WorldWideScience

Sample records for qr code rss

  1. Stylize Aesthetic QR Code

    OpenAIRE

    Xu, Mingliang; Su, Hao; Li, Yafei; Li, Xi; Liao, Jing; Niu, Jianwei; Lv, Pei; Zhou, Bing

    2018-01-01

    With the continued proliferation of smart mobile devices, Quick Response (QR) code has become one of the most-used types of two-dimensional code in the world. Aiming at beautifying the appearance of QR codes, existing works have developed a series of techniques to make the QR code more visual-pleasant. However, these works still leave much to be desired, such as visual diversity, aesthetic quality, flexibility, universal property, and robustness. To address these issues, in this paper, we pro...

  2. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  3. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  4. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  5. QR code for medical information uses.

    Science.gov (United States)

    Fontelo, Paul; Liu, Fang; Ducut, Erick G

    2008-11-06

    We developed QR code online tools, simulated and tested QR code applications for medical information uses including scanning QR code labels, URLs and authentication. Our results show possible applications for QR code in medicine.

  6. Surgical navigation with QR codes

    Directory of Open Access Journals (Sweden)

    Katanacho Manuel

    2016-09-01

    Full Text Available The presented work is an alternative to established measurement systems in surgical navigation. The system is based on camera based tracking of QR code markers. The application uses a single video camera, integrated in a surgical lamp, that captures the QR markers attached to surgical instruments and to the patient.

  7. Usage of QR code in tourism industry

    OpenAIRE

    Emek, Mehmet

    2012-01-01

    QR (Quick Response) code scanning allows the user to obtain in-depth information about the scanned item. Apps used for scanning QR codes can be found on nearly all smart phone devices. Travelers who have smart phone, equipped with the correct reader software, can easily access QR coded information (text, photo, video, web page, etc.) when it is available. Travelers can scan QR coded galleries, places, vineyards or monuments when they are visiting and reach the detailed information without usi...

  8. QR Codes: Taking Collections Further

    Science.gov (United States)

    Ahearn, Caitlin

    2014-01-01

    With some thought and direction, QR (quick response) codes are a great tool to use in school libraries to enhance access to information. From March through April 2013, Caitlin Ahearn interned at Sanborn Regional High School (SRHS) under the supervision of Pam Harland. As a result of Harland's un-Deweying of the nonfiction collection at SRHS,…

  9. Exploring the concept of QR Code and the benefits of using QR Code for companies

    OpenAIRE

    Ji, Qianyu

    2014-01-01

    This research work concentrates on the concept of QR Code and the benefits of using QR Code for companies. The first objective of this research work is to study the general information of QR Code in order to guide people to understand the QR Code in detail. The second objective of this research work is to explore and analyze the essential and feasible technologies of QR Code for the sake of clearing the technologies of QR code. Additionally, this research work through QR Code best practices t...

  10. QR CODE IN LIBRARY PRACTICE SOME EXAMPLES

    OpenAIRE

    Ajay Shanker Mishra*, Sachin Kumar Umre, Pavan Kumar Gupta

    2017-01-01

    Quick Response (QR) code is one such technology which can cater to the user demand of providing access to resources through mobile. The main objective of this article to review the concept of Quick Response Code (QR code) and describe the practice of reading and generating QR codes. Research paper attempt to the basic concept, structure, technological pros and cons of the QR code. The literature is filled with potential uses for Quick Response (QR) codes in the library practices like e-resour...

  11. QR CODES IN EDUCATION AND COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Gurhan DURAK

    2016-04-01

    Full Text Available Technological advances brought applications of innovations to education. Conventional education increasingly flourishes with new technologies accompanied by more learner active environments. In this continuum, there are learners preferring self-learning. Traditional learning materials yield attractive, motivating and technologically enhanced learning materials. The QR (Quick Response Codes are one of these innovations. The aim of this study is to redesign a lesson unit supported with QR Codes and to get the learner views about the redesigned material. For this purpose, the redesigned lesson unit was delivered to 15 learners in Balıkesir University in the academic year of 2013-2014. The learners were asked to study the material. The learners who had smart phones and Internet access were chosen for the study. To provide sectional diversity, three groups were created. The group learners were from Faculty of Education, Faculty of Science and Literature and Faculty of Engineering. After the semi-structured interviews were held, the learners were asked about their pre-knowledge about QR Codes, QR Codes’ contribution to learning, difficulties with using QR Codes about and design issues. Descriptive data analysis was used in the study. The findings were interpreted on the basis of Theory of Diffusion of Innovations and Theory of Uses and Gratifications. After the research, the themes found were awareness of QR Code, types of QR Codes and applications, contributions to learning, and proliferation of QR Codes. Generally, the learners participating in the study reported that they were aware of QR Codes; that they could use the QR Codes; and that using QR Codes in education was useful. They also expressed that such features as visual elements, attractiveness and direct routing had positive impact on learning. In addition, they generally mentioned that they did not have any difficulty using QR Codes; that they liked the design; and that the content should

  12. Utility of QR codes in biological collections.

    Science.gov (United States)

    Diazgranados, Mauricio; Funk, Vicki A

    2013-01-01

    The popularity of QR codes for encoding information such as URIs has increased exponentially in step with the technological advances and availability of smartphones, digital tablets, and other electronic devices. We propose using QR codes on specimens in biological collections to facilitate linking vouchers' electronic information with their associated collections. QR codes can efficiently provide such links for connecting collections, photographs, maps, ecosystem notes, citations, and even GenBank sequences. QR codes have numerous advantages over barcodes, including their small size, superior security mechanisms, increased complexity and quantity of information, and low implementation cost. The scope of this paper is to initiate an academic discussion about using QR codes on specimens in biological collections.

  13. Utility of QR codes in biological collections

    Directory of Open Access Journals (Sweden)

    Mauricio Diazgranados

    2013-07-01

    Full Text Available The popularity of QR codes for encoding information such as URIs has increased exponentially in step with the technological advances and availability of smartphones, digital tablets, and other electronic devices. We propose using QR codes on specimens in biological collections to facilitate linking vouchers’ electronic information with their associated collections. QR codes can efficiently provide such links for connecting collections, photographs, maps, ecosystem notes, citations, and even GenBank sequences. QR codes have numerous advantages over barcodes, including their small size, superior security mechanisms, increased complexity and quantity of information, and low implementation cost. The scope of this paper is to initiate an academic discussion about using QR codes on specimens in biological collections.

  14. QR Code: An Interactive Mobile Advertising Tool

    Directory of Open Access Journals (Sweden)

    Ela Sibel Bayrak Meydanoglu

    2013-10-01

    Full Text Available Easy and rapid interaction between consumers and marketers enabled by mobile technology prompted  an increase in the usage of mobile media as an interactive marketing tool in recent years. One of the mobile technologies that can be used in interactive marketing for advertising is QR code (Quick Response Code. Interactive advertising brings back some advantages for the companies that apply it. For example, interaction with consumers provides significant information about consumers' preferences. Marketers can use information obtained from consumers for various marketing activities such as customizing advertisement messages, determining  target audience, improving future products and services. QR codes used in marketing campaigns can provide links to specific websites in which through various tools (e.g. questionnaires, voting information about the needs and wants of customers are collected. The aim of this basic research is to illustrate the contribution of  QR codes to the realization of the advantages gained by interactive advertising.

  15. Interactive QR code beautification with full background image embedding

    Science.gov (United States)

    Lin, Lijian; Wu, Song; Liu, Sijiang; Jiang, Bo

    2017-06-01

    QR (Quick Response) code is a kind of two dimensional barcode that was first developed in automotive industry. Nowadays, QR code has been widely used in commercial applications like product promotion, mobile payment, product information management, etc. Traditional QR codes in accordance with the international standard are reliable and fast to decode, but are lack of aesthetic appearance to demonstrate visual information to customers. In this work, we present a novel interactive method to generate aesthetic QR code. By given information to be encoded and an image to be decorated as full QR code background, our method accepts interactive user's strokes as hints to remove undesired parts of QR code modules based on the support of QR code error correction mechanism and background color thresholds. Compared to previous approaches, our method follows the intention of the QR code designer, thus can achieve more user pleasant result, while keeping high machine readability.

  16. An introduction to using QR codes in scholarly journals

    Directory of Open Access Journals (Sweden)

    Jae Hwa Chang

    2014-08-01

    Full Text Available The Quick Response (QR code was first developed in 1994 by Denso Wave Incorporated, Japan. From that point on, it came into general use as an identification mark for all kinds of commercial products, advertisements, and other public announcements. In scholarly journals, the QR code is used to provide immediate direction to the journal homepage or specific content such as figures or videos. To produce a QR code and print it in the print version or upload to the web is very simple. Using a QR code producing program, an editor can add simple information to a website. After that, a QR code is produced. A QR code is very stable, such that it can be used for a long time without loss of quality. Producing and adding QR codes to a journal costs nothing; therefore, to increase the visibility of their journals, it is time for editors to add QR codes to their journals.

  17. QR Codes in the Library: Are They Worth the Effort? Analysis of a QR Code Pilot Project

    OpenAIRE

    Wilson, Andrew M.

    2012-01-01

    The literature is filled with potential uses for Quick Response (QR) codes in the library. Setting, but few library QR code projects have publicized usage statistics. A pilot project carried out in the Eda Kuhn Loeb Music Library of the Harvard College Library sought to determine whether library patrons actually understand and use QR codes. Results and analysis of the pilot project are provided, attempting to answer the question as to whether QR codes are worth the effort for libraries.

  18. QR Code: An Interactive Mobile Advertising Tool

    OpenAIRE

    Ela Sibel Bayrak Meydanoglu

    2013-01-01

    Easy and rapid interaction between consumers and marketers enabled by mobile technology prompted  an increase in the usage of mobile media as an interactive marketing tool in recent years. One of the mobile technologies that can be used in interactive marketing for advertising is QR code (Quick Response Code). Interactive advertising brings back some advantages for the companies that apply it. For example, interaction with consumers provides significant information about consumers' preference...

  19. QR codes: next level of social media.

    Science.gov (United States)

    Gottesman, Wesley; Baum, Neil

    2013-01-01

    The OR code, which is short for quick response code, system was invented in Japan for the auto industry. Its purpose was to track vehicles during manufacture; it was designed to allow high-speed component scanning. Now the scanning can be easily accomplished via cell phone, making the technology useful and within reach of your patients. There are numerous applications for OR codes in the contemporary medical practice. This article describes QR codes and how they might be applied for marketing and practice management.

  20. Research on pre-processing of QR Code

    Science.gov (United States)

    Sun, Haixing; Xia, Haojie; Dong, Ning

    2013-10-01

    QR code encodes many kinds of information because of its advantages: large storage capacity, high reliability, full arrange of utter-high-speed reading, small printing size and high-efficient representation of Chinese characters, etc. In order to obtain the clearer binarization image from complex background, and improve the recognition rate of QR code, this paper researches on pre-processing methods of QR code (Quick Response Code), and shows algorithms and results of image pre-processing for QR code recognition. Improve the conventional method by changing the Souvola's adaptive text recognition method. Additionally, introduce the QR code Extraction which adapts to different image size, flexible image correction approach, and improve the efficiency and accuracy of QR code image processing.

  1. Improvement of QR Code Recognition Based on Pillbox Filter Analysis

    Directory of Open Access Journals (Sweden)

    Jia-Shing Sheu

    2013-04-01

    Full Text Available The objective of this paper is to perform the innovation design for improving the recognition of a captured QR code image with blur through the Pillbox filter analysis. QR code images can be captured by digital video cameras. Many factors contribute to QR code decoding failure, such as the low quality of the image. Focus is an important factor that affects the quality of the image. This study discusses the out-of-focus QR code image and aims to improve the recognition of the contents in the QR code image. Many studies have used the pillbox filter (circular averaging filter method to simulate an out-of-focus image. This method is also used in this investigation to improve the recognition of a captured QR code image. A blurred QR code image is separated into nine levels. In the experiment, four different quantitative approaches are used to reconstruct and decode an out-of-focus QR code image. These nine reconstructed QR code images using methods are then compared. The final experimental results indicate improvements in identification.

  2. Ink-constrained halftoning with application to QR codes

    Science.gov (United States)

    Bayeh, Marzieh; Compaan, Erin; Lindsey, Theodore; Orlow, Nathan; Melczer, Stephen; Voller, Zachary

    2014-01-01

    This paper examines adding visually significant, human recognizable data into QR codes without affecting their machine readability by utilizing known methods in image processing. Each module of a given QR code is broken down into pixels, which are halftoned in such a way as to keep the QR code structure while revealing aspects of the secondary image to the human eye. The loss of information associated to this procedure is discussed, and entropy values are calculated for examples given in the paper. Numerous examples of QR codes with embedded images are included.

  3. Blending Classroom Teaching and Learning with QR Codes

    Science.gov (United States)

    Rikala, Jenni; Kankaanranta, Marja

    2014-01-01

    The aim of this case study was to explore the feasibility of the Quick Response (QR) codes and mobile devices in the context of Finnish basic education. The interest was especially to explore how mobile devices and QR codes can enhance and blend teaching and learning. The data were collected with a teacher interview and pupil surveys. The learning…

  4. Evaluation of an electrocardiogram on QR code.

    Science.gov (United States)

    Nakayama, Masaharu; Shimokawa, Hiroaki

    2013-01-01

    An electrocardiogram (ECG) is an indispensable tool to diagnose cardiac diseases, such as ischemic heart disease, myocarditis, arrhythmia, and cardiomyopathy. Since ECG patterns vary depend on patient status, it is also used to monitor patients during treatment and comparison with ECGs with previous results is important for accurate diagnosis. However, the comparison requires connection to ECG data server in a hospital and the availability of data connection among hospitals is limited. To improve the portability and availability of ECG data regardless of server connection, we here introduce conversion of ECG data into 2D barcodes as text data and decode of the QR code for drawing ECG with Google Chart API. Fourteen cardiologists and six general physicians evaluated the system using iPhone and iPad. Overall, they were satisfied with the system in usability and accuracy of decoded ECG compared to the original ECG. This new coding system may be useful in utilizing ECG data irrespective of server connections.

  5. Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks

    OpenAIRE

    Mavroeidis, Vasileios; Nicho, Mathew

    2017-01-01

    The two-dimensional quick response (QR) codes can be misleading due to the difficulty in differentiating a genuine QR code from a malicious one. Since the vulnerability is practically part of their design, scanning a malicious QR code can direct the user to cloned malicious sites resulting in revealing sensitive information. In order to evaluate the vulnerabilities and propose subsequent countermeasures, we demonstrate this type of attack through a simulated experiment, where a malicious QR c...

  6. QR code optical encryption using spatially incoherent illumination

    Science.gov (United States)

    Cheremkhin, P. A.; Krasnov, V. V.; Rodin, V. G.; Starikov, R. S.

    2017-02-01

    Optical encryption is an actively developing field of science. The majority of encryption techniques use coherent illumination and suffer from speckle noise, which severely limits their applicability. The spatially incoherent encryption technique does not have this drawback, but its effectiveness is dependent on the Fourier spectrum properties of the image to be encrypted. The application of a quick response (QR) code in the capacity of a data container solves this problem, and the embedded error correction code also enables errorless decryption. The optical encryption of digital information in the form of QR codes using spatially incoherent illumination was implemented experimentally. The encryption is based on the optical convolution of the image to be encrypted with the kinoform point spread function, which serves as an encryption key. Two liquid crystal spatial light modulators were used in the experimental setup for the QR code and the kinoform imaging, respectively. The quality of the encryption and decryption was analyzed in relation to the QR code size. Decryption was conducted digitally. The successful decryption of encrypted QR codes of up to 129  ×  129 pixels was demonstrated. A comparison with the coherent QR code encryption technique showed that the proposed technique has a signal-to-noise ratio that is at least two times higher.

  7. The feasibility of QR-code prescription in Taiwan.

    Science.gov (United States)

    Lin, C-H; Tsai, F-Y; Tsai, W-L; Wen, H-W; Hu, M-L

    2012-12-01

    An ideal Health Care Service is a service system that focuses on patients. Patients in Taiwan have the freedom to fill their prescriptions at any pharmacies contracted with National Health Insurance. Each of these pharmacies uses its own computer system. So far, there are at least ten different systems on the market in Taiwan. To transmit the prescription information from the hospital to the pharmacy accurately and efficiently presents a great issue. This study consisted of two-dimensional applications using a QR-code to capture Patient's identification and prescription information from the hospitals as well as using a webcam to read the QR-code and transfer all data to the pharmacy computer system. Two hospitals and 85 community pharmacies participated in the study. During the trial, all participant pharmacies appraised highly of the accurate transmission of the prescription information. The contents in QR-code prescriptions from Taipei area were picked up efficiently and accurately in pharmacies at Taichung area (middle Taiwan) without software system limit and area limitation. The QR-code device received a patent (No. M376844, March 2010) from Intellectual Property Office Ministry of Economic Affair, China. Our trial has proven that QR-code prescription can provide community pharmacists an efficient, accurate and inexpensive device to digitalize the prescription contents. Consequently, pharmacists can offer better quality of pharmacy service to patients. © 2012 Blackwell Publishing Ltd.

  8. [INVITED] Luminescent QR codes for smart labelling and sensing

    Science.gov (United States)

    Ramalho, João F. C. B.; António, L. C. F.; Correia, S. F. H.; Fu, L. S.; Pinho, A. S.; Brites, C. D. S.; Carlos, L. D.; André, P. S.; Ferreira, R. A. S.

    2018-05-01

    QR (Quick Response) codes are two-dimensional barcodes composed of special geometric patterns of black modules in a white square background that can encode different types of information with high density and robustness, correct errors and physical damages, thus keeping the stored information protected. Recently, these codes have gained increased attention as they offer a simple physical tool for quick access to Web sites for advertising and social interaction. Challenges encompass the increase of the storage capacity limit, even though they can store approximately 350 times more information than common barcodes, and encode different types of characters (e.g., numeric, alphanumeric, kanji and kana). In this work, we fabricate luminescent QR codes based on a poly(methyl methacrylate) substrate coated with organic-inorganic hybrid materials doped with trivalent terbium (Tb3+) and europium (Eu3+) ions, demonstrating the increase of storage capacity per unit area by a factor of two by using the colour multiplexing, when compared to conventional QR codes. A novel methodology to decode the multiplexed QR codes is developed based on a colour separation threshold where a decision level is calculated through a maximum-likelihood criteria to minimize the error probability of the demultiplexed modules, maximizing the foreseen total storage capacity. Moreover, the thermal dependence of the emission colour coordinates of the Eu3+/Tb3+-based hybrids enables the simultaneously QR code colour-multiplexing and may be used to sense temperature (reproducibility higher than 93%), opening new fields of applications for QR codes as smart labels for sensing.

  9. The Digital Forensics and Security Challenge of QR Codes

    Directory of Open Access Journals (Sweden)

    Nik Thompson

    2013-06-01

    Full Text Available The disciplines of digital forensics and IT security must adapt to new technologies and methods of interaction with those technologies.  New technologies present both challenges and opportunities for providing evidence for digital forensics investigations.  These may be in the form of new devices such as smartphones or new methods of sharing information, such as social networks.  One such rapidly emerging interaction technology is the use of Quick Response (QR codes.  These offer a physical mechanism for quick access to web sites for advertising and social interaction.  This paper argues that the common implementation of QR codes potentially presents security issues which must be considered.  It analyzes potential privacy problems with QR codes and studies a range of devices as they may have implications for the process of evidence collection and analysis.

  10. Two-dimensional QR-coded metamaterial absorber

    Science.gov (United States)

    Sui, Sai; Ma, Hua; Wang, Jiafu; Pang, Yongqiang; Zhang, Jieqiu; Qu, Shaobo

    2016-01-01

    In this paper, the design of metamaterial absorbers is proposed based on QR coding and topology optimization. Such absorbers look like QR codes and can be recognized by decoding softwares as well as mobile phones. To verify the design, two lightweight wideband absorbers are designed, which can achieve wideband absorption above 90 % in 6.68-19.30 and 7.00-19.70 GHz, respectively. More importantly, polarization-independent absorption over 90 % can be maintained under incident angle within 55°. The QR code absorber not only can achieve wideband absorption, but also can carry information such as texts and Web sites. They are of important values in applications such identification and electromagnetic protection.

  11. Development of Teaching Materials for a Physical Chemistry Experiment Using the QR Code

    OpenAIRE

    吉村, 忠与志

    2008-01-01

    The development of teaching materials with the QR code was attempted in an educational environment using a mobile telephone. The QR code is not sufficiently utilized in education, and the current study is one of the first in the field. The QR code is encrypted. However, the QR code can be deciphered by mobile telephones, thus enabling the expression of text in a small space.Contents of "Physical Chemistry Experiment" which are available on the Internet are briefly summarized and simplified. T...

  12. Evaluating QR Code Case Studies Using a Mobile Learning Framework

    Science.gov (United States)

    Rikala, Jenni

    2014-01-01

    The aim of this study was to evaluate the feasibility of Quick Response (QR) codes and mobile devices in the context of Finnish basic education. The feasibility was analyzed through a mobile learning framework, which includes the core characteristics of mobile learning. The study is part of a larger research where the aim is to develop a…

  13. QR Codes as Finding Aides: Linking Electronic and Print Library Resources

    Science.gov (United States)

    Kane, Danielle; Schneidewind, Jeff

    2011-01-01

    As part of a focused, methodical, and evaluative approach to emerging technologies, QR codes are one of many new technologies being used by the UC Irvine Libraries. QR codes provide simple connections between print and virtual resources. In summer 2010, a small task force began to investigate how QR codes could be used to provide information and…

  14. Evaluation and implementation of QR Code Identity Tag system for Healthcare in Turkey

    OpenAIRE

    Uzun, Vassilya; Bilgin, Sami

    2016-01-01

    For this study, we designed a QR Code Identity Tag system to integrate into the Turkish healthcare system. This system provides QR code-based medical identification alerts and an in-hospital patient identification system. Every member of the medical system is assigned a unique QR Code Tag; to facilitate medical identification alerts, the QR Code Identity Tag can be worn as a bracelet or necklace or carried as an ID card. Patients must always possess the QR Code Identity bracelets within hospi...

  15. SISTEM LEGALISIR SCAN IJASAH ONLINE BERBASIS QR CODE DAN WATERMARKING

    Directory of Open Access Journals (Sweden)

    Erwin Yudi Hidayat

    2015-05-01

    Full Text Available Dokumen ijasah memiliki arti penting bagi pemiliknya sebagai bukti seseorang telah menyelesaikan satu tahap studi yang ditempuh. Ijasah juga termasuk syarat utama ketika seseorang melamar kerja. Universitas Dian Nuswantoro (UDINUS memerlukan sistem yang handal untuk mengelola legalisir ijasah dengan cara digital dan online. Meskipun unggul dalam penyimpanan, ijasah dalam bentuk digital dapat dimodifikasi dan disalahgunakan dengan mudah. Untuk itu, perlindungan terhadap legalisir ijasah digital sangat diperlukan untuk menghindari penyalahgunaan oleh pihak yang tidak berwenang. Metode verifikasi pertama adalah Quick Response (QR Code. Metode kedua disebut watermarking. Hasil yang diperoleh menunjukkan, metode ini dapat diaplikasikan pada legalisir ijasah di lingkungan UDINUS untuk mempermudah pencarian data dan meminimalkan kemungkinan modifikasi dokumen ijasah digital. Kata Kunci: legalisir, ijasah, QR Code, watermarking.

  16. Privacy with Public Access: Digital Memorials on QR Codes

    DEFF Research Database (Denmark)

    Gotved, Stine

    2015-01-01

    takes the departure in gravestones with QR-codes; objects at once physical and digital, underhandedly putting presumably private content within public reach. A plethora of issues of privacy and publicness are at play within the study's two connected but rather different empirical spaces: the physical...... in the borderland between private and public is exemplified, and with the presentation, we are ensuring a continued discussion on privacy as well as legacy in our digital society....

  17. PENGEMBANGAN METODE OTENTIKASI KEASLIAN IJASAH DENGAN MEMANFAATKAN GAMBAR QR CODE

    Directory of Open Access Journals (Sweden)

    Eka Ardhianto

    2016-06-01

    Full Text Available - QR Code is two-dimensional image that represents the data, particularly data-shaped teks. QR Code is an evolution of the first one-dimensional barcode into two dimentions. QR Code has the ability to store much more data than a barcode. One of the important data in the campus are collegers certificate. It is a document that serves as proof of authenticity that someone has undergone a formal education stage and successfully pass the exam. The collegers certificate conventionally used today is a collegers certificate in physical form so that there is the possibility of lost or damaged. Conventional collegers certificate verification process is difficult because the process is carried out only by the manufacturer of collegers certificate. The means used to verify the authenticity of the data collegers certificate today is to make direct contact to the manufacturer's certificate regarding authenticity certificate holder, as well as the legalization process tertandatangan of collegers certificate maker. From the conduct of research and testing conducted it can be concluded that: QRCode can be used to accommodate large data information of graduate, Facilitate the detection of the authenticity of the certificate of ownership information from mobile devices, also QRCode can be quickly used to verify the certificates quickly and accurately

  18. Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography

    Directory of Open Access Journals (Sweden)

    Jianfeng Lu

    2017-01-01

    Full Text Available QR code (quick response code is used due to its beneficial properties, especially in the mobile payment field. However, there exists an inevitable risk in the transaction process. It is not easily perceived that the attacker tampers with or replaces the QR code that contains merchant’s beneficiary account. Thus, it is of great urgency to conduct authentication of QR code. In this study, we propose a novel mechanism based on visual cryptography scheme (VCS and aesthetic QR code, which contains three primary schemes for different concealment levels. The main steps of these schemes are as follows. Firstly, one original QR code is split into two shadows using VC multiple rules; secondly, the two shadows are embedded into the same background image, respectively, and the embedded results are fused with the same carrier QR code, respectively, using XOR mechanism of RS and QR code error correction mechanism. Finally, the two aesthetic QR codes can be stacked precisely and the original QR code is restored according to the defined VCS. Experiments corresponding to three proposed schemes are conducted and demonstrate the feasibility and security of the mobile payment authentication, the significant improvement of the concealment for the shadows in QR code, and the diversity of mobile payment authentication.

  19. Evaluation and implementation of QR Code Identity Tag system for Healthcare in Turkey.

    Science.gov (United States)

    Uzun, Vassilya; Bilgin, Sami

    2016-01-01

    For this study, we designed a QR Code Identity Tag system to integrate into the Turkish healthcare system. This system provides QR code-based medical identification alerts and an in-hospital patient identification system. Every member of the medical system is assigned a unique QR Code Tag; to facilitate medical identification alerts, the QR Code Identity Tag can be worn as a bracelet or necklace or carried as an ID card. Patients must always possess the QR Code Identity bracelets within hospital grounds. These QR code bracelets link to the QR Code Identity website, where detailed information is stored; a smartphone or standalone QR code scanner can be used to scan the code. The design of this system allows authorized personnel (e.g., paramedics, firefighters, or police) to access more detailed patient information than the average smartphone user: emergency service professionals are authorized to access patient medical histories to improve the accuracy of medical treatment. In Istanbul, we tested the self-designed system with 174 participants. To analyze the QR Code Identity Tag system's usability, the participants completed the System Usability Scale questionnaire after using the system.

  20. The interest of Romanian consumers in using QR codes in restaurants and pubs

    OpenAIRE

    Marius BĂLĂŞESCU; Lavinia DOVLEAC

    2017-01-01

    The fast development of smartphone technology has created an opportunity to use QR code, considered a popular way of mobile tagging due to its ease of use. Various types of hospitality units, such as accommodations or restaurants and bars have found in QR codes an excellent marketing tool. This paper presents the results of a marketing research study conducted in Brasov city from Romania regarding the consumers’ interest in using QR codes in restaurants and pubs. The results show that mostly ...

  1. The interest of Romanian consumers in using QR codes in restaurants and pubs

    Directory of Open Access Journals (Sweden)

    Marius BĂLĂŞESCU

    2017-07-01

    Full Text Available The fast development of smartphone technology has created an opportunity to use QR code, considered a popular way of mobile tagging due to its ease of use. Various types of hospitality units, such as accommodations or restaurants and bars have found in QR codes an excellent marketing tool. This paper presents the results of a marketing research study conducted in Brasov city from Romania regarding the consumers’ interest in using QR codes in restaurants and pubs. The results show that mostly the young generation of consumers is aware of QR codes existence because they have smartphones and they are always interested in testing the latest technologies.

  2. QR code based noise-free optical encryption and decryption of a gray scale image

    Science.gov (United States)

    Jiao, Shuming; Zou, Wenbin; Li, Xia

    2017-03-01

    In optical encryption systems, speckle noise is one major challenge in obtaining high quality decrypted images. This problem can be addressed by employing a QR code based noise-free scheme. Previous works have been conducted for optically encrypting a few characters or a short expression employing QR codes. This paper proposes a practical scheme for optically encrypting and decrypting a gray-scale image based on QR codes for the first time. The proposed scheme is compatible with common QR code generators and readers. Numerical simulation results reveal the proposed method can encrypt and decrypt an input image correctly.

  3. Use Them ... or Lose Them? The Case for and against Using QR Codes

    Science.gov (United States)

    Cunningham, Chuck; Dull, Cassie

    2011-01-01

    A quick-response (QR) code is a two-dimensional, black-and-white square barcode and links directly to a URL of one's choice. When the code is scanned with a smartphone, it will automatically redirect the user to the designated URL. QR codes are popping up everywhere--billboards, magazines, posters, shop windows, TVs, computer screens, and more.…

  4. Supporting Situated Learning Based on QR Codes with Etiquetar App: A Pilot Study

    Science.gov (United States)

    Camacho, Miguel Olmedo; Pérez-Sanagustín, Mar; Alario-Hoyos, Carlos; Soldani, Xavier; Kloos, Carlos Delgado; Sayago, Sergio

    2014-01-01

    EtiquetAR is an authoring tool for supporting the design and enactment of situated learning experiences based on QR tags. Practitioners use etiquetAR for creating, managing and personalizing collections of QR codes with special properties: (1) codes can have more than one link pointing at different multimedia resources, (2) codes can be updated…

  5. Optical encryption and QR codes: secure and noise-free information retrieval.

    Science.gov (United States)

    Barrera, John Fredy; Mira, Alejandro; Torroba, Roberto

    2013-03-11

    We introduce for the first time the concept of an information "container" before a standard optical encrypting procedure. The "container" selected is a QR code which offers the main advantage of being tolerant to pollutant speckle noise. Besides, the QR code can be read by smartphones, a massively used device. Additionally, QR code includes another secure step to the encrypting benefits the optical methods provide. The QR is generated by means of worldwide free available software. The concept development probes that speckle noise polluting the outcomes of normal optical encrypting procedures can be avoided, then making more attractive the adoption of these techniques. Actual smartphone collected results are shown to validate our proposal.

  6. Cooperative Secret Sharing Using QR Codes and Symmetric Keys

    Directory of Open Access Journals (Sweden)

    Yang-Wai Chow

    2018-04-01

    Full Text Available Secret sharing is an information security technique where a dealer divides a secret into a collection of shares and distributes these to members of a group. The secret will only be revealed when a predefined number of group members cooperate to recover the secret. The purpose of this study is to investigate a method of distributing shares by embedding them into cover Quick Response (QR codes in a secure manner using cryptographic keys. The advantage of this approach is that the shares can be disseminated over public channels, as anyone who scans the QR codes will only obtain public information. Only authorized individuals who are in possession of the required keys will be able to recover the shares. This also means that when group members cooperate to recover a secret, the group can determine the presence of an illegitimate participant if the person does not produce a valid share. This study proposes a protocol for accomplishing this and discusses the underlying security of the protocol.

  7. Breaking the Code: The Creative Use of QR Codes to Market Extension Events

    Science.gov (United States)

    Hill, Paul; Mills, Rebecca; Peterson, GaeLynn; Smith, Janet

    2013-01-01

    The use of smartphones has drastically increased in recent years, heralding an explosion in the use of QR codes. The black and white square barcodes that link the physical and digital world are everywhere. These simple codes can provide many opportunities to connect people in the physical world with many of Extension online resources. The…

  8. A QR code identification technology in package auto-sorting system

    Science.gov (United States)

    di, Yi-Juan; Shi, Jian-Ping; Mao, Guo-Yong

    2017-07-01

    Traditional manual sorting operation is not suitable for the development of Chinese logistics. For better sorting packages, a QR code recognition technology is proposed to identify the QR code label on the packages in package auto-sorting system. The experimental results compared with other algorithms in literatures demonstrate that the proposed method is valid and its performance is superior to other algorithms.

  9. QR-codes maken entree in de bibliotheek: barcode nieuwe stijl

    NARCIS (Netherlands)

    Braak, P.

    2010-01-01

    QR (Quick Response) codes zijn barcodes die je met een mobiele telefoon kunt lezen. Ze zijn steeds vaker te vinden op posters, advertenties en andere producten. Meestal bevat een QR-code een URL. Na het scannen opent op de telefoon direct een (mobiele) website met aanvullende informatie over hetgeen

  10. Quick Response (QR) Codes for Audio Support in Foreign Language Learning

    Science.gov (United States)

    Vigil, Kathleen Murray

    2017-01-01

    This study explored the potential benefits and barriers of using quick response (QR) codes as a means by which to provide audio materials to middle-school students learning Spanish as a foreign language. Eleven teachers of Spanish to middle-school students created transmedia materials containing QR codes linking to audio resources. Students…

  11. Pre-Service Teachers' Perception of Quick Response (QR) Code Integration in Classroom Activities

    Science.gov (United States)

    Ali, Nagla; Santos, Ieda M.; Areepattamannil, Shaljan

    2017-01-01

    Quick Response (QR) codes have been discussed in the literature as adding value to teaching and learning. Despite their potential in education, more research is needed to inform practice and advance knowledge in this field. This paper investigated the integration of the QR code in classroom activities and the perceptions of the integration by…

  12. Evaluation of an Online Instructional Database Accessed by QR Codes to Support Biochemistry Practical Laboratory Classes

    Science.gov (United States)

    Yip, Tor; Melling, Louise; Shaw, Kirsty J.

    2016-01-01

    An online instructional database containing information on commonly used pieces of laboratory equipment was created. In order to make the database highly accessible and to promote its use, QR codes were utilized. The instructional materials were available anytime and accessed using QR codes located on the equipment itself and within undergraduate…

  13. EVALUATION OF USAGE AND APPLICATION AREAS OF QR CODES IN SERVICE INDUSTRY

    Directory of Open Access Journals (Sweden)

    Aysel SANAL

    2018-01-01

    Full Text Available The use of QR codes accelerates the sharing of information and provides more practical access to information. In today's information age, in the limited area unlimited information, data and contents can be transferred with using QR code. This study examines how consumers use QR code technology using by the service sector and aim of inform consumers about their perception and usage levels. In the application part of the study, 180 consumers responded the survey questions. The t-test, ANOVA, variance analysis and regression analysis method were used to test hypotheses established in the research. Thus, factors affecting the perceptions of consumers on QR code technology have been identified. The finance and banking sectors have been identified as the sectors in which consumers use the QR code most frequently, and the speed and availability factors for this sector have been analyzed separately.

  14. Optical image encryption using QR code and multilevel fingerprints in gyrator transform domains

    Science.gov (United States)

    Wei, Yang; Yan, Aimin; Dong, Jiabin; Hu, Zhijuan; Zhang, Jingtao

    2017-11-01

    A new concept of GT encryption scheme is proposed in this paper. We present a novel optical image encryption method by using quick response (QR) code and multilevel fingerprint keys in gyrator transform (GT) domains. In this method, an original image is firstly transformed into a QR code, which is placed in the input plane of cascaded GTs. Subsequently, the QR code is encrypted into the cipher-text by using multilevel fingerprint keys. The original image can be obtained easily by reading the high-quality retrieved QR code with hand-held devices. The main parameters used as private keys are GTs' rotation angles and multilevel fingerprints. Biometrics and cryptography are integrated with each other to improve data security. Numerical simulations are performed to demonstrate the validity and feasibility of the proposed encryption scheme. In the future, the method of applying QR codes and fingerprints in GT domains possesses much potential for information security.

  15. Aplikasi Wisata Berplatform Android dengan Teknologi QR Code

    Directory of Open Access Journals (Sweden)

    Afan Galih Salman

    2013-12-01

    Full Text Available As a country renowned for its natural beauty, Indonesia has many interesting attractions to visit. An example is the attraction of animals shown at Ragunan Zoo. At Ragunan Zoo visitors not only enjoy the tour, but also learn about animals shown. However, information about the animals is only provided on the board. Therefore,Ragunan Zoo needs a technology that provides more information, efficiently and as a guide to explore the tourist attractions. The purpose of this research is to design an android-based mobile application that can provide information more than what is show on the board as well as provides digital mapinformation. The application generated in this study implements the QR code scanning to obtain information as well as locations of digital map attraction.

  16. Optical image encryption based on real-valued coding and subtracting with the help of QR code

    Science.gov (United States)

    Deng, Xiaopeng

    2015-08-01

    A novel optical image encryption based on real-valued coding and subtracting is proposed with the help of quick response (QR) code. In the encryption process, the original image to be encoded is firstly transformed into the corresponding QR code, and then the corresponding QR code is encoded into two phase-only masks (POMs) by using basic vector operations. Finally, the absolute values of the real or imaginary parts of the two POMs are chosen as the ciphertexts. In decryption process, the QR code can be approximately restored by recording the intensity of the subtraction between the ciphertexts, and hence the original image can be retrieved without any quality loss by scanning the restored QR code with a smartphone. Simulation results and actual smartphone collected results show that the method is feasible and has strong tolerance to noise, phase difference and ratio between intensities of the two decryption light beams.

  17. Integration of QR codes into an anesthesia information management system for resident case log management.

    Science.gov (United States)

    Avidan, Alexander; Weissman, Charles; Levin, Phillip D

    2015-04-01

    Quick response (QR) codes containing anesthesia syllabus data were introduced into an anesthesia information management system. The code was generated automatically at the conclusion of each case and available for resident case logging using a smartphone or tablet. The goal of this study was to evaluate the use and usability/user-friendliness of such system. Resident case logging practices were assessed prior to introducing the QR codes. QR code use and satisfactions amongst residents was reassessed at three and six months. Before QR code introduction only 12/23 (52.2%) residents maintained a case log. Most of the remaining residents (9/23, 39.1%) expected to receive a case list from the anesthesia information management system database at the end of their residency. At three months and six months 17/26 (65.4%) and 15/25 (60.0%) residents, respectively, were using the QR codes. Satisfaction was rated as very good or good. QR codes for residents' case logging with smartphones or tablets were successfully introduced in an anesthesia information management system and used by most residents. QR codes can be successfully implemented into medical practice to support data transfer. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  18. Binary Large Object-Based Approach for QR Code Detection in Uncontrolled Environments

    Directory of Open Access Journals (Sweden)

    Omar Lopez-Rincon

    2017-01-01

    Full Text Available Quick Response QR barcode detection in nonarbitrary environment is still a challenging task despite many existing applications for finding 2D symbols. The main disadvantage of recent applications for QR code detection is a low performance for rotated and distorted single or multiple symbols in images with variable illumination and presence of noise. In this paper, a particular solution for QR code detection in uncontrolled environments is presented. The proposal consists in recognizing geometrical features of QR code using a binary large object- (BLOB- based algorithm with subsequent iterative filtering QR symbol position detection patterns that do not require complex processing and training of classifiers frequently used for these purposes. The high precision and speed are achieved by adaptive threshold binarization of integral images. In contrast to well-known scanners, which fail to detect QR code with medium to strong blurring, significant nonuniform illumination, considerable symbol deformations, and noising, the proposed technique provides high recognition rate of 80%–100% with a speed compatible to real-time applications. In particular, speed varies from 200 ms to 800 ms per single or multiple QR code detected simultaneously in images with resolution from 640 × 480 to 4080 × 2720, respectively.

  19. High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique

    Science.gov (United States)

    Zhao, Shengmei; Wang, Le; Liang, Wenqiang; Cheng, Weiwen; Gong, Longyan

    2015-10-01

    In this paper, we propose a high performance optical encryption (OE) scheme based on computational ghost imaging (GI) with QR code and compressive sensing (CS) technique, named QR-CGI-OE scheme. N random phase screens, generated by Alice, is a secret key and be shared with its authorized user, Bob. The information is first encoded by Alice with QR code, and the QR-coded image is then encrypted with the aid of computational ghost imaging optical system. Here, measurement results from the GI optical system's bucket detector are the encrypted information and be transmitted to Bob. With the key, Bob decrypts the encrypted information to obtain the QR-coded image with GI and CS techniques, and further recovers the information by QR decoding. The experimental and numerical simulated results show that the authorized users can recover completely the original image, whereas the eavesdroppers can not acquire any information about the image even the eavesdropping ratio (ER) is up to 60% at the given measurement times. For the proposed scheme, the number of bits sent from Alice to Bob are reduced considerably and the robustness is enhanced significantly. Meantime, the measurement times in GI system is reduced and the quality of the reconstructed QR-coded image is improved.

  20. Enhancing the shopping experience through QR codes: the perspective of the Romanian users

    Directory of Open Access Journals (Sweden)

    Irina Albăstroiu

    2015-05-01

    Full Text Available The progress registered in the field of information and communication technologies has induced significant changes in the purchasing behaviour of the consumers who nowadays want simultaneous use of online and offline channels within the same shopping experience. QR Code (Quick Response is among the emerging technologies that retailers can implement for adapting to these changes. Through reviewing the literature, the article firstly clarifies the characteristics and applicability of the QR codes, especially in retail, and then presents the results of an exploratory research conducted among Romanian users regarding their attitude and interest in QR codes. The objective of the research was to identify the degree of usage, the willingness of the Romanian people to use codes in the buying process and also their perception about the functionality and usefulness of the codes. This is a pioneering work for the Romanian literature, because there aren`t other studies that explore issues concerning the use of QR codes in the buying process. Results of the study indicated that respondents know the applicability of QR codes and have used codes for accessing information about products and for online purchases and they consider that QR codes contribute to the improving of the shopping experience.

  1. Using QR codes for continuous assessment in higher education

    Directory of Open Access Journals (Sweden)

    Virginia Jiménez Rodríguez

    2016-10-01

    Full Text Available The implementation of information and communications technology (ICT in education has accelerated in recent years. At university level educational platforms that provide access to the contents of different subjects are used, as well as on-line communication between teachers and students. This project intended to improve teacher quality and motivation and satisfaction in 1st grade students, through the insertion of new ICT tools [forms Google and QR codes (quick response codes] that allow students the continuous assessment of their own learning, with particular emphasis on the application of metacognitive strategies for problem solving. It was conducted during the academic year 2014-2015 in the subject of Basic Psychology (practices. The subject Basic Psychology is taught in 1st Degree of Social Work at the Complutense University of Madrid. It consists of six ECTS (European Credit Transfer and Accumulation System credits and as such, students receive two hours of lecture and practical class one hour each week. It was during the weekly hour of practice which was carried out this innovation project.

  2. DNA barcode goes two-dimensions: DNA QR code web server.

    Science.gov (United States)

    Liu, Chang; Shi, Linchun; Xu, Xiaolan; Li, Huan; Xing, Hang; Liang, Dong; Jiang, Kun; Pang, Xiaohui; Song, Jingyuan; Chen, Shilin

    2012-01-01

    The DNA barcoding technology uses a standard region of DNA sequence for species identification and discovery. At present, "DNA barcode" actually refers to DNA sequences, which are not amenable to information storage, recognition, and retrieval. Our aim is to identify the best symbology that can represent DNA barcode sequences in practical applications. A comprehensive set of sequences for five DNA barcode markers ITS2, rbcL, matK, psbA-trnH, and CO1 was used as the test data. Fifty-three different types of one-dimensional and ten two-dimensional barcode symbologies were compared based on different criteria, such as coding capacity, compression efficiency, and error detection ability. The quick response (QR) code was found to have the largest coding capacity and relatively high compression ratio. To facilitate the further usage of QR code-based DNA barcodes, a web server was developed and is accessible at http://qrfordna.dnsalias.org. The web server allows users to retrieve the QR code for a species of interests, convert a DNA sequence to and from a QR code, and perform species identification based on local and global sequence similarities. In summary, the first comprehensive evaluation of various barcode symbologies has been carried out. The QR code has been found to be the most appropriate symbology for DNA barcode sequences. A web server has also been constructed to allow biologists to utilize QR codes in practical DNA barcoding applications.

  3. DNA barcode goes two-dimensions: DNA QR code web server.

    Directory of Open Access Journals (Sweden)

    Chang Liu

    Full Text Available The DNA barcoding technology uses a standard region of DNA sequence for species identification and discovery. At present, "DNA barcode" actually refers to DNA sequences, which are not amenable to information storage, recognition, and retrieval. Our aim is to identify the best symbology that can represent DNA barcode sequences in practical applications. A comprehensive set of sequences for five DNA barcode markers ITS2, rbcL, matK, psbA-trnH, and CO1 was used as the test data. Fifty-three different types of one-dimensional and ten two-dimensional barcode symbologies were compared based on different criteria, such as coding capacity, compression efficiency, and error detection ability. The quick response (QR code was found to have the largest coding capacity and relatively high compression ratio. To facilitate the further usage of QR code-based DNA barcodes, a web server was developed and is accessible at http://qrfordna.dnsalias.org. The web server allows users to retrieve the QR code for a species of interests, convert a DNA sequence to and from a QR code, and perform species identification based on local and global sequence similarities. In summary, the first comprehensive evaluation of various barcode symbologies has been carried out. The QR code has been found to be the most appropriate symbology for DNA barcode sequences. A web server has also been constructed to allow biologists to utilize QR codes in practical DNA barcoding applications.

  4. A novel use of QR code stickers after orthopaedic cast application.

    Science.gov (United States)

    Gough, A T; Fieraru, G; Gaffney, Pav; Butler, M; Kincaid, R J; Middleton, R G

    2017-07-01

    INTRODUCTION We present a novel solution to ensure that information and contact details are always available to patients while in cast. An information sticker containing both telephone numbers and a Quick Response (QR) code is applied to the cast. When scanned with a smartphone, the QR code loads the plaster team's webpage. This contains information and videos about cast care, complications and enhancing recovery. METHODS A sticker was designed and applied to all synthetic casts fitted in our fracture clinic. On cast removal, patients completed a questionnaire about the sticker. A total of 101 patients were surveyed between November 2015 and February 2016. The questionnaire comprised ten binary choice questions. RESULTS The vast majority (97%) of patients had the sticker still on their cast when they returned to clinic for cast removal. Eighty-four per cent of all patients felt reassured by the presence of the QR code sticker. Nine per cent used the contact details on the cast to seek advice. Over half (56%) had a smartphone and a third (33%) of these scanned the QR code. Of those who scanned the code, 95% found the information useful. CONCLUSIONS This study indicates that use of a QR code reassures patients and is an effective tool in the proactive management of potential cast problems. The QR code sticker is now applied to all casts across our trust. In line with NHS England's Five Year Forward View calling for enhanced use of smartphone technology, our trust is continuing to expand its portfolio of patient information accessible via QR codes. Other branches of medicine may benefit from incorporating QR codes as portals to access such information.

  5. Using QR codes to enable quick access to information in acute cancer care.

    Science.gov (United States)

    Upton, Joanne; Olsson-Brown, Anna; Marshall, Ernie; Sacco, Joseph

    2017-05-25

    Quick access to toxicity management information ensures timely access to steroids/immunosuppressive treatment for cancer patients experiencing immune-related adverse events, thus reducing length of hospital stays or avoiding hospital admission entirely. This article discusses a project to add a QR (quick response) code to a patient-held immunotherapy alert card. As QR code generation is free and the immunotherapy clinical management algorithms were already publicly available through the trust's clinical network website, the costs of integrating a QR code into the alert card, after printing, were low, while the potential benefits are numerous. Patient-held alert cards are widely used for patients receiving anti-cancer treatment, and this established standard of care has been modified to enable rapid access of information through the incorporation of a QR code.

  6. An In vitro evaluation of the reliability of QR code denture labeling technique.

    Science.gov (United States)

    Poovannan, Sindhu; Jain, Ashish R; Krishnan, Cakku Jalliah Venkata; Chandran, Chitraa R

    2016-01-01

    Positive identification of the dead after accidents and disasters through labeled dentures plays a key role in forensic scenario. A number of denture labeling methods are available, and studies evaluating their reliability under drastic conditions are vital. This study was conducted to evaluate the reliability of QR (Quick Response) Code labeled at various depths in heat-cured acrylic blocks after acid treatment, heat treatment (burns), and fracture in forensics. It was an in vitro study. This study included 160 specimens of heat-cured acrylic blocks (1.8 cm × 1.8 cm) and these were divided into 4 groups (40 samples per group). QR Codes were incorporated in the samples using clear acrylic sheet and they were assessed for reliability under various depths, acid, heat, and fracture. Data were analyzed using Chi-square test, test of proportion. The QR Code inclusion technique was reliable under various depths of acrylic sheet, acid (sulfuric acid 99%, hydrochloric acid 40%) and heat (up to 370°C). Results were variable with fracture of QR Code labeled acrylic blocks. Within the limitations of the study, by analyzing the results, it was clearly indicated that the QR Code technique was reliable under various depths of acrylic sheet, acid, and heat (370°C). Effectiveness varied in fracture and depended on the level of distortion. This study thus suggests that QR Code is an effective and simpler denture labeling method.

  7. Single-intensity-recording optical encryption technique based on phase retrieval algorithm and QR code

    Science.gov (United States)

    Wang, Zhi-peng; Zhang, Shuai; Liu, Hong-zhao; Qin, Yi

    2014-12-01

    Based on phase retrieval algorithm and QR code, a new optical encryption technology that only needs to record one intensity distribution is proposed. In this encryption process, firstly, the QR code is generated from the information to be encrypted; and then the generated QR code is placed in the input plane of 4-f system to have a double random phase encryption. For only one intensity distribution in the output plane is recorded as the ciphertext, the encryption process is greatly simplified. In the decryption process, the corresponding QR code is retrieved using phase retrieval algorithm. A priori information about QR code is used as support constraint in the input plane, which helps solve the stagnation problem. The original information can be recovered without distortion by scanning the QR code. The encryption process can be implemented either optically or digitally, and the decryption process uses digital method. In addition, the security of the proposed optical encryption technology is analyzed. Theoretical analysis and computer simulations show that this optical encryption system is invulnerable to various attacks, and suitable for harsh transmission conditions.

  8. Using QR Codes to Differentiate Learning for Gifted and Talented Students

    Science.gov (United States)

    Siegle, Del

    2015-01-01

    QR codes are two-dimensional square patterns that are capable of coding information that ranges from web addresses to links to YouTube video. The codes save time typing and eliminate errors in entering addresses incorrectly. These codes make learning with technology easier for students and motivationally engage them in news ways.

  9. [The QR code in society, economy and medicine--fields of application, options and chances].

    Science.gov (United States)

    Flaig, Benno; Parzeller, Markus

    2011-01-01

    2D codes like the QR Code ("Quick Response") are becoming more and more common in society and medicine. The application spectrum and benefits in medicine and other fields are described. 2D codes can be created free of charge on any computer with internet access without any previous knowledge. The codes can be easily used in publications, presentations, on business cards and posters. Editors choose between contact details, text or a hyperlink as information behind the code. At expert conferences, linkage by QR Code allows the audience to download presentations and posters quickly. The documents obtained can then be saved, printed, processed etc. Fast access to stored data in the internet makes it possible to integrate additional and explanatory multilingual videos into medical posters. In this context, a combination of different technologies (printed handout, QR Code and screen) may be reasonable.

  10. The use of QR Code as a learning technology: an exploratory study

    Directory of Open Access Journals (Sweden)

    Stefano Besana

    2010-12-01

    Full Text Available This paper discusses a pilot study on the potential benefits of QR (Quick Response Codes as a tool for facilitating and enhancing learning processes. An analysis is given of the strengths and added value of QR technologies applied to museum visits, with precautions regarding the design of learning environments like the one presented. Some possible future scenarios are identified for implementing these technologies in contexts more strictly related to teaching and education.

  11. Embedding QR codes in tumor board presentations, enhancing educational content for oncology information management.

    Science.gov (United States)

    Siderits, Richard; Yates, Stacy; Rodriguez, Arelis; Lee, Tina; Rimmer, Cheryl; Roche, Mark

    2011-01-01

    Quick Response (QR) Codes are standard in supply management and seen with increasing frequency in advertisements. They are now present regularly in healthcare informatics and education. These 2-dimensional square bar codes, originally designed by the Toyota car company, are free of license and have a published international standard. The codes can be generated by free online software and the resulting images incorporated into presentations. The images can be scanned by "smart" phones and tablets using either the iOS or Android platforms, which link the device with the information represented by the QR code (uniform resource locator or URL, online video, text, v-calendar entries, short message service [SMS] and formatted text). Once linked to the device, the information can be viewed at any time after the original presentation, saved in the device or to a Web-based "cloud" repository, printed, or shared with others via email or Bluetooth file transfer. This paper describes how we use QR codes in our tumor board presentations, discusses the benefits, the different QR codes from Web links and how QR codes facilitate the distribution of educational content.

  12. Implementation of QR Code and Digital Signature to Determine the Validity of KRS and KHS Documents

    Directory of Open Access Journals (Sweden)

    Fatich Fazlur Rochman

    2017-05-01

    Full Text Available Universitas Airlangga students often find it difficult to verify the mark that came out in the Kartu Hasil Studi (KHS is called Study Result Card or courses taken in the Kartu Rencana Studi (KRS is called Study Plan Card, if there are changes to the data on the system used Universitas Airlangga. This complicated KRS and KHS verification process happened because the KRS and KHS documents that owned by student is easier to counterfeit than the data in the system. Implementation digital signature and QR Code technology as a solution that can prove the validity of KRS or KHS. The KRS and KHS validation system developed by Digital Signature and QR Code. QR Code is a type of matrix code that was developed as a code that allows its contents to be decoded at high speed while the Digital Signature has a function as a marker on the data to ensure that the data is the original data. The verification process was divided into two types are reading the Digital Signature and printing document that works by scanning the data from QR Code. The application of the system is carried out were the addition of the QR Code on KRS and KHS, required a readiness of human resources. 

  13. Optimized and secure technique for multiplexing QR code images of single characters: application to noiseless messages retrieval

    International Nuclear Information System (INIS)

    Trejos, Sorayda; Barrera, John Fredy; Torroba, Roberto

    2015-01-01

    We present for the first time an optical encrypting–decrypting protocol for recovering messages without speckle noise. This is a digital holographic technique using a 2f scheme to process QR codes entries. In the procedure, letters used to compose eventual messages are individually converted into a QR code, and then each QR code is divided into portions. Through a holographic technique, we store each processed portion. After filtering and repositioning, we add all processed data to create a single pack, thus simplifying the handling and recovery of multiple QR code images, representing the first multiplexing procedure applied to processed QR codes. All QR codes are recovered in a single step and in the same plane, showing neither cross-talk nor noise problems as in other methods. Experiments have been conducted using an interferometric configuration and comparisons between unprocessed and recovered QR codes have been performed, showing differences between them due to the involved processing. Recovered QR codes can be successfully scanned, thanks to their noise tolerance. Finally, the appropriate sequence in the scanning of the recovered QR codes brings a noiseless retrieved message. Additionally, to procure maximum security, the multiplexed pack could be multiplied by a digital diffuser as to encrypt it. The encrypted pack is easily decoded by multiplying the multiplexing with the complex conjugate of the diffuser. As it is a digital operation, no noise is added. Therefore, this technique is threefold robust, involving multiplexing, encryption, and the need of a sequence to retrieve the outcome. (paper)

  14. Optimized and secure technique for multiplexing QR code images of single characters: application to noiseless messages retrieval

    Science.gov (United States)

    Trejos, Sorayda; Fredy Barrera, John; Torroba, Roberto

    2015-08-01

    We present for the first time an optical encrypting-decrypting protocol for recovering messages without speckle noise. This is a digital holographic technique using a 2f scheme to process QR codes entries. In the procedure, letters used to compose eventual messages are individually converted into a QR code, and then each QR code is divided into portions. Through a holographic technique, we store each processed portion. After filtering and repositioning, we add all processed data to create a single pack, thus simplifying the handling and recovery of multiple QR code images, representing the first multiplexing procedure applied to processed QR codes. All QR codes are recovered in a single step and in the same plane, showing neither cross-talk nor noise problems as in other methods. Experiments have been conducted using an interferometric configuration and comparisons between unprocessed and recovered QR codes have been performed, showing differences between them due to the involved processing. Recovered QR codes can be successfully scanned, thanks to their noise tolerance. Finally, the appropriate sequence in the scanning of the recovered QR codes brings a noiseless retrieved message. Additionally, to procure maximum security, the multiplexed pack could be multiplied by a digital diffuser as to encrypt it. The encrypted pack is easily decoded by multiplying the multiplexing with the complex conjugate of the diffuser. As it is a digital operation, no noise is added. Therefore, this technique is threefold robust, involving multiplexing, encryption, and the need of a sequence to retrieve the outcome.

  15. QR Codes in the Library: "It's Not Your Mother's Barcode!"

    Science.gov (United States)

    Dobbs, Cheri

    2011-01-01

    Barcode scanning has become more than just fun. Now libraries and businesses are leveraging barcode technology as an innovative tool to market their products and ideas. Developed and popularized in Japan, these Quick Response (QR) or two-dimensional barcodes allow marketers to provide interactive content in an otherwise static environment. In this…

  16. Fast heap transform-based QR-decomposition of real and complex matrices: algorithms and codes

    Science.gov (United States)

    Grigoryan, Artyom M.

    2015-03-01

    In this paper, we describe a new look on the application of Givens rotations to the QR-decomposition problem, which is similar to the method of Householder transformations. We apply the concept of the discrete heap transform, or signal-induced unitary transforms which had been introduced by Grigoryan (2006) and used in signal and image processing. Both cases of real and complex nonsingular matrices are considered and examples of performing QR-decomposition of square matrices are given. The proposed method of QR-decomposition for the complex matrix is novel and differs from the known method of complex Givens rotation and is based on analytical equations for the heap transforms. Many examples illustrated the proposed heap transform method of QR-decomposition are given, algorithms are described in detail, and MATLAB-based codes are included.

  17. RANCANG BANGUN APLIKASI PENDAFTARAN AKTA PPAT BERBASIS WEB DENGAN TEKNOLOGI QR CODE

    Directory of Open Access Journals (Sweden)

    Timothy Anggriawan

    2014-10-01

    Full Text Available Perkembangan ilmu pengetahuan dan teknologi telah mengalami percepatan yang tinggi. Keadaan tersebut membuat banyak hal dapat dilakukan dengan lebih mudah dan efisien. Seiring dengan hal tersebut kebutuhan akan informasi yang cepat dan akurat juga semakin tinggi. Dengan tujuan untuk menghasilkan penyajian informasi yang cepat, jelas, dan akurat sehingga dapat membantu proses pengambilan keputusan dalam proses verifikasi data. Metode dalam pembuatan aplikasi ini dibagi menjadi tiga bagian yaitu pertama, melakukan pengumpulan data Akta  PPAT. Kedua, perancangan aplikasi pencetakan Akta PPAT, QR Code, dan pengecekan Akta. Ketiga, pembuatan aplikasi pendaftaran Akta QR Code PPAT menggunakan bahasa pemrograman PHP yang dapat dijalankan pada browser. Hasil dari pembuatan aplikasi berupa aplikasi pendaftaran Akta PPAT yang dapat menampilkan proses penginputan data para pihak, pengeditan data pada Akta PPAT, pencetakan Akta QR Code. Aplikasi dapat menampilkan hasil pengecekan Akta melalui scan QR Code pada aplikasi dalam bentuk teks file, dan melakukan validasi data pada hasil scan. Simpulan yang dapat ditarik adalah aplikasi dapat menampilkan hasil cetak Akta dan QR Code.

  18. Tourist Satisfaction Enhancement Using Mobile QR Code Payment: An Empirical Investigation

    Directory of Open Access Journals (Sweden)

    Liguo Lou

    2017-07-01

    Full Text Available Innovative technologies have greatly changed people’s lives, including their travel experiences. This study investigates the antecedents and outcomes of the quick response (QR code payment technology used in tourism to provide empirical evidence that mobile technologies can be used to enhance tourist satisfaction. An empirical analysis using 247 field survey responses reveals that relative advantage, compatibility, and observability innovation attributes significantly affect tourists’ attitudes positively toward QR code payment services, which results in their use of the technology while traveling. However, image—the subjective norm in innovation diffusion—has no effect on such use. Furthermore, the study confirms that the use of the QR code payment technology in tourism influences an individual’s transaction satisfaction and travel satisfaction, suggesting that this technology can be used to advance the tourism industry. Theoretical and practical implications of the findings and future research directions are also discussed.

  19. Optical information encryption based on incoherent superposition with the help of the QR code

    Science.gov (United States)

    Qin, Yi; Gong, Qiong

    2014-01-01

    In this paper, a novel optical information encryption approach is proposed with the help of QR code. This method is based on the concept of incoherent superposition which we introduce for the first time. The information to be encrypted is first transformed into the corresponding QR code, and thereafter the QR code is further encrypted into two phase only masks analytically by use of the intensity superposition of two diffraction wave fields. The proposed method has several advantages over the previous interference-based method, such as a higher security level, a better robustness against noise attack, a more relaxed work condition, and so on. Numerical simulation results and actual smartphone collected results are shown to validate our proposal.

  20. Encryption of QR code and grayscale image in interference-based scheme with high quality retrieval and silhouette problem removal

    Science.gov (United States)

    Qin, Yi; Wang, Hongjuan; Wang, Zhipeng; Gong, Qiong; Wang, Danchen

    2016-09-01

    In optical interference-based encryption (IBE) scheme, the currently available methods have to employ the iterative algorithms in order to encrypt two images and retrieve cross-talk free decrypted images. In this paper, we shall show that this goal can be achieved via an analytical process if one of the two images is QR code. For decryption, the QR code is decrypted in the conventional architecture and the decryption has a noisy appearance. Nevertheless, the robustness of QR code against noise enables the accurate acquisition of its content from the noisy retrieval, as a result of which the primary QR code can be exactly regenerated. Thereafter, a novel optical architecture is proposed to recover the grayscale image by aid of the QR code. In addition, the proposal has totally eliminated the silhouette problem existing in the previous IBE schemes, and its effectiveness and feasibility have been demonstrated by numerical simulations.

  1. Confirm Content Validity and Sender Authenticity for Text Messages by Using QR Code

    Directory of Open Access Journals (Sweden)

    Firas Mohammed Aswad

    2018-05-01

    Full Text Available In light of the information revolution taking place in the modern world, therefore it becomes necessary and important to save this electronic messages. So we offered this technique to ensure the safety of the content of the messages and authenticity of the sender through  networks communication by converting the message's symbols to numbers , each one of this symbols (letters, numbers, symbols will converted into three digits, the first digit represents the ASCII code of the symbol , the second digit represents the frequency of this symbol in the message (the number of times this symbol is appear in the message, and the third digit represents the total number of the locations of the symbol (calculates the symbol location from the first symbol in the message to this symbol itself and blanks also calculated too .The digital signature of the sender will converted to numbers like the symbols of message we explained it before, and this numbers of the digital signature will gathering together to produce three numbers only, this number will gathering with each numbers of the message's symbols, the final  numbers will converted to QR Code , the QR Code will placed with the message and sent to the recipient. The recipient returns the steps of the sender (produce QR Code from the received message and compared it the received QR Codes, if it is match or not. The recipient will ensure that the content is secure, and confirms the authenticity of the sender.

  2. [QR-Code based patient tracking: a cost-effective option to improve patient safety].

    Science.gov (United States)

    Fischer, M; Rybitskiy, D; Strauß, G; Dietz, A; Dressler, C R

    2013-03-01

    Hospitals are implementing a risk management system to avoid patient or surgery mix-ups. The trend is to use preoperative checklists. This work deals specifically with a type of patient identification, which is realized by storing patient data on a patient-fixed medium. In 127 ENT surgeries data relevant for patient identification were encrypted in a 2D-QR-Code. The code, as a separate document coming with the patient chart or as a patient wristband, has been decrypted in the OR and the patient data were presented visible for all persons. The decoding time, the compliance of the patient data, as well as the duration of the patient identification was compared with the traditional patient identification by inspection of the patient chart. A total of 125 QR codes were read. The time for the decrypting of QR-Code was 5.6 s, the time for the screen view for patient identification was 7.9 s, and for a comparison group of 75 operations traditional patient identification was 27.3 s. Overall, there were 6 relevant information errors in the two parts of the experiment. This represents a ratio of 0.6% for 8 relevant classes per each encrypted QR code. This work allows a cost effective way to technically support patient identification based on electronic patient data. It was shown that the use in the clinical routine is possible. The disadvantage is a potential misinformation from incorrect or missing information in the HIS, or due to changes of the data after the code was created. The QR-code-based patient tracking is seen as a useful complement to the already widely used identification wristband. © Georg Thieme Verlag KG Stuttgart · New York.

  3. Crafting qualities in designing QR-coded embroidery and bedtime stories

    NARCIS (Netherlands)

    Kuusk, K.; Wensveen, S.A.G.; Tomico, O.

    2014-01-01

    There is a renewed interest into crafts and what it can mean when integrating new technologies into textiles. This paper proposes to embed craft qualities and sustainable values into designing smart textile projects. Our design iterations QR-Coded Embroidery and Bedtime Stories combine textiles,

  4. E-COMMERCE GOODY BAG SPUNBOND MENGGUNAKAN QR CODE BERBASIS WEB RESPONSIF

    Directory of Open Access Journals (Sweden)

    Rizkysari Meimaharani

    2014-11-01

    Full Text Available Abstrak Pemasaran merupakan salah satu hal yang terpenting bagi pelaku bisnis. Tanpa pemasaran yang baik, maka akan sulit membuat usaha lebih maju. Hal ini juga dialami oleh satu satu pelaku bisnis di kudus, yaitu vantacy shop. Vantacy shop merupakan salah satu usaha yang menjual goody bag (tas. Tidak hanya menjual tetapi juga mendesain sendiri tas tersebut. Pemasaran yang sudah dilakukan adalah door to door, artinya pemasaran konvensional. Dengan perkembangan teknologi sekarang ini, dalam penelitian ini ingin mencoba mengangkat vantacy shop dengan menciptakan pemasaran secara online. Penjualan online ini akan dilengkapi dengan penyebaran informasi mengenai goody bag menggunakan QR Code.QR Code merupakan teknologi yang sudah banyak diaplikasikan pada system operasi android. Jadi dengan adanya QR Code ini diharapkan konsumen lebih mudah memperoleh informasi mengenai apa yang ditawarkan dari vantacy shop. Selain itu website penjualan online ini berbasis web responsive, sehingga dapat diakses menggunakan semua gadget yang dimiliki oleh konsumen dengan tampilan yang baik. Kata kunci: web responsive, QR code, pemasaran

  5. What Are Those Checkerboard Things?: How QR Codes Can Enrich Student Projects

    Science.gov (United States)

    Tucker, Al

    2011-01-01

    Students enrolled in commercial arts program design and publish their school's yearbook. For the 2010-2011 school year, the students applied Quick Response (QR) code technology to include links to events that occurred after the yearbook's print deadline, including graduation. The technology has many applications in the school setting, and the…

  6. Teacher Candidates Implementing Universal Design for Learning: Enhancing Picture Books with QR Codes

    Science.gov (United States)

    Grande, Marya; Pontrello, Camille

    2016-01-01

    The purpose of this study was to investigate if teacher candidates could gain knowledge of the principles of Universal Design for Learning by enhancing traditional picture books with Quick Response (QR) codes and to determine if the process of making these enhancements would impact teacher candidates' comfort levels with using technology on both…

  7. Exploring Willingness to Pay for QR Code Labeled Extra- Virgin Olive Oil: An Application of the Theory of Planned Behavior

    OpenAIRE

    Lombardi, Alessia; Carfora, Valentina; Cicia, Giovanni; del Giudice, Teresa; Lombardi, Pasquale; Panico, Teresa

    2017-01-01

    Quick Response Code (QR code) is the representative device of a particular branch of marketing called mobile marketing. The code is found throughout various productive sectors, including the agro-food sector. This work investigates whether consumers are willing to pay a premium price for extra information on a bottle of extra-virgin olive oil (EVOO) by means of the QR-code. Based on data collected from 1006 interviews conducted in Italy, we implemented the Theory of Planned Behavior (TPB) mod...

  8. TANDA TANGAN DIGITAL MENGGUNAKAN QR CODE DENGAN METODE ADVANCED ENCRYPTION STANDARD

    Directory of Open Access Journals (Sweden)

    Abdul Gani Putra Suratma

    2017-04-01

    Full Text Available Tanda tangan digital (digital signature adalah sebuah skema matematis yang secara unik mengidentifikasikan seorang pengirim, sekaligus untuk membuktikan keaslian dari pemilik sebuah pesan atau dokumen digital, sehingga sebuah tanda tangan digital yang autentik (sah, sudah cukup menjadi alasan bagi penerima un- tuk percaya bahwa sebuah pesan atau dokumen yang diterima adalah berasal dari pengirim yang telah diketahui. Perkembangan teknologi memungkinkan adanya tanda tangan digital yang dapat digunakan untuk melakukan pembuktian secara matematis, sehingga informasi yang didapat oleh satu pihak dari pihak lain dapat diidentifikasi untuk memastikan keaslian informasi yang diterima. Tanda tangan digital merupakan mekanisme otentikasi yang memungkinkan pembuat pesan menambahkan sebuah kode yang bertindak sebagai tanda tangannya. Tujuan dari penelitian ini menerapkan QR Code atau yang dikenal dengan istilah QR (Quick Respon dan Algoritma yang akan ditambahkan yaitu AES (Advanced Encryption Standard sebagai tanda tangan digital sehingga hasil dari penelitian penerapan QR Code menggunakan algoritma Advanced Encryption Standard sebagai tanda tangan digital dapat berfungsi sebagai otentikasi tanda tangan pimpinan serta ve- rivikasi dokumen pengambilan barang yang sah. dari penelitian ini akurasi klasifi- kasi QR Code dengan menggunakan naïve bayes classifier sebesar 90% dengan precision positif sebesar 80% dan precision negatif sebesar 100%.

  9. Lithographically encoded polymer microtaggant using high-capacity and error-correctable QR code for anti-counterfeiting of drugs.

    Science.gov (United States)

    Han, Sangkwon; Bae, Hyung Jong; Kim, Junhoi; Shin, Sunghwan; Choi, Sung-Eun; Lee, Sung Hoon; Kwon, Sunghoon; Park, Wook

    2012-11-20

    A QR-coded microtaggant for the anti-counterfeiting of drugs is proposed that can provide high capacity and error-correction capability. It is fabricated lithographically in a microfluidic channel with special consideration of the island patterns in the QR Code. The microtaggant is incorporated in the drug capsule ("on-dose authentication") and can be read by a simple smartphone QR Code reader application when removed from the capsule and washed free of drug. Copyright © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  10. APIKASI PEMANDU MUSEUM GUNUNGAPI MERAPI (MGM DENGAN KONSEP LAYANAN BERBASIS LOKASI DALAM RUANGAN MENGGUNAKAN QR CODE

    Directory of Open Access Journals (Sweden)

    Aminudin Rais

    2015-07-01

    Full Text Available Museum  Gunungapi  Merapi (MGM merupakan  wahana  wisata  yang dirancang sebagai  wahana  edukasi  konservasi  yang  berkelanjutan  serta  pengembangan  ilmu kebencanaan  gunung  api,  gempa  bumi,  dan  bencana  alam  lainnya. Terbatasnya media informasi yang terdapat di Museum Gunungapi Merapi menyebabkan pengunjung mengalami kesulitan dalam memahami informasi dan ditambah lagi perlu adanya tour guide untuk mendapatkan informasi lebih tentunya dengan berbagai keterbatasan, sehingga perlu dikembangkan aplikasi yang dapat membantu pengunjung untuk memudahkan akses informasi di lingkungan Museum Gunungapi Merapi. Penelitian ini menggunakan model proses pengembangan sistem Waterfall diawali dengan tahap analisis definisi persyaratan yaitu analisis kebutuhan. Dilanjutkan dengan tahap perancangan sistem dan perangkat lunak yaitu perancangan proses dan perancangan interface. Kemudian Implementasi sistem menggunakan ADT dan CodeIgniter. Pengujian yang dilakukan pada aplikasi menggunakan metode black box test, dan pengujian kecepatan pemindaian QR Code. Hasil dari penelitian yang dilakukan menghasilkan sebuah aplikasi MGM Apps (frontend yang digunakan pengunjung untuk mengakses informasi dengan melakukan pemindaian QR Code dan Web Administrator MGM (backend digunakan oleh pengelola museum untuk mengelola informasi. Hasil pengujian yang dilakukan menunjukan bahwa aplikasi layak dan dapat digunakan.Kata Kunci: Museum Gunungapi Merapi,QR Code, Sistem Layanan Berbasis Lokasi.

  11. Three-dimensional polarization marked multiple-QR code encryption by optimizing a single vectorial beam

    Science.gov (United States)

    Lin, Chao; Shen, Xueju; Hua, Binbin; Wang, Zhisong

    2015-10-01

    We demonstrate the feasibility of three dimensional (3D) polarization multiplexing by optimizing a single vectorial beam using a multiple-signal window multiple-plane (MSW-MP) phase retrieval algorithm. Original messages represented with multiple quick response (QR) codes are first partitioned into a series of subblocks. Then, each subblock is marked with a specific polarization state and randomly distributed in 3D space with both longitudinal and transversal adjustable freedoms. A generalized 3D polarization mapping protocol is established to generate a 3D polarization key. Finally, multiple-QR code is encrypted into one phase only mask and one polarization only mask based on the modified Gerchberg-Saxton (GS) algorithm. We take the polarization mask as the cyphertext and the phase only mask as additional dimension of key. Only when both the phase key and 3D polarization key are correct, original messages can be recovered. We verify our proposal with both simulation and experiment evidences.

  12. QR Code Mobile sebagai Pendukung Rekam Medik Berkas Rawat Jalan RS. St. Elisabeth Semarang

    Directory of Open Access Journals (Sweden)

    Aldhi Ari Kurniawan

    2018-01-01

    Full Text Available Medical record play important role in order to improve hospital healthcare quality. Medical record must provide proper, fast, and relevant data. Current medical records documentation is manual based in mean the documents are available in notes and document maps. There is no integration among the document, and it can caused a misunderstanding among hospital stakeholder such as doctor or nurse and also duplicated data. QR code is one of alternative to handle completeness file, searching document, and store all document. The combination between QR code, web and mobile platform can handle the problem faced by hospital stakeholder. In testing phase, the proposed system can handle medical record problem in RS. St. Elisabeth. Average of respondent, more than 50% state that sistem is good to handle tracking record, completeness file, and store.

  13. QR-codes as a tool to increase physical activity level among school children during class hours

    DEFF Research Database (Denmark)

    Christensen, Jeanette Reffstrup; Kristensen, Allan; Bredahl, Thomas Viskum Gjelstrup

    the students physical activity level during class hours. Methods: A before-after study was used to examine 12 students physical activity level, measured with pedometers for six lessons. Three lessons of traditional teaching and three lessons, where QR-codes were used to make orienteering in school area...... as old fashioned. The students also felt positive about being physically active in teaching. Discussion and conclusion: QR-codes as a tool for teaching are usable for making students more physically active in teaching. The students were exited for using QR-codes and they experienced a good motivation......QR-codes as a tool to increase physical activity level among school children during class hours Introduction: Danish students are no longer fulfilling recommendations for everyday physical activity. Since August 2014, Danish students in public schools are therefore required to be physically active...

  14. QR Code, Face Recognition, and Google Location as Alternative Solution for Employee's Attendance in Small Companies

    OpenAIRE

    Wongso, Oscar

    2016-01-01

    RFID and biometric time attendance have been used to taking employee's attendances in attendances. But they have disadvantage which is cost a lot in terms of prices when need to be used in several places at the same time. An alternative solution was given by using android application which utilizing QR-Code, Face Recognition, and Google Map Location technologies implemented in smartphone to taking employee's attendances. A test for this system was conduct on one of private colouring studios i...

  15. Improving Inpatient Surveys: Web-Based Computer Adaptive Testing Accessed via Mobile Phone QR Codes.

    Science.gov (United States)

    Chien, Tsair-Wei; Lin, Weir-Sen

    2016-03-02

    The National Health Service (NHS) 70-item inpatient questionnaire surveys inpatients on their perceptions of their hospitalization experience. However, it imposes more burden on the patient than other similar surveys. The literature shows that computerized adaptive testing (CAT) based on item response theory can help shorten the item length of a questionnaire without compromising its precision. Our aim was to investigate whether CAT can be (1) efficient with item reduction and (2) used with quick response (QR) codes scanned by mobile phones. After downloading the 2008 inpatient survey data from the Picker Institute Europe website and analyzing the difficulties of this 70-item questionnaire, we used an author-made Excel program using the Rasch partial credit model to simulate 1000 patients' true scores followed by a standard normal distribution. The CAT was compared to two other scenarios of answering all items (AAI) and the randomized selection method (RSM), as we investigated item length (efficiency) and measurement accuracy. The author-made Web-based CAT program for gathering patient feedback was effectively accessed from mobile phones by scanning the QR code. We found that the CAT can be more efficient for patients answering questions (ie, fewer items to respond to) than either AAI or RSM without compromising its measurement accuracy. A Web-based CAT inpatient survey accessed by scanning a QR code on a mobile phone was viable for gathering inpatient satisfaction responses. With advances in technology, patients can now be offered alternatives for providing feedback about hospitalization satisfaction. This Web-based CAT is a possible option in health care settings for reducing the number of survey items, as well as offering an innovative QR code access.

  16. Durability of switchable QR code carriers under hydrolytic and photolytic conditions

    International Nuclear Information System (INIS)

    Ecker, Melanie; Pretsch, Thorsten

    2013-01-01

    Following a guest diffusion approach, the surface of a shape memory poly(ester urethane) (PEU) was either black or blue colored. Bowtie-shaped quick response (QR) code carriers were then obtained from laser engraving and cutting, before thermo-mechanical functionalization (programming) was applied to stabilize the PEU in a thermo-responsive (switchable) state. The stability of the dye within the polymer surface and long-term functionality of the polymer were investigated against UVA and hydrolytic ageing. Spectrophotometric investigations verified UVA ageing-related color shifts from black to yellow-brownish and blue to petrol-greenish whereas hydrolytically aged samples changed from black to greenish and blue to light blue. In the case of UVA ageing, color changes were accompanied by dye decolorization, whereas hydrolytic ageing led to contrast declines due to dye diffusion. The Michelson contrast could be identified as an effective tool to follow ageing-related contrast changes between surface-dyed and laser-ablated (undyed) polymer regions. As soon as the Michelson contrast fell below a crucial value of 0.1 due to ageing, the QR code was no longer decipherable with a scanning device. Remarkably, the PEU information carrier base material could even then be adequately fixed and recovered. Hence, the surface contrast turned out to be the decisive parameter for QR code carrier applicability. (paper)

  17. Durability of switchable QR code carriers under hydrolytic and photolytic conditions

    Science.gov (United States)

    Ecker, Melanie; Pretsch, Thorsten

    2013-09-01

    Following a guest diffusion approach, the surface of a shape memory poly(ester urethane) (PEU) was either black or blue colored. Bowtie-shaped quick response (QR) code carriers were then obtained from laser engraving and cutting, before thermo-mechanical functionalization (programming) was applied to stabilize the PEU in a thermo-responsive (switchable) state. The stability of the dye within the polymer surface and long-term functionality of the polymer were investigated against UVA and hydrolytic ageing. Spectrophotometric investigations verified UVA ageing-related color shifts from black to yellow-brownish and blue to petrol-greenish whereas hydrolytically aged samples changed from black to greenish and blue to light blue. In the case of UVA ageing, color changes were accompanied by dye decolorization, whereas hydrolytic ageing led to contrast declines due to dye diffusion. The Michelson contrast could be identified as an effective tool to follow ageing-related contrast changes between surface-dyed and laser-ablated (undyed) polymer regions. As soon as the Michelson contrast fell below a crucial value of 0.1 due to ageing, the QR code was no longer decipherable with a scanning device. Remarkably, the PEU information carrier base material could even then be adequately fixed and recovered. Hence, the surface contrast turned out to be the decisive parameter for QR code carrier applicability.

  18. Drug-laden 3D biodegradable label using QR code for anti-counterfeiting of drugs.

    Science.gov (United States)

    Fei, Jie; Liu, Ran

    2016-06-01

    Wiping out counterfeit drugs is a great task for public health care around the world. The boost of these drugs makes treatment to become potentially harmful or even lethal. In this paper, biodegradable drug-laden QR code label for anti-counterfeiting of drugs is proposed that can provide the non-fluorescence recognition and high capacity. It is fabricated by the laser cutting to achieve the roughness over different surface which causes the difference in the gray levels on the translucent material the QR code pattern, and the micro mold process to obtain the drug-laden biodegradable label. We screened biomaterials presenting the relevant conditions and further requirements of the package. The drug-laden microlabel is on the surface of the troches or the bottom of the capsule and can be read by a simple smartphone QR code reader application. Labeling the pill directly and decoding the information successfully means more convenient and simple operation with non-fluorescence and high capacity in contrast to the traditional methods. Copyright © 2016 Elsevier B.V. All rights reserved.

  19. Towards an Integrated QR Code Biosensor: Light-Driven Sample Acquisition and Bacterial Cellulose Paper Substrate.

    Science.gov (United States)

    Yuan, Mingquan; Jiang, Qisheng; Liu, Keng-Ku; Singamaneni, Srikanth; Chakrabartty, Shantanu

    2018-06-01

    This paper addresses two key challenges toward an integrated forward error-correcting biosensor based on our previously reported self-assembled quick-response (QR) code. The first challenge involves the choice of the paper substrate for printing and self-assembling the QR code. We have compared four different substrates that includes regular printing paper, Whatman filter paper, nitrocellulose membrane and lab synthesized bacterial cellulose. We report that out of the four substrates bacterial cellulose outperforms the others in terms of probe (gold nanorods) and ink retention capability. The second challenge involves remote activation of the analyte sampling and the QR code self-assembly process. In this paper, we use light as a trigger signal and a graphite layer as a light-absorbing material. The resulting change in temperature due to infrared absorption leads to a temperature gradient that then exerts a diffusive force driving the analyte toward the regions of self-assembly. The working principle has been verified in this paper using assembled biosensor prototypes where we demonstrate higher sample flow rate due to light induced thermal gradients.

  20. Enhancing Chemical Inventory Management in Laboratory through a Mobile-Based QR Code Tag

    Science.gov (United States)

    Shukran, M. A. M.; Ishak, M. S.; Abdullah, M. N.

    2017-08-01

    The demand for a greater inventory management system which can provide a lot of useful information from a single scan has made laboratory inventory management using barcode technology more difficult. Since the barcode technology lacks the ability to overcome the problem and is not capable of providing information needed to manage the chemicals in the laboratory, thus employing a QR code technology is the best solution. In this research, the main idea is to develop a standalone application running with its own database that is periodically synchronized with the inventory software hosted by the computer and connected to a specialized network as well. The first process required to establish this centralized system is to determine all inventory available in the chemical laboratory by referring to the documented data in order to develop the database. Several customization and enhancement were made to the open source QR code technology to ensure the developed application is dedicated for its main purposes. As the end of the research, it was proven that the system is able to track the position of all inventory and showing real time information about the scanned chemical labels. This paper intends to give an overview about the QR tag inventory system that was developed and its implementation at the National Defence University of Malaysia’s (NDUM) chemical laboratory.

  1. A SNP panel and online tool for checking genotype concordance through comparing QR codes.

    Directory of Open Access Journals (Sweden)

    Yonghong Du

    Full Text Available In the current precision medicine era, more and more samples get genotyped and sequenced. Both researchers and commercial companies expend significant time and resources to reduce the error rate. However, it has been reported that there is a sample mix-up rate of between 0.1% and 1%, not to mention the possibly higher mix-up rate during the down-stream genetic reporting processes. Even on the low end of this estimate, this translates to a significant number of mislabeled samples, especially over the projected one billion people that will be sequenced within the next decade. Here, we first describe a method to identify a small set of Single nucleotide polymorphisms (SNPs that can uniquely identify a personal genome, which utilizes allele frequencies of five major continental populations reported in the 1000 genomes project and the ExAC Consortium. To make this panel more informative, we added four SNPs that are commonly used to predict ABO blood type, and another two SNPs that are capable of predicting sex. We then implement a web interface (http://qrcme.tech, nicknamed QRC (for QR code based Concordance check, which is capable of extracting the relevant ID SNPs from a raw genetic data, coding its genotype as a quick response (QR code, and comparing QR codes to report the concordance of underlying genetic datasets. The resulting 80 fingerprinting SNPs represent a significant decrease in complexity and the number of markers used for genetic data labelling and tracking. Our method and web tool is easily accessible to both researchers and the general public who consider the accuracy of complex genetic data as a prerequisite towards precision medicine.

  2. A SNP panel and online tool for checking genotype concordance through comparing QR codes.

    Science.gov (United States)

    Du, Yonghong; Martin, Joshua S; McGee, John; Yang, Yuchen; Liu, Eric Yi; Sun, Yingrui; Geihs, Matthias; Kong, Xuejun; Zhou, Eric Lingfeng; Li, Yun; Huang, Jie

    2017-01-01

    In the current precision medicine era, more and more samples get genotyped and sequenced. Both researchers and commercial companies expend significant time and resources to reduce the error rate. However, it has been reported that there is a sample mix-up rate of between 0.1% and 1%, not to mention the possibly higher mix-up rate during the down-stream genetic reporting processes. Even on the low end of this estimate, this translates to a significant number of mislabeled samples, especially over the projected one billion people that will be sequenced within the next decade. Here, we first describe a method to identify a small set of Single nucleotide polymorphisms (SNPs) that can uniquely identify a personal genome, which utilizes allele frequencies of five major continental populations reported in the 1000 genomes project and the ExAC Consortium. To make this panel more informative, we added four SNPs that are commonly used to predict ABO blood type, and another two SNPs that are capable of predicting sex. We then implement a web interface (http://qrcme.tech), nicknamed QRC (for QR code based Concordance check), which is capable of extracting the relevant ID SNPs from a raw genetic data, coding its genotype as a quick response (QR) code, and comparing QR codes to report the concordance of underlying genetic datasets. The resulting 80 fingerprinting SNPs represent a significant decrease in complexity and the number of markers used for genetic data labelling and tracking. Our method and web tool is easily accessible to both researchers and the general public who consider the accuracy of complex genetic data as a prerequisite towards precision medicine.

  3. A virtual tour of geological heritage: Valourising geodiversity using Google Earth and QR code

    Science.gov (United States)

    Martínez-Graña, A. M.; Goy, J. L.; Cimarra, C. A.

    2013-12-01

    When making land-use plans, it is necessary to inventory and catalogue the geological heritage and geodiversity of a site to establish an apolitical conservation protection plan to meet the educational and social needs of society. New technologies make it possible to create virtual databases using virtual globes - e.g., Google Earth - and other personal-use geomatics applications (smartphones, tablets, PDAs) for accessing geological heritage information in “real time” for scientific, educational, and cultural purposes via a virtual geological itinerary. Seventeen mapped and georeferenced geosites have been created in Keyhole Markup Language for use in map layers used in geological itinerary stops for different applications. A virtual tour has been developed for Las Quilamas Natural Park, which is located in the Spanish Central System, using geological layers and topographic and digital terrain models that can be overlaid in a 3D model. The Google Earth application was used to import the geosite placemarks. For each geosite, a tab has been developed that shows a description of the geology with photographs and diagrams and that evaluates the scientific, educational, and tourism quality. Augmented reality allows the user to access these georeferenced thematic layers and overlay data, images, and graphics in real time on their mobile devices. These virtual tours can be incorporated into subject guides designed by public. Seven educational and interpretive panels describing some of the geosites were designed and tagged with a QR code that could be printed at each stop or in the printed itinerary. These QR codes can be scanned with the camera found on most mobile devices, and video virtual tours can be viewed on these devices. The virtual tour of the geological heritage can be used to show tourists the geological history of the Las Quilamas Natural Park using new geomatics technologies (virtual globes, augmented reality, and QR codes).

  4. Decoding Different Patterns in Various Grey Tones Incorporated in the QR Code

    Directory of Open Access Journals (Sweden)

    Filip Cvitić

    2014-07-01

    Full Text Available Using colors in bar codes causes errors that may adversely affect their readability (Tan etal. 2010, given that the contrast between data and background modules is reduced. Due to the unreliability of using color bar codes, most designers still keep to the limitations placed by Pira International (Smithers Pira in 2002 (Williams, 2004. Since the contrast between data modules and background modules is the most important aspect in the process of reliable bar code decoding, this paper explores the dependence of reliable decoding of QR codes incorporated with combinations of grey tones on the technical characteristics of the cameras on smartphones that were marketed in the period between 2008 and 2012.

  5. Testing Quick Response (QR) Codes as an Innovation to Improve Feedback Among Geographically-Separated Clerkship Sites.

    Science.gov (United States)

    Snyder, Matthew J; Nguyen, Dana R; Womack, Jasmyne J; Bunt, Christopher W; Westerfield, Katie L; Bell, Adriane E; Ledford, Christy J W

    2018-03-01

    Collection of feedback regarding medical student clinical experiences for formative or summative purposes remains a challenge across clinical settings. The purpose of this study was to determine whether the use of a quick response (QR) code-linked online feedback form improves the frequency and efficiency of rater feedback. In 2016, we compared paper-based feedback forms, an online feedback form, and a QR code-linked online feedback form at 15 family medicine clerkship sites across the United States. Outcome measures included usability, number of feedback submissions per student, number of unique raters providing feedback, and timeliness of feedback provided to the clerkship director. The feedback method was significantly associated with usability, with QR code scoring the highest, and paper second. Accessing feedback via QR code was associated with the shortest time to prepare feedback. Across four rotations, separate repeated measures analyses of variance showed no effect of feedback system on the number of submissions per student or the number of unique raters. The results of this study demonstrate that preceptors in the family medicine clerkship rate QR code-linked feedback as a high usability platform. Additionally, this platform resulted in faster form completion than paper or online forms. An overarching finding of this study is that feedback forms must be portable and easily accessible. Potential implementation barriers and the social norm for providing feedback in this manner need to be considered.

  6. Digitized forensics: retaining a link between physical and digital crime scene traces using QR-codes

    Science.gov (United States)

    Hildebrandt, Mario; Kiltz, Stefan; Dittmann, Jana

    2013-03-01

    The digitization of physical traces from crime scenes in forensic investigations in effect creates a digital chain-of-custody and entrains the challenge of creating a link between the two or more representations of the same trace. In order to be forensically sound, especially the two security aspects of integrity and authenticity need to be maintained at all times. Especially the adherence to the authenticity using technical means proves to be a challenge at the boundary between the physical object and its digital representations. In this article we propose a new method of linking physical objects with its digital counterparts using two-dimensional bar codes and additional meta-data accompanying the acquired data for integration in the conventional documentation of collection of items of evidence (bagging and tagging process). Using the exemplary chosen QR-code as particular implementation of a bar code and a model of the forensic process, we also supply a means to integrate our suggested approach into forensically sound proceedings as described by Holder et al.1 We use the example of the digital dactyloscopy as a forensic discipline, where currently progress is being made by digitizing some of the processing steps. We show an exemplary demonstrator of the suggested approach using a smartphone as a mobile device for the verification of the physical trace to extend the chain-of-custody from the physical to the digital domain. Our evaluation of the demonstrator is performed towards the readability and the verification of its contents. We can read the bar code despite its limited size of 42 x 42 mm and rather large amount of embedded data using various devices. Furthermore, the QR-code's error correction features help to recover contents of damaged codes. Subsequently, our appended digital signature allows for detecting malicious manipulations of the embedded data.

  7. E-MONEY BANYUWANGI TOURISM : QR CODE SEBAGAI ALAT TRANSAKSI DI WISATA PULAU MERAH

    Directory of Open Access Journals (Sweden)

    Yashinta Setyowati

    2017-11-01

    Full Text Available This study aims to design a sales system using QR Code as a means of transactions in the tour of Red Island. One of the tourist attractions in Banyuwangi often visited by foreign and domestic tourists is the Red Island. The advantages of the Red Island is the waves that are always stable for surfing, clean and conducive environment, and amazing scenery. However, due to the large number of visitors, it is not comparable with the sellers and service providers, the low educational background makes local residents difficult to communicate especially with foreign tourists. This research uses qualitative exploratory and action research methods conducted in Pulau Merah. Data collection is done through interviews and in-depth observation. Data analysis is done to generate a system requirement that will be designed. The result of this research is the design of sales accounting information system using QR Code as transaction tool. The contribution of this research is to increase the income of the people around Red Island, as well as local government through tax revenue, also to improve the competitiveness of Red Island into a natural tourist area of technology.

  8. QR code-based non-linear image encryption using Shearlet transform and spiral phase transform

    Science.gov (United States)

    Kumar, Ravi; Bhaduri, Basanta; Hennelly, Bryan

    2018-02-01

    In this paper, we propose a new quick response (QR) code-based non-linear technique for image encryption using Shearlet transform (ST) and spiral phase transform. The input image is first converted into a QR code and then scrambled using the Arnold transform. The scrambled image is then decomposed into five coefficients using the ST and the first Shearlet coefficient, C1 is interchanged with a security key before performing the inverse ST. The output after inverse ST is then modulated with a random phase mask and further spiral phase transformed to get the final encrypted image. The first coefficient, C1 is used as a private key for decryption. The sensitivity of the security keys is analysed in terms of correlation coefficient and peak signal-to noise ratio. The robustness of the scheme is also checked against various attacks such as noise, occlusion and special attacks. Numerical simulation results are shown in support of the proposed technique and an optoelectronic set-up for encryption is also proposed.

  9. Architecture proposal for the use of QR code in supply chain management

    Directory of Open Access Journals (Sweden)

    Dalton Matsuo Tavares

    2012-01-01

    Full Text Available Supply chain traceability and visibility are key concerns for many companies. Radio-Frequency Identification (RFID is an enabling technology that allows identification of objects in a fully automated manner via radio waves. Nevertheless, this technology has limited acceptance and high costs. This paper presents a research effort undertaken to design a track and trace solution in supply chains, using quick response code (or QR Code for short as a less complex and cost-effective alternative for RFID in supply chain management (SCM. A first architecture proposal using open source software will be presented as a proof of concept. The system architecture is presented in order to achieve tag generation, the image acquisition and pre-processing, product inventory and tracking. A prototype system for the tag identification is developed and discussed at the end of the paper to demonstrate its feasibility.

  10. QR Codes as Mobile Learning Tools for Labor Room Nurses at the San Pablo Colleges Medical Center

    Science.gov (United States)

    Del Rosario-Raymundo, Maria Rowena

    2017-01-01

    Purpose: The purpose of this paper is to explore the use of QR codes as mobile learning tools and examine factors that impact on their usefulness, acceptability and feasibility in assisting the nurses' learning. Design/Methodology/Approach: Study participants consisted of 14 regular, full-time, board-certified LR nurses. Over a two-week period,…

  11. Optical identity authentication technique based on compressive ghost imaging with QR code

    Science.gov (United States)

    Wenjie, Zhan; Leihong, Zhang; Xi, Zeng; Yi, Kang

    2018-04-01

    With the rapid development of computer technology, information security has attracted more and more attention. It is not only related to the information and property security of individuals and enterprises, but also to the security and social stability of a country. Identity authentication is the first line of defense in information security. In authentication systems, response time and security are the most important factors. An optical authentication technology based on compressive ghost imaging with QR codes is proposed in this paper. The scheme can be authenticated with a small number of samples. Therefore, the response time of the algorithm is short. At the same time, the algorithm can resist certain noise attacks, so it offers good security.

  12. PENGEMBANGAN QR CODE SCANNER BERBASIS ANDROID UNTUK SISTEM INFORMASI MUSEUM SONOBUDOYO YOGYAKARTA

    Directory of Open Access Journals (Sweden)

    Bambang Sugiantoro

    2015-07-01

    Full Text Available Along with the development of smartphone technology, the museum as an asset of the government also had to adjust the display collection. QR Code Scanner application built using Android-based ZBar Library features the Scanner, Bookmark, about Sonobudoyo, and display photos in 3D Rotate collection. All features in these applications can be run properly. Results of alpha testing is all in the application process successfully run during testing. Beta testing the application functionality obtained 100% of respondents said "Yes", and 0% of respondents said "No". While beta testing the system interface with the score is 66.4 which is located on the rating scale between 54.41 - 67.20 is satisfied

  13. Combating QR-Code-Based Compromised Accounts in Mobile Social Networks.

    Science.gov (United States)

    Guo, Dong; Cao, Jian; Wang, Xiaoqi; Fu, Qiang; Li, Qiang

    2016-09-20

    Cyber Physical Social Sensing makes mobile social networks (MSNs) popular with users. However, such attacks are rampant as malicious URLs are spread covertly through quick response (QR) codes to control compromised accounts in MSNs to propagate malicious messages. Currently, there are generally two types of methods to identify compromised accounts in MSNs: one type is to analyze the potential threats on wireless access points and the potential threats on handheld devices' operation systems so as to stop compromised accounts from spreading malicious messages; the other type is to apply the method of detecting compromised accounts in online social networks to MSNs. The above types of methods above focus neither on the problems of MSNs themselves nor on the interaction of sensors' messages, which leads to the restrictiveness of platforms and the simplification of methods. In order to stop the spreading of compromised accounts in MSNs effectively, the attacks have to be traced to their sources first. Through sensors, users exchange information in MSNs and acquire information by scanning QR codes. Therefore, analyzing the traces of sensor-related information helps to identify the compromised accounts in MSNs. This paper analyzes the diversity of information sending modes of compromised accounts and normal accounts, analyzes the regularity of GPS (Global Positioning System)-based location information, and introduces the concepts of entropy and conditional entropy so as to construct an entropy-based model based on machine learning strategies. To achieve the goal, about 500,000 accounts of Sina Weibo and about 100 million corresponding messages are collected. Through the validation, the accuracy rate of the model is proved to be as high as 87.6%, and the false positive rate is only 3.7%. Meanwhile, the comparative experiments of the feature sets prove that sensor-based location information can be applied to detect the compromised accounts in MSNs.

  14. Combating QR-Code-Based Compromised Accounts in Mobile Social Networks

    Directory of Open Access Journals (Sweden)

    Dong Guo

    2016-09-01

    Full Text Available Cyber Physical Social Sensing makes mobile social networks (MSNs popular with users. However, such attacks are rampant as malicious URLs are spread covertly through quick response (QR codes to control compromised accounts in MSNs to propagate malicious messages. Currently, there are generally two types of methods to identify compromised accounts in MSNs: one type is to analyze the potential threats on wireless access points and the potential threats on handheld devices’ operation systems so as to stop compromised accounts from spreading malicious messages; the other type is to apply the method of detecting compromised accounts in online social networks to MSNs. The above types of methods above focus neither on the problems of MSNs themselves nor on the interaction of sensors’ messages, which leads to the restrictiveness of platforms and the simplification of methods. In order to stop the spreading of compromised accounts in MSNs effectively, the attacks have to be traced to their sources first. Through sensors, users exchange information in MSNs and acquire information by scanning QR codes. Therefore, analyzing the traces of sensor-related information helps to identify the compromised accounts in MSNs. This paper analyzes the diversity of information sending modes of compromised accounts and normal accounts, analyzes the regularity of GPS (Global Positioning System-based location information, and introduces the concepts of entropy and conditional entropy so as to construct an entropy-based model based on machine learning strategies. To achieve the goal, about 500,000 accounts of Sina Weibo and about 100 million corresponding messages are collected. Through the validation, the accuracy rate of the model is proved to be as high as 87.6%, and the false positive rate is only 3.7%. Meanwhile, the comparative experiments of the feature sets prove that sensor-based location information can be applied to detect the compromised accounts in MSNs.

  15. DEVELOPMENT OF SALES APPLICATION OF PREPAID ELECTRICITY VOUCHER BASED ON ANFROID PLATFORM USING QUICK RESPONSE CODE (QR CODE

    Directory of Open Access Journals (Sweden)

    Ricky Akbar

    2017-09-01

    Full Text Available Perusahaan Listrik Negara (PLN has implemented a smart electricity system or prepaid electricity. The customers pay the electricity voucher first before use the electricity. The token contained in electricity voucher that has been purchased by the customer is inserted into the Meter Prabayar (MPB installed in the location of customers. When a customer purchases a voucher, it will get a receipt that contains all of the customer's identity and the 20-digit of voucher code (token to be entered into MPB as a substitute for electrical energy credit. Receipts obtained by the customer is certainly vulnerable to loss, or hijacked by unresponsible parties. In this study, authors designed and develop an android based application by utilizing QR code technology as a replacement for the receipt of prepaid electricity credit which contains the identity of the customer and the 20-digit voucher code. The application is developed by implemented waterfall methodology. The implementation process of the waterfall methods used, are (1 analysis of functional requirement of the system by conducting a preliminary study and data collection based on field studies and literature, (2 system design by using UML diagrams and Business Process Model Notation (BPMN and Entity Relationship diagram (ERD, (3 design implementation by using OOP (Object Oriented programming technique. Web application is developed by using laravel PHP framework and database MySQL while mobile application is developed by using B4A (4 developed system is tested by using blackbox method testing. Final result of this research is a Web and mobile applications for the sale of electricityvoucher by QR Code technology.

  16. Exploring Willingness to Pay for QR Code Labeled Extra-Virgin Olive Oil: An Application of the Theory of Planned Behavior

    Directory of Open Access Journals (Sweden)

    Alessia Lombardi

    2017-01-01

    Full Text Available Quick Response Code (QR code is the representative device of a particular branch of marketing called mobile marketing. The code is found throughout various productive sectors, including the agro-food sector. This work investigates whether consumers are willing to pay a premium price for extra information on a bottle of extra-virgin olive oil (EVOO by means of the QR-code. Based on data collected from 1006 interviews conducted in Italy, we implemented the Theory of Planned Behavior (TPB model to ascertain the factors that could influence consumer’s willingness to pay (WTP for extra QR code information. Empirical results show the influence of attitudes, subjective norms and consumer personal characteristics such as mavenism and motivation for shopping (utilitarian vs. hedonic motivation in explaining willingness to pay for a bottle of QR code labeled olive oil.

  17. Technological change in the wine market? The role of QR codes and wine apps in consumer wine purchases

    Directory of Open Access Journals (Sweden)

    Lindsey M. Higgins

    2014-06-01

    Full Text Available As an experiential good, wine purchases in the absence of tastings are often challenging and information-laden decisions. Technology has shaped the way consumers negotiate this complex purchase process. Using a sample of 631 US wine consumers, this research aims to identify the role of mobile applications and QR codes in the wine purchase decision. Results suggest that wine consumers that consider themselves wine connoisseurs or experts, enjoy talking about wine, and are interested in wine that is produced locally, organically, or sustainably are more likely to employ technology in their wine purchase decision. While disruption appears to have occurred on the supply side (number of wine applications available and the number of wine labels with a QR code, this research suggests that relatively little change is occurring on the demand side (a relatively small segment of the population—those already interested in wine—are employing the technology to aid in their purchase decision.

  18. Technological change in the wine market? The role of QR codes and wine apps in consumer wine purchases

    OpenAIRE

    Lindsey M. Higgins; Marianne McGarry Wolf; Mitchell J. Wolf

    2014-01-01

    As an experiential good, wine purchases in the absence of tastings are often challenging and information-laden decisions. Technology has shaped the way consumers negotiate this complex purchase process. Using a sample of 631 US wine consumers, this research aims to identify the role of mobile applications and QR codes in the wine purchase decision. Results suggest that wine consumers that consider themselves wine connoisseurs or experts, enjoy talking about wine, and are interested in wine th...

  19. A QR code based zero-watermarking scheme for authentication of medical images in teleradiology cloud.

    Science.gov (United States)

    Seenivasagam, V; Velumani, R

    2013-01-01

    Healthcare institutions adapt cloud based archiving of medical images and patient records to share them efficiently. Controlled access to these records and authentication of images must be enforced to mitigate fraudulent activities and medical errors. This paper presents a zero-watermarking scheme implemented in the composite Contourlet Transform (CT)-Singular Value Decomposition (SVD) domain for unambiguous authentication of medical images. Further, a framework is proposed for accessing patient records based on the watermarking scheme. The patient identification details and a link to patient data encoded into a Quick Response (QR) code serves as the watermark. In the proposed scheme, the medical image is not subjected to degradations due to watermarking. Patient authentication and authorized access to patient data are realized on combining a Secret Share with the Master Share constructed from invariant features of the medical image. The Hu's invariant image moments are exploited in creating the Master Share. The proposed system is evaluated with Checkmark software and is found to be robust to both geometric and non geometric attacks.

  20. A QR Code Based Zero-Watermarking Scheme for Authentication of Medical Images in Teleradiology Cloud

    Directory of Open Access Journals (Sweden)

    V. Seenivasagam

    2013-01-01

    Full Text Available Healthcare institutions adapt cloud based archiving of medical images and patient records to share them efficiently. Controlled access to these records and authentication of images must be enforced to mitigate fraudulent activities and medical errors. This paper presents a zero-watermarking scheme implemented in the composite Contourlet Transform (CT—Singular Value Decomposition (SVD domain for unambiguous authentication of medical images. Further, a framework is proposed for accessing patient records based on the watermarking scheme. The patient identification details and a link to patient data encoded into a Quick Response (QR code serves as the watermark. In the proposed scheme, the medical image is not subjected to degradations due to watermarking. Patient authentication and authorized access to patient data are realized on combining a Secret Share with the Master Share constructed from invariant features of the medical image. The Hu’s invariant image moments are exploited in creating the Master Share. The proposed system is evaluated with Checkmark software and is found to be robust to both geometric and non geometric attacks.

  1. Visual encoding of a QR code using a Gaussian modulating function%利用高斯调变函数视觉编码QR码

    Institute of Scientific and Technical Information of China (English)

    郭兴华; 朱小刚

    2017-01-01

    Objective As information tags,2D bar codes can easily be accessed by taking a picture or scanning.They possess the advantages of large data capacity,high decoding reliability,and wide range of encoding.Therefore,they are widely used worldwide due to the growth of the Internet in recent years.The quick response (QR) code is a 2D bar code.Compared with other 2D bar codes,the QR code has more features,such as high reading speed,large data density,and small occupied space.The QR code can encode arbitrary text strings,emails,hyperlinks,phone numbers,and so on.To obtain the embedded messages,mobile devices are used to capture the QR code,and information is acquired through a QR code reader.Given the popularity of smartphones,the QR code has become the most widespread 2D bar code.A common use of the QR code is to encode URLs so that people can scan a QR code to load a website on a cell phone instead of typing in a URL.QR codes are encoded using Reed Solomon error-correcting codes.Therefore,a QR scanner does not have to view every pixel correctly to decode the content.Error correction corrupts a part of the code (less than the maximum amount that the algorithm can fix) to make an image.This high fault tolerance makes QR codes popular and widely used in many commercial applications.In the conventional QR code,the mnodules are designated on an image by black and white square patterns,which can easily be identified by machines.However,noisy black and white patterns reveal no intuitive information about the QR code when viewers look at the patterns without the aid of a scanning software;the patterns also seriously degrade the aesthetic appeal of the carrier.Although the aesthetics and visual significance of the code are unimportant for scanning purposes,they do matter in advertising layout and can provide valuable brand distinction.Considering that QR codes often occupy a non-negligible display area in print media,the demand for visually appealing QR codes is increasing

  2. Fast Calibration of Industrial Mobile Robots to Workstations using QR Codes

    DEFF Research Database (Denmark)

    Andersen, Rasmus Skovgaard; Damgaard, Jens Skov; Madsen, Ole

    2013-01-01

    is proposed. With this QR calibration, it is possible to calibrate an AIMM to a workstation in 3D in less than 1 second, which is significantly faster than existing methods. The accuracy of the calibration is ±4 mm. The method is modular in the sense that it directly supports integration and calibration...

  3. Cross-cultural Exploration of Consumers’ Beliefs and Behavioral Intentions towards QR Codes in Marketing: An Experimental Study in India and USA

    Directory of Open Access Journals (Sweden)

    Hemant Bamoriya

    2014-08-01

    Full Text Available Current study focuses on examining consumers‟ beliefs and behavioral intentions towards QR Codes in marketing across different cultures such as India & USA. Study also examines select variables that moderate the relationship between beliefs and behavioral intentions. For this a scenario based experimental design was used. Findings suggest positive relationship between beliefs & behavioral intention and between culture & beliefs. Based on the empirical findings, study make important implications for the marketers so as to bring effectiveness in QR Code based marketing campaigns. Use of QR Codes in marketing is prevailing rapidly, however its effective integration in marketing mix remains mysterious as very little is known about consumers‟ beliefs and behavioral intentions towards it. Reason is that such academic research is practically non-existent, thus current study is of particular value.

  4. Nonlinear QR code based optical image encryption using spiral phase transform, equal modulus decomposition and singular value decomposition

    Science.gov (United States)

    Kumar, Ravi; Bhaduri, Basanta; Nishchal, Naveen K.

    2018-01-01

    In this study, we propose a quick response (QR) code based nonlinear optical image encryption technique using spiral phase transform (SPT), equal modulus decomposition (EMD) and singular value decomposition (SVD). First, the primary image is converted into a QR code and then multiplied with a spiral phase mask (SPM). Next, the product is spiral phase transformed with particular spiral phase function, and further, the EMD is performed on the output of SPT, which results into two complex images, Z 1 and Z 2. Among these, Z 1 is further Fresnel propagated with distance d, and Z 2 is reserved as a decryption key. Afterwards, SVD is performed on Fresnel propagated output to get three decomposed matrices i.e. one diagonal matrix and two unitary matrices. The two unitary matrices are modulated with two different SPMs and then, the inverse SVD is performed using the diagonal matrix and modulated unitary matrices to get the final encrypted image. Numerical simulation results confirm the validity and effectiveness of the proposed technique. The proposed technique is robust against noise attack, specific attack, and brutal force attack. Simulation results are presented in support of the proposed idea.

  5. Effects of Mode of Target Task Selection on Learning about Plants in a Mobile Learning Environment: Effortful Manual Selection versus Effortless QR-Code Selection

    Science.gov (United States)

    Gao, Yuan; Liu, Tzu-Chien; Paas, Fred

    2016-01-01

    This study compared the effects of effortless selection of target plants using quick respond (QR) code technology to effortful manual search and selection of target plants on learning about plants in a mobile device supported learning environment. In addition, it was investigated whether the effectiveness of the 2 selection methods was…

  6. Consumer acceptance of a quick response (QR) code for the food traceability system: Application of an extended technology acceptance model (TAM).

    Science.gov (United States)

    Kim, Yeong Gug; Woo, Eunju

    2016-07-01

    The objectives of this study are to apply the TAM using the addition of perceived information to individuals' behavioral intention to use the QR code for the food traceability system; and to determine the moderating effects of food involvement on the relationship between perceived information and perceived usefulness. Results from a survey of 420 respondents are analyzed using structural equation modeling. The study findings reveal that the extended TAM has a satisfactory fit to the data and that the underlying dimensions have a significant effect on consumers' intention to use the QR code for the food traceability system. In addition, food involvement plays a significant moderating function in the relationship between perceived information and perceived usefulness. The implications of this study for future research are discussed. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. Penggunaan QR Code untuk Menunjukkan Posisi dan Implementasi Algoritma Dijkstra dalam Pencarian Rute Terpendek pada Navigasi dalam Ruangan Berbasis Sistem Operasi Android

    Directory of Open Access Journals (Sweden)

    Prasetyo Prasetyo

    2017-01-01

    Full Text Available GPS memiliki kelemahan dalam menentukan posisi pengguna ketika berada di sebuah gedung bertingkat. Oleh karena itu, dikembangkan sebuah sistem yang  lebih akurat untuk navigasi dalam gedung bertingkat yang dikembangkan dengan konsep 3D Indoor Localization. Dengan menggunakan QR Code untuk menentukan posisi pengguna dalam suatu gedung bertingkat dan penggunaan algoritma Dijkstra dalam mencari rute terpendek ke suatu tujuan, maka sistem ini menyediakan sebuah layanan navigasi dalam ruangan yang lebih baik dari penggunaan GPS. Untuk mengetahui posisinya, pengguna hanya perlu melakukan pemindaian terhadap QR Code yang terdapat pada sebuah ruang. Pengguna selanjutnya dapat memilih lokasi tujuan yang dikehendaki, dan sistem akan mencari rute yang dapat ditempuh untuk sampai ke tujuan dengan jarak terpendek. Uji coba dilakukan menggunakan peta 3D dari gedung Teknik Informatika ITS. Hasil yang diperoleh menunjukkan bahwa sistem dapat melakukan semua prosesnya dengan baik, dimulai dari proses pemindaian hingga proses penunjukan rute ke tujuan. 

  8. Digital data for Quick Response (QR) codes of thermophiles to identify and compare the bacterial species isolated from Unkeshwar hot springs (India)

    Science.gov (United States)

    Rekadwad, Bhagwan N.; Khobragade, Chandrahasya N.

    2015-01-01

    16S rRNA sequences of morphologically and biochemically identified 21 thermophilic bacteria isolated from Unkeshwar hot springs (19°85′N and 78°25′E), Dist. Nanded (India) has been deposited in NCBI repository. The 16S rRNA gene sequences were used to generate QR codes for sequences (FASTA format and full Gene Bank information). Diversity among the isolates is compared with known isolates and evaluated using CGR, FCGR and PCA i.e. visual comparison and evaluation respectively. Considerable biodiversity was observed among the identified bacteria isolated from Unkeshwar hot springs. The hyperlinked QR codes, CGR, FCGR and PCA of all the isolates are made available to the users on a portal https://sites.google.com/site/bhagwanrekadwad/. PMID:26793757

  9. Making Your Mobile Device an Art Expert: Using QR Codes to Tell the Story Behind artiFACTS in Your Library

    Directory of Open Access Journals (Sweden)

    Jessica L. Howard

    2013-04-01

    Full Text Available Have you ever wondered about the stories behind the public art in your library? Every object had the potential to tell a story—the paintings, the sculpture, the furniture, and the building itself. At Musselman Library, Gettysburg College we use QR codes as the technical means to satisfy the natural curiosity of our patrons. Historical information already available in our Special Collections and College Archives was repurposed for the mobile-friendly environment. The artiFACTS project proved to be simple, scalable, and a great opportunity for collaboration.  We discuss how we implemented artiFACTS, including creating QR codes, marketing to campus constituencies and visitors, gathering feedback from students and faculty members, and evaluating the project’s success.

  10. Cross-cultural Exploration of Consumers’ Beliefs and Behavioral Intentions towards QR Codes in Marketing: An Experimental Study in India and USA

    OpenAIRE

    Hemant Bamoriya

    2014-01-01

    Current study focuses on examining consumers? beliefs and behavioral intentions towards QR Codes in marketing across different cultures such as India & USA. Study also examines select variables that moderate the relationship between beliefs and behavioral intentions. For this a scenario based experimental design was used. Findings suggest positive relationship between beliefs & behavioral intention and between culture & beliefs. Based on the empirical findings, study make important implicatio...

  11. Research and Trends in the Field of Technology-Enhanced Learning from 2006 to 2011: A Content Analysis of Quick Response Code (QR-Code) and Its Application in Selected Studies

    Science.gov (United States)

    Hau, Goh Bak; Siraj, Saedah; Alias, Norlidah; Rauf, Rose Amnah Abd.; Zakaria, Abd. Razak; Darusalam, Ghazali

    2013-01-01

    This study provides a content analysis of selected articles in the field of QR code and its application in educational context that were published in journals and proceedings of international conferences and workshops from 2006 to 2011. These articles were cross analysed by published years, journal, and research topics. Further analysis was…

  12. Codici QR (Quick Response in biblioteca

    Directory of Open Access Journals (Sweden)

    Stefano Gambari

    2010-11-01

    Numerose istituzioni stanno progettando di inserire questo utile strumento tra quelli forniti dalla propria biblioteca. La diffusione del QR code è tuttavia legata a due fondamentali caratteristiche: il possesso da parte dell'utente di uno smartphone e OPAC strutturati in modo da poter essere navigabili attraverso questo tipo di cellulari.

  13. Using QR Codes in Classrooms

    Science.gov (United States)

    Cetner, Michelle

    2015-01-01

    For years, many schools and districts have had strict policies banning the use of students' personal electronic devices in classrooms. However, some schools are beginning to embrace the educational value of handheld Web-enabled devices that students already bring to school each day. As teachers begin to explore the educational opportunities that…

  14. LANSCE radiation security system (RSS)

    International Nuclear Information System (INIS)

    Gallegos, F.R.

    1996-01-01

    The Radiation Security System (RSS) is an engineered safety system which automatically terminates transmission of accelerated ion beams in response to pre-defined abnormal conditions. It is one of the four major mechanisms used to protect people from radiation hazards induced by accelerated pulsed ion beams at the Los Alamos Neutron Science Center (LANSCE). The others are shielding, administrative policies and procedures, and qualified, trained personnel. Prompt radiation hazards at the half-mile long LANSCE accelerator exist due to average beam intensities ranging from 1 milli-amp for H + beam to 100 micro-amps for the high intensity H - beam. Experimental programs are supplied with variable energy (maximum 800 MeV), pulse-width (maximum 1 msec), and pulse frequency (maximum 120 Hz) ion beams. The RSS includes personnel access control systems, beam spill monitoring systems, and beam current level limiting systems. It is a stand-alone system with redundant logic chains. A fault of the RSS will cause the insertion of fusible beam plugs in the accelerator low energy beam transport. The design philosophy, description, and operation of the RSS are described in this paper

  15. The remote security station (RSS)

    International Nuclear Information System (INIS)

    Pletta, J.B.

    1991-01-01

    This paper reports that, as an outgrowth of research into physical security systems, Sandia is investigating robotic technologies for improving physical security performance and flexibility. Robotic systems have the potential to allow more effective utilization of security personnel, especially in scenarios where they might be exposed to harm. They also can supplement fixed site installations where sensors have failed or where transient assets are present. The Remote Security Station (RSS) program for the defense Nuclear Agency is developing a proof-of-principle robotic system which will be used to evaluate the role, and associated cost, of robotic technologies in exterior physical security systems. The RSS consists of three primary elements: a fixed but quickly moveable tripod with intrusion detection sensors and assessment camera; a mobile robotic platform with a functionally identical security module; and a control console which allows an operator to perform security functions and teleoperate the mobile platform

  16. Rotating Shadowband Spectroradiometer (RSS) Handbook

    Energy Technology Data Exchange (ETDEWEB)

    Kiedron, P; Schlemmer, J; Klassen, M

    2005-01-01

    The rotating shawdowband spectroradiometer (RSS) implements the same automated shadowbanding technique used by the multifilter rotating shadowband radiometer (MFRSR), and so it too provides spectrally-resolved, direct-normal, diffuse-horizontal, and total-horizontal irradiances, and can be calibrated in situ via Langley regression. The irradiance spectra are measured simultaneously at all spectral elements (pixels) in 360-nm to 1050-nm range.

  17. Interações analógico e digital móvel na mídia impressa: camadas informacionais na narrativa com QR Code, Aurasma e Realidade Aumentada

    Directory of Open Access Journals (Sweden)

    Fernando Firmino da Silva

    2013-08-01

    Full Text Available Este artigo discute a adoção de inovações no jornalismo impresso como QR Code, Aurasma, Realidade Aumentada, 3D como processos de complexificação das narrativas e das estratégias construídas como modelo de negócios nas organizações jornalísticas a partir das apropriações das tecnologias móveis digitais. As camadas informacionais (interativas, multimídia, metadados oriundas desses recursos compartilham da noção defendida por McLuhan (2005 de que os meios se refletem um no outro, reinventam-se. A abordagem se centra na análise dessas interações analógico-digital e de natureza móvel partindo da observação de que o jornalismo impresso procura introduzir nos seus projetos gráficos essa perspectiva visando se modernizar para "fisgar" ou manter os leitores através da conexão entre plataformas com o incremento às narrativas de recursos dinâmicos que vão além do próprio suporte, como nos casos em debate.

  18. Amplify Your Professional Knowledge through RSS

    Science.gov (United States)

    Stephens, Wendy

    2012-01-01

    In the championship playoffs of professional learning tools, this author contends that there is a clear-cut victor. Customizable, platform-agnostic, able to circumvent filters--both browser and network-imposed--RSS is the best professional learning tool. Reading sites via RSS has appeal for those who want the raw information. With a well-honed…

  19. Quick response codes in Orthodontics

    Directory of Open Access Journals (Sweden)

    Moidin Shakil

    2015-01-01

    Full Text Available Quick response (QR code codes are two-dimensional barcodes, which encodes for a large amount of information. QR codes in Orthodontics are an innovative approach in which patient details, radiographic interpretation, and treatment plan can be encoded. Implementing QR code in Orthodontics will save time, reduces paperwork, and minimizes manual efforts in storage and retrieval of patient information during subsequent stages of treatment.

  20. Augmenting Classroom Practices with QR Codes

    Science.gov (United States)

    Thorne, Tristan

    2016-01-01

    The use of mobile devices in the language classroom can help accomplish innumerable learning objectives, yet many teachers regard smartphones and tablets as obstacles to lesson goals. However, as portable technology continues to infiltrate classroom boundaries, it is becoming increasingly clear that educators should find ways to take advantage of…

  1. QR Codes in Education and Communication

    Science.gov (United States)

    Durak, Gurhan; Ozkeskin, E. Emre; Ataizi, Murat

    2016-01-01

    Technological advances brought applications of innovations to education. Conventional education increasingly flourishes with new technologies accompanied by more learner active environments. In this continuum, there are learners preferring self-learning. Traditional learning materials yield attractive, motivating and technologically enhanced…

  2. Application of RSS in Special Libraries

    Directory of Open Access Journals (Sweden)

    Shima Moradi

    2007-07-01

    Full Text Available Despite of ever increasing scope and volume of online information content and the constant need for easy accessibility to these contents, experts in various subject matters always face time constraints when searching for information or looking up their intended resource. Meanwhile, special libraries are faced with diminishing resources, time and human resource needed for providing services and meeting the information need of the said experts. Nowadays Push Technologies, in form of RSS could be used to speed up on-time information dissemination. RSS feeds could spontaneously deliver information to the users. These could be posted on webpages or read by RSS readers. RSS has numerous applications such as web page content update, reading lists, table of contents, current awareness, guides etc. The present paper while outlining RSS as one of the next generation web tools, would point out its various advantages and applications in the new generation of libraries (Lib 2.0,particularly the special libraries. It would also offer pointers to its application in meeting the information needs of experts and users in such libraries.

  3. How to Build an RSS 20 Feed

    CERN Document Server

    Woodman, Mark

    2006-01-01

    The little orange feed icons are everywhere on the web. From search engines to shopping sites to blogs, Really Simple Syndication (RSS 2.0) has become one of the hottest web technologies going. RSS 2.0 is a powerful - yet surprisingly easy - way to distributing timely content to a web-based audience. This Short Cut will give you the hands-on knowledge you need to build an RSS 2.0 feed. Along the way you'll learn not only the mechanics of building a feed, but industry-accepted best practices for creating feeds that perform well in various situations. Are you ready? Roll up your sleeves, c

  4. QR encoded smart oral dosage forms by inkjet printing.

    Science.gov (United States)

    Edinger, Magnus; Bar-Shalom, Daniel; Sandler, Niklas; Rantanen, Jukka; Genina, Natalja

    2018-01-30

    The use of inkjet printing (IJP) technology enables the flexible manufacturing of personalized medicine with the doses tailored for each patient. In this study we demonstrate, for the first time, the applicability of IJP in the production of edible dosage forms in the pattern of a quick response (QR) code. This printed pattern contains the drug itself and encoded information relevant to the patient and/or healthcare professionals. IJP of the active pharmaceutical ingredient (API)-containing ink in the pattern of QR code was performed onto a newly developed porous and flexible, but mechanically stable substrate with a good absorption capacity. The printing did not affect the mechanical properties of the substrate. The actual drug content of the printed dosage forms was in accordance with the encoded drug content. The QR encoded dosage forms had a good print definition without significant edge bleeding. They were readable by a smartphone even after storage in harsh conditions. This approach of efficient data incorporation and data storage combined with the use of smart devices can lead to safer and more patient-friendly drug products in the future. Copyright © 2017 Elsevier B.V. All rights reserved.

  5. The Remote Security Station (RSS) final report

    International Nuclear Information System (INIS)

    Pletta, J.B.; Amai, W.A.; Klarer, P.; Frank, D.; Carlson, J.; Byrne, R.

    1992-10-01

    The Remote Security Station (RSS) was developed by Sandia National Laboratories for the Defense Nuclear Agency to investigate issues pertaining to robotics and sensor fusion in physical security systems. This final report documents the status of the RSS program at its completion in April 1992. The RSS system consists of the Man Portable Security Station (MaPSS) and the Telemanaged Mobile Security Station (TMSS), which are integrated by the Operator's Control Unit (OCU) into a flexible exterior perimeter security system. The RSS system uses optical, infrared, microwave, and acoustic intrusion detection sensors in conjunction with sensor fusion techniques to increase the probability of detection and to decrease the nuisance alarm rate of the system. Major improvements to the system developed during the final year are an autonomous patrol capability, which allows TMSS to execute security patrols with limited operator interaction, and a neural network approach to sensor fusion, which significantly improves the system's ability to filter out nuisance alarms due to adverse weather conditions

  6. Zone-based RSS Reporting for Location Fingerprinting

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun; Treu, Georg; Linnhoff–Popien, Claudia

    2007-01-01

    In typical location fingerprinting systems a tracked terminal reports sampled Received Signal Strength (RSS) values to a location server, which estimates its position based on a database of pre-recorded RSS fingerprints. So far, poll-based and periodic RSS reporting has been proposed. However......, for supporting proactive Location-based Services (LBSs), triggered by pre-defined spatial events, the periodic protocol is inefficient. Hence, this paper introduces zone-based RSS reporting: the location server translates geographical zones defined by the LBS into RSS-based representations, which are dynamically...

  7. Application of RSS in Special Libraries

    OpenAIRE

    Shima Moradi

    2007-01-01

    Despite of ever increasing scope and volume of online information content and the constant need for easy accessibility to these contents, experts in various subject matters always face time constraints when searching for information or looking up their intended resource. Meanwhile, special libraries are faced with diminishing resources, time and human resource needed for providing services and meeting the information need of the said experts. Nowadays Push Technologies, in form of RSS could b...

  8. The Primary Care Electronic Library: RSS feeds using SNOMED-CT indexing for dynamic content delivery.

    Science.gov (United States)

    Robinson, Judas; de Lusignan, Simon; Kostkova, Patty; Madge, Bruce; Marsh, A; Biniaris, C

    2006-01-01

    Rich Site Summary (RSS) feeds are a method for disseminating and syndicating the contents of a website using extensible mark-up language (XML). The Primary Care Electronic Library (PCEL) distributes recent additions to the site in the form of an RSS feed. When new resources are added to PCEL, they are manually assigned medical subject headings (MeSH terms), which are then automatically mapped to SNOMED-CT terms using the Unified Medical Language System (UMLS) Metathesaurus. The library is thus searchable using MeSH or SNOMED-CT. Our syndicate partner wished to have remote access to PCEL coronary heart disease (CHD) information resources based on SNOMED-CT search terms. To pilot the supply of relevant information resources in response to clinically coded requests, using RSS syndication for transmission between web servers. Our syndicate partner provided a list of CHD SNOMED-CT terms to its end-users, a list which was coded according to UMLS specifications. When the end-user requested relevant information resources, this request was relayed from our syndicate partner's web server to the PCEL web server. The relevant resources were retrieved from the PCEL MySQL database. This database is accessed using a server side scripting language (PHP), which enables the production of dynamic RSS feeds on the basis of Source Asserted Identifiers (CODEs) contained in UMLS. Retrieving resources using SNOMED-CT terms using syndication can be used to build a functioning application. The process from request to display of syndicated resources took less than one second. The results of the pilot illustrate that it is possible to exchange data between servers using RSS syndication. This method could be utilised dynamically to supply digital library resources to a clinical system with SNOMED-CT data used as the standard of reference.

  9. Analýza využití QR kódů v maloobchodě v České republice

    Directory of Open Access Journals (Sweden)

    Čechurová Lenka

    2016-03-01

    Full Text Available QR codes are frequently used technology in various industries worldwide including retailing. Lately QR codes have become one of the key innovations in various tools of marketing communication of large amount of companies. For the purpose of this paper QR codes are viewed through the scope of retail companies’ marketing communication tools especially sales promotion. The aim of the paper given is to analyse QR codes usage in retail industry in the Czech Republic as well as to find out what attitude Czech consumers have towards active use of QR codes. Paper presents results of three researches out of which two are focused on supply side of a market and one on demand side of the market. Mystery shopping was used in order to obtain data from supply side of the market meanwhile the questionnaire survey was held to get data from demand side. During the research held in 2013, 1010 store units were visited to collect data and in continuous research in 2015 527 store units were included in the research focused on supply side of the market. In total 612 Czech customers participated in the research focused on demand side of the market. Results of researches focused on supply side of the market suggest that the usage of QR codes in marketing communication of retailers as well as producers of goods is increasing. The usage is becoming more effective and informative for customers and more often QR codes contain a value added for customer. On the other hand, Czech customers do not pay much attention to the QR code scanning. There are also suggestions for sales promotion of retailers included at the end of the paper.

  10. ISBN and QR Barcode Scanning Mobile App for Libraries

    Directory of Open Access Journals (Sweden)

    Graham McCarthy

    2011-04-01

    Full Text Available This article outlines the development of a mobile application for the Ryerson University Library. The application provides for ISBN barcode scanning that results in a lookup of library copies and services for the book scanned, as well as QR code scanning. Two versions of the application were developed, one for iOS and one for Android. The article includes some details on the free packages used for barcode scanning functionality. Source code for the Ryerson iOS and Android applications are freely available, and instructions are provided on customizing the Ryerson application for use in other library environments. Some statistics on the number of downloads of the Ryerson mobile app by users are included.

  11. Cleaning and Processing RSS measurements for Location Fingerprinting

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun

    2007-01-01

    Handling variations in sampled Received Signal Strength (RSS) is neassary for achieving robust location fingerprinting (LF). Current research has only proposed limited system-specific models for how to handle the cleaning of RSS variations. However, this paper propose a novel model for both...

  12. Technical Evaluation Report 58: RSS Windows Editors: First impressions

    Directory of Open Access Journals (Sweden)

    Steve Swettenham

    2006-12-01

    Full Text Available An RSS feed is a list of topics made available from a webpage via a standard XML file format known as RSS, an abbreviation of either Really Simple Syndication or Rich Site Summary (Wikipedia, 2006. The end-user subscribes to their favorite Internet content site via RSS-aware software. Once subscribed, announcements with appropriate links are “pushed” from the publishing site whenever new material is added to that site (see Figure 1. This allows notification of new content of possible interest, fed with anonymity to subscribers, and reduces email clutter.

  13. An RSS based location estimation technique for cognitive relay networks

    KAUST Repository

    Qaraqe, Khalid A.; Hussain, Syed Imtiaz; Ç elebi, Hasari Burak; Abdallah, Mohamed M.; Alouini, Mohamed-Slim

    2010-01-01

    In this paper, a received signal strength (RSS) based location estimation method is proposed for a cooperative wireless relay network where the relay is a cognitive radio. We propose a method for the considered cognitive relay network to determine

  14. Gravity Field Parameter Estimation Using QR Factorization

    Science.gov (United States)

    Klokocnik, J.; Wagner, C. A.; McAdoo, D.; Kostelecky, J.; Bezdek, A.; Novak, P.; Gruber, C.; Marty, J.; Bruinsma, S. L.; Gratton, S.; Balmino, G.; Baboulin, M.

    2007-12-01

    This study compares the accuracy of the estimated geopotential coefficients when QR factorization is used instead of the classical method applied at our institute, namely the generation of normal equations that are solved by means of Cholesky decomposition. The objective is to evaluate the gain in numerical precision, which is obtained at considerable extra cost in terms of computer resources. Therefore, a significant increase in precision must be realized in order to justify the additional cost. Numerical simulations were done in order to examine the performance of both solution methods. Reference gravity gradients were simulated, using the EIGEN-GL04C gravity field model to degree and order 300, every 3 seconds along a near-circular, polar orbit at 250 km altitude. The simulation spanned a total of 60 days. A polar orbit was selected in this simulation in order to avoid the 'polar gap' problem, which causes inaccurate estimation of the low-order spherical harmonic coefficients. Regularization is required in that case (e.g., the GOCE mission), which is not the subject of the present study. The simulated gravity gradients, to which white noise was added, were then processed with the GINS software package, applying EIGEN-CG03 as the background gravity field model, followed either by the usual normal equation computation or using the QR approach for incremental linear least squares. The accuracy assessment of the gravity field recovery consists in computing the median error degree-variance spectra, accumulated geoid errors, geoid errors due to individual coefficients, and geoid errors calculated on a global grid. The performance, in terms of memory usage, required disk space, and CPU time, of the QR versus the normal equation approach is also evaluated.

  15. RSS (http://www.iaees.org/publications/journals/arthropods/rss.xml

    Directory of Open Access Journals (Sweden)

    Arthropods (ISSN 2224-4255

    Full Text Available Arthropods ISSN 2224-4255 URL: http://www.iaees.org/publications/journals/arthropods/online-version.asp RSS: http://www.iaees.org/publications/journals/arthropods/rss.xml E-mail: arthropods@iaees.org Editor-in-Chief: WenJun Zhang Aims and Scope ARTHROPODS (ISSN 2224-4255 is an international journal devoted to the publication of articles on various aspects of arthropods, e.g., ecology, biogeography, systematics, biodiversity (species diversity, genetic diversity, et al., conservation, control, etc. The journal provides a forum for examining the importance of arthropods in biosphere (both terrestrial and marine ecosystems and human life in such fields as agriculture, forestry, fishery, environmental management and human health. The scope of Arthropods is wide and embraces all arthropods-insects, arachnids, crustaceans, centipedes, millipedes, and other arthropods. Articles/short communications on new taxa (species, genus, families, orders, etc. and new records of arthropods are particularly welcome. Authors can submit their works to the email box of this journal, arthropods@iaees.org. All manuscripts submitted to this journal must be previously unpublished and may not be considered for publication elsewhere at any time during review period of this journal. Authors are asked to read Author Guidelines before submitting manuscripts. In addition to free submissions from authors around the world, special issues are also accepted. The organizer of a special issue can collect submissions (yielded from a research project, a research group, etc. on a specific research topic, or submissions of a scientific conference for publication of special issue.

  16. RSS (http://www.iaees.org/publications/journals/environsc/rss.xml

    Directory of Open Access Journals (Sweden)

    Environmental Skeptics and Critics (ISSN 2224-4263

    Full Text Available Environmental Skeptics and Critics ISSN 2224-4263 URL: http://www.iaees.org/publications/journals/environsc/online-version.asp RSS: http://www.iaees.org/publications/journals/environsc/rss.xml E-mail: environsc@iaees.org Editor-in-Chief: WenJun Zhang Aims and Scope The more truth is debated, the clearer it becomes. Science will not proceed without debate and controversy. Wide and in-depth debate and controversy on human's knowledge, attitudes, policies and practices on the environment determines the future of our planet. There are numerous controversial and potentially controversial issues on environmental sciences and practices. ENVIRONMENTAL SKEPTICS and CRITICS (ISSN 2224-4263 is an international journal devoted to the publication of skeptical and critical articles/short communications/letters on theories, viewpoints, methodologies, practices, policies, etc., in ecological and environmental areas. The journal provides a forum for questioning, disputing, arguing, challenging, criticizing and judging known theories, methdologies, practices, and policies, etc., or presenting different ideas. The scope of Environmental Skeptics and Critics is wide and embraces all controversial, non-conclusive or unexplained issues in ecological and environmental areas. Authors can submit their works to the email box of this journal, environsc@iaees.org. All manuscripts submitted to this journal must be previously unpublished and may not be considered for publication elsewhere at any time during review period of this journal. Authors are asked to read Author Guidelines before submitting manuscripts. In addition to free submissions from authors around the world, special issues are also accepted. The organizer of a special issue can collect submissions (yielded from a research project, a research group, etc. on a specific research topic, or submissions of a scientific conference for publication of special issue.

  17. RSS (http://www.iaees.org/publications/journals/ces/rss.xml

    Directory of Open Access Journals (Sweden)

    Computational Ecology and Software (ISSN 2220-721X

    Full Text Available Computational Ecology and Software ISSN 2220-721X URL: http://www.iaees.org/publications/journals/ces/online-version.asp RSS: http://www.iaees.org/publications/journals/ces/rss.xml E-mail: ces@iaees.org Editor-in-Chief: WenJun Zhang Aims and Scope COMPUTATIONAL ECOLOGY AND SOFTWARE (ISSN 2220-721X is an open access, peer-reviewed online journal that considers scientific articles in all different areas of computational ecology. It is the transactions of the International Society of Computational Ecology. The journal is concerned with the ecological researches, constructions and applications of theories and methods of computational sciences including computational mathematics, computational statistics and computer science. It features the simulation, approximation, prediction, recognition, and classification of ecological issues. Intensive computation is one of the major stresses of the journal. The journal welcomes research articles, short communications, review articles, perspectives, and book reviews. The journal also supports the activities of the International Society of Computational Ecology. The topics to be covered by CES include, but are not limited to: •Computation intensive methods, numerical and optimization methods, differential and difference equation modeling and simulation, prediction, recognition, classification, statistical computation (Bayesian computing, randomization, bootstrapping, Monte Carlo techniques, stochastic process, etc., agent-based modeling, individual-based modeling, artificial neural networks, knowledge based systems, machine learning, genetic algorithms, data exploration, network analysis and computation, databases, ecological modeling and computation using Geographical Information Systems, satellite imagery, and other computation intensive theories and methods. •Artificial ecosystems, artificial life, complexity of ecosystems and virtual reality. •The development, evaluation and validation of software and

  18. RSS (http://www.iaees.org/publications/journals/nb/rss.xml

    Directory of Open Access Journals (Sweden)

    Network Biology (ISSN 2220-8879

    Full Text Available Network Biology ISSN 2220-8879 URL: http://www.iaees.org/publications/journals/nb/online-version.asp RSS: http://www.iaees.org/publications/journals/nb/rss.xml E-mail: networkbiology@iaees.org Editor-in-Chief: WenJun Zhang Aims and Scope NETWORK BIOLOGY (ISSN 2220-8879; CODEN NBEICS is an open access, peer-reviewed international journal that considers scientific articles in all different areas of network biology. It is the transactions of the International Society of Network Biology. It dedicates to the latest advances in network biology. The goal of this journal is to keep a record of the state-of-the-art research and promote the research work in these fast moving areas. The topics to be covered by Network Biology include, but are not limited to: •Theories, algorithms and programs of network analysis •Innovations and applications of biological networks •Ecological networks, food webs and natural equilibrium •Co-evolution, co-extinction, biodiversity conservation •Metabolic networks, protein-protein interaction networks, biochemical reaction networks, gene networks, transcriptional regulatory networks, cell cycle networks, phylogenetic networks, network motifs •Physiological networks •Network regulation of metabolic processes, human diseases and ecological systems •Social networks, epidemiological networks •System complexity, self-organized systems, emergence of biological systems, agent-based modeling, individual-based modeling, neural network modeling, and other network-based modeling, etc. We are also interested in short communications that clearly address a specific issue or completely present a new ecological network, food web, or metabolic or gene network, etc. Authors can submit their works to the email box of this journal, networkbiology@iaees.org. All manuscripts submitted to this journal must be previously unpublished and may not be considered for publication elsewhere at any time during review period of this journal

  19. ADVANCED SECURE EXAM MANAGEMENT SYSTEM THROUGH QR CODE BASED AUTHENTICATION

    OpenAIRE

    MR. OMKAR RAJENDRA URUNKAR , PROF. S. A. JOSHI

    2018-01-01

    M-Learning has enhanced the e-learning by making the learning process learner-centered. However, obligating exam security in environments which are open, every student has devices or Laptop connected to a Wi-Fi network or internet.

  20. QR Code Reader pada Smartphone Android untuk Aplikasi Layanan Restoran

    Directory of Open Access Journals (Sweden)

    Dennise Adrianto

    2015-06-01

    Full Text Available The development of today's smartphone technology has a huge impact to the world of information technology and telecommunications. The emergence of a variety of applications for smartphones can improve the performance and effectiveness of an activity. Some restaurants have made use of smartphones in the business process, but only as a recording medium order or see a list of menus available in the restaurant. The purpose of this paper is to make the application as a whole that integrated the frontend and backend operations that help the process from ordering food, serving customer to managing restaurant data such as restaurant menus, employees, and transactions. The method used is the method of analysis (study of literature, analysis of similar applications, questionnaires, and interviews and extreme programming design method. The results of this research is frontend application for food ordering and restaurant service and a backend system that has additional features such as restaurant profiles, restaurant menu data includes descriptions, recommended menuand images, promos, restaurant rating or menu rating, the waiter call feature, view bill and request features bill. The conclusion of this research is the developed application can help ordering process and restaurant servicesprocess in a restaurant with good customer satisfaction and good application performance.

  1. QR Codes in Higher Ed: Fad or Functional Tool?

    Science.gov (United States)

    Gradel, Kathleen; Edson, Alden J.

    2013-01-01

    As higher education grapples with addressing the 21st century needs of learners, technology is a pervasive concern. Waters (2012) painted a picture of three historical "screens," namely the television screen, the computer monitor, and today's mobile device screen. As mobile devices become increasingly commonplace in the workplace and on the…

  2. CERN alerter-RSS based system for information broadcast to all CERN offices

    International Nuclear Information System (INIS)

    Otto, R

    2008-01-01

    Nearly every large organization uses a tool to broadcast messages and information across the internal campus (messages like alerts announcing interruption in services or just information about upcoming events). These tools typically allow administrators (operators) to send 'targeted' messages which are sent only to specific groups of users or computers, e/g only those located in a specified building or connected to a particular computing service. CERN has a long history of such tools: CERNVMS's SPM q uotMESSAGE command, Zephyr [2] and the most recent the NICE Alerter based on the NNTP protocol. The NICE Alerter used on all Windows-based computers had to be phased out as a consequence of phasing out NNTP at CERN. The new solution to broadcast information messages on the CERN campus continues to provide the service based on cross-platform technologies, hence minimizing custom developments and relying on commercial software as much as possible. The new system, called CERN Alerter, is based on RSS (Really Simple Syndication) [9] for the transport protocol and uses Microsoft SharePoint as the backend for database and posting interface. The windows-based client relies on Internet Explorer 7.0 with custom code to trigger the window pop-ups and the notifications for new events. Linux and Mac OS X clients could also rely on any RSS readers to subscribe to targeted notifications. The paper covers the architecture and implementation aspects of the new system

  3. Using GeoRSS feeds to distribute house renting and selling information based on Google map

    Science.gov (United States)

    Nong, Yu; Wang, Kun; Miao, Lei; Chen, Fei

    2007-06-01

    Geographically Encoded Objects RSS (GeoRSS) is a way to encode location in RSS feeds. RSS is a widely supported format for syndication of news and weblogs, and is extendable to publish any sort of itemized data. When Weblogs explode since RSS became new portals, Geo-tagged feed is necessary to show the location that story tells. Geographically Encoded Objects adopts the core of RSS framework, making itself the map annotations specified in the RSS XML format. The case studied illuminates that GeoRSS could be maximally concise in representation and conception, so it's simple to manipulate generation and then mashup GeoRSS feeds with Google Map through API to show the real estate information with other attribute in the information window. After subscribe to feeds of concerned subjects, users could easily check for new bulletin showing on map through syndication. The primary design goal of GeoRSS is to make spatial data creation as easy as regular Web content development. However, it does more for successfully bridging the gap between traditional GIS professionals and amateurs, Web map hackers, and numerous services that enable location-based content for its simplicity and effectiveness.

  4. DIMENSI METRIK GRAPH LOBSTER Ln (q;r

    Directory of Open Access Journals (Sweden)

    PANDE GDE DONY GUMILAR

    2013-05-01

    Full Text Available The metric dimension of connected graph G is the cardinality of minimum resolving set in graph G. In this research, we study how to find the metric dimension of lobster graph Ln (q;r. Lobster graph Ln (q;r is a regular lobster graph with vertices backbone on the main path, every backbone vertex is connected to q hand vertices and every hand vertex is connected to r finger vertices, with n, q, r element of N. We obtain the metric dimension of lobster graph L2 (1;1 is 1, the metric dimension of lobster graph L2 (1;1 for n > 2 is 2.

  5. Investigating the use of quick response codes in the gross anatomy laboratory.

    Science.gov (United States)

    Traser, Courtney J; Hoffman, Leslie A; Seifert, Mark F; Wilson, Adam B

    2015-01-01

    The use of quick response (QR) codes within undergraduate university courses is on the rise, yet literature concerning their use in medical education is scant. This study examined student perceptions on the usefulness of QR codes as learning aids in a medical gross anatomy course, statistically analyzed whether this learning aid impacted student performance, and evaluated whether performance could be explained by the frequency of QR code usage. Question prompts and QR codes tagged on cadaveric specimens and models were available for four weeks as learning aids to medical (n = 155) and doctor of physical therapy (n = 39) students. Each QR code provided answers to posed questions in the form of embedded text or hyperlinked web pages. Students' perceptions were gathered using a formative questionnaire and practical examination scores were used to assess potential gains in student achievement. Overall, students responded positively to the use of QR codes in the gross anatomy laboratory as 89% (57/64) agreed the codes augmented their learning of anatomy. The users' most noticeable objection to using QR codes was the reluctance to bring their smartphones into the gross anatomy laboratory. A comparison between the performance of QR code users and non-users was found to be nonsignificant (P = 0.113), and no significant gains in performance (P = 0.302) were observed after the intervention. Learners welcomed the implementation of QR code technology in the gross anatomy laboratory, yet this intervention had no apparent effect on practical examination performance. © 2014 American Association of Anatomists.

  6. Radiation safety system (RSS) backbones: Design, engineering, fabrication and installation

    International Nuclear Information System (INIS)

    Wilmarth, J.E.; Sturrock, J.C.; Gallegos, F.R.

    1998-01-01

    The Radiation Safety System (RSS) Backbones are part of an electrical/electronic/mechanical system insuring safe access and exclusion of personnel to areas at the Los Alamos Neutron Science Center (LANSCE) accelerator. The RSS Backbones control the safety fusible beam plugs which terminate transmission of accelerated ion beams in response to predefined conditions. Any beam or access fault of the backbone inputs will cause insertion of the beam plugs in the low energy beam transport. The Backbones serve the function of tying the beam plugs to the access control systems, beam spill monitoring systems and current-level limiting systems. In some ways the Backbones may be thought of as a spinal column with beam plugs at the head and nerve centers along the spinal column. The two Linac Backbone segments and experimental area segments form a continuous cable plant over 3,500 feet from beam plugs to the tip on the longest tail. The Backbones were installed in compliance with current safety standards, such as installation of the two segments in separate conduits or tray. Monitoring for ground-faults and input wiring verification was an added enhancement to the system. The system has the capability to be tested remotely

  7. Use of RSS feeds for the implementation of clinical reminder.

    Science.gov (United States)

    Chi, Wen-Chou; Wen, Chia-Hsien; Lin, Chih-Yu; Poon, Sek-Kwong; Huang, Shih-Che

    2012-06-01

    A computer-based reminder system can help physicians get right information and make right decisions in daily clinical work in time. This study presents a RSS-based Clinical Reminding System (RCRS) designed for reminding clinicians to deal with their varied unfinished clinical works. The RCRS was implemented in a hospital to automatically generate messages for every clinician on the basis of clinical information gathered from the hospital information system (HIS) and send them by RSS feed. In order to allow all physicians to participate in the project, the RCRS was integrated with the Computerized Physician Order Entry (COPE) system to provide messages whenever a clinician logs in the HIS; the connection on screen lets the clinician easily make some response. The system can help clinicians focus on patient care without keeping track of the schedule of clinical chores stored in various systems. Two physicians, also directors from Clinical Informatics Research & Development Center (CIRD) who were appointed as project leaders of the RCRS project who went through the entire development process were chosen as interviewees to obtain a preliminary evaluation of the system. The results show the "Information Content" of this system was suggested to be modified, and "Information Accuracy", "Formats", "Ease of use" and "Timeliness" of the system were appropriate to meet the system design purposes.

  8. NAVIGATION IN LARGE-FORMAT BUILDINGS BASED ON RFID SENSORS AND QR AND AR MARKERS

    Directory of Open Access Journals (Sweden)

    Tomasz Szymczyk

    2016-09-01

    Full Text Available The authors address the problem of passive navigation in large buildings. Based on the example of several interconnected buildings housing departments of the Lublin University of Technology, as well as the conceptual navigation system, the paper presents one of the possible ways of leading the user from the entrance of the building to a particular room. An analysis of different types of users is made and different (best for them ways of navigating the intricate corridors are proposed. Three ways of user localisation are suggested: RFID, AR and QR markers. A graph of connections between specific rooms was made and weights proposed, representing “the difficulty of covering a given distance”. In the process of navigation Dijkstra’s algorithm was used. The road is indicated as multimedia information: a voice-over or animated arrow showing the direction displayed on the smart phone screen with proprietary software installed. It is also possible to inform the user of the position of the location in which he currently is, based on the static information stored in the QR code.

  9. Technical Modification Within the Healthcare Industry: Improving Both the Efficacy of the National Drug Code Carrier and the Accessibility of Electronic Health Records to Reduce Adverse Drug Events

    Science.gov (United States)

    2013-06-01

    with an EHR .................................................. 97 C. SWOT ANALYSIS OF USING QR CODES WITH THE NDC AND WITH EHRS...96 Figure 41. SWOT analysis ................................................................................... 99 xiii LIST OF...having an EHR provides a more robust overall solution. C. SWOT ANALYSIS OF USING QR CODES WITH THE NDC AND WITH EHRS In order to conduct an

  10. Information retrieval based on single-pixel optical imaging with quick-response code

    Science.gov (United States)

    Xiao, Yin; Chen, Wen

    2018-04-01

    Quick-response (QR) code technique is combined with ghost imaging (GI) to recover original information with high quality. An image is first transformed into a QR code. Then the QR code is treated as an input image in the input plane of a ghost imaging setup. After measurements, traditional correlation algorithm of ghost imaging is utilized to reconstruct an image (QR code form) with low quality. With this low-quality image as an initial guess, a Gerchberg-Saxton-like algorithm is used to improve its contrast, which is actually a post processing. Taking advantage of high error correction capability of QR code, original information can be recovered with high quality. Compared to the previous method, our method can obtain a high-quality image with comparatively fewer measurements, which means that the time-consuming postprocessing procedure can be avoided to some extent. In addition, for conventional ghost imaging, the larger the image size is, the more measurements are needed. However, for our method, images with different sizes can be converted into QR code with the same small size by using a QR generator. Hence, for the larger-size images, the time required to recover original information with high quality will be dramatically reduced. Our method makes it easy to recover a color image in a ghost imaging setup, because it is not necessary to divide the color image into three channels and respectively recover them.

  11. Rethinking mobile delivery: using Quick Response codes to access information at the point of need.

    Science.gov (United States)

    Lombardo, Nancy T; Morrow, Anne; Le Ber, Jeanne

    2012-01-01

    This article covers the use of Quick Response (QR) codes to provide instant mobile access to information, digital collections, educational offerings, library website, subject guides, text messages, videos, and library personnel. The array of uses and the value of using QR codes to push customized information to patrons are explained. A case is developed for using QR codes for mobile delivery of customized information to patrons. Applications in use at the Libraries of the University of Utah will be reviewed to provide readers with ideas for use in their library. Copyright © Taylor & Francis Group, LLC

  12. Average Likelihood Methods of Classification of Code Division Multiple Access (CDMA)

    Science.gov (United States)

    2016-05-01

    subject to code matrices that follows the structure given by (113). [⃗ yR y⃗I ] = √ Es 2L [ GR1 −GI1 GI2 GR2 ] [ QR −QI QI QR ] [⃗ bR b⃗I ] + [⃗ nR n⃗I... QR ] [⃗ b+ b⃗− ] + [⃗ n+ n⃗− ] (115) The average likelihood for type 4 CDMA (116) is a special case of type 1 CDMA with twice the code length and...AVERAGE LIKELIHOOD METHODS OF CLASSIFICATION OF CODE DIVISION MULTIPLE ACCESS (CDMA) MAY 2016 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE

  13. RssAB signaling coordinates early development of surface multicellularity in Serratia marcescens.

    Directory of Open Access Journals (Sweden)

    Yu-Huan Tsai

    Full Text Available Bacteria can coordinate several multicellular behaviors in response to environmental changes. Among these, swarming and biofilm formation have attracted significant attention for their correlation with bacterial pathogenicity. However, little is known about when and where the signaling occurs to trigger either swarming or biofilm formation. We have previously identified an RssAB two-component system involved in the regulation of swarming motility and biofilm formation in Serratia marcescens. Here we monitored the RssAB signaling status within single cells by tracing the location of the translational fusion protein EGFP-RssB following development of swarming or biofilm formation. RssAB signaling is specifically activated before surface migration in swarming development and during the early stage of biofilm formation. The activation results in the release of RssB from its cognate inner membrane sensor kinase, RssA, to the cytoplasm where the downstream gene promoters are located. Such dynamic localization of RssB requires phosphorylation of this regulator. By revealing the temporal activation of RssAB signaling following development of surface multicellular behavior, our findings contribute to an improved understanding of how bacteria coordinate their lifestyle on a surface.

  14. An RSS based location estimation technique for cognitive relay networks

    KAUST Repository

    Qaraqe, Khalid A.

    2010-11-01

    In this paper, a received signal strength (RSS) based location estimation method is proposed for a cooperative wireless relay network where the relay is a cognitive radio. We propose a method for the considered cognitive relay network to determine the location of the source using the direct and the relayed signal at the destination. We derive the Cramer-Rao lower bound (CRLB) expressions separately for x and y coordinates of the location estimate. We analyze the effects of cognitive behaviour of the relay on the performance of the proposed method. We also discuss and quantify the reliability of the location estimate using the proposed technique if the source is not stationary. The overall performance of the proposed method is presented through simulations. ©2010 IEEE.

  15. BOREAS RSS-20 POLDER C-130 Measurements of Surface BRDF

    Science.gov (United States)

    Leroy, Marc; Hall, Forrest G. (Editor); Nickerson, Jaime (Editor); Smith, David E. (Technical Monitor)

    2000-01-01

    This Boreal Ecosystem-Atmosphere Study (BOREAS) Remote Sensing Science (RSS)-20 data set contains measurements of surface bidirectional reflectance distribution function (BRDF) made by the polarization and Directionality of Earth reflectances (POLDER) instrument over several surface types (pine, spruce, fen) of the BOREAS southern study area (SSA) during the 1994 intensive field campaigns (IFCs). Single-point BRDF values were acquired either from the NASA Ames Research Center (ARC) C-130 aircraft or from a NASA Wallops Flight Facility (WFF) helicopter. A related data set collected from the helicopter platform is available as is POLDER imagery acquired from the C-130. The data are stored in tabular ASCII files. The data files are available on a CD-ROM (see document number 20010000884) or from the Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC).

  16. Uav Positioning and Collision Avoidance Based on RSS Measurements

    Science.gov (United States)

    Masiero, A.; Fissore, F.; Guarnieri, A.; Pirotti, F.; Vettore, A.

    2015-08-01

    In recent years, Unmanned Aerial Vehicles (UAVs) are attracting more and more attention in both the research and industrial communities: indeed, the possibility to use them in a wide range of remote sensing applications makes them a very flexible and attractive solution in both civil and commercial cases (e.g. precision agriculture, security and control, monitoring of sites, exploration of areas difficult to reach). Most of the existing UAV positioning systems rely on the use of the GPS signal. Despite this can be a satisfactory solution in open environments where the GPS signal is available, there are several operating conditions of interest where it is unavailable or unreliable (e.g. close to high buildings, or mountains, in indoor environments). Consequently, a different approach has to be adopted in these cases. This paper considers the use ofWiFi measurements in order to obtain position estimations of the device of interest. More specifically, to limit the costs for the devices involved in the positioning operations, an approach based on radio signal strengths (RSS) measurements is considered. Thanks to the use of a Kalman filter, the proposed approach takes advantage of the temporal dynamic of the device of interest in order to improve the positioning results initially provided by means of maximum likelihood estimations. The considered UAVs are assumed to be provided with communication devices, which can allow them to communicate with each other in order to improve their cooperation abilities. In particular, the collision avoidance problem is examined in this work.

  17. RSS based CERN Alerter. Information broadcast to all CERN offices.

    CERN Multimedia

    Otto, R

    2007-01-01

    Nearly every large organization uses a tool to broadcast messages and information across the internal campus (messages like alerts announcing interruption in services or just information about upcoming events). These tools typically allow administrators (operators) to send "targeted" messages which are sent only to specific groups of users or computers, e/g only those located in a specified building or connected to a particular computing service. CERN has a long history of such tools: CERNVMS€™s SPM_quotMESSAGE command, Zephyr and the most recent the NICE Alerter based on the NNTP protocol. The NICE Alerter used on all Windows-based computers had to be phased out as a consequence of phasing out NNTP at CERN. The new solution to broadcast information messages on the CERN campus continues to provide the service based on cross-platform technologies, hence minimizing custom developments and relying on commercial software as much as possible. The new system, called CERN Alerter, is based on RSS (Really Simpl...

  18. RSS SSM/I OCEAN PRODUCT GRIDS DAILY FROM DMSP F14 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Daily from DMSP F14 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  19. RSS SSM/I OCEAN PRODUCT GRIDS MONTHLY AVERAGE FROM DMSP F15 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Monthly Average from DMSP F15 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special...

  20. RSS SSMIS OCEAN PRODUCT GRIDS DAILY FROM DMSP F17 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSMIS Ocean Product Grids Daily from DMSP F17 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  1. RSS SSM/I OCEAN PRODUCT GRIDS DAILY FROM DMSP F11 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Daily from DMSP F11 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  2. RSS SSMIS OCEAN PRODUCT GRIDS 3-DAY AVERAGE FROM DMSP F16 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSMIS Ocean Product Grids 3-Day Average from DMSP F16 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  3. RSS SSMIS OCEAN PRODUCT GRIDS DAILY FROM DMSP F16 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSMIS Ocean Product Grids Daily from DMSP F16 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  4. RSS SSM/I OCEAN PRODUCT GRIDS DAILY FROM DMSP F13 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Daily from DMSP F13 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  5. Mobile robot trajectory tracking using noisy RSS measurements: an RFID approach.

    Science.gov (United States)

    Miah, M Suruz; Gueaieb, Wail

    2014-03-01

    Most RF beacons-based mobile robot navigation techniques rely on approximating line-of-sight (LOS) distances between the beacons and the robot. This is mostly performed using the robot's received signal strength (RSS) measurements from the beacons. However, accurate mapping between the RSS measurements and the LOS distance is almost impossible to achieve in reverberant environments. This paper presents a partially-observed feedback controller for a wheeled mobile robot where the feedback signal is in the form of noisy RSS measurements emitted from radio frequency identification (RFID) tags. The proposed controller requires neither an accurate mapping between the LOS distance and the RSS measurements, nor the linearization of the robot model. The controller performance is demonstrated through numerical simulations and real-time experiments. ©2013 Published by ISA. All rights reserved.

  6. Rashtriya Swayamsewak Sangh (RSS): History, Ideology and Its Influences on Indian Policy Towards Pakistan

    Science.gov (United States)

    2015-05-21

    www.ciaonet.org/pbei/csis/sam/sam55/. 32 Pathak, K. K. Of Jaswant Singh, the BJP and the RSS. Mumbai : The Rajaji Foundation, 2010. Accessed 10 August...common holy ground, a common blood and a common culture . It is also noteworthy to mention that Buddhists, Jains and Sikhs were included in this...martin-marty/hindu-fundamentalism _b_5352547.html . 71 Ibid. 72 Pathak, K. K. Of Jaswant Singh, the BJP and the RSS. Mumbai : The Rajaji

  7. Visual Sentiment Analysis of RSS News Feeds Featuring the US Presidential Election in 2008

    OpenAIRE

    Wanner, Franz; Rohrdantz, Christian; Mansmann, Florian; Oelke, Daniela; Keim, Daniel A.

    2009-01-01

    The technology behind RSS feeds offers great possibilities to retrieve more news items than ever. In contrast to these technical developments, human capabilities to read all these news items have not increased likewise. To bridge this gap, this paper presents a visual analytics tool for conducting semi-automatic sentiment analysis of large news feeds. While the tool automatically retrieves and analyzes RSS feeds with respect to positive and negative opinion words, the more demanding news anal...

  8. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Directory of Open Access Journals (Sweden)

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  9. Security printing of covert quick response codes using upconverting nanoparticle inks

    Science.gov (United States)

    Meruga, Jeevan M.; Cross, William M.; May, P. Stanley; Luu, QuocAnh; Crawford, Grant A.; Kellar, Jon J.

    2012-10-01

    Counterfeiting costs governments and private industries billions of dollars annually due to loss of value in currency and other printed items. This research involves using lanthanide doped β-NaYF4 nanoparticles for security printing applications. Inks comprised of Yb3+/Er3+ and Yb3+/Tm3+ doped β-NaYF4 nanoparticles with oleic acid as the capping agent in toluene and methyl benzoate with poly(methyl methacrylate) (PMMA) as the binding agent were used to print quick response (QR) codes. The QR codes were made using an AutoCAD file and printed with Optomec direct-write aerosol jetting®. The printed QR codes are invisible under ambient lighting conditions, but are readable using a near-IR laser, and were successfully scanned using a smart phone. This research demonstrates that QR codes, which have been used primarily for information sharing applications, can also be used for security purposes. Higher levels of security were achieved by printing both green and blue upconverting inks, based on combinations of Er3+/Yb3+ and Tm3+/Yb3+, respectively, in a single QR code. The near-infrared (NIR)-to-visible upconversion luminescence properties of the two-ink QR codes were analyzed, including the influence of NIR excitation power density on perceived color, in term of the CIE 1931 chromaticity index. It was also shown that this security ink can be optimized for line width, thickness and stability on different substrates.

  10. Security printing of covert quick response codes using upconverting nanoparticle inks

    International Nuclear Information System (INIS)

    Meruga, Jeevan M; Cross, William M; Crawford, Grant A; Kellar, Jon J; Stanley May, P; Luu, QuocAnh

    2012-01-01

    Counterfeiting costs governments and private industries billions of dollars annually due to loss of value in currency and other printed items. This research involves using lanthanide doped β-NaYF 4 nanoparticles for security printing applications. Inks comprised of Yb 3+ /Er 3+ and Yb 3+ /Tm 3+ doped β-NaYF 4 nanoparticles with oleic acid as the capping agent in toluene and methyl benzoate with poly(methyl methacrylate) (PMMA) as the binding agent were used to print quick response (QR) codes. The QR codes were made using an AutoCAD file and printed with Optomec direct-write aerosol jetting ® . The printed QR codes are invisible under ambient lighting conditions, but are readable using a near-IR laser, and were successfully scanned using a smart phone. This research demonstrates that QR codes, which have been used primarily for information sharing applications, can also be used for security purposes. Higher levels of security were achieved by printing both green and blue upconverting inks, based on combinations of Er 3+ /Yb 3+ and Tm 3+ /Yb 3+ , respectively, in a single QR code. The near-infrared (NIR)-to-visible upconversion luminescence properties of the two-ink QR codes were analyzed, including the influence of NIR excitation power density on perceived color, in term of the CIE 1931 chromaticity index. It was also shown that this security ink can be optimized for line width, thickness and stability on different substrates. (paper)

  11. Códigos QR: Museografía Nómade para la puesta en valor del patrimonio cultural

    Directory of Open Access Journals (Sweden)

    Lilian Meneses Plaza

    2014-07-01

    Full Text Available En la última década el sector cultural se ha apropiado de los avances científicos y las nuevas tecnologías para crear imágenes, sonidos, objetos y experiencias comunicacionales digitales que hacen más atractivo el patrimonio, mejorando la oferta de los museos y sitios patrimoniales desde el punto de vista turístico, cultural y educativo. Entre los medios que podemos mencionar destacan los museos virtuales, salas de exhibición 3D, audio-guías, códigos QR y aplicaciones para teléfonos móviles, entre otros, lo que deriva en una oferta novedosa y eficiente para la puesta en valor del patrimonio cultural. En el artículo se propone una metodología orientativa basada en la Interpretación del Patrimonio y la Museografía Nómada, para desarrollar una herramienta de gestión patrimonial apoyada en el uso de códigos QR. En esta propuesta se utilizó como referente la Ciudad de Valparaíso - Sitio Patrimonio de la Humanidad- dado que posee aptitudes de museo al aire libre, alta demanda por el turismo cultural y, además, constituye un lugar emblemático para la gestión patrimonial chilena en espacios urbanos habitados. Abstract From last decade that the cultural sector has taken the scientific advances and the new technologies to create images, sounds, objects and digital communication experiences that make the heritage more attractive, improving the museums and patrimonial sites offer to the tourism, the culture and education. Some the supports that we can mention are the virtual museums, 3D rooms, sonorous guide, QR codes and app for mobiles, etc.,presenting a new and efficient offer for putting in value the cultural heritage. In this article I propose a methodology guide based on the Heritage Interpretation and the Nomad Museography, to develop a heritage management tool about QR codes. In this methodology I use Valparaíso as example -World Heritage Site- because possesses aptitudes of outdoors museum, a high cultural tourism demand

  12. bayesQR: A Bayesian Approach to Quantile Regression

    Directory of Open Access Journals (Sweden)

    Dries F. Benoit

    2017-01-01

    Full Text Available After its introduction by Koenker and Basset (1978, quantile regression has become an important and popular tool to investigate the conditional response distribution in regression. The R package bayesQR contains a number of routines to estimate quantile regression parameters using a Bayesian approach based on the asymmetric Laplace distribution. The package contains functions for the typical quantile regression with continuous dependent variable, but also supports quantile regression for binary dependent variables. For both types of dependent variables, an approach to variable selection using the adaptive lasso approach is provided. For the binary quantile regression model, the package also contains a routine that calculates the fitted probabilities for each vector of predictors. In addition, functions for summarizing the results, creating traceplots, posterior histograms and drawing quantile plots are included. This paper starts with a brief overview of the theoretical background of the models used in the bayesQR package. The main part of this paper discusses the computational problems that arise in the implementation of the procedure and illustrates the usefulness of the package through selected examples.

  13. Theoretical Bound of CRLB for Energy Efficient Technique of RSS-Based Factor Graph Geolocation

    Science.gov (United States)

    Kahar Aziz, Muhammad Reza; Heriansyah; Saputra, EfaMaydhona; Musa, Ardiansyah

    2018-03-01

    To support the increase of wireless geolocation development as the key of the technology in the future, this paper proposes theoretical bound derivation, i.e., Cramer Rao lower bound (CRLB) for energy efficient of received signal strength (RSS)-based factor graph wireless geolocation technique. The theoretical bound derivation is crucially important to evaluate whether the energy efficient technique of RSS-based factor graph wireless geolocation is effective as well as to open the opportunity to further innovation of the technique. The CRLB is derived in this paper by using the Fisher information matrix (FIM) of the main formula of the RSS-based factor graph geolocation technique, which is lied on the Jacobian matrix. The simulation result shows that the derived CRLB has the highest accuracy as a bound shown by its lowest root mean squared error (RMSE) curve compared to the RMSE curve of the RSS-based factor graph geolocation technique. Hence, the derived CRLB becomes the lower bound for the efficient technique of RSS-based factor graph wireless geolocation.

  14. RSS-based localization of isotropically decaying source with unknown power and pathloss factor

    International Nuclear Information System (INIS)

    Sun, Shunyuan; Sun, Li; Ding, Zhiguo

    2016-01-01

    This paper addresses the localization of an isotropically decaying source based on the received signal strength (RSS) measurements that are collected from nearby active sensors that are position-known and wirelessly connected, and it propose a novel iterative algorithm for RSS-based source localization in order to improve the location accuracy and realize real-time location and automatic monitoring for hospital patients and medical equipment in the smart hospital. In particular, we consider the general case where the source power and pathloss factor are both unknown. For such a source localization problem, we propose an iterative algorithm, in which the unknown source position and two other unknown parameters (i.e. the source power and pathloss factor) are estimated in an alternating way based on each other, with our proposed sub-optimum initial estimate on source position obtained based on the RSS measurements that are collected from a few (closest) active sensors with largest RSS values. Analysis and simulation study show that our proposed iterative algorithm guarantees globally convergence to the least-squares (LS) solution, where for our suitably assumed independent and identically distributed (i.i.d.) zero-mean Gaussian RSS measurement errors the converged localization performance achieves the optimum that corresponds to the Cramer–Rao lower bound (CRLB).

  15. Benefits and Impact of Joint Metric of AOA/RSS/TOF on Indoor Localization Error

    Directory of Open Access Journals (Sweden)

    Qing Jiang

    2016-10-01

    Full Text Available The emerging techniques in the Fifth Generation (5G communication system, like the millimeter-Wave (mmWave and massive Multiple Input Multiple Output (MIMO, make it possible to measure the Angle-Of-arrival (AOA, Receive Signal Strength (RSS and Time-Of-flight (TOF by using various types of mobile devices. At the same time, there is always significant interest in the high-precision localization techniques based on the joint metric of AOA/RSS/TOF, which enable one to overcome the drawback of the single metric-based localization. Motivated by this concern, we rely on the Cramer–Rao Lower Bound (CRLB to analyze the localization errors of RSS/AOA, RSS/TOF, AOA/TOF and the Joint Metric of AOA/RSS/TOF (JMART-based localization. The error bounds derived in this paper can be selected as the benchmarking results to evaluate the indoor localization performance. Finally, extensive simulations are conducted to support our claim.

  16. Time series forecasting using ERNN and QR based on Bayesian model averaging

    Science.gov (United States)

    Pwasong, Augustine; Sathasivam, Saratha

    2017-08-01

    The Bayesian model averaging technique is a multi-model combination technique. The technique was employed to amalgamate the Elman recurrent neural network (ERNN) technique with the quadratic regression (QR) technique. The amalgamation produced a hybrid technique known as the hybrid ERNN-QR technique. The potentials of forecasting with the hybrid technique are compared with the forecasting capabilities of individual techniques of ERNN and QR. The outcome revealed that the hybrid technique is superior to the individual techniques in the mean square error sense.

  17. ManA is regulated by RssAB signaling and promotes motility in Serratia marcescens.

    Science.gov (United States)

    Soo, Po-Chi; Horng, Yu-Tze; Chang, Yung-Lin; Tsai, Wei-Wen; Jeng, Wen-Yih; Lu, Chia-Chen; Lai, Hsin-Chih

    2014-01-01

    Serratia marcescens swarms on 0.8% LB agar at 30 °C but not at 37 °C. To understand the molecular mechanism regulating Serratia swarming, transposon mutagenesis was performed to screen for mutants that swarmed at 37 °C. In one mutant, S. marcescens WW100, the transposon was inserted in the upstream region of manA, which encodes mannose-6-phosphate isomerase, a type I phosphomannose isomerase. The transcriptional and translational levels of manA were higher in S. marcescens WW100 than in the wild-type strain. S. marcescens WW100 produced more serrawettin W1 (biosurfactant) than the wild-type, as detected by thin-layer chromatography, to promote surface motility by reducing surface tension. Serratia swarming was previously shown to be negatively regulated by the RssA-RssB two-component system. An electrophoretic mobility shift assay (EMSA) indicated that phosphorylated RssB (the response regulator) binds upstream of the transposon insertion site and manA in S. marcescens WW100. Analysis by real-time RT-PCR (qRT-PCR) revealed that, compared to the wild-type level, manA mRNA was increased in the rssA deletion mutant. The results indicated that RssA-RssB signaling directly represses the expression of manA and that overexpression of manA increases the production of serrawettin for Serratia swarming at 37 °C. Copyright © 2013 Institut Pasteur. All rights reserved.

  18. Monitoring of phytopathogenic Ralstonia solanacearum cells using green fluorescent protein-expressing plasmid derived from bacteriophage phiRSS1.

    Science.gov (United States)

    Kawasaki, Takeru; Satsuma, Hideki; Fujie, Makoto; Usami, Shoji; Yamada, Takashi

    2007-12-01

    A green fluorescent protein (GFP)-expressing plasmid was constructed from a filamentous bacteriophage phiRSS1 that infects the phytopathogen Ralstonia solanacearum. This plasmid designated as pRSS12 (4.7 kbp in size) consists of an approximately 2248 bp region of the phiRSS1 RF DNA, including ORF1-ORF3 and the intergenic region (IG), and a Km cassette in addition to the GFP gene. It was easily introduced by electroporation and stably maintained even without selective pressure in strains of R. solanacearum of different races and biovars. Strong green fluorescence emitted from pRSS12-transformed bacterial cells was easily monitored in tomato tissues (stem, petiole, and root) after infection as well as from soil samples. These results suggest that pRSS12 can serve as an easy-to-use GFP-tagging tool for any given strain of R. solanacearum in cytological as well as field studies.

  19. RSS SSM/I OCEAN PRODUCT GRIDS WEEKLY AVERAGE FROM DMSP F15 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Weekly Average from DMSP F15 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  20. RSS SSM/I OCEAN PRODUCT GRIDS WEEKLY AVERAGE FROM DMSP F10 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Weekly Average from DMSP F10 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  1. RSS SSM/I OCEAN PRODUCT GRIDS WEEKLY AVERAGE FROM DMSP F8 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Products Grid Weekly Average from DMSP F8 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  2. The Primary Care Electronic Library: RSS feeds using SNOMED-CT indexing for dynamic content delivery

    Directory of Open Access Journals (Sweden)

    Judas Robinson

    2006-12-01

    Conclusion The results of the pilot illustrate that it is possible to exchange data between servers using RSS syndication. This method could be utilised dynamically to supply digital library resources to a clinical system with SNOMED-CTdata used as the standard of reference.

  3. Fils RSS | CRDI - Centre de recherches pour le développement ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Cliquez sur le fil pour ajouter votre site ou votre lecteur RSS préféré Fil de financement du CRDI Fil des nouvelles du CRDI Fil des perspectives du CRDI Fil des projets du CRDI Fil des publications du CRDI.

  4. QR-decomposition based SENSE reconstruction using parallel architecture.

    Science.gov (United States)

    Ullah, Irfan; Nisar, Habab; Raza, Haseeb; Qasim, Malik; Inam, Omair; Omer, Hammad

    2018-04-01

    Magnetic Resonance Imaging (MRI) is a powerful medical imaging technique that provides essential clinical information about the human body. One major limitation of MRI is its long scan time. Implementation of advance MRI algorithms on a parallel architecture (to exploit inherent parallelism) has a great potential to reduce the scan time. Sensitivity Encoding (SENSE) is a Parallel Magnetic Resonance Imaging (pMRI) algorithm that utilizes receiver coil sensitivities to reconstruct MR images from the acquired under-sampled k-space data. At the heart of SENSE lies inversion of a rectangular encoding matrix. This work presents a novel implementation of GPU based SENSE algorithm, which employs QR decomposition for the inversion of the rectangular encoding matrix. For a fair comparison, the performance of the proposed GPU based SENSE reconstruction is evaluated against single and multicore CPU using openMP. Several experiments against various acceleration factors (AFs) are performed using multichannel (8, 12 and 30) phantom and in-vivo human head and cardiac datasets. Experimental results show that GPU significantly reduces the computation time of SENSE reconstruction as compared to multi-core CPU (approximately 12x speedup) and single-core CPU (approximately 53x speedup) without any degradation in the quality of the reconstructed images. Copyright © 2018 Elsevier Ltd. All rights reserved.

  5. Monitoring growth and movement of Ralstonia solanacearum cells harboring plasmid pRSS12 derived from bacteriophage phiRSS1.

    Science.gov (United States)

    Fujie, Makoto; Takamoto, Hirofumi; Kawasaki, Takeru; Fujiwara, Akiko; Yamada, Takashi

    2010-02-01

    We monitored growth and movement of Ralstonia solanacearum harboring the plasmid pRSS12 in tomato seedlings. The plasmid contains a gene for green fluorescent protein (GFP) and is stably maintained in R. solanacearum cells without selection pressure. Bacteria harboring the plasmid can be tracked in planta by visualizing GFP fluorescence. Stems of seedlings were infected with R. solanacearum cells transformed with pRSS12, and bacterial growth and movement, particularly around the vascular bundles, were monitored for more than 7 days. Our results showed that vascular bundles are independent of each other within the stem, and that it takes a long time for R. solanacearum cells to migrate from one vascular bundle to another. For real-time monitoring of bacteria in planta, tomato seedlings were grown on agar medium and bacterial suspension was applied to the root apex. The bacterial invasion process was monitored by fluorescent microscopy. Bacteria invaded taproots within 6 h, and movement of the bacteria was observed until 144 h after inoculation. In susceptible tomato cultivars, strong GFP fluorescence was observed in hypocotyls and lateral roots as well as the taproot. In resistant cultivars, however, GFP fluorescence was rarely observed on lateral roots. Our results show that this monitoring system can be used to assess bacterial pathogenicity efficiently. Copyright (c) 2009 The Society for Biotechnology, Japan. Published by Elsevier B.V. All rights reserved.

  6. Human-Induced Effects on RSS Ranging Measurements for Cooperative Positioning

    DEFF Research Database (Denmark)

    Della Rosa, Francescantonio; Pelosi, Mauro; Nurmi, Jari

    2012-01-01

    of human-induced perturbations for enhancing the final positioning accuracy through cooperative schemes has been assessed. It has been proved that the effect of cooperation is very limited if human factors are not taken into account when performing experimental activities.......We present experimental evaluations of human-induced perturbations on received-signal-strength-(RSS-) based ranging measurements for cooperative mobile positioning. To the best of our knowledge, this work is the first attempt to gain insight and understand the impact of both body loss and hand grip...... on the RSS for enhancing proximity measurements among neighbouring devices in cooperative scenarios. Our main contribution is represented by experimental investigations. Analysis of the errors introduced in the distance estimation using path-loss-based methods has been carried out. Moreover, the exploitation...

  7. Diffusion Forecasting Model with Basis Functions from QR-Decomposition

    Science.gov (United States)

    Harlim, John; Yang, Haizhao

    2017-12-01

    The diffusion forecasting is a nonparametric approach that provably solves the Fokker-Planck PDE corresponding to Itô diffusion without knowing the underlying equation. The key idea of this method is to approximate the solution of the Fokker-Planck equation with a discrete representation of the shift (Koopman) operator on a set of basis functions generated via the diffusion maps algorithm. While the choice of these basis functions is provably optimal under appropriate conditions, computing these basis functions is quite expensive since it requires the eigendecomposition of an N× N diffusion matrix, where N denotes the data size and could be very large. For large-scale forecasting problems, only a few leading eigenvectors are computationally achievable. To overcome this computational bottleneck, a new set of basis functions constructed by orthonormalizing selected columns of the diffusion matrix and its leading eigenvectors is proposed. This computation can be carried out efficiently via the unpivoted Householder QR factorization. The efficiency and effectiveness of the proposed algorithm will be shown in both deterministically chaotic and stochastic dynamical systems; in the former case, the superiority of the proposed basis functions over purely eigenvectors is significant, while in the latter case forecasting accuracy is improved relative to using a purely small number of eigenvectors. Supporting arguments will be provided on three- and six-dimensional chaotic ODEs, a three-dimensional SDE that mimics turbulent systems, and also on the two spatial modes associated with the boreal winter Madden-Julian Oscillation obtained from applying the Nonlinear Laplacian Spectral Analysis on the measured Outgoing Longwave Radiation.

  8. Compressed RSS Measurement for Communication and Sensing in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Yanchao Zhao

    2017-01-01

    Full Text Available The receiving signal strength (RSS is crucial for the Internet of Things (IoT, as it is the key foundation for communication resource allocation, localization, interference management, sensing, and so on. Aside from its significance, the measurement process could be tedious, time consuming, inaccurate, and involving human operations. The state-of-the-art works usually applied the fashion of “measure a few, predict many,” which use measurement calibrated models to generate the RSS for the whole networks. However, this kind of methods still cannot provide accurate results in a short duration with low measurement cost. In addition, they also require careful scheduling of the measurement which is vulnerable to measurement conflict. In this paper, we propose a compressive sensing- (CS- based RSS measurement solution, which is conflict-tolerant, time-efficient, and accuracy-guaranteed without any model-calibrate operation. The CS-based solution takes advantage of compressive sensing theory to enable simultaneous measurement in the same channel, which reduces the time cost to the level of O(log⁡N (where N is the network size and works well for sparse networks. Extensive experiments based on real data trace are conducted to show the efficiency of the proposed solutions.

  9. NOAA Climate Data Record (CDR) of SSM/I and SSMIS Microwave Brightness Temperatures, RSS Version 7

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This Version 7 NOAA Fundamental Climate Data Record (CDR) from Remote Sensing Systems (RSS) contains brightness temperatures that have been inter-calibrated and...

  10. Updating QR factorization procedure for solution of linear least squares problem with equality constraints.

    Science.gov (United States)

    Zeb, Salman; Yousaf, Muhammad

    2017-01-01

    In this article, we present a QR updating procedure as a solution approach for linear least squares problem with equality constraints. We reduce the constrained problem to unconstrained linear least squares and partition it into a small subproblem. The QR factorization of the subproblem is calculated and then we apply updating techniques to its upper triangular factor R to obtain its solution. We carry out the error analysis of the proposed algorithm to show that it is backward stable. We also illustrate the implementation and accuracy of the proposed algorithm by providing some numerical experiments with particular emphasis on dense problems.

  11. Digital Semaphore: Technical Feasibility of QR Code Optical Signaling for Fleet Communications

    Science.gov (United States)

    2013-06-01

    Standards (http://www.iso.org) JIS Japanese Industrial Standard JPEG Joint Photographic Experts Group (digital image format; http://www.jpeg.org) LED...Denso Wave corporation in the 1990s for the Japanese automotive manufacturing industry. See Appendix A for full details. Reed-Solomon Error...eliminates camera blur induced by the shutter, providing clear images at extremely high frame rates. Thusly, digital cinema cameras are more suitable

  12. Digital semaphore: technical feasibility of QR code optical signaling for fleet communications

    OpenAIRE

    Lucas, Andrew R.

    2013-01-01

    Approved for public release; distribution is unlimited In recent decades, optical LOS communications such as flag semaphore or flashing light have atrophied to the point where, if they are required, U.S. Naval forces are at a distinct disadvantage. RF communications have become critical to nearly all operations, but this capability comes at the cost of disclosing the location of operations. Depending on the platform, these RF communications can become a critical vulnerability. EMCON attemp...

  13. Digital Semaphore: Tactical Implications of QR Code Optical Signaling for Fleet Communications

    Science.gov (United States)

    2013-06-01

    captured with a 4K cinematic video camera. This additional field experimentation provided an opportunity to develop an initial image enhancement process as...Cushion. (2013, March 1). Amphibious Assault Ship (Multi-Purpose) Photo Index LHD-5 Bataan. [Image]. Retrieved from http://www.navsource.org/archives...Vella- Gulf.htm Underway Replenishment (2004, March 6). USS Vella Gulf CG 72 guided missile cruiser. [Image]. Retrieved from http

  14. Perancangan dan Implementasi Augmented Reality Pemantauan Titik Reklame Kota Semarang Menggunakan QR-Code Berbasis ANDROID

    Directory of Open Access Journals (Sweden)

    Aji Prajayudha Permana

    2016-04-01

    Full Text Available Nowadays, information technology is needed, in all aspects of life almost inseparable with information technology. Information technology was venturing into the world of work and business that aims to improve, simplify and save business. This strategy was used in advertisement by using Augmented Reality technology that are used to compare the object of the marker and the original advertisement Application of Augmented Reality technology that is used to verify a billboard built by MDLC (Multimedia Development Life Cycle method consists of making the concept, design, gather materials, manufacturing, inspection, and measures distribution. Inspection measures using the Black-Box Testing method comprising Application Function tests, test lighting intensity, and distance of the camera from the marker. Based on the examination and analysis of the results to the application that is built, it can be concluded that the use of the application can be a means to assist in the verification process with a series of billboards and distance testing lighting intensity during morning and afternoon .

  15. A cloud medication safety support system using QR code and Web services for elderly outpatients.

    Science.gov (United States)

    Tseng, Ming-Hseng; Wu, Hui-Ching

    2014-01-01

    Drug is an important part of disease treatment, but medication errors happen frequently and have significant clinical and financial consequences. The prevalence of prescription medication use among the ambulatory adult population increases with advancing age. Because of the global aging society, outpatients need to improve medication safety more than inpatients. The elderly with multiple chronic conditions face the complex task of medication management. To reduce the medication errors for the elder outpatients with chronic diseases, a cloud medication safety supporting system is designed, demonstrated and evaluated. The proposed system is composed of a three-tier architecture: the front-end tier, the mobile tier and the cloud tier. The mobile tier will host the personalized medication safety supporting application on Android platforms that provides some primary functions including reminders for medication, assistance with pill-dispensing, recording of medications, position of medications and notices of forgotten medications for elderly outpatients. Finally, the hybrid technology acceptance model is employed to understand the intention and satisfaction level of the potential users to use this mobile medication safety support application system. The result of the system acceptance testing indicates that this developed system, implementing patient-centered services, is highly accepted by the elderly. This proposed M-health system could assist elderly outpatients' homecare in preventing medication errors and improving their medication safety.

  16. Print2Screen Mobile App: Embedding Multimedia in Printed ODL Course Materials Using QR Codes

    Science.gov (United States)

    Abeywardena, Ishan Sudeera

    2017-01-01

    With the rise of OER and multimedia such as YouTube videos, many academic institutions are becoming mindful of the richness they bring into the teaching and learning process. Given that multimedia resources cannot be directly integrated into printed material, the only available alternative is to print hyperlinks, which teachers and learners can…

  17. A Novelty in Turkish Commercial Life: Execution of QR-Code on Cheques

    Directory of Open Access Journals (Sweden)

    Ebru Tüzemen Atik

    2017-12-01

    Although cheques are a payment instrument by its qualification, it is also used as a credit instrument due to the possibility of arranging the postdated cheque in Turkish trade practice. Making special arrangements in order to ensure particular protection for the cheque and attractiveness of the cheque have become inevitable in this situation. The risk of bounced cheques in practice is significantly reduced with the aim of protecting the cheque holders prescribed by the amendments.

  18. Implementation of QR up- and downdating on a massively parallel |computer

    DEFF Research Database (Denmark)

    Bendtsen, Claus; Hansen, Per Christian; Madsen, Kaj

    1995-01-01

    We describe an implementation of QR up- and downdating on a massively parallel computer (the Connection Machine CM-200) and show that the algorithm maps well onto the computer. In particular, we show how the use of corrected semi-normal equations for downdating can be efficiently implemented. We...... also illustrate the use of our algorithms in a new LP algorithm....

  19. BOREAS RSS-7 Landsat TM LAI IMages of the SSA and NSA

    Science.gov (United States)

    Hall, Forrest G. (Editor); Nickeson, Jaime (Editor); Chen, Jing; Cihlar, Josef

    2000-01-01

    The BOReal Ecosystem-Atmosphere Study Remote Sensing Science (BOREAS RSS-7) team used Landsat Thematic Mapper (TM) images processed at CCRS to produce images of Leaf Area Index (LAI) for the BOREAS study areas. Two images acquired on 06-Jun and 09-Aug-1991 were used for the SSA, and one image acquired on 09-Jun-1994 was used for the NSA. The LAI images are based on ground measurements and Landsat TM Reduced Simple Ratio (RSR) images. The data are stored in binary image-format files.

  20. Structural basis for high substrate-binding affinity and enantioselectivity of 3-quinuclidinone reductase AtQR

    International Nuclear Information System (INIS)

    Hou, Feng; Miyakawa, Takuya; Kataoka, Michihiko; Takeshita, Daijiro; Kumashiro, Shoko; Uzura, Atsuko; Urano, Nobuyuki; Nagata, Koji; Shimizu, Sakayu; Tanokura, Masaru

    2014-01-01

    Highlights: • Crystal structure of AtQR has been determined at 1.72 Å. • NADH binding induces the formation of substrate binding site. • AtQR possesses a conserved hydrophobic wall for stereospecific binding of substrate. • Additional Glu197 residue is critical to the high binding affinity. - Abstract: (R)-3-Quinuclidinol, a useful compound for the synthesis of various pharmaceuticals, can be enantioselectively produced from 3-quinuclidinone by 3-quinuclidinone reductase. Recently, a novel NADH-dependent 3-quinuclidionone reductase (AtQR) was isolated from Agrobacterium tumefaciens, and showed much higher substrate-binding affinity (>100 fold) than the reported 3-quinuclidionone reductase (RrQR) from Rhodotorula rubra. Here, we report the crystal structure of AtQR at 1.72 Å. Three NADH-bound protomers and one NADH-free protomer form a tetrameric structure in an asymmetric unit of crystals. NADH not only acts as a proton donor, but also contributes to the stability of the α7 helix. This helix is a unique and functionally significant part of AtQR and is related to form a deep catalytic cavity. AtQR has all three catalytic residues of the short-chain dehydrogenases/reductases family and the hydrophobic wall for the enantioselective reduction of 3-quinuclidinone as well as RrQR. An additional residue on the α7 helix, Glu197, exists near the active site of AtQR. This acidic residue is considered to form a direct interaction with the amine part of 3-quinuclidinone, which contributes to substrate orientation and enhancement of substrate-binding affinity. Mutational analyses also support that Glu197 is an indispensable residue for the activity

  1. Structural basis for high substrate-binding affinity and enantioselectivity of 3-quinuclidinone reductase AtQR

    Energy Technology Data Exchange (ETDEWEB)

    Hou, Feng; Miyakawa, Takuya [Department of Applied Biological Chemistry, Graduate School of Agricultural and Life Sciences, The University of Tokyo, 1-1-1 Yayoi, Bunkyo-ku, Tokyo 113-8657 (Japan); Kataoka, Michihiko [Division of Applied Life Sciences, Graduate School of Life and Environmental Sciences, Osaka Prefecture University, 1-1 Gakuen-cho, Naka-ku, Sakai 559-8531 (Japan); Division of Applied Life Sciences, Graduate School of Agriculture, Kyoto University, Kitashirakawa-Oiwakecho, Sakyo-ku, Kyoto 606-8502 (Japan); Takeshita, Daijiro [Department of Applied Biological Chemistry, Graduate School of Agricultural and Life Sciences, The University of Tokyo, 1-1-1 Yayoi, Bunkyo-ku, Tokyo 113-8657 (Japan); Kumashiro, Shoko [Division of Applied Life Sciences, Graduate School of Agriculture, Kyoto University, Kitashirakawa-Oiwakecho, Sakyo-ku, Kyoto 606-8502 (Japan); Uzura, Atsuko [Research and Development Center, Nagase and Co., Ltd., 2-2-3 Muratani, Nishi-ku, Kobe 651-2241 (Japan); Urano, Nobuyuki [Division of Applied Life Sciences, Graduate School of Life and Environmental Sciences, Osaka Prefecture University, 1-1 Gakuen-cho, Naka-ku, Sakai 559-8531 (Japan); Division of Applied Life Sciences, Graduate School of Agriculture, Kyoto University, Kitashirakawa-Oiwakecho, Sakyo-ku, Kyoto 606-8502 (Japan); Nagata, Koji [Department of Applied Biological Chemistry, Graduate School of Agricultural and Life Sciences, The University of Tokyo, 1-1-1 Yayoi, Bunkyo-ku, Tokyo 113-8657 (Japan); Shimizu, Sakayu [Division of Applied Life Sciences, Graduate School of Agriculture, Kyoto University, Kitashirakawa-Oiwakecho, Sakyo-ku, Kyoto 606-8502 (Japan); Faculty of Bioenvironmental Science, Kyoto Gakuen University, Sogabe-cho, Kameoka 621-8555 (Japan); Tanokura, Masaru, E-mail: amtanok@mail.ecc.u-tokyo.ac.jp [Department of Applied Biological Chemistry, Graduate School of Agricultural and Life Sciences, The University of Tokyo, 1-1-1 Yayoi, Bunkyo-ku, Tokyo 113-8657 (Japan)

    2014-04-18

    Highlights: • Crystal structure of AtQR has been determined at 1.72 Å. • NADH binding induces the formation of substrate binding site. • AtQR possesses a conserved hydrophobic wall for stereospecific binding of substrate. • Additional Glu197 residue is critical to the high binding affinity. - Abstract: (R)-3-Quinuclidinol, a useful compound for the synthesis of various pharmaceuticals, can be enantioselectively produced from 3-quinuclidinone by 3-quinuclidinone reductase. Recently, a novel NADH-dependent 3-quinuclidionone reductase (AtQR) was isolated from Agrobacterium tumefaciens, and showed much higher substrate-binding affinity (>100 fold) than the reported 3-quinuclidionone reductase (RrQR) from Rhodotorula rubra. Here, we report the crystal structure of AtQR at 1.72 Å. Three NADH-bound protomers and one NADH-free protomer form a tetrameric structure in an asymmetric unit of crystals. NADH not only acts as a proton donor, but also contributes to the stability of the α7 helix. This helix is a unique and functionally significant part of AtQR and is related to form a deep catalytic cavity. AtQR has all three catalytic residues of the short-chain dehydrogenases/reductases family and the hydrophobic wall for the enantioselective reduction of 3-quinuclidinone as well as RrQR. An additional residue on the α7 helix, Glu197, exists near the active site of AtQR. This acidic residue is considered to form a direct interaction with the amine part of 3-quinuclidinone, which contributes to substrate orientation and enhancement of substrate-binding affinity. Mutational analyses also support that Glu197 is an indispensable residue for the activity.

  2. On the Dynamic RSS Feedbacks of Indoor Fingerprinting Databases for Localization Reliability Improvement.

    Science.gov (United States)

    Wen, Xiaoyang; Tao, Wenyuan; Own, Chung-Ming; Pan, Zhenjiang

    2016-08-15

    Location data is one of the most widely used context data types in context-aware and ubiquitous computing applications. To support locating applications in indoor environments, numerous systems with different deployment costs and positioning accuracies have been developed over the past decade. One useful method, based on received signal strength (RSS), provides a set of signal transmission access points. However, compiling a remeasurement RSS database involves a high cost, which is impractical in dynamically changing environments, particularly in highly crowded areas. In this study, we propose a dynamic estimation resampling method for certain locations chosen from a set of remeasurement fingerprinting databases. Our proposed method adaptively applies different, newly updated and offline fingerprinting points according to the temporal and spatial strength of the location. To achieve accuracy within a simulated area, the proposed method requires approximately 3% of the feedback to attain a double correctness probability comparable to similar methods; in a real environment, our proposed method can obtain excellent 1 m accuracy errors in the positioning system.

  3. On the Dynamic RSS Feedbacks of Indoor Fingerprinting Databases for Localization Reliability Improvement

    Directory of Open Access Journals (Sweden)

    Xiaoyang Wen

    2016-08-01

    Full Text Available Location data is one of the most widely used context data types in context-aware and ubiquitous computing applications. To support locating applications in indoor environments, numerous systems with different deployment costs and positioning accuracies have been developed over the past decade. One useful method, based on received signal strength (RSS, provides a set of signal transmission access points. However, compiling a remeasurement RSS database involves a high cost, which is impractical in dynamically changing environments, particularly in highly crowded areas. In this study, we propose a dynamic estimation resampling method for certain locations chosen from a set of remeasurement fingerprinting databases. Our proposed method adaptively applies different, newly updated and offline fingerprinting points according to the temporal and spatial strength of the location. To achieve accuracy within a simulated area, the proposed method requires approximately 3% of the feedback to attain a double correctness probability comparable to similar methods; in a real environment, our proposed method can obtain excellent 1 m accuracy errors in the positioning system.

  4. Efficient Underwater RSS Value to Distance Inversion Using the Lambert Function

    Directory of Open Access Journals (Sweden)

    Majid Hosseini

    2014-01-01

    Full Text Available There are many applications for using wireless sensor networks (WSN in ocean science; however, identifying the exact location of a sensor by itself (localization is still a challenging problem, where global positioning system (GPS devices are not applicable underwater. Precise distance measurement between two sensors is a tool of localization and received signal strength (RSS, reflecting transmission loss (TL phenomena, is widely used in terrestrial WSNs for that matter. Underwater acoustic sensor networks have not been used (UASN, due to the complexity of the TL function. In this paper, we addressed these problems by expressing underwater TL via the Lambert W function, for accurate distance inversion by the Halley method, and compared this to Newton-Raphson inversion. Mathematical proof, MATLAB simulation, and real device implementation demonstrate the accuracy and efficiency of the proposed equation in distance calculation, with fewer iterations, computation stability for short and long distances, and remarkably short processing time. Then, the sensitivities of Lambert W function and Newton-Raphson inversion to alteration in TL were examined. The simulation results showed that Lambert W function is more stable to errors than Newton-Raphson inversion. Finally, with a likelihood method, it was shown that RSS is a practical tool for distance measurement in UASN.

  5. Karakteristik karet ebonit yang dibuat dengan berbagai variasi rasio RSS I/Riklim dan jumlah belerang

    Directory of Open Access Journals (Sweden)

    Penny Setyowati

    2004-07-01

    Full Text Available The aim of the research was to study the influence of utilization of sulphur and reclaim rubber on the characteristics of ebonite rubber, and also to determine the optimum utilization of reclaim rubber and sulphur which yield good physical properties. Ebonite rubber was made by special natural rubber of RSS I (Ribbed Smoke Sheet I mixed with reclaimed rubber at ratio 80/20, 70/30 and 60/40 part hundred rubber/part hundred rubber (phr/phr and utilization of sulphur 30, 40, and 50 phr and also additives respectively. Mixing was done by using open mill, and vulcanization was conducted at early temperature 1200C for 2 hours, and it was continued by post curing at temperature 1500C for 2 hours. The physical properties such as tensile strength, elongation at break, D shore hardness, and izod impact of ebonite rubber vulcanized were determined. The result indicated that characteristics of ebonite rubber was significantly influenced by the amount of added sulphur and 40 phr reclaim rubber or at ratio of RSS I to reclaim rubber 60 to 40 phr/phr. However, the physical properties of ebonite rubber was able to meet the standard quality of group 2 regarding to Classification Hard Rubber issued by ASTM D 2135

  6. A Multi-Sensor RSS Spatial Sensing-Based Robust Stochastic Optimization Algorithm for Enhanced Wireless Tethering

    CERN Document Server

    Parasuraman, Ramviyas; Molinari, Luca; Kershaw, Keith; Di Castro, Mario; Masi, Alessandro; Ferre, Manuel

    2014-01-01

    The reliability of wireless communication in a network of mobile wireless robot nodes depends on the received radio signal strength (RSS). When the robot nodes are deployed in hostile environments with ionizing radiations (such as in some scientific facilities), there is a possibility that some electronic components may fail randomly (due to radiation effects), which causes problems in wireless connectivity. The objective of this paper is to maximize robot mission capabilities by maximizing the wireless network capacity and to reduce the risk of communication failure. Thus, in this paper, we consider a multi-node wireless tethering structure called the “server-relay-client” framework that uses (multiple) relay nodes in between a server and a client node. We propose a robust stochastic optimization (RSO) algorithm using a multi-sensor-based RSS sampling method at the relay nodes to efficiently improve and balance the RSS between the source and client nodes to improve the network capacity and to provide red...

  7. Design and implementation of safety traceability system for candied fruits based on two-dimension code technology

    Directory of Open Access Journals (Sweden)

    ZHAO Kun

    2014-12-01

    Full Text Available Traceability is the basic principle of food safety.A food safety traceability system based on QR code and cloud computing technology was introduced in this paper.First of all we introduced the QR code technology and the concept of traceability.And then through the field investigation,we analyzed the traceability process.At the same time,we designed the system and database were found,and the consumer experiencing technology is studied.Finally we expounded the traceability information collection,transmission and final presentation style and expected the future development of traceability system.

  8. Implementation of QR-decomposition based on CORDIC for unitary MUSIC algorithm

    Science.gov (United States)

    Lounici, Merwan; Luan, Xiaoming; Saadi, Wahab

    2013-07-01

    The DOA (Direction Of Arrival) estimation with subspace methods such as MUSIC (MUltiple SIgnal Classification) and ESPRIT (Estimation of Signal Parameters via Rotational Invariance Technique) is based on an accurate estimation of the eigenvalues and eigenvectors of covariance matrix. QR decomposition is implemented with the Coordinate Rotation DIgital Computer (CORDIC) algorithm. QRD requires only additions and shifts [6], so it is faster and more regular than other methods. In this article the hardware architecture of an EVD (Eigen Value Decomposition) processor based on TSA (triangular systolic array) for QR decomposition is proposed. Using Xilinx System Generator (XSG), the design is implemented and the estimated logic device resource values are presented for different matrix sizes.

  9. Conversion of palatal rugae pattern to scanable Quick Response code in an Arabian population

    Directory of Open Access Journals (Sweden)

    Sadatullah Syed

    2016-09-01

    Conclusion: The alphanumeric and QR code of the rugae pattern are unique for each individual and can be used for digital record keeping and person identification. A high degree of sexual dimorphism in PR exists in the studied Arab population studied.

  10. Solving the scalability issue in quantum-based refinement: Q|R#1.

    Science.gov (United States)

    Zheng, Min; Moriarty, Nigel W; Xu, Yanting; Reimers, Jeffrey R; Afonine, Pavel V; Waller, Mark P

    2017-12-01

    Accurately refining biomacromolecules using a quantum-chemical method is challenging because the cost of a quantum-chemical calculation scales approximately as n m , where n is the number of atoms and m (≥3) is based on the quantum method of choice. This fundamental problem means that quantum-chemical calculations become intractable when the size of the system requires more computational resources than are available. In the development of the software package called Q|R, this issue is referred to as Q|R#1. A divide-and-conquer approach has been developed that fragments the atomic model into small manageable pieces in order to solve Q|R#1. Firstly, the atomic model of a crystal structure is analyzed to detect noncovalent interactions between residues, and the results of the analysis are represented as an interaction graph. Secondly, a graph-clustering algorithm is used to partition the interaction graph into a set of clusters in such a way as to minimize disruption to the noncovalent interaction network. Thirdly, the environment surrounding each individual cluster is analyzed and any residue that is interacting with a particular cluster is assigned to the buffer region of that particular cluster. A fragment is defined as a cluster plus its buffer region. The gradients for all atoms from each of the fragments are computed, and only the gradients from each cluster are combined to create the total gradients. A quantum-based refinement is carried out using the total gradients as chemical restraints. In order to validate this interaction graph-based fragmentation approach in Q|R, the entire atomic model of an amyloid cross-β spine crystal structure (PDB entry 2oNA) was refined.

  11. BOREAS RSS-8 BIOME-BGC SSA Simulation of Annual Water and Carbon Fluxes

    Science.gov (United States)

    Hall, Forrest G. (Editor); Nickeson, Jaime (Editor); Kimball, John

    2000-01-01

    The BOREAS RSS-8 team performed research to evaluate the effect of seasonal weather and landcover heterogeneity on boreal forest regional water and carbon fluxes using a process-level ecosystem model, BIOME-BGC, coupled with remote sensing-derived parameter maps of key state variables. This data set contains derived maps of landcover type and crown and stem biomass as model inputs to determine annual evapotranspiration, gross primary production, autotrophic respiration, and net primary productivity within the BOREAS SSA-MSA, at a 30-m spatial resolution. Model runs were conducted over a 3-year period from 1994-1996; images are provided for each of those years. The data are stored in binary image format. The data files are available on a CD-ROM (see document number 20010000884), or from the Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC).

  12. BOREAS RSS-15 SIR-C and Landsat TM Biomass and Landcover Maps of the NSA

    Science.gov (United States)

    Hall, Forrest G. (Editor); Nickeson, Jaime (Editor); Ranson, K. Jon

    2000-01-01

    As part of BOREAS, the RSS-15 team conducted an investigation using SIR-C, X-SAR, and Landsat TM data for estimating total above-ground dry biomass for the SSA and NSA modeling grids and component biomass for the SSA. Relationships of backscatter to total biomass and total biomass to foliage, branch, and bole biomass were used to estimate biomass density across the landscape. The procedure involved image classification with SAR and Landsat TM data and development of simple mapping techniques using combinations of SAR channels. For the SSA, the SIR-C data used were acquired on 06-Oct-1994, and the Landsat TM data used were acquired on 02-Sep-1995. The maps of the NSA were developed from SIR-C data acquired on 13-Apr-1994. The data files are available on a CD-ROM (see document number 20010000884), or from the Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC).

  13. Hydrogen Sulfide Sensing through Reactive Sulfur Species (RSS) and Nitroxyl (HNO) in Enterococcus faecalis.

    Science.gov (United States)

    Shen, Jiangchuan; Walsh, Brenna J C; Flores-Mireles, Ana Lidia; Peng, Hui; Zhang, Yifan; Zhang, Yixiang; Trinidad, Jonathan C; Hultgren, Scott J; Giedroc, David P

    2018-05-17

    Recent studies of hydrogen sulfide (H 2 S) signaling implicate low molecular weight (LMW) thiol persulfides and other reactive sulfur species (RSS) as signaling effectors. Here, we show that a CstR protein from the human pathogen Enterococcus faecalis ( E. faecalis), previously identified in Staphylococcus aureus ( S. aureus), is an RSS-sensing repressor that transcriptionally regulates a cst-like operon in response to both exogenous sulfide stress and Angeli's salt, a precursor of nitroxyl (HNO). E. faecalis CstR reacts with coenzyme A persulfide (CoASSH) to form interprotomer disulfide and trisulfide bridges between C32 and C61', which negatively regulate DNA binding to a consensus CstR DNA operator. A Δ cstR strain exhibits deficiency in catheter colonization in a catheter-associated urinary tract infection (CAUTI) mouse model, suggesting sulfide regulation and homeostasis is critical for pathogenicity. Cellular polysulfide metabolite profiling of sodium sulfide-stressed E. faecalis confirms an increase in both inorganic polysulfides and LMW thiols and persulfides sensed by CstR. The cst-like operon encodes two authentic thiosulfate sulfurtransferases and an enzyme we characterize here as an NADH and FAD-dependent coenzyme A (CoA) persulfide reductase (CoAPR) that harbors an N-terminal CoA disulfide reductase (CDR) domain and a C-terminal rhodanese homology domain (RHD). Both cysteines in the CDR (C42) and RHD (C508) domains are required for CoAPR activity and complementation of a sulfide-induced growth phenotype of a S. aureus strain lacking cstB, encoding a nonheme Fe II persulfide dioxygenase. We propose that S. aureus CstB and E. faecalis CoAPR employ orthogonal chemistries to lower CoASSH that accumulates under conditions of cellular sulfide toxicity and signaling.

  14. Quantitative Reasoning in Environmental Science: Rasch Measurement to Support QR Assessment

    Directory of Open Access Journals (Sweden)

    Robert L. Mayes

    2015-07-01

    Full Text Available The ability of middle and high school students to reason quantitatively within the context of environmental science was investigated. A quantitative reasoning (QR learning progression, with associated QR assessments in the content areas of biodiversity, water, and carbon, was developed based on three QR progress variables: quantification act, quantitative interpretation, and quantitative modeling. Diagnostic instruments were developed specifically for the progress variable quantitative interpretation (QI, each consisting of 96 Likert-scale items. Each content version of the instrument focused on three scale levels (macro scale, micro scale, and landscape scale and four elements of QI identified in prior research (trend, translation, prediction, and revision. The QI assessments were completed by 362, 6th to 12th grade students in three U.S. states. Rasch (1960/1980 measurement was used to determine item and person measures for the QI instruments, both to examine validity and reliability characteristics of the instrument administration and inform the evolution of the learning progression. Rasch methods allowed identification of several QI instrument revisions, including modification of specific items, reducing number of items to avoid cognitive fatigue, reconsidering proposed item difficulty levels, and reducing Likert scale to 4 levels. Rasch diagnostics also indicated favorable levels of instrument reliability and appropriate targeting of item abilities to student abilities for the majority of participants. A revised QI instrument is available for STEM researchers and educators.

  15. RSS SSM/I OCEAN PRODUCT GRIDS 3-DAY AVERAGE FROM DMSP F14 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids 3-Day Average from DMSP F14 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  16. RSS SSM/I OCEAN PRODUCT GRIDS 3-DAY AVERAGE FROM DMSP F10 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids 3-Day Average from DMSP F10 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  17. A Multi-Sensor RSS Spatial Sensing-Based Robust Stochastic Optimization Algorithm for Enhanced Wireless Tethering

    Science.gov (United States)

    Parasuraman, Ramviyas; Fabry, Thomas; Molinari, Luca; Kershaw, Keith; Di Castro, Mario; Masi, Alessandro; Ferre, Manuel

    2014-01-01

    The reliability of wireless communication in a network of mobile wireless robot nodes depends on the received radio signal strength (RSS). When the robot nodes are deployed in hostile environments with ionizing radiations (such as in some scientific facilities), there is a possibility that some electronic components may fail randomly (due to radiation effects), which causes problems in wireless connectivity. The objective of this paper is to maximize robot mission capabilities by maximizing the wireless network capacity and to reduce the risk of communication failure. Thus, in this paper, we consider a multi-node wireless tethering structure called the “server-relay-client” framework that uses (multiple) relay nodes in between a server and a client node. We propose a robust stochastic optimization (RSO) algorithm using a multi-sensor-based RSS sampling method at the relay nodes to efficiently improve and balance the RSS between the source and client nodes to improve the network capacity and to provide redundant networking abilities. We use pre-processing techniques, such as exponential moving averaging and spatial averaging filters on the RSS data for smoothing. We apply a receiver spatial diversity concept and employ a position controller on the relay node using a stochastic gradient ascent method for self-positioning the relay node to achieve the RSS balancing task. The effectiveness of the proposed solution is validated by extensive simulations and field experiments in CERN facilities. For the field trials, we used a youBot mobile robot platform as the relay node, and two stand-alone Raspberry Pi computers as the client and server nodes. The algorithm has been proven to be robust to noise in the radio signals and to work effectively even under non-line-of-sight conditions. PMID:25615734

  18. A Multi-Sensor RSS Spatial Sensing-Based Robust Stochastic Optimization Algorithm for Enhanced Wireless Tethering

    Directory of Open Access Journals (Sweden)

    Ramviyas Parasuraman

    2014-12-01

    Full Text Available The reliability of wireless communication in a network of mobile wireless robot nodes depends on the received radio signal strength (RSS. When the robot nodes are deployed in hostile environments with ionizing radiations (such as in some scientific facilities, there is a possibility that some electronic components may fail randomly (due to radiation effects, which causes problems in wireless connectivity. The objective of this paper is to maximize robot mission capabilities by maximizing the wireless network capacity and to reduce the risk of communication failure. Thus, in this paper, we consider a multi-node wireless tethering structure called the “server-relay-client” framework that uses (multiple relay nodes in between a server and a client node. We propose a robust stochastic optimization (RSO algorithm using a multi-sensor-based RSS sampling method at the relay nodes to efficiently improve and balance the RSS between the source and client nodes to improve the network capacity and to provide redundant networking abilities. We use pre-processing techniques, such as exponential moving averaging and spatial averaging filters on the RSS data for smoothing. We apply a receiver spatial diversity concept and employ a position controller on the relay node using a stochastic gradient ascent method for self-positioning the relay node to achieve the RSS balancing task. The effectiveness of the proposed solution is validated by extensive simulations and field experiments in CERN facilities. For the field trials, we used a youBot mobile robot platform as the relay node, and two stand-alone Raspberry Pi computers as the client and server nodes. The algorithm has been proven to be robust to noise in the radio signals and to work effectively even under non-line-of-sight conditions.

  19. QR-technologies in Marketing Communication Activity of Trading Companies QR-технологии в маркетинговой коммуникационной деятельности предприятий торговли

    Directory of Open Access Journals (Sweden)

    Dubovyk Tetyana V.

    2013-10-01

    Full Text Available The article offers creative solutions on integrated application of QR-codes with common technologies and with the help of Internet technologies in marketing communication activity of trading companies, which would allow increase the brand value of a trading company and its goods under own trade mark. It recommends to use QR-codes or bar-codes in retail trade on packing with transition to a mobile version of the Internet shop page. It characterises the process of use of QR-codes by users and gives proposals on application of QR-technologies in retail trade – provision of information through QR-codes to users, interaction with buyers with the help of QR-technologies through a software application created by a company and application in warehouse accounting by trading companies.В статье предложены креативные решения по интегрированному применению QR-кодов с обычными технологиями и с помощью интернет-технологий в маркетинговой коммуникационной деятельности предприятий торговли, что позволит увеличить стоимость бренда предприятия торговли и его товаров под собственной торговой маркой. В розничной торговле рекомендуется использовать QR-коды, или штрих-коды, на упаковках товаров с переходом на мобильную версию страницы интернет-магазина. Охарактеризованы процесс использования QR-кодов пользователями и даны предложения по применению QR-технологии в розничной торговле – предоставление информации через QR-коды по

  20. Target Tracking with Sensor Navigation Using Coupled RSS and AoA Measurements

    Directory of Open Access Journals (Sweden)

    Slavisa Tomic

    2017-11-01

    Full Text Available This work addresses the problem of tracking a signal-emitting mobile target in wireless sensor networks (WSNs with navigated mobile sensors. The sensors are properly equipped to acquire received signal strength (RSS and angle of arrival (AoA measurements from the received signal, while the target transmit power is assumed not known. We start by showing how to linearize the highly non-linear measurement model. Then, by employing a Bayesian approach, we combine the linearized observation model with prior knowledge extracted from the state transition model. Based on the maximum a posteriori (MAP principle and the Kalman filtering (KF framework, we propose new MAP and KF algorithms, respectively. We also propose a simple and efficient mobile sensor navigation procedure, which allows us to further enhance the estimation accuracy of our algorithms with a reduced number of sensors. Model flaws, which result in imperfect knowledge about the path loss exponent (PLE and the true mobile sensors’ locations, are taken into consideration. We have carried out an extensive simulation study, and our results confirm the superiority of the proposed algorithms, as well as the effectiveness of the proposed navigation routine.

  1. R2NA: Received Signal Strength (RSS Ratio-Based Node Authentication for Body Area Network

    Directory of Open Access Journals (Sweden)

    Yang Wu

    2013-12-01

    Full Text Available The body area network (BAN is an emerging branch of wireless sensor networks for personalized applications. The services in BAN usually have a high requirement on security, especially for the medical diagnosis. One of the fundamental directions to ensure security in BAN is how to provide node authentication. Traditional research using cryptography relies on prior secrets shared among nodes, which leads to high resource cost. In addition, most existing non-cryptographic solutions exploit out-of-band (OOB channels, but they need the help of additional hardware support or significant modifications to the system software. To avoid the above problems, this paper presents a proximity-based node authentication scheme, which only uses wireless modules equipped on sensors. With only one sensor and one control unit (CU in BAN, we could detect a unique physical layer characteristic, namely, the difference between the received signal strength (RSS measured on different devices in BAN. Through the above-mentioned particular difference, we can tell whether the sender is close enough to be legitimate. We validate our scheme through both theoretical analysis and experiments, which are conducted on the real Shimmer nodes. The results demonstrate that our proposed scheme has a good security performance.

  2. Batched QR and SVD Algorithms on GPUs with Applications in Hierarchical Matrix Compression

    KAUST Repository

    Halim Boukaram, Wajih

    2017-09-14

    We present high performance implementations of the QR and the singular value decomposition of a batch of small matrices hosted on the GPU with applications in the compression of hierarchical matrices. The one-sided Jacobi algorithm is used for its simplicity and inherent parallelism as a building block for the SVD of low rank blocks using randomized methods. We implement multiple kernels based on the level of the GPU memory hierarchy in which the matrices can reside and show substantial speedups against streamed cuSOLVER SVDs. The resulting batched routine is a key component of hierarchical matrix compression, opening up opportunities to perform H-matrix arithmetic efficiently on GPUs.

  3. Batched QR and SVD Algorithms on GPUs with Applications in Hierarchical Matrix Compression

    KAUST Repository

    Halim Boukaram, Wajih; Turkiyyah, George; Ltaief, Hatem; Keyes, David E.

    2017-01-01

    We present high performance implementations of the QR and the singular value decomposition of a batch of small matrices hosted on the GPU with applications in the compression of hierarchical matrices. The one-sided Jacobi algorithm is used for its simplicity and inherent parallelism as a building block for the SVD of low rank blocks using randomized methods. We implement multiple kernels based on the level of the GPU memory hierarchy in which the matrices can reside and show substantial speedups against streamed cuSOLVER SVDs. The resulting batched routine is a key component of hierarchical matrix compression, opening up opportunities to perform H-matrix arithmetic efficiently on GPUs.

  4. Cytoadhesion to gC1qR through Plasmodium falciparum erythrocyte membrane protein 1 in severe malaria

    DEFF Research Database (Denmark)

    Magallón-Tejada, Ariel; Machevo, Sónia; Cisteró, Pau

    2016-01-01

    Cytoadhesion of Plasmodium falciparum infected erythrocytes to gC1qR has been associated with severe malaria, but the parasite ligand involved is currently unknown. To assess if binding to gC1qR is mediated through the P. falciparum erythrocyte membrane protein 1 (PfEMP1) family, we analyzed...

  5. PubMed Informer: Monitoring MEDLINE/PubMed through E-mail Alerts, SMS, PDA downloads and RSS feeds

    Science.gov (United States)

    Muin, Michael; Fontelo, Paul; Ackerman, Michael

    2005-01-01

    Summary PubMed Informer is a Web-based monitoring tool for topics of interest from MEDLINE/PubMed primarily designed for healthcare professionals. Five tracking methods are available: Web access, e-mail, Short Message Service (SMS), PDA downloads and RSS feeds. PubMed Informer delivers focused search updates and specific information to users with varying information-seeking practices. PMID:16779344

  6. Three-dimensional quick response code based on inkjet printing of upconversion fluorescent nanoparticles for drug anti-counterfeiting

    Science.gov (United States)

    You, Minli; Lin, Min; Wang, Shurui; Wang, Xuemin; Zhang, Ge; Hong, Yuan; Dong, Yuqing; Jin, Guorui; Xu, Feng

    2016-05-01

    Medicine counterfeiting is a serious issue worldwide, involving potentially devastating health repercussions. Advanced anti-counterfeit technology for drugs has therefore aroused intensive interest. However, existing anti-counterfeit technologies are associated with drawbacks such as the high cost, complex fabrication process, sophisticated operation and incapability in authenticating drug ingredients. In this contribution, we developed a smart phone recognition based upconversion fluorescent three-dimensional (3D) quick response (QR) code for tracking and anti-counterfeiting of drugs. We firstly formulated three colored inks incorporating upconversion nanoparticles with RGB (i.e., red, green and blue) emission colors. Using a modified inkjet printer, we printed a series of colors by precisely regulating the overlap of these three inks. Meanwhile, we developed a multilayer printing and splitting technology, which significantly increases the information storage capacity per unit area. As an example, we directly printed the upconversion fluorescent 3D QR code on the surface of drug capsules. The 3D QR code consisted of three different color layers with each layer encoded by information of different aspects of the drug. A smart phone APP was designed to decode the multicolor 3D QR code, providing the authenticity and related information of drugs. The developed technology possesses merits in terms of low cost, ease of operation, high throughput and high information capacity, thus holds great potential for drug anti-counterfeiting.Medicine counterfeiting is a serious issue worldwide, involving potentially devastating health repercussions. Advanced anti-counterfeit technology for drugs has therefore aroused intensive interest. However, existing anti-counterfeit technologies are associated with drawbacks such as the high cost, complex fabrication process, sophisticated operation and incapability in authenticating drug ingredients. In this contribution, we developed a

  7. Penelitian “rubber blend” antara karet alam rss dengan karet sintesis jsr 0061 untuk sol ringan sesuai sni 12-0778-1989

    Directory of Open Access Journals (Sweden)

    Penny Setyowati

    1997-12-01

    Full Text Available The objective of this research is to find composision of rubber blend of RSS and JSR 0061 and Carbon black for preparation light rubber sole compound and stabile on high process temperature that give the best fisical properties and the best sole product at moulding vulcanization trial. The best rubber compound to be reached at the compound formulation R III with composision of RSS 90 phr, JSR 0061 10 phr dan carbon black 40 phr.

  8. Power profiling of Cholesky and QR factorizations on distributed memory systems

    KAUST Repository

    Bosilca, George

    2012-08-30

    This paper presents the power profile of two high performance dense linear algebra libraries on distributed memory systems, ScaLAPACK and DPLASMA. From the algorithmic perspective, their methodologies are opposite. The former is based on block algorithms and relies on multithreaded BLAS and a two-dimensional block cyclic data distribution to achieve high parallel performance. The latter is based on tile algorithms running on top of a tile data layout and uses fine-grained task parallelism combined with a dynamic distributed scheduler (DAGuE) to leverage distributed memory systems. We present performance results (Gflop/s) as well as the power profile (Watts) of two common dense factorizations needed to solve linear systems of equations, namely Cholesky and QR. The reported numbers show that DPLASMA surpasses ScaLAPACK not only in terms of performance (up to 2X speedup) but also in terms of energy efficiency (up to 62 %). © 2012 Springer-Verlag (outside the USA).

  9. Code Cactus; Code Cactus

    Energy Technology Data Exchange (ETDEWEB)

    Fajeau, M; Nguyen, L T; Saunier, J [Commissariat a l' Energie Atomique, Centre d' Etudes Nucleaires de Saclay, 91 - Gif-sur-Yvette (France)

    1966-09-01

    This code handles the following problems: -1) Analysis of thermal experiments on a water loop at high or low pressure; steady state or transient behavior; -2) Analysis of thermal and hydrodynamic behavior of water-cooled and moderated reactors, at either high or low pressure, with boiling permitted; fuel elements are assumed to be flat plates: - Flowrate in parallel channels coupled or not by conduction across plates, with conditions of pressure drops or flowrate, variable or not with respect to time is given; the power can be coupled to reactor kinetics calculation or supplied by the code user. The code, containing a schematic representation of safety rod behavior, is a one dimensional, multi-channel code, and has as its complement (FLID), a one-channel, two-dimensional code. (authors) [French] Ce code permet de traiter les problemes ci-dessous: 1. Depouillement d'essais thermiques sur boucle a eau, haute ou basse pression, en regime permanent ou transitoire; 2. Etudes thermiques et hydrauliques de reacteurs a eau, a plaques, a haute ou basse pression, ebullition permise: - repartition entre canaux paralleles, couples on non par conduction a travers plaques, pour des conditions de debit ou de pertes de charge imposees, variables ou non dans le temps; - la puissance peut etre couplee a la neutronique et une representation schematique des actions de securite est prevue. Ce code (Cactus) a une dimension d'espace et plusieurs canaux, a pour complement Flid qui traite l'etude d'un seul canal a deux dimensions. (auteurs)

  10. Taking It to the Street: Using QR Codes to Tell Student-Created (Hi)stories on Location

    Science.gov (United States)

    van 't Hooft, Mark

    2013-01-01

    One of the challenges that social studies educators face daily is how to make student learning relevant. Digital technologies can play an important role by connecting what happens in the classroom to the world beyond. One way to do this is by turning students into producers of information and having them create content rather than simply consume.…

  11. A simple and inexpensive way to document simple husbandry in animal care facilities using QR code scanning.

    Science.gov (United States)

    Green, Tyler; Smith, Terry; Hodges, Richard; Fry, W Mark

    2017-12-01

    Record keeping within research animal care facilities is a key part of the guidelines set forth by national regulatory bodies and mandated by federal laws. Research facilities must maintain records of animal health issues, procedures and usage. Facilities are also required to maintain records regarding regular husbandry such as general animal checks, feeding and watering. The level of record keeping has the potential to generate excessive amounts of paper which must be retained in a fashion as to be accessible. In addition it is preferable not to retain within administrative areas any paper records which may have been in contact with animal rooms. Here, we present a flexible, simple and inexpensive process for the generation and storage of electronic animal husbandry records using smartphone technology over a WiFi or cellular network.

  12. Machine Learning Untuk Estimasi Posisi Objek Berbasis RSS Fingerprint Menggunakan IEEE 802.11g Pada Lantai 3 Gedung JTETI UGM

    Directory of Open Access Journals (Sweden)

    Chairani Chairani

    2015-05-01

    Full Text Available Penelitian ini membahas tentang estimasi posisi (localization objek dalam gedung menggunakan jaringan wireless atau IEEE 802.11g dengan pendekatan Machine Learning. Metode pada pengukuran RSS menggunakan RSS-based fingerprint.  Algoritma Machine Learning yang digunakan dalam memperkirakan lokasi dari pengukuran RSS-based menggunakan Naive Bayes.  Localization dilakukan pada lantai 3 gedung Jurusan Teknik Elektro dan Teknologi Informasi (JTETI dengan luas 1969,68 m2 dan memiliki 5 buah titik penempatan access point (AP. Untuk membentuk peta fingerprint digunakan dimensi 1 m x 1 m sehingga terbentuk grid sebanyak  1893 buah. Dengan menggunakan software Net Surveyor terkumpul data kekuatan sinyal yang diterima (RSS dari jaringan wireless ke perangkat penerima (laptop sebanyak 86.980 record. Hasil nilai rata-rata error jarak estimasi untuk localization seluruh ruangan di lantai 3 dengan menggunakan algoritma Naive Bayes pada fase offline tahap learning adalah 6,29 meter. Untuk fase online dan tahap post learning diperoleh rata-rata error jarak estimasi sebesar 7,82 meter.

  13. An evaluation of the effect of JPEG, JPEG2000, and H.264/AVC on CQR codes decoding process

    Science.gov (United States)

    Vizcarra Melgar, Max E.; Farias, Mylène C. Q.; Zaghetto, Alexandre

    2015-02-01

    This paper presents a binarymatrix code based on QR Code (Quick Response Code), denoted as CQR Code (Colored Quick Response Code), and evaluates the effect of JPEG, JPEG2000 and H.264/AVC compression on the decoding process. The proposed CQR Code has three additional colors (red, green and blue), what enables twice as much storage capacity when compared to the traditional black and white QR Code. Using the Reed-Solomon error-correcting code, the CQR Code model has a theoretical correction capability of 38.41%. The goal of this paper is to evaluate the effect that degradations inserted by common image compression algorithms have on the decoding process. Results show that a successful decoding process can be achieved for compression rates up to 0.3877 bits/pixel, 0.1093 bits/pixel and 0.3808 bits/pixel for JPEG, JPEG2000 and H.264/AVC formats, respectively. The algorithm that presents the best performance is the H.264/AVC, followed by the JPEG2000, and JPEG.

  14. An Optimization of (Q,r Inventory Policy Based on Health Care Apparel Products with Compound Poisson Demands

    Directory of Open Access Journals (Sweden)

    An Pan

    2014-01-01

    Full Text Available Addressing the problems of a health care center which produces tailor-made clothes for specific people, the paper proposes a single product continuous review model and establishes an optimal policy for the center based on (Q,r control policy to minimize expected average cost on an order cycle. A generic mathematical model to compute cost on real-time inventory level is developed to generate optimal order quantity under stochastic stock variation. The customer demands are described as compound Poisson process. Comparisons on cost between optimization method and experience-based decision on Q are made through numerical studies conducted for the inventory system of the center.

  15. Códigos QR: Museografía Nómade para la puesta en valor del patrimonio cultural

    OpenAIRE

    Lilian Meneses Plaza

    2014-01-01

    En la última década el sector cultural se ha apropiado de los avances científicos y las nuevas tecnologías para crear imágenes, sonidos, objetos y experiencias comunicacionales digitales que hacen más atractivo el patrimonio, mejorando la oferta de los museos y sitios patrimoniales desde el punto de vista turístico, cultural y educativo. Entre los medios que podemos mencionar destacan los museos virtuales, salas de exhibición 3D, audio-guías, códigos QR y aplicaciones para teléfonos móviles...

  16. QR-GARCH-M Model for Risk-Return Tradeoff in U.S. Stock Returns and Business Cycles

    OpenAIRE

    Nyberg, Henri

    2010-01-01

    In the empirical finance literature findings on the risk return tradeoff in excess stock market returns are ambiguous. In this study, we develop a new QR-GARCH-M model combining a probit model for a binary business cycle indicator and a regime switching GARCH-in-mean model for excess stock market return with the business cycle indicator defining the regime. Estimation results show that there is statistically significant variation in the U.S. excess stock returns over the business cycle. Howev...

  17. Anti-Counterfeiting Quick Response Code with Emission Color of Invisible Metal-Organic Frameworks as Encoding Information.

    Science.gov (United States)

    Wang, Yong-Mei; Tian, Xue-Tao; Zhang, Hui; Yang, Zhong-Rui; Yin, Xue-Bo

    2018-06-08

    Counterfeiting is a global epidemic that is compelling the development of new anti-counterfeiting strategy. Herein, we report a novel multiple anti-counterfeiting encoding strategy of invisible fluorescent quick response (QR) codes with emission color as information storage unit. The strategy requires red, green, and blue (RGB) light-emitting materials for different emission colors as encrypting information, single excitation for all of the emission for practicability, and ultraviolet (UV) excitation for invisibility under slight. Therefore, RGB light-emitting nanoscale metal-organic frameworks (NMOFs) are designed as inks to construct the colorful light-emitting boxes for information encrypting, while three black vertex boxes were used for positioning. Full-color emissions are obtained by mixing the trichromatic NMOFs inks through inkjet printer. The encrypting information capacity is easily adjusted by the number of light-emitting boxes with the infinite emission colors. The information is decoded with specific excitation light at 275 nm, making the QR codes invisible under daylight. The composition of inks, invisibility, inkjet printing, and the abundant encrypting information all contribute to multiple anti-counterfeiting. The proposed QR codes pattern holds great potential for advanced anti-counterfeiting.

  18. FaQR, required for the biosynthesis of the strawberry flavor compound 4-hydroxy-2,5-dimethyl-3(2H)-furanone, encodes an enone oxidoreductase.

    Science.gov (United States)

    Raab, Thomas; López-Ráez, Juan Antonio; Klein, Dorothée; Caballero, Jose Luis; Moyano, Enriqueta; Schwab, Wilfried; Muñoz-Blanco, Juan

    2006-04-01

    The flavor of strawberry (Fragaria x ananassa) fruit is dominated by an uncommon group of aroma compounds with a 2,5-dimethyl-3(H)-furanone structure. We report the characterization of an enzyme involved in the biosynthesis of 4-hydroxy-2,5-dimethyl-3(2H)-furanone (HDMF; Furaneol), the key flavor compound in strawberries. Protein extracts were partially purified, and the observed distribution of enzymatic activity correlated with the presence of a single polypeptide of approximately 37 kD. Sequence analysis of two peptide fragments showed total identity with the protein sequence of a strongly ripening-induced, auxin-dependent putative quinone oxidoreductase, Fragaria x ananassa quinone oxidoreductase (FaQR). The open reading frame of the FaQR cDNA consists of 969 bp encoding a 322-amino acid protein with a calculated molecular mass of 34.3 kD. Laser capture microdissection followed by RNA extraction and amplification demonstrated the presence of FaQR mRNA in parenchyma tissue of the strawberry fruit. The FaQR protein was functionally expressed in Escherichia coli, and the monomer catalyzed the formation of HDMF. After chemical synthesis and liquid chromatography-tandem mass spectrometry analysis, 4-hydroxy-5-methyl-2-methylene-3(2H)-furanone was confirmed as a substrate of FaQR and the natural precursor of HDMF. This study demonstrates the function of the FaQR enzyme in the biosynthesis of HDMF as enone oxidoreductase and provides a foundation for the improvement of strawberry flavor and the biotechnological production of HDMF.

  19. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  20. Efficient Dual Domain Decoding of Linear Block Codes Using Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Ahmed Azouaoui

    2012-01-01

    Full Text Available A computationally efficient algorithm for decoding block codes is developed using a genetic algorithm (GA. The proposed algorithm uses the dual code in contrast to the existing genetic decoders in the literature that use the code itself. Hence, this new approach reduces the complexity of decoding the codes of high rates. We simulated our algorithm in various transmission channels. The performance of this algorithm is investigated and compared with competitor decoding algorithms including Maini and Shakeel ones. The results show that the proposed algorithm gives large gains over the Chase-2 decoding algorithm and reach the performance of the OSD-3 for some quadratic residue (QR codes. Further, we define a new crossover operator that exploits the domain specific information and compare it with uniform and two point crossover. The complexity of this algorithm is also discussed and compared to other algorithms.

  1. rss.html

    Science.gov (United States)

    ... Incompatibility Stillbirth Teenage Pregnancy Tubal Ligation Tumors and Pregnancy Twins, Triplets, Multiple Births Vasectomy Substance Abuse Problems Alcohol Alcohol Use Disorder (AUD) Treatment Alcoholism and Alcohol Abuse Anabolic Steroids Club Drugs Cocaine ...

  2. SUSTENTABILIDADE NA GESTÃO DE RESÍDUOS DE SERVIÇOS DE SAÚDE (RSS EM INSTITUIÇÕES DE SAÚDE: UM OVERVIEW SOBRE O ESTADO DA ARTE

    Directory of Open Access Journals (Sweden)

    Jackeline Neres dos Santos

    2013-09-01

    Full Text Available O desenvolvimento da sociedade moderna nas últimas décadas principalmente nos quesitos tecnológico e industrial trouxe um conjunto de melhorias significativas à população no âmbito da saúde, infraestrutura, educação, saneamento básico entre outras. No entanto, o mesmo desenvolvimento que alavanca a qualidade de vida da população, proporciona novos desafios à sociedade moderna como, por exemplo, a grande produção e o gerenciamento dos Resíduos de Serviços de Saúde – RSS. O presente trabalho teve como principal objetivo realizar um levantamento do atual estado da arte sobre o tema sustentabilidade na gestão de Resíduos de Serviços de Saúde (RSS em instituições de saúde brasileiras destacando o papel do enfermeiro junto a equipes multidisciplinares no tratamento do tema. Foram consultadas fontes bibliográficas consolidadas tais como ivros, revistas, teses, dissertações, monografias e publicações científicas obtidas via repertórios científicos como Web Of Science, Scientific Electronic Library Online (SciELO, Google Acadêmico, Biblioteca Virtual em Saúde (BVS e Literatura Latino-Americana e do Caribe em Ciências da Saúde (LILACS, desde 2005. Temas como: (i Legislação Vigente para Área; (ii Atual Panorama dos RSS no Brasil; (iii Discussão sobre o Papel do Enfermeiro no Gerenciamento dos RSS – Aspectos gerais, Papel do enfermeiro à luz da Teoria Ambientalista de Florence Nightingale, Gerenciamento dos RSS: papel do enfermeiro versus custo; (iv Destinação e Eliminação Adequada para os RSS; e (v Sustentabilidade Ambiental no Gerenciamento dos RSS foram levantados, investigados e discutidos.

  3. Catalase as a sulfide-sulfur oxido-reductase: An ancient (and modern?) regulator of reactive sulfur species (RSS).

    Science.gov (United States)

    Olson, Kenneth R; Gao, Yan; DeLeon, Eric R; Arif, Maaz; Arif, Faihaan; Arora, Nitin; Straub, Karl D

    2017-08-01

    Catalase is well-known as an antioxidant dismutating H 2 O 2 to O 2 and H 2 O. However, catalases evolved when metabolism was largely sulfur-based, long before O 2 and reactive oxygen species (ROS) became abundant, suggesting catalase metabolizes reactive sulfide species (RSS). Here we examine catalase metabolism of H 2 S n , the sulfur analog of H 2 O 2 , hydrogen sulfide (H 2 S) and other sulfur-bearing molecules using H 2 S-specific amperometric electrodes and fluorophores to measure polysulfides (H 2 S n ; SSP4) and ROS (dichlorofluorescein, DCF). Catalase eliminated H 2 S n , but did not anaerobically generate H 2 S, the expected product of dismutation. Instead, catalase concentration- and oxygen-dependently metabolized H 2 S and in so doing acted as a sulfide oxidase with a P 50 of 20mmHg. H 2 O 2 had little effect on catalase-mediated H 2 S metabolism but in the presence of the catalase inhibitor, sodium azide (Az), H 2 O 2 rapidly and efficiently expedited H 2 S metabolism in both normoxia and hypoxia suggesting H 2 O 2 is an effective electron acceptor in this reaction. Unexpectedly, catalase concentration-dependently generated H 2 S from dithiothreitol (DTT) in both normoxia and hypoxia, concomitantly oxidizing H 2 S in the presence of O 2 . H 2 S production from DTT was inhibited by carbon monoxide and augmented by NADPH suggesting that catalase heme-iron is the catalytic site and that NADPH provides reducing equivalents. Catalase also generated H 2 S from garlic oil, diallyltrisulfide, thioredoxin and sulfur dioxide, but not from sulfite, metabisulfite, carbonyl sulfide, cysteine, cystine, glutathione or oxidized glutathione. Oxidase activity was also present in catalase from Aspergillus niger. These results show that catalase can act as either a sulfide oxidase or sulfur reductase and they suggest that these activities likely played a prominent role in sulfur metabolism during evolution and may continue do so in modern cells as well. This also appears

  4. Leveraging Quick Response Code Technology to Facilitate Simulation-Based Leaderboard Competition.

    Science.gov (United States)

    Chang, Todd P; Doughty, Cara B; Mitchell, Diana; Rutledge, Chrystal; Auerbach, Marc A; Frisell, Karin; Jani, Priti; Kessler, David O; Wolfe, Heather; MacKinnon, Ralph J; Dewan, Maya; Pirie, Jonathan; Lemke, Daniel; Khattab, Mona; Tofil, Nancy; Nagamuthu, Chenthila; Walsh, Catharine M

    2018-02-01

    Leaderboards provide feedback on relative performance and a competitive atmosphere for both self-guided improvement and social comparison. Because simulation can provide substantial quantitative participant feedback, leaderboards can be used, not only locally but also in a multidepartment, multicenter fashion. Quick Response (QR) codes can be integrated to allow participants to access and upload data. We present the development, implementation, and initial evaluation of an online leaderboard employing principles of gamification using points, badges, and leaderboards designed to enhance competition among healthcare providers. This article details the fundamentals behind the development and implementation of a user-friendly, online, multinational leaderboard that employs principles of gamification to enhance competition and integrates a QR code system to promote both self-reporting of performance data and data integrity. An open-ended survey was administered to capture perceptions of leaderboard implementation. Conceptual step-by-step instructions detailing how to apply the QR code system to any leaderboard using simulated or real performance metrics are outlined using an illustrative example of a leaderboard that employed simulated cardiopulmonary resuscitation performance scores to compare participants across 17 hospitals in 4 countries for 16 months. The following three major descriptive categories that captured perceptions of leaderboard implementation emerged from initial evaluation data from 10 sites: (1) competition, (2) longevity, and (3) perceived deficits. A well-designed leaderboard should be user-friendly and encompass best practices in gamification principles while collecting and storing data for research analyses. Easy storage and export of data allow for longitudinal record keeping that can be leveraged both to track compliance and to enable social competition.

  5. A disseminação seletiva da informação e a tecnologia RSS nas bibliotecas de Tribunais em Brasília

    Directory of Open Access Journals (Sweden)

    Thiago Gomes Eirão

    2015-09-01

    Full Text Available A pesquisa teve como objetivo verificar a utilização do serviço de disseminação seletiva da informação (DSI e a tecnologia RSS em bibliotecas de Tribunais em Brasília. Esse estudo foi proposto para identificar como os serviços de referência de tais bibliotecas veem a validade do serviço de disseminação seletiva e mais especificamente a tecnologia RSS como instrumentos para o desenvolvimento de novos produtos e serviços de informação com o foco nas necessidades do usuário. Ao todo foram visitadas seis instituições do poder Judiciário que possuem sede em Brasília. A amostra dos respondentes foi composta por doze profissionais formados em Biblioteconomia, que atuavam no serviço de referência dos respectivos órgãos. A técnica de pesquisa utilizada foi a entrevista semiaberta. Para obtenção das respostas foi utilizado um roteiro de perguntas que permitia ao entrevistador aprofundar as questões a partir das respostas concedidas pelos entrevistados. Os resultados obtidos demonstraram que os profissionais ainda veem utilidade do serviço de DSI, apesar de apenas duas das bibliotecas visitadas o utilizarem. Também foi possível verificar que os profissionais vislumbram a utilização da tecnologia RSS nos serviços de referência, apesar de nenhuma biblioteca visitada já ter pensado na utilização da tecnologia e os sites dessas bibliotecas ainda possuírem uma baixa disponibilização de serviços e utilização.

  6. Escala de Autoestima de Rosenberg (EAR: validade fatorial e consistência interna Rosenberg Self-Esteem Scale (RSS: factorial validity and internal consistency

    Directory of Open Access Journals (Sweden)

    Juliana Burges Sbicigo

    2010-12-01

    Full Text Available O objetivo deste estudo foi investigar as propriedades psicométricas da Escala de Autoestima de Rosenberg (EAR para adolescentes. Participaram 4.757 adolescentes, com idades entre 14 e 18 anos (M=15,77; DP=1,22, de nove cidades brasileiras. Os participantes responderam a uma versão da EAR adaptada para o Brasil. A análise fatorial exploratória apontou uma estrutura bidimensional, com 51.4% da variância explicada, que foi sustentada pela análise fatorial confirmatória. As análises de consistência interna realizadas por meio do coeficiente alfa de Cronbach, confiabilidade composta e variância extraída indicaram bons valores de fidedignidade. Diferenças nos escores de autoestima em função do sexo e da idade não foram encontradas. Conclui-se que a EAR apresenta qualidades psicométricas satisfatórias, mostrando-se um instrumento confiável para medir autoestima em adolescentes brasileiros.The aim of this study was to investigate the psychometrics properties of the Rosenberg Self-Esteem Scale (RSS for adolescents. The sample was composed of 4.757 adolescents, with ages between 14 and 18 years old (M=15.77; SD=1.22 in nine Brazilian cities. Participants responded to an adapted version of the RSS for Brazil. Exploratory factorial analysis showed a bidimensional structure, with 51.4% of explained variance. This result was supported by confirmatory factor analysis. The internal consistency analysis by Cronbach alpha coefficient, composite reliability and extracted variance indicated good reliability. Differences in self-esteem for gender and age were not found. These findings show that RSS has satisfactory psychometric qualities and it's a reliable instrument to assess self-esteem in Brazilian adolescents.

  7. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...

  8. Coding Labour

    Directory of Open Access Journals (Sweden)

    Anthony McCosker

    2014-03-01

    Full Text Available As well as introducing the Coding Labour section, the authors explore the diffusion of code across the material contexts of everyday life, through the objects and tools of mediation, the systems and practices of cultural production and organisational management, and in the material conditions of labour. Taking code beyond computation and software, their specific focus is on the increasingly familiar connections between code and labour with a focus on the codification and modulation of affect through technologies and practices of management within the contemporary work organisation. In the grey literature of spreadsheets, minutes, workload models, email and the like they identify a violence of forms through which workplace affect, in its constant flux of crisis and ‘prodromal’ modes, is regulated and governed.

  9. Assessment of CATHARE2 V1.5qR6 using the experimental data of BETHSY natural circulation tests

    International Nuclear Information System (INIS)

    Huang Yanping; Jia Dounan

    2003-01-01

    The assessment of CATHARE2 V1.5qR6 is carried out against the experimental data of BETHSY natural circulation test-4. 1a-TC. Results show that the experimental process under single phase natural circulation can be predicted very well by CATHARE2 V1.5qR6, the primary mass inventory at the transition points from single phase natural circulation to two-phase natural circulation and from two-phase natural circulation to reflux condensation mode are also predicted correctly. The predicted results for thermohydraulic parameters of two-phase natural circulation and reflux condensation mode are not so good. Generally speaking, the prediction capability of CATHARE2 V1.5 for strong and two-phase flow process should be improved further in future

  10. Canonical polyadic decomposition of third-order semi-nonnegative semi-symmetric tensors using LU and QR matrix factorizations

    Science.gov (United States)

    Wang, Lu; Albera, Laurent; Kachenoura, Amar; Shu, Huazhong; Senhadji, Lotfi

    2014-12-01

    Semi-symmetric three-way arrays are essential tools in blind source separation (BSS) particularly in independent component analysis (ICA). These arrays can be built by resorting to higher order statistics of the data. The canonical polyadic (CP) decomposition of such semi-symmetric three-way arrays allows us to identify the so-called mixing matrix, which contains the information about the intensities of some latent source signals present in the observation channels. In addition, in many applications, such as the magnetic resonance spectroscopy (MRS), the columns of the mixing matrix are viewed as relative concentrations of the spectra of the chemical components. Therefore, the two loading matrices of the three-way array, which are equal to the mixing matrix, are nonnegative. Most existing CP algorithms handle the symmetry and the nonnegativity separately. Up to now, very few of them consider both the semi-nonnegativity and the semi-symmetry structure of the three-way array. Nevertheless, like all the methods based on line search, trust region strategies, and alternating optimization, they appear to be dependent on initialization, requiring in practice a multi-initialization procedure. In order to overcome this drawback, we propose two new methods, called [InlineEquation not available: see fulltext.] and [InlineEquation not available: see fulltext.], to solve the problem of CP decomposition of semi-nonnegative semi-symmetric three-way arrays. Firstly, we rewrite the constrained optimization problem as an unconstrained one. In fact, the nonnegativity constraint of the two symmetric modes is ensured by means of a square change of variable. Secondly, a Jacobi-like optimization procedure is adopted because of its good convergence property. More precisely, the two new methods use LU and QR matrix factorizations, respectively, which consist in formulating high-dimensional optimization problems into several sequential polynomial and rational subproblems. By using both LU

  11. Reed-Solomon Codes and the Deep Hole Problem

    Science.gov (United States)

    Keti, Matt

    In many types of modern communication, a message is transmitted over a noisy medium. When this is done, there is a chance that the message will be corrupted. An error-correcting code adds redundant information to the message which allows the receiver to detect and correct errors accrued during the transmission. We will study the famous Reed-Solomon code (found in QR codes, compact discs, deep space probes,ldots) and investigate the limits of its error-correcting capacity. It can be shown that understanding this is related to understanding the "deep hole" problem, which is a question of determining when a received message has, in a sense, incurred the worst possible corruption. We partially resolve this in its traditional context, when the code is based on the finite field F q or Fq*, as well as new contexts, when it is based on a subgroup of F q* or the image of a Dickson polynomial. This is a new and important problem that could give insight on the true error-correcting potential of the Reed-Solomon code.

  12. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  13. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe ...

  14. The Pointer Optimization Strategy Based on the distributed RSs in the Mobile IP Network%移动IP中基于分布式注册服务器的指针优化策略

    Institute of Scientific and Technical Information of China (English)

    康凯; 郭伟; 吴诗其

    2002-01-01

    Mobility management is one of the key problems in the mobile communication techniques. The performance of the mobile communication networks is heavily depended on the effectiveness of the mobility management. In this paper, we have presented a protocol of the mobility management in the mobile IP networks, based on the distributed RSs. When the mobile user in the inactive connection handoffs, some pointers are constructed and modified by the RSs and routers. It can realize the local registration; only when a call arrives, the possible update operations of the mobile database are needed. Consequently, the access of the RS is limited, and the cost of the mobility management is also reduced.

  15. Aztheca Code

    International Nuclear Information System (INIS)

    Quezada G, S.; Espinosa P, G.; Centeno P, J.; Sanchez M, H.

    2017-09-01

    This paper presents the Aztheca code, which is formed by the mathematical models of neutron kinetics, power generation, heat transfer, core thermo-hydraulics, recirculation systems, dynamic pressure and level models and control system. The Aztheca code is validated with plant data, as well as with predictions from the manufacturer when the reactor operates in a stationary state. On the other hand, to demonstrate that the model is applicable during a transient, an event occurred in a nuclear power plant with a BWR reactor is selected. The plant data are compared with the results obtained with RELAP-5 and the Aztheca model. The results show that both RELAP-5 and the Aztheca code have the ability to adequately predict the behavior of the reactor. (Author)

  16. Vocable Code

    DEFF Research Database (Denmark)

    Soon, Winnie; Cox, Geoff

    2018-01-01

    a computational and poetic composition for two screens: on one of these, texts and voices are repeated and disrupted by mathematical chaos, together exploring the performativity of code and language; on the other, is a mix of a computer programming syntax and human language. In this sense queer code can...... be understood as both an object and subject of study that intervenes in the world’s ‘becoming' and how material bodies are produced via human and nonhuman practices. Through mixing the natural and computer language, this article presents a script in six parts from a performative lecture for two persons...

  17. NSURE code

    International Nuclear Information System (INIS)

    Rattan, D.S.

    1993-11-01

    NSURE stands for Near-Surface Repository code. NSURE is a performance assessment code. developed for the safety assessment of near-surface disposal facilities for low-level radioactive waste (LLRW). Part one of this report documents the NSURE model, governing equations and formulation of the mathematical models, and their implementation under the SYVAC3 executive. The NSURE model simulates the release of nuclides from an engineered vault, their subsequent transport via the groundwater and surface water pathways tot he biosphere, and predicts the resulting dose rate to a critical individual. Part two of this report consists of a User's manual, describing simulation procedures, input data preparation, output and example test cases

  18. Nonlinear Analysis for the Crack Control of SMA Smart Concrete Beam Based on a Bidirectional B-Spline QR Method

    Directory of Open Access Journals (Sweden)

    Yan Li

    2018-01-01

    Full Text Available A bidirectional B-spline QR method (BB-sQRM for the study on the crack control of the reinforced concrete (RC beam embedded with shape memory alloy (SMA wires is presented. In the proposed method, the discretization is performed with a set of spline nodes in two directions of the plane model, and structural displacement fields are constructed by the linear combination of the products of cubic B-spline interpolation functions. To derive the elastoplastic stiffness equation of the RC beam, an explicit form is utilized to express the elastoplastic constitutive law of concrete materials. The proposed model is compared with the ANSYS model in several numerical examples. The results not only show that the solutions given by the BB-sQRM are very close to those given by the finite element method (FEM but also prove the high efficiency and low computational cost of the BB-sQRM. Meanwhile, the five parameters, such as depth-span ratio, thickness of concrete cover, reinforcement ratio, prestrain, and eccentricity of SMA wires, are investigated to learn their effects on the crack control. The results show that depth-span ratio of RC beams and prestrain and eccentricity of SMA wires have a significant influence on the control performance of beam cracks.

  19. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  20. Coding Class

    DEFF Research Database (Denmark)

    Ejsing-Duun, Stine; Hansbøl, Mikala

    Denne rapport rummer evaluering og dokumentation af Coding Class projektet1. Coding Class projektet blev igangsat i skoleåret 2016/2017 af IT-Branchen i samarbejde med en række medlemsvirksomheder, Københavns kommune, Vejle Kommune, Styrelsen for IT- og Læring (STIL) og den frivillige forening...... Coding Pirates2. Rapporten er forfattet af Docent i digitale læringsressourcer og forskningskoordinator for forsknings- og udviklingsmiljøet Digitalisering i Skolen (DiS), Mikala Hansbøl, fra Institut for Skole og Læring ved Professionshøjskolen Metropol; og Lektor i læringsteknologi, interaktionsdesign......, design tænkning og design-pædagogik, Stine Ejsing-Duun fra Forskningslab: It og Læringsdesign (ILD-LAB) ved Institut for kommunikation og psykologi, Aalborg Universitet i København. Vi har fulgt og gennemført evaluering og dokumentation af Coding Class projektet i perioden november 2016 til maj 2017...

  1. Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the objectives, meeting goals and overall NASA goals for the NASA Data Standards Working Group. The presentation includes information on the technical progress surrounding the objective, short LDPC codes, and the general results on the Pu-Pw tradeoff.

  2. ANIMAL code

    International Nuclear Information System (INIS)

    Lindemuth, I.R.

    1979-01-01

    This report describes ANIMAL, a two-dimensional Eulerian magnetohydrodynamic computer code. ANIMAL's physical model also appears. Formulated are temporal and spatial finite-difference equations in a manner that facilitates implementation of the algorithm. Outlined are the functions of the algorithm's FORTRAN subroutines and variables

  3. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621 ...

  4. MCNP code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The MCNP code is the major Monte Carlo coupled neutron-photon transport research tool at the Los Alamos National Laboratory, and it represents the most extensive Monte Carlo development program in the United States which is available in the public domain. The present code is the direct descendent of the original Monte Carlo work of Fermi, von Neumaum, and Ulam at Los Alamos in the 1940s. Development has continued uninterrupted since that time, and the current version of MCNP (or its predecessors) has always included state-of-the-art methods in the Monte Carlo simulation of radiation transport, basic cross section data, geometry capability, variance reduction, and estimation procedures. The authors of the present code have oriented its development toward general user application. The documentation, though extensive, is presented in a clear and simple manner with many examples, illustrations, and sample problems. In addition to providing the desired results, the output listings give a a wealth of detailed information (some optional) concerning each state of the calculation. The code system is continually updated to take advantage of advances in computer hardware and software, including interactive modes of operation, diagnostic interrupts and restarts, and a variety of graphical and video aids

  5. Expander Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 10; Issue 1. Expander Codes - The Sipser–Spielman Construction. Priti Shankar. General Article Volume 10 ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science Bangalore 560 012, India.

  6. A connecter-like factor, CacA, links RssB/RpoS and the CpxR/CpxA two-component system in Salmonella.

    Science.gov (United States)

    Kato, Akinori; Hayashi, Hironori; Nomura, Wataru; Emori, Haruka; Hagihara, Kei; Utsumi, Ryutaro

    2012-10-02

    Bacteria integrate numerous environmental stimuli when generating cellular responses. Increasing numbers of examples describe how one two-component system (TCS) responds to signals detected by the sensor of another TCS. However, the molecular mechanisms underlying this phenomenon remain poorly defined. Here, we report a connector-like factor that affects the activity of the CpxR/CpxA two-component system in Salmonella enterica serovar Typhimurium. We isolated a clone that induced the expression of a cpxP-lac gene fusion from a high-copy-number plasmid pool of random Salmonella genomic fragments. A 63-amino acid protein, CacA, was responsible for the CpxA/CpxR-dependent activation of the cpxP gene. The CpxR-activated genes cpxP and spy exhibited approximately 30% and 50% reductions in transcription, respectively, in a clean cacA deletion mutant strain in comparison to wild-type. From 33 response regulator (RR) deletion mutants, we identified that the RssB regulator represses cacA transcription. Substitution mutations in a conserved -10 region harboring the RNA polymerase recognition sequence, which is well conserved with a known RpoS -10 region consensus sequence, rendered the cacA promoter RpoS-independent. The CacA-mediated induction of cpxP transcription was affected in a trxA deletion mutant, which encodes thioredoxin 1, suggesting a role for cysteine thiol-disulfide exchange(s) in CacA-dependent Cpx activation. We identified CacA as an activator of the CpxR/CpxA system in the plasmid clone. We propose that CacA may integrate the regulatory status of RssB/RpoS into the CpxR/CpxA system. Future investigations are necessary to thoroughly elucidate how CacA activates the CpxR/CpxA system.

  7. A connecter-like factor, CacA, links RssB/RpoS and the CpxR/CpxA two-component system in Salmonella

    Directory of Open Access Journals (Sweden)

    Kato Akinori

    2012-10-01

    Full Text Available Abstract Background Bacteria integrate numerous environmental stimuli when generating cellular responses. Increasing numbers of examples describe how one two-component system (TCS responds to signals detected by the sensor of another TCS. However, the molecular mechanisms underlying this phenomenon remain poorly defined. Results Here, we report a connector-like factor that affects the activity of the CpxR/CpxA two-component system in Salmonella enterica serovar Typhimurium. We isolated a clone that induced the expression of a cpxP-lac gene fusion from a high-copy-number plasmid pool of random Salmonella genomic fragments. A 63-amino acid protein, CacA, was responsible for the CpxA/CpxR-dependent activation of the cpxP gene. The CpxR-activated genes cpxP and spy exhibited approximately 30% and 50% reductions in transcription, respectively, in a clean cacA deletion mutant strain in comparison to wild-type. From 33 response regulator (RR deletion mutants, we identified that the RssB regulator represses cacA transcription. Substitution mutations in a conserved -10 region harboring the RNA polymerase recognition sequence, which is well conserved with a known RpoS -10 region consensus sequence, rendered the cacA promoter RpoS-independent. The CacA-mediated induction of cpxP transcription was affected in a trxA deletion mutant, which encodes thioredoxin 1, suggesting a role for cysteine thiol-disulfide exchange(s in CacA-dependent Cpx activation. Conclusions We identified CacA as an activator of the CpxR/CpxA system in the plasmid clone. We propose that CacA may integrate the regulatory status of RssB/RpoS into the CpxR/CpxA system. Future investigations are necessary to thoroughly elucidate how CacA activates the CpxR/CpxA system.

  8. A Study on the use of Facebook, RSS, Blogs and Twitter (Web2.0) among selected academic libraries from 6 Gulf countries namely: Kingdom of Saudi Arabia, United Arab Emirates, Qatar, Bahrain, Oman and Kuwait

    KAUST Repository

    Ramli, Rindra M.

    2014-01-01

    This paper aims to explore and study the current usage trends of Web2.0 namely Facebook, RSS, Blogs and Twitter among selected higher education institutions’ libraries in 6 gulf countries namely: Kingdom of Saudi Arabia, United Arab Emirates, Qatar

  9. Panda code

    International Nuclear Information System (INIS)

    Altomare, S.; Minton, G.

    1975-02-01

    PANDA is a new two-group one-dimensional (slab/cylinder) neutron diffusion code designed to replace and extend the FAB series. PANDA allows for the nonlinear effects of xenon, enthalpy and Doppler. Fuel depletion is allowed. PANDA has a completely general search facility which will seek criticality, maximize reactivity, or minimize peaking. Any single parameter may be varied in a search. PANDA is written in FORTRAN IV, and as such is nearly machine independent. However, PANDA has been written with the present limitations of the Westinghouse CDC-6600 system in mind. Most computation loops are very short, and the code is less than half the useful 6600 memory size so that two jobs can reside in the core at once. (auth)

  10. CANAL code

    International Nuclear Information System (INIS)

    Gara, P.; Martin, E.

    1983-01-01

    The CANAL code presented here optimizes a realistic iron free extraction channel which has to provide a given transversal magnetic field law in the median plane: the current bars may be curved, have finite lengths and cooling ducts and move in a restricted transversal area; terminal connectors may be added, images of the bars in pole pieces may be included. A special option optimizes a real set of circular coils [fr

  11. Audiovisualización del papel. Usos del código QR para innovar en la industria periodística impresa

    Directory of Open Access Journals (Sweden)

    María Dolores Meneses Fernández

    2014-10-01

    Full Text Available El código de respuesta rápida QR es una tecnología reciente en proceso de desarrollo y aplicación continua. Su carácter novedoso excusa el aún insuficiente conocimiento y aprovechamiento por el periodismo impreso, frente a su normalización en publicidad y marketing, dos sectores de la comunicación social en los que calan antes las tecnologías de visualización emergentes. La fase de expansión periodística del QR, en la que se encuentra ahora, comienza a ofrecer ejemplos de uso innovador para la industria editorial, los profesionales del periodismo en papel y los lectores. Esta investigación se justifica por el potencial info-comunicativo que brinda este sistema de visualización a un sector en crisis: el periodismo impreso. Los autores exponen los beneficios derivados de las sinergias entre el papel y lo audiovisual, gracias a las tecnologías de la información y la comunicación, más acordes con la misión de garantizar el derecho a la información, frente a los malos augurios que se le presuponen a la prensa. Para ello se basan en el estudio de casos, ejemplificados con cabeceras de referencia internacional, nacional y local. También es objetivo de este artículo contribuir a mitigar la escasa bibliografía académica y profesional sobre la aplicación de las tecnologías de visualización emergentes en el periodismo impreso, en concreto del código QR

  12. A new approach to the joined estimation of the heat generated by a semicontiunuous emulsion polymerization Qr and the overall heat exchange parameter UA

    Directory of Open Access Journals (Sweden)

    Freire F. B.

    2004-01-01

    Full Text Available This work is concerned with the coupled estimation of the heat generated by the reaction (Qr and the overall heat transfer parameter (UA during the terpolymerization of styrene, butyl acrylate and methyl methacrylate from temperature measurements and the reactor heat balance. By making specific assumptions about the dynamics of the evolution of UA and Q R, we propose a cascade of observers to successively estimate these two parameters without the need for additional measurements of on-line samples. One further aspect of our approach is that only the energy balance around the reactor was employed. It means that the flow rate of the cooling jacket fluid was not required.

  13. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  14. ANÁLISIS DE DATOS DE PACIENTES SUBAGUDOS CON INFORMACIÓN REGISTRADA EN EL CONJUNTO MINIMO BASICO DE DATOS SOCIOSANITARIOS (CMBD-RSS

    Directory of Open Access Journals (Sweden)

    Cristina Meléndez Frigola

    2016-01-01

    Full Text Available Fundamentos: Es necesario profundizar en el conocimiento del conjunto mínimo básico de datos (CMBD-RSS de la línea sociosanitaria de pacientes subagudos (con patología crónica asociada y frecuentes ingresos. El objetivo de este estudio fue conocer las características sanitarias de este tipo de pacientes. Métodos: Muestra de 660 pacientes que ingresaron en camas de subagudos del Hospital Santa Caterina (Región Sanitaria Girona, de octubre de 2013 a diciembre de 2014. La fuente de información fue el CMBD-RSS. Se realizó análisis estadístico descriptivo y se verificó la relación entre variables: número de días de estancia y edad, procedencia del paciente y días de estancia (Significación de Mann-Whitney; diagnóstico principal y días de estancia (Kruskal-Wallis. Se contrastaron la procedencia y el diagnóstico principal mediante χ2 de Pearson y el coeficiente V de Cramer. Resultados: La edad media de las personas de la muestra fue de 83 años, el 55% eran mujeres. Los cinco grupos de enfermedades que concentraron el 80% de los diagnósticos de los pacientes fueron trastorno mental, enfermedades del sistema nervioso, cardiovasculares, respiratoria e infecciones genitourinarias. Los pacientes que procedieron del hospital, tuvieron una estancia media 8 días inferior a los procedentes de domicilio (9 días. En el 80% de los casos se retornó al domicilio al alta. Conclusiones: Las personas con patología crónica asociada con frecuentes ingresos hospitalarios configuran un grupo de riesgo importante. La elevada edad y la descompensación clínica añaden complejidad. Una correcta valoración del paciente al inicio del episodio facilita la asignación del recurso más adecuado. En la muestra estudiada se plasman las patologías más prevalentes, la procedencia, la estancia media y el destino al alta.

  15. Automatic coding method of the ACR Code

    International Nuclear Information System (INIS)

    Park, Kwi Ae; Ihm, Jong Sool; Ahn, Woo Hyun; Baik, Seung Kook; Choi, Han Yong; Kim, Bong Gi

    1993-01-01

    The authors developed a computer program for automatic coding of ACR(American College of Radiology) code. The automatic coding of the ACR code is essential for computerization of the data in the department of radiology. This program was written in foxbase language and has been used for automatic coding of diagnosis in the Department of Radiology, Wallace Memorial Baptist since May 1992. The ACR dictionary files consisted of 11 files, one for the organ code and the others for the pathology code. The organ code was obtained by typing organ name or code number itself among the upper and lower level codes of the selected one that were simultaneous displayed on the screen. According to the first number of the selected organ code, the corresponding pathology code file was chosen automatically. By the similar fashion of organ code selection, the proper pathologic dode was obtained. An example of obtained ACR code is '131.3661'. This procedure was reproducible regardless of the number of fields of data. Because this program was written in 'User's Defined Function' from, decoding of the stored ACR code was achieved by this same program and incorporation of this program into program in to another data processing was possible. This program had merits of simple operation, accurate and detail coding, and easy adjustment for another program. Therefore, this program can be used for automation of routine work in the department of radiology

  16. Error-correction coding

    Science.gov (United States)

    Hinds, Erold W. (Principal Investigator)

    1996-01-01

    This report describes the progress made towards the completion of a specific task on error-correcting coding. The proposed research consisted of investigating the use of modulation block codes as the inner code of a concatenated coding system in order to improve the overall space link communications performance. The study proposed to identify and analyze candidate codes that will complement the performance of the overall coding system which uses the interleaved RS (255,223) code as the outer code.

  17. Dynamic Shannon Coding

    OpenAIRE

    Gagie, Travis

    2005-01-01

    We present a new algorithm for dynamic prefix-free coding, based on Shannon coding. We give a simple analysis and prove a better upper bound on the length of the encoding produced than the corresponding bound for dynamic Huffman coding. We show how our algorithm can be modified for efficient length-restricted coding, alphabetic coding and coding with unequal letter costs.

  18. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  19. Codes Over Hyperfields

    Directory of Open Access Journals (Sweden)

    Atamewoue Surdive

    2017-12-01

    Full Text Available In this paper, we define linear codes and cyclic codes over a finite Krasner hyperfield and we characterize these codes by their generator matrices and parity check matrices. We also demonstrate that codes over finite Krasner hyperfields are more interesting for code theory than codes over classical finite fields.

  20. Production and characterization of a murine monoclonal IgM antibody to human C1q receptor (C1qR)

    International Nuclear Information System (INIS)

    Ghebrehiwet, B.

    1986-01-01

    A hybridoma cell line that produces a monoclonal antibody (MAb) to cell surface C1q receptor (C1qr) has been produced by fusion of the P3 x 63-Ag8.653 mouse myeloma cell line with the spleen cells of a CD-1 mouse that had been hyperimmunized with viable Raji cell suspensions (5 x 10 7 cells/inoculum). This MAb, designated II1/D1, is an IgM antibody with lambda-light chain specificity. Radiolabeled or unlabeled, highly purified II1/D1 was used to determine that: a) this antibody competes for C1q binding sites on C1qR-bearing cells; b) the molecule recognized by this MAb is the C1qR; and c) cells that are known to bind C1q also bind II1/D1 in a specific manner. Western blot analysis of solubilized Raji, or U937 cell membranes, showed that the 125 I-MAb detected a major protein band of approximately 85000 m.w. in its unreduced state, indicating that the C1qR is similar, if not identical, in both types of cells. Analyses of 125 I-II/D1 binding experiments revealed that the antibody bound to Raji cells or u937 cells in a specific manner. Uptake of the antibody was saturable, with equilibrium virtually attained within 35 min. Scatchard analysis of the binding data using the intact MAb suggests that the affinity constant K/sub D/ is 2.9 x 10 -10 M, and at apparent saturation, 24.6 ng of the antibody were bound per 2 x 10 6 cells, giving an estimated 7.8 x 10 3 antibody molecules bound per cell. That the II1/D1 antibody is specifically directed to the C1q was further evidenced by an ELISA in which the ability of C1qR-bearing cells to bind the MAb was abrogated by c-C1q in a specific dose-dependent manner

  1. Vector Network Coding Algorithms

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L x L coding matrices that play a similar role as coding c in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector coding, our algori...

  2. Homological stabilizer codes

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Jonas T., E-mail: jonastyleranderson@gmail.com

    2013-03-15

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

  3. Diagnostic Coding for Epilepsy.

    Science.gov (United States)

    Williams, Korwyn; Nuwer, Marc R; Buchhalter, Jeffrey R

    2016-02-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  4. Coding of Neuroinfectious Diseases.

    Science.gov (United States)

    Barkley, Gregory L

    2015-12-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  5. QR académico: una propuesta didáctica emergente con apropiación de la cultura juvenil

    Directory of Open Access Journals (Sweden)

    Flora Arteaga Bustos

    2016-08-01

    Full Text Available Presentar una propuesta didáctica emergente para el uso del celular dentro del aula mediante la utilización de códigos QR (quick response- respuesta rápida- rige el objetivo del artículo. Se basa en la sistematización de teorías previas, identificadas en la búsqueda por difundir las nuevas estrategias educativas tecnológicas que se desarrollan en el ámbito venezolano. Su fundamentación se basa en la promoción de competencias digitales cónsonas a la cultura juvenil, la mejora de la calidad educativa y la optimización del desempeño estudiantil, aspectos fundamentales de las metas educativas de la CEPAL, de la OEI y de la UNESCO. El método utilizado es cuali-cuantitativo, para la técnica se diseñó una entrevista realizada al docente y un cuestionario dirigido a 20 de sus estudiantes. Los resultados indican mayor motivación e interés de los alumnos por la lectura y la investigación, así como un notable desarrollo del trabajo cooperativo-participativo. Se considera el establecer una mayor apropiación de las actividades en el aula consolidando la cultura juvenil, por lo que se demuestra el potencial de los códigos QR como herramienta educativa emergente. Como obstáculo evidenciado con el uso de la aplicación se menciona la deficiente interconectividad a la Internet. Se recomiendan procesos de difusión sobre nuevas experiencias docentes, como propuestas significativas de transposición didáctica tecnológica.

  6. Vector Network Coding

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L X L coding matrices that play a similar role as coding coefficients in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector co...

  7. Entropy Coding in HEVC

    OpenAIRE

    Sze, Vivienne; Marpe, Detlev

    2014-01-01

    Context-Based Adaptive Binary Arithmetic Coding (CABAC) is a method of entropy coding first introduced in H.264/AVC and now used in the latest High Efficiency Video Coding (HEVC) standard. While it provides high coding efficiency, the data dependencies in H.264/AVC CABAC make it challenging to parallelize and thus limit its throughput. Accordingly, during the standardization of entropy coding for HEVC, both aspects of coding efficiency and throughput were considered. This chapter describes th...

  8. Generalized concatenated quantum codes

    International Nuclear Information System (INIS)

    Grassl, Markus; Shor, Peter; Smith, Graeme; Smolin, John; Zeng Bei

    2009-01-01

    We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length but also asymptotically meet the quantum Hamming bound for large block length.

  9. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  10. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  11. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  12. Discussion on LDPC Codes and Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  13. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  14. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    Shannon limit of the channel. Among the earliest discovered codes that approach the. Shannon limit were the low density parity check (LDPC) codes. The term low density arises from the property of the parity check matrix defining the code. We will now define this matrix and the role that it plays in decoding. 2. Linear Codes.

  15. Manually operated coded switch

    International Nuclear Information System (INIS)

    Barnette, J.H.

    1978-01-01

    The disclosure related to a manually operated recodable coded switch in which a code may be inserted, tried and used to actuate a lever controlling an external device. After attempting a code, the switch's code wheels must be returned to their zero positions before another try is made

  16. Coding in Muscle Disease.

    Science.gov (United States)

    Jones, Lyell K; Ney, John P

    2016-12-01

    Accurate coding is critically important for clinical practice and research. Ongoing changes to diagnostic and billing codes require the clinician to stay abreast of coding updates. Payment for health care services, data sets for health services research, and reporting for medical quality improvement all require accurate administrative coding. This article provides an overview of administrative coding for patients with muscle disease and includes a case-based review of diagnostic and Evaluation and Management (E/M) coding principles in patients with myopathy. Procedural coding for electrodiagnostic studies and neuromuscular ultrasound is also reviewed.

  17. Codes and curves

    CERN Document Server

    Walker, Judy L

    2000-01-01

    When information is transmitted, errors are likely to occur. Coding theory examines efficient ways of packaging data so that these errors can be detected, or even corrected. The traditional tools of coding theory have come from combinatorics and group theory. Lately, however, coding theorists have added techniques from algebraic geometry to their toolboxes. In particular, by re-interpreting the Reed-Solomon codes, one can see how to define new codes based on divisors on algebraic curves. For instance, using modular curves over finite fields, Tsfasman, Vladut, and Zink showed that one can define a sequence of codes with asymptotically better parameters than any previously known codes. This monograph is based on a series of lectures the author gave as part of the IAS/PCMI program on arithmetic algebraic geometry. Here, the reader is introduced to the exciting field of algebraic geometric coding theory. Presenting the material in the same conversational tone of the lectures, the author covers linear codes, inclu...

  18. Photoactivatable Mussel-Based Underwater Adhesive Proteins by an Expanded Genetic Code.

    Science.gov (United States)

    Hauf, Matthias; Richter, Florian; Schneider, Tobias; Faidt, Thomas; Martins, Berta M; Baumann, Tobias; Durkin, Patrick; Dobbek, Holger; Jacobs, Karin; Möglich, Andreas; Budisa, Nediljko

    2017-09-19

    Marine mussels exhibit potent underwater adhesion abilities under hostile conditions by employing 3,4-dihydroxyphenylalanine (DOPA)-rich mussel adhesive proteins (MAPs). However, their recombinant production is a major biotechnological challenge. Herein, a novel strategy based on genetic code expansion has been developed by engineering efficient aminoacyl-transfer RNA synthetases (aaRSs) for the photocaged noncanonical amino acid ortho-nitrobenzyl DOPA (ONB-DOPA). The engineered ONB-DOPARS enables in vivo production of MAP type 5 site-specifically equipped with multiple instances of ONB-DOPA to yield photocaged, spatiotemporally controlled underwater adhesives. Upon exposure to UV light, these proteins feature elevated wet adhesion properties. This concept offers new perspectives for the production of recombinant bioadhesives. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  19. Zebrafish Adar2 Edits the Q/R site of AMPA receptor Subunit gria2α transcript to ensure normal development of nervous system and cranial neural crest cells.

    Directory of Open Access Journals (Sweden)

    I-Chen Li

    Full Text Available BACKGROUND: Adar2 deaminates selective adenosines to inosines (A-to-I RNA editing in the double-stranded region of nuclear transcripts. Although the functions of mouse Adar2 and its biologically most important substrate gria2, encoding the GluA2 subunit of AMPA (α-amino-3-hydroxy-5-methyl-4-isoxazole propionic acid receptor, have been extensively studied, the substrates and functions of zebrafish Adar2 remain elusive. METHODS/PRINCIPAL FINDINGS: Expression of Adar2 was perturbed in the adar2 morphant (adar2MO, generated by antisense morpholio oligonucleotides. The Q/R editing of gria2α was reduced in the adar2MO and was enhanced by overexpression of Adar2, demonstrating an evolutionarily conserved activity between zebrafish and mammalian Adar2 in editing the Q/R site of gria2. To delineate the role of Q/R editing of gria2α in the developmental defects observed in the adar2MO, the Q/R editing of gria2α was specifically perturbed in the gria2αQRMO, generated by a morpholio oligonucleotide complementary to the exon complementary sequence (ECS required for the Q/R editing. Analogous to the adar2-deficient and Q/R-editing deficient mice displaying identical neurological defects, the gria2αQRMO and adar2MO displayed identical developmental defects in the nervous system and cranial cartilages. Knockdown p53 abolished apoptosis and partially suppressed the loss of spinal cord motor neurons in these morphants. However, reducing p53 activity neither replenished the brain neuronal populations nor rescued the developmental defects. The expressions of crestin and sox9b in the neural crest cells were reduced in the adar2MO and gria2αQRMO. Overexpressing the edited GluA2αR in the adar2MO restored normal expressions of cresting and sox9b. Moreover, overexpressing the unedited GluA2αQ in the wild type embryos resulted in reduction of crestin and sox9b expressions. These results argue that an elevated GluA2αQ level is sufficient for generating the

  20. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    This essay studies the source code of an artwork from a software studies perspective. By examining code that come close to the approach of critical code studies (Marino, 2006), I trace the network artwork, Pupufu (Lin, 2009) to understand various real-time approaches to social media platforms (MSN......, Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...... to understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  1. Coding for optical channels

    CERN Document Server

    Djordjevic, Ivan; Vasic, Bane

    2010-01-01

    This unique book provides a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory and optical communication.

  2. SEVERO code - user's manual

    International Nuclear Information System (INIS)

    Sacramento, A.M. do.

    1989-01-01

    This user's manual contains all the necessary information concerning the use of SEVERO code. This computer code is related to the statistics of extremes = extreme winds, extreme precipitation and flooding hazard risk analysis. (A.C.A.S.)

  3. Synthesizing Certified Code

    OpenAIRE

    Whalen, Michael; Schumann, Johann; Fischer, Bernd

    2002-01-01

    Code certification is a lightweight approach for formally demonstrating software quality. Its basic idea is to require code producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates that can be checked independently. Since code certification uses the same underlying technology as program verification, it requires detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding annotations to th...

  4. FERRET data analysis code

    International Nuclear Information System (INIS)

    Schmittroth, F.

    1979-09-01

    A documentation of the FERRET data analysis code is given. The code provides a way to combine related measurements and calculations in a consistent evaluation. Basically a very general least-squares code, it is oriented towards problems frequently encountered in nuclear data and reactor physics. A strong emphasis is on the proper treatment of uncertainties and correlations and in providing quantitative uncertainty estimates. Documentation includes a review of the method, structure of the code, input formats, and examples

  5. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    doing formal coding and when doing more “traditional” conversation analysis research based on collections. We are more wary, however, of the implication that coding-based research is the end result of a process that starts with qualitative investigations and ends with categories that can be coded...

  6. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow...

  7. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  8. Software Certification - Coding, Code, and Coders

    Science.gov (United States)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  9. The network code

    International Nuclear Information System (INIS)

    1997-01-01

    The Network Code defines the rights and responsibilities of all users of the natural gas transportation system in the liberalised gas industry in the United Kingdom. This report describes the operation of the Code, what it means, how it works and its implications for the various participants in the industry. The topics covered are: development of the competitive gas market in the UK; key points in the Code; gas transportation charging; impact of the Code on producers upstream; impact on shippers; gas storage; supply point administration; impact of the Code on end users; the future. (20 tables; 33 figures) (UK)

  10. Coding for Electronic Mail

    Science.gov (United States)

    Rice, R. F.; Lee, J. J.

    1986-01-01

    Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.

  11. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  12. XSOR codes users manual

    International Nuclear Information System (INIS)

    Jow, Hong-Nian; Murfin, W.B.; Johnson, J.D.

    1993-11-01

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ''XSOR''. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms

  13. Reactor lattice codes

    International Nuclear Information System (INIS)

    Kulikowska, T.

    1999-01-01

    The present lecture has a main goal to show how the transport lattice calculations are realised in a standard computer code. This is illustrated on the example of the WIMSD code, belonging to the most popular tools for reactor calculations. Most of the approaches discussed here can be easily modified to any other lattice code. The description of the code assumes the basic knowledge of reactor lattice, on the level given in the lecture on 'Reactor lattice transport calculations'. For more advanced explanation of the WIMSD code the reader is directed to the detailed descriptions of the code cited in References. The discussion of the methods and models included in the code is followed by the generally used homogenisation procedure and several numerical examples of discrepancies in calculated multiplication factors based on different sources of library data. (author)

  14. DLLExternalCode

    Energy Technology Data Exchange (ETDEWEB)

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  15. Novel 2D-sequential color code system employing Image Sensor Communications for Optical Wireless Communications

    Directory of Open Access Journals (Sweden)

    Trang Nguyen

    2016-06-01

    Full Text Available The IEEE 802.15.7r1 Optical Wireless Communications Task Group (TG7r1, also known as the revision of the IEEE 802.15.7 Visible Light Communication standard targeting the commercial usage of visible light communication systems, is of interest in this paper. The paper is mainly concerned with Image Sensor Communications (ISC of TG7r1; however, the major challenge facing ISC, as addressed in the Technical Consideration Document (TCD of TG7r1, is Image Sensor Compatibility among the variety of different commercial cameras on the market. One of the most challenging but interesting compatibility requirements is the need to support the verified presence of frame rate variation. This paper proposes a novel design for 2D-sequential color code. Compared to a QR-code-based sequential transmission, the proposed design of 2D-sequential code can overcome the above challenge that it is compatible with different frame rate variations and different shutter operations, and has the ability to mitigate the rolling effect as well as the rotating effect while effectively minimizing transmission overhead. Practical implementations are demonstrated and a performance comparison is presented.

  16. Toric Varieties and Codes, Error-correcting Codes, Quantum Codes, Secret Sharing and Decoding

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    We present toric varieties and associated toric codes and their decoding. Toric codes are applied to construct Linear Secret Sharing Schemes (LSSS) with strong multiplication by the Massey construction. Asymmetric Quantum Codes are obtained from toric codes by the A.R. Calderbank P.W. Shor and A.......M. Steane construction of stabilizer codes (CSS) from linear codes containing their dual codes....

  17. An Optimal Linear Coding for Index Coding Problem

    OpenAIRE

    Pezeshkpour, Pouya

    2015-01-01

    An optimal linear coding solution for index coding problem is established. Instead of network coding approach by focus on graph theoric and algebraic methods a linear coding program for solving both unicast and groupcast index coding problem is presented. The coding is proved to be the optimal solution from the linear perspective and can be easily utilize for any number of messages. The importance of this work is lying mostly on the usage of the presented coding in the groupcast index coding ...

  18. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  19. Majorana fermion codes

    International Nuclear Information System (INIS)

    Bravyi, Sergey; Terhal, Barbara M; Leemhuis, Bernhard

    2010-01-01

    We initiate the study of Majorana fermion codes (MFCs). These codes can be viewed as extensions of Kitaev's one-dimensional (1D) model of unpaired Majorana fermions in quantum wires to higher spatial dimensions and interacting fermions. The purpose of MFCs is to protect quantum information against low-weight fermionic errors, that is, operators acting on sufficiently small subsets of fermionic modes. We examine to what extent MFCs can surpass qubit stabilizer codes in terms of their stability properties. A general construction of 2D MFCs is proposed that combines topological protection based on a macroscopic code distance with protection based on fermionic parity conservation. Finally, we use MFCs to show how to transform any qubit stabilizer code to a weakly self-dual CSS code.

  20. Theory of epigenetic coding.

    Science.gov (United States)

    Elder, D

    1984-06-07

    The logic of genetic control of development may be based on a binary epigenetic code. This paper revises the author's previous scheme dealing with the numerology of annelid metamerism in these terms. Certain features of the code had been deduced to be combinatorial, others not. This paradoxical contrast is resolved here by the interpretation that these features relate to different operations of the code; the combinatiorial to coding identity of units, the non-combinatorial to coding production of units. Consideration of a second paradox in the theory of epigenetic coding leads to a new solution which further provides a basis for epimorphic regeneration, and may in particular throw light on the "regeneration-duplication" phenomenon. A possible test of the model is also put forward.

  1. DISP1 code

    International Nuclear Information System (INIS)

    Vokac, P.

    1999-12-01

    DISP1 code is a simple tool for assessment of the dispersion of the fission product cloud escaping from a nuclear power plant after an accident. The code makes it possible to tentatively check the feasibility of calculations by more complex PSA3 codes and/or codes for real-time dispersion calculations. The number of input parameters is reasonably low and the user interface is simple enough to allow a rapid processing of sensitivity analyses. All input data entered through the user interface are stored in the text format. Implementation of dispersion model corrections taken from the ARCON96 code enables the DISP1 code to be employed for assessment of the radiation hazard within the NPP area, in the control room for instance. (P.A.)

  2. Phonological coding during reading.

    Science.gov (United States)

    Leinenger, Mallorie

    2014-11-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early [prelexical] or that phonological codes come online late [postlexical]) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eye-tracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model, Van Orden, 1987; dual-route model, e.g., M. Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001; parallel distributed processing model, Seidenberg & McClelland, 1989) are discussed. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  3. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  4. Experiencia de innovación educativa con curso MOOC: los códigos QR aplicados a la enseñanza

    Directory of Open Access Journals (Sweden)

    Pedro Román Graván

    2014-01-01

    Full Text Available Los procesos formativos actuales están sufriendo una reorganización y orientación desde los principios de gratuidad y masividad. A este tipo de formación se la ha denominado con la sigla inglesa MOOC (Massive On-line Open Course y ha irrumpido con fuerza en el contexto de la educación universitaria, planeándose un futuro excitante, inquietante y completamente impredecible según los últimos acontecimientos. El manuscrito que se presenta consiste en una firme e innovadora propuesta conceptual y práctica de lo que debería ser el avance metodológico del siglo XXI, en lo que al diseño de acciones educativas no formales organizadas desde la Educación Superior. Concretamente, se exponen los elementos clave que todo MOOC debiera tener para satisfacer metodológica y pedagógicamente al alumnado más exigente. El objetivo general de este trabajo era diseñar, producir y evaluar un curso sobre conceptualización y utilización didáctica de los códigos de respuesta rápida códigos QR, dirigido a estudiantes de cualquier nivel educativo. La evaluación de la propuesta fue realizada por estudiantes de Educación Primaria y de Pedagogía de la Facultad de Educación de la Universidad de Sevilla, arrojando resultados muy satisfactorios.

  5. MORSE Monte Carlo code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described

  6. Tokamak Systems Code

    International Nuclear Information System (INIS)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged

  7. Efficient Coding of Information: Huffman Coding -RE ...

    Indian Academy of Sciences (India)

    to a stream of equally-likely symbols so as to recover the original stream in the event of errors. The for- ... The source-coding problem is one of finding a mapping from U to a ... probability that the random variable X takes the value x written as ...

  8. NR-code: Nonlinear reconstruction code

    Science.gov (United States)

    Yu, Yu; Pen, Ue-Li; Zhu, Hong-Ming

    2018-04-01

    NR-code applies nonlinear reconstruction to the dark matter density field in redshift space and solves for the nonlinear mapping from the initial Lagrangian positions to the final redshift space positions; this reverses the large-scale bulk flows and improves the precision measurement of the baryon acoustic oscillations (BAO) scale.

  9. Synthesizing Certified Code

    Science.gov (United States)

    Whalen, Michael; Schumann, Johann; Fischer, Bernd

    2002-01-01

    Code certification is a lightweight approach to demonstrate software quality on a formal level. Its basic idea is to require producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates which can be checked independently. Since code certification uses the same underlying technology as program verification, it also requires many detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding theses annotations to the code is time-consuming and error-prone. We address this problem by combining code certification with automatic program synthesis. We propose an approach to generate simultaneously, from a high-level specification, code and all annotations required to certify generated code. Here, we describe a certification extension of AUTOBAYES, a synthesis tool which automatically generates complex data analysis programs from compact specifications. AUTOBAYES contains sufficient high-level domain knowledge to generate detailed annotations. This allows us to use a general-purpose verification condition generator to produce a set of proof obligations in first-order logic. The obligations are then discharged using the automated theorem E-SETHEO. We demonstrate our approach by certifying operator safety for a generated iterative data classification program without manual annotation of the code.

  10. Code of Ethics

    Science.gov (United States)

    Division for Early Childhood, Council for Exceptional Children, 2009

    2009-01-01

    The Code of Ethics of the Division for Early Childhood (DEC) of the Council for Exceptional Children is a public statement of principles and practice guidelines supported by the mission of DEC. The foundation of this Code is based on sound ethical reasoning related to professional practice with young children with disabilities and their families…

  11. Interleaved Product LDPC Codes

    OpenAIRE

    Baldi, Marco; Cancellieri, Giovanni; Chiaraluce, Franco

    2011-01-01

    Product LDPC codes take advantage of LDPC decoding algorithms and the high minimum distance of product codes. We propose to add suitable interleavers to improve the waterfall performance of LDPC decoding. Interleaving also reduces the number of low weight codewords, that gives a further advantage in the error floor region.

  12. Insurance billing and coding.

    Science.gov (United States)

    Napier, Rebecca H; Bruelheide, Lori S; Demann, Eric T K; Haug, Richard H

    2008-07-01

    The purpose of this article is to highlight the importance of understanding various numeric and alpha-numeric codes for accurately billing dental and medically related services to private pay or third-party insurance carriers. In the United States, common dental terminology (CDT) codes are most commonly used by dentists to submit claims, whereas current procedural terminology (CPT) and International Classification of Diseases, Ninth Revision, Clinical Modification (ICD.9.CM) codes are more commonly used by physicians to bill for their services. The CPT and ICD.9.CM coding systems complement each other in that CPT codes provide the procedure and service information and ICD.9.CM codes provide the reason or rationale for a particular procedure or service. These codes are more commonly used for "medical necessity" determinations, and general dentists and specialists who routinely perform care, including trauma-related care, biopsies, and dental treatment as a result of or in anticipation of a cancer-related treatment, are likely to use these codes. Claim submissions for care provided can be completed electronically or by means of paper forms.

  13. Error Correcting Codes

    Indian Academy of Sciences (India)

    Science and Automation at ... the Reed-Solomon code contained 223 bytes of data, (a byte ... then you have a data storage system with error correction, that ..... practical codes, storing such a table is infeasible, as it is generally too large.

  14. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Lene; Pries-Heje, Jan; Dalgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  15. RFQ simulation code

    International Nuclear Information System (INIS)

    Lysenko, W.P.

    1984-04-01

    We have developed the RFQLIB simulation system to provide a means to systematically generate the new versions of radio-frequency quadrupole (RFQ) linac simulation codes that are required by the constantly changing needs of a research environment. This integrated system simplifies keeping track of the various versions of the simulation code and makes it practical to maintain complete and up-to-date documentation. In this scheme, there is a certain standard version of the simulation code that forms a library upon which new versions are built. To generate a new version of the simulation code, the routines to be modified or added are appended to a standard command file, which contains the commands to compile the new routines and link them to the routines in the library. The library itself is rarely changed. Whenever the library is modified, however, this modification is seen by all versions of the simulation code, which actually exist as different versions of the command file. All code is written according to the rules of structured programming. Modularity is enforced by not using COMMON statements, simplifying the relation of the data flow to a hierarchy diagram. Simulation results are similar to those of the PARMTEQ code, as expected, because of the similar physical model. Different capabilities, such as those for generating beams matched in detail to the structure, are available in the new code for help in testing new ideas in designing RFQ linacs

  16. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 3. Error Correcting Codes - Reed Solomon Codes. Priti Shankar. Series Article Volume 2 Issue 3 March ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560 012, India ...

  17. 78 FR 18321 - International Code Council: The Update Process for the International Codes and Standards

    Science.gov (United States)

    2013-03-26

    ... Energy Conservation Code. International Existing Building Code. International Fire Code. International... Code. International Property Maintenance Code. International Residential Code. International Swimming Pool and Spa Code International Wildland-Urban Interface Code. International Zoning Code. ICC Standards...

  18. Validation of thermalhydraulic codes

    International Nuclear Information System (INIS)

    Wilkie, D.

    1992-01-01

    Thermalhydraulic codes require to be validated against experimental data collected over a wide range of situations if they are to be relied upon. A good example is provided by the nuclear industry where codes are used for safety studies and for determining operating conditions. Errors in the codes could lead to financial penalties, to the incorrect estimation of the consequences of accidents and even to the accidents themselves. Comparison between prediction and experiment is often described qualitatively or in approximate terms, e.g. ''agreement is within 10%''. A quantitative method is preferable, especially when several competing codes are available. The codes can then be ranked in order of merit. Such a method is described. (Author)

  19. Fracture flow code

    International Nuclear Information System (INIS)

    Dershowitz, W; Herbert, A.; Long, J.

    1989-03-01

    The hydrology of the SCV site will be modelled utilizing discrete fracture flow models. These models are complex, and can not be fully cerified by comparison to analytical solutions. The best approach for verification of these codes is therefore cross-verification between different codes. This is complicated by the variation in assumptions and solution techniques utilized in different codes. Cross-verification procedures are defined which allow comparison of the codes developed by Harwell Laboratory, Lawrence Berkeley Laboratory, and Golder Associates Inc. Six cross-verification datasets are defined for deterministic and stochastic verification of geometric and flow features of the codes. Additional datasets for verification of transport features will be documented in a future report. (13 figs., 7 tabs., 10 refs.) (authors)

  20. Uplink capacity of multi-class IEEE 802.16j relay networks with adaptive modulation and coding

    DEFF Research Database (Denmark)

    Wang, Hua; Xiong, C; Iversen, Villy Bæk

    2009-01-01

    The emerging IEEE 802.16j mobile multi-hop relay (MMR) network is currently being developed to increase the user throughput and extend the service coverage as an enhancement of existing 802.16e standard. In 802.16j, the intermediate relay stations (RSs) help the base station (BS) communicate...... with those mobile stations (MSs) that are either too far away from the BS or placed in an area where direct communication with BS experiences unsatisfactory level of service. In this paper, we investigate the uplink Erlang capacity of a two-hop 802.16j relay system supporting both voice and data traffics...... with adaptive modulation and coding (AMC) scheme applied in the physical layer. We first develop analytical models to calculate the blocking probability in the access zone and the outage probability in the relay zone, respectively. Then a joint algorithm is proposed to determine the bandwidth distribution...

  1. Huffman coding in advanced audio coding standard

    Science.gov (United States)

    Brzuchalski, Grzegorz

    2012-05-01

    This article presents several hardware architectures of Advanced Audio Coding (AAC) Huffman noiseless encoder, its optimisations and working implementation. Much attention has been paid to optimise the demand of hardware resources especially memory size. The aim of design was to get as short binary stream as possible in this standard. The Huffman encoder with whole audio-video system has been implemented in FPGA devices.

  2. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  3. Report number codes

    International Nuclear Information System (INIS)

    Nelson, R.N.

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name

  4. Raman spectroscopy: in vivo quick response code of skin physiological status

    Science.gov (United States)

    Vyumvuhore, Raoul; Tfayli, Ali; Piot, Olivier; Le Guillou, Maud; Guichard, Nathalie; Manfait, Michel; Baillet-Guffroy, Arlette

    2014-11-01

    Dermatologists need to combine different clinically relevant characteristics for a better understanding of skin health. These characteristics are usually measured by different techniques, and some of them are highly time consuming. Therefore, a predicting model based on Raman spectroscopy and partial least square (PLS) regression was developed as a rapid multiparametric method. The Raman spectra collected from the five uppermost micrometers of 11 healthy volunteers were fitted to different skin characteristics measured by independent appropriate methods (transepidermal water loss, hydration, pH, relative amount of ceramides, fatty acids, and cholesterol). For each parameter, the obtained PLS model presented correlation coefficients higher than R2=0.9. This model enables us to obtain all the aforementioned parameters directly from the unique Raman signature. In addition to that, in-depth Raman analyses down to 20 μm showed different balances between partially bound water and unbound water with depth. In parallel, the increase of depth was followed by an unfolding process of the proteins. The combinations of all these information led to a multiparametric investigation, which better characterizes the skin status. Raman signal can thus be used as a quick response code (QR code). This could help dermatologic diagnosis of physiological variations and presents a possible extension to pathological characterization.

  5. Chitosan/Fe spheres on the blue QR-19 dye degradation by photo Fenton processes using artificial or solar light; Esferas de quitosana/Fe na degradacao do corante azul QR-19 por processos foto-Fenton utilizando luz artificial ou solar

    Energy Technology Data Exchange (ETDEWEB)

    Souza, Kely V. de; Zamora, Patricio G.P.; Zawadzki, Sonia F. [Universidade Federal do Parana (DQ/UFPR), Curitiba, PR (Brazil). Dept. de Quimica], E-mail: zawadzki@quimica.ufpr.br

    2010-07-15

    The contamination of water resources is one of the greatest environmental problems today. Among the polluting sources are the textile industries due to the production of large volumes of effluent, often treated inefficiently. The main reason for the environmental impact of the rejected materials is the presence of dyes such as azo reactive compounds that can generate by-products with carcinogenic and mutagenic effects. They may also include anthraquinone type compounds, which are highly resistant to degradation and persist in the effluent for a long time. The purpose of this study is the use of photo-Fenton processes assisted by artificial or solar light, using immobilized iron on chitosan beads, crosslinked with glutaraldehyde, for the anthraquinone type compound Blue QR-19 standard dye degradation in aqueous solutions. The obtained spheres showed a regular size and 4.0 mm diameter. The results showed 90% discoloration of the system within 180 minutes and a 60% total organic carbon (TOC)reduction for the photo-Fenton system using artificial light. For the system using sunlight, the total discoloration was achieved in 120 minutes and the TOC value decreased 70%. Also observed was that iron remained in the polymeric matrix after the treatment, thus allowing reuse. (author)

  6. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  7. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  8. Transport theory and codes

    International Nuclear Information System (INIS)

    Clancy, B.E.

    1986-01-01

    This chapter begins with a neutron transport equation which includes the one dimensional plane geometry problems, the one dimensional spherical geometry problems, and numerical solutions. The section on the ANISN code and its look-alikes covers problems which can be solved; eigenvalue problems; outer iteration loop; inner iteration loop; and finite difference solution procedures. The input and output data for ANISN is also discussed. Two dimensional problems such as the DOT code are given. Finally, an overview of the Monte-Carlo methods and codes are elaborated on

  9. Gravity inversion code

    International Nuclear Information System (INIS)

    Burkhard, N.R.

    1979-01-01

    The gravity inversion code applies stabilized linear inverse theory to determine the topography of a subsurface density anomaly from Bouguer gravity data. The gravity inversion program consists of four source codes: SEARCH, TREND, INVERT, and AVERAGE. TREND and INVERT are used iteratively to converge on a solution. SEARCH forms the input gravity data files for Nevada Test Site data. AVERAGE performs a covariance analysis on the solution. This document describes the necessary input files and the proper operation of the code. 2 figures, 2 tables

  10. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  11. Supervised Convolutional Sparse Coding

    KAUST Repository

    Affara, Lama Ahmed; Ghanem, Bernard; Wonka, Peter

    2018-01-01

    coding, which aims at learning discriminative dictionaries instead of purely reconstructive ones. We incorporate a supervised regularization term into the traditional unsupervised CSC objective to encourage the final dictionary elements

  12. SASSYS LMFBR systems code

    International Nuclear Information System (INIS)

    Dunn, F.E.; Prohammer, F.G.; Weber, D.P.

    1983-01-01

    The SASSYS LMFBR systems analysis code is being developed mainly to analyze the behavior of the shut-down heat-removal system and the consequences of failures in the system, although it is also capable of analyzing a wide range of transients, from mild operational transients through more severe transients leading to sodium boiling in the core and possible melting of clad and fuel. The code includes a detailed SAS4A multi-channel core treatment plus a general thermal-hydraulic treatment of the primary and intermediate heat-transport loops and the steam generators. The code can handle any LMFBR design, loop or pool, with an arbitrary arrangement of components. The code is fast running: usually faster than real time

  13. OCA Code Enforcement

    Data.gov (United States)

    Montgomery County of Maryland — The Office of the County Attorney (OCA) processes Code Violation Citations issued by County agencies. The citations can be viewed by issued department, issued date...

  14. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  15. Code Disentanglement: Initial Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wohlbier, John Greaton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kelley, Timothy M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rockefeller, Gabriel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Calef, Matthew Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  16. Induction technology optimization code

    International Nuclear Information System (INIS)

    Caporaso, G.J.; Brooks, A.L.; Kirbie, H.C.

    1992-01-01

    A code has been developed to evaluate relative costs of induction accelerator driver systems for relativistic klystrons. The code incorporates beam generation, transport and pulsed power system constraints to provide an integrated design tool. The code generates an injector/accelerator combination which satisfies the top level requirements and all system constraints once a small number of design choices have been specified (rise time of the injector voltage and aspect ratio of the ferrite induction cores, for example). The code calculates dimensions of accelerator mechanical assemblies and values of all electrical components. Cost factors for machined parts, raw materials and components are applied to yield a total system cost. These costs are then plotted as a function of the two design choices to enable selection of an optimum design based on various criteria. (Author) 11 refs., 3 figs

  17. VT ZIP Code Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) A ZIP Code Tabulation Area (ZCTA) is a statistical geographic entity that approximates the delivery area for a U.S. Postal Service five-digit...

  18. Bandwidth efficient coding

    CERN Document Server

    Anderson, John B

    2017-01-01

    Bandwidth Efficient Coding addresses the major challenge in communication engineering today: how to communicate more bits of information in the same radio spectrum. Energy and bandwidth are needed to transmit bits, and bandwidth affects capacity the most. Methods have been developed that are ten times as energy efficient at a given bandwidth consumption as simple methods. These employ signals with very complex patterns and are called "coding" solutions. The book begins with classical theory before introducing new techniques that combine older methods of error correction coding and radio transmission in order to create narrowband methods that are as efficient in both spectrum and energy as nature allows. Other topics covered include modulation techniques such as CPM, coded QAM and pulse design.

  19. Reactor lattice codes

    International Nuclear Information System (INIS)

    Kulikowska, T.

    2001-01-01

    The description of reactor lattice codes is carried out on the example of the WIMSD-5B code. The WIMS code in its various version is the most recognised lattice code. It is used in all parts of the world for calculations of research and power reactors. The version WIMSD-5B is distributed free of charge by NEA Data Bank. The description of its main features given in the present lecture follows the aspects defined previously for lattice calculations in the lecture on Reactor Lattice Transport Calculations. The spatial models are described, and the approach to the energy treatment is given. Finally the specific algorithm applied in fuel depletion calculations is outlined. (author)

  20. Critical Care Coding for Neurologists.

    Science.gov (United States)

    Nuwer, Marc R; Vespa, Paul M

    2015-10-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  1. Lattice Index Coding

    OpenAIRE

    Natarajan, Lakshmi; Hong, Yi; Viterbo, Emanuele

    2014-01-01

    The index coding problem involves a sender with K messages to be transmitted across a broadcast channel, and a set of receivers each of which demands a subset of the K messages while having prior knowledge of a different subset as side information. We consider the specific case of noisy index coding where the broadcast channel is Gaussian and every receiver demands all the messages from the source. Instances of this communication problem arise in wireless relay networks, sensor networks, and ...

  2. Towards advanced code simulators

    International Nuclear Information System (INIS)

    Scriven, A.H.

    1990-01-01

    The Central Electricity Generating Board (CEGB) uses advanced thermohydraulic codes extensively to support PWR safety analyses. A system has been developed to allow fully interactive execution of any code with graphical simulation of the operator desk and mimic display. The system operates in a virtual machine environment, with the thermohydraulic code executing in one virtual machine, communicating via interrupts with any number of other virtual machines each running other programs and graphics drivers. The driver code itself does not have to be modified from its normal batch form. Shortly following the release of RELAP5 MOD1 in IBM compatible form in 1983, this code was used as the driver for this system. When RELAP5 MOD2 became available, it was adopted with no changes needed in the basic system. Overall the system has been used for some 5 years for the analysis of LOBI tests, full scale plant studies and for simple what-if studies. For gaining rapid understanding of system dependencies it has proved invaluable. The graphical mimic system, being independent of the driver code, has also been used with other codes to study core rewetting, to replay results obtained from batch jobs on a CRAY2 computer system and to display suitably processed experimental results from the LOBI facility to aid interpretation. For the above work real-time execution was not necessary. Current work now centers on implementing the RELAP 5 code on a true parallel architecture machine. Marconi Simulation have been contracted to investigate the feasibility of using upwards of 100 processors, each capable of a peak of 30 MIPS to run a highly detailed RELAP5 model in real time, complete with specially written 3D core neutronics and balance of plant models. This paper describes the experience of using RELAP5 as an analyzer/simulator, and outlines the proposed methods and problems associated with parallel execution of RELAP5

  3. Cracking the Gender Codes

    DEFF Research Database (Denmark)

    Rennison, Betina Wolfgang

    2016-01-01

    extensive work to raise the proportion of women. This has helped slightly, but women remain underrepresented at the corporate top. Why is this so? What can be done to solve it? This article presents five different types of answers relating to five discursive codes: nature, talent, business, exclusion...... in leadership management, we must become more aware and take advantage of this complexity. We must crack the codes in order to crack the curve....

  4. Selection of tRNA charging quality control mechanisms that increase mistranslation of the genetic code

    DEFF Research Database (Denmark)

    Yadavalli, Srujana S; Ibba, Michael

    2013-01-01

    Mistranslation can follow two events during protein synthesis: production of non-cognate amino acid:transfer RNA (tRNA) pairs by aminoacyl-tRNA synthetases (aaRSs) and inaccurate selection of aminoacyl-tRNAs by the ribosome. Many aaRSs actively edit non-cognate amino acids, but editing mechanisms...

  5. PEAR code review

    International Nuclear Information System (INIS)

    De Wit, R.; Jamieson, T.; Lord, M.; Lafortune, J.F.

    1997-07-01

    As a necessary component in the continuous improvement and refinement of methodologies employed in the nuclear industry, regulatory agencies need to periodically evaluate these processes to improve confidence in results and ensure appropriate levels of safety are being achieved. The independent and objective review of industry-standard computer codes forms an essential part of this program. To this end, this work undertakes an in-depth review of the computer code PEAR (Public Exposures from Accidental Releases), developed by Atomic Energy of Canada Limited (AECL) to assess accidental releases from CANDU reactors. PEAR is based largely on the models contained in the Canadian Standards Association (CSA) N288.2-M91. This report presents the results of a detailed technical review of the PEAR code to identify any variations from the CSA standard and other supporting documentation, verify the source code, assess the quality of numerical models and results, and identify general strengths and weaknesses of the code. The version of the code employed in this review is the one which AECL intends to use for CANDU 9 safety analyses. (author)

  6. KENO-V code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The KENO-V code is the current release of the Oak Ridge multigroup Monte Carlo criticality code development. The original KENO, with 16 group Hansen-Roach cross sections and P 1 scattering, was one ot the first multigroup Monte Carlo codes and it and its successors have always been a much-used research tool for criticality studies. KENO-V is able to accept large neutron cross section libraries (a 218 group set is distributed with the code) and has a general P/sub N/ scattering capability. A supergroup feature allows execution of large problems on small computers, but at the expense of increased calculation time and system input/output operations. This supergroup feature is activated automatically by the code in a manner which utilizes as much computer memory as is available. The primary purpose of KENO-V is to calculate the system k/sub eff/, from small bare critical assemblies to large reflected arrays of differing fissile and moderator elements. In this respect KENO-V neither has nor requires the many options and sophisticated biasing techniques of general Monte Carlo codes

  7. Code, standard and specifications

    International Nuclear Information System (INIS)

    Abdul Nassir Ibrahim; Azali Muhammad; Ab. Razak Hamzah; Abd. Aziz Mohamed; Mohamad Pauzi Ismail

    2008-01-01

    Radiography also same as the other technique, it need standard. This standard was used widely and method of used it also regular. With that, radiography testing only practical based on regulations as mentioned and documented. These regulation or guideline documented in code, standard and specifications. In Malaysia, level one and basic radiographer can do radiography work based on instruction give by level two or three radiographer. This instruction was produced based on guideline that mention in document. Level two must follow the specifications mentioned in standard when write the instruction. From this scenario, it makes clearly that this radiography work is a type of work that everything must follow the rule. For the code, the radiography follow the code of American Society for Mechanical Engineer (ASME) and the only code that have in Malaysia for this time is rule that published by Atomic Energy Licensing Board (AELB) known as Practical code for radiation Protection in Industrial radiography. With the existence of this code, all the radiography must follow the rule or standard regulated automatically.

  8. Fast Coding Unit Encoding Mechanism for Low Complexity Video Coding

    OpenAIRE

    Gao, Yuan; Liu, Pengyu; Wu, Yueying; Jia, Kebin; Gao, Guandong

    2016-01-01

    In high efficiency video coding (HEVC), coding tree contributes to excellent compression performance. However, coding tree brings extremely high computational complexity. Innovative works for improving coding tree to further reduce encoding time are stated in this paper. A novel low complexity coding tree mechanism is proposed for HEVC fast coding unit (CU) encoding. Firstly, this paper makes an in-depth study of the relationship among CU distribution, quantization parameter (QP) and content ...

  9. SPECTRAL AMPLITUDE CODING OCDMA SYSTEMS USING ENHANCED DOUBLE WEIGHT CODE

    Directory of Open Access Journals (Sweden)

    F.N. HASOON

    2006-12-01

    Full Text Available A new code structure for spectral amplitude coding optical code division multiple access systems based on double weight (DW code families is proposed. The DW has a fixed weight of two. Enhanced double-weight (EDW code is another variation of a DW code family that can has a variable weight greater than one. The EDW code possesses ideal cross-correlation properties and exists for every natural number n. A much better performance can be provided by using the EDW code compared to the existing code such as Hadamard and Modified Frequency-Hopping (MFH codes. It has been observed that theoretical analysis and simulation for EDW is much better performance compared to Hadamard and Modified Frequency-Hopping (MFH codes.

  10. Nuclear code abstracts (1975 edition)

    International Nuclear Information System (INIS)

    Akanuma, Makoto; Hirakawa, Takashi

    1976-02-01

    Nuclear Code Abstracts is compiled in the Nuclear Code Committee to exchange information of the nuclear code developments among members of the committee. Enlarging the collection, the present one includes nuclear code abstracts obtained in 1975 through liaison officers of the organizations in Japan participating in the Nuclear Energy Agency's Computer Program Library at Ispra, Italy. The classification of nuclear codes and the format of code abstracts are the same as those in the library. (auth.)

  11. Some new ternary linear codes

    Directory of Open Access Journals (Sweden)

    Rumen Daskalov

    2017-07-01

    Full Text Available Let an $[n,k,d]_q$ code be a linear code of length $n$, dimension $k$ and minimum Hamming distance $d$ over $GF(q$. One of the most important problems in coding theory is to construct codes with optimal minimum distances. In this paper 22 new ternary linear codes are presented. Two of them are optimal. All new codes improve the respective lower bounds in [11].

  12. Reconstruction of Magnetic Field Surfaces of the NOVILLO Tokamak by means of the 3D-MAPTOR Code

    International Nuclear Information System (INIS)

    Chavez-Alarcon, Esteban; Herrera-Velazquez, J. Julio E.

    2008-01-01

    A 3-D code has been developed in order to simulate the magnetic field lines in circular cross-section tokamaks. The toroidal magnetic field can be obtained from the individual fields of circular coils arranged around the torus, or alternatively, as a ripple-less field, as well as the vertical field coils, and divertor-like coils. The poloidal field is provided by a given toroidal current density profile. Proposing initial conditions for a magnetic filed line, it is integrated along the toroidal angle coordinate, and the Poincare maps can be obtained at any desired cross section plane along the torus. Following this procedure, the code allows to explore the necessary current values for the existence of magnetic field surfaces, allowing for deviations from axial symmetry, such as ripple effects. Therefore it is a good design instrument, in which different parameters and arrangements of coils can be tested. On the other hand, the current signals from experimental devices can be used in order to reconstruct the behaviour of the magnetic field surfaces, including the q(r) profiles. The reconstruction properties of the code are shown in this work

  13. ACE - Manufacturer Identification Code (MID)

    Data.gov (United States)

    Department of Homeland Security — The ACE Manufacturer Identification Code (MID) application is used to track and control identifications codes for manufacturers. A manufacturer is identified on an...

  14. Algebraic and stochastic coding theory

    CERN Document Server

    Kythe, Dave K

    2012-01-01

    Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.

  15. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  16. The Aster code

    International Nuclear Information System (INIS)

    Delbecq, J.M.

    1999-01-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  17. Adaptive distributed source coding.

    Science.gov (United States)

    Varodayan, David; Lin, Yao-Chung; Girod, Bernd

    2012-05-01

    We consider distributed source coding in the presence of hidden variables that parameterize the statistical dependence among sources. We derive the Slepian-Wolf bound and devise coding algorithms for a block-candidate model of this problem. The encoder sends, in addition to syndrome bits, a portion of the source to the decoder uncoded as doping bits. The decoder uses the sum-product algorithm to simultaneously recover the source symbols and the hidden statistical dependence variables. We also develop novel techniques based on density evolution (DE) to analyze the coding algorithms. We experimentally confirm that our DE analysis closely approximates practical performance. This result allows us to efficiently optimize parameters of the algorithms. In particular, we show that the system performs close to the Slepian-Wolf bound when an appropriate doping rate is selected. We then apply our coding and analysis techniques to a reduced-reference video quality monitoring system and show a bit rate saving of about 75% compared with fixed-length coding.

  18. Speech coding code- excited linear prediction

    CERN Document Server

    Bäckström, Tom

    2017-01-01

    This book provides scientific understanding of the most central techniques used in speech coding both for advanced students as well as professionals with a background in speech audio and or digital signal processing. It provides a clear connection between the whys hows and whats thus enabling a clear view of the necessity purpose and solutions provided by various tools as well as their strengths and weaknesses in each respect Equivalently this book sheds light on the following perspectives for each technology presented Objective What do we want to achieve and especially why is this goal important Resource Information What information is available and how can it be useful and Resource Platform What kind of platforms are we working with and what are their capabilities restrictions This includes computational memory and acoustic properties and the transmission capacity of devices used. The book goes on to address Solutions Which solutions have been proposed and how can they be used to reach the stated goals and ...

  19. Spatially coded backscatter radiography

    International Nuclear Information System (INIS)

    Thangavelu, S.; Hussein, E.M.A.

    2007-01-01

    Conventional radiography requires access to two opposite sides of an object, which makes it unsuitable for the inspection of extended and/or thick structures (airframes, bridges, floors etc.). Backscatter imaging can overcome this problem, but the indications obtained are difficult to interpret. This paper applies the coded aperture technique to gamma-ray backscatter-radiography in order to enhance the detectability of flaws. This spatial coding method involves the positioning of a mask with closed and open holes to selectively permit or block the passage of radiation. The obtained coded-aperture indications are then mathematically decoded to detect the presence of anomalies. Indications obtained from Monte Carlo calculations were utilized in this work to simulate radiation scattering measurements. These simulated measurements were used to investigate the applicability of this technique to the detection of flaws by backscatter radiography

  20. Aztheca Code; Codigo Aztheca

    Energy Technology Data Exchange (ETDEWEB)

    Quezada G, S.; Espinosa P, G. [Universidad Autonoma Metropolitana, Unidad Iztapalapa, San Rafael Atlixco No. 186, Col. Vicentina, 09340 Ciudad de Mexico (Mexico); Centeno P, J.; Sanchez M, H., E-mail: sequga@gmail.com [UNAM, Facultad de Ingenieria, Ciudad Universitaria, Circuito Exterior s/n, 04510 Ciudad de Mexico (Mexico)

    2017-09-15

    This paper presents the Aztheca code, which is formed by the mathematical models of neutron kinetics, power generation, heat transfer, core thermo-hydraulics, recirculation systems, dynamic pressure and level models and control system. The Aztheca code is validated with plant data, as well as with predictions from the manufacturer when the reactor operates in a stationary state. On the other hand, to demonstrate that the model is applicable during a transient, an event occurred in a nuclear power plant with a BWR reactor is selected. The plant data are compared with the results obtained with RELAP-5 and the Aztheca model. The results show that both RELAP-5 and the Aztheca code have the ability to adequately predict the behavior of the reactor. (Author)

  1. The Coding Question.

    Science.gov (United States)

    Gallistel, C R

    2017-07-01

    Recent electrophysiological results imply that the duration of the stimulus onset asynchrony in eyeblink conditioning is encoded by a mechanism intrinsic to the cerebellar Purkinje cell. This raises the general question - how is quantitative information (durations, distances, rates, probabilities, amounts, etc.) transmitted by spike trains and encoded into engrams? The usual assumption is that information is transmitted by firing rates. However, rate codes are energetically inefficient and computationally awkward. A combinatorial code is more plausible. If the engram consists of altered synaptic conductances (the usual assumption), then we must ask how numbers may be written to synapses. It is much easier to formulate a coding hypothesis if the engram is realized by a cell-intrinsic molecular mechanism. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Revised SRAC code system

    International Nuclear Information System (INIS)

    Tsuchihashi, Keichiro; Ishiguro, Yukio; Kaneko, Kunio; Ido, Masaru.

    1986-09-01

    Since the publication of JAERI-1285 in 1983 for the preliminary version of the SRAC code system, a number of additions and modifications to the functions have been made to establish an overall neutronics code system. Major points are (1) addition of JENDL-2 version of data library, (2) a direct treatment of doubly heterogeneous effect on resonance absorption, (3) a generalized Dancoff factor, (4) a cell calculation based on the fixed boundary source problem, (5) the corresponding edit required for experimental analysis and reactor design, (6) a perturbation theory calculation for reactivity change, (7) an auxiliary code for core burnup and fuel management, etc. This report is a revision of the users manual which consists of the general description, input data requirements and their explanation, detailed information on usage, mathematics, contents of libraries and sample I/O. (author)

  3. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  4. Esferas de quitosana/Fe na degradação do corante Azul QR-19 por processos foto-Fenton utilizando luz artificial ou solar Chitosan/Fe spheres on the Blue QR-19 dye degradation by photo Fenton processes using artificial or solar light

    Directory of Open Access Journals (Sweden)

    Kely V. de Souza

    2010-09-01

    Full Text Available A contaminação dos recursos hídricos é um dos maiores problemas ambientais da atualidade. Dentre as várias fontes poluidoras, destacam-se as indústrias têxteis, por serem fontes geradoras de grandes volumes de efluentes, muitas vezes tratados de maneira ineficiente. A principal causa do grande impacto ambiental decorrente deste descarte é a presença dos corantes, tais como os compostos do tipo azo, que podem gerar subprodutos de caráter carcinogênico e/ou mutagênico, ou como os de base antraquinona, que são muito resistentes à degradação natural e portanto persistem no efluente por um longo tempo. O objetivo do presente trabalho consiste na utilização de processos foto-Fenton assistidos por luz artificial e solar, utilizando ferro imobilizado em esferas de quitosana reticulada com glutaraldeído, para promover a degradação do corante reativo Azul QR-19, de base antraquinona, em solução aquosa. As esferas obtidas apresentaram tamanho regular com diâmetro de 4,0 mm. Os resultados demonstraram 90% de descoloração do sistema em 180minutos e redução de 60% do teor de carbono orgânico total (COT, para o sistema foto-Fenton utilizando luz artificial. Para o sistema fotoassistido com luz solar, a descoloração foi integralmente obtida em 120 minutos com 70% de redução do teor de COT. Foi observado que o ferro permaneceu na matriz após o tratamento, possibilitando sua reutilização.The contamination of water resources is one of the greatest environmental problems today. Among the polluting sources are the textile industries due to the production of large volumes of effluent, often treated inefficiently. The main reason for the environmental impact of the rejected materials is the presence of dyes such as azo reactive compounds that can generate by-products with carcinogenic and mutagenic effects. They may also include anthraquinone type compounds, which are highly resistant to degradation and persist in the effluent for a

  5. The correspondence between projective codes and 2-weight codes

    NARCIS (Netherlands)

    Brouwer, A.E.; Eupen, van M.J.M.; Tilborg, van H.C.A.; Willems, F.M.J.

    1994-01-01

    The hyperplanes intersecting a 2-weight code in the same number of points obviously form the point set of a projective code. On the other hand, if we have a projective code C, then we can make a 2-weight code by taking the multiset of points E PC with multiplicity "Y(w), where W is the weight of

  6. Visualizing code and coverage changes for code review

    NARCIS (Netherlands)

    Oosterwaal, Sebastiaan; van Deursen, A.; De Souza Coelho, R.; Sawant, A.A.; Bacchelli, A.

    2016-01-01

    One of the tasks of reviewers is to verify that code modifications are well tested. However, current tools offer little support in understanding precisely how changes to the code relate to changes to the tests. In particular, it is hard to see whether (modified) test code covers the changed code.

  7. Turbo-Gallager Codes: The Emergence of an Intelligent Coding ...

    African Journals Online (AJOL)

    Today, both turbo codes and low-density parity-check codes are largely superior to other code families and are being used in an increasing number of modern communication systems including 3G standards, satellite and deep space communications. However, the two codes have certain distinctive characteristics that ...

  8. Code of Medical Ethics

    Directory of Open Access Journals (Sweden)

    . SZD-SZZ

    2017-03-01

    Full Text Available Te Code was approved on December 12, 1992, at the 3rd regular meeting of the General Assembly of the Medical Chamber of Slovenia and revised on April 24, 1997, at the 27th regular meeting of the General Assembly of the Medical Chamber of Slovenia. The Code was updated and harmonized with the Medical Association of Slovenia and approved on October 6, 2016, at the regular meeting of the General Assembly of the Medical Chamber of Slovenia.

  9. Supervised Convolutional Sparse Coding

    KAUST Repository

    Affara, Lama Ahmed

    2018-04-08

    Convolutional Sparse Coding (CSC) is a well-established image representation model especially suited for image restoration tasks. In this work, we extend the applicability of this model by proposing a supervised approach to convolutional sparse coding, which aims at learning discriminative dictionaries instead of purely reconstructive ones. We incorporate a supervised regularization term into the traditional unsupervised CSC objective to encourage the final dictionary elements to be discriminative. Experimental results show that using supervised convolutional learning results in two key advantages. First, we learn more semantically relevant filters in the dictionary and second, we achieve improved image reconstruction on unseen data.

  10. CONCEPT computer code

    International Nuclear Information System (INIS)

    Delene, J.

    1984-01-01

    CONCEPT is a computer code that will provide conceptual capital investment cost estimates for nuclear and coal-fired power plants. The code can develop an estimate for construction at any point in time. Any unit size within the range of about 400 to 1300 MW electric may be selected. Any of 23 reference site locations across the United States and Canada may be selected. PWR, BWR, and coal-fired plants burning high-sulfur and low-sulfur coal can be estimated. Multiple-unit plants can be estimated. Costs due to escalation/inflation and interest during construction are calculated

  11. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  12. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...... includes a reformulation of the usual methods to estimate the minimum distances of evaluation codes into the setting of affine variety codes. Finally we describe the connection to the theory of one-pointgeometric Goppa codes. Contents 4.1 Introduction...... . . . . . . . . . . . . . . . . . . . . . . . 171 4.9 Codes form order domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 4.10 One-point geometric Goppa codes . . . . . . . . . . . . . . . . . . . . . . . . 176 4.11 Bibliographical Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 References...

  13. A Study on the use of Facebook, RSS, Blogs and Twitter (Web2.0) among selected academic libraries from 6 Gulf countries namely: Kingdom of Saudi Arabia, United Arab Emirates, Qatar, Bahrain, Oman and Kuwait

    KAUST Repository

    Ramli, Rindra M.

    2014-04-01

    This paper aims to explore and study the current usage trends of Web2.0 namely Facebook, RSS, Blogs and Twitter among selected higher education institutions’ libraries in 6 gulf countries namely: Kingdom of Saudi Arabia, United Arab Emirates, Qatar, Bahrain, Oman and Kuwait. Websites of the selected libraries would be compared on the extent of the usage of these tools, the participation level and their purpose. The author would also share his opinion and suggestions on improving the current trends pertaining to the area of Web2.0 and libraries. The impact and importance of Web2.0 on libraries cannot be disputed. Since gaining popularity in mid-2000, libraries around the globe have jumped onto the Web2.0 bandwagon. Among the common examples of Web2.0 used by libraries today are namely: social networking sites, blogs, wikis, folksonomies and video sharing sites. Libraries are using Web2.0 to (among others): • market their services / resources to their community, • announce latest library news, • provide their online guides / notes for their resources among others. Though such tools have been implemented by most libraries around the world, some of the challenges faced by libraries are: •participation level – casting the net to a wider audience •selection of web2.0 tools •effectiveness of present web2.0 tools used by the libraries

  14. Dual Coding in Children.

    Science.gov (United States)

    Burton, John K.; Wildman, Terry M.

    The purpose of this study was to test the applicability of the dual coding hypothesis to children's recall performance. The hypothesis predicts that visual interference will have a small effect on the recall of visually presented words or pictures, but that acoustic interference will cause a decline in recall of visually presented words and…

  15. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  16. Radioactive action code

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    A new coding system, 'Hazrad', for buildings and transportation containers for alerting emergency services personnel to the presence of radioactive materials has been developed in the United Kingdom. The hazards of materials in the buildings or transport container, together with the recommended emergency action, are represented by a number of codes which are marked on the building or container and interpreted from a chart carried as a pocket-size guide. Buildings would be marked with the familiar yellow 'radioactive' trefoil, the written information 'Radioactive materials' and a list of isotopes. Under this the 'Hazrad' code would be written - three symbols to denote the relative radioactive risk (low, medium or high), the biological risk (also low, medium or high) and the third showing the type of radiation emitted, alpha, beta or gamma. The response cards indicate appropriate measures to take, eg for a high biological risk, Bio3, the wearing of a gas-tight protection suit is advised. The code and its uses are explained. (U.K.)

  17. Building Codes and Regulations.

    Science.gov (United States)

    Fisher, John L.

    The hazard of fire is of great concern to libraries due to combustible books and new plastics used in construction and interiors. Building codes and standards can offer architects and planners guidelines to follow but these standards should be closely monitored, updated, and researched for fire prevention. (DS)

  18. Physics of codes

    International Nuclear Information System (INIS)

    Cooper, R.K.; Jones, M.E.

    1989-01-01

    The title given this paper is a bit presumptuous, since one can hardly expect to cover the physics incorporated into all the codes already written and currently being written. The authors focus on those codes which have been found to be particularly useful in the analysis and design of linacs. At that the authors will be a bit parochial and discuss primarily those codes used for the design of radio-frequency (rf) linacs, although the discussions of TRANSPORT and MARYLIE have little to do with the time structures of the beams being analyzed. The plan of this paper is first to describe rather simply the concepts of emittance and brightness, then to describe rather briefly each of the codes TRANSPORT, PARMTEQ, TBCI, MARYLIE, and ISIS, indicating what physics is and is not included in each of them. It is expected that the vast majority of what is covered will apply equally well to protons and electrons (and other particles). This material is intended to be tutorial in nature and can in no way be expected to be exhaustive. 31 references, 4 figures

  19. Reliability and code level

    NARCIS (Netherlands)

    Kasperski, M.; Geurts, C.P.W.

    2005-01-01

    The paper describes the work of the IAWE Working Group WBG - Reliability and Code Level, one of the International Codification Working Groups set up at ICWE10 in Copenhagen. The following topics are covered: sources of uncertainties in the design wind load, appropriate design target values for the

  20. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  1. CERN Code of Conduct

    CERN Document Server

    Department, HR

    2010-01-01

    The Code is intended as a guide in helping us, as CERN contributors, to understand how to conduct ourselves, treat others and expect to be treated. It is based around the five core values of the Organization. We should all become familiar with it and try to incorporate it into our daily life at CERN.

  2. Nuclear safety code study

    Energy Technology Data Exchange (ETDEWEB)

    Hu, H.H.; Ford, D.; Le, H.; Park, S.; Cooke, K.L.; Bleakney, T.; Spanier, J.; Wilburn, N.P.; O' Reilly, B.; Carmichael, B.

    1981-01-01

    The objective is to analyze an overpower accident in an LMFBR. A simplified model of the primary coolant loop was developed in order to understand the instabilities encountered with the MELT III and SAS codes. The computer programs were translated for switching to the IBM 4331. Numerical methods were investigated for solving the neutron kinetics equations; the Adams and Gear methods were compared. (DLC)

  3. Revised C++ coding conventions

    CERN Document Server

    Callot, O

    2001-01-01

    This document replaces the note LHCb 98-049 by Pavel Binko. After a few years of practice, some simplification and clarification of the rules was needed. As many more people have now some experience in writing C++ code, their opinion was also taken into account to get a commonly agreed set of conventions

  4. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and

  5. Error Correcting Codes -34 ...

    Indian Academy of Sciences (India)

    information and coding theory. A large scale relay computer had failed to deliver the expected results due to a hardware fault. Hamming, one of the active proponents of computer usage, was determined to find an efficient means by which computers could detect and correct their own faults. A mathematician by train-.

  6. Broadcast Coded Slotted ALOHA

    DEFF Research Database (Denmark)

    Ivanov, Mikhail; Brännström, Frederik; Graell i Amat, Alexandre

    2016-01-01

    We propose an uncoordinated medium access control (MAC) protocol, called all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all broadcast with strict latency constraints. In B-CSA, each user acts as both transmitter and receiver in a half-duplex mode. The half-duplex mode gives ...

  7. Software Defined Coded Networking

    DEFF Research Database (Denmark)

    Di Paola, Carla; Roetter, Daniel Enrique Lucani; Palazzo, Sergio

    2017-01-01

    the quality of each link and even across neighbouring links and using simulations to show that an additional reduction of packet transmission in the order of 40% is possible. Second, to advocate for the use of network coding (NC) jointly with software defined networking (SDN) providing an implementation...

  8. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  9. (Almost) practical tree codes

    KAUST Repository

    Khina, Anatoly

    2016-08-15

    We consider the problem of stabilizing an unstable plant driven by bounded noise over a digital noisy communication link, a scenario at the heart of networked control. To stabilize such a plant, one needs real-time encoding and decoding with an error probability profile that decays exponentially with the decoding delay. The works of Schulman and Sahai over the past two decades have developed the notions of tree codes and anytime capacity, and provided the theoretical framework for studying such problems. Nonetheless, there has been little practical progress in this area due to the absence of explicit constructions of tree codes with efficient encoding and decoding algorithms. Recently, linear time-invariant tree codes were proposed to achieve the desired result under maximum-likelihood decoding. In this work, we take one more step towards practicality, by showing that these codes can be efficiently decoded using sequential decoding algorithms, up to some loss in performance (and with some practical complexity caveats). We supplement our theoretical results with numerical simulations that demonstrate the effectiveness of the decoder in a control system setting.

  10. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    having a probability Pi of being equal to a 1. Let us assume ... equal to a 0/1 has no bearing on the probability of the. It is often ... bits (call this set S) whose individual bits add up to zero ... In the context of binary error-correct~ng codes, specifi-.

  11. The Redox Code.

    Science.gov (United States)

    Jones, Dean P; Sies, Helmut

    2015-09-20

    The redox code is a set of principles that defines the positioning of the nicotinamide adenine dinucleotide (NAD, NADP) and thiol/disulfide and other redox systems as well as the thiol redox proteome in space and time in biological systems. The code is richly elaborated in an oxygen-dependent life, where activation/deactivation cycles involving O₂ and H₂O₂ contribute to spatiotemporal organization for differentiation, development, and adaptation to the environment. Disruption of this organizational structure during oxidative stress represents a fundamental mechanism in system failure and disease. Methodology in assessing components of the redox code under physiological conditions has progressed, permitting insight into spatiotemporal organization and allowing for identification of redox partners in redox proteomics and redox metabolomics. Complexity of redox networks and redox regulation is being revealed step by step, yet much still needs to be learned. Detailed knowledge of the molecular patterns generated from the principles of the redox code under defined physiological or pathological conditions in cells and organs will contribute to understanding the redox component in health and disease. Ultimately, there will be a scientific basis to a modern redox medicine.

  12. Z₂-double cyclic codes

    OpenAIRE

    Borges, J.

    2014-01-01

    A binary linear code C is a Z2-double cyclic code if the set of coordinates can be partitioned into two subsets such that any cyclic shift of the coordinates of both subsets leaves invariant the code. These codes can be identified as submodules of the Z2[x]-module Z2[x]/(x^r − 1) × Z2[x]/(x^s − 1). We determine the structure of Z2-double cyclic codes giving the generator polynomials of these codes. The related polynomial representation of Z2-double cyclic codes and its duals, and the relation...

  13. Coding for urologic office procedures.

    Science.gov (United States)

    Dowling, Robert A; Painter, Mark

    2013-11-01

    This article summarizes current best practices for documenting, coding, and billing common office-based urologic procedures. Topics covered include general principles, basic and advanced urologic coding, creation of medical records that support compliant coding practices, bundled codes and unbundling, global periods, modifiers for procedure codes, when to bill for evaluation and management services during the same visit, coding for supplies, and laboratory and radiology procedures pertinent to urology practice. Detailed information is included for the most common urology office procedures, and suggested resources and references are provided. This information is of value to physicians, office managers, and their coding staff. Copyright © 2013 Elsevier Inc. All rights reserved.

  14. Essential idempotents and simplex codes

    Directory of Open Access Journals (Sweden)

    Gladys Chalom

    2017-01-01

    Full Text Available We define essential idempotents in group algebras and use them to prove that every mininmal abelian non-cyclic code is a repetition code. Also we use them to prove that every minimal abelian code is equivalent to a minimal cyclic code of the same length. Finally, we show that a binary cyclic code is simplex if and only if is of length of the form $n=2^k-1$ and is generated by an essential idempotent.

  15. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...

  16. Entanglement-assisted quantum MDS codes constructed from negacyclic codes

    Science.gov (United States)

    Chen, Jianzhang; Huang, Yuanyuan; Feng, Chunhui; Chen, Riqing

    2017-12-01

    Recently, entanglement-assisted quantum codes have been constructed from cyclic codes by some scholars. However, how to determine the number of shared pairs required to construct entanglement-assisted quantum codes is not an easy work. In this paper, we propose a decomposition of the defining set of negacyclic codes. Based on this method, four families of entanglement-assisted quantum codes constructed in this paper satisfy the entanglement-assisted quantum Singleton bound, where the minimum distance satisfies q+1 ≤ d≤ n+2/2. Furthermore, we construct two families of entanglement-assisted quantum codes with maximal entanglement.

  17. Fast Maximum-Likelihood Decoder for Quasi-Orthogonal Space-Time Block Code

    Directory of Open Access Journals (Sweden)

    Adel Ahmadi

    2015-01-01

    Full Text Available Motivated by the decompositions of sphere and QR-based methods, in this paper we present an extremely fast maximum-likelihood (ML detection approach for quasi-orthogonal space-time block code (QOSTBC. The proposed algorithm with a relatively simple design exploits structure of quadrature amplitude modulation (QAM constellations to achieve its goal and can be extended to any arbitrary constellation. Our decoder utilizes a new decomposition technique for ML metric which divides the metric into independent positive parts and a positive interference part. Search spaces of symbols are substantially reduced by employing the independent parts and statistics of noise. Symbols within the search spaces are successively evaluated until the metric is minimized. Simulation results confirm that the proposed decoder’s performance is superior to many of the recently published state-of-the-art solutions in terms of complexity level. More specifically, it was possible to verify that application of the new algorithms with 1024-QAM would decrease the computational complexity compared to state-of-the-art solution with 16-QAM.

  18. Efficient convolutional sparse coding

    Science.gov (United States)

    Wohlberg, Brendt

    2017-06-20

    Computationally efficient algorithms may be applied for fast dictionary learning solving the convolutional sparse coding problem in the Fourier domain. More specifically, efficient convolutional sparse coding may be derived within an alternating direction method of multipliers (ADMM) framework that utilizes fast Fourier transforms (FFT) to solve the main linear system in the frequency domain. Such algorithms may enable a significant reduction in computational cost over conventional approaches by implementing a linear solver for the most critical and computationally expensive component of the conventional iterative algorithm. The theoretical computational cost of the algorithm may be reduced from O(M.sup.3N) to O(MN log N), where N is the dimensionality of the data and M is the number of elements in the dictionary. This significant improvement in efficiency may greatly increase the range of problems that can practically be addressed via convolutional sparse representations.

  19. Coded Network Function Virtualization

    DEFF Research Database (Denmark)

    Al-Shuwaili, A.; Simone, O.; Kliewer, J.

    2016-01-01

    Network function virtualization (NFV) prescribes the instantiation of network functions on general-purpose network devices, such as servers and switches. While yielding a more flexible and cost-effective network architecture, NFV is potentially limited by the fact that commercial off......-the-shelf hardware is less reliable than the dedicated network elements used in conventional cellular deployments. The typical solution for this problem is to duplicate network functions across geographically distributed hardware in order to ensure diversity. In contrast, this letter proposes to leverage channel...... coding in order to enhance the robustness on NFV to hardware failure. The proposed approach targets the network function of uplink channel decoding, and builds on the algebraic structure of the encoded data frames in order to perform in-network coding on the signals to be processed at different servers...

  20. The NIMROD Code

    Science.gov (United States)

    Schnack, D. D.; Glasser, A. H.

    1996-11-01

    NIMROD is a new code system that is being developed for the analysis of modern fusion experiments. It is being designed from the beginning to make the maximum use of massively parallel computer architectures and computer graphics. The NIMROD physics kernel solves the three-dimensional, time-dependent two-fluid equations with neo-classical effects in toroidal geometry of arbitrary poloidal cross section. The NIMROD system also includes a pre-processor, a grid generator, and a post processor. User interaction with NIMROD is facilitated by a modern graphical user interface (GUI). The NIMROD project is using Quality Function Deployment (QFD) team management techniques to minimize re-engineering and reduce code development time. This paper gives an overview of the NIMROD project. Operation of the GUI is demonstrated, and the first results from the physics kernel are given.

  1. Computer code FIT

    International Nuclear Information System (INIS)

    Rohmann, D.; Koehler, T.

    1987-02-01

    This is a description of the computer code FIT, written in FORTRAN-77 for a PDP 11/34. FIT is an interactive program to decude position, width and intensity of lines of X-ray spectra (max. length of 4K channels). The lines (max. 30 lines per fit) may have Gauss- or Voigt-profile, as well as exponential tails. Spectrum and fit can be displayed on a Tektronix terminal. (orig.) [de

  2. Discrete Sparse Coding.

    Science.gov (United States)

    Exarchakis, Georgios; Lücke, Jörg

    2017-11-01

    Sparse coding algorithms with continuous latent variables have been the subject of a large number of studies. However, discrete latent spaces for sparse coding have been largely ignored. In this work, we study sparse coding with latents described by discrete instead of continuous prior distributions. We consider the general case in which the latents (while being sparse) can take on any value of a finite set of possible values and in which we learn the prior probability of any value from data. This approach can be applied to any data generated by discrete causes, and it can be applied as an approximation of continuous causes. As the prior probabilities are learned, the approach then allows for estimating the prior shape without assuming specific functional forms. To efficiently train the parameters of our probabilistic generative model, we apply a truncated expectation-maximization approach (expectation truncation) that we modify to work with a general discrete prior. We evaluate the performance of the algorithm by applying it to a variety of tasks: (1) we use artificial data to verify that the algorithm can recover the generating parameters from a random initialization, (2) use image patches of natural images and discuss the role of the prior for the extraction of image components, (3) use extracellular recordings of neurons to present a novel method of analysis for spiking neurons that includes an intuitive discretization strategy, and (4) apply the algorithm on the task of encoding audio waveforms of human speech. The diverse set of numerical experiments presented in this letter suggests that discrete sparse coding algorithms can scale efficiently to work with realistic data sets and provide novel statistical quantities to describe the structure of the data.

  3. Code of Practice

    International Nuclear Information System (INIS)

    Doyle, Colin; Hone, Christopher; Nowlan, N.V.

    1984-05-01

    This Code of Practice introduces accepted safety procedures associated with the use of alpha, beta, gamma and X-radiation in secondary schools (pupils aged 12 to 18) in Ireland, and summarises good practice and procedures as they apply to radiation protection. Typical dose rates at various distances from sealed sources are quoted, and simplified equations are used to demonstrate dose and shielding calculations. The regulatory aspects of radiation protection are outlined, and references to statutory documents are given

  4. Tokamak simulation code manual

    International Nuclear Information System (INIS)

    Chung, Moon Kyoo; Oh, Byung Hoon; Hong, Bong Keun; Lee, Kwang Won

    1995-01-01

    The method to use TSC (Tokamak Simulation Code) developed by Princeton plasma physics laboratory is illustrated. In KT-2 tokamak, time dependent simulation of axisymmetric toroidal plasma and vertical stability have to be taken into account in design phase using TSC. In this report physical modelling of TSC are described and examples of application in JAERI and SERI are illustrated, which will be useful when TSC is installed KAERI computer system. (Author) 15 refs., 6 figs., 3 tabs

  5. Status of MARS Code

    Energy Technology Data Exchange (ETDEWEB)

    N.V. Mokhov

    2003-04-09

    Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

  6. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, transparency, neutrality, impartiality, effectiveness, accountability, and legality. The normative context of public administration, as expressed in codes, seems to ignore the New Public Management and Reinventing Government reform movements....

  7. Orthopedics coding and funding.

    Science.gov (United States)

    Baron, S; Duclos, C; Thoreux, P

    2014-02-01

    The French tarification à l'activité (T2A) prospective payment system is a financial system in which a health-care institution's resources are based on performed activity. Activity is described via the PMSI medical information system (programme de médicalisation du système d'information). The PMSI classifies hospital cases by clinical and economic categories known as diagnosis-related groups (DRG), each with an associated price tag. Coding a hospital case involves giving as realistic a description as possible so as to categorize it in the right DRG and thus ensure appropriate payment. For this, it is essential to understand what determines the pricing of inpatient stay: namely, the code for the surgical procedure, the patient's principal diagnosis (reason for admission), codes for comorbidities (everything that adds to management burden), and the management of the length of inpatient stay. The PMSI is used to analyze the institution's activity and dynamism: change on previous year, relation to target, and comparison with competing institutions based on indicators such as the mean length of stay performance indicator (MLS PI). The T2A system improves overall care efficiency. Quality of care, however, is not presently taken account of in the payment made to the institution, as there are no indicators for this; work needs to be done on this topic. Copyright © 2014. Published by Elsevier Masson SAS.

  8. Code Modernization of VPIC

    Science.gov (United States)

    Bird, Robert; Nystrom, David; Albright, Brian

    2017-10-01

    The ability of scientific simulations to effectively deliver performant computation is increasingly being challenged by successive generations of high-performance computing architectures. Code development to support efficient computation on these modern architectures is both expensive, and highly complex; if it is approached without due care, it may also not be directly transferable between subsequent hardware generations. Previous works have discussed techniques to support the process of adapting a legacy code for modern hardware generations, but despite the breakthroughs in the areas of mini-app development, portable-performance, and cache oblivious algorithms the problem still remains largely unsolved. In this work we demonstrate how a focus on platform agnostic modern code-development can be applied to Particle-in-Cell (PIC) simulations to facilitate effective scientific delivery. This work builds directly on our previous work optimizing VPIC, in which we replaced intrinsic based vectorisation with compile generated auto-vectorization to improve the performance and portability of VPIC. In this work we present the use of a specialized SIMD queue for processing some particle operations, and also preview a GPU capable OpenMP variant of VPIC. Finally we include a lessons learnt. Work performed under the auspices of the U.S. Dept. of Energy by the Los Alamos National Security, LLC Los Alamos National Laboratory under contract DE-AC52-06NA25396 and supported by the LANL LDRD program.

  9. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  10. MELCOR computer code manuals

    International Nuclear Information System (INIS)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L.; Hodge, S.A.; Hyman, C.R.; Sanders, R.L.

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR's phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package

  11. Study on the Application of Two-Dimensional Code Technology in Graphic Advertisement Design%二维码技术在平面广告设计中的应用研究

    Institute of Scientific and Technical Information of China (English)

    王晨; 司占军; 沈柯

    2015-01-01

    产品平面宣传广告是关系产品销售的重要环节,在产品的市场推广中起着重要的作用,而二维码作为新兴的条码存储技术使人们获取信息的方式更便捷。因此,将二维码技术应用于平面广告宣传中,以手机的平面广告为研究对象,对其使用3DS Max进行建模并在网页上实现360度实景展示,最终通过二维码技术实现广告从平面到立体的延伸,完善平面媒体在信息表达方式上的缺憾。%The product graphic advertisement is an important part of the relationship among product sales, it plays an important role in product marketing, and the QR code as the barcode emerging storage technology makes people access to information in more convenient way. Therefore, the QR code technology is applied in the graphic advertising, as the research object, mobile phone to the plane advertisement can be used with 3DS Max modeling and Realization in Webpage real 360 degree display performance, finally from the plane to three-dimensional extension acheives two-dimensional code technology, where consummate the graphic media in the form of expression of the information.

  12. Quality Improvement of MARS Code and Establishment of Code Coupling

    International Nuclear Information System (INIS)

    Chung, Bub Dong; Jeong, Jae Jun; Kim, Kyung Doo

    2010-04-01

    The improvement of MARS code quality and coupling with regulatory auditing code have been accomplished for the establishment of self-reliable technology based regulatory auditing system. The unified auditing system code was realized also by implementing the CANDU specific models and correlations. As a part of the quality assurance activities, the various QA reports were published through the code assessments. The code manuals were updated and published a new manual which describe the new models and correlations. The code coupling methods were verified though the exercise of plant application. The education-training seminar and technology transfer were performed for the code users. The developed MARS-KS is utilized as reliable auditing tool for the resolving the safety issue and other regulatory calculations. The code can be utilized as a base technology for GEN IV reactor applications

  13. Design of convolutional tornado code

    Science.gov (United States)

    Zhou, Hui; Yang, Yao; Gao, Hongmin; Tan, Lu

    2017-09-01

    As a linear block code, the traditional tornado (tTN) code is inefficient in burst-erasure environment and its multi-level structure may lead to high encoding/decoding complexity. This paper presents a convolutional tornado (cTN) code which is able to improve the burst-erasure protection capability by applying the convolution property to the tTN code, and reduce computational complexity by abrogating the multi-level structure. The simulation results show that cTN code can provide a better packet loss protection performance with lower computation complexity than tTN code.

  14. Random linear codes in steganography

    Directory of Open Access Journals (Sweden)

    Kamil Kaczyński

    2016-12-01

    Full Text Available Syndrome coding using linear codes is a technique that allows improvement in the steganographic algorithms parameters. The use of random linear codes gives a great flexibility in choosing the parameters of the linear code. In parallel, it offers easy generation of parity check matrix. In this paper, the modification of LSB algorithm is presented. A random linear code [8, 2] was used as a base for algorithm modification. The implementation of the proposed algorithm, along with practical evaluation of algorithms’ parameters based on the test images was made.[b]Keywords:[/b] steganography, random linear codes, RLC, LSB

  15. Containment Code Validation Matrix

    International Nuclear Information System (INIS)

    Chin, Yu-Shan; Mathew, P.M.; Glowa, Glenn; Dickson, Ray; Liang, Zhe; Leitch, Brian; Barber, Duncan; Vasic, Aleks; Bentaib, Ahmed; Journeau, Christophe; Malet, Jeanne; Studer, Etienne; Meynet, Nicolas; Piluso, Pascal; Gelain, Thomas; Michielsen, Nathalie; Peillon, Samuel; Porcheron, Emmanuel; Albiol, Thierry; Clement, Bernard; Sonnenkalb, Martin; Klein-Hessling, Walter; Arndt, Siegfried; Weber, Gunter; Yanez, Jorge; Kotchourko, Alexei; Kuznetsov, Mike; Sangiorgi, Marco; Fontanet, Joan; Herranz, Luis; Garcia De La Rua, Carmen; Santiago, Aleza Enciso; Andreani, Michele; Paladino, Domenico; Dreier, Joerg; Lee, Richard; Amri, Abdallah

    2014-01-01

    The Committee on the Safety of Nuclear Installations (CSNI) formed the CCVM (Containment Code Validation Matrix) task group in 2002. The objective of this group was to define a basic set of available experiments for code validation, covering the range of containment (ex-vessel) phenomena expected in the course of light and heavy water reactor design basis accidents and beyond design basis accidents/severe accidents. It was to consider phenomena relevant to pressurised heavy water reactor (PHWR), pressurised water reactor (PWR) and boiling water reactor (BWR) designs of Western origin as well as of Eastern European VVER types. This work would complement the two existing CSNI validation matrices for thermal hydraulic code validation (NEA/CSNI/R(1993)14) and In-vessel core degradation (NEA/CSNI/R(2001)21). The report initially provides a brief overview of the main features of a PWR, BWR, CANDU and VVER reactors. It also provides an overview of the ex-vessel corium retention (core catcher). It then provides a general overview of the accident progression for light water and heavy water reactors. The main focus is to capture most of the phenomena and safety systems employed in these reactor types and to highlight the differences. This CCVM contains a description of 127 phenomena, broken down into 6 categories: - Containment Thermal-hydraulics Phenomena; - Hydrogen Behaviour (Combustion, Mitigation and Generation) Phenomena; - Aerosol and Fission Product Behaviour Phenomena; - Iodine Chemistry Phenomena; - Core Melt Distribution and Behaviour in Containment Phenomena; - Systems Phenomena. A synopsis is provided for each phenomenon, including a description, references for further information, significance for DBA and SA/BDBA and a list of experiments that may be used for code validation. The report identified 213 experiments, broken down into the same six categories (as done for the phenomena). An experiment synopsis is provided for each test. Along with a test description

  16. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes.......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  17. TASS code topical report. V.1 TASS code technical manual

    International Nuclear Information System (INIS)

    Sim, Suk K.; Chang, W. P.; Kim, K. D.; Kim, H. C.; Yoon, H. Y.

    1997-02-01

    TASS 1.0 code has been developed at KAERI for the initial and reload non-LOCA safety analysis for the operating PWRs as well as the PWRs under construction in Korea. TASS code will replace various vendor's non-LOCA safety analysis codes currently used for the Westinghouse and ABB-CE type PWRs in Korea. This can be achieved through TASS code input modifications specific to each reactor type. The TASS code can be run interactively through the keyboard operation. A simimodular configuration used in developing the TASS code enables the user easily implement new models. TASS code has been programmed using FORTRAN77 which makes it easy to install and port for different computer environments. The TASS code can be utilized for the steady state simulation as well as the non-LOCA transient simulations such as power excursions, reactor coolant pump trips, load rejections, loss of feedwater, steam line breaks, steam generator tube ruptures, rod withdrawal and drop, and anticipated transients without scram (ATWS). The malfunctions of the control systems, components, operator actions and the transients caused by the malfunctions can be easily simulated using the TASS code. This technical report describes the TASS 1.0 code models including reactor thermal hydraulic, reactor core and control models. This TASS code models including reactor thermal hydraulic, reactor core and control models. This TASS code technical manual has been prepared as a part of the TASS code manual which includes TASS code user's manual and TASS code validation report, and will be submitted to the regulatory body as a TASS code topical report for a licensing non-LOCA safety analysis for the Westinghouse and ABB-CE type PWRs operating and under construction in Korea. (author). 42 refs., 29 tabs., 32 figs

  18. Construction of new quantum MDS codes derived from constacyclic codes

    Science.gov (United States)

    Taneja, Divya; Gupta, Manish; Narula, Rajesh; Bhullar, Jaskaran

    Obtaining quantum maximum distance separable (MDS) codes from dual containing classical constacyclic codes using Hermitian construction have paved a path to undertake the challenges related to such constructions. Using the same technique, some new parameters of quantum MDS codes have been constructed here. One set of parameters obtained in this paper has achieved much larger distance than work done earlier. The remaining constructed parameters of quantum MDS codes have large minimum distance and were not explored yet.

  19. POLITICA DE RECRUTARE ȘI SELECȚIE A PERSONALULUI ACADEMIC ÎN ÎNVĂȚĂMÂNTUL SUPERIOR DIN RSS MOLDOVENEASCĂ. 1944-1950

    Directory of Open Access Journals (Sweden)

    Liliana ROTARU

    2017-08-01

    Full Text Available Resursa umană este capitalul strategic al oricărei instituții de învățământ superior și o politică judicioasă de personal, în general, dar mai ales de recrutare și selecție a cadrelor didactico-științifice. Ea face posibilă realizarea misiunii învăță­mân­tului superior, implicit, prin cei care îl promovează. Cercetarea politicii de personal în școlile superioare din RSS Moldovenească în perioada de refacere a învățământului superior de după cel de-al Doilea Război Mondial a scos în evidență că aceasta era subordonată politicii naționale a statului sovietic, care presupunea formarea „omului nou” și integrarea acestuia în identitatea supraetnică numită „popor sovietic” – deznaționalizat, îndoctrinat cu ideologie marxist-leninistă, rusificat și rusianizat, care să aibă o patrie socialistă comună – Uniunea Sovietică și un scop comun – const­ruirea comunismului. Toate instrumentele și metodele de recrutare și selectare a personalului academic pentru insti­tuțiile de învățământ din RSS Moldovenească erau subordonate necesității creării unui corp didactico-științific în mare parte vorbitor și purtător de limbă și cultură rusă, puternic ideologizat și loial statului sovietic și partidului comunist, și mai apoi de o anumită competență profesională, toate acestea camuflate sub pregnanta idee de promovare a „elemen­tului autohton moldovenesc”.THE POLICY OF RECRUITMENT AND SELECTION OF ACADEMIC STAFF IN HIGHER EDUCATION OF MSSR. 1944-1950The human resource is the strategic capital of any higher education institutions and, in general, a judicious staff policy, but especially – a good policy of recruitment and selection of didactic and scientific staff makes possible to realize the higher education mission and, by default – the goals of those who are promoting it. The research of staff policy in high schools of MSSR during the higher education

  20. Combinatorial neural codes from a mathematical coding theory perspective.

    Science.gov (United States)

    Curto, Carina; Itskov, Vladimir; Morrison, Katherine; Roth, Zachary; Walker, Judy L

    2013-07-01

    Shannon's seminal 1948 work gave rise to two distinct areas of research: information theory and mathematical coding theory. While information theory has had a strong influence on theoretical neuroscience, ideas from mathematical coding theory have received considerably less attention. Here we take a new look at combinatorial neural codes from a mathematical coding theory perspective, examining the error correction capabilities of familiar receptive field codes (RF codes). We find, perhaps surprisingly, that the high levels of redundancy present in these codes do not support accurate error correction, although the error-correcting performance of receptive field codes catches up to that of random comparison codes when a small tolerance to error is introduced. However, receptive field codes are good at reflecting distances between represented stimuli, while the random comparison codes are not. We suggest that a compromise in error-correcting capability may be a necessary price to pay for a neural code whose structure serves not only error correction, but must also reflect relationships between stimuli.

  1. Convolutional coding techniques for data protection

    Science.gov (United States)

    Massey, J. L.

    1975-01-01

    Results of research on the use of convolutional codes in data communications are presented. Convolutional coding fundamentals are discussed along with modulation and coding interaction. Concatenated coding systems and data compression with convolutional codes are described.

  2. High Energy Transport Code HETC

    International Nuclear Information System (INIS)

    Gabriel, T.A.

    1985-09-01

    The physics contained in the High Energy Transport Code (HETC), in particular the collision models, are discussed. An application using HETC as part of the CALOR code system is also given. 19 refs., 5 figs., 3 tabs

  3. Code stroke in Asturias.

    Science.gov (United States)

    Benavente, L; Villanueva, M J; Vega, P; Casado, I; Vidal, J A; Castaño, B; Amorín, M; de la Vega, V; Santos, H; Trigo, A; Gómez, M B; Larrosa, D; Temprano, T; González, M; Murias, E; Calleja, S

    2016-04-01

    Intravenous thrombolysis with alteplase is an effective treatment for ischaemic stroke when applied during the first 4.5 hours, but less than 15% of patients have access to this technique. Mechanical thrombectomy is more frequently able to recanalise proximal occlusions in large vessels, but the infrastructure it requires makes it even less available. We describe the implementation of code stroke in Asturias, as well as the process of adapting various existing resources for urgent stroke care in the region. By considering these resources, and the demographic and geographic circumstances of our region, we examine ways of reorganising the code stroke protocol that would optimise treatment times and provide the most appropriate treatment for each patient. We distributed the 8 health districts in Asturias so as to permit referral of candidates for reperfusion therapies to either of the 2 hospitals with 24-hour stroke units and on-call neurologists and providing IV fibrinolysis. Hospitals were assigned according to proximity and stroke severity; the most severe cases were immediately referred to the hospital with on-call interventional neurology care. Patient triage was provided by pre-hospital emergency services according to the NIHSS score. Modifications to code stroke in Asturias have allowed us to apply reperfusion therapies with good results, while emphasising equitable care and managing the severity-time ratio to offer the best and safest treatment for each patient as soon as possible. Copyright © 2015 Sociedad Española de Neurología. Published by Elsevier España, S.L.U. All rights reserved.

  4. Decoding Xing-Ling codes

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Refslund

    2002-01-01

    This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed.......This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed....

  5. WWER reactor physics code applications

    International Nuclear Information System (INIS)

    Gado, J.; Kereszturi, A.; Gacs, A.; Telbisz, M.

    1994-01-01

    The coupled steady-state reactor physics and thermohydraulic code system KARATE has been developed and applied for WWER-1000 and WWER-440 operational calculations. The 3 D coupled kinetic code KIKO3D has been developed and validated for WWER-440 accident analysis applications. The coupled kinetic code SMARTA developed by VTT Helsinki has been applied for WWER-440 accident analysis. The paper gives a summary of the experience in code development and application. (authors). 10 refs., 2 tabs., 5 figs

  6. The path of code linting

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Join the path of code linting and discover how it can help you reach higher levels of programming enlightenment. Today we will cover how to embrace code linters to offload cognitive strain on preserving style standards in your code base as well as avoiding error-prone constructs. Additionally, I will show you the journey ahead for integrating several code linters in the programming tools your already use with very little effort.

  7. The CORSYS neutronics code system

    International Nuclear Information System (INIS)

    Caner, M.; Krumbein, A.D.; Saphier, D.; Shapira, M.

    1994-01-01

    The purpose of this work is to assemble a code package for LWR core physics including coupled neutronics, burnup and thermal hydraulics. The CORSYS system is built around the cell code WIMS (for group microscopic cross section calculations) and 3-dimension diffusion code CITATION (for burnup and fuel management). We are implementing such a system on an IBM RS-6000 workstation. The code was rested with a simplified model of the Zion Unit 2 PWR. (authors). 6 refs., 8 figs., 1 tabs

  8. Bar codes for nuclear safeguards

    International Nuclear Information System (INIS)

    Keswani, A.N.; Bieber, A.M. Jr.

    1983-01-01

    Bar codes similar to those used in supermarkets can be used to reduce the effort and cost of collecting nuclear materials accountability data. A wide range of equipment is now commercially available for printing and reading bar-coded information. Several examples of each of the major types of commercially available equipment are given, and considerations are discussed both for planning systems using bar codes and for choosing suitable bar code equipment

  9. Bar codes for nuclear safeguards

    International Nuclear Information System (INIS)

    Keswani, A.N.; Bieber, A.M.

    1983-01-01

    Bar codes similar to those used in supermarkets can be used to reduce the effort and cost of collecting nuclear materials accountability data. A wide range of equipment is now commercially available for printing and reading bar-coded information. Several examples of each of the major types of commercially-available equipment are given, and considerations are discussed both for planning systems using bar codes and for choosing suitable bar code equipment

  10. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...

  11. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  12. UNSPEC: revisited (semaphore code)

    International Nuclear Information System (INIS)

    Neifert, R.D.

    1981-01-01

    The UNSPEC code is used to solve the problem of unfolding an observed x-ray spectrum given the response matrix of the measuring system and the measured signal values. UNSPEC uses an iterative technique to solve the unfold problem. Due to experimental errors in the measured signal values and/or computer round-off errors, discontinuities and oscillatory behavior may occur in the iterated spectrum. These can be suppressed by smoothing the results after each iteration. Input/output options and control cards are explained; sample input and output are provided

  13. The FLIC conversion codes

    International Nuclear Information System (INIS)

    Basher, J.C.

    1965-05-01

    This report describes the FORTRAN programmes, FLIC 1 and FLIC 2. These programmes convert programmes coded in one dialect of FORTRAN to another dialect of the same language. FLIC 1 is a general pattern recognition and replacement programme whereas FLIC 2 contains extensions directed towards the conversion of FORTRAN II and S2 programmes to EGTRAN 1 - the dialect now in use on the Winfrith KDF9. FII or S2 statements are replaced where possible by their E1 equivalents; other statements which may need changing are flagged. (author)

  14. SPRAY code user's report

    International Nuclear Information System (INIS)

    Shire, P.R.

    1977-03-01

    The SPRAY computer code has been developed to model the effects of postulated sodium spray release from LMFBR piping within containment chambers. The calculation method utilizes gas convection, heat transfer and droplet combustion theory to calculate the pressure and temperature effects within the enclosure. The applicable range is 0-21 mol percent oxygen and .02-.30 inch droplets with or without humidity. Droplet motion and large sodium surface area combine to produce rapid heat release and pressure rise within the enclosed volume

  15. The FLIC conversion codes

    Energy Technology Data Exchange (ETDEWEB)

    Basher, J C [General Reactor Physics Division, Atomic Energy Establishment, Winfrith, Dorchester, Dorset (United Kingdom)

    1965-05-15

    This report describes the FORTRAN programmes, FLIC 1 and FLIC 2. These programmes convert programmes coded in one dialect of FORTRAN to another dialect of the same language. FLIC 1 is a general pattern recognition and replacement programme whereas FLIC 2 contains extensions directed towards the conversion of FORTRAN II and S2 programmes to EGTRAN 1 - the dialect now in use on the Winfrith KDF9. FII or S2 statements are replaced where possible by their E1 equivalents; other statements which may need changing are flagged. (author)

  16. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  17. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    1997-01-01

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy...... machinery of algebraic geometry....

  18. Direct-semidirect (DSD) codes

    International Nuclear Information System (INIS)

    Cvelbar, F.

    1999-01-01

    Recent codes for direct-semidirect (DSD) model calculations in the form of answers to a detailed questionnaire are reviewed. These codes include those embodying the classical DSD approach covering only the transitions to the bound states (RAF, HIKARI, and those of the Bologna group), as well as the code CUPIDO++ that also treats transitions to unbound states. (author)

  19. Dual Coding, Reasoning and Fallacies.

    Science.gov (United States)

    Hample, Dale

    1982-01-01

    Develops the theory that a fallacy is not a comparison of a rhetorical text to a set of definitions but a comparison of one person's cognition with another's. Reviews Paivio's dual coding theory, relates nonverbal coding to reasoning processes, and generates a limited fallacy theory based on dual coding theory. (PD)

  20. Strongly-MDS convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Rosenthal, J; Smarandache, R

    Maximum-distance separable (MDS) convolutional codes have the property that their free distance is maximal among all codes of the same rate and the same degree. In this paper, a class of MDS convolutional codes is introduced whose column distances reach the generalized Singleton bound at the

  1. Lattice polytopes in coding theory

    Directory of Open Access Journals (Sweden)

    Ivan Soprunov

    2015-05-01

    Full Text Available In this paper we discuss combinatorial questions about lattice polytopes motivated by recent results on minimum distance estimation for toric codes. We also include a new inductive bound for the minimum distance of generalized toric codes. As an application, we give new formulas for the minimum distance of generalized toric codes for special lattice point configurations.

  2. Computer codes for safety analysis

    International Nuclear Information System (INIS)

    Holland, D.F.

    1986-11-01

    Computer codes for fusion safety analysis have been under development in the United States for about a decade. This paper will discuss five codes that are currently under development by the Fusion Safety Program. The purpose and capability of each code will be presented, a sample given, followed by a discussion of the present status and future development plans

  3. Geochemical computer codes. A review

    International Nuclear Information System (INIS)

    Andersson, K.

    1987-01-01

    In this report a review of available codes is performed and some code intercomparisons are also discussed. The number of codes treating natural waters (groundwater, lake water, sea water) is large. Most geochemical computer codes treat equilibrium conditions, although some codes with kinetic capability are available. A geochemical equilibrium model consists of a computer code, solving a set of equations by some numerical method and a data base, consisting of thermodynamic data required for the calculations. There are some codes which treat coupled geochemical and transport modeling. Some of these codes solve the equilibrium and transport equations simultaneously while other solve the equations separately from each other. The coupled codes require a large computer capacity and have thus as yet limited use. Three code intercomparisons have been found in literature. It may be concluded that there are many codes available for geochemical calculations but most of them require a user that us quite familiar with the code. The user also has to know the geochemical system in order to judge the reliability of the results. A high quality data base is necessary to obtain a reliable result. The best results may be expected for the major species of natural waters. For more complicated problems, including trace elements, precipitation/dissolution, adsorption, etc., the results seem to be less reliable. (With 44 refs.) (author)

  4. Separate Turbo Code and Single Turbo Code Adaptive OFDM Transmissions

    Directory of Open Access Journals (Sweden)

    Lei Ye

    2009-01-01

    Full Text Available This paper discusses the application of adaptive modulation and adaptive rate turbo coding to orthogonal frequency-division multiplexing (OFDM, to increase throughput on the time and frequency selective channel. The adaptive turbo code scheme is based on a subband adaptive method, and compares two adaptive systems: a conventional approach where a separate turbo code is used for each subband, and a single turbo code adaptive system which uses a single turbo code over all subbands. Five modulation schemes (BPSK, QPSK, 8AMPM, 16QAM, and 64QAM are employed and turbo code rates considered are 1/2 and 1/3. The performances of both systems with high (10−2 and low (10−4 BER targets are compared. Simulation results for throughput and BER show that the single turbo code adaptive system provides a significant improvement.

  5. New quantum codes constructed from quaternary BCH codes

    Science.gov (United States)

    Xu, Gen; Li, Ruihu; Guo, Luobin; Ma, Yuena

    2016-10-01

    In this paper, we firstly study construction of new quantum error-correcting codes (QECCs) from three classes of quaternary imprimitive BCH codes. As a result, the improved maximal designed distance of these narrow-sense imprimitive Hermitian dual-containing quaternary BCH codes are determined to be much larger than the result given according to Aly et al. (IEEE Trans Inf Theory 53:1183-1188, 2007) for each different code length. Thus, families of new QECCs are newly obtained, and the constructed QECCs have larger distance than those in the previous literature. Secondly, we apply a combinatorial construction to the imprimitive BCH codes with their corresponding primitive counterpart and construct many new linear quantum codes with good parameters, some of which have parameters exceeding the finite Gilbert-Varshamov bound for linear quantum codes.

  6. Quantum Codes From Cyclic Codes Over The Ring R 2

    International Nuclear Information System (INIS)

    Altinel, Alev; Güzeltepe, Murat

    2016-01-01

    Let R 2 denotes the ring F 2 + μF 2 + υ 2 + μυ F 2 + wF 2 + μwF 2 + υwF 2 + μυwF 2 . In this study, we construct quantum codes from cyclic codes over the ring R 2 , for arbitrary length n, with the restrictions μ 2 = 0, υ 2 = 0, w 2 = 0, μυ = υμ, μw = wμ, υw = wυ and μ (υw) = (μυ) w. Also, we give a necessary and sufficient condition for cyclic codes over R 2 that contains its dual. As a final point, we obtain the parameters of quantum error-correcting codes from cyclic codes over R 2 and we give an example of quantum error-correcting codes form cyclic codes over R 2 . (paper)

  7. Separate Turbo Code and Single Turbo Code Adaptive OFDM Transmissions

    Directory of Open Access Journals (Sweden)

    Burr Alister

    2009-01-01

    Full Text Available Abstract This paper discusses the application of adaptive modulation and adaptive rate turbo coding to orthogonal frequency-division multiplexing (OFDM, to increase throughput on the time and frequency selective channel. The adaptive turbo code scheme is based on a subband adaptive method, and compares two adaptive systems: a conventional approach where a separate turbo code is used for each subband, and a single turbo code adaptive system which uses a single turbo code over all subbands. Five modulation schemes (BPSK, QPSK, 8AMPM, 16QAM, and 64QAM are employed and turbo code rates considered are and . The performances of both systems with high ( and low ( BER targets are compared. Simulation results for throughput and BER show that the single turbo code adaptive system provides a significant improvement.

  8. Converter of a continuous code into the Grey code

    International Nuclear Information System (INIS)

    Gonchar, A.I.; TrUbnikov, V.R.

    1979-01-01

    Described is a converter of a continuous code into the Grey code used in a 12-charged precision amplitude-to-digital converter to decrease the digital component of spectrometer differential nonlinearity to +0.7% in the 98% range of the measured band. To construct the converter of a continuous code corresponding to the input signal amplitude into the Grey code used is the regularity in recycling of units and zeroes in each discharge of the Grey code in the case of a continuous change of the number of pulses of a continuous code. The converter is constructed on the elements of 155 series, the frequency of continuous code pulse passing at the converter input is 25 MHz

  9. Supervised Transfer Sparse Coding

    KAUST Repository

    Al-Shedivat, Maruan

    2014-07-27

    A combination of the sparse coding and transfer learn- ing techniques was shown to be accurate and robust in classification tasks where training and testing objects have a shared feature space but are sampled from differ- ent underlying distributions, i.e., belong to different do- mains. The key assumption in such case is that in spite of the domain disparity, samples from different domains share some common hidden factors. Previous methods often assumed that all the objects in the target domain are unlabeled, and thus the training set solely comprised objects from the source domain. However, in real world applications, the target domain often has some labeled objects, or one can always manually label a small num- ber of them. In this paper, we explore such possibil- ity and show how a small number of labeled data in the target domain can significantly leverage classifica- tion accuracy of the state-of-the-art transfer sparse cod- ing methods. We further propose a unified framework named supervised transfer sparse coding (STSC) which simultaneously optimizes sparse representation, domain transfer and classification. Experimental results on three applications demonstrate that a little manual labeling and then learning the model in a supervised fashion can significantly improve classification accuracy.

  10. Two-terminal video coding.

    Science.gov (United States)

    Yang, Yang; Stanković, Vladimir; Xiong, Zixiang; Zhao, Wei

    2009-03-01

    Following recent works on the rate region of the quadratic Gaussian two-terminal source coding problem and limit-approaching code designs, this paper examines multiterminal source coding of two correlated, i.e., stereo, video sequences to save the sum rate over independent coding of both sequences. Two multiterminal video coding schemes are proposed. In the first scheme, the left sequence of the stereo pair is coded by H.264/AVC and used at the joint decoder to facilitate Wyner-Ziv coding of the right video sequence. The first I-frame of the right sequence is successively coded by H.264/AVC Intracoding and Wyner-Ziv coding. An efficient stereo matching algorithm based on loopy belief propagation is then adopted at the decoder to produce pixel-level disparity maps between the corresponding frames of the two decoded video sequences on the fly. Based on the disparity maps, side information for both motion vectors and motion-compensated residual frames of the right sequence are generated at the decoder before Wyner-Ziv encoding. In the second scheme, source splitting is employed on top of classic and Wyner-Ziv coding for compression of both I-frames to allow flexible rate allocation between the two sequences. Experiments with both schemes on stereo video sequences using H.264/AVC, LDPC codes for Slepian-Wolf coding of the motion vectors, and scalar quantization in conjunction with LDPC codes for Wyner-Ziv coding of the residual coefficients give a slightly lower sum rate than separate H.264/AVC coding of both sequences at the same video quality.

  11. The Art of Readable Code

    CERN Document Server

    Boswell, Dustin

    2011-01-01

    As programmers, we've all seen source code that's so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they're bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it-even if that someone else is you. This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languag

  12. Sub-Transport Layer Coding

    DEFF Research Database (Denmark)

    Hansen, Jonas; Krigslund, Jeppe; Roetter, Daniel Enrique Lucani

    2014-01-01

    Packet losses in wireless networks dramatically curbs the performance of TCP. This paper introduces a simple coding shim that aids IP-layer traffic in lossy environments while being transparent to transport layer protocols. The proposed coding approach enables erasure correction while being...... oblivious to the congestion control algorithms of the utilised transport layer protocol. Although our coding shim is indifferent towards the transport layer protocol, we focus on the performance of TCP when ran on top of our proposed coding mechanism due to its widespread use. The coding shim provides gains...

  13. 75 FR 19944 - International Code Council: The Update Process for the International Codes and Standards

    Science.gov (United States)

    2010-04-16

    ... documents from ICC's Chicago District Office: International Code Council, 4051 W Flossmoor Road, Country... Energy Conservation Code. International Existing Building Code. International Fire Code. International...

  14. Polynomial weights and code constructions

    DEFF Research Database (Denmark)

    Massey, J; Costello, D; Justesen, Jørn

    1973-01-01

    polynomial included. This fundamental property is then used as the key to a variety of code constructions including 1) a simplified derivation of the binary Reed-Muller codes and, for any primepgreater than 2, a new extensive class ofp-ary "Reed-Muller codes," 2) a new class of "repeated-root" cyclic codes...... of long constraint length binary convolutional codes derived from2^r-ary Reed-Solomon codes, and 6) a new class ofq-ary "repeated-root" constacyclic codes with an algebraic decoding algorithm.......For any nonzero elementcof a general finite fieldGF(q), it is shown that the polynomials(x - c)^i, i = 0,1,2,cdots, have the "weight-retaining" property that any linear combination of these polynomials with coefficients inGF(q)has Hamming weight at least as great as that of the minimum degree...

  15. Introduction of SCIENCE code package

    International Nuclear Information System (INIS)

    Lu Haoliang; Li Jinggang; Zhu Ya'nan; Bai Ning

    2012-01-01

    The SCIENCE code package is a set of neutronics tools based on 2D assembly calculations and 3D core calculations. It is made up of APOLLO2F, SMART and SQUALE and used to perform the nuclear design and loading pattern analysis for the reactors on operation or under construction of China Guangdong Nuclear Power Group. The purpose of paper is to briefly present the physical and numerical models used in each computation codes of the SCIENCE code pack age, including the description of the general structure of the code package, the coupling relationship of APOLLO2-F transport lattice code and SMART core nodal code, and the SQUALE code used for processing the core maps. (authors)

  16. Elements of algebraic coding systems

    CERN Document Server

    Cardoso da Rocha, Jr, Valdemar

    2014-01-01

    Elements of Algebraic Coding Systems is an introductory text to algebraic coding theory. In the first chapter, you'll gain inside knowledge of coding fundamentals, which is essential for a deeper understanding of state-of-the-art coding systems. This book is a quick reference for those who are unfamiliar with this topic, as well as for use with specific applications such as cryptography and communication. Linear error-correcting block codes through elementary principles span eleven chapters of the text. Cyclic codes, some finite field algebra, Goppa codes, algebraic decoding algorithms, and applications in public-key cryptography and secret-key cryptography are discussed, including problems and solutions at the end of each chapter. Three appendices cover the Gilbert bound and some related derivations, a derivation of the Mac- Williams' identities based on the probability of undetected error, and two important tools for algebraic decoding-namely, the finite field Fourier transform and the Euclidean algorithm f...

  17. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    of interfering nodes and usage of spatial reservation mechanisms. Specifically, we introduce a reserved area in order to protect the nodes involved in two-way relaying from the interference caused by neighboring nodes. We analytically derive the end-to-end rate achieved by PLNC considering the impact......Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause....../receive interference. The way to deal with this problem in distributed wireless networks is usage of MAC-layer mechanisms that make a spatial reservation of the shared wireless medium, similar to the well-known RTS/CTS in IEEE 802.11 wireless networks. In this paper, we investigate two-way relaying in presence...

  18. Concatenated quantum codes

    Energy Technology Data Exchange (ETDEWEB)

    Knill, E.; Laflamme, R.

    1996-07-01

    One main problem for the future of practial quantum computing is to stabilize the computation against unwanted interactions with the environment and imperfections in the applied operations. Existing proposals for quantum memories and quantum channels require gates with asymptotically zero error to store or transmit an input quantum state for arbitrarily long times or distances with fixed error. This report gives a method which has the property that to store or transmit a qubit with maximum error {epsilon} requires gates with errors at most {ital c}{epsilon} and storage or channel elements with error at most {epsilon}, independent of how long we wish to store the state or how far we wish to transmit it. The method relies on using concatenated quantum codes and hierarchically implemented recovery operations. The overhead of the method is polynomial in the time of storage or the distance of the transmission. Rigorous and heuristic lower bounds for the constant {ital c} are given.

  19. Code des baux 2018

    CERN Document Server

    Vial-Pedroletti, Béatrice; Kendérian, Fabien; Chavance, Emmanuelle; Coutan-Lapalus, Christelle

    2017-01-01

    Le code des baux 2018 vous offre un contenu extrêmement pratique, fiable et à jour au 1er août 2017. Cette 16e édition intègre notamment : le décret du 27 juillet 2017 relatif à l’évolution de certains loyers dans le cadre d’une nouvelle location ou d’un renouvellement de bail, pris en application de l’article 18 de la loi n° 89-462 du 6 juillet 1989 ; la loi du 27 janvier 2017 relative à l’égalité et à la citoyenneté ; la loi du 9 décembre 2016 relative à la transparence, à la lutte contre la corruption et à la modernisation de la vie économique ; la loi du 18 novembre 2016 de modernisation de la justice du xxie siècle

  20. GOC: General Orbit Code

    International Nuclear Information System (INIS)

    Maddox, L.B.; McNeilly, G.S.

    1979-08-01

    GOC (General Orbit Code) is a versatile program which will perform a variety of calculations relevant to isochronous cyclotron design studies. In addition to the usual calculations of interest (e.g., equilibrium and accelerated orbits, focusing frequencies, field isochronization, etc.), GOC has a number of options to calculate injections with a charge change. GOC provides both printed and plotted output, and will follow groups of particles to allow determination of finite-beam properties. An interactive PDP-10 program called GIP, which prepares input data for GOC, is available. GIP is a very easy and convenient way to prepare complicated input data for GOC. Enclosed with this report are several microfiche containing source listings of GOC and other related routines and the printed output from a multiple-option GOC run