WorldWideScience

Sample records for r codes

  1. Software information sorting code 'PLUTO-R'

    International Nuclear Information System (INIS)

    Tsunematsu, Toshihide; Naraoka, Kenitsu; Adachi, Masao; Takeda, Tatsuoki

    1984-10-01

    A software information sorting code PLUTO-R is developed as one of the supporting codes of the TRITON system for the fusion plasma analysis. The objective of the PLUTO-R code is to sort reference materials of the codes in the TRITON code system. The easiness in the registration of information is especially pursued. As experience and skill in the data registration are not required, this code is usable for construction of general small-scale information system. This report gives an overall description and the user's manual of the PLUTO-R code. (author)

  2. Quantum Codes From Cyclic Codes Over The Ring R 2

    International Nuclear Information System (INIS)

    Altinel, Alev; Güzeltepe, Murat

    2016-01-01

    Let R 2 denotes the ring F 2 + μF 2 + υ 2 + μυ F 2 + wF 2 + μwF 2 + υwF 2 + μυwF 2 . In this study, we construct quantum codes from cyclic codes over the ring R 2 , for arbitrary length n, with the restrictions μ 2 = 0, υ 2 = 0, w 2 = 0, μυ = υμ, μw = wμ, υw = wυ and μ (υw) = (μυ) w. Also, we give a necessary and sufficient condition for cyclic codes over R 2 that contains its dual. As a final point, we obtain the parameters of quantum error-correcting codes from cyclic codes over R 2 and we give an example of quantum error-correcting codes form cyclic codes over R 2 . (paper)

  3. R-matrix analysis code (RAC)

    International Nuclear Information System (INIS)

    Chen Zhenpeng; Qi Huiquan

    1990-01-01

    A comprehensive R-matrix analysis code has been developed. It is based on the multichannel and multilevel R-matrix theory and runs in VAX computer with FORTRAN-77. With this code many kinds of experimental data for one nuclear system can be fitted simultaneously. The comparisions between code RAC and code EDA of LANL are made. The data show both codes produced the same calculation results when one set of R-matrix parameters was used. The differential cross section of 10 B (n, α) 7 Li for E n = 0.4 MeV and the polarization of 16 O (n,n) 16 O for E n = 2.56 MeV are presented

  4. The r-Java 2.0 code: nuclear physics

    Science.gov (United States)

    Kostka, M.; Koning, N.; Shand, Z.; Ouyed, R.; Jaikumar, P.

    2014-08-01

    Aims: We present r-Java 2.0, a nucleosynthesis code for open use that performs r-process calculations, along with a suite of other analysis tools. Methods: Equipped with a straightforward graphical user interface, r-Java 2.0 is capable of simulating nuclear statistical equilibrium (NSE), calculating r-process abundances for a wide range of input parameters and astrophysical environments, computing the mass fragmentation from neutron-induced fission and studying individual nucleosynthesis processes. Results: In this paper we discuss enhancements to this version of r-Java, especially the ability to solve the full reaction network. The sophisticated fission methodology incorporated in r-Java 2.0 that includes three fission channels (beta-delayed, neutron-induced, and spontaneous fission), along with computation of the mass fragmentation, is compared to the upper limit on mass fission approximation. The effects of including beta-delayed neutron emission on r-process yield is studied. The role of Coulomb interactions in NSE abundances is shown to be significant, supporting previous findings. A comparative analysis was undertaken during the development of r-Java 2.0 whereby we reproduced the results found in the literature from three other r-process codes. This code is capable of simulating the physical environment of the high-entropy wind around a proto-neutron star, the ejecta from a neutron star merger, or the relativistic ejecta from a quark nova. Likewise the users of r-Java 2.0 are given the freedom to define a custom environment. This software provides a platform for comparing proposed r-process sites.

  5. Le Rôle du langage de programmation dans la réalisation de code ...

    African Journals Online (AJOL)

    Le Rôle du langage de programmation dans la réalisation de code de qualité, les cas de Delphi et C++ Nous discutons dans ce papier le rôle du langage de programmation dans la production d'un code de qualité. La qualité d'un code peut être atteinte en respectant certains critères simples au niveau de la programmation ...

  6. LASER-R a computer code for reactor cell and burnup calculations in neutron transport theory

    International Nuclear Information System (INIS)

    Cristian, I.; Cirstoiu, B.; Dumitrache, I.; Cepraga, D.

    1976-04-01

    The LASER-R code is an IBM 370/135 version of the Westinghouse code, LASER, based on the THERMOS and MUFT codes developped by Poncelet. It can be used to perform thermal reactor cell calculations and burnup calculations. The cell exhibits 3-4 concentric areas: fuel, cladding, moderator and scattering ring. Besides directions for use, a short description of the physical model, numerical methods and output is presented

  7. R-Matrix Codes for Charged-particle Induced Reactionsin the Resolved Resonance Region

    Energy Technology Data Exchange (ETDEWEB)

    Leeb, Helmut [Technical Univ. of Wien, Vienna (Austria); Dimitriou, Paraskevi [Intl Atomic Energy Agency (IAEA), Vienna (Austria); Thompson, Ian J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-01-01

    A Consultant’s Meeting was held at the IAEA Headquarters, from 5 to 7 December 2016, to discuss the status of R-matrix codes currently used in calculations of charged-particle induced reaction cross sections at low energies. The meeting was a follow-up to the R-matrix Codes meeting held in December 2015, and served the purpose of monitoring progress in: the development of a translation code to enable exchange of input/output parameters between the various codes in different formats, fitting procedures and treatment of uncertainties, the evaluation methodology, and finally dissemination. The details of the presentations and technical discussions, as well as additional actions that were proposed to achieve all the goals of the meeting are summarized in this report.

  8. Coding Instructions, Worksheets, and Keypunch Sheets for M.E.T.R.O.-APEX Simulation.

    Science.gov (United States)

    Michigan Univ., Ann Arbor. Environmental Simulation Lab.

    Compiled in this resource are coding instructions, worksheets, and keypunch sheets for use in the M.E.T.R.O.-APEX simulation, described in detail in documents ED 064 530 through ED 064 550. Air Pollution Exercise (APEX) is a computerized college and professional level "real world" simulation of a community with urban and rural problems, industrial…

  9. Defects in railway bridges and procedures for maintenance:UIC Code 778-4R

    OpenAIRE

    Elfgren, Lennart

    2009-01-01

    This leaflet gives guidelines and recommendations covering procedures for the maintenance and strengthening of railway bridges. Arrangements and methods for inspection are presented; defects are described; methods for monitoring and assessment are given; and procedures for maintenance, repair, strengthening and renewal are defined.The purpose is to update the 1989 edition of UIC Code 778-4R and to implement results from a European Integrated Research Project (2003-2007) on “Sustainable Bridge...

  10. R5FORCE: a program to compute fluid induced forces using hydrodynamic output from the RELAP5 code

    International Nuclear Information System (INIS)

    Watkins, J.C.

    1983-01-01

    This paper describes the computer code R5FORCE, a postprocessor to the RELAP5/MOD1 thermal-hydraulics code. R5FORCE computes piping hydraulic force/time histories that can be input into various structural analysis computer codes. R5FORCE solves the momentum conservation equation using the pressure and wall shear force terms rather than the pressure and fluid acceleration terms; eliminating potential instabilities associated with computing the time derivative in the fluid acceleration term. The updates to REALP5 required to generate the input data to R5FORCE are also discussed

  11. Verification of the code DYN3D/R with the help of international benchmarks

    International Nuclear Information System (INIS)

    Grundmann, U.; Rohde, U.

    1997-10-01

    Different benchmarks for reactors with quadratic fuel assemblies were calculated with the code DYN3D/R. In this report comparisons with the results of the reference solutions are carried out. The results of DYN3D/R and the reference calculation for the eigenvalue k eff and the power distribution are shown for the steady-state 3-dimensional IAEA-Benchmark. The results of NEACRP-Benchmarks on control rod ejections in a standard PWR were compared with the reference solutions published by the NEA Data Bank. For assessing the accuracy of DYN3D/R results in comparison to other codes the deviations to the reference solutions are considered. Detailed comparisons with the published reference solutions of the NEA-NSC Benchmarks on uncontrolled withdrawal of control rods are made. The influence of the axial nodalization is also investigated. All in all, a good agreement of the DYN3D/R results with the reference solutions can be seen for the considered benchmark problems. (orig.) [de

  12. IEA-R1 reactor core simulation with RELAP5 code

    International Nuclear Information System (INIS)

    Rocha, Ricardo Takeshi Vieira da; Belchior Junior, Antonio; Andrade, Delvonei Alves de; Sabundjian, Gaiane; Umbehaum, Pedro Ernesto; Torres, Walmir Maximo

    2005-01-01

    This paper presents a preliminary RELAP5 model for the IEA-R1 core. The power distribution is supplied by the neutronic code, CITATION. The main objective is to model the IEA-R1 core and validate the model through the comparison of the results to the ones from COBRA and PARET, which were used in the Final Safety Analysis Report (FSAR) for this plant. Preliminary calculations regarding some simulations are presented. Boundary conditions are simulated through time dependent components. Results obtained are compared to those available for the IEA-R1. This study will be continued considering a model for the whole plant. Important transient and accidents will be analysed in order to verify the Emergency Core Cooling System - ECCS efficiency to hold its function as projected to preserve the integrity of the reactor core and guarantee its cooling. (author)

  13. A model of R-D performance evaluation for Rate-Distortion-Complexity evaluation of H.264 video coding

    DEFF Research Database (Denmark)

    Wu, Mo; Forchhammer, Søren

    2007-01-01

    This paper considers a method for evaluation of Rate-Distortion-Complexity (R-D-C) performance of video coding. A statistical model of the transformed coefficients is used to estimate the Rate-Distortion (R-D) performance. A model frame work for rate, distortion and slope of the R-D curve for inter...... and intra frame is presented. Assumptions are given for analyzing an R-D model for fast R-D-C evaluation. The theoretical expressions are combined with H.264 video coding, and confirmed by experimental results. The complexity frame work is applied to the integer motion estimation....

  14. R134a Flow Boiling Analysis with Modified Thermodynamic Property File of MARS Code

    Energy Technology Data Exchange (ETDEWEB)

    Son, Gyumin; Bang, In Cheol [UNIST, Ulsan (Korea, Republic of)

    2016-10-15

    Previous study showed application of RELAP5 code to solar energy facility with molten salt (60% NaNO3 and 40% KNO3) as working fluid. Based on external experimental correlations, thermodynamic properties of molten salt were evaluated as a function of pressure and temperature and those equations were used to generate tpf. To validate external tpf, experimental values were compared with RELAP5 analysis. In nuclear field, utilization of other fluid is also important since many thermal-hydraulic experiments used various fluids such as FC-72, R123, and R134a. Theses refrigerants have been used to simulate the high pressure environment of nuclear power plants due to their low boiling point, and density ratio between vapor and liquid. Thus, this study aims for tpf generation of R134a and verification by analyzing real case. R134a is selected as a fluid to be implemented and analyzed because it is currently used in refrigerator and frequently used in flow boiling experiment related with heat transfer coefficient and CHF measurement. R134a property file were generated with fitted equation using temperature and pressure as variables, originated from external data source. For validation, flow boiling experiment case were made into simplified input. Analysis with tpfr134a showed that application of Gnielinksi correlation could enhance single phase flow accuracy. Large error of HTC from two phase analysis requires parameter study. Future work aims for more specified experimental case comparison and correlation enhancement for two phase analysis.

  15. Recent R and D around the Monte-Carlo code Tripoli-4 for criticality calculation

    International Nuclear Information System (INIS)

    Hugot, F.X.; Lee, Y.K.; Malvagi, F.

    2008-01-01

    TRIPOLI-4 [1] is the fourth generation of the TRIPOLI family of Monte Carlo codes developed from the 60's by CEA. It simulates the 3D transport of neutrons, photons, electrons and positrons as well as coupled neutron-photon propagation and electron-photons cascade showers. The code addresses radiation protection and shielding problems, as well as criticality and reactor physics problems through both critical and subcritical neutronics calculations. It uses full pointwise as well as multigroup cross-sections. The code has been validated through several hundred benchmarks as well as measurement campaigns. It is used as a reference tool by CEA as well as its industrial and institutional partners, and in the NURESIM [2] European project. Section 2 reviews its main features, with emphasis on the latest developments. Section 3 presents some recent R and D for criticality calculations. Fission matrix, Eigen-values and eigenvectors computations will be exposed. Corrections on the standard deviation estimator in the case of correlations between generation steps will be detailed. Section 4 presents some preliminary results obtained by the new mesh tally feature. The last section presents the interest of using XML format output files. (authors)

  16. VizieR Online Data Catalog: FARGO_THORIN 1.0 hydrodynamic code (Chrenko+, 2017)

    Science.gov (United States)

    Chrenko, O.; Broz, M.; Lambrechts, M.

    2017-07-01

    This archive contains the source files, documentation and example simulation setups of the FARGO_THORIN 1.0 hydrodynamic code. The program was introduced, described and used for simulations in the paper. It is built on top of the FARGO code (Masset, 2000A&AS..141..165M, Baruteau & Masset, 2008ApJ...672.1054B) and it is also interfaced with the REBOUND integrator package (Rein & Liu, 2012A&A...537A.128R). THORIN stands for Two-fluid HydrOdynamics, the Rebound integrator Interface and Non-isothermal gas physics. The program is designed for self-consistent investigations of protoplanetary systems consisting of a gas disk, a disk of small solid particles (pebbles) and embedded protoplanets. Code features: I) Non-isothermal gas disk with implicit numerical solution of the energy equation. The implemented energy source terms are: Compressional heating, viscous heating, stellar irradiation, vertical escape of radiation, radiative diffusion in the midplane and radiative feedback to accretion heating of protoplanets. II) Planets evolved in 3D, with close encounters allowed. The orbits are integrated using the IAS15 integrator (Rein & Spiegel, 2015MNRAS.446.1424R). The code detects the collisions among planets and resolve them as mergers. III) Refined treatment of the planet-disk gravitational interaction. The code uses a vertical averaging of the gravitational potential, as outlined in Muller & Kley (2012A&A...539A..18M). IV) Pebble disk represented by an Eulerian, presureless and inviscid fluid. The pebble dynamics is affected by the Epstein gas drag and optionally by the diffusive effects. We also implemented the drag back-reaction term into the Navier-Stokes equation for the gas. Archive summary: ------------------------------------------------------------------------- directory/file Explanation ------------------------------------------------------------------------- /in_relax Contains setup of the first example simulation /in_wplanet Contains setup of the second

  17. User Guide for the R5EXEC Coupling Interface in the RELAP5-3D Code

    Energy Technology Data Exchange (ETDEWEB)

    Forsmann, J. Hope [Idaho National Lab. (INL), Idaho Falls, ID (United States); Weaver, Walter L. [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-04-01

    This report describes the R5EXEC coupling interface in the RELAP5-3D computer code from the users perspective. The information in the report is intended for users who want to couple RELAP5-3D to other thermal-hydraulic, neutron kinetics, or control system simulation codes.

  18. A two dimensional code (R,Z) for nuclear reactor analysis and its application to the UAR-RI reactor

    International Nuclear Information System (INIS)

    Bishay, S.T.; Mikhail, I.F.I.; Gaafar, M.A.; Michaiel, M.L.; Nassar, S.F.

    1988-01-01

    A detailed study is given of fuel consumption in completely reflected cylindrical reactors. A two group, two dimensional (r,z) code is developed to carry out the required procedure. The code is applied to the UAR-RI reactor and the results are found to be in complete agreement with the experimental observations and with the theoretical interpretations. 7 fig., 12 tab

  19. Sensitivity Analysis of Uncertainty Parameter based on MARS-LMR Code on SHRT-45R of EBR II

    Energy Technology Data Exchange (ETDEWEB)

    Kang, Seok-Ju; Kang, Doo-Hyuk; Seo, Jae-Seung [System Engineering and Technology Co., Daejeon (Korea, Republic of); Bae, Sung-Won [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Jeong, Hae-Yong [Sejong University, Seoul (Korea, Republic of)

    2016-10-15

    In order to assess the uncertainty quantification of the MARS-LMR code, the code has been improved by modifying the source code to accommodate calculation process required for uncertainty quantification. In the present study, a transient of Unprotected Loss of Flow(ULOF) is selected as typical cases of as Anticipated Transient without Scram(ATWS) which belongs to DEC category. The MARS-LMR input generation for EBR II SHRT-45R and execution works are performed by using the PAPIRUS program. The sensitivity analysis is carried out with Uncertainty Parameter of the MARS-LMR code for EBR-II SHRT-45R. Based on the results of sensitivity analysis, dominant parameters with large sensitivity to FoM are picked out. Dominant parameters selected are closely related to the development process of ULOF event.

  20. Extending R packages to support 64-bit compiled code: An illustration with spam64 and GIMMS NDVI3g data

    Science.gov (United States)

    Gerber, Florian; Mösinger, Kaspar; Furrer, Reinhard

    2017-07-01

    Software packages for spatial data often implement a hybrid approach of interpreted and compiled programming languages. The compiled parts are usually written in C, C++, or Fortran, and are efficient in terms of computational speed and memory usage. Conversely, the interpreted part serves as a convenient user-interface and calls the compiled code for computationally demanding operations. The price paid for the user friendliness of the interpreted component is-besides performance-the limited access to low level and optimized code. An example of such a restriction is the 64-bit vector support of the widely used statistical language R. On the R side, users do not need to change existing code and may not even notice the extension. On the other hand, interfacing 64-bit compiled code efficiently is challenging. Since many R packages for spatial data could benefit from 64-bit vectors, we investigate strategies to efficiently pass 64-bit vectors to compiled languages. More precisely, we show how to simply extend existing R packages using the foreign function interface to seamlessly support 64-bit vectors. This extension is shown with the sparse matrix algebra R package spam. The new capabilities are illustrated with an example of GIMMS NDVI3g data featuring a parametric modeling approach for a non-stationary covariance matrix.

  1. A Slater parameter optimisation interface for the CIV3 atomic structure code and its possible use with the R-matrix close coupling collision code

    International Nuclear Information System (INIS)

    Fawcett, B.C.; Hibbert, A.

    1989-11-01

    Details are here provided of amendments to the atomic structure code CIV3 which allow the optional adjustment of Slater parameters and average energies of configurations so that they result in improved energy levels and eigenvectors. It is also indicated how, in principle, the resultant improved eigenvectors can be utilised by the R-matrix collision code, thus providing an optimised target for close coupling collision strength calculations. An analogous computational method was recently reported for distorted wave collision strength calculations and applied to Fe XIII. The general method is suitable for the computation of collision strengths for complex ions and in some cases can then provide a basis for collision strength calculations in ions where ab initio computations break down or result in unnecessarily large errors. (author)

  2. SHREDI a removal diffusion shielding code for x-y and r-z geometries

    International Nuclear Information System (INIS)

    Daneri, A.; Toselli, G.

    1974-01-01

    The SHREDI, a removal diffusion neutron shielding code written in FORTRAN for IBM 370/165, is presented. The code computes neutron fluxes or adjoint fluxes and activations in bidimensional sections of the shield. It is also possible to consider shielding points with the same coordinate (y or z) (monodimensional problems)

  3. International benchmark study of advanced thermal hydraulic safety analysis codes against measurements on IEA-R1 research reactor

    Energy Technology Data Exchange (ETDEWEB)

    Hainoun, A., E-mail: pscientific2@aec.org.sy [Atomic Energy Commission of Syria (AECS), Nuclear Engineering Department, P.O. Box 6091, Damascus (Syrian Arab Republic); Doval, A. [Nuclear Engineering Department, Av. Cmdt. Luis Piedrabuena 4950, C.P. 8400 S.C de Bariloche, Rio Negro (Argentina); Umbehaun, P. [Centro de Engenharia Nuclear – CEN, IPEN-CNEN/SP, Av. Lineu Prestes 2242-Cidade Universitaria, CEP-05508-000 São Paulo, SP (Brazil); Chatzidakis, S. [School of Nuclear Engineering, Purdue University, West Lafayette, IN 47907 (United States); Ghazi, N. [Atomic Energy Commission of Syria (AECS), Nuclear Engineering Department, P.O. Box 6091, Damascus (Syrian Arab Republic); Park, S. [Research Reactor Design and Engineering Division, Basic Science Project Operation Dept., Korea Atomic Energy Research Institute (Korea, Republic of); Mladin, M. [Institute for Nuclear Research, Campului Street No. 1, P.O. Box 78, 115400 Mioveni, Arges (Romania); Shokr, A. [Division of Nuclear Installation Safety, Research Reactor Safety Section, International Atomic Energy Agency, A-1400 Vienna (Austria)

    2014-12-15

    Highlights: • A set of advanced system thermal hydraulic codes are benchmarked against IFA of IEA-R1. • Comparative safety analysis of IEA-R1 reactor during LOFA by 7 working teams. • This work covers both experimental and calculation effort and presents new out findings on TH of RR that have not been reported before. • LOFA results discrepancies from 7% to 20% for coolant and peak clad temperatures are predicted conservatively. - Abstract: In the framework of the IAEA Coordination Research Project on “Innovative methods in research reactor analysis: Benchmark against experimental data on neutronics and thermal hydraulic computational methods and tools for operation and safety analysis of research reactors” the Brazilian research reactor IEA-R1 has been selected as reference facility to perform benchmark calculations for a set of thermal hydraulic codes being widely used by international teams in the field of research reactor (RR) deterministic safety analysis. The goal of the conducted benchmark is to demonstrate the application of innovative reactor analysis tools in the research reactor community, validation of the applied codes and application of the validated codes to perform comprehensive safety analysis of RR. The IEA-R1 is equipped with an Instrumented Fuel Assembly (IFA) which provided measurements for normal operation and loss of flow transient. The measurements comprised coolant and cladding temperatures, reactor power and flow rate. Temperatures are measured at three different radial and axial positions of IFA summing up to 12 measuring points in addition to the coolant inlet and outlet temperatures. The considered benchmark deals with the loss of reactor flow and the subsequent flow reversal from downward forced to upward natural circulation and presents therefore relevant phenomena for the RR safety analysis. The benchmark calculations were performed independently by the participating teams using different thermal hydraulic and safety

  4. Transient cases analyses of the TRIGA IPR-R1 using thermal hydraulic and neutron kinetic coupled codes

    Energy Technology Data Exchange (ETDEWEB)

    Reis, Patricia A.L.; Costa, Antonella L.; Pereira, Claubia; Veloso, Maria A.F.; Scari, Maria E., E-mail: patricialire@yahoo.com.br, E-mail: antonella@nuclear.ufmg.br, E-mail: claubia@nuclear.ufmg.br, E-mail: dora@nuclear.ufmg.br, E-mail: melizabethscari@yahoo.com [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, MG (Brazil). Departamento de Engenharia Nuclear; Instituto Nacional de Ciencias e Tecnologia de Reatores Nucleares Inovadores (INCT/CNPq), Belo Horizonte (Brazil); Miro, Rafael; Verdu, Gumersindo, E-mail: rmiro@iqn.upv.es, E-mail: gverdu@iqn.upv.es [Universidad Politecnica de Valencia (Spain). Departamento de Ingenieria Quimica y Nuclear

    2015-07-01

    Simulations and analyses of nuclear reactors have been improved by utilization of coupled thermal-hydraulic (TH) and neutron kinetics (NK) system codes especially to simulate transients that involve strong feedback effects between NK and TH. The TH-NK coupling technique was initially developed and used to simulate the behavior of power reactors; however, several coupling methodologies are now being applied for research reactors. This work presents the coupling methodology application between RELAP5 and PARCS codes using as a model the TRIGA IPR-R1 research reactor. Analyses of steady state and transient conditions and comparisons with results from simulations using only the RELAP5 code are being presented in this paper. (author)

  5. Large Intergenic Non-coding RNA-RoR Inhibits Aerobic Glycolysis of Glioblastoma Cells via Akt Pathway

    Science.gov (United States)

    Li, Yong; He, Zhi-Cheng; Liu, Qing; Zhou, Kai; Shi, Yu; Yao, Xiao-Hong; Zhang, Xia; Kung, Hsiang-Fu; Ping, Yi-Fang; Bian, Xiu-Wu

    2018-01-01

    Reprogramming energy metabolism is a hallmark of malignant tumors, including glioblastoma (GBM). Aerobic glycolysis is often utilized by tumor cells to maintain survival and proliferation. However, the underlying mechanisms of aerobic glycolysis in GBM remain elusive. Herein, we demonstrated that large intergenic non-coding RNA-RoR (LincRNA-RoR) functioned as a critical suppressor to inhibit the aerobic glycolysis and viability of GBM cells. We found that LincRNA-RoR was markedly reduced in GBM tissues compared with adjacent non-tumor tissues from 10 cases of GBM patients. Consistently, LincRNA-RoR expression in GBM cells was significantly lower than that in normal glial cells. The aerobic glycolysis of GBM cells, as determined by the measurement of glucose uptake and lactate production, was impaired by LincRNA-RoR overexpression. Mechanistically, LincRNA-RoR inhibited the expression of Rictor, the key component of mTORC2 (mammalian target of rapamycin complex 2), to suppress the activity of Akt pathway and impair the expression of glycolytic effectors, including Glut1, HK2, PKM2 and LDHA. Finally, enforced expression of LincRNA-RoR reduced the proliferation of GBM cells in vitro, restrained tumor growth in vivo, and repressed the expression of glycolytic molecules in GBM xenografts. Collectively, our results underscore LincRNA-RoR as a new suppressor of GBM aerobic glycolysis with therapeutic potential. PMID:29581766

  6. Long non-coding RNA TUG1 promotes endometrial cancer development via inhibiting miR-299 and miR-34a-5p.

    Science.gov (United States)

    Liu, Lifen; Chen, Xin; Zhang, Ying; Hu, Yanrong; Shen, Xiaoqing; Zhu, Weipei

    2017-05-09

    It is generally known that the human genome makes a large amount of noncoding RNAs compared with coding genes. Long non-coding RNAs (lncRNAs) which composed of more than 200 nucleotides have been described as the largest subclass of the non-coding transcriptome in human noncoding RNAs. Existing research shows that lncRNAs exerted biological functions in various tumors via participating in both oncogenic and tumor suppressing pathways. The previous studies indicated that lncRNA taurine upregulated 1 (TUG1) play important roles in the initiation and progression of malignancies. In this study,based on previous research, we investigated the expression and biological role of the lncRNA-TUG1. We analyzed the relationship between lncRNA-TUG1and endometrial carcinoma (EC) in a total 104 EC carcinoma specimens, compared with that in normal tissues. We found that lncRNA-TUG1 expression in cancer tissues was significantly higher than that in adjacent tissues. Through a series of experiments, the results demonstrated that lncRNA-TUG1 enhances the evolution and progression of EC through inhibiting miR-299 and miR-34a-5p.

  7. Long non-coding RNA TUG1 acts as a miR-26a sponge in human glioma cells.

    Science.gov (United States)

    Li, Jun; An, Gang; Zhang, Meng; Ma, Qingfang

    2016-09-02

    Long non-coding RNA taurine upregulated gene 1 (TUG1) acts as an important regulator in cancer pathogenesis; however, its functional mechanism in glioma development remains unclear. This study aims to explore the potential function of TUG1 in glioma by sponging miR-26a. The expression of TUG1, miR-26a, and phosphatase and tensin homolog (PTEN) in 20 paired glioma tissues was detected by quantitative real-time PCR and subjected to correlation analysis. Bioinformatics analysis was performed by using DIANA Tools. Abnormal TUG1 expression was conducted in two glioma cells to analyze its regulation on miR-26a and PTEN using real-time PCR, western blot, and luciferase reporter assay. TUG1 expression was confirmed to be upregulated in glioma tissues, and showed an inverse correlation with downregulated miR-26a. TUG1 could negatively regulate the expression of miR-26a in glioma cells. The bioinformatics prediction revealed putative miR-26a binding sites within TUG1 transcripts. Further experiments demonstrated the positive regulation of TUG1 on the miR-26a target, PTEN, wherein TUG1 could inhibit the negative regulation of miR-26a on PTEN by binding its 3'UTR. Additionally, the expression of PTEN was also upregulated in glioma tissues, showing a positive or negative correlation with TUG1 or miR-26a, respectively. TUG1 could serve as a miR-26a sponge in human glioma cells, contributing to the upregulation of PTEN. This study revealed a new TUG1/miR-26a/PTEN regulatory mechanism and provided a further understanding of the tumor-suppressive role of TUG1 in glioma development. Copyright © 2016 Elsevier Inc. All rights reserved.

  8. R&D for Safety Codes and Standards: Materials and Components Compatibility

    Energy Technology Data Exchange (ETDEWEB)

    Somerday, Brian P. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); LaFleur, Chris [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Marchi, Chris San [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2015-08-01

    This project addresses the following technical barriers from the Safety, Codes and Standards section of the 2012 Fuel Cell Technologies Office Multi-Year Research, Development and Demonstration Plan (section 3.8): (A) Safety data and information: limited access and availability (F) Enabling national and international markets requires consistent RCS (G) Insufficient technical data to revise standards.

  9. Thermal neutron flux distribution in the ET R R-1 reactor core as experimentally measured and theoretically calculated by the code triton

    Energy Technology Data Exchange (ETDEWEB)

    Imam, M [National center for nuclear safety and radiation control, atomic energy authority, Cairo, (Egypt)

    1995-10-01

    Thermal neutron flux distributions that were measured earlier at the ET-R R-1 reactor are compared with those calculated by the three dimensional diffusion code Triton. This comparison was made for the horizontal and vertical flux distributions. The horizontal thermal flux distributions considered in this comparison were along the core diagonals at two planes of different heights from core bottom, where one at a level passing through the control rod at core center and the other at a level below this control rod. In the meantime all the control rods were taken into consideration. The effect of the existence of a water cavity inside the core as well as the influence of the control rods on the thermal flux are illustrated in this work. The vertical thermal flux distributions considered in the comparison were at two positions in core namely; one along the core height the horizontal reactor power distribution along the core height and the horizontal reactor power distribution along the core diagonal as calculated by the code Triton are also given this work. 8 figs., 1 tab.

  10. Criticality analysis of the storage tubes for irradiated fuel elements from the IEA-R1 with the MCNP code

    International Nuclear Information System (INIS)

    Maragni, M.G.; Moreira, J.M.L.

    1992-01-01

    A criticality safety analysis has been carried out for the storage tubes for irradiated fuel elements from the IEA-R1 research reactor. The analysis utilized the MCNP computer code which allows exact simulations of complex geometries. Aiming reducing the amount of input data, the fuel element cross-sections have been spatially smeared out. The earth material interstice between fuel elements has been approximated conservatively as concrete because its composition was unknown. The storage tubes have been found subcritical for the most adverse conditions (water flooding and un-irradiated fuel elements). A similar analysis with the KENO-IV computer code overestimated the KEF result but still confirmed the criticality safety of the storage tubes. (author)

  11. Atucha II NPP full scope simulator modelling with the thermal hydraulic code TRAC{sub R}T

    Energy Technology Data Exchange (ETDEWEB)

    Alonso, Pablo Rey; Ruiz, Jose Antonio; Rivero, Norberto, E-mail: prey@tecnatom.e, E-mail: jaruiz@tecnatom.e, E-mail: nrivero@tecnatom.e [Tecnatom S.A., Madrid (Spain)

    2011-07-01

    In February 2010 NA-SA (Nucleoelectrica Argentina S.A.) awarded Tecnatom the Atucha II full scope simulator project. NA-SA is a public company owner of the Argentinean nuclear power plants. Atucha II is due to enter in operation shortly. Atucha II NPP is a PHWR type plant cooled by the water of the Parana River and has the same design as the Atucha I unit, doubling its power capacity. Atucha II will produce 745 MWe utilizing heavy water as coolant and moderator, and natural uranium as fuel. A plant singular feature is the permanent core refueling. TRAC{sub R}T is the first real time thermal hydraulic six-equations code used in the training simulation industry for NSSS modeling. It is the result from adapting to real time the best estimate code TRACG. TRAC{sub R}T is based on first principle conservation equations for mass, energy and momentum for liquid and steam phases, with two phase flows under non homogeneous and non equilibrium conditions. At present, it has been successfully implemented in twelve full scope replica simulators in different training centers throughout the world. To ease the modeling task, TRAC{sub R}T includes a graphical pre-processing tool designed to optimize this process and alleviate the burden of entering alpha numerical data in an input file. (author)

  12. Application of the newly developed 3D transport code r3t to selected field cases

    International Nuclear Information System (INIS)

    Rubel, A.; Fein, E.

    2006-01-01

    To model the transport of contaminants in connexion with long-term safety analyses of repositories for radioactive waste recently the numerical model r 3 t was developed. In the following first applications of r 3 t are presented. The results of modelling of the transport of zinc at the sewage treatment facility in Cape Cod, Massachusetts, and of trace elements in the frame work of the in-situ diffusion experiments DI-A and DR at the underground laboratory Mont Terri are shown. (authors)

  13. Insertion of reactivity (RIA) without scram in the reactor core IEA-R1 using code PARET

    International Nuclear Information System (INIS)

    Alves, Urias F.; Castrillo, Lazara S.; Lima, Fernando A.

    2013-01-01

    The modeling and analysis thermo hydraulics of a research reactor with MTR type fuel elements - Material Testing Reactor - was performed using the code PARET (Program for the Analysis of Reactor Transients) when in the system some external event is introduced that changed the reactivity in the reactor core. Transients of Reactivity Insertion of 0.5 , 1.5 and 2.0$/ 0.7s in the brazilian reactor IEA-R1 will be presented, and will be shown under what conditions it is possible to ensure the safe operation of its nucleus. (author)

  14. CRNDE: a long non-coding RNA involved in CanceR, Neurobiology and DEvelopment

    Directory of Open Access Journals (Sweden)

    Blake C. Ellis

    2012-11-01

    Full Text Available CRNDE is the gene symbol for Colorectal Neoplasia Differentially Expressed (non protein-coding, a long non-coding RNA (lncRNA gene that expresses multiple splice variants and displays a very tissue-specific pattern of expression. CRNDE was initially identified as a lncRNA whose expression is highly elevated in colorectal cancer, but it is also upregulated in many other solid tumors and in leukemias. Indeed, CRNDE is the most upregulated lncRNA in gliomas and here, as in other cancers, it is associated with a stemness signature. CRNDE is expressed in specific regions within the human and mouse brain; the mouse ortholog is high in induced pluripotent stem cells and increases further during neuronal differentiation. We suggest that CRNDE is a multifunctional lncRNA whose different splice forms provide specific functional scaffolds for regulatory complexes, such as the polycomb repressive complex 2 (PRC2 and CoREST chromatin-modifying complexes, which CRNDE helps pilot to target genes.

  15. Long non-coding RNA H19 suppresses retinoblastoma progression via counteracting miR-17-92 cluster.

    Science.gov (United States)

    Zhang, Aihui; Shang, Weiwei; Nie, Qiaoli; Li, Ting; Li, Suhui

    2018-04-01

    Long non-coding RNAs (lncRNAs) are frequently dysregulated and play important roles in many cancers. lncRNA H19 is one of the earliest discovered lncRNAs which has diverse roles in different cancers. However, the expression, roles, and action mechanisms of H19 in retinoblastoma are still largely unknown. In this study, we found that H19 is downregulated in retinoblastoma tissues and cell lines. Gain-of-function and loss-of-function assays showed that H19 inhibits retinoblastoma cell proliferation, induces retinoblastoma cell cycle arrest and cell apoptosis. Mechanistically, we identified seven miR-17-92 cluster binding sites on H19, and found that H19 directly bound to miR-17-92 cluster via these seven binding sites. Through binding to miR-17-92 cluster, H19 relieves the suppressing roles of miR-17-92 cluster on p21. Furthermore, H19 represses STAT3 activation induced by miR-17-92 cluster. Hence, our results revealed that H19 upregulates p21 expression, inhibits STAT3 phosphorylation, and downregulates the expression of STAT3 target genes BCL2, BCL2L1, and BIRC5. In addition, functional assays demonstrated that the mutation of miR-17-92 cluster binding sites on H19 abolished the proliferation inhibiting, cell cycle arrest and cell apoptosis inducing roles of H19 in retinoblastoma. In conclusion, our data suggested that H19 inhibits retinoblastoma progression via counteracting the roles of miR-17-92 cluster, and implied that enhancing the action of H19 may be a promising therapeutic strategy for retinoblastoma. © 2017 Wiley Periodicals, Inc.

  16. Analysis of OECD/CSNI ISP-42 phase A PANDA experiment using coupled code R5G (RELAP5-GOTHIC)

    International Nuclear Information System (INIS)

    Bencik, V.; Debrecin, N.; Grgic, D.; Bajs, T.

    2010-01-01

    In the paper, the results of the analysis of OECD/CSNI ISP-42 Phase A experiment at PANDA facility using stand-alone codes RELAP5/mod3.3 and GOTHIC 7.2b as well as coupled code R5G (RELAP5/mod3.3-GOTHIC 7.2b) are presented. PANDA is a large-scale thermal-hydraulic test facility installed at PSI (Paul Scherrer Institute) in Switzerland. The OECD/CSNI ISP-42 test consists of six sequential phases (Phase A through F). The present work deals with the post-test calculation of the Phase A, including the break of the main steam line and the Passive Containment Cooling (PCC) System Start-Up. The objective of the test is to investigate the start-up phenomenology of passive cooling system when steam is injected into cold vessel filled with air. The calculation was performed using stand-alone RELAP5/mod3.3 and GOTHIC 7.2b models, and then the same calculation was performed using coupled code with RELAP5 being responsible for reactor part of the model and GOTHIC being responsible for containment part of the model. The prediction capability, running time and modeling aspects were discussed for all three cases. (authors)

  17. Dynamische Programm-Code-Verwaltung und -Optimierung für eingebettete Systeme

    OpenAIRE

    Schell, Dominic

    2009-01-01

    Bei Desktop-PCs ist ein großer Hauptspeicherausbau im Bereich jenseits von 1 GB dank gesunkener Speicherpreise und auf Grund gestiegener Anforderungen keine Seltenheit mehr. Es existiert jedoch eine Unmenge Kleinstrechner, wie z.B. im Automobilbereich eingesetzte Steuergeräte, die sich einen großen Speicherausbau wegen des Platzbedarfs der Speicherchips, deren Energiekonsum und den zusätzlichen Kosten nicht leisten können. Ein wichtiges Ziel beim Erzeugen der Software für eingebettete Systeme...

  18. Proclamation No. R. 151, Natal Code of Zulu Law, 3 September 1987.

    Science.gov (United States)

    1988-01-01

    This document contains major provisions of the 1987 South African Proclamation amending the Natal Code of Zulu Law. Chapter 4 of these provisions covers personal status, property rights, the age of majority, and houses or families of which children become members. Chapter 5 deals with family heads in general, the earnings of minor children, the ownership and control of family property, the control of family members, and the responsibilities and privileges of family heads. The seventh chapter regulates customary marriages in general, the investigation of complaints about unreasonable withholding of consent on the part of a father or guardian, reporting of the arranged marriage date and payment of fees, the appointment and duties of official witnesses, the payment of "lobolo," the registration of customary marriages, issuance of the certificate of customary marriage, grounds for divorce, grounds for a declaration of nullity, duties of the party seeking the divorce, return of lobolo, child custody, and "ukungena" unions. The provisions of the eight chapter include the date of payment and delivery of lobolo and death of the lobolo cattle, the women who may receive lobolo, the constitution of lobolo, the amount of lobolo paid for women of varying social ranks, claims relative to lobolo payments, and the claiming of a ngquthu beast. Chapter 9 details the family system in terms of the establishment of senior or affiliated houses, the status of the first wife, the status of wives taken by a commoner subsequent to the first wife, a formal declaration of intention to divide a family home into sections, the declaration of the status of a second and subsequent wives, the declaration of the status of a third wife as a qade wife, junior houses affiliated with senior houses, the status of wives of the hereditary chief, the circumstances when members may leave a family home, and the property of a girl entering a customary marriage. The tenth chapter contains the laws of

  19. Development of blow down and sodium-water reaction jet analysis codes-Validation by sodium-water reaction tests (SWAT-1R)

    International Nuclear Information System (INIS)

    Hiroshi Seino; Akikazu Kurihara; Isao Ono; Koji Jitsu

    2005-01-01

    Blow down analysis code (LEAP-BLOW) and sodium-water reaction jet analysis code (LEAP-JET) have been developed in order to improve the evaluation method on sodium-water reaction event in the steam generator (SG) of a sodium cooled fast breeder reactor (FBR). The validation analyses by these two codes were carried out using the data of Sodium-Water Reaction Test (SWAT-1R). The following main results have been obtained through this validation: (1) The calculational results by LEAP-BLOW such as internal pressure and water flow rate show good agreement with the results of the SWAT- 1R test. (2) The LEAP-JET code can qualitatively simulate the behavior of sodium-water reaction. However, it is found that the code has tendency to overestimate the maximum temperature of the reaction jet. (authors)

  20. N-body simulations for f(R) gravity using a self-adaptive particle-mesh code

    Science.gov (United States)

    Zhao, Gong-Bo; Li, Baojiu; Koyama, Kazuya

    2011-02-01

    We perform high-resolution N-body simulations for f(R) gravity based on a self-adaptive particle-mesh code MLAPM. The chameleon mechanism that recovers general relativity on small scales is fully taken into account by self-consistently solving the nonlinear equation for the scalar field. We independently confirm the previous simulation results, including the matter power spectrum, halo mass function, and density profiles, obtained by Oyaizu [Phys. Rev. DPRVDAQ1550-7998 78, 123524 (2008)10.1103/PhysRevD.78.123524] and Schmidt [Phys. Rev. DPRVDAQ1550-7998 79, 083518 (2009)10.1103/PhysRevD.79.083518], and extend the resolution up to k˜20h/Mpc for the measurement of the matter power spectrum. Based on our simulation results, we discuss how the chameleon mechanism affects the clustering of dark matter and halos on full nonlinear scales.

  1. N-body simulations for f(R) gravity using a self-adaptive particle-mesh code

    International Nuclear Information System (INIS)

    Zhao Gongbo; Koyama, Kazuya; Li Baojiu

    2011-01-01

    We perform high-resolution N-body simulations for f(R) gravity based on a self-adaptive particle-mesh code MLAPM. The chameleon mechanism that recovers general relativity on small scales is fully taken into account by self-consistently solving the nonlinear equation for the scalar field. We independently confirm the previous simulation results, including the matter power spectrum, halo mass function, and density profiles, obtained by Oyaizu et al.[Phys. Rev. D 78, 123524 (2008)] and Schmidt et al.[Phys. Rev. D 79, 083518 (2009)], and extend the resolution up to k∼20 h/Mpc for the measurement of the matter power spectrum. Based on our simulation results, we discuss how the chameleon mechanism affects the clustering of dark matter and halos on full nonlinear scales.

  2. Efficient diagonalization of the sparse matrices produced within the framework of the UK R-matrix molecular codes

    Science.gov (United States)

    Galiatsatos, P. G.; Tennyson, J.

    2012-11-01

    The most time consuming step within the framework of the UK R-matrix molecular codes is that of the diagonalization of the inner region Hamiltonian matrix (IRHM). Here we present the method that we follow to speed up this step. We use shared memory machines (SMM), distributed memory machines (DMM), the OpenMP directive based parallel language, the MPI function based parallel language, the sparse matrix diagonalizers ARPACK and PARPACK, a variation for real symmetric matrices of the official coordinate sparse matrix format and finally a parallel sparse matrix-vector product (PSMV). The efficient application of the previous techniques rely on two important facts: the sparsity of the matrix is large enough (more than 98%) and in order to get back converged results we need a small only part of the matrix spectrum.

  3. Representation of inhomogeneities in the flow and transport codes d{sup 3}f and r{sup 3}t

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, Anke (ed.)

    2013-09-15

    The codes d{sup 3}f and r{sup 3}t are well established for modelling density-driven flow and nuclide transport in the far field of repositories for hazardous material in deep geological formations. While originally intended to be applied to the overburden of a salt dome they were adapted to alternative host media such as crystalline rock or mudstone by including fractures into an otherwise porous medium. However, only discrete fractures or fracture networks with a rather limited number of fractures could be dealt with. Networks of smaller fractures - so-called background fractures - can easily consist of hundreds and thousands of significant individual fractures in a model domain and were therefore beyond the scope of d{sup 3}f and r{sup 3}t. One way to circumvent this problem is to replace a discrete fracture network with an equivalent porous medium. While this is a task in itself the codes had also numerically adapted to be to cope with the new methods. This report describes approaches and results of this work. In groundwater flow simulation fractures are usually modelled as lower dimensional objects. But especially in the case of density driven flow situations may occur where the validity of this assumption has to be proved. Here a special approach was developed and implemented that allows an adaptive resolution of the layers. Of central relevance in this respect is the development of local refinement or coarsening criteria, an adaptive discretisation that allows an adaptive transition from low-dimensional to equidimensional modelling of the fractures, and an adaptive multigrid algorithm Furthermore, discretisation methods of higher order for the mixed parabolic-hyperbolic problems were developed. New filtering algebraic multigrid methods as efficient solvers for the large linear equation systems were implemented. The parallelisation was improved by implementation of a parallel communication layer (pcl). For the estimation of parameters for these systems by

  4. Calculs de doses générées par les rayonnements ionisants principes physiques et codes de calcul

    CERN Document Server

    Vivier, Alain

    2016-01-01

    Cet ouvrage et les codes associés s’adressent aux utilisateurs de sources de rayonnements ionisants : techniciens, ingénieurs de sécurité, personnes compétentes en radioprotection, mais aussi médecins, chercheurs, concepteurs, décideurs… Les contraintes croissantes liées à la radioprotection rendent indispensables l’utilisation de codes de calcul permettant d’évaluer les débits de doses générées par ces sources et la façon dont on peut s’en protéger au mieux. De nombreux codes existent, dont certains restent des références incontournables, mais ils sont relativement complexes à mettre en oeuvre et restent en général réservés aux bureaux d’études. En outre, ces codes sont souvent des « boîtes noires » qui ne permettent pas de comprendre la physique sous-jacente. L’objectif de cet ouvrage est double : - Exposer les principes physiques permettant de comprendre les phénomènes à l’oeuvre lorsque la matière est irradiée par des rayonnements ionisants. Il devient al...

  5. R

    Directory of Open Access Journals (Sweden)

    Ravšelj Dejan

    2017-06-01

    Full Text Available Investment in research and development (R&D plays a vital role in economic growth. Therefore, the crucial role of government is to encourage companies to develop new knowledge, skills, and innovations in order to achieve greater competitiveness, employment creation, and economic development. The aim of this paper is to determine whether R&D subsidies contribute to corporate performance and ascertain whether the relationship between the amount of R&D subsidies and corporate performance is moderated by Slovenian cohesion (NUTS 2 level and statistical (NUTS 3 level regions. This paper ultimately tries to classify statistical regions within meaningful groups. Using an OLS regression, a unique dataset of 407 Slovenian companies is analysed for 2014. The empirical results reveal that R&D subsidies have a positive impact on corporate performance and confirm that cohesion and statistical regions can moderate the effect of R&D subsidy on corporate performance. Moreover, the paper provides for the classification of Slovenian statistical regions into four groups.

  6. R

    Directory of Open Access Journals (Sweden)

    Prokop Jacek

    2015-06-01

    Full Text Available This paper analyzes the impact of R&D activities in an oligopoly on consumer surplus and social welfare. We use a two-stage model to analyze the behavior of duopolists at the research level, and in the final-product market, under the assumption of linear and quadratic cost functions. Three options for firm competition are considered: 1 Cournot competition at both stages; 2 cooperation at the R&D stage and Cournot competition in the final-product market; and 3 cooperation at both stages. Numerical simulations for various levels of R&D spillovers are conducted to analyze the welfare effects of firm decisions. We conclude that for high levels of technological spillovers, total welfare is highest when firms engage in cooperation at the R&D stage, and compete in the final product market, independent of the shape of cost functions. However, the functional form of production costs has a qualitative impact on welfare when firms fully compete.

  7. Performance of the coupled thermalhydraulics/neutron kinetics code R/P/C on workstation clusters and multiprocessor systems

    International Nuclear Information System (INIS)

    Hammer, C.; Paffrath, M.; Boeer, R.; Finnemann, H.; Jackson, C.J.

    1996-01-01

    The light water reactor core simulation code PANBOX has been coupled with the transient analysis code RELAP5 for the purpose of performing plant safety analyses with a three-dimensional (3-D) neutron kinetics model. The system has been parallelized to improve the computational efficiency. The paper describes the features of this system with emphasis on performance aspects. Performance results are given for different types of parallelization, i. e. for using an automatic parallelizing compiler, using the portable PVM platform on a workstation cluster, using PVM on a shared memory multiprocessor, and for using machine dependent interfaces. (author)

  8. Tumor-targeting Salmonella typhimurium A1-R Inhibits Osteosarcoma Angiogenesis in the In Vivo Gelfoam® Assay Visualized by Color-coded Imaging.

    Science.gov (United States)

    Kiyuna, Tasuku; Tome, Yasunori; Uehara, Fuminari; Murakami, Takashi; Zhang, Yong; Zhao, Ming; Kanaya, Fuminori; Hoffman, Robert M

    2018-01-01

    We previously developed a color-coded imaging model that can quantify the length of nascent blood vessels using Gelfoam® implanted in nestin-driven green fluorescent protein (ND-GFP) nude mice. In this model, nascent blood vessels selectively express GFP. We also previously showed that osteosarcoma cells promote angiogenesis in this assay. We have also previously demonstrated the tumor-targeting bacteria Salmonella typhimurium A1-R (S. typhimurium A1-R) can inhibit or regress all tested tumor types in mouse models. The aim of the present study was to determine if S. typhimurium A1-R could inhibit osteosarcoma angiogenesis in the in vivo Gelfoam® color-coded imaging assay. Gelfoam® was implanted subcutaneously in ND-GFP nude mice. Skin flaps were made 7 days after implantation and 143B-RFP human osteosarcoma cells expressing red fluorescent protein (RFP) were injected into the implanted Gelfoam. After establishment of tumors in the Gelfoam®, control-group mice were treated with phosphate buffered saline via tail-vein injection (iv) and the experimental group was treated with S. typhimurium A1-R iv Skin flaps were made at day 7, 14, 21, and 28 after implantation of the Gelfoam® to allow imaging of vascularization in the Gelfoam® using a variable-magnification small-animal imaging system and confocal fluorescence microscopy. Nascent blood vessels expressing ND-GFP extended into the Gelfoam® over time in both groups. However, the extent of nascent blood-vessel growth was significantly inhibited by S. typhimurium A1-R treatment by day 28. The present results indicate S. typhimurium A1-R has potential for anti-angiogenic targeted therapy of osteosarcoma. Copyright© 2018, International Institute of Anticancer Research (Dr. George J. Delinasios), All rights reserved.

  9. The miR-223 host non-coding transcript linc-223 induces IRF4 expression in acute myeloid leukemia by acting as a competing endogenous RNA

    KAUST Repository

    Mangiavacchi, Arianna

    2016-08-10

    Alterations in genetic programs required for terminal myeloid differentiation and aberrant proliferation characterize acute myeloid leukemia (AML) cells. Here, we identify the host transcript of miR-223, linc-223, as a novel functional long non-coding RNA (lncRNA) in AML. We show that from the primary nuclear transcript, the alternative production of miR-223 and linc-223 is finely regulated during monocytic differentiation. Moreover, linc-223 expression inhibits cell cycle progression and promotes monocytic differentiation of AML cells. We also demonstrate that endogenous linc-223 localizes in the cytoplasm and acts as a competing endogenous RNA for miR-125-5p, an oncogenic microRNA in leukemia. In particular, we show that linc-223 directly binds to miR-125-5p and that its knockdown increases the repressing activity of miR-125-5p resulting in the downregulation of its target interferon regulatory factor 4 (IRF4), which it was previously shown to inhibit the oncogenic activity of miR-125-5p in vivo. Furthermore, data from primary AML samples show significant downregulation of linc-223 in different AML subtypes. Therein, these findings indicate that the newly identified lncRNA linc-223 may have an important role in myeloid differentiation and leukemogenesis, at least in part, by cross-talking with IRF4 mRNA.

  10. Toric Varieties and Codes, Error-correcting Codes, Quantum Codes, Secret Sharing and Decoding

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    We present toric varieties and associated toric codes and their decoding. Toric codes are applied to construct Linear Secret Sharing Schemes (LSSS) with strong multiplication by the Massey construction. Asymmetric Quantum Codes are obtained from toric codes by the A.R. Calderbank P.W. Shor and A.......M. Steane construction of stabilizer codes (CSS) from linear codes containing their dual codes....

  11. The Long Non-Coding RNA XIST Interacted with MiR-124 to Modulate Bladder Cancer Growth, Invasion and Migration by Targeting Androgen Receptor (AR).

    Science.gov (United States)

    Xiong, Yaoyao; Wang, Long; Li, Yuan; Chen, Minfeng; He, Wei; Qi, Lin

    2017-01-01

    Long non-coding RNA (lncRNA) X-inactive specific transcript (XIST) is involved in the progression of several tumors. The interaction between lncRNA and miRNA or miRNA's target genes is reported to play crucial roles in malignancy. In addition, Androgen receptor (AR) is considered to be involved in bladder cancer progression. In this study, we investigated the role of XIST in human bladder cancer and its interaction with miR-124 and AR. XIST and AR expression was detected in bladder tumor samples and cell lines. Effects of XIST and AR on bladder cancer cells growth, invasion and migration were analyzed. Bioinformatic analysis and luciferase assays were used to identify the interaction among XIST, AR and miR-124. The correlations of miR-124 with XIST and AR in bladder cancer samples were statistically analyzed. XIST and AR were upregulated in bladder cancer tissues and positively correlated. Higher XIST and AR expression were related to poorer TNM stage of bladder cancer. XIST knockdown reduced bladder cancer cells' proliferation, invasion and migration. While this inhibitory effect could be partially restored by AR overexpression. XIST inhibited miR-124 expression by directly targeting. Moreover, miR-124 could bind to the 3'UTR of AR to regulate its expression. MiR-124 inhibition partially restored the XIST knockdown-induced reduction of AR, c-myc, p27, MMP13 and MMP9 expression. In bladder cancer tissues, miR-124 level was inversely correlated with the expression of XIST and AR, respectively. These findings indicated that XIST might be an oncogenic lncRNA that promoted the bladder cancer growth, invasion and migration via miR-124 dependent AR regulation. © 2017 The Author(s). Published by S. Karger AG, Basel.

  12. The Long Non-Coding RNA XIST Interacted with MiR-124 to Modulate Bladder Cancer Growth, Invasion and Migration by Targeting Androgen Receptor (AR

    Directory of Open Access Journals (Sweden)

    Yaoyao Xiong

    2017-08-01

    Full Text Available Backgrounds/Aims: Long non-coding RNA (lncRNA X-inactive specific transcript (XIST is involved in the progression of several tumors. The interaction between lncRNA and miRNA or miRNA’s target genes is reported to play crucial roles in malignancy. In addition, Androgen receptor (AR is considered to be involved in bladder cancer progression. In this study, we investigated the role of XIST in human bladder cancer and its interaction with miR-124 and AR. Methods: XIST and AR expression was detected in bladder tumor samples and cell lines. Effects of XIST and AR on bladder cancer cells growth, invasion and migration were analyzed. Bioinformatic analysis and luciferase assays were used to identify the interaction among XIST, AR and miR-124. The correlations of miR-124 with XIST and AR in bladder cancer samples were statistically analyzed. Results: XIST and AR were upregulated in bladder cancer tissues and positively correlated. Higher XIST and AR expression were related to poorer TNM stage of bladder cancer. XIST knockdown reduced bladder cancer cells’ proliferation, invasion and migration. While this inhibitory effect could be partially restored by AR overexpression. XIST inhibited miR-124 expression by directly targeting. Moreover, miR-124 could bind to the 3’UTR of AR to regulate its expression. MiR-124 inhibition partially restored the XIST knockdown-induced reduction of AR, c-myc, p27, MMP13 and MMP9 expression. In bladder cancer tissues, miR-124 level was inversely correlated with the expression of XIST and AR, respectively. Conclusion: These findings indicated that XIST might be an oncogenic lncRNA that promoted the bladder cancer growth, invasion and migration via miR-124 dependent AR regulation.

  13. Data Qualification Report For: Thermodynamic Data File, DATA0.YMP.R0 For Geochemical Code, EQ3/6?

    International Nuclear Information System (INIS)

    P.L. Cloke

    2000-09-01

    The objective of this work is to evaluate the adequacy of chemical thermodynamic data provided by Lawrence Livermore National Laboratory (LLNL) as DataO.ymp.ROA in response to an input request submitted under AP-3.14Q. This request specified that chemical thermodynamic data available in the file, Data0.com.R2, be updated, improved, and augmented for use in geochemical modeling used in Process Model Reports (PMRs) for Engineered Barrier Systems, Waste Form, Waste Package, Unsaturated Zone, and Near Field Environment, as well as for Performance Assessment. The data are qualified in the temperature range 0 to 100 C. Several Data Tracking Numbers (DTNs) associated with Analysis/Model Reports (AMR) addressing various aspects of the post-closure chemical behavior of the waste package and the Engineered Barrier System that rely on EQ316 outputs to which these data are used as input, are Principal Factor affecting. This qualification activity was accomplished in accordance with the AP-SIII.2Q using the Technical Assessment method. A development plan, TDP-EBS-MD-000044, was prepared in accordance with AP-2.13Q and approved by the Responsible Manager. In addition, a Process Control Evaluation was performed in accordance with AP-SV.1Q. The qualification method, selected in accordance with AP-SIII.2Q, was Technical Assessment. The rationale for this approach is that the data in File Data0.com.R2 are considered Handbook data and therefore do not themselves require qualification. Only changes to Data0.com.R2 required qualification. A new file has been produced which contains the database Data0.ymp.R0, which is recommended for qualification as a result of this action. Data0.ymp.R0 will supersede Data0.com.R2 for all Yucca Mountain Project (YMP) activities

  14. Long non-coding RNA TUG1 promotes cervical cancer progression by regulating the miR-138-5p-SIRT1 axis.

    Science.gov (United States)

    Zhu, Jie; Shi, Huirong; Liu, Huina; Wang, Xiaojuan; Li, Fengmei

    2017-09-12

    Increasing evidences showed that long non-coding RNAs (lncRNAs) play vital roles in tumor progression. Recent studies indicated that lncRNA TUG1 was upregulated and promoted tumor processes in several cancers. However, the expression and underlying mechanism of TUG1 in cervical cancer remain unclear. In the present study, we found that TUG1 expression was upregulated in cervical cancer tissues and correlated with advanced clinical features and poor overall survival. TUG1 knockdown suppressed cervical cancer cell growth and metastasis in vitro and tumor growth in vivo . In addition, our results indicated that TUG1 could act as an endogenous sponge by directly binding to miR-138-5p and suppressed miR-138-5p expression. Furthermore, we found that TUG1 could reverse the inhibitory effect of miR-138-5p on cervical cancer cells processes, which might be involved in the activation of SIRT1, a target gene of miR-138-5p, and activation of Wnt/β-catenin signaling pathway. Taken together, we elucidated that TUG1 might promote cervical cancer malignant progression via miR-138-5p-SIRT1-Wnt/β-catenin signaling pathway axis.

  15. Upregulation of long non-coding RNA TUG1 promotes bladder cancer cell 5 proliferation, migration and invasion by inhibiting miR-29c.

    Science.gov (United States)

    Guo, Peng; Zhang, Guohui; Meng, Jialin; He, Qian; Li, Zhihui; Guan, Yawei

    2018-01-10

    Bladder cancer (BC) is one of the leading causes of cancer-related death in the word. Long non-coding RNA (lncRNA) taurine-upregulated gene 1 (TUG1) plays an important role in the development and progression of numerous cancers, including BC. However, the exact role of TUG1 in modulating BC progression is still poorly known. In this study, we found that TUG1 was upregulated and microRNA-29c (miR-29c) was downregulated in BC tissues and cell lines. Overexpression of TUG1 promoted the cell proliferation of T24 and EJ cells, whereas TUG1 knockdown had the opposite effect. Upregulation of TUG1 obviously facilitated the migration and invasion of T24 and EJ cells. In contrast, TUG1 silencing repressed the migration and invasion of T24 and EJ cells. Furthermore, TUG1 knockdown markedly increased the expression of miR-29c in vitro. On the contrary, overexpression of TUG1 remarkably decreased the expression of miR-29c. Transfection with plasmids containing mutant TUG1 has no effect on the expression of miR-29c. There were direct interactions between miR-29c and the binding sites of TUG1. In addition, the inhibitory effects of small interfering RNA specific for TUG1 on BC cell proliferation, migration and invasion were reversed by downregulation of miR-29c. Collectively, our study strongly demonstrates that TUG1 promotes BC cell proliferation, migration and invasion by inhibiting miR-29c, suggesting that lncRNATUG1 may be a promising target for BC gene therapy.

  16. Long non-coding RNA TUG1 promotes progression of oral squamous cell carcinoma through upregulating FMNL2 by sponging miR-219.

    Science.gov (United States)

    Yan, Guangqi; Wang, Xue; Yang, Mingliang; Lu, Li; Zhou, Qing

    2017-01-01

    Oral squamous cell carcinoma (OSCC) is a prevalent oral disease with a high morbidity and mortality rate. Several long non-coding RNAs (lncRNAs) were identified as important regulators of carcinogenesis. However, the pathogenic implications of TUG1 in OSCC are still unclear. In the present study, the expression of TUG1 was increased in OSCC cells. Knockdown of TUG1 inhibited cell proliferation, migration, and invasion, and induced cell cycle arrest at G0/G1 phase, whereas overexpression of TUG1 exerted the opposite effect on OSCC cells. A reciprocal repressive interaction between TUG1 and miR-219 was found, and miR-219 inhibition abolished the tumor-suppressive effect of TUG1 knockdown on cell growth and motility. Furthermore, bioinformatics analysis and luciferase reporter assay showed that FMNL2 was a direct target of miR-219. Restoration of FMNL2 abrogated the miR-219-induced inhibition of cell proliferation, cell cycle progression, migration, and invasion. Besides, overexpression of TUG1 promoted tumor growth and metastasis in vivo . Clinically, the expression of TUG1 and FMNL2 were increased, but miR-219 was decreased in primary tumors compared to non-tumor tissues. Both the upregulated TUG1, and FMNL2 and the downregulated miR-219 was associated with advanced stage of OSCC and poor overall survival. Notably, multivariate analyses confirmed that FMNL2 was an independent risk factor for OSCC. In conclusion, our data revealed that TUG1 confers oncogenic function in OSCC and TUG1/miR-219/FMNL2 axis may be a novel therapeutic strategy in this disease.

  17. An intergenic non-coding rRNA correlated with expression of the rRNA and frequency of an rRNA single nucleotide polymorphism in lung cancer cells.

    Directory of Open Access Journals (Sweden)

    Yih-Horng Shiao

    Full Text Available BACKGROUND: Ribosomal RNA (rRNA is a central regulator of cell growth and may control cancer development. A cis noncoding rRNA (nc-rRNA upstream from the 45S rRNA transcription start site has recently been implicated in control of rRNA transcription in mouse fibroblasts. We investigated whether a similar nc-rRNA might be expressed in human cancer epithelial cells, and related to any genomic characteristics. METHODOLOGY/PRINCIPAL FINDINGS: Using quantitative rRNA measurement, we demonstrated that a nc-rRNA is transcribed in human lung epithelial and lung cancer cells, starting from approximately -1000 nucleotides upstream of the rRNA transcription start site (+1 and extending at least to +203. This nc-rRNA was significantly more abundant in the majority of lung cancer cell lines, relative to a nontransformed lung epithelial cell line. Its abundance correlated negatively with total 45S rRNA in 12 of 13 cell lines (P = 0.014. During sequence analysis from -388 to +306, we observed diverse, frequent intercopy single nucleotide polymorphisms (SNPs in rRNA, with a frequency greater than predicted by chance at 12 sites. A SNP at +139 (U/C in the 5' leader sequence varied among the cell lines and correlated negatively with level of the nc-rRNA (P = 0.014. Modelling of the secondary structure of the rRNA 5'-leader sequence indicated a small increase in structural stability due to the +139 U/C SNP and a minor shift in local configuration occurrences. CONCLUSIONS/SIGNIFICANCE: The results demonstrate occurrence of a sense nc-rRNA in human lung epithelial and cancer cells, and imply a role in regulation of the rRNA gene, which may be affected by a +139 SNP in the 5' leader sequence of the primary rRNA transcript.

  18. Stalled RNAP-II molecules bound to non-coding rDNA spacers are required for normal nucleolus architecture.

    Science.gov (United States)

    Freire-Picos, M A; Landeira-Ameijeiras, V; Mayán, María D

    2013-07-01

    The correct distribution of nuclear domains is critical for the maintenance of normal cellular processes such as transcription and replication, which are regulated depending on their location and surroundings. The most well-characterized nuclear domain, the nucleolus, is essential for cell survival and metabolism. Alterations in nucleolar structure affect nuclear dynamics; however, how the nucleolus and the rest of the nuclear domains are interconnected is largely unknown. In this report, we demonstrate that RNAP-II is vital for the maintenance of the typical crescent-shaped structure of the nucleolar rDNA repeats and rRNA transcription. When stalled RNAP-II molecules are not bound to the chromatin, the nucleolus loses its typical crescent-shaped structure. However, the RNAP-II interaction with Seh1p, or cryptic transcription by RNAP-II, is not critical for morphological changes. Copyright © 2013 John Wiley & Sons, Ltd.

  19. Decision n. 2010-DC-0175 made on the 4. of February 2010 by the Nuclear Safety Authority and defining technical modalities and periodicities of controls as prescribed in the R. 4452-12 and R. 4452-13 articles of the Labour Code as well as in the R. 1333-7 et R. 1333-95 articles of the Public Health Code

    International Nuclear Information System (INIS)

    2010-01-01

    This document defines the modalities of technical controls of sources and equipment emitting ionizing radiation, the modalities of technical controls of the surroundings, the modalities of the control of the efficiency of radioprotection organization and technical equipment (management of sealed and non-sealed radioactive sources, elimination of effluents and wastes associated with these sources), and the modalities of control of measurement instruments and of protection devices, altogether in application of the Labour code and of the Public Health code. Requirements defined by these both codes are recalled in appendix. They may depend on the radioactive source type or on the equipment (electric equipment generating X rays, particle accelerator, sealed sources or equipment containing such sources, not-sealed sources)

  20. Knockdown of long non-coding RNA HOTAIR increases miR-454-3p by targeting Stat3 and Atg12 to inhibit chondrosarcoma growth.

    Science.gov (United States)

    Bao, Xing; Ren, Tingting; Huang, Yi; Sun, Kunkun; Wang, Shidong; Liu, Kuisheng; Zheng, Bingxin; Guo, Wei

    2017-02-09

    Current practices for the therapy of chondrosarcoma, including wide-margin surgical resection and chemotherapy, are less than satisfactory. Recently, emerging evidence has demonstrated that long non-coding RNAs (lncRNAs) have an essential role in the initiation and progression of tumors. As a typical lncRNA, HOTAIR is significantly overexpressed in various tumors. However, the function and potential biological mechanisms of HOTAIR in human chondrosarcoma remain unknown. Quantitative RT-PCR demonstrated that HOTAIR expression was upregulated in chondrosarcoma tissues and cell lines. High HOTAIR expression is correlated with tumor stage and poor prognosis. Functional experiments reveal that HOTAIR knockdown leads to growth inhibition of human chondrosarcoma cells in vitro and in vivo. In addition to cycle arrest and apoptosis, knockdown of HOTAIR inhibits autophagy, which favors cell death. Mechanistically, we demonstrated that HOTAIR induced DNA methylation of miR-454-3p by recruiting EZH2 and DNMT1 to the miR-454-3p promoter regions, which markedly silences miR-454-3p expression. Further analysis revealed that STAT3 and ATG12 are targets of miR-454-3p, initiate HOTAIR deficiency-induced apoptosis and reduce autophagy. Collectively, our data reveal the roles and functional mechanisms of HOTAIR in human chondrosarcoma and suggest that HOTAIR may act as a prognostic biomarker and potential therapeutic target for chondrosarcoma.

  1. Long non-coding RNA MALAT1 acts as a competing endogenous RNA to promote malignant melanoma growth and metastasis by sponging miR-22.

    Science.gov (United States)

    Luan, Wenkang; Li, Lubo; Shi, Yan; Bu, Xuefeng; Xia, Yun; Wang, Jinlong; Djangmah, Henry Siaw; Liu, Xiaohui; You, Yongping; Xu, Bin

    2016-09-27

    Long non-coding RNAs (lncRNAs) are involved in tumorigenesis. Metastasis-associated lung adenocarcinoma transcript 1 (MALAT1), an lncRNAs, is associated with the growth and metastasis of many human tumors, but its biological roles in malignant melanoma remain unclear. In this study, the aberrant up-regulation of MALAT1 was detected in melanoma. We determined that MALAT1 promotes melanoma cells proliferation, invasion and migration by sponging miR-22. MiR-22 was decreased and acted as a tumor suppressor in melanoma, and MMP14 and Snail were the functional targets of miR-22. Furthermore, MALAT1 could modulate MMP14 and Snail by operating as a competing endogenous RNA (ceRNA) for miR-22. The effects of MALAT1 in malignant melanoma is verified using a xenograft model. This finding elucidates a new mechanism for MALAT1 in melanoma development and provides a potential target for melanoma therapeutic intervention.

  2. Color differences among feral pigeons (Columba livia) are not attributable to sequence variation in the coding region of the melanocortin-1 receptor gene (MC1R)

    Science.gov (United States)

    2013-01-01

    Background Genetic variation at the melanocortin-1 receptor (MC1R) gene is correlated with melanin color variation in many birds. Feral pigeons (Columba livia) show two major melanin-based colorations: a red coloration due to pheomelanic pigment and a black coloration due to eumelanic pigment. Furthermore, within each color type, feral pigeons display continuous variation in the amount of melanin pigment present in the feathers, with individuals varying from pure white to a full dark melanic color. Coloration is highly heritable and it has been suggested that it is under natural or sexual selection, or both. Our objective was to investigate whether MC1R allelic variants are associated with plumage color in feral pigeons. Findings We sequenced 888 bp of the coding sequence of MC1R among pigeons varying both in the type, eumelanin or pheomelanin, and the amount of melanin in their feathers. We detected 10 non-synonymous substitutions and 2 synonymous substitution but none of them were associated with a plumage type. It remains possible that non-synonymous substitutions that influence coloration are present in the short MC1R fragment that we did not sequence but this seems unlikely because we analyzed the entire functionally important region of the gene. Conclusions Our results show that color differences among feral pigeons are probably not attributable to amino acid variation at the MC1R locus. Therefore, variation in regulatory regions of MC1R or variation in other genes may be responsible for the color polymorphism of feral pigeons. PMID:23915680

  3. Modeling of solution renewal with the Kindis code: example of R7T7 glass dissolution at 90 deg C

    International Nuclear Information System (INIS)

    Advocat, T.; Vernaz, E.; Crovisier, J.L.; Clement, A.; Gerard, F.

    1994-01-01

    The deep underground environment that would correspond to a geological repository is a system open to fluid flow. It is therefore necessary to investigate the effects of solution renewal on the long-term behavior of glass in contact with water. These effects can now be simulated using the new version of the geochemical KINDIS model (thermodynamic and kinetic model). We tested the model at 90 deg C with an SA/V ratio of 400 m -1 at twelve renewal rates of pure water ranging from 200 to 0 vol% per day. With renewal rates between 200 and 0.065 vol% per day, steady-state conditions were obtained in the reaction system: i.e. the glass corrosion rate remained constant as did the concentrations of the dissolved species in solution (although at different values depending on the renewal rate). The ionic strength never exceeded 1 (the validity limit for the DEBYE-HUCKEL law) and long term predictions of the dissolved glass mass, the solution composition and the potential secondary mineral sequence are possible. For simulated renewal rates of less than 0.065 vol% per day (27% per year), the ionic strength rose above 1 (as in a closed system) before steady-state conditions were reached, making it critical to calculate long-term rates; A constant and empirical long-term rate, derived from laboratory measurement, have to be extrapolated. These calculations were based on a first order equation to describe the glass dissolution kinetic. The results obtained with the KINDIS code show discrepancies with some major experimental kinetic data (the long term rate must decrease with the ''glass-water'' reaction progress, under silica saturation conditions). This clearly indicates that a more refine kinetic relation is needed for the glass matrix. (authors). 16 refs., 4 figs., 4 tabs

  4. Long non-coding RNA CCAT1 modulates neuropathic pain progression through sponging miR-155.

    Science.gov (United States)

    Dou, Lidong; Lin, Hongqi; Wang, Kaiwei; Zhu, Guosong; Zou, Xuli; Chang, Enqiang; Zhu, Yongfeng

    2017-10-27

    Neuropathic pain is caused by dysfunction or primary injury of the somatosensory nervous system. Long noncoding RNAs (lncRNAs) play important roles in the development of neuropathic pain. However, the effects of lncRNA colon cancer associated transcript-1 (CCAT1) in neuropathic pain have not been reported. The model of bilateral sciatic nerve chronic constriction injuries (bCCI) is regarded as long-lasting mechanical hypersensitivity and cold allodynia, which is the representative symptom in the human subjects suffering from the neuropathic pain. In this study, we found that CCAT1 expression was decreased in the spinal dorsal horn, dorsal root ganglion (DRG), hippocampus, and anterior cingulate cortex (ACC) of rats with bCCI. The rats of bCCI presented the cold allodynia after the 14 th day of postoperation. We furtherly showed that lncRNA CCAT1 decreased miR-155 expression and enhanced Serum and glucocorticoid regulated protein kinase 3 (SGK3) expression in the NGF-differentiated PC12 cell. We found that miR-155 expression was increased in the spinal dorsal horn, DRG, hippocampus, and ACC of rats with bCCI injuries. However, SGK3 expression was downregulated in the spinal dorsal horn, DRG, hippocampus, and ACC of rats with bCCI injuries. Moreover, lncRNA CCAT1 overexpression could alleviate the pain thresholds and inhibited expression of SGK3 could rescue this effect. In conclusion, these results suggested the crucial roles of CCAT1 and SGK3 in the neuropathic pain.

  5. The Long Non-Coding RNA XIST Controls Non-Small Cell Lung Cancer Proliferation and Invasion by Modulating miR-186-5p

    Directory of Open Access Journals (Sweden)

    Haoyou Wang

    2017-04-01

    Full Text Available Background/Aims: Long non-coding RNAs (lncRNAs are key players in the development and progression of human cancers. The lncRNA XIST (X-inactive specific transcript has been shown to be upregulated in human non-small cell lung cancer (NSCLC; however, its role and molecular mechanisms in NSCLC cell progression remain unclear. Methods: qRT-PCR was conducted to assess the expression of XIST and miR-186. Cell proliferation was detected using MTT assay. Cell invasion and migration were evaluated using transwell assay. Cell cycle distribution and apoptosis rates were analyzed by flow cytometry. Luciferase reporter assay was used to identify the direct regulation of XIST and miR-186. A RNA immunoprecipitation was used to analyze whether XIST was associated with the RNA-induced silencing complex (RISC. Results: We confirmed that XIST was upregulated in NSCLC cell lines and tissues. Functionally, XIST knockdown inhibited cancer cell proliferation and invasion, and induced apoptosis in vitro, and suppressed subcutaneous tumor growth in vivo. Mechanistic investigations revealed a reciprocal repressive interaction between XIST and miR-186-5p. Furthermore, we showed that miR-186-5p has a binding site for XIST. Our data also indicated that XIST and miR-186-5p are likely in the same RNA induced silencing complex. Conclusion: Together, our data revealed that XIST knockdown confers suppressive function in NSCLC and XIST may be a novel therapeutic marker in this disease.

  6. A Bioinformatics Analysis Reveals a Group of MocR Bacterial Transcriptional Regulators Linked to a Family of Genes Coding for Membrane Proteins

    Directory of Open Access Journals (Sweden)

    Teresa Milano

    2016-01-01

    Full Text Available The MocR bacterial transcriptional regulators are characterized by an N-terminal domain, 60 residues long on average, possessing the winged-helix-turn-helix (wHTH architecture responsible for DNA recognition and binding, linked to a large C-terminal domain (350 residues on average that is homologous to fold type-I pyridoxal 5′-phosphate (PLP dependent enzymes like aspartate aminotransferase (AAT. These regulators are involved in the expression of genes taking part in several metabolic pathways directly or indirectly connected to PLP chemistry, many of which are still uncharacterized. A bioinformatics analysis is here reported that studied the features of a distinct group of MocR regulators predicted to be functionally linked to a family of homologous genes coding for integral membrane proteins of unknown function. This group occurs mainly in the Actinobacteria and Gammaproteobacteria phyla. An analysis of the multiple sequence alignments of their wHTH and AAT domains suggested the presence of specificity-determining positions (SDPs. Mapping of SDPs onto a homology model of the AAT domain hinted at possible structural/functional roles in effector recognition. Likewise, SDPs in wHTH domain suggested the basis of specificity of Transcription Factor Binding Site recognition. The results reported represent a framework for rational design of experiments and for bioinformatics analysis of other MocR subgroups.

  7. Synergism of the method of characteristic, R-functions and diffusion solution for accurate representation of 3D neutron interactions in research reactors using the AGENT code system

    International Nuclear Information System (INIS)

    Hursin, Mathieu; Xiao Shanjie; Jevremovic, Tatjana

    2006-01-01

    This paper summarizes the theoretical and numerical aspects of the AGENT code methodology accurately applied for detailed three-dimensional (3D) multigroup steady-state modeling of neutron interactions in complex heterogeneous reactor domains. For the first time we show the fine-mesh neutron scalar flux distribution in Purdue research reactor (that was built over forty years ago). The AGENT methodology is based on the unique combination of the three theories: the method of characteristics (MOC) used to simulate the neutron transport in two-dimensional (2D) whole core heterogeneous calculation, the theory of R-functions used as a mathematical tool to describe the true geometry and fuse with the MOC equations, and one-dimensional (1D) higher-order diffusion correction of 2D transport model to account for full 3D heterogeneous whole core representation. The synergism between the radial 2D transport and the 1D axial transport (to take into account the axial neutron interactions and leakage), called the 2D/1D method (used in DeCART and CHAPLET codes), provides a 3D computational solution. The unique synergism between the AGENT geometrical algorithm capable of modeling any current or future reactor core geometry and 3D neutron transport methodology is described in details. The 3D AGENT accuracy and its efficiency are demonstrated showing the eigenvalues, point-wise flux and reaction rate distributions in representative reactor geometries. The AGENT code, comprising this synergism, represents a building block of the computational system, called the virtual reactor. Its main purpose is to perform 'virtual' experiments and demonstrations of various mainly university research reactor experiments

  8. PMICALC: an R code-based software for estimating post-mortem interval (PMI) compatible with Windows, Mac and Linux operating systems.

    Science.gov (United States)

    Muñoz-Barús, José I; Rodríguez-Calvo, María Sol; Suárez-Peñaranda, José M; Vieira, Duarte N; Cadarso-Suárez, Carmen; Febrero-Bande, Manuel

    2010-01-30

    In legal medicine the correct determination of the time of death is of utmost importance. Recent advances in estimating post-mortem interval (PMI) have made use of vitreous humour chemistry in conjunction with Linear Regression, but the results are questionable. In this paper we present PMICALC, an R code-based freeware package which estimates PMI in cadavers of recent death by measuring the concentrations of potassium ([K+]), hypoxanthine ([Hx]) and urea ([U]) in the vitreous humor using two different regression models: Additive Models (AM) and Support Vector Machine (SVM), which offer more flexibility than the previously used Linear Regression. The results from both models are better than those published to date and can give numerical expression of PMI with confidence intervals and graphic support within 20 min. The program also takes into account the cause of death. 2009 Elsevier Ireland Ltd. All rights reserved.

  9. Development of LEAP-JET code for sodium-water reaction analysis. Validation by sodium-water reaction tests (SWAT-1R)

    International Nuclear Information System (INIS)

    Seino, Hiroshi; Hamada, Hirotsugu

    2004-03-01

    The sodium-water reaction event in an FBR steam generator (SG) has influence on the safety, economical efficiency, etc. of the plant, so that the selection of design base leak (DBL) of the SG is considered as one of the important matters. The clarification of the sodium-water reaction phenomenon and the development of an analysis model are necessary to estimate the sodium-water reaction event with high accuracy and rationality in selecting the DBL. The reaction jet model is pointed out as a part of the necessary improvements to evaluate the overheating tube rupture of large SGs, since the behavior of overheating tube rupture is largely affected by the reaction jet conditions outside the tube. Therefore, LEAP-JET has been developed as an analysis code for the simulation of sodium-water reactions. This document shows the validation of the LEAP-JET code by the Sodium-Water Reaction Test (SWAT-1R). The following results have been obtained: (1) The reaction rate constant, K, is estimated at between 0.001≤K≤0.1 from the LEAP-JET analysis of the SWAT-1R data. (2) The analytical results on the high-temperature region and the behaviors of reaction consumption (Na, H 2 O) and products (H 2 , NaOH, Na 2 O) are considered to be physically reasonable. (3) The LEAP-JET analysis shows the tendency of overestimation in the maximum temperature and temperature distribution of the reaction jet. (4) In the LEAP-JET analysis, the numerical calculation becomes unstably, especially in the mesh containing quite small sodium mass. Therefore, it is necessary to modify the computational algorism to stabilize it and obtain the optimum value of K in sodium-water reactions. (author)

  10. Long non-coding RNA NEAT1 facilitates pancreatic cancer progression through negative modulation of miR-506-3p

    International Nuclear Information System (INIS)

    Huang, Bo; Liu, Chuan; Wu, Qiong; Zhang, Jing; Min, Qinghua; Sheng, Tianle; Wang, Xiaozhong; Zou, Yeqing

    2017-01-01

    Recently, long non-coding RNAs (lncRNAs) have been shown to have critical regulatory roles in tumourigenesis. Increasing evidence has suggested that lncRNA NEAT1 has been implicated in various types of human cancer. However, the potential biological roles and regulatory mechanisms of NEAT1 in pancreatic cancer (PC) remains unclear. Here, we found that the expression level of NEAT1 was higher in PC tissues compared to the corresponding non-tumor tissues. Besides, our findings indicate that high NEAT1 expression level is closely correlated with tumor progression and poor survival in PC patients. Furthermore, we also found that knockdown of NEAT1 remarkably suppressed cell proliferation by inducing cell cycle arrest and apoptosis promotion in PC cells. Moreover, bioinformatics analysis and luciferase reporter assay revealed that NEAT1 directly bound to the miR-506-3p, which has been reported to act as a tumor suppressor in diverse cancers. Additionally, our results confirmed that the tumor-promoting effects of NEAT1 in PC cells is at least partly through negative modulation of miR-506-3p. Overall, our results suggested that NEAT1 functions as an oncogenic lncRNA in PC, which could be a novel diagnostic and therapeutic target for PC. - Highlights: • Upregulation of NEAT1 expression was significantly associated with the poor survival in PC patients. • Knockdown of NEAT1 can suppress PC cells growth by inducing cell cycle arrest and apoptosis promotion in vitro study. • NEAT1 functions as an oncogene in pancreatic cancer by acting as a competing endogenous RNA for miR-506-3p. • The tumor-suppressive effects of NEAT1 knockdown in PC cells was partially reversed by miR-506-3p inhibitor.

  11. Exploration of the R code-based mathematical model for PMI estimation using profiling of RNA degradation in rat brain tissue at different temperatures.

    Science.gov (United States)

    Ma, Jianlong; Pan, Hui; Zeng, Yan; Lv, Yehui; Zhang, Heng; Xue, Aimin; Jiang, Jieqing; Ma, Kaijun; Chen, Long

    2015-12-01

    Precise estimation of postmortem interval (PMI) is crucial in some criminal cases. This study aims to find some optimal markers for PMI estimation and build a mathematical model that could be used in various temperature conditions. Different mRNA and microRNA markers in rat brain samples were detected using real-time fluorescent quantitative PCR at 12 time points within 144 h postmortem and at temperatures of 4, 15, 25, and 35 °C. Samples from 36 other rats were used to verify the animal mathematical model. Brain-specific mir-9 and mir-125b are effective endogenous control markers that are not affected by PMI up to 144 h postmortem under these temperatures, whereas the commonly used U6 is not a suitable endogenous control in this study. Among all the candidate markers, ΔCt (β-actin) has the best correlation coefficient with PMI and was used to build a new model using R software which can simultaneously manage both PMI and temperature parameters. This animal mathematical model is verified using samples from 36 other rats and shows increased accuracy for higher temperatures and longer PMI. In this study, β-actin was found to be an optimal marker to estimate PMI and some other markers were found to be suitable to act as endogenous controls. Additionally, we have used R code software to build a model of PMI estimation that could be used in various temperature conditions.

  12. Low-Frequency Synonymous Coding Variation in CYP2R1 Has Large Effects on Vitamin D Levels and Risk of Multiple Sclerosis.

    Science.gov (United States)

    Manousaki, Despoina; Dudding, Tom; Haworth, Simon; Hsu, Yi-Hsiang; Liu, Ching-Ti; Medina-Gómez, Carolina; Voortman, Trudy; van der Velde, Nathalie; Melhus, Håkan; Robinson-Cohen, Cassianne; Cousminer, Diana L; Nethander, Maria; Vandenput, Liesbeth; Noordam, Raymond; Forgetta, Vincenzo; Greenwood, Celia M T; Biggs, Mary L; Psaty, Bruce M; Rotter, Jerome I; Zemel, Babette S; Mitchell, Jonathan A; Taylor, Bruce; Lorentzon, Mattias; Karlsson, Magnus; Jaddoe, Vincent V W; Tiemeier, Henning; Campos-Obando, Natalia; Franco, Oscar H; Utterlinden, Andre G; Broer, Linda; van Schoor, Natasja M; Ham, Annelies C; Ikram, M Arfan; Karasik, David; de Mutsert, Renée; Rosendaal, Frits R; den Heijer, Martin; Wang, Thomas J; Lind, Lars; Orwoll, Eric S; Mook-Kanamori, Dennis O; Michaëlsson, Karl; Kestenbaum, Bryan; Ohlsson, Claes; Mellström, Dan; de Groot, Lisette C P G M; Grant, Struan F A; Kiel, Douglas P; Zillikens, M Carola; Rivadeneira, Fernando; Sawcer, Stephen; Timpson, Nicholas J; Richards, J Brent

    2017-08-03

    Vitamin D insufficiency is common, correctable, and influenced by genetic factors, and it has been associated with risk of several diseases. We sought to identify low-frequency genetic variants that strongly increase the risk of vitamin D insufficiency and tested their effect on risk of multiple sclerosis, a disease influenced by low vitamin D concentrations. We used whole-genome sequencing data from 2,619 individuals through the UK10K program and deep-imputation data from 39,655 individuals genotyped genome-wide. Meta-analysis of the summary statistics from 19 cohorts identified in CYP2R1 the low-frequency (minor allele frequency = 2.5%) synonymous coding variant g.14900931G>A (p.Asp120Asp) (rs117913124[A]), which conferred a large effect on 25-hydroxyvitamin D (25OHD) levels (-0.43 SD of standardized natural log-transformed 25OHD per A allele; p value = 1.5 × 10 -88 ). The effect on 25OHD was four times larger and independent of the effect of a previously described common variant near CYP2R1. By analyzing 8,711 individuals, we showed that heterozygote carriers of this low-frequency variant have an increased risk of vitamin D insufficiency (odds ratio [OR] = 2.2, 95% confidence interval [CI] = 1.78-2.78, p = 1.26 × 10 -12 ). Individuals carrying one copy of this variant also had increased odds of multiple sclerosis (OR = 1.4, 95% CI = 1.19-1.64, p = 2.63 × 10 -5 ) in a sample of 5,927 case and 5,599 control subjects. In conclusion, we describe a low-frequency CYP2R1 coding variant that exerts the largest effect upon 25OHD levels identified to date in the general European population and implicates vitamin D in the etiology of multiple sclerosis. Copyright © 2017 American Society of Human Genetics. Published by Elsevier Inc. All rights reserved.

  13. Long non-coding RNA FBXL19-AS1 plays oncogenic role in colorectal cancer by sponging miR-203

    International Nuclear Information System (INIS)

    Shen, Bo; Yuan, Yuan; Zhang, Yan; Yu, Shaorong; Peng, Wei; Huang, Xin'en; Feng, Jifeng

    2017-01-01

    Long non-coding RNAs (lncRNAs) have emerged as critical regulators of the progression of human cancers, including colorectal cancer (CRC). The study of genome-wide lncRNA expression patterns in metastatic CRC could provide novel mechanism underlying CRC carcinogenesis. In here, we determined the lncRNA expression profiles correlating to CRC with or without lymph node metastasis (LNM) based on microarray analysis. We found that 2439 lncRNAs and 1654 mRNAs were differentially expressed in metastatic CRC relative to primary CRC. Among these dysregulated lncRNAs, FBXL19-AS1 was the most significantly upregulated lncRNA in metastatic tumors. Functionally, knockdown of FBXL19-AS1 played tumor-suppressive effects by inhibiting cell proliferation, migration and invasion in vitro and tumor growth and metastasis in vivo. Overexpression of FBXL19-AS1 was markedly correlated with TNM stage and LNM in CRC. Bioinformatics analysis predicted that miR-203 was potentially targeted by FBXL19-AS1, which was confirmed by dual-luciferase reporter assay. Pearson's correlation analysis showed that miR-203 expression was negatively related to FBXL19-AS1 in tumor tissues. Finally, miR-203 inhibition abrogated the effect of FBXL19-AS1 knockdown on the proliferation and invasion of LoVo cells. Our results reveal the cancer-promoting effect of FBXL19-AS1, acting as a molecular sponge in negatively modulating miR-203, which might provide a new insight for understanding of CRC development. - Highlights: • LncRNA expression signature was different between metastatic and primary tumors. • Knockdown of FBXL19-AS1 inhibits proliferation, migration and invasion in vitro. • Knockdown of FBXL19-AS1 inhibits tumorigenesis and metastasis in vivo. • FBXL19-AS1 was upregulated in CRC tissues and related with lymph node metastasis. • FBXL19-AS1, acting as a molecular sponge in negatively regulating miR-203.

  14. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  15. Long non-coding RNA TUG1 promotes cell proliferation and metastasis by negatively regulating miR-300 in gallbladder carcinoma.

    Science.gov (United States)

    Ma, Fei; Wang, Shou-Hua; Cai, Qiang; Jin, Long-Yang; Zhou, Di; Ding, Jun; Quan, Zhi-Wei

    2017-04-01

    As we all know, long non-coding RNAs (lncRNAs) have been reported to play vital roles in various human cancers. In this study, we aimed to explore the role of lncRNA TUG1 in gallbladder carcinoma (GBC) development. Total RNA was extracted from the tissues of thirty GBC patients, four GBC cell lines. We detected the expression levels of TUG1 using quantitative real-time PCR. We performed CCK8, colony formation, transwell invasion and apoptosis assays to study the effects of TUG1 on GBC cell proliferation and invasion. Western blot assay was performed to assess to the expression level of epithelial-mesenchymal transition (EMT) markers in transforming growth factor-β1 (TGF-β1) treated and TUG1 knockdown GBC cell. Lastly, dual-luciferase reporter assay and quantitative real-time PCR were performed to verify the potential target microRNAs (miRNAs) of TUG1. TUG1 expression was significantly overexpressed in GBC tissues. Functionally, this study demonstrated that knockdown of TUG1 significantly inhibited GBC cell proliferation, metastasis. Mechanically, we found that TUG1 is upregulated by TGF-β1, and knockdown of TUG1 inhibited GBC cell EMT. Furthermore, we identified that miR-300, which has been reported as a suppressor in other types of cancer, is negatively regulated by TUG1. LncRNA TUG1 promotes GBC cell proliferation, metastasis and EMT progression by functioning as a miRNA sponge to abrogate the endogenous effect of miR-300. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  16. Contribution of 194.1 keV Resonance to 17O(p, alpha) 14N Reaction Rate using R Matrix Code

    International Nuclear Information System (INIS)

    Chafa, A.; Messili, F.Z.; Barhoumi, S.

    2009-01-01

    Knowledge of the 17 O(p, alpha ) 14 N reaction rates is required for evaluating elemental abundances in a number of hydrogen - burning stellar sites. This reaction is specifically very important for nucleosynthesis of the rare oxygen isotope 17 O. Classical novae are thought to be a major source of 17 O in the Galaxy and produce the short-live radioisotope 18 F whose + decay is followed by a gamma ray emission which could be observed with satellites such as the Integral observatory. As the 17 O(p, alpha) 14 N and 17 O(p, alpha ) 18 F reactions govern the destruction of 17 O and the formation of 1 '8F, their rates are decisive in determining the final abundances of these isotopes. Stellar temperatures of primary importance for nucleosynthesis are typically in the ranges T = 0.01-0.1 GK for red giant, AGB, and massive stars, and T 0.01-0.4 GK for classical nova explosions In recent work, we observed, for the first time, a resonance a 183.3 keV corresponding to level in 18 F at Ex 5789.8 ± 0.3 keV. A new astrophysical parameters of this resonance are found. In this work we study this reaction using numerical code based on R matrix method including the new values of level energy and parameters of 183.3 keV resonance in order to show his contribution to 17 O(p, alpha) 14 N reaction rates. We also use old parameters values of this resonance given in Keiser work for comparison. We show that this resonance predominate the reaction rates in all range of stellar temperature for classical nova explosions. This is in good agreement with our work with experimental method. We also study cross section and differential cross section 17 O(p, alpha ) 14 N reaction with R matrix method

  17. Coding Class

    DEFF Research Database (Denmark)

    Ejsing-Duun, Stine; Hansbøl, Mikala

    Denne rapport rummer evaluering og dokumentation af Coding Class projektet1. Coding Class projektet blev igangsat i skoleåret 2016/2017 af IT-Branchen i samarbejde med en række medlemsvirksomheder, Københavns kommune, Vejle Kommune, Styrelsen for IT- og Læring (STIL) og den frivillige forening...... Coding Pirates2. Rapporten er forfattet af Docent i digitale læringsressourcer og forskningskoordinator for forsknings- og udviklingsmiljøet Digitalisering i Skolen (DiS), Mikala Hansbøl, fra Institut for Skole og Læring ved Professionshøjskolen Metropol; og Lektor i læringsteknologi, interaktionsdesign......, design tænkning og design-pædagogik, Stine Ejsing-Duun fra Forskningslab: It og Læringsdesign (ILD-LAB) ved Institut for kommunikation og psykologi, Aalborg Universitet i København. Vi har fulgt og gennemført evaluering og dokumentation af Coding Class projektet i perioden november 2016 til maj 2017...

  18. Code Cactus; Code Cactus

    Energy Technology Data Exchange (ETDEWEB)

    Fajeau, M; Nguyen, L T; Saunier, J [Commissariat a l' Energie Atomique, Centre d' Etudes Nucleaires de Saclay, 91 - Gif-sur-Yvette (France)

    1966-09-01

    This code handles the following problems: -1) Analysis of thermal experiments on a water loop at high or low pressure; steady state or transient behavior; -2) Analysis of thermal and hydrodynamic behavior of water-cooled and moderated reactors, at either high or low pressure, with boiling permitted; fuel elements are assumed to be flat plates: - Flowrate in parallel channels coupled or not by conduction across plates, with conditions of pressure drops or flowrate, variable or not with respect to time is given; the power can be coupled to reactor kinetics calculation or supplied by the code user. The code, containing a schematic representation of safety rod behavior, is a one dimensional, multi-channel code, and has as its complement (FLID), a one-channel, two-dimensional code. (authors) [French] Ce code permet de traiter les problemes ci-dessous: 1. Depouillement d'essais thermiques sur boucle a eau, haute ou basse pression, en regime permanent ou transitoire; 2. Etudes thermiques et hydrauliques de reacteurs a eau, a plaques, a haute ou basse pression, ebullition permise: - repartition entre canaux paralleles, couples on non par conduction a travers plaques, pour des conditions de debit ou de pertes de charge imposees, variables ou non dans le temps; - la puissance peut etre couplee a la neutronique et une representation schematique des actions de securite est prevue. Ce code (Cactus) a une dimension d'espace et plusieurs canaux, a pour complement Flid qui traite l'etude d'un seul canal a deux dimensions. (auteurs)

  19. Concerted evolution rapidly eliminates sequence variation in rDNA coding regions but not in intergenic spacers in Nicotiana tabacum allotetraploid

    Czech Academy of Sciences Publication Activity Database

    Lunerová Bedřichová, Jana; Renny-Byfield, S.; Matyášek, Roman; Leitch, A.; Kovařík, Aleš

    2017-01-01

    Roč. 303, č. 8 (2017), s. 1043-1060 ISSN 0378-2697 R&D Projects: GA ČR(CZ) GA17-11642S; GA ČR(CZ) GC16-02149J Institutional support: RVO:68081707 Keywords : Concerted evolution * Immunomodulation * Neutrophils Subject RIV: EB - Genetics ; Molecular Biology OBOR OECD: Genetics and heredity (medical genetics to be 3) Impact factor: 1.239, year: 2016

  20. Multiple Scattering Theory for Spectroscopies : a Guide to Multiple Scattering Computer Codes : Dedicated to C. R. Natoli on the Occasion of his 75th Birthday

    CERN Document Server

    Hatada, Keisuke; Ebert, Hubert

    2018-01-01

    This edited book, based on material presented at the EU Spec Training School on Multiple Scattering Codes and the following MSNano Conference, is divided into two distinct parts. The first part, subtitled “basic knowledge”, provides the basics of the multiple scattering description in spectroscopies, enabling readers to understand the physics behind the various multiple scattering codes available for modelling spectroscopies. The second part, “extended knowledge”, presents “state- of-the-art” short chapters on specific subjects associated with improving of the actual description of spectroscopies within the multiple scattering formalism, such as inelastic processes, or precise examples of modelling.

  1. The long non-coding RNA H19-derived miR-675 modulates human gastric cancer cell proliferation by targeting tumor suppressor RUNX1

    International Nuclear Information System (INIS)

    Zhuang, Ming; Gao, Wen; Xu, Jing; Wang, Ping; Shu, Yongqian

    2014-01-01

    Graphical abstract: - Highlights: • H19 regulates gastric cancer cell proliferation phenotype via miR-675. • MiR-675 modulates cell proliferation of gastric cancer cells by targeting tumor suppressor RUNX1. • The H19/miR-675/RUNX1 axis plays an important role in the tumorigenesis of gastric cancer. - Abstract: The lncRNA H19 has been recently shown to be upregulated and play important roles in gastric cancer tumorigenesis. However, the precise molecular mechanism of H19 and its mature product miR-675 in the carcinogenesis of gastric cancer remains unclear. In this study, we found that miR-675 was positively expressed with H19 and was a pivotal mediator in H19-induced gastric cancer cell growth promotion. Subsequently, the tumor suppressor Runt Domain Transcription Factor1 (RUNX1) was confirmed to be a direct target of miR-675 using a luciferase reporter assay and Western blotting analyses. A series of rescue assays indicated that RUNX1 mediated H19/miR-67-induced gastric cancer cell phenotypic changes. Moreover, the inverse relationship between the expression of RUNX1 and H19/miR-675 was also revealed in gastric cancer tissues and gastric cancer cell lines. Taken together, our study demonstrated that the novel pathway H19/miR-675/RUNX1 regulates gastric cancer development and may serve as a potential target for gastric cancer therapy

  2. Z₂-double cyclic codes

    OpenAIRE

    Borges, J.

    2014-01-01

    A binary linear code C is a Z2-double cyclic code if the set of coordinates can be partitioned into two subsets such that any cyclic shift of the coordinates of both subsets leaves invariant the code. These codes can be identified as submodules of the Z2[x]-module Z2[x]/(x^r − 1) × Z2[x]/(x^s − 1). We determine the structure of Z2-double cyclic codes giving the generator polynomials of these codes. The related polynomial representation of Z2-double cyclic codes and its duals, and the relation...

  3. The miR-223 host non-coding transcript linc-223 induces IRF4 expression in acute myeloid leukemia by acting as a competing endogenous RNA

    KAUST Repository

    Mangiavacchi, Arianna; Sorci, Melissa; Masciarelli, Silvia; Larivera, Simone; Legnini, Ivano; Iosue, Ilaria; Bozzoni, Irene; Fazi, Francesco; Fatica, Alessandro

    2016-01-01

    Alterations in genetic programs required for terminal myeloid differentiation and aberrant proliferation characterize acute myeloid leukemia (AML) cells. Here, we identify the host transcript of miR-223, linc-223, as a novel functional long non

  4. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  5. Long Non-coding RNA LINC00339 Stimulates Glioma Vasculogenic Mimicry Formation by Regulating the miR-539-5p/TWIST1/MMPs Axis

    Directory of Open Access Journals (Sweden)

    Junqing Guo

    2018-03-01

    Full Text Available Glioma is recognized as a highly angiogenic malignant brain tumor. Vasculogenic mimicry (VM greatly restricts the therapeutic effect of anti-angiogenic tumor therapy for glioma patients. However, the molecular mechanisms of VM formation in glioma remain unclear. Here, we demonstrated that LINC00339 was upregulated in glioma tissue as well as in glioma cell lines. The expression of LINC00339 in glioma tissues was positively correlated with glioma VM formation. Knockdown of LINC00339 inhibited glioma cell proliferation, migration, invasion, and tube formation, meanwhile downregulating the expression of VM-related molecular MMP-2 and MMP-14. Furthermore, knockdown of LINC00339 significantly increased the expression of miR-539-5p. Both bioinformatics and luciferase reporter assay revealed that LINC00339 regulated the above effects via binding to miR-539-5p. Besides, overexpression of miR-539-5p resulted in decreased expression of TWIST1, a transcription factor known to play an oncogenic role in glioma and identified as a direct target of miR-539-5p. TWIST1 upregulated the promoter activities of MMP-2 and MMP-14. The in vivo study showed that nude mice carrying tumors with knockdown of LINC00339 and overexpression of miR-539-5p exhibited the smallest tumor volume through inhibiting VM formation. In conclusion, LINC00339 may be used as a novel therapeutic target for VM formation in glioma.

  6. Knockdown of long non-coding RNA MAP3K20 antisense RNA 1 inhibits gastric cancer growth through epigenetically regulating miR-375.

    Science.gov (United States)

    Quan, Yongsheng; Zhang, Yan; Lin, Wei; Shen, Zhaohua; Wu, Shuai; Zhu, Changxin; Wang, Xiaoyan

    2018-03-04

    Emerging evidence has demonstrated that long noncoding RNAs (lncRNAs) play a critical role in tumorigenesis of gastric cancer. LncRNA MAP3K20 antisense RNA 1 (MLK7-AS1) has been identified as one of gastric cancer-specific lncRNAs. However, its precise role in gastric cancer remains unknown. In this study, we found that lncRNA MLK7-AS1 was significantly increased in gastric cancer tissues compared with in adjacent tissues. Gastric cancer patients with high MLK7-AS1 expression had a shorter survival and poorer prognosis. By loss-function assay, we demonstrated that knockdown of MLK7-AS1 inhibited cell proliferation and induced apoptosis in HGC27and MKN-45 cells. Furthermore, we identified miR-375 as a target of MLK7-AS1. MLK7-AS1 interacted with Dnmt1 and recruited it to miR-375 promotor, hyper-methylating miR-375 promotor and repressing miR-375 expression. Taken together, our findings demonstrate that knockdown of MLK7-AS1 by siRNA inhibits gastric cancer growth by epigenetically regulating miR-375. Thus, MLK7-AS1 may be a useful prognostic marker and therapeutic target for gastric cancer patients. Copyright © 2018 Elsevier Inc. All rights reserved.

  7. Long Non-Coding RNA TUG1 Promotes Proliferation and Inhibits Apoptosis of Osteosarcoma Cells by Sponging miR-132-3p and Upregulating SOX4 Expression.

    Science.gov (United States)

    Li, Gang; Liu, Keyu; Du, Xinhui

    2018-03-01

    Long non-coding RNA taurine upregulated gene 1 (TUG1) is reported to be a vital regulator of the progression of various cancers. This study aimed to explore the exact roles and molecular mechanisms of TUG1 in osteosarcoma (OS) development. Real-time quantitative PCR was applied to detect the expressions of TUG1 and microRNA-132-3p (miR-132-3p) in OS tissues and cells. Western blot was performed to measure protein levels of sex determining region Y-box 4 (SOX4). Cell viability was assessed using XTT assay. Cell apoptosis was evaluated using flow cytometry and caspase-3 activity detection assays. Bioinformatics analysis and luciferase reporter experiments were employed to confirm relationships among TUG1, miR-132-3p, and SOX4. TUG1 was highly expressed in human OS tissues, OS cell lines, and primary OS cells. TUG1 knockdown hindered proliferation and induced apoptosis in human OS cell lines and primary OS cells. Moreover, TUG1 inhibited miR-132-3p expression by direct interaction, and introduction of miR-132-3p inhibitor partly abrogated the effect of TUG1 knockdown on the proliferation and apoptosis of OS cells. Furthermore, SOX4 was validated as a target of miR-132-3p. Further functional analyses revealed that miR-132-3p inhibited proliferation and induced apoptosis of OS cells, while this effect was greatly abated following SOX4 overexpression. Moreover, TUG1 knockdown suppressed proliferation and promoted apoptosis by upregulating miR-132-3p and downregulating SOX4 in primary OS cells. TUG1 facilitated proliferation and suppressed apoptosis by regulating the miR-132-3p/SOX4 axis in human OS cell lines and primary OS cells. This finding provides a potential target for OS therapy. © Copyright: Yonsei University College of Medicine 2018

  8. Data Qualification Report For: Thermodynamic Data File, DATA0.YMP.R0 For Geochemical Code, EQ3/6 

    Energy Technology Data Exchange (ETDEWEB)

    P.L. Cloke

    2001-10-16

    The objective of this work is to evaluate the adequacy of chemical thermodynamic data provided by Lawrence Livermore National Laboratory (LLNL) as DataO.ymp.ROA in response to an input request submitted under AP-3.14Q. This request specified that chemical thermodynamic data available in the file, Data0.com.R2, be updated, improved, and augmented for use in geochemical modeling used in Process Model Reports (PMRs) for Engineered Barrier Systems, Waste Form, Waste Package, Unsaturated Zone, and Near Field Environment, as well as for Performance Assessment. The data are qualified in the temperature range 0 to 100 C. Several Data Tracking Numbers (DTNs) associated with Analysis/Model Reports (AMR) addressing various aspects of the post-closure chemical behavior of the waste package and the Engineered Barrier System that rely on EQ316 outputs to which these data are used as input, are Principal Factor affecting. This qualification activity was accomplished in accordance with the AP-SIII.2Q using the Technical Assessment method. A development plan, TDP-EBS-MD-000044, was prepared in accordance with AP-2.13Q and approved by the Responsible Manager. In addition, a Process Control Evaluation was performed in accordance with AP-SV.1Q. The qualification method, selected in accordance with AP-SIII.2Q, was Technical Assessment. The rationale for this approach is that the data in File Data0.com.R2 are considered Handbook data and therefore do not themselves require qualification. Only changes to Data0.com.R2 required qualification. A new file has been produced which contains the database Data0.ymp.R0, which is recommended for qualification as a result of this action. Data0.ymp.R0 will supersede Data0.com.R2 for all Yucca Mountain Project (YMP) activities.

  9. Long non-coding RNA TUG1 promotes progression of oral squamous cell carcinoma through upregulating FMNL2 by sponging miR-219

    OpenAIRE

    Yan, Guangqi; Wang, Xue; Yang, Mingliang; Lu, Li; Zhou, Qing

    2017-01-01

    Oral squamous cell carcinoma (OSCC) is a prevalent oral disease with a high morbidity and mortality rate. Several long non-coding RNAs (lncRNAs) were identified as important regulators of carcinogenesis. However, the pathogenic implications of TUG1 in OSCC are still unclear. In the present study, the expression of TUG1 was increased in OSCC cells. Knockdown of TUG1 inhibited cell proliferation, migration, and invasion, and induced cell cycle arrest at G0/G1 phase, whereas overexpression of TU...

  10. Decree No85-968 of 27 August 1986 amending Article R.233-83 of the Labour Code and defining the health and safety conditions to be met by gamma industrial radiography equipment

    International Nuclear Information System (INIS)

    1986-01-01

    This Decree, amending Article R 233-83 of the Labour Code, applies to gamma-ray industrial radiography equipment whether mobile or fixed. It contains specific technical conditions concerning the equipment, in particular, safety devices located at the entry and exit points of the source's shield. The equipment must carry a notice mentioning''Radioactive''prepared by the constructor or the importer of the source, which explains the conditions for handling, setting-up, use and maintenance of the source, including the frequency of revisions. The Decree entered into force on 1 June 1986. (NEA) [fr

  11. The long non-coding RNA MALAT1 promotes the migration and invasion of hepatocellular carcinoma by sponging miR-204 and releasing SIRT1.

    Science.gov (United States)

    Hou, Zhouhua; Xu, Xuwen; Zhou, Ledu; Fu, Xiaoyu; Tao, Shuhui; Zhou, Jiebin; Tan, Deming; Liu, Shuiping

    2017-07-01

    Increasing evidence supports the significance of long non-coding RNA in cancer development. Several recent studies suggest the oncogenic activity of long non-coding RNA metastasis-associated lung adenocarcinoma transcript 1 (MALAT1) in hepatocellular carcinoma. In this study, we explored the molecular mechanisms by which MALAT1 modulates hepatocellular carcinoma biological behaviors. We found that microRNA-204 was significantly downregulated in sh-MALAT1 HepG2 cell and 15 hepatocellular carcinoma tissues by quantitative real-time polymerase chain reaction analysis. Through bioinformatic screening, luciferase reporter assay, RNA-binding protein immunoprecipitation, and RNA pull-down assay, we identified microRNA-204 as a potential interacting partner for MALAT1. Functionally, wound-healing and transwell assays revealed that microRNA-204 significantly inhibited the migration and invasion of hepatocellular carcinoma cells. Notably, sirtuin 1 was recognized as a direct downstream target of microRNA-204 in HepG2 cells. Moreover, si-SIRT1 significantly inhibited cell invasion and migration process. These data elucidated, by sponging and competitive binding to microRNA-204, MALAT1 releases the suppression on sirtuin 1, which in turn promotes hepatocellular carcinoma migration and invasion. This study reveals a novel mechanism by which MALAT1 stimulates hepatocellular carcinoma progression and justifies targeting metastasis-associated lung adenocarcinoma transcript 1 as a potential therapy for hepatocellular carcinoma.

  12. Computer code system for the R and D of nuclear fuel cycle with fast reactor. 2. Development and application of analytical evaluation system for thermal striping phenomena

    International Nuclear Information System (INIS)

    Muramatsu, Toshiharu

    2001-01-01

    Fluid-structure thermal interaction phenomena characterized by stationary random temperature fluctuations, namely thermal striping are observed in the downstream region such as a T-junction piping system of liquid metal fast reactors (LMFRs). Therefore, the piping wall located in the downstream region must be protected against the stationary random thermal process, which might induce high-cycle fatigue. This paper describes the evaluation system based on numerical simulation methods consisting of three thermohydraulics computer programs AQUA, DINUS-3 and THEMIS and of three thermomechanical computer programs BEMSET, FINAS and CANIS, for the thermal striping developed at Japan Nuclear Cycle Development Institute (JNC). Verification results for each computer code and the system are also introduced based on out-of-pile experimental data using water and sodium as working fluids. (author)

  13. Application of TEMPPC code to the IEA-R1 nuclear reactor core hydrothermal calculations operating at 2 MW for determining the minimal coolant flow

    International Nuclear Information System (INIS)

    Frajndlich, R.; Sousa, J.A. de.

    1985-01-01

    A thermohydraulic study of the IEA-R1 nuclear reactor core on steady-state operating condition and forced convection, is presented. The objective of this calculation is to obtain the minimal flow rate of coolant necessary at the reactor core, limited by the temperature associated to the beginning of nucleate boiling over the fuel plates at a normal operating power (2MW) for a certain inlet coolant temperature. The coolant system safety level is also calculated in this paper, which is divided in three steps: thermohydraulic calculation, without using the uncertainty factors and, after that, considering these factor by two methods: the statistical and the conventional ones. Whichever the method accepted, the results obtained by the program TEMPPC show a great safety margin with respect to the termohydraulic parameters from the IEA-R1 nuclear reactor. (Author) [pt

  14. Mycobacterial RNA isolation optimized for non-coding RNA: high fidelity isolation of 5S rRNA from Mycobacterium bovis BCG reveals novel post-transcriptional processing and a complete spectrum of modified ribonucleosides.

    Science.gov (United States)

    Hia, Fabian; Chionh, Yok Hian; Pang, Yan Ling Joy; DeMott, Michael S; McBee, Megan E; Dedon, Peter C

    2015-03-11

    A major challenge in the study of mycobacterial RNA biology is the lack of a comprehensive RNA isolation method that overcomes the unusual cell wall to faithfully yield the full spectrum of non-coding RNA (ncRNA) species. Here, we describe a simple and robust procedure optimized for the isolation of total ncRNA, including 5S, 16S and 23S ribosomal RNA (rRNA) and tRNA, from mycobacteria, using Mycobacterium bovis BCG to illustrate the method. Based on a combination of mechanical disruption and liquid and solid-phase technologies, the method produces all major species of ncRNA in high yield and with high integrity, enabling direct chemical and sequence analysis of the ncRNA species. The reproducibility of the method with BCG was evident in bioanalyzer electrophoretic analysis of isolated RNA, which revealed quantitatively significant differences in the ncRNA profiles of exponentially growing and non-replicating hypoxic bacilli. The method also overcame an historical inconsistency in 5S rRNA isolation, with direct sequencing revealing a novel post-transcriptional processing of 5S rRNA to its functional form and with chemical analysis revealing seven post-transcriptional ribonucleoside modifications in the 5S rRNA. This optimized RNA isolation procedure thus provides a means to more rigorously explore the biology of ncRNA species in mycobacteria. © The Author(s) 2014. Published by Oxford University Press on behalf of Nucleic Acids Research.

  15. Long non-coding RNA TUG1 promotes migration and invasion by acting as a ceRNA of miR-335-5p in osteosarcoma cells.

    Science.gov (United States)

    Wang, Yong; Yang, Tao; Zhang, Zhen; Lu, Ming; Zhao, Wei; Zeng, Xiandong; Zhang, Weiguo

    2017-05-01

    Long non-coding RNA (lncRNA) have been the focus of increasing attention due to the role they play in many diseases, including osteosarcoma. The function of taurine upregulated gene 1 (TUG1) and its mechanism in osteosarcoma remain unclear. In our research, we found that TUG1 was elevated and correlated with a poor prognosis in osteosarcoma patients. In addition, the following functional experiment showed that decreased TUG1 could remarkably inhibit osteosarcoma cell migration and invasion, indicating that TUG1 functioned as an oncogene in osteosarcoma. Moreover, we revealed that TUG1 and Rho-associated coiled-coil-containing protein kinase 1 (ROCK1), a metastasis-related gene targeted by microRNA-335-5p (miR-335-5p), had the same miR-335-5p combining site. The subsequent luciferase assay verified TUG1 was a target of miR-335-5p. Furthermore, the results of a real-time quantitative PCR showed that TUG1 and miR-335-5p could affect each other's expression. respectively. Finally, we affirmed that TUG1 affected ROCK1 expression and ROCK1-mediated migration/invasion by working as a competitive endogenous RNA (ceRNA) via miR-335-5p. In summary, the findings of this study, based on ceRNA theory, combining the research foundation of miR-335-5p and ROCK1, and taking TUG1 as a new study point, provide new insight into molecular-level reversing migration and invasion of osteosarcoma. © 2017 The Authors. Cancer Science published by John Wiley & Sons Australia, Ltd on behalf of Japanese Cancer Association.

  16. The mechanism of long non-coding RNA MEG3 for neurons apoptosis caused by hypoxia: mediated by miR-181b-12/15-LOX signaling pathway

    Directory of Open Access Journals (Sweden)

    Xiaomin Liu

    2016-09-01

    Full Text Available Objective: lncRNAs are recently thought to play a significant role in cellular homeostasis during pathological process of diseases by competing inhibiting miRNA function. The aim of present study was to assess the function of long non-coding RNA (lncRNA MEG3 and its functional interaction with microRNA-181b in cerebral ischemic infarct of mice and hypoxia-induced neurons apoptosis. Methods: To address this question, we performed the experiments with in vivo middle cerebral artery occlusion (MCAO mice model and in vitro oxygen-glucose deprivation (OGD-cultured neuronal HT22 cell line. Relative expression of MEG3, miR-181b and 12/15-LOX (lipoxygenase mRNA was determined using quantitative RT-PCR. Western blot was used to evaluate 12/15-LOX protein expression. TUNEL assay was performed to assess cell apoptosis.Results: In both MCAO mice and OGD-cultured HT22 cell, ischemia or hypoxia treatment results in a time-dependent increase in MEG3 and 12/15-LOX expression and decrease in miR-181b expression. Knockdown of MEG3 contributes to attenuation of hypoxia-induced apoptosis of HT22 cell. Also, expression level of MEG3 negatively correlated with miR-181b expression and positively correlated with 12/15-LOX expression. In contrary to MEG3, miR-181b overexpression attenuated hypoxia-induced HT22 cell apoptosis, as well as suppressed hypoxia-induced increase in 12/15-LOX expression. By luciferase reporter assay, we concluded that miR-181b directly binds to 12/15-LOX 3’-UTR, thereby negatively regulates 12/15-LOX expression. Conclusion: Our data suggested that long non-coding RNA MEG3 functions as a competing endogenous RNA for miR-181b to regulate 12/15-LOX expression in middle cerebral artery occlusion-induced ischemic infarct of brain nerve cells.

  17. Covalent Strategies for Targeting Messenger and Non-Coding RNAs: An Updated Review on siRNA, miRNA and antimiR Conjugates

    Directory of Open Access Journals (Sweden)

    Santiago Grijalvo

    2018-02-01

    Full Text Available Oligonucleotide-based therapy has become an alternative to classical approaches in the search of novel therapeutics involving gene-related diseases. Several mechanisms have been described in which demonstrate the pivotal role of oligonucleotide for modulating gene expression. Antisense oligonucleotides (ASOs and more recently siRNAs and miRNAs have made important contributions either in reducing aberrant protein levels by sequence-specific targeting messenger RNAs (mRNAs or restoring the anomalous levels of non-coding RNAs (ncRNAs that are involved in a good number of diseases including cancer. In addition to formulation approaches which have contributed to accelerate the presence of ASOs, siRNAs and miRNAs in clinical trials; the covalent linkage between non-viral vectors and nucleic acids has also added value and opened new perspectives to the development of promising nucleic acid-based therapeutics. This review article is mainly focused on the strategies carried out for covalently modifying siRNA and miRNA molecules. Examples involving cell-penetrating peptides (CPPs, carbohydrates, polymers, lipids and aptamers are discussed for the synthesis of siRNA conjugates whereas in the case of miRNA-based drugs, this review article makes special emphasis in using antagomiRs, locked nucleic acids (LNAs, peptide nucleic acids (PNAs as well as nanoparticles. The biomedical applications of siRNA and miRNA conjugates are also discussed.

  18. Simulation and Comparison of the Calorimeters Measuring the Nuclear Heating in the OSIRIS Reactor, with the TRIPOLI-4R Monte-Carlo Code

    International Nuclear Information System (INIS)

    Peron, A.; Malouch, F.; Diop, C.M.

    2013-06-01

    Two calorimeter devices are used in the OSIRIS MTR reactor (CEA-Saclay center) for the nuclear heating measurements. The first one is a fixed five-stage calorimeter device. The second one is an innovative mobile probe called 'CALMOS'. The design of these devices is different (in particular their geometry), implying modifications on the local neutron and photon fluxes and hence on nuclear heating measured values. The measurements performed by the two calorimeter devices cannot directly be compared; this requires perfect irradiation conditions in the reactor core, especially for the core loading and the control element positions. Simulation is here a good help to perform a fully relevant comparison. In this paper, differences between calorimeter devices in terms of nuclear heating and particle fluxes are evaluated using the TRIPOLI-4 Monte-Carlo code. After a description of the OSIRIS reactor and the design of the two calorimeter devices, the nuclear heating calculation scheme used for simulation will be introduced. Different simulations and results will be detailed and analyzed to determine the calorimeter geometry impact on the measured nuclear heating. (authors)

  19. Automation of the computational programs and codes used in the methodology of neutronic and thermohydraulic calculation for the IEA-R1 nuclear reactor

    International Nuclear Information System (INIS)

    Stefani, Giovanni Laranjo de

    2009-01-01

    This work proceeds the elaboration of a computational program for execution of various neutron and thermalhydraulic calculation methodology programs of the IEA-R1-Sao Paulo, Brazil, making the process more practical and safe, besides transforming de output data of each program an automatic process. This reactor is largely used for production of radioisotopes for medical use, material irradiation, personnel training and also for basic research. For that purposes it is necessary to change his core configuration in order to adapt the reactor for different uses. The work will transform various existent programs into subroutines of a principal program, i.e.,a program which call each of the programs automatically when necessary, and create another programs for manipulation the output data and therefore making practical the process

  20. Long non-coding RNA TUG1 contributes to tumorigenesis of human osteosarcoma by sponging miR-9-5p and regulating POU2F1 expression.

    Science.gov (United States)

    Xie, Chu-Hai; Cao, Yan-Ming; Huang, Yan; Shi, Qun-Wei; Guo, Jian-Hong; Fan, Zi-Wen; Li, Ju-Gen; Chen, Bin-Wei; Wu, Bo-Yi

    2016-11-01

    Recent studies have shown that long non-coding RNAs (lncRNAs) have critical roles in tumorigenesis, including osteosarcoma. The lncRNA taurine-upregulated gene 1 (TUG1) was reported to be involved in the progression of osteosarcoma. Here, we investigated the role of TUG1 in osteosarcoma cells and the underlying mechanism. TUG1 expression was measured in osteosarcoma cell lines and human normal osteoblast cells by quantitative real-time PCR (qRT-PCR). The effects of TUG1 on osteosarcoma cells were studied by RNA interference in vitro and in vivo. The mechanism of competing endogenous RNA (ceRNA) was determined using bioinformatic analysis and luciferase assays. Our data showed that TUG1 knockdown inhibited cell proliferation and colony formation, and induced G0/G1 cell cycle arrest and apoptosis in vitro, and suppressed tumor growth in vivo. Besides, we found that TUG1 acted as an endogenous sponge to directly bind to miR-9-5p and downregulated miR-9-5p expression. Moreover, TUG1 overturned the effect of miR-9-5p on the proliferation, colony formation, cell cycle arrest, and apoptosis in osteosarcoma cells, which involved the derepression of POU class 2 homeobox 1 (POU2F1) expression. In conclusion, our study elucidated a novel TUG1/miR-9-5p/POU2F1 pathway, in which TUG1 acted as a ceRNA by sponging miR-9-5p, leading to downregulation of POU2F1 and facilitating the tumorigenesis of osteosarcoma. These findings may contribute to the lncRNA-targeted therapy for human osteosarcoma.

  1. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...

  2. Determination of the number of copies of genes coding for 5s-rRNA and tRNA in the genomes of 43 species of wheat and Aegilops

    International Nuclear Information System (INIS)

    Vakhitov, V.A.; Gimalov, F.R.; Nikonorov, Yu.M.

    1986-01-01

    The number of 5s-rRNA and tRNA genes has been studied in 43 species of wheat and Aegilops differing in ploidy level, genomic composition and origin. It has been demonstrated that the repeatability of the 5s-rRNA and tRNA genes increases in wheat with increasing ploidy level, but not in proportion to the genome size. In Aegilops, in distinction from wheat, the relative as well as absolute number of 5s-RNA genes increases with increasing ploidy level. The proportion of the sequences coding for tRNA in the dipoloid and polyploid Aegilops species is practically similar, while the number of tRNA genes increases almost 2-3 times with increasing ploidy level. Large variability has been recorded between the species with similar genomic composition and ploidy level in respect of the number of the 5s-rRNA and tRNA genes. It has been demonstrated that integration of the initial genomes of the amphidiploids is accompanied by elimination of a particular part of these genomes. It has been concluded that the mechanisms of establishment and evolution of genomes in the intra- and intergeneric allopolyploids are not identical

  3. Coding Labour

    Directory of Open Access Journals (Sweden)

    Anthony McCosker

    2014-03-01

    Full Text Available As well as introducing the Coding Labour section, the authors explore the diffusion of code across the material contexts of everyday life, through the objects and tools of mediation, the systems and practices of cultural production and organisational management, and in the material conditions of labour. Taking code beyond computation and software, their specific focus is on the increasingly familiar connections between code and labour with a focus on the codification and modulation of affect through technologies and practices of management within the contemporary work organisation. In the grey literature of spreadsheets, minutes, workload models, email and the like they identify a violence of forms through which workplace affect, in its constant flux of crisis and ‘prodromal’ modes, is regulated and governed.

  4. Polynomial weights and code constructions

    DEFF Research Database (Denmark)

    Massey, J; Costello, D; Justesen, Jørn

    1973-01-01

    polynomial included. This fundamental property is then used as the key to a variety of code constructions including 1) a simplified derivation of the binary Reed-Muller codes and, for any primepgreater than 2, a new extensive class ofp-ary "Reed-Muller codes," 2) a new class of "repeated-root" cyclic codes...... of long constraint length binary convolutional codes derived from2^r-ary Reed-Solomon codes, and 6) a new class ofq-ary "repeated-root" constacyclic codes with an algebraic decoding algorithm.......For any nonzero elementcof a general finite fieldGF(q), it is shown that the polynomials(x - c)^i, i = 0,1,2,cdots, have the "weight-retaining" property that any linear combination of these polynomials with coefficients inGF(q)has Hamming weight at least as great as that of the minimum degree...

  5. R and Matlab

    CERN Document Server

    Hiebeler, David E

    2015-01-01

    The First Book to Explain How a User of R or MATLAB Can Benefit from the OtherIn today's increasingly interdisciplinary world, R and MATLAB® users from different backgrounds must often work together and share code. R and MATLAB® is designed for users who already know R or MATLAB and now need to learn the other platform. The book makes the transition from one platform to the other as quick and painless as possible.Enables R and MATLAB Users to Easily Collaborate and Share CodeThe author covers essential tasks, such as working with matrices and vectors, writing functions and other programming co

  6. Metaprogramming in R

    DEFF Research Database (Denmark)

    Mailund, Thomas

    Learn how to manipulate functions and expressions to modify how the R language interprets itself. This book is an introduction to metaprogramming in the R language, so you will write programs to manipulate other programs. Metaprogramming in R shows you how to treat code as data that you can gener...

  7. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  8. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe ...

  9. Aztheca Code

    International Nuclear Information System (INIS)

    Quezada G, S.; Espinosa P, G.; Centeno P, J.; Sanchez M, H.

    2017-09-01

    This paper presents the Aztheca code, which is formed by the mathematical models of neutron kinetics, power generation, heat transfer, core thermo-hydraulics, recirculation systems, dynamic pressure and level models and control system. The Aztheca code is validated with plant data, as well as with predictions from the manufacturer when the reactor operates in a stationary state. On the other hand, to demonstrate that the model is applicable during a transient, an event occurred in a nuclear power plant with a BWR reactor is selected. The plant data are compared with the results obtained with RELAP-5 and the Aztheca model. The results show that both RELAP-5 and the Aztheca code have the ability to adequately predict the behavior of the reactor. (Author)

  10. Vocable Code

    DEFF Research Database (Denmark)

    Soon, Winnie; Cox, Geoff

    2018-01-01

    a computational and poetic composition for two screens: on one of these, texts and voices are repeated and disrupted by mathematical chaos, together exploring the performativity of code and language; on the other, is a mix of a computer programming syntax and human language. In this sense queer code can...... be understood as both an object and subject of study that intervenes in the world’s ‘becoming' and how material bodies are produced via human and nonhuman practices. Through mixing the natural and computer language, this article presents a script in six parts from a performative lecture for two persons...

  11. NSURE code

    International Nuclear Information System (INIS)

    Rattan, D.S.

    1993-11-01

    NSURE stands for Near-Surface Repository code. NSURE is a performance assessment code. developed for the safety assessment of near-surface disposal facilities for low-level radioactive waste (LLRW). Part one of this report documents the NSURE model, governing equations and formulation of the mathematical models, and their implementation under the SYVAC3 executive. The NSURE model simulates the release of nuclides from an engineered vault, their subsequent transport via the groundwater and surface water pathways tot he biosphere, and predicts the resulting dose rate to a critical individual. Part two of this report consists of a User's manual, describing simulation procedures, input data preparation, output and example test cases

  12. Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the objectives, meeting goals and overall NASA goals for the NASA Data Standards Working Group. The presentation includes information on the technical progress surrounding the objective, short LDPC codes, and the general results on the Pu-Pw tradeoff.

  13. ANIMAL code

    International Nuclear Information System (INIS)

    Lindemuth, I.R.

    1979-01-01

    This report describes ANIMAL, a two-dimensional Eulerian magnetohydrodynamic computer code. ANIMAL's physical model also appears. Formulated are temporal and spatial finite-difference equations in a manner that facilitates implementation of the algorithm. Outlined are the functions of the algorithm's FORTRAN subroutines and variables

  14. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621 ...

  15. MCNP code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The MCNP code is the major Monte Carlo coupled neutron-photon transport research tool at the Los Alamos National Laboratory, and it represents the most extensive Monte Carlo development program in the United States which is available in the public domain. The present code is the direct descendent of the original Monte Carlo work of Fermi, von Neumaum, and Ulam at Los Alamos in the 1940s. Development has continued uninterrupted since that time, and the current version of MCNP (or its predecessors) has always included state-of-the-art methods in the Monte Carlo simulation of radiation transport, basic cross section data, geometry capability, variance reduction, and estimation procedures. The authors of the present code have oriented its development toward general user application. The documentation, though extensive, is presented in a clear and simple manner with many examples, illustrations, and sample problems. In addition to providing the desired results, the output listings give a a wealth of detailed information (some optional) concerning each state of the calculation. The code system is continually updated to take advantage of advances in computer hardware and software, including interactive modes of operation, diagnostic interrupts and restarts, and a variety of graphical and video aids

  16. Expander Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 10; Issue 1. Expander Codes - The Sipser–Spielman Construction. Priti Shankar. General Article Volume 10 ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science Bangalore 560 012, India.

  17. The Aster code

    International Nuclear Information System (INIS)

    Delbecq, J.M.

    1999-01-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  18. Panda code

    International Nuclear Information System (INIS)

    Altomare, S.; Minton, G.

    1975-02-01

    PANDA is a new two-group one-dimensional (slab/cylinder) neutron diffusion code designed to replace and extend the FAB series. PANDA allows for the nonlinear effects of xenon, enthalpy and Doppler. Fuel depletion is allowed. PANDA has a completely general search facility which will seek criticality, maximize reactivity, or minimize peaking. Any single parameter may be varied in a search. PANDA is written in FORTRAN IV, and as such is nearly machine independent. However, PANDA has been written with the present limitations of the Westinghouse CDC-6600 system in mind. Most computation loops are very short, and the code is less than half the useful 6600 memory size so that two jobs can reside in the core at once. (auth)

  19. CANAL code

    International Nuclear Information System (INIS)

    Gara, P.; Martin, E.

    1983-01-01

    The CANAL code presented here optimizes a realistic iron free extraction channel which has to provide a given transversal magnetic field law in the median plane: the current bars may be curved, have finite lengths and cooling ducts and move in a restricted transversal area; terminal connectors may be added, images of the bars in pole pieces may be included. A special option optimizes a real set of circular coils [fr

  20. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  1. Self-complementary circular codes in coding theory.

    Science.gov (United States)

    Fimmel, Elena; Michel, Christian J; Starman, Martin; Strüngmann, Lutz

    2018-04-01

    Self-complementary circular codes are involved in pairing genetic processes. A maximal [Formula: see text] self-complementary circular code X of trinucleotides was identified in genes of bacteria, archaea, eukaryotes, plasmids and viruses (Michel in Life 7(20):1-16 2017, J Theor Biol 380:156-177, 2015; Arquès and Michel in J Theor Biol 182:45-58 1996). In this paper, self-complementary circular codes are investigated using the graph theory approach recently formulated in Fimmel et al. (Philos Trans R Soc A 374:20150058, 2016). A directed graph [Formula: see text] associated with any code X mirrors the properties of the code. In the present paper, we demonstrate a necessary condition for the self-complementarity of an arbitrary code X in terms of the graph theory. The same condition has been proven to be sufficient for codes which are circular and of large size [Formula: see text] trinucleotides, in particular for maximal circular codes ([Formula: see text] trinucleotides). For codes of small-size [Formula: see text] trinucleotides, some very rare counterexamples have been constructed. Furthermore, the length and the structure of the longest paths in the graphs associated with the self-complementary circular codes are investigated. It has been proven that the longest paths in such graphs determine the reading frame for the self-complementary circular codes. By applying this result, the reading frame in any arbitrary sequence of trinucleotides is retrieved after at most 15 nucleotides, i.e., 5 consecutive trinucleotides, from the circular code X identified in genes. Thus, an X motif of a length of at least 15 nucleotides in an arbitrary sequence of trinucleotides (not necessarily all of them belonging to X) uniquely defines the reading (correct) frame, an important criterion for analyzing the X motifs in genes in the future.

  2. Metaprogramming in R

    DEFF Research Database (Denmark)

    Mailund, Thomas

    Learn how to manipulate functions and expressions to modify how the R language interprets itself. This book is an introduction to metaprogramming in the R language, so you will write programs to manipulate other programs. Metaprogramming in R shows you how to treat code as data that you can...... generate, analyze, or modify. R is a very high-level language where all operations are functions and all functions are data that can be manipulated. This book shows you how to leverage R's natural flexibility in how function calls and expressions are evaluated, to create small domain-specific languages...... to extend R within the R language itself. You will: Find out about the anatomy of a function in R Look inside a function call Work with R expressions and environments Manipulate expressions in R Use substitutions...

  3. Metaprogramming in R

    DEFF Research Database (Denmark)

    Mailund, Thomas

    2017-01-01

    Learn how to manipulate functions and expressions to modify how the R language interprets itself. This book is an introduction to metaprogramming in the R language, so you will write programs to manipulate other programs. Metaprogramming in R shows you how to treat code as data that you can...... generate, analyze, or modify. R is a very high-level language where all operations are functions and all functions are data that can be manipulated. This book shows you how to leverage R's natural flexibility in how function calls and expressions are evaluated, to create small domain-specific languages...... to extend R within the R language itself. You will: Find out about the anatomy of a function in R Look inside a function call Work with R expressions and environments Manipulate expressions in R Use substitutions...

  4. Droit déguisé : Quelques considérations sur le rôle du droit byzantin dans la genèse des codes en Europe orientale au XIXe siècle

    NARCIS (Netherlands)

    Penna, Daphne

    2015-01-01

    This paper attempts to examine some first questions related to the use of Byzantine law in the codes that emerged during the 19th century in South-Eastern Europe. It focuses on the introductory acts to the codes of Moldavie (1817) and Valachie (1818) and an episode related to the involvement of

  5. LFSC - Linac Feedback Simulation Code

    Energy Technology Data Exchange (ETDEWEB)

    Ivanov, Valentin; /Fermilab

    2008-05-01

    The computer program LFSC (Code>) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output.

  6. Automatic coding method of the ACR Code

    International Nuclear Information System (INIS)

    Park, Kwi Ae; Ihm, Jong Sool; Ahn, Woo Hyun; Baik, Seung Kook; Choi, Han Yong; Kim, Bong Gi

    1993-01-01

    The authors developed a computer program for automatic coding of ACR(American College of Radiology) code. The automatic coding of the ACR code is essential for computerization of the data in the department of radiology. This program was written in foxbase language and has been used for automatic coding of diagnosis in the Department of Radiology, Wallace Memorial Baptist since May 1992. The ACR dictionary files consisted of 11 files, one for the organ code and the others for the pathology code. The organ code was obtained by typing organ name or code number itself among the upper and lower level codes of the selected one that were simultaneous displayed on the screen. According to the first number of the selected organ code, the corresponding pathology code file was chosen automatically. By the similar fashion of organ code selection, the proper pathologic dode was obtained. An example of obtained ACR code is '131.3661'. This procedure was reproducible regardless of the number of fields of data. Because this program was written in 'User's Defined Function' from, decoding of the stored ACR code was achieved by this same program and incorporation of this program into program in to another data processing was possible. This program had merits of simple operation, accurate and detail coding, and easy adjustment for another program. Therefore, this program can be used for automation of routine work in the department of radiology

  7. Error-correction coding

    Science.gov (United States)

    Hinds, Erold W. (Principal Investigator)

    1996-01-01

    This report describes the progress made towards the completion of a specific task on error-correcting coding. The proposed research consisted of investigating the use of modulation block codes as the inner code of a concatenated coding system in order to improve the overall space link communications performance. The study proposed to identify and analyze candidate codes that will complement the performance of the overall coding system which uses the interleaved RS (255,223) code as the outer code.

  8. Dynamic Shannon Coding

    OpenAIRE

    Gagie, Travis

    2005-01-01

    We present a new algorithm for dynamic prefix-free coding, based on Shannon coding. We give a simple analysis and prove a better upper bound on the length of the encoding produced than the corresponding bound for dynamic Huffman coding. We show how our algorithm can be modified for efficient length-restricted coding, alphabetic coding and coding with unequal letter costs.

  9. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  10. Codes Over Hyperfields

    Directory of Open Access Journals (Sweden)

    Atamewoue Surdive

    2017-12-01

    Full Text Available In this paper, we define linear codes and cyclic codes over a finite Krasner hyperfield and we characterize these codes by their generator matrices and parity check matrices. We also demonstrate that codes over finite Krasner hyperfields are more interesting for code theory than codes over classical finite fields.

  11. Containment Code Validation Matrix

    International Nuclear Information System (INIS)

    Chin, Yu-Shan; Mathew, P.M.; Glowa, Glenn; Dickson, Ray; Liang, Zhe; Leitch, Brian; Barber, Duncan; Vasic, Aleks; Bentaib, Ahmed; Journeau, Christophe; Malet, Jeanne; Studer, Etienne; Meynet, Nicolas; Piluso, Pascal; Gelain, Thomas; Michielsen, Nathalie; Peillon, Samuel; Porcheron, Emmanuel; Albiol, Thierry; Clement, Bernard; Sonnenkalb, Martin; Klein-Hessling, Walter; Arndt, Siegfried; Weber, Gunter; Yanez, Jorge; Kotchourko, Alexei; Kuznetsov, Mike; Sangiorgi, Marco; Fontanet, Joan; Herranz, Luis; Garcia De La Rua, Carmen; Santiago, Aleza Enciso; Andreani, Michele; Paladino, Domenico; Dreier, Joerg; Lee, Richard; Amri, Abdallah

    2014-01-01

    The Committee on the Safety of Nuclear Installations (CSNI) formed the CCVM (Containment Code Validation Matrix) task group in 2002. The objective of this group was to define a basic set of available experiments for code validation, covering the range of containment (ex-vessel) phenomena expected in the course of light and heavy water reactor design basis accidents and beyond design basis accidents/severe accidents. It was to consider phenomena relevant to pressurised heavy water reactor (PHWR), pressurised water reactor (PWR) and boiling water reactor (BWR) designs of Western origin as well as of Eastern European VVER types. This work would complement the two existing CSNI validation matrices for thermal hydraulic code validation (NEA/CSNI/R(1993)14) and In-vessel core degradation (NEA/CSNI/R(2001)21). The report initially provides a brief overview of the main features of a PWR, BWR, CANDU and VVER reactors. It also provides an overview of the ex-vessel corium retention (core catcher). It then provides a general overview of the accident progression for light water and heavy water reactors. The main focus is to capture most of the phenomena and safety systems employed in these reactor types and to highlight the differences. This CCVM contains a description of 127 phenomena, broken down into 6 categories: - Containment Thermal-hydraulics Phenomena; - Hydrogen Behaviour (Combustion, Mitigation and Generation) Phenomena; - Aerosol and Fission Product Behaviour Phenomena; - Iodine Chemistry Phenomena; - Core Melt Distribution and Behaviour in Containment Phenomena; - Systems Phenomena. A synopsis is provided for each phenomenon, including a description, references for further information, significance for DBA and SA/BDBA and a list of experiments that may be used for code validation. The report identified 213 experiments, broken down into the same six categories (as done for the phenomena). An experiment synopsis is provided for each test. Along with a test description

  12. Analytical computation of thermodynamic performance parameters of actual vapour compression refrigeration system with R22, R32, R134a, R152a, R290 and R1270

    Directory of Open Access Journals (Sweden)

    Vali Shaik Sharmas

    2018-01-01

    Full Text Available The present work focuses on analytical computation of thermodynamic performance of actual vapour compression refrigeration system by using six pure refrigerants. The refrigerants are namely R22, R32, R134a, R152a, R290 and R1270 respectively. A MATLAB code is developed to compute the thermodynamic performance parameters of actual vapour compression system such as refrigeration effect, compressor work, COP, power per ton of refrigeration, compressor discharge temperature and volumetric refrigeration capacity at condensing and evaporating temperatures of 54.4oC and 7.2oC respectively. Analytical results exhibited that COP of both R32 and R134a are 15.95% and 11.71% higher among the six investigated refrigerants. However R32 and R134a cannot be replaced directly into R22 system. This is due to their higher compressor discharge temperature and poor volumetric capacity respectively. The discharge temperature of both R1270 and R290 are lower than R22 by 20-26oC. Volumetric refrigeration capacity of R1270 (3197 kJ/m3 is very close to that of volumetric capacity of R22 (3251 kJ/m3. Both R1270 and R290 shows good miscibility with R22 mineral oil. Overall R1270 would be a suitable ecofriendly refrigerant to replace R22 from the stand point of ODP, GWP, volumetric capacity, discharge temperature and miscibility with mineral oil although its COP is lower.

  13. LFSC - Linac Feedback Simulation Code

    International Nuclear Information System (INIS)

    Ivanov, Valentin; Fermilab

    2008-01-01

    The computer program LFSC ( ) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output

  14. R data analysis without programming

    CERN Document Server

    Gerbing, David W

    2013-01-01

    This book prepares readers to analyze data and interpret statistical results using R more quickly than other texts. R is a challenging program to learn because code must be created to get started. To alleviate that challenge, Professor Gerbing developed lessR. LessR extensions remove the need to program. By introducing R through less R, readers learn how to organize data for analysis, read the data into R, and produce output without performing numerous functions and programming exercises first. With lessR, readers can select the necessary procedure and change the relevant variables without pro

  15. Vector Network Coding Algorithms

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L x L coding matrices that play a similar role as coding c in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector coding, our algori...

  16. Homological stabilizer codes

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Jonas T., E-mail: jonastyleranderson@gmail.com

    2013-03-15

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

  17. R-Matrix Codes for Charged-Particle Induced Reactions in the Resolved Resonance Region (3), Summary Report of an IAEA Consultants' Meeting IAEA Headquarters, Vienna, Austria, 28-30 June 2017

    Energy Technology Data Exchange (ETDEWEB)

    Leeb, Helmut [Technische Univ. Wien, Vienna (Austria); Dimitriou, Paraskevi [Intl Atomic Energy Agency (IAEA), Vienna (Austria); Thompson, Ian [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-10-23

    A Consultants Meeting was held at the IAEA Headquarters, from 28 to 30 June 2017, to discuss the results of a test exercise that had been defined and assigned to all participants of the previous meeting held in December 2016. Five codes were used in this exercise: AMUR, AZURE2, RAC, SFRESCO and SAMMY. The results obtained from these codes were compared and further actions were proposed. Participants’ presentations and technical discussions, as well as proposed additional actions have been summarized in this report.

  18. Diagnostic Coding for Epilepsy.

    Science.gov (United States)

    Williams, Korwyn; Nuwer, Marc R; Buchhalter, Jeffrey R

    2016-02-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  19. Coding of Neuroinfectious Diseases.

    Science.gov (United States)

    Barkley, Gregory L

    2015-12-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  20. Documentation of the heat conduction code TRANCO

    International Nuclear Information System (INIS)

    Callahan, G.D.

    1975-01-01

    A transient heat conduction code used for thermal, thermoelastic, thermoelastic/plastic, and thermo/viscoelastic analyses is presented. The code can solve two-dimensional X-Y and axially symmetric R-theta-z thermal problems with the following conditions: constant temperature, constant flux, convective, or adiabatic boundary conditions; time-dependent or constant internal heat generation; and anisotropic thermal conductivities

  1. Vector Network Coding

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L X L coding matrices that play a similar role as coding coefficients in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector co...

  2. Entropy Coding in HEVC

    OpenAIRE

    Sze, Vivienne; Marpe, Detlev

    2014-01-01

    Context-Based Adaptive Binary Arithmetic Coding (CABAC) is a method of entropy coding first introduced in H.264/AVC and now used in the latest High Efficiency Video Coding (HEVC) standard. While it provides high coding efficiency, the data dependencies in H.264/AVC CABAC make it challenging to parallelize and thus limit its throughput. Accordingly, during the standardization of entropy coding for HEVC, both aspects of coding efficiency and throughput were considered. This chapter describes th...

  3. Generalized concatenated quantum codes

    International Nuclear Information System (INIS)

    Grassl, Markus; Shor, Peter; Smith, Graeme; Smolin, John; Zeng Bei

    2009-01-01

    We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length but also asymptotically meet the quantum Hamming bound for large block length.

  4. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  5. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  6. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  7. R-ES-ONAN-CE

    Indian Academy of Sciences (India)

    B N Goswami. 16 Algorithms. Algorithms for Sorting and. Searching. R K Shyamasundar. 33 Error Correcting Codes. Reed Solomon Codes. Prifi Shankar. 48 Know Your Chromosomes The Uniqueness of Sex. Chromosomes. Vani Brahmachari. GENERAL ARTICLES. 58 Transfinite Numbers. S M Srivastava. What is Infinity ...

  8. Abstraction carrying code and resource-awareness

    OpenAIRE

    Hermenegildo, Manuel V.; Albert Albiol, Elvira; López García, Pedro; Puebla Sánchez, Alvaro Germán

    2005-01-01

    Proof-Carrying Code (PCC) is a general approach to mobile code safety in which the code supplier augments the program with a certifícate (or proof). The intended benefit is that the program consumer can locally validate the certifícate w.r.t. the "untrusted" program by means of a certifícate checker—a process which should be much simpler, eíñcient, and automatic than generating the original proof. Abstraction Carrying Code (ACC) is an enabling technology for PCC in which an abstract mod...

  9. Pochekaev R.Yu. Chinggis Khan’s Great Yasa in the Mongol Empire and Chinggisid States of the 13th–14th centuries: Legal Code or Ideal “Law and Order”?

    Directory of Open Access Journals (Sweden)

    R.Yu. Pochekaev

    2016-12-01

    Full Text Available Research objective of the article is clarifying of the nature of the Greta Yasa of Chinggis Khan: was it legal code or set of specific edicts, regulations and principles? Research materials include Arabian and Persian historical sources which already were used by another researchers of the Great Yasa (D. Ayalon, D.O. Morgan, as well as new sources on the history of the Mongol Empire, the Golden Horde, Yuan Empire, Chaghataid state recently introduced into scholarly circulation. Research results of the article consist in getting of arguments that the Great Yasa, in fact, was a set of specific principles and rules established by Chinggis Khan, and their observance provided a harmony in the Mongol Empire and the states of Chinggisids, i.e. the Great Yasa was a kind of “law and order” but not a legal code. Research novelty of the article is represented by analysis of the level of the legal development of the Mongols of the 13th–14th cc. when they didn’t need a special codification to regulate their legal relations, that’s why no one authentic source mentioned the Great Yasa as code of laws and it is characterized in this way only by representatives of the “written legal culture” (European, Caucasus, Arabian, etc..

  10. Discussion on LDPC Codes and Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  11. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  12. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    Shannon limit of the channel. Among the earliest discovered codes that approach the. Shannon limit were the low density parity check (LDPC) codes. The term low density arises from the property of the parity check matrix defining the code. We will now define this matrix and the role that it plays in decoding. 2. Linear Codes.

  13. Manually operated coded switch

    International Nuclear Information System (INIS)

    Barnette, J.H.

    1978-01-01

    The disclosure related to a manually operated recodable coded switch in which a code may be inserted, tried and used to actuate a lever controlling an external device. After attempting a code, the switch's code wheels must be returned to their zero positions before another try is made

  14. Truncation Depth Rule-of-Thumb for Convolutional Codes

    Science.gov (United States)

    Moision, Bruce

    2009-01-01

    In this innovation, it is shown that a commonly used rule of thumb (that the truncation depth of a convolutional code should be five times the memory length, m, of the code) is accurate only for rate 1/2 codes. In fact, the truncation depth should be 2.5 m/(1 - r), where r is the code rate. The accuracy of this new rule is demonstrated by tabulating the distance properties of a large set of known codes. This new rule was derived by bounding the losses due to truncation as a function of the code rate. With regard to particular codes, a good indicator of the required truncation depth is the path length at which all paths that diverge from a particular path have accumulated the minimum distance of the code. It is shown that the new rule of thumb provides an accurate prediction of this depth for codes of varying rates.

  15. Stimulus reference frame and neural coding precision

    Czech Academy of Sciences Publication Activity Database

    Košťál, Lubomír

    2016-01-01

    Roč. 71, Apr 2016 (2016), s. 22-27 ISSN 0022-2496 R&D Projects: GA ČR(CZ) GA15-08066S Institutional support: RVO:67985823 Keywords : Fisher information * coding accuracy * measurement scale * Jeffreys prior Subject RIV: FH - Neurology Impact factor: 1.377, year: 2016

  16. Coding in Muscle Disease.

    Science.gov (United States)

    Jones, Lyell K; Ney, John P

    2016-12-01

    Accurate coding is critically important for clinical practice and research. Ongoing changes to diagnostic and billing codes require the clinician to stay abreast of coding updates. Payment for health care services, data sets for health services research, and reporting for medical quality improvement all require accurate administrative coding. This article provides an overview of administrative coding for patients with muscle disease and includes a case-based review of diagnostic and Evaluation and Management (E/M) coding principles in patients with myopathy. Procedural coding for electrodiagnostic studies and neuromuscular ultrasound is also reviewed.

  17. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  18. Convex Optimization in R

    Directory of Open Access Journals (Sweden)

    Roger Koenker

    2014-09-01

    Full Text Available Convex optimization now plays an essential role in many facets of statistics. We briefly survey some recent developments and describe some implementations of these methods in R . Applications of linear and quadratic programming are introduced including quantile regression, the Huber M-estimator and various penalized regression methods. Applications to additively separable convex problems subject to linear equality and inequality constraints such as nonparametric density estimation and maximum likelihood estimation of general nonparametric mixture models are described, as are several cone programming problems. We focus throughout primarily on implementations in the R environment that rely on solution methods linked to R, like MOSEK by the package Rmosek. Code is provided in R to illustrate several of these problems. Other applications are available in the R package REBayes, dealing with empirical Bayes estimation of nonparametric mixture models.

  19. R-ES-ONANCE--IJa-nu-a-rY

    Indian Academy of Sciences (India)

    panying poster. 1 How many of the amino acids are chiral? 2 All chiral amino acids have theL configuration; however, in the R/S nomenclature only one has the R configuration. Which one, and why? 3 Which amino acids have more than one asymmetric centre? 4 What are the two common letter-code systems used to repre-.

  20. H.R. 804: A Bill to amend the Internal Revenue Code of 1986 to reduce emissions of carbon dioxide by imposing a tax on certain fuels based on their carbon content. Introduced in the House of Representatives, One Hundred Third Congress, First Session, February 3, 1993

    International Nuclear Information System (INIS)

    Anon.

    1993-01-01

    H.R. 804 proposes the imposition of a carbon tax on primary fossil fuels. In general, Chapter 38 of the Internal Revenue Code of 1986 is to be amended by adding at the end thereof the following new subchapter: open-quotes Subchapter E--Carbon Tax on Primary Fossil Fuels.close quotes Section 4691 will be concerned with the tax on coal; Section 4692 with the tax on petroleum; Section 4693 with the tax on natural gas; and Section 4694 will discuss inflation adjustments

  1. Double-negative feedback loop between long non-coding RNA TUG1 and miR-145 promotes epithelial to mesenchymal transition and radioresistance in human bladder cancer cells.

    Science.gov (United States)

    Tan, Jiemei; Qiu, Kaifeng; Li, Mingyi; Liang, Ying

    2015-10-07

    LncRNAs have a critical role in the regulation of cellular processes such as cancer progression and metastasis. In the present study, we confirmed that TUG1 was overexpressed in bladder cancer tissues and established cell lines. Knockdown of TUG1 inhibited bladder cancer cell metastasis both in vitro and in vivo. Furthermore, we found that TUG1 promoted cancer cell invasion and radioresistance through inducing epithelial-to-mesenchymal transition (EMT). Interestingly, TUG1 decreased the expression of miR-145 and there was a reciprocal repression between TUG1 and miR-145 in an Argonaute2-dependent manner. ZEB2 was identified as a down-stream target of miR-145 and TUG1 exerted its function through the miR-145/ZEB2 axis. In summary, our data indicated that blocking TUG1 function may be an effective anti-cancer therapy. Copyright © 2015 Federation of European Biochemical Societies. Published by Elsevier B.V. All rights reserved.

  2. Codes and curves

    CERN Document Server

    Walker, Judy L

    2000-01-01

    When information is transmitted, errors are likely to occur. Coding theory examines efficient ways of packaging data so that these errors can be detected, or even corrected. The traditional tools of coding theory have come from combinatorics and group theory. Lately, however, coding theorists have added techniques from algebraic geometry to their toolboxes. In particular, by re-interpreting the Reed-Solomon codes, one can see how to define new codes based on divisors on algebraic curves. For instance, using modular curves over finite fields, Tsfasman, Vladut, and Zink showed that one can define a sequence of codes with asymptotically better parameters than any previously known codes. This monograph is based on a series of lectures the author gave as part of the IAS/PCMI program on arithmetic algebraic geometry. Here, the reader is introduced to the exciting field of algebraic geometric coding theory. Presenting the material in the same conversational tone of the lectures, the author covers linear codes, inclu...

  3. Massive Predictive Modeling using Oracle R Enterprise

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    R is fast becoming the lingua franca for analyzing data via statistics, visualization, and predictive analytics. For enterprise-scale data, R users have three main concerns: scalability, performance, and production deployment. Oracle's R-based technologies - Oracle R Distribution, Oracle R Enterprise, Oracle R Connector for Hadoop, and the R package ROracle - address these concerns. In this talk, we introduce Oracle's R technologies, highlighting how each enables R users to achieve scalability and performance while making production deployment of R results a natural outcome of the data analyst/scientist efforts. The focus then turns to Oracle R Enterprise with code examples using the transparency layer and embedded R execution, targeting massive predictive modeling. One goal behind massive predictive modeling is to build models per entity, such as customers, zip codes, simulations, in an effort to understand behavior and tailor predictions at the entity level. Predictions...

  4. Altered long non-coding RNA expression profile in rabbit atria with atrial fibrillation: TCONS_00075467 modulates atrial electrical remodeling by sponging miR-328 to regulate CACNA1C.

    Science.gov (United States)

    Li, Zhan; Wang, Ximin; Wang, Weizong; Du, Juanjuan; Wei, Jinqiu; Zhang, Yong; Wang, Jiangrong; Hou, Yinglong

    2017-07-01

    Electrical remodeling has been reported to play a major role in the initiation and maintenance of atrial fibrillation (AF). Long non-coding RNAs (lncRNAs) have been increasingly recognized as contributors to the pathology of heart diseases. However, the roles and mechanisms of lncRNAs in electrical remodeling during AF remain unknown. In this study, the lncRNA expression profiles of right atria were investigated in AF and non-AF rabbit models by using RNA sequencing technique and validated using quantitative real-time polymerase chain reaction (qRT-PCR). A total of 99,843 putative new lncRNAs were identified, in which 1220 differentially expressed transcripts exhibited >2-fold change. Bioinformatics analysis was conducted to predict the functions and interactions of the aberrantly expressed genes. On the basis of a series of filtering pipelines, one lncRNA, TCONS_00075467, was selected to explore its effects and mechanisms on electrical remodeling. The atrial effective refractory period was shortened in vivo and the L-type calcium current and action potential duration were decreased in vitro by silencing of TCONS_00075467 with lentiviruses. Besides, the expression of miRNA-328 was negatively correlated with TCONS_00075467. We further demonstrated that TCONS_00075467 could sponge miRNA-328 in vitro and in vivo to regulate the downstream protein coding gene CACNA1C. In addition, miRNA-328 could partly reverse the effects of TCONS_00075467 on electrical remodeling. In summary, dysregulated lncRNAs may play important roles in modulating electrical remodeling during AF. Our study may facilitate the mechanism studies of lncRNAs in AF pathogenesis and provide potential therapeutic targets for AF. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    This essay studies the source code of an artwork from a software studies perspective. By examining code that come close to the approach of critical code studies (Marino, 2006), I trace the network artwork, Pupufu (Lin, 2009) to understand various real-time approaches to social media platforms (MSN......, Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...... to understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  6. Coding for optical channels

    CERN Document Server

    Djordjevic, Ivan; Vasic, Bane

    2010-01-01

    This unique book provides a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory and optical communication.

  7. SEVERO code - user's manual

    International Nuclear Information System (INIS)

    Sacramento, A.M. do.

    1989-01-01

    This user's manual contains all the necessary information concerning the use of SEVERO code. This computer code is related to the statistics of extremes = extreme winds, extreme precipitation and flooding hazard risk analysis. (A.C.A.S.)

  8. R cookbook

    National Research Council Canada - National Science Library

    Teetor, Paul; Loukides, Michael Kosta

    2011-01-01

    ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii 1. Getting Started and Getting Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Downloading and Installing R 2...

  9. R graphics

    CERN Document Server

    Murrell, Paul

    2005-01-01

    R is revolutionizing the world of statistical computing. Powerful, flexible, and best of all free, R is now the program of choice for tens of thousands of statisticians. Destined to become an instant classic, R Graphics presents the first complete, authoritative exposition on the R graphical system. Paul Murrell, widely known as the leading expert on R graphics, has developed an in-depth resource that takes nothing for granted and helps both neophyte and seasoned users master the intricacies of R graphics. After an introductory overview of R graphics facilities, the presentation first focuses

  10. Synthesizing Certified Code

    OpenAIRE

    Whalen, Michael; Schumann, Johann; Fischer, Bernd

    2002-01-01

    Code certification is a lightweight approach for formally demonstrating software quality. Its basic idea is to require code producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates that can be checked independently. Since code certification uses the same underlying technology as program verification, it requires detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding annotations to th...

  11. FERRET data analysis code

    International Nuclear Information System (INIS)

    Schmittroth, F.

    1979-09-01

    A documentation of the FERRET data analysis code is given. The code provides a way to combine related measurements and calculations in a consistent evaluation. Basically a very general least-squares code, it is oriented towards problems frequently encountered in nuclear data and reactor physics. A strong emphasis is on the proper treatment of uncertainties and correlations and in providing quantitative uncertainty estimates. Documentation includes a review of the method, structure of the code, input formats, and examples

  12. Stylize Aesthetic QR Code

    OpenAIRE

    Xu, Mingliang; Su, Hao; Li, Yafei; Li, Xi; Liao, Jing; Niu, Jianwei; Lv, Pei; Zhou, Bing

    2018-01-01

    With the continued proliferation of smart mobile devices, Quick Response (QR) code has become one of the most-used types of two-dimensional code in the world. Aiming at beautifying the appearance of QR codes, existing works have developed a series of techniques to make the QR code more visual-pleasant. However, these works still leave much to be desired, such as visual diversity, aesthetic quality, flexibility, universal property, and robustness. To address these issues, in this paper, we pro...

  13. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  14. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    doing formal coding and when doing more “traditional” conversation analysis research based on collections. We are more wary, however, of the implication that coding-based research is the end result of a process that starts with qualitative investigations and ends with categories that can be coded...

  15. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow...

  16. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  17. Software Certification - Coding, Code, and Coders

    Science.gov (United States)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  18. Performance measures for transform data coding.

    Science.gov (United States)

    Pearl, J.; Andrews, H. C.; Pratt, W. K.

    1972-01-01

    This paper develops performance criteria for evaluating transform data coding schemes under computational constraints. Computational constraints that conform with the proposed basis-restricted model give rise to suboptimal coding efficiency characterized by a rate-distortion relation R(D) similar in form to the theoretical rate-distortion function. Numerical examples of this performance measure are presented for Fourier, Walsh, Haar, and Karhunen-Loeve transforms.

  19. The network code

    International Nuclear Information System (INIS)

    1997-01-01

    The Network Code defines the rights and responsibilities of all users of the natural gas transportation system in the liberalised gas industry in the United Kingdom. This report describes the operation of the Code, what it means, how it works and its implications for the various participants in the industry. The topics covered are: development of the competitive gas market in the UK; key points in the Code; gas transportation charging; impact of the Code on producers upstream; impact on shippers; gas storage; supply point administration; impact of the Code on end users; the future. (20 tables; 33 figures) (UK)

  20. Coding for Electronic Mail

    Science.gov (United States)

    Rice, R. F.; Lee, J. J.

    1986-01-01

    Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.

  1. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  2. XSOR codes users manual

    International Nuclear Information System (INIS)

    Jow, Hong-Nian; Murfin, W.B.; Johnson, J.D.

    1993-11-01

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ''XSOR''. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms

  3. Explicit Constructions and Bounds for Batch Codes with Restricted Size of Reconstruction Sets

    OpenAIRE

    Thomas, Eldho K.; Skachek, Vitaly

    2017-01-01

    Linear batch codes and codes for private information retrieval (PIR) with a query size $t$ and a restricted size $r$ of the reconstruction sets are studied. New bounds on the parameters of such codes are derived for small values of $t$ or of $r$ by providing corresponding constructions. By building on the ideas of Cadambe and Mazumdar, a new bound in a recursive form is derived for batch codes and PIR codes.

  4. Reactor lattice codes

    International Nuclear Information System (INIS)

    Kulikowska, T.

    1999-01-01

    The present lecture has a main goal to show how the transport lattice calculations are realised in a standard computer code. This is illustrated on the example of the WIMSD code, belonging to the most popular tools for reactor calculations. Most of the approaches discussed here can be easily modified to any other lattice code. The description of the code assumes the basic knowledge of reactor lattice, on the level given in the lecture on 'Reactor lattice transport calculations'. For more advanced explanation of the WIMSD code the reader is directed to the detailed descriptions of the code cited in References. The discussion of the methods and models included in the code is followed by the generally used homogenisation procedure and several numerical examples of discrepancies in calculated multiplication factors based on different sources of library data. (author)

  5. DLLExternalCode

    Energy Technology Data Exchange (ETDEWEB)

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  6. Forms and Linear Network Codes

    DEFF Research Database (Denmark)

    Hansen, Johan P.

    We present a general theory to obtain linear network codes utilizing forms and obtain explicit families of equidimensional vector spaces, in which any pair of distinct vector spaces intersect in the same small dimension. The theory is inspired by the methods of the author utilizing the osculating...... spaces of Veronese varieties. Linear network coding transmits information in terms of a basis of a vector space and the information is received as a basis of a possibly altered vector space. Ralf Koetter and Frank R. Kschischang introduced a metric on the set af vector spaces and showed that a minimal...... distance decoder for this metric achieves correct decoding if the dimension of the intersection of the transmitted and received vector space is sufficiently large. The vector spaces in our construction are equidistant in the above metric and the distance between any pair of vector spaces is large making...

  7. Long non-coding RNA TUG1 inhibits apoptosis and inflammatory response in LPS-treated H9c2 cells by down-regulation of miR-29b.

    Science.gov (United States)

    Zhang, Haifang; Li, Hui; Ge, Ang; Guo, Enyu; Liu, Shuxia; Zhang, Lijuan

    2018-05-01

    Myocarditis is an important cause for cardiovascular morbidity and mortality in children and adults. The lncRNA taurine up-regulated gene 1 (TUG1) plays important roles in cell apoptosis and inflammation in tumor and liver injury. The present study aimed to investigate the role of TUG1 in LPS-injured H9c2 cells and explore the underlying molecular mechanism. H9c2 cells were stimulated with LPS to induce inflammatory injury. The expression of TUG1 was altered by transient transfections. Cell viability and apoptotic cell rates were detected by CCK-8 assay and flow cytometry assay, respectively. Inflammatory response was determined by detecting levels of inflammatory cytokines using qRT-PCR and ELISA. Furthermore, western blot analysis was conducted to assess the expression levels of core factors related with apoptosis and activations of NF-κB and JAK/STAT signaling pathways. LPS exposure reduced cell viability but enhanced cell apoptosis and inflammation in H9c2 cells. Moreover, TUG1 expression was down-regulated in LPS-injured H9c2 cells. TUG1 overexpression attenuated LPS-induced injuries in H9c2 cells, evidenced by augmented cell viability, declined apoptotic cell rates and decreased levels of pro-apoptotic factors and inflammatory cytokines. Inversely, TUG1 inhibition exerted the opposite effects. More importantly, TUG1 negatively modulated the expression of miR-29b and miR-29b mimic blocked the effect of TUG1 overexpression on cell viability, apoptosis, inflammation and inactivation of NF-κB and JAK/STAT signaling pathways in LPS-stimulated H9c2 cells. This study demonstrated that TUG1 played the anti-apoptotic and anti-inflammatory roles in LPS-injured H9c2 cells via down-regulating miR-29b and inhibiting NF-κB and JAK/STAT pathways. Copyright © 2018 Elsevier Masson SAS. All rights reserved.

  8. Beginning Data Science in R

    DEFF Research Database (Denmark)

    Mailund, Thomas

    in R details how data science is a combination of statistics, computational science, and machine learning. You’ll see how to efficiently structure and mine data to extract useful patterns and build mathematical models. This requires computational methods and programming, and R is an ideal programming...... language for this. This book is based on a number of lecture notes for classes the author has taught on data science and statistical programming using the R programming language. Modern data analysis requires computational skills and usually a minimum of programming. You will: Perform data science...... and analytics using statistics and the R programming language Visualize and explore data, including working with large data sets found in big data Build an R package Test and check your code Practice version control Profile and optimize your code...

  9. R Divakar

    Indian Academy of Sciences (India)

    Home; Journals; Bulletin of Materials Science. R Divakar. Articles written in Bulletin of Materials Science. Volume 36 Issue 7 December 2013 pp 1323-1329. Structural characterization of electrodeposited boron · Ashish Jain C Ghosh T R Ravindran S Anthonysamy R Divakar E Mohandas G S Gupta · More Details Abstract ...

  10. R Gnanamoorthy

    Indian Academy of Sciences (India)

    Home; Journals; Bulletin of Materials Science. R Gnanamoorthy. Articles written in Bulletin of Materials Science. Volume 25 Issue 2 April 2002 pp 109-114 Steels and Alloys. Fretting fatigue in AISI 1015 steel · R Gnanamoorthy R Rosi Reddy · More Details Abstract Fulltext PDF. A small osillatory movement between two ...

  11. An Optimal Linear Coding for Index Coding Problem

    OpenAIRE

    Pezeshkpour, Pouya

    2015-01-01

    An optimal linear coding solution for index coding problem is established. Instead of network coding approach by focus on graph theoric and algebraic methods a linear coding program for solving both unicast and groupcast index coding problem is presented. The coding is proved to be the optimal solution from the linear perspective and can be easily utilize for any number of messages. The importance of this work is lying mostly on the usage of the presented coding in the groupcast index coding ...

  12. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  13. Majorana fermion codes

    International Nuclear Information System (INIS)

    Bravyi, Sergey; Terhal, Barbara M; Leemhuis, Bernhard

    2010-01-01

    We initiate the study of Majorana fermion codes (MFCs). These codes can be viewed as extensions of Kitaev's one-dimensional (1D) model of unpaired Majorana fermions in quantum wires to higher spatial dimensions and interacting fermions. The purpose of MFCs is to protect quantum information against low-weight fermionic errors, that is, operators acting on sufficiently small subsets of fermionic modes. We examine to what extent MFCs can surpass qubit stabilizer codes in terms of their stability properties. A general construction of 2D MFCs is proposed that combines topological protection based on a macroscopic code distance with protection based on fermionic parity conservation. Finally, we use MFCs to show how to transform any qubit stabilizer code to a weakly self-dual CSS code.

  14. Theory of epigenetic coding.

    Science.gov (United States)

    Elder, D

    1984-06-07

    The logic of genetic control of development may be based on a binary epigenetic code. This paper revises the author's previous scheme dealing with the numerology of annelid metamerism in these terms. Certain features of the code had been deduced to be combinatorial, others not. This paradoxical contrast is resolved here by the interpretation that these features relate to different operations of the code; the combinatiorial to coding identity of units, the non-combinatorial to coding production of units. Consideration of a second paradox in the theory of epigenetic coding leads to a new solution which further provides a basis for epimorphic regeneration, and may in particular throw light on the "regeneration-duplication" phenomenon. A possible test of the model is also put forward.

  15. DISP1 code

    International Nuclear Information System (INIS)

    Vokac, P.

    1999-12-01

    DISP1 code is a simple tool for assessment of the dispersion of the fission product cloud escaping from a nuclear power plant after an accident. The code makes it possible to tentatively check the feasibility of calculations by more complex PSA3 codes and/or codes for real-time dispersion calculations. The number of input parameters is reasonably low and the user interface is simple enough to allow a rapid processing of sensitivity analyses. All input data entered through the user interface are stored in the text format. Implementation of dispersion model corrections taken from the ARCON96 code enables the DISP1 code to be employed for assessment of the radiation hazard within the NPP area, in the control room for instance. (P.A.)

  16. Phonological coding during reading.

    Science.gov (United States)

    Leinenger, Mallorie

    2014-11-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early [prelexical] or that phonological codes come online late [postlexical]) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eye-tracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model, Van Orden, 1987; dual-route model, e.g., M. Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001; parallel distributed processing model, Seidenberg & McClelland, 1989) are discussed. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  17. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  18. MORSE Monte Carlo code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described

  19. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  20. Tokamak Systems Code

    International Nuclear Information System (INIS)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged

  1. An Efficient Construction of Self-Dual Codes

    OpenAIRE

    Lee, Yoonjin; Kim, Jon-Lark

    2012-01-01

    We complete the building-up construction for self-dual codes by resolving the open cases over $GF(q)$ with $q \\equiv 3 \\pmod 4$, and over $\\Z_{p^m}$ and Galois rings $\\GR(p^m,r)$ with an odd prime $p$ satisfying $p \\equiv 3 \\pmod 4$ with $r$ odd. We also extend the building-up construction for self-dual codes to finite chain rings. Our building-up construction produces many new interesting self-dual codes. In particular, we construct 945 new extremal self-dual ternary $[32,16,9]$ codes, each ...

  2. Efficient Coding of Information: Huffman Coding -RE ...

    Indian Academy of Sciences (India)

    to a stream of equally-likely symbols so as to recover the original stream in the event of errors. The for- ... The source-coding problem is one of finding a mapping from U to a ... probability that the random variable X takes the value x written as ...

  3. NR-code: Nonlinear reconstruction code

    Science.gov (United States)

    Yu, Yu; Pen, Ue-Li; Zhu, Hong-Ming

    2018-04-01

    NR-code applies nonlinear reconstruction to the dark matter density field in redshift space and solves for the nonlinear mapping from the initial Lagrangian positions to the final redshift space positions; this reverses the large-scale bulk flows and improves the precision measurement of the baryon acoustic oscillations (BAO) scale.

  4. Code package to analyse behavior of the WWER fuel rods in normal operation: TOPRA's code

    International Nuclear Information System (INIS)

    Scheglov, A.; Proselkov, V.

    2001-01-01

    This paper briefly describes the code package intended for analysis of WWER fuel rod characteristics. The package includes two computer codes: TOPRA-1 and TOPRA-2 for full-scale fuel rod analyses; MRZ and MKK codes for analyzing the separate sections of fuel rods in r-z and r-j geometry. The TOPRA's codes are developed on the base of PIN-mod2 version and verified against experimental results obtained in MR, MIR and Halden research reactors (in the framework of SOFIT, FGR-2 and FUMEX experimental programs). Comparative analysis of calculation results and results from post-reactor examination of the WWER-440 and WWER-1000 fuel rod are also made as additional verification of these codes. To avoid the enlarging of uncertainties in fuel behavior prediction as a result of simplifying of the fuel geometry, MKK and MRZ codes are developed on the basis of the finite element method with use of the three nodal finite elements. Results obtained in the course of the code verification indicate the possibility for application of the method and TOPRA's code for simplified engineering calculations of WWER fuel rods thermal-physical parameters. An analysis of maximum relative errors for predicting of the fuel rod characteristics in the range of the accepted parameter values is also presented in the paper

  5. Desenvolvimento de métodos rápidos para determinação de Codeína, Diclofenaco e seus contra-íons por eletroforese capilar com detecção condutométrica sem contato (CE-C4D)

    OpenAIRE

    Cunha, Rafael Rodrigues

    2013-01-01

    Neste trabalho são apresentados novos procedimentos analíticos para determinação rápida (t < 1 min) de codeína (COD), diclofenaco (DCF) e seus contraíons sódio (Na), potássio (K), dietilamônio (DEA) e fosfato via eletroforese capilar com detecção condutométrica sem contato acoplada capacitivamente (CE-C4D). Os métodos propostos podem ser usados no controle de qualidade de matérias primas e de formulações farmacêuticas que possuam tais compostos em sua composição. Dois método...

  6. Balanced and sparse Tamo-Barg codes

    KAUST Repository

    Halbawi, Wael; Duursma, Iwan; Dau, Hoang; Hassibi, Babak

    2017-01-01

    We construct balanced and sparse generator matrices for Tamo and Barg's Locally Recoverable Codes (LRCs). More specifically, for a cyclic Tamo-Barg code of length n, dimension k and locality r, we show how to deterministically construct a generator matrix where the number of nonzeros in any two columns differs by at most one, and where the weight of every row is d + r - 1, where d is the minimum distance of the code. Since LRCs are designed mainly for distributed storage systems, the results presented in this work provide a computationally balanced and efficient encoding scheme for these codes. The balanced property ensures that the computational effort exerted by any storage node is essentially the same, whilst the sparse property ensures that this effort is minimal. The work presented in this paper extends a similar result previously established for Reed-Solomon (RS) codes, where it is now known that any cyclic RS code possesses a generator matrix that is balanced as described, but is sparsest, meaning that each row has d nonzeros.

  7. Balanced and sparse Tamo-Barg codes

    KAUST Repository

    Halbawi, Wael

    2017-08-29

    We construct balanced and sparse generator matrices for Tamo and Barg\\'s Locally Recoverable Codes (LRCs). More specifically, for a cyclic Tamo-Barg code of length n, dimension k and locality r, we show how to deterministically construct a generator matrix where the number of nonzeros in any two columns differs by at most one, and where the weight of every row is d + r - 1, where d is the minimum distance of the code. Since LRCs are designed mainly for distributed storage systems, the results presented in this work provide a computationally balanced and efficient encoding scheme for these codes. The balanced property ensures that the computational effort exerted by any storage node is essentially the same, whilst the sparse property ensures that this effort is minimal. The work presented in this paper extends a similar result previously established for Reed-Solomon (RS) codes, where it is now known that any cyclic RS code possesses a generator matrix that is balanced as described, but is sparsest, meaning that each row has d nonzeros.

  8. The article 583 bis of the Criminal Code: an illicit committed in the name of religion? - L’article n° 583 bis du Code Pénal : un acte illicite commis au nom de la réligion? - L’articolo 583 bis c.p. un illecito compiuto in nome della religione?

    Directory of Open Access Journals (Sweden)

    Colombo C.

    2009-08-01

    Full Text Available Mutilations of female genital organs are a particularly difficult issue. That is the reason why it occupies historical, anthropological and medico-legal research. So the present article considers the situation in all these aspects together with the provisions introduced by Law n. 7, 9/1/2006 and article 583 bis of the Criminal Code for the Protection of the rights of women being mutilated.Indeed we believe that the mutilations are real and cause personal psychic injury. The custom of mutilation has nothing to do with religious beliefs, but is the product of old social prejudices against women, as an individual.La MGF (mutilation génitale féminine est un sujet de société tristement actuel dont on dit qu'elle est pratiquée au nom des croyances religieuses les plus ancestrales.C’est la raison pour laquelle j’ai voulu avant tout consulter, bien que brièvement, l'analyse anthropologique, historique, médico-légale et juridique effectuée sur cet argument pour me pencher ensuite sur la loi italienne n° 7 du 9/1/2006 et sur l’article n° 583bis du Code Pénal Italien, ayant trait à la sauvegarde des droits inaliénables de la femme qui subit une mutilation.En effet les mutilations sont de véritables lésions physiques et souffrances psychiques qui plus que motivées par des croyances religieuses sont dictées par d'anciens us et coutumes combles de préjugés sociaux envers la femme en tant qu’individu.Le mutilazioni degli organi genitali femminili rappresentano un tema tristemente attuale legato per “comodità” alle credenze religiose più arcaiche.Per questo motivo, l’articolo ha voluto, da subito, volgere uno sguardo, seppur breve, all’analisi antropologica, storica e medico-giuridica dell’argomento per poi considerare la legge n. 7 del 9/1/2006 (che ha attuato i principi della Dichiarazione e del Programma della IV Conferenza mondiale dell’ONU sulle donne - Pechino 1995, nonché le disposizioni degli artt. 2,3,32 della

  9. Parallel R

    CERN Document Server

    McCallum, Ethan

    2011-01-01

    It's tough to argue with R as a high-quality, cross-platform, open source statistical software product-unless you're in the business of crunching Big Data. This concise book introduces you to several strategies for using R to analyze large datasets. You'll learn the basics of Snow, Multicore, Parallel, and some Hadoop-related tools, including how to find them, how to use them, when they work well, and when they don't. With these packages, you can overcome R's single-threaded nature by spreading work across multiple CPUs, or offloading work to multiple machines to address R's memory barrier.

  10. Synthesizing Certified Code

    Science.gov (United States)

    Whalen, Michael; Schumann, Johann; Fischer, Bernd

    2002-01-01

    Code certification is a lightweight approach to demonstrate software quality on a formal level. Its basic idea is to require producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates which can be checked independently. Since code certification uses the same underlying technology as program verification, it also requires many detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding theses annotations to the code is time-consuming and error-prone. We address this problem by combining code certification with automatic program synthesis. We propose an approach to generate simultaneously, from a high-level specification, code and all annotations required to certify generated code. Here, we describe a certification extension of AUTOBAYES, a synthesis tool which automatically generates complex data analysis programs from compact specifications. AUTOBAYES contains sufficient high-level domain knowledge to generate detailed annotations. This allows us to use a general-purpose verification condition generator to produce a set of proof obligations in first-order logic. The obligations are then discharged using the automated theorem E-SETHEO. We demonstrate our approach by certifying operator safety for a generated iterative data classification program without manual annotation of the code.

  11. Code of Ethics

    Science.gov (United States)

    Division for Early Childhood, Council for Exceptional Children, 2009

    2009-01-01

    The Code of Ethics of the Division for Early Childhood (DEC) of the Council for Exceptional Children is a public statement of principles and practice guidelines supported by the mission of DEC. The foundation of this Code is based on sound ethical reasoning related to professional practice with young children with disabilities and their families…

  12. Interleaved Product LDPC Codes

    OpenAIRE

    Baldi, Marco; Cancellieri, Giovanni; Chiaraluce, Franco

    2011-01-01

    Product LDPC codes take advantage of LDPC decoding algorithms and the high minimum distance of product codes. We propose to add suitable interleavers to improve the waterfall performance of LDPC decoding. Interleaving also reduces the number of low weight codewords, that gives a further advantage in the error floor region.

  13. Insurance billing and coding.

    Science.gov (United States)

    Napier, Rebecca H; Bruelheide, Lori S; Demann, Eric T K; Haug, Richard H

    2008-07-01

    The purpose of this article is to highlight the importance of understanding various numeric and alpha-numeric codes for accurately billing dental and medically related services to private pay or third-party insurance carriers. In the United States, common dental terminology (CDT) codes are most commonly used by dentists to submit claims, whereas current procedural terminology (CPT) and International Classification of Diseases, Ninth Revision, Clinical Modification (ICD.9.CM) codes are more commonly used by physicians to bill for their services. The CPT and ICD.9.CM coding systems complement each other in that CPT codes provide the procedure and service information and ICD.9.CM codes provide the reason or rationale for a particular procedure or service. These codes are more commonly used for "medical necessity" determinations, and general dentists and specialists who routinely perform care, including trauma-related care, biopsies, and dental treatment as a result of or in anticipation of a cancer-related treatment, are likely to use these codes. Claim submissions for care provided can be completed electronically or by means of paper forms.

  14. Error Correcting Codes

    Indian Academy of Sciences (India)

    Science and Automation at ... the Reed-Solomon code contained 223 bytes of data, (a byte ... then you have a data storage system with error correction, that ..... practical codes, storing such a table is infeasible, as it is generally too large.

  15. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Lene; Pries-Heje, Jan; Dalgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  16. RFQ simulation code

    International Nuclear Information System (INIS)

    Lysenko, W.P.

    1984-04-01

    We have developed the RFQLIB simulation system to provide a means to systematically generate the new versions of radio-frequency quadrupole (RFQ) linac simulation codes that are required by the constantly changing needs of a research environment. This integrated system simplifies keeping track of the various versions of the simulation code and makes it practical to maintain complete and up-to-date documentation. In this scheme, there is a certain standard version of the simulation code that forms a library upon which new versions are built. To generate a new version of the simulation code, the routines to be modified or added are appended to a standard command file, which contains the commands to compile the new routines and link them to the routines in the library. The library itself is rarely changed. Whenever the library is modified, however, this modification is seen by all versions of the simulation code, which actually exist as different versions of the command file. All code is written according to the rules of structured programming. Modularity is enforced by not using COMMON statements, simplifying the relation of the data flow to a hierarchy diagram. Simulation results are similar to those of the PARMTEQ code, as expected, because of the similar physical model. Different capabilities, such as those for generating beams matched in detail to the structure, are available in the new code for help in testing new ideas in designing RFQ linacs

  17. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 3. Error Correcting Codes - Reed Solomon Codes. Priti Shankar. Series Article Volume 2 Issue 3 March ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560 012, India ...

  18. 78 FR 18321 - International Code Council: The Update Process for the International Codes and Standards

    Science.gov (United States)

    2013-03-26

    ... Energy Conservation Code. International Existing Building Code. International Fire Code. International... Code. International Property Maintenance Code. International Residential Code. International Swimming Pool and Spa Code International Wildland-Urban Interface Code. International Zoning Code. ICC Standards...

  19. Validation of thermalhydraulic codes

    International Nuclear Information System (INIS)

    Wilkie, D.

    1992-01-01

    Thermalhydraulic codes require to be validated against experimental data collected over a wide range of situations if they are to be relied upon. A good example is provided by the nuclear industry where codes are used for safety studies and for determining operating conditions. Errors in the codes could lead to financial penalties, to the incorrect estimation of the consequences of accidents and even to the accidents themselves. Comparison between prediction and experiment is often described qualitatively or in approximate terms, e.g. ''agreement is within 10%''. A quantitative method is preferable, especially when several competing codes are available. The codes can then be ranked in order of merit. Such a method is described. (Author)

  20. Fracture flow code

    International Nuclear Information System (INIS)

    Dershowitz, W; Herbert, A.; Long, J.

    1989-03-01

    The hydrology of the SCV site will be modelled utilizing discrete fracture flow models. These models are complex, and can not be fully cerified by comparison to analytical solutions. The best approach for verification of these codes is therefore cross-verification between different codes. This is complicated by the variation in assumptions and solution techniques utilized in different codes. Cross-verification procedures are defined which allow comparison of the codes developed by Harwell Laboratory, Lawrence Berkeley Laboratory, and Golder Associates Inc. Six cross-verification datasets are defined for deterministic and stochastic verification of geometric and flow features of the codes. Additional datasets for verification of transport features will be documented in a future report. (13 figs., 7 tabs., 10 refs.) (authors)

  1. Huffman coding in advanced audio coding standard

    Science.gov (United States)

    Brzuchalski, Grzegorz

    2012-05-01

    This article presents several hardware architectures of Advanced Audio Coding (AAC) Huffman noiseless encoder, its optimisations and working implementation. Much attention has been paid to optimise the demand of hardware resources especially memory size. The aim of design was to get as short binary stream as possible in this standard. The Huffman encoder with whole audio-video system has been implemented in FPGA devices.

  2. R Ramanujam

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education. R Ramanujam. Articles written in Resonance – Journal of Science Education. Volume 6 Issue 7 July 2001 pp 97-98 Book Review. Forever Undecided: A Puzzle Guide to Gödel · R Ramanujam · More Details Fulltext PDF ...

  3. R Velusamy

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education. R Velusamy. Articles written in Resonance – Journal of Science Education. Volume 12 Issue 12 December 2007 pp 12-24 General Article. Mayer-Jensen Shell Model and Magic Numbers - An Independent Nucleon Model with Spin-Orbit Coupling · R Velusamy.

  4. R Jayaraman

    Indian Academy of Sciences (India)

    More Details Fulltext PDF. Volume 13 Issue 10 October 2008 pp 898-908 General Article. Seymour Benzer and T4 rII - Running the Map into the Ground · R Jayaraman · More Details Fulltext PDF. Volume 15 Issue 12 December 2010 pp 1084-1096 General Article. Jacques Monod and the Advent of the Age of Operons.

  5. R Ramaswamy

    Indian Academy of Sciences (India)

    More Details Fulltext PDF. Volume 19 Issue 1 January 2014 pp 1-2 General Editorial. General Editorial on Publication Ethics · R Ramaswamy · More Details Fulltext PDF. Volume 20 Issue 2 February 2015 pp 91-92. General Editorial on Publication Ethics · R Ramaswamy Rajaram Nityananda · More Details Fulltext PDF ...

  6. R Sridharan

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education. R Sridharan. Articles written in Resonance – Journal of Science Education. Volume 1 Issue 6 June 1996 pp 90-93 Book Review. Non European Roots of Mathematics - Setting the Record Straight · R Sridharan · More Details Fulltext PDF. Volume 4 Issue 8 August ...

  7. R Thangadurai

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education. R Thangadurai. Articles written in Resonance – Journal of Science Education. Volume 17 Issue 9 September 2012 pp 855-883 General Article. S Chowla and S S Pillai - The Story of Two Peerless Indian Mathematicians · B Sury R Thangadurai · More Details ...

  8. R Sarvanakumar

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education. R Sarvanakumar. Articles written in Resonance – Journal of Science Education. Volume 12 Issue 11 November 2007 pp 77-86 Feature Article. Molecule Matters - Metal Organic Frameworks (MOFs) · R Sarvanakumar S Sankararaman · More Details Fulltext PDF ...

  9. An analytical demonstration of coupling schemes between magnetohydrodynamic codes and eddy current codes

    International Nuclear Information System (INIS)

    Liu Yueqiang; Albanese, R.; Rubinacci, G.; Portone, A.; Villone, F.

    2008-01-01

    In order to model a magnetohydrodynamic (MHD) instability that strongly couples to external conducting structures (walls and/or coils) in a fusion device, it is often necessary to combine a MHD code solving for the plasma response, with an eddy current code computing the fields and currents of conductors. We present a rigorous proof of the coupling schemes between these two types of codes. One of the coupling schemes has been introduced and implemented in the CARMA code [R. Albanese, Y. Q. Liu, A. Portone, G. Rubinacci, and F. Villone, IEEE Trans. Magn. 44, 1654 (2008); A. Portone, F. Villone, Y. Q. Liu, R. Albanese, and G. Rubinacci, Plasma Phys. Controlled Fusion 50, 085004 (2008)] that couples the MHD code MARS-F[Y. Q. Liu, A. Bondeson, C. M. Fransson, B. Lennartson, and C. Breitholtz, Phys. Plasmas 7, 3681 (2000)] and the eddy current code CARIDDI[R. Albanese and G. Rubinacci, Adv. Imaging Electron Phys. 102, 1 (1998)]. While the coupling schemes are described for a general toroidal geometry, we give the analytical proof for a cylindrical plasma.

  10. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  11. Report number codes

    International Nuclear Information System (INIS)

    Nelson, R.N.

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name

  12. Construction of Short-length High-rates Ldpc Codes Using Difference Families

    OpenAIRE

    Deny Hamdani; Ery Safrianti

    2007-01-01

    Low-density parity-check (LDPC) code is linear-block error-correcting code defined by sparse parity-check matrix. It isdecoded using the massage-passing algorithm, and in many cases, capable of outperforming turbo code. This paperpresents a class of low-density parity-check (LDPC) codes showing good performance with low encoding complexity.The code is constructed using difference families from combinatorial design. The resulting code, which is designed tohave short code length and high code r...

  13. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  14. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  15. Transport theory and codes

    International Nuclear Information System (INIS)

    Clancy, B.E.

    1986-01-01

    This chapter begins with a neutron transport equation which includes the one dimensional plane geometry problems, the one dimensional spherical geometry problems, and numerical solutions. The section on the ANISN code and its look-alikes covers problems which can be solved; eigenvalue problems; outer iteration loop; inner iteration loop; and finite difference solution procedures. The input and output data for ANISN is also discussed. Two dimensional problems such as the DOT code are given. Finally, an overview of the Monte-Carlo methods and codes are elaborated on

  16. Gravity inversion code

    International Nuclear Information System (INIS)

    Burkhard, N.R.

    1979-01-01

    The gravity inversion code applies stabilized linear inverse theory to determine the topography of a subsurface density anomaly from Bouguer gravity data. The gravity inversion program consists of four source codes: SEARCH, TREND, INVERT, and AVERAGE. TREND and INVERT are used iteratively to converge on a solution. SEARCH forms the input gravity data files for Nevada Test Site data. AVERAGE performs a covariance analysis on the solution. This document describes the necessary input files and the proper operation of the code. 2 figures, 2 tables

  17. L’Application des Codes de Costas et des Codes a Congruences Quadratiques a la Compression d’Impulsion Numerique (The Application of Cost, Codes and Quadratic Congruence Codes to the Compression of Numeric Impulsion)

    Science.gov (United States)

    1991-12-01

    de produire des diagrammes d’ambigult& en forme de punaise avec de faibles lobes...particularit& de produire des diagrammes d’ambiguiLt6 en forme de punaise tout en ayant de faibles lobes secondaires. Ce rapport traite des diff6rentes m6thodes...les codes de Costas, les r~sultats obtenus mantrent que les codes de Golomb of frent de mains bonnes possibi- lit ~s que les codes de Welch pour

  18. MIFT: GIFT Combinatorial Geometry Input to VCS Code

    Science.gov (United States)

    1977-03-01

    r-w w-^ H ^ß0318is CQ BRL °RCUMr REPORT NO. 1967 —-S: ... MIFT: GIFT COMBINATORIAL GEOMETRY INPUT TO VCS CODE Albert E...TITLE (and Subtitle) MIFT: GIFT Combinatorial Geometry Input to VCS Code S. TYPE OF REPORT & PERIOD COVERED FINAL 6. PERFORMING ORG. REPORT NUMBER...Vehicle Code System (VCS) called MORSE was modified to accept the GIFT combinatorial geometry package. GIFT , as opposed to the geometry package

  19. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  20. Supervised Convolutional Sparse Coding

    KAUST Repository

    Affara, Lama Ahmed; Ghanem, Bernard; Wonka, Peter

    2018-01-01

    coding, which aims at learning discriminative dictionaries instead of purely reconstructive ones. We incorporate a supervised regularization term into the traditional unsupervised CSC objective to encourage the final dictionary elements

  1. SASSYS LMFBR systems code

    International Nuclear Information System (INIS)

    Dunn, F.E.; Prohammer, F.G.; Weber, D.P.

    1983-01-01

    The SASSYS LMFBR systems analysis code is being developed mainly to analyze the behavior of the shut-down heat-removal system and the consequences of failures in the system, although it is also capable of analyzing a wide range of transients, from mild operational transients through more severe transients leading to sodium boiling in the core and possible melting of clad and fuel. The code includes a detailed SAS4A multi-channel core treatment plus a general thermal-hydraulic treatment of the primary and intermediate heat-transport loops and the steam generators. The code can handle any LMFBR design, loop or pool, with an arbitrary arrangement of components. The code is fast running: usually faster than real time

  2. OCA Code Enforcement

    Data.gov (United States)

    Montgomery County of Maryland — The Office of the County Attorney (OCA) processes Code Violation Citations issued by County agencies. The citations can be viewed by issued department, issued date...

  3. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  4. Code Disentanglement: Initial Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wohlbier, John Greaton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kelley, Timothy M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rockefeller, Gabriel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Calef, Matthew Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  5. Induction technology optimization code

    International Nuclear Information System (INIS)

    Caporaso, G.J.; Brooks, A.L.; Kirbie, H.C.

    1992-01-01

    A code has been developed to evaluate relative costs of induction accelerator driver systems for relativistic klystrons. The code incorporates beam generation, transport and pulsed power system constraints to provide an integrated design tool. The code generates an injector/accelerator combination which satisfies the top level requirements and all system constraints once a small number of design choices have been specified (rise time of the injector voltage and aspect ratio of the ferrite induction cores, for example). The code calculates dimensions of accelerator mechanical assemblies and values of all electrical components. Cost factors for machined parts, raw materials and components are applied to yield a total system cost. These costs are then plotted as a function of the two design choices to enable selection of an optimum design based on various criteria. (Author) 11 refs., 3 figs

  6. VT ZIP Code Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) A ZIP Code Tabulation Area (ZCTA) is a statistical geographic entity that approximates the delivery area for a U.S. Postal Service five-digit...

  7. Bandwidth efficient coding

    CERN Document Server

    Anderson, John B

    2017-01-01

    Bandwidth Efficient Coding addresses the major challenge in communication engineering today: how to communicate more bits of information in the same radio spectrum. Energy and bandwidth are needed to transmit bits, and bandwidth affects capacity the most. Methods have been developed that are ten times as energy efficient at a given bandwidth consumption as simple methods. These employ signals with very complex patterns and are called "coding" solutions. The book begins with classical theory before introducing new techniques that combine older methods of error correction coding and radio transmission in order to create narrowband methods that are as efficient in both spectrum and energy as nature allows. Other topics covered include modulation techniques such as CPM, coded QAM and pulse design.

  8. Reactor lattice codes

    International Nuclear Information System (INIS)

    Kulikowska, T.

    2001-01-01

    The description of reactor lattice codes is carried out on the example of the WIMSD-5B code. The WIMS code in its various version is the most recognised lattice code. It is used in all parts of the world for calculations of research and power reactors. The version WIMSD-5B is distributed free of charge by NEA Data Bank. The description of its main features given in the present lecture follows the aspects defined previously for lattice calculations in the lecture on Reactor Lattice Transport Calculations. The spatial models are described, and the approach to the energy treatment is given. Finally the specific algorithm applied in fuel depletion calculations is outlined. (author)

  9. Critical Care Coding for Neurologists.

    Science.gov (United States)

    Nuwer, Marc R; Vespa, Paul M

    2015-10-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  10. Lattice Index Coding

    OpenAIRE

    Natarajan, Lakshmi; Hong, Yi; Viterbo, Emanuele

    2014-01-01

    The index coding problem involves a sender with K messages to be transmitted across a broadcast channel, and a set of receivers each of which demands a subset of the K messages while having prior knowledge of a different subset as side information. We consider the specific case of noisy index coding where the broadcast channel is Gaussian and every receiver demands all the messages from the source. Instances of this communication problem arise in wireless relay networks, sensor networks, and ...

  11. Towards advanced code simulators

    International Nuclear Information System (INIS)

    Scriven, A.H.

    1990-01-01

    The Central Electricity Generating Board (CEGB) uses advanced thermohydraulic codes extensively to support PWR safety analyses. A system has been developed to allow fully interactive execution of any code with graphical simulation of the operator desk and mimic display. The system operates in a virtual machine environment, with the thermohydraulic code executing in one virtual machine, communicating via interrupts with any number of other virtual machines each running other programs and graphics drivers. The driver code itself does not have to be modified from its normal batch form. Shortly following the release of RELAP5 MOD1 in IBM compatible form in 1983, this code was used as the driver for this system. When RELAP5 MOD2 became available, it was adopted with no changes needed in the basic system. Overall the system has been used for some 5 years for the analysis of LOBI tests, full scale plant studies and for simple what-if studies. For gaining rapid understanding of system dependencies it has proved invaluable. The graphical mimic system, being independent of the driver code, has also been used with other codes to study core rewetting, to replay results obtained from batch jobs on a CRAY2 computer system and to display suitably processed experimental results from the LOBI facility to aid interpretation. For the above work real-time execution was not necessary. Current work now centers on implementing the RELAP 5 code on a true parallel architecture machine. Marconi Simulation have been contracted to investigate the feasibility of using upwards of 100 processors, each capable of a peak of 30 MIPS to run a highly detailed RELAP5 model in real time, complete with specially written 3D core neutronics and balance of plant models. This paper describes the experience of using RELAP5 as an analyzer/simulator, and outlines the proposed methods and problems associated with parallel execution of RELAP5

  12. Cracking the Gender Codes

    DEFF Research Database (Denmark)

    Rennison, Betina Wolfgang

    2016-01-01

    extensive work to raise the proportion of women. This has helped slightly, but women remain underrepresented at the corporate top. Why is this so? What can be done to solve it? This article presents five different types of answers relating to five discursive codes: nature, talent, business, exclusion...... in leadership management, we must become more aware and take advantage of this complexity. We must crack the codes in order to crack the curve....

  13. PEAR code review

    International Nuclear Information System (INIS)

    De Wit, R.; Jamieson, T.; Lord, M.; Lafortune, J.F.

    1997-07-01

    As a necessary component in the continuous improvement and refinement of methodologies employed in the nuclear industry, regulatory agencies need to periodically evaluate these processes to improve confidence in results and ensure appropriate levels of safety are being achieved. The independent and objective review of industry-standard computer codes forms an essential part of this program. To this end, this work undertakes an in-depth review of the computer code PEAR (Public Exposures from Accidental Releases), developed by Atomic Energy of Canada Limited (AECL) to assess accidental releases from CANDU reactors. PEAR is based largely on the models contained in the Canadian Standards Association (CSA) N288.2-M91. This report presents the results of a detailed technical review of the PEAR code to identify any variations from the CSA standard and other supporting documentation, verify the source code, assess the quality of numerical models and results, and identify general strengths and weaknesses of the code. The version of the code employed in this review is the one which AECL intends to use for CANDU 9 safety analyses. (author)

  14. KENO-V code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The KENO-V code is the current release of the Oak Ridge multigroup Monte Carlo criticality code development. The original KENO, with 16 group Hansen-Roach cross sections and P 1 scattering, was one ot the first multigroup Monte Carlo codes and it and its successors have always been a much-used research tool for criticality studies. KENO-V is able to accept large neutron cross section libraries (a 218 group set is distributed with the code) and has a general P/sub N/ scattering capability. A supergroup feature allows execution of large problems on small computers, but at the expense of increased calculation time and system input/output operations. This supergroup feature is activated automatically by the code in a manner which utilizes as much computer memory as is available. The primary purpose of KENO-V is to calculate the system k/sub eff/, from small bare critical assemblies to large reflected arrays of differing fissile and moderator elements. In this respect KENO-V neither has nor requires the many options and sophisticated biasing techniques of general Monte Carlo codes

  15. Code, standard and specifications

    International Nuclear Information System (INIS)

    Abdul Nassir Ibrahim; Azali Muhammad; Ab. Razak Hamzah; Abd. Aziz Mohamed; Mohamad Pauzi Ismail

    2008-01-01

    Radiography also same as the other technique, it need standard. This standard was used widely and method of used it also regular. With that, radiography testing only practical based on regulations as mentioned and documented. These regulation or guideline documented in code, standard and specifications. In Malaysia, level one and basic radiographer can do radiography work based on instruction give by level two or three radiographer. This instruction was produced based on guideline that mention in document. Level two must follow the specifications mentioned in standard when write the instruction. From this scenario, it makes clearly that this radiography work is a type of work that everything must follow the rule. For the code, the radiography follow the code of American Society for Mechanical Engineer (ASME) and the only code that have in Malaysia for this time is rule that published by Atomic Energy Licensing Board (AELB) known as Practical code for radiation Protection in Industrial radiography. With the existence of this code, all the radiography must follow the rule or standard regulated automatically.

  16. Turbo Pascal Computer Code for PIXE Analysis

    International Nuclear Information System (INIS)

    Darsono

    2002-01-01

    To optimal utilization of the 150 kV ion accelerator facilities and to govern the analysis technique using ion accelerator, the research and development of low energy PIXE technology has been done. The R and D for hardware of the low energy PIXE installation in P3TM have been carried on since year 2000. To support the R and D of PIXE accelerator facilities in harmonize with the R and D of the PIXE hardware, the development of PIXE software for analysis is also needed. The development of database of PIXE software for analysis using turbo Pascal computer code is reported in this paper. This computer code computes the ionization cross-section, the fluorescence yield, and the stopping power of elements also it computes the coefficient attenuation of X- rays energy. The computer code is named PIXEDASIS and it is part of big computer code planed for PIXE analysis that will be constructed in the near future. PIXEDASIS is designed to be communicative with the user. It has the input from the keyboard. The output shows in the PC monitor, which also can be printed. The performance test of the PIXEDASIS shows that it can be operated well and it can provide data agreement with data form other literatures. (author)

  17. Fast Coding Unit Encoding Mechanism for Low Complexity Video Coding

    OpenAIRE

    Gao, Yuan; Liu, Pengyu; Wu, Yueying; Jia, Kebin; Gao, Guandong

    2016-01-01

    In high efficiency video coding (HEVC), coding tree contributes to excellent compression performance. However, coding tree brings extremely high computational complexity. Innovative works for improving coding tree to further reduce encoding time are stated in this paper. A novel low complexity coding tree mechanism is proposed for HEVC fast coding unit (CU) encoding. Firstly, this paper makes an in-depth study of the relationship among CU distribution, quantization parameter (QP) and content ...

  18. Fast convolutional sparse coding using matrix inversion lemma

    Czech Academy of Sciences Publication Activity Database

    Šorel, Michal; Šroubek, Filip

    2016-01-01

    Roč. 55, č. 1 (2016), s. 44-51 ISSN 1051-2004 R&D Projects: GA ČR GA13-29225S Institutional support: RVO:67985556 Keywords : Convolutional sparse coding * Feature learning * Deconvolution networks * Shift-invariant sparse coding Subject RIV: JD - Computer Applications, Robotics Impact factor: 2.337, year: 2016 http://library.utia.cas.cz/separaty/2016/ZOI/sorel-0459332.pdf

  19. Linear tree codes and the problem of explicit constructions

    Czech Academy of Sciences Publication Activity Database

    Pudlák, Pavel

    2016-01-01

    Roč. 490, February 1 (2016), s. 124-144 ISSN 0024-3795 R&D Projects: GA ČR GBP202/12/G061 Institutional support: RVO:67985840 Keywords : tree code * error correcting code * triangular totally nonsingular matrix Subject RIV: BA - General Mathematics Impact factor: 0.973, year: 2016 http://www.sciencedirect.com/science/article/pii/S002437951500645X

  20. CFD codes and the Onsager relations

    International Nuclear Information System (INIS)

    Makai, M.

    2008-01-01

    In the last decade, papers appeared in the literature discussing a shortcoming of the basic equations of hydrodynamics: the Navier-Stokes equations do not meet the Onsager symmetry relations. Recently R. Streater wrote about the topic. The basic problem is that the solution to the Boltzmann equation f(r,v,t) depends on seven variable, nevertheless the solution of the Navier-Stokes equation yields T(r,t),v(r,t) and ?(r,t)-the temperature, velocity and density distribution, altogether ?ve functions. Clearly, the solution class of the Boltzmann equation is a broader class than the solution class of the Navier-Stokes equation. What is the importance of that question? Are the results of CFD codes questionable ones or, the contradiction can be resolved by some ignored terms of second order? (Author)

  1. Research on Primary Shielding Calculation Source Generation Codes

    Science.gov (United States)

    Zheng, Zheng; Mei, Qiliang; Li, Hui; Shangguan, Danhua; Zhang, Guangchun

    2017-09-01

    Primary Shielding Calculation (PSC) plays an important role in reactor shielding design and analysis. In order to facilitate PSC, a source generation code is developed to generate cumulative distribution functions (CDF) for the source particle sample code of the J Monte Carlo Transport (JMCT) code, and a source particle sample code is deveoped to sample source particle directions, types, coordinates, energy and weights from the CDFs. A source generation code is developed to transform three dimensional (3D) power distributions in xyz geometry to source distributions in r θ z geometry for the J Discrete Ordinate Transport (JSNT) code. Validation on PSC model of Qinshan No.1 nuclear power plant (NPP), CAP1400 and CAP1700 reactors are performed. Numerical results show that the theoretical model and the codes are both correct.

  2. VizieR Online Data Catalog: FADO code (Gomes+, 2017)

    Science.gov (United States)

    Gomes, J. M.; Papaderos, P.

    2017-03-01

    FADO comes from the Latin word "fatum" that means fate or destiny. It is also a well known genre of Portuguese music, and by choosing this acronym for this spectral synthesis tool we would like to pay tribute to Portugal. The main goal of FADO is to explore the star-formation and chemical enrichment history (the "Fado") of galaxies based on two hitherto unique elements in spectral fitting models: a) self-consistency between the best-fitting star formation history (SFH) and the nebular characteristics of a galaxy (e.g., hydrogen Balmer-line luminosities and equivalent widths; shape of the nebular continuum, including the Balmer and Paschen discontinuity) and b) genetic optimization and artificial intelligence algorithms. This document is part of the FADO v.1 distribution package, which contains two different ascii files, ReadMe and Read_F, and one tarball archive FADOv1.tar.gz. FADOv1.tar.gz contains the binary (executable) compiled in both OpenSuSE 13.2 64bit LINUX (FADO) and MAC OS X (FADO_MACOSX). The former is compatible with most LINUX distributions, while the latter was only tested for Yosemite 10.10.3. It contains the configuration files for running FADO: FADO.config and PLOT.config, as well as the "Simple Stellar Population" (SSP) base library with the base file list Base.BC03.L, the FADO v.1 short manual Read_F and this file (in the ReadMe directory) and, for testing purposes, three characteristic de-redshifted spectra from SDSS-DR7 in ascii format, corresponding to a star-forming (spec1.txt), composite (spec2.txt) and LINER (spec3.txt) galaxy. Auxiliary files needed for execution of FADO (.HIfboundem.ascii, .HeIIfbound.ascii, .HeIfboundem.ascii, grfont.dat and grfont.txt) are also included in the tarball. By decompressing the tarball the following six directories are created: input, output, plots, ReadMe, SSPs and tables (see below for a brief explanation). (2 data files).

  3. IFR code for secondary particle dynamics

    International Nuclear Information System (INIS)

    Teague, M.R.; Yu, S.S.

    1985-01-01

    A numerical simulation has been constructed to obtain a detailed, quantitative estimate of the electromagnetic fields and currents existing in the Advanced Test Accelerator under conditions of laser guiding. The code treats the secondary electrons by particle simulation and the beam dynamics by a time-dependent envelope model. The simulation gives a fully relativistic description of secondary electrons moving in self-consistent electromagnetic fields. The calculations are made using coordinates t, x, y, z for the electrons and t, ct-z, r for the axisymmetric electromagnetic fields and currents. Code results, showing in particular current enhancement effects, will be given

  4. Skew cyclic codes over F_q+uF_q+vF_q+uvF_q

    Directory of Open Access Journals (Sweden)

    Ting Yao

    2015-09-01

    Full Text Available In this paper, we study skew cyclic codes over the ring $R=F_q+uF_q+vF_q+uvF_q$, where $u^{2}=u,v^{2}=v,uv=vu$, $q=p^{m}$ and $p$ is an odd prime. We investigate the structural properties of skew cyclic codes over $R$ through a decomposition theorem. Furthermore, we give a formula for the number of skew cyclic codes of length $n$ over $R.$

  5. At R407/R408

    CERN Multimedia

    1974-01-01

    R407/R408 were experiments designed by the CERN-Collège de France-Heidelberg-Karlsruhe Collaboration to study two-particle correlations in the fragmentation region requiring a large transverse momentum particle in the forward direction. Atmospheric pressure Cerenkov counters were part of the additional equipment set up during 1974 at the SFM facility. Here Paul Hanke multi-reflected on Cerenkov mirrors.

  6. State of art in FE-based fuel performance codes

    International Nuclear Information System (INIS)

    Kim, Hyo Chan; Yang, Yong Sik; Kim, Dae Ho; Bang, Je Geon; Kim, Sun Ki; Koo, Yang Hyun

    2013-01-01

    Fuel performance codes approximate this complex behavior using an axisymmetric, axially-stacked, one-dimensional radial representation to save computation cost. However, the need for improved modeling of PCMI and, particularly, the importance of multidimensional capability for accurate fuel performance simulation has been identified as safety margin decreases. Finite element (FE) method that is reliable and proven solution in mechanical field has been introduced into fuel performance codes for multidimensional analysis. The present state of the art in numerical simulation of FE-based fuel performance predominantly involves 2-D axisymmetric model and 3-D volumetric model. The FRAPCON and FRAPTRAN own 1.5-D and 2-D FE model to simulate PCMI and cladding ballooning. In 2-D simulation, the FALCON code, developed by EPRI, is a 2-D (R-Z and R-θ) fully thermal-mechanically coupled steady-state and transient FE-based fuel behavior code. The French codes TOUTATIS and ALCYONE which are 3-D, and typically used to investigate localized behavior. In 2008, the Idaho National Laboratory (INL) has been developing multidimensional (2-D and 3-D) nuclear fuel performance code called BISON. In this paper, the current state of FE-based fuel performance code and their models are presented. Based on investigation into the codes, requirements and direction of development for new FE-based fuel performance code can be discussed. Based on comparison of models in FE-based fuel performance code, status of art in the codes can be discussed. A new FE-based fuel performance code should include typical pellet and cladding models which all codes own. In particular, specified pellet and cladding model such as gaseous swelling and high burnup structure (HBS) model should be developed to improve accuracy of code as well as consider AC condition. To reduce computation cost, the approximated gap and the optimized contact model should be also developed

  7. SPECTRAL AMPLITUDE CODING OCDMA SYSTEMS USING ENHANCED DOUBLE WEIGHT CODE

    Directory of Open Access Journals (Sweden)

    F.N. HASOON

    2006-12-01

    Full Text Available A new code structure for spectral amplitude coding optical code division multiple access systems based on double weight (DW code families is proposed. The DW has a fixed weight of two. Enhanced double-weight (EDW code is another variation of a DW code family that can has a variable weight greater than one. The EDW code possesses ideal cross-correlation properties and exists for every natural number n. A much better performance can be provided by using the EDW code compared to the existing code such as Hadamard and Modified Frequency-Hopping (MFH codes. It has been observed that theoretical analysis and simulation for EDW is much better performance compared to Hadamard and Modified Frequency-Hopping (MFH codes.

  8. Nuclear code abstracts (1975 edition)

    International Nuclear Information System (INIS)

    Akanuma, Makoto; Hirakawa, Takashi

    1976-02-01

    Nuclear Code Abstracts is compiled in the Nuclear Code Committee to exchange information of the nuclear code developments among members of the committee. Enlarging the collection, the present one includes nuclear code abstracts obtained in 1975 through liaison officers of the organizations in Japan participating in the Nuclear Energy Agency's Computer Program Library at Ispra, Italy. The classification of nuclear codes and the format of code abstracts are the same as those in the library. (auth.)

  9. Some new ternary linear codes

    Directory of Open Access Journals (Sweden)

    Rumen Daskalov

    2017-07-01

    Full Text Available Let an $[n,k,d]_q$ code be a linear code of length $n$, dimension $k$ and minimum Hamming distance $d$ over $GF(q$. One of the most important problems in coding theory is to construct codes with optimal minimum distances. In this paper 22 new ternary linear codes are presented. Two of them are optimal. All new codes improve the respective lower bounds in [11].

  10. ACE - Manufacturer Identification Code (MID)

    Data.gov (United States)

    Department of Homeland Security — The ACE Manufacturer Identification Code (MID) application is used to track and control identifications codes for manufacturers. A manufacturer is identified on an...

  11. Algebraic and stochastic coding theory

    CERN Document Server

    Kythe, Dave K

    2012-01-01

    Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.

  12. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  13. Adaptive distributed source coding.

    Science.gov (United States)

    Varodayan, David; Lin, Yao-Chung; Girod, Bernd

    2012-05-01

    We consider distributed source coding in the presence of hidden variables that parameterize the statistical dependence among sources. We derive the Slepian-Wolf bound and devise coding algorithms for a block-candidate model of this problem. The encoder sends, in addition to syndrome bits, a portion of the source to the decoder uncoded as doping bits. The decoder uses the sum-product algorithm to simultaneously recover the source symbols and the hidden statistical dependence variables. We also develop novel techniques based on density evolution (DE) to analyze the coding algorithms. We experimentally confirm that our DE analysis closely approximates practical performance. This result allows us to efficiently optimize parameters of the algorithms. In particular, we show that the system performs close to the Slepian-Wolf bound when an appropriate doping rate is selected. We then apply our coding and analysis techniques to a reduced-reference video quality monitoring system and show a bit rate saving of about 75% compared with fixed-length coding.

  14. Speech coding code- excited linear prediction

    CERN Document Server

    Bäckström, Tom

    2017-01-01

    This book provides scientific understanding of the most central techniques used in speech coding both for advanced students as well as professionals with a background in speech audio and or digital signal processing. It provides a clear connection between the whys hows and whats thus enabling a clear view of the necessity purpose and solutions provided by various tools as well as their strengths and weaknesses in each respect Equivalently this book sheds light on the following perspectives for each technology presented Objective What do we want to achieve and especially why is this goal important Resource Information What information is available and how can it be useful and Resource Platform What kind of platforms are we working with and what are their capabilities restrictions This includes computational memory and acoustic properties and the transmission capacity of devices used. The book goes on to address Solutions Which solutions have been proposed and how can they be used to reach the stated goals and ...

  15. Political analysis using R

    CERN Document Server

    Monogan III, James E

    2015-01-01

    Political Analysis Using R can serve as a textbook for undergraduate or graduate students as well as a manual for independent researchers. It is unique among competitor books in its usage of 21 example datasets that are all drawn from political research. All of the data and example code is available from the Springer website, as well as from Dataverse (http://dx.doi.org/10.7910/DVN/ARKOTI). The book provides a narrative of how R can be useful for addressing problems common to the analysis of public administration, public policy, and political science data specifically, in addition to the social sciences more broadly. While the book uses data drawn from political science, public administration, and policy analyses, it is written so that students and researchers in other fields should find it accessible and useful as well. Political Analysis Using R is perfect for the first-time R user who has no prior knowledge about the program. By working through the first seven chapters of this book, an entry-level user sho...

  16. Spatially coded backscatter radiography

    International Nuclear Information System (INIS)

    Thangavelu, S.; Hussein, E.M.A.

    2007-01-01

    Conventional radiography requires access to two opposite sides of an object, which makes it unsuitable for the inspection of extended and/or thick structures (airframes, bridges, floors etc.). Backscatter imaging can overcome this problem, but the indications obtained are difficult to interpret. This paper applies the coded aperture technique to gamma-ray backscatter-radiography in order to enhance the detectability of flaws. This spatial coding method involves the positioning of a mask with closed and open holes to selectively permit or block the passage of radiation. The obtained coded-aperture indications are then mathematically decoded to detect the presence of anomalies. Indications obtained from Monte Carlo calculations were utilized in this work to simulate radiation scattering measurements. These simulated measurements were used to investigate the applicability of this technique to the detection of flaws by backscatter radiography

  17. Aztheca Code; Codigo Aztheca

    Energy Technology Data Exchange (ETDEWEB)

    Quezada G, S.; Espinosa P, G. [Universidad Autonoma Metropolitana, Unidad Iztapalapa, San Rafael Atlixco No. 186, Col. Vicentina, 09340 Ciudad de Mexico (Mexico); Centeno P, J.; Sanchez M, H., E-mail: sequga@gmail.com [UNAM, Facultad de Ingenieria, Ciudad Universitaria, Circuito Exterior s/n, 04510 Ciudad de Mexico (Mexico)

    2017-09-15

    This paper presents the Aztheca code, which is formed by the mathematical models of neutron kinetics, power generation, heat transfer, core thermo-hydraulics, recirculation systems, dynamic pressure and level models and control system. The Aztheca code is validated with plant data, as well as with predictions from the manufacturer when the reactor operates in a stationary state. On the other hand, to demonstrate that the model is applicable during a transient, an event occurred in a nuclear power plant with a BWR reactor is selected. The plant data are compared with the results obtained with RELAP-5 and the Aztheca model. The results show that both RELAP-5 and the Aztheca code have the ability to adequately predict the behavior of the reactor. (Author)

  18. The Coding Question.

    Science.gov (United States)

    Gallistel, C R

    2017-07-01

    Recent electrophysiological results imply that the duration of the stimulus onset asynchrony in eyeblink conditioning is encoded by a mechanism intrinsic to the cerebellar Purkinje cell. This raises the general question - how is quantitative information (durations, distances, rates, probabilities, amounts, etc.) transmitted by spike trains and encoded into engrams? The usual assumption is that information is transmitted by firing rates. However, rate codes are energetically inefficient and computationally awkward. A combinatorial code is more plausible. If the engram consists of altered synaptic conductances (the usual assumption), then we must ask how numbers may be written to synapses. It is much easier to formulate a coding hypothesis if the engram is realized by a cell-intrinsic molecular mechanism. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Revised SRAC code system

    International Nuclear Information System (INIS)

    Tsuchihashi, Keichiro; Ishiguro, Yukio; Kaneko, Kunio; Ido, Masaru.

    1986-09-01

    Since the publication of JAERI-1285 in 1983 for the preliminary version of the SRAC code system, a number of additions and modifications to the functions have been made to establish an overall neutronics code system. Major points are (1) addition of JENDL-2 version of data library, (2) a direct treatment of doubly heterogeneous effect on resonance absorption, (3) a generalized Dancoff factor, (4) a cell calculation based on the fixed boundary source problem, (5) the corresponding edit required for experimental analysis and reactor design, (6) a perturbation theory calculation for reactivity change, (7) an auxiliary code for core burnup and fuel management, etc. This report is a revision of the users manual which consists of the general description, input data requirements and their explanation, detailed information on usage, mathematics, contents of libraries and sample I/O. (author)

  20. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  1. The correspondence between projective codes and 2-weight codes

    NARCIS (Netherlands)

    Brouwer, A.E.; Eupen, van M.J.M.; Tilborg, van H.C.A.; Willems, F.M.J.

    1994-01-01

    The hyperplanes intersecting a 2-weight code in the same number of points obviously form the point set of a projective code. On the other hand, if we have a projective code C, then we can make a 2-weight code by taking the multiset of points E PC with multiplicity "Y(w), where W is the weight of

  2. Visualizing code and coverage changes for code review

    NARCIS (Netherlands)

    Oosterwaal, Sebastiaan; van Deursen, A.; De Souza Coelho, R.; Sawant, A.A.; Bacchelli, A.

    2016-01-01

    One of the tasks of reviewers is to verify that code modifications are well tested. However, current tools offer little support in understanding precisely how changes to the code relate to changes to the tests. In particular, it is hard to see whether (modified) test code covers the changed code.

  3. Turbo-Gallager Codes: The Emergence of an Intelligent Coding ...

    African Journals Online (AJOL)

    Today, both turbo codes and low-density parity-check codes are largely superior to other code families and are being used in an increasing number of modern communication systems including 3G standards, satellite and deep space communications. However, the two codes have certain distinctive characteristics that ...

  4. r TPPM

    DEFF Research Database (Denmark)

    Equbal, Asif; Paul, Subhradip; Mithu, Venus Singh

    2014-01-01

    We present here a simple refocused modification, r TPPM, of the Two-Pulse Phase-Modulation (TPPM) heteronuclear decoupling method, which improves decoupling and makes the sequence much more robust with respect to essential experimental parameters. The modified sequence is compared with the establ...

  5. r misra

    Indian Academy of Sciences (India)

    R MISRA. Articles written in Indian Academy of Sciences Conference Series. Volume 1 Issue 1 December 2017 pp 43-49 Proceedings of the Conference on Perspectives in Nonlinear Dynamics - 2016. Determining the minimum embedding dimension for state space reconstruction through recurrence networks.

  6. Code of Medical Ethics

    Directory of Open Access Journals (Sweden)

    . SZD-SZZ

    2017-03-01

    Full Text Available Te Code was approved on December 12, 1992, at the 3rd regular meeting of the General Assembly of the Medical Chamber of Slovenia and revised on April 24, 1997, at the 27th regular meeting of the General Assembly of the Medical Chamber of Slovenia. The Code was updated and harmonized with the Medical Association of Slovenia and approved on October 6, 2016, at the regular meeting of the General Assembly of the Medical Chamber of Slovenia.

  7. Supervised Convolutional Sparse Coding

    KAUST Repository

    Affara, Lama Ahmed

    2018-04-08

    Convolutional Sparse Coding (CSC) is a well-established image representation model especially suited for image restoration tasks. In this work, we extend the applicability of this model by proposing a supervised approach to convolutional sparse coding, which aims at learning discriminative dictionaries instead of purely reconstructive ones. We incorporate a supervised regularization term into the traditional unsupervised CSC objective to encourage the final dictionary elements to be discriminative. Experimental results show that using supervised convolutional learning results in two key advantages. First, we learn more semantically relevant filters in the dictionary and second, we achieve improved image reconstruction on unseen data.

  8. CONCEPT computer code

    International Nuclear Information System (INIS)

    Delene, J.

    1984-01-01

    CONCEPT is a computer code that will provide conceptual capital investment cost estimates for nuclear and coal-fired power plants. The code can develop an estimate for construction at any point in time. Any unit size within the range of about 400 to 1300 MW electric may be selected. Any of 23 reference site locations across the United States and Canada may be selected. PWR, BWR, and coal-fired plants burning high-sulfur and low-sulfur coal can be estimated. Multiple-unit plants can be estimated. Costs due to escalation/inflation and interest during construction are calculated

  9. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  10. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...... includes a reformulation of the usual methods to estimate the minimum distances of evaluation codes into the setting of affine variety codes. Finally we describe the connection to the theory of one-pointgeometric Goppa codes. Contents 4.1 Introduction...... . . . . . . . . . . . . . . . . . . . . . . . 171 4.9 Codes form order domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 4.10 One-point geometric Goppa codes . . . . . . . . . . . . . . . . . . . . . . . . 176 4.11 Bibliographical Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 References...

  11. Optimized reversible binary-coded decimal adders

    DEFF Research Database (Denmark)

    Thomsen, Michael Kirkedal; Glück, Robert

    2008-01-01

    Abstract Babu and Chowdhury [H.M.H. Babu, A.R. Chowdhury, Design of a compact reversible binary coded decimal adder circuit, Journal of Systems Architecture 52 (5) (2006) 272-282] recently proposed, in this journal, a reversible adder for binary-coded decimals. This paper corrects and optimizes...... their design. The optimized 1-decimal BCD full-adder, a 13 × 13 reversible logic circuit, is faster, and has lower circuit cost and less garbage bits. It can be used to build a fast reversible m-decimal BCD full-adder that has a delay of only m + 17 low-power reversible CMOS gates. For a 32-decimal (128-bit....... Keywords: Reversible logic circuit; Full-adder; Half-adder; Parallel adder; Binary-coded decimal; Application of reversible logic synthesis...

  12. Parallel R-matrix computation

    International Nuclear Information System (INIS)

    Heggarty, J.W.

    1999-06-01

    For almost thirty years, sequential R-matrix computation has been used by atomic physics research groups, from around the world, to model collision phenomena involving the scattering of electrons or positrons with atomic or molecular targets. As considerable progress has been made in the understanding of fundamental scattering processes, new data, obtained from more complex calculations, is of current interest to experimentalists. Performing such calculations, however, places considerable demands on the computational resources to be provided by the target machine, in terms of both processor speed and memory requirement. Indeed, in some instances the computational requirements are so great that the proposed R-matrix calculations are intractable, even when utilising contemporary classic supercomputers. Historically, increases in the computational requirements of R-matrix computation were accommodated by porting the problem codes to a more powerful classic supercomputer. Although this approach has been successful in the past, it is no longer considered to be a satisfactory solution due to the limitations of current (and future) Von Neumann machines. As a consequence, there has been considerable interest in the high performance multicomputers, that have emerged over the last decade which appear to offer the computational resources required by contemporary R-matrix research. Unfortunately, developing codes for these machines is not as simple a task as it was to develop codes for successive classic supercomputers. The difficulty arises from the considerable differences in the computing models that exist between the two types of machine and results in the programming of multicomputers to be widely acknowledged as a difficult, time consuming and error-prone task. Nevertheless, unless parallel R-matrix computation is realised, important theoretical and experimental atomic physics research will continue to be hindered. This thesis describes work that was undertaken in

  13. New extremal binary self-dual codes of lengths 64 and 66 from bicubic planar graphs

    OpenAIRE

    Kaya, Abidin

    2016-01-01

    In this work, connected cubic planar bipartite graphs and related binary self-dual codes are studied. Binary self-dual codes of length 16 are obtained by face-vertex incidence matrices of these graphs. By considering their lifts to the ring R_2 new extremal binary self-dual codes of lengths 64 are constructed as Gray images. More precisely, we construct 15 new codes of length 64. Moreover, 10 new codes of length 66 were obtained by applying a building-up construction to the binary codes. Code...

  14. Using R via PHP for Teaching Purposes: R-php

    Directory of Open Access Journals (Sweden)

    Angelo Mineo

    2006-10-01

    Full Text Available This paper deals with the R-php statistical software, that is an environment for statistical analysis, freely accessible and attainable through the World Wide Web, based on R. Indeed, this software uses, as “engine” for statistical analyses, R via PHP and its design has been inspired by a paper of de Leeuw (1997. R-php is based on two modules: a base module and a point-and-click module. R-php base allows the simple editing of R code in a form. R-php point-and-click allows some statistical analyses by means of a graphical user interface (GUI: then, to use this module it is not necessary for the user to know the R environment, but all the allowed analyses can be performed by using the computer mouse. We think that this tool could be particularly useful for teaching purposes: one possible use could be in a University computer laboratory to permit a smooth approach of students to R.

  15. Dual Coding in Children.

    Science.gov (United States)

    Burton, John K.; Wildman, Terry M.

    The purpose of this study was to test the applicability of the dual coding hypothesis to children's recall performance. The hypothesis predicts that visual interference will have a small effect on the recall of visually presented words or pictures, but that acoustic interference will cause a decline in recall of visually presented words and…

  16. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  17. Radioactive action code

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    A new coding system, 'Hazrad', for buildings and transportation containers for alerting emergency services personnel to the presence of radioactive materials has been developed in the United Kingdom. The hazards of materials in the buildings or transport container, together with the recommended emergency action, are represented by a number of codes which are marked on the building or container and interpreted from a chart carried as a pocket-size guide. Buildings would be marked with the familiar yellow 'radioactive' trefoil, the written information 'Radioactive materials' and a list of isotopes. Under this the 'Hazrad' code would be written - three symbols to denote the relative radioactive risk (low, medium or high), the biological risk (also low, medium or high) and the third showing the type of radiation emitted, alpha, beta or gamma. The response cards indicate appropriate measures to take, eg for a high biological risk, Bio3, the wearing of a gas-tight protection suit is advised. The code and its uses are explained. (U.K.)

  18. Building Codes and Regulations.

    Science.gov (United States)

    Fisher, John L.

    The hazard of fire is of great concern to libraries due to combustible books and new plastics used in construction and interiors. Building codes and standards can offer architects and planners guidelines to follow but these standards should be closely monitored, updated, and researched for fire prevention. (DS)

  19. Physics of codes

    International Nuclear Information System (INIS)

    Cooper, R.K.; Jones, M.E.

    1989-01-01

    The title given this paper is a bit presumptuous, since one can hardly expect to cover the physics incorporated into all the codes already written and currently being written. The authors focus on those codes which have been found to be particularly useful in the analysis and design of linacs. At that the authors will be a bit parochial and discuss primarily those codes used for the design of radio-frequency (rf) linacs, although the discussions of TRANSPORT and MARYLIE have little to do with the time structures of the beams being analyzed. The plan of this paper is first to describe rather simply the concepts of emittance and brightness, then to describe rather briefly each of the codes TRANSPORT, PARMTEQ, TBCI, MARYLIE, and ISIS, indicating what physics is and is not included in each of them. It is expected that the vast majority of what is covered will apply equally well to protons and electrons (and other particles). This material is intended to be tutorial in nature and can in no way be expected to be exhaustive. 31 references, 4 figures

  20. Reliability and code level

    NARCIS (Netherlands)

    Kasperski, M.; Geurts, C.P.W.

    2005-01-01

    The paper describes the work of the IAWE Working Group WBG - Reliability and Code Level, one of the International Codification Working Groups set up at ICWE10 in Copenhagen. The following topics are covered: sources of uncertainties in the design wind load, appropriate design target values for the

  1. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  2. CERN Code of Conduct

    CERN Document Server

    Department, HR

    2010-01-01

    The Code is intended as a guide in helping us, as CERN contributors, to understand how to conduct ourselves, treat others and expect to be treated. It is based around the five core values of the Organization. We should all become familiar with it and try to incorporate it into our daily life at CERN.

  3. Nuclear safety code study

    Energy Technology Data Exchange (ETDEWEB)

    Hu, H.H.; Ford, D.; Le, H.; Park, S.; Cooke, K.L.; Bleakney, T.; Spanier, J.; Wilburn, N.P.; O' Reilly, B.; Carmichael, B.

    1981-01-01

    The objective is to analyze an overpower accident in an LMFBR. A simplified model of the primary coolant loop was developed in order to understand the instabilities encountered with the MELT III and SAS codes. The computer programs were translated for switching to the IBM 4331. Numerical methods were investigated for solving the neutron kinetics equations; the Adams and Gear methods were compared. (DLC)

  4. Revised C++ coding conventions

    CERN Document Server

    Callot, O

    2001-01-01

    This document replaces the note LHCb 98-049 by Pavel Binko. After a few years of practice, some simplification and clarification of the rules was needed. As many more people have now some experience in writing C++ code, their opinion was also taken into account to get a commonly agreed set of conventions

  5. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and

  6. Error Correcting Codes -34 ...

    Indian Academy of Sciences (India)

    information and coding theory. A large scale relay computer had failed to deliver the expected results due to a hardware fault. Hamming, one of the active proponents of computer usage, was determined to find an efficient means by which computers could detect and correct their own faults. A mathematician by train-.

  7. Broadcast Coded Slotted ALOHA

    DEFF Research Database (Denmark)

    Ivanov, Mikhail; Brännström, Frederik; Graell i Amat, Alexandre

    2016-01-01

    We propose an uncoordinated medium access control (MAC) protocol, called all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all broadcast with strict latency constraints. In B-CSA, each user acts as both transmitter and receiver in a half-duplex mode. The half-duplex mode gives ...

  8. Software Defined Coded Networking

    DEFF Research Database (Denmark)

    Di Paola, Carla; Roetter, Daniel Enrique Lucani; Palazzo, Sergio

    2017-01-01

    the quality of each link and even across neighbouring links and using simulations to show that an additional reduction of packet transmission in the order of 40% is possible. Second, to advocate for the use of network coding (NC) jointly with software defined networking (SDN) providing an implementation...

  9. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  10. (Almost) practical tree codes

    KAUST Repository

    Khina, Anatoly

    2016-08-15

    We consider the problem of stabilizing an unstable plant driven by bounded noise over a digital noisy communication link, a scenario at the heart of networked control. To stabilize such a plant, one needs real-time encoding and decoding with an error probability profile that decays exponentially with the decoding delay. The works of Schulman and Sahai over the past two decades have developed the notions of tree codes and anytime capacity, and provided the theoretical framework for studying such problems. Nonetheless, there has been little practical progress in this area due to the absence of explicit constructions of tree codes with efficient encoding and decoding algorithms. Recently, linear time-invariant tree codes were proposed to achieve the desired result under maximum-likelihood decoding. In this work, we take one more step towards practicality, by showing that these codes can be efficiently decoded using sequential decoding algorithms, up to some loss in performance (and with some practical complexity caveats). We supplement our theoretical results with numerical simulations that demonstrate the effectiveness of the decoder in a control system setting.

  11. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    having a probability Pi of being equal to a 1. Let us assume ... equal to a 0/1 has no bearing on the probability of the. It is often ... bits (call this set S) whose individual bits add up to zero ... In the context of binary error-correct~ng codes, specifi-.

  12. The Redox Code.

    Science.gov (United States)

    Jones, Dean P; Sies, Helmut

    2015-09-20

    The redox code is a set of principles that defines the positioning of the nicotinamide adenine dinucleotide (NAD, NADP) and thiol/disulfide and other redox systems as well as the thiol redox proteome in space and time in biological systems. The code is richly elaborated in an oxygen-dependent life, where activation/deactivation cycles involving O₂ and H₂O₂ contribute to spatiotemporal organization for differentiation, development, and adaptation to the environment. Disruption of this organizational structure during oxidative stress represents a fundamental mechanism in system failure and disease. Methodology in assessing components of the redox code under physiological conditions has progressed, permitting insight into spatiotemporal organization and allowing for identification of redox partners in redox proteomics and redox metabolomics. Complexity of redox networks and redox regulation is being revealed step by step, yet much still needs to be learned. Detailed knowledge of the molecular patterns generated from the principles of the redox code under defined physiological or pathological conditions in cells and organs will contribute to understanding the redox component in health and disease. Ultimately, there will be a scientific basis to a modern redox medicine.

  13. Running R Statistical Computing Environment Software on the Peregrine

    Science.gov (United States)

    ") print(p) dev.off() Parallel Programming in R Programming in R on Peregrine has two distinct parallel processing. R code, like many programming languages, is typically written and executed serially highlight interesting packages, problems, and share experiences related to R programming. Contact Daniel

  14. Coding for urologic office procedures.

    Science.gov (United States)

    Dowling, Robert A; Painter, Mark

    2013-11-01

    This article summarizes current best practices for documenting, coding, and billing common office-based urologic procedures. Topics covered include general principles, basic and advanced urologic coding, creation of medical records that support compliant coding practices, bundled codes and unbundling, global periods, modifiers for procedure codes, when to bill for evaluation and management services during the same visit, coding for supplies, and laboratory and radiology procedures pertinent to urology practice. Detailed information is included for the most common urology office procedures, and suggested resources and references are provided. This information is of value to physicians, office managers, and their coding staff. Copyright © 2013 Elsevier Inc. All rights reserved.

  15. Essential idempotents and simplex codes

    Directory of Open Access Journals (Sweden)

    Gladys Chalom

    2017-01-01

    Full Text Available We define essential idempotents in group algebras and use them to prove that every mininmal abelian non-cyclic code is a repetition code. Also we use them to prove that every minimal abelian code is equivalent to a minimal cyclic code of the same length. Finally, we show that a binary cyclic code is simplex if and only if is of length of the form $n=2^k-1$ and is generated by an essential idempotent.

  16. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...

  17. Canadian energy standards : residential energy code requirements

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, K. [SAR Engineering Ltd., Burnaby, BC (Canada)

    2006-09-15

    A survey of residential energy code requirements was discussed. New housing is approximately 13 per cent more efficient than housing built 15 years ago, and more stringent energy efficiency requirements in building codes have contributed to decreased energy use and greenhouse gas (GHG) emissions. However, a survey of residential energy codes across Canada has determined that explicit demands for energy efficiency are currently only present in British Columbia (BC), Manitoba, Ontario and Quebec. The survey evaluated more than 4300 single-detached homes built between 2000 and 2005 using data from the EnerGuide for Houses (EGH) database. House area, volume, airtightness and construction characteristics were reviewed to create archetypes for 8 geographic areas. The survey indicated that in Quebec and the Maritimes, 90 per cent of houses comply with ventilation system requirements of the National Building Code, while compliance in the rest of Canada is much lower. Heat recovery ventilation use is predominant in the Atlantic provinces. Direct-vent or condensing furnaces constitute the majority of installed systems in provinces where natural gas is the primary space heating fuel. Details of Insulation levels for walls, double-glazed windows, and building code insulation standards were also reviewed. It was concluded that if R-2000 levels of energy efficiency were applied, total average energy consumption would be reduced by 36 per cent in Canada. 2 tabs.

  18. 77 FR 1656 - Proposed Establishment of Restricted Areas R-5402, R-5403A, R-5403B, R-5403C, R-5403D, R-5403E, R...

    Science.gov (United States)

    2012-01-11

    ...-0117; Airspace Docket No. 09-AGL-31] RIN 2120-AI92 Proposed Establishment of Restricted Areas R-5402, R-5403A, R- 5403B, R-5403C, R-5403D, R-5403E, R-5403F; Devils Lake, ND AGENCY: Federal Aviation... Restricted Areas R-5402, R-5403A, R-5403B, R- 5403C, R-5403D, R-5403E, R-5403F; Devils Lake, ND (76 FR 72869...

  19. 77 FR 36907 - Establishment of Restricted Areas R-5402, R-5403A, R-5403B, R-5403C, R-5403D, R-5403E, and R...

    Science.gov (United States)

    2012-06-20

    ...; Airspace Docket No. 09-AGL-31] Establishment of Restricted Areas R-5402, R-5403A, R-5403B, R- 5403C, R-5403D, R-5403E, and R-5403F; Devils Lake, ND AGENCY: Federal Aviation Administration (FAA), DOT. ACTION... establish Restricted Areas R- 5402, R-5403A, R-5403B, R-5403C, R-5403D, R-5403E, and R-5403F in the vicinity...

  20. Hierarchical differences in population coding within auditory cortex.

    Science.gov (United States)

    Downer, Joshua D; Niwa, Mamiko; Sutter, Mitchell L

    2017-08-01

    Most models of auditory cortical (AC) population coding have focused on primary auditory cortex (A1). Thus our understanding of how neural coding for sounds progresses along the cortical hierarchy remains obscure. To illuminate this, we recorded from two AC fields: A1 and middle lateral belt (ML) of rhesus macaques. We presented amplitude-modulated (AM) noise during both passive listening and while the animals performed an AM detection task ("active" condition). In both fields, neurons exhibit monotonic AM-depth tuning, with A1 neurons mostly exhibiting increasing rate-depth functions and ML neurons approximately evenly distributed between increasing and decreasing functions. We measured noise correlation ( r noise ) between simultaneously recorded neurons and found that whereas engagement decreased average r noise in A1, engagement increased average r noise in ML. This finding surprised us, because attentive states are commonly reported to decrease average r noise We analyzed the effect of r noise on AM coding in both A1 and ML and found that whereas engagement-related shifts in r noise in A1 enhance AM coding, r noise shifts in ML have little effect. These results imply that the effect of r noise differs between sensory areas, based on the distribution of tuning properties among the neurons within each population. A possible explanation of this is that higher areas need to encode nonsensory variables (e.g., attention, choice, and motor preparation), which impart common noise, thus increasing r noise Therefore, the hierarchical emergence of r noise -robust population coding (e.g., as we observed in ML) enhances the ability of sensory cortex to integrate cognitive and sensory information without a loss of sensory fidelity. NEW & NOTEWORTHY Prevailing models of population coding of sensory information are based on a limited subset of neural structures. An important and under-explored question in neuroscience is how distinct areas of sensory cortex differ in their

  1. Entanglement-assisted quantum MDS codes constructed from negacyclic codes

    Science.gov (United States)

    Chen, Jianzhang; Huang, Yuanyuan; Feng, Chunhui; Chen, Riqing

    2017-12-01

    Recently, entanglement-assisted quantum codes have been constructed from cyclic codes by some scholars. However, how to determine the number of shared pairs required to construct entanglement-assisted quantum codes is not an easy work. In this paper, we propose a decomposition of the defining set of negacyclic codes. Based on this method, four families of entanglement-assisted quantum codes constructed in this paper satisfy the entanglement-assisted quantum Singleton bound, where the minimum distance satisfies q+1 ≤ d≤ n+2/2. Furthermore, we construct two families of entanglement-assisted quantum codes with maximal entanglement.

  2. Computerized adaptive and multistage testing with R using packages catR and mstR

    CERN Document Server

    Magis, David; von Davier, Alina A

    2017-01-01

    The goal of this guide and manual is to provide a practical and brief overview of the theory on computerized adaptive testing (CAT) and multistage testing (MST) and to illustrate the methodologies and applications using R open source language and several data examples.  Implementation relies on the R packages catR and mstR that have been already or are being developed by the first author (with the team) and that include some of the newest research algorithms on the topic. The book covers many topics along with the R-code: the basics of R, theoretical overview of CAT and MST, CAT designs, CAT assembly methodologies, CAT simulations, catR package, CAT applications, MST designs, IRT-based MST methodologies, tree-based MST methodologies, mstR package, and MST applications.  CAT has been used in many large-scale assessments over recent decades, and MST has become very popular in recent years.  R open source language also has become one of the most useful tools for applications in almost all fields, including b...

  3. Efficient convolutional sparse coding

    Science.gov (United States)

    Wohlberg, Brendt

    2017-06-20

    Computationally efficient algorithms may be applied for fast dictionary learning solving the convolutional sparse coding problem in the Fourier domain. More specifically, efficient convolutional sparse coding may be derived within an alternating direction method of multipliers (ADMM) framework that utilizes fast Fourier transforms (FFT) to solve the main linear system in the frequency domain. Such algorithms may enable a significant reduction in computational cost over conventional approaches by implementing a linear solver for the most critical and computationally expensive component of the conventional iterative algorithm. The theoretical computational cost of the algorithm may be reduced from O(M.sup.3N) to O(MN log N), where N is the dimensionality of the data and M is the number of elements in the dictionary. This significant improvement in efficiency may greatly increase the range of problems that can practically be addressed via convolutional sparse representations.

  4. Coded Network Function Virtualization

    DEFF Research Database (Denmark)

    Al-Shuwaili, A.; Simone, O.; Kliewer, J.

    2016-01-01

    Network function virtualization (NFV) prescribes the instantiation of network functions on general-purpose network devices, such as servers and switches. While yielding a more flexible and cost-effective network architecture, NFV is potentially limited by the fact that commercial off......-the-shelf hardware is less reliable than the dedicated network elements used in conventional cellular deployments. The typical solution for this problem is to duplicate network functions across geographically distributed hardware in order to ensure diversity. In contrast, this letter proposes to leverage channel...... coding in order to enhance the robustness on NFV to hardware failure. The proposed approach targets the network function of uplink channel decoding, and builds on the algebraic structure of the encoded data frames in order to perform in-network coding on the signals to be processed at different servers...

  5. The NIMROD Code

    Science.gov (United States)

    Schnack, D. D.; Glasser, A. H.

    1996-11-01

    NIMROD is a new code system that is being developed for the analysis of modern fusion experiments. It is being designed from the beginning to make the maximum use of massively parallel computer architectures and computer graphics. The NIMROD physics kernel solves the three-dimensional, time-dependent two-fluid equations with neo-classical effects in toroidal geometry of arbitrary poloidal cross section. The NIMROD system also includes a pre-processor, a grid generator, and a post processor. User interaction with NIMROD is facilitated by a modern graphical user interface (GUI). The NIMROD project is using Quality Function Deployment (QFD) team management techniques to minimize re-engineering and reduce code development time. This paper gives an overview of the NIMROD project. Operation of the GUI is demonstrated, and the first results from the physics kernel are given.

  6. Computer code FIT

    International Nuclear Information System (INIS)

    Rohmann, D.; Koehler, T.

    1987-02-01

    This is a description of the computer code FIT, written in FORTRAN-77 for a PDP 11/34. FIT is an interactive program to decude position, width and intensity of lines of X-ray spectra (max. length of 4K channels). The lines (max. 30 lines per fit) may have Gauss- or Voigt-profile, as well as exponential tails. Spectrum and fit can be displayed on a Tektronix terminal. (orig.) [de

  7. Discrete Sparse Coding.

    Science.gov (United States)

    Exarchakis, Georgios; Lücke, Jörg

    2017-11-01

    Sparse coding algorithms with continuous latent variables have been the subject of a large number of studies. However, discrete latent spaces for sparse coding have been largely ignored. In this work, we study sparse coding with latents described by discrete instead of continuous prior distributions. We consider the general case in which the latents (while being sparse) can take on any value of a finite set of possible values and in which we learn the prior probability of any value from data. This approach can be applied to any data generated by discrete causes, and it can be applied as an approximation of continuous causes. As the prior probabilities are learned, the approach then allows for estimating the prior shape without assuming specific functional forms. To efficiently train the parameters of our probabilistic generative model, we apply a truncated expectation-maximization approach (expectation truncation) that we modify to work with a general discrete prior. We evaluate the performance of the algorithm by applying it to a variety of tasks: (1) we use artificial data to verify that the algorithm can recover the generating parameters from a random initialization, (2) use image patches of natural images and discuss the role of the prior for the extraction of image components, (3) use extracellular recordings of neurons to present a novel method of analysis for spiking neurons that includes an intuitive discretization strategy, and (4) apply the algorithm on the task of encoding audio waveforms of human speech. The diverse set of numerical experiments presented in this letter suggests that discrete sparse coding algorithms can scale efficiently to work with realistic data sets and provide novel statistical quantities to describe the structure of the data.

  8. Code of Practice

    International Nuclear Information System (INIS)

    Doyle, Colin; Hone, Christopher; Nowlan, N.V.

    1984-05-01

    This Code of Practice introduces accepted safety procedures associated with the use of alpha, beta, gamma and X-radiation in secondary schools (pupils aged 12 to 18) in Ireland, and summarises good practice and procedures as they apply to radiation protection. Typical dose rates at various distances from sealed sources are quoted, and simplified equations are used to demonstrate dose and shielding calculations. The regulatory aspects of radiation protection are outlined, and references to statutory documents are given

  9. Tokamak simulation code manual

    International Nuclear Information System (INIS)

    Chung, Moon Kyoo; Oh, Byung Hoon; Hong, Bong Keun; Lee, Kwang Won

    1995-01-01

    The method to use TSC (Tokamak Simulation Code) developed by Princeton plasma physics laboratory is illustrated. In KT-2 tokamak, time dependent simulation of axisymmetric toroidal plasma and vertical stability have to be taken into account in design phase using TSC. In this report physical modelling of TSC are described and examples of application in JAERI and SERI are illustrated, which will be useful when TSC is installed KAERI computer system. (Author) 15 refs., 6 figs., 3 tabs

  10. Status of MARS Code

    Energy Technology Data Exchange (ETDEWEB)

    N.V. Mokhov

    2003-04-09

    Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

  11. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, transparency, neutrality, impartiality, effectiveness, accountability, and legality. The normative context of public administration, as expressed in codes, seems to ignore the New Public Management and Reinventing Government reform movements....

  12. Orthopedics coding and funding.

    Science.gov (United States)

    Baron, S; Duclos, C; Thoreux, P

    2014-02-01

    The French tarification à l'activité (T2A) prospective payment system is a financial system in which a health-care institution's resources are based on performed activity. Activity is described via the PMSI medical information system (programme de médicalisation du système d'information). The PMSI classifies hospital cases by clinical and economic categories known as diagnosis-related groups (DRG), each with an associated price tag. Coding a hospital case involves giving as realistic a description as possible so as to categorize it in the right DRG and thus ensure appropriate payment. For this, it is essential to understand what determines the pricing of inpatient stay: namely, the code for the surgical procedure, the patient's principal diagnosis (reason for admission), codes for comorbidities (everything that adds to management burden), and the management of the length of inpatient stay. The PMSI is used to analyze the institution's activity and dynamism: change on previous year, relation to target, and comparison with competing institutions based on indicators such as the mean length of stay performance indicator (MLS PI). The T2A system improves overall care efficiency. Quality of care, however, is not presently taken account of in the payment made to the institution, as there are no indicators for this; work needs to be done on this topic. Copyright © 2014. Published by Elsevier Masson SAS.

  13. Code Modernization of VPIC

    Science.gov (United States)

    Bird, Robert; Nystrom, David; Albright, Brian

    2017-10-01

    The ability of scientific simulations to effectively deliver performant computation is increasingly being challenged by successive generations of high-performance computing architectures. Code development to support efficient computation on these modern architectures is both expensive, and highly complex; if it is approached without due care, it may also not be directly transferable between subsequent hardware generations. Previous works have discussed techniques to support the process of adapting a legacy code for modern hardware generations, but despite the breakthroughs in the areas of mini-app development, portable-performance, and cache oblivious algorithms the problem still remains largely unsolved. In this work we demonstrate how a focus on platform agnostic modern code-development can be applied to Particle-in-Cell (PIC) simulations to facilitate effective scientific delivery. This work builds directly on our previous work optimizing VPIC, in which we replaced intrinsic based vectorisation with compile generated auto-vectorization to improve the performance and portability of VPIC. In this work we present the use of a specialized SIMD queue for processing some particle operations, and also preview a GPU capable OpenMP variant of VPIC. Finally we include a lessons learnt. Work performed under the auspices of the U.S. Dept. of Energy by the Los Alamos National Security, LLC Los Alamos National Laboratory under contract DE-AC52-06NA25396 and supported by the LANL LDRD program.

  14. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  15. MELCOR computer code manuals

    International Nuclear Information System (INIS)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L.; Hodge, S.A.; Hyman, C.R.; Sanders, R.L.

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR's phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package

  16. Impact testing and analysis for structural code benchmarking

    International Nuclear Information System (INIS)

    Glass, R.E.

    1989-01-01

    Sandia National Laboratories, in cooperation with industry and other national laboratories, has been benchmarking computer codes (''Structural Code Benchmarking for the Analysis of Impact Response of Nuclear Material Shipping Cask,'' R.E. Glass, Sandia National Laboratories, 1985; ''Sample Problem Manual for Benchmarking of Cask Analysis Codes,'' R.E. Glass, Sandia National Laboratories, 1988; ''Standard Thermal Problem Set for the Evaluation of Heat Transfer Codes Used in the Assessment of Transportation Packages, R.E. Glass, et al., Sandia National Laboratories, 1988) used to predict the structural, thermal, criticality, and shielding behavior of radioactive materials packages. The first step in the benchmarking of the codes was to develop standard problem sets and to compare the results from several codes and users. This step for structural analysis codes has been completed as described in ''Structural Code Benchmarking for the Analysis of Impact Response of Nuclear Material Shipping Casks,'' R.E. Glass, Sandia National Laboratories, 1985. The problem set is shown in Fig. 1. This problem set exercised the ability of the codes to predict the response to end (axisymmetric) and side (plane strain) impacts with both elastic and elastic/plastic materials. The results from these problems showed that there is good agreement in predicting elastic response. Significant differences occurred in predicting strains for the elastic/plastic models. An example of the variation in predicting plastic behavior is given, which shows the hoop strain as a function of time at the impacting end of Model B. These differences in predicting plastic strains demonstrated a need for benchmark data for a cask-like problem. 6 refs., 5 figs

  17. Probability and statistics with R

    CERN Document Server

    Ugarte, Maria Dolores; Arnholt, Alan T

    2008-01-01

    -Technometrics, May 2009, Vol. 51, No. 2 The book is comprehensive and well written. The notation is clear and the mathematical derivations behind nontrivial equations and computational implementations are carefully explained. Rather than presenting a collection of R scripts together with a summary of relevant theoretical results, this book offers a well-balanced mix of theory, examples and R code.-Raquel Prado, University of California, Santa Cruz,  The American Statistician, February 2009… an impressive book … Overall, this is a good reference book with comprehensive coverage of the details

  18. Quality Improvement of MARS Code and Establishment of Code Coupling

    International Nuclear Information System (INIS)

    Chung, Bub Dong; Jeong, Jae Jun; Kim, Kyung Doo

    2010-04-01

    The improvement of MARS code quality and coupling with regulatory auditing code have been accomplished for the establishment of self-reliable technology based regulatory auditing system. The unified auditing system code was realized also by implementing the CANDU specific models and correlations. As a part of the quality assurance activities, the various QA reports were published through the code assessments. The code manuals were updated and published a new manual which describe the new models and correlations. The code coupling methods were verified though the exercise of plant application. The education-training seminar and technology transfer were performed for the code users. The developed MARS-KS is utilized as reliable auditing tool for the resolving the safety issue and other regulatory calculations. The code can be utilized as a base technology for GEN IV reactor applications

  19. Design of convolutional tornado code

    Science.gov (United States)

    Zhou, Hui; Yang, Yao; Gao, Hongmin; Tan, Lu

    2017-09-01

    As a linear block code, the traditional tornado (tTN) code is inefficient in burst-erasure environment and its multi-level structure may lead to high encoding/decoding complexity. This paper presents a convolutional tornado (cTN) code which is able to improve the burst-erasure protection capability by applying the convolution property to the tTN code, and reduce computational complexity by abrogating the multi-level structure. The simulation results show that cTN code can provide a better packet loss protection performance with lower computation complexity than tTN code.

  20. Random linear codes in steganography

    Directory of Open Access Journals (Sweden)

    Kamil Kaczyński

    2016-12-01

    Full Text Available Syndrome coding using linear codes is a technique that allows improvement in the steganographic algorithms parameters. The use of random linear codes gives a great flexibility in choosing the parameters of the linear code. In parallel, it offers easy generation of parity check matrix. In this paper, the modification of LSB algorithm is presented. A random linear code [8, 2] was used as a base for algorithm modification. The implementation of the proposed algorithm, along with practical evaluation of algorithms’ parameters based on the test images was made.[b]Keywords:[/b] steganography, random linear codes, RLC, LSB

  1. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes.......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  2. TASS code topical report. V.1 TASS code technical manual

    International Nuclear Information System (INIS)

    Sim, Suk K.; Chang, W. P.; Kim, K. D.; Kim, H. C.; Yoon, H. Y.

    1997-02-01

    TASS 1.0 code has been developed at KAERI for the initial and reload non-LOCA safety analysis for the operating PWRs as well as the PWRs under construction in Korea. TASS code will replace various vendor's non-LOCA safety analysis codes currently used for the Westinghouse and ABB-CE type PWRs in Korea. This can be achieved through TASS code input modifications specific to each reactor type. The TASS code can be run interactively through the keyboard operation. A simimodular configuration used in developing the TASS code enables the user easily implement new models. TASS code has been programmed using FORTRAN77 which makes it easy to install and port for different computer environments. The TASS code can be utilized for the steady state simulation as well as the non-LOCA transient simulations such as power excursions, reactor coolant pump trips, load rejections, loss of feedwater, steam line breaks, steam generator tube ruptures, rod withdrawal and drop, and anticipated transients without scram (ATWS). The malfunctions of the control systems, components, operator actions and the transients caused by the malfunctions can be easily simulated using the TASS code. This technical report describes the TASS 1.0 code models including reactor thermal hydraulic, reactor core and control models. This TASS code models including reactor thermal hydraulic, reactor core and control models. This TASS code technical manual has been prepared as a part of the TASS code manual which includes TASS code user's manual and TASS code validation report, and will be submitted to the regulatory body as a TASS code topical report for a licensing non-LOCA safety analysis for the Westinghouse and ABB-CE type PWRs operating and under construction in Korea. (author). 42 refs., 29 tabs., 32 figs

  3. Construction of new quantum MDS codes derived from constacyclic codes

    Science.gov (United States)

    Taneja, Divya; Gupta, Manish; Narula, Rajesh; Bhullar, Jaskaran

    Obtaining quantum maximum distance separable (MDS) codes from dual containing classical constacyclic codes using Hermitian construction have paved a path to undertake the challenges related to such constructions. Using the same technique, some new parameters of quantum MDS codes have been constructed here. One set of parameters obtained in this paper has achieved much larger distance than work done earlier. The remaining constructed parameters of quantum MDS codes have large minimum distance and were not explored yet.

  4. Network Coding for Wireless Cooperative Networks

    DEFF Research Database (Denmark)

    Khamfroush, Hana; Roetter, Daniel Enrique Lucani; Barros, João

    2014-01-01

    We consider the problem of finding an optimal packet transmission policy that minimizes the total cost of transmitting M data packets from a source S to two receivers R1,R2 over half-duplex, erasure channels. The source can either broadcast random linear network coding (RLNC) packets to the recei......We consider the problem of finding an optimal packet transmission policy that minimizes the total cost of transmitting M data packets from a source S to two receivers R1,R2 over half-duplex, erasure channels. The source can either broadcast random linear network coding (RLNC) packets...... to the receivers or transmit using unicast sessions at each time slot. We assume that the receivers can share their knowledge with each other by sending RLNC packets using unicast transmissions. We model this problem by using a Markov Decision Process (MDP), where the actions include the source of and type...... of transmission to be used in a given time slot given perfect knowledge of the system state. We study the distribution of actions selected by the MDP in terms of the knowledge at the receivers, the channel erasure probabilities, and the ratio between the cost of broadcast and unicast. This allowed us to learn...

  5. Modélisation thermodynamique et cinétique des réactions diagénétiques dans les bassins sédimentaires. Présentation du modèle géochimique KINDISP Thermodynamic and Kinetic Modelling of Diagenetic Reactions in Sedimentary Basins. Description of the Geochemical Code Kindisp

    Directory of Open Access Journals (Sweden)

    Clement A.

    2006-11-01

    Full Text Available Le programme thermodynamique et cinétique KINDISP (KINetic of DISsolution and Precipitation simule les interactions minéraux/solutions aqueuses en considérant la dissolution irréversible des réactants et la précipitation réversible ou irréversible des phases secondaires. Les lois générales introduites dans le modèle ont pour base théorique la Thermodynamique des Processus Irréversibles. Les interactions eaux/roches à basse température (25-30 °C sont interprétées théoriquement à l'aide de la Théorie de l'Etat de Transition et de la Chimie de Coordination de Surface. Le mécanisme qui limite la vitesse de dissolution ou de précipitation d'un minéral, c'est-à-dire le mécanisme le plus lent pour les réactions irréversibles successives, est soit la diffusion moléculaire aqueuse d'une entité élémentaire (atome, molécule . . . ou bien la réaction de surface (adsorption-désorption d'une entité élémentaire. A chaque étape du calcul, caractérisé par un incrément de temps (dt, le modèle informatique KINDISP calcule les vitesses de réaction pour chaque minéral réactif dans le système eau-roche. A partir de ce calcul, le modèle compare les vitesses contrôlées par la diffusion moléculaire et par la réaction de surface. Ensuite, KINDISP retient la vitesse la plus lente pour représenter la loi de dissolution d'un minéral réactif primaire ou la loi de précipitation d'une phase néoformée secondaire. La croissance des minéraux secondaires est simulée, soit à l'équilibre thermodynamique, soit en domaine de sursaturation (en nonéquilibre, après une étape de nucléation, lorsque le point de sursaturation critique S* est atteint. Le programme géochimique KINDISP est divisé en deux ensembles : un module de calcul d'équilibre initial de la solution aqueuse appelé EQUILT et un module constitué de la procédure de perturbation par incréments de temps rendant compte de l'évolution géochimique du syst

  6. Combinatorial neural codes from a mathematical coding theory perspective.

    Science.gov (United States)

    Curto, Carina; Itskov, Vladimir; Morrison, Katherine; Roth, Zachary; Walker, Judy L

    2013-07-01

    Shannon's seminal 1948 work gave rise to two distinct areas of research: information theory and mathematical coding theory. While information theory has had a strong influence on theoretical neuroscience, ideas from mathematical coding theory have received considerably less attention. Here we take a new look at combinatorial neural codes from a mathematical coding theory perspective, examining the error correction capabilities of familiar receptive field codes (RF codes). We find, perhaps surprisingly, that the high levels of redundancy present in these codes do not support accurate error correction, although the error-correcting performance of receptive field codes catches up to that of random comparison codes when a small tolerance to error is introduced. However, receptive field codes are good at reflecting distances between represented stimuli, while the random comparison codes are not. We suggest that a compromise in error-correcting capability may be a necessary price to pay for a neural code whose structure serves not only error correction, but must also reflect relationships between stimuli.

  7. Convolutional coding techniques for data protection

    Science.gov (United States)

    Massey, J. L.

    1975-01-01

    Results of research on the use of convolutional codes in data communications are presented. Convolutional coding fundamentals are discussed along with modulation and coding interaction. Concatenated coding systems and data compression with convolutional codes are described.

  8. Constacyclic codes over the ring F_q+v{F}_q+v2F_q and their applications of constructing new non-binary quantum codes

    Science.gov (United States)

    Ma, Fanghui; Gao, Jian; Fu, Fang-Wei

    2018-06-01

    Let R={F}_q+v{F}_q+v2{F}_q be a finite non-chain ring, where q is an odd prime power and v^3=v. In this paper, we propose two methods of constructing quantum codes from (α +β v+γ v2)-constacyclic codes over R. The first one is obtained via the Gray map and the Calderbank-Shor-Steane construction from Euclidean dual-containing (α +β v+γ v2)-constacyclic codes over R. The second one is obtained via the Gray map and the Hermitian construction from Hermitian dual-containing (α +β v+γ v2)-constacyclic codes over R. As an application, some new non-binary quantum codes are obtained.

  9. High Energy Transport Code HETC

    International Nuclear Information System (INIS)

    Gabriel, T.A.

    1985-09-01

    The physics contained in the High Energy Transport Code (HETC), in particular the collision models, are discussed. An application using HETC as part of the CALOR code system is also given. 19 refs., 5 figs., 3 tabs

  10. Code stroke in Asturias.

    Science.gov (United States)

    Benavente, L; Villanueva, M J; Vega, P; Casado, I; Vidal, J A; Castaño, B; Amorín, M; de la Vega, V; Santos, H; Trigo, A; Gómez, M B; Larrosa, D; Temprano, T; González, M; Murias, E; Calleja, S

    2016-04-01

    Intravenous thrombolysis with alteplase is an effective treatment for ischaemic stroke when applied during the first 4.5 hours, but less than 15% of patients have access to this technique. Mechanical thrombectomy is more frequently able to recanalise proximal occlusions in large vessels, but the infrastructure it requires makes it even less available. We describe the implementation of code stroke in Asturias, as well as the process of adapting various existing resources for urgent stroke care in the region. By considering these resources, and the demographic and geographic circumstances of our region, we examine ways of reorganising the code stroke protocol that would optimise treatment times and provide the most appropriate treatment for each patient. We distributed the 8 health districts in Asturias so as to permit referral of candidates for reperfusion therapies to either of the 2 hospitals with 24-hour stroke units and on-call neurologists and providing IV fibrinolysis. Hospitals were assigned according to proximity and stroke severity; the most severe cases were immediately referred to the hospital with on-call interventional neurology care. Patient triage was provided by pre-hospital emergency services according to the NIHSS score. Modifications to code stroke in Asturias have allowed us to apply reperfusion therapies with good results, while emphasising equitable care and managing the severity-time ratio to offer the best and safest treatment for each patient as soon as possible. Copyright © 2015 Sociedad Española de Neurología. Published by Elsevier España, S.L.U. All rights reserved.

  11. Advanced Object-Oriented Programming in R

    DEFF Research Database (Denmark)

    Mailund, Thomas

    2017-01-01

    Learn how to write object-oriented programs in R and how to construct classes and class hierarchies in the three object-oriented systems available in R. This book gives an introduction to object-oriented programming in the R programming language and shows you how to use and apply R in an object......-oriented manner. You will then be able to use this powerful programming style in your own statistical programming projects to write flexible and extendable software. After reading Advanced Object-Oriented Programming in R, you'll come away with a practical project that you can reuse in your own analytics coding...... of data being manipulated. You will: Define and use classes and generic functions using R Work with the R class hierarchies Benefit from implementation reuse Handle operator overloading Apply the S4 and R6 classes...

  12. Advanced Object-Oriented Programming in R

    DEFF Research Database (Denmark)

    Mailund, Thomas

    Learn how to write object-oriented programs in R and how to construct classes and class hierarchies in the three object-oriented systems available in R. This book gives an introduction to object-oriented programming in the R programming language and shows you how to use and apply R in an object......-oriented manner. You will then be able to use this powerful programming style in your own statistical programming projects to write flexible and extendable software. After reading Advanced Object-Oriented Programming in R, you'll come away with a practical project that you can reuse in your own analytics coding...... of data being manipulated. You will: Define and use classes and generic functions using R Work with the R class hierarchies Benefit from implementation reuse Handle operator overloading Apply the S4 and R6 classes...

  13. Decoding Xing-Ling codes

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Refslund

    2002-01-01

    This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed.......This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed....

  14. WWER reactor physics code applications

    International Nuclear Information System (INIS)

    Gado, J.; Kereszturi, A.; Gacs, A.; Telbisz, M.

    1994-01-01

    The coupled steady-state reactor physics and thermohydraulic code system KARATE has been developed and applied for WWER-1000 and WWER-440 operational calculations. The 3 D coupled kinetic code KIKO3D has been developed and validated for WWER-440 accident analysis applications. The coupled kinetic code SMARTA developed by VTT Helsinki has been applied for WWER-440 accident analysis. The paper gives a summary of the experience in code development and application. (authors). 10 refs., 2 tabs., 5 figs

  15. The path of code linting

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Join the path of code linting and discover how it can help you reach higher levels of programming enlightenment. Today we will cover how to embrace code linters to offload cognitive strain on preserving style standards in your code base as well as avoiding error-prone constructs. Additionally, I will show you the journey ahead for integrating several code linters in the programming tools your already use with very little effort.

  16. The CORSYS neutronics code system

    International Nuclear Information System (INIS)

    Caner, M.; Krumbein, A.D.; Saphier, D.; Shapira, M.

    1994-01-01

    The purpose of this work is to assemble a code package for LWR core physics including coupled neutronics, burnup and thermal hydraulics. The CORSYS system is built around the cell code WIMS (for group microscopic cross section calculations) and 3-dimension diffusion code CITATION (for burnup and fuel management). We are implementing such a system on an IBM RS-6000 workstation. The code was rested with a simplified model of the Zion Unit 2 PWR. (authors). 6 refs., 8 figs., 1 tabs

  17. Bar codes for nuclear safeguards

    International Nuclear Information System (INIS)

    Keswani, A.N.; Bieber, A.M. Jr.

    1983-01-01

    Bar codes similar to those used in supermarkets can be used to reduce the effort and cost of collecting nuclear materials accountability data. A wide range of equipment is now commercially available for printing and reading bar-coded information. Several examples of each of the major types of commercially available equipment are given, and considerations are discussed both for planning systems using bar codes and for choosing suitable bar code equipment

  18. Bar codes for nuclear safeguards

    International Nuclear Information System (INIS)

    Keswani, A.N.; Bieber, A.M.

    1983-01-01

    Bar codes similar to those used in supermarkets can be used to reduce the effort and cost of collecting nuclear materials accountability data. A wide range of equipment is now commercially available for printing and reading bar-coded information. Several examples of each of the major types of commercially-available equipment are given, and considerations are discussed both for planning systems using bar codes and for choosing suitable bar code equipment

  19. Quick response codes in Orthodontics

    Directory of Open Access Journals (Sweden)

    Moidin Shakil

    2015-01-01

    Full Text Available Quick response (QR code codes are two-dimensional barcodes, which encodes for a large amount of information. QR codes in Orthodontics are an innovative approach in which patient details, radiographic interpretation, and treatment plan can be encoded. Implementing QR code in Orthodontics will save time, reduces paperwork, and minimizes manual efforts in storage and retrieval of patient information during subsequent stages of treatment.

  20. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...

  1. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  2. UNSPEC: revisited (semaphore code)

    International Nuclear Information System (INIS)

    Neifert, R.D.

    1981-01-01

    The UNSPEC code is used to solve the problem of unfolding an observed x-ray spectrum given the response matrix of the measuring system and the measured signal values. UNSPEC uses an iterative technique to solve the unfold problem. Due to experimental errors in the measured signal values and/or computer round-off errors, discontinuities and oscillatory behavior may occur in the iterated spectrum. These can be suppressed by smoothing the results after each iteration. Input/output options and control cards are explained; sample input and output are provided

  3. The FLIC conversion codes

    International Nuclear Information System (INIS)

    Basher, J.C.

    1965-05-01

    This report describes the FORTRAN programmes, FLIC 1 and FLIC 2. These programmes convert programmes coded in one dialect of FORTRAN to another dialect of the same language. FLIC 1 is a general pattern recognition and replacement programme whereas FLIC 2 contains extensions directed towards the conversion of FORTRAN II and S2 programmes to EGTRAN 1 - the dialect now in use on the Winfrith KDF9. FII or S2 statements are replaced where possible by their E1 equivalents; other statements which may need changing are flagged. (author)

  4. SPRAY code user's report

    International Nuclear Information System (INIS)

    Shire, P.R.

    1977-03-01

    The SPRAY computer code has been developed to model the effects of postulated sodium spray release from LMFBR piping within containment chambers. The calculation method utilizes gas convection, heat transfer and droplet combustion theory to calculate the pressure and temperature effects within the enclosure. The applicable range is 0-21 mol percent oxygen and .02-.30 inch droplets with or without humidity. Droplet motion and large sodium surface area combine to produce rapid heat release and pressure rise within the enclosed volume

  5. The FLIC conversion codes

    Energy Technology Data Exchange (ETDEWEB)

    Basher, J C [General Reactor Physics Division, Atomic Energy Establishment, Winfrith, Dorchester, Dorset (United Kingdom)

    1965-05-15

    This report describes the FORTRAN programmes, FLIC 1 and FLIC 2. These programmes convert programmes coded in one dialect of FORTRAN to another dialect of the same language. FLIC 1 is a general pattern recognition and replacement programme whereas FLIC 2 contains extensions directed towards the conversion of FORTRAN II and S2 programmes to EGTRAN 1 - the dialect now in use on the Winfrith KDF9. FII or S2 statements are replaced where possible by their E1 equivalents; other statements which may need changing are flagged. (author)

  6. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  7. Further results on binary convolutional codes with an optimum distance profile

    DEFF Research Database (Denmark)

    Johannesson, Rolf; Paaske, Erik

    1978-01-01

    Fixed binary convolutional codes are considered which are simultaneously optimal or near-optimal according to three criteria: namely, distance profiled, free distanced_{ infty}, and minimum number of weightd_{infty}paths. It is shown how the optimum distance profile criterion can be used to limit...... codes. As a counterpart to quick-look-in (QLI) codes which are not "transparent," we introduce rateR = 1/2easy-look-in-transparent (ELIT) codes with a feedforward inverse(1 + D,D). In general, ELIT codes haved_{infty}superior to that of QLI codes....

  8. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    1997-01-01

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy...... machinery of algebraic geometry....

  9. Direct-semidirect (DSD) codes

    International Nuclear Information System (INIS)

    Cvelbar, F.

    1999-01-01

    Recent codes for direct-semidirect (DSD) model calculations in the form of answers to a detailed questionnaire are reviewed. These codes include those embodying the classical DSD approach covering only the transitions to the bound states (RAF, HIKARI, and those of the Bologna group), as well as the code CUPIDO++ that also treats transitions to unbound states. (author)

  10. Dual Coding, Reasoning and Fallacies.

    Science.gov (United States)

    Hample, Dale

    1982-01-01

    Develops the theory that a fallacy is not a comparison of a rhetorical text to a set of definitions but a comparison of one person's cognition with another's. Reviews Paivio's dual coding theory, relates nonverbal coding to reasoning processes, and generates a limited fallacy theory based on dual coding theory. (PD)

  11. Strongly-MDS convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Rosenthal, J; Smarandache, R

    Maximum-distance separable (MDS) convolutional codes have the property that their free distance is maximal among all codes of the same rate and the same degree. In this paper, a class of MDS convolutional codes is introduced whose column distances reach the generalized Singleton bound at the

  12. Lattice polytopes in coding theory

    Directory of Open Access Journals (Sweden)

    Ivan Soprunov

    2015-05-01

    Full Text Available In this paper we discuss combinatorial questions about lattice polytopes motivated by recent results on minimum distance estimation for toric codes. We also include a new inductive bound for the minimum distance of generalized toric codes. As an application, we give new formulas for the minimum distance of generalized toric codes for special lattice point configurations.

  13. Computer codes for safety analysis

    International Nuclear Information System (INIS)

    Holland, D.F.

    1986-11-01

    Computer codes for fusion safety analysis have been under development in the United States for about a decade. This paper will discuss five codes that are currently under development by the Fusion Safety Program. The purpose and capability of each code will be presented, a sample given, followed by a discussion of the present status and future development plans

  14. Geochemical computer codes. A review

    International Nuclear Information System (INIS)

    Andersson, K.

    1987-01-01

    In this report a review of available codes is performed and some code intercomparisons are also discussed. The number of codes treating natural waters (groundwater, lake water, sea water) is large. Most geochemical computer codes treat equilibrium conditions, although some codes with kinetic capability are available. A geochemical equilibrium model consists of a computer code, solving a set of equations by some numerical method and a data base, consisting of thermodynamic data required for the calculations. There are some codes which treat coupled geochemical and transport modeling. Some of these codes solve the equilibrium and transport equations simultaneously while other solve the equations separately from each other. The coupled codes require a large computer capacity and have thus as yet limited use. Three code intercomparisons have been found in literature. It may be concluded that there are many codes available for geochemical calculations but most of them require a user that us quite familiar with the code. The user also has to know the geochemical system in order to judge the reliability of the results. A high quality data base is necessary to obtain a reliable result. The best results may be expected for the major species of natural waters. For more complicated problems, including trace elements, precipitation/dissolution, adsorption, etc., the results seem to be less reliable. (With 44 refs.) (author)

  15. Separate Turbo Code and Single Turbo Code Adaptive OFDM Transmissions

    Directory of Open Access Journals (Sweden)

    Lei Ye

    2009-01-01

    Full Text Available This paper discusses the application of adaptive modulation and adaptive rate turbo coding to orthogonal frequency-division multiplexing (OFDM, to increase throughput on the time and frequency selective channel. The adaptive turbo code scheme is based on a subband adaptive method, and compares two adaptive systems: a conventional approach where a separate turbo code is used for each subband, and a single turbo code adaptive system which uses a single turbo code over all subbands. Five modulation schemes (BPSK, QPSK, 8AMPM, 16QAM, and 64QAM are employed and turbo code rates considered are 1/2 and 1/3. The performances of both systems with high (10−2 and low (10−4 BER targets are compared. Simulation results for throughput and BER show that the single turbo code adaptive system provides a significant improvement.

  16. New quantum codes constructed from quaternary BCH codes

    Science.gov (United States)

    Xu, Gen; Li, Ruihu; Guo, Luobin; Ma, Yuena

    2016-10-01

    In this paper, we firstly study construction of new quantum error-correcting codes (QECCs) from three classes of quaternary imprimitive BCH codes. As a result, the improved maximal designed distance of these narrow-sense imprimitive Hermitian dual-containing quaternary BCH codes are determined to be much larger than the result given according to Aly et al. (IEEE Trans Inf Theory 53:1183-1188, 2007) for each different code length. Thus, families of new QECCs are newly obtained, and the constructed QECCs have larger distance than those in the previous literature. Secondly, we apply a combinatorial construction to the imprimitive BCH codes with their corresponding primitive counterpart and construct many new linear quantum codes with good parameters, some of which have parameters exceeding the finite Gilbert-Varshamov bound for linear quantum codes.

  17. Separate Turbo Code and Single Turbo Code Adaptive OFDM Transmissions

    Directory of Open Access Journals (Sweden)

    Burr Alister

    2009-01-01

    Full Text Available Abstract This paper discusses the application of adaptive modulation and adaptive rate turbo coding to orthogonal frequency-division multiplexing (OFDM, to increase throughput on the time and frequency selective channel. The adaptive turbo code scheme is based on a subband adaptive method, and compares two adaptive systems: a conventional approach where a separate turbo code is used for each subband, and a single turbo code adaptive system which uses a single turbo code over all subbands. Five modulation schemes (BPSK, QPSK, 8AMPM, 16QAM, and 64QAM are employed and turbo code rates considered are and . The performances of both systems with high ( and low ( BER targets are compared. Simulation results for throughput and BER show that the single turbo code adaptive system provides a significant improvement.

  18. Converter of a continuous code into the Grey code

    International Nuclear Information System (INIS)

    Gonchar, A.I.; TrUbnikov, V.R.

    1979-01-01

    Described is a converter of a continuous code into the Grey code used in a 12-charged precision amplitude-to-digital converter to decrease the digital component of spectrometer differential nonlinearity to +0.7% in the 98% range of the measured band. To construct the converter of a continuous code corresponding to the input signal amplitude into the Grey code used is the regularity in recycling of units and zeroes in each discharge of the Grey code in the case of a continuous change of the number of pulses of a continuous code. The converter is constructed on the elements of 155 series, the frequency of continuous code pulse passing at the converter input is 25 MHz

  19. VVER-440 loading patterns optimization using ATHENA code

    International Nuclear Information System (INIS)

    Katovsky, K.; Sustek, J.; Bajgl, J.; Cada, R.

    2009-01-01

    In this paper the Czech optimization state-of-the-art, new code system development goals and OPAL optimization system are briefly mentioned. The algorithms, maths, present status and future developments of the ATHENA code are described. A calculation exercise of the Dukovany NPP cycles, on increased power using ATHENA, starting with on-coming 24th cycle (303 FPD) continuing with 25th (322 FPD), and 26th (336 FPD); for all cycles K R ≤1.54 is presented

  20. The computer code EURDYN-1M (release 2). User's manual

    International Nuclear Information System (INIS)

    1982-01-01

    EURDYN-1M is a finite element computer code developed at J.R.C. Ispra to compute the response of two-dimensional coupled fluid-structure configurations to transient dynamic loading for reactor safety studies. This report gives instructions for preparing input data to EURDYN-1M, release 2, and describes a test problem in order to illustrate both the input and the output of the code

  1. Nonuniform code concatenation for universal fault-tolerant quantum computing

    Science.gov (United States)

    Nikahd, Eesa; Sedighi, Mehdi; Saheb Zamani, Morteza

    2017-09-01

    Using transversal gates is a straightforward and efficient technique for fault-tolerant quantum computing. Since transversal gates alone cannot be computationally universal, they must be combined with other approaches such as magic state distillation, code switching, or code concatenation to achieve universality. In this paper we propose an alternative approach for universal fault-tolerant quantum computing, mainly based on the code concatenation approach proposed in [T. Jochym-O'Connor and R. Laflamme, Phys. Rev. Lett. 112, 010505 (2014), 10.1103/PhysRevLett.112.010505], but in a nonuniform fashion. The proposed approach is described based on nonuniform concatenation of the 7-qubit Steane code with the 15-qubit Reed-Muller code, as well as the 5-qubit code with the 15-qubit Reed-Muller code, which lead to two 49-qubit and 47-qubit codes, respectively. These codes can correct any arbitrary single physical error with the ability to perform a universal set of fault-tolerant gates, without using magic state distillation.

  2. Supervised Transfer Sparse Coding

    KAUST Repository

    Al-Shedivat, Maruan

    2014-07-27

    A combination of the sparse coding and transfer learn- ing techniques was shown to be accurate and robust in classification tasks where training and testing objects have a shared feature space but are sampled from differ- ent underlying distributions, i.e., belong to different do- mains. The key assumption in such case is that in spite of the domain disparity, samples from different domains share some common hidden factors. Previous methods often assumed that all the objects in the target domain are unlabeled, and thus the training set solely comprised objects from the source domain. However, in real world applications, the target domain often has some labeled objects, or one can always manually label a small num- ber of them. In this paper, we explore such possibil- ity and show how a small number of labeled data in the target domain can significantly leverage classifica- tion accuracy of the state-of-the-art transfer sparse cod- ing methods. We further propose a unified framework named supervised transfer sparse coding (STSC) which simultaneously optimizes sparse representation, domain transfer and classification. Experimental results on three applications demonstrate that a little manual labeling and then learning the model in a supervised fashion can significantly improve classification accuracy.

  3. Rapport: Coding Class - Dokumentation og evaluering

    DEFF Research Database (Denmark)

    Hansbøl, Mikala; Ejsing-Duun, Stine

    2017-01-01

    Denne rapport rummer evaluering og dokumentation af Coding Class projektet . Coding Class projektet blev igangsat i skoleåret 2016/2017 af IT-Branchen i samarbejde med en række medlemsvirksomheder, Københavns kommune, Vejle Kommune, Styrelsen for IT- og Læring (STIL) og den frivillige forening...... Coding Pirates . Rapporten er forfattet af Docent i digitale læringsressourcer og faglig leder af forsknings- og udviklingsmiljøet Digitalisering i Skolen (DiS), Mikala Hansbøl, fra Institut for Skole og Læring ved professionshøjskolen Metropol; og Lektor i læringsteknologi, interaktionsdesign, design...... tænkning og design-pædagogik, Stine Ejsing-Duun fra Forskningslab: It og Læringsdesign (ILD-LAB) ved Institut for Kommunikation ved Aalborg Universitet i København. Vi har fulgt og gennemført evaluering og dokumentation af Coding Class projektet i perioden november 2016 til maj 2017...

  4. Two-terminal video coding.

    Science.gov (United States)

    Yang, Yang; Stanković, Vladimir; Xiong, Zixiang; Zhao, Wei

    2009-03-01

    Following recent works on the rate region of the quadratic Gaussian two-terminal source coding problem and limit-approaching code designs, this paper examines multiterminal source coding of two correlated, i.e., stereo, video sequences to save the sum rate over independent coding of both sequences. Two multiterminal video coding schemes are proposed. In the first scheme, the left sequence of the stereo pair is coded by H.264/AVC and used at the joint decoder to facilitate Wyner-Ziv coding of the right video sequence. The first I-frame of the right sequence is successively coded by H.264/AVC Intracoding and Wyner-Ziv coding. An efficient stereo matching algorithm based on loopy belief propagation is then adopted at the decoder to produce pixel-level disparity maps between the corresponding frames of the two decoded video sequences on the fly. Based on the disparity maps, side information for both motion vectors and motion-compensated residual frames of the right sequence are generated at the decoder before Wyner-Ziv encoding. In the second scheme, source splitting is employed on top of classic and Wyner-Ziv coding for compression of both I-frames to allow flexible rate allocation between the two sequences. Experiments with both schemes on stereo video sequences using H.264/AVC, LDPC codes for Slepian-Wolf coding of the motion vectors, and scalar quantization in conjunction with LDPC codes for Wyner-Ziv coding of the residual coefficients give a slightly lower sum rate than separate H.264/AVC coding of both sequences at the same video quality.

  5. TractoR: Magnetic Resonance Imaging and Tractography with R

    Directory of Open Access Journals (Sweden)

    Chris A. Clark

    2011-10-01

    Full Text Available Statistical techniques play a major role in contemporary methods for analyzing magnetic resonance imaging (MRI data. In addition to the central role that classical statistical methods play in research using MRI, statistical modeling and machine learning techniques are key to many modern data analysis pipelines. Applications for these techniques cover a broad spectrum of research, including many preclinical and clinical studies, and in some cases these methods are working their way into widespread routine use. In this manuscript we describe a software tool called TractoR (for “Tractography with R”, a collection of packages for the R language and environment, along with additional infrastructure for straightforwardly performing common image processing tasks. TractoR provides general purpose functions for reading, writing and manipulating MR images, as well as more specific code for fitting signal models to diffusion MRI data and performing tractography, a technique for visualizing neural connectivity.

  6. Emergency readmissions to paediatric surgery and urology: The impact of inappropriate coding.

    Science.gov (United States)

    Peeraully, R; Henderson, K; Davies, B

    2016-04-01

    Introduction In England, emergency readmissions within 30 days of hospital discharge after an elective admission are not reimbursed if they do not meet Payment by Results (PbR) exclusion criteria. However, coding errors could inappropriately penalise hospitals. We aimed to assess the accuracy of coding for emergency readmissions. Methods Emergency readmissions attributed to paediatric surgery and urology between September 2012 and August 2014 to our tertiary referral centre were retrospectively reviewed. Payment by Results (PbR) coding data were obtained from the hospital's Family Health Directorate. Clinical details were obtained from contemporaneous records. All readmissions were categorised as appropriately coded (postoperative or nonoperative) or inappropriately coded (planned surgical readmission, unrelated surgical admission, unrelated medical admission or coding error). Results Over the 24-month period, 241 patients were coded as 30-day readmissions, with 143 (59%) meeting the PbR exclusion criteria. Of the remaining 98 (41%) patients, 24 (25%) were inappropriately coded as emergency readmissions. These readmissions resulted in 352 extra bed days, of which 117 (33%) were attributable to inappropriately coded cases. Conclusions One-quarter of non-excluded emergency readmissions were inappropriately coded, accounting for one-third of additional bed days. As a stay on a paediatric ward costs up to £500 a day, the potential cost to our institution due to inappropriate readmission coding was over £50,000. Diagnoses and the reason for admission for each care episode should be accurately documented and coded, and readmission data should be reviewed at a senior clinician level.

  7. The Art of Readable Code

    CERN Document Server

    Boswell, Dustin

    2011-01-01

    As programmers, we've all seen source code that's so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they're bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it-even if that someone else is you. This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languag

  8. Sub-Transport Layer Coding

    DEFF Research Database (Denmark)

    Hansen, Jonas; Krigslund, Jeppe; Roetter, Daniel Enrique Lucani

    2014-01-01

    Packet losses in wireless networks dramatically curbs the performance of TCP. This paper introduces a simple coding shim that aids IP-layer traffic in lossy environments while being transparent to transport layer protocols. The proposed coding approach enables erasure correction while being...... oblivious to the congestion control algorithms of the utilised transport layer protocol. Although our coding shim is indifferent towards the transport layer protocol, we focus on the performance of TCP when ran on top of our proposed coding mechanism due to its widespread use. The coding shim provides gains...

  9. Comparison of beam deposition for three neutral beam injection codes

    International Nuclear Information System (INIS)

    Wieland, R.M.; Houlberg, W.A.; Mense, A.T.

    1979-03-01

    The three neutral beam injection codes BEAM (Houlberg, ORNL), HOFR (Howe, ORNL), and FREYA (Post, PPPL) are compared with respect to the calculation of the fast ion deposition profile H(r). Only plasmas of circular cross section are considered, with injection confined to the mid-plane of the torus. The approximations inherent in each code are pointed out, and a series of comparisons varying several parameters (beam energy and radius, machine size, and injection angle) shows excellent agreement among all the codes. A cost comparison (execution time and memory requirements) is made which points out the relative merits of each code within the context of incorporation into a plasma transport simulation code

  10. 75 FR 19944 - International Code Council: The Update Process for the International Codes and Standards

    Science.gov (United States)

    2010-04-16

    ... documents from ICC's Chicago District Office: International Code Council, 4051 W Flossmoor Road, Country... Energy Conservation Code. International Existing Building Code. International Fire Code. International...

  11. ORMEC: a three-dimensional MHD spectral inverse equilibrium code

    International Nuclear Information System (INIS)

    Hirshman, S.P.; Hogan, J.T.

    1986-02-01

    The Oak Ridge Moments Equilibrium Code (ORMEC) is an efficient computer code that has been developed to calculate three-dimensional MHD equilibria using the inverse spectral method. The fixed boundary formulation, which is based on a variational principle for the spectral coefficients (moments) of the cylindrical coordinates R and Z, is described and compared with the finite difference code BETA developed by Bauer, Betancourt, and Garabedian. Calculations for the Heliotron, Wendelstein VIIA, and Advanced Toroidal Facility (ATF) configurations are performed to establish the accuracy and mesh convergence properties for the spectral method. 16 refs., 13 figs

  12. Riemann-Roch Spaces and Linear Network Codes

    DEFF Research Database (Denmark)

    Hansen, Johan P.

    We construct linear network codes utilizing algebraic curves over finite fields and certain associated Riemann-Roch spaces and present methods to obtain their parameters. In particular we treat the Hermitian curve and the curves associated with the Suzuki and Ree groups all having the maximal...... number of points for curves of their respective genera. Linear network coding transmits information in terms of a basis of a vector space and the information is received as a basis of a possibly altered vector space. Ralf Koetter and Frank R. Kschischang %\\cite{DBLP:journals/tit/KoetterK08} introduced...... in the above metric making them suitable for linear network coding....

  13. Introduction of SCIENCE code package

    International Nuclear Information System (INIS)

    Lu Haoliang; Li Jinggang; Zhu Ya'nan; Bai Ning

    2012-01-01

    The SCIENCE code package is a set of neutronics tools based on 2D assembly calculations and 3D core calculations. It is made up of APOLLO2F, SMART and SQUALE and used to perform the nuclear design and loading pattern analysis for the reactors on operation or under construction of China Guangdong Nuclear Power Group. The purpose of paper is to briefly present the physical and numerical models used in each computation codes of the SCIENCE code pack age, including the description of the general structure of the code package, the coupling relationship of APOLLO2-F transport lattice code and SMART core nodal code, and the SQUALE code used for processing the core maps. (authors)

  14. Elements of algebraic coding systems

    CERN Document Server

    Cardoso da Rocha, Jr, Valdemar

    2014-01-01

    Elements of Algebraic Coding Systems is an introductory text to algebraic coding theory. In the first chapter, you'll gain inside knowledge of coding fundamentals, which is essential for a deeper understanding of state-of-the-art coding systems. This book is a quick reference for those who are unfamiliar with this topic, as well as for use with specific applications such as cryptography and communication. Linear error-correcting block codes through elementary principles span eleven chapters of the text. Cyclic codes, some finite field algebra, Goppa codes, algebraic decoding algorithms, and applications in public-key cryptography and secret-key cryptography are discussed, including problems and solutions at the end of each chapter. Three appendices cover the Gilbert bound and some related derivations, a derivation of the Mac- Williams' identities based on the probability of undetected error, and two important tools for algebraic decoding-namely, the finite field Fourier transform and the Euclidean algorithm f...

  15. TURTLE 24.0 diffusion depletion code

    International Nuclear Information System (INIS)

    Altomare, S.; Barry, R.F.

    1971-09-01

    TURTLE is a two-group, two-dimensional (x-y, x-z, r-z) neutron diffusion code featuring a direct treatment of the nonlinear effects of xenon, enthalpy, and Doppler. Fuel depletion is allowed. TURTLE was written for the study of azimuthal xenon oscillations, but the code is useful for general analysis. The input is simple, fuel management is handled directly, and a boron criticality search is allowed. Ten thousand space points are allowed (over 20,000 with diagonal symmetry). TURTLE is written in FORTRAN IV and is tailored for the present CDC-6600. The program is core-contained. Provision is made to save data on tape for future reference. (auth)

  16. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    of interfering nodes and usage of spatial reservation mechanisms. Specifically, we introduce a reserved area in order to protect the nodes involved in two-way relaying from the interference caused by neighboring nodes. We analytically derive the end-to-end rate achieved by PLNC considering the impact......Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause....../receive interference. The way to deal with this problem in distributed wireless networks is usage of MAC-layer mechanisms that make a spatial reservation of the shared wireless medium, similar to the well-known RTS/CTS in IEEE 802.11 wireless networks. In this paper, we investigate two-way relaying in presence...

  17. Concatenated quantum codes

    Energy Technology Data Exchange (ETDEWEB)

    Knill, E.; Laflamme, R.

    1996-07-01

    One main problem for the future of practial quantum computing is to stabilize the computation against unwanted interactions with the environment and imperfections in the applied operations. Existing proposals for quantum memories and quantum channels require gates with asymptotically zero error to store or transmit an input quantum state for arbitrarily long times or distances with fixed error. This report gives a method which has the property that to store or transmit a qubit with maximum error {epsilon} requires gates with errors at most {ital c}{epsilon} and storage or channel elements with error at most {epsilon}, independent of how long we wish to store the state or how far we wish to transmit it. The method relies on using concatenated quantum codes and hierarchically implemented recovery operations. The overhead of the method is polynomial in the time of storage or the distance of the transmission. Rigorous and heuristic lower bounds for the constant {ital c} are given.

  18. Code des baux 2018

    CERN Document Server

    Vial-Pedroletti, Béatrice; Kendérian, Fabien; Chavance, Emmanuelle; Coutan-Lapalus, Christelle

    2017-01-01

    Le code des baux 2018 vous offre un contenu extrêmement pratique, fiable et à jour au 1er août 2017. Cette 16e édition intègre notamment : le décret du 27 juillet 2017 relatif à l’évolution de certains loyers dans le cadre d’une nouvelle location ou d’un renouvellement de bail, pris en application de l’article 18 de la loi n° 89-462 du 6 juillet 1989 ; la loi du 27 janvier 2017 relative à l’égalité et à la citoyenneté ; la loi du 9 décembre 2016 relative à la transparence, à la lutte contre la corruption et à la modernisation de la vie économique ; la loi du 18 novembre 2016 de modernisation de la justice du xxie siècle

  19. GOC: General Orbit Code

    International Nuclear Information System (INIS)

    Maddox, L.B.; McNeilly, G.S.

    1979-08-01

    GOC (General Orbit Code) is a versatile program which will perform a variety of calculations relevant to isochronous cyclotron design studies. In addition to the usual calculations of interest (e.g., equilibrium and accelerated orbits, focusing frequencies, field isochronization, etc.), GOC has a number of options to calculate injections with a charge change. GOC provides both printed and plotted output, and will follow groups of particles to allow determination of finite-beam properties. An interactive PDP-10 program called GIP, which prepares input data for GOC, is available. GIP is a very easy and convenient way to prepare complicated input data for GOC. Enclosed with this report are several microfiche containing source listings of GOC and other related routines and the printed output from a multiple-option GOC run

  20. Using DEWIS and R for Multi-Staged Statistics e-Assessments

    Science.gov (United States)

    Gwynllyw, D. Rhys; Weir, Iain S.; Henderson, Karen L.

    2016-01-01

    We demonstrate how the DEWIS e-Assessment system may use embedded R code to facilitate the assessment of students' ability to perform involved statistical analyses. The R code has been written to emulate SPSS output and thus the statistical results for each bespoke data set can be generated efficiently and accurately using standard R routines.…

  1. Biocomputational prediction of small non-coding RNAs in Streptomyces

    Czech Academy of Sciences Publication Activity Database

    Pánek, Josef; Bobek, Jan; Mikulík, Karel; Basler, Marek; Vohradský, Jiří

    2008-01-01

    Roč. 9, č. 217 (2008), s. 1-14 ISSN 1471-2164 R&D Projects: GA ČR GP204/07/P361; GA ČR GA203/05/0106; GA ČR GA310/07/1009 Grant - others:XE(XE) EC Integrated Project ActinoGEN, LSHM-CT-2004-005224. Institutional research plan: CEZ:AV0Z50200510 Keywords : non-coding RNA * streptomyces * biocomputational prediction Subject RIV: IN - Informatics, Computer Science Impact factor: 3.926, year: 2008

  2. LDGM Codes for Channel Coding and Joint Source-Channel Coding of Correlated Sources

    Directory of Open Access Journals (Sweden)

    Javier Garcia-Frias

    2005-05-01

    Full Text Available We propose a coding scheme based on the use of systematic linear codes with low-density generator matrix (LDGM codes for channel coding and joint source-channel coding of multiterminal correlated binary sources. In both cases, the structures of the LDGM encoder and decoder are shown, and a concatenated scheme aimed at reducing the error floor is proposed. Several decoding possibilities are investigated, compared, and evaluated. For different types of noisy channels and correlation models, the resulting performance is very close to the theoretical limits.

  3. Surface acoustic wave coding for orthogonal frequency coded devices

    Science.gov (United States)

    Malocha, Donald (Inventor); Kozlovski, Nikolai (Inventor)

    2011-01-01

    Methods and systems for coding SAW OFC devices to mitigate code collisions in a wireless multi-tag system. Each device producing plural stepped frequencies as an OFC signal with a chip offset delay to increase code diversity. A method for assigning a different OCF to each device includes using a matrix based on the number of OFCs needed and the number chips per code, populating each matrix cell with OFC chip, and assigning the codes from the matrix to the devices. The asynchronous passive multi-tag system includes plural surface acoustic wave devices each producing a different OFC signal having the same number of chips and including a chip offset time delay, an algorithm for assigning OFCs to each device, and a transceiver to transmit an interrogation signal and receive OFC signals in response with minimal code collisions during transmission.

  4. Entanglement-assisted quantum MDS codes from negacyclic codes

    Science.gov (United States)

    Lu, Liangdong; Li, Ruihu; Guo, Luobin; Ma, Yuena; Liu, Yang

    2018-03-01

    The entanglement-assisted formalism generalizes the standard stabilizer formalism, which can transform arbitrary classical linear codes into entanglement-assisted quantum error-correcting codes (EAQECCs) by using pre-shared entanglement between the sender and the receiver. In this work, we construct six classes of q-ary entanglement-assisted quantum MDS (EAQMDS) codes based on classical negacyclic MDS codes by exploiting two or more pre-shared maximally entangled states. We show that two of these six classes q-ary EAQMDS have minimum distance more larger than q+1. Most of these q-ary EAQMDS codes are new in the sense that their parameters are not covered by the codes available in the literature.

  5. An algebraic approach to graph codes

    DEFF Research Database (Denmark)

    Pinero, Fernando

    This thesis consists of six chapters. The first chapter, contains a short introduction to coding theory in which we explain the coding theory concepts we use. In the second chapter, we present the required theory for evaluation codes and also give an example of some fundamental codes in coding...... theory as evaluation codes. Chapter three consists of the introduction to graph based codes, such as Tanner codes and graph codes. In Chapter four, we compute the dimension of some graph based codes with a result combining graph based codes and subfield subcodes. Moreover, some codes in chapter four...

  6. Diagonal Eigenvalue Unity (DEU) code for spectral amplitude coding-optical code division multiple access

    Science.gov (United States)

    Ahmed, Hassan Yousif; Nisar, K. S.

    2013-08-01

    Code with ideal in-phase cross correlation (CC) and practical code length to support high number of users are required in spectral amplitude coding-optical code division multiple access (SAC-OCDMA) systems. SAC systems are getting more attractive in the field of OCDMA because of its ability to eliminate the influence of multiple access interference (MAI) and also suppress the effect of phase induced intensity noise (PIIN). In this paper, we have proposed new Diagonal Eigenvalue Unity (DEU) code families with ideal in-phase CC based on Jordan block matrix with simple algebraic ways. Four sets of DEU code families based on the code weight W and number of users N for the combination (even, even), (even, odd), (odd, odd) and (odd, even) are constructed. This combination gives DEU code more flexibility in selection of code weight and number of users. These features made this code a compelling candidate for future optical communication systems. Numerical results show that the proposed DEU system outperforms reported codes. In addition, simulation results taken from a commercial optical systems simulator, Virtual Photonic Instrument (VPI™) shown that, using point to multipoint transmission in passive optical network (PON), DEU has better performance and could support long span with high data rate.

  7. Operational reactor physics analysis codes (ORPAC)

    International Nuclear Information System (INIS)

    Kumar, Jainendra; Singh, K.P.; Singh, Kanchhi

    2007-07-01

    For efficient, smooth and safe operation of a nuclear research reactor, many reactor physics evaluations are regularly required. As part of reactor core management the important activities are maintaining core reactivity status, core power distribution, xenon estimations, safety evaluation of in-pile irradiation samples and experimental assemblies and assessment of nuclear safety in fuel handling/storage. In-pile irradiation of samples requires a prior estimation of the reactivity load due to the sample, the heating rate and the activity developed in it during irradiation. For the safety of personnel handling irradiated samples the dose rate at the surface of shielded flask housing the irradiated sample should be less than 200 mR/Hr.Therefore, a proper shielding and radioactive cooling of the irradiated sample are required to meet the said requirement. Knowledge of xenon load variation with time (Startup-curve) helps in estimating Xenon override time. Monitoring of power in individual fuel channels during reactor operation is essential to know any abnormal power distribution to avoid unsafe situations. Complexities in the estimation of above mentioned reactor parameters and their frequent requirement compel one to use computer codes to avoid possible human errors. For efficient and quick evaluation of parameters related to reactor operations such as xenon load, critical moderator height and nuclear heating and reactivity load of isotope samples/experimental assembly, a computer code ORPAC (Operational Reactor Physics Analysis Codes) has been developed. This code is being used for regular assessment of reactor physics parameters in Dhruva and Cirus. The code ORPAC written in Visual Basic 6.0 environment incorporates several important operational reactor physics aspects on a single platform with graphical user interfaces (GUI) to make it more user-friendly and presentable. (author)

  8. State of art in FE-based fuel performance codes

    International Nuclear Information System (INIS)

    Kim, Hyo Chan; Yang, Yong Sik; Kim, Dae Ho; Bang, Je Geon; Kim, Sun Ki; Koo, Yang Hyun

    2013-01-01

    Finite element (FE) method that is reliable and proven solution in mechanical field has been introduced into fuel performance codes for multidimensional analysis. The present state of the art in numerical simulation of FE-based fuel performance predominantly involves 2-D axisymmetric model and 3-D volumetric model. The FRAPCON and FRAPTRAN own 1.5-D and 2-D FE model to simulate PCMI and cladding ballooning. In 2-D simulation, the FALCON code, developed by EPRI, is a 2-D (R-Z and R-θ) fully thermal-mechanically coupled steady-state and transient FE-based fuel behavior code. The French codes TOUTATIS and ALCYONE which are 3-D, and typically used to investigate localized behavior. In 2008, the Idaho National Laboratory (INL) has been developing multidimensional (2-D and 3-D) nuclear fuel performance code called BISON. In this paper, the current state of FE-based fuel performance code and their models are presented. Based on investigation into the codes, requirements and direction of development for new FE-based fuel performance code can be discussed. Based on comparison of models in FE-based fuel performance code, status of art in the codes can be discussed. A new FE-based fuel performance code should include typical pellet and cladding models which all codes own. In particular, specified pellet and cladding model such as gaseous swelling and high burnup structure (HBS) model should be developed to improve accuracy of code as well as consider AC condition. To reduce computation cost, the approximated gap and the optimized contact model should be also developed. Nuclear fuel operates in an extreme environment that induces complex multiphysics phenomena, occurring over distances ranging from inter-atomic spacing to meters, and times scales ranging from microseconds to years. This multiphysics behavior is often tightly coupled, a well known example being the thermomechanical behavior. Adding to this complexity, important aspects of fuel behavior are inherently

  9. Error correcting coding for OTN

    DEFF Research Database (Denmark)

    Justesen, Jørn; Larsen, Knud J.; Pedersen, Lars A.

    2010-01-01

    Forward error correction codes for 100 Gb/s optical transmission are currently receiving much attention from transport network operators and technology providers. We discuss the performance of hard decision decoding using product type codes that cover a single OTN frame or a small number...... of such frames. In particular we argue that a three-error correcting BCH is the best choice for the component code in such systems....

  10. Numerical Tokamak Project code comparison

    International Nuclear Information System (INIS)

    Waltz, R.E.; Cohen, B.I.; Beer, M.A.

    1994-01-01

    The Numerical Tokamak Project undertook a code comparison using a set of TFTR tokamak parameters. Local radial annulus codes of both gyrokinetic and gyrofluid types were compared for both slab and toroidal case limits assuming ion temperature gradient mode turbulence in a pure plasma with adiabatic electrons. The heat diffusivities were found to be in good internal agreement within ± 50% of the group average over five codes

  11. Ethical codes in business practice

    OpenAIRE

    Kobrlová, Marie

    2013-01-01

    The diploma thesis discusses the issues of ethics and codes of ethics in business. The theoretical part defines basic concepts of ethics, presents its historical development and the methods and tools of business ethics. It also focuses on ethical codes and the area of law and ethics. The practical part consists of a quantitative survey, which provides views of selected business entities of business ethics and the use of codes of ethics in practice.

  12. QR code for medical information uses.

    Science.gov (United States)

    Fontelo, Paul; Liu, Fang; Ducut, Erick G

    2008-11-06

    We developed QR code online tools, simulated and tested QR code applications for medical information uses including scanning QR code labels, URLs and authentication. Our results show possible applications for QR code in medicine.

  13. High Order Modulation Protograph Codes

    Science.gov (United States)

    Nguyen, Thuy V. (Inventor); Nosratinia, Aria (Inventor); Divsalar, Dariush (Inventor)

    2014-01-01

    Digital communication coding methods for designing protograph-based bit-interleaved code modulation that is general and applies to any modulation. The general coding framework can support not only multiple rates but also adaptive modulation. The method is a two stage lifting approach. In the first stage, an original protograph is lifted to a slightly larger intermediate protograph. The intermediate protograph is then lifted via a circulant matrix to the expected codeword length to form a protograph-based low-density parity-check code.

  14. Semi-supervised sparse coding

    KAUST Repository

    Wang, Jim Jing-Yan; Gao, Xin

    2014-01-01

    Sparse coding approximates the data sample as a sparse linear combination of some basic codewords and uses the sparse codes as new presentations. In this paper, we investigate learning discriminative sparse codes by sparse coding in a semi-supervised manner, where only a few training samples are labeled. By using the manifold structure spanned by the data set of both labeled and unlabeled samples and the constraints provided by the labels of the labeled samples, we learn the variable class labels for all the samples. Furthermore, to improve the discriminative ability of the learned sparse codes, we assume that the class labels could be predicted from the sparse codes directly using a linear classifier. By solving the codebook, sparse codes, class labels and classifier parameters simultaneously in a unified objective function, we develop a semi-supervised sparse coding algorithm. Experiments on two real-world pattern recognition problems demonstrate the advantage of the proposed methods over supervised sparse coding methods on partially labeled data sets.

  15. Programming Entity Framework Code First

    CERN Document Server

    Lerman, Julia

    2011-01-01

    Take advantage of the Code First data modeling approach in ADO.NET Entity Framework, and learn how to build and configure a model based on existing classes in your business domain. With this concise book, you'll work hands-on with examples to learn how Code First can create an in-memory model and database by default, and how you can exert more control over the model through further configuration. Code First provides an alternative to the database first and model first approaches to the Entity Data Model. Learn the benefits of defining your model with code, whether you're working with an exis

  16. User manual of UNF code

    International Nuclear Information System (INIS)

    Zhang Jingshang

    2001-01-01

    The UNF code (2001 version) written in FORTRAN-90 is developed for calculating fast neutron reaction data of structure materials with incident energies from about 1 Kev up to 20 Mev. The code consists of the spherical optical model, the unified Hauser-Feshbach and exciton model. The man nal of the UNF code is available for users. The format of the input parameter files and the output files, as well as the functions of flag used in UNF code, are introduced in detail, and the examples of the format of input parameters files are given

  17. Semi-supervised sparse coding

    KAUST Repository

    Wang, Jim Jing-Yan

    2014-07-06

    Sparse coding approximates the data sample as a sparse linear combination of some basic codewords and uses the sparse codes as new presentations. In this paper, we investigate learning discriminative sparse codes by sparse coding in a semi-supervised manner, where only a few training samples are labeled. By using the manifold structure spanned by the data set of both labeled and unlabeled samples and the constraints provided by the labels of the labeled samples, we learn the variable class labels for all the samples. Furthermore, to improve the discriminative ability of the learned sparse codes, we assume that the class labels could be predicted from the sparse codes directly using a linear classifier. By solving the codebook, sparse codes, class labels and classifier parameters simultaneously in a unified objective function, we develop a semi-supervised sparse coding algorithm. Experiments on two real-world pattern recognition problems demonstrate the advantage of the proposed methods over supervised sparse coding methods on partially labeled data sets.

  18. System performance with R407A, R407B, R407C compared to R22

    DEFF Research Database (Denmark)

    Knudsen, Hans Jørgen Høgaard

    1997-01-01

    both the cooling capacity and COP are smaller then the cooling capacity and COP with R22. The cooling capacity for R407A and R407B is lower than the capacity for R22 for brine temperatures less than 0 C and higher then the cooling capacity for R22 for brine temperatures higher than 0 C. The COP for R......407A and R407B er lower than the COP for R22.The volumetric and isentropic efficiency of the compressor are with mixture higher than the volumetric and isentropic efficiency with R22.......The article presents the results obtained by substituting R22 with mixture of R32/R125/R134A (R407A, R407B and R407C) in an existing refrigeration plant. Cooling capacity, coefficient of performance and heat transfer coefficient in the evaporator have been measured.The results show that for R407C...

  19. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup

    2017-12-01

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high-dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaicing and 4D light field view synthesis.

  20. Coded aperture tomography revisited

    International Nuclear Information System (INIS)

    Bizais, Y.; Rowe, R.W.; Zubal, I.G.; Bennett, G.W.; Brill, A.B.

    1983-01-01

    Coded aperture (CA) Tomography never achieved wide spread use in Nuclear Medicine, except for the degenerate case of Seven Pinhole tomagraphy (7PHT). However it enjoys several attractive features (high sensitivity and tomographic ability with a statis detector). On the other hand, resolution is usually poor especially along the depth axis and the reconstructed volume is rather limited. Arguments are presented justifying the position that CA tomography can be useful for imaging time-varying 3D structures, if its major drawbacks (poor longitudinal resolution and difficulty in quantification) are overcome. Poor results obtained with 7PHT can be explained by both a very limited angular range sampled and a crude modelling of the image formation process. Therefore improvements can be expected by the use of a dual-detector system, along with a better understanding of its sampling properties and the use of more powerful reconstruction algorithms. Non overlapping multipinhole plates, because they do not involve a decoding procedure, should be considered first for practical applications. Use of real CA should be considered for cases in which non overlapping multipinhole plates do not lead to satisfactory solutions. We have been and currently are carrying out theoretical and experimental works, in order to define the factors which limit CA imaging and to propose satisfactory solutions for Dynamic Emission Tomography

  1. Mobile code security

    Science.gov (United States)

    Ramalingam, Srikumar

    2001-11-01

    A highly secure mobile agent system is very important for a mobile computing environment. The security issues in mobile agent system comprise protecting mobile hosts from malicious agents, protecting agents from other malicious agents, protecting hosts from other malicious hosts and protecting agents from malicious hosts. Using traditional security mechanisms the first three security problems can be solved. Apart from using trusted hardware, very few approaches exist to protect mobile code from malicious hosts. Some of the approaches to solve this problem are the use of trusted computing, computing with encrypted function, steganography, cryptographic traces, Seal Calculas, etc. This paper focuses on the simulation of some of these existing techniques in the designed mobile language. Some new approaches to solve malicious network problem and agent tampering problem are developed using public key encryption system and steganographic concepts. The approaches are based on encrypting and hiding the partial solutions of the mobile agents. The partial results are stored and the address of the storage is destroyed as the agent moves from one host to another host. This allows only the originator to make use of the partial results. Through these approaches some of the existing problems are solved.

  2. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup

    2017-04-11

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaickingand 4D light field view synthesis.

  3. Coding, cryptography and combinatorics

    CERN Document Server

    Niederreiter, Harald; Xing, Chaoping

    2004-01-01

    It has long been recognized that there are fascinating connections between cod­ ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi­ natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the p...

  4. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup; Swanson, Robin; Heide, Felix; Wetzstein, Gordon; Heidrich, Wolfgang

    2017-01-01

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high-dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaicing and 4D light field view synthesis.

  5. Computer code abstract: NESTLE

    International Nuclear Information System (INIS)

    Turinsky, P.J.; Al-Chalabi, R.M.K.; Engrand, P.; Sarsour, H.N.; Faure, F.X.; Guo, W.

    1995-01-01

    NESTLE is a few-group neutron diffusion equation solver utilizing the nodal expansion method (NEM) for eigenvalue, adjoint, and fixed-source steady-state and transient problems. The NESTLE code solve the eigenvalue (criticality), eigenvalue adjoint, external fixed-source steady-state, and external fixed-source or eigenvalue initiated transient problems. The eigenvalue problem allows criticality searches to be completed, and the external fixed-source steady-state problem can search to achieve a specified power level. Transient problems model delayed neutrons via precursor groups. Several core properties can be input as time dependent. Two- or four-energy groups can be utilized, with all energy groups being thermal groups (i.e., upscatter exits) is desired. Core geometries modeled include Cartesian and hexagonal. Three-, two-, and one-dimensional models can be utilized with various symmetries. The thermal conditions predicted by the thermal-hydraulic model of the core are used to correct cross sections for temperature and density effects. Cross sections for temperature and density effects. Cross sections are parameterized by color, control rod state (i.e., in or out), and burnup, allowing fuel depletion to be modeled. Either a macroscopic or microscopic model may be employed

  6. Decoding of interleaved Reed-Solomon codes using improved power decoding

    DEFF Research Database (Denmark)

    Puchinger, Sven; Rosenkilde ne Nielsen, Johan

    2017-01-01

    We propose a new partial decoding algorithm for m-interleaved Reed-Solomon (IRS) codes that can decode, with high probability, a random error of relative weight 1 − Rm/m+1 at all code rates R, in time polynomial in the code length n. For m > 2, this is an asymptotic improvement over the previous...... state-of-the-art for all rates, and the first improvement for R > 1/3 in the last 20 years. The method combines collaborative decoding of IRS codes with power decoding up to the Johnson radius....

  7. Joint source-channel coding using variable length codes

    NARCIS (Netherlands)

    Balakirsky, V.B.

    2001-01-01

    We address the problem of joint source-channel coding when variable-length codes are used for information transmission over a discrete memoryless channel. Data transmitted over the channel are interpreted as pairs (m k ,t k ), where m k is a message generated by the source and t k is a time instant

  8. MOMCON: A spectral code for obtaining three-dimensional magnetohydrodynamic equilibria

    International Nuclear Information System (INIS)

    Hirshman, S.P.; Lee, D.K.

    1986-01-01

    A new code, MOMCON (spectral moments code with constraints), is described that computes three-dimensional ideal magnetohydrodynamic (MHD) equilibria in a fixed toroidal domain using a Fourier expansion for the inverse coordinates (R, Z) representing nested magnetic surfaces. A set of nonlinear coupled ordinary differential equations for the spectral coefficients of (R, Z) is solved using an accelerated steepest descent method. A stream function, lambda, is introduced to improve the mode convergence properties of the Fourier series for R and Z. The convergence rate of the R-Z spectra is optimized on each flux surface by solving nonlinear constraint equations relating the m>=2 spectral coefficients of R and Z. (orig.)

  9. Interrelations of codes in human semiotic systems.

    OpenAIRE

    Somov, Georgij

    2016-01-01

    Codes can be viewed as mechanisms that enable relations of signs and their components, i.e., semiosis is actualized. The combinations of these relations produce new relations as new codes are building over other codes. Structures appear in the mechanisms of codes. Hence, codes can be described as transformations of structures from some material systems into others. Structures belong to different carriers, but exist in codes in their "pure" form. Building of codes over other codes fosters t...

  10. Further Generalisations of Twisted Gabidulin Codes

    DEFF Research Database (Denmark)

    Puchinger, Sven; Rosenkilde, Johan Sebastian Heesemann; Sheekey, John

    2017-01-01

    We present a new family of maximum rank distance (MRD) codes. The new class contains codes that are neither equivalent to a generalised Gabidulin nor to a twisted Gabidulin code, the only two known general constructions of linear MRD codes.......We present a new family of maximum rank distance (MRD) codes. The new class contains codes that are neither equivalent to a generalised Gabidulin nor to a twisted Gabidulin code, the only two known general constructions of linear MRD codes....

  11. Mirage, a food chain transfer and dosimetric impact code in relation with atmospheric and liquid dispersion codes

    International Nuclear Information System (INIS)

    Van Dorpe, F.; Jourdain, F.

    2006-01-01

    Full text: The numerical code M.I.R.A.G.E. (Module of Radiological impact calculations on the Environment due to accidental or chronic nuclear releases through Aqueous and Gas media) has been developed to simulate the radionuclides transfer in the biosphere and food chains, as well as the dosimetric impact on man, after accidental or chronic releases in the environment by nuclear installations. The originality of M.I.R.A.G.E. is to propose a single tool chained downstream with various atmospheric and liquid dispersion codes. The code M.I.R.A.G.E. is a series of modules which makes it possible to carry out evaluations on the transfers in food chains and human dose impact. Currently, M.I.R.A.G.E. is chained with a Gaussian atmospheric dispersion code H.A.R.M.A.T.T.A.N. (Cea), a 3 D atmospheric dispersion code with Lagrangian model named M.I.N.E.R.V.E.-S.P.R.A.Y. (Aria Technology) and a 3 D groundwater transfer code named M.A.R.T.H.E. (B.R.G.M.). M.I.R.A.G.E. uses concentration or activity result files as initial data input for its calculations. The application initially calculates the concentrations in the various compartments of the environment (soils, plants, animals). The results are given in the shape of concentration and dose maps and also on a particular place called a reference group for dosimetric impact (like a village or a specific population group located around a nuclear installation). The input and output data of M.I.R.A.G.E. can have geographic coordinates and thus readable by a G.I.S. M.I.R.A.G. E.is an opened system with which it is easy to chain other codes of dispersion that those currently used. The calculations uncoupled with dispersion calculations are also possible by manual seizure of the dispersion data (contamination of a tablecloth, particular value in a point, etc.). M.I.R.A.G.E. takes into account soil deposits and resuspension phenomenon, transfers in plants and animals (choice of agricultural parameters, types of plants and animals, etc

  12. MARS Code in Linux Environment

    Energy Technology Data Exchange (ETDEWEB)

    Hwang, Moon Kyu; Bae, Sung Won; Jung, Jae Joon; Chung, Bub Dong [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    2005-07-01

    The two-phase system analysis code MARS has been incorporated into Linux system. The MARS code was originally developed based on the RELAP5/MOD3.2 and COBRA-TF. The 1-D module which evolved from RELAP5 alone could be applied for the whole NSSS system analysis. The 3-D module developed based on the COBRA-TF, however, could be applied for the analysis of the reactor core region where 3-D phenomena would be better treated. The MARS code also has several other code units that could be incorporated for more detailed analysis. The separate code units include containment analysis modules and 3-D kinetics module. These code modules could be optionally invoked to be coupled with the main MARS code. The containment code modules (CONTAIN and CONTEMPT), for example, could be utilized for the analysis of the plant containment phenomena in a coupled manner with the nuclear reactor system. The mass and energy interaction during the hypothetical coolant leakage accident could, thereby, be analyzed in a more realistic manner. In a similar way, 3-D kinetics could be incorporated for simulating the three dimensional reactor kinetic behavior, instead of using the built-in point kinetics model. The MARS code system, developed initially for the MS Windows environment, however, would not be adequate enough for the PC cluster system where multiple CPUs are available. When parallelism is to be eventually incorporated into the MARS code, MS Windows environment is not considered as an optimum platform. Linux environment, on the other hand, is generally being adopted as a preferred platform for the multiple codes executions as well as for the parallel application. In this study, MARS code has been modified for the adaptation of Linux platform. For the initial code modification, the Windows system specific features have been removed from the code. Since the coupling code module CONTAIN is originally in a form of dynamic load library (DLL) in the Windows system, a similar adaptation method

  13. Allele coding in genomic evaluation

    Directory of Open Access Journals (Sweden)

    Christensen Ole F

    2011-06-01

    Full Text Available Abstract Background Genomic data are used in animal breeding to assist genetic evaluation. Several models to estimate genomic breeding values have been studied. In general, two approaches have been used. One approach estimates the marker effects first and then, genomic breeding values are obtained by summing marker effects. In the second approach, genomic breeding values are estimated directly using an equivalent model with a genomic relationship matrix. Allele coding is the method chosen to assign values to the regression coefficients in the statistical model. A common allele coding is zero for the homozygous genotype of the first allele, one for the heterozygote, and two for the homozygous genotype for the other allele. Another common allele coding changes these regression coefficients by subtracting a value from each marker such that the mean of regression coefficients is zero within each marker. We call this centered allele coding. This study considered effects of different allele coding methods on inference. Both marker-based and equivalent models were considered, and restricted maximum likelihood and Bayesian methods were used in inference. Results Theoretical derivations showed that parameter estimates and estimated marker effects in marker-based models are the same irrespective of the allele coding, provided that the model has a fixed general mean. For the equivalent models, the same results hold, even though different allele coding methods lead to different genomic relationship matrices. Calculated genomic breeding values are independent of allele coding when the estimate of the general mean is included into the values. Reliabilities of estimated genomic breeding values calculated using elements of the inverse of the coefficient matrix depend on the allele coding because different allele coding methods imply different models. Finally, allele coding affects the mixing of Markov chain Monte Carlo algorithms, with the centered coding being

  14. MARS Code in Linux Environment

    International Nuclear Information System (INIS)

    Hwang, Moon Kyu; Bae, Sung Won; Jung, Jae Joon; Chung, Bub Dong

    2005-01-01

    The two-phase system analysis code MARS has been incorporated into Linux system. The MARS code was originally developed based on the RELAP5/MOD3.2 and COBRA-TF. The 1-D module which evolved from RELAP5 alone could be applied for the whole NSSS system analysis. The 3-D module developed based on the COBRA-TF, however, could be applied for the analysis of the reactor core region where 3-D phenomena would be better treated. The MARS code also has several other code units that could be incorporated for more detailed analysis. The separate code units include containment analysis modules and 3-D kinetics module. These code modules could be optionally invoked to be coupled with the main MARS code. The containment code modules (CONTAIN and CONTEMPT), for example, could be utilized for the analysis of the plant containment phenomena in a coupled manner with the nuclear reactor system. The mass and energy interaction during the hypothetical coolant leakage accident could, thereby, be analyzed in a more realistic manner. In a similar way, 3-D kinetics could be incorporated for simulating the three dimensional reactor kinetic behavior, instead of using the built-in point kinetics model. The MARS code system, developed initially for the MS Windows environment, however, would not be adequate enough for the PC cluster system where multiple CPUs are available. When parallelism is to be eventually incorporated into the MARS code, MS Windows environment is not considered as an optimum platform. Linux environment, on the other hand, is generally being adopted as a preferred platform for the multiple codes executions as well as for the parallel application. In this study, MARS code has been modified for the adaptation of Linux platform. For the initial code modification, the Windows system specific features have been removed from the code. Since the coupling code module CONTAIN is originally in a form of dynamic load library (DLL) in the Windows system, a similar adaptation method

  15. RSEIS and RFOC: Seismic Analysis in R

    Science.gov (United States)

    Lees, J. M.

    2015-12-01

    Open software is essential for reproducible scientific exchange. R-packages provide a platform for development of seismological investigation software that can be properly documented and traced for data processing. A suite of R packages designed for a wide range of seismic analysis is currently available in the free software platform called R. R is a software platform based on the S-language developed at Bell Labs decades ago. Routines in R can be run as standalone function calls, or developed in object-oriented mode. R comes with a base set of routines, and thousands of user developed packages. The packages developed at UNC include subroutines and interactive codes for processing seismic data, analyzing geographic information (GIS) and inverting data involved in a variety of geophysical applications. On CRAN (Comprehensive R Archive Network, http://www.r-project.org/) currently available packages related to seismic analysis are RSEIS, Rquake, GEOmap, RFOC, zoeppritz, RTOMO, and geophys, Rwave, PEIP, hht, rFDSN. These include signal processing, data management, mapping, earthquake location, deconvolution, focal mechanisms, wavelet transforms, Hilbert-Huang Transforms, tomographic inversion, and Mogi deformation among other useful functionality. All software in R packages is required to have detailed documentation, making the exchange and modification of existing software easy. In this presentation, I will focus on packages RSEIS and RFOC, showing examples from a variety of seismic analyses. The R approach has similarities to the popular (and expensive) MATLAB platform, although R is open source and free to down load.

  16. Design of Packet-Based Block Codes with Shift Operators

    Directory of Open Access Journals (Sweden)

    Jacek Ilow

    2010-01-01

    Full Text Available This paper introduces packet-oriented block codes for the recovery of lost packets and the correction of an erroneous single packet. Specifically, a family of systematic codes is proposed, based on a Vandermonde matrix applied to a group of k information packets to construct r redundant packets, where the elements of the Vandermonde matrix are bit-level right arithmetic shift operators. The code design is applicable to packets of any size, provided that the packets within a block of k information packets are of uniform length. In order to decrease the overhead associated with packet padding using shift operators, non-Vandermonde matrices are also proposed for designing packet-oriented block codes. An efficient matrix inversion procedure for the off-line design of the decoding algorithm is presented to recover lost packets. The error correction capability of the design is investigated as well. The decoding algorithm, based on syndrome decoding, to correct a single erroneous packet in a group of n=k+r received packets is presented. The paper is equipped with examples of codes using different parameters. The code designs and their performance are tested using Monte Carlo simulations; the results obtained exhibit good agreement with the corresponding theoretical results.

  17. Specific structural probing of plasmid-coded ribosomal RNAs from Escherichia coli

    DEFF Research Database (Denmark)

    Aagaard, C; Rosendahl, G; Dam, M

    1991-01-01

    The preferred method for construction and in vivo expression of mutagenised Escherichia coli ribosomal RNAs (rRNAs) is via high copy number plasmids. Transcription of wild-type rRNA from the seven chromosomal rrn operons in strains harbouring plasmid-coded mutant rRNAs leads to a heterogeneous...

  18. Coding in pigeons: Multiple-coding versus single-code/default strategies.

    Science.gov (United States)

    Pinto, Carlos; Machado, Armando

    2015-05-01

    To investigate the coding strategies that pigeons may use in a temporal discrimination tasks, pigeons were trained on a matching-to-sample procedure with three sample durations (2s, 6s and 18s) and two comparisons (red and green hues). One comparison was correct following 2-s samples and the other was correct following both 6-s and 18-s samples. Tests were then run to contrast the predictions of two hypotheses concerning the pigeons' coding strategies, the multiple-coding and the single-code/default. According to the multiple-coding hypothesis, three response rules are acquired, one for each sample. According to the single-code/default hypothesis, only two response rules are acquired, one for the 2-s sample and a "default" rule for any other duration. In retention interval tests, pigeons preferred the "default" key, a result predicted by the single-code/default hypothesis. In no-sample tests, pigeons preferred the key associated with the 2-s sample, a result predicted by multiple-coding. Finally, in generalization tests, when the sample duration equaled 3.5s, the geometric mean of 2s and 6s, pigeons preferred the key associated with the 6-s and 18-s samples, a result predicted by the single-code/default hypothesis. The pattern of results suggests the need for models that take into account multiple sources of stimulus control. © Society for the Experimental Analysis of Behavior.

  19. Average Likelihood Methods of Classification of Code Division Multiple Access (CDMA)

    Science.gov (United States)

    2016-05-01

    subject to code matrices that follows the structure given by (113). [⃗ yR y⃗I ] = √ Es 2L [ GR1 −GI1 GI2 GR2 ] [ QR −QI QI QR ] [⃗ bR b⃗I ] + [⃗ nR n⃗I... QR ] [⃗ b+ b⃗− ] + [⃗ n+ n⃗− ] (115) The average likelihood for type 4 CDMA (116) is a special case of type 1 CDMA with twice the code length and...AVERAGE LIKELIHOOD METHODS OF CLASSIFICATION OF CODE DIVISION MULTIPLE ACCESS (CDMA) MAY 2016 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE

  20. Error-correction coding for digital communications

    Science.gov (United States)

    Clark, G. C., Jr.; Cain, J. B.

    This book is written for the design engineer who must build the coding and decoding equipment and for the communication system engineer who must incorporate this equipment into a system. It is also suitable as a senior-level or first-year graduate text for an introductory one-semester course in coding theory. Fundamental concepts of coding are discussed along with group codes, taking into account basic principles, practical constraints, performance computations, coding bounds, generalized parity check codes, polynomial codes, and important classes of group codes. Other topics explored are related to simple nonalgebraic decoding techniques for group codes, soft decision decoding of block codes, algebraic techniques for multiple error correction, the convolutional code structure and Viterbi decoding, syndrome decoding techniques, and sequential decoding techniques. System applications are also considered, giving attention to concatenated codes, coding for the white Gaussian noise channel, interleaver structures for coded systems, and coding for burst noise channels.

  1. R7 VU Born-Assessed Demo Plan

    Energy Technology Data Exchange (ETDEWEB)

    Robert Nourgaliev

    2010-02-01

    This is an initial draft of a born-assessed VU plan for the RELAP7 (R7) code development effort. The plan will continue to evolve based on the growth of code capability. This growth will be reflected as additional testing is identified and done. Later versions of this document will reflect that growth.

  2. Distributed space-time coding

    CERN Document Server

    Jing, Yindi

    2014-01-01

    Distributed Space-Time Coding (DSTC) is a cooperative relaying scheme that enables high reliability in wireless networks. This brief presents the basic concept of DSTC, its achievable performance, generalizations, code design, and differential use. Recent results on training design and channel estimation for DSTC and the performance of training-based DSTC are also discussed.

  3. NETWORK CODING BY BEAM FORMING

    DEFF Research Database (Denmark)

    2013-01-01

    Network coding by beam forming in networks, for example, in single frequency networks, can provide aid in increasing spectral efficiency. When network coding by beam forming and user cooperation are combined, spectral efficiency gains may be achieved. According to certain embodiments, a method...... cooperating with the plurality of user equipment to decode the received data....

  4. Building codes : obstacle or opportunity?

    Science.gov (United States)

    Alberto Goetzl; David B. McKeever

    1999-01-01

    Building codes are critically important in the use of wood products for construction. The codes contain regulations that are prescriptive or performance related for various kinds of buildings and construction types. A prescriptive standard might dictate that a particular type of material be used in a given application. A performance standard requires that a particular...

  5. Accelerator Physics Code Web Repository

    CERN Document Server

    Zimmermann, Frank; Bellodi, G; Benedetto, E; Dorda, U; Giovannozzi, Massimo; Papaphilippou, Y; Pieloni, T; Ruggiero, F; Rumolo, G; Schmidt, F; Todesco, E; Zotter, Bruno W; Payet, J; Bartolini, R; Farvacque, L; Sen, T; Chin, Y H; Ohmi, K; Oide, K; Furman, M; Qiang, J; Sabbi, G L; Seidl, P A; Vay, J L; Friedman, A; Grote, D P; Cousineau, S M; Danilov, V; Holmes, J A; Shishlo, A; Kim, E S; Cai, Y; Pivi, M; Kaltchev, D I; Abell, D T; Katsouleas, Thomas C; Boine-Frankenheim, O; Franchetti, G; Hofmann, I; Machida, S; Wei, J

    2006-01-01

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic acceleratorphysics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  6. Interleaver Design for Turbo Coding

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl; Zyablov, Viktor

    1997-01-01

    By a combination of construction and random search based on a careful analysis of the low weight words and the distance properties of the component codes, it is possible to find interleavers for turbo coding with a high minimum distance. We have designed a block interleaver with permutations...

  7. Code breaking in the pacific

    CERN Document Server

    Donovan, Peter

    2014-01-01

    Covers the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945 Describes, explains and analyzes the code breaking techniques developed during the war in the Pacific Exposes the blunders (in code construction and use) made by the Japanese Navy that led to significant US Naval victories

  8. Development status of TUF code

    International Nuclear Information System (INIS)

    Liu, W.S.; Tahir, A.; Zaltsgendler

    1996-01-01

    An overview of the important development of the TUF code in 1995 is presented. The development in the following areas is presented: control of round-off error propagation, gas resolution and release models, and condensation induced water hammer. This development is mainly generated from station requests for operational support and code improvement. (author)

  9. Accident consequence assessment code development

    International Nuclear Information System (INIS)

    Homma, T.; Togawa, O.

    1991-01-01

    This paper describes the new computer code system, OSCAAR developed for off-site consequence assessment of a potential nuclear accident. OSCAAR consists of several modules which have modeling capabilities in atmospheric transport, foodchain transport, dosimetry, emergency response and radiological health effects. The major modules of the consequence assessment code are described, highlighting the validation and verification of the models. (author)

  10. The nuclear codes and guidelines

    International Nuclear Information System (INIS)

    Sonter, M.

    1984-01-01

    This paper considers problems faced by the mining industry when implementing the nuclear codes of practice. Errors of interpretation are likely. A major criticism is that the guidelines to the codes must be seen as recommendations only. They are not regulations. Specific clauses in the guidelines are criticised

  11. Survey of coded aperture imaging

    International Nuclear Information System (INIS)

    Barrett, H.H.

    1975-01-01

    The basic principle and limitations of coded aperture imaging for x-ray and gamma cameras are discussed. Current trends include (1) use of time varying apertures, (2) use of ''dilute'' apertures with transmission much less than 50%, and (3) attempts to derive transverse tomographic sections, unblurred by other planes, from coded images

  12. ACCELERATION PHYSICS CODE WEB REPOSITORY.

    Energy Technology Data Exchange (ETDEWEB)

    WEI, J.

    2006-06-26

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic accelerator-physics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  13. Grassmann codes and Schubert unions

    DEFF Research Database (Denmark)

    Hansen, Johan Peder; Johnsen, Trygve; Ranestad, Kristian

    2009-01-01

    We study subsets of Grassmann varieties over a field , such that these subsets are unions of Schubert cycles, with respect to a fixed flag. We study such sets in detail, and give applications to coding theory, in particular for Grassmann codes. For much is known about such Schubert unions with a ...

  14. On Network Coded Filesystem Shim

    DEFF Research Database (Denmark)

    Sørensen, Chres Wiant; Roetter, Daniel Enrique Lucani; Médard, Muriel

    2017-01-01

    Although network coding has shown the potential to revolutionize networking and storage, its deployment has faced a number of challenges. Usual proposals involve two approaches. First, deploying a new protocol (e.g., Multipath Coded TCP), or retrofitting another one (e.g., TCP/NC) to deliver bene...

  15. Running codes through the web

    International Nuclear Information System (INIS)

    Clark, R.E.H.

    2001-01-01

    Dr. Clark presented a report and demonstration of running atomic physics codes through the WWW. The atomic physics data is generated from Los Alamos National Laboratory (LANL) codes that calculate electron impact excitation, ionization, photoionization, and autoionization, and inversed processes through detailed balance. Samples of Web interfaces, input and output are given in the report

  16. Hybrid coded aperture and Compton imaging using an active mask

    International Nuclear Information System (INIS)

    Schultz, L.J.; Wallace, M.S.; Galassi, M.C.; Hoover, A.S.; Mocko, M.; Palmer, D.M.; Tornga, S.R.; Kippen, R.M.; Hynes, M.V.; Toolin, M.J.; Harris, B.; McElroy, J.E.; Wakeford, D.; Lanza, R.C.; Horn, B.K.P.; Wehe, D.K.

    2009-01-01

    The trimodal imager (TMI) images gamma-ray sources from a mobile platform using both coded aperture (CA) and Compton imaging (CI) modalities. In this paper we will discuss development and performance of image reconstruction algorithms for the TMI. In order to develop algorithms in parallel with detector hardware we are using a GEANT4 [J. Allison, K. Amako, J. Apostolakis, H. Araujo, P.A. Dubois, M. Asai, G. Barrand, R. Capra, S. Chauvie, R. Chytracek, G. Cirrone, G. Cooperman, G. Cosmo, G. Cuttone, G. Daquino, et al., IEEE Trans. Nucl. Sci. NS-53 (1) (2006) 270] based simulation package to produce realistic data sets for code development. The simulation code incorporates detailed detector modeling, contributions from natural background radiation, and validation of simulation results against measured data. Maximum likelihood algorithms for both imaging methods are discussed, as well as a hybrid imaging algorithm wherein CA and CI information is fused to generate a higher fidelity reconstruction.

  17. Non-coding RNA in Deinococcus radiodurans

    International Nuclear Information System (INIS)

    Chen Zhongzhong; Wang Liangyan; Lin Jun; Tian Bing; Hua Yuejin

    2006-01-01

    Researches on DNA damage and repair pathways of Deinococcus radiodurans show its extreme resistance to ionizing radiation, ultraviolet radiation and reactive oxygen species. Non-coding (ncRNA) RNAs are involved in a variety of processes such as transcriptional regulations, RNA processing and modification, mRNA translation, protein transportation and stability. The conserved secondary structures of intergenic regions of Deinococcus radiodurans R1 were predicted using Stochastic Context Free Grammar (SCFG) scan strategy. Results showed that 28 ncRNA families were present in the non-coding regions of the genome of Deinococcus radiodurans R1. Among these families, IRE is the largest family, followed by Histone3, tRNA, SECIS. DicF, ctRNA-pGA1 and tmRNA are one discovered in bacteria. Results from the comparison with other organisms showed that these ncRNA can be applied to the study of biological function of Deinococcus radiodurans and supply reference for the further study of DNA damage and repair mechanisms of this bacterium. (authors)

  18. Dynamic benchmarking of simulation codes

    International Nuclear Information System (INIS)

    Henry, R.E.; Paik, C.Y.; Hauser, G.M.

    1996-01-01

    Computer simulation of nuclear power plant response can be a full-scope control room simulator, an engineering simulator to represent the general behavior of the plant under normal and abnormal conditions, or the modeling of the plant response to conditions that would eventually lead to core damage. In any of these, the underlying foundation for their use in analysing situations, training of vendor/utility personnel, etc. is how well they represent what has been known from industrial experience, large integral experiments and separate effects tests. Typically, simulation codes are benchmarked with some of these; the level of agreement necessary being dependent upon the ultimate use of the simulation tool. However, these analytical models are computer codes, and as a result, the capabilities are continually enhanced, errors are corrected, new situations are imposed on the code that are outside of the original design basis, etc. Consequently, there is a continual need to assure that the benchmarks with important transients are preserved as the computer code evolves. Retention of this benchmarking capability is essential to develop trust in the computer code. Given the evolving world of computer codes, how is this retention of benchmarking capabilities accomplished? For the MAAP4 codes this capability is accomplished through a 'dynamic benchmarking' feature embedded in the source code. In particular, a set of dynamic benchmarks are included in the source code and these are exercised every time the archive codes are upgraded and distributed to the MAAP users. Three different types of dynamic benchmarks are used: plant transients; large integral experiments; and separate effects tests. Each of these is performed in a different manner. The first is accomplished by developing a parameter file for the plant modeled and an input deck to describe the sequence; i.e. the entire MAAP4 code is exercised. The pertinent plant data is included in the source code and the computer

  19. Distributed source coding of video

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Van Luong, Huynh

    2015-01-01

    A foundation for distributed source coding was established in the classic papers of Slepian-Wolf (SW) [1] and Wyner-Ziv (WZ) [2]. This has provided a starting point for work on Distributed Video Coding (DVC), which exploits the source statistics at the decoder side offering shifting processing...... steps, conventionally performed at the video encoder side, to the decoder side. Emerging applications such as wireless visual sensor networks and wireless video surveillance all require lightweight video encoding with high coding efficiency and error-resilience. The video data of DVC schemes differ from...... the assumptions of SW and WZ distributed coding, e.g. by being correlated in time and nonstationary. Improving the efficiency of DVC coding is challenging. This paper presents some selected techniques to address the DVC challenges. Focus is put on pin-pointing how the decoder steps are modified to provide...

  20. Non-Protein Coding RNAs

    CERN Document Server

    Walter, Nils G; Batey, Robert T

    2009-01-01

    This book assembles chapters from experts in the Biophysics of RNA to provide a broadly accessible snapshot of the current status of this rapidly expanding field. The 2006 Nobel Prize in Physiology or Medicine was awarded to the discoverers of RNA interference, highlighting just one example of a large number of non-protein coding RNAs. Because non-protein coding RNAs outnumber protein coding genes in mammals and other higher eukaryotes, it is now thought that the complexity of organisms is correlated with the fraction of their genome that encodes non-protein coding RNAs. Essential biological processes as diverse as cell differentiation, suppression of infecting viruses and parasitic transposons, higher-level organization of eukaryotic chromosomes, and gene expression itself are found to largely be directed by non-protein coding RNAs. The biophysical study of these RNAs employs X-ray crystallography, NMR, ensemble and single molecule fluorescence spectroscopy, optical tweezers, cryo-electron microscopy, and ot...

  1. Reliability-Based Code Calibration

    DEFF Research Database (Denmark)

    Faber, M.H.; Sørensen, John Dalsgaard

    2003-01-01

    The present paper addresses fundamental concepts of reliability based code calibration. First basic principles of structural reliability theory are introduced and it is shown how the results of FORM based reliability analysis may be related to partial safety factors and characteristic values....... Thereafter the code calibration problem is presented in its principal decision theoretical form and it is discussed how acceptable levels of failure probability (or target reliabilities) may be established. Furthermore suggested values for acceptable annual failure probabilities are given for ultimate...... and serviceability limit states. Finally the paper describes the Joint Committee on Structural Safety (JCSS) recommended procedure - CodeCal - for the practical implementation of reliability based code calibration of LRFD based design codes....

  2. What Froze the Genetic Code?

    Directory of Open Access Journals (Sweden)

    Lluís Ribas de Pouplana

    2017-04-01

    Full Text Available The frozen accident theory of the Genetic Code was a proposal by Francis Crick that attempted to explain the universal nature of the Genetic Code and the fact that it only contains information for twenty amino acids. Fifty years later, it is clear that variations to the universal Genetic Code exist in nature and that translation is not limited to twenty amino acids. However, given the astonishing diversity of life on earth, and the extended evolutionary time that has taken place since the emergence of the extant Genetic Code, the idea that the translation apparatus is for the most part immobile remains true. Here, we will offer a potential explanation to the reason why the code has remained mostly stable for over three billion years, and discuss some of the mechanisms that allow species to overcome the intrinsic functional limitations of the protein synthesis machinery.

  3. Verification of reactor safety codes

    International Nuclear Information System (INIS)

    Murley, T.E.

    1978-01-01

    The safety evaluation of nuclear power plants requires the investigation of wide range of potential accidents that could be postulated to occur. Many of these accidents deal with phenomena that are outside the range of normal engineering experience. Because of the expense and difficulty of full scale tests covering the complete range of accident conditions, it is necessary to rely on complex computer codes to assess these accidents. The central role that computer codes play in safety analyses requires that the codes be verified, or tested, by comparing the code predictions with a wide range of experimental data chosen to span the physical phenomena expected under potential accident conditions. This paper discusses the plans of the Nuclear Regulatory Commission for verifying the reactor safety codes being developed by NRC to assess the safety of light water reactors and fast breeder reactors. (author)

  4. What Froze the Genetic Code?

    Science.gov (United States)

    Ribas de Pouplana, Lluís; Torres, Adrian Gabriel; Rafels-Ybern, Àlbert

    2017-04-05

    The frozen accident theory of the Genetic Code was a proposal by Francis Crick that attempted to explain the universal nature of the Genetic Code and the fact that it only contains information for twenty amino acids. Fifty years later, it is clear that variations to the universal Genetic Code exist in nature and that translation is not limited to twenty amino acids. However, given the astonishing diversity of life on earth, and the extended evolutionary time that has taken place since the emergence of the extant Genetic Code, the idea that the translation apparatus is for the most part immobile remains true. Here, we will offer a potential explanation to the reason why the code has remained mostly stable for over three billion years, and discuss some of the mechanisms that allow species to overcome the intrinsic functional limitations of the protein synthesis machinery.

  5. Tristan code and its application

    Science.gov (United States)

    Nishikawa, K.-I.

    Since TRISTAN: The 3-D Electromagnetic Particle Code was introduced in 1990, it has been used for many applications including the simulations of global solar windmagnetosphere interaction. The most essential ingridients of this code have been published in the ISSS-4 book. In this abstract we describe some of issues and an application of this code for the study of global solar wind-magnetosphere interaction including a substorm study. The basic code (tristan.f) for the global simulation and a local simulation of reconnection with a Harris model (issrec2.f) are available at http:/www.physics.rutger.edu/˜kenichi. For beginners the code (isssrc2.f) with simpler boundary conditions is suitable to start to run simulations. The future of global particle simulations for a global geospace general circulation (GGCM) model with predictive capability (for Space Weather Program) is discussed.

  6. High efficiency video coding coding tools and specification

    CERN Document Server

    Wien, Mathias

    2015-01-01

    The video coding standard High Efficiency Video Coding (HEVC) targets at improved compression performance for video resolutions of HD and beyond, providing Ultra HD video at similar compressed bit rates as for HD video encoded with the well-established video coding standard H.264 | AVC. Based on known concepts, new coding structures and improved coding tools have been developed and specified in HEVC. The standard is expected to be taken up easily by established industry as well as new endeavors, answering the needs of todays connected and ever-evolving online world. This book presents the High Efficiency Video Coding standard and explains it in a clear and coherent language. It provides a comprehensive and consistently written description, all of a piece. The book targets at both, newbies to video coding as well as experts in the field. While providing sections with introductory text for the beginner, it suits as a well-arranged reference book for the expert. The book provides a comprehensive reference for th...

  7. Detecting non-coding selective pressure in coding regions

    Directory of Open Access Journals (Sweden)

    Blanchette Mathieu

    2007-02-01

    Full Text Available Abstract Background Comparative genomics approaches, where orthologous DNA regions are compared and inter-species conserved regions are identified, have proven extremely powerful for identifying non-coding regulatory regions located in intergenic or intronic regions. However, non-coding functional elements can also be located within coding region, as is common for exonic splicing enhancers, some transcription factor binding sites, and RNA secondary structure elements affecting mRNA stability, localization, or translation. Since these functional elements are located in regions that are themselves highly conserved because they are coding for a protein, they generally escaped detection by comparative genomics approaches. Results We introduce a comparative genomics approach for detecting non-coding functional elements located within coding regions. Codon evolution is modeled as a mixture of codon substitution models, where each component of the mixture describes the evolution of codons under a specific type of coding selective pressure. We show how to compute the posterior distribution of the entropy and parsimony scores under this null model of codon evolution. The method is applied to a set of growth hormone 1 orthologous mRNA sequences and a known exonic splicing elements is detected. The analysis of a set of CORTBP2 orthologous genes reveals a region of several hundred base pairs under strong non-coding selective pressure whose function remains unknown. Conclusion Non-coding functional elements, in particular those involved in post-transcriptional regulation, are likely to be much more prevalent than is currently known. With the numerous genome sequencing projects underway, comparative genomics approaches like that proposed here are likely to become increasingly powerful at detecting such elements.

  8. General features of the neutronics design code EQUICYCLE

    International Nuclear Information System (INIS)

    Jirlow, K.

    1978-10-01

    The neutronics code EQUICYCLE has been developed and improved over a long period of time. It is expecially adapted to survey type design calculations of large fast power reactors with particular emphasis on the nuclear parameters for a realistic equilibrium fuel cycle. Thus the code is used to evaluate the breeding performance, the power distributions and the uranium and plutonium mass balance for realistic refuelling schemes. In addition reactivity coefficients can be calculated and the influence of burnup could be assessed. The code is two-dimensional and treats the reactor core in R-Z geometry. The basic ideas of the calculating scheme are successive iterative improvement of cross-section sets and flux spectra and use of the mid-cycle flux for burning the fuel according to a specified refuelling scheme. Normally given peak burn-ups and maximum power densities are used as boundary conditions. The code is capable of handling the unconventional, so called heterogeneous cores. (author)

  9. Comparing weld inspection codes: radiography vs. ultrasonics

    International Nuclear Information System (INIS)

    Moles, M.; Ginzel, E.

    2007-01-01

    Requirements for weld quality are continually increasing. This is due to a combination of factors: increased public awareness; bigger legal penalties; improved and thinner steels; better analysis techniques such as Engineering Critical Assessment (ECA); higher material costs. Weld quality is primarily dictated by construction codes, which should reflect the needs of society and industry: safety, the environment, society, and cost-effectiveness. As R and D produces new products, techniques and procedures, ideally these developments should be reflected in the codes. While pressure vessel and structural welding are certainly included here, it is really pipeline weld inspections that are setting the pace on new developments. For pipelines, a major shift was made from radiography to ultrasonics in Alberta some decades ago. This was driven by the 'need for speed', plus the requirement to size defects in the vertical plane for ECA (also called Fracture Mechanics or Fitness-For-Purpose). One of the main objectives of ECA was to benefit from the calculated fracture toughness of materials, and not to rely on the overly conservative workmanship criteria in radiography. In practice, performing repairs on higher quality material often does more harm than good; changing the microstructure can seriously compromise the material properties. Rising steel costs are another major driving force, so higher strength, thinner materials are being used. Under these conditions, ECA and defect sizing are critical. This paper compares where the various North American codes for pipelines, pressure vessels and structural welds stand on using advanced inspection techniques: ultrasonics, phased arrays, ECA, sizing techniques. For those codes which are not using the latest technologies, there are typical routes for incorporating them. (author)

  10. On the numerical verification of industrial codes

    International Nuclear Information System (INIS)

    Montan, Sethy Akpemado

    2013-01-01

    Numerical verification of industrial codes, such as those developed at EDF R and D, is required to estimate the precision and the quality of computed results, even more for code running in HPC environments where millions of instructions are performed each second. These programs usually use external libraries (MPI, BLACS, BLAS, LAPACK). In this context, it is required to have a tool as non intrusive as possible to avoid rewriting the original code. In this regard, the CADNA library, which implements the Discrete Stochastic Arithmetic, appears to be one of a promising approach for industrial applications. In the first part of this work, we are interested in an efficient implementation of the BLAS routine DGEMM (General Matrix Multiply) implementing Discrete Stochastic Arithmetic. The implementation of a basic algorithm for matrix product using stochastic types leads to an overhead greater than 1000 for a matrix of 1024 * 1024 compared to the standard version and commercial versions of xGEMM. Here, we detail different solutions to reduce this overhead and the results we have obtained. A new routine Dgemm- CADNA have been designed. This routine has allowed to reduce the overhead from 1100 to 35 compare to optimized BLAS implementations (GotoBLAS). Then, we focus on the numerical verification of Telemac-2D computed results. Performing a numerical validation with the CADNA library shows that more than 30% of the numerical instabilities occurring during an execution come from the dot product function. A more accurate implementation of the dot product with compensated algorithms is presented in this work. We show that implementing these kinds of algorithms, in order to improve the accuracy of computed results does not alter the code performance. (author)

  11. R quick syntax reference

    CERN Document Server

    Tollefson, Margot

    2014-01-01

    The R Quick Syntax Reference is a handy reference book detailing the intricacies of the R language. Not only is R a free, open-source tool, R is powerful, flexible, and has state of the art statistical techniques available. With the many details which must be correct when using any language, however, the R Quick Syntax Reference makes using R easier.Starting with the basic structure of R, the book takes you on a journey through the terminology used in R and the syntax required to make R work. You will find looking up the correct form for an expression quick and easy. With a copy of the R Quick

  12. Coding for effective denial management.

    Science.gov (United States)

    Miller, Jackie; Lineberry, Joe

    2004-01-01

    Nearly everyone will agree that accurate and consistent coding of diagnoses and procedures is the cornerstone for operating a compliant practice. The CPT or HCPCS procedure code tells the payor what service was performed and also (in most cases) determines the amount of payment. The ICD-9-CM diagnosis code, on the other hand, tells the payor why the service was performed. If the diagnosis code does not meet the payor's criteria for medical necessity, all payment for the service will be denied. Implementation of an effective denial management program can help "stop the bleeding." Denial management is a comprehensive process that works in two ways. First, it evaluates the cause of denials and takes steps to prevent them. Second, denial management creates specific procedures for refiling or appealing claims that are initially denied. Accurate, consistent and compliant coding is key to both of these functions. The process of proactively managing claim denials also reveals a practice's administrative strengths and weaknesses, enabling radiology business managers to streamline processes, eliminate duplicated efforts and shift a larger proportion of the staff's focus from paperwork to servicing patients--all of which are sure to enhance operations and improve practice management and office morale. Accurate coding requires a program of ongoing training and education in both CPT and ICD-9-CM coding. Radiology business managers must make education a top priority for their coding staff. Front office staff, technologists and radiologists should also be familiar with the types of information needed for accurate coding. A good staff training program will also cover the proper use of Advance Beneficiary Notices (ABNs). Registration and coding staff should understand how to determine whether the patient's clinical history meets criteria for Medicare coverage, and how to administer an ABN if the exam is likely to be denied. Staff should also understand the restrictions on use of

  13. Unfolding code for neutron spectrometry based on neural nets technology

    International Nuclear Information System (INIS)

    Ortiz R, J. M.; Vega C, H. R.

    2012-10-01

    The most delicate part of neutron spectrometry, is the unfolding process. The derivation of the spectral information is not simple because the unknown is not given directly as a result of the measurements. The drawbacks associated with traditional unfolding procedures have motivated the need of complementary approaches. Novel methods based on Artificial Neural Networks have been widely investigated. In this work, a neutron spectrum unfolding code based on neural nets technology is presented. This unfolding code called Neutron Spectrometry and Dosimetry by means of Artificial Neural Networks was designed in a graphical interface under LabVIEW programming environment. The core of the code is an embedded neural network architecture, previously optimized by the R obust Design of Artificial Neural Networks Methodology . The main features of the code are: is easy to use, friendly and intuitive to the user. This code was designed for a Bonner Sphere System based on a 6 Lil(Eu) neutron detector and a response matrix expressed in 60 energy bins taken from an International Atomic Energy Agency compilation. The main feature of the code is that as entrance data, only seven rate counts measurement with a Bonner spheres spectrometer are required for simultaneously unfold the 60 energy bins of the neutron spectrum and to calculate 15 dosimetric quantities, for radiation protection porpoises. This code generates a full report in html format with all relevant information. (Author)

  14. Development of probabilistic fracture mechanics code PASCAL and user's manual

    Energy Technology Data Exchange (ETDEWEB)

    Shibata, Katsuyuki; Onizawa, Kunio [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment; Li, Yinsheng; Kato, Daisuke [Fuji Research Institute Corporation, Tokyo (Japan)

    2001-03-01

    As a part of the aging and structural integrity research for LWR components, a new PFM (Probabilistic Fracture Mechanics) code PASCAL (PFM Analysis of Structural Components in Aging LWR) has been developed since FY1996. This code evaluates the failure probability of an aged reactor pressure vessel subjected to transient loading such as PTS (Pressurized Thermal Shock). The development of the code has been aimed to improve the accuracy and reliability of analysis by introducing new analysis methodologies and algorithms considering the recent development in the fracture mechanics methodologies and computer performance. The code has some new functions in optimized sampling and cell dividing procedure in stratified Monte Carlo simulation, elastic-plastic fracture criterion of R6 method, extension analysis models in semi-elliptical crack, evaluation of effect of thermal annealing and etc. In addition, an input data generator of temperature and stress distribution time histories was also prepared in the code. Functions and performance of the code have been confirmed based on the verification analyses and some case studies on the influence parameters. The present phase of the development will be completed in FY2000. Thus this report provides the user's manual and theoretical background of the code. (author)

  15. Unfolding code for neutron spectrometry based on neural nets technology

    Energy Technology Data Exchange (ETDEWEB)

    Ortiz R, J. M.; Vega C, H. R., E-mail: morvymm@yahoo.com.mx [Universidad Autonoma de Zacatecas, Unidad Academica de Ingenieria Electrica, Apdo. Postal 336, 98000 Zacatecas (Mexico)

    2012-10-15

    The most delicate part of neutron spectrometry, is the unfolding process. The derivation of the spectral information is not simple because the unknown is not given directly as a result of the measurements. The drawbacks associated with traditional unfolding procedures have motivated the need of complementary approaches. Novel methods based on Artificial Neural Networks have been widely investigated. In this work, a neutron spectrum unfolding code based on neural nets technology is presented. This unfolding code called Neutron Spectrometry and Dosimetry by means of Artificial Neural Networks was designed in a graphical interface under LabVIEW programming environment. The core of the code is an embedded neural network architecture, previously optimized by the {sup R}obust Design of Artificial Neural Networks Methodology{sup .} The main features of the code are: is easy to use, friendly and intuitive to the user. This code was designed for a Bonner Sphere System based on a {sup 6}Lil(Eu) neutron detector and a response matrix expressed in 60 energy bins taken from an International Atomic Energy Agency compilation. The main feature of the code is that as entrance data, only seven rate counts measurement with a Bonner spheres spectrometer are required for simultaneously unfold the 60 energy bins of the neutron spectrum and to calculate 15 dosimetric quantities, for radiation protection porpoises. This code generates a full report in html format with all relevant information. (Author)

  16. Interoperable domain-specific languages families for code generation

    Czech Academy of Sciences Publication Activity Database

    Malohlava, M.; Plášil, F.; Bureš, Tomáš; Hnětynka, P.

    2013-01-01

    Roč. 43, č. 5 (2013), s. 479-499 ISSN 0038-0644 R&D Projects: GA ČR GD201/09/H057 EU Projects: European Commission(XE) ASCENS 257414 Grant - others:GA AV ČR(CZ) GAP103/11/1489 Program:FP7 Institutional research plan: CEZ:AV0Z10300504 Keywords : code generation * domain specific languages * models reuse * extensible languages * specification * program synthesis Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.148, year: 2013

  17. Naval Weapons Center Plume Radar Frequency Interference Code

    Science.gov (United States)

    1982-10-01

    ppm sodium. Both equilibrium and finite rate chemistry during the expansion from the chamber were tried as initial conditions for the plume. In...was too large. The difference between the.e two sets of initial conditions diminished downstream as the chemistry in the plume mixing region began to...Rerkirre Arvliral I Comirlnrnde!- ir.C h ic 1. tVS. Pacific Hice ((Code 3251 1 Corimu tinde r. ’n, r-d I leer. Pearl I atar I Coimniaide r. Sevent

  18. ESCADRE and ICARE code systems

    International Nuclear Information System (INIS)

    Reocreux, M.; Gauvain, J.

    1992-01-01

    The French sever accident code development program is following two parallel approaches: the first one is dealing with ''integral codes'' which are designed for giving immediate engineer answers, the second one is following a more mechanistic way in order to have the capability of detailed analysis of experiments, in order to get a better understanding of the scaling problem and reach a better confidence in plant calculations. In the first approach a complete system has been developed and is being used for practical cases: this is the ESCADRE system. In the second approach, a set of codes dealing first with primary circuit is being developed: a mechanistic core degradation code, ICARE, has been issued and is being coupled with the advanced thermalhydraulic code CATHARE. Fission product codes have been also coupled to CATHARE. The ''integral'' ESCADRE system and the mechanistic ICARE and associated codes are described. Their main characteristics are reviewed and the status of their development and assessment given. Future studies are finally discussed. 36 refs, 4 figs, 1 tab

  19. The ZPIC educational code suite

    Science.gov (United States)

    Calado, R.; Pardal, M.; Ninhos, P.; Helm, A.; Mori, W. B.; Decyk, V. K.; Vieira, J.; Silva, L. O.; Fonseca, R. A.

    2017-10-01

    Particle-in-Cell (PIC) codes are used in almost all areas of plasma physics, such as fusion energy research, plasma accelerators, space physics, ion propulsion, and plasma processing, and many other areas. In this work, we present the ZPIC educational code suite, a new initiative to foster training in plasma physics using computer simulations. Leveraging on our expertise and experience from the development and use of the OSIRIS PIC code, we have developed a suite of 1D/2D fully relativistic electromagnetic PIC codes, as well as 1D electrostatic. These codes are self-contained and require only a standard laptop/desktop computer with a C compiler to be run. The output files are written in a new file format called ZDF that can be easily read using the supplied routines in a number of languages, such as Python, and IDL. The code suite also includes a number of example problems that can be used to illustrate several textbook and advanced plasma mechanisms, including instructions for parameter space exploration. We also invite contributions to this repository of test problems that will be made freely available to the community provided the input files comply with the format defined by the ZPIC team. The code suite is freely available and hosted on GitHub at https://github.com/zambzamb/zpic. Work partially supported by PICKSC.

  20. Stability analysis by ERATO code

    International Nuclear Information System (INIS)

    Tsunematsu, Toshihide; Takeda, Tatsuoki; Matsuura, Toshihiko; Azumi, Masafumi; Kurita, Gen-ichi

    1979-12-01

    Problems in MHD stability calculations by ERATO code are described; which concern convergence property of results, equilibrium codes, and machine optimization of ERATO code. It is concluded that irregularity on a convergence curve is not due to a fault of the ERATO code itself but due to inappropriate choice of the equilibrium calculation meshes. Also described are a code to calculate an equilibrium as a quasi-inverse problem and a code to calculate an equilibrium as a result of a transport process. Optimization of the code with respect to I/O operations reduced both CPU time and I/O time considerably. With the FACOM230-75 APU/CPU multiprocessor system, the performance is about 6 times as high as with the FACOM230-75 CPU, showing the effectiveness of a vector processing computer for the kind of MHD computations. This report is a summary of the material presented at the ERATO workshop 1979(ORNL), supplemented with some details. (author)

  1. ETR/ITER systems code

    Energy Technology Data Exchange (ETDEWEB)

    Barr, W.L.; Bathke, C.G.; Brooks, J.N.; Bulmer, R.H.; Busigin, A.; DuBois, P.F.; Fenstermacher, M.E.; Fink, J.; Finn, P.A.; Galambos, J.D.; Gohar, Y.; Gorker, G.E.; Haines, J.R.; Hassanein, A.M.; Hicks, D.R.; Ho, S.K.; Kalsi, S.S.; Kalyanam, K.M.; Kerns, J.A.; Lee, J.D.; Miller, J.R.; Miller, R.L.; Myall, J.O.; Peng, Y-K.M.; Perkins, L.J.; Spampinato, P.T.; Strickler, D.J.; Thomson, S.L.; Wagner, C.E.; Willms, R.S.; Reid, R.L. (ed.)

    1988-04-01

    A tokamak systems code capable of modeling experimental test reactors has been developed and is described in this document. The code, named TETRA (for Tokamak Engineering Test Reactor Analysis), consists of a series of modules, each describing a tokamak system or component, controlled by an optimizer/driver. This code development was a national effort in that the modules were contributed by members of the fusion community and integrated into a code by the Fusion Engineering Design Center. The code has been checked out on the Cray computers at the National Magnetic Fusion Energy Computing Center and has satisfactorily simulated the Tokamak Ignition/Burn Experimental Reactor II (TIBER) design. A feature of this code is the ability to perform optimization studies through the use of a numerical software package, which iterates prescribed variables to satisfy a set of prescribed equations or constraints. This code will be used to perform sensitivity studies for the proposed International Thermonuclear Experimental Reactor (ITER). 22 figs., 29 tabs.

  2. ETR/ITER systems code

    International Nuclear Information System (INIS)

    Barr, W.L.; Bathke, C.G.; Brooks, J.N.

    1988-04-01

    A tokamak systems code capable of modeling experimental test reactors has been developed and is described in this document. The code, named TETRA (for Tokamak Engineering Test Reactor Analysis), consists of a series of modules, each describing a tokamak system or component, controlled by an optimizer/driver. This code development was a national effort in that the modules were contributed by members of the fusion community and integrated into a code by the Fusion Engineering Design Center. The code has been checked out on the Cray computers at the National Magnetic Fusion Energy Computing Center and has satisfactorily simulated the Tokamak Ignition/Burn Experimental Reactor II (TIBER) design. A feature of this code is the ability to perform optimization studies through the use of a numerical software package, which iterates prescribed variables to satisfy a set of prescribed equations or constraints. This code will be used to perform sensitivity studies for the proposed International Thermonuclear Experimental Reactor (ITER). 22 figs., 29 tabs

  3. Coded communications with nonideal interleaving

    Science.gov (United States)

    Laufer, Shaul

    1991-02-01

    Burst error channels - a type of block interference channels - feature increasing capacity but decreasing cutoff rate as the memory rate increases. Despite the large capacity, there is degradation in the performance of practical coding schemes when the memory length is excessive. A short-coding error parameter (SCEP) was introduced, which expresses a bound on the average decoding-error probability for codes shorter than the block interference length. The performance of a coded slow frequency-hopping communication channel is analyzed for worst-case partial band jamming and nonideal interleaving, by deriving expressions for the capacity and cutoff rate. The capacity and cutoff rate, respectively, are shown to approach and depart from those of a memoryless channel corresponding to the transmission of a single code letter per hop. For multiaccess communications over a slot-synchronized collision channel without feedback, the channel was considered as a block interference channel with memory length equal to the number of letters transmitted in each slot. The effects of an asymmetrical background noise and a reduced collision error rate were studied, as aspects of real communications. The performance of specific convolutional and Reed-Solomon codes was examined for slow frequency-hopping systems with nonideal interleaving. An upper bound is presented for the performance of a Viterbi decoder for a convolutional code with nonideal interleaving, and a soft decision diversity combining technique is introduced.

  4. Coding and decoding for code division multiple user communication systems

    Science.gov (United States)

    Healy, T. J.

    1985-01-01

    A new algorithm is introduced which decodes code division multiple user communication signals. The algorithm makes use of the distinctive form or pattern of each signal to separate it from the composite signal created by the multiple users. Although the algorithm is presented in terms of frequency-hopped signals, the actual transmitter modulator can use any of the existing digital modulation techniques. The algorithm is applicable to error-free codes or to codes where controlled interference is permitted. It can be used when block synchronization is assumed, and in some cases when it is not. The paper also discusses briefly some of the codes which can be used in connection with the algorithm, and relates the algorithm to past studies which use other approaches to the same problem.

  5. microRNA-9 targets the long non-coding RNA MALAT1 for degradation in the nucleus

    DEFF Research Database (Denmark)

    Leucci, Eleonora; Patella, Francesca; Waage, Johannes

    2013-01-01

    -coding RNAs. Here we report that microRNA-9 (miR-9) regulates the expression of the Metastasis Associated Lung Adenocarcinoma Transcript 1 (MALAT-1), one of the most abundant and conserved long non-coding RNAs. Intriguingly, we find that miR-9 targets AGO2-mediated regulation of MALAT1 in the nucleus. Our...

  6. Evaluation of the SCANAIR Computer Code

    International Nuclear Information System (INIS)

    Jernkvist, Lars Olof; Massih, Ali

    2001-11-01

    -burnup fuel rod. This test case is used to check the validity of SCANAIR installation in a new computer environment, but also to examine the output response of the code to an RIA-type load. Moreover, we have used independent computational methods to verify and compare some of the SCANAIR results for this reference case. The outcome is encouraging. In addition, we have attempted to simulate with SCANAIR a ramp test performed at the Studsvik R2 reactor, and a rod in the Studsvik TRANSRAMP-IV project was selected for this purpose. Although SCANAIR is not designed to simulate 'moderate' transients like the one considered here, we have found the results on fission gas release and clad plastic strain in fair agreement with measured data. Finally, we have performed computations on an existent RIA test made on a pre-irradiated rod in the CABRI reactor, to wit the REP-Na2 rod in the REP-Na test series. Rod Na2 was subjected to a fast RIA-type pulse with a pulse-width of 0.9 ms and a peak linear power density of about 40 MW/m. Also for this test case, SCANAIR exhibited good performance with reasonable execution times on personal computers with the Linux operating system. We have not subjected SCANAIR to extensive testing and benchmarking against experimental data, nor to a wide-range of parametric studies to locate possible faults of the code in analyses of highly irradiated fuel rods under RIA. However, our evaluation and testing indicate that the models used for pellet and clad (visco)plastic deformation and axial mixing of released fission products should be improved. Nevertheless, our limited study with SCANAIR has been positive. Although it would benefit from further calibration to experimental data, we believe that SCANAIR is an adequate computer code for predicting thermal-mechanical behavior of a fuel rod during a postulated RIA

  7. Criticality benchmarks for COG: A new point-wise Monte Carlo code

    International Nuclear Information System (INIS)

    Alesso, H.P.; Pearson, J.; Choi, J.S.

    1989-01-01

    COG is a new point-wise Monte Carlo code being developed and tested at LLNL for the Cray computer. It solves the Boltzmann equation for the transport of neutrons, photons, and (in future versions) charged particles. Techniques included in the code for modifying the random walk of particles make COG most suitable for solving deep-penetration (shielding) problems. However, its point-wise cross-sections also make it effective for a wide variety of criticality problems. COG has some similarities to a number of other computer codes used in the shielding and criticality community. These include the Lawrence Livermore National Laboratory (LLNL) codes TART and ALICE, the Los Alamos National Laboratory code MCNP, the Oak Ridge National Laboratory codes 05R, 06R, KENO, and MORSE, the SACLAY code TRIPOLI, and the MAGI code SAM. Each code is a little different in its geometry input and its random-walk modification options. Validating COG consists in part of running benchmark calculations against critical experiments as well as other codes. The objective of this paper is to present calculational results of a variety of critical benchmark experiments using COG, and to present the resulting code bias. Numerous benchmark calculations have been completed for a wide variety of critical experiments which generally involve both simple and complex physical problems. The COG results, which they report in this paper, have been excellent

  8. GAMERA - The New Magnetospheric Code

    Science.gov (United States)

    Lyon, J.; Sorathia, K.; Zhang, B.; Merkin, V. G.; Wiltberger, M. J.; Daldorff, L. K. S.

    2017-12-01

    The Lyon-Fedder-Mobarry (LFM) code has been a main-line magnetospheric simulation code for 30 years. The code base, designed in the age of memory to memory vector ma- chines,is still in wide use for science production but needs upgrading to ensure the long term sustainability. In this presentation, we will discuss our recent efforts to update and improve that code base and also highlight some recent results. The new project GAM- ERA, Grid Agnostic MHD for Extended Research Applications, has kept the original design characteristics of the LFM and made significant improvements. The original de- sign included high order numerical differencing with very aggressive limiting, the ability to use arbitrary, but logically rectangular, grids, and maintenance of div B = 0 through the use of the Yee grid. Significant improvements include high-order upwinding and a non-clipping limiter. One other improvement with wider applicability is an im- proved averaging technique for the singularities in polar and spherical grids. The new code adopts a hybrid structure - multi-threaded OpenMP with an overarching MPI layer for large scale and coupled applications. The MPI layer uses a combination of standard MPI and the Global Array Toolkit from PNL to provide a lightweight mechanism for coupling codes together concurrently. The single processor code is highly efficient and can run magnetospheric simulations at the default CCMC resolution faster than real time on a MacBook pro. We have run the new code through the Athena suite of tests, and the results compare favorably with the codes available to the astrophysics community. LFM/GAMERA has been applied to many different situations ranging from the inner and outer heliosphere and magnetospheres of Venus, the Earth, Jupiter and Saturn. We present example results the Earth's magnetosphere including a coupled ring current (RCM), the magnetospheres of Jupiter and Saturn, and the inner heliosphere.

  9. SCALE Code System

    Energy Technology Data Exchange (ETDEWEB)

    Jessee, Matthew Anderson [ORNL

    2016-04-01

    The SCALE Code System is a widely-used modeling and simulation suite for nuclear safety analysis and design that is developed, maintained, tested, and managed by the Reactor and Nuclear Systems Division (RNSD) of Oak Ridge National Laboratory (ORNL). SCALE provides a comprehensive, verified and validated, user-friendly tool set for criticality safety, reactor and lattice physics, radiation shielding, spent fuel and radioactive source term characterization, and sensitivity and uncertainty analysis. Since 1980, regulators, licensees, and research institutions around the world have used SCALE for safety analysis and design. SCALE provides an integrated framework with dozens of computational modules including three deterministic and three Monte Carlo radiation transport solvers that are selected based on the desired solution strategy. SCALE includes current nuclear data libraries and problem-dependent processing tools for continuous-energy (CE) and multigroup (MG) neutronics and coupled neutron-gamma calculations, as well as activation, depletion, and decay calculations. SCALE includes unique capabilities for automated variance reduction for shielding calculations, as well as sensitivity and uncertainty analysis. SCALE’s graphical user interfaces assist with accurate system modeling, visualization of nuclear data, and convenient access to desired results.SCALE 6.2 provides many new capabilities and significant improvements of existing features.New capabilities include:• ENDF/B-VII.1 nuclear data libraries CE and MG with enhanced group structures,• Neutron covariance data based on ENDF/B-VII.1 and supplemented with ORNL data,• Covariance data for fission product yields and decay constants,• Stochastic uncertainty and correlation quantification for any SCALE sequence with Sampler,• Parallel calculations with KENO,• Problem-dependent temperature corrections for CE calculations,• CE shielding and criticality accident alarm system analysis with MAVRIC,• CE

  10. Code-Mixing and Code Switchingin The Process of Learning

    Directory of Open Access Journals (Sweden)

    Diyah Atiek Mustikawati

    2016-09-01

    Full Text Available This study aimed to describe a form of code switching and code mixing specific form found in the teaching and learning activities in the classroom as well as determining factors influencing events stand out that form of code switching and code mixing in question.Form of this research is descriptive qualitative case study which took place in Al Mawaddah Boarding School Ponorogo. Based on the analysis and discussion that has been stated in the previous chapter that the form of code mixing and code switching learning activities in Al Mawaddah Boarding School is in between the use of either language Java language, Arabic, English and Indonesian, on the use of insertion of words, phrases, idioms, use of nouns, adjectives, clauses, and sentences. Code mixing deciding factor in the learning process include: Identification of the role, the desire to explain and interpret, sourced from the original language and its variations, is sourced from a foreign language. While deciding factor in the learning process of code, includes: speakers (O1, partners speakers (O2, the presence of a third person (O3, the topic of conversation, evoke a sense of humour, and just prestige. The significance of this study is to allow readers to see the use of language in a multilingual society, especially in AL Mawaddah boarding school about the rules and characteristics variation in the language of teaching and learning activities in the classroom. Furthermore, the results of this research will provide input to the ustadz / ustadzah and students in developing oral communication skills and the effectiveness of teaching and learning strategies in boarding schools.

  11. Linear and nonlinear verification of gyrokinetic microstability codes

    Science.gov (United States)

    Bravenec, R. V.; Candy, J.; Barnes, M.; Holland, C.

    2011-12-01

    Verification of nonlinear microstability codes is a necessary step before comparisons or predictions of turbulent transport in toroidal devices can be justified. By verification we mean demonstrating that a code correctly solves the mathematical model upon which it is based. Some degree of verification can be accomplished indirectly from analytical instability threshold conditions, nonlinear saturation estimates, etc., for relatively simple plasmas. However, verification for experimentally relevant plasma conditions and physics is beyond the realm of analytical treatment and must rely on code-to-code comparisons, i.e., benchmarking. The premise is that the codes are verified for a given problem or set of parameters if they all agree within a specified tolerance. True verification requires comparisons for a number of plasma conditions, e.g., different devices, discharges, times, and radii. Running the codes and keeping track of linear and nonlinear inputs and results for all conditions could be prohibitive unless there was some degree of automation. We have written software to do just this and have formulated a metric for assessing agreement of nonlinear simulations. We present comparisons, both linear and nonlinear, between the gyrokinetic codes GYRO [J. Candy and R. E. Waltz, J. Comput. Phys. 186, 545 (2003)] and GS2 [W. Dorland, F. Jenko, M. Kotschenreuther, and B. N. Rogers, Phys. Rev. Lett. 85, 5579 (2000)]. We do so at the mid-radius for the same discharge as in earlier work [C. Holland, A. E. White, G. R. McKee, M. W. Shafer, J. Candy, R. E. Waltz, L. Schmitz, and G. R. Tynan, Phys. Plasmas 16, 052301 (2009)]. The comparisons include electromagnetic fluctuations, passing and trapped electrons, plasma shaping, one kinetic impurity, and finite Debye-length effects. Results neglecting and including electron collisions (Lorentz model) are presented. We find that the linear frequencies with or without collisions agree well between codes, as do the time averages of

  12. Neural Decoder for Topological Codes

    Science.gov (United States)

    Torlai, Giacomo; Melko, Roger G.

    2017-07-01

    We present an algorithm for error correction in topological codes that exploits modern machine learning techniques. Our decoder is constructed from a stochastic neural network called a Boltzmann machine, of the type extensively used in deep learning. We provide a general prescription for the training of the network and a decoding strategy that is applicable to a wide variety of stabilizer codes with very little specialization. We demonstrate the neural decoder numerically on the well-known two-dimensional toric code with phase-flip errors.

  13. Coding chaotic billiards. Pt. 3

    International Nuclear Information System (INIS)

    Ullmo, D.; Giannoni, M.J.

    1993-01-01

    Non-tiling compact billiard defined on the pseudosphere is studied 'a la Morse coding'. As for most bounded systems, the coding is non exact. However, two sets of approximate grammar rules can be obtained, one specifying forbidden codes, and the other allowed ones. In-between some sequences remain in the 'unknown' zone, but their relative amount can be reduced to zero if one lets the length of the approximate grammar rules goes to infinity. The relationship between these approximate grammar rules and the 'pruning front' introduced by Cvitanovic et al. is discussed. (authors). 13 refs., 10 figs., 1 tab

  14. Iterative nonlinear unfolding code: TWOGO

    International Nuclear Information System (INIS)

    Hajnal, F.

    1981-03-01

    a new iterative unfolding code, TWOGO, was developed to analyze Bonner sphere neutron measurements. The code includes two different unfolding schemes which alternate on successive iterations. The iterative process can be terminated either when the ratio of the coefficient of variations in terms of the measured and calculated responses is unity, or when the percentage difference between the measured and evaluated sphere responses is less than the average measurement error. The code was extensively tested with various known spectra and real multisphere neutron measurements which were performed inside the containments of pressurized water reactors

  15. Atlas C++ Coding Standard Specification

    CERN Document Server

    Albrand, S; Barberis, D; Bosman, M; Jones, B; Stavrianakou, M; Arnault, C; Candlin, D; Candlin, R; Franck, E; Hansl-Kozanecka, Traudl; Malon, D; Qian, S; Quarrie, D; Schaffer, R D

    2001-01-01

    This document defines the ATLAS C++ coding standard, that should be adhered to when writing C++ code. It has been adapted from the original "PST Coding Standard" document (http://pst.cern.ch/HandBookWorkBook/Handbook/Programming/programming.html) CERN-UCO/1999/207. The "ATLAS standard" comprises modifications, further justification and examples for some of the rules in the original PST document. All changes were discussed in the ATLAS Offline Software Quality Control Group and feedback from the collaboration was taken into account in the "current" version.

  16. Writing the Live Coding Book

    DEFF Research Database (Denmark)

    Blackwell, Alan; Cox, Geoff; Lee, Sang Wong

    2016-01-01

    This paper is a speculation on the relationship between coding and writing, and the ways in which technical innovations and capabilities enable us to rethink each in terms of the other. As a case study, we draw on recent experiences of preparing a book on live coding, which integrates a wide range...... of personal, historical, technical and critical perspectives. This book project has been both experimental and reflective, in a manner that allows us to draw on critical understanding of both code and writing, and point to the potential for new practices in the future....

  17. LiveCode mobile development

    CERN Document Server

    Lavieri, Edward D

    2013-01-01

    A practical guide written in a tutorial-style, ""LiveCode Mobile Development Hotshot"" walks you step-by-step through 10 individual projects. Every project is divided into sub tasks to make learning more organized and easy to follow along with explanations, diagrams, screenshots, and downloadable material.This book is great for anyone who wants to develop mobile applications using LiveCode. You should be familiar with LiveCode and have access to a smartphone. You are not expected to know how to create graphics or audio clips.

  18. Network Coding Fundamentals and Applications

    CERN Document Server

    Medard, Muriel

    2011-01-01

    Network coding is a field of information and coding theory and is a method of attaining maximum information flow in a network. This book is an ideal introduction for the communications and network engineer, working in research and development, who needs an intuitive introduction to network coding and to the increased performance and reliability it offers in many applications. This book is an ideal introduction for the research and development communications and network engineer who needs an intuitive introduction to the theory and wishes to understand the increased performance and reliabil

  19. Linear network error correction coding

    CERN Document Server

    Guang, Xuan

    2014-01-01

    There are two main approaches in the theory of network error correction coding. In this SpringerBrief, the authors summarize some of the most important contributions following the classic approach, which represents messages by sequences?similar to algebraic coding,?and also briefly discuss the main results following the?other approach,?that uses the theory of rank metric codes for network error correction of representing messages by subspaces. This book starts by establishing the basic linear network error correction (LNEC) model and then characterizes two equivalent descriptions. Distances an

  20. Tree Coding of Bilevel Images

    DEFF Research Database (Denmark)

    Martins, Bo; Forchhammer, Søren

    1998-01-01

    Presently, sequential tree coders are the best general purpose bilevel image coders and the best coders of halftoned images. The current ISO standard, Joint Bilevel Image Experts Group (JBIG), is a good example. A sequential tree coder encodes the data by feeding estimates of conditional...... is one order of magnitude slower than JBIG, obtains excellent and highly robust compression performance. A multipass free tree coding scheme produces superior compression results for all test images. A multipass free template coding scheme produces significantly better results than JBIG for difficult...... images such as halftones. By utilizing randomized subsampling in the template selection, the speed becomes acceptable for practical image coding...