WorldWideScience

Sample records for surgery codes 1983-1997

  1. Reconciliation of international administrative coding systems for comparison of colorectal surgery outcome

    NARCIS (Netherlands)

    Munasinghe, A.; Chang, D.; Mamidanna, R.; Middleton, S.; Joy, M.; Penninckx, F.; Darzi, A.; Livingston, E.; Faiz, O.; Chang, David; Dalton, Stephen; Engel, Alexander; Faiz, Omar; Livingston, Ed; Mahmoud, Najjia; Rabaglia, Jennifer L.; Ramamoorthy, Sonia; Singh, Baljit; Tollenaar, Rob; van Berge Henegouwen, Mark I.

    2014-01-01

    Aim Significant variation in colorectal surgery outcomes exists between different countries. Better understanding of the sources of variable outcomes using administrative data requires alignment of differing clinical coding systems. We aimed to map similar diagnoses and procedures across

  2. The exploration of relationship between the surgery grading management and the ICD-9-CM-3 coding

    Directory of Open Access Journals (Sweden)

    Xin-yu FAN

    2014-09-01

    Full Text Available Surgery grading management is one of the key aspects of medical technology access and medical quality management. Surgical classification is graded by risk level, the degree of difficulty of the process and the technology; however, surgery coding is mainly classified by the surgical site. Therefore, the grading of the ICD coding surgical name encounters some difficulties. Our hospital uses the “Jiangsu Province set of medical information classification and coding standards” and “Jiangsu Province surgery hierarchical directory”, which is issued by Jiangsu Provincial Commission of Health and Family Planning, as the basis. We are practicing and exploring about the correspondence between the surgery which has graded and ICD-9-CM-3 encoding, including six categories problems, such as different types of the same operation, different surgeries of the same parts. We carry out the surgical grading and coding intelligent management into hospital management, which will regulate the management of hospital surgery more effectively, ensure the safety of medical quality, and reduce the incidence of adverse events in health care.

  3. Perceptual coding of stereo endoscopy video for minimally invasive surgery

    Science.gov (United States)

    Bartoli, Guido; Menegaz, Gloria; Yang, Guang Zhong

    2007-03-01

    In this paper, we propose a compression scheme that is tailored for stereo-laparoscope sequences. The inter-frame correlation is modeled by the deformation field obtained by elastic registration between two subsequent frames and exploited for prediction of the left sequence. The right sequence is lossy encoded by prediction from the corresponding left images. Wavelet-based coding is applied to both the deformation vector fields and residual images. The resulting system supports spatio temporal scalability, while providing lossless performance. The implementation of the wavelet transform by integer lifting ensures a low computational complexity, thus reducing the required run-time memory allocation and on line implementation. Extensive psychovisual tests were performed for system validation and characterization with respect to the MPEG4 standard for video coding. Results are very encouraging: the PSVC system features the functionalities making it suitable for PACS while providing a good trade-off between usability and performance in lossy mode.

  4. A traffic-light coding system to organize emergency surgery across surgical disciplines.

    Science.gov (United States)

    Leppäniemi, A; Jousela, I

    2014-01-01

    Emergency surgery is associated with night-time procedures and disruption of elective surgery. An analysis was undertaken of the effect of classifying emergency operations uniformly with a three-tier urgency colour code and the use of dedicated daytime operating rooms. Observed changes from 2001 to 2012 in the number, timing and ability to meet the urgency-designated colour code deadline were retrieved from the computer-based operating theatre organization system for all emergency operations. The number of emergency operations performed annually ranged from 3330 to 4341, with an increasing trend. The proportion of night-time emergency operations decreased from 27.4 per cent (2563 of 9347) before to 23.5 per cent (7731 of 32,959) after introduction of the colour coding system in 2004 (χ2  = 61.94, 1 d.f., P emergency operation theatre was 85.4 per cent. The structural separation of elective and emergency surgery, the use of dedicated daytime operating theatres and the implementation of a universal classification of emergency operations reduced night-time surgery, improved the efficiency of operating theatre utilization during daytime, shortened preoperative delay in patients requiring urgent surgery, and enabled monitoring and corrective actions for providing emergency surgery services. © 2013 BJS Society Ltd. Published by John Wiley & Sons Ltd.

  5. Team interaction during surgery: a systematic review of communication coding schemes.

    Science.gov (United States)

    Tiferes, Judith; Bisantz, Ann M; Guru, Khurshid A

    2015-05-15

    Communication problems have been systematically linked to human errors in surgery and a deep understanding of the underlying processes is essential. Although a number of tools exist to assess nontechnical skills, methods to study communication and other team-related processes are far from being standardized, making comparisons challenging. We conducted a systematic review to analyze methods used to study events in the operating room (OR) and to develop a synthesized coding scheme for OR team communication. Six electronic databases were accessed to search for articles that collected individual events during surgery and included detailed coding schemes. Additional articles were added based on cross-referencing. That collection was then classified based on type of events collected, environment type (real or simulated), number of procedures, type of surgical task, team characteristics, method of data collection, and coding scheme characteristics. All dimensions within each coding scheme were grouped based on emergent content similarity. Categories drawn from articles, which focused on communication events, were further analyzed and synthesized into one common coding scheme. A total of 34 of 949 articles met the inclusion criteria. The methodological characteristics and coding dimensions of the articles were summarized. A priori coding was used in nine studies. The synthesized coding scheme for OR communication included six dimensions as follows: information flow, period, statement type, topic, communication breakdown, and effects of communication breakdown. The coding scheme provides a standardized coding method for OR communication, which can be used to develop a priori codes for future studies especially in comparative effectiveness research. Copyright © 2015 Elsevier Inc. All rights reserved.

  6. Surgery

    Science.gov (United States)

    ... and sterile gloves. Before the surgery begins, a time out is held during which the surgical team confirms ... the Consumer Version. DOCTORS: Click here for the Professional Version What Participants Need to Know About Clinical ...

  7. Surgery

    Science.gov (United States)

    ... surgery has several common causes, including the following: Infections at the operative site Lung problems such as pneumonia or collapsed lung ... the trauma of an operation. The risk of infections at the operative site, DVTs, and UTIs can be decreased by meticulous ...

  8. Robotic surgery

    Science.gov (United States)

    Robot-assisted surgery; Robotic-assisted laparoscopic surgery; Laparoscopic surgery with robotic assistance ... Robotic surgery is similar to laparoscopic surgery. It can be performed through smaller cuts than open surgery. ...

  9. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  10. Coding Class

    DEFF Research Database (Denmark)

    Ejsing-Duun, Stine; Hansbøl, Mikala

    Sammenfatning af de mest væsentlige pointer fra hovedrapporten: Dokumentation og evaluering af Coding Class......Sammenfatning af de mest væsentlige pointer fra hovedrapporten: Dokumentation og evaluering af Coding Class...

  11. Cosmetic Surgery

    Science.gov (United States)

    ... Body Looking and feeling your best Cosmetic surgery Cosmetic surgery Teens might have cosmetic surgery for a number ... about my body? What are the risks of cosmetic surgery? top People who have cosmetic surgery face many ...

  12. Maze Surgery

    Science.gov (United States)

    ... Center > Maze Surgery Menu Topics Topics FAQs Maze Surgery Article Info En español Electrical impulses in your ... called an arrhythmia. Why do I need Maze surgery? Maze surgery is also called the Maze procedure. ...

  13. Network Coding

    Indian Academy of Sciences (India)

    message symbols downstream, network coding achieves vast performance gains by permitting intermediate nodes to carry out algebraic oper- ations on the incoming data. In this article we present a tutorial introduction to network coding as well as an application to the e±cient operation of distributed data-storage networks.

  14. Coding Class

    DEFF Research Database (Denmark)

    Ejsing-Duun, Stine; Hansbøl, Mikala

    Denne rapport rummer evaluering og dokumentation af Coding Class projektet1. Coding Class projektet blev igangsat i skoleåret 2016/2017 af IT-Branchen i samarbejde med en række medlemsvirksomheder, Københavns kommune, Vejle Kommune, Styrelsen for IT- og Læring (STIL) og den frivillige forening......, design tænkning og design-pædagogik, Stine Ejsing-Duun fra Forskningslab: It og Læringsdesign (ILD-LAB) ved Institut for kommunikation og psykologi, Aalborg Universitet i København. Vi har fulgt og gennemført evaluering og dokumentation af Coding Class projektet i perioden november 2016 til maj 2017....... Coding Class projektet er et pilotprojekt, hvor en række skoler i København og Vejle kommuner har igangsat undervisningsaktiviteter med fokus på kodning og programmering i skolen. Evalueringen og dokumentationen af projektet omfatter kvalitative nedslag i udvalgte undervisningsinterventioner i efteråret...

  15. Coding Labour

    Directory of Open Access Journals (Sweden)

    Anthony McCosker

    2014-03-01

    Full Text Available As well as introducing the Coding Labour section, the authors explore the diffusion of code across the material contexts of everyday life, through the objects and tools of mediation, the systems and practices of cultural production and organisational management, and in the material conditions of labour. Taking code beyond computation and software, their specific focus is on the increasingly familiar connections between code and labour with a focus on the codification and modulation of affect through technologies and practices of management within the contemporary work organisation. In the grey literature of spreadsheets, minutes, workload models, email and the like they identify a violence of forms through which workplace affect, in its constant flux of crisis and ‘prodromal’ modes, is regulated and governed.

  16. Plastic Surgery: Tackling Misconceptions

    African Journals Online (AJOL)

    will succeed. First impressions tend to last, and if young people's first impression of plastic surgeons is that they spend much of their time doing cosmetic surgery then this is a first impression that might be long ... Res 2014;4 Suppl S3:169‑70. Access this article online. Quick Response Code: Website: www.amhsr.org. DOI:.

  17. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  18. Turbinate surgery

    Science.gov (United States)

    Turbinectomy; Turbinoplasty; Turbinate reduction; Nasal airway surgery; Nasal obstruction - turbinate surgery ... There are several types of turbinate surgery: Turbinectomy: All or ... This can be done in several different ways, but sometimes a ...

  19. NSURE code

    International Nuclear Information System (INIS)

    Rattan, D.S.

    1993-11-01

    NSURE stands for Near-Surface Repository code. NSURE is a performance assessment code. developed for the safety assessment of near-surface disposal facilities for low-level radioactive waste (LLRW). Part one of this report documents the NSURE model, governing equations and formulation of the mathematical models, and their implementation under the SYVAC3 executive. The NSURE model simulates the release of nuclides from an engineered vault, their subsequent transport via the groundwater and surface water pathways tot he biosphere, and predicts the resulting dose rate to a critical individual. Part two of this report consists of a User's manual, describing simulation procedures, input data preparation, output and example test cases

  20. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and softwa...... expression in the public realm. The book’s line of argument defends language against its invasion by economics, arguing that speech continues to underscore the human condition, however paradoxical this may seem in an era of pervasive computing....

  1. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  2. ANIMAL code

    Energy Technology Data Exchange (ETDEWEB)

    Lindemuth, I.R.

    1979-02-28

    This report describes ANIMAL, a two-dimensional Eulerian magnetohydrodynamic computer code. ANIMAL's physical model also appears. Formulated are temporal and spatial finite-difference equations in a manner that facilitates implementation of the algorithm. Outlined are the functions of the algorithm's FORTRAN subroutines and variables.

  3. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621 ...

  4. ANIMAL code

    International Nuclear Information System (INIS)

    Lindemuth, I.R.

    1979-01-01

    This report describes ANIMAL, a two-dimensional Eulerian magnetohydrodynamic computer code. ANIMAL's physical model also appears. Formulated are temporal and spatial finite-difference equations in a manner that facilitates implementation of the algorithm. Outlined are the functions of the algorithm's FORTRAN subroutines and variables

  5. Expander Codes

    Indian Academy of Sciences (India)

    Codes and Channels. A noisy communication channel is illustrated in Fig- ... nication channel. Suppose we want to transmit a message over the unreliable communication channel so that even if the channel corrupts some of the bits we are able to recover ..... is d-regular, meaning thereby that every vertex has de- gree d.

  6. Expander Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 10; Issue 1. Expander Codes - The Sipser–Spielman Construction. Priti Shankar. General Article Volume 10 ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science Bangalore 560 012, India.

  7. Network Coding

    Indian Academy of Sciences (India)

    Network coding is a technique to increase the amount of information °ow in a network by mak- ing the key observation that information °ow is fundamentally different from commodity °ow. Whereas, under traditional methods of opera- tion of data networks, intermediate nodes are restricted to simply forwarding their incoming.

  8. Panda code

    International Nuclear Information System (INIS)

    Altomare, S.; Minton, G.

    1975-02-01

    PANDA is a new two-group one-dimensional (slab/cylinder) neutron diffusion code designed to replace and extend the FAB series. PANDA allows for the nonlinear effects of xenon, enthalpy and Doppler. Fuel depletion is allowed. PANDA has a completely general search facility which will seek criticality, maximize reactivity, or minimize peaking. Any single parameter may be varied in a search. PANDA is written in FORTRAN IV, and as such is nearly machine independent. However, PANDA has been written with the present limitations of the Westinghouse CDC-6600 system in mind. Most computation loops are very short, and the code is less than half the useful 6600 memory size so that two jobs can reside in the core at once. (auth)

  9. Dental Implant Surgery

    Science.gov (United States)

    ... here to find out more. Dental Implant Surgery Dental Implant Surgery Dental implant surgery is, of course, surgery, ... here to find out more. Dental Implant Surgery Dental Implant Surgery Dental implant surgery is, of course, surgery, ...

  10. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... here to find out more. Dental Implant Surgery Dental Implant Surgery Dental implant surgery is, of course, surgery, ... here to find out more. Dental Implant Surgery Dental Implant Surgery Dental implant surgery is, of course, surgery, ...

  11. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... to find out more. Dental Implant Surgery Dental Implant Surgery Dental implant surgery is, of course, surgery, ... to find out more. Dental Implant Surgery Dental Implant Surgery Dental implant surgery is, of course, surgery, ...

  12. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  13. Hemorrhoid surgery

    Science.gov (United States)

    ... surgery. Hemorrhoid surgery may involve: Putting a small rubber band around a hemorrhoid to shrink it by blocking blood flow. Stapling a hemorrhoid to block blood flow, causing it to shrink. Using a ...

  14. Plastic Surgery

    Science.gov (United States)

    ... idea for teens? As with everything, there are right and wrong reasons to have surgery. Cosmetic surgery is unlikely to change your life. Most board-certified plastic surgeons spend a lot of time ... the right reasons. Many plastic surgery procedures are just that — ...

  15. Automatic coding method of the ACR Code

    International Nuclear Information System (INIS)

    Park, Kwi Ae; Ihm, Jong Sool; Ahn, Woo Hyun; Baik, Seung Kook; Choi, Han Yong; Kim, Bong Gi

    1993-01-01

    The authors developed a computer program for automatic coding of ACR(American College of Radiology) code. The automatic coding of the ACR code is essential for computerization of the data in the department of radiology. This program was written in foxbase language and has been used for automatic coding of diagnosis in the Department of Radiology, Wallace Memorial Baptist since May 1992. The ACR dictionary files consisted of 11 files, one for the organ code and the others for the pathology code. The organ code was obtained by typing organ name or code number itself among the upper and lower level codes of the selected one that were simultaneous displayed on the screen. According to the first number of the selected organ code, the corresponding pathology code file was chosen automatically. By the similar fashion of organ code selection, the proper pathologic dode was obtained. An example of obtained ACR code is '131.3661'. This procedure was reproducible regardless of the number of fields of data. Because this program was written in 'User's Defined Function' from, decoding of the stored ACR code was achieved by this same program and incorporation of this program into program in to another data processing was possible. This program had merits of simple operation, accurate and detail coding, and easy adjustment for another program. Therefore, this program can be used for automation of routine work in the department of radiology

  16. American Society for Laser Medicine and Surgery

    Science.gov (United States)

    ... Back Specialty Laser and Energy-Based Device Use Dentistry Dermatology General Surgery Neurosurgery Obstetrics/Gynecology Oncology Ophthalmology ... About ASLMS Code of Ethics Standards of Practice History Governance Back Governance Board of Directors Committees Membership ...

  17. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  18. PAEDIATRIC SURGERY

    African Journals Online (AJOL)

    3 Department of Paediatric Surgery, Sophia's Children Hospital/Erasmus Medical Centre, Rotterdam, The Netherlands. 4 Department of Paediatric Surgery, Emma's Children Hospital/Academic Medical Centre, Amsterdam, The Netherlands. 5 Department of Radiology, Red Cross War Memorial Children's Hospital, ...

  19. PAEDIATRIC SURGERY

    African Journals Online (AJOL)

    Gastroschisis in a developing country: poor resuscitation is a more significant predictor of mortality than postnatal transfer time. PAEDIATRIC SURGERY. P Stevens,1 E Muller,1 P Becker2. 1 Department of Paediatric Surgery, Steve Biko Academic Hospital, University of Pretoria. 2 South African Medical Research Council.

  20. Model Children's Code.

    Science.gov (United States)

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  1. Affine Grassmann codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Beelen, Peter; Ghorpade, Sudhir Ramakant

    2010-01-01

    We consider a new class of linear codes, called affine Grassmann codes. These can be viewed as a variant of generalized Reed-Muller codes and are closely related to Grassmann codes.We determine the length, dimension, and the minimum distance of any affine Grassmann code. Moreover, we show that af...

  2. Generalized concatenated quantum codes

    International Nuclear Information System (INIS)

    Grassl, Markus; Shor, Peter; Smith, Graeme; Smolin, John; Zeng Bei

    2009-01-01

    We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length but also asymptotically meet the quantum Hamming bound for large block length.

  3. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  4. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  5. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  6. Rodding Surgery

    Science.gov (United States)

    ... usually undertaken as a scheduled elective procedure. An optimal age for a first rodding surgery has not ... which may prevent or postpone the need for replacement. The smallest diameter expanding rods are still too ...

  7. Lung surgery

    Science.gov (United States)

    ... the pulmonary artery ( pulmonary embolism ) Treat complications of tuberculosis Video-assisted thoracoscopic surgery can be used to ... Louisiana State University Health Sciences Center-Shreveport, Shreveport, LA. Review provided by VeriMed Healthcare Network. Also reviewed ...

  8. Bariatric Surgery

    Science.gov (United States)

    ... action of certain hormones, such as ghrelin —“the hunger hormone.” People have these types of surgery if ... organizations to further patient education on hormone related issues. Network Sponsors The Hormone Health Network is supported ...

  9. Epilepsy Surgery

    Science.gov (United States)

    ... and the portion of your brain that's involved: Memory problems. The temporal lobe handles memory and language functions, so surgery on this part ... computerized tomography (SPECT). The scan image varies in color depending on the amount of blood flow in ...

  10. After Surgery

    Science.gov (United States)

    After any operation, you'll have some side effects. There is usually some pain with surgery. There ... anesthesia, or accidental injury. Some people have a greater risk of complications because of other medical conditions. ...

  11. Brain surgery

    Science.gov (United States)

    Craniotomy; Surgery - brain; Neurosurgery; Craniectomy; Stereotactic craniotomy; Stereotactic brain biopsy; Endoscopic craniotomy ... Barnett J, Mohanty A, Desai SK, Patterson JT. Neurosurgery. In: Townsend CM Jr, Beauchamp RD, Evers BM, ...

  12. Bariatric surgery

    Science.gov (United States)

    Karmali, Shahzeer; Stoklossa, Carlene Johnson; Sharma, Arya; Stadnyk, Janet; Christiansen, Sandra; Cottreau, Danielle; Birch, Daniel W.

    2010-01-01

    Abstract OBJECTIVE To review the management of bariatric surgical patients. QUALITY OF EVIDENCE MEDLINE, EMBASE, and Cochrane Library databases were searched, as well as PubMed US National Library, from January 1950 to December 2009. Evidence was levels I, II, and III. MAIN MESSAGE Bariatric surgery should be considered for obese patients at high risk of morbidity and mortality who have not achieved adequate weight loss with lifestyle and medical management and who are suffering from the complications of obesity. Bariatric surgery can result in substantial weight loss, resolution of comorbid conditions, and improved quality of life. The patient’s weight-loss history; his or her personal accountability, responsibility, and comprehension; and the acceptable level of risk must be taken into account. Complications include technical failure, bleeding, abdominal pain, nausea or vomiting, excess loose skin, bowel obstruction, ulcers, and anastomotic stricture. Lifelong monitoring by a multidisciplinary team is essential. CONCLUSION Limited long-term success of behavioural and pharmacologic therapies in severe obesity has led to renewed interest in bariatric surgery. Success with bariatric surgery is more likely when multidisciplinary care providers, in conjunction with primary care providers, assess, treat, monitor, and evaluate patients before and after surgery. Family physicians will play a critical role in counseling patients about bariatric surgery and will need to develop skills in managing these patients in the long-term. PMID:20841586

  13. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... to find out more. Dental Implant Surgery Dental Implant Surgery Dental implant surgery is, of course, surgery, and is ... to find out more. Dental Implant Surgery Dental Implant Surgery Dental implant surgery is, of course, surgery, and is ...

  14. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... and Craniofacial Surgery Cleft Lip/Palate and Craniofacial Surgery A cleft lip may require one or more ... find out more. Corrective Jaw Surgery Corrective Jaw Surgery Orthognathic surgery is performed to correct the misalignment ...

  15. Mohs micrographic surgery

    Science.gov (United States)

    Skin cancer - Mohs surgery; Basal cell skin cancer - Mohs surgery; Squamous cell skin cancer - Mohs surgery ... Mohs surgery usually takes place in the doctor's office. The surgery is started early in the morning and is ...

  16. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  17. Error Correcting Codes

    Indian Academy of Sciences (India)

    sound quality is, in essence, obtained by accurate waveform coding and decoding of the audio signals. In addition, the coded audio information is protected against disc errors by the use of a Cross Interleaved Reed-Solomon Code (CIRC). Reed-. Solomon codes were discovered by Irving Reed and Gus Solomon in 1960.

  18. Foot Surgery

    Science.gov (United States)

    ... coding trends along with compliance guidelines and practice marketing materials, APMA has you covered whether you are ... Promote Your Practice Footprints Newsletter Public Education Campaigns Digital Brochures Reaching Out to the Media Feature Article ...

  19. Network Coding Taxonomy

    OpenAIRE

    Adamson , Brian; Adjih , Cédric; Bilbao , Josu; Firoiu , Victor; Fitzek , Frank; Samah , Ghanem ,; Lochin , Emmanuel; Masucci , Antonia; Montpetit , Marie-Jose; Pedersen , Morten V.; Peralta , Goiuri; Roca , Vincent; Paresh , Saxena; Sivakumar , Senthil

    2017-01-01

    Internet Research Task Force - Working document of the Network Coding Research Group (NWCRG), draft-irtf-nwcrg-network-coding-taxonomy-05 (work in progress), https://datatracker.ietf.org/doc/draft-irtf-nwcrg-network-coding-taxonomy/; This document summarizes a recommended terminology for Network Coding concepts and constructs. It provides a comprehensive set of terms with unique names in order to avoid ambiguities in future Network Coding IRTF and IETF documents. This document is intended to ...

  20. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  1. Bariatric surgery

    Directory of Open Access Journals (Sweden)

    Alojz Pleskovič

    2013-07-01

    Full Text Available Background: In almost six decades different surgical techniques have been developed to treat patients with morbid obesity. Various surgical techniques are generally divided with respect to their effect into restrictive, malabsorbtive and humoral and a combination of these. Surgically modified human metabolism ameliorates metabolic diseases, particularly diabetes, even in nonobese patients. The understanding of metabolic effects changed the traditional paradigm of bariatric surgery from simple weight-loss procedure to metabolic surgery affecting whole-body metabolism. Proper surgical technique for individual patient is the most important factor influencing long- term results, comorbidities and quality of life. Recommendations for patient selection, surgical methods and pre- and postoperative patient management are to be respected. Metabolic surgery principles and current concepts are presented.

  2. Efficient Coding of Information: Huffman Coding -RE ...

    Indian Academy of Sciences (India)

    1. Introduction. Shannon's landmark paper 'A Mathematical Theory of. Communication' [1] laid the foundation for communica- ... coding theory, codes over graphs and iterative techniques, and informa- tion theory. .... An important consequence of independence is that if. {Xb X2 , . Xn} are independent random variables, each.

  3. Turbo Codes Extended with Outer BCH Code

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1996-01-01

    The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is proposed...

  4. Cosmetic surgery.

    OpenAIRE

    Harris, D. L.

    1989-01-01

    The psychotherapeutic nature of cosmetic surgery is emphasised by outlining the range of symptoms from which patients suffer and by explaining the sequence of psychological reactions which cause them. The principles which govern the selection of patients are defined. A brief account of each of the main cosmetic operations is given together with notes on their limitations and risks.

  5. PLASTIC SURGERY

    African Journals Online (AJOL)

    surgery or subcutaneous mastectomy utilizing a periareolar or circumareolar ... old. Informed consent was obtained. The height of the patients was measured from heel to vertex with a standard height measuring device. The chest circumference was ... The procedure was followed with liposuction 3-6 months later if required.

  6. GENERAL SURGERY

    African Journals Online (AJOL)

    Summary: The multidisciplinary management of Breast Cancer (BC) has evolved over the past 50 years: the patient is offered a choice of .... Choice of procedure. – For women with early BC, there is essentially a choice between 2 procedures: mastectomy or breast conserving surgery with radiation (BCT). The standard.

  7. GENERAL SURGERY

    African Journals Online (AJOL)

    Schwab , using a three-phase approach.5 In 1998, Moore et al. extended the concept and described the five-stage approach.6. The aim of damage control surgery is to prevent severely injured patients from developing the “lethal triad” of hypothermia, coagulopathy and worsening acidosis, as this confers a dismal prognosis ...

  8. GENERAL SURGERY

    African Journals Online (AJOL)

    We plan to protocolise earlier surgery and blood conservation strategies intraoperatively in addition to a restrictive strategy in ..... Marshall JC. Review Transfusion trigger: when to transfuse? Crit Care. 2004;8(Suppl 2):S31-3. 11. Hofmann A, Farmer S, Towler SC. Strategies to preempt and reduce the use of blood products: ...

  9. Cosmetic Surgery

    Science.gov (United States)

    ... http://www.mayoclinic.com/health/cosmetic-surgery/SN00006 Medical Tourism (Copyright © American Society of Plastic Surgeons) — People considering ... in exotic vacation spots. This publication talks about "medical tourism" and whether it's safe. http://www.plasticsurgery.org/ ...

  10. GENERAL SURGERY

    African Journals Online (AJOL)

    Department of Surgery, University of Cape Town Health Sciences Faculty, Groote Schuur Hospital, Observatory, Cape Town,. South Africa ... included all district, regional and tertiary hospitals in the nine provinces. Clinics and so-called ..... large contingency of senior general surgeons from countries such as Cuba, who have ...

  11. GENERAL SURGERY

    African Journals Online (AJOL)

    after pancreaticoduodenectomy for pancreatic ductal adenocarcinoma. J Surg Oncol. 2016;113(2):188-193. http:// dx.doi.org/10.1002/jso.24125. 2. Wente MN, Veit JA, Bassi C, et al. Postpancreatectomy hemorrhage (PPH): An international study group of pancreatic surgery (ISGPS) definition. Surg. 2007;142(1):20-25. http://.

  12. Metabolic Surgery

    DEFF Research Database (Denmark)

    Pareek, Manan; Schauer, Philip R; Kaplan, Lee M

    2018-01-01

    the superiority of surgery over medical treatment alone in achieving improved glycemic control, as well as a reduction in cardiovascular risk factors. The mechanisms seem to extend beyond the magnitude of weight loss alone and include improvements in incretin profiles, insulin secretion, and insulin sensitivity...

  13. TRAUMA SURGERY

    African Journals Online (AJOL)

    deaths due to other trauma types (gunshot wounds, road traffic fatalities and assault) ... the axillary artery was ligated during surgery. Type of ... Left axillary artery. Ischaemic left upper limb. 3. Fifth intercostal space on the left. Bilateral pneumothorax and haemothorax still present at autopsy. (intercostal drain only inserted on ...

  14. Carotid artery surgery

    Science.gov (United States)

    Carotid endarterectomy; CAS surgery; Carotid artery stenosis - surgery; Endarterectomy - carotid artery ... through the catheter around the blocked area during surgery. Your carotid artery is opened. The surgeon removes ...

  15. SEVERO code - user's manual

    International Nuclear Information System (INIS)

    Sacramento, A.M. do.

    1989-01-01

    This user's manual contains all the necessary information concerning the use of SEVERO code. This computer code is related to the statistics of extremes = extreme winds, extreme precipitation and flooding hazard risk analysis. (A.C.A.S.)

  16. Model and code development

    International Nuclear Information System (INIS)

    Anon.

    1977-01-01

    Progress in model and code development for reactor physics calculations is summarized. The codes included CINDER-10, PHROG, RAFFLE GAPP, DCFMR, RELAP/4, PARET, and KENO. Kinetics models for the PBF were developed

  17. Coding for optical channels

    CERN Document Server

    Djordjevic, Ivan; Vasic, Bane

    2010-01-01

    This unique book provides a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory and optical communication.

  18. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  19. Stylize Aesthetic QR Code

    OpenAIRE

    Xu, Mingliang; Su, Hao; Li, Yafei; Li, Xi; Liao, Jing; Niu, Jianwei; Lv, Pei; Zhou, Bing

    2018-01-01

    With the continued proliferation of smart mobile devices, Quick Response (QR) code has become one of the most-used types of two-dimensional code in the world. Aiming at beautifying the appearance of QR codes, existing works have developed a series of techniques to make the QR code more visual-pleasant. However, these works still leave much to be desired, such as visual diversity, aesthetic quality, flexibility, universal property, and robustness. To address these issues, in this paper, we pro...

  20. ARC Code TI: CODE Software Framework

    Data.gov (United States)

    National Aeronautics and Space Administration — CODE is a software framework for control and observation in distributed environments. The basic functionality of the framework allows a user to observe a distributed...

  1. ARC Code TI: ROC Curve Code Augmentation

    Data.gov (United States)

    National Aeronautics and Space Administration — ROC (Receiver Operating Characteristic) curve Code Augmentation was written by Rodney Martin and John Stutz at NASA Ames Research Center and is a modification of ROC...

  2. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  3. Error Correcting Codes -34 ...

    Indian Academy of Sciences (India)

    the reading of data from memory the receiving process. Protecting data in computer memories was one of the earliest applications of Hamming codes. We now describe the clever scheme invented by Hamming in 1948. To keep things simple, we describe the binary length 7 Hamming code. Encoding in the Hamming Code.

  4. Morse Code Activity Packet.

    Science.gov (United States)

    Clinton, Janeen S.

    This activity packet offers simple directions for setting up a Morse Code system appropriate to interfacing with any of several personal computer systems. Worksheets are also included to facilitate teaching Morse Code to persons with visual or other disabilities including blindness, as it is argued that the code is best learned auditorily. (PB)

  5. Fifty Years of Innovation in Plastic Surgery

    Directory of Open Access Journals (Sweden)

    Richard M Kwasnicki

    2016-03-01

    Full Text Available BackgroundInnovation has molded the current landscape of plastic surgery. However, documentation of this process only exists scattered throughout the literature as individual articles. The few attempts made to profile innovation in plastic surgery have been narrative, and therefore qualitative and inherently biased. Through the implementation of a novel innovation metric, this work aims to identify and characterise the most prevalent innovations in plastic surgery over the last 50 years.MethodsPatents and publications related to plastic surgery (1960 to 2010 were retrieved from patent and MEDLINE databases, respectively. The most active patent codes were identified and grouped into technology areas, which were subsequently plotted graphically against publication data. Expert-derived technologies outside of the top performing patents areas were additionally explored.ResultsBetween 1960 and 2010, 4,651 patents and 43,118 publications related to plastic surgery were identified. The most active patent codes were grouped under reconstructive prostheses, implants, instruments, non-invasive techniques, and tissue engineering. Of these areas and other expert-derived technologies, those currently undergoing growth include surgical instruments, implants, non-invasive practices, transplantation and breast surgery. Innovations related to microvascular surgery, liposuction, tissue engineering, lasers and prostheses have all plateaued.ConclusionsThe application of a novel metric for evaluating innovation quantitatively outlines the natural history of technologies fundamental to the evolution of plastic surgery. Analysis of current innovation trends provides some insight into which technology domains are the most active.

  6. The psychological impact of body contouring surgery

    DEFF Research Database (Denmark)

    Mikkelsen Lorenzen, Mike; Poulsen, Lotte; Poulsen, Signe

    2018-01-01

    relevant codes had been extracted. RESULTS: A total of seven psychological themes were iden- tified, indicating that surgery alone cannot improve the pa- tients’ psychological difficulties and that psychological care and management of the expected discomfort and body im- age is of considerable importance......INTRODUCTION: Body contouring surgery is associated with changes in body image and identity. The primary aim of the study was to investigate a multidisciplinary assessment of potential psychological challenges before and after body contouring surgery. METHODS: Eight pre- and post-operative patients...... undergo- ing plastic surgery, two surgeons and two nurses were in- vestigated using semi-structured and focus group inter- views to capture the perspectives of both the healthcare professionals and the patients. Data were analysed using an interpretive descriptive approach and coded line-by-line until all...

  7. Software Certification - Coding, Code, and Coders

    Science.gov (United States)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  8. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... and Craniofacial Surgery A cleft lip may require one or more surgeries depending on the extent of ... and Craniofacial Surgery A cleft lip may require one or more surgeries depending on the extent of ...

  9. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... to find out more. Facial Cosmetic Surgery Facial Cosmetic Surgery Extensive education and training in surgical procedures ... to find out more. Facial Cosmetic Surgery Facial Cosmetic Surgery Extensive education and training in surgical procedures ...

  10. Tennis elbow surgery - discharge

    Science.gov (United States)

    Lateral epicondylitis surgery - discharge; Lateral tendinosis surgery - discharge; Lateral tennis elbow surgery - discharge ... Soon after surgery, severe pain will decrease, but you may have mild soreness for 3 to 6 months.

  11. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... to find out more. Facial Cosmetic Surgery Facial Cosmetic Surgery Extensive education and training in surgical procedures involving ... to find out more. Facial Cosmetic Surgery Facial Cosmetic Surgery Extensive education and training in surgical procedures involving ...

  12. Orthognathic Surgery

    DEFF Research Database (Denmark)

    Kjærgaard Larsen, Marie; Thygesen, Torben Henrik

    2016-01-01

    on the level of satisfaction was studied. The social-networking web site Facebook was used to identify the study population. An online questionnaire was performed using the website SurveyMonkey. In all, 105 (9%) respondents from the Danish Facebook group about OS, called Kaebeoperation (jaw surgery), were......The literature shows that the indications for orthognathic surgery (OS) are often functional problems and unsatisfactory facial esthetics. This study investigated the esthetic outcomes and overall satisfaction following OS. Somatosensory change is a relatively common complication and its influence...... to sex, age, and somatosensory change. High satisfaction and improvement in facial esthetic after OS were seen. Young patients (16-25 years) and men indicated a higher degree of satisfaction than old (>25 years) patients and women. The use of social media seems to be an interesting platform...

  13. The network code

    International Nuclear Information System (INIS)

    1997-01-01

    The Network Code defines the rights and responsibilities of all users of the natural gas transportation system in the liberalised gas industry in the United Kingdom. This report describes the operation of the Code, what it means, how it works and its implications for the various participants in the industry. The topics covered are: development of the competitive gas market in the UK; key points in the Code; gas transportation charging; impact of the Code on producers upstream; impact on shippers; gas storage; supply point administration; impact of the Code on end users; the future. (20 tables; 33 figures) (UK)

  14. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    , Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...... to understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  15. Coding for Electronic Mail

    Science.gov (United States)

    Rice, R. F.; Lee, J. J.

    1986-01-01

    Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.

  16. XSOR codes users manual

    International Nuclear Information System (INIS)

    Jow, Hong-Nian; Murfin, W.B.; Johnson, J.D.

    1993-11-01

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ''XSOR''. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms

  17. DLLExternalCode

    Energy Technology Data Exchange (ETDEWEB)

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  18. Emergency surgery

    DEFF Research Database (Denmark)

    Stoneham, M; Murray, D; Foss, N

    2014-01-01

    undertaken on elderly patients with limited physiological reserve. National audits have reported variations in care quality, data that are increasingly being used to drive quality improvement through professional guidance. Given that the number of elderly patients presenting for emergency surgery is likely...... to rise as the population ages, this review summarises the evidence on which such guidance is based, and provides information about how anaesthetists might participate in audit and research aimed at improving local and national outcomes for these most vulnerable of patients....

  19. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  20. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  1. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow t...... the transversal implementation of a universal set of gates by gauge fixing, while error-dectecting measurements involve only four or six qubits....

  2. Doubled Color Codes

    Science.gov (United States)

    Bravyi, Sergey

    Combining protection from noise and computational universality is one of the biggest challenges in the fault-tolerant quantum computing. Topological stabilizer codes such as the 2D surface code can tolerate a high level of noise but implementing logical gates, especially non-Clifford ones, requires a prohibitively large overhead due to the need of state distillation. In this talk I will describe a new family of 2D quantum error correcting codes that enable a transversal implementation of all logical gates required for the universal quantum computing. Transversal logical gates (TLG) are encoded operations that can be realized by applying some single-qubit rotation to each physical qubit. TLG are highly desirable since they introduce no overhead and do not spread errors. It has been known before that a quantum code can have only a finite number of TLGs which rules out computational universality. Our scheme circumvents this no-go result by combining TLGs of two different quantum codes using the gauge-fixing method pioneered by Paetznick and Reichardt. The first code, closely related to the 2D color code, enables a transversal implementation of all single-qubit Clifford gates such as the Hadamard gate and the π / 2 phase shift. The second code that we call a doubled color code provides a transversal T-gate, where T is the π / 4 phase shift. The Clifford+T gate set is known to be computationally universal. The two codes can be laid out on the honeycomb lattice with two qubits per site such that the code conversion requires parity measurements for six-qubit Pauli operators supported on faces of the lattice. I will also describe numerical simulations of logical Clifford+T circuits encoded by the distance-3 doubled color code. Based on a joint work with Andrew Cross.

  3. Phonological coding during reading

    Science.gov (United States)

    Leinenger, Mallorie

    2014-01-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early (pre-lexical) or that phonological codes come online late (post-lexical)) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eyetracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model (Van Order, 1987), dual-route model (e.g., Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001), parallel distributed processing model (Seidenberg & McClelland, 1989)) are discussed. PMID:25150679

  4. MORSE Monte Carlo code

    Energy Technology Data Exchange (ETDEWEB)

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described.

  5. Bar Code Labels

    Science.gov (United States)

    1988-01-01

    American Bar Codes, Inc. developed special bar code labels for inventory control of space shuttle parts and other space system components. ABC labels are made in a company-developed anodizing aluminum process and consecutively marketed with bar code symbology and human readable numbers. They offer extreme abrasion resistance and indefinite resistance to ultraviolet radiation, capable of withstanding 700 degree temperatures without deterioration and up to 1400 degrees with special designs. They offer high resistance to salt spray, cleaning fluids and mild acids. ABC is now producing these bar code labels commercially or industrial customers who also need labels to resist harsh environments.

  6. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  7. MORSE Monte Carlo code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described

  8. Tokamak Systems Code

    International Nuclear Information System (INIS)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged

  9. ARC Code TI: ACCEPT

    Data.gov (United States)

    National Aeronautics and Space Administration — ACCEPT consists of an overall software infrastructure framework and two main software components. The software infrastructure framework consists of code written to...

  10. On {\\sigma}-LCD codes

    OpenAIRE

    Carlet, Claude; Mesnager, Sihem; Tang, Chunming; Qi, Yanfeng

    2017-01-01

    Linear complementary pairs (LCP) of codes play an important role in armoring implementations against side-channel attacks and fault injection attacks. One of the most common ways to construct LCP of codes is to use Euclidean linear complementary dual (LCD) codes. In this paper, we first introduce the concept of linear codes with $\\sigma$ complementary dual ($\\sigma$-LCD), which includes known Euclidean LCD codes, Hermitian LCD codes, and Galois LCD codes. As Euclidean LCD codes, $\\sigma$-LCD ...

  11. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    We welcome Tanya Stivers’s discussion (Stivers, 2015/this issue) of coding social interaction and find that her descriptions of the processes of coding open up important avenues for discussion, among other things of the precise ad hoc considerations that researchers need to bear in mind, both when...

  12. Error Correcting Codes -34 ...

    Indian Academy of Sciences (India)

    Science, Bangalore. Her interests are in. Theoretical Computer. Science. SERIES I ARTICLE. Error Correcting Codes. 2. The Hamming Codes. Priti Shankar. In the first article of this series we showed how redundancy introduced into a message transmitted over a noisy channel could improve the reliability of transmission. In.

  13. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    set up a well defined goal - that of achieving a per- formance bound set by the noisy channel coding theo- rem, proved in the paper. Whereas the goal appeared elusive twenty five years ago, today, there are practi- cal codes and decoding algorithms that come close to achieving it. It is interesting to note that all known.

  14. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 3. Error Correcting Codes - Reed Solomon Codes. Priti Shankar. Series Article Volume 2 Issue 3 March 1997 pp 33-47. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/002/03/0033-0047 ...

  15. Insurance billing and coding.

    Science.gov (United States)

    Napier, Rebecca H; Bruelheide, Lori S; Demann, Eric T K; Haug, Richard H

    2008-07-01

    The purpose of this article is to highlight the importance of understanding various numeric and alpha-numeric codes for accurately billing dental and medically related services to private pay or third-party insurance carriers. In the United States, common dental terminology (CDT) codes are most commonly used by dentists to submit claims, whereas current procedural terminology (CPT) and International Classification of Diseases, Ninth Revision, Clinical Modification (ICD.9.CM) codes are more commonly used by physicians to bill for their services. The CPT and ICD.9.CM coding systems complement each other in that CPT codes provide the procedure and service information and ICD.9.CM codes provide the reason or rationale for a particular procedure or service. These codes are more commonly used for "medical necessity" determinations, and general dentists and specialists who routinely perform care, including trauma-related care, biopsies, and dental treatment as a result of or in anticipation of a cancer-related treatment, are likely to use these codes. Claim submissions for care provided can be completed electronically or by means of paper forms.

  16. Codes of Conduct

    Science.gov (United States)

    Million, June

    2004-01-01

    Most schools have a code of conduct, pledge, or behavioral standards, set by the district or school board with the school community. In this article, the author features some schools that created a new vision of instilling code of conducts to students based on work quality, respect, safety and courtesy. She suggests that communicating the code…

  17. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    Department of Computer. Science 'and Automation,. lISe. Their research addresses ... The fifty five year old history of error correcting codes began with Claude Shannon's path-breaking paper en- titled 'A ... given the limited computing power available then, Gal- lager's codes were not considered practical. A landmark.

  18. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 3. Error Correcting Codes - Reed Solomon Codes. Priti Shankar. Series Article Volume 2 Issue 3 March ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560 012, India ...

  19. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 9. Decoding Codes on Graphs - Low Density Parity Check Codes. A S Madhu Aditya Nori. General Article Volume 8 Issue 9 September 2003 pp 49-59. Fulltext. Click here to view fulltext PDF. Permanent link:

  20. READING A NEURAL CODE

    NARCIS (Netherlands)

    BIALEK, W; RIEKE, F; VANSTEVENINCK, RRD; WARLAND, D

    1991-01-01

    Traditional approaches to neural coding characterize the encoding of known stimuli in average neural responses. Organisms face nearly the opposite task - extracting information about an unknown time-dependent stimulus from short segments of a spike train. Here the neural code was characterized from

  1. The lacrimal system: diagnosis, management, and surgery

    National Research Council Canada - National Science Library

    Cohen, Adam J; Mercandetti, Michael; Brazzo, Brian G

    2006-01-01

    ... and techniques presented represent the state of the art of lacrimal diagnosis and surgery. There is mention of lacrimal infection dating back to the Code of Hammurabi in 2250 BC, but it was not until the late 1800s that real progress began to be made. Toti, an ENT surgeon in Florence, Italy, described external dacryocystorhinostomy (DCR) with turb...

  2. Choosing surgery

    DEFF Research Database (Denmark)

    Thorstensson, Carina; Lohmander, L; Frobell, Richard

    2009-01-01

    -depth qualitative interviews were conducted with young (aged 18-35), physically active individuals with ACL rupture who were participating in a RCT comparing training and surgical reconstruction with training only. 22/34 were randomised to training only but crossed over to surgery. Of these, 11 were interviewed...... and many patients said that they joined the RCT in order to bypass waiting lists. Patients who chose to cross-over described training as time consuming, boring and as unable to provide sufficient results within a reasonable timeframe. Some said their injured knees had given-way; others experienced new knee...... a variety of views and beliefs about those treatments, and trial participation happens in the absence of equipoise. Furthermore, opting for surgical reconstruction does not necessarily provide patients with satisfactory outcomes. Definition of successful outcome may require an individualised approach...

  3. Fracture flow code

    International Nuclear Information System (INIS)

    Dershowitz, W; Herbert, A.; Long, J.

    1989-03-01

    The hydrology of the SCV site will be modelled utilizing discrete fracture flow models. These models are complex, and can not be fully cerified by comparison to analytical solutions. The best approach for verification of these codes is therefore cross-verification between different codes. This is complicated by the variation in assumptions and solution techniques utilized in different codes. Cross-verification procedures are defined which allow comparison of the codes developed by Harwell Laboratory, Lawrence Berkeley Laboratory, and Golder Associates Inc. Six cross-verification datasets are defined for deterministic and stochastic verification of geometric and flow features of the codes. Additional datasets for verification of transport features will be documented in a future report. (13 figs., 7 tabs., 10 refs.) (authors)

  4. Validation of thermalhydraulic codes

    International Nuclear Information System (INIS)

    Wilkie, D.

    1992-01-01

    Thermalhydraulic codes require to be validated against experimental data collected over a wide range of situations if they are to be relied upon. A good example is provided by the nuclear industry where codes are used for safety studies and for determining operating conditions. Errors in the codes could lead to financial penalties, to the incorrect estimation of the consequences of accidents and even to the accidents themselves. Comparison between prediction and experiment is often described qualitatively or in approximate terms, e.g. ''agreement is within 10%''. A quantitative method is preferable, especially when several competing codes are available. The codes can then be ranked in order of merit. Such a method is described. (Author)

  5. Heart failure - surgeries and devices

    Science.gov (United States)

    CHF - surgery; Congestive heart failure - surgery; Cardiomyopathy - surgery; HF - surgery; Intra-aortic balloon pumps - heart failure; IABP - heart failure; Catheter based assist devices - heart failure

  6. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... here to find out more. Dental Implant Surgery Dental Implant Surgery Dental implant surgery is, of course, ... to find out more. Wisdom Teeth Management Wisdom Teeth Management An impacted wisdom tooth can damage neighboring ...

  7. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... Oral Surgeries Facial Cosmetic Surgery Facial Injury / Trauma Surgery Obstructive Sleep Apnea (OSA) Oral, Head and Neck Pathology TMJ and Facial Pain Wisdom Teeth Management Procedures Anesthesia Anesthesia Oral and maxillofacial surgeons are ...

  8. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... Other Oral Surgeries Facial Cosmetic Surgery Facial Injury / Trauma Surgery Obstructive Sleep Apnea (OSA) Oral, Head and Neck Pathology TMJ and Facial Pain Wisdom Teeth Management Procedures Anesthesia Anesthesia Oral and maxillofacial surgeons ...

  9. Hip Replacement Surgery

    Science.gov (United States)

    ... Initiative Breadcrumb Home Health Topics English Español Hip Replacement Surgery Basics In-Depth Download Download EPUB Download ... What is it? Points To Remember About Hip Replacement Surgery Hip replacement surgery removes damaged or diseased ...

  10. Lung surgery - discharge

    Science.gov (United States)

    ... Lung biopsy - discharge; Thoracoscopy - discharge; Video-assisted thoracoscopic surgery - discharge; VATS - discharge ... milk) for 2 weeks after video-assisted thoracoscopic surgery and 6 to 8 weeks after open surgery. ...

  11. Laser surgery - skin

    Science.gov (United States)

    Surgery using a laser ... used is directly related to the type of surgery being performed and the color of the tissue ... Laser surgery can be used to: Close small blood vessels to reduce blood loss Remove warts , moles , sunspots, and ...

  12. Coronary Artery Bypass Surgery

    Science.gov (United States)

    ... t help, you may need coronary artery bypass surgery. The surgery creates a new path for blood to flow ... more than one bypass. The results of the surgery usually are excellent. Many people remain symptom-free ...

  13. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... Surgery Dental Implant Surgery Facial Cosmetic Surgery Head, Neck and Oral Pathology Obstructive Sleep Apnea TMJ and Facial Pain Treatment of Facial Injury Wisdom Teeth Management Procedures ...

  14. Pediatric heart surgery

    Science.gov (United States)

    Heart surgery - pediatric; Heart surgery for children; Acquired heart disease; Heart valve surgery - children ... Ginther RM, Forbess JM. Pediatric cardiopulmonary bypass. In: ... Care . 5th ed. Philadelphia, PA: Elsevier; 2017:chap 37. LeRoy S, ...

  15. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... Do Who We Are News Videos Contact Find a Surgeon What We Do Anesthesia Anesthesia Oral and ... Craniofacial Surgery Cleft Lip/Palate and Craniofacial Surgery A cleft lip may require one or more surgeries ...

  16. What Is Refractive Surgery?

    Science.gov (United States)

    ... Uveitis Focus On Pediatric Ophthalmology Education Center Oculofacial Plastic Surgery Center Laser Surgery Education Center Redmond Ethics Center ... Glaucoma Education Center Pediatric Ophthalmology Education Center Oculofacial Plastic ... Center Laser Surgery Education Center Redmond Ethics Center ...

  17. LASIK - Laser Eye Surgery

    Science.gov (United States)

    ... Uveitis Focus On Pediatric Ophthalmology Education Center Oculofacial Plastic Surgery Center Laser Surgery Education Center Redmond Ethics Center ... Glaucoma Education Center Pediatric Ophthalmology Education Center Oculofacial Plastic ... Center Laser Surgery Education Center Redmond Ethics Center ...

  18. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... surgery, orthognathic surgery is performed to correct functional problems. Jaw Surgery can have a dramatic effect on ... without straining Chronic mouth breathing Sleep apnea (breathing problems when sleeping, including snoring) Your dentist, orthodontist and ...

  19. Report number codes

    International Nuclear Information System (INIS)

    Nelson, R.N.

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name

  20. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  1. Laser propagation code study

    OpenAIRE

    Rockower, Edward B.

    1985-01-01

    A number of laser propagation codes have been assessed as to their suitability for modeling Army High Energy Laser (HEL) weapons used in an anti- sensor mode. We identify a number of areas in which systems analysis HEL codes are deficient. Most notably, available HEL scaling law codes model the laser aperture as circular, possibly with a fixed (e.g. 10%) obscuration. However, most HELs have rectangular apertures with up to 30% obscuration. We present a beam-quality/aperture shape scaling rela...

  2. Transport theory and codes

    International Nuclear Information System (INIS)

    Clancy, B.E.

    1986-01-01

    This chapter begins with a neutron transport equation which includes the one dimensional plane geometry problems, the one dimensional spherical geometry problems, and numerical solutions. The section on the ANISN code and its look-alikes covers problems which can be solved; eigenvalue problems; outer iteration loop; inner iteration loop; and finite difference solution procedures. The input and output data for ANISN is also discussed. Two dimensional problems such as the DOT code are given. Finally, an overview of the Monte-Carlo methods and codes are elaborated on

  3. Gravity inversion code

    International Nuclear Information System (INIS)

    Burkhard, N.R.

    1979-01-01

    The gravity inversion code applies stabilized linear inverse theory to determine the topography of a subsurface density anomaly from Bouguer gravity data. The gravity inversion program consists of four source codes: SEARCH, TREND, INVERT, and AVERAGE. TREND and INVERT are used iteratively to converge on a solution. SEARCH forms the input gravity data files for Nevada Test Site data. AVERAGE performs a covariance analysis on the solution. This document describes the necessary input files and the proper operation of the code. 2 figures, 2 tables

  4. Decoding the productivity code

    DEFF Research Database (Denmark)

    Hansen, David

    , that is, the productivity code of the 21st century, is dissolved. Today, organizations are pressured for operational efficiency, often in terms of productivity, due to increased global competition, demographical changes, and use of natural resources. Taylor’s principles for rationalization founded...... that swing between rationalization and employee development. The productivity code is the lack of alternatives to this ineffective approach. This thesis decodes the productivity code based on the results from a 3-year action research study at a medium-sized manufacturing facility. During the project period...

  5. CALIPSOS code report

    International Nuclear Information System (INIS)

    Fanselau, R.W.; Thakkar, J.G.; Hiestand, J.W.; Cassell, D.S.

    1980-04-01

    CALIPSOS is a steady-state three-dimensional flow distribution code which predicts the fluid dynamics and heat transfer interactions of the secondary two-phase flow in a steam generator. The mathematical formulation is sufficiently general to accommodate two fluid models described by separate gas and liquid momentum equations. However, if the user selects the homogeneous flow option, the code automatically equates the gas and liquid phase velocities (thereby reducing the number of momentum equations solved to three) and utilizes a homogeneous density mixture. This report presents the basic features of the CALIPSOS code and includes assumptions, equations solved, the finite-difference grid, and highlights of the solution procedure

  6. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  7. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  8. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  9. Code Disentanglement: Initial Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wohlbier, John Greaton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kelley, Timothy M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rockefeller, Gabriel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Calef, Matthew Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  10. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi

    2015-01-01

    The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered...... as waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access......, in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of coded...

  11. VT ZIP Code Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) A ZIP Code Tabulation Area (ZCTA) is a statistical geographic entity that approximates the delivery area for a U.S. Postal Service five-digit...

  12. Induction technology optimization code

    International Nuclear Information System (INIS)

    Caporaso, G.J.; Brooks, A.L.; Kirbie, H.C.

    1992-01-01

    A code has been developed to evaluate relative costs of induction accelerator driver systems for relativistic klystrons. The code incorporates beam generation, transport and pulsed power system constraints to provide an integrated design tool. The code generates an injector/accelerator combination which satisfies the top level requirements and all system constraints once a small number of design choices have been specified (rise time of the injector voltage and aspect ratio of the ferrite induction cores, for example). The code calculates dimensions of accelerator mechanical assemblies and values of all electrical components. Cost factors for machined parts, raw materials and components are applied to yield a total system cost. These costs are then plotted as a function of the two design choices to enable selection of an optimum design based on various criteria. (Author) 11 refs., 3 figs

  13. Code de conduite

    International Development Research Centre (IDRC) Digital Library (Canada)

    irocca

    le respect de telles normes. Ce faisant, nous contribuons à la bonne réputation et à l'intégrité du Centre et allons dans le sens du Code de valeurs et d'éthique du secteur public du gouvernement du Canada. Je vous invite à prendre connaissance de cette nouvelle mouture du Code de conduite et à appliquer ses principes ...

  14. Towards advanced code simulators

    International Nuclear Information System (INIS)

    Scriven, A.H.

    1990-01-01

    The Central Electricity Generating Board (CEGB) uses advanced thermohydraulic codes extensively to support PWR safety analyses. A system has been developed to allow fully interactive execution of any code with graphical simulation of the operator desk and mimic display. The system operates in a virtual machine environment, with the thermohydraulic code executing in one virtual machine, communicating via interrupts with any number of other virtual machines each running other programs and graphics drivers. The driver code itself does not have to be modified from its normal batch form. Shortly following the release of RELAP5 MOD1 in IBM compatible form in 1983, this code was used as the driver for this system. When RELAP5 MOD2 became available, it was adopted with no changes needed in the basic system. Overall the system has been used for some 5 years for the analysis of LOBI tests, full scale plant studies and for simple what-if studies. For gaining rapid understanding of system dependencies it has proved invaluable. The graphical mimic system, being independent of the driver code, has also been used with other codes to study core rewetting, to replay results obtained from batch jobs on a CRAY2 computer system and to display suitably processed experimental results from the LOBI facility to aid interpretation. For the above work real-time execution was not necessary. Current work now centers on implementing the RELAP 5 code on a true parallel architecture machine. Marconi Simulation have been contracted to investigate the feasibility of using upwards of 100 processors, each capable of a peak of 30 MIPS to run a highly detailed RELAP5 model in real time, complete with specially written 3D core neutronics and balance of plant models. This paper describes the experience of using RELAP5 as an analyzer/simulator, and outlines the proposed methods and problems associated with parallel execution of RELAP5

  15. Aphasia for Morse code.

    Science.gov (United States)

    Wyler, A R; Ray, M W

    1986-03-01

    The ability to communicate by Morse code at high speed has, to our knowledge, not been localized within the cerebral cortex, but might be suspected as residing within the left (dominant) hemisphere. We report a case of a 54-year-old male who suffered a left temporal tip intracerebral hematoma and who temporarily lost his ability to communicate in Morse code, but who was minimally aphasic.

  16. PEAR code review

    International Nuclear Information System (INIS)

    De Wit, R.; Jamieson, T.; Lord, M.; Lafortune, J.F.

    1997-07-01

    As a necessary component in the continuous improvement and refinement of methodologies employed in the nuclear industry, regulatory agencies need to periodically evaluate these processes to improve confidence in results and ensure appropriate levels of safety are being achieved. The independent and objective review of industry-standard computer codes forms an essential part of this program. To this end, this work undertakes an in-depth review of the computer code PEAR (Public Exposures from Accidental Releases), developed by Atomic Energy of Canada Limited (AECL) to assess accidental releases from CANDU reactors. PEAR is based largely on the models contained in the Canadian Standards Association (CSA) N288.2-M91. This report presents the results of a detailed technical review of the PEAR code to identify any variations from the CSA standard and other supporting documentation, verify the source code, assess the quality of numerical models and results, and identify general strengths and weaknesses of the code. The version of the code employed in this review is the one which AECL intends to use for CANDU 9 safety analyses. (author)

  17. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...

  18. Risk of Abdominal Surgery in Pregnancy Among Women Who Have Undergone Bariatric Surgery.

    Science.gov (United States)

    Stuart, Andrea; Källen, Karin

    2017-05-01

    To compare the rates of abdominal surgery during pregnancy among women with previous bariatric surgery (women in the case group) and women with first-trimester body mass index (BMI) greater than 35 and no previous bariatric surgery (women in the control group). We conducted a national cohort study, merging data from the Swedish Medical Birth Registry and the Swedish National Patient Registry, comparing women who had bariatric surgery from 1987 to 2011 with women in a control group with first-trimester BMI greater than 35 who had not had bariatric surgery. Primary outcome variables were diagnosis and surgical procedure codes grouped as five outcome categories: 1) intestinal obstruction, 2) gallbladder disease, 3) appendicitis, 4) hernia, and 5) diagnostic laparoscopy or laparotomy without the presence of a diagnosis or surgical code for outcomes in outcome categories 1-4. Odds ratios were computed using multivariate linear regression analysis for each separate pregnancy. For all pregnancies in a given woman, general estimating equations with robust variance estimation were used. Adjustment was made for smoking, year of delivery, maternal age, and previous abdominal surgery. During the first pregnancy after bariatric surgery, the rate of surgery for intestinal obstruction was 1.5% (39/2,543; 95% confidence interval [CI] 1.1-2.0%) in women in the case group compared with 0.02% (4/21,909; 95% CI 0.0-0.04%) among women in the control group (adjusted odds ratio [OR] 34.3, 95% CI 11.9-98.7). Similarly, the rate of diagnostic laparoscopy or laparotomy was 1.5% (37/2,542; 95% CI 1.0-1.9%) among women in the case group compared with 0.1% (18/21,909; 95% CI 0.0-0.1%) among women in the control group (adjusted OR 11.3, 95% CI 6.9-18.5). Bariatric surgery is associated with an increased risk of abdominal surgery during pregnancy.

  19. Polynomial weights and code constructions

    DEFF Research Database (Denmark)

    Massey, J; Costello, D; Justesen, Jørn

    1973-01-01

    polynomial included. This fundamental property is then used as the key to a variety of code constructions including 1) a simplified derivation of the binary Reed-Muller codes and, for any primepgreater than 2, a new extensive class ofp-ary "Reed-Muller codes," 2) a new class of "repeated-root" cyclic codes...... that are subcodes of the binary Reed-Muller codes and can be very simply instrumented, 3) a new class of constacyclic codes that are subcodes of thep-ary "Reed-Muller codes," 4) two new classes of binary convolutional codes with large "free distance" derived from known binary cyclic codes, 5) two new classes...... of long constraint length binary convolutional codes derived from2^r-ary Reed-Solomon codes, and 6) a new class ofq-ary "repeated-root" constacyclic codes with an algebraic decoding algorithm....

  20. Gastric Bypass Surgery

    Science.gov (United States)

    ... gastrointestinal system Death (rare) Longer term risks and complications of weight-loss surgery vary depending on the type of surgery. They ... room, where medical staff monitors you for any complications. Your hospital stay may ... of bariatric surgery Each type of bariatric surgery has pros and ...

  1. Facial Cosmetic Surgery

    Science.gov (United States)

    ... out more. Cleft Lip/Palate and Craniofacial Surgery Cleft Lip/Palate and Craniofacial Surgery A cleft lip may require ... out more. Cleft Lip/Palate and Craniofacial Surgery Cleft Lip/Palate and Craniofacial Surgery A cleft lip may require ...

  2. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... out more. Cleft Lip/Palate and Craniofacial Surgery Cleft Lip/Palate and Craniofacial Surgery A cleft lip may require ... out more. Cleft Lip/Palate and Craniofacial Surgery Cleft Lip/Palate and Craniofacial Surgery A cleft lip may require ...

  3. Corrective Jaw Surgery

    Science.gov (United States)

    ... out more. Cleft Lip/Palate and Craniofacial Surgery Cleft Lip/Palate and Craniofacial Surgery A cleft lip may require ... out more. Cleft Lip/Palate and Craniofacial Surgery Cleft Lip/Palate and Craniofacial Surgery A cleft lip may require ...

  4. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... It can also invite bacteria that lead to gum disease. Click here to find out more. Who We Are Find a Surgeon News Videos Contact Anesthesia Cleft Lip/Palate and Craniofacial Surgery Corrective Jaw Surgery Dental Implant Surgery Extractions and Other Oral Surgeries Facial Cosmetic ...

  5. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... and Other Oral Surgeries Extractions and Other Oral Surgeries Oral and maxillofacial surgeons surgically treat the soft tissues of the ... and Other Oral Surgeries Extractions and Other Oral Surgeries Oral and maxillofacial surgeons surgically treat the soft tissues of the ...

  6. Bariatric Surgery Procedures

    Science.gov (United States)

    ... Procedures Who is a Candidate for Bariatric Surgery? Childhood and Adolescent Obesity Find a Provider Benefits of Bariatric Surgery Life ... Bariatric Surgery FAQs Bariatric Surgery Procedures BMI Calculator Childhood and Adolescent Obesity 100 SW 75th Street, Suite 201, Gainesville, FL, ...

  7. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... out more. Cleft Lip/Palate and Craniofacial Surgery Cleft Lip/Palate and Craniofacial Surgery A cleft lip may ... out more. Cleft Lip/Palate and Craniofacial Surgery Cleft Lip/Palate and Craniofacial Surgery A cleft lip may ...

  8. SPECTRAL AMPLITUDE CODING OCDMA SYSTEMS USING ENHANCED DOUBLE WEIGHT CODE

    Directory of Open Access Journals (Sweden)

    F.N. HASOON

    2006-12-01

    Full Text Available A new code structure for spectral amplitude coding optical code division multiple access systems based on double weight (DW code families is proposed. The DW has a fixed weight of two. Enhanced double-weight (EDW code is another variation of a DW code family that can has a variable weight greater than one. The EDW code possesses ideal cross-correlation properties and exists for every natural number n. A much better performance can be provided by using the EDW code compared to the existing code such as Hadamard and Modified Frequency-Hopping (MFH codes. It has been observed that theoretical analysis and simulation for EDW is much better performance compared to Hadamard and Modified Frequency-Hopping (MFH codes.

  9. Some new ternary linear codes

    Directory of Open Access Journals (Sweden)

    Rumen Daskalov

    2017-07-01

    Full Text Available Let an $[n,k,d]_q$ code be a linear code of length $n$, dimension $k$ and minimum Hamming distance $d$ over $GF(q$. One of the most important problems in coding theory is to construct codes with optimal minimum distances. In this paper 22 new ternary linear codes are presented. Two of them are optimal. All new codes improve the respective lower bounds in [11].

  10. Limited-Access Heart Surgery

    Science.gov (United States)

    ... Surgery Menu Topics Topics FAQs Limited-Access Heart Surgery Article Info En español Thousands of heart surgeries ... with cardiovascular disease. What is minimally invasive heart surgery? In minimally invasive heart surgery, surgeons take steps ...

  11. ACE - Manufacturer Identification Code (MID)

    Data.gov (United States)

    Department of Homeland Security — The ACE Manufacturer Identification Code (MID) application is used to track and control identifications codes for manufacturers. A manufacturer is identified on an...

  12. Algebraic and stochastic coding theory

    CERN Document Server

    Kythe, Dave K

    2012-01-01

    Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.

  13. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  14. Outcomes of bariatric surgery in the elderly.

    Science.gov (United States)

    Varela, J Esteban; Wilson, Samuel E; Nguyen, Ninh T

    2006-10-01

    The Medicare Coverage Advisory Committee recently concluded that evidence supports the safety and effectiveness of bariatric surgery in the general adult population. However, more information is needed on the role of bariatric surgery in the elderly. The aim of this study was to examine the outcome of bariatric surgery in the elderly performed at academic centers. Using International Classification of Diseases, 9th Revision diagnosis and procedure codes, we obtained data from the University HealthSystem Consortium Clinical Data Base for all elderly (>60 years) and nonelderly (19-60 years) patients who underwent bariatric surgery for the treatment of morbid obesity between 1999 and 2005. Outcome measures, including patient characteristics, length of stay, 30-day readmission, morbidity, and observed and expected (risk-adjusted) mortality, were compared between groups. Bariatric surgery in the elderly represents 2.7 per cent (n = 1,339) of all bariatric operations being performed at academic centers. Of the 99 University HealthSystem Consortium centers performing bariatric surgery, 78 centers (79%) perform bariatric surgery in the elderly. Compared with nonelderly patients, elderly patients who underwent bariatric surgery had more comorbidities, longer lengths of stay (4.9 days vs 3.8 days, P elderly group (0.7% vs 0.3%, P = 0.03). When risk adjusted, the observed-to-expected mortality ratio for the elderly group was 0.9. In a subset of elderly patients with a pre-existing cardiac condition (n = 236), the in-hospital mortality was 4.7 per cent. Bariatric surgery in the elderly represents only a small fraction of the number of bariatric operations performed at academic centers. Although the morbidity and mortality is higher in the elderly, bariatric surgery in the elderly is considered as safe as other gastrointestinal procedures because the observed mortality is better than the expected (risk-adjusted) mortality.

  15. Speech coding code- excited linear prediction

    CERN Document Server

    Bäckström, Tom

    2017-01-01

    This book provides scientific understanding of the most central techniques used in speech coding both for advanced students as well as professionals with a background in speech audio and or digital signal processing. It provides a clear connection between the whys hows and whats thus enabling a clear view of the necessity purpose and solutions provided by various tools as well as their strengths and weaknesses in each respect Equivalently this book sheds light on the following perspectives for each technology presented Objective What do we want to achieve and especially why is this goal important Resource Information What information is available and how can it be useful and Resource Platform What kind of platforms are we working with and what are their capabilities restrictions This includes computational memory and acoustic properties and the transmission capacity of devices used. The book goes on to address Solutions Which solutions have been proposed and how can they be used to reach the stated goals and ...

  16. Spatially coded backscatter radiography

    International Nuclear Information System (INIS)

    Thangavelu, S.; Hussein, E.M.A.

    2007-01-01

    Conventional radiography requires access to two opposite sides of an object, which makes it unsuitable for the inspection of extended and/or thick structures (airframes, bridges, floors etc.). Backscatter imaging can overcome this problem, but the indications obtained are difficult to interpret. This paper applies the coded aperture technique to gamma-ray backscatter-radiography in order to enhance the detectability of flaws. This spatial coding method involves the positioning of a mask with closed and open holes to selectively permit or block the passage of radiation. The obtained coded-aperture indications are then mathematically decoded to detect the presence of anomalies. Indications obtained from Monte Carlo calculations were utilized in this work to simulate radiation scattering measurements. These simulated measurements were used to investigate the applicability of this technique to the detection of flaws by backscatter radiography

  17. Aztheca Code; Codigo Aztheca

    Energy Technology Data Exchange (ETDEWEB)

    Quezada G, S.; Espinosa P, G. [Universidad Autonoma Metropolitana, Unidad Iztapalapa, San Rafael Atlixco No. 186, Col. Vicentina, 09340 Ciudad de Mexico (Mexico); Centeno P, J.; Sanchez M, H., E-mail: sequga@gmail.com [UNAM, Facultad de Ingenieria, Ciudad Universitaria, Circuito Exterior s/n, 04510 Ciudad de Mexico (Mexico)

    2017-09-15

    This paper presents the Aztheca code, which is formed by the mathematical models of neutron kinetics, power generation, heat transfer, core thermo-hydraulics, recirculation systems, dynamic pressure and level models and control system. The Aztheca code is validated with plant data, as well as with predictions from the manufacturer when the reactor operates in a stationary state. On the other hand, to demonstrate that the model is applicable during a transient, an event occurred in a nuclear power plant with a BWR reactor is selected. The plant data are compared with the results obtained with RELAP-5 and the Aztheca model. The results show that both RELAP-5 and the Aztheca code have the ability to adequately predict the behavior of the reactor. (Author)

  18. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  19. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  20. Revised SRAC code system

    International Nuclear Information System (INIS)

    Tsuchihashi, Keichiro; Ishiguro, Yukio; Kaneko, Kunio; Ido, Masaru.

    1986-09-01

    Since the publication of JAERI-1285 in 1983 for the preliminary version of the SRAC code system, a number of additions and modifications to the functions have been made to establish an overall neutronics code system. Major points are (1) addition of JENDL-2 version of data library, (2) a direct treatment of doubly heterogeneous effect on resonance absorption, (3) a generalized Dancoff factor, (4) a cell calculation based on the fixed boundary source problem, (5) the corresponding edit required for experimental analysis and reactor design, (6) a perturbation theory calculation for reactivity change, (7) an auxiliary code for core burnup and fuel management, etc. This report is a revision of the users manual which consists of the general description, input data requirements and their explanation, detailed information on usage, mathematics, contents of libraries and sample I/O. (author)

  1. Graph Codes with Reed-Solomon Component Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2006-01-01

    We treat a specific case of codes based on bipartite expander graphs coming from finite geometries. The code symbols are associated with the branches and the symbols connected to a given node are restricted to be codewords in a Reed-Solomon code. We give results on the parameters of the codes...

  2. Visualizing code and coverage changes for code review

    NARCIS (Netherlands)

    Oosterwaal, Sebastiaan; van Deursen, A.; De Souza Coelho, R.; Sawant, A.A.; Bacchelli, A.

    2016-01-01

    One of the tasks of reviewers is to verify that code modifications are well tested. However, current tools offer little support in understanding precisely how changes to the code relate to changes to the tests. In particular, it is hard to see whether (modified) test code covers the changed code.

  3. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  4. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    A classic way to choose a supplier is through a bidding process where tenders from competing companies are evaluated in relation to the customer’s requirements. If the customer wants to hire an agile software developing team instead of buying a software product, a new approach for comparing tenders...... is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  5. Supervised Convolutional Sparse Coding

    KAUST Repository

    Affara, Lama Ahmed

    2018-04-08

    Convolutional Sparse Coding (CSC) is a well-established image representation model especially suited for image restoration tasks. In this work, we extend the applicability of this model by proposing a supervised approach to convolutional sparse coding, which aims at learning discriminative dictionaries instead of purely reconstructive ones. We incorporate a supervised regularization term into the traditional unsupervised CSC objective to encourage the final dictionary elements to be discriminative. Experimental results show that using supervised convolutional learning results in two key advantages. First, we learn more semantically relevant filters in the dictionary and second, we achieve improved image reconstruction on unseen data.

  6. CONCEPT computer code

    International Nuclear Information System (INIS)

    Delene, J.

    1984-01-01

    CONCEPT is a computer code that will provide conceptual capital investment cost estimates for nuclear and coal-fired power plants. The code can develop an estimate for construction at any point in time. Any unit size within the range of about 400 to 1300 MW electric may be selected. Any of 23 reference site locations across the United States and Canada may be selected. PWR, BWR, and coal-fired plants burning high-sulfur and low-sulfur coal can be estimated. Multiple-unit plants can be estimated. Costs due to escalation/inflation and interest during construction are calculated

  7. Less extensive surgery compared to extensive surgery

    DEFF Research Database (Denmark)

    Lauszus, Finn F; Petersen, Astrid Christine; Neumann, Gudrun

    2014-01-01

    in postmenopausal women was associated with surgery including hysterectomy and bilateral oophorectomy (pcarcinoma was found 138 times (95% CI: 48, 275) more prevalent than the expected rate. CONCLUSION......: The survival of women was better in AGCT than in epithelial ovarian tumor. Age and type of surgery, besides stage, influenced survival. Total abdominal hysterectomy and bilateral salpingo-oophorectomy is the recommended treatment with advancing age. At younger age less extensive surgery was associated...

  8. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    lowing function is maximized,. This kind of decoding strategy is called the maximum a posteriori probability (MAP) decoding strategy as it attempts to estimate each symbol of the codeword that ..... gate the effects of packet loss over digital networks. Un- doubtedly other applications will use these codes in the years to come.

  9. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  10. CERN Code of Conduct

    CERN Document Server

    Department, HR

    2010-01-01

    The Code is intended as a guide in helping us, as CERN contributors, to understand how to conduct ourselves, treat others and expect to be treated. It is based around the five core values of the Organization. We should all become familiar with it and try to incorporate it into our daily life at CERN.

  11. Error Correcting Codes

    Indian Academy of Sciences (India)

    focused pictures of Triton, Neptune's largest moon. This great feat was in no small measure due to the fact that the sophisticated communication system on Voyager had an elaborate error correcting scheme built into it. At Jupiter and Saturn, a convolutional code was used to enhance the reliability of transmission, and at ...

  12. Nuclear safety code study

    Energy Technology Data Exchange (ETDEWEB)

    Hu, H.H.; Ford, D.; Le, H.; Park, S.; Cooke, K.L.; Bleakney, T.; Spanier, J.; Wilburn, N.P.; O' Reilly, B.; Carmichael, B.

    1981-01-01

    The objective is to analyze an overpower accident in an LMFBR. A simplified model of the primary coolant loop was developed in order to understand the instabilities encountered with the MELT III and SAS codes. The computer programs were translated for switching to the IBM 4331. Numerical methods were investigated for solving the neutron kinetics equations; the Adams and Gear methods were compared. (DLC)

  13. Student Dress Codes.

    Science.gov (United States)

    Uerling, Donald F.

    School officials see a need for regulations that prohibit disruptive and inappropriate forms of expression and attire; students see these regulations as unwanted restrictions on their freedom. This paper reviews court litigation involving constitutional limitations on school authority, dress and hair codes, state law constraints, and school…

  14. Differential pulse code modulation

    Science.gov (United States)

    Herman, C. F. (Inventor)

    1976-01-01

    A differential pulse code modulation (DPCM) encoding and decoding method is described along with an apparatus which is capable of transmission with minimum bandwidth. The apparatus is not affected by data transition density, requires no direct current (DC) response of the transmission link, and suffers from minimal ambiguity in resolution of the digital data.

  15. Error Correcting Codes

    Indian Academy of Sciences (India)

    syndrome is an indicator of underlying disease. Here too, a non zero syndrome is an indication that something has gone wrong during transmission. SERIES I ARTICLE. The first matrix on the left hand side is called the parity check matrix H. Thus every codeword c satisfies the equation o o. HcT = o o. Therefore the code can ...

  16. Focusing Automatic Code Inspections

    NARCIS (Netherlands)

    Boogerd, C.J.

    2010-01-01

    Automatic Code Inspection tools help developers in early detection of defects in software. A well-known drawback of many automatic inspection approaches is that they yield too many warnings and require a clearer focus. In this thesis, we provide such focus by proposing two methods to prioritize

  17. Reliability and code level

    NARCIS (Netherlands)

    Kasperski, M.; Geurts, C.P.W.

    2005-01-01

    The paper describes the work of the IAWE Working Group WBG - Reliability and Code Level, one of the International Codification Working Groups set up at ICWE10 in Copenhagen. The following topics are covered: sources of uncertainties in the design wind load, appropriate design target values for the

  18. Broadcast Coded Slotted ALOHA

    DEFF Research Database (Denmark)

    Ivanov, Mikhail; Brännström, Frederik; Graell i Amat, Alexandre

    2016-01-01

    We propose an uncoordinated medium access control (MAC) protocol, called all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all broadcast with strict latency constraints. In B-CSA, each user acts as both transmitter and receiver in a half-duplex mode. The half-duplex mode gives...

  19. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  20. (Almost) practical tree codes

    KAUST Repository

    Khina, Anatoly

    2016-08-15

    We consider the problem of stabilizing an unstable plant driven by bounded noise over a digital noisy communication link, a scenario at the heart of networked control. To stabilize such a plant, one needs real-time encoding and decoding with an error probability profile that decays exponentially with the decoding delay. The works of Schulman and Sahai over the past two decades have developed the notions of tree codes and anytime capacity, and provided the theoretical framework for studying such problems. Nonetheless, there has been little practical progress in this area due to the absence of explicit constructions of tree codes with efficient encoding and decoding algorithms. Recently, linear time-invariant tree codes were proposed to achieve the desired result under maximum-likelihood decoding. In this work, we take one more step towards practicality, by showing that these codes can be efficiently decoded using sequential decoding algorithms, up to some loss in performance (and with some practical complexity caveats). We supplement our theoretical results with numerical simulations that demonstrate the effectiveness of the decoder in a control system setting.

  1. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  2. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and

  3. Ptolemy Coding Style

    Science.gov (United States)

    2014-09-05

    because this would combine Ptolemy II with the GPL’d code and thus encumber Ptolemy II with the GPL. Another GNU license is the GNU Library General...permission on the source.eecs.berkeley.edu repositories, then use your local repository. bash-3.2$ svn co svn+ ssh ://source.eecs.berkeley.edu/chess

  4. Accumulate Repeat Accumulate Coded Modulation

    Science.gov (United States)

    Abbasfar, Aliazam; Divsalar, Dariush; Yao, Kung

    2004-01-01

    In this paper we propose an innovative coded modulation scheme called 'Accumulate Repeat Accumulate Coded Modulation' (ARA coded modulation). This class of codes can be viewed as serial turbo-like codes, or as a subclass of Low Density Parity Check (LDPC) codes that are combined with high level modulation. Thus at the decoder belief propagation can be used for iterative decoding of ARA coded modulation on a graph, provided a demapper transforms the received in-phase and quadrature samples to reliability of the bits.

  5. Causation, constructors and codes.

    Science.gov (United States)

    Hofmeyr, Jan-Hendrik S

    2018-02-01

    Relational biology relies heavily on the enriched understanding of causal entailment that Robert Rosen's formalisation of Aristotle's four causes has made possible, although to date efficient causes and the rehabilitation of final cause have been its main focus. Formal cause has been paid rather scant attention, but, as this paper demonstrates, is crucial to our understanding of many types of processes, not necessarily biological. The graph-theoretic relational diagram of a mapping has played a key role in relational biology, and the first part of the paper is devoted to developing an explicit representation of formal cause in the diagram and how it acts in combination with efficient cause to form a mapping. I then use these representations to show how Von Neumann's universal constructor can be cast into a relational diagram in a way that avoids the logical paradox that Rosen detected in his own representation of the constructor in terms of sets and mappings. One aspect that was absent from both Von Neumann's and Rosen's treatments was the necessity of a code to translate the description (the formal cause) of the automaton to be constructed into the construction process itself. A formal definition of codes in general, and organic codes in particular, allows the relational diagram to be extended so as to capture this translation of formal cause into process. The extended relational diagram is used to exemplify causal entailment in a diverse range of processes, such as enzyme action, construction of automata, communication through the Morse code, and ribosomal polypeptide synthesis through the genetic code. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. Surgery for Stress Urinary Incontinence

    Science.gov (United States)

    ... Surgery for Stress Urinary Incontinence Page Navigation ▼ ACOG Pregnancy Book Surgery for Stress Urinary Incontinence Patient Education FAQs Surgery for Stress Urinary Incontinence Patient Education ...

  7. [Thymus surgery in a general surgery department].

    Science.gov (United States)

    Mega, Raquel; Coelho, Fátima; Pimentel, Teresa; Ribero, Rui; Matos, Novo de; Araújo, António

    2005-01-01

    Evaluation of thymectomy cases between 1990-2003, in a General Surgery Department. Evaluation of the therapeutic efficacy in Miastenia Gravis patients. Retrospective study based on evaluation of data from Serviço de Cirurgia, Neurologia and Consult de Neurology processes, between 1990-2003, of 15 patients submitted to total thymectomy. 15 patients, aged 17 to 72, 11 female and 4 male. Miastenia Gravis was the main indication for surgery, for uncontrollable symptoms or suspicion of thymoma. In patients with myasthenia, surgery was accomplish after compensation of symptoms. There weren't post-surgery complications. Pathology were divided in thymic hyperplasia and thymoma. Miastenia patients have there symptoms diminished or stable with reduction or cessation of medical therapy. Miastenia was the most frequent indication for thymectomy. Surgery was good results, with low morbimortality, as long as the protocols are respected.

  8. Entanglement-assisted quantum MDS codes constructed from negacyclic codes

    Science.gov (United States)

    Chen, Jianzhang; Huang, Yuanyuan; Feng, Chunhui; Chen, Riqing

    2017-12-01

    Recently, entanglement-assisted quantum codes have been constructed from cyclic codes by some scholars. However, how to determine the number of shared pairs required to construct entanglement-assisted quantum codes is not an easy work. In this paper, we propose a decomposition of the defining set of negacyclic codes. Based on this method, four families of entanglement-assisted quantum codes constructed in this paper satisfy the entanglement-assisted quantum Singleton bound, where the minimum distance satisfies q+1 ≤ d≤ n+2/2. Furthermore, we construct two families of entanglement-assisted quantum codes with maximal entanglement.

  9. Weight Loss Surgery

    Science.gov (United States)

    Weight loss surgery helps people with extreme obesity to lose weight. It may be an option if you ... caused by obesity. There are different types of weight loss surgery. They often limit the amount of food ...

  10. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... administer local anesthesia, all forms of sedation and general anesthesia. Click here to find out more. Cleft Lip/Palate and Craniofacial Surgery Cleft Lip/Palate and Craniofacial Surgery A cleft ...

  11. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... best performed by a trained surgeon with specialized education and training. Click here to find out more. Extractions and ... more. Facial Cosmetic Surgery Facial Cosmetic Surgery Extensive education and training in surgical procedures involving skin, muscle, ...

  12. Preparing for Surgery

    Science.gov (United States)

    ... FAQs Preparing for Surgery Page Navigation ▼ ACOG Pregnancy Book Preparing for Surgery Patient Education FAQs Preparing for ... the person who is in charge of giving anesthesia and checking its effects. What can I do ...

  13. Laparoscopic Spine Surgery

    Science.gov (United States)

    ... Global Affairs and Humanitarian Efforts Log In Laparoscopic Spine Surgery Patient Information from SAGES Download PDF Find a SAGES Surgeon Laparoscopic Spine Surgery Your spine surgeon has determined that you ...

  14. Heart valve surgery

    Science.gov (United States)

    ... techniques are used: Percutaneous surgery (through the skin) Robot-assisted surgery If your surgeon can repair your ... M. is also a founding member of Hi-Ethics and subscribes to the principles of the Health ...

  15. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... by a trained surgeon with specialized education and training. Click here to find out more. Extractions and ... Cosmetic Surgery Facial Cosmetic Surgery Extensive education and training in surgical procedures involving skin, muscle, bone and ...

  16. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... more surgeries depending on the extent of the repair needed. Click here to find out more. Corrective ... more surgeries depending on the extent of the repair needed. Click here to find out more. Corrective ...

  17. Cosmetic ear surgery

    Science.gov (United States)

    Otoplasty; Ear pinning; Ear surgery - cosmetic; Ear reshaping; Pinnaplasty ... Cosmetic ear surgery may be done in the surgeon's office, an outpatient clinic, or a hospital. It can be performed under ...

  18. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... Jaw Surgery Download Download the ebook for further information Corrective jaw, or orthognathic surgery is performed by ... your treatment. Correction of Common Dentofacial Deformities ​ ​ The information provided here is not intended as a substitute ...

  19. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... best performed by a trained surgeon with specialized education and training. Click here to find out more. Facial Cosmetic Surgery Facial Cosmetic Surgery Extensive education and training in surgical procedures involving skin, muscle, ...

  20. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... Lip/Palate and Craniofacial Surgery A cleft lip may require one or more surgeries depending on the ... are not uncommon. Individuals with a TMJ disorder may experience a variety of symptoms, such as earaches, ...

  1. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... Facial Injury / Trauma Surgery Facial trauma injuries include fractures of the upper and lower jaws and the ... Facial Injury / Trauma Surgery Facial trauma injuries include fractures of the upper and lower jaws and the ...

  2. Abdominal wall surgery

    Science.gov (United States)

    Cosmetic surgery of the abdomen; Tummy tuck; Abdominoplasty ... Most of the time, this surgery is an elective or cosmetic procedure because it is an operation you choose to have. It is not usually needed for health reasons. Cosmetic abdomen repair ...

  3. Pediatric heart surgery - discharge

    Science.gov (United States)

    ... discharge; Heart valve surgery - children - discharge; Heart surgery - pediatric - discharge; Heart transplant - pediatric - discharge ... Geme JW, Schor NF, eds. Nelson Textbook of Pediatrics . 20th ed. Philadelphia, PA: Elsevier; 2016:chap 434. ...

  4. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... best performed by a trained surgeon with specialized education and training. Click here to find out more. ... more. Facial Cosmetic Surgery Facial Cosmetic Surgery Extensive education and training in surgical procedures involving skin, muscle, ...

  5. Refractive corneal surgery - discharge

    Science.gov (United States)

    ... after surgery, it should be OK to use artificial tears. Check with your provider. DO NOT wear contact lenses on the eye that had surgery, even if you have blurry vision. DO NOT use any makeup, creams, or lotions ...

  6. Smoking and surgery

    Science.gov (United States)

    Surgery - quitting smoking; Surgery - quitting tobacco; Wound healing - smoking ... Tar, nicotine, and other chemicals from smoking can increase your risk of many health problems. These include heart and blood vessel problems, such as: Blood clots and aneurysms in ...

  7. Robotic liver surgery

    Science.gov (United States)

    Leung, Universe

    2014-01-01

    Robotic surgery is an evolving technology that has been successfully applied to a number of surgical specialties, but its use in liver surgery has so far been limited. In this review article we discuss the challenges of minimally invasive liver surgery, the pros and cons of robotics, the evolution of medical robots, and the potentials in applying this technology to liver surgery. The current data in the literature are also presented. PMID:25392840

  8. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, however, that national views of good governance reflect different political cultures and institutional heritages. Fourteen national codes of conduct are analyzed. The findings suggest that public values converge and that they match model codes from the United Nations and the European Council as well...... as conceptions of good governance from other international organizations. While values converge, they are balanced and communicated differently, and seem to some extent to be translated into the national cultures. The set of global public values derived from this analysis include public interest, regime dignity...

  9. Coding isotropic images

    Science.gov (United States)

    Oneal, J. B., Jr.; Natarajan, T. R.

    1976-01-01

    Rate distortion functions for two-dimensional homogeneous isotropic images are compared with the performance of 5 source encoders designed for such images. Both unweighted and frequency weighted mean square error distortion measures are considered. The coders considered are differential PCM (DPCM) using six previous samples in the prediction, herein called 6 pel (picutre element) DPCM; simple DPCM using single sample prediction; 6 pel DPCM followed by entropy coding; 8 x 8 discrete cosine transform coder, and 4 x 4 Hadamard transform coder. Other transform coders were studied and found to have about the same performance as the two transform coders above. With the mean square error distortion measure DPCM with entropy coding performed best. The relative performance of the coders changes slightly when the distortion measure is frequency weighted mean square error. The performance of all the coders was separated by only about 4 dB.

  10. Efficient convolutional sparse coding

    Energy Technology Data Exchange (ETDEWEB)

    Wohlberg, Brendt

    2017-06-20

    Computationally efficient algorithms may be applied for fast dictionary learning solving the convolutional sparse coding problem in the Fourier domain. More specifically, efficient convolutional sparse coding may be derived within an alternating direction method of multipliers (ADMM) framework that utilizes fast Fourier transforms (FFT) to solve the main linear system in the frequency domain. Such algorithms may enable a significant reduction in computational cost over conventional approaches by implementing a linear solver for the most critical and computationally expensive component of the conventional iterative algorithm. The theoretical computational cost of the algorithm may be reduced from O(M.sup.3N) to O(MN log N), where N is the dimensionality of the data and M is the number of elements in the dictionary. This significant improvement in efficiency may greatly increase the range of problems that can practically be addressed via convolutional sparse representations.

  11. Computer code FIT

    International Nuclear Information System (INIS)

    Rohmann, D.; Koehler, T.

    1987-02-01

    This is a description of the computer code FIT, written in FORTRAN-77 for a PDP 11/34. FIT is an interactive program to decude position, width and intensity of lines of X-ray spectra (max. length of 4K channels). The lines (max. 30 lines per fit) may have Gauss- or Voigt-profile, as well as exponential tails. Spectrum and fit can be displayed on a Tektronix terminal. (orig.) [de

  12. Status of MARS Code

    Energy Technology Data Exchange (ETDEWEB)

    N.V. Mokhov

    2003-04-09

    Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

  13. Cracking the Gender Codes

    DEFF Research Database (Denmark)

    Rennison, Betina Wolfgang

    2016-01-01

    Why do men continue to fill most of the senior executive positions and seats in the board of directors in Western corporations? Almost everyone agrees that diversity is good, many women are coming down the pipeline, and companies, states and international organizations and institutions have done...... in leadership management, we must become more aware and take advantage of this complexity. We must crack the codes in order to crack the curve....

  14. Hydra Code Release

    OpenAIRE

    Couchman, H. M. P.; Pearce, F. R.; Thomas, P. A.

    1996-01-01

    Comment: A new version of the AP3M-SPH code, Hydra, is now available as a tar file from the following sites; http://coho.astro.uwo.ca/pub/hydra/hydra.html , http://star-www.maps.susx.ac.uk/~pat/hydra/hydra.html . The release now also contains a cosmological initial conditions generator, documentation, an installation guide and installation tests. A LaTex version of the documentation is included here

  15. Tokamak simulation code manual

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Moon Kyoo; Oh, Byung Hoon; Hong, Bong Keun; Lee, Kwang Won [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1995-01-01

    The method to use TSC (Tokamak Simulation Code) developed by Princeton plasma physics laboratory is illustrated. In KT-2 tokamak, time dependent simulation of axisymmetric toroidal plasma and vertical stability have to be taken into account in design phase using TSC. In this report physical modelling of TSC are described and examples of application in JAERI and SERI are illustrated, which will be useful when TSC is installed KAERI computer system. (Author) 15 refs., 6 figs., 3 tabs.

  16. Tokamak simulation code manual

    International Nuclear Information System (INIS)

    Chung, Moon Kyoo; Oh, Byung Hoon; Hong, Bong Keun; Lee, Kwang Won

    1995-01-01

    The method to use TSC (Tokamak Simulation Code) developed by Princeton plasma physics laboratory is illustrated. In KT-2 tokamak, time dependent simulation of axisymmetric toroidal plasma and vertical stability have to be taken into account in design phase using TSC. In this report physical modelling of TSC are described and examples of application in JAERI and SERI are illustrated, which will be useful when TSC is installed KAERI computer system. (Author) 15 refs., 6 figs., 3 tabs

  17. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  18. Bar coded retroreflective target

    Science.gov (United States)

    Vann, Charles S.

    2000-01-01

    This small, inexpensive, non-contact laser sensor can detect the location of a retroreflective target in a relatively large volume and up to six degrees of position. The tracker's laser beam is formed into a plane of light which is swept across the space of interest. When the beam illuminates the retroreflector, some of the light returns to the tracker. The intensity, angle, and time of the return beam is measured to calculate the three dimensional location of the target. With three retroreflectors on the target, the locations of three points on the target are measured, enabling the calculation of all six degrees of target position. Until now, devices for three-dimensional tracking of objects in a large volume have been heavy, large, and very expensive. Because of the simplicity and unique characteristics of this tracker, it is capable of three-dimensional tracking of one to several objects in a large volume, yet it is compact, light-weight, and relatively inexpensive. Alternatively, a tracker produces a diverging laser beam which is directed towards a fixed position, and senses when a retroreflective target enters the fixed field of view. An optically bar coded target can be read by the tracker to provide information about the target. The target can be formed of a ball lens with a bar code on one end. As the target moves through the field, the ball lens causes the laser beam to scan across the bar code.

  19. MELCOR computer code manuals

    International Nuclear Information System (INIS)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L.; Hodge, S.A.; Hyman, C.R.; Sanders, R.L.

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR's phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package

  20. Development of PARASOL code

    Energy Technology Data Exchange (ETDEWEB)

    Hosokawa, Masanari [Research Organization for Information Science and Technology, Tokai, Ibaraki (Japan); Takizuka, Tomonori [Japan Atomic Energy Research Inst., Naka, Ibaraki (Japan). Naka Fusion Research Establishment

    2000-05-01

    The divertor is expected to play key roles in tokamak reactors, such as ITER, for the heat removal, ash exhaust, and impurity shielding. Its performance is being predicted by using comprehensive simulation codes with the fluid model. In the fluid model for scrape-off layer (SOL) and divertor plasmas, various physics models are introduced. Kinetic approach is required to examine the validity of such physics models. One of the most powerful kinetic models is the particle simulation. Therefore a particle code PARASOL has been developed, and is being used for the simulation study of SOL and divertor plasmas. The PARASOL code treats the plasma bounded by two divertor plates, in which motions of ions and electrons are traced by using a electrostatic PIC method. Effects of Coulomb collisions are simulated by using a Monte-Carlo=method binary collision model. Motions of neutral particles are traced simultaneously with charged particles. In this report, we describe the physics model of PARASOL, the numerical methods, the configuration of the program, input parameters, output formats, samples of simulation results, the parallel computing method. The efficiency of the parallel computing with Paragon XP/S15-256 is demonstrated. (author)

  1. Code Modernization of VPIC

    Science.gov (United States)

    Bird, Robert; Nystrom, David; Albright, Brian

    2017-10-01

    The ability of scientific simulations to effectively deliver performant computation is increasingly being challenged by successive generations of high-performance computing architectures. Code development to support efficient computation on these modern architectures is both expensive, and highly complex; if it is approached without due care, it may also not be directly transferable between subsequent hardware generations. Previous works have discussed techniques to support the process of adapting a legacy code for modern hardware generations, but despite the breakthroughs in the areas of mini-app development, portable-performance, and cache oblivious algorithms the problem still remains largely unsolved. In this work we demonstrate how a focus on platform agnostic modern code-development can be applied to Particle-in-Cell (PIC) simulations to facilitate effective scientific delivery. This work builds directly on our previous work optimizing VPIC, in which we replaced intrinsic based vectorisation with compile generated auto-vectorization to improve the performance and portability of VPIC. In this work we present the use of a specialized SIMD queue for processing some particle operations, and also preview a GPU capable OpenMP variant of VPIC. Finally we include a lessons learnt. Work performed under the auspices of the U.S. Dept. of Energy by the Los Alamos National Security, LLC Los Alamos National Laboratory under contract DE-AC52-06NA25396 and supported by the LANL LDRD program.

  2. RADIATION AND SURGERY

    African Journals Online (AJOL)

    Dr. S.A. Adewuyi

    of radical surgical procedures, surgery remains the only potential curative treatment for many cancer patients ... catheter, 'Toilet' procedure, e.g. simple mastectomy or amputation of a limb, for fungating tumours. Debulking .... that tumour is irradiated prior to surgery and post- operative implies after surgery. 10. Pre-operative.

  3. Cavus Foot Surgery

    Science.gov (United States)

    ... Toes All Site Content AOFAS / FootCareMD / Treatments Cavus Foot Surgery Page Content What is a cavus foot? A cavus or high-arched foot may have ... related problems. What are the goals of cavus foot surgery? The main goal of surgery is to ...

  4. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... their surgery, orthognathic surgery is performed to correct functional problems. Jaw Surgery can have a dramatic effect on many aspects of life. Following are some of the conditions that may ... front, or side Facial injury Birth defects Receding lower jaw and ...

  5. Breast Cancer Surgery

    Science.gov (United States)

    FACTS FOR LIFE Breast Cancer Surgery The goal of breast cancer surgery is to remove the whole tumor from the breast. Some lymph nodes ... might still be in the body. Types of breast cancer surgery There are two types of breast cancer ...

  6. Quality Improvement of MARS Code and Establishment of Code Coupling

    International Nuclear Information System (INIS)

    Chung, Bub Dong; Jeong, Jae Jun; Kim, Kyung Doo

    2010-04-01

    The improvement of MARS code quality and coupling with regulatory auditing code have been accomplished for the establishment of self-reliable technology based regulatory auditing system. The unified auditing system code was realized also by implementing the CANDU specific models and correlations. As a part of the quality assurance activities, the various QA reports were published through the code assessments. The code manuals were updated and published a new manual which describe the new models and correlations. The code coupling methods were verified though the exercise of plant application. The education-training seminar and technology transfer were performed for the code users. The developed MARS-KS is utilized as reliable auditing tool for the resolving the safety issue and other regulatory calculations. The code can be utilized as a base technology for GEN IV reactor applications

  7. On Some Ternary LCD Codes

    OpenAIRE

    Darkunde, Nitin S.; Patil, Arunkumar R.

    2018-01-01

    The main aim of this paper is to study $LCD$ codes. Linear code with complementary dual($LCD$) are those codes which have their intersection with their dual code as $\\{0\\}$. In this paper we will give rather alternative proof of Massey's theorem\\cite{8}, which is one of the most important characterization of $LCD$ codes. Let $LCD[n,k]_3$ denote the maximum of possible values of $d$ among $[n,k,d]$ ternary $LCD$ codes. In \\cite{4}, authors have given upper bound on $LCD[n,k]_2$ and extended th...

  8. Design of convolutional tornado code

    Science.gov (United States)

    Zhou, Hui; Yang, Yao; Gao, Hongmin; Tan, Lu

    2017-09-01

    As a linear block code, the traditional tornado (tTN) code is inefficient in burst-erasure environment and its multi-level structure may lead to high encoding/decoding complexity. This paper presents a convolutional tornado (cTN) code which is able to improve the burst-erasure protection capability by applying the convolution property to the tTN code, and reduce computational complexity by abrogating the multi-level structure. The simulation results show that cTN code can provide a better packet loss protection performance with lower computation complexity than tTN code.

  9. Random linear codes in steganography

    Directory of Open Access Journals (Sweden)

    Kamil Kaczyński

    2016-12-01

    Full Text Available Syndrome coding using linear codes is a technique that allows improvement in the steganographic algorithms parameters. The use of random linear codes gives a great flexibility in choosing the parameters of the linear code. In parallel, it offers easy generation of parity check matrix. In this paper, the modification of LSB algorithm is presented. A random linear code [8, 2] was used as a base for algorithm modification. The implementation of the proposed algorithm, along with practical evaluation of algorithms’ parameters based on the test images was made.[b]Keywords:[/b] steganography, random linear codes, RLC, LSB

  10. Containment Code Validation Matrix

    International Nuclear Information System (INIS)

    Chin, Yu-Shan; Mathew, P.M.; Glowa, Glenn; Dickson, Ray; Liang, Zhe; Leitch, Brian; Barber, Duncan; Vasic, Aleks; Bentaib, Ahmed; Journeau, Christophe; Malet, Jeanne; Studer, Etienne; Meynet, Nicolas; Piluso, Pascal; Gelain, Thomas; Michielsen, Nathalie; Peillon, Samuel; Porcheron, Emmanuel; Albiol, Thierry; Clement, Bernard; Sonnenkalb, Martin; Klein-Hessling, Walter; Arndt, Siegfried; Weber, Gunter; Yanez, Jorge; Kotchourko, Alexei; Kuznetsov, Mike; Sangiorgi, Marco; Fontanet, Joan; Herranz, Luis; Garcia De La Rua, Carmen; Santiago, Aleza Enciso; Andreani, Michele; Paladino, Domenico; Dreier, Joerg; Lee, Richard; Amri, Abdallah

    2014-01-01

    The Committee on the Safety of Nuclear Installations (CSNI) formed the CCVM (Containment Code Validation Matrix) task group in 2002. The objective of this group was to define a basic set of available experiments for code validation, covering the range of containment (ex-vessel) phenomena expected in the course of light and heavy water reactor design basis accidents and beyond design basis accidents/severe accidents. It was to consider phenomena relevant to pressurised heavy water reactor (PHWR), pressurised water reactor (PWR) and boiling water reactor (BWR) designs of Western origin as well as of Eastern European VVER types. This work would complement the two existing CSNI validation matrices for thermal hydraulic code validation (NEA/CSNI/R(1993)14) and In-vessel core degradation (NEA/CSNI/R(2001)21). The report initially provides a brief overview of the main features of a PWR, BWR, CANDU and VVER reactors. It also provides an overview of the ex-vessel corium retention (core catcher). It then provides a general overview of the accident progression for light water and heavy water reactors. The main focus is to capture most of the phenomena and safety systems employed in these reactor types and to highlight the differences. This CCVM contains a description of 127 phenomena, broken down into 6 categories: - Containment Thermal-hydraulics Phenomena; - Hydrogen Behaviour (Combustion, Mitigation and Generation) Phenomena; - Aerosol and Fission Product Behaviour Phenomena; - Iodine Chemistry Phenomena; - Core Melt Distribution and Behaviour in Containment Phenomena; - Systems Phenomena. A synopsis is provided for each phenomenon, including a description, references for further information, significance for DBA and SA/BDBA and a list of experiments that may be used for code validation. The report identified 213 experiments, broken down into the same six categories (as done for the phenomena). An experiment synopsis is provided for each test. Along with a test description

  11. Construction of new quantum MDS codes derived from constacyclic codes

    Science.gov (United States)

    Taneja, Divya; Gupta, Manish; Narula, Rajesh; Bhullar, Jaskaran

    Obtaining quantum maximum distance separable (MDS) codes from dual containing classical constacyclic codes using Hermitian construction have paved a path to undertake the challenges related to such constructions. Using the same technique, some new parameters of quantum MDS codes have been constructed here. One set of parameters obtained in this paper has achieved much larger distance than work done earlier. The remaining constructed parameters of quantum MDS codes have large minimum distance and were not explored yet.

  12. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Høholdt, Tom

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K...

  13. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes.......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  14. [Implementation of a department of plastic surgery in a university clinic for trauma surgery].

    Science.gov (United States)

    von Dercks, N; Fakler, J; Langer, S; Josten, C

    2014-11-01

    Since May 2012 plastic surgery for trauma patients at the University Hospital Leipzig is provided by an autonomous department. This study analyzed the effect of plastic surgery on the changes in diagnosis-related groups (DRG) at a clinic for trauma surgery. Within the first 2 years 37 patients (29 male and 8 female of which 38 were inpatient cases) were admitted to the clinic for trauma surgery and additionally received plastic surgery treatment. The appropriate DRG assignment as well as associated codes and revenues were recorded and compared with and without plastic surgery. A total of 261 operations were performed on these patients of which 71 were performed by the department of plastic surgery. The mean revenue was 22,156.44 EUR±20,578.22 EUR with a mean cost weighting of 7.2±6.7. Excluding plastic surgery treatment the mean revenue was 19,378.44 EUR±20,688.40 EUR and the mean cost weighting was 6.3±6.7. Thus, additional proceeds by the plastic surgery treatment were 2778.00 EUR±3857.01 EUR per case. The mean increase of the cost weighting was 0.9±1.3. A change of the DRG grouping occurred in 20 out of 38 cases treated. The mean length of stay (LoS) was 40.2±26.6 days. In the first year this was 17.9±22.4 days more than the mean national LoS of the appropriate DRG and 10.9±19.3 days in the second year. This means an average cost reduction of 4774.59 EUR per case. The implementation of a department for plastic surgery increased the revenues. Additional profits should be achieved by process enhancement and not by prolonged LoS.

  15. A Population-Based Analysis of Time to Surgery and Travel Distances for Brachial Plexus Surgery.

    Science.gov (United States)

    Dy, Christopher J; Baty, Jack; Saeed, Mohammed J; Olsen, Margaret A; Osei, Daniel A

    2016-09-01

    Despite the importance of timely evaluation for patients with brachial plexus injuries (BPIs), in clinical practice we have noted delays in referral. Because the published BPI experience is largely from individual centers, we used a population-based approach to evaluate the delivery of care for patients with BPI. We used statewide administrative databases from Florida (2007-2013), New York (2008-2012), and North Carolina (2009-2010) to create a cohort of patients who underwent surgery for BPI (exploration, repair, neurolysis, grafting, or nerve transfer). Emergency department and inpatient records were used to determine the time interval between the injury and surgical treatment. Distances between treating hospitals and between the patient's home ZIP code and the surgical hospital were recorded. A multivariable logistic regression model was used to determine predictors for time from injury to surgery exceeding 365 days. Within the 222 patients in our cohort, median time from injury to surgery was 7.6 months and exceeded 365 days in 29% (64 of 222 patients) of cases. Treatment at a smaller hospital for the initial injury was significantly associated with surgery beyond 365 days after injury. Patient insurance type, travel distance for surgery, distance between the 2 treating hospitals, and changing hospitals between injury and surgery did not significantly influence time to surgery. Nearly one third of patients in Florida, New York, and North Carolina underwent BPI surgery more than 1 year after the injury. Patients initially treated at smaller hospitals are at risk for undergoing delayed BPI surgery. These findings can inform administrative and policy efforts to expedite timely referral of patients with BPI to experienced centers. Copyright © 2016 American Society for Surgery of the Hand. Published by Elsevier Inc. All rights reserved.

  16. low bit rate video coding low bit rate video coding

    African Journals Online (AJOL)

    eobe

    Variable length bit rate (VLBR) ariable length bit rate (VLBR) ariable length bit rate (VLBR) broadly encompasses video coding which broadly encompasses video coding which broadly encompasses video coding which mandates a temporal frequency of 10 mandates a temporal frequency of 10 frames per frames per ...

  17. Code Flows : Visualizing Structural Evolution of Source Code

    NARCIS (Netherlands)

    Telea, Alexandru; Auber, David

    2008-01-01

    Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared to the understanding of fine and mid-level scale changes across several file versions. We enhance an existing visual

  18. Cost Differences Between Open and Minimally Invasive Surgery.

    Science.gov (United States)

    Fitch, Kathryn; Engel, Tyler; Bochner, Andrew

    2015-09-01

    To analyze the cost difference between minimally invasive surgery (MIS) and open surgery from a commercial payer perspective for colectomy, ventral hernia repair, thoracic resection (resection of the lung), and hysterectomy. A retrospective claims data analysis was conducted using the 2011 and 2012 Truven Health Analytics MarketScan Commercial Claims and Encounter Database. Study eligibility criteria included age 18-64 years, pharmacy coverage, ≥ 1 month of eligibility in 2012, and a claim coded with 1 of the 4 surgical procedures of interest; the index year was 2012. Average allowed facility and professional costs were calculated during inpatient stay (or day of surgery for outpatient hysterectomy) and the 30 days after discharge for MIS vs open surgery. Cost difference was compared after adjusting for presence of cancer, geographic region, and risk profile (age, gender, and comorbidities). In total, 46,386 cases in the 2012 MarketScan database represented one of the surgeries of interest. The difference in average allowed surgical procedure cost (facility and professional) between open surgery vs adjusted MIS was $10,204 for colectomy; $3,721, ventral hernia repair; $12,989, thoracic resection; and $1,174, noncancer hysterectomy (P average allowed cost in the 30 days after surgery between open surgery vs adjusted MIS was $1,494 for colectomy, $1,320 for ventral hernia repair, negative $711 for thoracic resection, and negative $425 for noncancer hysterectomy (P costs than open surgery for all 4 analyzed surgeries.

  19. The Tap code - a code similar to Morse code for communication by tapping

    OpenAIRE

    Rafler, Stephan

    2013-01-01

    A code is presented for fast, easy and efficient communication over channels that allow only two signal types: a single sound (e.g. a knock), or no sound (i.e. silence). This is a true binary code while Morse code is a ternary code and does not work in such situations. Thus the presented code is more universal than Morse and can be used in much more situations. Additionally it is very tolerant to variations in signal strength or duration. The paper contains various ways in which the code can ...

  20. Quick response codes in Orthodontics

    Directory of Open Access Journals (Sweden)

    Moidin Shakil

    2015-01-01

    Full Text Available Quick response (QR code codes are two-dimensional barcodes, which encodes for a large amount of information. QR codes in Orthodontics are an innovative approach in which patient details, radiographic interpretation, and treatment plan can be encoded. Implementing QR code in Orthodontics will save time, reduces paperwork, and minimizes manual efforts in storage and retrieval of patient information during subsequent stages of treatment.

  1. Bar codes for nuclear safeguards

    International Nuclear Information System (INIS)

    Keswani, A.N.; Bieber, A.M. Jr.

    1983-01-01

    Bar codes similar to those used in supermarkets can be used to reduce the effort and cost of collecting nuclear materials accountability data. A wide range of equipment is now commercially available for printing and reading bar-coded information. Several examples of each of the major types of commercially available equipment are given, and considerations are discussed both for planning systems using bar codes and for choosing suitable bar code equipment

  2. The CORSYS neutronics code system

    International Nuclear Information System (INIS)

    Caner, M.; Krumbein, A.D.; Saphier, D.; Shapira, M.

    1994-01-01

    The purpose of this work is to assemble a code package for LWR core physics including coupled neutronics, burnup and thermal hydraulics. The CORSYS system is built around the cell code WIMS (for group microscopic cross section calculations) and 3-dimension diffusion code CITATION (for burnup and fuel management). We are implementing such a system on an IBM RS-6000 workstation. The code was rested with a simplified model of the Zion Unit 2 PWR. (authors). 6 refs., 8 figs., 1 tabs

  3. The path of code linting

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Join the path of code linting and discover how it can help you reach higher levels of programming enlightenment. Today we will cover how to embrace code linters to offload cognitive strain on preserving style standards in your code base as well as avoiding error-prone constructs. Additionally, I will show you the journey ahead for integrating several code linters in the programming tools your already use with very little effort.

  4. The FLIC conversion codes

    International Nuclear Information System (INIS)

    Basher, J.C.

    1965-05-01

    This report describes the FORTRAN programmes, FLIC 1 and FLIC 2. These programmes convert programmes coded in one dialect of FORTRAN to another dialect of the same language. FLIC 1 is a general pattern recognition and replacement programme whereas FLIC 2 contains extensions directed towards the conversion of FORTRAN II and S2 programmes to EGTRAN 1 - the dialect now in use on the Winfrith KDF9. FII or S2 statements are replaced where possible by their E1 equivalents; other statements which may need changing are flagged. (author)

  5. Physical Layer Network Coding

    OpenAIRE

    Shengli, Zhang; Liew, Soung-Chang; Lam, Patrick P. K.

    2007-01-01

    A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11). This paper shows that the concept of network coding can be applied at the physical layer to turn the b...

  6. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  7. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  8. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    1997-01-01

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy...... machinery of algebraic geometry....

  9. Network Coding Over The 232

    DEFF Research Database (Denmark)

    Pedersen, Morten Videbæk; Heide, Janus; Vingelmann, Peter

    2013-01-01

    Creating efficient finite field implementations has been an active research topic for several decades. Many appli- cations in areas such as cryptography, signal processing, erasure coding and now also network coding depend on this research to deliver satisfactory performance. In this paper we...... will be useful in many network coding applications where large field sizes are required....

  10. Sub-Transport Layer Coding

    DEFF Research Database (Denmark)

    Hansen, Jonas; Krigslund, Jeppe; Roetter, Daniel Enrique Lucani

    2014-01-01

    oblivious to the congestion control algorithms of the utilised transport layer protocol. Although our coding shim is indifferent towards the transport layer protocol, we focus on the performance of TCP when ran on top of our proposed coding mechanism due to its widespread use. The coding shim provides gains...

  11. Strongly-MDS convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Rosenthal, J; Smarandache, R

    Maximum-distance separable (MDS) convolutional codes have the property that their free distance is maximal among all codes of the same rate and the same degree. In this paper, a class of MDS convolutional codes is introduced whose column distances reach the generalized Singleton bound at the

  12. Geochemical computer codes. A review

    International Nuclear Information System (INIS)

    Andersson, K.

    1987-01-01

    In this report a review of available codes is performed and some code intercomparisons are also discussed. The number of codes treating natural waters (groundwater, lake water, sea water) is large. Most geochemical computer codes treat equilibrium conditions, although some codes with kinetic capability are available. A geochemical equilibrium model consists of a computer code, solving a set of equations by some numerical method and a data base, consisting of thermodynamic data required for the calculations. There are some codes which treat coupled geochemical and transport modeling. Some of these codes solve the equilibrium and transport equations simultaneously while other solve the equations separately from each other. The coupled codes require a large computer capacity and have thus as yet limited use. Three code intercomparisons have been found in literature. It may be concluded that there are many codes available for geochemical calculations but most of them require a user that us quite familiar with the code. The user also has to know the geochemical system in order to judge the reliability of the results. A high quality data base is necessary to obtain a reliable result. The best results may be expected for the major species of natural waters. For more complicated problems, including trace elements, precipitation/dissolution, adsorption, etc., the results seem to be less reliable. (With 44 refs.) (author)

  13. Authorship Attribution of Source Code

    Science.gov (United States)

    Tennyson, Matthew F.

    2013-01-01

    Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…

  14. Separate Turbo Code and Single Turbo Code Adaptive OFDM Transmissions

    Directory of Open Access Journals (Sweden)

    Burr Alister

    2009-01-01

    Full Text Available Abstract This paper discusses the application of adaptive modulation and adaptive rate turbo coding to orthogonal frequency-division multiplexing (OFDM, to increase throughput on the time and frequency selective channel. The adaptive turbo code scheme is based on a subband adaptive method, and compares two adaptive systems: a conventional approach where a separate turbo code is used for each subband, and a single turbo code adaptive system which uses a single turbo code over all subbands. Five modulation schemes (BPSK, QPSK, 8AMPM, 16QAM, and 64QAM are employed and turbo code rates considered are and . The performances of both systems with high ( and low ( BER targets are compared. Simulation results for throughput and BER show that the single turbo code adaptive system provides a significant improvement.

  15. Separate Turbo Code and Single Turbo Code Adaptive OFDM Transmissions

    Directory of Open Access Journals (Sweden)

    Lei Ye

    2009-01-01

    Full Text Available This paper discusses the application of adaptive modulation and adaptive rate turbo coding to orthogonal frequency-division multiplexing (OFDM, to increase throughput on the time and frequency selective channel. The adaptive turbo code scheme is based on a subband adaptive method, and compares two adaptive systems: a conventional approach where a separate turbo code is used for each subband, and a single turbo code adaptive system which uses a single turbo code over all subbands. Five modulation schemes (BPSK, QPSK, 8AMPM, 16QAM, and 64QAM are employed and turbo code rates considered are 1/2 and 1/3. The performances of both systems with high (10−2 and low (10−4 BER targets are compared. Simulation results for throughput and BER show that the single turbo code adaptive system provides a significant improvement.

  16. Quantum Codes From Cyclic Codes Over The Ring R 2

    International Nuclear Information System (INIS)

    Altinel, Alev; Güzeltepe, Murat

    2016-01-01

    Let R 2 denotes the ring F 2 + μF 2 + υ 2 + μυ F 2 + wF 2 + μwF 2 + υwF 2 + μυwF 2 . In this study, we construct quantum codes from cyclic codes over the ring R 2 , for arbitrary length n, with the restrictions μ 2 = 0, υ 2 = 0, w 2 = 0, μυ = υμ, μw = wμ, υw = wυ and μ (υw) = (μυ) w. Also, we give a necessary and sufficient condition for cyclic codes over R 2 that contains its dual. As a final point, we obtain the parameters of quantum error-correcting codes from cyclic codes over R 2 and we give an example of quantum error-correcting codes form cyclic codes over R 2 . (paper)

  17. Genetic code for sine

    Science.gov (United States)

    Abdullah, Alyasa Gan; Wah, Yap Bee

    2015-02-01

    The computation of the approximate values of the trigonometric sines was discovered by Bhaskara I (c. 600-c.680), a seventh century Indian mathematician and is known as the Bjaskara's I's sine approximation formula. The formula is given in his treatise titled Mahabhaskariya. In the 14th century, Madhava of Sangamagrama, a Kerala mathematician astronomer constructed the table of trigonometric sines of various angles. Madhava's table gives the measure of angles in arcminutes, arcseconds and sixtieths of an arcsecond. The search for more accurate formulas led to the discovery of the power series expansion by Madhava of Sangamagrama (c.1350-c. 1425), the founder of the Kerala school of astronomy and mathematics. In 1715, the Taylor series was introduced by Brook Taylor an English mathematician. If the Taylor series is centered at zero, it is called a Maclaurin series, named after the Scottish mathematician Colin Maclaurin. Some of the important Maclaurin series expansions include trigonometric functions. This paper introduces the genetic code of the sine of an angle without using power series expansion. The genetic code using square root approach reveals the pattern in the signs (plus, minus) and sequence of numbers in the sine of an angle. The square root approach complements the Pythagoras method, provides a better understanding of calculating an angle and will be useful for teaching the concepts of angles in trigonometry.

  18. Supervised Transfer Sparse Coding

    KAUST Repository

    Al-Shedivat, Maruan

    2014-07-27

    A combination of the sparse coding and transfer learn- ing techniques was shown to be accurate and robust in classification tasks where training and testing objects have a shared feature space but are sampled from differ- ent underlying distributions, i.e., belong to different do- mains. The key assumption in such case is that in spite of the domain disparity, samples from different domains share some common hidden factors. Previous methods often assumed that all the objects in the target domain are unlabeled, and thus the training set solely comprised objects from the source domain. However, in real world applications, the target domain often has some labeled objects, or one can always manually label a small num- ber of them. In this paper, we explore such possibil- ity and show how a small number of labeled data in the target domain can significantly leverage classifica- tion accuracy of the state-of-the-art transfer sparse cod- ing methods. We further propose a unified framework named supervised transfer sparse coding (STSC) which simultaneously optimizes sparse representation, domain transfer and classification. Experimental results on three applications demonstrate that a little manual labeling and then learning the model in a supervised fashion can significantly improve classification accuracy.

  19. DEVELOPMENT OF PLASTIC SURGERY.

    Science.gov (United States)

    Pećanac, Marija Đ

    2015-01-01

    Plastic surgery is a medical specialty dealing with corrections of defects, improvements in appearance and restoration of lost function. Ancient times. The first recorded account of reconstructive plastic surgery was found in ancient Indian Sanskrit texts, which described reconstructive surgeries of the nose and ears. In ancient Greece and Rome, many medicine men performed simple plastic cosmetic surgeries to repair damaged parts of the body caused by war mutilation, punishment or humiliation. In the Middle Ages, the development of all medical braches, including plastic surgery was hindered. New age. The interest in surgical reconstruction of mutilated body parts was renewed in the XVIII century by a great number of enthusiastic and charismatic surgeons, who mastered surgical disciplines and became true artists that created new forms. Modern era. In the XX century, plastic surgery developed as a modern branch in medicine including many types of reconstructive surgery, hand, head and neck surgery, microsurgery and replantation, treatment of burns and their sequelae, and esthetic surgery. Contemporary and future plastic surgery will continue to evolve and improve with regenerative medicine and tissue engineering resulting in a lot of benefits to be gained by patients in reconstruction after body trauma, oncology amputation, and for congenital disfigurement and dysfunction.

  20. Continuous Non-malleable Codes

    DEFF Research Database (Denmark)

    Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus

    2014-01-01

    Non-malleable codes are a natural relaxation of error correcting/ detecting codes that have useful applications in the context of tamper resilient cryptography. Informally, a code is non-malleable if an adversary trying to tamper with an encoding of a given message can only leave it unchanged or ...... applications of non-malleable codes in this setting required to perfectly erase the entire memory after each execution and required the adversary to be restricted in memory. We show that continuous non-malleable codes avoid these restrictions....

  1. The Art of Readable Code

    CERN Document Server

    Boswell, Dustin

    2011-01-01

    As programmers, we've all seen source code that's so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they're bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it-even if that someone else is you. This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languag

  2. Reduced incidence of gestational diabetes with bariatric surgery.

    Science.gov (United States)

    Burke, Anne E; Bennett, Wendy L; Jamshidi, Roxanne M; Gilson, Marta M; Clark, Jeanne M; Segal, Jodi B; Shore, Andrew D; Magnuson, Thomas H; Dominici, Francesca; Wu, Albert W; Makary, Martin A

    2010-08-01

    Obesity is a risk factor for gestational diabetes mellitus (GDM), and bariatric surgery is an effective treatment for obesity. Our objective was to determine the association of bariatric surgery with the incidence of GDM and related complications. We performed a retrospective study comparing rates of GDM and related outcomes (including cesarean section, large-for-gestational-age infant, shoulder dystocia, and infection) between a group of women with a delivery before bariatric surgery and a group with a delivery after bariatric surgery. We used a private insurance claims database with information on 23,594 women who had bariatric surgery between 2002 and 2006. The dataset was searched to identify women with codes for bariatric surgery and a pregnancy resulting in a delivery at greater than 22 weeks gestation. Incidences of GDM and selected delivery complications for delivery before versus after bariatric surgery were compared using Fisher exact test and logistic regression. There were 346 women who had a delivery before bariatric surgery, and 354 had a delivery after bariatric surgery. Women with delivery after bariatric surgery had lower incidences of GDM (8% vs 27%, odds ratio (OR) 0.23, (95% CI 0.15 to 0.36) and cesarean section (28% vs 43%, OR0.53, 95% CI 0.39 to 0.72) than those with delivery before bariatric surgery. Bariatric surgery is associated with a decreased incidence of GDM and cesarean section in subsequent pregnancies. This potential effect of bariatric surgery should be considered in the management of obese women of childbearing age. Prospective studies are needed to confirm these findings. Copyright 2010 American College of Surgeons. Published by Elsevier Inc. All rights reserved.

  3. Elements of algebraic coding systems

    CERN Document Server

    Cardoso da Rocha, Jr, Valdemar

    2014-01-01

    Elements of Algebraic Coding Systems is an introductory text to algebraic coding theory. In the first chapter, you'll gain inside knowledge of coding fundamentals, which is essential for a deeper understanding of state-of-the-art coding systems. This book is a quick reference for those who are unfamiliar with this topic, as well as for use with specific applications such as cryptography and communication. Linear error-correcting block codes through elementary principles span eleven chapters of the text. Cyclic codes, some finite field algebra, Goppa codes, algebraic decoding algorithms, and applications in public-key cryptography and secret-key cryptography are discussed, including problems and solutions at the end of each chapter. Three appendices cover the Gilbert bound and some related derivations, a derivation of the Mac- Williams' identities based on the probability of undetected error, and two important tools for algebraic decoding-namely, the finite field Fourier transform and the Euclidean algorithm f...

  4. Introduction of SCIENCE code package

    International Nuclear Information System (INIS)

    Lu Haoliang; Li Jinggang; Zhu Ya'nan; Bai Ning

    2012-01-01

    The SCIENCE code package is a set of neutronics tools based on 2D assembly calculations and 3D core calculations. It is made up of APOLLO2F, SMART and SQUALE and used to perform the nuclear design and loading pattern analysis for the reactors on operation or under construction of China Guangdong Nuclear Power Group. The purpose of paper is to briefly present the physical and numerical models used in each computation codes of the SCIENCE code pack age, including the description of the general structure of the code package, the coupling relationship of APOLLO2-F transport lattice code and SMART core nodal code, and the SQUALE code used for processing the core maps. (authors)

  5. [Breast cancer surgery].

    Science.gov (United States)

    Vlastos, Georges; Berclaz, Gilles; Langer, Igor; Pittet-Cuenod, Brigitte; Delaloye, Jean-François

    2007-10-24

    Breast conserving surgery followed by radiation therapy is the treatment of choice for early breast cancer. For patients who choice or need a mastectomy, breast reconstruction provides an acceptable alternative. Breast cancer surgery has been evolving through minimally invasive approaches. Sentinel node biopsy has already remplaced axillary lymph node dissection in the evaluation of the axilla. Local ablation of the tumor may be a valuable alternative to surgery in the future.

  6. Gastric and intestinal surgery.

    Science.gov (United States)

    Fossum, Theresa W; Hedlund, Cheryl S

    2003-09-01

    Gastric surgery is commonly performed to remove foreign bodies and correct gastric dilatation-volvulus and is less commonly performed to treat gastric ulceration or erosion, neoplasia, and benign gastric outflow obstruction. Intestinal surgery, although commonly performed by veterinarians, should never be considered routine. The most common procedures of the small intestinal tract performed in dogs and cats include enterotomy and resection/anastomosis. Surgery of the large intestine is indicated for lesions causing obstruction, perforations, colonic inertia, or chronic inflammation.

  7. Galois LCD Codes over Finite Fields

    OpenAIRE

    Liu, Xiusheng; Fan, Yun; Liu, Hualu

    2017-01-01

    In this paper, we study the complementary dual codes in more general setting (which are called Galois LCD codes) by a uniform method. A necessary and sufficient condition for linear codes to be Galois LCD codes is determined, and constacyclic codes to be Galois LCD codes are characterized. Some illustrative examples which constacyclic codes are Galois LCD MDS codes are provided as well. In particular, we study Hermitian LCD constacyclic codes. Finally, we present a construction of a class of ...

  8. GOC: General Orbit Code

    International Nuclear Information System (INIS)

    Maddox, L.B.; McNeilly, G.S.

    1979-08-01

    GOC (General Orbit Code) is a versatile program which will perform a variety of calculations relevant to isochronous cyclotron design studies. In addition to the usual calculations of interest (e.g., equilibrium and accelerated orbits, focusing frequencies, field isochronization, etc.), GOC has a number of options to calculate injections with a charge change. GOC provides both printed and plotted output, and will follow groups of particles to allow determination of finite-beam properties. An interactive PDP-10 program called GIP, which prepares input data for GOC, is available. GIP is a very easy and convenient way to prepare complicated input data for GOC. Enclosed with this report are several microfiche containing source listings of GOC and other related routines and the printed output from a multiple-option GOC run

  9. Code des baux 2018

    CERN Document Server

    Vial-Pedroletti, Béatrice; Kendérian, Fabien; Chavance, Emmanuelle; Coutan-Lapalus, Christelle

    2017-01-01

    Le code des baux 2018 vous offre un contenu extrêmement pratique, fiable et à jour au 1er août 2017. Cette 16e édition intègre notamment : le décret du 27 juillet 2017 relatif à l’évolution de certains loyers dans le cadre d’une nouvelle location ou d’un renouvellement de bail, pris en application de l’article 18 de la loi n° 89-462 du 6 juillet 1989 ; la loi du 27 janvier 2017 relative à l’égalité et à la citoyenneté ; la loi du 9 décembre 2016 relative à la transparence, à la lutte contre la corruption et à la modernisation de la vie économique ; la loi du 18 novembre 2016 de modernisation de la justice du xxie siècle

  10. Annals of surgery

    National Research Council Canada - National Science Library

    1885-01-01

    Includes the transactions of the American Surgical Association, New York Surgical Society, Philadelphia Academy of Surgery, Southern Surgical Association, Central Surgical Association, and at various...

  11. [Surgery of adrenal tumors].

    Science.gov (United States)

    Bondarenko, V O; Ermolov, A S; Kovalenko, T I; Kondratiev, A V

    2004-01-01

    From 1983 to 2003 examination and surgical treatment were performed in 463 patients with different adrenal tumors. Hormone-active tumors were revealed in 249 of them, non-active - in 214. Combination of CT or MRT with study of adrenal hormones is the basis of the diagnosis. In different cases multispiral computed tomography, angiography, selected taking of blood from inferior caval vein, US- or CT-guided biopsy were used. Open surgery through thoracofrenolumbotomy was performed in 392 patients, videolaparoscopic surgery - in 71. Expediency of laparoscopic surgery in line with open surgery is demonstrated.

  12. Hyperoxaluria and Bariatric Surgery

    Science.gov (United States)

    Asplin, John R.

    2007-04-01

    Bariatric surgery as a means to treat obesity is becoming increasingly common in the United States. An early form of bariatric surgery, the jejunoileal bypass, had to be abandoned in 1980 due to numerous complications, including hyperoxaluria and kidney stones. Current bariatric procedures have not been systematically evaluated to determine if they cause hyperoxaluria. Presented here are data showing that hyperoxaluria is the major metabolic abnormality in patients with bariatric surgery who form kidney stones. Further studies are needed to assess the prevalence of hyperoxaluria in all patients with bariatric surgery.

  13. Oncoplastic breast surgery.

    Science.gov (United States)

    Pillarisetti, Raghu Ram; Querci Della Rovere, Guidubaldo

    2012-06-01

    Breast Surgery is now a recognized subspecialty of General Surgery abroad with structured training for designated 'Oncoplastic Breast Surgeons'. Oncoplastic Breast surgery is probably one of the most interesting and challenging new developments over the past 20 years. The aims of Oncoplastic surgery are wide local excision of the cancer coupled with partial reconstruction of the defect to achieve a cosmetically acceptable result. Avoidance of mastectomy and consequent reduction of psychological morbidity are the principal goals in the development of various oncoplastic techniques. The use of plastic surgical techniques not only ensures good cosmetic outcome, but also allows the cancer surgeon to remove the tumour with greater volume of surrounding tissue, thus extending the boundaries of breast conserving surgery. Proper patient selection and careful planning after proper radiological and clinical assessment are the two essential prerequisites before undertaking oncoplastic breast surgery. Oncoplastic surgery involves both volume displacement and volume replacement techniques. Some commonly used volume displacement procedures are described in the article. The need for adjustment of contralateral breast should also be anticipated at the time of planning breast conserving surgery, which can be done either at the same time as breast cancer surgery or as a delayed setting.

  14. Abdominal aortic aneurysm surgery

    DEFF Research Database (Denmark)

    Gefke, K; Schroeder, T V; Thisted, B

    1994-01-01

    The goal of this study was to identify patients who need longer care in the ICU (more than 48 hours) following abdominal aortic aneurysm (AAA) surgery and to evaluate the influence of perioperative complications on short- and long-term survival and quality of life. AAA surgery was performed in 553......, 78% stated that their quality of life had improved or was unchanged after surgery and had resumed working. These data justify a therapeutically aggressive approach, including ICU therapy following AAA surgery, despite failure of one or more organ systems....

  15. Annals of surgery

    National Research Council Canada - National Science Library

    Includes the transactions of the American Surgical Association, New York Surgical Society, Philadelphia Academy of Surgery, Southern Surgical Association, Central Surgical Association, and at various...

  16. [Crohn's disease surgery].

    Science.gov (United States)

    Kala, Zdeněk; Marek, Filip; Válek, Vlastimil A; Bartušek, Daniel

    2014-01-01

    Surgery of Crohns disease is an important part of the general treatment algorithm. The role of surgery is changing with the development of conservative procedures. The recent years have seen the return to early treatment of patients with Crohns disease. Given the character of the disease and its intestinal symptoms, a specific approach to these patients is necessary, especially regarding the correct choice of surgery. The paper focuses on the luminal damage of the small and large intestine including complications of the disease. We describe the individual indications for a surgical solution, including the choice of anastomosis or multiple / repeated surgeries.

  17. Entanglement-assisted quantum MDS codes from negacyclic codes

    Science.gov (United States)

    Lu, Liangdong; Li, Ruihu; Guo, Luobin; Ma, Yuena; Liu, Yang

    2018-03-01

    The entanglement-assisted formalism generalizes the standard stabilizer formalism, which can transform arbitrary classical linear codes into entanglement-assisted quantum error-correcting codes (EAQECCs) by using pre-shared entanglement between the sender and the receiver. In this work, we construct six classes of q-ary entanglement-assisted quantum MDS (EAQMDS) codes based on classical negacyclic MDS codes by exploiting two or more pre-shared maximally entangled states. We show that two of these six classes q-ary EAQMDS have minimum distance more larger than q+1. Most of these q-ary EAQMDS codes are new in the sense that their parameters are not covered by the codes available in the literature.

  18. Diagonal Eigenvalue Unity (DEU) code for spectral amplitude coding-optical code division multiple access

    Science.gov (United States)

    Ahmed, Hassan Yousif; Nisar, K. S.

    2013-08-01

    Code with ideal in-phase cross correlation (CC) and practical code length to support high number of users are required in spectral amplitude coding-optical code division multiple access (SAC-OCDMA) systems. SAC systems are getting more attractive in the field of OCDMA because of its ability to eliminate the influence of multiple access interference (MAI) and also suppress the effect of phase induced intensity noise (PIIN). In this paper, we have proposed new Diagonal Eigenvalue Unity (DEU) code families with ideal in-phase CC based on Jordan block matrix with simple algebraic ways. Four sets of DEU code families based on the code weight W and number of users N for the combination (even, even), (even, odd), (odd, odd) and (odd, even) are constructed. This combination gives DEU code more flexibility in selection of code weight and number of users. These features made this code a compelling candidate for future optical communication systems. Numerical results show that the proposed DEU system outperforms reported codes. In addition, simulation results taken from a commercial optical systems simulator, Virtual Photonic Instrument (VPI™) shown that, using point to multipoint transmission in passive optical network (PON), DEU has better performance and could support long span with high data rate.

  19. Selection of Code and Interleaver for Turbo Coding

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1998-01-01

    The selection of component codes for turbo coding has often been based on the performance at high SNR's. However, we will argue that the selection mainly should be based on the performance at low SNR's, i.e. the convergence properties. Further, we will present a way to construct interleavers...... that significantly improve the performance of the turbo coding scheme at high SNR's, i.e. lowers the error floor...

  20. Suture Coding: A Novel Educational Guide for Suture Patterns.

    Science.gov (United States)

    Gaber, Mohamed; Abdel-Wahed, Ramadan

    2015-01-01

    This study aims to provide a helpful guide to perform tissue suturing successfully using suture coding-a method for identification of suture patterns and techniques by giving full information about the method of application of each pattern using numbers and symbols. Suture coding helps construct an infrastructure for surgical suture science. It facilitates the easy understanding and learning of suturing techniques and patterns as well as detects the relationship between the different patterns. Guide points are fixed on both edges of the wound to act as a guideline to help practice suture pattern techniques. The arrangement is fixed as 1-3-5-7 and a-c-e-g on one side (whether right or left) and as 2-4-6-8 and b-d-f-h on the other side. Needle placement must start from number 1 or letter "a" and continue to follow the code till the end of the stitching. Some rules are created to be adopted for the application of suture coding. A suture trainer containing guide points that simulate the coding process is used to facilitate the learning of the coding method. (120) Is the code of simple interrupted suture pattern; (ab210) is the code of vertical mattress suture pattern, and (013465)²/3 is the code of Cushing suture pattern. (0A1) Is suggested as a surgical suture language that gives the name and type of the suture pattern used to facilitate its identification. All suture patterns known in the world should start with (0), (A), or (1). There is a relationship between 2 or more surgical patterns according to their codes. It can be concluded that every suture pattern has its own code that helps in the identification of its type, structure, and method of application. Combination between numbers and symbols helps in the understanding of suture techniques easily without complication. There are specific relationships that can be identified between different suture patterns. Coding methods facilitate suture patterns learning process. The use of suture coding can be a good

  1. Contemporary endodontic surgery.

    Science.gov (United States)

    Rubinstein, Richard; Torabinejad, Mahmoud

    2004-06-01

    During the past decade, endodontics has seen a dramatic shift in the application of periradicular surgery and the role it plays in endodontic treatment. With the introduction of enhanced magnification, periradicular ultrasonics and other associative technologies, teeth that might otherwise be extracted now have a chance for retention. This article describes the role of these advances in contemporary endodontic surgery.

  2. Annals of Pediatric Surgery

    African Journals Online (AJOL)

    The Annals of Pediatric Surgery is striving to fill an important niche that provides focus to clinical care, technical innovation and clinical research. The Annals of Pediatric Surgery has the responsibility to serve not only pediatric surgeons in the Middle East and North Africa but also should be an important conduit for scientific ...

  3. Robust surgery loading

    NARCIS (Netherlands)

    Hans, Elias W.; Wullink, Gerhard; van Houdenhoven, Mark; Kazemier, Geert

    2008-01-01

    We consider the robust surgery loading problem for a hospital’s operating theatre department, which concerns assigning surgeries and sufficient planned slack to operating room days. The objective is to maximize capacity utilization and minimize the risk of overtime, and thus cancelled patients. This

  4. Safety in cardiac surgery

    NARCIS (Netherlands)

    Siregar, S.

    2013-01-01

    The monitoring of safety in cardiac surgery is a complex process, which involves many clinical, practical, methodological and statistical issues. The objective of this thesis was to measure and to compare safety in cardiac surgery in The Netherlands using the Netherlands Association for

  5. Prehabilitation Before Major Surgery

    OpenAIRE

    Johnson Francis

    2018-01-01

    Prehabilitation is a new term for preoperative rehabilitation before major surgery. Some authors use the short form 'Prehab', though it is not so widely used. Prehabilitation involves measures to improve the physical, physiological, metabolic and psychosocial reserves in preparation for an elective surgery. This involves exercise, nutrition, education and psychosocial interventions.

  6. Annals of African Surgery

    African Journals Online (AJOL)

    The goal of the Annals of African Surgery is to provide a medium for the exchange of current information between surgeons in the African region. The journal embraces surgery in all its aspects; basic science, clinical research, experimental research, surgical education. It will assist surgeons in the region to keep abreast of ...

  7. Economics of epilepsy surgery

    Directory of Open Access Journals (Sweden)

    Venkatraman Sadanand

    2014-01-01

    Full Text Available Objective: Surgical decision-making is a complex process. First, a medical decision is made to determine if surgery is necessary. Second, another medical decision is made to determine the type of surgery. Third, a corporate decision is made if such a surgery is financially feasible. Finally, a legal decision is made to proceed or refuse the chosen surgery. This paper examines these issues in the case of surgery for medically intractable epilepsy and proposes a method of decision analysis to guide epilepsy surgery. Materials and Methods: A stochastic game of imperfect information using techniques of game theory and decision analysis is introduced as an analytical tool for surgical decision-making. Results: Surgery for appropriately chosen patients suffering from medically intractable epilepsy may not only be feasible, but may be the best medical option and the best financial option for the patient, families, society and the healthcare system. Such a situation would then make it legally or ethically difficult to reject or postpone surgery for these patients. Conclusions: A process to collect data to quantify the parameters used in the decision analysis is hereby proposed.

  8. Cosmetic breast surgery - discharge

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000273.htm Cosmetic breast surgery - discharge To use the sharing features on this ... Editorial team. Related MedlinePlus Health Topics Plastic and Cosmetic Surgery Browse the Encyclopedia A.D.A.M., Inc. ...

  9. [Cognitive deterioration after surgery

    DEFF Research Database (Denmark)

    Steinmetz, J.; Rasmussen, L.S.

    2008-01-01

    Delirium and postoperative cognitive dysfunction are important and common complications after surgery. Risk factors are first of all increasing age and type of surgery, whereas the type of anaesthesia does not seem to play an important role. Mortality is higher among patients with cognitive...

  10. Bariatric surgery and fertility.

    Science.gov (United States)

    Shah, Divya K; Ginsburg, Elizabeth S

    2010-06-01

    Bariatric surgery is the most reliable way to sustain weight loss in the morbidly obese. Reproductive age women comprise the majority of bariatric patients, and many may be interested in conceiving after surgery. The purpose of this review is to synthesize the recent literature on bariatric surgery and fertility to assist providers in patient counseling. Obesity adversely impacts fecundability and IVF outcomes through a variety of mechanisms. The body of literature on reproductive outcome after bariatric surgery is sparse and of mixed quality. Bariatric surgery has been shown to improve menstrual cyclicity in anovulatory women, but little is published on the impact of surgical weight loss on spontaneous or IVF-treatment-related pregnancy rates. The increased risk of miscarriage in obese women may decline after bariatric surgery. There are currently insufficient data to support recommendations regarding the ideal timing for pregnancy after bariatric surgery. Obesity has been shown to adversely impact fertility, and weight loss is associated with significant improvement in many parameters of reproductive function. Further research is required as to the specific impact of surgical weight loss on pregnancy and miscarriage rates, as well as the optimal timing of pregnancy after bariatric surgery.

  11. Stochastic Decoding of Turbo Codes

    OpenAIRE

    Dong , Q. T.; ARZEL , Matthieu; Jego , Christophe; Gross , W. J.

    2010-01-01

    International audience; Stochastic computation is a technique in which operations on probabilities are performed on random bit streams. Stochastic decoding of forward error-correction (FEC) codes is inspired by this technique. This paper extends the application of the stochastic decoding approach to the families of convolutional codes and turbo codes. It demonstrates that stochastic computation is a promising solution to improve the data throughput of turbo decoders with very simple implement...

  12. An algebraic approach to graph codes

    DEFF Research Database (Denmark)

    Pinero, Fernando

    theory as evaluation codes. Chapter three consists of the introduction to graph based codes, such as Tanner codes and graph codes. In Chapter four, we compute the dimension of some graph based codes with a result combining graph based codes and subfield subcodes. Moreover, some codes in chapter four...... are optimal or best known for their parameters. In chapter five we study some graph codes with Reed–Solomon component codes. The underlying graph is well known and widely used for its good characteristics. This helps us to compute the dimension of the graph codes. We also introduce a combinatorial concept...... related to the iterative encoding of graph codes with MDS component code. The last chapter deals with affine Grassmann codes and Grassmann codes. We begin with some previously known codes and prove that they are also Tanner codes of the incidence graph of the point–line partial geometry...

  13. QR code for medical information uses.

    Science.gov (United States)

    Fontelo, Paul; Liu, Fang; Ducut, Erick G

    2008-11-06

    We developed QR code online tools, simulated and tested QR code applications for medical information uses including scanning QR code labels, URLs and authentication. Our results show possible applications for QR code in medicine.

  14. Critical differences between elective and emergency surgery: identifying domains for quality improvement in emergency general surgery.

    Science.gov (United States)

    Columbus, Alexandra B; Morris, Megan A; Lilley, Elizabeth J; Harlow, Alyssa F; Haider, Adil H; Salim, Ali; Havens, Joaquim M

    2018-04-01

    The objective of our study was to characterize providers' impressions of factors contributing to disproportionate rates of morbidity and mortality in emergency general surgery to identify targets for care quality improvement. Emergency general surgery is characterized by a high-cost burden and disproportionate morbidity and mortality. Factors contributing to these observed disparities are not comprehensively understood and targets for quality improvement have not been formally developed. Using a grounded theory approach, emergency general surgery providers were recruited through purposive-criterion-based sampling to participate in semi-structured interviews and focus groups. Participants were asked to identify contributors to emergency general surgery outcomes, to define effective care for EGS patients, and to describe operating room team structure. Interviews were performed to thematic saturation. Transcripts were iteratively coded and analyzed within and across cases to identify emergent themes. Member checking was performed to establish credibility of the findings. A total of 40 participants from 5 academic hospitals participated in either individual interviews (n = 25 [9 anesthesia, 12 surgery, 4 nursing]) or focus groups (n = 2 [15 nursing]). Emergency general surgery was characterized by an exceptionally high level of variability, which can be subcategorized as patient-variability (acute physiology and comorbidities) and system-variability (operating room resources and workforce). Multidisciplinary communication is identified as a modifier to variability in emergency general surgery; however, nursing is often left out of early communication exchanges. Critical variability in emergency general surgery may impact outcomes. Patient-variability and system-variability, with focus on multidisciplinary communication, represent potential domains for quality improvement in this field. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. Ultrasound imaging using coded signals

    DEFF Research Database (Denmark)

    Misaridis, Athanasios

    coded excitation can be used for increasing the frame rate. The work includes both simulated results using Field II, and experimental results based on measurements on phantoms as well as clinical images. Initially a mathematical foundation of signal modulation is given. Pulse compression based...... is described. Application of coded excitation in array imaging is evaluated through simulations in Field II. The low degree of the orthogonality among coded signals for ultrasound systems is first discussed, and the effect of mismatched filtering in the cross-correlation properties of the signals is evaluated...... emissions. Finally, a novel coding technique which uses pulse train excitation is presented....

  16. Grassmann codes and Schubert unions

    DEFF Research Database (Denmark)

    Hansen, Johan Peder; Johnsen, Trygve; Ranestad, Kristian

    2009-01-01

    We study subsets of Grassmann varieties over a field , such that these subsets are unions of Schubert cycles, with respect to a fixed flag. We study such sets in detail, and give applications to coding theory, in particular for Grassmann codes. For much is known about such Schubert unions...... with a maximal number of -rational points for a given spanning dimension. We study the case and give a conjecture for general . We also define Schubert union codes in general, and study the parameters and support weights of these codes....

  17. High Order Modulation Protograph Codes

    Science.gov (United States)

    Nguyen, Thuy V. (Inventor); Nosratinia, Aria (Inventor); Divsalar, Dariush (Inventor)

    2014-01-01

    Digital communication coding methods for designing protograph-based bit-interleaved code modulation that is general and applies to any modulation. The general coding framework can support not only multiple rates but also adaptive modulation. The method is a two stage lifting approach. In the first stage, an original protograph is lifted to a slightly larger intermediate protograph. The intermediate protograph is then lifted via a circulant matrix to the expected codeword length to form a protograph-based low-density parity-check code.

  18. Semi-supervised sparse coding

    KAUST Repository

    Wang, Jim Jing-Yan

    2014-07-06

    Sparse coding approximates the data sample as a sparse linear combination of some basic codewords and uses the sparse codes as new presentations. In this paper, we investigate learning discriminative sparse codes by sparse coding in a semi-supervised manner, where only a few training samples are labeled. By using the manifold structure spanned by the data set of both labeled and unlabeled samples and the constraints provided by the labels of the labeled samples, we learn the variable class labels for all the samples. Furthermore, to improve the discriminative ability of the learned sparse codes, we assume that the class labels could be predicted from the sparse codes directly using a linear classifier. By solving the codebook, sparse codes, class labels and classifier parameters simultaneously in a unified objective function, we develop a semi-supervised sparse coding algorithm. Experiments on two real-world pattern recognition problems demonstrate the advantage of the proposed methods over supervised sparse coding methods on partially labeled data sets.

  19. Coding, cryptography and combinatorics

    CERN Document Server

    Niederreiter, Harald; Xing, Chaoping

    2004-01-01

    It has long been recognized that there are fascinating connections between cod­ ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi­ natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the p...

  20. Coded aperture tomography revisited

    International Nuclear Information System (INIS)

    Bizais, Y.; Rowe, R.W.; Zubal, I.G.; Bennett, G.W.; Brill, A.B.

    1983-01-01

    Coded aperture (CA) Tomography never achieved wide spread use in Nuclear Medicine, except for the degenerate case of Seven Pinhole tomagraphy (7PHT). However it enjoys several attractive features (high sensitivity and tomographic ability with a statis detector). On the other hand, resolution is usually poor especially along the depth axis and the reconstructed volume is rather limited. Arguments are presented justifying the position that CA tomography can be useful for imaging time-varying 3D structures, if its major drawbacks (poor longitudinal resolution and difficulty in quantification) are overcome. Poor results obtained with 7PHT can be explained by both a very limited angular range sampled and a crude modelling of the image formation process. Therefore improvements can be expected by the use of a dual-detector system, along with a better understanding of its sampling properties and the use of more powerful reconstruction algorithms. Non overlapping multipinhole plates, because they do not involve a decoding procedure, should be considered first for practical applications. Use of real CA should be considered for cases in which non overlapping multipinhole plates do not lead to satisfactory solutions. We have been and currently are carrying out theoretical and experimental works, in order to define the factors which limit CA imaging and to propose satisfactory solutions for Dynamic Emission Tomography

  1. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup

    2017-04-11

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaickingand 4D light field view synthesis.

  2. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup

    2017-12-01

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high-dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaicing and 4D light field view synthesis.

  3. Computer code abstract: NESTLE

    International Nuclear Information System (INIS)

    Turinsky, P.J.; Al-Chalabi, R.M.K.; Engrand, P.; Sarsour, H.N.; Faure, F.X.; Guo, W.

    1995-01-01

    NESTLE is a few-group neutron diffusion equation solver utilizing the nodal expansion method (NEM) for eigenvalue, adjoint, and fixed-source steady-state and transient problems. The NESTLE code solve the eigenvalue (criticality), eigenvalue adjoint, external fixed-source steady-state, and external fixed-source or eigenvalue initiated transient problems. The eigenvalue problem allows criticality searches to be completed, and the external fixed-source steady-state problem can search to achieve a specified power level. Transient problems model delayed neutrons via precursor groups. Several core properties can be input as time dependent. Two- or four-energy groups can be utilized, with all energy groups being thermal groups (i.e., upscatter exits) is desired. Core geometries modeled include Cartesian and hexagonal. Three-, two-, and one-dimensional models can be utilized with various symmetries. The thermal conditions predicted by the thermal-hydraulic model of the core are used to correct cross sections for temperature and density effects. Cross sections for temperature and density effects. Cross sections are parameterized by color, control rod state (i.e., in or out), and burnup, allowing fuel depletion to be modeled. Either a macroscopic or microscopic model may be employed

  4. Sinus surgery: optimal surgery, optimal outcome?

    NARCIS (Netherlands)

    Fokkens, Wytske J.

    2016-01-01

    Sinus surgery remains an issue of discussion. We lack data on a number of important issues. In this issue of the journal Jiang et al. show that 67 % of their patients who underwent FESS for CRS had OSAS (of which more than half moderate to severe) but only 38% complained of daytime sleepiness

  5. Revision endoscopic sinonasal surgery.

    Science.gov (United States)

    Cantillano, Pablo; Rubio, Fabián; Naser, Alfredo; Nazar, Rodolfo

    Endoscopic sinonasal surgery is the procedure of choice in the treatment of chronic rhinosinusitis and sinonasal polyposis refractory to medical treatment, with high rates of success (76% to 97.5%). However, 2.5%-24% of those patients will require revision surgery (RESS). In this study, we present the clinical, anatomical, radiological and histological features of patients receiving RESS in our centre during a 3-year period. A retrospective review of clinical, anatomical, radiological and histopathological data of patients receiving revision endoscopic sinonasal surgery between 2012 and 2014 was carried out. From 299 surgery procedures performed, 27 (9%) were revision surgeries. The mean patient age was 46 years, with a male/female ratio of 1.4/1. The most frequent preoperative and postoperative diagnosis was chronic polypoid rhinosinusitis. The mean time since the previous surgery was 6.1 years, with 11.9 months of mean follow-up since that surgery. Stenotic antrostomy was found during revision in 81.5% of the patients and incomplete anterior ethmoidectomy and persistent uncinate process, in 59.3%. In radiology, 70.4% of patients had persistent anterior ethmoidal cells. Antrostomy or widening of antrostomy was performed in 96.3% of cases and anterior ethmoidectomy or completion of it was performed in 66.7%. Polyps, stenotic antrostomy and incomplete ethmoidectomy were the most frequent causes of revision surgery, in concordance with the procedures performed. The patients had long periods of time without follow-up between surgeries. Further investigation is necessary to generate measures to reduce the number of revision surgeries. Copyright © 2016 Elsevier España, S.L.U. and Sociedad Española de Otorrinolaringología y Cirugía de Cabeza y Cuello. All rights reserved.

  6. Turbo-Gallager Codes: The Emergence of an Intelligent Coding ...

    African Journals Online (AJOL)

    In 1948, C. Shannon developed fundamental limits on the efficiency of communication over noisy channels. However it is only in 1993 (about half a century later) that Berrou, Glavieux and Thitimajshima developed turbo codes and demonstrated performance close to that limit. Overnight, much of the algebraic coding ...

  7. Bariatric surgery and the changing current scope of general surgery practice: implications for general surgery residency training.

    Science.gov (United States)

    Mostaedi, Rouzbeh; Ali, Mohamed R; Pierce, Jonathan L; Scherer, Lynette A; Galante, Joseph M

    2015-02-01

    The scope of general surgery practice has evolved tremendously in the last 20 years. However, clinical experience in general surgery residency training has undergone relatively little change. To evaluate the current scope of academic general surgery and its implications on surgical residency. The University HealthSystem Consortium and Association of American Medical Colleges established the Faculty Practice Solution Center (FPSC) to characterize physician productivity. The FPSC is a benchmarking tool for academic medical centers created from revenue data collected from more than 90,000 physicians who practice at 95 institutions across the United States. The FPSC database was queried to evaluate the annual mean procedure frequency per surgeon (PFS) in each calendar year from 2006 through 2011. The associated work relative value units (wRVUs) were also examined to measure physician effort and skill. During the 6-year period, 146 distinct Current Procedural Terminology codes were among the top 100 procedures, and 16 of these procedures ranked in the top 10 procedures in at least 1 year. The top 10 procedures accounted for more than half (range, 52.5%-57.2%) of the total 100 PFS evaluated for each year. Laparoscopic Roux-en-Y gastric bypass was consistently among the top 10 procedures in each year (PFS, 18.2-24.6). The other most frequently performed procedures included laparoscopic cholecystectomy (PFS, 30.3-43.5), upper gastrointestinal tract endoscopy (PFS, 26.5-34.3), mastectomy (PFS, 16.5-35.0), inguinal hernia repair (PFS, 15.5-22.1), and abdominal wall hernia repair (PFS, 21.6-26.1). In all years, laparoscopic Roux-en-Y gastric bypass generated the highest number of wRVUs (wRVUs, 491.0-618.2), and laparoscopic cholecystectomy was regularly the next highest (wRVUs, 335.8-498.7). A significant proportion of academic general surgery is composed of bariatric surgery, yet surgical training does not sufficiently emphasize the necessary exposure to technical expertise

  8. Aortic valve surgery - minimally invasive

    Science.gov (United States)

    ... valve surgery. Techniques include min-thoracotomy, min-sternotomy, robot-assisted surgery, and percutaneous surgery. To perform the ... M. is also a founding member of Hi-Ethics and subscribes to the principles of the Health ...

  9. Cleft Lip and Palate Surgery

    Science.gov (United States)

    ... The experts in face, mouth and jaw surgery. Cleft Lip / Palate and Craniofacial Surgery This type of surgery is ... the carefully orchestrated, multiple-stage correctional program for cleft lip and palate patients. The goal is to help restore the ...

  10. Tests and visits before surgery

    Science.gov (United States)

    Before surgery - tests; Before surgery - doctor visits ... Pre-op is the time before your surgery. It means "before operation." During this time, you will meet with one of your doctors. This may be your surgeon or primary care ...

  11. Gamma knife surgery for craniopharyngioma

    International Nuclear Information System (INIS)

    Prasad, D.; Steiner, M.; Steiner, L.

    1995-01-01

    We present our results of Gamma Knife surgery for craniopharyngioma in nine patients. The current status of surgery, radiation therapy, intracavitary instillation of radionuclides and Gamma Knife surgery in the management of craniopharyngiomas is discussed. (author)

  12. Getting yourself healthy before surgery

    Science.gov (United States)

    ... 3 months after certain surgeries (joint replacement or heart valve surgery). So be sure to schedule your dental ... Mattox KL, eds. Sabiston Textbook of Surgery: The Biological Basis of Modern Surgical Practice . 20th ed. Philadelphia, ...

  13. Allele coding in genomic evaluation

    Directory of Open Access Journals (Sweden)

    Christensen Ole F

    2011-06-01

    Full Text Available Abstract Background Genomic data are used in animal breeding to assist genetic evaluation. Several models to estimate genomic breeding values have been studied. In general, two approaches have been used. One approach estimates the marker effects first and then, genomic breeding values are obtained by summing marker effects. In the second approach, genomic breeding values are estimated directly using an equivalent model with a genomic relationship matrix. Allele coding is the method chosen to assign values to the regression coefficients in the statistical model. A common allele coding is zero for the homozygous genotype of the first allele, one for the heterozygote, and two for the homozygous genotype for the other allele. Another common allele coding changes these regression coefficients by subtracting a value from each marker such that the mean of regression coefficients is zero within each marker. We call this centered allele coding. This study considered effects of different allele coding methods on inference. Both marker-based and equivalent models were considered, and restricted maximum likelihood and Bayesian methods were used in inference. Results Theoretical derivations showed that parameter estimates and estimated marker effects in marker-based models are the same irrespective of the allele coding, provided that the model has a fixed general mean. For the equivalent models, the same results hold, even though different allele coding methods lead to different genomic relationship matrices. Calculated genomic breeding values are independent of allele coding when the estimate of the general mean is included into the values. Reliabilities of estimated genomic breeding values calculated using elements of the inverse of the coefficient matrix depend on the allele coding because different allele coding methods imply different models. Finally, allele coding affects the mixing of Markov chain Monte Carlo algorithms, with the centered coding being

  14. MARS Code in Linux Environment

    International Nuclear Information System (INIS)

    Hwang, Moon Kyu; Bae, Sung Won; Jung, Jae Joon; Chung, Bub Dong

    2005-01-01

    The two-phase system analysis code MARS has been incorporated into Linux system. The MARS code was originally developed based on the RELAP5/MOD3.2 and COBRA-TF. The 1-D module which evolved from RELAP5 alone could be applied for the whole NSSS system analysis. The 3-D module developed based on the COBRA-TF, however, could be applied for the analysis of the reactor core region where 3-D phenomena would be better treated. The MARS code also has several other code units that could be incorporated for more detailed analysis. The separate code units include containment analysis modules and 3-D kinetics module. These code modules could be optionally invoked to be coupled with the main MARS code. The containment code modules (CONTAIN and CONTEMPT), for example, could be utilized for the analysis of the plant containment phenomena in a coupled manner with the nuclear reactor system. The mass and energy interaction during the hypothetical coolant leakage accident could, thereby, be analyzed in a more realistic manner. In a similar way, 3-D kinetics could be incorporated for simulating the three dimensional reactor kinetic behavior, instead of using the built-in point kinetics model. The MARS code system, developed initially for the MS Windows environment, however, would not be adequate enough for the PC cluster system where multiple CPUs are available. When parallelism is to be eventually incorporated into the MARS code, MS Windows environment is not considered as an optimum platform. Linux environment, on the other hand, is generally being adopted as a preferred platform for the multiple codes executions as well as for the parallel application. In this study, MARS code has been modified for the adaptation of Linux platform. For the initial code modification, the Windows system specific features have been removed from the code. Since the coupling code module CONTAIN is originally in a form of dynamic load library (DLL) in the Windows system, a similar adaptation method

  15. Civil Code, 11 December 1987.

    Science.gov (United States)

    1988-01-01

    Article 162 of this Mexican Code provides, among other things, that "Every person has the right freely, responsibly, and in an informed fashion to determine the number and spacing of his or her children." When a marriage is involved, this right is to be observed by the spouses "in agreement with each other." The civil codes of the following states contain the same provisions: 1) Baja California (Art. 159 of the Civil Code of 28 April 1972 as revised in Decree No. 167 of 31 January 1974); 2) Morelos (Art. 255 of the Civil Code of 26 September 1949 as revised in Decree No. 135 of 29 December 1981); 3) Queretaro (Art. 162 of the Civil Code of 29 December 1950 as revised in the Act of 9 January 1981); 4) San Luis Potosi (Art. 147 of the Civil Code of 24 March 1946 as revised in 13 June 1978); Sinaloa (Art. 162 of the Civil Code of 18 June 1940 as revised in Decree No. 28 of 14 October 1975); 5) Tamaulipas (Art. 146 of the Civil Code of 21 November 1960 as revised in Decree No. 20 of 30 April 1975); 6) Veracruz-Llave (Art. 98 of the Civil Code of 1 September 1932 as revised in the Act of 30 December 1975); and 7) Zacatecas (Art. 253 of the Civil Code of 9 February 1965 as revised in Decree No. 104 of 13 August 1975). The Civil Codes of Puebla and Tlaxcala provide for this right only in the context of marriage with the spouses in agreement. See Art. 317 of the Civil Code of Puebla of 15 April 1985 and Article 52 of the Civil Code of Tlaxcala of 31 August 1976 as revised in Decree No. 23 of 2 April 1984. The Family Code of Hidalgo requires as a formality of marriage a certification that the spouses are aware of methods of controlling fertility, responsible parenthood, and family planning. In addition, Article 22 the Civil Code of the Federal District provides that the legal capacity of natural persons is acquired at birth and lost at death; however, from the moment of conception the individual comes under the protection of the law, which is valid with respect to the

  16. MARS Code in Linux Environment

    Energy Technology Data Exchange (ETDEWEB)

    Hwang, Moon Kyu; Bae, Sung Won; Jung, Jae Joon; Chung, Bub Dong [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    2005-07-01

    The two-phase system analysis code MARS has been incorporated into Linux system. The MARS code was originally developed based on the RELAP5/MOD3.2 and COBRA-TF. The 1-D module which evolved from RELAP5 alone could be applied for the whole NSSS system analysis. The 3-D module developed based on the COBRA-TF, however, could be applied for the analysis of the reactor core region where 3-D phenomena would be better treated. The MARS code also has several other code units that could be incorporated for more detailed analysis. The separate code units include containment analysis modules and 3-D kinetics module. These code modules could be optionally invoked to be coupled with the main MARS code. The containment code modules (CONTAIN and CONTEMPT), for example, could be utilized for the analysis of the plant containment phenomena in a coupled manner with the nuclear reactor system. The mass and energy interaction during the hypothetical coolant leakage accident could, thereby, be analyzed in a more realistic manner. In a similar way, 3-D kinetics could be incorporated for simulating the three dimensional reactor kinetic behavior, instead of using the built-in point kinetics model. The MARS code system, developed initially for the MS Windows environment, however, would not be adequate enough for the PC cluster system where multiple CPUs are available. When parallelism is to be eventually incorporated into the MARS code, MS Windows environment is not considered as an optimum platform. Linux environment, on the other hand, is generally being adopted as a preferred platform for the multiple codes executions as well as for the parallel application. In this study, MARS code has been modified for the adaptation of Linux platform. For the initial code modification, the Windows system specific features have been removed from the code. Since the coupling code module CONTAIN is originally in a form of dynamic load library (DLL) in the Windows system, a similar adaptation method

  17. Coding in pigeons: Multiple-coding versus single-code/default strategies.

    Science.gov (United States)

    Pinto, Carlos; Machado, Armando

    2015-05-01

    To investigate the coding strategies that pigeons may use in a temporal discrimination tasks, pigeons were trained on a matching-to-sample procedure with three sample durations (2s, 6s and 18s) and two comparisons (red and green hues). One comparison was correct following 2-s samples and the other was correct following both 6-s and 18-s samples. Tests were then run to contrast the predictions of two hypotheses concerning the pigeons' coding strategies, the multiple-coding and the single-code/default. According to the multiple-coding hypothesis, three response rules are acquired, one for each sample. According to the single-code/default hypothesis, only two response rules are acquired, one for the 2-s sample and a "default" rule for any other duration. In retention interval tests, pigeons preferred the "default" key, a result predicted by the single-code/default hypothesis. In no-sample tests, pigeons preferred the key associated with the 2-s sample, a result predicted by multiple-coding. Finally, in generalization tests, when the sample duration equaled 3.5s, the geometric mean of 2s and 6s, pigeons preferred the key associated with the 6-s and 18-s samples, a result predicted by the single-code/default hypothesis. The pattern of results suggests the need for models that take into account multiple sources of stimulus control. © Society for the Experimental Analysis of Behavior.

  18. Anesthesia for bariatric surgery.

    Science.gov (United States)

    Nishiyama, Tomoki; Kohno, Yumiko; Koishi, Keiko

    2012-02-01

    Bariatric surgery has a lot of problems in anesthesia. We retrospectively compared anesthesia for bariatric surgery in yellow race with that in normal weight patients. Twenty patients who received bariatric surgery and 20 normal body weight patients who received abdominal surgery in Japan were enrolled. Induction condition, depth of epidural space, dose of anesthetics, duration of the effects of muscle relaxants, ventilation, and fluid management in bariatric surgery were analyzed and compared with those in normal body weight patients. An epidural catheterization was successful under ultrasound guide in the bariatric group. The depth epidural space was significantly larger in the bariatric group. Cormack and Lehane classification and the number of intubation attempt were not different between the two groups, while one bariatric case was once awakened to intubate blindly. Pressure-controlled ventilation was used in the bariatric group. Four bariatric patients were continuously ventilated after surgery. The doses of anesthetics and fluid infusion rate were not different between the two groups when calculated by ideal body weight in the bariatric group. The duration of the effects of rocuronium and pancuronium were shorter in the bariatric group. For anesthesia of yellow race patients undergoing bariatric surgery, intravenous anesthetics and acetate Ringer's solution with 1% glucose could be administered per ideal body weight, the effects of muscle relaxants lasted shorter, pressure-controlled ventilation could keep oxygenation with adequate carbon dioxide, and ultrasound assist was useful in epidural catheterization in the bariatric patients.

  19. Cyclic codes of length 2

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    [X]/〈X2m. − 1〉 are given. Cyclic codes of length 2m over the finite field Fq, of odd characteristic, are defined in terms of their generator polynomials. The exact minimum distance and the dimension of the codes are obtained. Keywords.

  20. Code breaking in the pacific

    CERN Document Server

    Donovan, Peter

    2014-01-01

    Covers the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945 Describes, explains and analyzes the code breaking techniques developed during the war in the Pacific Exposes the blunders (in code construction and use) made by the Japanese Navy that led to significant US Naval victories

  1. NETWORK CODING BY BEAM FORMING

    DEFF Research Database (Denmark)

    2013-01-01

    Network coding by beam forming in networks, for example, in single frequency networks, can provide aid in increasing spectral efficiency. When network coding by beam forming and user cooperation are combined, spectral efficiency gains may be achieved. According to certain embodiments, a method...

  2. On Network Coded Filesystem Shim

    DEFF Research Database (Denmark)

    Sørensen, Chres Wiant; Roetter, Daniel Enrique Lucani; Médard, Muriel

    2017-01-01

    benefits to any application in a computer. However, incorporating new protocols to the Internet is a challenging and slow process. Second, deploying coding at the application layer, which forces each application to implement network coding. This paper proposes an alternative approach through the use...

  3. LFSC - Linac Feedback Simulation Code

    Energy Technology Data Exchange (ETDEWEB)

    Ivanov, Valentin; /Fermilab

    2008-05-01

    The computer program LFSC (Code>) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output.

  4. The reactor dynamic code RETRANS

    International Nuclear Information System (INIS)

    Kamelander, G.; Woloch, F.; Sdouz, G.; Koinig, H.

    1984-08-01

    This report gives a general view on the reactor dynamic code RETRANS. The subroutines and common-blocks are described in detail to facilitate code-modifications and improvements of physical models or numerical methods. Furthermore the report contains an users guide. Finally some test examples are given. The physical meaning of the results is discussed. (Author) [de

  5. Flow Analysis of Code Customizations

    DEFF Research Database (Denmark)

    Hessellund, Anders; Sestoft, Peter

    2008-01-01

    Inconsistency between metadata and code customizations is a major concern in modern, configurable enterprise systems. The increasing reliance on metadata, in the form of XML files, and code customizations, in the form of Java files, has led to a hybrid development platform. The expected consistency...

  6. Survey of coded aperture imaging

    International Nuclear Information System (INIS)

    Barrett, H.H.

    1975-01-01

    The basic principle and limitations of coded aperture imaging for x-ray and gamma cameras are discussed. Current trends include (1) use of time varying apertures, (2) use of ''dilute'' apertures with transmission much less than 50%, and (3) attempts to derive transverse tomographic sections, unblurred by other planes, from coded images

  7. Distributed source coding of video

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Van Luong, Huynh

    2015-01-01

    A foundation for distributed source coding was established in the classic papers of Slepian-Wolf (SW) [1] and Wyner-Ziv (WZ) [2]. This has provided a starting point for work on Distributed Video Coding (DVC), which exploits the source statistics at the decoder side offering shifting processing...

  8. Recommendations for ECG diagnostic coding

    NARCIS (Netherlands)

    Bonner, R.E.; Caceres, C.A.; Cuddy, T.E.; Meijler, F.L.; Milliken, J.A.; Rautaharju, P.M.; Robles de Medina, E.O.; Willems, J.L.; Wolf, H.K.; Working Group 'Diagnostic Codes'

    1978-01-01

    The Oxford dictionary defines code as "a body of laws so related to each other as to avoid inconsistency and overlapping". It is obvious that natural language with its high degree of ambiguity does not qualify as a code in the sense of this definition. Everyday experiences provide ample evidence

  9. Error correcting coding for OTN

    DEFF Research Database (Denmark)

    Justesen, Jørn; Larsen, Knud J.; Pedersen, Lars A.

    2010-01-01

    Forward error correction codes for 100 Gb/s optical transmission are currently receiving much attention from transport network operators and technology providers. We discuss the performance of hard decision decoding using product type codes that cover a single OTN frame or a small number...

  10. Accelerator Physics Code Web Repository

    CERN Document Server

    Zimmermann, Frank; Bellodi, G; Benedetto, E; Dorda, U; Giovannozzi, Massimo; Papaphilippou, Y; Pieloni, T; Ruggiero, F; Rumolo, G; Schmidt, F; Todesco, E; Zotter, Bruno W; Payet, J; Bartolini, R; Farvacque, L; Sen, T; Chin, Y H; Ohmi, K; Oide, K; Furman, M; Qiang, J; Sabbi, G L; Seidl, P A; Vay, J L; Friedman, A; Grote, D P; Cousineau, S M; Danilov, V; Holmes, J A; Shishlo, A; Kim, E S; Cai, Y; Pivi, M; Kaltchev, D I; Abell, D T; Katsouleas, Thomas C; Boine-Frankenheim, O; Franchetti, G; Hofmann, I; Machida, S; Wei, J

    2006-01-01

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic acceleratorphysics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  11. Distributed space-time coding

    CERN Document Server

    Jing, Yindi

    2014-01-01

    Distributed Space-Time Coding (DSTC) is a cooperative relaying scheme that enables high reliability in wireless networks. This brief presents the basic concept of DSTC, its achievable performance, generalizations, code design, and differential use. Recent results on training design and channel estimation for DSTC and the performance of training-based DSTC are also discussed.

  12. What Froze the Genetic Code?

    Science.gov (United States)

    Ribas de Pouplana, Lluís; Torres, Adrian Gabriel; Rafels-Ybern, Àlbert

    2017-04-05

    The frozen accident theory of the Genetic Code was a proposal by Francis Crick that attempted to explain the universal nature of the Genetic Code and the fact that it only contains information for twenty amino acids. Fifty years later, it is clear that variations to the universal Genetic Code exist in nature and that translation is not limited to twenty amino acids. However, given the astonishing diversity of life on earth, and the extended evolutionary time that has taken place since the emergence of the extant Genetic Code, the idea that the translation apparatus is for the most part immobile remains true. Here, we will offer a potential explanation to the reason why the code has remained mostly stable for over three billion years, and discuss some of the mechanisms that allow species to overcome the intrinsic functional limitations of the protein synthesis machinery.

  13. What Froze the Genetic Code?

    Directory of Open Access Journals (Sweden)

    Lluís Ribas de Pouplana

    2017-04-01

    Full Text Available The frozen accident theory of the Genetic Code was a proposal by Francis Crick that attempted to explain the universal nature of the Genetic Code and the fact that it only contains information for twenty amino acids. Fifty years later, it is clear that variations to the universal Genetic Code exist in nature and that translation is not limited to twenty amino acids. However, given the astonishing diversity of life on earth, and the extended evolutionary time that has taken place since the emergence of the extant Genetic Code, the idea that the translation apparatus is for the most part immobile remains true. Here, we will offer a potential explanation to the reason why the code has remained mostly stable for over three billion years, and discuss some of the mechanisms that allow species to overcome the intrinsic functional limitations of the protein synthesis machinery.

  14. Non-Protein Coding RNAs

    CERN Document Server

    Walter, Nils G; Batey, Robert T

    2009-01-01

    This book assembles chapters from experts in the Biophysics of RNA to provide a broadly accessible snapshot of the current status of this rapidly expanding field. The 2006 Nobel Prize in Physiology or Medicine was awarded to the discoverers of RNA interference, highlighting just one example of a large number of non-protein coding RNAs. Because non-protein coding RNAs outnumber protein coding genes in mammals and other higher eukaryotes, it is now thought that the complexity of organisms is correlated with the fraction of their genome that encodes non-protein coding RNAs. Essential biological processes as diverse as cell differentiation, suppression of infecting viruses and parasitic transposons, higher-level organization of eukaryotic chromosomes, and gene expression itself are found to largely be directed by non-protein coding RNAs. The biophysical study of these RNAs employs X-ray crystallography, NMR, ensemble and single molecule fluorescence spectroscopy, optical tweezers, cryo-electron microscopy, and ot...

  15. Surveys on surgery theory

    CERN Document Server

    Cappell, Sylvain; Rosenberg, Jonathan

    2014-01-01

    Surgery theory, the basis for the classification theory of manifolds, is now about forty years old. There have been some extraordinary accomplishments in that time, which have led to enormously varied interactions with algebra, analysis, and geometry. Workers in many of these areas have often lamented the lack of a single source that surveys surgery theory and its applications. Indeed, no one person could write such a survey. The sixtieth birthday of C. T. C. Wall, one of the leaders of the founding generation of surgery theory, provided an opportunity to rectify the situation and produce a

  16. Surveys on surgery theory

    CERN Document Server

    Cappell, Sylvain; Rosenberg, Jonathan

    2014-01-01

    Surgery theory, the basis for the classification theory of manifolds, is now about forty years old. The sixtieth birthday (on December 14, 1996) of C.T.C. Wall, a leading member of the subject''s founding generation, led the editors of this volume to reflect on the extraordinary accomplishments of surgery theory as well as its current enormously varied interactions with algebra, analysis, and geometry. Workers in many of these areas have often lamented the lack of a single source surveying surgery theory and its applications. Because no one person could write such a survey, the editors ask

  17. Keratomycosis after cataract surgery.

    Science.gov (United States)

    Mendicute, J; Orbegozo, J; Ruiz, M; Sáiz, A; Eder, F; Aramberri, J

    2000-11-01

    To evaluate cases and results of keratomycosis that developed after cataract surgery. Hospital de Guipúzcoa, San Sebastián, Spain. This retrospective study comprised 8 patients who developed keratomycosis soon after cataract surgery. Culture analysis revealed 7 cases of Aspergillus fumigatus and 1 of Aspergillus flavus. After medical treatment with antifungal agents, 6 cases resolved and 2 required evisceration. The presence of fungi in corneal ulcers that develop after cataract surgery should be considered. Initiation of early treatment determines the prognosis. Among the therapeutic options, collagen shields soaked in amphotericin B may be effective.

  18. Single port laparoscopic surgery

    DEFF Research Database (Denmark)

    Springborg, Henrik; Istre, Olav

    2012-01-01

    potential benefits. Theoretically, cosmetic outcomes, postoperative pain and complication rates could be improved with use of single site surgery. This study describes introduction of the method in a private hospital in Denmark, in which 40 patients have been treated for benign gynecologic conditions......LESS, or laparo-endoscopic single site surgery, is a promising new method in minimally invasive surgery. An increasing number of surgical procedures are being performed using this technique, however, its large-scale adoption awaits results of prospective randomized controlled studies confirming...

  19. High efficiency video coding coding tools and specification

    CERN Document Server

    Wien, Mathias

    2015-01-01

    The video coding standard High Efficiency Video Coding (HEVC) targets at improved compression performance for video resolutions of HD and beyond, providing Ultra HD video at similar compressed bit rates as for HD video encoded with the well-established video coding standard H.264 | AVC. Based on known concepts, new coding structures and improved coding tools have been developed and specified in HEVC. The standard is expected to be taken up easily by established industry as well as new endeavors, answering the needs of todays connected and ever-evolving online world. This book presents the High Efficiency Video Coding standard and explains it in a clear and coherent language. It provides a comprehensive and consistently written description, all of a piece. The book targets at both, newbies to video coding as well as experts in the field. While providing sections with introductory text for the beginner, it suits as a well-arranged reference book for the expert. The book provides a comprehensive reference for th...

  20. Detecting non-coding selective pressure in coding regions

    Directory of Open Access Journals (Sweden)

    Blanchette Mathieu

    2007-02-01

    Full Text Available Abstract Background Comparative genomics approaches, where orthologous DNA regions are compared and inter-species conserved regions are identified, have proven extremely powerful for identifying non-coding regulatory regions located in intergenic or intronic regions. However, non-coding functional elements can also be located within coding region, as is common for exonic splicing enhancers, some transcription factor binding sites, and RNA secondary structure elements affecting mRNA stability, localization, or translation. Since these functional elements are located in regions that are themselves highly conserved because they are coding for a protein, they generally escaped detection by comparative genomics approaches. Results We introduce a comparative genomics approach for detecting non-coding functional elements located within coding regions. Codon evolution is modeled as a mixture of codon substitution models, where each component of the mixture describes the evolution of codons under a specific type of coding selective pressure. We show how to compute the posterior distribution of the entropy and parsimony scores under this null model of codon evolution. The method is applied to a set of growth hormone 1 orthologous mRNA sequences and a known exonic splicing elements is detected. The analysis of a set of CORTBP2 orthologous genes reveals a region of several hundred base pairs under strong non-coding selective pressure whose function remains unknown. Conclusion Non-coding functional elements, in particular those involved in post-transcriptional regulation, are likely to be much more prevalent than is currently known. With the numerous genome sequencing projects underway, comparative genomics approaches like that proposed here are likely to become increasingly powerful at detecting such elements.

  1. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... results on DVC show that the LDPCA perfomance implies a loss compared to the conditional entropy, but also that the proposed scheme reduces the DVC bit rate up to 3.9% and improves the rate-distortion (RD) performance of a Transform Domain Wyner-Ziv (TDWZ) video codec....

  2. [Cosmetic surgery among Norwegian women].

    Science.gov (United States)

    von Soest, Tilmann; Kvalem, Ingela Lundin; Roald, Helge Einar; Skolleborg, Knut Chr

    2004-07-01

    There are few data on the frequency of cosmetic surgery among Norwegian women. A random sample of 2000 Norwegian women aged 22 to 55 received a questionnaire on cosmetic surgery, demographic data, self-esteem, and to what extent people around them accepted cosmetic surgery. The response rate was 46% (907 women). Of these, 7.7% indicated that they had undergone cosmetic surgery, while 22.6% wished to do so. Other people's degree of acceptance predicted both the wish to undergo cosmetic surgery and already conducted surgery. Low self-esteem was correlated with a wish to undergo surgery, though women who had done surgery had no lower self-esteem than non-patients. Although the response rate was relatively low, this study gives the first reliable data on the frequency of cosmetic surgery in Norway. The results indicate that other people's degree of acceptance of cosmetic surgery is a predictor of such surgery being chosen.

  3. Repetitive endoscopic sinus surgery failure: a role for radical surgery?

    NARCIS (Netherlands)

    Videler, Ward J. M.; Wreesmann, Volkert B.; van der Meulen, Freerk W.; Knegt, Paul P.; Fokkens, Wytske J.

    2006-01-01

    OBJECTIVES: Endoscopic sinus surgery (ESS) is considered to be the golden standard for surgery in patients with chronic rhinosinusitis and nasal polyposis. However, there is still a small group of patients unresponsive despite repetitive surgery. Radical surgery aimed at reduction of the

  4. Cosmetic surgery: medicolegal considerations.

    Science.gov (United States)

    Piras, Mauro; Delbon, Paola; Conti, Adelaide; Graziano, Vincenzo; Capasso, Emanuele; Niola, Massimo; Bin, Paola

    2016-01-01

    Cosmetic surgery is one of the two branches of plastic surgery. The characteristic of non-necessity of this surgical speciality implies an increased severity in the evaluation of the risk-benefit balance. Therefore, great care must be taken in providing all the information necessary in order to obtain valid consent to the intervention. We analyzed judgments concerning cosmetic surgery found in national legal databases. A document of National Bioethics Committee (CNB) was also analyzed. The receipt of valid, informed consent is of absolute importance not only to legitimise the medical-surgical act, but it also represents the key element in the question concerning the existence of an obligation to achieve certain results/use of certain methods in the cosmetic surgery.

  5. [Pregnancy after bariatric surgery].

    Science.gov (United States)

    Tzur, Tamar; Sheiner, Eyal

    2011-06-01

    Recent research has put the spotlight on two different aspects of pregnancy after bariatric surgery: safety of the mother and fetus, and the procedure's effectiveness in preventing the complications surrounding reproduction and pregnancy often seen in the obese woman. To evaluate the pregnancy outcome foLlowing bariatric surgery. Although there are severaL reports documenting poor perinatal outcomes and late surgical complications during pregnancies subsequent to bariatric surgery, systematic studies have generaLLy not proven such an association. Pregnancy after bariatric surgery appears to be safe, and in general perinatal outcome is better when compared to pregnancies of obese women. Providers should be familiar with potential complications related to postoperative pregnancies and be prepared to provide appropriate interventions such as nutritional supplementation and band adjustment when necessary.

  6. Gastric Sleeve Surgery

    Science.gov (United States)

    ... regular exercise has family members who will provide emotional and practical support (like driving to every doctor's visit or buying healthy food ) Preparing for Gastric Sleeve Surgery Preparing for this ...

  7. Breast augmentation surgery

    Science.gov (United States)

    ... care - open Images Breast lift (mastopexy) - series Breast reduction (mammoplasty) - series Breast augmentation - series References Maxwell GP, Gabriel A. Breast augmentation. In: Neligan PC, ed. Plastic Surgery . 3rd ed. Philadelphia, PA: Elsevier Saunders; 2013: ...

  8. Oophorectomy (Ovary Removal Surgery)

    Science.gov (United States)

    ... symptoms, such as hot flashes and vaginal dryness Depression or anxiety Heart disease Memory problems Decreased sex drive Osteoporosis Premature death Taking low doses of hormone replacement drugs after surgery and until about age ...

  9. Annals of Pediatric Surgery

    African Journals Online (AJOL)

    Annals of Pediatric Surgery. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 10, No 1 (2014) >. Log in or Register to get access to full text downloads.

  10. [Pregnancy after bariatric surgery].

    Science.gov (United States)

    Pepe, Franco; DE Luca, Francesco; Stracquadanio, Mariagrazia; Garraffo, Claudia; Santonocito, Veronica C; Privitera, Agata

    2017-04-01

    Pregnancy after bariatric surgery has some peculiarities related to obesity, type of surgery, amount of weight loss, time elapsed from the surgery and adherence to medical prescriptions. Pregnant woman is at risk of nutritional deficiencies and it is unclear whether there is an increased incidence of intestinal complications during pregnancy after bariatric surgery and whether this kind of complications are more frequent during cesarean section. The fetus is at high risk of prematurity and fetal growth restriction, but they seem not at increased risk of birth defects (DTN) except in individual cases of folic acid deficiency (DTN) or vitamin K defect (similar abnormalities in patients receiving oral anticoagulants). In addition, the incidence of gestational diabetes and hypertension results to be decreased. Other postnatal outcomes from possible epigenetic modifications need to be evaluated in the long-term postnatal follow-up.

  11. Bariatric Surgery Misconceptions

    Science.gov (United States)

    ... quality of life than someone who is normal weight. Bariatric surgery results in highly significant improvement in psychosocial well- ... affecting an individual’s weight, such as psychological issues. Weight gain generally occurs when there is an energy imbalance ...

  12. Deep breathing after surgery

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/patientinstructions/000440.htm Deep breathing after surgery To use the sharing features on ... way to do so is by doing deep breathing exercises. Deep breathing keeps your lungs well-inflated ...

  13. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... and teeth. Surgery can improve chewing, speaking and breathing. While the patient's appearance may be dramatically enhanced ... make the lips meet without straining Chronic mouth breathing Sleep apnea (breathing problems when sleeping, including snoring) ...

  14. Art and Plastic Surgery.

    Science.gov (United States)

    Fernandes, Julio Wilson; Metka, Susanne

    2016-04-01

    The roots of science and art of plastic surgery are very antique. Anatomy, drawing, painting, and sculpting have been very important to the surgery and medicine development over the centuries. Artistic skills besides shape, volume, and lines perception can be a practical aid to the plastic surgeons' daily work. An overview about the interactions between art and plastic surgery is presented, with a few applications to rhinoplasty, cleft lip, and other reconstructive plastic surgeries. This journal requires that authors assign a level of evidence to each article. For a full description of these Evidence-Based Medicine ratings, please refer to the Table of Contents or the online Instructions to Authors www.springer.com/00266.

  15. Blood donation before surgery

    Science.gov (United States)

    ... very safe, some people choose to use a method called autologous blood donation. Autologous blood is blood donated by you, which you later receive if you need a transfusion during or after surgery. You can have blood ...

  16. Nigerian Journal of Surgery

    African Journals Online (AJOL)

    Comparative efficacy of amoxicillin/clavulanic acid and levofloxacin in the reduction of postsurgical sequelae after third molar surgery: A randomized, double blind, clinical trial in a Nigerian University Teaching Hospital.

  17. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... and orthodontist understand that this is a long-term commitment for you and your family, and will ... face, mouth and jaw surgery Contact Us Sitemap Terms of Use Privacy Policy © Copyright AAOMS 2008-2018 ...

  18. Retrosternal thyroid surgery

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/article/007558.htm Retrosternal thyroid surgery To use the sharing features on this page, please enable JavaScript. The thyroid gland is normally located at the front of ...

  19. Surgery - Multiple Languages

    Science.gov (United States)

    ... 简体中文) Expand Section Biopsy - 简体中文 (Chinese, Simplified (Mandarin dialect)) Bilingual PDF Health Information Translations Getting Your Skin Ready for Surgery - 简体中文 (Chinese, ...

  20. Heart Surgery - Multiple Languages

    Science.gov (United States)

    ... Coronary Artery Bypass Surgery - 简体中文 (Chinese, Simplified (Mandarin dialect)) Bilingual PDF Health Information Translations Pacemaker - 简体中文 (Chinese, Simplified (Mandarin dialect)) Bilingual PDF ...

  1. After Surgery - Multiple Languages

    Science.gov (United States)

    ... After Total Joint Replacement - 简体中文 (Chinese, Simplified (Mandarin dialect)) Bilingual PDF Health Information Translations Home Care Instructions After Surgery - 简体中文 (Chinese, Simplified ( ...

  2. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... can also invite bacteria that lead to gum disease. Click here to find out more. Who We ... Injury / Trauma Surgery Obstructive Sleep Apnea (OSA) Oral, Head and Neck Pathology TMJ ...

  3. Robotics in Colorectal Surgery.

    Science.gov (United States)

    Weaver, Allison; Steele, Scott

    2016-01-01

    Over the past few decades, robotic surgery has developed from a futuristic dream to a real, widely used technology. Today, robotic platforms are used for a range of procedures and have added a new facet to the development and implementation of minimally invasive surgeries. The potential advantages are enormous, but the current progress is impeded by high costs and limited technology. However, recent advances in haptic feedback systems and single-port surgical techniques demonstrate a clear role for robotics and are likely to improve surgical outcomes. Although robotic surgeries have become the gold standard for a number of procedures, the research in colorectal surgery is not definitive and more work needs to be done to prove its safety and efficacy to both surgeons and patients.

  4. Blepharoplasty (Eyelid Surgery)

    Science.gov (United States)

    ... lid blepharoplasty is almost always done just for cosmetic reasons. Risks Possible risks of eyelid surgery include: Infection and bleeding Dry, irritated eyes Difficulty closing your eyes or other eyelid problems Noticeable scarring Injury to eye muscles Skin discoloration ...

  5. Alternative Refractive Surgery Procedures

    Science.gov (United States)

    ... the epithelial cells. Once the epithelial flap is created and moved aside, the procedure is the same ... Sites EyeWiki International Society of Refractive Surgery * Required * First Name: * Last Name: Member ID: * Phone Number: * Email: * ...

  6. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... jaw surgery.™ What We Do Who We Are News Videos Contact Find a Surgeon What We Do ... out more. Who We Are Find a Surgeon News Videos Contact Administration of Anesthesia Cleft Lip/Palate ...

  7. LASIK Eye Surgery

    Science.gov (United States)

    ... your eye. Overcorrections may be more difficult to fix than undercorrections. Astigmatism. Astigmatism can be caused by ... back into place. The flap usually heals without stitches. During the surgery, you'll be asked to ...

  8. Orthopaedics in day surgery

    African Journals Online (AJOL)

    emergency patients for a surgical procedure, returning home the same day (1). Ambulatory orthopaedics happens to have double meaning, so in this communication day surgery will be the preferred term. In Kenya the three models of day.

  9. Cosmetic surgery: medicolegal considerations

    Directory of Open Access Journals (Sweden)

    Piras Mauro

    2016-01-01

    Full Text Available Cosmetic surgery is one of the two branches of plastic surgery. The characteristic of non-necessity of this surgical speciality implies an increased severity in the evaluation of the risk-benefit balance. Therefore, great care must be taken in providing all the information necessary in order to obtain valid consent to the intervention. We analyzed judgments concerning cosmetic surgery found in national legal databases. A document of National Bioethics Committee (CNB was also analyzed. Conclusion: The receipt of valid, informed consent is of absolute importance not only to legitimise the medical-surgical act, but it also represents the key element in the question concerning the existence of an obligation to achieve certain results/use of certain methods in the cosmetic surgery.

  10. Breast Reduction Surgery

    Science.gov (United States)

    ... Breast reduction surgery might also help improve your self-image and your ability to participate in physical activities. ... under the breasts Nerve pain Restricted activity Poor self-image related to large breasts Difficulty fitting into bras ...

  11. Annals of Pediatric Surgery

    African Journals Online (AJOL)

    Annals of Pediatric Surgery. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 7, No 1 (2011) >. Log in or Register to get access to full text downloads.

  12. Annals of Pediatric Surgery

    African Journals Online (AJOL)

    Annals of Pediatric Surgery. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 14, No 1 (2018) >. Log in or Register to get access to full text downloads.

  13. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... in face, mouth and jaw surgery.™ What We Do Who We Are News Videos Contact Find a Surgeon What We Do Anesthesia Anesthesia Oral and maxillofacial surgeons are extensively ...

  14. Expectations of Sinus Surgery

    Science.gov (United States)

    ... ARS HOME ANATOMY Nasal Anatomy Sinus Anatomy Nasal Physiology Nasal Endoscopy Skull Base Anatomy Virtual Anatomy Disclosure ... reduce the pressure in your nose. Avoid strenuous exercise for the first 2 weeks after surgery. Also ...

  15. Corrective Jaw Surgery

    Medline Plus

    Full Text Available AAOMS - Oral and maxillofacial surgeons. The experts in face, mouth and jaw surgery.™ What We Do Who ... surgeons surgically treat the soft tissues of the face, mouth and gums to improve function, appearance and ...

  16. Shoulder surgery - discharge

    Science.gov (United States)

    ... repair Shoulder arthroscopy Shoulder CT scan Shoulder MRI scan Shoulder ... by: C. Benjamin Ma, MD, Professor, Chief, Sports Medicine and Shoulder Service, UCSF Department of Orthopaedic Surgery, San Francisco, CA. ...

  17. Endoscopic Sinus Surgery

    Science.gov (United States)

    ... vitamins, herbal remedies, and spices including vitamin E, garlic, ginger, gingko, and ginseng may increase the risk of bleeding. Some patients may be asked to take antibiotics and/or steroids prior to sinus surgery. This ...

  18. Bariatric Surgery for Obesity.

    Science.gov (United States)

    le Roux, Carel W; Heneghan, Helen M

    2018-01-01

    In this review, the authors discuss the indications for and the published outcomes of commonly performed bariatric procedures, including weight loss, perioperative morbidity and mortality, late complications, as well as the impact of bariatric surgery on comorbidities, cardiovascular risk, and mortality. They also briefly discuss the mechanisms by which bariatric/metabolic surgery causes such significant weight loss and health gain. Copyright © 2017 Elsevier Inc. All rights reserved.

  19. Is day surgery safe?

    DEFF Research Database (Denmark)

    Majholm, Birgitte; Engbæk, J; Bartholdy, Jens

    2012-01-01

    Day surgery is expanding in several countries, and it is important to collect information about quality. The aim of this study was to assess morbidity and unanticipated hospital visits 0-30 days post-operatively in a large cohort.......Day surgery is expanding in several countries, and it is important to collect information about quality. The aim of this study was to assess morbidity and unanticipated hospital visits 0-30 days post-operatively in a large cohort....

  20. Robotics in General Surgery

    OpenAIRE

    Wall, James; Chandra, Venita; Krummel, Thomas

    2008-01-01

    In summary, robotics has made a significant contribution to General Surgery in the past 20 years. In its infancy, surgical robotics has seen a shift from early systems that assisted the surgeon to current teleoperator systems that can enhance surgical skills. Telepresence and augmented reality surgery are being realized, while research and development into miniaturization and automation is rapidly moving forward. The future of surgical robotics is bright. Researchers are working to address th...

  1. Plastic surgery pitfalls.

    Science.gov (United States)

    Gorney, M

    1999-01-01

    As a founding member of the physician-owned insurance carrier The Doctors' Company, the author has reviewed many plastic surgery policy claims. In this article, he presents an overview of the plastic surgery procedures that produce the most severe losses. He then offers suggestions on how to proceed with these "medical malpractice favorites." The author discusses potential antitrust traps and legal recourse for plastic surgeons.

  2. Minimally Invasive Abdominal Surgery

    OpenAIRE

    Richardson, William S.; Carter, Kristine M.; Fuhrman, George M.; Bolton, John S.; Bowen, John C.

    2000-01-01

    In the last decade, laparoscopy has been the most innovative surgical movement in general surgery. Minimally invasive surgery performed through a few small incisions, laparoscopy is the standard of care for the treatment of gallbladder disease and the gold standard for the treatment of reflux disease. The indications for a laparoscopic approach to abdominal disease continue to increase, and many diseases may be treated with laparoscopic techniques. At Ochsner, laparoscopic techniques have dem...

  3. Surgery for Acute Pancreatitis

    OpenAIRE

    Navadgi, Suresh; Pandanaboyana, Sanjay; Windsor, John A.

    2015-01-01

    Surgery for acute pancreatitis has undergone significant changes over the last 3 decades. A better understanding of the pathophysiology has contributed to this, but the greatest driver for change has been the rise of less invasive interventions in the fields of laparoscopy, endoscopy and radiology. Surgery has a very limited role in the diagnosis of acute pancreatitis. The most common indication for intervention in acute pancreatitis is for the treatment of complications and most notably the ...

  4. ESCADRE and ICARE code systems

    International Nuclear Information System (INIS)

    Reocreux, M.; Gauvain, J.

    1992-01-01

    The French sever accident code development program is following two parallel approaches: the first one is dealing with ''integral codes'' which are designed for giving immediate engineer answers, the second one is following a more mechanistic way in order to have the capability of detailed analysis of experiments, in order to get a better understanding of the scaling problem and reach a better confidence in plant calculations. In the first approach a complete system has been developed and is being used for practical cases: this is the ESCADRE system. In the second approach, a set of codes dealing first with primary circuit is being developed: a mechanistic core degradation code, ICARE, has been issued and is being coupled with the advanced thermalhydraulic code CATHARE. Fission product codes have been also coupled to CATHARE. The ''integral'' ESCADRE system and the mechanistic ICARE and associated codes are described. Their main characteristics are reviewed and the status of their development and assessment given. Future studies are finally discussed. 36 refs, 4 figs, 1 tab

  5. LFSC - Linac Feedback Simulation Code

    International Nuclear Information System (INIS)

    Ivanov, Valentin; Fermilab

    2008-01-01

    The computer program LFSC ( ) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output

  6. The Flutter Shutter Code Calculator

    Directory of Open Access Journals (Sweden)

    Yohann Tendero

    2015-08-01

    Full Text Available The goal of the flutter shutter is to make uniform motion blur invertible, by a"fluttering" shutter that opens and closes on a sequence of well chosen sub-intervals of the exposure time interval. In other words, the photon flux is modulated according to a well chosen sequence calledflutter shutter code. This article provides a numerical method that computes optimal flutter shutter codes in terms of mean square error (MSE. We assume that the observed objects follow a known (or learned random velocity distribution. In this paper, Gaussian and uniform velocity distributions are considered. Snapshots are also optimized taking the velocity distribution into account. For each velocity distribution, the gain of the optimal flutter shutter code with respectto the optimal snapshot in terms of MSE is computed. This symmetric optimization of theflutter shutter and of the snapshot allows to compare on an equal footing both solutions, i.e. camera designs. Optimal flutter shutter codes are demonstrated to improve substantially the MSE compared to classic (patented or not codes. A numerical method that permits to perform a reverse engineering of any existing (patented or not flutter shutter codes is also describedand an implementation is given. In this case we give the underlying velocity distribution fromwhich a given optimal flutter shutter code comes from. The combination of these two numerical methods furnishes a comprehensive study of the optimization of a flutter shutter that includes a forward and a backward numerical solution.

  7. The ZPIC educational code suite

    Science.gov (United States)

    Calado, R.; Pardal, M.; Ninhos, P.; Helm, A.; Mori, W. B.; Decyk, V. K.; Vieira, J.; Silva, L. O.; Fonseca, R. A.

    2017-10-01

    Particle-in-Cell (PIC) codes are used in almost all areas of plasma physics, such as fusion energy research, plasma accelerators, space physics, ion propulsion, and plasma processing, and many other areas. In this work, we present the ZPIC educational code suite, a new initiative to foster training in plasma physics using computer simulations. Leveraging on our expertise and experience from the development and use of the OSIRIS PIC code, we have developed a suite of 1D/2D fully relativistic electromagnetic PIC codes, as well as 1D electrostatic. These codes are self-contained and require only a standard laptop/desktop computer with a C compiler to be run. The output files are written in a new file format called ZDF that can be easily read using the supplied routines in a number of languages, such as Python, and IDL. The code suite also includes a number of example problems that can be used to illustrate several textbook and advanced plasma mechanisms, including instructions for parameter space exploration. We also invite contributions to this repository of test problems that will be made freely available to the community provided the input files comply with the format defined by the ZPIC team. The code suite is freely available and hosted on GitHub at https://github.com/zambzamb/zpic. Work partially supported by PICKSC.

  8. Continuous-variable topological codes

    Science.gov (United States)

    Morimae, Tomoyuki

    2013-10-01

    Topological code is a stabilizer quantum error correcting code whose generators are local but logical operators are topologically nontrivial and nonlocal. It offers interesting features such as the homological deformations of string operators and anyonic excitations on it. Topological codes are also closely related to the “topological order,” which has been an important concept in condensed-matter physics. In this paper, we consider continuous-variable versions of topological codes, including the toric code by Kitaev [A. Y. Kitaev, Ann. Phys.APNYA60003-491610.1016/S0003-4916(02)00018-0 303, 2 (2003)] with a single type of stabilizer on the checkerboard lattice, and the color code by Bombin and Martin-Delgado [H. Bombin and M. A. Martin-Delgado, Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.97.180501 97, 180501 (2006)]. We show that it is possible to consider continuous-variable analog of these topological codes.

  9. Coded communications with nonideal interleaving

    Science.gov (United States)

    Laufer, Shaul

    1991-02-01

    Burst error channels - a type of block interference channels - feature increasing capacity but decreasing cutoff rate as the memory rate increases. Despite the large capacity, there is degradation in the performance of practical coding schemes when the memory length is excessive. A short-coding error parameter (SCEP) was introduced, which expresses a bound on the average decoding-error probability for codes shorter than the block interference length. The performance of a coded slow frequency-hopping communication channel is analyzed for worst-case partial band jamming and nonideal interleaving, by deriving expressions for the capacity and cutoff rate. The capacity and cutoff rate, respectively, are shown to approach and depart from those of a memoryless channel corresponding to the transmission of a single code letter per hop. For multiaccess communications over a slot-synchronized collision channel without feedback, the channel was considered as a block interference channel with memory length equal to the number of letters transmitted in each slot. The effects of an asymmetrical background noise and a reduced collision error rate were studied, as aspects of real communications. The performance of specific convolutional and Reed-Solomon codes was examined for slow frequency-hopping systems with nonideal interleaving. An upper bound is presented for the performance of a Viterbi decoder for a convolutional code with nonideal interleaving, and a soft decision diversity combining technique is introduced.

  10. Day surgery in Bristol.

    Science.gov (United States)

    Carrington, S

    1993-02-01

    As in the rest of the United Kingdom, day surgery in Bristol is on the increase. In the Bristol Royal Infirmary day surgery unit (DSU) we treat approximately 3,500 patients a year. We have recently opened a second operating theatre. This has shifted the proportion of cases from our general theatres. This has also improved our case mix, less minor surgery under local anaesthetics, to more of the recommended 'basket type' surgery ie hernia repair, varicose vein surgery, excision of breast lumps etc. We have recently introduced an appointment booking system that is progressing. Such changes have to be introduced with good preparation, communication and a lot of diplomacy. I would like to outline the management aspects that help to expand and improve on the service we give, including patient selection and the appointment booking system we have introduced. I will describe how we drew up a policy involving the organisation of operation lists and staff involvement in day surgery management and accountability for patient care from admission through to discharge including our latest care plan. Finally I will outline the methods we have developed for evaluating the care we give.

  11. Innovations in robotic surgery.

    Science.gov (United States)

    Gettman, Matthew; Rivera, Marcelino

    2016-05-01

    Developments in robotic surgery have continued to advance care throughout the field of urology. The purpose of this review is to evaluate innovations in robotic surgery over the past 18 months. The release of the da Vinci Xi system heralded an improvement on the Si system with improved docking, the ability to further manipulate robotic arms without clashing, and an autofocus universal endoscope. Robotic simulation continues to evolve with improvements in simulation training design to include augmented reality in robotic surgical education. Robotic-assisted laparoendoscopic single-site surgery continues to evolve with improvements on technique that allow for tackling previously complex pathologic surgical anatomy including urologic oncology and reconstruction. Last, innovations of new surgical platforms with robotic systems to improve surgeon ergonomics and efficiency in ureteral and renal surgery are being applied in the clinical setting. Urologic surgery continues to be at the forefront of the revolution of robotic surgery with advancements in not only existing technology but also creation of entirely novel surgical systems.

  12. Metabolic surgery: quo vadis?

    Science.gov (United States)

    Ramos-Leví, Ana M; Rubio Herrera, Miguel A

    2014-01-01

    The impact of bariatric surgery beyond its effect on weight loss has entailed a change in the way of regarding it. The term metabolic surgery has become more popular to designate those interventions that aim at resolving diseases that have been traditionally considered as of exclusive medical management, such as type 2 diabetes mellitus (T2D). Recommendations for metabolic surgery have been largely addressed and discussed in worldwide meetings, but no definitive consensus has been reached yet. Rates of diabetes remission after metabolic surgery have been one of the most debated hot topics, with heterogeneity being a current concern. This review aims to identify and clarify controversies regarding metabolic surgery, by focusing on a critical analysis of T2D remission rates achieved with different bariatric procedures, and using different criteria for its definition. Indications for metabolic surgery for patients with T2D who are not morbidly obese are also discussed. Copyright © 2013 SEEN. Published by Elsevier Espana. All rights reserved.

  13. GAMERA - The New Magnetospheric Code

    Science.gov (United States)

    Lyon, J.; Sorathia, K.; Zhang, B.; Merkin, V. G.; Wiltberger, M. J.; Daldorff, L. K. S.

    2017-12-01

    The Lyon-Fedder-Mobarry (LFM) code has been a main-line magnetospheric simulation code for 30 years. The code base, designed in the age of memory to memory vector ma- chines,is still in wide use for science production but needs upgrading to ensure the long term sustainability. In this presentation, we will discuss our recent efforts to update and improve that code base and also highlight some recent results. The new project GAM- ERA, Grid Agnostic MHD for Extended Research Applications, has kept the original design characteristics of the LFM and made significant improvements. The original de- sign included high order numerical differencing with very aggressive limiting, the ability to use arbitrary, but logically rectangular, grids, and maintenance of div B = 0 through the use of the Yee grid. Significant improvements include high-order upwinding and a non-clipping limiter. One other improvement with wider applicability is an im- proved averaging technique for the singularities in polar and spherical grids. The new code adopts a hybrid structure - multi-threaded OpenMP with an overarching MPI layer for large scale and coupled applications. The MPI layer uses a combination of standard MPI and the Global Array Toolkit from PNL to provide a lightweight mechanism for coupling codes together concurrently. The single processor code is highly efficient and can run magnetospheric simulations at the default CCMC resolution faster than real time on a MacBook pro. We have run the new code through the Athena suite of tests, and the results compare favorably with the codes available to the astrophysics community. LFM/GAMERA has been applied to many different situations ranging from the inner and outer heliosphere and magnetospheres of Venus, the Earth, Jupiter and Saturn. We present example results the Earth's magnetosphere including a coupled ring current (RCM), the magnetospheres of Jupiter and Saturn, and the inner heliosphere.

  14. SCALE Code System

    Energy Technology Data Exchange (ETDEWEB)

    Jessee, Matthew Anderson [ORNL

    2016-04-01

    The SCALE Code System is a widely-used modeling and simulation suite for nuclear safety analysis and design that is developed, maintained, tested, and managed by the Reactor and Nuclear Systems Division (RNSD) of Oak Ridge National Laboratory (ORNL). SCALE provides a comprehensive, verified and validated, user-friendly tool set for criticality safety, reactor and lattice physics, radiation shielding, spent fuel and radioactive source term characterization, and sensitivity and uncertainty analysis. Since 1980, regulators, licensees, and research institutions around the world have used SCALE for safety analysis and design. SCALE provides an integrated framework with dozens of computational modules including three deterministic and three Monte Carlo radiation transport solvers that are selected based on the desired solution strategy. SCALE includes current nuclear data libraries and problem-dependent processing tools for continuous-energy (CE) and multigroup (MG) neutronics and coupled neutron-gamma calculations, as well as activation, depletion, and decay calculations. SCALE includes unique capabilities for automated variance reduction for shielding calculations, as well as sensitivity and uncertainty analysis. SCALE’s graphical user interfaces assist with accurate system modeling, visualization of nuclear data, and convenient access to desired results.SCALE 6.2 provides many new capabilities and significant improvements of existing features.New capabilities include:• ENDF/B-VII.1 nuclear data libraries CE and MG with enhanced group structures,• Neutron covariance data based on ENDF/B-VII.1 and supplemented with ORNL data,• Covariance data for fission product yields and decay constants,• Stochastic uncertainty and correlation quantification for any SCALE sequence with Sampler,• Parallel calculations with KENO,• Problem-dependent temperature corrections for CE calculations,• CE shielding and criticality accident alarm system analysis with MAVRIC,• CE

  15. Code-Mixing and Code Switchingin The Process of Learning

    Directory of Open Access Journals (Sweden)

    Diyah Atiek Mustikawati

    2016-09-01

    Full Text Available This study aimed to describe a form of code switching and code mixing specific form found in the teaching and learning activities in the classroom as well as determining factors influencing events stand out that form of code switching and code mixing in question.Form of this research is descriptive qualitative case study which took place in Al Mawaddah Boarding School Ponorogo. Based on the analysis and discussion that has been stated in the previous chapter that the form of code mixing and code switching learning activities in Al Mawaddah Boarding School is in between the use of either language Java language, Arabic, English and Indonesian, on the use of insertion of words, phrases, idioms, use of nouns, adjectives, clauses, and sentences. Code mixing deciding factor in the learning process include: Identification of the role, the desire to explain and interpret, sourced from the original language and its variations, is sourced from a foreign language. While deciding factor in the learning process of code, includes: speakers (O1, partners speakers (O2, the presence of a third person (O3, the topic of conversation, evoke a sense of humour, and just prestige. The significance of this study is to allow readers to see the use of language in a multilingual society, especially in AL Mawaddah boarding school about the rules and characteristics variation in the language of teaching and learning activities in the classroom. Furthermore, the results of this research will provide input to the ustadz / ustadzah and students in developing oral communication skills and the effectiveness of teaching and learning strategies in boarding schools.

  16. Validating accident consequence assessment codes

    International Nuclear Information System (INIS)

    Viktorsson, C.; Kelly, G.N.; Nixon, W.

    1993-01-01

    The main objective of the study was to compare the predictions of participating codes for a range of postulated accidental releases and to assess the significance of any differences observed. Seven codes from various countries participated in the exercise: ARANO (Finland), CONDOR (UK), COSYMA (CEC), LENA (Sweden), MACCS (USA), MECA2 (Spain) and OSCAAR (Japan). They calculated a wide range of consequences, for example: collective doses, early and late health effects, economic costs and the effect of countermeasures on people and agriculture. In each case, the probability distributions predicted by the codes were compared. (author)

  17. State building energy codes status

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-09-01

    This document contains the State Building Energy Codes Status prepared by Pacific Northwest National Laboratory for the U.S. Department of Energy under Contract DE-AC06-76RL01830 and dated September 1996. The U.S. Department of Energy`s Office of Codes and Standards has developed this document to provide an information resource for individuals interested in energy efficiency of buildings and the relevant building energy codes in each state and U.S. territory. This is considered to be an evolving document and will be updated twice a year. In addition, special state updates will be issued as warranted.

  18. LiveCode mobile development

    CERN Document Server

    Lavieri, Edward D

    2013-01-01

    A practical guide written in a tutorial-style, ""LiveCode Mobile Development Hotshot"" walks you step-by-step through 10 individual projects. Every project is divided into sub tasks to make learning more organized and easy to follow along with explanations, diagrams, screenshots, and downloadable material.This book is great for anyone who wants to develop mobile applications using LiveCode. You should be familiar with LiveCode and have access to a smartphone. You are not expected to know how to create graphics or audio clips.

  19. Studies on DANESS Code Modeling

    International Nuclear Information System (INIS)

    Jeong, Chang Joon

    2009-09-01

    The DANESS code modeling study has been performed. DANESS code is widely used in a dynamic fuel cycle analysis. Korea Atomic Energy Research Institute (KAERI) has used the DANESS code for the Korean national nuclear fuel cycle scenario analysis. In this report, the important models such as Energy-demand scenario model, New Reactor Capacity Decision Model, Reactor and Fuel Cycle Facility History Model, and Fuel Cycle Model are investigated. And, some models in the interface module are refined and inserted for Korean nuclear fuel cycle model. Some application studies have also been performed for GNEP cases and for US fast reactor scenarios with various conversion ratios

  20. Linear network error correction coding

    CERN Document Server

    Guang, Xuan

    2014-01-01

    There are two main approaches in the theory of network error correction coding. In this SpringerBrief, the authors summarize some of the most important contributions following the classic approach, which represents messages by sequences?similar to algebraic coding,?and also briefly discuss the main results following the?other approach,?that uses the theory of rank metric codes for network error correction of representing messages by subspaces. This book starts by establishing the basic linear network error correction (LNEC) model and then characterizes two equivalent descriptions. Distances an

  1. Network Coding Fundamentals and Applications

    CERN Document Server

    Medard, Muriel

    2011-01-01

    Network coding is a field of information and coding theory and is a method of attaining maximum information flow in a network. This book is an ideal introduction for the communications and network engineer, working in research and development, who needs an intuitive introduction to network coding and to the increased performance and reliability it offers in many applications. This book is an ideal introduction for the research and development communications and network engineer who needs an intuitive introduction to the theory and wishes to understand the increased performance and reliabil

  2. Writing the Live Coding Book

    DEFF Research Database (Denmark)

    Blackwell, Alan; Cox, Geoff; Lee, Sang Wong

    2016-01-01

    This paper is a speculation on the relationship between coding and writing, and the ways in which technical innovations and capabilities enable us to rethink each in terms of the other. As a case study, we draw on recent experiences of preparing a book on live coding, which integrates a wide range...... of personal, historical, technical and critical perspectives. This book project has been both experimental and reflective, in a manner that allows us to draw on critical understanding of both code and writing, and point to the potential for new practices in the future....

  3. Iterative nonlinear unfolding code: TWOGO

    International Nuclear Information System (INIS)

    Hajnal, F.

    1981-03-01

    a new iterative unfolding code, TWOGO, was developed to analyze Bonner sphere neutron measurements. The code includes two different unfolding schemes which alternate on successive iterations. The iterative process can be terminated either when the ratio of the coefficient of variations in terms of the measured and calculated responses is unity, or when the percentage difference between the measured and evaluated sphere responses is less than the average measurement error. The code was extensively tested with various known spectra and real multisphere neutron measurements which were performed inside the containments of pressurized water reactors

  4. Examination of bariatric surgery Facebook support groups: a content analysis.

    Science.gov (United States)

    Koball, Afton M; Jester, Dylan J; Domoff, Sarah E; Kallies, Kara J; Grothe, Karen B; Kothari, Shanu N

    2017-08-01

    Support following bariatric surgery is vital to ensure long-term postoperative success. Many individuals undergoing bariatric surgery are turning to online modalities, especially the popular social media platform Facebook, to access support groups and pages. Despite evidence suggesting that the majority of patients considering bariatric surgery are utilizing online groups, little is known about the actual content of these groups. The purpose of the present study was to conduct a content analysis of bariatric surgery support groups and pages on Facebook. Online via Facebook, independent academic medical center, United States. Data from bariatric surgery-related Facebook support groups and pages were extracted over a 1-month period in 2016. Salient content themes (e.g., progress posts, depression content, eating behaviors) were coded reliably (all κ> .70). More than 6,800 posts and replies were coded. Results indicated that seeking recommendations (11%), providing information or recommendations (53%), commenting on changes since surgery (19%), and lending support to other members (32%) were the most common types of posts. Content surrounding anxiety, eating behaviors, depression, body image, weight bias, and alcohol was found less frequently. Online bariatric surgery groups can be used to receive support, celebrate physical and emotional accomplishments, provide anecdotal accounts of the "bariatric lifestyle" for preoperative patients, and comment on challenges with mental health and experiences of weight bias. Providers should become acquainted with the content commonly found in online groups and exercise caution in recommending these platforms to information-seeking patients. Copyright © 2017 American Society for Bariatric Surgery. Published by Elsevier Inc. All rights reserved.

  5. Understanding Antegrade Colonic Enema (ACE) Surgery

    Science.gov (United States)

    ... Colonic Enema (ACE) Surgery Antegrade Colonic Enema (ACE) Surgery Antegrade colonic enema surgery (ACE) is a procedure ... Risks / Benefits What is antegrade colonic enema (ACE) surgery? Antegrade colonic enema surgery (ACE) or Malone antegrade ...

  6. Beam-dynamics codes used at DARHT

    Energy Technology Data Exchange (ETDEWEB)

    Ekdahl, Jr., Carl August [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-02-01

    Several beam simulation codes are used to help gain a better understanding of beam dynamics in the DARHT LIAs. The most notable of these fall into the following categories: for beam production – Tricomp Trak orbit tracking code, LSP Particle in cell (PIC) code, for beam transport and acceleration – XTR static envelope and centroid code, LAMDA time-resolved envelope and centroid code, LSP-Slice PIC code, for coasting-beam transport to target – LAMDA time-resolved envelope code, LSP-Slice PIC code. These codes are also being used to inform the design of Scorpius.

  7. Introduction to coding and information theory

    CERN Document Server

    Roman, Steven

    1997-01-01

    This book is intended to introduce coding theory and information theory to undergraduate students of mathematics and computer science. It begins with a review of probablity theory as applied to finite sample spaces and a general introduction to the nature and types of codes. The two subsequent chapters discuss information theory: efficiency of codes, the entropy of information sources, and Shannon's Noiseless Coding Theorem. The remaining three chapters deal with coding theory: communication channels, decoding in the presence of errors, the general theory of linear codes, and such specific codes as Hamming codes, the simplex codes, and many others.

  8. Zip Codes - MDC_WCSZipcode

    Data.gov (United States)

    NSGIC Local Govt | GIS Inventory — The WCSZipcode polygon feature class was created by Miami-Dade Enterprise Technology Department to be used in the WCS batch jobs to assign the actual zip code of...

  9. Allele coding in genomic evaluation

    DEFF Research Database (Denmark)

    Standen, Ismo; Christensen, Ole Fredslund

    2011-01-01

    Genomic data are used in animal breeding to assist genetic evaluation. Several models to estimate genomic breeding values have been studied. In general, two approaches have been used. One approach estimates the marker effects first and then, genomic breeding values are obtained by summing marker...... effects. In the second approach, genomic breeding values are estimated directly using an equivalent model with a genomic relationship matrix. Allele coding is the method chosen to assign values to the regression coefficients in the statistical model. A common allele coding is zero for the homozygous...... this centered allele coding. This study considered effects of different allele coding methods on inference. Both marker-based and equivalent models were considered, and restricted maximum likelihood and Bayesian methods were used in inference. \\paragraph*{Results:} Theoretical derivations showed that parameter...

  10. Description of the COMRADEX code

    International Nuclear Information System (INIS)

    Spangler, G.W.; Boling, M.; Rhoades, W.A.; Willis, C.A.

    1967-01-01

    The COMRADEX Code is discussed briefly and instructions are provided for the use of the code. The subject code was developed for calculating doses from hypothetical power reactor accidents. It permits the user to analyze four successive levels of containment with time-varying leak rates. Filtration, cleanup, fallout and plateout in each containment shell can also be analyzed. The doses calculated include the direct gamma dose from the containment building, the internal doses to as many as 14 organs including the thyroid, bone, lung, etc. from inhaling the contaminated air, and the external gamma doses from the cloud. While further improvements are needed, such as a provision for calculating doses from fallout, rainout and washout, the present code capabilities have a wide range of applicability for reactor accident analysis

  11. Electronic Code of Federal Regulations

    Data.gov (United States)

    National Archives and Records Administration — The Electronic Code of Federal Regulations (e-CFR) is the codification of the general and permanent rules published in the Federal Register by the executive...

  12. The intercomparison of aerosol codes

    International Nuclear Information System (INIS)

    Dunbar, I.H.; Fermandjian, J.; Gauvain, J.

    1988-01-01

    The behavior of aerosols in a reactor containment vessel following a severe accident could be an important determinant of the accident source term to the environment. Various processes result in the deposition of the aerosol onto surfaces within the containment, from where they are much less likely to be released. Some of these processes are very sensitive to particle size, so it is important to model the aerosol growth processes: agglomeration and condensation. A number of computer codes have been written to model growth and deposition processes. They have been tested against each other in a series of code comparison exercises. These exercises have investigated sensitivities to physical and numerical assumptions and have also proved a useful means of quality control for the codes. Various exercises in which code predictions are compared with experimental results are now under way

  13. CRUCIB: an axisymmetric convection code

    International Nuclear Information System (INIS)

    Bertram, L.A.

    1975-03-01

    The CRUCIB code was written in support of an experimental program aimed at measurement of thermal diffusivities of refractory liquids. Precise values of diffusivity are necessary to realistic analysis of reactor safety problems, nuclear waste disposal procedures, and fundamental metal forming processes. The code calculates the axisymmetric transient convective motions produced in a right circular cylindrical crucible, which is surface heated by an annular heat pulse. Emphasis of this report is placed on the input-output options of the CRUCIB code, which are tailored to assess the importance of the convective heat transfer in determining the surface temperature distribution. Use is limited to Prandtl numbers less than unity; larger values can be accommodated by replacement of a single block of the code, if desired. (U.S.)

  14. Allegheny County Zip Code Boundaries

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset demarcates the zip code boundaries that lie within Allegheny County.If viewing this description on the Western Pennsylvania Regional Data Center’s open...

  15. Tracking Code for Microwave Instability

    International Nuclear Information System (INIS)

    Heifets, S.; SLAC

    2006-01-01

    To study microwave instability the tracking code is developed. For bench marking, results are compared with Oide-Yokoya results [1] for broad-band Q = 1 impedance. Results hint to two possible mechanisms determining the threshold of instability

  16. NESTLE: A nodal kinetics code

    International Nuclear Information System (INIS)

    Al-Chalabi, R.M.; Turinsky, P.J.; Faure, F.-X.; Sarsour, H.N.; Engrand, P.R.

    1993-01-01

    The NESTLE nodal kinetics code has been developed for utilization as a stand-alone code for steady-state and transient reactor neutronic analysis and for incorporation into system transient codes, such as TRAC and RELAP. The latter is desirable to increase the simulation fidelity over that obtained from currently employed zero- and one-dimensional neutronic models and now feasible due to advances in computer performance and efficiency of nodal methods. As a stand-alone code, requirements are that it operate on a range of computing platforms from memory-limited personal computers (PCs) to supercomputers with vector processors. This paper summarizes the features of NESTLE that reflect the utilization and requirements just noted

  17. Coding and Billing in Surgical Education: A Systems-Based Practice Education Program.

    Science.gov (United States)

    Ghaderi, Kimeya F; Schmidt, Scott T; Drolet, Brian C

    Despite increased emphasis on systems-based practice through the Accreditation Council for Graduate Medical Education core competencies, few studies have examined what surgical residents know about coding and billing. We sought to create and measure the effectiveness of a multifaceted approach to improving resident knowledge and performance of documenting and coding outpatient encounters. We identified knowledge gaps and barriers to documentation and coding in the outpatient setting. We implemented a series of educational and workflow interventions with a group of 12 residents in a surgical clinic at a tertiary care center. To measure the effect of this program, we compared billing codes for 1 year before intervention (FY2012) to prospectively collected data from the postintervention period (FY2013). All related documentation and coding were verified by study-blinded auditors. Interventions took place at the outpatient surgical clinic at Rhode Island Hospital, a tertiary-care center. A cohort of 12 plastic surgery residents ranging from postgraduate year 2 through postgraduate year 6 participated in the interventional sequence. A total of 1285 patient encounters in the preintervention group were compared with 1170 encounters in the postintervention group. Using evaluation and management codes (E&M) as a measure of documentation and coding, we demonstrated a significant and durable increase in billing with supporting clinical documentation after the intervention. For established patient visits, the monthly average E&M code level increased from 2.14 to 3.05 (p patients the monthly average E&M level increased from 2.61 to 3.19 (p educational and workflow interventions, which improved resident coding and billing of outpatient clinic encounters. Using externally audited coding data, we demonstrate significantly increased rates of higher complexity E&M coding in a stable patient population based on improved documentation and billing awareness by the residents. Copyright

  18. Academic proficiency in children after early congenital heart disease surgery.

    Science.gov (United States)

    Mulkey, Sarah B; Swearingen, Christopher J; Melguizo, Maria S; Reeves, Rachel N; Rowell, Jacob A; Gibson, Neal; Holland, Greg; Bhutta, Adnan T; Kaiser, Jeffrey R

    2014-02-01

    Children with early surgery for congenital heart disease (CHD) are known to have impaired neurodevelopment; their performance on school-age achievement tests and their need for special education remains largely unexplored. The study aimed to determine predictors of academic achievement at school age and placement in special education services among early CHD surgery survivors. Children with CHD surgery at achieving proficiency in literacy and mathematics and the receipt of special education were determined. Two hundred fifty-six children who attended Arkansas public schools and who had surgery as infants were included; 77.7 % had either school-age achievement-test scores or special-education codes of mental retardation or multiple disabilities. Scores on achievement tests for these children were 7-13 % lower than those of Arkansas students (p increase in receipt of special education due to multiple disabilities [odds ratio (OR) 10.66, 95 % confidence interval (CI) 4.23-22.35] or mental retardation (OR 4.96, 95 % CI 2.6-8.64). Surgery after the neonatal period was associated with decreased literacy proficiency, and cardiopulmonary bypass during the first surgery was associated with decreased mathematics proficiency. Children who had early CHD surgery were less proficient on standardized school assessments, and many received special education. This is concerning because achievement-test scores at school age are "real-world" predictors of long-term outcomes.

  19. Reliable Physical Layer Network Coding

    OpenAIRE

    Nazer, Bobak; Gastpar, Michael

    2011-01-01

    When two or more users in a wireless network transmit simultaneously, their electromagnetic signals are linearly superimposed on the channel. As a result, a receiver that is interested in one of these signals sees the others as unwanted interference. This property of the wireless medium is typically viewed as a hindrance to reliable communication over a network. However, using a recently developed coding strategy, interference can in fact be harnessed for network coding. In a wired network, (...

  20. Edge equilibrium code for tokamaks

    Energy Technology Data Exchange (ETDEWEB)

    Li, Xujing [Institute of Computational Mathematics and Scientific/Engineering Computing, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, P.O. Box 2719, Beijing 100190 (China); Zakharov, Leonid E. [Princeton Plasma Physics Laboratory Princeton, MS-27 P.O. Box 451, New Jersey (United States); Drozdov, Vladimir V. [Euratom/CCFE Fusion Association, Culham Science Centre, Abingdon OX14 3DB (United Kingdom)

    2014-01-15

    The edge equilibrium code (EEC) described in this paper is developed for simulations of the near edge plasma using the finite element method. It solves the Grad-Shafranov equation in toroidal coordinate and uses adaptive grids aligned with magnetic field lines. Hermite finite elements are chosen for the numerical scheme. A fast Newton scheme which is the same as implemented in the equilibrium and stability code (ESC) is applied here to adjust the grids.

  1. Interleaver Design for Turbo Coding

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl; Zyablov, Viktor

    1997-01-01

    By a combination of construction and random search based on a careful analysis of the low weight words and the distance properties of the component codes, it is possible to find interleavers for turbo coding with a high minimum distance. We have designed a block interleaver with permutations...... of each row, and found a combination of permutations where a tight upper bound to the minimum distance of the complete turbo scheme is 108....

  2. UNIX code management and distribution

    International Nuclear Information System (INIS)

    Hung, T.; Kunz, P.F.

    1992-09-01

    We describe a code management and distribution system based on tools freely available for the UNIX systems. At the master site, version control is managed with CVS, which is a layer on top of RCS, and distribution is done via NFS mounted file systems. At remote sites, small modifications to CVS provide for interactive transactions with the CVS system at the master site such that remote developers are true peers in the code development process

  3. Parametric Coding of Stereo Audio

    Directory of Open Access Journals (Sweden)

    Erik Schuijers

    2005-06-01

    Full Text Available Parametric-stereo coding is a technique to efficiently code a stereo audio signal as a monaural signal plus a small amount of parametric overhead to describe the stereo image. The stereo properties are analyzed, encoded, and reinstated in a decoder according to spatial psychoacoustical principles. The monaural signal can be encoded using any (conventional audio coder. Experiments show that the parameterized description of spatial properties enables a highly efficient, high-quality stereo audio representation.

  4. Squares of Random Linear Codes

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Cramer, Ronald; Mirandola, Diego

    2015-01-01

    a positive answer, for codes of dimension $k$ and length roughly $\\frac{1}{2}k^2$ or smaller. Moreover, the convergence speed is exponential if the difference $k(k+1)/2-n$ is at least linear in $k$. The proof uses random coding and combinatorial arguments, together with algebraic tools involving the precise...... computation of the number of quadratic forms of a given rank, and the number of their zeros....

  5. Computer-Access-Code Matrices

    Science.gov (United States)

    Collins, Earl R., Jr.

    1990-01-01

    Authorized users respond to changing challenges with changing passwords. Scheme for controlling access to computers defeats eavesdroppers and "hackers". Based on password system of challenge and password or sign, challenge, and countersign correlated with random alphanumeric codes in matrices of two or more dimensions. Codes stored on floppy disk or plug-in card and changed frequently. For even higher security, matrices of four or more dimensions used, just as cubes compounded into hypercubes in concurrent processing.

  6. Verification of ONED90 code

    International Nuclear Information System (INIS)

    Chang, Jong Hwa; Lee, Ki Bog; Zee, Sung Kyun; Lee, Chang Ho

    1993-12-01

    ONED90 developed by KAERI is a 1-dimensional 2-group diffusion theory code. For nuclear design and reactor simulation, the usage of ONED90 encompasses core follow calculation, load follow calculation, plant power control simulation, xenon oscillation simulation and control rod maneuvering, etc. In order to verify the validity of ONED90 code, two well-known benchmark problems are solved by ONED90 shows very similar result to reference solution. (Author) 11 refs., 5 figs., 13 tabs

  7. Training course on code implementation.

    Science.gov (United States)

    Allain, A; De Arango, R

    1992-01-01

    The International Baby Food Action Network (IBFAN) is a coalition of over 40 citizen groups in 70 countries. IBFAN monitors the progress worldwide of the implementation of the International Code of Marketing of Breastmilk Substitutes. The Code is intended to regulate the advertising and promotional techniques used to sell infant formula. The 1991 IBFAN report shows that 75 countries have taken some action to implement the International Code. During 1992, the IBFAN Code Documentation Center in Malaysia conducted 2 training courses to help countries draft legislation to implement and monitor compliance with the International Code. In April, government officials from 19 Asian and African countries attended the first course in Malaysia; the second course was conducted in Spanish in Guatemala and attended by officials from 15 Latin American and Caribbean countries. The resource people included representatives from NGOs in Africa, Asia, Latin America, Europe and North America with experience in Code implementation and monitoring at the national level. The main purpose of each course was to train government officials to use the International Code as a starting point for national legislation to protect breastfeeding. Participants reviewed recent information on lactation management, the advantages of breastfeeding, current trends in breastfeeding and the marketing practices of infant formula manufacturers. The participants studied the terminology contained in the International Code and terminology used by infant formula manufacturers to include breastmilk supplements such as follow-on formulas and cereal-based baby foods. Relevant World Health Assembly resolutions such as the one adopted in 1986 on the need to ban free and low-cost supplies to hospitals were examined. The legal aspects of the current Baby Friendly Hospital Initiative (BFHI) and the progress in the 12 BFHI test countries concerning the elimination of supplies were also examined. International Labor

  8. Robotic Surgery for Thyroid Disease

    OpenAIRE

    Lee, Jandee; Chung, Woong Youn

    2013-01-01

    Robotic surgery is an innovation in thyroid surgery that may compensate for the drawbacks of conventional endoscopic surgery. A surgical robot provides strong advantages, including three-dimensional imaging, motion scaling, tremor elimination, and additional degrees of freedom. We review here recent adaptations, experience and applications of robotics in thyroid surgery. Robotic thyroid surgeries include thyroid lobectomy, total thyroidectomy, central compartment neck dissection, and radical ...

  9. Fuel performance analysis code 'FAIR'

    International Nuclear Information System (INIS)

    Swami Prasad, P.; Dutta, B.K.; Kushwaha, H.S.; Mahajan, S.C.; Kakodkar, A.

    1994-01-01

    For modelling nuclear reactor fuel rod behaviour of water cooled reactors under severe power maneuvering and high burnups, a mechanistic fuel performance analysis code FAIR has been developed. The code incorporates finite element based thermomechanical module, physically based fission gas release module and relevant models for modelling fuel related phenomena, such as, pellet cracking, densification and swelling, radial flux redistribution across the pellet due to the build up of plutonium near the pellet surface, pellet clad mechanical interaction/stress corrosion cracking (PCMI/SSC) failure of sheath etc. The code follows the established principles of fuel rod analysis programmes, such as coupling of thermal and mechanical solutions along with the fission gas release calculations, analysing different axial segments of fuel rod simultaneously, providing means for performing local analysis such as clad ridging analysis etc. The modular nature of the code offers flexibility in affecting modifications easily to the code for modelling MOX fuels and thorium based fuels. For performing analysis of fuel rods subjected to very long power histories within a reasonable amount of time, the code has been parallelised and is commissioned on the ANUPAM parallel processing system developed at Bhabha Atomic Research Centre (BARC). (author). 37 refs

  10. System Code Models and Capabilities

    International Nuclear Information System (INIS)

    Bestion, D.

    2008-01-01

    System thermalhydraulic codes such as RELAP, TRACE, CATHARE or ATHLET are now commonly used for reactor transient simulations. The whole methodology of code development is described including the derivation of the system of equations, the analysis of experimental data to obtain closure relation and the validation process. The characteristics of the models are briefly presented starting with the basic assumptions, the system of equations and the derivation of closure relationships. An extensive work was devoted during the last three decades to the improvement and validation of these models, which resulted in some homogenisation of the different codes although separately developed. The so called two-fluid model is the common basis of these codes and it is shown how it can describe both thermal and mechanical nonequilibrium. A review of some important physical models allows to illustrate the main capabilities and limitations of system codes. Attention is drawn on the role of flow regime maps, on the various methods for developing closure laws, on the role of interfacial area and turbulence on interfacial and wall transfers. More details are given for interfacial friction laws and their relation with drift flux models. Prediction of chocked flow and CFFL is also addressed. Based on some limitations of the present generation of codes, perspectives for future are drawn.

  11. Innovations in Bariatric Surgery.

    Science.gov (United States)

    Zhu, Catherine; Pryor, Aurora D

    2015-11-01

    Surgery has consistently been demonstrated to be the most effective long-term therapy for the treatment of obesity. However, despite excellent outcomes with current procedures, most patients with obesity- and weight-related comorbidities who meet criteria for surgical treatment choose not to pursue surgery out of fear of operative risks and complications or concerns about high costs. Novel minimally invasive procedures and devices may offer alternative solutions for patients who are hesitant to pursue standard surgical approaches. These procedures may be used for primary treatment of obesity, early intervention for patients approaching morbid obesity, temporary management prior to bariatric surgery, or revision of bypass surgery associated with weight regain. Novel bariatric procedures can in general be divided into four categories: endoluminal space-occupying devices, gastric suturing and restrictive devices, absorption-limiting devices, and neural-hormonal modulating devices. Many of these are only approved as short-term interventions, but these devices may be effective for patients desiring low-risk procedures or a transient effect. We will see the expansion of indications and alternatives for metabolic surgery as these techniques gain approval.

  12. Robotic surgery in gynecology.

    Science.gov (United States)

    Alkatout, Ibrahim; Mettler, Liselotte; Maass, Nicolai; Ackermann, Johannes

    2016-01-01

    Robotic surgery is the most dynamic development in the sector of minimally invasive operations currently. It should not be viewed as an alternative to laparoscopy, but as the next step in a process of technological evolution. The advancement of robotic surgery, in terms of the introduction of the Da Vinci Xi, permits the variable use of optical devices in all four trocars. Due to the new geometry of the "patient cart," an operation can be performed in all spatial directions without re-docking. Longer instruments and the markedly narrower mechanical elements of the "patient cart" provide greater flexibility as well as access similar to those of traditional laparoscopy. Currently, robotic surgery is used for a variety of indications in the treatment of benign gynecological diseases as well as malignant ones. Interdisciplinary cooperation and cooperation over large geographical distances have been rendered possible by telemedicine, and will ensure comprehensive patient care in the future by highly specialized surgery teams. In addition, the second operation console and the operation simulator constitute a new dimension in advanced surgical training. The disadvantages of robotic surgery remain the high costs of acquisition and maintenance as well as the laborious training of medical personnel before they are confident with using the technology.

  13. The Proteomic Code: a molecular recognition code for proteins

    Directory of Open Access Journals (Sweden)

    Biro Jan C

    2007-11-01

    Full Text Available Abstract Background The Proteomic Code is a set of rules by which information in genetic material is transferred into the physico-chemical properties of amino acids. It determines how individual amino acids interact with each other during folding and in specific protein-protein interactions. The Proteomic Code is part of the redundant Genetic Code. Review The 25-year-old history of this concept is reviewed from the first independent suggestions by Biro and Mekler, through the works of Blalock, Root-Bernstein, Siemion, Miller and others, followed by the discovery of a Common Periodic Table of Codons and Nucleic Acids in 2003 and culminating in the recent conceptualization of partial complementary coding of interacting amino acids as well as the theory of the nucleic acid-assisted protein folding. Methods and conclusions A novel cloning method for the design and production of specific, high-affinity-reacting proteins (SHARP is presented. This method is based on the concept of proteomic codes and is suitable for large-scale, industrial production of specifically interacting peptides.

  14. The Proteomic Code: a molecular recognition code for proteins.

    Science.gov (United States)

    Biro, Jan C

    2007-11-13

    The Proteomic Code is a set of rules by which information in genetic material is transferred into the physico-chemical properties of amino acids. It determines how individual amino acids interact with each other during folding and in specific protein-protein interactions. The Proteomic Code is part of the redundant Genetic Code. The 25-year-old history of this concept is reviewed from the first independent suggestions by Biro and Mekler, through the works of Blalock, Root-Bernstein, Siemion, Miller and others, followed by the discovery of a Common Periodic Table of Codons and Nucleic Acids in 2003 and culminating in the recent conceptualization of partial complementary coding of interacting amino acids as well as the theory of the nucleic acid-assisted protein folding. A novel cloning method for the design and production of specific, high-affinity-reacting proteins (SHARP) is presented. This method is based on the concept of proteomic codes and is suitable for large-scale, industrial production of specifically interacting peptides.

  15. Tribal Green Building Administrative Code Example

    Science.gov (United States)

    This Tribal Green Building Administrative Code Example can be used as a template for technical code selection (i.e., building, electrical, plumbing, etc.) to be adopted as a comprehensive building code.

  16. KWIC Index of nuclear codes (1975 edition)

    International Nuclear Information System (INIS)

    Akanuma, Makoto; Hirakawa, Takashi

    1976-01-01

    It is a KWIC Index for 254 nuclear codes in the Nuclear Code Abstracts (1975 edition). The classification of nuclear codes and the form of index are the same as those in the Computer Programme Library at Ispra, Italy. (auth.)

  17. SURGERY AND CARDIOVASCULAR SURGERY JOURNALS ANALYSIS.

    Science.gov (United States)

    Schanaider, Alberto

    2015-01-01

    To analyze critically the effectiveness and value of bibliometric indicators in journals of Surgery or Cardiovacular Surgery in the context of the postgraduate programs of CAPES Medicine III. A sampling with 16 academic programs and one professional master of Medicine III, encompassing the General and Digestive System Surgery, Cardiovascular Surgery and Multidisciplinary courses with such contents, was evaluated. Thomson Reuters/ISI (JCR), Elsevier/Scopus (SJR), and also Scielo databases were used. Only in seven programs, the teachers had an average of Qualis A1 articles greater than the others strata. Eleven journals in the surgical area are in stratum A1 (5%) and it reaches 25% in Cardiovascular Surgery. Among the six journals with the largest number of publications Qualis A1 in area Medicine III, five are from non-specific areas. The Acta Cirúrgica Brasileira represented 58% of the publications in the stratum A2. There are some obstacles in the Qualis classification with little uniformity among the Medicine areas I, II and III. A permanent committee should be set to update the Qualis, composed by the three medical areas. It should be considered using other index databases and the unification of the Qualis criteria for journals in medicine. Rating criteria of multi and transdisciplinary journals need to be reviewed. It is essential an institutional financial support for national journals chosen by peers aiming to provide a full computerization process and a professional reviewer of the English language, in order to increase the impact factor. Analisar criticamente a eficácia e valor de indicadores bibliométricos dos periódicos da Cirurgia e Cirurgia Cardiovascular no contexto dos Programas de Pós-Graduação da área Medicina III da CAPES. Foi avaliada uma amostragem com 16 programas acadêmicos e um mestrado profissional da área de Medicina III, compreendendo a Cirurgia Geral e do Aparelho Digestivo, a Cirurgia Cardiovascular e Cursos Multidisciplinares

  18. Viscoless microincision cataract surgery

    Directory of Open Access Journals (Sweden)

    Guy Sallet

    2008-06-01

    Full Text Available Guy SalletDepartment of Opthamology, Aalsters Stedelijk Ziekenhuis, BelgiumAbstract: A cataract surgery technique is described in which incisions, continuous circular capsulorhexis and hydrodissection are made without the use of any viscoelastics. Two small incisions are created through which the different parts of the procedure can take place, maintaining a stable anterior chamber under continuous irrigation. Subsequent bimanual phacoemulsification can be done through these microincisions. At the end of the procedure, an intraocular lens can be inserted through the self-sealing incision under continuous irrigation. 50 consecutive cataract patients were operated on without the use of viscoelastics and then compared with a group of 50 patients who had been helped with viscoelastics. No difference in outcome, endothelial cell count or pachymetry was noted between the two groups. No intraoperative complication was encountered. Viscoless cataract surgery was a safe procedure with potential advantages.Keywords: ophthalmic visco-surgical device, viscoless cataract surgery, microincision

  19. Number of minimum-weight code words in a product code

    Science.gov (United States)

    Miller, R. L.

    1978-01-01

    Consideration is given to the number of minimum-weight code words in a product code. The code is considered as a tensor product of linear codes over a finite field. Complete theorems and proofs are presented.

  20. CITOPP, CITMOD, CITWI, Processing codes for CITATION Code

    International Nuclear Information System (INIS)

    Albarhoum, M.

    2008-01-01

    Description of program or function: CITOPP processes the output file of the CITATION 3-D diffusion code. The program can plot axial, radial and circumferential flux distributions (in cylindrical geometry) in addition to the multiplication factor convergence. The flux distributions can be drawn for each group specified by the program and visualized on the screen. CITMOD processes both the output and the input files of the CITATION 3-D diffusion code. CITMOD can visualize both axial, and radial-angular models of the reactor described by CITATION input/output files. CITWI processes the input file (CIT.INP) of CITATION 3-D diffusion code. CIT.INP is processed to deduce the dimensions of the cell whose cross sections can be representative of the homonym reactor component in section 008 of CIT.INP

  1. Recent advances in laparoscopic surgery.

    Science.gov (United States)

    Lee, Wei-Jei; Chan, Chien-Pin; Wang, Bing-Yen

    2013-02-01

    Laparoscopic surgery has been widely adopted and new technical innovation, procedures and evidence based knowledge are persistently emerging. This review documents recent major advancements in laparoscopic surgery. A PubMed search was made in order to identify recent advances in this field. We reviewed the recent data on randomized trials in this field as well as papers of systematic review. Laparoscopic cholecystectomy is the most frequently performed procedure, followed by laparoscopic bariatric surgery. Although bile duct injuries are relatively uncommon (0.15%-0.6%), intraoperative cholangiography still plays a role in reducing the cost of litigation. Laparoscopic bariatric surgery is the most commonly performed laparoscopic gastrointestinal surgery in the USA, and laparoscopic Nissen fundoplication is the treatment of choice for intractable gastroesophageal reflux disease. Recent randomized trials have demonstrated that laparoscopic gastric and colorectal cancer resection are safe and oncologically correct procedures. Laparoscopic surgery has also been widely developed in hepatic, pancreatic, gynecological and urological surgery. Recently, SILS and robotic surgery have penetrated all specialties of abdominal surgery. However, evidence-based medicine has failed to show major advantages in SILS, and the disadvantage of robotic surgery is the high costs related to purchase and maintenance of technology. Laparoscopic surgery has become well developed in recent decades and is the choice of treatment in abdominal surgery. Recently developed SILS techniques and robotic surgery are promising but their benefits remain to be determined. © 2012 Japan Society for Endoscopic Surgery, Asia Endosurgery Task Force and Wiley Publishing Asia Pty Ltd.

  2. Surgery in Amphibians.

    Science.gov (United States)

    Chai, Norin

    2016-01-01

    Amphibian surgery has been especially described in research. Since the last decade, interest for captive amphibians has increased, so have the indications for surgical intervention. Clinicians should not hesitate to advocate such manipulations. Amphibian surgeries have no overwhelming obstacles. These patients heal well and tolerate blood loss more than higher vertebrates. Most procedures described in reptiles (mostly lizards) can be undertaken in most amphibians if equipment can be matched to the patients' size. In general, the most difficult aspect would be the provision of adequate anesthesia. Copyright © 2016 Elsevier Inc. All rights reserved.

  3. [Simulation in pediatric surgery].

    Science.gov (United States)

    Becmeur, François; Lacreuse, Isabelle; Soler, Luc

    2011-11-01

    Simulation in paediatric surgery is essential for educational, ethical, medicolegal and economic reasons, and is particularly important for rare procedures. There are three different levels of simulation:--simulation of basic techniques in order to learn or improve surgical skills (dissection, intracorporeal knots, etc.);--preparation for surgery using virtual reality, to perfect and test various procedures on a virtual patient, and to determine the best approaches for individual cases;--behavioral simulation underlines the importance of the preoperative check-list and facilitates crisis management (complications, conversion, etc.).

  4. Surgery in Spain.

    Science.gov (United States)

    Trias, M; Targarona, E M; Moral, A; Pera, C

    1998-02-01

    The Iberian Peninsula-the southwestern point of Europe, between the Mediterranean Sea and the Atlantic Ocean-was visited and settled in ancient times by a variety of peoples. Phoenicians, Carthaginians, Celts, Greeks, Romans, Visigoths, and Arabs all left their mark on the peninsula, and their cultures blended together to found, among other things, a rich tradition in medicine and surgery. During the Renaissance, the fluid exchange of technical skills and knowledge with the rest of Europe and the emergence of universities ensured the development of a high level of medical expertise. Today, surgery in Spain is at the forefront of innovations in the field.

  5. Standing equine dental surgery.

    Science.gov (United States)

    Menzies, Robert A; Easley, Jack

    2014-04-01

    Dental surgeries refer to procedures that affect the dental tissues or their supporting structures. With the development of specific, efficacious, and conservative treatments, morbidity risks have been lowered and chances of benefiting the health of equids improved. Advances in quality of sedation, analgesia, and locoregional anesthesia allow a majority of dental surgeries to be performed in the standing patient. This update focuses on an orthograde endodontic technique, a minimally invasive buccotomy technique, with the potential to combine it with a transbuccal screw extraction technique, and revisits the AO pinless external fixator for fractures of the body of the mandible. Copyright © 2014 Elsevier Inc. All rights reserved.

  6. [Bariatric surgery in Denmark.

    DEFF Research Database (Denmark)

    Funch-Jensen, P.; Iversen, M.G.; Kehlet, H.

    2008-01-01

    INTRODUCTION: In 2005 the National Board of Health (NBH) published guidelines on bariatric surgery in Denmark. The aim of the present study was to shed light on the national bariatric effort in relation to these guidelines. MATERIAL AND METHODS: The analysis is based on extraction of the following......, a tendency which was attributable to the activities of one of the private clinics. CONCLUSION: The frequency with which bariatric surgery is performed follows a strongly increasing trend and the procedures are only performed at the public departments selected by the National Board of Health...

  7. Female genital cosmetic surgery.

    Science.gov (United States)

    Shaw, Dorothy; Lefebvre, Guylaine; Bouchard, Celine; Shapiro, Jodi; Blake, Jennifer; Allen, Lisa; Cassell, Krista

    2013-12-01

    To provide Canadian gynaecologists with evidence-based direction for female genital cosmetic surgery in response to increasing requests for, and availability of, vaginal and vulvar surgeries that fall well outside the traditional realm of medically-indicated reconstructions. Published literature was retrieved through searches of PubMed or MEDLINE, CINAHL, and The Cochrane Library in 2011 and 2012 using appropriate controlled vocabulary and key words (female genital cosmetic surgery). Results were restricted to systematic reviews, randomized control trials/controlled clinical trials, and observational studies. There were no date or language restrictions. Searches were updated on a regular basis and incorporated in the guideline to May 2012. Grey (unpublished) literature was identified through searching the websites of health technology assessment and health technology-related agencies, clinical practice guideline collections, clinical trial registries, and national and international medical specialty societies. The quality of evidence in this document was rated using the criteria described in the Report of the Canadian Task Force on Preventive Health Care (Table). Recommendations 1. The obstetrician and gynaecologist should play an important role in helping women to understand their anatomy and to respect individual variations. (III-A) 2. For women who present with requests for vaginal cosmetic procedures, a complete medical, sexual, and gynaecologic history should be obtained and the absence of any major sexual or psychological dysfunction should be ascertained. Any possibility of coercion or exploitation should be ruled out. (III-B) 3. Counselling should be a priority for women requesting female genital cosmetic surgery. Topics should include normal variation and physiological changes over the lifespan, as well as the possibility of unintended consequences of cosmetic surgery to the genital area. The lack of evidence regarding outcomes and the lack of data on the

  8. Epiretinal membrane surgery

    DEFF Research Database (Denmark)

    Hamoudi, Hassan; Correll Christensen, Ulrik; La Cour, Morten

    2017-01-01

    and subsequent pars plana vitrectomy (PPV) (CAT group), (2) PPV and subsequent cataract surgery (VIT group) or (3) phaco-vitrectomy (COMBI group). Examinations were at baseline, one month after each surgery, and at 3 months and 12 months of follow-up. Primary outcome was the RE (the difference between predicted...... and achieved spherical equivalent); secondary outcomes were best-corrected visual acuity (BCVA), and incidence of cystoid macular oedema (CME) defined as >10% increment of central subfield macular thickness (CSMT). Results: Sixty-two eyes were enrolled. The mean RE showed a small myopic shift of -0.36D in all...

  9. On Code Parameters and Coding Vector Representation for Practical RLNC

    DEFF Research Database (Denmark)

    Heide, Janus; Pedersen, Morten Videbæk; Fitzek, Frank

    2011-01-01

    RLNC provides a theoretically efficient method for coding. The drawbacks associated with it are the complexity of the decoding and the overhead resulting from the encoding vector. Increasing the field size and generation size presents a fundamental trade-off between packet-based throughput...... to higher energy consumption. Therefore, the optimal trade-off is system and topology dependent, as it depends on the cost in energy of performing coding operations versus transmitting data. We show that moderate field sizes are the correct choice when trade-offs are considered. The results show that sparse...

  10. Ecoacoustic codes and ecological complexity.

    Science.gov (United States)

    Farina, Almo

    2018-02-01

    Multi-layer communication and sensing network assures the exchange of relevant information between animals and their umwelten, imparting complexity to the ecological systems. Individual soniferous species, the acoustic community, and soundscape are the three main operational levels that comprise this multi-layer network. Acoustic adaptation and acoustic niche are two more important mechanisms that regulate the acoustic performances at the first level while the acoustic community model explains the complexity of the interspecific acoustic network at the second level. Acoustic habitat and ecoacoustic events are two of the most relevant mechanisms that operate at the third level. The exchange of ecoacoustic information on each of these levels is assured by ecoacoustic codes. At the level of individual sonifeorus species, a dyadic intraspecific exchange of information is established between an emitter and a receiver. Ecoacoustic codes discriminate, identify, and label specific signals that pertain to the theme, variation, motif repetition, and intensity of signals. At the acoustic community level, a voluntarily or involuntarily communication is established between networks of interspecific emitters and receivers. Ecoacoustic codes at this level transmit information (e.g., recognition of predators, location of food sources, availability and location of refuges) between one species and the acoustically interacting community and impart cohesion to interspecific assemblages. At the soundscape level, acoustic information is transferred from a mosaic of geophonies, biophonies, and technophonies to different species that discriminate meaningful ecoacoustic events and their temporal dynamics during habitat selection processes. Ecoacoustic codes at this level operate on a limited set of signals from the environmental acoustic dynamic that are heterogeneous in time and space, and these codes are interpreted differently according to the species during habitat selection and the

  11. Requirements of a Better Secure Program Coding

    Directory of Open Access Journals (Sweden)

    Marius POPA

    2012-01-01

    Full Text Available Secure program coding refers to how manage the risks determined by the security breaches because of the program source code. The papers reviews the best practices must be doing during the software development life cycle for secure software assurance, the methods and techniques used for a secure coding assurance, the most known and common vulnerabilities determined by a bad coding process and how the security risks are managed and mitigated. As a tool of the better secure program coding, the code review process is presented, together with objective measures for code review assurance and estimation of the effort for the code improvement.

  12. The WIMS familly of codes

    International Nuclear Information System (INIS)

    Askew, J.

    1981-01-01

    WIMS-D4 is the latest version of the original form of the Winfrith Improved Multigroup Scheme, developed in 1963-5 for lattice calculations on all types of thermal reactor, whether moderated by graphite, heavy or light water. The code, in earlier versions, has been available from the NEA code centre for a number of years in both IBM and CDC dialects of FORTRAN. An important feature of this code was its rapid, accurate deterministic system for treating resonance capture in heavy nuclides, and capable of dealing with both regular pin lattices and with cluster geometries typical of pressure tube and gas cooled reactors. WIMS-E is a compatible code scheme in which each calcultation step is bounded by standard interfaces on disc or tape. The interfaces contain files of information in a standard form, restricted to numbers representing physically meaningful quantities such as cross-sections and fluxes. Restriction of code intercommunication to this channel limits the possible propagation of errors. A module is capable of transforming WIMS-D output into the standard interface form and hence the two schemes can be linked if required. LWR-WIMS was developed in 1970 as a method of calculating LWR reloads for the fuel fabricators BNFL/GUNF. It uses the WIMS-E library and a number of the same module

  13. Comparison of sodium aerosol codes

    International Nuclear Information System (INIS)

    Dunbar, I.H.; Fermandjian, J.; Bunz, H.; L'homme, A.; Lhiaubet, G.; Himeno, Y.; Kirby, C.R.; Mitsutsuka, N.

    1984-01-01

    Although hypothetical fast reactor accidents leading to severe core damage are very low probability events, their consequences are to be assessed. During such accidents, one can envisage the ejection of sodium, mixed with fuel and fission products, from the primary circuit into the secondary containment. Aerosols can be formed either by mechanical dispersion of the molten material or as a result of combustion of the sodium in the mixture. Therefore considerable effort has been devoted to study the different sodium aerosol phenomena. To ensure that the problems of describing the physical behaviour of sodium aerosols were adequately understood, a comparison of the codes being developed to describe their behaviour was undertaken. The comparison consists of two parts. The first is a comparative study of the computer codes used to predict aerosol behaviour during a hypothetical accident. It is a critical review of documentation available. The second part is an exercise in which code users have run their own codes with a pre-arranged input. For the critical comparative review of the computer models, documentation has been made available on the following codes: AEROSIM (UK), MAEROS (USA), HAARM-3 (USA), AEROSOLS/A2 (France), AEROSOLS/B1 (France), and PARDISEKO-IIIb (FRG)

  14. Translation of ARAC computer codes

    International Nuclear Information System (INIS)

    Takahashi, Kunio; Chino, Masamichi; Honma, Toshimitsu; Ishikawa, Hirohiko; Kai, Michiaki; Imai, Kazuhiko; Asai, Kiyoshi

    1982-05-01

    In 1981 we have translated the famous MATHEW, ADPIC and their auxiliary computer codes for CDC 7600 computer version to FACOM M-200's. The codes consist of a part of the Atmospheric Release Advisory Capability (ARAC) system of Lawrence Livermore National Laboratory (LLNL). The MATHEW is a code for three-dimensional wind field analysis. Using observed data, it calculates the mass-consistent wind field of grid cells by a variational method. The ADPIC is a code for three-dimensional concentration prediction of gases and particulates released to the atmosphere. It calculates concentrations in grid cells by the particle-in-cell method. They are written in LLLTRAN, i.e., LLNL Fortran language and are implemented on the CDC 7600 computers of LLNL. In this report, i) the computational methods of the MATHEW/ADPIC and their auxiliary codes, ii) comparisons of the calculated results with our JAERI particle-in-cell, and gaussian plume models, iii) translation procedures from the CDC version to FACOM M-200's, are described. Under the permission of LLNL G-Division, this report is published to keep the track of the translation procedures and to serve our JAERI researchers for comparisons and references of their works. (author)

  15. International assessment of PCA codes

    International Nuclear Information System (INIS)

    Neymotin, L.; Lui, C.; Glynn, J.; Archarya, S.

    1993-11-01

    Over the past three years (1991-1993), an extensive international exercise for intercomparison of a group of six Probabilistic Consequence Assessment (PCA) codes was undertaken. The exercise was jointly sponsored by the Commission of European Communities (CEC) and OECD Nuclear Energy Agency. This exercise was a logical continuation of a similar effort undertaken by OECD/NEA/CSNI in 1979-1981. The PCA codes are currently used by different countries for predicting radiological health and economic consequences of severe accidents at nuclear power plants (and certain types of non-reactor nuclear facilities) resulting in releases of radioactive materials into the atmosphere. The codes participating in the exercise were: ARANO (Finland), CONDOR (UK), COSYMA (CEC), LENA (Sweden), MACCS (USA), and OSCAAR (Japan). In parallel with this inter-code comparison effort, two separate groups performed a similar set of calculations using two of the participating codes, MACCS and COSYMA. Results of the intercode and inter-MACCS comparisons are presented in this paper. The MACCS group included four participants: GREECE: Institute of Nuclear Technology and Radiation Protection, NCSR Demokritos; ITALY: ENEL, ENEA/DISP, and ENEA/NUC-RIN; SPAIN: Universidad Politecnica de Madrid (UPM) and Consejo de Seguridad Nuclear; USA: Brookhaven National Laboratory, US NRC and DOE

  16. Cosmetic Surgery Training in Plastic Surgery Residency Programs

    Directory of Open Access Journals (Sweden)

    Colton H. L. McNichols, MD

    2017-09-01

    Conclusions:. There is an increase in dedicated cosmetic surgery rotations and fewer residents believe they need a fellowship to practice cosmetic surgery. However, the comfort level of performing facial aesthetic and body contouring procedures remains low particularly among independent residents.

  17. A genetic scale of reading frame coding.

    Science.gov (United States)

    Michel, Christian J

    2014-08-21

    The reading frame coding (RFC) of codes (sets) of trinucleotides is a genetic concept which has been largely ignored during the last 50 years. A first objective is the definition of a new and simple statistical parameter PrRFC for analysing the probability (efficiency) of reading frame coding (RFC) of any trinucleotide code. A second objective is to reveal different classes and subclasses of trinucleotide codes involved in reading frame coding: the circular codes of 20 trinucleotides and the bijective genetic codes of 20 trinucleotides coding the 20 amino acids. This approach allows us to propose a genetic scale of reading frame coding which ranges from 1/3 with the random codes (RFC probability identical in the three frames) to 1 with the comma-free circular codes (RFC probability maximal in the reading frame and null in the two shifted frames). This genetic scale shows, in particular, the reading frame coding probabilities of the 12,964,440 circular codes (PrRFC=83.2% in average), the 216 C(3) self-complementary circular codes (PrRFC=84.1% in average) including the code X identified in eukaryotic and prokaryotic genes (PrRFC=81.3%) and the 339,738,624 bijective genetic codes (PrRFC=61.5% in average) including the 52 codes without permuted trinucleotides (PrRFC=66.0% in average). Otherwise, the reading frame coding probabilities of each trinucleotide code coding an amino acid with the universal genetic code are also determined. The four amino acids Gly, Lys, Phe and Pro are coded by codes (not circular) with RFC probabilities equal to 2/3, 1/2, 1/2 and 2/3, respectively. The amino acid Leu is coded by a circular code (not comma-free) with a RFC probability equal to 18/19. The 15 other amino acids are coded by comma-free circular codes, i.e. with RFC probabilities equal to 1. The identification of coding properties in some classes of trinucleotide codes studied here may bring new insights in the origin and evolution of the genetic code. Copyright © 2014 Elsevier

  18. Tree Coding of Bilevel Images

    DEFF Research Database (Denmark)

    Martins, Bo; Forchhammer, Søren

    1998-01-01

    Presently, sequential tree coders are the best general purpose bilevel image coders and the best coders of halftoned images. The current ISO standard, Joint Bilevel Image Experts Group (JBIG), is a good example. A sequential tree coder encodes the data by feeding estimates of conditional...... probabilities to an arithmetic coder. The conditional probabilities are estimated from co-occurrence statistics of past pixels, the statistics are stored in a tree. By organizing the code length calculations properly, a vast number of possible models (trees) reflecting different pixel orderings can...... is one order of magnitude slower than JBIG, obtains excellent and highly robust compression performance. A multipass free tree coding scheme produces superior compression results for all test images. A multipass free template coding scheme produces significantly better results than JBIG for difficult...

  19. ASME Code Efforts Supporting HTGRs

    Energy Technology Data Exchange (ETDEWEB)

    D.K. Morton

    2010-09-01

    In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

  20. ASME Code Efforts Supporting HTGRs

    Energy Technology Data Exchange (ETDEWEB)

    D.K. Morton

    2011-09-01

    In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

  1. ASME Code Efforts Supporting HTGRs

    Energy Technology Data Exchange (ETDEWEB)

    D.K. Morton

    2012-09-01

    In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

  2. MAGNETOHYDRODYNAMIC EQUATIONS (MHD GENERATION CODE

    Directory of Open Access Journals (Sweden)

    Francisco Frutos Alfaro

    2017-04-01

    Full Text Available A program to generate codes in Fortran and C of the full magnetohydrodynamic equations is shown. The program uses the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the magnetohydrodynamic equations to obtain a code that can be used as a seed for a magnetohydrodynamic code for numerical applications. As an example, we present part of the output of our programs for Cartesian coordinates and how to do the discretization.

  3. FLOWTRAN-TF code benchmarking

    Energy Technology Data Exchange (ETDEWEB)

    Flach, G.P. (ed.)

    1990-12-01

    FLOWTRAN-TF is a two-component (air-water), two-phase thermal-hydraulics code designed for performing accident analyses of SRS reactor fuel assemblies during the Emergency Cooling System (ECS) phase of a Double Ended Guillotine Break (DEGB) Loss Of Coolant Accident (LOCA). A description of the code is given by Flach et al. (1990). This report provides benchmarking results for the version of FLOWTRAN-TF used to compute the Recommended K-Reactor Restart ECS Power Limit (Smith et al., 1990a; 1990b). Individual constitutive relations are benchmarked in Sections 2 through 5 while in Sections 6 and 7 integral code benchmarking results are presented. An overall assessment of FLOWTRAN-TF for its intended use in computing the ECS power limit completes the document.

  4. Stakeholders' Opinions on the use of Code Switching/ Code Mixing ...

    African Journals Online (AJOL)

    English-Kiswahili code switching is employedintensively in the classrooms by both teachers and learners, as a coping strategy toattain meaningful learning. This practice is not permitted officially in Tanzaniaeven though it may be the only possible strategy at the moment to move away fromthe difficulty faced in using English ...

  5. Signal Constellations for Multilevel Coded Modulation with Sparse Graph Codes

    NARCIS (Netherlands)

    Cronie, H.S.

    2005-01-01

    A method to combine error-correction coding and spectral efficient modulation for transmission over channels with Gaussian noise is presented. The method of modulation leads to a signal constellation in which the constellation symbols have a nonuniform distribution. This gives a so-called shape gain

  6. Turbo-Gallager Codes: The Emergence of an Intelligent Coding ...

    African Journals Online (AJOL)

    over noisy channels. However it is only in 1993 (about half a century later) that Berrou,. Glavieux and Thitimajshima developed turbo codes and demonstrated performance ... However, computational power at that time could not demon- ... wireless communication standards as well as the IEEE 802.3 (10GBASE-T Ethernet).

  7. Corrective Jaw Surgery

    Medline Plus

    Full Text Available AAOMS - Oral and maxillofacial surgeons. The experts in face, mouth and jaw surgery.™ What We Do Who We Are News Videos Contact Find ... Surgeon What We Do Anesthesia Anesthesia Oral and maxillofacial surgeons are extensively trained to appropriately administer local ...

  8. Aortic valve surgery - open

    Science.gov (United States)

    ... while you are connected to this machine. This machine does the work of your heart while your heart is stopped. If your aortic valve is too damaged, you will need a new valve. This is called replacement surgery. Your surgeon will remove your aortic valve ...

  9. Plastic Surgery: Tackling Misconceptions

    African Journals Online (AJOL)

    Misconceptions. Dear Sir,. Denadai and Raposo-Amaral have presented an interesting account of undergraduate plastic surgery education and the challenges associated with it.[1] They have outlined a comprehensive program to ensure that medical students get a much deeper understanding of the activities of plastic ...

  10. Gastric bypass surgery

    Science.gov (United States)

    ... Buchwald H, ed. Buchwald's Atlas of Metabolic and Bariatric Surgical Techniques and Procedures . Philadelphia, PA: Elsevier Saunders; 2012:chap 5. Halperin F, Ding SA, Simonson DC, et al. Roux-en-Y gastric bypass surgery or lifestyle with intensive medical management in patients ...

  11. Heart bypass surgery

    Science.gov (United States)

    ... from the hospital. The day before your surgery: Shower and shampoo well. You may be asked to wash your whole body below your neck with a special soap. Scrub your chest 2 or 3 times with this soap. Make sure that you dry ...

  12. Mitral valve surgery - open

    Science.gov (United States)

    ... return. The day before your surgery, take a shower and wash your hair. You may need to wash your whole body below your neck with a special soap. Scrub your chest 2 or 3 times with this soap. You also may need to ...

  13. Ghrelin and Metabolic Surgery

    Directory of Open Access Journals (Sweden)

    Dimitrios J. Pournaras

    2010-01-01

    Full Text Available Metabolic surgery is the most effective treatment for morbid obesity. Ghrelin has been implicated to play a role in the success of these procedures. Furthermore, these operations have been used to study the gut-brain axis. This article explores this interaction, reviewing the available data on changes in ghrelin levels after different surgical procedures.

  14. Bariatric Surgery and Hypertension.

    Science.gov (United States)

    Owen, Jonathan G; Yazdi, Farshid; Reisin, Efrain

    2017-12-08

    Obesity continues to increase in prevalence worldwide. Hypertension has long been associated with obesity, and weight loss continues to be a first-line therapy in the treatment of hypertension. Lifestyle modification and pharmacologic therapy, however, often meet with treatment failure. Bariatric surgery continues to be the most successful approach to sustained weight loss. This review focuses on the underlying physiologic mechanisms of obesity-hypertension, and the impact of bariatric surgery on the treatment of hypertension. Current available literature on the physiologic mechanisms of obesity-hypertension, and the major trials, meta-analyses and systematic reviews of the impact of bariatric surgery procedures on hypertension are reviewed. Evidence suggests significant improvement in obesity-hypertension in patients who undergo surgical weight-reduction procedures. Malabsorptive techniques such as the Roux-en-Y gastric bypass or surgical resection techniques such as laparoscopic sleeve gastrectomy appear to offer superior results in regards to hypertension control over restrictive techniques such as Gastric Banding. Though long-term control of hypertension following surgery remains a concern, available follow-up post-operative data of up to 10 years suggests a sustained, if lessened, effect on hypertension control over time. © American Journal of Hypertension, Ltd 2017. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  15. Robotics in gynecologic surgery.

    Science.gov (United States)

    Frick, A C; Falcone, T

    2009-06-01

    Robotic surgery has evolved from an investigational surgical approach to a clinically useful adjunct in multiple surgical specialties over the past decade. Advocates of robotic-assisted gynecologic surgery revere the system's wristed instrumentation, ergonomic positioning, and three-dimensional high-definition vision system as significant improvements over laparoscopic equipment's four degrees of freedom and two-dimensional laparoscope that demand the surgeon stand throughout a procedure. The cost, lack of haptic feedback, and the bulky size of the equipment make robotics less attractive to others. Studies evaluating outcomes in robotic-assisted gynecologic surgery are limited. Multiple small retrospective studies demonstrate the safety and feasibility of robotic hysterectomy. With increased surgeon experience, operative times are similar to, or shorter than, laparoscopic cases. Robotic assistance can facilitate suturing in laparoscopic myomectomies, and is associated with decreased blood loss and a shorter hospital stay, although may require longer operative times. Robotic assistance has also been applied to multiple procedures in the subspecialties of infertility, urogynecology and gynecologic oncology with good success and relatively low morbidity. However, further research is warranted to better evaluate the relative benefits and costs of robotic assisted gynecologic surgery.

  16. Scoliosis surgery - child

    Science.gov (United States)

    ... from getting worse. But, when they no longer work, the child's health care provider will recommend surgery. There are ... urinate. Your child's stomach and bowels may not work for a few days ... Your child may need to receive fluids and nutrition through ...

  17. Nigerian Journal of Surgery

    African Journals Online (AJOL)

    The Nigerian Journal of Surgery publishes original articles, special articles (by invitation), reviews, case reports, correspondences and notes. Materials cited for publication will include scientific research papers read at the meetings of the Nigerian Surgical Research Society, and of the Association of Surgeons of Nigeria and ...

  18. Annals of Pediatric Surgery

    African Journals Online (AJOL)

    The Annals of Pediatric Surgery is striving to fill an important niche that provides focus to clinical care, technical innovation and clinical research. ... Nonconventionalmesocaval prosthetic shunt interposition in refractory case with portal hypertension in a 10-kg female infant · EMAIL FREE FULL TEXT EMAIL FREE FULL ...

  19. Surgery for adrenal tumors

    International Nuclear Information System (INIS)

    Salamah, S.M.

    2002-01-01

    Objective: To analyze the presentation, localization, pathology, surgical management and outcome of surgery for adrenal gland tumors. Design: Prospective clinico epidemiological study. Place and Duration of Study: The study was conducted at the Department of General Surgery, University Unit, Riyadh medical Complex Kingdom of Saudi Rabia from June, 1991 to may, 2001. Subjects and Methods: A total of 21 cases with adrenal tumors were studied for demographic data, clinical presentation, diagnostic workup, localization, surgical management, pathology and outcome. The outcome of these patients was followed prospectively. Results: The study included 12 female and 9 male patients. The mean age at surgery was 36.7 years. Hypertension (69.%) was the commonest presentation in hypersecretory functional tumors. The localization accuracy for ultrasonography, computerized tomography, MRI and MIBG scan was 95.2%, 98.3% 87.8% and 83.6% respectively. Pheochromocytoma was the most common adrenal pathology observed in 14 (66.6%) cases. The overall morbidity was 19% with no hospital mortality. Complete follow-up of available 19 patients (90.5 %) revealed no tumor recurrence and persistent hypertension in 14.3% cases. Conclusion: surgery on adrenal glands is safe in experienced hands and is recommended in institutes with all backup facilities. (author)

  20. COMPUTERS IN SURGERY

    African Journals Online (AJOL)

    BODE

    to keep abreast of the rapidly changing trends in surgical fields. What are the legal implications of on- line referrals, treatment via telemedicine, surgical decisions following video-conferencing? In robot- assisted remote surgery and telemedicine, is the consulted or remote doctor bound by the licensing regulations of the ...