WorldWideScience

Sample records for surgery codes 1983-1997

  1. Ethical and educational considerations in coding hand surgeries.

    Science.gov (United States)

    Lifchez, Scott D; Leinberry, Charles F; Rivlin, Michael; Blazar, Philip E

    2014-07-01

    To assess treatment coding knowledge and practices among residents, fellows, and attending hand surgeons. Through the use of 6 hypothetical cases, we developed a coding survey to assess coding knowledge and practices. We e-mailed this survey to residents, fellows, and attending hand surgeons. In additionally, we asked 2 professional coders to code these cases. A total of 71 participants completed the survey out of 134 people to whom the survey was sent (response rate = 53%). We observed marked disparity in codes chosen among surgeons and among professional coders. Results of this study indicate that coding knowledge, not just its ethical application, had a major role in coding procedures accurately. Surgical coding is an essential part of a hand surgeon's practice and is not well learned during residency or fellowship. Whereas ethical issues such as deliberate unbundling and upcoding may have a role in inaccurate coding, lack of knowledge among surgeons and coders has a major role as well. Coding has a critical role in every hand surgery practice. Inconstancies among those polled in this study reveal that an increase in education on coding during training and improvement in the clarity and consistency of the Current Procedural Terminology coding rules themselves are needed. Copyright © 2014 American Society for Surgery of the Hand. Published by Elsevier Inc. All rights reserved.

  2. Audit of accuracy of clinical coding in oral surgery.

    Science.gov (United States)

    Naran, S; Hudovsky, A; Antscherl, J; Howells, S; Nouraei, S A R

    2014-10-01

    We aimed to study the accuracy of clinical coding within oral surgery and to identify ways in which it can be improved. We undertook did a multidisciplinary audit of a sample of 646 day case patients who had had oral surgery procedures between 2011 and 2012. We compared the codes given with their case notes and amended any discrepancies. The accuracy of coding was assessed for primary and secondary diagnoses and procedures, and for health resource groupings (HRGs). The financial impact of coding Subjectivity, Variability and Error (SVE) was assessed by reference to national tariffs. The audit resulted in 122 (19%) changes to primary diagnoses. The codes for primary procedures changed in 224 (35%) cases; 310 (48%) morbidities and complications had been missed, and 266 (41%) secondary procedures had been missed or were incorrect. This led to at least one change of coding in 496 (77%) patients, and to the HRG changes in 348 (54%) patients. The financial impact of this was £114 in lost revenue per patient. There is a high incidence of coding errors in oral surgery because of the large number of day cases, a lack of awareness by clinicians of coding issues, and because clinical coders are not always familiar with the large number of highly specialised abbreviations used. Accuracy of coding can be improved through the use of a well-designed proforma, and standards can be maintained by the use of an ongoing data quality assurance programme. Copyright © 2014. Published by Elsevier Ltd.

  3. Perceptual coding of stereo endoscopy video for minimally invasive surgery

    Science.gov (United States)

    Bartoli, Guido; Menegaz, Gloria; Yang, Guang Zhong

    2007-03-01

    In this paper, we propose a compression scheme that is tailored for stereo-laparoscope sequences. The inter-frame correlation is modeled by the deformation field obtained by elastic registration between two subsequent frames and exploited for prediction of the left sequence. The right sequence is lossy encoded by prediction from the corresponding left images. Wavelet-based coding is applied to both the deformation vector fields and residual images. The resulting system supports spatio temporal scalability, while providing lossless performance. The implementation of the wavelet transform by integer lifting ensures a low computational complexity, thus reducing the required run-time memory allocation and on line implementation. Extensive psychovisual tests were performed for system validation and characterization with respect to the MPEG4 standard for video coding. Results are very encouraging: the PSVC system features the functionalities making it suitable for PACS while providing a good trade-off between usability and performance in lossy mode.

  4. Emergency readmissions to paediatric surgery and urology: The impact of inappropriate coding.

    Science.gov (United States)

    Peeraully, R; Henderson, K; Davies, B

    2016-04-01

    Introduction In England, emergency readmissions within 30 days of hospital discharge after an elective admission are not reimbursed if they do not meet Payment by Results (PbR) exclusion criteria. However, coding errors could inappropriately penalise hospitals. We aimed to assess the accuracy of coding for emergency readmissions. Methods Emergency readmissions attributed to paediatric surgery and urology between September 2012 and August 2014 to our tertiary referral centre were retrospectively reviewed. Payment by Results (PbR) coding data were obtained from the hospital's Family Health Directorate. Clinical details were obtained from contemporaneous records. All readmissions were categorised as appropriately coded (postoperative or nonoperative) or inappropriately coded (planned surgical readmission, unrelated surgical admission, unrelated medical admission or coding error). Results Over the 24-month period, 241 patients were coded as 30-day readmissions, with 143 (59%) meeting the PbR exclusion criteria. Of the remaining 98 (41%) patients, 24 (25%) were inappropriately coded as emergency readmissions. These readmissions resulted in 352 extra bed days, of which 117 (33%) were attributable to inappropriately coded cases. Conclusions One-quarter of non-excluded emergency readmissions were inappropriately coded, accounting for one-third of additional bed days. As a stay on a paediatric ward costs up to £500 a day, the potential cost to our institution due to inappropriate readmission coding was over £50,000. Diagnoses and the reason for admission for each care episode should be accurately documented and coded, and readmission data should be reviewed at a senior clinician level.

  5. Evaluating Coding Accuracy in General Surgery Residents' Accreditation Council for Graduate Medical Education Procedural Case Logs.

    Science.gov (United States)

    Balla, Fadi; Garwe, Tabitha; Motghare, Prasenjeet; Stamile, Tessa; Kim, Jennifer; Mahnken, Heidi; Lees, Jason

    .0043). The survey response rate was 100%. Survey results indicated that inability to find the precise code within the ACGME search interface and unfamiliarity with available CPT codes were by far the most common perceived barriers to accuracy. Survey results also indicated that most residents (74%) believe that they code accurately most of the time and agree that their case log would accurately represent their operative experience (66.6%). This is the first study to evaluate correctness of residents' ACGME case logs in general surgery. The degree of inaccuracy found here necessitates further investigation into the etiology of these discrepancies. Instruction on coding practices should also benefit the residents after graduation. Optimizing communication among attendings and residents, improving ACGME coding search interface, and implementing consistent coding practices could improve accuracy giving a more realistic view of residents' operative experience. Published by Elsevier Inc.

  6. Reconciliation of international administrative coding systems for comparison of colorectal surgery outcome.

    Science.gov (United States)

    Munasinghe, A; Chang, D; Mamidanna, R; Middleton, S; Joy, M; Penninckx, F; Darzi, A; Livingston, E; Faiz, O

    2014-07-01

    Significant variation in colorectal surgery outcomes exists between different countries. Better understanding of the sources of variable outcomes using administrative data requires alignment of differing clinical coding systems. We aimed to map similar diagnoses and procedures across administrative coding systems used in different countries. Administrative data were collected in a central database as part of the Global Comparators (GC) Project. In order to unify these data, a systematic translation of diagnostic and procedural codes was undertaken. Codes for colorectal diagnoses, resections, operative complications and reoperative interventions were mapped across the respective national healthcare administrative coding systems. Discharge data from January 2006 to June 2011 for patients who had undergone colorectal surgical resections were analysed to generate risk-adjusted models for mortality, length of stay, readmissions and reoperations. In all, 52 544 case records were collated from 31 institutions in five countries. Mapping of all the coding systems was achieved so that diagnosis and procedures from the participant countries could be compared. Using the aligned coding systems to develop risk-adjusted models, the 30-day mortality rate for colorectal surgery was 3.95% (95% CI 0.86-7.54), the 30-day readmission rate was 11.05% (5.67-17.61), the 28-day reoperation rate was 6.13% (3.68-9.66) and the mean length of stay was 14 (7.65-46.76) days. The linkage of international hospital administrative data that we developed enabled comparison of documented surgical outcomes between countries. This methodology may facilitate international benchmarking. Colorectal Disease © 2014 The Association of Coloproctology of Great Britain and Ireland.

  7. Indications for spine surgery: validation of an administrative coding algorithm to classify degenerative diagnoses

    Science.gov (United States)

    Lurie, Jon D.; Tosteson, Anna N.A.; Deyo, Richard A.; Tosteson, Tor; Weinstein, James; Mirza, Sohail K.

    2014-01-01

    Study Design Retrospective analysis of Medicare claims linked to a multi-center clinical trial. Objective The Spine Patient Outcomes Research Trial (SPORT) provided a unique opportunity to examine the validity of a claims-based algorithm for grouping patients by surgical indication. SPORT enrolled patients for lumbar disc herniation, spinal stenosis, and degenerative spondylolisthesis. We compared the surgical indication derived from Medicare claims to that provided by SPORT surgeons, the “gold standard”. Summary of Background Data Administrative data are frequently used to report procedure rates, surgical safety outcomes, and costs in the management of spinal surgery. However, the accuracy of using diagnosis codes to classify patients by surgical indication has not been examined. Methods Medicare claims were link to beneficiaries enrolled in SPORT. The sensitivity and specificity of three claims-based approaches to group patients based on surgical indications were examined: 1) using the first listed diagnosis; 2) using all diagnoses independently; and 3) using a diagnosis hierarchy based on the support for fusion surgery. Results Medicare claims were obtained from 376 SPORT participants, including 21 with disc herniation, 183 with spinal stenosis, and 172 with degenerative spondylolisthesis. The hierarchical coding algorithm was the most accurate approach for classifying patients by surgical indication, with sensitivities of 76.2%, 88.1%, and 84.3% for disc herniation, spinal stenosis, and degenerative spondylolisthesis cohorts, respectively. The specificity was 98.3% for disc herniation, 83.2% for spinal stenosis, and 90.7% for degenerative spondylolisthesis. Misclassifications were primarily due to codes attributing more complex pathology to the case. Conclusion Standardized approaches for using claims data to accurately group patients by surgical indications has widespread interest. We found that a hierarchical coding approach correctly classified over 90

  8. Chiari malformation Type I surgery in pediatric patients. Part 1: validation of an ICD-9-CM code search algorithm.

    Science.gov (United States)

    Ladner, Travis R; Greenberg, Jacob K; Guerrero, Nicole; Olsen, Margaret A; Shannon, Chevis N; Yarbrough, Chester K; Piccirillo, Jay F; Anderson, Richard C E; Feldstein, Neil A; Wellons, John C; Smyth, Matthew D; Park, Tae Sung; Limbrick, David D

    2016-05-01

    OBJECTIVE Administrative billing data may facilitate large-scale assessments of treatment outcomes for pediatric Chiari malformation Type I (CM-I). Validated International Classification of Diseases, Ninth Revision, Clinical Modification (ICD-9-CM) code algorithms for identifying CM-I surgery are critical prerequisites for such studies but are currently only available for adults. The objective of this study was to validate two ICD-9-CM code algorithms using hospital billing data to identify pediatric patients undergoing CM-I decompression surgery. METHODS The authors retrospectively analyzed the validity of two ICD-9-CM code algorithms for identifying pediatric CM-I decompression surgery performed at 3 academic medical centers between 2001 and 2013. Algorithm 1 included any discharge diagnosis code of 348.4 (CM-I), as well as a procedure code of 01.24 (cranial decompression) or 03.09 (spinal decompression or laminectomy). Algorithm 2 restricted this group to the subset of patients with a primary discharge diagnosis of 348.4. The positive predictive value (PPV) and sensitivity of each algorithm were calculated. RESULTS Among 625 first-time admissions identified by Algorithm 1, the overall PPV for CM-I decompression was 92%. Among the 581 admissions identified by Algorithm 2, the PPV was 97%. The PPV for Algorithm 1 was lower in one center (84%) compared with the other centers (93%-94%), whereas the PPV of Algorithm 2 remained high (96%-98%) across all subgroups. The sensitivity of Algorithms 1 (91%) and 2 (89%) was very good and remained so across subgroups (82%-97%). CONCLUSIONS An ICD-9-CM algorithm requiring a primary diagnosis of CM-I has excellent PPV and very good sensitivity for identifying CM-I decompression surgery in pediatric patients. These results establish a basis for utilizing administrative billing data to assess pediatric CM-I treatment outcomes.

  9. A Study of Clinical Coding Accuracy in Surgery: Implications for the Use of Administrative Big Data for Outcomes Management.

    Science.gov (United States)

    Nouraei, S A R; Hudovsky, A; Frampton, A E; Mufti, U; White, N B; Wathen, C G; Sandhu, G S; Darzi, A

    2015-06-01

    Clinical coding is the translation of clinical activity into a coded language. Coded data drive hospital reimbursement and are used for audit and research, and benchmarking and outcomes management purposes. We undertook a 2-center audit of coding accuracy across surgery. Clinician-auditor multidisciplinary teams reviewed the coding of 30,127 patients and assessed accuracy at primary and secondary diagnosis and procedure levels, morbidity level, complications assignment, and financial variance. Postaudit data of a randomly selected sample of 400 cases were reaudited by an independent team. At least 1 coding change occurred in 15,402 patients (51%). There were 3911 (13%) and 3620 (12%) changes to primary diagnoses and procedures, respectively. In 5183 (17%) patients, the Health Resource Grouping changed, resulting in income variance of £3,974,544 (+6.2%). The morbidity level changed in 2116 (7%) patients (P data are a key engine for knowledge-driven health care provision. They are used, increasingly at individual surgeon level, to benchmark performance. Surgical clinical coding is prone to subjectivity, variability, and error (SVE). Having a specialty-by-specialty understanding of the nature and clinical significance of informatics variability and adopting strategies to reduce it, are necessary to allow accurate assumptions and informed decisions to be made concerning the scope and clinical applicability of administrative data in surgical outcomes improvement.

  10. Accuracy of clinical coding for procedures in oral and maxillofacial surgery.

    Science.gov (United States)

    Khurram, S A; Warner, C; Henry, A M; Kumar, A; Mohammed-Ali, R I

    2016-10-01

    Clinical coding has important financial implications, and discrepancies in the assigned codes can directly affect the funding of a department and hospital. Over the last few years, numerous oversights have been noticed in the coding of oral and maxillofacial (OMF) procedures. To establish the accuracy and completeness of coding, we retrospectively analysed the records of patients during two time periods: March to May 2009 (324 patients), and January to March 2014 (200 patients). Two investigators independently collected and analysed the data to ensure accuracy and remove bias. A large proportion of operations were not assigned all the relevant codes, and only 32% - 33% were correct in both cycles. To our knowledge, this is the first reported audit of clinical coding in OMFS, and it highlights serious shortcomings that have substantial financial implications. Better input by the surgical team and improved communication between the surgical and coding departments will improve accuracy. Copyright © 2016 The British Association of Oral and Maxillofacial Surgeons. Published by Elsevier Ltd. All rights reserved.

  11. Foot Surgery

    Science.gov (United States)

    ... coding trends along with compliance guidelines and practice marketing materials, APMA has you covered whether you are ... crutches after the surgery or in a cast. Fusions: Fusions are usually performed to treat arthritic or ...

  12. Code Cactus; Code Cactus

    Energy Technology Data Exchange (ETDEWEB)

    Fajeau, M; Nguyen, L T; Saunier, J [Commissariat a l' Energie Atomique, Centre d' Etudes Nucleaires de Saclay, 91 - Gif-sur-Yvette (France)

    1966-09-01

    This code handles the following problems: -1) Analysis of thermal experiments on a water loop at high or low pressure; steady state or transient behavior; -2) Analysis of thermal and hydrodynamic behavior of water-cooled and moderated reactors, at either high or low pressure, with boiling permitted; fuel elements are assumed to be flat plates: - Flowrate in parallel channels coupled or not by conduction across plates, with conditions of pressure drops or flowrate, variable or not with respect to time is given; the power can be coupled to reactor kinetics calculation or supplied by the code user. The code, containing a schematic representation of safety rod behavior, is a one dimensional, multi-channel code, and has as its complement (FLID), a one-channel, two-dimensional code. (authors) [French] Ce code permet de traiter les problemes ci-dessous: 1. Depouillement d'essais thermiques sur boucle a eau, haute ou basse pression, en regime permanent ou transitoire; 2. Etudes thermiques et hydrauliques de reacteurs a eau, a plaques, a haute ou basse pression, ebullition permise: - repartition entre canaux paralleles, couples on non par conduction a travers plaques, pour des conditions de debit ou de pertes de charge imposees, variables ou non dans le temps; - la puissance peut etre couplee a la neutronique et une representation schematique des actions de securite est prevue. Ce code (Cactus) a une dimension d'espace et plusieurs canaux, a pour complement Flid qui traite l'etude d'un seul canal a deux dimensions. (auteurs)

  13. MERS Coronavirus Neutralizing Antibodies in Camels, Eastern Africa, 1983-1997

    NARCIS (Netherlands)

    Müller, Marcel A; Corman, Victor Max; Jores, Joerg; Meyer, Benjamin; Younan, Mario; Liljander, Anne; Bosch, Berend-Jan; Lattwein, Erik; Hilali, Mosaad; Musa, Bakri E; Bornstein, Set; Drosten, Christian

    2014-01-01

    To analyze the distribution of Middle East respiratory syndrome coronavirus (MERS-CoV)-seropositive dromedary camels in eastern Africa, we tested 189 archived serum samples accumulated during the past 30 years. We identified MERS-CoV neutralizing antibodies in 81.0% of samples from the main

  14. Uncommon combinations of ICD10-PCS or ICD-9-CM operative procedure codes account for most inpatient surgery at half of Texas hospitals.

    Science.gov (United States)

    O'Neill, Liam; Dexter, Franklin; Park, Sae-Hwan; Epstein, Richard H

    2017-09-01

    Recently, there has been interest in activity-based cost accounting for inpatient surgical procedures to facilitate "value based" analyses. Research 10-20years ago, performed using data from 3 large teaching hospitals, found that activity-based cost accounting was practical and useful for modeling surgeons and subspecialties, but inaccurate for individual procedures. We hypothesized that these older results would apply to hundreds of hospitals, currently evaluable using administrative databases. Observational study. State of Texas hospital discharge abstract data for 1st quarter of 2016, 4th quarter of 2015, 1st quarter of 2015, and 4th quarter of 2014. Discharged from an acute care hospital in Texas with at least 1 major therapeutic ("operative") procedure. Counts of discharges for each procedure or combination of procedures, classified by ICD-10-PCS or ICD-9-CM. At the average hospital, most surgical discharges were for procedures performed at most once a month at the hospital (54%, 95% confidence interval [CI] 51% to 55%). At the average hospital, approximately 90% of procedures were performed at most once a month at the hospital (93%, CI 93% to 94%). The percentages were insensitive to the quarter of the year. The percentages were 3% to 6% greater with ICD-10-PCS than for the superseded ICD 9 CM. There are many different procedure codes, and many different combinations of codes, relative to the number of different hospital discharges. Since most procedures at most hospitals are performed no more than once a month, activity-based cost accounting with a sample size sufficient to be useful is impractical for the vast majority of procedures, in contrast to analysis by surgeon and/or subspecialty. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  16. Turbinate surgery

    Science.gov (United States)

    Turbinectomy; Turbinoplasty; Turbinate reduction; Nasal airway surgery; Nasal obstruction - turbinate surgery ... There are several types of turbinate surgery: Turbinectomy: All or ... This can be done in several different ways, but sometimes a ...

  17. Bariatric Surgery

    Science.gov (United States)

    ... often. Each type of surgery has advantages and disadvantages. Bariatric Surgery Benefits Bariatric surgery can improve many ... Grants & Grant History Research Resources Research at NIDDK Technology Advancement & Transfer Meetings & Workshops Health Information Diabetes Digestive ...

  18. Lung surgery

    Science.gov (United States)

    ... are thoracotomy and video-assisted thoracoscopic surgery (VATS). Robotic surgery may also be used. Lung surgery using ... Center-Shreveport, Shreveport, LA. Review provided by VeriMed Healthcare Network. Also reviewed by David Zieve, MD, MHA, ...

  19. Plastic Surgery

    Science.gov (United States)

    ... Staying Safe Videos for Educators Search English Español Plastic Surgery KidsHealth / For Teens / Plastic Surgery What's in ... her forehead lightened with a laser? What Is Plastic Surgery? Just because the name includes the word " ...

  20. Plastic Surgery: Tackling Misconceptions

    African Journals Online (AJOL)

    will succeed. First impressions tend to last, and if young people's first impression of plastic surgeons is that they spend much of their time doing cosmetic surgery then this is a first impression that might be long ... Res 2014;4 Suppl S3:169‑70. Access this article online. Quick Response Code: Website: www.amhsr.org. DOI:.

  1. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... here to find out more. Dental Implant Surgery Dental Implant Surgery Dental implant surgery is, of course, surgery, ... here to find out more. Dental Implant Surgery Dental Implant Surgery Dental implant surgery is, of course, surgery, ...

  2. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...

  3. Robotic surgery

    Science.gov (United States)

    ... with this type of surgery give it some advantages over standard endoscopic techniques. The surgeon can make ... Elsevier Saunders; 2015:chap 87. Muller CL, Fried GM. Emerging technology in surgery: Informatics, electronics, robotics. In: ...

  4. Nose Surgery

    Science.gov (United States)

    ... Patient Health Home Copyright © 2018 American Academy of Otolaryngology–Head and Neck Surgery. Reproduction or republication strictly ... Terms of Use © Copyright 2018. American Academy of Otolaryngology — Head and Neck Surgery 1650 Diagonal Rd Alexandria, ...

  5. After Surgery

    Science.gov (United States)

    ... side effects. There is usually some pain with surgery. There may also be swelling and soreness around ... the first few days, weeks, or months after surgery. Some other questions to ask are How long ...

  6. Coding Labour

    Directory of Open Access Journals (Sweden)

    Anthony McCosker

    2014-03-01

    Full Text Available As well as introducing the Coding Labour section, the authors explore the diffusion of code across the material contexts of everyday life, through the objects and tools of mediation, the systems and practices of cultural production and organisational management, and in the material conditions of labour. Taking code beyond computation and software, their specific focus is on the increasingly familiar connections between code and labour with a focus on the codification and modulation of affect through technologies and practices of management within the contemporary work organisation. In the grey literature of spreadsheets, minutes, workload models, email and the like they identify a violence of forms through which workplace affect, in its constant flux of crisis and ‘prodromal’ modes, is regulated and governed.

  7. Thyroid Surgery

    Science.gov (United States)

    ... Hypothyroidism in Children and Adolescents Pediatric Differentiated Thyroid Cancer Thyroid Nodules in Children and Adolescents Thyroid Surgery Resources Thyroid Surgery Brochure PDF Thyroid Surgery FAQs PDF En Español Cirugia De La Tiroides El folleto de Cirugia De La Tiroides Search Thyroid ...

  8. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  9. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe ...

  10. Aztheca Code

    International Nuclear Information System (INIS)

    Quezada G, S.; Espinosa P, G.; Centeno P, J.; Sanchez M, H.

    2017-09-01

    This paper presents the Aztheca code, which is formed by the mathematical models of neutron kinetics, power generation, heat transfer, core thermo-hydraulics, recirculation systems, dynamic pressure and level models and control system. The Aztheca code is validated with plant data, as well as with predictions from the manufacturer when the reactor operates in a stationary state. On the other hand, to demonstrate that the model is applicable during a transient, an event occurred in a nuclear power plant with a BWR reactor is selected. The plant data are compared with the results obtained with RELAP-5 and the Aztheca model. The results show that both RELAP-5 and the Aztheca code have the ability to adequately predict the behavior of the reactor. (Author)

  11. Vocable Code

    DEFF Research Database (Denmark)

    Soon, Winnie; Cox, Geoff

    2018-01-01

    a computational and poetic composition for two screens: on one of these, texts and voices are repeated and disrupted by mathematical chaos, together exploring the performativity of code and language; on the other, is a mix of a computer programming syntax and human language. In this sense queer code can...... be understood as both an object and subject of study that intervenes in the world’s ‘becoming' and how material bodies are produced via human and nonhuman practices. Through mixing the natural and computer language, this article presents a script in six parts from a performative lecture for two persons...

  12. NSURE code

    International Nuclear Information System (INIS)

    Rattan, D.S.

    1993-11-01

    NSURE stands for Near-Surface Repository code. NSURE is a performance assessment code. developed for the safety assessment of near-surface disposal facilities for low-level radioactive waste (LLRW). Part one of this report documents the NSURE model, governing equations and formulation of the mathematical models, and their implementation under the SYVAC3 executive. The NSURE model simulates the release of nuclides from an engineered vault, their subsequent transport via the groundwater and surface water pathways tot he biosphere, and predicts the resulting dose rate to a critical individual. Part two of this report consists of a User's manual, describing simulation procedures, input data preparation, output and example test cases

  13. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  14. Coding Class

    DEFF Research Database (Denmark)

    Ejsing-Duun, Stine; Hansbøl, Mikala

    Denne rapport rummer evaluering og dokumentation af Coding Class projektet1. Coding Class projektet blev igangsat i skoleåret 2016/2017 af IT-Branchen i samarbejde med en række medlemsvirksomheder, Københavns kommune, Vejle Kommune, Styrelsen for IT- og Læring (STIL) og den frivillige forening...... Coding Pirates2. Rapporten er forfattet af Docent i digitale læringsressourcer og forskningskoordinator for forsknings- og udviklingsmiljøet Digitalisering i Skolen (DiS), Mikala Hansbøl, fra Institut for Skole og Læring ved Professionshøjskolen Metropol; og Lektor i læringsteknologi, interaktionsdesign......, design tænkning og design-pædagogik, Stine Ejsing-Duun fra Forskningslab: It og Læringsdesign (ILD-LAB) ved Institut for kommunikation og psykologi, Aalborg Universitet i København. Vi har fulgt og gennemført evaluering og dokumentation af Coding Class projektet i perioden november 2016 til maj 2017...

  15. Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the objectives, meeting goals and overall NASA goals for the NASA Data Standards Working Group. The presentation includes information on the technical progress surrounding the objective, short LDPC codes, and the general results on the Pu-Pw tradeoff.

  16. ANIMAL code

    International Nuclear Information System (INIS)

    Lindemuth, I.R.

    1979-01-01

    This report describes ANIMAL, a two-dimensional Eulerian magnetohydrodynamic computer code. ANIMAL's physical model also appears. Formulated are temporal and spatial finite-difference equations in a manner that facilitates implementation of the algorithm. Outlined are the functions of the algorithm's FORTRAN subroutines and variables

  17. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621 ...

  18. MCNP code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The MCNP code is the major Monte Carlo coupled neutron-photon transport research tool at the Los Alamos National Laboratory, and it represents the most extensive Monte Carlo development program in the United States which is available in the public domain. The present code is the direct descendent of the original Monte Carlo work of Fermi, von Neumaum, and Ulam at Los Alamos in the 1940s. Development has continued uninterrupted since that time, and the current version of MCNP (or its predecessors) has always included state-of-the-art methods in the Monte Carlo simulation of radiation transport, basic cross section data, geometry capability, variance reduction, and estimation procedures. The authors of the present code have oriented its development toward general user application. The documentation, though extensive, is presented in a clear and simple manner with many examples, illustrations, and sample problems. In addition to providing the desired results, the output listings give a a wealth of detailed information (some optional) concerning each state of the calculation. The code system is continually updated to take advantage of advances in computer hardware and software, including interactive modes of operation, diagnostic interrupts and restarts, and a variety of graphical and video aids

  19. Expander Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 10; Issue 1. Expander Codes - The Sipser–Spielman Construction. Priti Shankar. General Article Volume 10 ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science Bangalore 560 012, India.

  20. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... out more. Corrective Jaw Surgery Corrective Jaw Surgery Orthognathic surgery is performed to correct the misalignment of jaws ... out more. Corrective Jaw Surgery Corrective Jaw Surgery Orthognathic surgery is performed to correct the misalignment of jaws ...

  1. GENERAL SURGERY

    African Journals Online (AJOL)

    in the endoscopy room. GENERAL SURGERY. T du Toit, O C Buchel, S J A Smit. Department of Surgery, University of the Free State, Bloemfontein, ... The lack of video instrumentation in developing countries: Redundant fibre-optic instruments (the old. “eye scope”) are still being used. This instrument brings endoscopists ...

  2. GENERAL SURGERY

    African Journals Online (AJOL)

    mean time to first surgery post burn was 11.5 days with a median volume of 0.73 mls/kg/% ..... Mode. Mean (SD). Upper limit. 95% CI. Lower limit. 95% CI. Mode. Elective surgery .... evaluating single-unit red blood cell transfusions in reducing.

  3. Panda code

    International Nuclear Information System (INIS)

    Altomare, S.; Minton, G.

    1975-02-01

    PANDA is a new two-group one-dimensional (slab/cylinder) neutron diffusion code designed to replace and extend the FAB series. PANDA allows for the nonlinear effects of xenon, enthalpy and Doppler. Fuel depletion is allowed. PANDA has a completely general search facility which will seek criticality, maximize reactivity, or minimize peaking. Any single parameter may be varied in a search. PANDA is written in FORTRAN IV, and as such is nearly machine independent. However, PANDA has been written with the present limitations of the Westinghouse CDC-6600 system in mind. Most computation loops are very short, and the code is less than half the useful 6600 memory size so that two jobs can reside in the core at once. (auth)

  4. CANAL code

    International Nuclear Information System (INIS)

    Gara, P.; Martin, E.

    1983-01-01

    The CANAL code presented here optimizes a realistic iron free extraction channel which has to provide a given transversal magnetic field law in the median plane: the current bars may be curved, have finite lengths and cooling ducts and move in a restricted transversal area; terminal connectors may be added, images of the bars in pole pieces may be included. A special option optimizes a real set of circular coils [fr

  5. Choosing surgery

    DEFF Research Database (Denmark)

    Thorstensson, Carina; Lohmander, L; Frobell, Richard

    2009-01-01

    -depth qualitative interviews were conducted with young (aged 18-35), physically active individuals with ACL rupture who were participating in a RCT comparing training and surgical reconstruction with training only. 22/34 were randomised to training only but crossed over to surgery. Of these, 11 were interviewed......ABSTRACT: BACKGROUND: The objective was to understand patients' views of treatment after acute anterior cruciate ligament (ACL) injury, and their reasons for deciding to request surgery despite consenting to participate in a randomised controlled trial (to 'cross-over'). METHODS: Thirty-four in...... before surgery, and 11 were interviewed at least 6 months after surgery. To provide additional information, 12 patients were interviewed before randomisation. Interviews were audio-recorded, transcribed and analysed using the Framework approach. RESULTS: Strong preference for surgery was commonplace...

  6. Quantum computing with Majorana fermion codes

    Science.gov (United States)

    Litinski, Daniel; von Oppen, Felix

    2018-05-01

    We establish a unified framework for Majorana-based fault-tolerant quantum computation with Majorana surface codes and Majorana color codes. All logical Clifford gates are implemented with zero-time overhead. This is done by introducing a protocol for Pauli product measurements with tetrons and hexons which only requires local 4-Majorana parity measurements. An analogous protocol is used in the fault-tolerant setting, where tetrons and hexons are replaced by Majorana surface code patches, and parity measurements are replaced by lattice surgery, still only requiring local few-Majorana parity measurements. To this end, we discuss twist defects in Majorana fermion surface codes and adapt the technique of twist-based lattice surgery to fermionic codes. Moreover, we propose a family of codes that we refer to as Majorana color codes, which are obtained by concatenating Majorana surface codes with small Majorana fermion codes. Majorana surface and color codes can be used to decrease the space overhead and stabilizer weight compared to their bosonic counterparts.

  7. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  8. Cataract Surgery

    Science.gov (United States)

    ... Oncology Oculoplastics/Orbit Refractive Management/Intervention Retina/Vitreous Uveitis Focus On Pediatric Ophthalmology ... Are Cataracts? Pediatric Cataracts Cataract Diagnosis and Treatment Cataract Surgery IOL Implants: Lens Replacement After Cataracts ...

  9. Brain surgery

    Science.gov (United States)

    Craniotomy; Surgery - brain; Neurosurgery; Craniectomy; Stereotactic craniotomy; Stereotactic brain biopsy; Endoscopic craniotomy ... cut depends on where the problem in the brain is located. The surgeon creates a hole in ...

  10. Hemorrhoid surgery

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/article/002939.htm Hemorrhoid surgery To use the sharing features on this page, please enable JavaScript. Hemorrhoids are swollen veins around the anus. They may ...

  11. PLASTIC SURGERY

    African Journals Online (AJOL)

    Department of Plastic and Reconstructive Surgery Sefako Makgatho Health Science University, ... We report on a pilot study on the use of a circumareolar excision and the use of .... and 1 gynecomastia patient) requested reduction in NAC size.

  12. GENERAL SURGERY

    African Journals Online (AJOL)

    influence medical students in pursuing a career in surgery. ... training, females reported significantly higher levels of agreement that surgical training would be better overseas when ..... mentoring surgical research or educational lectures and.

  13. GENERAL SURGERY

    African Journals Online (AJOL)

    1 Department of Surgery, Nelson R Mandela School of Medicine, University of ... in 51 reports. Four reports were illegible; one was conducted by a junior consultant, two by a fourth year trainee specialist ... The study period was 12 months from.

  14. Sinus Surgery

    Science.gov (United States)

    ... sinus computed tomography (CT) scan (without contrast), nasal physiology (rhinomanometry and nasal cytology), smell testing, and selected ... altered anatomical landmarks, or where a patient’s sinus anatomy is very unusual, making typical surgery difficult. Image ...

  15. Emergency surgery

    DEFF Research Database (Denmark)

    Stoneham, M; Murray, D; Foss, N

    2014-01-01

    National reports recommended that peri-operative care should be improved for elderly patients undergoing emergency surgery. Postoperative mortality and morbidity rates remain high, and indicate that emergency ruptured aneurysm repair, laparotomy and hip fracture fixation are high-risk procedures...... undertaken on elderly patients with limited physiological reserve. National audits have reported variations in care quality, data that are increasingly being used to drive quality improvement through professional guidance. Given that the number of elderly patients presenting for emergency surgery is likely...

  16. Tennis elbow surgery

    Science.gov (United States)

    Lateral epicondylitis - surgery; Lateral tendinosis - surgery; Lateral tennis elbow - surgery ... Surgery to repair tennis elbow is often an outpatient surgery. This means you will not stay in the hospital overnight. You will be given ...

  17. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... and Craniofacial Surgery Cleft Lip/Palate and Craniofacial Surgery A cleft lip may require one or more ... find out more. Corrective Jaw Surgery Corrective Jaw Surgery Orthognathic surgery is performed to correct the misalignment ...

  18. Mohs micrographic surgery

    Science.gov (United States)

    Skin cancer - Mohs surgery; Basal cell skin cancer - Mohs surgery; Squamous cell skin cancer - Mohs surgery ... Mohs surgery usually takes place in the doctor's office. The surgery is started early in the morning and is ...

  19. Orthognathic Surgery

    DEFF Research Database (Denmark)

    Kjærgaard Larsen, Marie; Thygesen, Torben Henrik

    2016-01-01

    The literature shows that the indications for orthognathic surgery (OS) are often functional problems and unsatisfactory facial esthetics. This study investigated the esthetic outcomes and overall satisfaction following OS. Somatosensory change is a relatively common complication and its influence...... on the level of satisfaction was studied. The social-networking web site Facebook was used to identify the study population. An online questionnaire was performed using the website SurveyMonkey. In all, 105 (9%) respondents from the Danish Facebook group about OS, called Kaebeoperation (jaw surgery), were...... in beauty than women (P = 0.030). Sixty-four percent replied that their attractiveness had been increased after OS. Eighty-six percent were happy with the results and 89% would recommend the surgery to others in need. No significant differences in esthetic results and satisfaction were seen with regard...

  20. Automatic coding method of the ACR Code

    International Nuclear Information System (INIS)

    Park, Kwi Ae; Ihm, Jong Sool; Ahn, Woo Hyun; Baik, Seung Kook; Choi, Han Yong; Kim, Bong Gi

    1993-01-01

    The authors developed a computer program for automatic coding of ACR(American College of Radiology) code. The automatic coding of the ACR code is essential for computerization of the data in the department of radiology. This program was written in foxbase language and has been used for automatic coding of diagnosis in the Department of Radiology, Wallace Memorial Baptist since May 1992. The ACR dictionary files consisted of 11 files, one for the organ code and the others for the pathology code. The organ code was obtained by typing organ name or code number itself among the upper and lower level codes of the selected one that were simultaneous displayed on the screen. According to the first number of the selected organ code, the corresponding pathology code file was chosen automatically. By the similar fashion of organ code selection, the proper pathologic dode was obtained. An example of obtained ACR code is '131.3661'. This procedure was reproducible regardless of the number of fields of data. Because this program was written in 'User's Defined Function' from, decoding of the stored ACR code was achieved by this same program and incorporation of this program into program in to another data processing was possible. This program had merits of simple operation, accurate and detail coding, and easy adjustment for another program. Therefore, this program can be used for automation of routine work in the department of radiology

  1. Intestinal Surgery.

    Science.gov (United States)

    Desrochers, André; Anderson, David E

    2016-11-01

    A wide variety of disorders affecting the intestinal tract in cattle may require surgery. Among those disorders the more common are: intestinal volvulus, jejunal hemorrhage syndrome and more recently the duodenal sigmoid flexure volvulus. Although general principles of intestinal surgery can be applied, cattle has anatomical and behavior particularities that must be known before invading the abdomen. This article focuses on surgical techniques used to optimize outcomes and discusses specific disorders of small intestine. Diagnoses and surgical techniques presented can be applied in field conditions. Copyright © 2016 Elsevier Inc. All rights reserved.

  2. Error-correction coding

    Science.gov (United States)

    Hinds, Erold W. (Principal Investigator)

    1996-01-01

    This report describes the progress made towards the completion of a specific task on error-correcting coding. The proposed research consisted of investigating the use of modulation block codes as the inner code of a concatenated coding system in order to improve the overall space link communications performance. The study proposed to identify and analyze candidate codes that will complement the performance of the overall coding system which uses the interleaved RS (255,223) code as the outer code.

  3. Dynamic Shannon Coding

    OpenAIRE

    Gagie, Travis

    2005-01-01

    We present a new algorithm for dynamic prefix-free coding, based on Shannon coding. We give a simple analysis and prove a better upper bound on the length of the encoding produced than the corresponding bound for dynamic Huffman coding. We show how our algorithm can be modified for efficient length-restricted coding, alphabetic coding and coding with unequal letter costs.

  4. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  5. Codes Over Hyperfields

    Directory of Open Access Journals (Sweden)

    Atamewoue Surdive

    2017-12-01

    Full Text Available In this paper, we define linear codes and cyclic codes over a finite Krasner hyperfield and we characterize these codes by their generator matrices and parity check matrices. We also demonstrate that codes over finite Krasner hyperfields are more interesting for code theory than codes over classical finite fields.

  6. GENERAL SURGERY

    African Journals Online (AJOL)

    surgery. Since the first laparoscopic treatment of hydatid disease was described in 1992,14 there has been a steady growth in reports of the laparoscopic treatment of hydatid cysts of liver. Although early reported laparoscopic treatment of liver hydatid disease was confined to simple drainage, more advanced laparoscopic ...

  7. GENERAL SURGERY

    African Journals Online (AJOL)

    Department of Surgery, University of Cape Town Health Sciences Faculty, Groote Schuur Hospital, Observatory, Cape Town,. South Africa ... included all district, regional and tertiary hospitals in the nine provinces. Clinics and so-called ..... large contingency of senior general surgeons from countries such as Cuba, who have ...

  8. TRAUMA SURGERY

    African Journals Online (AJOL)

    meet the criteria for damage control surgery, and ligation of the AVC is a .... There were two vertebral body fractures, one penetrating brain injury from a gunshot wound to the head, one ... two hand fractures, three haemothoraces, one pelvic fracture, .... One patient with an intimal flap injury to his left common iliac artery ...

  9. GENERAL SURGERY

    African Journals Online (AJOL)

    Schwab , using a three-phase approach.5 In 1998, Moore et al. extended the concept and described the five-stage approach.6. The aim of damage control surgery is to prevent severely injured patients from developing the “lethal triad” of hypothermia, coagulopathy and worsening acidosis, as this confers a dismal prognosis ...

  10. Rodding Surgery

    Science.gov (United States)

    ... Physical activity prior to surgery,  Length of the operation; anesthesia issues,  Reason for the choice of rod,  Time in the hospital,  Length of recovery time at home,  Pain management including control of muscle spasms,  The rehabilitation plan. ...

  11. Carotid artery surgery

    Science.gov (United States)

    Carotid endarterectomy; CAS surgery; Carotid artery stenosis - surgery; Endarterectomy - carotid artery ... through the catheter around the blocked area during surgery. Your carotid artery is opened. The surgeon removes ...

  12. Vector Network Coding Algorithms

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L x L coding matrices that play a similar role as coding c in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector coding, our algori...

  13. Homological stabilizer codes

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Jonas T., E-mail: jonastyleranderson@gmail.com

    2013-03-15

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

  14. Metabolic Surgery

    DEFF Research Database (Denmark)

    Pareek, Manan; Schauer, Philip R; Kaplan, Lee M

    2018-01-01

    The alarming rise in the worldwide prevalence of obesity is paralleled by an increasing burden of type 2 diabetes mellitus. Metabolic surgery is the most effective means of obtaining substantial and durable weight loss in individuals with obesity. Randomized trials have recently shown...... the superiority of surgery over medical treatment alone in achieving improved glycemic control, as well as a reduction in cardiovascular risk factors. The mechanisms seem to extend beyond the magnitude of weight loss alone and include improvements in incretin profiles, insulin secretion, and insulin sensitivity....... Moreover, observational data suggest that the reduction in cardiovascular risk factors translates to better patient outcomes. This review describes commonly used metabolic surgical procedures and their current indications and summarizes the evidence related to weight loss and glycemic outcomes. It further...

  15. Preparing for Surgery

    Science.gov (United States)

    ... Events Advocacy For Patients About ACOG Preparing for Surgery Home For Patients Search FAQs Preparing for Surgery ... Surgery FAQ080, August 2011 PDF Format Preparing for Surgery Gynecologic Problems What is the difference between outpatient ...

  16. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... Extractions and Other Oral Surgeries Extractions and Other Oral Surgeries Oral and maxillofacial surgeons surgically treat the soft ... Extractions and Other Oral Surgeries Extractions and Other Oral Surgeries Oral and maxillofacial surgeons surgically treat the soft ...

  17. Corrective Jaw Surgery

    Science.gov (United States)

    ... Extractions and Other Oral Surgeries Extractions and Other Oral Surgeries Oral and maxillofacial surgeons surgically treat the soft ... Extractions and Other Oral Surgeries Extractions and Other Oral Surgeries Oral and maxillofacial surgeons surgically treat the soft ...

  18. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... to find out more. Facial Cosmetic Surgery Facial Cosmetic Surgery Extensive education and training in surgical procedures ... to find out more. Facial Cosmetic Surgery Facial Cosmetic Surgery Extensive education and training in surgical procedures ...

  19. Facial Cosmetic Surgery

    Science.gov (United States)

    ... to find out more. Facial Cosmetic Surgery Facial Cosmetic Surgery Extensive education and training in surgical procedures ... to find out more. Facial Cosmetic Surgery Facial Cosmetic Surgery Extensive education and training in surgical procedures ...

  20. Heart bypass surgery

    Science.gov (United States)

    Off-pump coronary artery bypass; OPCAB; Beating heart surgery; Bypass surgery - heart; CABG; Coronary artery bypass graft; Coronary artery bypass surgery; Coronary bypass surgery; Coronary artery disease - CABG; CAD - CABG; Angina - ...

  1. Diagnostic Coding for Epilepsy.

    Science.gov (United States)

    Williams, Korwyn; Nuwer, Marc R; Buchhalter, Jeffrey R

    2016-02-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  2. Coding of Neuroinfectious Diseases.

    Science.gov (United States)

    Barkley, Gregory L

    2015-12-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  3. Fifty Years of Innovation in Plastic Surgery

    Directory of Open Access Journals (Sweden)

    Richard M Kwasnicki

    2016-03-01

    Full Text Available BackgroundInnovation has molded the current landscape of plastic surgery. However, documentation of this process only exists scattered throughout the literature as individual articles. The few attempts made to profile innovation in plastic surgery have been narrative, and therefore qualitative and inherently biased. Through the implementation of a novel innovation metric, this work aims to identify and characterise the most prevalent innovations in plastic surgery over the last 50 years.MethodsPatents and publications related to plastic surgery (1960 to 2010 were retrieved from patent and MEDLINE databases, respectively. The most active patent codes were identified and grouped into technology areas, which were subsequently plotted graphically against publication data. Expert-derived technologies outside of the top performing patents areas were additionally explored.ResultsBetween 1960 and 2010, 4,651 patents and 43,118 publications related to plastic surgery were identified. The most active patent codes were grouped under reconstructive prostheses, implants, instruments, non-invasive techniques, and tissue engineering. Of these areas and other expert-derived technologies, those currently undergoing growth include surgical instruments, implants, non-invasive practices, transplantation and breast surgery. Innovations related to microvascular surgery, liposuction, tissue engineering, lasers and prostheses have all plateaued.ConclusionsThe application of a novel metric for evaluating innovation quantitatively outlines the natural history of technologies fundamental to the evolution of plastic surgery. Analysis of current innovation trends provides some insight into which technology domains are the most active.

  4. Vector Network Coding

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L X L coding matrices that play a similar role as coding coefficients in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector co...

  5. Entropy Coding in HEVC

    OpenAIRE

    Sze, Vivienne; Marpe, Detlev

    2014-01-01

    Context-Based Adaptive Binary Arithmetic Coding (CABAC) is a method of entropy coding first introduced in H.264/AVC and now used in the latest High Efficiency Video Coding (HEVC) standard. While it provides high coding efficiency, the data dependencies in H.264/AVC CABAC make it challenging to parallelize and thus limit its throughput. Accordingly, during the standardization of entropy coding for HEVC, both aspects of coding efficiency and throughput were considered. This chapter describes th...

  6. Generalized concatenated quantum codes

    International Nuclear Information System (INIS)

    Grassl, Markus; Shor, Peter; Smith, Graeme; Smolin, John; Zeng Bei

    2009-01-01

    We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length but also asymptotically meet the quantum Hamming bound for large block length.

  7. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  8. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  9. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  10. Cracking the code: the accuracy of coding shoulder procedures and the repercussions.

    Science.gov (United States)

    Clement, N D; Murray, I R; Nie, Y X; McBirnie, J M

    2013-05-01

    Coding of patients' diagnosis and surgical procedures is subject to error levels of up to 40% with consequences on distribution of resources and financial recompense. Our aim was to explore and address reasons behind coding errors of shoulder diagnosis and surgical procedures and to evaluate a potential solution. A retrospective review of 100 patients who had undergone surgery was carried out. Coding errors were identified and the reasons explored. A coding proforma was designed to address these errors and was prospectively evaluated for 100 patients. The financial implications were also considered. Retrospective analysis revealed the correct primary diagnosis was assigned in 54 patients (54%) had an entirely correct diagnosis, and only 7 (7%) patients had a correct procedure code assigned. Coders identified indistinct clinical notes and poor clarity of procedure codes as reasons for errors. The proforma was significantly more likely to assign the correct diagnosis (odds ratio 18.2, p code (odds ratio 310.0, p coding department. High error levels for coding are due to misinterpretation of notes and ambiguity of procedure codes. This can be addressed by allowing surgeons to assign the diagnosis and procedure using a simplified list that is passed directly to coding.

  11. Discussion on LDPC Codes and Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  12. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  13. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    Shannon limit of the channel. Among the earliest discovered codes that approach the. Shannon limit were the low density parity check (LDPC) codes. The term low density arises from the property of the parity check matrix defining the code. We will now define this matrix and the role that it plays in decoding. 2. Linear Codes.

  14. Manually operated coded switch

    International Nuclear Information System (INIS)

    Barnette, J.H.

    1978-01-01

    The disclosure related to a manually operated recodable coded switch in which a code may be inserted, tried and used to actuate a lever controlling an external device. After attempting a code, the switch's code wheels must be returned to their zero positions before another try is made

  15. Coding in Muscle Disease.

    Science.gov (United States)

    Jones, Lyell K; Ney, John P

    2016-12-01

    Accurate coding is critically important for clinical practice and research. Ongoing changes to diagnostic and billing codes require the clinician to stay abreast of coding updates. Payment for health care services, data sets for health services research, and reporting for medical quality improvement all require accurate administrative coding. This article provides an overview of administrative coding for patients with muscle disease and includes a case-based review of diagnostic and Evaluation and Management (E/M) coding principles in patients with myopathy. Procedural coding for electrodiagnostic studies and neuromuscular ultrasound is also reviewed.

  16. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  17. Tennis elbow surgery - discharge

    Science.gov (United States)

    ... epicondylitis surgery - discharge; Lateral tendinosis surgery - discharge; Lateral tennis elbow surgery - discharge ... long as you are told. This helps ensure tennis elbow will not return. You may be prescribed a ...

  18. Lung surgery - discharge

    Science.gov (United States)

    ... Lung biopsy - discharge; Thoracoscopy - discharge; Video-assisted thoracoscopic surgery - discharge; VATS - discharge ... milk) for 2 weeks after video-assisted thoracoscopic surgery and 6 to 8 weeks after open surgery. ...

  19. Gastric Sleeve Surgery

    Science.gov (United States)

    ... Videos for Educators Search English Español Gastric Sleeve Surgery KidsHealth / For Teens / Gastric Sleeve Surgery What's in ... or buying healthy food ) Preparing for Gastric Sleeve Surgery Preparing for this major operation takes months of ...

  20. Hip Replacement Surgery

    Science.gov (United States)

    ... Outreach Initiative Breadcrumb Home Health Topics English Español Hip Replacement Surgery Basics In-Depth Download Download EPUB ... PDF What is it? Points To Remember About Hip Replacement Surgery Hip replacement surgery removes damaged or ...

  1. Dental Implant Surgery

    Science.gov (United States)

    ... here to find out more. Dental Implant Surgery Dental Implant Surgery Dental implant surgery is, of course, ... to find out more. Wisdom Teeth Management Wisdom Teeth Management An impacted wisdom tooth can damage neighboring ...

  2. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... here to find out more. Dental Implant Surgery Dental Implant Surgery Dental implant surgery is, of course, ... to find out more. Wisdom Teeth Management Wisdom Teeth Management An impacted wisdom tooth can damage neighboring ...

  3. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... Oral Surgeries Facial Cosmetic Surgery Facial Injury / Trauma Surgery Obstructive Sleep Apnea (OSA) Oral, Head and Neck Pathology TMJ and Facial Pain Wisdom Teeth Management Procedures Anesthesia Anesthesia Oral and maxillofacial surgeons are ...

  4. Codes and curves

    CERN Document Server

    Walker, Judy L

    2000-01-01

    When information is transmitted, errors are likely to occur. Coding theory examines efficient ways of packaging data so that these errors can be detected, or even corrected. The traditional tools of coding theory have come from combinatorics and group theory. Lately, however, coding theorists have added techniques from algebraic geometry to their toolboxes. In particular, by re-interpreting the Reed-Solomon codes, one can see how to define new codes based on divisors on algebraic curves. For instance, using modular curves over finite fields, Tsfasman, Vladut, and Zink showed that one can define a sequence of codes with asymptotically better parameters than any previously known codes. This monograph is based on a series of lectures the author gave as part of the IAS/PCMI program on arithmetic algebraic geometry. Here, the reader is introduced to the exciting field of algebraic geometric coding theory. Presenting the material in the same conversational tone of the lectures, the author covers linear codes, inclu...

  5. The lacrimal system: diagnosis, management, and surgery

    National Research Council Canada - National Science Library

    Cohen, Adam J; Mercandetti, Michael; Brazzo, Brian G

    2006-01-01

    ... and techniques presented represent the state of the art of lacrimal diagnosis and surgery. There is mention of lacrimal infection dating back to the Code of Hammurabi in 2250 BC, but it was not until the late 1800s that real progress began to be made. Toti, an ENT surgeon in Florence, Italy, described external dacryocystorhinostomy (DCR) with turb...

  6. Breast Reduction Surgery

    Science.gov (United States)

    ... considering breast reduction surgery, consult a board-certified plastic surgeon. It's important to understand what breast reduction surgery entails — including possible risks and complications — as ...

  7. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    This essay studies the source code of an artwork from a software studies perspective. By examining code that come close to the approach of critical code studies (Marino, 2006), I trace the network artwork, Pupufu (Lin, 2009) to understand various real-time approaches to social media platforms (MSN......, Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...... to understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  8. Coding for optical channels

    CERN Document Server

    Djordjevic, Ivan; Vasic, Bane

    2010-01-01

    This unique book provides a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory and optical communication.

  9. SEVERO code - user's manual

    International Nuclear Information System (INIS)

    Sacramento, A.M. do.

    1989-01-01

    This user's manual contains all the necessary information concerning the use of SEVERO code. This computer code is related to the statistics of extremes = extreme winds, extreme precipitation and flooding hazard risk analysis. (A.C.A.S.)

  10. Synthesizing Certified Code

    OpenAIRE

    Whalen, Michael; Schumann, Johann; Fischer, Bernd

    2002-01-01

    Code certification is a lightweight approach for formally demonstrating software quality. Its basic idea is to require code producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates that can be checked independently. Since code certification uses the same underlying technology as program verification, it requires detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding annotations to th...

  11. FERRET data analysis code

    International Nuclear Information System (INIS)

    Schmittroth, F.

    1979-09-01

    A documentation of the FERRET data analysis code is given. The code provides a way to combine related measurements and calculations in a consistent evaluation. Basically a very general least-squares code, it is oriented towards problems frequently encountered in nuclear data and reactor physics. A strong emphasis is on the proper treatment of uncertainties and correlations and in providing quantitative uncertainty estimates. Documentation includes a review of the method, structure of the code, input formats, and examples

  12. Stylize Aesthetic QR Code

    OpenAIRE

    Xu, Mingliang; Su, Hao; Li, Yafei; Li, Xi; Liao, Jing; Niu, Jianwei; Lv, Pei; Zhou, Bing

    2018-01-01

    With the continued proliferation of smart mobile devices, Quick Response (QR) code has become one of the most-used types of two-dimensional code in the world. Aiming at beautifying the appearance of QR codes, existing works have developed a series of techniques to make the QR code more visual-pleasant. However, these works still leave much to be desired, such as visual diversity, aesthetic quality, flexibility, universal property, and robustness. To address these issues, in this paper, we pro...

  13. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  14. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    doing formal coding and when doing more “traditional” conversation analysis research based on collections. We are more wary, however, of the implication that coding-based research is the end result of a process that starts with qualitative investigations and ends with categories that can be coded...

  15. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow...

  16. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  17. Software Certification - Coding, Code, and Coders

    Science.gov (United States)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  18. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... out more. Cleft Lip/Palate and Craniofacial Surgery Cleft Lip/Palate and Craniofacial Surgery A cleft lip may require ... out more. Cleft Lip/Palate and Craniofacial Surgery Cleft Lip/Palate and Craniofacial Surgery A cleft lip may require ...

  19. The network code

    International Nuclear Information System (INIS)

    1997-01-01

    The Network Code defines the rights and responsibilities of all users of the natural gas transportation system in the liberalised gas industry in the United Kingdom. This report describes the operation of the Code, what it means, how it works and its implications for the various participants in the industry. The topics covered are: development of the competitive gas market in the UK; key points in the Code; gas transportation charging; impact of the Code on producers upstream; impact on shippers; gas storage; supply point administration; impact of the Code on end users; the future. (20 tables; 33 figures) (UK)

  20. Coding for Electronic Mail

    Science.gov (United States)

    Rice, R. F.; Lee, J. J.

    1986-01-01

    Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.

  1. [Orthopedic and trauma surgery in the German DRG System 2007].

    Science.gov (United States)

    Franz, D; Kaufmann, M; Siebert, C H; Windolf, J; Roeder, N

    2007-03-01

    The German Diagnosis-Related Groups (DRG) System was further developed into its 2007 version. For orthopedic and trauma surgery, significant changes were made in terms of the coding of diagnoses and medical procedures, as well as in the DRG structure itself. The German Societies for Trauma Surgery and for Orthopedics and Orthopedic Surgery (Deutsch Gesellschaft für Unfallchirurgie, DGU; and Deutsche Gesellschaft für Orthopädie und Orthopädische Chirurgie, DGOOC) once again cooperated constructively with the German DRG Institute InEK. Among other innovations, new International Classification of Diseases (ICD) codes for second-degree burns were implemented. Procedure codes for joint operations, endoprosthetic-surgery and spine surgery were restructured. Furthermore, a specific code for septic surgery was introduced in 2007. In addition, the DRG structure was improved. Case allocation of patients with more than one significant operation was established. Further DRG subdivisions were established according to the patients age and the Patient Clinical Complexity Level (PCCL). DRG developments for 2007 have improved appropriate case allocation, but once again increased the system's complexity. Clinicians need an ever growing amount of specific coding know-how. Still, further adjustments to the German DRG system are required to allow for a correct allocation of cases and funds.

  2. Surgical specialty procedures in rural surgery practices: implications for rural surgery training.

    Science.gov (United States)

    Sticca, Robert P; Mullin, Brady C; Harris, Joel D; Hosford, Clint C

    2012-12-01

    Specialty procedures constitute one eighth of rural surgery practice. Currently, general surgeons intending to practice in rural hospitals may not get adequate training for specialty procedures, which they will be expected to perform. Better definition of these procedures will help guide rural surgery training. Current Procedural Terminology codes for all surgical procedures for 81% of North Dakota and South Dakota rural surgeons were entered into the Dakota Database for Rural Surgery. Specialty procedures were analyzed and compared with the Surgical Council on Resident Education curriculum to determine whether general surgery training is adequate preparation for rural surgery practice. The Dakota Database for Rural Surgery included 46,052 procedures, of which 5,666 (12.3%) were specialty procedures. Highest volume specialty categories included vascular, obstetrics and gynecology, orthopedics, cardiothoracic, urology, and otolaryngology. Common procedures in cardiothoracic and vascular surgery are taught in general surgical residency, while common procedures in obstetrics and gynecology, orthopedics, urology, and otolaryngology are usually not taught in general surgery training. Optimal training for rural surgery practice should include experience in specialty procedures in obstetrics and gynecology, orthopedics, urology, and otolaryngology. Copyright © 2012 Elsevier Inc. All rights reserved.

  3. The psychological impact of body contouring surgery

    DEFF Research Database (Denmark)

    Mikkelsen Lorenzen, Mike; Poulsen, Lotte; Poulsen, Signe

    2018-01-01

    INTRODUCTION: Body contouring surgery is associated with changes in body image and identity. The primary aim of the study was to investigate a multidisciplinary assessment of potential psychological challenges before and after body contouring surgery. METHODS: Eight pre- and post-operative patients...... relevant codes had been extracted. RESULTS: A total of seven psychological themes were iden- tified, indicating that surgery alone cannot improve the pa- tients’ psychological difficulties and that psychological care and management of the expected discomfort and body im- age is of considerable importance...... in providing continuity of care. CONCLUSIONS: The reported quality of life is of consider- able importance to patients undergoing body contouring surgery after massive weight loss. Our findings may provide useful information for surgeons and healthcare profes- sionals allowing them to develop patient education...

  4. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  5. XSOR codes users manual

    International Nuclear Information System (INIS)

    Jow, Hong-Nian; Murfin, W.B.; Johnson, J.D.

    1993-11-01

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ''XSOR''. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms

  6. Reactor lattice codes

    International Nuclear Information System (INIS)

    Kulikowska, T.

    1999-01-01

    The present lecture has a main goal to show how the transport lattice calculations are realised in a standard computer code. This is illustrated on the example of the WIMSD code, belonging to the most popular tools for reactor calculations. Most of the approaches discussed here can be easily modified to any other lattice code. The description of the code assumes the basic knowledge of reactor lattice, on the level given in the lecture on 'Reactor lattice transport calculations'. For more advanced explanation of the WIMSD code the reader is directed to the detailed descriptions of the code cited in References. The discussion of the methods and models included in the code is followed by the generally used homogenisation procedure and several numerical examples of discrepancies in calculated multiplication factors based on different sources of library data. (author)

  7. DLLExternalCode

    Energy Technology Data Exchange (ETDEWEB)

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  8. Toric Varieties and Codes, Error-correcting Codes, Quantum Codes, Secret Sharing and Decoding

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    We present toric varieties and associated toric codes and their decoding. Toric codes are applied to construct Linear Secret Sharing Schemes (LSSS) with strong multiplication by the Massey construction. Asymmetric Quantum Codes are obtained from toric codes by the A.R. Calderbank P.W. Shor and A.......M. Steane construction of stabilizer codes (CSS) from linear codes containing their dual codes....

  9. An Optimal Linear Coding for Index Coding Problem

    OpenAIRE

    Pezeshkpour, Pouya

    2015-01-01

    An optimal linear coding solution for index coding problem is established. Instead of network coding approach by focus on graph theoric and algebraic methods a linear coding program for solving both unicast and groupcast index coding problem is presented. The coding is proved to be the optimal solution from the linear perspective and can be easily utilize for any number of messages. The importance of this work is lying mostly on the usage of the presented coding in the groupcast index coding ...

  10. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  11. Majorana fermion codes

    International Nuclear Information System (INIS)

    Bravyi, Sergey; Terhal, Barbara M; Leemhuis, Bernhard

    2010-01-01

    We initiate the study of Majorana fermion codes (MFCs). These codes can be viewed as extensions of Kitaev's one-dimensional (1D) model of unpaired Majorana fermions in quantum wires to higher spatial dimensions and interacting fermions. The purpose of MFCs is to protect quantum information against low-weight fermionic errors, that is, operators acting on sufficiently small subsets of fermionic modes. We examine to what extent MFCs can surpass qubit stabilizer codes in terms of their stability properties. A general construction of 2D MFCs is proposed that combines topological protection based on a macroscopic code distance with protection based on fermionic parity conservation. Finally, we use MFCs to show how to transform any qubit stabilizer code to a weakly self-dual CSS code.

  12. Theory of epigenetic coding.

    Science.gov (United States)

    Elder, D

    1984-06-07

    The logic of genetic control of development may be based on a binary epigenetic code. This paper revises the author's previous scheme dealing with the numerology of annelid metamerism in these terms. Certain features of the code had been deduced to be combinatorial, others not. This paradoxical contrast is resolved here by the interpretation that these features relate to different operations of the code; the combinatiorial to coding identity of units, the non-combinatorial to coding production of units. Consideration of a second paradox in the theory of epigenetic coding leads to a new solution which further provides a basis for epimorphic regeneration, and may in particular throw light on the "regeneration-duplication" phenomenon. A possible test of the model is also put forward.

  13. DISP1 code

    International Nuclear Information System (INIS)

    Vokac, P.

    1999-12-01

    DISP1 code is a simple tool for assessment of the dispersion of the fission product cloud escaping from a nuclear power plant after an accident. The code makes it possible to tentatively check the feasibility of calculations by more complex PSA3 codes and/or codes for real-time dispersion calculations. The number of input parameters is reasonably low and the user interface is simple enough to allow a rapid processing of sensitivity analyses. All input data entered through the user interface are stored in the text format. Implementation of dispersion model corrections taken from the ARCON96 code enables the DISP1 code to be employed for assessment of the radiation hazard within the NPP area, in the control room for instance. (P.A.)

  14. Phonological coding during reading.

    Science.gov (United States)

    Leinenger, Mallorie

    2014-11-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early [prelexical] or that phonological codes come online late [postlexical]) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eye-tracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model, Van Orden, 1987; dual-route model, e.g., M. Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001; parallel distributed processing model, Seidenberg & McClelland, 1989) are discussed. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  15. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  16. MORSE Monte Carlo code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described

  17. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  18. Tokamak Systems Code

    International Nuclear Information System (INIS)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged

  19. Efficient Coding of Information: Huffman Coding -RE ...

    Indian Academy of Sciences (India)

    to a stream of equally-likely symbols so as to recover the original stream in the event of errors. The for- ... The source-coding problem is one of finding a mapping from U to a ... probability that the random variable X takes the value x written as ...

  20. NR-code: Nonlinear reconstruction code

    Science.gov (United States)

    Yu, Yu; Pen, Ue-Li; Zhu, Hong-Ming

    2018-04-01

    NR-code applies nonlinear reconstruction to the dark matter density field in redshift space and solves for the nonlinear mapping from the initial Lagrangian positions to the final redshift space positions; this reverses the large-scale bulk flows and improves the precision measurement of the baryon acoustic oscillations (BAO) scale.

  1. Improving the accuracy of operation coding in surgical discharge summaries

    Science.gov (United States)

    Martinou, Eirini; Shouls, Genevieve; Betambeau, Nadine

    2014-01-01

    Procedural coding in surgical discharge summaries is extremely important; as well as communicating to healthcare staff which procedures have been performed, it also provides information that is used by the hospital's coding department. The OPCS code (Office of Population, Censuses and Surveys Classification of Surgical Operations and Procedures) is used to generate the tariff that allows the hospital to be reimbursed for the procedure. We felt that the OPCS coding on discharge summaries was often incorrect within our breast and endocrine surgery department. A baseline measurement over two months demonstrated that 32% of operations had been incorrectly coded, resulting in an incorrect tariff being applied and an estimated loss to the Trust of £17,000. We developed a simple but specific OPCS coding table in collaboration with the clinical coding team and breast surgeons that summarised all operations performed within our department. This table was disseminated across the team, specifically to the junior doctors who most frequently complete the discharge summaries. Re-audit showed 100% of operations were accurately coded, demonstrating the effectiveness of the coding table. We suggest that specifically designed coding tables be introduced across each surgical department to ensure accurate OPCS codes are used to produce better quality surgical discharge summaries and to ensure correct reimbursement to the Trust. PMID:26734286

  2. [Thymus surgery in a general surgery department].

    Science.gov (United States)

    Mega, Raquel; Coelho, Fátima; Pimentel, Teresa; Ribero, Rui; Matos, Novo de; Araújo, António

    2005-01-01

    Evaluation of thymectomy cases between 1990-2003, in a General Surgery Department. Evaluation of the therapeutic efficacy in Miastenia Gravis patients. Retrospective study based on evaluation of data from Serviço de Cirurgia, Neurologia and Consult de Neurology processes, between 1990-2003, of 15 patients submitted to total thymectomy. 15 patients, aged 17 to 72, 11 female and 4 male. Miastenia Gravis was the main indication for surgery, for uncontrollable symptoms or suspicion of thymoma. In patients with myasthenia, surgery was accomplish after compensation of symptoms. There weren't post-surgery complications. Pathology were divided in thymic hyperplasia and thymoma. Miastenia patients have there symptoms diminished or stable with reduction or cessation of medical therapy. Miastenia was the most frequent indication for thymectomy. Surgery was good results, with low morbimortality, as long as the protocols are respected.

  3. [Hand surgery in the German DRG System 2007].

    Science.gov (United States)

    Franz, D; Windolf, J; Kaufmann, M; Siebert, C H; Roeder, N

    2007-05-01

    Hand surgery often needs only a short length of stay in hospital. Patients' comorbidity is low. Many hand surgery procedures do not need inpatient structures. Up until 2006 special procedures of hand surgery could not be coded. The DRG structure did not separate very complex and less complex operations. Specialized hospitals needed a proper case allocation of their patients within the G-DRG system. The DRG structure concerning hand surgery increased in version 2007 of the G-DRG system. The main parameter of DRG splitting is the complexity of the operation. Furthermore additional criteria such as more than one significant OR procedure, the patients' age, or special diagnoses influence case allocation. A special OPS code for complex cases treated with hand surgery was implemented. The changes in the DRG structure and the implementation of the new OPS code for complex cases establish a strong basis for the identification of different patient costs. Different case allocation leads to different economic impacts on departments of hand surgery. Whether the new OPS code becomes a DRG splitting parameter has to be calculated by the German DRG Institute for further DRG versions.

  4. Nutrition Following Pancreatic Surgery

    Science.gov (United States)

    ... BACK Contact Us DONATE NOW GENERAL DONATION PURPLESTRIDE Nutrition Following Pancreatic Surgery Home Facing Pancreatic Cancer Living with Pancreatic Cancer Diet and Nutrition Nutrition Following Pancreatic Surgery Ver esta página en ...

  5. Blood donation before surgery

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/patientinstructions/000367.htm Blood donation before surgery To use the sharing features on ... team. Related MedlinePlus Health Topics Blood Transfusion and Donation Surgery Browse the Encyclopedia A.D.A.M., ...

  6. Cosmetic ear surgery

    Science.gov (United States)

    Otoplasty; Ear pinning; Ear surgery - cosmetic; Ear reshaping; Pinnaplasty ... Cosmetic ear surgery may be done in the surgeon's office, an outpatient clinic, or a hospital. It can be performed under ...

  7. Open heart surgery

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/article/002950.htm Open heart surgery To use the sharing features on this ... large arteries connected to the heart. The term "open heart surgery" means that you are connected to a ...

  8. Pediatric heart surgery - discharge

    Science.gov (United States)

    ... discharge; Heart valve surgery - children - discharge; Heart surgery - pediatric - discharge; Heart transplant - pediatric - discharge ... Geme JW, Schor NF, eds. Nelson Textbook of Pediatrics . 20th ed. Philadelphia, PA: Elsevier; 2016:chap 434. ...

  9. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... misalignment of jaws and teeth. Surgery can improve chewing, speaking and breathing. While the patient's appearance may ... indicate the need for corrective jaw surgery: Difficulty chewing, or biting food Difficulty swallowing Chronic jaw or ...

  10. Refractive corneal surgery - discharge

    Science.gov (United States)

    ... surgery. Avoid contact sports (such as boxing and football) for the first 4 weeks after surgery. DO ... herein should not be used during any medical emergency or for the diagnosis or treatment of any ...

  11. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... best performed by a trained surgeon with specialized education and training. Click here to find out more. ... more. Facial Cosmetic Surgery Facial Cosmetic Surgery Extensive education and training in surgical procedures involving skin, muscle, ...

  12. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... more surgeries depending on the extent of the repair needed. Click here to find out more. Corrective ... more surgeries depending on the extent of the repair needed. Click here to find out more. Corrective ...

  13. Surgery for pancreatic cancer

    Science.gov (United States)

    ... laparoscopically (using a tiny video camera) or using robotic surgery depends on: The extent of the surgery ... by URAC, also known as the American Accreditation HealthCare Commission (www.urac.org). URAC's accreditation program is ...

  14. Anti-reflux surgery

    Science.gov (United States)

    ... surgery. You may need another surgery in the future if you develop new reflux symptoms or swallowing ... Diseases of the esophagus. In: Goldman L, Schafer AI, eds. Goldman-Cecil Medicine . 25th ed. Philadelphia, PA: ...

  15. Blepharoplasty (Eyelid Surgery)

    Science.gov (United States)

    ... Blepharoplasty (BLEF-uh-roe-plas-tee) is a type of surgery that repairs droopy eyelids and may involve ... tobacco and drugs. Your expectations. An honest discussion of your hopes and motivation for surgery will help set the stage for ...

  16. Smoking and surgery

    Science.gov (United States)

    Surgery - quitting smoking; Surgery - quitting tobacco; Wound healing - smoking ... Tar, nicotine, and other chemicals from smoking can increase your risk of many health problems. These include heart and blood vessel problems, such as: Blood clots and aneurysms in ...

  17. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... Jaw Surgery Download Download the ebook for further information Corrective jaw, or orthognathic surgery is performed by ... your treatment. Correction of Common Dentofacial Deformities ​ ​ The information provided here is not intended as a substitute ...

  18. Cosmetic breast surgery - discharge

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000273.htm Cosmetic breast surgery - discharge To use the sharing features on this page, please enable JavaScript. You had cosmetic breast surgery to change the size or shape ...

  19. Shoulder surgery - discharge

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000179.htm Shoulder surgery - discharge To use the sharing features on this page, please enable JavaScript. You had shoulder surgery to repair the tissues inside or around your ...

  20. Weight Loss Surgery

    Science.gov (United States)

    Weight loss surgery helps people with extreme obesity to lose weight. It may be an option if you cannot lose weight ... obesity. There are different types of weight loss surgery. They often limit the amount of food you ...

  1. Emergency general surgery: definition and estimated burden of disease.

    Science.gov (United States)

    Shafi, Shahid; Aboutanos, Michel B; Agarwal, Suresh; Brown, Carlos V R; Crandall, Marie; Feliciano, David V; Guillamondegui, Oscar; Haider, Adil; Inaba, Kenji; Osler, Turner M; Ross, Steven; Rozycki, Grace S; Tominaga, Gail T

    2013-04-01

    Acute care surgery encompasses trauma, surgical critical care, and emergency general surgery (EGS). While the first two components are well defined, the scope of EGS practice remains unclear. This article describes the work of the American Association for the Surgery of Trauma to define EGS. A total of 621 unique International Classification of Diseases-9th Rev. (ICD-9) diagnosis codes were identified using billing data (calendar year 2011) from seven large academic medical centers that practice EGS. A modified Delphi methodology was used by the American Association for the Surgery of Trauma Committee on Severity Assessment and Patient Outcomes to review these codes and achieve consensus on the definition of primary EGS diagnosis codes. National Inpatient Sample data from 2009 were used to develop a national estimate of EGS burden of disease. Several unique ICD-9 codes were identified as primary EGS diagnoses. These encompass a wide spectrum of general surgery practice, including upper and lower gastrointestinal tract, hepatobiliary and pancreatic disease, soft tissue infections, and hernias. National Inpatient Sample estimates revealed over 4 million inpatient encounters nationally in 2009 for EGS diseases. This article provides the first list of ICD-9 diagnoses codes that define the scope of EGS based on current clinical practices. These findings have wide implications for EGS workforce training, access to care, and research.

  2. Synthesizing Certified Code

    Science.gov (United States)

    Whalen, Michael; Schumann, Johann; Fischer, Bernd

    2002-01-01

    Code certification is a lightweight approach to demonstrate software quality on a formal level. Its basic idea is to require producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates which can be checked independently. Since code certification uses the same underlying technology as program verification, it also requires many detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding theses annotations to the code is time-consuming and error-prone. We address this problem by combining code certification with automatic program synthesis. We propose an approach to generate simultaneously, from a high-level specification, code and all annotations required to certify generated code. Here, we describe a certification extension of AUTOBAYES, a synthesis tool which automatically generates complex data analysis programs from compact specifications. AUTOBAYES contains sufficient high-level domain knowledge to generate detailed annotations. This allows us to use a general-purpose verification condition generator to produce a set of proof obligations in first-order logic. The obligations are then discharged using the automated theorem E-SETHEO. We demonstrate our approach by certifying operator safety for a generated iterative data classification program without manual annotation of the code.

  3. Code of Ethics

    Science.gov (United States)

    Division for Early Childhood, Council for Exceptional Children, 2009

    2009-01-01

    The Code of Ethics of the Division for Early Childhood (DEC) of the Council for Exceptional Children is a public statement of principles and practice guidelines supported by the mission of DEC. The foundation of this Code is based on sound ethical reasoning related to professional practice with young children with disabilities and their families…

  4. Interleaved Product LDPC Codes

    OpenAIRE

    Baldi, Marco; Cancellieri, Giovanni; Chiaraluce, Franco

    2011-01-01

    Product LDPC codes take advantage of LDPC decoding algorithms and the high minimum distance of product codes. We propose to add suitable interleavers to improve the waterfall performance of LDPC decoding. Interleaving also reduces the number of low weight codewords, that gives a further advantage in the error floor region.

  5. Insurance billing and coding.

    Science.gov (United States)

    Napier, Rebecca H; Bruelheide, Lori S; Demann, Eric T K; Haug, Richard H

    2008-07-01

    The purpose of this article is to highlight the importance of understanding various numeric and alpha-numeric codes for accurately billing dental and medically related services to private pay or third-party insurance carriers. In the United States, common dental terminology (CDT) codes are most commonly used by dentists to submit claims, whereas current procedural terminology (CPT) and International Classification of Diseases, Ninth Revision, Clinical Modification (ICD.9.CM) codes are more commonly used by physicians to bill for their services. The CPT and ICD.9.CM coding systems complement each other in that CPT codes provide the procedure and service information and ICD.9.CM codes provide the reason or rationale for a particular procedure or service. These codes are more commonly used for "medical necessity" determinations, and general dentists and specialists who routinely perform care, including trauma-related care, biopsies, and dental treatment as a result of or in anticipation of a cancer-related treatment, are likely to use these codes. Claim submissions for care provided can be completed electronically or by means of paper forms.

  6. Error Correcting Codes

    Indian Academy of Sciences (India)

    Science and Automation at ... the Reed-Solomon code contained 223 bytes of data, (a byte ... then you have a data storage system with error correction, that ..... practical codes, storing such a table is infeasible, as it is generally too large.

  7. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Lene; Pries-Heje, Jan; Dalgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  8. RFQ simulation code

    International Nuclear Information System (INIS)

    Lysenko, W.P.

    1984-04-01

    We have developed the RFQLIB simulation system to provide a means to systematically generate the new versions of radio-frequency quadrupole (RFQ) linac simulation codes that are required by the constantly changing needs of a research environment. This integrated system simplifies keeping track of the various versions of the simulation code and makes it practical to maintain complete and up-to-date documentation. In this scheme, there is a certain standard version of the simulation code that forms a library upon which new versions are built. To generate a new version of the simulation code, the routines to be modified or added are appended to a standard command file, which contains the commands to compile the new routines and link them to the routines in the library. The library itself is rarely changed. Whenever the library is modified, however, this modification is seen by all versions of the simulation code, which actually exist as different versions of the command file. All code is written according to the rules of structured programming. Modularity is enforced by not using COMMON statements, simplifying the relation of the data flow to a hierarchy diagram. Simulation results are similar to those of the PARMTEQ code, as expected, because of the similar physical model. Different capabilities, such as those for generating beams matched in detail to the structure, are available in the new code for help in testing new ideas in designing RFQ linacs

  9. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 3. Error Correcting Codes - Reed Solomon Codes. Priti Shankar. Series Article Volume 2 Issue 3 March ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560 012, India ...

  10. Robotic liver surgery

    Science.gov (United States)

    Leung, Universe

    2014-01-01

    Robotic surgery is an evolving technology that has been successfully applied to a number of surgical specialties, but its use in liver surgery has so far been limited. In this review article we discuss the challenges of minimally invasive liver surgery, the pros and cons of robotics, the evolution of medical robots, and the potentials in applying this technology to liver surgery. The current data in the literature are also presented. PMID:25392840

  11. 78 FR 18321 - International Code Council: The Update Process for the International Codes and Standards

    Science.gov (United States)

    2013-03-26

    ... Energy Conservation Code. International Existing Building Code. International Fire Code. International... Code. International Property Maintenance Code. International Residential Code. International Swimming Pool and Spa Code International Wildland-Urban Interface Code. International Zoning Code. ICC Standards...

  12. Validation of thermalhydraulic codes

    International Nuclear Information System (INIS)

    Wilkie, D.

    1992-01-01

    Thermalhydraulic codes require to be validated against experimental data collected over a wide range of situations if they are to be relied upon. A good example is provided by the nuclear industry where codes are used for safety studies and for determining operating conditions. Errors in the codes could lead to financial penalties, to the incorrect estimation of the consequences of accidents and even to the accidents themselves. Comparison between prediction and experiment is often described qualitatively or in approximate terms, e.g. ''agreement is within 10%''. A quantitative method is preferable, especially when several competing codes are available. The codes can then be ranked in order of merit. Such a method is described. (Author)

  13. Fracture flow code

    International Nuclear Information System (INIS)

    Dershowitz, W; Herbert, A.; Long, J.

    1989-03-01

    The hydrology of the SCV site will be modelled utilizing discrete fracture flow models. These models are complex, and can not be fully cerified by comparison to analytical solutions. The best approach for verification of these codes is therefore cross-verification between different codes. This is complicated by the variation in assumptions and solution techniques utilized in different codes. Cross-verification procedures are defined which allow comparison of the codes developed by Harwell Laboratory, Lawrence Berkeley Laboratory, and Golder Associates Inc. Six cross-verification datasets are defined for deterministic and stochastic verification of geometric and flow features of the codes. Additional datasets for verification of transport features will be documented in a future report. (13 figs., 7 tabs., 10 refs.) (authors)

  14. Breast Cancer Surgery

    Science.gov (United States)

    FACTS FOR LIFE Breast Cancer Surgery The goal of breast cancer surgery is to remove the whole tumor from the breast. Some lymph nodes ... might still be in the body. Types of breast cancer surgery There are two types of breast cancer ...

  15. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... their surgery, orthognathic surgery is performed to correct functional problems. Jaw Surgery can have a dramatic effect on many aspects of life. Following are some of the conditions that may ... front, or side Facial injury Birth defects Receding lower jaw and ...

  16. Pediatric heart surgery

    Science.gov (United States)

    Heart surgery - pediatric; Heart surgery for children; Acquired heart disease; Heart valve surgery - children ... There are many kinds of heart defects. Some are minor, and others are more serious. Defects can occur inside the heart or in the large blood vessels ...

  17. Huffman coding in advanced audio coding standard

    Science.gov (United States)

    Brzuchalski, Grzegorz

    2012-05-01

    This article presents several hardware architectures of Advanced Audio Coding (AAC) Huffman noiseless encoder, its optimisations and working implementation. Much attention has been paid to optimise the demand of hardware resources especially memory size. The aim of design was to get as short binary stream as possible in this standard. The Huffman encoder with whole audio-video system has been implemented in FPGA devices.

  18. Using your shoulder after surgery

    Science.gov (United States)

    Shoulder surgery - using your shoulder; Shoulder surgery - after ... rotator cuff surgery or other ligament or labral surgery, you need to be careful with your shoulder. Ask the surgeon what arm movements are safe ...

  19. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  20. Report number codes

    International Nuclear Information System (INIS)

    Nelson, R.N.

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name

  1. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  2. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  3. Transport theory and codes

    International Nuclear Information System (INIS)

    Clancy, B.E.

    1986-01-01

    This chapter begins with a neutron transport equation which includes the one dimensional plane geometry problems, the one dimensional spherical geometry problems, and numerical solutions. The section on the ANISN code and its look-alikes covers problems which can be solved; eigenvalue problems; outer iteration loop; inner iteration loop; and finite difference solution procedures. The input and output data for ANISN is also discussed. Two dimensional problems such as the DOT code are given. Finally, an overview of the Monte-Carlo methods and codes are elaborated on

  4. Gravity inversion code

    International Nuclear Information System (INIS)

    Burkhard, N.R.

    1979-01-01

    The gravity inversion code applies stabilized linear inverse theory to determine the topography of a subsurface density anomaly from Bouguer gravity data. The gravity inversion program consists of four source codes: SEARCH, TREND, INVERT, and AVERAGE. TREND and INVERT are used iteratively to converge on a solution. SEARCH forms the input gravity data files for Nevada Test Site data. AVERAGE performs a covariance analysis on the solution. This document describes the necessary input files and the proper operation of the code. 2 figures, 2 tables

  5. A Population-Based Analysis of Time to Surgery and Travel Distances for Brachial Plexus Surgery.

    Science.gov (United States)

    Dy, Christopher J; Baty, Jack; Saeed, Mohammed J; Olsen, Margaret A; Osei, Daniel A

    2016-09-01

    Despite the importance of timely evaluation for patients with brachial plexus injuries (BPIs), in clinical practice we have noted delays in referral. Because the published BPI experience is largely from individual centers, we used a population-based approach to evaluate the delivery of care for patients with BPI. We used statewide administrative databases from Florida (2007-2013), New York (2008-2012), and North Carolina (2009-2010) to create a cohort of patients who underwent surgery for BPI (exploration, repair, neurolysis, grafting, or nerve transfer). Emergency department and inpatient records were used to determine the time interval between the injury and surgical treatment. Distances between treating hospitals and between the patient's home ZIP code and the surgical hospital were recorded. A multivariable logistic regression model was used to determine predictors for time from injury to surgery exceeding 365 days. Within the 222 patients in our cohort, median time from injury to surgery was 7.6 months and exceeded 365 days in 29% (64 of 222 patients) of cases. Treatment at a smaller hospital for the initial injury was significantly associated with surgery beyond 365 days after injury. Patient insurance type, travel distance for surgery, distance between the 2 treating hospitals, and changing hospitals between injury and surgery did not significantly influence time to surgery. Nearly one third of patients in Florida, New York, and North Carolina underwent BPI surgery more than 1 year after the injury. Patients initially treated at smaller hospitals are at risk for undergoing delayed BPI surgery. These findings can inform administrative and policy efforts to expedite timely referral of patients with BPI to experienced centers. Copyright © 2016 American Society for Surgery of the Hand. Published by Elsevier Inc. All rights reserved.

  6. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  7. Supervised Convolutional Sparse Coding

    KAUST Repository

    Affara, Lama Ahmed; Ghanem, Bernard; Wonka, Peter

    2018-01-01

    coding, which aims at learning discriminative dictionaries instead of purely reconstructive ones. We incorporate a supervised regularization term into the traditional unsupervised CSC objective to encourage the final dictionary elements

  8. SASSYS LMFBR systems code

    International Nuclear Information System (INIS)

    Dunn, F.E.; Prohammer, F.G.; Weber, D.P.

    1983-01-01

    The SASSYS LMFBR systems analysis code is being developed mainly to analyze the behavior of the shut-down heat-removal system and the consequences of failures in the system, although it is also capable of analyzing a wide range of transients, from mild operational transients through more severe transients leading to sodium boiling in the core and possible melting of clad and fuel. The code includes a detailed SAS4A multi-channel core treatment plus a general thermal-hydraulic treatment of the primary and intermediate heat-transport loops and the steam generators. The code can handle any LMFBR design, loop or pool, with an arbitrary arrangement of components. The code is fast running: usually faster than real time

  9. OCA Code Enforcement

    Data.gov (United States)

    Montgomery County of Maryland — The Office of the County Attorney (OCA) processes Code Violation Citations issued by County agencies. The citations can be viewed by issued department, issued date...

  10. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  11. Code Disentanglement: Initial Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wohlbier, John Greaton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kelley, Timothy M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rockefeller, Gabriel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Calef, Matthew Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  12. Induction technology optimization code

    International Nuclear Information System (INIS)

    Caporaso, G.J.; Brooks, A.L.; Kirbie, H.C.

    1992-01-01

    A code has been developed to evaluate relative costs of induction accelerator driver systems for relativistic klystrons. The code incorporates beam generation, transport and pulsed power system constraints to provide an integrated design tool. The code generates an injector/accelerator combination which satisfies the top level requirements and all system constraints once a small number of design choices have been specified (rise time of the injector voltage and aspect ratio of the ferrite induction cores, for example). The code calculates dimensions of accelerator mechanical assemblies and values of all electrical components. Cost factors for machined parts, raw materials and components are applied to yield a total system cost. These costs are then plotted as a function of the two design choices to enable selection of an optimum design based on various criteria. (Author) 11 refs., 3 figs

  13. VT ZIP Code Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) A ZIP Code Tabulation Area (ZCTA) is a statistical geographic entity that approximates the delivery area for a U.S. Postal Service five-digit...

  14. Bandwidth efficient coding

    CERN Document Server

    Anderson, John B

    2017-01-01

    Bandwidth Efficient Coding addresses the major challenge in communication engineering today: how to communicate more bits of information in the same radio spectrum. Energy and bandwidth are needed to transmit bits, and bandwidth affects capacity the most. Methods have been developed that are ten times as energy efficient at a given bandwidth consumption as simple methods. These employ signals with very complex patterns and are called "coding" solutions. The book begins with classical theory before introducing new techniques that combine older methods of error correction coding and radio transmission in order to create narrowband methods that are as efficient in both spectrum and energy as nature allows. Other topics covered include modulation techniques such as CPM, coded QAM and pulse design.

  15. Reactor lattice codes

    International Nuclear Information System (INIS)

    Kulikowska, T.

    2001-01-01

    The description of reactor lattice codes is carried out on the example of the WIMSD-5B code. The WIMS code in its various version is the most recognised lattice code. It is used in all parts of the world for calculations of research and power reactors. The version WIMSD-5B is distributed free of charge by NEA Data Bank. The description of its main features given in the present lecture follows the aspects defined previously for lattice calculations in the lecture on Reactor Lattice Transport Calculations. The spatial models are described, and the approach to the energy treatment is given. Finally the specific algorithm applied in fuel depletion calculations is outlined. (author)

  16. Cost Differences Between Open and Minimally Invasive Surgery.

    Science.gov (United States)

    Fitch, Kathryn; Engel, Tyler; Bochner, Andrew

    2015-09-01

    To analyze the cost difference between minimally invasive surgery (MIS) and open surgery from a commercial payer perspective for colectomy, ventral hernia repair, thoracic resection (resection of the lung), and hysterectomy. A retrospective claims data analysis was conducted using the 2011 and 2012 Truven Health Analytics MarketScan Commercial Claims and Encounter Database. Study eligibility criteria included age 18-64 years, pharmacy coverage, ≥ 1 month of eligibility in 2012, and a claim coded with 1 of the 4 surgical procedures of interest; the index year was 2012. Average allowed facility and professional costs were calculated during inpatient stay (or day of surgery for outpatient hysterectomy) and the 30 days after discharge for MIS vs open surgery. Cost difference was compared after adjusting for presence of cancer, geographic region, and risk profile (age, gender, and comorbidities). In total, 46,386 cases in the 2012 MarketScan database represented one of the surgeries of interest. The difference in average allowed surgical procedure cost (facility and professional) between open surgery vs adjusted MIS was $10,204 for colectomy; $3,721, ventral hernia repair; $12,989, thoracic resection; and $1,174, noncancer hysterectomy (P average allowed cost in the 30 days after surgery between open surgery vs adjusted MIS was $1,494 for colectomy, $1,320 for ventral hernia repair, negative $711 for thoracic resection, and negative $425 for noncancer hysterectomy (P costs than open surgery for all 4 analyzed surgeries.

  17. Critical Care Coding for Neurologists.

    Science.gov (United States)

    Nuwer, Marc R; Vespa, Paul M

    2015-10-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  18. Lattice Index Coding

    OpenAIRE

    Natarajan, Lakshmi; Hong, Yi; Viterbo, Emanuele

    2014-01-01

    The index coding problem involves a sender with K messages to be transmitted across a broadcast channel, and a set of receivers each of which demands a subset of the K messages while having prior knowledge of a different subset as side information. We consider the specific case of noisy index coding where the broadcast channel is Gaussian and every receiver demands all the messages from the source. Instances of this communication problem arise in wireless relay networks, sensor networks, and ...

  19. Towards advanced code simulators

    International Nuclear Information System (INIS)

    Scriven, A.H.

    1990-01-01

    The Central Electricity Generating Board (CEGB) uses advanced thermohydraulic codes extensively to support PWR safety analyses. A system has been developed to allow fully interactive execution of any code with graphical simulation of the operator desk and mimic display. The system operates in a virtual machine environment, with the thermohydraulic code executing in one virtual machine, communicating via interrupts with any number of other virtual machines each running other programs and graphics drivers. The driver code itself does not have to be modified from its normal batch form. Shortly following the release of RELAP5 MOD1 in IBM compatible form in 1983, this code was used as the driver for this system. When RELAP5 MOD2 became available, it was adopted with no changes needed in the basic system. Overall the system has been used for some 5 years for the analysis of LOBI tests, full scale plant studies and for simple what-if studies. For gaining rapid understanding of system dependencies it has proved invaluable. The graphical mimic system, being independent of the driver code, has also been used with other codes to study core rewetting, to replay results obtained from batch jobs on a CRAY2 computer system and to display suitably processed experimental results from the LOBI facility to aid interpretation. For the above work real-time execution was not necessary. Current work now centers on implementing the RELAP 5 code on a true parallel architecture machine. Marconi Simulation have been contracted to investigate the feasibility of using upwards of 100 processors, each capable of a peak of 30 MIPS to run a highly detailed RELAP5 model in real time, complete with specially written 3D core neutronics and balance of plant models. This paper describes the experience of using RELAP5 as an analyzer/simulator, and outlines the proposed methods and problems associated with parallel execution of RELAP5

  20. Cracking the Gender Codes

    DEFF Research Database (Denmark)

    Rennison, Betina Wolfgang

    2016-01-01

    extensive work to raise the proportion of women. This has helped slightly, but women remain underrepresented at the corporate top. Why is this so? What can be done to solve it? This article presents five different types of answers relating to five discursive codes: nature, talent, business, exclusion...... in leadership management, we must become more aware and take advantage of this complexity. We must crack the codes in order to crack the curve....

  1. PEAR code review

    International Nuclear Information System (INIS)

    De Wit, R.; Jamieson, T.; Lord, M.; Lafortune, J.F.

    1997-07-01

    As a necessary component in the continuous improvement and refinement of methodologies employed in the nuclear industry, regulatory agencies need to periodically evaluate these processes to improve confidence in results and ensure appropriate levels of safety are being achieved. The independent and objective review of industry-standard computer codes forms an essential part of this program. To this end, this work undertakes an in-depth review of the computer code PEAR (Public Exposures from Accidental Releases), developed by Atomic Energy of Canada Limited (AECL) to assess accidental releases from CANDU reactors. PEAR is based largely on the models contained in the Canadian Standards Association (CSA) N288.2-M91. This report presents the results of a detailed technical review of the PEAR code to identify any variations from the CSA standard and other supporting documentation, verify the source code, assess the quality of numerical models and results, and identify general strengths and weaknesses of the code. The version of the code employed in this review is the one which AECL intends to use for CANDU 9 safety analyses. (author)

  2. KENO-V code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The KENO-V code is the current release of the Oak Ridge multigroup Monte Carlo criticality code development. The original KENO, with 16 group Hansen-Roach cross sections and P 1 scattering, was one ot the first multigroup Monte Carlo codes and it and its successors have always been a much-used research tool for criticality studies. KENO-V is able to accept large neutron cross section libraries (a 218 group set is distributed with the code) and has a general P/sub N/ scattering capability. A supergroup feature allows execution of large problems on small computers, but at the expense of increased calculation time and system input/output operations. This supergroup feature is activated automatically by the code in a manner which utilizes as much computer memory as is available. The primary purpose of KENO-V is to calculate the system k/sub eff/, from small bare critical assemblies to large reflected arrays of differing fissile and moderator elements. In this respect KENO-V neither has nor requires the many options and sophisticated biasing techniques of general Monte Carlo codes

  3. Code, standard and specifications

    International Nuclear Information System (INIS)

    Abdul Nassir Ibrahim; Azali Muhammad; Ab. Razak Hamzah; Abd. Aziz Mohamed; Mohamad Pauzi Ismail

    2008-01-01

    Radiography also same as the other technique, it need standard. This standard was used widely and method of used it also regular. With that, radiography testing only practical based on regulations as mentioned and documented. These regulation or guideline documented in code, standard and specifications. In Malaysia, level one and basic radiographer can do radiography work based on instruction give by level two or three radiographer. This instruction was produced based on guideline that mention in document. Level two must follow the specifications mentioned in standard when write the instruction. From this scenario, it makes clearly that this radiography work is a type of work that everything must follow the rule. For the code, the radiography follow the code of American Society for Mechanical Engineer (ASME) and the only code that have in Malaysia for this time is rule that published by Atomic Energy Licensing Board (AELB) known as Practical code for radiation Protection in Industrial radiography. With the existence of this code, all the radiography must follow the rule or standard regulated automatically.

  4. DEVELOPMENT OF PLASTIC SURGERY.

    Science.gov (United States)

    Pećanac, Marija Đ

    2015-01-01

    Plastic surgery is a medical specialty dealing with corrections of defects, improvements in appearance and restoration of lost function. Ancient times. The first recorded account of reconstructive plastic surgery was found in ancient Indian Sanskrit texts, which described reconstructive surgeries of the nose and ears. In ancient Greece and Rome, many medicine men performed simple plastic cosmetic surgeries to repair damaged parts of the body caused by war mutilation, punishment or humiliation. In the Middle Ages, the development of all medical braches, including plastic surgery was hindered. New age. The interest in surgical reconstruction of mutilated body parts was renewed in the XVIII century by a great number of enthusiastic and charismatic surgeons, who mastered surgical disciplines and became true artists that created new forms. Modern era. In the XX century, plastic surgery developed as a modern branch in medicine including many types of reconstructive surgery, hand, head and neck surgery, microsurgery and replantation, treatment of burns and their sequelae, and esthetic surgery. Contemporary and future plastic surgery will continue to evolve and improve with regenerative medicine and tissue engineering resulting in a lot of benefits to be gained by patients in reconstruction after body trauma, oncology amputation, and for congenital disfigurement and dysfunction.

  5. Fast Coding Unit Encoding Mechanism for Low Complexity Video Coding

    OpenAIRE

    Gao, Yuan; Liu, Pengyu; Wu, Yueying; Jia, Kebin; Gao, Guandong

    2016-01-01

    In high efficiency video coding (HEVC), coding tree contributes to excellent compression performance. However, coding tree brings extremely high computational complexity. Innovative works for improving coding tree to further reduce encoding time are stated in this paper. A novel low complexity coding tree mechanism is proposed for HEVC fast coding unit (CU) encoding. Firstly, this paper makes an in-depth study of the relationship among CU distribution, quantization parameter (QP) and content ...

  6. SPECTRAL AMPLITUDE CODING OCDMA SYSTEMS USING ENHANCED DOUBLE WEIGHT CODE

    Directory of Open Access Journals (Sweden)

    F.N. HASOON

    2006-12-01

    Full Text Available A new code structure for spectral amplitude coding optical code division multiple access systems based on double weight (DW code families is proposed. The DW has a fixed weight of two. Enhanced double-weight (EDW code is another variation of a DW code family that can has a variable weight greater than one. The EDW code possesses ideal cross-correlation properties and exists for every natural number n. A much better performance can be provided by using the EDW code compared to the existing code such as Hadamard and Modified Frequency-Hopping (MFH codes. It has been observed that theoretical analysis and simulation for EDW is much better performance compared to Hadamard and Modified Frequency-Hopping (MFH codes.

  7. Ergonomics in laparoscopic surgery

    Directory of Open Access Journals (Sweden)

    Supe Avinash

    2010-01-01

    Full Text Available Laparoscopic surgery provides patients with less painful surgery but is more demanding for the surgeon. The increased technological complexity and sometimes poorly adapted equipment have led to increased complaints of surgeon fatigue and discomfort during laparoscopic surgery. Ergonomic integration and suitable laparoscopic operating room environment are essential to improve efficiency, safety, and comfort for the operating team. Understanding ergonomics can not only make life of surgeon comfortable in the operating room but also reduce physical strains on surgeon.

  8. Gastric and intestinal surgery.

    Science.gov (United States)

    Fossum, Theresa W; Hedlund, Cheryl S

    2003-09-01

    Gastric surgery is commonly performed to remove foreign bodies and correct gastric dilatation-volvulus and is less commonly performed to treat gastric ulceration or erosion, neoplasia, and benign gastric outflow obstruction. Intestinal surgery, although commonly performed by veterinarians, should never be considered routine. The most common procedures of the small intestinal tract performed in dogs and cats include enterotomy and resection/anastomosis. Surgery of the large intestine is indicated for lesions causing obstruction, perforations, colonic inertia, or chronic inflammation.

  9. Nuclear code abstracts (1975 edition)

    International Nuclear Information System (INIS)

    Akanuma, Makoto; Hirakawa, Takashi

    1976-02-01

    Nuclear Code Abstracts is compiled in the Nuclear Code Committee to exchange information of the nuclear code developments among members of the committee. Enlarging the collection, the present one includes nuclear code abstracts obtained in 1975 through liaison officers of the organizations in Japan participating in the Nuclear Energy Agency's Computer Program Library at Ispra, Italy. The classification of nuclear codes and the format of code abstracts are the same as those in the library. (auth.)

  10. Some new ternary linear codes

    Directory of Open Access Journals (Sweden)

    Rumen Daskalov

    2017-07-01

    Full Text Available Let an $[n,k,d]_q$ code be a linear code of length $n$, dimension $k$ and minimum Hamming distance $d$ over $GF(q$. One of the most important problems in coding theory is to construct codes with optimal minimum distances. In this paper 22 new ternary linear codes are presented. Two of them are optimal. All new codes improve the respective lower bounds in [11].

  11. Surgery: a risky business.

    Science.gov (United States)

    Vats, Amit; Nagpal, Kamal; Moorthy, Krishna

    2009-10-01

    The advancement of surgical technology has made surgery an increasingly suitable management option for an increasing number of medical conditions. Yet there is also a growing concern about the number of patients coming to harm as a result of surgery. Studies show that this harm can be prevented by better teamwork and communication in operating theatres. This article discusses the extent of adverse events in surgery and how effective teamwork and communication can improve patient safety. It also highlights the role checklists and briefing in improving teamwork and reducing human error in surgery.

  12. Heart valve surgery

    Science.gov (United States)

    ... replacement; Valve repair; Heart valve prosthesis; Mechanical valves; Prosthetic valves ... surgery. Your heart valve has been damaged by infection ( endocarditis ). You have received a new heart valve ...

  13. ACE - Manufacturer Identification Code (MID)

    Data.gov (United States)

    Department of Homeland Security — The ACE Manufacturer Identification Code (MID) application is used to track and control identifications codes for manufacturers. A manufacturer is identified on an...

  14. Algebraic and stochastic coding theory

    CERN Document Server

    Kythe, Dave K

    2012-01-01

    Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.

  15. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  16. The Aster code

    International Nuclear Information System (INIS)

    Delbecq, J.M.

    1999-01-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  17. Adaptive distributed source coding.

    Science.gov (United States)

    Varodayan, David; Lin, Yao-Chung; Girod, Bernd

    2012-05-01

    We consider distributed source coding in the presence of hidden variables that parameterize the statistical dependence among sources. We derive the Slepian-Wolf bound and devise coding algorithms for a block-candidate model of this problem. The encoder sends, in addition to syndrome bits, a portion of the source to the decoder uncoded as doping bits. The decoder uses the sum-product algorithm to simultaneously recover the source symbols and the hidden statistical dependence variables. We also develop novel techniques based on density evolution (DE) to analyze the coding algorithms. We experimentally confirm that our DE analysis closely approximates practical performance. This result allows us to efficiently optimize parameters of the algorithms. In particular, we show that the system performs close to the Slepian-Wolf bound when an appropriate doping rate is selected. We then apply our coding and analysis techniques to a reduced-reference video quality monitoring system and show a bit rate saving of about 75% compared with fixed-length coding.

  18. Prioritizing quality improvement in general surgery.

    Science.gov (United States)

    Schilling, Peter L; Dimick, Justin B; Birkmeyer, John D

    2008-11-01

    Despite growing interest in quality improvement, uncertainty remains about which procedures offer the most room for improvement in general surgery. In this context, we sought to describe the relative contribution of different procedures to overall morbidity, mortality, and excess length of stay in general surgery. Using data from the American College of Surgeons' National Surgery Quality Improvement Program (ACS-NSQIP), we identified all patients undergoing a general surgery procedure in 2005 and 2006 (n=129,233). Patients were placed in 36 distinct procedure groups based on Current Procedural Terminology codes. We first examined procedure groups according to their relative contribution to overall morbidity and mortality. We then assessed procedure groups according to their contribution to overall excess length of stay. Ten procedure groups alone accounted for 62% of complications and 54% of excess hospital days. Colectomy accounted for the greatest share of adverse events, followed by small intestine resection, inpatient cholecystectomy, and ventral hernia repair. In contrast, several common procedures contributed little to overall morbidity and mortality. For example, outpatient cholecystectomy, breast procedures, thyroidectomy, parathyroidectomy, and outpatient inguinal hernia repair together accounted for 34% of procedures, but only 6% of complications (and only 4% of major complications). These same procedures accounted for surgery. Focusing quality improvement efforts on these procedures may be an effective strategy for improving patient care and reducing cost.

  19. Speech coding code- excited linear prediction

    CERN Document Server

    Bäckström, Tom

    2017-01-01

    This book provides scientific understanding of the most central techniques used in speech coding both for advanced students as well as professionals with a background in speech audio and or digital signal processing. It provides a clear connection between the whys hows and whats thus enabling a clear view of the necessity purpose and solutions provided by various tools as well as their strengths and weaknesses in each respect Equivalently this book sheds light on the following perspectives for each technology presented Objective What do we want to achieve and especially why is this goal important Resource Information What information is available and how can it be useful and Resource Platform What kind of platforms are we working with and what are their capabilities restrictions This includes computational memory and acoustic properties and the transmission capacity of devices used. The book goes on to address Solutions Which solutions have been proposed and how can they be used to reach the stated goals and ...

  20. Less extensive surgery compared to extensive surgery

    DEFF Research Database (Denmark)

    Lauszus, Finn F; Petersen, Astrid C; Neumann, Gudrun

    2014-01-01

    -up by hospital data files, general practitioner, death certificate, and autopsy report. Revision of histopathology by a single pathologist. Main outcome measures: Survival and relapse by clinical data, stage, and type of surgery. RESULTS: The incidence of AGCT was 1.37 per year per 100,000 women (95% CI: 1.08, 1.......68). The median follow-up time was 15 years and for the 79 surviving women 22 years. Stage I was found in 94% of cases. Relapse occurred in 24% of women in stage I and 100% of the other stages. Survival in stage I was 95%, 89% and 84% after 5, 10 and 20 years respectively. Increased survival of stage I......: The survival of women was better in AGCT than in epithelial ovarian tumor. Age and type of surgery, besides stage, influenced survival. Total abdominal hysterectomy and bilateral salpingo-oophorectomy is the recommended treatment with advancing age. At younger age less extensive surgery was associated...

  1. Spatially coded backscatter radiography

    International Nuclear Information System (INIS)

    Thangavelu, S.; Hussein, E.M.A.

    2007-01-01

    Conventional radiography requires access to two opposite sides of an object, which makes it unsuitable for the inspection of extended and/or thick structures (airframes, bridges, floors etc.). Backscatter imaging can overcome this problem, but the indications obtained are difficult to interpret. This paper applies the coded aperture technique to gamma-ray backscatter-radiography in order to enhance the detectability of flaws. This spatial coding method involves the positioning of a mask with closed and open holes to selectively permit or block the passage of radiation. The obtained coded-aperture indications are then mathematically decoded to detect the presence of anomalies. Indications obtained from Monte Carlo calculations were utilized in this work to simulate radiation scattering measurements. These simulated measurements were used to investigate the applicability of this technique to the detection of flaws by backscatter radiography

  2. Aztheca Code; Codigo Aztheca

    Energy Technology Data Exchange (ETDEWEB)

    Quezada G, S.; Espinosa P, G. [Universidad Autonoma Metropolitana, Unidad Iztapalapa, San Rafael Atlixco No. 186, Col. Vicentina, 09340 Ciudad de Mexico (Mexico); Centeno P, J.; Sanchez M, H., E-mail: sequga@gmail.com [UNAM, Facultad de Ingenieria, Ciudad Universitaria, Circuito Exterior s/n, 04510 Ciudad de Mexico (Mexico)

    2017-09-15

    This paper presents the Aztheca code, which is formed by the mathematical models of neutron kinetics, power generation, heat transfer, core thermo-hydraulics, recirculation systems, dynamic pressure and level models and control system. The Aztheca code is validated with plant data, as well as with predictions from the manufacturer when the reactor operates in a stationary state. On the other hand, to demonstrate that the model is applicable during a transient, an event occurred in a nuclear power plant with a BWR reactor is selected. The plant data are compared with the results obtained with RELAP-5 and the Aztheca model. The results show that both RELAP-5 and the Aztheca code have the ability to adequately predict the behavior of the reactor. (Author)

  3. The Coding Question.

    Science.gov (United States)

    Gallistel, C R

    2017-07-01

    Recent electrophysiological results imply that the duration of the stimulus onset asynchrony in eyeblink conditioning is encoded by a mechanism intrinsic to the cerebellar Purkinje cell. This raises the general question - how is quantitative information (durations, distances, rates, probabilities, amounts, etc.) transmitted by spike trains and encoded into engrams? The usual assumption is that information is transmitted by firing rates. However, rate codes are energetically inefficient and computationally awkward. A combinatorial code is more plausible. If the engram consists of altered synaptic conductances (the usual assumption), then we must ask how numbers may be written to synapses. It is much easier to formulate a coding hypothesis if the engram is realized by a cell-intrinsic molecular mechanism. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Revised SRAC code system

    International Nuclear Information System (INIS)

    Tsuchihashi, Keichiro; Ishiguro, Yukio; Kaneko, Kunio; Ido, Masaru.

    1986-09-01

    Since the publication of JAERI-1285 in 1983 for the preliminary version of the SRAC code system, a number of additions and modifications to the functions have been made to establish an overall neutronics code system. Major points are (1) addition of JENDL-2 version of data library, (2) a direct treatment of doubly heterogeneous effect on resonance absorption, (3) a generalized Dancoff factor, (4) a cell calculation based on the fixed boundary source problem, (5) the corresponding edit required for experimental analysis and reactor design, (6) a perturbation theory calculation for reactivity change, (7) an auxiliary code for core burnup and fuel management, etc. This report is a revision of the users manual which consists of the general description, input data requirements and their explanation, detailed information on usage, mathematics, contents of libraries and sample I/O. (author)

  5. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  6. The correspondence between projective codes and 2-weight codes

    NARCIS (Netherlands)

    Brouwer, A.E.; Eupen, van M.J.M.; Tilborg, van H.C.A.; Willems, F.M.J.

    1994-01-01

    The hyperplanes intersecting a 2-weight code in the same number of points obviously form the point set of a projective code. On the other hand, if we have a projective code C, then we can make a 2-weight code by taking the multiset of points E PC with multiplicity "Y(w), where W is the weight of

  7. Visualizing code and coverage changes for code review

    NARCIS (Netherlands)

    Oosterwaal, Sebastiaan; van Deursen, A.; De Souza Coelho, R.; Sawant, A.A.; Bacchelli, A.

    2016-01-01

    One of the tasks of reviewers is to verify that code modifications are well tested. However, current tools offer little support in understanding precisely how changes to the code relate to changes to the tests. In particular, it is hard to see whether (modified) test code covers the changed code.

  8. Turbo-Gallager Codes: The Emergence of an Intelligent Coding ...

    African Journals Online (AJOL)

    Today, both turbo codes and low-density parity-check codes are largely superior to other code families and are being used in an increasing number of modern communication systems including 3G standards, satellite and deep space communications. However, the two codes have certain distinctive characteristics that ...

  9. Code of Medical Ethics

    Directory of Open Access Journals (Sweden)

    . SZD-SZZ

    2017-03-01

    Full Text Available Te Code was approved on December 12, 1992, at the 3rd regular meeting of the General Assembly of the Medical Chamber of Slovenia and revised on April 24, 1997, at the 27th regular meeting of the General Assembly of the Medical Chamber of Slovenia. The Code was updated and harmonized with the Medical Association of Slovenia and approved on October 6, 2016, at the regular meeting of the General Assembly of the Medical Chamber of Slovenia.

  10. Supervised Convolutional Sparse Coding

    KAUST Repository

    Affara, Lama Ahmed

    2018-04-08

    Convolutional Sparse Coding (CSC) is a well-established image representation model especially suited for image restoration tasks. In this work, we extend the applicability of this model by proposing a supervised approach to convolutional sparse coding, which aims at learning discriminative dictionaries instead of purely reconstructive ones. We incorporate a supervised regularization term into the traditional unsupervised CSC objective to encourage the final dictionary elements to be discriminative. Experimental results show that using supervised convolutional learning results in two key advantages. First, we learn more semantically relevant filters in the dictionary and second, we achieve improved image reconstruction on unseen data.

  11. CONCEPT computer code

    International Nuclear Information System (INIS)

    Delene, J.

    1984-01-01

    CONCEPT is a computer code that will provide conceptual capital investment cost estimates for nuclear and coal-fired power plants. The code can develop an estimate for construction at any point in time. Any unit size within the range of about 400 to 1300 MW electric may be selected. Any of 23 reference site locations across the United States and Canada may be selected. PWR, BWR, and coal-fired plants burning high-sulfur and low-sulfur coal can be estimated. Multiple-unit plants can be estimated. Costs due to escalation/inflation and interest during construction are calculated

  12. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  13. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...... includes a reformulation of the usual methods to estimate the minimum distances of evaluation codes into the setting of affine variety codes. Finally we describe the connection to the theory of one-pointgeometric Goppa codes. Contents 4.1 Introduction...... . . . . . . . . . . . . . . . . . . . . . . . 171 4.9 Codes form order domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 4.10 One-point geometric Goppa codes . . . . . . . . . . . . . . . . . . . . . . . . 176 4.11 Bibliographical Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 References...

  14. Annals of Pediatric Surgery

    African Journals Online (AJOL)

    The Annals of Pediatric Surgery is striving to fill an important niche that provides focus to clinical care, technical innovation and clinical research. The Annals of Pediatric Surgery has the responsibility to serve not only pediatric surgeons in the Middle East and North Africa but also should be an important conduit for scientific ...

  15. Safety in cardiac surgery

    NARCIS (Netherlands)

    Siregar, S.

    2013-01-01

    The monitoring of safety in cardiac surgery is a complex process, which involves many clinical, practical, methodological and statistical issues. The objective of this thesis was to measure and to compare safety in cardiac surgery in The Netherlands using the Netherlands Association for

  16. What Is Heart Surgery?

    Science.gov (United States)

    ... kidneys, liver, and lungs. Stroke , which may cause short-term or permanent damage. Death. (Heart surgery is more likely to be life threatening in people who are very sick before the surgery.) Memory loss and other issues, such as problems concentrating or ...

  17. Annals of African Surgery

    African Journals Online (AJOL)

    The goal of the Annals of African Surgery is to provide a medium for the exchange of current information between surgeons in the African region. The journal embraces surgery in all its aspects; basic science, clinical research, experimental research, surgical education. It will assist surgeons in the region to keep abreast of ...

  18. About Hand Surgery

    Science.gov (United States)

    ... Find a hand surgeon near you. © 2009 American Society for Surgery of the Hand. Definition developed by ASSH Council. Other Links CME Mission Statement and Disclaimer Policies and Technical Requirements Exhibits and Partners ASSH 822 W. Washington Blvd. ... 2018 by American Society for Surgery of the Hand × Search Tips Tip ...

  19. Lasik eye surgery - slideshow

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/presentations/100206.htm Lasik eye surgery - series—Normal anatomy To use the ... A.M. Editorial team. Related MedlinePlus Health Topics Laser Eye Surgery A.D.A.M., Inc. is accredited by ...

  20. LASIK - Laser Eye Surgery

    Science.gov (United States)

    ... Refractive Surgery Procedures What Is Photorefractive Keratectomy (PRK)? LASIK — Laser Eye Surgery Leer en Español: LASIK—Cirugía ocular con láser ... loss of close-up focusing power. How the LASIK procedure works LASIK is performed while the patient ...

  1. [Gases in vitreoretinal surgery].

    Science.gov (United States)

    Janco, L; Vida, R; Bartos, M; Villémová, K; Izák, M

    2012-02-01

    To evaluate the importance and benefits of using gases in vitreoretinal surgery. The gases represent a wide group of substances used in eye surgery for more than 100 years. The role of intraocular gases in vitreoretinal surgery is irreplaceable. Their use is still considered to be the "gold standard". An important step in eye surgery was the introduction of expanding gases--sulfur hexafluoride and perfluorocarbons into routine clinical practice. The most common indications for the use of intraocular gases are: retinal detachment, idiopathic macular hole, complications of vitreoretinal surgery and others. The introduction of intraocular gases into routine clinical practice, along with other modern surgical techniques resulted in significant improvement of postoperative outcomes in a wide range of eye diseases. Understanding the principles of intraocular gases use brings the benefits to the patient and physician as well. Due to their physical and chemical properties they pose far the best and most appropriate variant of intraocular tamponade. Gases also bring some disadvantages, such as difficulties in detailed fundus examination, visual acuity testing, ultrasonographic examination, difficulties in application of intravitreal drugs or reduced possibility of retina laser treatment. The gases significantly change optical system properties of the eye. The use of gases in vitreoretinal surgery has significantly increased success rate of retinal detachment surgery, complicated posterior segment cases, trauma, surgery of the macula and other diseases.

  2. Robust surgery loading

    NARCIS (Netherlands)

    Hans, Elias W.; Wullink, Gerhard; van Houdenhoven, Mark; Kazemier, Geert

    2008-01-01

    We consider the robust surgery loading problem for a hospital’s operating theatre department, which concerns assigning surgeries and sufficient planned slack to operating room days. The objective is to maximize capacity utilization and minimize the risk of overtime, and thus cancelled patients. This

  3. [Cognitive deterioration after surgery

    DEFF Research Database (Denmark)

    Steinmetz, J.; Rasmussen, L.S.

    2008-01-01

    Delirium and postoperative cognitive dysfunction are important and common complications after surgery. Risk factors are first of all increasing age and type of surgery, whereas the type of anaesthesia does not seem to play an important role. Mortality is higher among patients with cognitive...

  4. Hand Surgery: Anesthesia

    Science.gov (United States)

    ... All Topics A-Z Videos Infographics Symptom Picker Anatomy Bones Joints Muscles Nerves Vessels Tendons About Hand Surgery What is a Hand Surgeon? What is a Hand Therapist? Media Find a Hand Surgeon Home Anatomy Hand Surgery Anesthesia Email to a friend * required ...

  5. Penile enlargement surgery.

    Science.gov (United States)

    Alter, G J

    1998-06-01

    Aesthetic surgery to improve the appearance of the penis, scrotum, and pubic region has successfully evolved. Penile lengthening is performed by releasing the suspensory ligament of the penis followed by use of penile weights. Girth is increased by wrapping a dermal-fat graft around the penile circumference. The choice of surgery is determined by the patient's anatomy and desires.

  6. Minimally invasive orthognathic surgery.

    Science.gov (United States)

    Resnick, Cory M; Kaban, Leonard B; Troulis, Maria J

    2009-02-01

    Minimally invasive surgery is defined as the discipline in which operative procedures are performed in novel ways to diminish the sequelae of standard surgical dissections. The goals of minimally invasive surgery are to reduce tissue trauma and to minimize bleeding, edema, and injury, thereby improving the rate and quality of healing. In orthognathic surgery, there are two minimally invasive techniques that can be used separately or in combination: (1) endoscopic exposure and (2) distraction osteogenesis. This article describes the historical developments of the fields of orthognathic surgery and minimally invasive surgery, as well as the integration of the two disciplines. Indications, techniques, and the most current outcome data for specific minimally invasive orthognathic surgical procedures are presented.

  7. Dual Coding in Children.

    Science.gov (United States)

    Burton, John K.; Wildman, Terry M.

    The purpose of this study was to test the applicability of the dual coding hypothesis to children's recall performance. The hypothesis predicts that visual interference will have a small effect on the recall of visually presented words or pictures, but that acoustic interference will cause a decline in recall of visually presented words and…

  8. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  9. Radioactive action code

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    A new coding system, 'Hazrad', for buildings and transportation containers for alerting emergency services personnel to the presence of radioactive materials has been developed in the United Kingdom. The hazards of materials in the buildings or transport container, together with the recommended emergency action, are represented by a number of codes which are marked on the building or container and interpreted from a chart carried as a pocket-size guide. Buildings would be marked with the familiar yellow 'radioactive' trefoil, the written information 'Radioactive materials' and a list of isotopes. Under this the 'Hazrad' code would be written - three symbols to denote the relative radioactive risk (low, medium or high), the biological risk (also low, medium or high) and the third showing the type of radiation emitted, alpha, beta or gamma. The response cards indicate appropriate measures to take, eg for a high biological risk, Bio3, the wearing of a gas-tight protection suit is advised. The code and its uses are explained. (U.K.)

  10. Building Codes and Regulations.

    Science.gov (United States)

    Fisher, John L.

    The hazard of fire is of great concern to libraries due to combustible books and new plastics used in construction and interiors. Building codes and standards can offer architects and planners guidelines to follow but these standards should be closely monitored, updated, and researched for fire prevention. (DS)

  11. Physics of codes

    International Nuclear Information System (INIS)

    Cooper, R.K.; Jones, M.E.

    1989-01-01

    The title given this paper is a bit presumptuous, since one can hardly expect to cover the physics incorporated into all the codes already written and currently being written. The authors focus on those codes which have been found to be particularly useful in the analysis and design of linacs. At that the authors will be a bit parochial and discuss primarily those codes used for the design of radio-frequency (rf) linacs, although the discussions of TRANSPORT and MARYLIE have little to do with the time structures of the beams being analyzed. The plan of this paper is first to describe rather simply the concepts of emittance and brightness, then to describe rather briefly each of the codes TRANSPORT, PARMTEQ, TBCI, MARYLIE, and ISIS, indicating what physics is and is not included in each of them. It is expected that the vast majority of what is covered will apply equally well to protons and electrons (and other particles). This material is intended to be tutorial in nature and can in no way be expected to be exhaustive. 31 references, 4 figures

  12. Reliability and code level

    NARCIS (Netherlands)

    Kasperski, M.; Geurts, C.P.W.

    2005-01-01

    The paper describes the work of the IAWE Working Group WBG - Reliability and Code Level, one of the International Codification Working Groups set up at ICWE10 in Copenhagen. The following topics are covered: sources of uncertainties in the design wind load, appropriate design target values for the

  13. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  14. CERN Code of Conduct

    CERN Document Server

    Department, HR

    2010-01-01

    The Code is intended as a guide in helping us, as CERN contributors, to understand how to conduct ourselves, treat others and expect to be treated. It is based around the five core values of the Organization. We should all become familiar with it and try to incorporate it into our daily life at CERN.

  15. Nuclear safety code study

    Energy Technology Data Exchange (ETDEWEB)

    Hu, H.H.; Ford, D.; Le, H.; Park, S.; Cooke, K.L.; Bleakney, T.; Spanier, J.; Wilburn, N.P.; O' Reilly, B.; Carmichael, B.

    1981-01-01

    The objective is to analyze an overpower accident in an LMFBR. A simplified model of the primary coolant loop was developed in order to understand the instabilities encountered with the MELT III and SAS codes. The computer programs were translated for switching to the IBM 4331. Numerical methods were investigated for solving the neutron kinetics equations; the Adams and Gear methods were compared. (DLC)

  16. Revised C++ coding conventions

    CERN Document Server

    Callot, O

    2001-01-01

    This document replaces the note LHCb 98-049 by Pavel Binko. After a few years of practice, some simplification and clarification of the rules was needed. As many more people have now some experience in writing C++ code, their opinion was also taken into account to get a commonly agreed set of conventions

  17. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and

  18. Error Correcting Codes -34 ...

    Indian Academy of Sciences (India)

    information and coding theory. A large scale relay computer had failed to deliver the expected results due to a hardware fault. Hamming, one of the active proponents of computer usage, was determined to find an efficient means by which computers could detect and correct their own faults. A mathematician by train-.

  19. Broadcast Coded Slotted ALOHA

    DEFF Research Database (Denmark)

    Ivanov, Mikhail; Brännström, Frederik; Graell i Amat, Alexandre

    2016-01-01

    We propose an uncoordinated medium access control (MAC) protocol, called all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all broadcast with strict latency constraints. In B-CSA, each user acts as both transmitter and receiver in a half-duplex mode. The half-duplex mode gives ...

  20. Software Defined Coded Networking

    DEFF Research Database (Denmark)

    Di Paola, Carla; Roetter, Daniel Enrique Lucani; Palazzo, Sergio

    2017-01-01

    the quality of each link and even across neighbouring links and using simulations to show that an additional reduction of packet transmission in the order of 40% is possible. Second, to advocate for the use of network coding (NC) jointly with software defined networking (SDN) providing an implementation...

  1. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  2. (Almost) practical tree codes

    KAUST Repository

    Khina, Anatoly

    2016-08-15

    We consider the problem of stabilizing an unstable plant driven by bounded noise over a digital noisy communication link, a scenario at the heart of networked control. To stabilize such a plant, one needs real-time encoding and decoding with an error probability profile that decays exponentially with the decoding delay. The works of Schulman and Sahai over the past two decades have developed the notions of tree codes and anytime capacity, and provided the theoretical framework for studying such problems. Nonetheless, there has been little practical progress in this area due to the absence of explicit constructions of tree codes with efficient encoding and decoding algorithms. Recently, linear time-invariant tree codes were proposed to achieve the desired result under maximum-likelihood decoding. In this work, we take one more step towards practicality, by showing that these codes can be efficiently decoded using sequential decoding algorithms, up to some loss in performance (and with some practical complexity caveats). We supplement our theoretical results with numerical simulations that demonstrate the effectiveness of the decoder in a control system setting.

  3. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    having a probability Pi of being equal to a 1. Let us assume ... equal to a 0/1 has no bearing on the probability of the. It is often ... bits (call this set S) whose individual bits add up to zero ... In the context of binary error-correct~ng codes, specifi-.

  4. The Redox Code.

    Science.gov (United States)

    Jones, Dean P; Sies, Helmut

    2015-09-20

    The redox code is a set of principles that defines the positioning of the nicotinamide adenine dinucleotide (NAD, NADP) and thiol/disulfide and other redox systems as well as the thiol redox proteome in space and time in biological systems. The code is richly elaborated in an oxygen-dependent life, where activation/deactivation cycles involving O₂ and H₂O₂ contribute to spatiotemporal organization for differentiation, development, and adaptation to the environment. Disruption of this organizational structure during oxidative stress represents a fundamental mechanism in system failure and disease. Methodology in assessing components of the redox code under physiological conditions has progressed, permitting insight into spatiotemporal organization and allowing for identification of redox partners in redox proteomics and redox metabolomics. Complexity of redox networks and redox regulation is being revealed step by step, yet much still needs to be learned. Detailed knowledge of the molecular patterns generated from the principles of the redox code under defined physiological or pathological conditions in cells and organs will contribute to understanding the redox component in health and disease. Ultimately, there will be a scientific basis to a modern redox medicine.

  5. Z₂-double cyclic codes

    OpenAIRE

    Borges, J.

    2014-01-01

    A binary linear code C is a Z2-double cyclic code if the set of coordinates can be partitioned into two subsets such that any cyclic shift of the coordinates of both subsets leaves invariant the code. These codes can be identified as submodules of the Z2[x]-module Z2[x]/(x^r − 1) × Z2[x]/(x^s − 1). We determine the structure of Z2-double cyclic codes giving the generator polynomials of these codes. The related polynomial representation of Z2-double cyclic codes and its duals, and the relation...

  6. Coding for urologic office procedures.

    Science.gov (United States)

    Dowling, Robert A; Painter, Mark

    2013-11-01

    This article summarizes current best practices for documenting, coding, and billing common office-based urologic procedures. Topics covered include general principles, basic and advanced urologic coding, creation of medical records that support compliant coding practices, bundled codes and unbundling, global periods, modifiers for procedure codes, when to bill for evaluation and management services during the same visit, coding for supplies, and laboratory and radiology procedures pertinent to urology practice. Detailed information is included for the most common urology office procedures, and suggested resources and references are provided. This information is of value to physicians, office managers, and their coding staff. Copyright © 2013 Elsevier Inc. All rights reserved.

  7. Cleft Lip and Palate Surgery

    Science.gov (United States)

    ... The experts in face, mouth and jaw surgery. Cleft Lip / Palate and Craniofacial Surgery This type of surgery is ... the carefully orchestrated, multiple-stage correctional program for cleft lip and palate patients. The goal is to help restore the ...

  8. Gamma knife surgery for craniopharyngioma

    International Nuclear Information System (INIS)

    Prasad, D.; Steiner, M.; Steiner, L.

    1995-01-01

    We present our results of Gamma Knife surgery for craniopharyngioma in nine patients. The current status of surgery, radiation therapy, intracavitary instillation of radionuclides and Gamma Knife surgery in the management of craniopharyngiomas is discussed. (author)

  9. Heart failure - surgeries and devices

    Science.gov (United States)

    ... surgery; HF - surgery; Intra-aortic balloon pumps - heart failure; IABP - heart failure; Catheter based assist devices - heart failure ... problem may cause heart failure or make heart failure worse. Heart valve surgery may be needed to repair or ...

  10. Essential idempotents and simplex codes

    Directory of Open Access Journals (Sweden)

    Gladys Chalom

    2017-01-01

    Full Text Available We define essential idempotents in group algebras and use them to prove that every mininmal abelian non-cyclic code is a repetition code. Also we use them to prove that every minimal abelian code is equivalent to a minimal cyclic code of the same length. Finally, we show that a binary cyclic code is simplex if and only if is of length of the form $n=2^k-1$ and is generated by an essential idempotent.

  11. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...

  12. Critical differences between elective and emergency surgery: identifying domains for quality improvement in emergency general surgery.

    Science.gov (United States)

    Columbus, Alexandra B; Morris, Megan A; Lilley, Elizabeth J; Harlow, Alyssa F; Haider, Adil H; Salim, Ali; Havens, Joaquim M

    2018-04-01

    The objective of our study was to characterize providers' impressions of factors contributing to disproportionate rates of morbidity and mortality in emergency general surgery to identify targets for care quality improvement. Emergency general surgery is characterized by a high-cost burden and disproportionate morbidity and mortality. Factors contributing to these observed disparities are not comprehensively understood and targets for quality improvement have not been formally developed. Using a grounded theory approach, emergency general surgery providers were recruited through purposive-criterion-based sampling to participate in semi-structured interviews and focus groups. Participants were asked to identify contributors to emergency general surgery outcomes, to define effective care for EGS patients, and to describe operating room team structure. Interviews were performed to thematic saturation. Transcripts were iteratively coded and analyzed within and across cases to identify emergent themes. Member checking was performed to establish credibility of the findings. A total of 40 participants from 5 academic hospitals participated in either individual interviews (n = 25 [9 anesthesia, 12 surgery, 4 nursing]) or focus groups (n = 2 [15 nursing]). Emergency general surgery was characterized by an exceptionally high level of variability, which can be subcategorized as patient-variability (acute physiology and comorbidities) and system-variability (operating room resources and workforce). Multidisciplinary communication is identified as a modifier to variability in emergency general surgery; however, nursing is often left out of early communication exchanges. Critical variability in emergency general surgery may impact outcomes. Patient-variability and system-variability, with focus on multidisciplinary communication, represent potential domains for quality improvement in this field. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. Bariatric surgery and the changing current scope of general surgery practice: implications for general surgery residency training.

    Science.gov (United States)

    Mostaedi, Rouzbeh; Ali, Mohamed R; Pierce, Jonathan L; Scherer, Lynette A; Galante, Joseph M

    2015-02-01

    The scope of general surgery practice has evolved tremendously in the last 20 years. However, clinical experience in general surgery residency training has undergone relatively little change. To evaluate the current scope of academic general surgery and its implications on surgical residency. The University HealthSystem Consortium and Association of American Medical Colleges established the Faculty Practice Solution Center (FPSC) to characterize physician productivity. The FPSC is a benchmarking tool for academic medical centers created from revenue data collected from more than 90,000 physicians who practice at 95 institutions across the United States. The FPSC database was queried to evaluate the annual mean procedure frequency per surgeon (PFS) in each calendar year from 2006 through 2011. The associated work relative value units (wRVUs) were also examined to measure physician effort and skill. During the 6-year period, 146 distinct Current Procedural Terminology codes were among the top 100 procedures, and 16 of these procedures ranked in the top 10 procedures in at least 1 year. The top 10 procedures accounted for more than half (range, 52.5%-57.2%) of the total 100 PFS evaluated for each year. Laparoscopic Roux-en-Y gastric bypass was consistently among the top 10 procedures in each year (PFS, 18.2-24.6). The other most frequently performed procedures included laparoscopic cholecystectomy (PFS, 30.3-43.5), upper gastrointestinal tract endoscopy (PFS, 26.5-34.3), mastectomy (PFS, 16.5-35.0), inguinal hernia repair (PFS, 15.5-22.1), and abdominal wall hernia repair (PFS, 21.6-26.1). In all years, laparoscopic Roux-en-Y gastric bypass generated the highest number of wRVUs (wRVUs, 491.0-618.2), and laparoscopic cholecystectomy was regularly the next highest (wRVUs, 335.8-498.7). A significant proportion of academic general surgery is composed of bariatric surgery, yet surgical training does not sufficiently emphasize the necessary exposure to technical expertise

  14. Epiretinal membrane surgery

    DEFF Research Database (Denmark)

    Hamoudi, Hassan; Correll Christensen, Ulrik; La Cour, Morten

    2017-01-01

    Purpose: To assess the impact of combined phacoemulsification-vitrectomy and sequential surgery for idiopathic epiretinal membrane (ERM) on refractive error (RE) and macular morphology. Methods: In this prospective clinical trial, we allocated phakic eyes with ERM to (1) cataract surgery and subs......Purpose: To assess the impact of combined phacoemulsification-vitrectomy and sequential surgery for idiopathic epiretinal membrane (ERM) on refractive error (RE) and macular morphology. Methods: In this prospective clinical trial, we allocated phakic eyes with ERM to (1) cataract surgery...... and achieved spherical equivalent); secondary outcomes were best-corrected visual acuity (BCVA), and incidence of cystoid macular oedema (CME) defined as >10% increment of central subfield macular thickness (CSMT). Results: Sixty-two eyes were enrolled. The mean RE showed a small myopic shift of -0.36D in all...... between the groups. Four cases (17%) in the CAT group had resolved visual complaints and improved BCVA after cataract surgery resulting in no need for PPV within the follow-up period. Conclusion: Surgery for idiopathic ERM in phakic eyes with either phaco-vitrectomy or sequential surgery are equal...

  15. Craniofacial Surgery Fellowship Websites.

    Science.gov (United States)

    Silvestre, Jason; Agarwal, Divyansh; Taylor, Jesse A

    2016-06-01

    Applicants for craniofacial surgery fellowships utilize Internet-based resources like the San Francisco (SF) Match to manage applications. The purpose of this study was to evaluate the accessibility and content of craniofacial surgery fellowship websites (CSFWs). A list of available craniofacial surgery fellowships was compiled from directories of the American Society of Craniofacial Surgery (ACSFS) and SF Match. Accessibility of CSFWs was assessed via links from these directories and a Google search. Craniofacial surgery fellowship websites were evaluated on education and recruitment content and compared via program characteristics. Twenty-four of the 28 US-based craniofacial surgery fellowship programs had a CSFW (86%). The ACSFS and SF Match databases had limited CSFW accessibility, but a Google search revealed most CSFWs had the top search result (76%). In total, CSFWs provided an average of 39% of education and recruitment variables. While most programs provided fellowship program descriptions (96%), application links (96%), and faculty listings (83%), relatively few provided rotation schedules (13%), fellow selection process information (13%), or interview dates (8%). CSFW content did not vary by program location, faculty size, accreditation status, or institutional affiliations (P > 0.05). Craniofacial surgery fellowships often lack readily accessible websites from national program lists and have limited information for interested applicants. The consistent lack of online information across programs suggests future opportunities exist to improve these educational resources.

  16. Brain surgery breathes new life into aging plants

    Energy Technology Data Exchange (ETDEWEB)

    Makansi, J. [Pearl Street Inc. (United States)

    2006-04-15

    Unlike managing the human aging process, extending the life of a power plant often includes brain surgery, modernizing its control and automation system. Lately, such retrofits range from wholesale replacing of existing controls to the addition of specific control elements that help optimize performance. Pending revisions to safety codes and cybersecurity issues also need to be considered. 4 figs.

  17. Entanglement-assisted quantum MDS codes constructed from negacyclic codes

    Science.gov (United States)

    Chen, Jianzhang; Huang, Yuanyuan; Feng, Chunhui; Chen, Riqing

    2017-12-01

    Recently, entanglement-assisted quantum codes have been constructed from cyclic codes by some scholars. However, how to determine the number of shared pairs required to construct entanglement-assisted quantum codes is not an easy work. In this paper, we propose a decomposition of the defining set of negacyclic codes. Based on this method, four families of entanglement-assisted quantum codes constructed in this paper satisfy the entanglement-assisted quantum Singleton bound, where the minimum distance satisfies q+1 ≤ d≤ n+2/2. Furthermore, we construct two families of entanglement-assisted quantum codes with maximal entanglement.

  18. Surveys on surgery theory

    CERN Document Server

    Cappell, Sylvain; Rosenberg, Jonathan

    2014-01-01

    Surgery theory, the basis for the classification theory of manifolds, is now about forty years old. The sixtieth birthday (on December 14, 1996) of C.T.C. Wall, a leading member of the subject''s founding generation, led the editors of this volume to reflect on the extraordinary accomplishments of surgery theory as well as its current enormously varied interactions with algebra, analysis, and geometry. Workers in many of these areas have often lamented the lack of a single source surveying surgery theory and its applications. Because no one person could write such a survey, the editors ask

  19. Surveys on surgery theory

    CERN Document Server

    Cappell, Sylvain; Rosenberg, Jonathan

    2014-01-01

    Surgery theory, the basis for the classification theory of manifolds, is now about forty years old. There have been some extraordinary accomplishments in that time, which have led to enormously varied interactions with algebra, analysis, and geometry. Workers in many of these areas have often lamented the lack of a single source that surveys surgery theory and its applications. Indeed, no one person could write such a survey. The sixtieth birthday of C. T. C. Wall, one of the leaders of the founding generation of surgery theory, provided an opportunity to rectify the situation and produce a

  20. Efficient convolutional sparse coding

    Science.gov (United States)

    Wohlberg, Brendt

    2017-06-20

    Computationally efficient algorithms may be applied for fast dictionary learning solving the convolutional sparse coding problem in the Fourier domain. More specifically, efficient convolutional sparse coding may be derived within an alternating direction method of multipliers (ADMM) framework that utilizes fast Fourier transforms (FFT) to solve the main linear system in the frequency domain. Such algorithms may enable a significant reduction in computational cost over conventional approaches by implementing a linear solver for the most critical and computationally expensive component of the conventional iterative algorithm. The theoretical computational cost of the algorithm may be reduced from O(M.sup.3N) to O(MN log N), where N is the dimensionality of the data and M is the number of elements in the dictionary. This significant improvement in efficiency may greatly increase the range of problems that can practically be addressed via convolutional sparse representations.

  1. Coded Network Function Virtualization

    DEFF Research Database (Denmark)

    Al-Shuwaili, A.; Simone, O.; Kliewer, J.

    2016-01-01

    Network function virtualization (NFV) prescribes the instantiation of network functions on general-purpose network devices, such as servers and switches. While yielding a more flexible and cost-effective network architecture, NFV is potentially limited by the fact that commercial off......-the-shelf hardware is less reliable than the dedicated network elements used in conventional cellular deployments. The typical solution for this problem is to duplicate network functions across geographically distributed hardware in order to ensure diversity. In contrast, this letter proposes to leverage channel...... coding in order to enhance the robustness on NFV to hardware failure. The proposed approach targets the network function of uplink channel decoding, and builds on the algebraic structure of the encoded data frames in order to perform in-network coding on the signals to be processed at different servers...

  2. The NIMROD Code

    Science.gov (United States)

    Schnack, D. D.; Glasser, A. H.

    1996-11-01

    NIMROD is a new code system that is being developed for the analysis of modern fusion experiments. It is being designed from the beginning to make the maximum use of massively parallel computer architectures and computer graphics. The NIMROD physics kernel solves the three-dimensional, time-dependent two-fluid equations with neo-classical effects in toroidal geometry of arbitrary poloidal cross section. The NIMROD system also includes a pre-processor, a grid generator, and a post processor. User interaction with NIMROD is facilitated by a modern graphical user interface (GUI). The NIMROD project is using Quality Function Deployment (QFD) team management techniques to minimize re-engineering and reduce code development time. This paper gives an overview of the NIMROD project. Operation of the GUI is demonstrated, and the first results from the physics kernel are given.

  3. Computer code FIT

    International Nuclear Information System (INIS)

    Rohmann, D.; Koehler, T.

    1987-02-01

    This is a description of the computer code FIT, written in FORTRAN-77 for a PDP 11/34. FIT is an interactive program to decude position, width and intensity of lines of X-ray spectra (max. length of 4K channels). The lines (max. 30 lines per fit) may have Gauss- or Voigt-profile, as well as exponential tails. Spectrum and fit can be displayed on a Tektronix terminal. (orig.) [de

  4. Discrete Sparse Coding.

    Science.gov (United States)

    Exarchakis, Georgios; Lücke, Jörg

    2017-11-01

    Sparse coding algorithms with continuous latent variables have been the subject of a large number of studies. However, discrete latent spaces for sparse coding have been largely ignored. In this work, we study sparse coding with latents described by discrete instead of continuous prior distributions. We consider the general case in which the latents (while being sparse) can take on any value of a finite set of possible values and in which we learn the prior probability of any value from data. This approach can be applied to any data generated by discrete causes, and it can be applied as an approximation of continuous causes. As the prior probabilities are learned, the approach then allows for estimating the prior shape without assuming specific functional forms. To efficiently train the parameters of our probabilistic generative model, we apply a truncated expectation-maximization approach (expectation truncation) that we modify to work with a general discrete prior. We evaluate the performance of the algorithm by applying it to a variety of tasks: (1) we use artificial data to verify that the algorithm can recover the generating parameters from a random initialization, (2) use image patches of natural images and discuss the role of the prior for the extraction of image components, (3) use extracellular recordings of neurons to present a novel method of analysis for spiking neurons that includes an intuitive discretization strategy, and (4) apply the algorithm on the task of encoding audio waveforms of human speech. The diverse set of numerical experiments presented in this letter suggests that discrete sparse coding algorithms can scale efficiently to work with realistic data sets and provide novel statistical quantities to describe the structure of the data.

  5. Code of Practice

    International Nuclear Information System (INIS)

    Doyle, Colin; Hone, Christopher; Nowlan, N.V.

    1984-05-01

    This Code of Practice introduces accepted safety procedures associated with the use of alpha, beta, gamma and X-radiation in secondary schools (pupils aged 12 to 18) in Ireland, and summarises good practice and procedures as they apply to radiation protection. Typical dose rates at various distances from sealed sources are quoted, and simplified equations are used to demonstrate dose and shielding calculations. The regulatory aspects of radiation protection are outlined, and references to statutory documents are given

  6. Tokamak simulation code manual

    International Nuclear Information System (INIS)

    Chung, Moon Kyoo; Oh, Byung Hoon; Hong, Bong Keun; Lee, Kwang Won

    1995-01-01

    The method to use TSC (Tokamak Simulation Code) developed by Princeton plasma physics laboratory is illustrated. In KT-2 tokamak, time dependent simulation of axisymmetric toroidal plasma and vertical stability have to be taken into account in design phase using TSC. In this report physical modelling of TSC are described and examples of application in JAERI and SERI are illustrated, which will be useful when TSC is installed KAERI computer system. (Author) 15 refs., 6 figs., 3 tabs

  7. Status of MARS Code

    Energy Technology Data Exchange (ETDEWEB)

    N.V. Mokhov

    2003-04-09

    Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

  8. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, transparency, neutrality, impartiality, effectiveness, accountability, and legality. The normative context of public administration, as expressed in codes, seems to ignore the New Public Management and Reinventing Government reform movements....

  9. Orthopedics coding and funding.

    Science.gov (United States)

    Baron, S; Duclos, C; Thoreux, P

    2014-02-01

    The French tarification à l'activité (T2A) prospective payment system is a financial system in which a health-care institution's resources are based on performed activity. Activity is described via the PMSI medical information system (programme de médicalisation du système d'information). The PMSI classifies hospital cases by clinical and economic categories known as diagnosis-related groups (DRG), each with an associated price tag. Coding a hospital case involves giving as realistic a description as possible so as to categorize it in the right DRG and thus ensure appropriate payment. For this, it is essential to understand what determines the pricing of inpatient stay: namely, the code for the surgical procedure, the patient's principal diagnosis (reason for admission), codes for comorbidities (everything that adds to management burden), and the management of the length of inpatient stay. The PMSI is used to analyze the institution's activity and dynamism: change on previous year, relation to target, and comparison with competing institutions based on indicators such as the mean length of stay performance indicator (MLS PI). The T2A system improves overall care efficiency. Quality of care, however, is not presently taken account of in the payment made to the institution, as there are no indicators for this; work needs to be done on this topic. Copyright © 2014. Published by Elsevier Masson SAS.

  10. Code Modernization of VPIC

    Science.gov (United States)

    Bird, Robert; Nystrom, David; Albright, Brian

    2017-10-01

    The ability of scientific simulations to effectively deliver performant computation is increasingly being challenged by successive generations of high-performance computing architectures. Code development to support efficient computation on these modern architectures is both expensive, and highly complex; if it is approached without due care, it may also not be directly transferable between subsequent hardware generations. Previous works have discussed techniques to support the process of adapting a legacy code for modern hardware generations, but despite the breakthroughs in the areas of mini-app development, portable-performance, and cache oblivious algorithms the problem still remains largely unsolved. In this work we demonstrate how a focus on platform agnostic modern code-development can be applied to Particle-in-Cell (PIC) simulations to facilitate effective scientific delivery. This work builds directly on our previous work optimizing VPIC, in which we replaced intrinsic based vectorisation with compile generated auto-vectorization to improve the performance and portability of VPIC. In this work we present the use of a specialized SIMD queue for processing some particle operations, and also preview a GPU capable OpenMP variant of VPIC. Finally we include a lessons learnt. Work performed under the auspices of the U.S. Dept. of Energy by the Los Alamos National Security, LLC Los Alamos National Laboratory under contract DE-AC52-06NA25396 and supported by the LANL LDRD program.

  11. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  12. MELCOR computer code manuals

    International Nuclear Information System (INIS)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L.; Hodge, S.A.; Hyman, C.R.; Sanders, R.L.

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR's phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package

  13. Corrective Jaw Surgery

    Medline Plus

    Full Text Available AAOMS - Oral and maxillofacial surgeons. The experts in face, mouth and jaw surgery.™ What We Do Who ... surgeons surgically treat the soft tissues of the face, mouth and gums to improve function, appearance and ...

  14. COMPUTERS IN SURGERY

    African Journals Online (AJOL)

    BODE

    Key words: Computers, surgery, applications. Introduction ... With improved memory, speed and processing power in an ever more compact ... with picture and voice embedment to wit. With the ... recall the tedium of anatomy, physiology and.

  15. HEAD AND NECK SURGERY

    African Journals Online (AJOL)

    simple and well tolerated, and can be used selectively or as a ... up clinical information was obtained from a review of the patients' .... When a mass is clinically malignant, and facial nerve ... extension of surgery and closer attention to tumour.

  16. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... surgery. It is important to understand that your treatment, which will probably include orthodontics before and after ... to realistically estimate the time required for your treatment. Correction of Common Dentofacial Deformities ​ ​ The information provided ...

  17. Aortic valve surgery - open

    Science.gov (United States)

    ... gov/ency/article/007408.htm Aortic valve surgery - open To use the sharing features on this page, ... separates the heart and aorta. The aortic valve opens so blood can flow out. It then closes ...

  18. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... Oral and maxillofacial surgeons. The experts in face, mouth and jaw surgery.™ What We Do Who We ... surgically treat the soft tissues of the face, mouth and gums to improve function, appearance and oral ...

  19. Spine surgery - discharge

    Science.gov (United States)

    ... milk). This means you should not lift a laundry basket, grocery bags, or small children. You should ... Ma, MD, Professor, Chief, Sports Medicine and Shoulder Service, UCSF Department of Orthopaedic Surgery, San Francisco, CA. ...

  20. Pain Medications After Surgery

    Science.gov (United States)

    ... be used for outpatient procedures or more-involved inpatient surgery. For pain relief lasting several hours, an ... surgical care, such as rest, ice packs, rehabilitative exercises and wound care. Ask to have written instructions ...

  1. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... in face, mouth and jaw surgery.™ What We Do Who We Are News Videos Contact Find a Surgeon What We Do Anesthesia Anesthesia Oral and maxillofacial surgeons are extensively ...

  2. Scoliosis surgery - child

    Science.gov (United States)

    ... from getting worse. But, when they no longer work, the child's health care provider will recommend surgery. There are several reasons to treat scoliosis: Appearance is a major concern. Scoliosis often causes back pain. If the curve is severe enough, ...

  3. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... performs the actual surgery. It is important to understand that your treatment, which will probably include orthodontics ... several years to complete. Your OMS and orthodontist understand that this is a long-term commitment for ...

  4. Ambulatory paediatric surgery

    African Journals Online (AJOL)

    reminder and instructions 24 - 48 hours before surgery. Effective communication with ... patients, no abnormal postoperative behaviour patterns were recorded by the ... nursing and administration staff - less desirable is a day- stay ward with ...

  5. Aids and Surgery

    African Journals Online (AJOL)

    user

    2004-12-02

    Dec 2, 2004 ... The correlation between HIV infection and surgery began to be highlighted only two ... expect greater clinical exposure to patients with. HIV/AIDS. .... fractures in HIV patient, although too little is known about the relationship ...

  6. HEAD AND NECK SURGERY

    African Journals Online (AJOL)

    +/-symptoms and signs), intravenous calcium gluconate and oral calcium lactate is .... facilitated by surgical stress, Vitamin D deficiency and hungry .... recurrence after thyroid surgery, excluding cancer. Chirurgie. ... Crea C, Alesina P, et al.

  7. Hip fracture surgeries

    Science.gov (United States)

    ... clearly. Sometimes, surgery can make this problem worse. Pressure sores ( pressure ulcers or bed sores) from being in bed or ... the hospital for 3 to 5 days. Full recovery will take from 3 to 4 months to ...

  8. Mitral valve surgery - open

    Science.gov (United States)

    ... Taking warfarin (Coumadin) References Otto CM, Bonow RO. Valvular heart disease. In: Mann DL, Zipes DP, Libby P, Bonow ... A.M. Editorial team. Heart Surgery Read more Heart Valve Diseases Read more Mitral Valve Prolapse Read more A. ...

  9. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... surgery: Difficulty chewing, or biting food Difficulty swallowing Chronic jaw or jaw joint (TMJ) pain and headache ... Inability to make the lips meet without straining Chronic mouth breathing Sleep apnea (breathing problems when sleeping, ...

  10. Hemorrhoid surgery - slideshow

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/presentations/100026.htm Hemorrhoid surgery - series—Normal anatomy To use the sharing ... empties stool from the body through the anus. Hemorrhoids are "cushions" of tissue filled with blood vessels ...

  11. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... We Do Who We Are News Videos Contact Find a Surgeon What We Do Anesthesia Anesthesia Oral ... of sedation and general anesthesia. Click here to find out more. Cleft Lip/Palate and Craniofacial Surgery ...

  12. Laser surgery - skin

    Science.gov (United States)

    ... Bleeding Problem not going away Infection Pain Scarring Skin color changes Some laser surgery is done when you are asleep and ... TG, Elston DM, eds. Andrews' Diseases of the Skin: Clinical ... lasers, lights, and tissue interactions. In: Hruza GJ, Avram ...

  13. Aids and Surgery

    African Journals Online (AJOL)

    user

    2004-12-02

    Dec 2, 2004 ... HIV/AIDS patients require surgery sometimes during their illness. The objective of the ... risks to surgical equipes and analysing preventive strategies to HIV ... of Atlanta, and after an assessment of the performance status and ...

  14. Art and Plastic Surgery.

    Science.gov (United States)

    Fernandes, Julio Wilson; Metka, Susanne

    2016-04-01

    The roots of science and art of plastic surgery are very antique. Anatomy, drawing, painting, and sculpting have been very important to the surgery and medicine development over the centuries. Artistic skills besides shape, volume, and lines perception can be a practical aid to the plastic surgeons' daily work. An overview about the interactions between art and plastic surgery is presented, with a few applications to rhinoplasty, cleft lip, and other reconstructive plastic surgeries. This journal requires that authors assign a level of evidence to each article. For a full description of these Evidence-Based Medicine ratings, please refer to the Table of Contents or the online Instructions to Authors www.springer.com/00266.

  15. Laparoscopic Spine Surgery

    Science.gov (United States)

    ... the frontal approach takes advantage of normal tissue planes and does not require removal of any bone. ... to the “open” procedure may include: Obesity A history of prior abdominal surgery causing dense scar tissue ...

  16. Gastric Bypass Surgery

    Science.gov (United States)

    ... surgery is typically not reversible. It works by decreasing the amount of food you can eat at ... healthy changes in your diet and get regular physical activity and exercise. If you frequently snack on high- ...

  17. Expectations of Sinus Surgery

    Science.gov (United States)

    ... ARS HOME ANATOMY Nasal Anatomy Sinus Anatomy Nasal Physiology Nasal Endoscopy Skull Base Anatomy Virtual Anatomy Disclosure ... reduce the pressure in your nose. Avoid strenuous exercise for the first 2 weeks after surgery. Also ...

  18. Cosmetic surgery: medicolegal considerations

    Directory of Open Access Journals (Sweden)

    Piras Mauro

    2016-01-01

    Full Text Available Cosmetic surgery is one of the two branches of plastic surgery. The characteristic of non-necessity of this surgical speciality implies an increased severity in the evaluation of the risk-benefit balance. Therefore, great care must be taken in providing all the information necessary in order to obtain valid consent to the intervention. We analyzed judgments concerning cosmetic surgery found in national legal databases. A document of National Bioethics Committee (CNB was also analyzed. Conclusion: The receipt of valid, informed consent is of absolute importance not only to legitimise the medical-surgical act, but it also represents the key element in the question concerning the existence of an obligation to achieve certain results/use of certain methods in the cosmetic surgery.

  19. Knee microfracture surgery

    Science.gov (United States)

    Cartilage regeneration - knee ... Three types of anesthesia may be used for knee arthroscopy surgery: Medicine to relax you, and shots of painkillers to numb the knee Spinal (regional) anesthesia General anesthesia (you will be ...

  20. Robotics in Colorectal Surgery

    Science.gov (United States)

    Weaver, Allison; Steele, Scott

    2016-01-01

    Over the past few decades, robotic surgery has developed from a futuristic dream to a real, widely used technology. Today, robotic platforms are used for a range of procedures and have added a new facet to the development and implementation of minimally invasive surgeries. The potential advantages are enormous, but the current progress is impeded by high costs and limited technology. However, recent advances in haptic feedback systems and single-port surgical techniques demonstrate a clear role for robotics and are likely to improve surgical outcomes. Although robotic surgeries have become the gold standard for a number of procedures, the research in colorectal surgery is not definitive and more work needs to be done to prove its safety and efficacy to both surgeons and patients. PMID:27746895

  1. Periscopic Spine Surgery

    National Research Council Canada - National Science Library

    Cleary, Kevin R

    2000-01-01

    .... Key research accomplishments for the first year are: ̂Demonstrated the value of intraoperative CT for visualization and verification of the anatomy in complex spine surgeries in the neurosurgery operating room...

  2. Clinical Trials in Surgery

    African Journals Online (AJOL)

    The ANNALS of AFRICAN SURGERY | www.sskenya.org/journal. The ANNALS of ... by two different experiments on small pox by Lady. Mary Wortley Montagu and ... through their 'animal magnetism' were nothing more than an expensive ...

  3. Quality Improvement of MARS Code and Establishment of Code Coupling

    International Nuclear Information System (INIS)

    Chung, Bub Dong; Jeong, Jae Jun; Kim, Kyung Doo

    2010-04-01

    The improvement of MARS code quality and coupling with regulatory auditing code have been accomplished for the establishment of self-reliable technology based regulatory auditing system. The unified auditing system code was realized also by implementing the CANDU specific models and correlations. As a part of the quality assurance activities, the various QA reports were published through the code assessments. The code manuals were updated and published a new manual which describe the new models and correlations. The code coupling methods were verified though the exercise of plant application. The education-training seminar and technology transfer were performed for the code users. The developed MARS-KS is utilized as reliable auditing tool for the resolving the safety issue and other regulatory calculations. The code can be utilized as a base technology for GEN IV reactor applications

  4. Design of convolutional tornado code

    Science.gov (United States)

    Zhou, Hui; Yang, Yao; Gao, Hongmin; Tan, Lu

    2017-09-01

    As a linear block code, the traditional tornado (tTN) code is inefficient in burst-erasure environment and its multi-level structure may lead to high encoding/decoding complexity. This paper presents a convolutional tornado (cTN) code which is able to improve the burst-erasure protection capability by applying the convolution property to the tTN code, and reduce computational complexity by abrogating the multi-level structure. The simulation results show that cTN code can provide a better packet loss protection performance with lower computation complexity than tTN code.

  5. Random linear codes in steganography

    Directory of Open Access Journals (Sweden)

    Kamil Kaczyński

    2016-12-01

    Full Text Available Syndrome coding using linear codes is a technique that allows improvement in the steganographic algorithms parameters. The use of random linear codes gives a great flexibility in choosing the parameters of the linear code. In parallel, it offers easy generation of parity check matrix. In this paper, the modification of LSB algorithm is presented. A random linear code [8, 2] was used as a base for algorithm modification. The implementation of the proposed algorithm, along with practical evaluation of algorithms’ parameters based on the test images was made.[b]Keywords:[/b] steganography, random linear codes, RLC, LSB

  6. Repetitive endoscopic sinus surgery failure: a role for radical surgery?

    NARCIS (Netherlands)

    Videler, Ward J. M.; Wreesmann, Volkert B.; van der Meulen, Freerk W.; Knegt, Paul P.; Fokkens, Wytske J.

    2006-01-01

    OBJECTIVES: Endoscopic sinus surgery (ESS) is considered to be the golden standard for surgery in patients with chronic rhinosinusitis and nasal polyposis. However, there is still a small group of patients unresponsive despite repetitive surgery. Radical surgery aimed at reduction of the

  7. Containment Code Validation Matrix

    International Nuclear Information System (INIS)

    Chin, Yu-Shan; Mathew, P.M.; Glowa, Glenn; Dickson, Ray; Liang, Zhe; Leitch, Brian; Barber, Duncan; Vasic, Aleks; Bentaib, Ahmed; Journeau, Christophe; Malet, Jeanne; Studer, Etienne; Meynet, Nicolas; Piluso, Pascal; Gelain, Thomas; Michielsen, Nathalie; Peillon, Samuel; Porcheron, Emmanuel; Albiol, Thierry; Clement, Bernard; Sonnenkalb, Martin; Klein-Hessling, Walter; Arndt, Siegfried; Weber, Gunter; Yanez, Jorge; Kotchourko, Alexei; Kuznetsov, Mike; Sangiorgi, Marco; Fontanet, Joan; Herranz, Luis; Garcia De La Rua, Carmen; Santiago, Aleza Enciso; Andreani, Michele; Paladino, Domenico; Dreier, Joerg; Lee, Richard; Amri, Abdallah

    2014-01-01

    The Committee on the Safety of Nuclear Installations (CSNI) formed the CCVM (Containment Code Validation Matrix) task group in 2002. The objective of this group was to define a basic set of available experiments for code validation, covering the range of containment (ex-vessel) phenomena expected in the course of light and heavy water reactor design basis accidents and beyond design basis accidents/severe accidents. It was to consider phenomena relevant to pressurised heavy water reactor (PHWR), pressurised water reactor (PWR) and boiling water reactor (BWR) designs of Western origin as well as of Eastern European VVER types. This work would complement the two existing CSNI validation matrices for thermal hydraulic code validation (NEA/CSNI/R(1993)14) and In-vessel core degradation (NEA/CSNI/R(2001)21). The report initially provides a brief overview of the main features of a PWR, BWR, CANDU and VVER reactors. It also provides an overview of the ex-vessel corium retention (core catcher). It then provides a general overview of the accident progression for light water and heavy water reactors. The main focus is to capture most of the phenomena and safety systems employed in these reactor types and to highlight the differences. This CCVM contains a description of 127 phenomena, broken down into 6 categories: - Containment Thermal-hydraulics Phenomena; - Hydrogen Behaviour (Combustion, Mitigation and Generation) Phenomena; - Aerosol and Fission Product Behaviour Phenomena; - Iodine Chemistry Phenomena; - Core Melt Distribution and Behaviour in Containment Phenomena; - Systems Phenomena. A synopsis is provided for each phenomenon, including a description, references for further information, significance for DBA and SA/BDBA and a list of experiments that may be used for code validation. The report identified 213 experiments, broken down into the same six categories (as done for the phenomena). An experiment synopsis is provided for each test. Along with a test description

  8. Is day surgery safe?

    DEFF Research Database (Denmark)

    Majholm, Birgitte; Engbæk, J; Bartholdy, Jens

    2012-01-01

    Day surgery is expanding in several countries, and it is important to collect information about quality. The aim of this study was to assess morbidity and unanticipated hospital visits 0-30 days post-operatively in a large cohort.......Day surgery is expanding in several countries, and it is important to collect information about quality. The aim of this study was to assess morbidity and unanticipated hospital visits 0-30 days post-operatively in a large cohort....

  9. Bariatric Surgery for Obesity.

    Science.gov (United States)

    le Roux, Carel W; Heneghan, Helen M

    2018-01-01

    In this review, the authors discuss the indications for and the published outcomes of commonly performed bariatric procedures, including weight loss, perioperative morbidity and mortality, late complications, as well as the impact of bariatric surgery on comorbidities, cardiovascular risk, and mortality. They also briefly discuss the mechanisms by which bariatric/metabolic surgery causes such significant weight loss and health gain. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. Robotics in General Surgery

    OpenAIRE

    Wall, James; Chandra, Venita; Krummel, Thomas

    2008-01-01

    In summary, robotics has made a significant contribution to General Surgery in the past 20 years. In its infancy, surgical robotics has seen a shift from early systems that assisted the surgeon to current teleoperator systems that can enhance surgical skills. Telepresence and augmented reality surgery are being realized, while research and development into miniaturization and automation is rapidly moving forward. The future of surgical robotics is bright. Researchers are working to address th...

  11. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes.......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  12. TASS code topical report. V.1 TASS code technical manual

    International Nuclear Information System (INIS)

    Sim, Suk K.; Chang, W. P.; Kim, K. D.; Kim, H. C.; Yoon, H. Y.

    1997-02-01

    TASS 1.0 code has been developed at KAERI for the initial and reload non-LOCA safety analysis for the operating PWRs as well as the PWRs under construction in Korea. TASS code will replace various vendor's non-LOCA safety analysis codes currently used for the Westinghouse and ABB-CE type PWRs in Korea. This can be achieved through TASS code input modifications specific to each reactor type. The TASS code can be run interactively through the keyboard operation. A simimodular configuration used in developing the TASS code enables the user easily implement new models. TASS code has been programmed using FORTRAN77 which makes it easy to install and port for different computer environments. The TASS code can be utilized for the steady state simulation as well as the non-LOCA transient simulations such as power excursions, reactor coolant pump trips, load rejections, loss of feedwater, steam line breaks, steam generator tube ruptures, rod withdrawal and drop, and anticipated transients without scram (ATWS). The malfunctions of the control systems, components, operator actions and the transients caused by the malfunctions can be easily simulated using the TASS code. This technical report describes the TASS 1.0 code models including reactor thermal hydraulic, reactor core and control models. This TASS code models including reactor thermal hydraulic, reactor core and control models. This TASS code technical manual has been prepared as a part of the TASS code manual which includes TASS code user's manual and TASS code validation report, and will be submitted to the regulatory body as a TASS code topical report for a licensing non-LOCA safety analysis for the Westinghouse and ABB-CE type PWRs operating and under construction in Korea. (author). 42 refs., 29 tabs., 32 figs

  13. Construction of new quantum MDS codes derived from constacyclic codes

    Science.gov (United States)

    Taneja, Divya; Gupta, Manish; Narula, Rajesh; Bhullar, Jaskaran

    Obtaining quantum maximum distance separable (MDS) codes from dual containing classical constacyclic codes using Hermitian construction have paved a path to undertake the challenges related to such constructions. Using the same technique, some new parameters of quantum MDS codes have been constructed here. One set of parameters obtained in this paper has achieved much larger distance than work done earlier. The remaining constructed parameters of quantum MDS codes have large minimum distance and were not explored yet.

  14. Metabolic surgery: quo vadis?

    Science.gov (United States)

    Ramos-Leví, Ana M; Rubio Herrera, Miguel A

    2014-01-01

    The impact of bariatric surgery beyond its effect on weight loss has entailed a change in the way of regarding it. The term metabolic surgery has become more popular to designate those interventions that aim at resolving diseases that have been traditionally considered as of exclusive medical management, such as type 2 diabetes mellitus (T2D). Recommendations for metabolic surgery have been largely addressed and discussed in worldwide meetings, but no definitive consensus has been reached yet. Rates of diabetes remission after metabolic surgery have been one of the most debated hot topics, with heterogeneity being a current concern. This review aims to identify and clarify controversies regarding metabolic surgery, by focusing on a critical analysis of T2D remission rates achieved with different bariatric procedures, and using different criteria for its definition. Indications for metabolic surgery for patients with T2D who are not morbidly obese are also discussed. Copyright © 2013 SEEN. Published by Elsevier Espana. All rights reserved.

  15. Innovations in robotic surgery.

    Science.gov (United States)

    Gettman, Matthew; Rivera, Marcelino

    2016-05-01

    Developments in robotic surgery have continued to advance care throughout the field of urology. The purpose of this review is to evaluate innovations in robotic surgery over the past 18 months. The release of the da Vinci Xi system heralded an improvement on the Si system with improved docking, the ability to further manipulate robotic arms without clashing, and an autofocus universal endoscope. Robotic simulation continues to evolve with improvements in simulation training design to include augmented reality in robotic surgical education. Robotic-assisted laparoendoscopic single-site surgery continues to evolve with improvements on technique that allow for tackling previously complex pathologic surgical anatomy including urologic oncology and reconstruction. Last, innovations of new surgical platforms with robotic systems to improve surgeon ergonomics and efficiency in ureteral and renal surgery are being applied in the clinical setting. Urologic surgery continues to be at the forefront of the revolution of robotic surgery with advancements in not only existing technology but also creation of entirely novel surgical systems.

  16. Combinatorial neural codes from a mathematical coding theory perspective.

    Science.gov (United States)

    Curto, Carina; Itskov, Vladimir; Morrison, Katherine; Roth, Zachary; Walker, Judy L

    2013-07-01

    Shannon's seminal 1948 work gave rise to two distinct areas of research: information theory and mathematical coding theory. While information theory has had a strong influence on theoretical neuroscience, ideas from mathematical coding theory have received considerably less attention. Here we take a new look at combinatorial neural codes from a mathematical coding theory perspective, examining the error correction capabilities of familiar receptive field codes (RF codes). We find, perhaps surprisingly, that the high levels of redundancy present in these codes do not support accurate error correction, although the error-correcting performance of receptive field codes catches up to that of random comparison codes when a small tolerance to error is introduced. However, receptive field codes are good at reflecting distances between represented stimuli, while the random comparison codes are not. We suggest that a compromise in error-correcting capability may be a necessary price to pay for a neural code whose structure serves not only error correction, but must also reflect relationships between stimuli.

  17. Benchmarking in Thoracic Surgery. Third Edition.

    Science.gov (United States)

    Freixinet Gilart, Jorge; Varela Simó, Gonzalo; Rodríguez Suárez, Pedro; Embún Flor, Raúl; Rivas de Andrés, Juan José; de la Torre Bravos, Mercedes; Molins López-Rodó, Laureano; Pac Ferrer, Joaquín; Izquierdo Elena, José Miguel; Baschwitz, Benno; López de Castro, Pedro E; Fibla Alfara, Juan José; Hernando Trancho, Florentino; Carvajal Carrasco, Ángel; Canalís Arrayás, Emili; Salvatierra Velázquez, Ángel; Canela Cardona, Mercedes; Torres Lanzas, Juan; Moreno Mata, Nicolás

    2016-04-01

    Benchmarking entails continuous comparison of efficacy and quality among products and activities, with the primary objective of achieving excellence. To analyze the results of benchmarking performed in 2013 on clinical practices undertaken in 2012 in 17 Spanish thoracic surgery units. Study data were obtained from the basic minimum data set for hospitalization, registered in 2012. Data from hospital discharge reports were submitted by the participating groups, but staff from the corresponding departments did not intervene in data collection. Study cases all involved hospital discharges recorded in the participating sites. Episodes included were respiratory surgery (Major Diagnostic Category 04, Surgery), and those of the thoracic surgery unit. Cases were labelled using codes from the International Classification of Diseases, 9th revision, Clinical Modification. The refined diagnosis-related groups classification was used to evaluate differences in severity and complexity of cases. General parameters (number of cases, mean stay, complications, readmissions, mortality, and activity) varied widely among the participating groups. Specific interventions (lobectomy, pneumonectomy, atypical resections, and treatment of pneumothorax) also varied widely. As in previous editions, practices among participating groups varied considerably. Some areas for improvement emerge: admission processes need to be standardized to avoid urgent admissions and to improve pre-operative care; hospital discharges should be streamlined and discharge reports improved by including all procedures and complications. Some units have parameters which deviate excessively from the norm, and these sites need to review their processes in depth. Coding of diagnoses and comorbidities is another area where improvement is needed. Copyright © 2015 SEPAR. Published by Elsevier Espana. All rights reserved.

  18. Convolutional coding techniques for data protection

    Science.gov (United States)

    Massey, J. L.

    1975-01-01

    Results of research on the use of convolutional codes in data communications are presented. Convolutional coding fundamentals are discussed along with modulation and coding interaction. Concatenated coding systems and data compression with convolutional codes are described.

  19. Ostomy Surgery of the Bowel

    Science.gov (United States)

    ... Digestive System & How it Works Zollinger-Ellison Syndrome Ostomy Surgery of the Bowel What is ostomy surgery of the bowel? Ostomy surgery of the ... of the body. Why does a person need ostomy surgery of the bowel? A person may need ...

  20. High Energy Transport Code HETC

    International Nuclear Information System (INIS)

    Gabriel, T.A.

    1985-09-01

    The physics contained in the High Energy Transport Code (HETC), in particular the collision models, are discussed. An application using HETC as part of the CALOR code system is also given. 19 refs., 5 figs., 3 tabs

  1. Code stroke in Asturias.

    Science.gov (United States)

    Benavente, L; Villanueva, M J; Vega, P; Casado, I; Vidal, J A; Castaño, B; Amorín, M; de la Vega, V; Santos, H; Trigo, A; Gómez, M B; Larrosa, D; Temprano, T; González, M; Murias, E; Calleja, S

    2016-04-01

    Intravenous thrombolysis with alteplase is an effective treatment for ischaemic stroke when applied during the first 4.5 hours, but less than 15% of patients have access to this technique. Mechanical thrombectomy is more frequently able to recanalise proximal occlusions in large vessels, but the infrastructure it requires makes it even less available. We describe the implementation of code stroke in Asturias, as well as the process of adapting various existing resources for urgent stroke care in the region. By considering these resources, and the demographic and geographic circumstances of our region, we examine ways of reorganising the code stroke protocol that would optimise treatment times and provide the most appropriate treatment for each patient. We distributed the 8 health districts in Asturias so as to permit referral of candidates for reperfusion therapies to either of the 2 hospitals with 24-hour stroke units and on-call neurologists and providing IV fibrinolysis. Hospitals were assigned according to proximity and stroke severity; the most severe cases were immediately referred to the hospital with on-call interventional neurology care. Patient triage was provided by pre-hospital emergency services according to the NIHSS score. Modifications to code stroke in Asturias have allowed us to apply reperfusion therapies with good results, while emphasising equitable care and managing the severity-time ratio to offer the best and safest treatment for each patient as soon as possible. Copyright © 2015 Sociedad Española de Neurología. Published by Elsevier España, S.L.U. All rights reserved.

  2. Decoding Xing-Ling codes

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Refslund

    2002-01-01

    This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed.......This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed....

  3. WWER reactor physics code applications

    International Nuclear Information System (INIS)

    Gado, J.; Kereszturi, A.; Gacs, A.; Telbisz, M.

    1994-01-01

    The coupled steady-state reactor physics and thermohydraulic code system KARATE has been developed and applied for WWER-1000 and WWER-440 operational calculations. The 3 D coupled kinetic code KIKO3D has been developed and validated for WWER-440 accident analysis applications. The coupled kinetic code SMARTA developed by VTT Helsinki has been applied for WWER-440 accident analysis. The paper gives a summary of the experience in code development and application. (authors). 10 refs., 2 tabs., 5 figs

  4. The path of code linting

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Join the path of code linting and discover how it can help you reach higher levels of programming enlightenment. Today we will cover how to embrace code linters to offload cognitive strain on preserving style standards in your code base as well as avoiding error-prone constructs. Additionally, I will show you the journey ahead for integrating several code linters in the programming tools your already use with very little effort.

  5. The CORSYS neutronics code system

    International Nuclear Information System (INIS)

    Caner, M.; Krumbein, A.D.; Saphier, D.; Shapira, M.

    1994-01-01

    The purpose of this work is to assemble a code package for LWR core physics including coupled neutronics, burnup and thermal hydraulics. The CORSYS system is built around the cell code WIMS (for group microscopic cross section calculations) and 3-dimension diffusion code CITATION (for burnup and fuel management). We are implementing such a system on an IBM RS-6000 workstation. The code was rested with a simplified model of the Zion Unit 2 PWR. (authors). 6 refs., 8 figs., 1 tabs

  6. Bar codes for nuclear safeguards

    International Nuclear Information System (INIS)

    Keswani, A.N.; Bieber, A.M. Jr.

    1983-01-01

    Bar codes similar to those used in supermarkets can be used to reduce the effort and cost of collecting nuclear materials accountability data. A wide range of equipment is now commercially available for printing and reading bar-coded information. Several examples of each of the major types of commercially available equipment are given, and considerations are discussed both for planning systems using bar codes and for choosing suitable bar code equipment

  7. Bar codes for nuclear safeguards

    International Nuclear Information System (INIS)

    Keswani, A.N.; Bieber, A.M.

    1983-01-01

    Bar codes similar to those used in supermarkets can be used to reduce the effort and cost of collecting nuclear materials accountability data. A wide range of equipment is now commercially available for printing and reading bar-coded information. Several examples of each of the major types of commercially-available equipment are given, and considerations are discussed both for planning systems using bar codes and for choosing suitable bar code equipment

  8. Quick response codes in Orthodontics

    Directory of Open Access Journals (Sweden)

    Moidin Shakil

    2015-01-01

    Full Text Available Quick response (QR code codes are two-dimensional barcodes, which encodes for a large amount of information. QR codes in Orthodontics are an innovative approach in which patient details, radiographic interpretation, and treatment plan can be encoded. Implementing QR code in Orthodontics will save time, reduces paperwork, and minimizes manual efforts in storage and retrieval of patient information during subsequent stages of treatment.

  9. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...

  10. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  11. UNSPEC: revisited (semaphore code)

    International Nuclear Information System (INIS)

    Neifert, R.D.

    1981-01-01

    The UNSPEC code is used to solve the problem of unfolding an observed x-ray spectrum given the response matrix of the measuring system and the measured signal values. UNSPEC uses an iterative technique to solve the unfold problem. Due to experimental errors in the measured signal values and/or computer round-off errors, discontinuities and oscillatory behavior may occur in the iterated spectrum. These can be suppressed by smoothing the results after each iteration. Input/output options and control cards are explained; sample input and output are provided

  12. The FLIC conversion codes

    International Nuclear Information System (INIS)

    Basher, J.C.

    1965-05-01

    This report describes the FORTRAN programmes, FLIC 1 and FLIC 2. These programmes convert programmes coded in one dialect of FORTRAN to another dialect of the same language. FLIC 1 is a general pattern recognition and replacement programme whereas FLIC 2 contains extensions directed towards the conversion of FORTRAN II and S2 programmes to EGTRAN 1 - the dialect now in use on the Winfrith KDF9. FII or S2 statements are replaced where possible by their E1 equivalents; other statements which may need changing are flagged. (author)

  13. SPRAY code user's report

    International Nuclear Information System (INIS)

    Shire, P.R.

    1977-03-01

    The SPRAY computer code has been developed to model the effects of postulated sodium spray release from LMFBR piping within containment chambers. The calculation method utilizes gas convection, heat transfer and droplet combustion theory to calculate the pressure and temperature effects within the enclosure. The applicable range is 0-21 mol percent oxygen and .02-.30 inch droplets with or without humidity. Droplet motion and large sodium surface area combine to produce rapid heat release and pressure rise within the enclosed volume

  14. The FLIC conversion codes

    Energy Technology Data Exchange (ETDEWEB)

    Basher, J C [General Reactor Physics Division, Atomic Energy Establishment, Winfrith, Dorchester, Dorset (United Kingdom)

    1965-05-15

    This report describes the FORTRAN programmes, FLIC 1 and FLIC 2. These programmes convert programmes coded in one dialect of FORTRAN to another dialect of the same language. FLIC 1 is a general pattern recognition and replacement programme whereas FLIC 2 contains extensions directed towards the conversion of FORTRAN II and S2 programmes to EGTRAN 1 - the dialect now in use on the Winfrith KDF9. FII or S2 statements are replaced where possible by their E1 equivalents; other statements which may need changing are flagged. (author)

  15. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  16. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    1997-01-01

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy...... machinery of algebraic geometry....

  17. Direct-semidirect (DSD) codes

    International Nuclear Information System (INIS)

    Cvelbar, F.

    1999-01-01

    Recent codes for direct-semidirect (DSD) model calculations in the form of answers to a detailed questionnaire are reviewed. These codes include those embodying the classical DSD approach covering only the transitions to the bound states (RAF, HIKARI, and those of the Bologna group), as well as the code CUPIDO++ that also treats transitions to unbound states. (author)

  18. Dual Coding, Reasoning and Fallacies.

    Science.gov (United States)

    Hample, Dale

    1982-01-01

    Develops the theory that a fallacy is not a comparison of a rhetorical text to a set of definitions but a comparison of one person's cognition with another's. Reviews Paivio's dual coding theory, relates nonverbal coding to reasoning processes, and generates a limited fallacy theory based on dual coding theory. (PD)

  19. Strongly-MDS convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Rosenthal, J; Smarandache, R

    Maximum-distance separable (MDS) convolutional codes have the property that their free distance is maximal among all codes of the same rate and the same degree. In this paper, a class of MDS convolutional codes is introduced whose column distances reach the generalized Singleton bound at the

  20. Lattice polytopes in coding theory

    Directory of Open Access Journals (Sweden)

    Ivan Soprunov

    2015-05-01

    Full Text Available In this paper we discuss combinatorial questions about lattice polytopes motivated by recent results on minimum distance estimation for toric codes. We also include a new inductive bound for the minimum distance of generalized toric codes. As an application, we give new formulas for the minimum distance of generalized toric codes for special lattice point configurations.

  1. Computer codes for safety analysis

    International Nuclear Information System (INIS)

    Holland, D.F.

    1986-11-01

    Computer codes for fusion safety analysis have been under development in the United States for about a decade. This paper will discuss five codes that are currently under development by the Fusion Safety Program. The purpose and capability of each code will be presented, a sample given, followed by a discussion of the present status and future development plans

  2. Geochemical computer codes. A review

    International Nuclear Information System (INIS)

    Andersson, K.

    1987-01-01

    In this report a review of available codes is performed and some code intercomparisons are also discussed. The number of codes treating natural waters (groundwater, lake water, sea water) is large. Most geochemical computer codes treat equilibrium conditions, although some codes with kinetic capability are available. A geochemical equilibrium model consists of a computer code, solving a set of equations by some numerical method and a data base, consisting of thermodynamic data required for the calculations. There are some codes which treat coupled geochemical and transport modeling. Some of these codes solve the equilibrium and transport equations simultaneously while other solve the equations separately from each other. The coupled codes require a large computer capacity and have thus as yet limited use. Three code intercomparisons have been found in literature. It may be concluded that there are many codes available for geochemical calculations but most of them require a user that us quite familiar with the code. The user also has to know the geochemical system in order to judge the reliability of the results. A high quality data base is necessary to obtain a reliable result. The best results may be expected for the major species of natural waters. For more complicated problems, including trace elements, precipitation/dissolution, adsorption, etc., the results seem to be less reliable. (With 44 refs.) (author)

  3. Separate Turbo Code and Single Turbo Code Adaptive OFDM Transmissions

    Directory of Open Access Journals (Sweden)

    Lei Ye

    2009-01-01

    Full Text Available This paper discusses the application of adaptive modulation and adaptive rate turbo coding to orthogonal frequency-division multiplexing (OFDM, to increase throughput on the time and frequency selective channel. The adaptive turbo code scheme is based on a subband adaptive method, and compares two adaptive systems: a conventional approach where a separate turbo code is used for each subband, and a single turbo code adaptive system which uses a single turbo code over all subbands. Five modulation schemes (BPSK, QPSK, 8AMPM, 16QAM, and 64QAM are employed and turbo code rates considered are 1/2 and 1/3. The performances of both systems with high (10−2 and low (10−4 BER targets are compared. Simulation results for throughput and BER show that the single turbo code adaptive system provides a significant improvement.

  4. New quantum codes constructed from quaternary BCH codes

    Science.gov (United States)

    Xu, Gen; Li, Ruihu; Guo, Luobin; Ma, Yuena

    2016-10-01

    In this paper, we firstly study construction of new quantum error-correcting codes (QECCs) from three classes of quaternary imprimitive BCH codes. As a result, the improved maximal designed distance of these narrow-sense imprimitive Hermitian dual-containing quaternary BCH codes are determined to be much larger than the result given according to Aly et al. (IEEE Trans Inf Theory 53:1183-1188, 2007) for each different code length. Thus, families of new QECCs are newly obtained, and the constructed QECCs have larger distance than those in the previous literature. Secondly, we apply a combinatorial construction to the imprimitive BCH codes with their corresponding primitive counterpart and construct many new linear quantum codes with good parameters, some of which have parameters exceeding the finite Gilbert-Varshamov bound for linear quantum codes.

  5. Quantum Codes From Cyclic Codes Over The Ring R 2

    International Nuclear Information System (INIS)

    Altinel, Alev; Güzeltepe, Murat

    2016-01-01

    Let R 2 denotes the ring F 2 + μF 2 + υ 2 + μυ F 2 + wF 2 + μwF 2 + υwF 2 + μυwF 2 . In this study, we construct quantum codes from cyclic codes over the ring R 2 , for arbitrary length n, with the restrictions μ 2 = 0, υ 2 = 0, w 2 = 0, μυ = υμ, μw = wμ, υw = wυ and μ (υw) = (μυ) w. Also, we give a necessary and sufficient condition for cyclic codes over R 2 that contains its dual. As a final point, we obtain the parameters of quantum error-correcting codes from cyclic codes over R 2 and we give an example of quantum error-correcting codes form cyclic codes over R 2 . (paper)

  6. Separate Turbo Code and Single Turbo Code Adaptive OFDM Transmissions

    Directory of Open Access Journals (Sweden)

    Burr Alister

    2009-01-01

    Full Text Available Abstract This paper discusses the application of adaptive modulation and adaptive rate turbo coding to orthogonal frequency-division multiplexing (OFDM, to increase throughput on the time and frequency selective channel. The adaptive turbo code scheme is based on a subband adaptive method, and compares two adaptive systems: a conventional approach where a separate turbo code is used for each subband, and a single turbo code adaptive system which uses a single turbo code over all subbands. Five modulation schemes (BPSK, QPSK, 8AMPM, 16QAM, and 64QAM are employed and turbo code rates considered are and . The performances of both systems with high ( and low ( BER targets are compared. Simulation results for throughput and BER show that the single turbo code adaptive system provides a significant improvement.

  7. Converter of a continuous code into the Grey code

    International Nuclear Information System (INIS)

    Gonchar, A.I.; TrUbnikov, V.R.

    1979-01-01

    Described is a converter of a continuous code into the Grey code used in a 12-charged precision amplitude-to-digital converter to decrease the digital component of spectrometer differential nonlinearity to +0.7% in the 98% range of the measured band. To construct the converter of a continuous code corresponding to the input signal amplitude into the Grey code used is the regularity in recycling of units and zeroes in each discharge of the Grey code in the case of a continuous change of the number of pulses of a continuous code. The converter is constructed on the elements of 155 series, the frequency of continuous code pulse passing at the converter input is 25 MHz

  8. Supervised Transfer Sparse Coding

    KAUST Repository

    Al-Shedivat, Maruan

    2014-07-27

    A combination of the sparse coding and transfer learn- ing techniques was shown to be accurate and robust in classification tasks where training and testing objects have a shared feature space but are sampled from differ- ent underlying distributions, i.e., belong to different do- mains. The key assumption in such case is that in spite of the domain disparity, samples from different domains share some common hidden factors. Previous methods often assumed that all the objects in the target domain are unlabeled, and thus the training set solely comprised objects from the source domain. However, in real world applications, the target domain often has some labeled objects, or one can always manually label a small num- ber of them. In this paper, we explore such possibil- ity and show how a small number of labeled data in the target domain can significantly leverage classifica- tion accuracy of the state-of-the-art transfer sparse cod- ing methods. We further propose a unified framework named supervised transfer sparse coding (STSC) which simultaneously optimizes sparse representation, domain transfer and classification. Experimental results on three applications demonstrate that a little manual labeling and then learning the model in a supervised fashion can significantly improve classification accuracy.

  9. Examination of bariatric surgery Facebook support groups: a content analysis.

    Science.gov (United States)

    Koball, Afton M; Jester, Dylan J; Domoff, Sarah E; Kallies, Kara J; Grothe, Karen B; Kothari, Shanu N

    2017-08-01

    Support following bariatric surgery is vital to ensure long-term postoperative success. Many individuals undergoing bariatric surgery are turning to online modalities, especially the popular social media platform Facebook, to access support groups and pages. Despite evidence suggesting that the majority of patients considering bariatric surgery are utilizing online groups, little is known about the actual content of these groups. The purpose of the present study was to conduct a content analysis of bariatric surgery support groups and pages on Facebook. Online via Facebook, independent academic medical center, United States. Data from bariatric surgery-related Facebook support groups and pages were extracted over a 1-month period in 2016. Salient content themes (e.g., progress posts, depression content, eating behaviors) were coded reliably (all κ> .70). More than 6,800 posts and replies were coded. Results indicated that seeking recommendations (11%), providing information or recommendations (53%), commenting on changes since surgery (19%), and lending support to other members (32%) were the most common types of posts. Content surrounding anxiety, eating behaviors, depression, body image, weight bias, and alcohol was found less frequently. Online bariatric surgery groups can be used to receive support, celebrate physical and emotional accomplishments, provide anecdotal accounts of the "bariatric lifestyle" for preoperative patients, and comment on challenges with mental health and experiences of weight bias. Providers should become acquainted with the content commonly found in online groups and exercise caution in recommending these platforms to information-seeking patients. Copyright © 2017 American Society for Bariatric Surgery. Published by Elsevier Inc. All rights reserved.

  10. Two-terminal video coding.

    Science.gov (United States)

    Yang, Yang; Stanković, Vladimir; Xiong, Zixiang; Zhao, Wei

    2009-03-01

    Following recent works on the rate region of the quadratic Gaussian two-terminal source coding problem and limit-approaching code designs, this paper examines multiterminal source coding of two correlated, i.e., stereo, video sequences to save the sum rate over independent coding of both sequences. Two multiterminal video coding schemes are proposed. In the first scheme, the left sequence of the stereo pair is coded by H.264/AVC and used at the joint decoder to facilitate Wyner-Ziv coding of the right video sequence. The first I-frame of the right sequence is successively coded by H.264/AVC Intracoding and Wyner-Ziv coding. An efficient stereo matching algorithm based on loopy belief propagation is then adopted at the decoder to produce pixel-level disparity maps between the corresponding frames of the two decoded video sequences on the fly. Based on the disparity maps, side information for both motion vectors and motion-compensated residual frames of the right sequence are generated at the decoder before Wyner-Ziv encoding. In the second scheme, source splitting is employed on top of classic and Wyner-Ziv coding for compression of both I-frames to allow flexible rate allocation between the two sequences. Experiments with both schemes on stereo video sequences using H.264/AVC, LDPC codes for Slepian-Wolf coding of the motion vectors, and scalar quantization in conjunction with LDPC codes for Wyner-Ziv coding of the residual coefficients give a slightly lower sum rate than separate H.264/AVC coding of both sequences at the same video quality.

  11. CT after transsphenoidal surgery

    International Nuclear Information System (INIS)

    Tazawa, Satoru

    1991-01-01

    Two hundred and ten CT studies of 95 patients after transsphenoidal surgery were reviewed. Spheno-ethmoid opacificaiton, intrasellar hematoma and gas bubbles were noted within 2 weeks after surgery. Bone defect of the sellar floor and bone stent were seen on coronal scans in most cases. The packing material frequently disappeared on follow-up studies. Hormonal assessment of the functioning tumor, according to which the effect of treatment was evaluated, was correlated with CT findings. Because differentiation between postoperative changes and residual mass was difficult, there was no definite CT criteria to indicate residual functioning tumor except upward convexity of the diaphragma sellae on CT more than 3 months after surgery. Initial follow up CT study is recommended to be performed at about 3 months after surgery, at which time the immediate postoperative inflammatory changes have been disappeared. The incidence of recurrence was 3/47 (6%), which was shown on follow-up CT from 4 to 10 years after surgery. Therefore, subsequent CT study should be done in every year or two, taking the clinical symptoms and hormonal data into consideration. (author)

  12. Pediatric endocrine surgery development

    Directory of Open Access Journals (Sweden)

    Ivan I. Dedov

    2017-12-01

    Full Text Available Department of pediatric surgery at the Endocrinology Research Centre has been around for nearly two years. During operation, surgical treatment has received more than 500 patients with various endocrine disorders. The article discusses modern diagnostic approaches and surgical options for diseases included in the new direction of pediatric surgery – endocrine surgery in children. There are discussions about options for radical treatment of Graves disease in children, positive and negative aspects of surgical and radioactive iodine treatment. Is own stats of postoperative hyperparathyroidism. Is proposed to optimize the algorithm of actions in identifying thyroid nodules in children. In primary hyperparathyroidism, the emphasis is on the complexity of the postoperative management of patients related to the feature of children’s age in determining the severity of the reactions on the water-electrolyte disorders. Separately reviewed the literature of the adrenal glands diseases in children, demonstrating their own clinical cases which required surgical intervention. The authors describe the possibilities of modern neurosurgical equipment in the Endocrinology Research Centre in operations on the pituitary gland in children. Patients of different age groups performed transnasal transsphenoidal removal of tumors of the chiasm-sellar region using endoscopic assistance. The article also cited research data of pancreas diseases and their surgical treatment. Much attention is paid to the gender section of endocrine surgery in children. Discusses the tactics in disorders of sex development, gonadal tumors in children, diseases of the breast. In conclusion outlines the prospects for the development of endocrine surgery in children.

  13. Innovations in Bariatric Surgery.

    Science.gov (United States)

    Zhu, Catherine; Pryor, Aurora D

    2015-11-01

    Surgery has consistently been demonstrated to be the most effective long-term therapy for the treatment of obesity. However, despite excellent outcomes with current procedures, most patients with obesity- and weight-related comorbidities who meet criteria for surgical treatment choose not to pursue surgery out of fear of operative risks and complications or concerns about high costs. Novel minimally invasive procedures and devices may offer alternative solutions for patients who are hesitant to pursue standard surgical approaches. These procedures may be used for primary treatment of obesity, early intervention for patients approaching morbid obesity, temporary management prior to bariatric surgery, or revision of bypass surgery associated with weight regain. Novel bariatric procedures can in general be divided into four categories: endoluminal space-occupying devices, gastric suturing and restrictive devices, absorption-limiting devices, and neural-hormonal modulating devices. Many of these are only approved as short-term interventions, but these devices may be effective for patients desiring low-risk procedures or a transient effect. We will see the expansion of indications and alternatives for metabolic surgery as these techniques gain approval.

  14. CT after transsphenoidal surgery

    Energy Technology Data Exchange (ETDEWEB)

    Tazawa, Satoru [Tohoku Univ., Sendai (Japan). School of Medicine

    1991-03-01

    Two hundred and ten CT studies of 95 patients after transsphenoidal surgery were reviewed. Spheno-ethmoid opacificaiton, intrasellar hematoma and gas bubbles were noted within 2 weeks after surgery. Bone defect of the sellar floor and bone stent were seen on coronal scans in most cases. The packing material frequently disappeared on follow-up studies. Hormonal assessment of the functioning tumor, according to which the effect of treatment was evaluated, was correlated with CT findings. Because differentiation between postoperative changes and residual mass was difficult, there was no definite CT criteria to indicate residual functioning tumor except upward convexity of the diaphragma sellae on CT more than 3 months after surgery. Initial follow up CT study is recommended to be performed at about 3 months after surgery, at which time the immediate postoperative inflammatory changes have been disappeared. The incidence of recurrence was 3/47 (6%), which was shown on follow-up CT from 4 to 10 years after surgery. Therefore, subsequent CT study should be done in every year or two, taking the clinical symptoms and hormonal data into consideration. (author).

  15. The Art of Readable Code

    CERN Document Server

    Boswell, Dustin

    2011-01-01

    As programmers, we've all seen source code that's so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they're bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it-even if that someone else is you. This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languag

  16. Sub-Transport Layer Coding

    DEFF Research Database (Denmark)

    Hansen, Jonas; Krigslund, Jeppe; Roetter, Daniel Enrique Lucani

    2014-01-01

    Packet losses in wireless networks dramatically curbs the performance of TCP. This paper introduces a simple coding shim that aids IP-layer traffic in lossy environments while being transparent to transport layer protocols. The proposed coding approach enables erasure correction while being...... oblivious to the congestion control algorithms of the utilised transport layer protocol. Although our coding shim is indifferent towards the transport layer protocol, we focus on the performance of TCP when ran on top of our proposed coding mechanism due to its widespread use. The coding shim provides gains...

  17. Surgery for trigger finger.

    Science.gov (United States)

    Fiorini, Haroldo Junior; Tamaoki, Marcel Jun; Lenza, Mário; Gomes Dos Santos, Joao Baptista; Faloppa, Flávio; Belloti, Joao Carlos

    2018-02-20

    Trigger finger is a common clinical disorder, characterised by pain and catching as the patient flexes and extends digits because of disproportion between the diameter of flexor tendons and the A1 pulley. The treatment approach may include non-surgical or surgical treatments. Currently there is no consensus about the best surgical treatment approach (open, percutaneous or endoscopic approaches). To evaluate the effectiveness and safety of different methods of surgical treatment for trigger finger (open, percutaneous or endoscopic approaches) in adults at any stage of the disease. We searched CENTRAL, MEDLINE, Embase and LILACS up to August 2017. We included randomised or quasi-randomised controlled trials that assessed adults with trigger finger and compared any type of surgical treatment with each other or with any other non-surgical intervention. The major outcomes were the resolution of trigger finger, pain, hand function, participant-reported treatment success or satisfaction, recurrence of triggering, adverse events and neurovascular injury. Two review authors independently selected the trial reports, extracted the data and assessed the risk of bias. Measures of treatment effect for dichotomous outcomes calculated risk ratios (RRs), and mean differences (MDs) or standardised mean differences (SMD) for continuous outcomes, with 95% confidence intervals (CIs). When possible, the data were pooled into meta-analysis using the random-effects model. GRADE was used to assess the quality of evidence for each outcome. Fourteen trials were included, totalling 1260 participants, with 1361 trigger fingers. The age of participants included in the studies ranged from 16 to 88 years; and the majority of participants were women (approximately 70%). The average duration of symptoms ranged from three to 15 months, and the follow-up after the procedure ranged from eight weeks to 23 months.The studies reported nine types of comparisons: open surgery versus steroid injections (two

  18. SURGERY AND CARDIOVASCULAR SURGERY JOURNALS ANALYSIS.

    Science.gov (United States)

    Schanaider, Alberto

    2015-01-01

    To analyze critically the effectiveness and value of bibliometric indicators in journals of Surgery or Cardiovacular Surgery in the context of the postgraduate programs of CAPES Medicine III. A sampling with 16 academic programs and one professional master of Medicine III, encompassing the General and Digestive System Surgery, Cardiovascular Surgery and Multidisciplinary courses with such contents, was evaluated. Thomson Reuters/ISI (JCR), Elsevier/Scopus (SJR), and also Scielo databases were used. Only in seven programs, the teachers had an average of Qualis A1 articles greater than the others strata. Eleven journals in the surgical area are in stratum A1 (5%) and it reaches 25% in Cardiovascular Surgery. Among the six journals with the largest number of publications Qualis A1 in area Medicine III, five are from non-specific areas. The Acta Cirúrgica Brasileira represented 58% of the publications in the stratum A2. There are some obstacles in the Qualis classification with little uniformity among the Medicine areas I, II and III. A permanent committee should be set to update the Qualis, composed by the three medical areas. It should be considered using other index databases and the unification of the Qualis criteria for journals in medicine. Rating criteria of multi and transdisciplinary journals need to be reviewed. It is essential an institutional financial support for national journals chosen by peers aiming to provide a full computerization process and a professional reviewer of the English language, in order to increase the impact factor. Analisar criticamente a eficácia e valor de indicadores bibliométricos dos periódicos da Cirurgia e Cirurgia Cardiovascular no contexto dos Programas de Pós-Graduação da área Medicina III da CAPES. Foi avaliada uma amostragem com 16 programas acadêmicos e um mestrado profissional da área de Medicina III, compreendendo a Cirurgia Geral e do Aparelho Digestivo, a Cirurgia Cardiovascular e Cursos Multidisciplinares

  19. 75 FR 19944 - International Code Council: The Update Process for the International Codes and Standards

    Science.gov (United States)

    2010-04-16

    ... documents from ICC's Chicago District Office: International Code Council, 4051 W Flossmoor Road, Country... Energy Conservation Code. International Existing Building Code. International Fire Code. International...

  20. Polynomial weights and code constructions

    DEFF Research Database (Denmark)

    Massey, J; Costello, D; Justesen, Jørn

    1973-01-01

    polynomial included. This fundamental property is then used as the key to a variety of code constructions including 1) a simplified derivation of the binary Reed-Muller codes and, for any primepgreater than 2, a new extensive class ofp-ary "Reed-Muller codes," 2) a new class of "repeated-root" cyclic codes...... of long constraint length binary convolutional codes derived from2^r-ary Reed-Solomon codes, and 6) a new class ofq-ary "repeated-root" constacyclic codes with an algebraic decoding algorithm.......For any nonzero elementcof a general finite fieldGF(q), it is shown that the polynomials(x - c)^i, i = 0,1,2,cdots, have the "weight-retaining" property that any linear combination of these polynomials with coefficients inGF(q)has Hamming weight at least as great as that of the minimum degree...

  1. Introduction of SCIENCE code package

    International Nuclear Information System (INIS)

    Lu Haoliang; Li Jinggang; Zhu Ya'nan; Bai Ning

    2012-01-01

    The SCIENCE code package is a set of neutronics tools based on 2D assembly calculations and 3D core calculations. It is made up of APOLLO2F, SMART and SQUALE and used to perform the nuclear design and loading pattern analysis for the reactors on operation or under construction of China Guangdong Nuclear Power Group. The purpose of paper is to briefly present the physical and numerical models used in each computation codes of the SCIENCE code pack age, including the description of the general structure of the code package, the coupling relationship of APOLLO2-F transport lattice code and SMART core nodal code, and the SQUALE code used for processing the core maps. (authors)

  2. Elements of algebraic coding systems

    CERN Document Server

    Cardoso da Rocha, Jr, Valdemar

    2014-01-01

    Elements of Algebraic Coding Systems is an introductory text to algebraic coding theory. In the first chapter, you'll gain inside knowledge of coding fundamentals, which is essential for a deeper understanding of state-of-the-art coding systems. This book is a quick reference for those who are unfamiliar with this topic, as well as for use with specific applications such as cryptography and communication. Linear error-correcting block codes through elementary principles span eleven chapters of the text. Cyclic codes, some finite field algebra, Goppa codes, algebraic decoding algorithms, and applications in public-key cryptography and secret-key cryptography are discussed, including problems and solutions at the end of each chapter. Three appendices cover the Gilbert bound and some related derivations, a derivation of the Mac- Williams' identities based on the probability of undetected error, and two important tools for algebraic decoding-namely, the finite field Fourier transform and the Euclidean algorithm f...

  3. Viscoless microincision cataract surgery

    Directory of Open Access Journals (Sweden)

    Guy Sallet

    2008-06-01

    Full Text Available Guy SalletDepartment of Opthamology, Aalsters Stedelijk Ziekenhuis, BelgiumAbstract: A cataract surgery technique is described in which incisions, continuous circular capsulorhexis and hydrodissection are made without the use of any viscoelastics. Two small incisions are created through which the different parts of the procedure can take place, maintaining a stable anterior chamber under continuous irrigation. Subsequent bimanual phacoemulsification can be done through these microincisions. At the end of the procedure, an intraocular lens can be inserted through the self-sealing incision under continuous irrigation. 50 consecutive cataract patients were operated on without the use of viscoelastics and then compared with a group of 50 patients who had been helped with viscoelastics. No difference in outcome, endothelial cell count or pachymetry was noted between the two groups. No intraoperative complication was encountered. Viscoless cataract surgery was a safe procedure with potential advantages.Keywords: ophthalmic visco-surgical device, viscoless cataract surgery, microincision

  4. Single port laparoscopic surgery

    DEFF Research Database (Denmark)

    Springborg, Henrik; Istre, Olav

    2012-01-01

    LESS, or laparo-endoscopic single site surgery, is a promising new method in minimally invasive surgery. An increasing number of surgical procedures are being performed using this technique, however, its large-scale adoption awaits results of prospective randomized controlled studies confirming...... potential benefits. Theoretically, cosmetic outcomes, postoperative pain and complication rates could be improved with use of single site surgery. This study describes introduction of the method in a private hospital in Denmark, in which 40 patients have been treated for benign gynecologic conditions....... Although the operations described are the first of their kind reported in Denmark, favorable operating times and very low complication rates are seen. It is the authors' opinion that in addition to being feasible for hysterectomy, single port laparoscopy may become the preferred method for many simple...

  5. Robotic aortic surgery.

    Science.gov (United States)

    Duran, Cassidy; Kashef, Elika; El-Sayed, Hosam F; Bismuth, Jean

    2011-01-01

    Surgical robotics was first utilized to facilitate neurosurgical biopsies in 1985, and it has since found application in orthopedics, urology, gynecology, and cardiothoracic, general, and vascular surgery. Surgical assistance systems provide intelligent, versatile tools that augment the physician's ability to treat patients by eliminating hand tremor and enabling dexterous operation inside the patient's body. Surgical robotics systems have enabled surgeons to treat otherwise untreatable conditions while also reducing morbidity and error rates, shortening operative times, reducing radiation exposure, and improving overall workflow. These capabilities have begun to be realized in two important realms of aortic vascular surgery, namely, flexible robotics for exclusion of complex aortic aneurysms using branched endografts, and robot-assisted laparoscopic aortic surgery for occlusive and aneurysmal disease.

  6. Wide Awake Hand Surgery.

    Science.gov (United States)

    Lied, Line; Borchgrevink, Grethe E; Finsen, Vilhjalmur

    2017-09-01

    "Wide awake hand surgery", where surgery is performed in local anaesthesia with adrenaline, without sedation or a tourniquet, has become widespread in some countries. It has a number of potential advantages and we wished to evaluate it among our patients. All 122 patients treated by this method during one year were evaluated by the surgeons and the patients on a numerical scale from 0 (best/least) to 10 (worst/most). Theatre time was compared to that recorded for a year when regional or general anaesthesia had been used. The patients' mean score for the general care they had received was 0.1 (SD 0.6), for pain during lidocaine injection 2.4 (SD 2.2), for pain during surgery 0.9 (SD 1.5), and for other discomfort during surgery 0.5 (SD 1.4). Eight reported that they would want general anaesthesia if they were to be operated again. The surgeons' mean evaluation of bleeding during surgery was 1.6 (SD 1.8), oedema during surgery 0.4 (SD 1.1), general disadvantages with the method 1.0 (SD 1.6) and general advantages 6.5 (SD 4.3). The estimation of advantages was 9.9 (DS 0.5) for tendon suture. 28 patients needed intra-operative additional anaesthesia. The proportion was lower among trained hand surgeons and fell significantly during the study period. Non-surgical theatre time was 46 (SD 15) minutes during the study period and 55 (SD 22) minutes during the regional/general period (p theatre.

  7. [Bariatric surgery in Denmark.

    DEFF Research Database (Denmark)

    Funch-Jensen, P.; Iversen, M.G.; Kehlet, H.

    2008-01-01

    INTRODUCTION: In 2005 the National Board of Health (NBH) published guidelines on bariatric surgery in Denmark. The aim of the present study was to shed light on the national bariatric effort in relation to these guidelines. MATERIAL AND METHODS: The analysis is based on extraction of the following......, a tendency which was attributable to the activities of one of the private clinics. CONCLUSION: The frequency with which bariatric surgery is performed follows a strongly increasing trend and the procedures are only performed at the public departments selected by the National Board of Health...

  8. Orthognathic surgery: general considerations.

    Science.gov (United States)

    Khechoyan, David Y

    2013-08-01

    a patient's appearance and occlusal function can be improved significantly, impacting the patient's sense of self and well-being. Successful outcomes in modern orthognathic surgery rely on close collaboration between the surgeon and the orthodontist across all stages of treatment, from preoperative planning to finalization of occlusion. Virtual computer planning promotes a more accurate analysis of dentofacial deformity and preoperative planning. It is also an invaluable aid in providing comprehensive patient education. In this article, the author describes the general surgical principles that underlie orthognathic surgery, highlighting the sequence of treatment, preoperative analysis of dentofacial deformity, surgical execution of the treatment plan, and possible complications.

  9. [Simulation in pediatric surgery].

    Science.gov (United States)

    Becmeur, François; Lacreuse, Isabelle; Soler, Luc

    2011-11-01

    Simulation in paediatric surgery is essential for educational, ethical, medicolegal and economic reasons, and is particularly important for rare procedures. There are three different levels of simulation:--simulation of basic techniques in order to learn or improve surgical skills (dissection, intracorporeal knots, etc.);--preparation for surgery using virtual reality, to perfect and test various procedures on a virtual patient, and to determine the best approaches for individual cases;--behavioral simulation underlines the importance of the preoperative check-list and facilitates crisis management (complications, conversion, etc.).

  10. Diplopia after Strabismus Surgery.

    Science.gov (United States)

    Sharma, Medha; Hunter, David G

    2018-01-01

    Diplopia is a disappointing and, at times, unanticipated consequence of what might otherwise be considered anatomically successful strabismus surgery. In this study, we review the existing literature regarding diplopia after strabismus surgery in the context of the senior author's experience. We divide postoperative diplopia types into cases that occur in the setting of normal binocular vision (or "normal" suppression) vs. cases that are the consequence of rare or anomalous sensorial adaptations. We then discuss how to identify patients at greatest risk based on history and preoperative testing, and we offer strategies for managing these sometimes-challenging cases.

  11. Ovarian cancer surgery

    DEFF Research Database (Denmark)

    Seibaek, Lene; Blaakaer, Jan; Petersen, Lone Kjeld

    2013-01-01

    PURPOSE: The study objective was to survey general health and coping in women undergoing ovarian cancer surgery, and subsequently to develop and test a supportive care intervention. METHODS/MATERIALS: Women who underwent surgery on the suspicion of ovarian cancer participated in a follow...... standard levels. Concerning mental health, levels were below standard during the entire period, but did improve with time, also in women in whom the potential cancer diagnosis was refuted. The preoperative differences between these groups leveled out postoperatively in terms of physical health. At the end...

  12. Tourniquets in orthopedic surgery

    Directory of Open Access Journals (Sweden)

    Jai Prakash Sharma

    2012-01-01

    Full Text Available Tourniquets are commonly used in limb surgeries, be it orthopedic or plastic surgeries. But the inflation pressures, the duration, and release guidelines are still not clear. According to a survey, majority of orthopedic surgeons inflate the tourniquet to fixed pressures for the upper and the lower limbs without considering the baseline blood pressure of the patient on whom the tourniquets are being applied. This review was designed to recall and review the safe use of tourniquets and the various techniques that can be employed to minimize the complications of tourniquet use. Google, science direct, and pubmed were searched for appropriate literature and relevant articles were identified.

  13. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    of interfering nodes and usage of spatial reservation mechanisms. Specifically, we introduce a reserved area in order to protect the nodes involved in two-way relaying from the interference caused by neighboring nodes. We analytically derive the end-to-end rate achieved by PLNC considering the impact......Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause....../receive interference. The way to deal with this problem in distributed wireless networks is usage of MAC-layer mechanisms that make a spatial reservation of the shared wireless medium, similar to the well-known RTS/CTS in IEEE 802.11 wireless networks. In this paper, we investigate two-way relaying in presence...

  14. Concatenated quantum codes

    Energy Technology Data Exchange (ETDEWEB)

    Knill, E.; Laflamme, R.

    1996-07-01

    One main problem for the future of practial quantum computing is to stabilize the computation against unwanted interactions with the environment and imperfections in the applied operations. Existing proposals for quantum memories and quantum channels require gates with asymptotically zero error to store or transmit an input quantum state for arbitrarily long times or distances with fixed error. This report gives a method which has the property that to store or transmit a qubit with maximum error {epsilon} requires gates with errors at most {ital c}{epsilon} and storage or channel elements with error at most {epsilon}, independent of how long we wish to store the state or how far we wish to transmit it. The method relies on using concatenated quantum codes and hierarchically implemented recovery operations. The overhead of the method is polynomial in the time of storage or the distance of the transmission. Rigorous and heuristic lower bounds for the constant {ital c} are given.

  15. Code des baux 2018

    CERN Document Server

    Vial-Pedroletti, Béatrice; Kendérian, Fabien; Chavance, Emmanuelle; Coutan-Lapalus, Christelle

    2017-01-01

    Le code des baux 2018 vous offre un contenu extrêmement pratique, fiable et à jour au 1er août 2017. Cette 16e édition intègre notamment : le décret du 27 juillet 2017 relatif à l’évolution de certains loyers dans le cadre d’une nouvelle location ou d’un renouvellement de bail, pris en application de l’article 18 de la loi n° 89-462 du 6 juillet 1989 ; la loi du 27 janvier 2017 relative à l’égalité et à la citoyenneté ; la loi du 9 décembre 2016 relative à la transparence, à la lutte contre la corruption et à la modernisation de la vie économique ; la loi du 18 novembre 2016 de modernisation de la justice du xxie siècle

  16. GOC: General Orbit Code

    International Nuclear Information System (INIS)

    Maddox, L.B.; McNeilly, G.S.

    1979-08-01

    GOC (General Orbit Code) is a versatile program which will perform a variety of calculations relevant to isochronous cyclotron design studies. In addition to the usual calculations of interest (e.g., equilibrium and accelerated orbits, focusing frequencies, field isochronization, etc.), GOC has a number of options to calculate injections with a charge change. GOC provides both printed and plotted output, and will follow groups of particles to allow determination of finite-beam properties. An interactive PDP-10 program called GIP, which prepares input data for GOC, is available. GIP is a very easy and convenient way to prepare complicated input data for GOC. Enclosed with this report are several microfiche containing source listings of GOC and other related routines and the printed output from a multiple-option GOC run

  17. LDGM Codes for Channel Coding and Joint Source-Channel Coding of Correlated Sources

    Directory of Open Access Journals (Sweden)

    Javier Garcia-Frias

    2005-05-01

    Full Text Available We propose a coding scheme based on the use of systematic linear codes with low-density generator matrix (LDGM codes for channel coding and joint source-channel coding of multiterminal correlated binary sources. In both cases, the structures of the LDGM encoder and decoder are shown, and a concatenated scheme aimed at reducing the error floor is proposed. Several decoding possibilities are investigated, compared, and evaluated. For different types of noisy channels and correlation models, the resulting performance is very close to the theoretical limits.

  18. Surface acoustic wave coding for orthogonal frequency coded devices

    Science.gov (United States)

    Malocha, Donald (Inventor); Kozlovski, Nikolai (Inventor)

    2011-01-01

    Methods and systems for coding SAW OFC devices to mitigate code collisions in a wireless multi-tag system. Each device producing plural stepped frequencies as an OFC signal with a chip offset delay to increase code diversity. A method for assigning a different OCF to each device includes using a matrix based on the number of OFCs needed and the number chips per code, populating each matrix cell with OFC chip, and assigning the codes from the matrix to the devices. The asynchronous passive multi-tag system includes plural surface acoustic wave devices each producing a different OFC signal having the same number of chips and including a chip offset time delay, an algorithm for assigning OFCs to each device, and a transceiver to transmit an interrogation signal and receive OFC signals in response with minimal code collisions during transmission.

  19. Entanglement-assisted quantum MDS codes from negacyclic codes

    Science.gov (United States)

    Lu, Liangdong; Li, Ruihu; Guo, Luobin; Ma, Yuena; Liu, Yang

    2018-03-01

    The entanglement-assisted formalism generalizes the standard stabilizer formalism, which can transform arbitrary classical linear codes into entanglement-assisted quantum error-correcting codes (EAQECCs) by using pre-shared entanglement between the sender and the receiver. In this work, we construct six classes of q-ary entanglement-assisted quantum MDS (EAQMDS) codes based on classical negacyclic MDS codes by exploiting two or more pre-shared maximally entangled states. We show that two of these six classes q-ary EAQMDS have minimum distance more larger than q+1. Most of these q-ary EAQMDS codes are new in the sense that their parameters are not covered by the codes available in the literature.

  20. An algebraic approach to graph codes

    DEFF Research Database (Denmark)

    Pinero, Fernando

    This thesis consists of six chapters. The first chapter, contains a short introduction to coding theory in which we explain the coding theory concepts we use. In the second chapter, we present the required theory for evaluation codes and also give an example of some fundamental codes in coding...... theory as evaluation codes. Chapter three consists of the introduction to graph based codes, such as Tanner codes and graph codes. In Chapter four, we compute the dimension of some graph based codes with a result combining graph based codes and subfield subcodes. Moreover, some codes in chapter four...

  1. Diagonal Eigenvalue Unity (DEU) code for spectral amplitude coding-optical code division multiple access

    Science.gov (United States)

    Ahmed, Hassan Yousif; Nisar, K. S.

    2013-08-01

    Code with ideal in-phase cross correlation (CC) and practical code length to support high number of users are required in spectral amplitude coding-optical code division multiple access (SAC-OCDMA) systems. SAC systems are getting more attractive in the field of OCDMA because of its ability to eliminate the influence of multiple access interference (MAI) and also suppress the effect of phase induced intensity noise (PIIN). In this paper, we have proposed new Diagonal Eigenvalue Unity (DEU) code families with ideal in-phase CC based on Jordan block matrix with simple algebraic ways. Four sets of DEU code families based on the code weight W and number of users N for the combination (even, even), (even, odd), (odd, odd) and (odd, even) are constructed. This combination gives DEU code more flexibility in selection of code weight and number of users. These features made this code a compelling candidate for future optical communication systems. Numerical results show that the proposed DEU system outperforms reported codes. In addition, simulation results taken from a commercial optical systems simulator, Virtual Photonic Instrument (VPI™) shown that, using point to multipoint transmission in passive optical network (PON), DEU has better performance and could support long span with high data rate.

  2. Self-complementary circular codes in coding theory.

    Science.gov (United States)

    Fimmel, Elena; Michel, Christian J; Starman, Martin; Strüngmann, Lutz

    2018-04-01

    Self-complementary circular codes are involved in pairing genetic processes. A maximal [Formula: see text] self-complementary circular code X of trinucleotides was identified in genes of bacteria, archaea, eukaryotes, plasmids and viruses (Michel in Life 7(20):1-16 2017, J Theor Biol 380:156-177, 2015; Arquès and Michel in J Theor Biol 182:45-58 1996). In this paper, self-complementary circular codes are investigated using the graph theory approach recently formulated in Fimmel et al. (Philos Trans R Soc A 374:20150058, 2016). A directed graph [Formula: see text] associated with any code X mirrors the properties of the code. In the present paper, we demonstrate a necessary condition for the self-complementarity of an arbitrary code X in terms of the graph theory. The same condition has been proven to be sufficient for codes which are circular and of large size [Formula: see text] trinucleotides, in particular for maximal circular codes ([Formula: see text] trinucleotides). For codes of small-size [Formula: see text] trinucleotides, some very rare counterexamples have been constructed. Furthermore, the length and the structure of the longest paths in the graphs associated with the self-complementary circular codes are investigated. It has been proven that the longest paths in such graphs determine the reading frame for the self-complementary circular codes. By applying this result, the reading frame in any arbitrary sequence of trinucleotides is retrieved after at most 15 nucleotides, i.e., 5 consecutive trinucleotides, from the circular code X identified in genes. Thus, an X motif of a length of at least 15 nucleotides in an arbitrary sequence of trinucleotides (not necessarily all of them belonging to X) uniquely defines the reading (correct) frame, an important criterion for analyzing the X motifs in genes in the future.

  3. Cosmetic Surgery Training in Plastic Surgery Residency Programs

    Directory of Open Access Journals (Sweden)

    Colton H. L. McNichols, MD

    2017-09-01

    Conclusions:. There is an increase in dedicated cosmetic surgery rotations and fewer residents believe they need a fellowship to practice cosmetic surgery. However, the comfort level of performing facial aesthetic and body contouring procedures remains low particularly among independent residents.

  4. Suture Coding: A Novel Educational Guide for Suture Patterns.

    Science.gov (United States)

    Gaber, Mohamed; Abdel-Wahed, Ramadan

    2015-01-01

    This study aims to provide a helpful guide to perform tissue suturing successfully using suture coding-a method for identification of suture patterns and techniques by giving full information about the method of application of each pattern using numbers and symbols. Suture coding helps construct an infrastructure for surgical suture science. It facilitates the easy understanding and learning of suturing techniques and patterns as well as detects the relationship between the different patterns. Guide points are fixed on both edges of the wound to act as a guideline to help practice suture pattern techniques. The arrangement is fixed as 1-3-5-7 and a-c-e-g on one side (whether right or left) and as 2-4-6-8 and b-d-f-h on the other side. Needle placement must start from number 1 or letter "a" and continue to follow the code till the end of the stitching. Some rules are created to be adopted for the application of suture coding. A suture trainer containing guide points that simulate the coding process is used to facilitate the learning of the coding method. (120) Is the code of simple interrupted suture pattern; (ab210) is the code of vertical mattress suture pattern, and (013465)²/3 is the code of Cushing suture pattern. (0A1) Is suggested as a surgical suture language that gives the name and type of the suture pattern used to facilitate its identification. All suture patterns known in the world should start with (0), (A), or (1). There is a relationship between 2 or more surgical patterns according to their codes. It can be concluded that every suture pattern has its own code that helps in the identification of its type, structure, and method of application. Combination between numbers and symbols helps in the understanding of suture techniques easily without complication. There are specific relationships that can be identified between different suture patterns. Coding methods facilitate suture patterns learning process. The use of suture coding can be a good

  5. Nigerian Journal of Surgery

    African Journals Online (AJOL)

    The Nigerian Journal of Surgery publishes original articles, special articles (by invitation), reviews, case reports, correspondences and notes. Materials cited for publication will include scientific research papers read at the meetings of the Nigerian Surgical Research Society, and of the Association of Surgeons of Nigeria and ...

  6. Surgery for adrenal tumors

    International Nuclear Information System (INIS)

    Salamah, S.M.

    2002-01-01

    Objective: To analyze the presentation, localization, pathology, surgical management and outcome of surgery for adrenal gland tumors. Design: Prospective clinico epidemiological study. Place and Duration of Study: The study was conducted at the Department of General Surgery, University Unit, Riyadh medical Complex Kingdom of Saudi Rabia from June, 1991 to may, 2001. Subjects and Methods: A total of 21 cases with adrenal tumors were studied for demographic data, clinical presentation, diagnostic workup, localization, surgical management, pathology and outcome. The outcome of these patients was followed prospectively. Results: The study included 12 female and 9 male patients. The mean age at surgery was 36.7 years. Hypertension (69.%) was the commonest presentation in hypersecretory functional tumors. The localization accuracy for ultrasonography, computerized tomography, MRI and MIBG scan was 95.2%, 98.3% 87.8% and 83.6% respectively. Pheochromocytoma was the most common adrenal pathology observed in 14 (66.6%) cases. The overall morbidity was 19% with no hospital mortality. Complete follow-up of available 19 patients (90.5 %) revealed no tumor recurrence and persistent hypertension in 14.3% cases. Conclusion: surgery on adrenal glands is safe in experienced hands and is recommended in institutes with all backup facilities. (author)

  7. Heart valve surgery - discharge

    Science.gov (United States)

    ... ACC guideline for the management of patients with valvular heart disease: executive summary: a report of the American College ... Editorial team. Related MedlinePlus Health Topics Heart Surgery Heart Valve Diseases Browse the Encyclopedia A.D.A.M., Inc. ...

  8. Abdominal wall surgery

    Science.gov (United States)

    ... as liposuction , which is another way to remove fat. But, abdominal wall surgery is sometimes combined with liposuction. ... from the middle and lower sections of your abdomen to make it firmer ... removes excess fat and skin (love handles) from the sides of ...

  9. Cognitive outcome of surgery.

    Science.gov (United States)

    Gallagher, Anne; Jambaqué, Isabelle; Lassonde, Maryse

    2013-01-01

    Epilepsy surgery is now widely accepted as an effective therapeutic option for carefully selected children with medically refractory epilepsy. The surgical procedure may cause cognitive deficits or exacerbate existing impairments, but it may also improve cognitive abilities by the restoration of functions located in adjacent or contralateral areas that had been secondarily affected by the epilepsy or the underlying pathology. Compared to adults, better cognitive outcome has been reported in children, a finding probably due to the developing state of the brain, which possesses considerable structural and functional plasticity. More extensive and effective surgery such as hemispherectomy is more commonly used in the pediatric population, and this must also influence surgical outcome. However, studies related to cognitive outcome of epilepsy surgery in children are limited, and controversial results are often reported. In this chapter, we provide a current overview of the literature on cognitive outcomes in children who undergo different types of epilepsy surgery, including focal resections as well as corpus callosotomy and hemispherectomy. Early surgical intervention appears to be a rational option for the treatment of childhood epilepsy since many cognitive deficits are linked to the epileptic process and may disappear when seizures are controlled. Copyright © 2013 Elsevier B.V. All rights reserved.

  10. Annals of Pediatric Surgery

    African Journals Online (AJOL)

    The Annals of Pediatric Surgery is striving to fill an important niche that provides focus to clinical care, technical innovation and clinical research. ... Nonconventionalmesocaval prosthetic shunt interposition in refractory case with portal hypertension in a 10-kg female infant · EMAIL FREE FULL TEXT EMAIL FREE FULL ...

  11. RADIATION AND SURGERY

    African Journals Online (AJOL)

    Dr. S.A. Adewuyi

    Radiation therapy and surgery in cancer management. 1S.A.Adewuyi,. 2 ... cancer, since axillary node status may determine whether or not a ... The principles are 'En-bloc' dissection which ... prevention of symptoms of cancer, including pain alleviation, and .... Pre-Operative And Post-Operative Radiotherapy: These terms ...

  12. Mechanisms in bariatric surgery

    DEFF Research Database (Denmark)

    Holst, Jens Juul; Madsbad, Sten; Bojsen-Møller, Kirstine N

    2018-01-01

    Gastric bypass surgery leads to profound changes in the secretion of gut hormones with effects on metabolism, appetite, and food intake. Here, we discuss their contributions to the improvement in glucose tolerance and the weight loss that results from the operations. We find that the improved glu...

  13. Tendon Transfer Surgery

    Science.gov (United States)

    ... All Topics A-Z Videos Infographics Symptom Picker Anatomy Bones Joints Muscles Nerves Vessels Tendons About Hand Surgery What is ... Hand Therapist? Media Find a Hand Surgeon Home Anatomy ... DESCRIPTION The tendon is the strong cord at either end of a muscle that is attached to bone. Tendons , combined with ...

  14. Cataract Surgery in Uveitis

    Directory of Open Access Journals (Sweden)

    Rupesh Agrawal

    2012-01-01

    Full Text Available Cataract surgery in uveitic eyes is often challenging and can result in intraoperative and postoperative complications. Most uveitic patients enjoy good vision despite potentially sight-threatening complications, including cataract development. In those patients who develop cataracts, successful surgery stems from educated patient selection, careful surgical technique, and aggressive preoperative and postoperative control of inflammation. With improved understanding of the disease processes, pre- and perioperative control of inflammation, modern surgical techniques, availability of biocompatible intraocular lens material and design, surgical experience in performing complicated cataract surgeries, and efficient management of postoperative complications have led to much better outcome. Preoperative factors include proper patient selection and counseling and preoperative control of inflammation. Meticulous and careful cataract surgery in uveitic cataract is essential in optimizing the postoperative outcome. Management of postoperative complications, especially inflammation and glaucoma, earlier rather than later, has also contributed to improved outcomes. This manuscript is review of the existing literature and highlights the management pearls in tackling complicated cataract based on medline search of literature and experience of the authors.

  15. Surgery with cooperative robots.

    Science.gov (United States)

    Lehman, Amy C; Berg, Kyle A; Dumpert, Jason; Wood, Nathan A; Visty, Abigail Q; Rentschler, Mark E; Platt, Stephen R; Farritor, Shane M; Oleynikov, Dmitry

    2008-03-01

    Advances in endoscopic techniques for abdominal procedures continue to reduce the invasiveness of surgery. Gaining access to the peritoneal cavity through small incisions prompted the first significant shift in general surgery. The complete elimination of external incisions through natural orifice access is potentially the next step in reducing patient trauma. While minimally invasive techniques offer significant patient advantages, the procedures are surgically challenging. Robotic surgical systems are being developed that address the visualization and manipulation limitations, but many of these systems remain constrained by the entry incisions. Alternatively, miniature in vivo robots are being developed that are completely inserted into the peritoneal cavity for laparoscopic and natural orifice procedures. These robots can provide vision and task assistance without the constraints of the entry incision, and can reduce the number of incisions required for laparoscopic procedures. In this study, a series of minimally invasive animal-model surgeries were performed using multiple miniature in vivo robots in cooperation with existing laparoscopy and endoscopy tools as well as the da Vinci Surgical System. These procedures demonstrate that miniature in vivo robots can address the visualization constraints of minimally invasive surgery by providing video feedback and task assistance from arbitrary orientations within the peritoneal cavity.

  16. Patch in Cardiac Surgery

    Directory of Open Access Journals (Sweden)

    Alireza Alizadeh Ghavidel

    2014-06-01

    Full Text Available Introduction: Excessive bleeding presents a risk for the patient in cardiovascular surgery. Local haemostatic agents are of great value to reduce bleeding and related complications. TachoSil (Nycomed, Linz, Austria is a sterile, haemostatic agent that consists of an equine collagen patchcoated with human fibrinogen and thrombin. This study evaluated the safety and efficacy of TachoSil compared to conventional technique.Methods: Forty-two patients scheduled for open heart surgeries, were entered to this study from August 2010 to May 2011. After primary haemostatic measures, patients divided in two groups based on surgeon’s judgment. Group A: 20 patients for whom TachoSil was applied and group B: 22 patients that conventional method using Surgicel (13 patients or wait and see method (9 cases, were performed in order to control the bleeding. In group A, 10 patients were male with mean age of 56.95±15.67 years and in group B, 9 cases were male with mean age of 49.95±14.41 years. In case group 70% (14/20 of the surgeries were redo surgeries versus 100% (22/22 in control group.Results: Baseline characteristics were similar in both groups. In TachoSil group 75% of patients required transfusion versus 90.90% in group B (P=0.03.Most transfusions consisted of packed red blood cell; 2±1.13 units in group A versus 3.11±1.44 in group B (P=0.01, however there were no significant differences between two groups regarding the mean total volume of intra and post-operative bleeding. Re-exploration was required in 10% in group A versus 13.63% in group B (P=0.67.Conclusion: TachoSil may act as a superior alternative in different types of cardiac surgery in order to control the bleeding and therefore reducing transfusion requirement.

  17. ROBOTIC SURGERY: BIOETHICAL ASPECTS.

    Science.gov (United States)

    Siqueira-Batista, Rodrigo; Souza, Camila Ribeiro; Maia, Polyana Mendes; Siqueira, Sávio Lana

    2016-01-01

    The use of robots in surgery has been increasingly common today, allowing the emergence of numerous bioethical issues in this area. To present review of the ethical aspects of robot use in surgery. Search in Pubmed, SciELO and Lilacs crossing the headings "bioethics", "surgery", "ethics", "laparoscopy" and "robotic". Of the citations obtained, were selected 17 articles, which were used for the preparation of the article. It contains brief presentation on robotics, its inclusion in health and bioethical aspects, and the use of robots in surgery. Robotic surgery is a reality today in many hospitals, which makes essential bioethical reflection on the relationship between health professionals, automata and patients. A utilização de robôs em procedimentos cirúrgicos tem sido cada vez mais frequente na atualidade, o que permite a emergência de inúmeras questões bioéticas nesse âmbito. Apresentar revisão sobre os aspectos éticos dos usos de robôs em cirurgia. Realizou-se revisão nas bases de dados Pubmed, SciELO e Lilacs cruzando-se os descritores "bioética", "cirurgia", "ética", "laparoscopia" e "robótica". Do total de citações obtidas, selecionou-se 17 artigos, os quais foram utilizados para a elaboração do artigo. Ele contém breve apresentação sobre a robótica, sua inserção na saúde e os aspectos bioéticos da utilização dos robôs em procedimentos cirúrgicos. A cirurgia robótica é uma realidade, hoje, em muitas unidades hospitalares, o que torna essencial a reflexão bioética sobre as relações entre profissionais da saúde, autômatos e pacientes.

  18. Variable Operative Experience in Hand Surgery for Plastic Surgery Residents.

    Science.gov (United States)

    Silvestre, Jason; Lin, Ines C; Levin, Lawrence Scott; Chang, Benjamin

    Efforts to standardize hand surgery training during plastic surgery residency remain challenging. We analyze the variability of operative hand experience at U.S. plastic surgery residency programs. Operative case logs of chief residents in accredited U.S. plastic surgery residency programs were analyzed (2011-2015). Trends in fold differences of hand surgery case volume between the 10th and 90th percentiles of residents were assessed graphically. Percentile data were used to calculate the number of residents achieving case minimums in hand surgery for 2015. Case logs from 818 plastic surgery residents were analyzed of which a minority were from integrated (35.7%) versus independent/combined (64.3%) residents. Trend analysis of fold differences in case volume demonstrated decreasing variability among procedure categories over time. By 2015, fold differences for hand reconstruction, tendon cases, nerve cases, arthroplasty/arthrodesis, amputation, arterial repair, Dupuytren release, and neoplasm cases were below 10-fold. Congenital deformity cases among independent/combined residents was the sole category that exceeded 10-fold by 2015. Percentile data suggested that approximately 10% of independent/combined residents did not meet case minimums for arterial repair and congenital deformity in 2015. Variable operative experience during plastic surgery residency may limit adequate exposure to hand surgery for certain residents. Future studies should establish empiric case minimums for plastic surgery residents to ensure hand surgery competency upon graduation. Copyright © 2017 Association of Program Directors in Surgery. Published by Elsevier Inc. All rights reserved.

  19. [ENT and head and neck surgery in the German DRG system 2007].

    Science.gov (United States)

    Franz, D; Roeder, N; Hörmann, K; Alberty, J

    2007-07-01

    The German DRG system has been further developed into version 2007. For ENT and head and neck surgery, significant changes in the coding of diagnoses and medical operations as well as in the the DRG structure have been made. New ICD codes for sleep apnoea and acquired tracheal stenosis have been implemented. Surgery on the acoustic meatus, removal of auricle hyaline cartilage for transplantation (e. g. rhinosurgery) and tonsillotomy have been coded in the 2007 version. In addition, the DRG structure has been improved. Case allocation of more than one significant operation has been established. The G-DRG system has gained in complexity. High demands are made on the coding of complex cases, whereas standard cases require mostly only one specific diagnosis and one specific OPS code. The quality of case allocation for ENT patients within the G-DRG system has been improved. Nevertheless, further adjustments of the G-DRG system are necessary.

  20. Error correcting coding for OTN

    DEFF Research Database (Denmark)

    Justesen, Jørn; Larsen, Knud J.; Pedersen, Lars A.

    2010-01-01

    Forward error correction codes for 100 Gb/s optical transmission are currently receiving much attention from transport network operators and technology providers. We discuss the performance of hard decision decoding using product type codes that cover a single OTN frame or a small number...... of such frames. In particular we argue that a three-error correcting BCH is the best choice for the component code in such systems....

  1. Numerical Tokamak Project code comparison

    International Nuclear Information System (INIS)

    Waltz, R.E.; Cohen, B.I.; Beer, M.A.

    1994-01-01

    The Numerical Tokamak Project undertook a code comparison using a set of TFTR tokamak parameters. Local radial annulus codes of both gyrokinetic and gyrofluid types were compared for both slab and toroidal case limits assuming ion temperature gradient mode turbulence in a pure plasma with adiabatic electrons. The heat diffusivities were found to be in good internal agreement within ± 50% of the group average over five codes

  2. Ethical codes in business practice

    OpenAIRE

    Kobrlová, Marie

    2013-01-01

    The diploma thesis discusses the issues of ethics and codes of ethics in business. The theoretical part defines basic concepts of ethics, presents its historical development and the methods and tools of business ethics. It also focuses on ethical codes and the area of law and ethics. The practical part consists of a quantitative survey, which provides views of selected business entities of business ethics and the use of codes of ethics in practice.

  3. [Orthopedic and trauma surgery in the German DRG system. Recent developments].

    Science.gov (United States)

    Franz, D; Schemmann, F; Selter, D D; Wirtz, D C; Roeder, N; Siebert, H; Mahlke, L

    2012-07-01

    Orthopedics and trauma surgery are subject to continuous medical advancement. The correct and performance-based case allocation by German diagnosis-related groups (G-DRG) is a major challenge. This article analyzes and assesses current developments in orthopedics and trauma surgery in the areas of coding of diagnoses and medical procedures and the development of the 2012 G-DRG system. The relevant diagnoses, medical procedures and G-DRGs in the versions 2011 and 2012 were analyzed based on the publications of the German DRG Institute (InEK) and the German Institute of Medical Documentation and Information (DIMDI). Changes were made for the International Classification of Diseases (ICD) coding of complex cases with medical complications, the procedure coding for spinal surgery and for hand and foot surgery. The G-DRG structures were modified for endoprosthetic surgery on ankle, shoulder and elbow joints. The definition of modular structured endoprostheses was clarified. The G-DRG system for orthopedic and trauma surgery appears to be largely consolidated. The current phase of the evolution of the G-DRG system is primarily aimed at developing most exact descriptions and definitions of the content and mutual delimitation of operation and procedures coding (OPS). This is an essential prerequisite for a correct and performance-based case allocation in the G-DRG system.

  4. The Burden of Clostridium difficile after Cervical Spine Surgery.

    Science.gov (United States)

    Guzman, Javier Z; Skovrlj, Branko; Rothenberg, Edward S; Lu, Young; McAnany, Steven; Cho, Samuel K; Hecht, Andrew C; Qureshi, Sheeraz A

    2016-06-01

    Study Design Retrospective database analysis. Objective The purpose of this study is to investigate incidence, comorbidities, and impact on health care resources of Clostridium difficile infection after cervical spine surgery. Methods A total of 1,602,130 cervical spine surgeries from the Nationwide Inpatient Sample database from 2002 to 2011 were included. Patients were included for study based on International Classification of Diseases Ninth Revision, Clinical Modification procedural codes for cervical spine surgery for degenerative spine diagnoses. Baseline patient characteristics were determined. Multivariable analyses assessed factors associated with increased incidence of C. difficile and risk of mortality. Results Incidence of C. difficile infection in postoperative cervical spine surgery hospitalizations is 0.08%, significantly increased since 2002 (p difficile infection were significantly increased in patients with comorbidities such as congestive heart failure, renal failure, and perivascular disease. Circumferential cervical fusion (odds ratio [OR] = 2.93, p difficile infection after degenerative cervical spine surgery. C. difficile infection after cervical spine surgery results in extended length of stay (p costs (p difficile after cervical spine surgery is nearly 8% versus 0.19% otherwise (p difficile to be a significant predictor of inpatient mortality (OR = 3.99, p difficile increases the risk of in-hospital mortality and costs approximately $6,830,695 per year to manage in patients undergoing elective cervical spine surgery. Patients with comorbidities such as renal failure or congestive heart failure have increased probability of developing infection after surgery. Accepted antibiotic guidelines in this population must be followed to decrease the risk of developing postoperative C. difficile colitis.

  5. Limited-Access Heart Surgery

    Science.gov (United States)

    ... on the side of the chest. With traditional open heart surgery, the incision is usually 6 to 8 ... attached to a heart-lung machine. In traditional open heart surgery, patients would be connected to the heart- ...

  6. Infant open heart surgery (image)

    Science.gov (United States)

    During open-heart surgery an incision is made through the breastbone (sternum) while the child is under general anesthesia. ... During open-heart surgery an incision is made through the breastbone (sternum) while the child is under general anesthesia.

  7. Anti-reflux surgery - children

    Science.gov (United States)

    ... stomach). Problems with these muscles can lead to gastroesophageal reflux disease (GERD). This surgery can also be done during a ... Anti-reflux surgery is usually done to treat GERD in children only after medicines have not worked ...

  8. QR code for medical information uses.

    Science.gov (United States)

    Fontelo, Paul; Liu, Fang; Ducut, Erick G

    2008-11-06

    We developed QR code online tools, simulated and tested QR code applications for medical information uses including scanning QR code labels, URLs and authentication. Our results show possible applications for QR code in medicine.

  9. High Order Modulation Protograph Codes

    Science.gov (United States)

    Nguyen, Thuy V. (Inventor); Nosratinia, Aria (Inventor); Divsalar, Dariush (Inventor)

    2014-01-01

    Digital communication coding methods for designing protograph-based bit-interleaved code modulation that is general and applies to any modulation. The general coding framework can support not only multiple rates but also adaptive modulation. The method is a two stage lifting approach. In the first stage, an original protograph is lifted to a slightly larger intermediate protograph. The intermediate protograph is then lifted via a circulant matrix to the expected codeword length to form a protograph-based low-density parity-check code.

  10. Semi-supervised sparse coding

    KAUST Repository

    Wang, Jim Jing-Yan; Gao, Xin

    2014-01-01

    Sparse coding approximates the data sample as a sparse linear combination of some basic codewords and uses the sparse codes as new presentations. In this paper, we investigate learning discriminative sparse codes by sparse coding in a semi-supervised manner, where only a few training samples are labeled. By using the manifold structure spanned by the data set of both labeled and unlabeled samples and the constraints provided by the labels of the labeled samples, we learn the variable class labels for all the samples. Furthermore, to improve the discriminative ability of the learned sparse codes, we assume that the class labels could be predicted from the sparse codes directly using a linear classifier. By solving the codebook, sparse codes, class labels and classifier parameters simultaneously in a unified objective function, we develop a semi-supervised sparse coding algorithm. Experiments on two real-world pattern recognition problems demonstrate the advantage of the proposed methods over supervised sparse coding methods on partially labeled data sets.

  11. Programming Entity Framework Code First

    CERN Document Server

    Lerman, Julia

    2011-01-01

    Take advantage of the Code First data modeling approach in ADO.NET Entity Framework, and learn how to build and configure a model based on existing classes in your business domain. With this concise book, you'll work hands-on with examples to learn how Code First can create an in-memory model and database by default, and how you can exert more control over the model through further configuration. Code First provides an alternative to the database first and model first approaches to the Entity Data Model. Learn the benefits of defining your model with code, whether you're working with an exis

  12. User manual of UNF code

    International Nuclear Information System (INIS)

    Zhang Jingshang

    2001-01-01

    The UNF code (2001 version) written in FORTRAN-90 is developed for calculating fast neutron reaction data of structure materials with incident energies from about 1 Kev up to 20 Mev. The code consists of the spherical optical model, the unified Hauser-Feshbach and exciton model. The man nal of the UNF code is available for users. The format of the input parameter files and the output files, as well as the functions of flag used in UNF code, are introduced in detail, and the examples of the format of input parameters files are given

  13. Semi-supervised sparse coding

    KAUST Repository

    Wang, Jim Jing-Yan

    2014-07-06

    Sparse coding approximates the data sample as a sparse linear combination of some basic codewords and uses the sparse codes as new presentations. In this paper, we investigate learning discriminative sparse codes by sparse coding in a semi-supervised manner, where only a few training samples are labeled. By using the manifold structure spanned by the data set of both labeled and unlabeled samples and the constraints provided by the labels of the labeled samples, we learn the variable class labels for all the samples. Furthermore, to improve the discriminative ability of the learned sparse codes, we assume that the class labels could be predicted from the sparse codes directly using a linear classifier. By solving the codebook, sparse codes, class labels and classifier parameters simultaneously in a unified objective function, we develop a semi-supervised sparse coding algorithm. Experiments on two real-world pattern recognition problems demonstrate the advantage of the proposed methods over supervised sparse coding methods on partially labeled data sets.

  14. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup

    2017-12-01

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high-dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaicing and 4D light field view synthesis.

  15. Coded aperture tomography revisited

    International Nuclear Information System (INIS)

    Bizais, Y.; Rowe, R.W.; Zubal, I.G.; Bennett, G.W.; Brill, A.B.

    1983-01-01

    Coded aperture (CA) Tomography never achieved wide spread use in Nuclear Medicine, except for the degenerate case of Seven Pinhole tomagraphy (7PHT). However it enjoys several attractive features (high sensitivity and tomographic ability with a statis detector). On the other hand, resolution is usually poor especially along the depth axis and the reconstructed volume is rather limited. Arguments are presented justifying the position that CA tomography can be useful for imaging time-varying 3D structures, if its major drawbacks (poor longitudinal resolution and difficulty in quantification) are overcome. Poor results obtained with 7PHT can be explained by both a very limited angular range sampled and a crude modelling of the image formation process. Therefore improvements can be expected by the use of a dual-detector system, along with a better understanding of its sampling properties and the use of more powerful reconstruction algorithms. Non overlapping multipinhole plates, because they do not involve a decoding procedure, should be considered first for practical applications. Use of real CA should be considered for cases in which non overlapping multipinhole plates do not lead to satisfactory solutions. We have been and currently are carrying out theoretical and experimental works, in order to define the factors which limit CA imaging and to propose satisfactory solutions for Dynamic Emission Tomography

  16. Mobile code security

    Science.gov (United States)

    Ramalingam, Srikumar

    2001-11-01

    A highly secure mobile agent system is very important for a mobile computing environment. The security issues in mobile agent system comprise protecting mobile hosts from malicious agents, protecting agents from other malicious agents, protecting hosts from other malicious hosts and protecting agents from malicious hosts. Using traditional security mechanisms the first three security problems can be solved. Apart from using trusted hardware, very few approaches exist to protect mobile code from malicious hosts. Some of the approaches to solve this problem are the use of trusted computing, computing with encrypted function, steganography, cryptographic traces, Seal Calculas, etc. This paper focuses on the simulation of some of these existing techniques in the designed mobile language. Some new approaches to solve malicious network problem and agent tampering problem are developed using public key encryption system and steganographic concepts. The approaches are based on encrypting and hiding the partial solutions of the mobile agents. The partial results are stored and the address of the storage is destroyed as the agent moves from one host to another host. This allows only the originator to make use of the partial results. Through these approaches some of the existing problems are solved.

  17. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup

    2017-04-11

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaickingand 4D light field view synthesis.

  18. Coding, cryptography and combinatorics

    CERN Document Server

    Niederreiter, Harald; Xing, Chaoping

    2004-01-01

    It has long been recognized that there are fascinating connections between cod­ ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi­ natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the p...

  19. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup; Swanson, Robin; Heide, Felix; Wetzstein, Gordon; Heidrich, Wolfgang

    2017-01-01

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high-dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaicing and 4D light field view synthesis.

  20. Computer code abstract: NESTLE

    International Nuclear Information System (INIS)

    Turinsky, P.J.; Al-Chalabi, R.M.K.; Engrand, P.; Sarsour, H.N.; Faure, F.X.; Guo, W.

    1995-01-01

    NESTLE is a few-group neutron diffusion equation solver utilizing the nodal expansion method (NEM) for eigenvalue, adjoint, and fixed-source steady-state and transient problems. The NESTLE code solve the eigenvalue (criticality), eigenvalue adjoint, external fixed-source steady-state, and external fixed-source or eigenvalue initiated transient problems. The eigenvalue problem allows criticality searches to be completed, and the external fixed-source steady-state problem can search to achieve a specified power level. Transient problems model delayed neutrons via precursor groups. Several core properties can be input as time dependent. Two- or four-energy groups can be utilized, with all energy groups being thermal groups (i.e., upscatter exits) is desired. Core geometries modeled include Cartesian and hexagonal. Three-, two-, and one-dimensional models can be utilized with various symmetries. The thermal conditions predicted by the thermal-hydraulic model of the core are used to correct cross sections for temperature and density effects. Cross sections for temperature and density effects. Cross sections are parameterized by color, control rod state (i.e., in or out), and burnup, allowing fuel depletion to be modeled. Either a macroscopic or microscopic model may be employed

  1. Joint source-channel coding using variable length codes

    NARCIS (Netherlands)

    Balakirsky, V.B.

    2001-01-01

    We address the problem of joint source-channel coding when variable-length codes are used for information transmission over a discrete memoryless channel. Data transmitted over the channel are interpreted as pairs (m k ,t k ), where m k is a message generated by the source and t k is a time instant

  2. Interrelations of codes in human semiotic systems.

    OpenAIRE

    Somov, Georgij

    2016-01-01

    Codes can be viewed as mechanisms that enable relations of signs and their components, i.e., semiosis is actualized. The combinations of these relations produce new relations as new codes are building over other codes. Structures appear in the mechanisms of codes. Hence, codes can be described as transformations of structures from some material systems into others. Structures belong to different carriers, but exist in codes in their "pure" form. Building of codes over other codes fosters t...

  3. Further Generalisations of Twisted Gabidulin Codes

    DEFF Research Database (Denmark)

    Puchinger, Sven; Rosenkilde, Johan Sebastian Heesemann; Sheekey, John

    2017-01-01

    We present a new family of maximum rank distance (MRD) codes. The new class contains codes that are neither equivalent to a generalised Gabidulin nor to a twisted Gabidulin code, the only two known general constructions of linear MRD codes.......We present a new family of maximum rank distance (MRD) codes. The new class contains codes that are neither equivalent to a generalised Gabidulin nor to a twisted Gabidulin code, the only two known general constructions of linear MRD codes....

  4. Timing of surgery for sciatica

    NARCIS (Netherlands)

    Peul, Wilco C.

    2008-01-01

    The frequently diagnosed lumbar disc herniation can disappear by natural course, but still leads to high low back surgery rates. The optimal period of conservative care, before surgery is executed, was unknown. It is surprising that scientific evidence was lacking which justified “early” surgery.

  5. Nigerian Journal of Plastic Surgery

    African Journals Online (AJOL)

    The Nigerian Journal of Plastic Surgery has its objectives in publishing original articles about developments in all areas related to plastic and reconstructive surgery as well as to trauma surgery. It also serves as a means of providing a forum for correspondence, information and discussion. It also accepts review articles that ...

  6. Cataract surgery among Medicare beneficiaries.

    Science.gov (United States)

    Schein, Oliver D; Cassard, Sandra D; Tielsch, James M; Gower, Emily W

    2012-10-01

    To present descriptive epidemiology of cataract surgery among Medicare recipients in the United States. Cataract surgery performed on Medicare beneficiaries in 2003 and 2004. Medicare claims data were used to identify all cataract surgery claims for procedures performed in the United States in 2003-2004. Standard assumptions were used to limit the claims to actual cataract surgery procedures performed. Summary statistics were created to determine the number of procedures performed for each outcome of interest: cataract surgery rates by age, sex, race and state; surgical volume by facility type and surgeon characteristics; time interval between first- and second-eye cataract surgery. The national cataract surgery rate for 2003-2004 was 61.8 per 1000 Medicare beneficiary person-years. The rate was significantly higher for females and for those aged 75-84 years. After adjustment for age and sex, blacks had approximately a 30% lower rate of surgery than whites. While only 5% of cataract surgeons performed more than 500 cataract surgeries annually, these surgeons performed 26% of the total cataract surgeries. Increasing surgical volume was found to be highly correlated with use of ambulatory surgical centers and reduced time interval between first- and second-eye surgery in the same patient. The epidemiology of cataract surgery in the United States Medicare population documents substantial variation in surgical rates by race, sex, age, and by certain provider characteristics.

  7. MARS Code in Linux Environment

    Energy Technology Data Exchange (ETDEWEB)

    Hwang, Moon Kyu; Bae, Sung Won; Jung, Jae Joon; Chung, Bub Dong [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    2005-07-01

    The two-phase system analysis code MARS has been incorporated into Linux system. The MARS code was originally developed based on the RELAP5/MOD3.2 and COBRA-TF. The 1-D module which evolved from RELAP5 alone could be applied for the whole NSSS system analysis. The 3-D module developed based on the COBRA-TF, however, could be applied for the analysis of the reactor core region where 3-D phenomena would be better treated. The MARS code also has several other code units that could be incorporated for more detailed analysis. The separate code units include containment analysis modules and 3-D kinetics module. These code modules could be optionally invoked to be coupled with the main MARS code. The containment code modules (CONTAIN and CONTEMPT), for example, could be utilized for the analysis of the plant containment phenomena in a coupled manner with the nuclear reactor system. The mass and energy interaction during the hypothetical coolant leakage accident could, thereby, be analyzed in a more realistic manner. In a similar way, 3-D kinetics could be incorporated for simulating the three dimensional reactor kinetic behavior, instead of using the built-in point kinetics model. The MARS code system, developed initially for the MS Windows environment, however, would not be adequate enough for the PC cluster system where multiple CPUs are available. When parallelism is to be eventually incorporated into the MARS code, MS Windows environment is not considered as an optimum platform. Linux environment, on the other hand, is generally being adopted as a preferred platform for the multiple codes executions as well as for the parallel application. In this study, MARS code has been modified for the adaptation of Linux platform. For the initial code modification, the Windows system specific features have been removed from the code. Since the coupling code module CONTAIN is originally in a form of dynamic load library (DLL) in the Windows system, a similar adaptation method

  8. Allele coding in genomic evaluation

    Directory of Open Access Journals (Sweden)

    Christensen Ole F

    2011-06-01

    Full Text Available Abstract Background Genomic data are used in animal breeding to assist genetic evaluation. Several models to estimate genomic breeding values have been studied. In general, two approaches have been used. One approach estimates the marker effects first and then, genomic breeding values are obtained by summing marker effects. In the second approach, genomic breeding values are estimated directly using an equivalent model with a genomic relationship matrix. Allele coding is the method chosen to assign values to the regression coefficients in the statistical model. A common allele coding is zero for the homozygous genotype of the first allele, one for the heterozygote, and two for the homozygous genotype for the other allele. Another common allele coding changes these regression coefficients by subtracting a value from each marker such that the mean of regression coefficients is zero within each marker. We call this centered allele coding. This study considered effects of different allele coding methods on inference. Both marker-based and equivalent models were considered, and restricted maximum likelihood and Bayesian methods were used in inference. Results Theoretical derivations showed that parameter estimates and estimated marker effects in marker-based models are the same irrespective of the allele coding, provided that the model has a fixed general mean. For the equivalent models, the same results hold, even though different allele coding methods lead to different genomic relationship matrices. Calculated genomic breeding values are independent of allele coding when the estimate of the general mean is included into the values. Reliabilities of estimated genomic breeding values calculated using elements of the inverse of the coefficient matrix depend on the allele coding because different allele coding methods imply different models. Finally, allele coding affects the mixing of Markov chain Monte Carlo algorithms, with the centered coding being

  9. MARS Code in Linux Environment

    International Nuclear Information System (INIS)

    Hwang, Moon Kyu; Bae, Sung Won; Jung, Jae Joon; Chung, Bub Dong

    2005-01-01

    The two-phase system analysis code MARS has been incorporated into Linux system. The MARS code was originally developed based on the RELAP5/MOD3.2 and COBRA-TF. The 1-D module which evolved from RELAP5 alone could be applied for the whole NSSS system analysis. The 3-D module developed based on the COBRA-TF, however, could be applied for the analysis of the reactor core region where 3-D phenomena would be better treated. The MARS code also has several other code units that could be incorporated for more detailed analysis. The separate code units include containment analysis modules and 3-D kinetics module. These code modules could be optionally invoked to be coupled with the main MARS code. The containment code modules (CONTAIN and CONTEMPT), for example, could be utilized for the analysis of the plant containment phenomena in a coupled manner with the nuclear reactor system. The mass and energy interaction during the hypothetical coolant leakage accident could, thereby, be analyzed in a more realistic manner. In a similar way, 3-D kinetics could be incorporated for simulating the three dimensional reactor kinetic behavior, instead of using the built-in point kinetics model. The MARS code system, developed initially for the MS Windows environment, however, would not be adequate enough for the PC cluster system where multiple CPUs are available. When parallelism is to be eventually incorporated into the MARS code, MS Windows environment is not considered as an optimum platform. Linux environment, on the other hand, is generally being adopted as a preferred platform for the multiple codes executions as well as for the parallel application. In this study, MARS code has been modified for the adaptation of Linux platform. For the initial code modification, the Windows system specific features have been removed from the code. Since the coupling code module CONTAIN is originally in a form of dynamic load library (DLL) in the Windows system, a similar adaptation method

  10. Clostridium difficile colitis in patients undergoing lumbar spine surgery.

    Science.gov (United States)

    Skovrlj, Branko; Guzman, Javier Z; Silvestre, Jason; Al Maaieh, Motasem; Qureshi, Sheeraz A

    2014-09-01

    Retrospective database analysis. To investigate incidence, comorbidities, and impact on health care resources of Clostridium difficile infection after lumbar spine surgery. C. difficile colitis is reportedly increasing in hospitalized patients and can have a negative impact on patient outcomes. No data exist on estimates of C. difficile infection rates and its consequences on patient outcomes and health care resources among patients undergoing lumbar spine surgery. The Nationwide Inpatient Sample was examined from 2002 to 2011. Patients were included for study based on International Classification of Diseases, Ninth Revision, Clinical Modification, procedural codes for lumbar spine surgery for degenerative diagnoses. Baseline patient characteristics were determined and multivariable analyses assessed factors associated with increased incidence of C. difficile and risk of mortality. The incidence of C. difficile infection in patients undergoing lumbar spine surgery is 0.11%. At baseline, patients infected with C. difficile were significantly older (65.4 yr vs. 58.9 yr, Pinfection. Small hospital size was associated with decreased odds (odds ratio [OR], 0.5; Pinfection. Uninsured (OR, 1.62; Pinfection. C. difficile increased hospital length of stay by 8 days (Pdifficile infection after lumbar spine surgery carries a 36.4-fold increase in mortality and costs approximately $10,658,646 per year to manage. These data suggest that great care should be taken to avoid C. difficile colitis in patients undergoing lumbar spine surgery because it is associated with longer hospital stays, greater overall costs, and increased inpatient mortality. 3.

  11. Coding in pigeons: Multiple-coding versus single-code/default strategies.

    Science.gov (United States)

    Pinto, Carlos; Machado, Armando

    2015-05-01

    To investigate the coding strategies that pigeons may use in a temporal discrimination tasks, pigeons were trained on a matching-to-sample procedure with three sample durations (2s, 6s and 18s) and two comparisons (red and green hues). One comparison was correct following 2-s samples and the other was correct following both 6-s and 18-s samples. Tests were then run to contrast the predictions of two hypotheses concerning the pigeons' coding strategies, the multiple-coding and the single-code/default. According to the multiple-coding hypothesis, three response rules are acquired, one for each sample. According to the single-code/default hypothesis, only two response rules are acquired, one for the 2-s sample and a "default" rule for any other duration. In retention interval tests, pigeons preferred the "default" key, a result predicted by the single-code/default hypothesis. In no-sample tests, pigeons preferred the key associated with the 2-s sample, a result predicted by multiple-coding. Finally, in generalization tests, when the sample duration equaled 3.5s, the geometric mean of 2s and 6s, pigeons preferred the key associated with the 6-s and 18-s samples, a result predicted by the single-code/default hypothesis. The pattern of results suggests the need for models that take into account multiple sources of stimulus control. © Society for the Experimental Analysis of Behavior.

  12. Robotic surgery update.

    Science.gov (United States)

    Jacobsen, G; Elli, F; Horgan, S

    2004-08-01

    Minimally invasive surgical techniques have revolutionized the field of surgery. Telesurgical manipulators (robots) and new information technologies strive to improve upon currently available minimally invasive techniques and create new possibilities. A retrospective review of all robotic cases at a single academic medical center from August 2000 until November 2002 was conducted. A comprehensive literature evaluation on robotic surgical technology was also performed. Robotic technology is safely and effectively being applied at our institution. Robotic and information technologies have improved upon minimally invasive surgical techniques and created new opportunities not attainable in open surgery. Robotic technology offers many benefits over traditional minimal access techniques and has been proven safe and effective. Further research is needed to better define the optimal application of this technology. Credentialing and educational requirements also need to be delineated.

  13. Abdominal aortic aneurysm surgery

    DEFF Research Database (Denmark)

    Gefke, K; Schroeder, T V; Thisted, B

    1994-01-01

    The goal of this study was to identify patients who need longer care in the ICU (more than 48 hours) following abdominal aortic aneurysm (AAA) surgery and to evaluate the influence of perioperative complications on short- and long-term survival and quality of life. AAA surgery was performed in 553...... patients, 51 (9%) of whom died within the first 48 hours. Of the 502 patients who survived for more than 48 hours, 109 required ICU therapy for more than 48 hours, whereas 393 patients were in the ICU for less than 48 hours. The incidence of preoperative risk factors was similar for the two groups...... combined failed to permit identification of patients in whom the perioperative survival rate was 0%. Even 20% of patients with multiorgan failure survived for 6 months. Of those patients who needed ICU therapy for more than 48 hours, 41 (38%) were alive at the end of 1988. In response to a questionnaire...

  14. [Stress in surgeries].

    Science.gov (United States)

    Daian, Márcia Rodrigues; Petroianu, Andy; Alberti, Luiz Ronaldo; Jeunon, Ester Eliane

    2012-01-01

    The purpose of this article was to provide the literature regarding the psychological stress in the peri-operative period of adult patients undergoing operations under general anesthesia. The articles were obtained by surveying the papers published and catalogued in the Medline Pubmed interface database, Lilacs and the Biblioteca Virtual de Saúde (BVS) since 1984, crossing the headings stress, surgery, general anesthesia, psychology. Over 800 articles related to stress and surgery were analyzed with regards to their relevance to the considered subject. Eighteen articles were related to psychological stress. Their results confirmed the presence of psychological and physical stress, during the peri-operative period as well as relation between stress and de clinical post-operative recovery. There is a gap regarding in the peri-operative period. More studies on psychological influence on stress may benefit patients and help professionals during the surgical treatment.

  15. Error-correction coding for digital communications

    Science.gov (United States)

    Clark, G. C., Jr.; Cain, J. B.

    This book is written for the design engineer who must build the coding and decoding equipment and for the communication system engineer who must incorporate this equipment into a system. It is also suitable as a senior-level or first-year graduate text for an introductory one-semester course in coding theory. Fundamental concepts of coding are discussed along with group codes, taking into account basic principles, practical constraints, performance computations, coding bounds, generalized parity check codes, polynomial codes, and important classes of group codes. Other topics explored are related to simple nonalgebraic decoding techniques for group codes, soft decision decoding of block codes, algebraic techniques for multiple error correction, the convolutional code structure and Viterbi decoding, syndrome decoding techniques, and sequential decoding techniques. System applications are also considered, giving attention to concatenated codes, coding for the white Gaussian noise channel, interleaver structures for coded systems, and coding for burst noise channels.

  16. Single-incision thoracoscopic surgery for spontaneous ...

    African Journals Online (AJOL)

    aDivision of Pediatric Surgery, bDepartment of Surgery, National Defense Medical. College ... Correspondence to Akinari Hinoki, MD, PhD, Department of Surgery, Division of. Pediatric ... (Echelon60; Ethicon Endo-Surgery, Ethicon, NJ, USA).

  17. Distributed space-time coding

    CERN Document Server

    Jing, Yindi

    2014-01-01

    Distributed Space-Time Coding (DSTC) is a cooperative relaying scheme that enables high reliability in wireless networks. This brief presents the basic concept of DSTC, its achievable performance, generalizations, code design, and differential use. Recent results on training design and channel estimation for DSTC and the performance of training-based DSTC are also discussed.

  18. NETWORK CODING BY BEAM FORMING

    DEFF Research Database (Denmark)

    2013-01-01

    Network coding by beam forming in networks, for example, in single frequency networks, can provide aid in increasing spectral efficiency. When network coding by beam forming and user cooperation are combined, spectral efficiency gains may be achieved. According to certain embodiments, a method...... cooperating with the plurality of user equipment to decode the received data....

  19. Building codes : obstacle or opportunity?

    Science.gov (United States)

    Alberto Goetzl; David B. McKeever

    1999-01-01

    Building codes are critically important in the use of wood products for construction. The codes contain regulations that are prescriptive or performance related for various kinds of buildings and construction types. A prescriptive standard might dictate that a particular type of material be used in a given application. A performance standard requires that a particular...

  20. Accelerator Physics Code Web Repository

    CERN Document Server

    Zimmermann, Frank; Bellodi, G; Benedetto, E; Dorda, U; Giovannozzi, Massimo; Papaphilippou, Y; Pieloni, T; Ruggiero, F; Rumolo, G; Schmidt, F; Todesco, E; Zotter, Bruno W; Payet, J; Bartolini, R; Farvacque, L; Sen, T; Chin, Y H; Ohmi, K; Oide, K; Furman, M; Qiang, J; Sabbi, G L; Seidl, P A; Vay, J L; Friedman, A; Grote, D P; Cousineau, S M; Danilov, V; Holmes, J A; Shishlo, A; Kim, E S; Cai, Y; Pivi, M; Kaltchev, D I; Abell, D T; Katsouleas, Thomas C; Boine-Frankenheim, O; Franchetti, G; Hofmann, I; Machida, S; Wei, J

    2006-01-01

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic acceleratorphysics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  1. LFSC - Linac Feedback Simulation Code

    Energy Technology Data Exchange (ETDEWEB)

    Ivanov, Valentin; /Fermilab

    2008-05-01

    The computer program LFSC (Code>) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output.

  2. Interleaver Design for Turbo Coding

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl; Zyablov, Viktor

    1997-01-01

    By a combination of construction and random search based on a careful analysis of the low weight words and the distance properties of the component codes, it is possible to find interleavers for turbo coding with a high minimum distance. We have designed a block interleaver with permutations...

  3. Code breaking in the pacific

    CERN Document Server

    Donovan, Peter

    2014-01-01

    Covers the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945 Describes, explains and analyzes the code breaking techniques developed during the war in the Pacific Exposes the blunders (in code construction and use) made by the Japanese Navy that led to significant US Naval victories

  4. Development status of TUF code

    International Nuclear Information System (INIS)

    Liu, W.S.; Tahir, A.; Zaltsgendler

    1996-01-01

    An overview of the important development of the TUF code in 1995 is presented. The development in the following areas is presented: control of round-off error propagation, gas resolution and release models, and condensation induced water hammer. This development is mainly generated from station requests for operational support and code improvement. (author)

  5. Accident consequence assessment code development

    International Nuclear Information System (INIS)

    Homma, T.; Togawa, O.

    1991-01-01

    This paper describes the new computer code system, OSCAAR developed for off-site consequence assessment of a potential nuclear accident. OSCAAR consists of several modules which have modeling capabilities in atmospheric transport, foodchain transport, dosimetry, emergency response and radiological health effects. The major modules of the consequence assessment code are described, highlighting the validation and verification of the models. (author)

  6. The nuclear codes and guidelines

    International Nuclear Information System (INIS)

    Sonter, M.

    1984-01-01

    This paper considers problems faced by the mining industry when implementing the nuclear codes of practice. Errors of interpretation are likely. A major criticism is that the guidelines to the codes must be seen as recommendations only. They are not regulations. Specific clauses in the guidelines are criticised

  7. Survey of coded aperture imaging

    International Nuclear Information System (INIS)

    Barrett, H.H.

    1975-01-01

    The basic principle and limitations of coded aperture imaging for x-ray and gamma cameras are discussed. Current trends include (1) use of time varying apertures, (2) use of ''dilute'' apertures with transmission much less than 50%, and (3) attempts to derive transverse tomographic sections, unblurred by other planes, from coded images

  8. ACCELERATION PHYSICS CODE WEB REPOSITORY.

    Energy Technology Data Exchange (ETDEWEB)

    WEI, J.

    2006-06-26

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic accelerator-physics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  9. Grassmann codes and Schubert unions

    DEFF Research Database (Denmark)

    Hansen, Johan Peder; Johnsen, Trygve; Ranestad, Kristian

    2009-01-01

    We study subsets of Grassmann varieties over a field , such that these subsets are unions of Schubert cycles, with respect to a fixed flag. We study such sets in detail, and give applications to coding theory, in particular for Grassmann codes. For much is known about such Schubert unions with a ...

  10. On Network Coded Filesystem Shim

    DEFF Research Database (Denmark)

    Sørensen, Chres Wiant; Roetter, Daniel Enrique Lucani; Médard, Muriel

    2017-01-01

    Although network coding has shown the potential to revolutionize networking and storage, its deployment has faced a number of challenges. Usual proposals involve two approaches. First, deploying a new protocol (e.g., Multipath Coded TCP), or retrofitting another one (e.g., TCP/NC) to deliver bene...

  11. Running codes through the web

    International Nuclear Information System (INIS)

    Clark, R.E.H.

    2001-01-01

    Dr. Clark presented a report and demonstration of running atomic physics codes through the WWW. The atomic physics data is generated from Los Alamos National Laboratory (LANL) codes that calculate electron impact excitation, ionization, photoionization, and autoionization, and inversed processes through detailed balance. Samples of Web interfaces, input and output are given in the report

  12. Surgery of the Forestomach.

    Science.gov (United States)

    Lozier, Joseph W; Niehaus, Andrew J

    2016-11-01

    Indications for rumen surgery include rumen tympany (bloat), toxic plant ingestion, to provide enteral nutrition, to perform elective cannula placement, and to access other forestomach compartments (reticulum/omasum). The rumen is a highly contaminated viscus and special care should be taken to avoid peritoneal contamination from rumen contents. Diseases causing forestomach dysfunction and surgical procedures on the forestomach compartments are discussed here. Copyright © 2016 Elsevier Inc. All rights reserved.

  13. Surgery of the Trachea

    Directory of Open Access Journals (Sweden)

    Mark S. Allen

    2015-08-01

    Full Text Available Surgical procedures on the trachea have only been undertaken within the past 50 years. Knowing the unique blood supply of the trachea and how to reduce tension on any anastomosis are key to a successful outcome. Tracheal conditions requiring surgery usually present with shortness of breath on exertion, and preoperative evaluation involves computed tomography and rigid bronchoscopy. Tracheal resection and reconstruction can be safely performed with excellent outcomes by following a well-described technique.

  14. Pregnancy and bariatric surgery.

    Science.gov (United States)

    Mahawar, Kamal K

    2017-12-01

    A large number of women experience pregnancy after bariatric surgery. The purpose of this review was to understand the evidence base in this area to come up with practical, evidence-based recommendations. We examined PubMed for all published articles on pregnancy in patients who have previously undergone a bariatric surgery. There is an increasing body of evidence pointing towards a beneficial effect of weight loss induced by bariatric surgery on female and male fertility prompting calls for recognition of infertility as a qualifying co-morbidity for patients between the Body Mass Index of 35.0 kg/m2 and 40.0 kg/m2. Women in childbearing age group should be routinely offered contraceptive advice after bariatric surgery and advised to avoid pregnancy until their weight has stabilized. Until more focused studies are available, the advice to wait for 12 months or 2 months after the weight loss has stabilized, whichever is latter, seems reasonable. Patients should be advised to seek clearance from their bariatric teams prior to conception and looked after by a multi-disciplinary team of women health professionals, bariatric surgeons, and dietitians during pregnancy. The main objective of care is to ensure adequate nutritional state to allow for a satisfactory weight gain and fetal growth. There is a relative lack of studies and complete lack of Level 1 evidence to inform practice in this area. This review summarizes current literature and makes a number of practical suggestions for routine care of these women while we develop evidence to better inform future practice.

  15. Cell response to surgery.

    LENUS (Irish Health Repository)

    Ni Choileain, Niamh

    2012-02-03

    OBJECTIVES: To describe the profound alterations in host immunity that are produced by major surgery as demonstrated by experimental and clinical studies, and to evaluate the benefits of therapeutic strategies aimed at attenuating perioperative immune dysfunction. DATA SOURCES: A review of the English-language literature was conducted, incorporating searches of the MEDLINE, EMBASE, and Cochrane collaboration databases to identify laboratory and clinical studies investigating the cellular response to surgery. STUDY SELECTION: Original articles and case reports describing immune dysfunction secondary to surgical trauma were included. DATA EXTRACTION: The results were compiled to show outcomes of different studies and were compared. DATA SYNTHESIS: Current evidence indicates that the early systemic inflammatory response syndrome observed after major surgery that is characterized by proinflammatory cytokine release, microcirculatory disturbance, and cell-mediated immune dysfunction is followed by a compensatory anti-inflammatory response syndrome, which predisposes the patient to opportunistic infection, multiple organ dysfunction syndrome, and death. Because there are currently no effective treatment options for multiple organ dysfunction syndrome, measures to prevent its onset should be initiated at an early stage. Accumulating experimental evidence suggests that targeted therapeutic strategies involving immunomodulatory agents such as interferon gamma, granulocyte colony-stimulating factor, the prostaglandin E(2) antagonist, indomethacin, and pentoxifylline may be used for the treatment of systemic inflammatory response syndrome to prevent the onset of multiple organ dysfunction syndrome. CONCLUSIONS: Surgical trauma produces profound immunological dysfunction. Therapeutic strategies directed at restoring immune homeostasis should aim to redress the physiological proinflammatory-anti-inflammatory cell imbalance associated with major surgery.

  16. Image-guided surgery.

    Science.gov (United States)

    Wagner, A; Ploder, O; Enislidis, G; Truppe, M; Ewers, R

    1996-04-01

    Interventional video tomography (IVT), a new imaging modality, achieves virtual visualization of anatomic structures in three dimensions for intraoperative stereotactic navigation. Partial immersion into a virtual data space, which is orthotopically coregistered to the surgical field, enhances, by means of a see-through head-mounted display (HMD), the surgeon's visual perception and technique by providing visual access to nonvisual data of anatomy, physiology, and function. The presented cases document the potential of augmented reality environments in maxillofacial surgery.

  17. Art and epilepsy surgery.

    Science.gov (United States)

    Ladino, Lady Diana; Hunter, Gary; Téllez-Zenteno, José Francisco

    2013-10-01

    The impact of health and disease has led many artists to depict these themes for thousands of years. Specifically, epilepsy has been the subject of many famous works, likely because of the dramatic and misunderstood nature of the clinical presentation. It often evokes religious and even mythical processes. Epilepsy surgical treatment has revolutionized the care of selected patients and is a relatively recent advance. Epilepsy surgery has been depicted in very few artistic works. The first portrait showing a potential surgical treatment for patients with epilepsy was painted in the 12th century. During the Renaissance, Bosch famously provided artistic commentary on traditional beliefs in "The stone of madness". Several of these works demonstrate a surgeon extracting a stone from a patient's head, at one time believed to be the source of all "folly", including epileptic seizures, psychosis, intellectual disability, depression, and a variety of other illnesses. There are some contemporary art pieces including themes around epilepsy surgery, all of them depicting ancient Inca Empire procedures such as trepanning. This article reviews the most relevant artistic works related with epilepsy surgery and also its historical context at the time the work was produced. We also present a painting from the Mexican artist Eduardo Urbano Merino that represents the patient's journey through refractory epilepsy, investigations, and ultimately recovery. Through this work, the artist intends to communicate hope and reassurance to patients going through this difficult process. © 2013.

  18. Gamma surgery for hemangiopericytomas

    International Nuclear Information System (INIS)

    Payne, B.R.; Prasad, D.; Steiner, M.; Steiner, L.

    2000-01-01

    A retrospective analysis of a consecutive series of 12 patients with 15 intracranial hemangiopericytomas treated at the University of Virginia using gamma surgery is presented. Clinical and radiographic follow up of 3 to 56 months is available for 10 patients with 12 tumors. There was one tumor present at the time of initial gamma surgery in each patient. Two new tumors occurred in patients previously treated. Nine of the tumors decreased in volume and three remained stable. Four of the nine tumors that shrank later progressed at an average of 22 months after treatment. Of the tumors that decreased in volume and have not progressed, the response has been for an average of 11 months. The follow-up for two tumors that remained unchanged was 10 and 34 months (average 22 months). A third tumor was unchanged at 42 months but the patient died of new disease adjacent to the treated area in the anterior skull base. There were no complications and the quality of life following the procedure was maintained or improved in every case. Gamma surgery is effective in palliating the patients by decreasing tumor volume and delaying recurrence. (author)

  19. Robotic surgery in gynecology

    Directory of Open Access Journals (Sweden)

    Jean eBouquet De Jolinière

    2016-05-01

    Full Text Available Abstract Minimally invasive surgery (MIS can be considered as the greatest surgical innovation over the past thirty years. It revolutionized surgical practice with well-proven advantages over traditional open surgery: reduced surgical trauma and incision-related complications, such as surgical-site infections, postoperative pain and hernia, reduced hospital stay, and improved cosmetic outcome. Nonetheless, proficiency in MIS can be technically challenging as conventional laparoscopy is associated with several limitations as the two-dimensional (2D monitor reduction in-depth perception, camera instability, limited range of motion and steep learning curves. The surgeon has a low force feedback which allows simple gestures, respect for tissues and more effective treatment of complications.Since 1980s several computer sciences and robotics projects have been set up to overcome the difficulties encountered with conventional laparoscopy, to augment the surgeon's skills, achieve accuracy and high precision during complex surgery and facilitate widespread of MIS. Surgical instruments are guided by haptic interfaces that replicate and filter hand movements. Robotically assisted technology offers advantages that include improved three- dimensional stereoscopic vision, wristed instruments that improve dexterity, and tremor canceling software that improves surgical precision.

  20. Robotic assisted andrological surgery

    Science.gov (United States)

    Parekattil, Sijo J; Gudeloglu, Ahmet

    2013-01-01

    The introduction of the operative microscope for andrological surgery in the 1970s provided enhanced magnification and accuracy, unparalleled to any previous visual loop or magnification techniques. This technology revolutionized techniques for microsurgery in andrology. Today, we may be on the verge of a second such revolution by the incorporation of robotic assisted platforms for microsurgery in andrology. Robotic assisted microsurgery is being utilized to a greater degree in andrology and a number of other microsurgical fields, such as ophthalmology, hand surgery, plastics and reconstructive surgery. The potential advantages of robotic assisted platforms include elimination of tremor, improved stability, surgeon ergonomics, scalability of motion, multi-input visual interphases with up to three simultaneous visual views, enhanced magnification, and the ability to manipulate three surgical instruments and cameras simultaneously. This review paper begins with the historical development of robotic microsurgery. It then provides an in-depth presentation of the technique and outcomes of common robotic microsurgical andrological procedures, such as vasectomy reversal, subinguinal varicocelectomy, targeted spermatic cord denervation (for chronic orchialgia) and robotic assisted microsurgical testicular sperm extraction (microTESE). PMID:23241637

  1. Dynamic benchmarking of simulation codes

    International Nuclear Information System (INIS)

    Henry, R.E.; Paik, C.Y.; Hauser, G.M.

    1996-01-01

    Computer simulation of nuclear power plant response can be a full-scope control room simulator, an engineering simulator to represent the general behavior of the plant under normal and abnormal conditions, or the modeling of the plant response to conditions that would eventually lead to core damage. In any of these, the underlying foundation for their use in analysing situations, training of vendor/utility personnel, etc. is how well they represent what has been known from industrial experience, large integral experiments and separate effects tests. Typically, simulation codes are benchmarked with some of these; the level of agreement necessary being dependent upon the ultimate use of the simulation tool. However, these analytical models are computer codes, and as a result, the capabilities are continually enhanced, errors are corrected, new situations are imposed on the code that are outside of the original design basis, etc. Consequently, there is a continual need to assure that the benchmarks with important transients are preserved as the computer code evolves. Retention of this benchmarking capability is essential to develop trust in the computer code. Given the evolving world of computer codes, how is this retention of benchmarking capabilities accomplished? For the MAAP4 codes this capability is accomplished through a 'dynamic benchmarking' feature embedded in the source code. In particular, a set of dynamic benchmarks are included in the source code and these are exercised every time the archive codes are upgraded and distributed to the MAAP users. Three different types of dynamic benchmarks are used: plant transients; large integral experiments; and separate effects tests. Each of these is performed in a different manner. The first is accomplished by developing a parameter file for the plant modeled and an input deck to describe the sequence; i.e. the entire MAAP4 code is exercised. The pertinent plant data is included in the source code and the computer

  2. Organizational Factors and Long-Term Mortality after Hip Fracture Surgery. A Cohort Study of 6143 Consecutive Patients Undergoing Hip Fracture Surgery

    DEFF Research Database (Denmark)

    Lund, Caterina A; Møller, Ann M; Wetterslev, Jørn

    2014-01-01

    OBJECTIVE: In hospital and health care organizational factors may be changed to reduce postoperative mortality. The aim of this study is to evaluate a possible association between mortality and 'length of hospital stay', 'priority of surgery', 'time of surgery', or 'surgical delay' in hip fracture...... surgery. DESIGN: Observational cohort study. SETTING: Prospectively and consecutively reported data from the Danish Anaesthesia Database were linked to The Danish National Registry of Patients and The Civil Registration System. Records on vital status, admittance, discharges, codes of diagnosis......; therefore cluster randomized clinical trials comparing different clinical set ups may be warranted evaluating health care organizational factors....

  3. Distributed source coding of video

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Van Luong, Huynh

    2015-01-01

    A foundation for distributed source coding was established in the classic papers of Slepian-Wolf (SW) [1] and Wyner-Ziv (WZ) [2]. This has provided a starting point for work on Distributed Video Coding (DVC), which exploits the source statistics at the decoder side offering shifting processing...... steps, conventionally performed at the video encoder side, to the decoder side. Emerging applications such as wireless visual sensor networks and wireless video surveillance all require lightweight video encoding with high coding efficiency and error-resilience. The video data of DVC schemes differ from...... the assumptions of SW and WZ distributed coding, e.g. by being correlated in time and nonstationary. Improving the efficiency of DVC coding is challenging. This paper presents some selected techniques to address the DVC challenges. Focus is put on pin-pointing how the decoder steps are modified to provide...

  4. Non-Protein Coding RNAs

    CERN Document Server

    Walter, Nils G; Batey, Robert T

    2009-01-01

    This book assembles chapters from experts in the Biophysics of RNA to provide a broadly accessible snapshot of the current status of this rapidly expanding field. The 2006 Nobel Prize in Physiology or Medicine was awarded to the discoverers of RNA interference, highlighting just one example of a large number of non-protein coding RNAs. Because non-protein coding RNAs outnumber protein coding genes in mammals and other higher eukaryotes, it is now thought that the complexity of organisms is correlated with the fraction of their genome that encodes non-protein coding RNAs. Essential biological processes as diverse as cell differentiation, suppression of infecting viruses and parasitic transposons, higher-level organization of eukaryotic chromosomes, and gene expression itself are found to largely be directed by non-protein coding RNAs. The biophysical study of these RNAs employs X-ray crystallography, NMR, ensemble and single molecule fluorescence spectroscopy, optical tweezers, cryo-electron microscopy, and ot...

  5. Reliability-Based Code Calibration

    DEFF Research Database (Denmark)

    Faber, M.H.; Sørensen, John Dalsgaard

    2003-01-01

    The present paper addresses fundamental concepts of reliability based code calibration. First basic principles of structural reliability theory are introduced and it is shown how the results of FORM based reliability analysis may be related to partial safety factors and characteristic values....... Thereafter the code calibration problem is presented in its principal decision theoretical form and it is discussed how acceptable levels of failure probability (or target reliabilities) may be established. Furthermore suggested values for acceptable annual failure probabilities are given for ultimate...... and serviceability limit states. Finally the paper describes the Joint Committee on Structural Safety (JCSS) recommended procedure - CodeCal - for the practical implementation of reliability based code calibration of LRFD based design codes....

  6. What Froze the Genetic Code?

    Directory of Open Access Journals (Sweden)

    Lluís Ribas de Pouplana

    2017-04-01

    Full Text Available The frozen accident theory of the Genetic Code was a proposal by Francis Crick that attempted to explain the universal nature of the Genetic Code and the fact that it only contains information for twenty amino acids. Fifty years later, it is clear that variations to the universal Genetic Code exist in nature and that translation is not limited to twenty amino acids. However, given the astonishing diversity of life on earth, and the extended evolutionary time that has taken place since the emergence of the extant Genetic Code, the idea that the translation apparatus is for the most part immobile remains true. Here, we will offer a potential explanation to the reason why the code has remained mostly stable for over three billion years, and discuss some of the mechanisms that allow species to overcome the intrinsic functional limitations of the protein synthesis machinery.

  7. Verification of reactor safety codes

    International Nuclear Information System (INIS)

    Murley, T.E.

    1978-01-01

    The safety evaluation of nuclear power plants requires the investigation of wide range of potential accidents that could be postulated to occur. Many of these accidents deal with phenomena that are outside the range of normal engineering experience. Because of the expense and difficulty of full scale tests covering the complete range of accident conditions, it is necessary to rely on complex computer codes to assess these accidents. The central role that computer codes play in safety analyses requires that the codes be verified, or tested, by comparing the code predictions with a wide range of experimental data chosen to span the physical phenomena expected under potential accident conditions. This paper discusses the plans of the Nuclear Regulatory Commission for verifying the reactor safety codes being developed by NRC to assess the safety of light water reactors and fast breeder reactors. (author)

  8. What Froze the Genetic Code?

    Science.gov (United States)

    Ribas de Pouplana, Lluís; Torres, Adrian Gabriel; Rafels-Ybern, Àlbert

    2017-04-05

    The frozen accident theory of the Genetic Code was a proposal by Francis Crick that attempted to explain the universal nature of the Genetic Code and the fact that it only contains information for twenty amino acids. Fifty years later, it is clear that variations to the universal Genetic Code exist in nature and that translation is not limited to twenty amino acids. However, given the astonishing diversity of life on earth, and the extended evolutionary time that has taken place since the emergence of the extant Genetic Code, the idea that the translation apparatus is for the most part immobile remains true. Here, we will offer a potential explanation to the reason why the code has remained mostly stable for over three billion years, and discuss some of the mechanisms that allow species to overcome the intrinsic functional limitations of the protein synthesis machinery.

  9. Tristan code and its application

    Science.gov (United States)

    Nishikawa, K.-I.

    Since TRISTAN: The 3-D Electromagnetic Particle Code was introduced in 1990, it has been used for many applications including the simulations of global solar windmagnetosphere interaction. The most essential ingridients of this code have been published in the ISSS-4 book. In this abstract we describe some of issues and an application of this code for the study of global solar wind-magnetosphere interaction including a substorm study. The basic code (tristan.f) for the global simulation and a local simulation of reconnection with a Harris model (issrec2.f) are available at http:/www.physics.rutger.edu/˜kenichi. For beginners the code (isssrc2.f) with simpler boundary conditions is suitable to start to run simulations. The future of global particle simulations for a global geospace general circulation (GGCM) model with predictive capability (for Space Weather Program) is discussed.

  10. High efficiency video coding coding tools and specification

    CERN Document Server

    Wien, Mathias

    2015-01-01

    The video coding standard High Efficiency Video Coding (HEVC) targets at improved compression performance for video resolutions of HD and beyond, providing Ultra HD video at similar compressed bit rates as for HD video encoded with the well-established video coding standard H.264 | AVC. Based on known concepts, new coding structures and improved coding tools have been developed and specified in HEVC. The standard is expected to be taken up easily by established industry as well as new endeavors, answering the needs of todays connected and ever-evolving online world. This book presents the High Efficiency Video Coding standard and explains it in a clear and coherent language. It provides a comprehensive and consistently written description, all of a piece. The book targets at both, newbies to video coding as well as experts in the field. While providing sections with introductory text for the beginner, it suits as a well-arranged reference book for the expert. The book provides a comprehensive reference for th...

  11. Detecting non-coding selective pressure in coding regions

    Directory of Open Access Journals (Sweden)

    Blanchette Mathieu

    2007-02-01

    Full Text Available Abstract Background Comparative genomics approaches, where orthologous DNA regions are compared and inter-species conserved regions are identified, have proven extremely powerful for identifying non-coding regulatory regions located in intergenic or intronic regions. However, non-coding functional elements can also be located within coding region, as is common for exonic splicing enhancers, some transcription factor binding sites, and RNA secondary structure elements affecting mRNA stability, localization, or translation. Since these functional elements are located in regions that are themselves highly conserved because they are coding for a protein, they generally escaped detection by comparative genomics approaches. Results We introduce a comparative genomics approach for detecting non-coding functional elements located within coding regions. Codon evolution is modeled as a mixture of codon substitution models, where each component of the mixture describes the evolution of codons under a specific type of coding selective pressure. We show how to compute the posterior distribution of the entropy and parsimony scores under this null model of codon evolution. The method is applied to a set of growth hormone 1 orthologous mRNA sequences and a known exonic splicing elements is detected. The analysis of a set of CORTBP2 orthologous genes reveals a region of several hundred base pairs under strong non-coding selective pressure whose function remains unknown. Conclusion Non-coding functional elements, in particular those involved in post-transcriptional regulation, are likely to be much more prevalent than is currently known. With the numerous genome sequencing projects underway, comparative genomics approaches like that proposed here are likely to become increasingly powerful at detecting such elements.

  12. Bariatric surgery insurance requirements independently predict surgery dropout.

    Science.gov (United States)

    Love, Kaitlin M; Mehaffey, J Hunter; Safavian, Dana; Schirmer, Bruce; Malin, Steven K; Hallowell, Peter T; Kirby, Jennifer L

    2017-05-01

    Many insurance companies have considerable prebariatric surgery requirements despite a lack of evidence for improved clinical outcomes. The hypothesis of this study is that insurance-specific requirements will be associated with a decreased progression to surgery and increased delay in time to surgery. Retrospective data collection was performed for patients undergoing bariatric surgery evaluation from 2010-2015. Patients who underwent surgery (SGY; n = 827; mean body mass index [BMI] 49.1) were compared with those who did not (no-SGY; n = 648; mean BMI: 49.4). Univariate and multivariate analysis were performed to identify specific co-morbidity and insurance specific predictors of surgical dropout and time to surgery. A total of 1475 patients using 12 major insurance payors were included. Univariate analysis found insurance requirements associated with surgical drop out included longer median diet duration (no-SGY = 6 mo; SGY = 3 mo; Psurgery dropout. Additionally, surgical patients had an average interval between initial visit and surgery of 5.8±4.6 months with significant weight gain (2.1 kg, Psurgery insurance requirements were associated with lack of patient progression to surgery in this study. In addition, delays in surgery were associated with preoperative weight gain. Although prospective and multicenter studies are needed, these findings have major policy implications suggesting insurance requirements may need to be reconsidered to improve medical care. Copyright © 2017 American Society for Bariatric Surgery. Published by Elsevier Inc. All rights reserved.

  13. Acute care surgery: defining mortality in emergency general surgery in the state of Maryland.

    Science.gov (United States)

    Narayan, Mayur; Tesoriero, Ronald; Bruns, Brandon R; Klyushnenkova, Elena N; Chen, Hegang; Diaz, Jose J

    2015-04-01

    Emergency general surgery (EGS) is a major component of acute care surgery, however, limited data exist on mortality with respect to trauma center (TC) designation. We hypothesized that mortality would be lower for EGS patients treated at a TC vs non-TC (NTC). A retrospective review of the Maryland Health Services Cost Review Commission database from 2009 to 2013 was performed. The American Association for the Surgery of Trauma EGS ICD-9 codes were used to identify EGS patients. Data collected included demographics, TC designation, emergency department admissions, and All Patients Refined Severity of Illness (APR_SOI). Trauma center designation was used as a marker of a formal acute care surgery program. Primary outcomes included in-hospital mortality. Multivariable logistic regression analysis was performed controlling for age. There were 817,942 EGS encounters. Mean ± SD age of patients was 60.1 ± 18.7 years, 46.5% were males; 71.1% of encounters were at NTCs; and 75.8% were emergency department admissions. Overall mortality was 4.05%. Mortality was calculated based on TC designation controlling for age across APR_SOI strata. Multivariable logistic regression analysis did not show statistically significant differences in mortality between hospital levels for minor APR_SOI. For moderate APR_SOI, mortality was significantly lower for TCs compared with NTCs (p surgery patients treated at TCs had lower mortality for moderate APR_SOI, but increased mortality for extreme APR_SOI when compared with NTCs. Additional investigation is required to better evaluate this unexpected finding. Copyright © 2015 American College of Surgeons. Published by Elsevier Inc. All rights reserved.

  14. Coding for effective denial management.

    Science.gov (United States)

    Miller, Jackie; Lineberry, Joe

    2004-01-01

    Nearly everyone will agree that accurate and consistent coding of diagnoses and procedures is the cornerstone for operating a compliant practice. The CPT or HCPCS procedure code tells the payor what service was performed and also (in most cases) determines the amount of payment. The ICD-9-CM diagnosis code, on the other hand, tells the payor why the service was performed. If the diagnosis code does not meet the payor's criteria for medical necessity, all payment for the service will be denied. Implementation of an effective denial management program can help "stop the bleeding." Denial management is a comprehensive process that works in two ways. First, it evaluates the cause of denials and takes steps to prevent them. Second, denial management creates specific procedures for refiling or appealing claims that are initially denied. Accurate, consistent and compliant coding is key to both of these functions. The process of proactively managing claim denials also reveals a practice's administrative strengths and weaknesses, enabling radiology business managers to streamline processes, eliminate duplicated efforts and shift a larger proportion of the staff's focus from paperwork to servicing patients--all of which are sure to enhance operations and improve practice management and office morale. Accurate coding requires a program of ongoing training and education in both CPT and ICD-9-CM coding. Radiology business managers must make education a top priority for their coding staff. Front office staff, technologists and radiologists should also be familiar with the types of information needed for accurate coding. A good staff training program will also cover the proper use of Advance Beneficiary Notices (ABNs). Registration and coding staff should understand how to determine whether the patient's clinical history meets criteria for Medicare coverage, and how to administer an ABN if the exam is likely to be denied. Staff should also understand the restrictions on use of

  15. The Gender Issue in Congenital and Developmental Cataract Surgery

    Directory of Open Access Journals (Sweden)

    Marzieh Katibeh

    2013-01-01

    Full Text Available Purpose: To describe the demographic pattern of congenital cataract surgery at a referral ophthalmology center in Iran and to evaluate any possible difference between the genders. Methods: Subjects aged 15 years or less scheduled for cataract surgery were enrolled in this cross-sectional study. Data was retrieved from the electronic medical records according to the ICD-10 coding system. Age and proportion of operations by sex were the main parameters of interest. We employed analysis of covariance to compare age at surgery and logistic regression to obtain the trend for the number of cataract procedures in boys and girls. Results: Overall, 314 congenital cataract procedures were performed during the study period, 55 (17.5% of which were related to second eye surgery. Operated eyes belonged to male subjects in 172 (54.8% cases and female subjects in 142 (45.2% cases. Mean age at operation for both first and second eyes was 3.2±3.0 years overall, and 3.1±2.9 versus 3.4±3.0 years in girls and boys, respectively (P= 0.62. Surgery was performed before one year of age in 33.2% and before 5 years in 75% of cases. Among patients undergoing second eye surgery, girls presented significantly later than boys (at 4.2±3.3 vs. 2.6±1.7 years, P= 0.012. Conclusion: The rate of congenital/infantile cataract surgery in boys was almost 10% higher than girls. We observed a significant difference only regarding age at second eye surgery which comprised 17.5% of all operations. One third and two thirds of the procedures were performed under the age of one and five years, respectively.

  16. Trends in adolescent bariatric surgery evaluated by UHC database collection.

    Science.gov (United States)

    Pallati, Pradeep; Buettner, Shelby; Simorov, Anton; Meyer, Avishai; Shaligram, Abhijit; Oleynikov, Dmitry

    2012-11-01

    With increasing childhood obesity, adolescent bariatric surgery has been increasingly performed. We used a national database to analyze current trends in laparoscopic bariatric surgery in the adolescent population and related short-term outcomes. Discharge data from the University Health System Consortium (UHC) database was accessed using International Classification of Disease codes during a 36 month period. UHC is an alliance of more than 110 academic medical centers and nearly 250 affiliate hospitals. All adolescent patients between 13 and 18 years of age, with the assorted diagnoses of obesity, who underwent laparoscopic adjustable gastric banding (LAGB), sleeve gastrectomy (SG), and laparoscopic Roux-en-Y gastric bypass (LRYGB) were evaluated. The main outcome measures analyzed were morbidity, mortality, length of hospital stay (LOS), overall cost, intensive care unit (ICU) admission rate, and readmission rate. These outcomes were compared to those of adult bariatric surgery. Adolescent laparoscopic bariatric surgery was performed on 329 patients. At the same time, 49,519 adult bariatric surgeries were performed. One hundred thirty-six adolescent patients underwent LAGB, 47 had SG, and 146 patients underwent LRYGB. LAGB has shown a decreasing trend (n = 68, 34, and 34), while SG has shown an increasing trend (n = 8, 15, and 24) over the study years. LRYGB remained stable (n = 44, 60, and 42) throughout the study period. The individual and summative morbidity and mortality rates for these procedures were zero. Compared to adult bariatric surgery, 30 day in-hospital morbidity (0 vs. 2.2 %, p adolescent bariatric surgery, while the ICU admission rate (9.78 vs. 6.30 %, p adolescent laparoscopic bariatric surgery reveal the increased use of sleeve gastrectomy and adjustable gastric banding falling out of favor.

  17. ESCADRE and ICARE code systems

    International Nuclear Information System (INIS)

    Reocreux, M.; Gauvain, J.

    1992-01-01

    The French sever accident code development program is following two parallel approaches: the first one is dealing with ''integral codes'' which are designed for giving immediate engineer answers, the second one is following a more mechanistic way in order to have the capability of detailed analysis of experiments, in order to get a better understanding of the scaling problem and reach a better confidence in plant calculations. In the first approach a complete system has been developed and is being used for practical cases: this is the ESCADRE system. In the second approach, a set of codes dealing first with primary circuit is being developed: a mechanistic core degradation code, ICARE, has been issued and is being coupled with the advanced thermalhydraulic code CATHARE. Fission product codes have been also coupled to CATHARE. The ''integral'' ESCADRE system and the mechanistic ICARE and associated codes are described. Their main characteristics are reviewed and the status of their development and assessment given. Future studies are finally discussed. 36 refs, 4 figs, 1 tab

  18. The ZPIC educational code suite

    Science.gov (United States)

    Calado, R.; Pardal, M.; Ninhos, P.; Helm, A.; Mori, W. B.; Decyk, V. K.; Vieira, J.; Silva, L. O.; Fonseca, R. A.

    2017-10-01

    Particle-in-Cell (PIC) codes are used in almost all areas of plasma physics, such as fusion energy research, plasma accelerators, space physics, ion propulsion, and plasma processing, and many other areas. In this work, we present the ZPIC educational code suite, a new initiative to foster training in plasma physics using computer simulations. Leveraging on our expertise and experience from the development and use of the OSIRIS PIC code, we have developed a suite of 1D/2D fully relativistic electromagnetic PIC codes, as well as 1D electrostatic. These codes are self-contained and require only a standard laptop/desktop computer with a C compiler to be run. The output files are written in a new file format called ZDF that can be easily read using the supplied routines in a number of languages, such as Python, and IDL. The code suite also includes a number of example problems that can be used to illustrate several textbook and advanced plasma mechanisms, including instructions for parameter space exploration. We also invite contributions to this repository of test problems that will be made freely available to the community provided the input files comply with the format defined by the ZPIC team. The code suite is freely available and hosted on GitHub at https://github.com/zambzamb/zpic. Work partially supported by PICKSC.

  19. Stability analysis by ERATO code

    International Nuclear Information System (INIS)

    Tsunematsu, Toshihide; Takeda, Tatsuoki; Matsuura, Toshihiko; Azumi, Masafumi; Kurita, Gen-ichi

    1979-12-01

    Problems in MHD stability calculations by ERATO code are described; which concern convergence property of results, equilibrium codes, and machine optimization of ERATO code. It is concluded that irregularity on a convergence curve is not due to a fault of the ERATO code itself but due to inappropriate choice of the equilibrium calculation meshes. Also described are a code to calculate an equilibrium as a quasi-inverse problem and a code to calculate an equilibrium as a result of a transport process. Optimization of the code with respect to I/O operations reduced both CPU time and I/O time considerably. With the FACOM230-75 APU/CPU multiprocessor system, the performance is about 6 times as high as with the FACOM230-75 CPU, showing the effectiveness of a vector processing computer for the kind of MHD computations. This report is a summary of the material presented at the ERATO workshop 1979(ORNL), supplemented with some details. (author)

  20. ETR/ITER systems code

    Energy Technology Data Exchange (ETDEWEB)

    Barr, W.L.; Bathke, C.G.; Brooks, J.N.; Bulmer, R.H.; Busigin, A.; DuBois, P.F.; Fenstermacher, M.E.; Fink, J.; Finn, P.A.; Galambos, J.D.; Gohar, Y.; Gorker, G.E.; Haines, J.R.; Hassanein, A.M.; Hicks, D.R.; Ho, S.K.; Kalsi, S.S.; Kalyanam, K.M.; Kerns, J.A.; Lee, J.D.; Miller, J.R.; Miller, R.L.; Myall, J.O.; Peng, Y-K.M.; Perkins, L.J.; Spampinato, P.T.; Strickler, D.J.; Thomson, S.L.; Wagner, C.E.; Willms, R.S.; Reid, R.L. (ed.)

    1988-04-01

    A tokamak systems code capable of modeling experimental test reactors has been developed and is described in this document. The code, named TETRA (for Tokamak Engineering Test Reactor Analysis), consists of a series of modules, each describing a tokamak system or component, controlled by an optimizer/driver. This code development was a national effort in that the modules were contributed by members of the fusion community and integrated into a code by the Fusion Engineering Design Center. The code has been checked out on the Cray computers at the National Magnetic Fusion Energy Computing Center and has satisfactorily simulated the Tokamak Ignition/Burn Experimental Reactor II (TIBER) design. A feature of this code is the ability to perform optimization studies through the use of a numerical software package, which iterates prescribed variables to satisfy a set of prescribed equations or constraints. This code will be used to perform sensitivity studies for the proposed International Thermonuclear Experimental Reactor (ITER). 22 figs., 29 tabs.