WorldWideScience

Sample records for survey coding rules

  1. Truncation Depth Rule-of-Thumb for Convolutional Codes

    Science.gov (United States)

    Moision, Bruce

    2009-01-01

    In this innovation, it is shown that a commonly used rule of thumb (that the truncation depth of a convolutional code should be five times the memory length, m, of the code) is accurate only for rate 1/2 codes. In fact, the truncation depth should be 2.5 m/(1 - r), where r is the code rate. The accuracy of this new rule is demonstrated by tabulating the distance properties of a large set of known codes. This new rule was derived by bounding the losses due to truncation as a function of the code rate. With regard to particular codes, a good indicator of the required truncation depth is the path length at which all paths that diverge from a particular path have accumulated the minimum distance of the code. It is shown that the new rule of thumb provides an accurate prediction of this depth for codes of varying rates.

  2. Multiple Primary and Histology Coding Rules - SEER

    Science.gov (United States)

    Download the coding manual and training resources for cases diagnosed from 2007 to 2017. Sites included are lung, breast, colon, melanoma of the skin, head and neck, kidney, renal pelvis/ureter/bladder, benign brain, and malignant brain.

  3. Codification of LMFBR rules and comparison of codes

    International Nuclear Information System (INIS)

    Faure, O.; Debaene, J.P.

    1993-01-01

    The first part of this report presents the basic RCC-MR (regles de conception et de construction des materiels mecaniques des ilots nucleaires, reacteurs a neutrons rapides) design rules and their purpose. The second part is a qualitative comparison between RCC-MR, Code case N47 (ASME) and ETSDG Guide (MONJU Guide), made on the following topics: negligible creep test, ratcheting, creep fatigue, buckling, piping rules. An outline is given on improvements to RCC-MR rules now in progress

  4. Setting new global rules? : TNCs and codes of conduct

    NARCIS (Netherlands)

    Kolk, A.; van Tulder, R.

    2005-01-01

    The introduction of codes of conduct can be seen as an expression of corporate social responsibility, but also as rule-setting behaviour - attempts to help fill some of the existing international instutitional voids. To shed light on these aspects and the (potential) effectiveness of codes, this

  5. Survey of coded aperture imaging

    International Nuclear Information System (INIS)

    Barrett, H.H.

    1975-01-01

    The basic principle and limitations of coded aperture imaging for x-ray and gamma cameras are discussed. Current trends include (1) use of time varying apertures, (2) use of ''dilute'' apertures with transmission much less than 50%, and (3) attempts to derive transverse tomographic sections, unblurred by other planes, from coded images

  6. Survey of nuclear fuel-cycle codes

    International Nuclear Information System (INIS)

    Thomas, C.R.; de Saussure, G.; Marable, J.H.

    1981-04-01

    A two-month survey of nuclear fuel-cycle models was undertaken. This report presents the information forthcoming from the survey. Of the nearly thirty codes reviewed in the survey, fifteen of these codes have been identified as potentially useful in fulfilling the tasks of the Nuclear Energy Analysis Division (NEAD) as defined in their FY 1981-1982 Program Plan. Six of the fifteen codes are given individual reviews. The individual reviews address such items as the funding agency, the author and organization, the date of completion of the code, adequacy of documentation, computer requirements, history of use, variables that are input and forecast, type of reactors considered, part of fuel cycle modeled and scope of the code (international or domestic, long-term or short-term, regional or national). The report recommends that the Model Evaluation Team perform an evaluation of the EUREKA uranium mining and milling code

  7. Proposal to modify Rule 6, Rule 10a, and Rule 12c of the International Code of Nomenclature of Prokaryotes.

    Science.gov (United States)

    Oren, Aharon; Garrity, George M; Schink, Bernhard

    2014-04-01

    According to the current versions of Rule 10a and Rule 12c of the International Code of Nomenclature of Prokaryotes, names of a genus or subgenus and specific epithets may be taken from any source and may even be composed in an arbitrary manner. Based on these rules, names may be composed of any word or any combination of elements derived from any language with a Latin ending. We propose modifying these rules by adding the text, currently part of Recommendation 6, according to which words from languages other than Latin or Greek should be avoided as long as equivalents exist in Latin or Greek or can be constructed by combining word elements from these two languages. We also propose modification of Rule 6 by adopting some of the current paragraphs of Recommendation 6 to become part of the Rule.

  8. Report on FY15 alloy 617 code rules development

    Energy Technology Data Exchange (ETDEWEB)

    Sham, Sam [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Jetter, Robert I [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Hollinger, Greg [Becht Engineering Co., Inc., Liberty Corner, NJ (United States); Pease, Derrick [Becht Engineering Co., Inc., Liberty Corner, NJ (United States); Carter, Peter [Stress Engineering Services, Inc., Houston, TX (United States); Pu, Chao [Univ. of Tennessee, Knoxville, TN (United States); Wang, Yanli [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2015-09-01

    Due to its strength at very high temperatures, up to 950°C (1742°F), Alloy 617 is the reference construction material for structural components that operate at or near the outlet temperature of the very high temperature gas-cooled reactors. However, the current rules in the ASME Section III, Division 5 Subsection HB, Subpart B for the evaluation of strain limits and creep-fatigue damage using simplified methods based on elastic analysis have been deemed inappropriate for Alloy 617 at temperatures above 650°C (1200°F) (Corum and Brass, Proceedings of ASME 1991 Pressure Vessels and Piping Conference, PVP-Vol. 215, p.147, ASME, NY, 1991). The rationale for this exclusion is that at higher temperatures it is not feasible to decouple plasticity and creep, which is the basis for the current simplified rules. This temperature, 650°C (1200°F), is well below the temperature range of interest for this material for the high temperature gas-cooled reactors and the very high temperature gas-cooled reactors. The only current alternative is, thus, a full inelastic analysis requiring sophisticated material models that have not yet been formulated and verified. To address these issues, proposed code rules have been developed which are based on the use of elastic-perfectly plastic (EPP) analysis methods applicable to very high temperatures. The proposed rules for strain limits and creep-fatigue evaluation were initially documented in the technical literature (Carter, Jetter and Sham, Proceedings of ASME 2012 Pressure Vessels and Piping Conference, papers PVP 2012 28082 and PVP 2012 28083, ASME, NY, 2012), and have been recently revised to incorporate comments and simplify their application. Background documents have been developed for these two code cases to support the ASME Code committee approval process. These background documents for the EPP strain limits and creep-fatigue code cases are documented in this report.

  9. Privacy rules for DNA databanks. Protecting coded 'future diaries'.

    Science.gov (United States)

    Annas, G J

    1993-11-17

    In privacy terms, genetic information is like medical information. But the information contained in the DNA molecule itself is more sensitive because it contains an individual's probabilistic "future diary," is written in a code that has only partially been broken, and contains information about an individual's parents, siblings, and children. Current rules for protecting the privacy of medical information cannot protect either genetic information or identifiable DNA samples stored in DNA databanks. A review of the legal and public policy rationales for protecting genetic privacy suggests that specific enforceable privacy rules for DNA databanks are needed. Four preliminary rules are proposed to govern the creation of DNA databanks, the collection of DNA samples for storage, limits on the use of information derived from the samples, and continuing obligations to those whose DNA samples are in the databanks.

  10. Creep-fatigue rules in the RCC-MR code

    International Nuclear Information System (INIS)

    Drubay, B.

    1988-01-01

    In 1978, CEA, Electricite de France (EDF) and NOVATOME decided to draw up a complete set of design and construction rules for LMFBR components. This RCC-MR code issued in June 1985 and completed in November 1987 was chosen as a sound basis for the next European Fast Reactor (EFR). The purpose of this paper is to describe the present RCC-MR creep-fatigue design rules to be applied with elastic analysis including the modifications adopted in the first addenda. This method is based on a separate evaluation of a fatigue usage fraction V and creep rupture usage fraction W with the common linear summation rule. The fatigue usage fraction is obtained from continuous fatigue curves (without hold times) and from total strain ranges (elastic + plastic + creep). The creep rupture usage fraction W is obtained from stress to rupture curves and a stress σk evaluating the stress generated during the cycle. (author)

  11. Survey of Codes Employing Nuclear Damage Assessment

    Science.gov (United States)

    1977-10-01

    surveyed codes were com- DO 73Mu 1473 ETN OF 1NOVSSSOLETE UNCLASSIFIED 1 SECURITY CLASSIFICATION OF THIS f AGE (Wh*11 Date Efntered)S<>-~C. I UNCLASSIFIED...level and above) TALLEY/TOTEM not nuclear TARTARUS too highly aggregated (battalion level and above) UNICORN highly aggregated force allocation code...vulnerability data can bq input by the user as he receives them, and there is the abil ’ity to replay any situation using hindsight. The age of target

  12. Low back pain status in elite and semi-elite Australian football codes: a cross-sectional survey of football (soccer, Australian rules, rugby league, rugby union and non-athletic controls

    Directory of Open Access Journals (Sweden)

    McHardy Andrew

    2009-04-01

    Full Text Available Abstract Background Our understanding of the effects of football code participation on low back pain (LBP is limited. It is unclear whether LBP is more prevalent in athletic populations or differs between levels of competition. Thus it was the aim of this study to document and compare the prevalence, intensity, quality and frequency of LBP between elite and semi-elite male Australian football code participants and a non-athletic group. Methods A cross-sectional survey of elite and semi-elite male Australian football code participants and a non-athletic group was performed. Participants completed a self-reported questionnaire incorporating the Quadruple Visual Analogue Scale (QVAS and McGill Pain Questionnaire (short form (MPQ-SF, along with additional questions adapted from an Australian epidemiological study. Respondents were 271 elite players (mean age 23.3, range 17–39, 360 semi-elite players (mean age 23.8, range 16–46 and 148 non-athletic controls (mean age 23.9, range 18–39. Results Groups were matched for age (p = 0.42 and experienced the same age of first onset LBP (p = 0.40. A significant linear increase in LBP from the non-athletic group, to the semi-elite and elite groups for the QVAS and the MPQ-SF was evident (p Conclusion Foolers in Australia have significantly more severe and frequent LBP than a non-athletic group and this escalates with level of competition.

  13. Low back pain status in elite and semi-elite Australian football codes: a cross-sectional survey of football (soccer), Australian rules, rugby league, rugby union and non-athletic controls.

    Science.gov (United States)

    Hoskins, Wayne; Pollard, Henry; Daff, Chris; Odell, Andrew; Garbutt, Peter; McHardy, Andrew; Hardy, Kate; Dragasevic, George

    2009-04-17

    Our understanding of the effects of football code participation on low back pain (LBP) is limited. It is unclear whether LBP is more prevalent in athletic populations or differs between levels of competition. Thus it was the aim of this study to document and compare the prevalence, intensity, quality and frequency of LBP between elite and semi-elite male Australian football code participants and a non-athletic group. A cross-sectional survey of elite and semi-elite male Australian football code participants and a non-athletic group was performed. Participants completed a self-reported questionnaire incorporating the Quadruple Visual Analogue Scale (QVAS) and McGill Pain Questionnaire (short form) (MPQ-SF), along with additional questions adapted from an Australian epidemiological study. Respondents were 271 elite players (mean age 23.3, range 17-39), 360 semi-elite players (mean age 23.8, range 16-46) and 148 non-athletic controls (mean age 23.9, range 18-39). Groups were matched for age (p = 0.42) and experienced the same age of first onset LBP (p = 0.40). A significant linear increase in LBP from the non-athletic group, to the semi-elite and elite groups for the QVAS and the MPQ-SF was evident (p < 0.001). Elite subjects were more likely to experience more frequent (daily or weekly OR 1.77, 95% CI 1.29-2.42) and severe LBP (discomforting and greater OR 1.75, 95% CI 1.29-2.38). Foolers in Australia have significantly more severe and frequent LBP than a non-athletic group and this escalates with level of competition.

  14. Creep design rules in french ''RCC-MR'' code

    International Nuclear Information System (INIS)

    Roche, H.

    1986-04-01

    In this paper, four points enlightening the originality of the ''RCC-MR'' analysis rules in the creep range will be discussed. The three first points will concern elastic analysis, the fourth one materials data. The rules given in this paper are applicable for class 1 components and level A conditions. They are given by way of illustration in a simplified form

  15. C++ Coding Standards 101 Rules, Guidelines, and Best Practices

    CERN Document Server

    Sutter, Herb

    2005-01-01

    Consistent, high-quality coding standards improve software quality, reduce time-to-market, promote teamwork, eliminate time wasted on inconsequential matters, and simplify maintenance. Now, two of the world's most respected C++ experts distill the rich collective experience of the global C++ community into a set of coding standards that every developer and development team can understand and use as a basis for their own coding standards.

  16. 26 CFR 1.997-1 - Special rules for subchapter C of the Code.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 10 2010-04-01 2010-04-01 false Special rules for subchapter C of the Code. 1.997-1 Section 1.997-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES Domestic International Sales Corporations § 1.997-1 Special rules for...

  17. Survey of particle codes in the Magnetic Fusion Energy Program

    International Nuclear Information System (INIS)

    1977-12-01

    In the spring of 1976, the Fusion Plasma Theory Branch of the Division of Magnetic Fusion Energy conducted a survey of all the physics computer codes being supported at that time. The purpose of that survey was to allow DMFE to prepare a description of the codes for distribution to the plasma physics community. This document is the first of several planned and covers those types of codes which treat the plasma as a group of particles

  18. Survey Of Lossless Image Coding Techniques

    Science.gov (United States)

    Melnychuck, Paul W.; Rabbani, Majid

    1989-04-01

    Many image transmission/storage applications requiring some form of data compression additionally require that the decoded image be an exact replica of the original. Lossless image coding algorithms meet this requirement by generating a decoded image that is numerically identical to the original. Several lossless coding techniques are modifications of well-known lossy schemes, whereas others are new. Traditional Markov-based models and newer arithmetic coding techniques are applied to predictive coding, bit plane processing, and lossy plus residual coding. Generally speaking, the compression ratio offered by these techniques are in the area of 1.6:1 to 3:1 for 8-bit pictorial images. Compression ratios for 12-bit radiological images approach 3:1, as these images have less detailed structure, and hence, their higher pel correlation leads to a greater removal of image redundancy.

  19. Evaluation on applicability of the rules, regulations, and industrial codes and standards for SMART development

    International Nuclear Information System (INIS)

    Choi, Suhn; Lee, C C.; Lee, C.K.; Kim, K.K.; Kim, J.P.; Kim, J.H.; Cho, B.H.; Kang, D J.; Bae, G.H.; Chung, M.; Chang, M.H.

    1999-03-01

    In this report, evaluation on applicability of the rules, regulations, and industrial codes and standards for SMART has been made. As the first step, past-to-present status of licensing structures were reviewed. Then, the rules, regulations, and standards applied to YGN 3-6 were listed and reviewed. Finally, evaluation on applicability of such rules and standards for SMART are made in each design fields. During this step technical evaluations on each items of rules, regulations and standards are made and the possible remedies or comments are suggested. The results are summarized in a tabular form and enclosed as Appendix. (Author). 8 refs., 5 tabs., 3 figs

  20. Code-specific learning rules improve action selection by populations of spiking neurons.

    Science.gov (United States)

    Friedrich, Johannes; Urbanczik, Robert; Senn, Walter

    2014-08-01

    Population coding is widely regarded as a key mechanism for achieving reliable behavioral decisions. We previously introduced reinforcement learning for population-based decision making by spiking neurons. Here we generalize population reinforcement learning to spike-based plasticity rules that take account of the postsynaptic neural code. We consider spike/no-spike, spike count and spike latency codes. The multi-valued and continuous-valued features in the postsynaptic code allow for a generalization of binary decision making to multi-valued decision making and continuous-valued action selection. We show that code-specific learning rules speed up learning both for the discrete classification and the continuous regression tasks. The suggested learning rules also speed up with increasing population size as opposed to standard reinforcement learning rules. Continuous action selection is further shown to explain realistic learning speeds in the Morris water maze. Finally, we introduce the concept of action perturbation as opposed to the classical weight- or node-perturbation as an exploration mechanism underlying reinforcement learning. Exploration in the action space greatly increases the speed of learning as compared to exploration in the neuron or weight space.

  1. Consideration of creep in design rules of AFCEN RCC-MRx 2012 code

    International Nuclear Information System (INIS)

    Lebarbe, T.; Petesch, C.; Lejeail, Y.; Lamagnere, P.; Dubiez-Le Goff, S.

    2014-01-01

    The 2012 edition of the RCC-MRx Code has been issued in French and English versions by AFCEN (Association Francaise pour les regles de Conception et de Construction des Materiels des Chaudieres Electro-nucleaires). This Code is the result of the merger of the RCC-MX 2008 developed in the context of the research reactor Jules Horowitz Reactor project, in the RCC-MR 2007 which set up rules applicable to the design of components operating at high temperature and to the Vacuum Vessel of ITER. This new edition is the opportunity to publish also the background of the rules. This paper is one illustration of what may be such a document, on a dedicated example, the creep rules. It contains an overview of the design rules associated to the creep damage and explains the purpose and the origins of these rules. This type of exercise is going to be generalized to all the parts of the code in AFCEN technical publications, the criteria. (authors)

  2. QEFSM model and Markov Algorithm for translating Quran reciting rules into Braille code

    Directory of Open Access Journals (Sweden)

    Abdallah M. Abualkishik

    2015-07-01

    Full Text Available The Holy Quran is the central religious verbal text of Islam. Muslims are expected to read, understand, and apply the teachings of the Holy Quran. The Holy Quran was translated to Braille code as a normal Arabic text without having its reciting rules included. It is obvious that the users of this transliteration will not be able to recite the Quran the right way. Through this work, Quran Braille Translator (QBT presents a specific translator to translate Quran verses and their reciting rules into the Braille code. Quran Extended Finite State Machine (QEFSM model is proposed through this study as it is able to detect the Quran reciting rules (QRR from the Quran text. Basis path testing was used to evaluate the inner work for the model by checking all the test cases for the model. Markov Algorithm (MA was used for translating the detected QRR and Quran text into the matched Braille code. The data entries for QBT are Arabic letters and diacritics. The outputs of this study are seen in the double lines of Braille symbols; the first line is the proposed Quran reciting rules and the second line is for the Quran scripts.

  3. Buckling rules in design codes: state of the art and future developments

    Energy Technology Data Exchange (ETDEWEB)

    Turbat, A. [FRAMATOME ANP, 69 - Lyon (France); Meziere, Y. [Electricite de France (EDF SEPTEN), 69 - Villeurbanne (France)

    2001-07-01

    Buckling, which can affect structures like bars, beams and shells when they are submitted to compressive stresses, can lead to unacceptable deformations and ruptures. Consequently, main Design Codes, especially those used in nuclear industry, include rules and analysis methods in order to prevent this phenomenon. In this paper, a review of buckling rules and/or analysis methods existing in ASME, RCC-M, RCC-MR and European Recommendations is performed. Then, these rules and methods are applied to the case of a cylinder filled with water and submitted to a seismic loading and results are compared. In the last part, current developments of methods to analyse creep buckling and dynamic buckling which should come and complete RCC-MR soon are presented. (author)

  4. Buckling rules in design codes: state of the art and future developments

    International Nuclear Information System (INIS)

    Turbat, A.; Meziere, Y.

    2001-01-01

    Buckling, which can affect structures like bars, beams and shells when they are submitted to compressive stresses, can lead to unacceptable deformations and ruptures. Consequently, main Design Codes, especially those used in nuclear industry, include rules and analysis methods in order to prevent this phenomenon. In this paper, a review of buckling rules and/or analysis methods existing in ASME, RCC-M, RCC-MR and European Recommendations is performed. Then, these rules and methods are applied to the case of a cylinder filled with water and submitted to a seismic loading and results are compared. In the last part, current developments of methods to analyse creep buckling and dynamic buckling which should come and complete RCC-MR soon are presented. (author)

  5. Survey of 1 1/2D transport codes

    International Nuclear Information System (INIS)

    Grad, H.

    1978-10-01

    A survey is given of a family of classical transport codes, recently termed ''1 1/2D'', which efficiently and accurately follow the evolution of plasma configurations on a long time scale, following coupled changes in plasma shape and topology with transport (but not wave motion). Codes have been constructed and operated (since 1974) which include various combinations of finite beta, general plasma cross-section and aspect, various topologies (Doublet, tearing, reversed-field mirror) including time dependent transitions in topology resulting from external coil variation and plasma transport, with models including (classical) tensor resistivity and heat flow as well as the adiabatic limiting case

  6. Basis of the tubesheet heat exchanger design rules used in the French pressure vessel code

    International Nuclear Information System (INIS)

    Osweiller, F.

    1990-01-01

    For about 40 years most tubesheet heat exchangers have been designed according to the standards of TEMA. Partly due to their simplicity, these rules do not assure a safe heat-exchangers design in all cases. This is the main reason why new tubesheet design rules were developed in 1981 in France for the French pressure vessel code CODAP. For fixed tubesheet heat exchangers the new rules account for the elastic rotational restraint of the shell and channel at the outer edge of the tubesheet. For floating-head and U- tube exchangers an approach was selected with some modifications. In both cases the tubesheet is replaced by an equivalent solid plate with adequate effective elastic constants, and the tube bundle is simulated by an elastic foundation. The elastic restraint at the edge of the tubesheet due the shell and channel is accounted for in different ways in the two types of heat exchangers. The purpose of the paper is to present the main basis of these rules and to compare them to TEMA rules

  7. Fatal anaphylaxis registries data support changes in the who anaphylaxis mortality coding rules.

    Science.gov (United States)

    Tanno, Luciana Kase; Simons, F Estelle R; Annesi-Maesano, Isabella; Calderon, Moises A; Aymé, Ségolène; Demoly, Pascal

    2017-01-13

    Anaphylaxis is defined as a severe life-threatening generalized or systemic hypersensitivity reaction. The difficulty of coding anaphylaxis fatalities under the World Health Organization (WHO) International Classification of Diseases (ICD) system is recognized as an important reason for under-notification of anaphylaxis deaths. On current death certificates, a limited number of ICD codes are valid as underlying causes of death, and death certificates do not include the word anaphylaxis per se. In this review, we provide evidences supporting the need for changes in WHO mortality coding rules and call for addition of anaphylaxis as an underlying cause of death on international death certificates. This publication will be included in support of a formal request to the WHO as a formal request for this move taking the 11 th ICD revision.

  8. A survey of the French creep-fatigue design rules for LMFBR

    International Nuclear Information System (INIS)

    Tribout, J.; Cordier, G.; Moulin, D.

    1987-01-01

    The paper provides a survey of the creep-fatigue design rules for the LMFBR in France. These rules are the ones currently implemented in French component manufacturing. The background of each item is discussed and the trends for improvements currently investigated are described. The creep-fatigue rules apply to elastic analysis only. (orig.)

  9. The sign rule and beyond: boundary effects, flexibility, and noise correlations in neural population codes.

    Directory of Open Access Journals (Sweden)

    Yu Hu

    2014-02-01

    Full Text Available Over repeat presentations of the same stimulus, sensory neurons show variable responses. This "noise" is typically correlated between pairs of cells, and a question with rich history in neuroscience is how these noise correlations impact the population's ability to encode the stimulus. Here, we consider a very general setting for population coding, investigating how information varies as a function of noise correlations, with all other aspects of the problem - neural tuning curves, etc. - held fixed. This work yields unifying insights into the role of noise correlations. These are summarized in the form of theorems, and illustrated with numerical examples involving neurons with diverse tuning curves. Our main contributions are as follows. (1 We generalize previous results to prove a sign rule (SR - if noise correlations between pairs of neurons have opposite signs vs. their signal correlations, then coding performance will improve compared to the independent case. This holds for three different metrics of coding performance, and for arbitrary tuning curves and levels of heterogeneity. This generality is true for our other results as well. (2 As also pointed out in the literature, the SR does not provide a necessary condition for good coding. We show that a diverse set of correlation structures can improve coding. Many of these violate the SR, as do experimentally observed correlations. There is structure to this diversity: we prove that the optimal correlation structures must lie on boundaries of the possible set of noise correlations. (3 We provide a novel set of necessary and sufficient conditions, under which the coding performance (in the presence of noise will be as good as it would be if there were no noise present at all.

  10. Do UK television alcohol advertisements abide by the code of broadcast advertising rules regarding the portrayal of alcohol?

    Science.gov (United States)

    Searle, Rebecca; Alston, Daisy; French, David P

    2014-01-01

    The aim of the study was to assess the extent to which members of the UK general public perceive television alcohol advertisements to comply with the regulatory code governing these: the Advertising Standards Authority Code of Broadcast Advertising (BCAP Code). The Code provides a general principle and 16 rules to prevent such adverts implying, condoning or encouraging immoderate, irresponsible or anti-social drinking. Quota sample of 373 adults, representative of the UK population aged 18-74 years in terms of age and gender, were recruited at a train station. Participants were shown one of seven advertisements that had been broadcast in the previous month on the two leading commercial television channels, and then completed a questionnaire with 40 statements representing the BCAP Code rules. Overall, 75% of the participants rated the advertisements as breaching at least one rule from the BCAP Code. Breaches were observed for all the seven advertisements, ranging from 49 to 91% non-compliant. Rules regarding alcohol being presented as contributing to popularity or confidence, and implying that alcohol is capable of changing mood, physical condition, behaviour, or as nourishment, were seen as being breached by over 50% of participants. A clear majority of the UK general public perceive alcohol advertisements to breach the BCAP Code, suggesting that the current regulatory system for UK television alcohol advertisements is inadequate. © The Author 2014. Medical Council on Alcohol and Oxford University Press. All rights reserved.

  11. Survey of billing and coding for counterstrain tender points.

    Science.gov (United States)

    Snider, Karen T; Johnson, Jane C

    2012-06-01

    The names of certain counterstrain tender points are incongruent with their physical locations because of an assumption that these points are reflective of dysfunction in neighboring body areas. Because the body area that is physically examined does not always match the body region in which somatic dysfunction is diagnosed for these tender points, it is not always clear which evaluation and management service codes should be used for billing physician services. To assess the attitudes of osteopathic physicians toward the billing and coding of incongruent counterstrain tender points. Physician members of the American Academy of Osteopathy who use counterstrain in clinical practice were surveyed regarding the body area that they would physically examine when assessing for incongruent tender points and, if tender points were present, the body regions to which they would assign somatic dysfunction for billing and coding purposes. Physician responses were categorized as indicating a structural approach (ie, reflective of anatomic location) or a functional approach (ie, reflective of dysfunction in neighboring body areas) to tender point examination and treatment. Associations between sex, specialty, and years in practice with the approach chosen were also examined. Of 175 physicians who responded to the survey, 156 met the study criteria. Respondents were primarily board-certified in neuromusculoskeletal medicine/osteopathic manipulative medicine (98 [63%]), special proficiency in osteopathic manipulative medicine (30 [19%]), or family practice/family practice and osteopathic manipulative treatment (94 [60%]). Ninety percent of physicians predominantly chose responses indicating a structural approach to the physical examination of tender points and 21% predominantly chose responses indicating a functional approach to somatic dysfunction diagnosis. There were inconsistencies among individual respondents regarding the type of approach chosen for a single tender point. For

  12. ANTINOMIES BETWEEN CIVIL CODE AND NEW CIVIL PROCEDURE CODE: ANALYSIS OF ARTICLE 221 OF THE CC/2002 AND ARTICLE 784 OF THE RULE 13.105/2015

    Directory of Open Access Journals (Sweden)

    Andrea Cristina Zanetti

    2016-06-01

    Full Text Available Article 221 of the Brazilian Civil Code defines the form of evidence to provethe obligations between contracting parties, asserting that just the existence of contract signed by the parties, which are in the free disposal of theirs property, it´s enough to be proven the obligatory relationship between them, independent the adjusted value of the obligation. As noted, the Brazilian Civil Code of 2002 no longer requires that the contracts need to be signed by two witnesses to attest their existence and binding force between the parties. However, Article 784, item III, of Rule n. 13.105/15 (new Civil Procedure Code which will come into force in March 2016, makes it clear that it will only be considered extrajudicial title of the executionaction the particular document signed by the debtor and two (2 witnesses, keeping the expression of Art.585, item II of the CPC/1973. In this sense, one can say that art. 784 of Rule No. 13.105/15 would be contradicting the terms of Art. 221 of the Civil Code/2002? After all,the new Civil Procedure Code requires the presence of two witnesses in private documents (contracts in general. We would be facing an antinomy? This academic paperanalyzesthese issues, contributing to the study of antinomy between the rules of Civil Code and the new Civil Procedure Code, without conclude all the questions related a potential antinomies between these two legislations. These are issues that need tobe carefullyreviewedby the jurist, in searches, for the future solutions.

  13. Ontario emissions trading code : emission reduction credit creation, recording and transfer rules, rules for renewable energy projects and conservation projects, and rules for the operation of the Ontario Emissions Trading Registry

    International Nuclear Information System (INIS)

    2001-12-01

    Emissions trading has been an integral part of Ontario's air quality strategy since December 31, 2001. Ontario has adopted the 'cap, credit and trade' type of emissions trading system, a hybrid that takes the best features of pure 'cap-and-trade' and 'baseline-and-credit' type systems. It covers nitric oxide and sulphur dioxide. The Ontario Emissions Trading Code supplements Ontario Regulation 397/01 and sets out rules for renewable energy projects and conservation projects for which applications for emission allowances can be made. This Code describes the rules for the creation and transfer of emission reduction credits (ERCs). It also explains the rules for the operation of the registry that has been established to provide information to the public about the emissions trading program and records decisions about credit creation and credit and allowance retirement. 3 tabs

  14. 25 CFR 18.301 - May a tribe create and adopt a single heir rule without adopting a tribal probate code?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false May a tribe create and adopt a single heir rule without adopting a tribal probate code? 18.301 Section 18.301 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR PROBATE TRIBAL PROBATE CODES Approval of Single Heir Rule § 18.301 May a tribe create and adopt a...

  15. A Survey of Progress in Coding Theory in the Soviet Union. Final Report.

    Science.gov (United States)

    Kautz, William H.; Levitt, Karl N.

    The results of a comprehensive technical survey of all published Soviet literature in coding theory and its applications--over 400 papers and books appearing before March 1967--are described in this report. Noteworthy Soviet contributions are discussed, including codes for the noiseless channel, codes that correct asymetric errors, decoding for…

  16. Mining Branching Rules from Past Survey Data with an Illustration Using a Geriatric Assessment Survey for Older Adults with Cancer

    Directory of Open Access Journals (Sweden)

    Daniel R. Jeske

    2016-05-01

    Full Text Available We construct a fast data mining algorithm that can be used to identify high-frequency response patterns in historical surveys. Identification of these patterns leads to the derivation of question branching rules that shorten the time required to complete a survey. The data mining algorithm allows the user to control the error rate that is incurred through the use of implied answers that go along with each branching rule. The context considered is binary response questions, which can be obtained from multi-level response questions through dichotomization. The algorithm is illustrated by the analysis of four sections of a geriatric assessment survey used by oncologists. Reductions in the number of questions that need to be asked in these four sections range from 33% to 54%.

  17. THE APPLICATION PROCESS OF HAMBURG RULES, GIVEN THE CONTEXT OF THE EMERGENCE AND ENTRY INTO FORCE OF THE NEW ROMANIAN CIVIL CODE

    Directory of Open Access Journals (Sweden)

    Adriana Elena Belu

    2013-11-01

    Full Text Available The paper aims to conduct a comparative analysis and tries to offer an objective point of view regarding a number of questions arisen in practice, related to the applicability of the 1978 Hamburg Rules and keeping public order of Romanian private international law, such as those that aim at: agreeing upon the applicability of the foreign law by the Romanian parties; applicability of the Hamburg Rules; public nuisance of the Romanian private international law; character of public policy rule of the Hamburg Rules. In the application process of the Hamburg Rules, given the context of the emergence and entry into force of the New Civil Code, obviously, the provisions of the Romanian Civil Code shall apply in addition, where the international convention lacks. Therefore, in order to apply the logic of the provisions of the Civil Code in full compliance with the international standards, though giving priority to the latter rules, a rigorous analysis is required, analysis which becomes more complex given the fact that, in accordance with Art. 230 of Law no. 71/2011 to implement Law no. 287/2009 on the Civil Code, Book II "About Maritime Trade and Sailing" of the Commercial Code, will be abolished upon the entry into force of the Maritime Code, as those provisions remain in force, being applied with priority to the rules of the Civil Code.

  18. Survey of computer codes applicable to waste facility performance evaluations

    International Nuclear Information System (INIS)

    Alsharif, M.; Pung, D.L.; Rivera, A.L.; Dole, L.R.

    1988-01-01

    This study is an effort to review existing information that is useful to develop an integrated model for predicting the performance of a radioactive waste facility. A summary description of 162 computer codes is given. The identified computer programs address the performance of waste packages, waste transport and equilibrium geochemistry, hydrological processes in unsaturated and saturated zones, and general waste facility performance assessment. Some programs also deal with thermal analysis, structural analysis, and special purposes. A number of these computer programs are being used by the US Department of Energy, the US Nuclear Regulatory Commission, and their contractors to analyze various aspects of waste package performance. Fifty-five of these codes were identified as being potentially useful on the analysis of low-level radioactive waste facilities located above the water table. The code summaries include authors, identification data, model types, and pertinent references. 14 refs., 5 tabs

  19. Analysis of Quality of Proxy Questions in Health Surveys by Behavior Coding

    NARCIS (Netherlands)

    Benitez, I.; Padilla, J.L.; Ongena, Yfke

    2012-01-01

    The aim of this study is to show how to analyze the quality of questions for proxy informants by means of behavior coding. Proxy questions can undermine survey data quality because of the fact that proxies respond to questions on behalf of other people. Behavior coding can improve questions by

  20. Fatal injection: a survey of modern code injection attack countermeasures

    Directory of Open Access Journals (Sweden)

    Dimitris Mitropoulos

    2017-11-01

    Full Text Available With a code injection attack (CIA an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of the application and the location of the programming flaw that leads to the attack. Currently, CIAs are considered one of the most damaging classes of application attacks since they can severely affect an organisation’s infrastructure and cause financial and reputational damage to it. In this paper we examine and categorize the countermeasures developed to detect the various attack forms. In particular, we identify two distinct categories. The first incorporates static program analysis tools used to eliminate flaws that can lead to such attacks during the development of the system. The second involves the use of dynamic detection safeguards that prevent code injection attacks while the system is in production mode. Our analysis is based on nonfunctional characteristics that are considered critical when creating security mechanisms. Such characteristics involve usability, overhead, implementation dependencies, false positives and false negatives. Our categorization and analysis can help both researchers and practitioners either to develop novel approaches, or use the appropriate mechanisms according to their needs.

  1. The rule on granting subsidies for survey of hot drainage influences

    International Nuclear Information System (INIS)

    1977-01-01

    The rule is based on the prescriptions of the Law Concerning Proper Budget Enforcement on Subsidies and its Enforcement Order. These rules apply to the granting subsidies provided for by the Enforcement Order for the Special Account Law for Measures Promoting Power Source Development. Terms are defined, such as nuclear power generating facilities; arrangement work for equipments for surveying hot drainage influences; work of preliminary survey of hot drainage; work of surveying hot drainage influences; establishments, etc. The Minister of International Trade and Industry delivers the subsidies for all or a part of the expenses necessary for arrangement work of equipments for surveying hot drainage influences, work of preliminary survey of hot drainage and work of surveying hot drainage influences to the prefectures where nuclear power generating facilities have been or are to be set up, or their neighboring prefectures. Terms of delivery concerning an establishment vary from two years to four years according to the kinds of such subsidies. Limits of the subsidies concerning an establishment range from 10 million yen to 2.5 million yen. The applicant prefecture files the application to the Minister of International Trade and Industry. The Minister examines such applications, and notifies his decision to the applicants. Conditions on delivery, reports submitted by receivers of the subsidies and other matters related are specified. (Okada, K.)

  2. Establishment of a New Drug Code for Marihuana Extract. Final rule.

    Science.gov (United States)

    2016-12-14

    The Drug Enforcement Administration is creating a new Administration Controlled Substances Code Number for "Marihuana Extract." This code number will allow DEA and DEA-registered entities to track quantities of this material separately from quantities of marihuana. This, in turn, will aid in complying with relevant treaty provisions. Under international drug control treaties administered by the United Nations, some differences exist between the regulatory controls pertaining to marihuana extract versus those for marihuana and tetrahydrocannabinols. The DEA has previously established separate code numbers for marihuana and for tetrahydrocannabinols, but not for marihuana extract. To better track these materials and comply with treaty provisions, DEA is creating a separate code number for marihuana extract with the following definition: "Meaning an extract containing one or more cannabinoids that has been derived from any plant of the genus Cannabis, other than the separated resin (whether crude or purified) obtained from the plant." Extracts of marihuana will continue to be treated as Schedule I controlled substances.

  3. Using Association Rules to Study the Co-evolution of Production & Test Code

    NARCIS (Netherlands)

    Lubsen, Z.; Zaidman, A.; Pinzger, M.

    2009-01-01

    Paper accepted for publication in the proceedings of the 6th International Working Conference on Mining Software Repositories (MSR 2009). Unit tests are generally acknowledged as an important aid to produce high quality code, as they provide quick feedback to developers on the correctness of their

  4. Studying Co-evolution of Production and Test Code Using Association Rule Mining

    NARCIS (Netherlands)

    Lubsen, Z.; Zaidman, A.; Pinzger, M.

    2009-01-01

    Long version of the short paper accepted for publication in the proceedings of the 6th International Working Conference on Mining Software Repositories (MSR 2009). Unit tests are generally acknowledged as an important aid to produce high quality code, as they provide quick feedback to developers on

  5. Change to CERN Safety Rules: Abolition of Safety Code A7

    CERN Multimedia

    2016-01-01

    As from 3 June 2016 Safety Code A7 “Road traffic at CERN” is abolished.   CERN's current practice to follow French or Swiss road traffic regulations on the corresponding parts of the CERN site will continue to apply. HSE Unit

  6. Illegitimate Tax Avoidance and Rule XVI of Preliminary Title of Tax Code

    OpenAIRE

    Tarsitano, Alberto

    2014-01-01

    The author analyzes a very important issue such as illegitimate tax avoidance. He begins by explaining the content of the concept of illegitimate tax avoidance, and also he points out the differences with other concepts like tax evasion and tax planning. Then, he comments the debate on the use of legal figures which doesn’t belong to Tax Law, in order to solve issue of illegitimate tax avoidance. Finally, he explains the scope and the application of the Peruvian general anti-avoidance rule st...

  7. FUNDAMENTAL RULES OF THE CIVIL PROCEDURE CODE OF 2015: BRIEF REFLECTIONS

    Directory of Open Access Journals (Sweden)

    Aluisio Gonçalves de Castro Mendes

    2016-12-01

    Full Text Available This paper aims to bring some brief reflections on the topics covered in Book I of the General Part in the Code of Civil Procedure of 2015, in each of the twelve articles related to the basic standards, highlighting its relevance to the application and the proper interpretation of new legislation. The intention is not to exhaust the subject, but just to open the debate to bring a few lines to improve the theoretical understanding and improving the judicial services.

  8. Results of a survey on accident and safety analysis codes, benchmarks, verification and validation methods

    International Nuclear Information System (INIS)

    Lee, A.G.; Wilkin, G.B.

    1995-01-01

    This report is a compilation of the information submitted by AECL, CIAE, JAERI, ORNL and Siemens in response to a need identified at the 'Workshop on R and D Needs' at the IGORR-3 meeting. The survey compiled information on the national standards applied to the Safety Quality Assurance (SQA) programs undertaken by the participants. Information was assembled for the computer codes and nuclear data libraries used in accident and safety analyses for research reactors and the methods used to verify and validate the codes and libraries. Although the survey was not comprehensive, it provides a basis for exchanging information of common interest to the research reactor community

  9. Synaptic learning rules and sparse coding in a model sensory system.

    Directory of Open Access Journals (Sweden)

    Luca A Finelli

    2008-04-01

    Full Text Available Neural circuits exploit numerous strategies for encoding information. Although the functional significance of individual coding mechanisms has been investigated, ways in which multiple mechanisms interact and integrate are not well understood. The locust olfactory system, in which dense, transiently synchronized spike trains across ensembles of antenna lobe (AL neurons are transformed into a sparse representation in the mushroom body (MB; a region associated with memory, provides a well-studied preparation for investigating the interaction of multiple coding mechanisms. Recordings made in vivo from the insect MB demonstrated highly specific responses to odors in Kenyon cells (KCs. Typically, only a few KCs from the recorded population of neurons responded reliably when a specific odor was presented. Different odors induced responses in different KCs. Here, we explored with a biologically plausible model the possibility that a form of plasticity may control and tune synaptic weights of inputs to the mushroom body to ensure the specificity of KCs' responses to familiar or meaningful odors. We found that plasticity at the synapses between the AL and the MB efficiently regulated the delicate tuning necessary to selectively filter the intense AL oscillatory output and condense it to a sparse representation in the MB. Activity-dependent plasticity drove the observed specificity, reliability, and expected persistence of odor representations, suggesting a role for plasticity in information processing and making a testable prediction about synaptic plasticity at AL-MB synapses.

  10. Effect of change in coding rules on recording diabetes in hospital administrative datasets.

    Science.gov (United States)

    Assareh, Hassan; Achat, Helen M; Guevarra, Veth M; Stubbs, Joanne M

    2016-10-01

    During 2008-2011 Australian Coding Standards mandated a causal relationship between diabetes and inpatient care as a criterion for recording diabetes as a comorbidity in hospital administrative datasets. We aim to measure the effect of the causality mandate on recorded diabetes and associated inter-hospital variations. For patients with diabetes, all admissions between 2004 and 2013 to all New South Wales acute public hospitals were investigated. Poisson mixed models were employed to derive adjusted rates and variations. The non-recorded diabetes incidence rate was 20.7%. The causality mandate increased the incidence rate four fold during the change period, 2008-2011, compared to the pre- or post-change periods (32.5% vs 8.4% and 6.9%). The inter-hospital variation was also higher, with twice the difference in the non-recorded rate between hospitals with the highest and lowest rates (50% vs 24% and 27% risk gap). The variation decreased during the change period (29%), while the rate continued to rise (53%). Admission characteristics accounted for over 44% of the variation compared with at most two per cent attributable to patient or hospital characteristics. Contributing characteristics explained less of the variation within the change period compared to pre- or post-change (46% vs 58% and 53%). Hospital relative performance was not constant over time. The causality mandate substantially increased the non-recorded diabetes rate and associated inter-hospital variation. Longitudinal accumulation of clinical information at the patient level, and the development of appropriate adoption protocols to achieve comprehensive and timely implementation of coding changes are essential to supporting the integrity of hospital administrative datasets. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  11. Reliable and adequateengineering surveys for construction: the rule of two D

    Directory of Open Access Journals (Sweden)

    Rakitina Natal'ya Nikolaevna

    2014-01-01

    Full Text Available In the article the current state of quality supply of engineering surveys for construction is discussed. The main criteria for improving the design quality of buildings and structures for industrial, civil and other purposes is the reliability and adequacy of the results of engineering-geological surveys. The authors show the examples of inadequate study of engineering-geological conditions in the design of structures that led to emergency situations. Consideration of the reasons of accidents in structures showed that they are caused by lack of research conducted, the underestimation of the complexity of geological conditions. In the process of conducting geotechnical investigations the works were focused directly in the enclosure of a designed building, and the features of geological and hydrogeological conditions of the off-site were much more complex. In the process of construction during the sinking of the pit activation suffusion processes occurred, which led to an accident. Underestimation of the use of these geological funds in this example shows that even in the presence of fund materials, which are currently almost not increased, errors may occur due to the notorious savings for research. The requirements to ensuring the reliability and adequacy of engineering-geological surveys, which the authors call "The Rule of two D" (in Russian — Reliability and Adequacy, lie in the existing legal acts. The practice of fulfilling requirements to a large extend shows that the desire to save money at the stage of design and exploration works results in additional costs for additional design, recovery from accidents and works on a new project. The authors critically evaluated the development of engineering and geotechnical engineering instead of geological survey, which is not methodologically and theoretically substantiated and leads to the excluding from engineering surveys the consideration of the off-site geotechnical conditions directly below

  12. Emergency medicine summary code for reporting CT scan results: implementation and survey results.

    Science.gov (United States)

    Lam, Joanne; Coughlin, Ryan; Buhl, Luce; Herbst, Meghan; Herbst, Timothy; Martillotti, Jared; Coughlin, Bret

    2018-06-01

    The purpose of the study was to assess the emergency department (ED) providers' interest and satisfaction with ED CT result reporting before and after the implementation of a standardized summary code for all CT scan reporting. A summary code was provided at the end of all CTs ordered through the ED from August to October of 2016. A retrospective review was completed on all studies performed during this period. A pre- and post-survey was given to both ED and radiology providers. A total of 3980 CT scans excluding CTAs were ordered with 2240 CTs dedicated to the head and neck, 1685 CTs dedicated to the torso, and 55 CTs dedicated to the extremities. Approximately 74% CT scans were contrast enhanced. Of the 3980 ED CT examination ordered, 69% had a summary code assigned to it. Fifteen percent of the coded CTs had a critical or diagnostic positive result. The introduction of an ED CT summary code did not show a definitive improvement in communication. However, the ED providers are in consensus that radiology reports are crucial their patients' management. There is slightly increased satisfaction with the providers with less than 5 years of experience with the ED CT codes compared to more seasoned providers. The implementation of a user-friendly summary code may allow better analysis of results, practice improvement, and quality measurements in the future.

  13. Results of a survey on accident and safety analysis codes, benchmarks, verification and validation methods

    International Nuclear Information System (INIS)

    Lee, A.G.; Wilkin, G.B.

    1996-03-01

    During the 'Workshop on R and D needs' at the 3rd Meeting of the International Group on Research Reactors (IGORR-III), the participants agreed that it would be useful to compile a survey of the computer codes and nuclear data libraries used in accident and safety analyses for research reactors and the methods various organizations use to verify and validate their codes and libraries. Five organizations, Atomic Energy of Canada Limited (AECL, Canada), China Institute of Atomic Energy (CIAE, People's Republic of China), Japan Atomic Energy Research Institute (JAERI, Japan), Oak Ridge National Laboratories (ORNL, USA), and Siemens (Germany) responded to the survey. The results of the survey are compiled in this report. (author) 36 refs., 3 tabs

  14. Proposal to modify Rule 10a and to delete Recommendation 10a(3) from the International Code of Nomenclature of Prokaryotes.

    Science.gov (United States)

    Oren, Aharon

    2017-09-01

    Principle 2 of the Prokaryotic Code, as modified by the ICSP in 1999, reads: 'The nomenclature of prokaryotes is not independent of botanical and zoological nomenclature. When naming new taxa in the rank of genus or higher, due consideration is to be given to avoiding names which are regulated by the International Code of Zoological Nomenclature and the International Code of Nomenclature for algae, fungi and plants'. But in the current version of the Prokaryotic Code no Rule implements this version of Principle 2. I therefore propose adding the following sentence to Rule 10a: 'As from January 2001, newly proposed generic names must not be later homonyms of names in use in botany or zoology'. Recommendation 10a(3) of the Code states: 'Avoid introducing into bacteriology as generic names such names as are in use in botany or zoology, in particular well-known names'. This Recommendation contravenes the current version of Principle 2 and the proposed new version of Rule 10a. Therefore I propose to delete Recommendation 10a(3) from the Prokaryotic Code.

  15. Interviewer and respondent interaction in survey interviews : Empirical evidence from behavior coding studies and question wording experiments

    NARCIS (Netherlands)

    Ongena, Yfke

    2010-01-01

    This book sheds light on verbal interaction problems in survey interviews. It is shown how behavior coding, i.e., coding the utterances of interviewer and respondent while they are answering survey questions, can be used to detect interactional problems. Several empirical studies using behavior

  16. Improving Inpatient Surveys: Web-Based Computer Adaptive Testing Accessed via Mobile Phone QR Codes.

    Science.gov (United States)

    Chien, Tsair-Wei; Lin, Weir-Sen

    2016-03-02

    The National Health Service (NHS) 70-item inpatient questionnaire surveys inpatients on their perceptions of their hospitalization experience. However, it imposes more burden on the patient than other similar surveys. The literature shows that computerized adaptive testing (CAT) based on item response theory can help shorten the item length of a questionnaire without compromising its precision. Our aim was to investigate whether CAT can be (1) efficient with item reduction and (2) used with quick response (QR) codes scanned by mobile phones. After downloading the 2008 inpatient survey data from the Picker Institute Europe website and analyzing the difficulties of this 70-item questionnaire, we used an author-made Excel program using the Rasch partial credit model to simulate 1000 patients' true scores followed by a standard normal distribution. The CAT was compared to two other scenarios of answering all items (AAI) and the randomized selection method (RSM), as we investigated item length (efficiency) and measurement accuracy. The author-made Web-based CAT program for gathering patient feedback was effectively accessed from mobile phones by scanning the QR code. We found that the CAT can be more efficient for patients answering questions (ie, fewer items to respond to) than either AAI or RSM without compromising its measurement accuracy. A Web-based CAT inpatient survey accessed by scanning a QR code on a mobile phone was viable for gathering inpatient satisfaction responses. With advances in technology, patients can now be offered alternatives for providing feedback about hospitalization satisfaction. This Web-based CAT is a possible option in health care settings for reducing the number of survey items, as well as offering an innovative QR code access.

  17. Survey of source code metrics for evaluating testability of object oriented systems

    OpenAIRE

    Shaheen , Muhammad Rabee; Du Bousquet , Lydie

    2010-01-01

    Software testing is costly in terms of time and funds. Testability is a software characteristic that aims at producing systems easy to test. Several metrics have been proposed to identify the testability weaknesses. But it is sometimes difficult to be convinced that those metrics are really related with testability. This article is a critical survey of the source-code based metrics proposed in the literature for object-oriented software testability. It underlines the necessity to provide test...

  18. PREMOR: a point reactor exposure model computer code for survey analysis of power plant performance

    International Nuclear Information System (INIS)

    Vondy, D.R.

    1979-10-01

    The PREMOR computer code was written to exploit a simple, two-group point nuclear reactor power plant model for survey analysis. Up to thirteen actinides, fourteen fission products, and one lumped absorber nuclide density are followed over a reactor history. Successive feed batches are accounted for with provision for from one to twenty batches resident. The effect of exposure of each of the batches to the same neutron flux is determined

  19. PREMOR: a point reactor exposure model computer code for survey analysis of power plant performance

    Energy Technology Data Exchange (ETDEWEB)

    Vondy, D.R.

    1979-10-01

    The PREMOR computer code was written to exploit a simple, two-group point nuclear reactor power plant model for survey analysis. Up to thirteen actinides, fourteen fission products, and one lumped absorber nuclide density are followed over a reactor history. Successive feed batches are accounted for with provision for from one to twenty batches resident. The effect of exposure of each of the batches to the same neutron flux is determined.

  20. A study of the responses of neutron dose equivalent survey meters with computer codes

    International Nuclear Information System (INIS)

    Sartori, D.E.; Beer, G.P. de

    1983-01-01

    The ANISN and DOT discrete-ordinates radiation transport codes for one and two dimensions have been proved as effective and simple techniques to study the response of dose equivalent neutron detectors. Comparisons between results of an experimental calibration of the Harwell 95/0075 survey meter and calculated results rendered satisfactory agreement, considering the different techniques and sources of error involved. Possible improvements in the methods and designs and causes of error are discussed. (author)

  1. Joint Source-Channel Decoding of Variable-Length Codes with Soft Information: A Survey

    Directory of Open Access Journals (Sweden)

    Pierre Siohan

    2005-05-01

    Full Text Available Multimedia transmission over time-varying wireless channels presents a number of challenges beyond existing capabilities conceived so far for third-generation networks. Efficient quality-of-service (QoS provisioning for multimedia on these channels may in particular require a loosening and a rethinking of the layer separation principle. In that context, joint source-channel decoding (JSCD strategies have gained attention as viable alternatives to separate decoding of source and channel codes. A statistical framework based on hidden Markov models (HMM capturing dependencies between the source and channel coding components sets the foundation for optimal design of techniques of joint decoding of source and channel codes. The problem has been largely addressed in the research community, by considering both fixed-length codes (FLC and variable-length source codes (VLC widely used in compression standards. Joint source-channel decoding of VLC raises specific difficulties due to the fact that the segmentation of the received bitstream into source symbols is random. This paper makes a survey of recent theoretical and practical advances in the area of JSCD with soft information of VLC-encoded sources. It first describes the main paths followed for designing efficient estimators for VLC-encoded sources, the key component of the JSCD iterative structure. It then presents the main issues involved in the application of the turbo principle to JSCD of VLC-encoded sources as well as the main approaches to source-controlled channel decoding. This survey terminates by performance illustrations with real image and video decoding systems.

  2. Joint Source-Channel Decoding of Variable-Length Codes with Soft Information: A Survey

    Science.gov (United States)

    Guillemot, Christine; Siohan, Pierre

    2005-12-01

    Multimedia transmission over time-varying wireless channels presents a number of challenges beyond existing capabilities conceived so far for third-generation networks. Efficient quality-of-service (QoS) provisioning for multimedia on these channels may in particular require a loosening and a rethinking of the layer separation principle. In that context, joint source-channel decoding (JSCD) strategies have gained attention as viable alternatives to separate decoding of source and channel codes. A statistical framework based on hidden Markov models (HMM) capturing dependencies between the source and channel coding components sets the foundation for optimal design of techniques of joint decoding of source and channel codes. The problem has been largely addressed in the research community, by considering both fixed-length codes (FLC) and variable-length source codes (VLC) widely used in compression standards. Joint source-channel decoding of VLC raises specific difficulties due to the fact that the segmentation of the received bitstream into source symbols is random. This paper makes a survey of recent theoretical and practical advances in the area of JSCD with soft information of VLC-encoded sources. It first describes the main paths followed for designing efficient estimators for VLC-encoded sources, the key component of the JSCD iterative structure. It then presents the main issues involved in the application of the turbo principle to JSCD of VLC-encoded sources as well as the main approaches to source-controlled channel decoding. This survey terminates by performance illustrations with real image and video decoding systems.

  3. Predictions of the spontaneous symmetry-breaking theory for visual code completeness and spatial scaling in single-cell learning rules.

    Science.gov (United States)

    Webber, C J

    2001-05-01

    This article shows analytically that single-cell learning rules that give rise to oriented and localized receptive fields, when their synaptic weights are randomly and independently initialized according to a plausible assumption of zero prior information, will generate visual codes that are invariant under two-dimensional translations, rotations, and scale magnifications, provided that the statistics of their training images are sufficiently invariant under these transformations. Such codes span different image locations, orientations, and size scales with equal economy. Thus, single-cell rules could account for the spatial scaling property of the cortical simple-cell code. This prediction is tested computationally by training with natural scenes; it is demonstrated that a single-cell learning rule can give rise to simple-cell receptive fields spanning the full range of orientations, image locations, and spatial frequencies (except at the extreme high and low frequencies at which the scale invariance of the statistics of digitally sampled images must ultimately break down, because of the image boundary and the finite pixel resolution). Thus, no constraint on completeness, or any other coupling between cells, is necessary to induce the visual code to span wide ranges of locations, orientations, and size scales. This prediction is made using the theory of spontaneous symmetry breaking, which we have previously shown can also explain the data-driven self-organization of a wide variety of transformation invariances in neurons' responses, such as the translation invariance of complex cell response.

  4. Surveying multidisciplinary aspects in real-time distributed coding for Wireless Sensor Networks.

    Science.gov (United States)

    Braccini, Carlo; Davoli, Franco; Marchese, Mario; Mongelli, Maurizio

    2015-01-27

    Wireless Sensor Networks (WSNs), where a multiplicity of sensors observe a physical phenomenon and transmit their measurements to one or more sinks, pertain to the class of multi-terminal source and channel coding problems of Information Theory. In this category, "real-time" coding is often encountered for WSNs, referring to the problem of finding the minimum distortion (according to a given measure), under transmission power constraints, attainable by encoding and decoding functions, with stringent limits on delay and complexity. On the other hand, the Decision Theory approach seeks to determine the optimal coding/decoding strategies or some of their structural properties. Since encoder(s) and decoder(s) possess different information, though sharing a common goal, the setting here is that of Team Decision Theory. A more pragmatic vision rooted in Signal Processing consists of fixing the form of the coding strategies (e.g., to linear functions) and, consequently, finding the corresponding optimal decoding strategies and the achievable distortion, generally by applying parametric optimization techniques. All approaches have a long history of past investigations and recent results. The goal of the present paper is to provide the taxonomy of the various formulations, a survey of the vast related literature, examples from the authors' own research, and some highlights on the inter-play of the different theories.

  5. Surveying Multidisciplinary Aspects in Real-Time Distributed Coding for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Carlo Braccini

    2015-01-01

    Full Text Available Wireless Sensor Networks (WSNs, where a multiplicity of sensors observe a physical phenomenon and transmit their measurements to one or more sinks, pertain to the class of multi-terminal source and channel coding problems of Information Theory. In this category, “real-time” coding is often encountered for WSNs, referring to the problem of finding the minimum distortion (according to a given measure, under transmission power constraints, attainable by encoding and decoding functions, with stringent limits on delay and complexity. On the other hand, the Decision Theory approach seeks to determine the optimal coding/decoding strategies or some of their structural properties. Since encoder(s and decoder(s possess different information, though sharing a common goal, the setting here is that of Team Decision Theory. A more pragmatic vision rooted in Signal Processing consists of fixing the form of the coding strategies (e.g., to linear functions and, consequently, finding the corresponding optimal decoding strategies and the achievable distortion, generally by applying parametric optimization techniques. All approaches have a long history of past investigations and recent results. The goal of the present paper is to provide the taxonomy of the various formulations, a survey of the vast related literature, examples from the authors’ own research, and some highlights on the inter-play of the different theories.

  6. Main hearing according to the new Serbian Criminal Procedure Code: Survey in practice

    Directory of Open Access Journals (Sweden)

    Soković Snežana

    2017-01-01

    Full Text Available The main hearing is the central part of the criminal procedure. In Serbia, the reform of the national criminal procedure legislation has brought about numerous changes related to this stage of criminal proceedings. Numerous objections have been addressed to the almost entirely new legal text. In an attempt to examine the advantages and disadvantages of the new legislation and observe how the prescribed rules are applied in practice, the authors have conducted an empirical research by attending 205 main hearings which were conducted under the rules of the new Criminal Procedure Code. The research covers a huge number of related issues but, given the page limit, this paper will focus on individual issues observed in trial proceedings. The focal point of reference is the examination of witness, but the authors also consider a number of other issues: the examination of expert witness, the delay of the trial, and the use of a video-link as a novelty introduced owing to the technological achievements of the modern era. The article is organized into several parts. The authors first provide a theoretical background of the issue under consideration and, then, present and discuss the research results provided in tables. In the third part of the article, the authors draw specific conclusions about the current practice in trials proceedings.

  7. Does health promotion need a Code of Ethics? Results from an IUHPE mixed method survey.

    Science.gov (United States)

    Bull, Torill; Riggs, Elisha; Nchogu, Sussy N

    2012-09-01

    Health promotion is an ethically challenging field involving constant reflection of values across multiple cultures of what is regarded as good and bad health promotion practice. While many disciplines are guided by a Code of Ethics (CoE) no such guide is available to health promoters. The International Union for Health Promotion and Education (IUHPE) has been nominated as a suitable candidate for developing such a code. It is within this context that the IUHPE Student and Early Career Network (ISECN), through its Ethics Working Group, has taken up the challenge of preparing the foundations for a CoE for health promotion. An online survey comprising open and closed-answer questions was used to gather the opinions of IUHPE members regarding the need for a CoE for health promotion. The quantitative data were calculated with descriptive analyses. A thematic analysis approach was used to analyze and interpret the qualitative data. IUHPE members (n = 236) from all global regions responded to the survey. The majority (52%) of the respondents had 11 years' experience or more in the field of health promotion. Ethical dilemmas were commonly encountered. The need for a CoE for health promotion was expressed by 83% of respondents. Respondents also offered their views of possibilities, ideas and challenges regarding the development of a CoE for health promotion. Considering that health promoters encounter ethical dilemmas frequently in their practice, this study reinforces the need to develop a CoE for the field. The recommendations from the survey provide a good basis for future work to develop such a code.

  8. Relative validity of the pre-coded food diary used in the Danish National Survey of Diet and Physical Activity

    DEFF Research Database (Denmark)

    Knudsen, Vibeke Kildegaard; Gille, Maj-Britt; Nielsen, Trine Holmgaard

    2011-01-01

    Objective: To determine the relative validity of the pre-coded food diary applied in the Danish National Survey of Dietary Habits and Physical Activity. Design: A cross-over study among seventy-two adults (aged 20 to 69 years) recording diet by means of a pre-coded food diary over 4 d and a 4 d...

  9. 15 CFR 806.16 - Rules and regulations for BE-10, Benchmark Survey of U.S. Direct Investment Abroad-2004.

    Science.gov (United States)

    2010-01-01

    ..., Benchmark Survey of U.S. Direct Investment Abroad-2004. 806.16 Section 806.16 Commerce and Foreign Trade... COMMERCE DIRECT INVESTMENT SURVEYS § 806.16 Rules and regulations for BE-10, Benchmark Survey of U.S. Direct Investment Abroad—2004. A BE-10, Benchmark Survey of U.S. Direct Investment Abroad will be...

  10. The anticipated costs analysis and benefit items survey against performing the maintenance rule

    International Nuclear Information System (INIS)

    Hwang, M. J.; Kim, K. Y.; Yang, Z. A.

    2002-01-01

    In this paper, we surveyed the cost and benefit items and evaluated the costs against performing the Maintenance Rule. In the past, only one electric power company had provided the electricity without free competition in Korea. In these days, however, the electric power company was divided into two parts by the sources: atomic and hydraulic generation and thermal-power generation. Therefore, the generation sources that done have competitiveness at the price will be weeded out in the electric power market. Although the preferential goal is on the safe operation at the Nuclear power Plants (NPPs), if too much money is required to maintain or improve the safety of the NPP, the licensee could hesitate to adopt the program related to the safety even though it is a good one. Since the Risk-Informed Applications (RIA) have been using for a plant operation in recent, the condition of a plant might be changed. Therefore, considering the affects of the RIA, a method to keep the capability through the monitoring the maintenance effectiveness has been proposed. However, to perform this, a number of works, continuous collecting data and monitoring the maintenance effectiveness and understanding the reason of degrading capability, should be preceded. Therefore, a lot of man-hour is needed to develop and to manage the application method, and the licensee should pay the costs. Therefore, in the domestic circumstance, it is necessary to evaluate the cost to monitor the maintenance effectiveness. Hence, we are going to examine the cost to perform the MR and its anticipated benefit lists

  11. Structural dynamics in LMFBR containment analysis. A brief survey of computational methods and codes

    International Nuclear Information System (INIS)

    Chang, Y.W.

    1977-01-01

    This paper gives a brief survey of the computational methods and codes available for LMFBR containment analysis. The various numerical methods commonly used in the computer codes are compared. It provides the reactor engineers to up-to-date information on the development of structural dynamics in LMFBR containment analysis. It can also be used as a basis for the selection of the numerical method in the future code development. First, the commonly used finite-difference expressions in the Lagrangian codes will be compared. Sample calculations will be used as a basis for discussing and comparing the accuracy of the various finite-difference representations. The distortion of the meshes will also be compared; the techniques used for eliminating the numerical instabilities will be discussed and compared using examples. Next, the numerical methods used in the Eulerian formulation will be compared, first among themselves and then with the Lagrangian formulations. Special emphasis is placed on the effect of mass diffusion of the Eulerian calculation on the propagation of discontinuities. Implicit and explicit numerical integrations will be discussed and results obtained from these two techniques will be compared. Then, the finite-element methods are compared with the finite-difference methods. The advantages and disadvantages of the two methods will be discussed in detail, together with the versatility and ease of application of the method to containment analysis having complex geometries. It will also be shown that the finite-element equations for a constant-pressure fluid element is identical to the finite-difference equations using contour integrations. Finally, conclusions based on this study will be given

  12. MIG version 0.0 model interface guidelines: Rules to accelerate installation of numerical models into any compliant parent code

    Energy Technology Data Exchange (ETDEWEB)

    Brannon, R.M.; Wong, M.K.

    1996-08-01

    A set of model interface guidelines, called MIG, is presented as a means by which any compliant numerical material model can be rapidly installed into any parent code without having to modify the model subroutines. Here, {open_quotes}model{close_quotes} usually means a material model such as one that computes stress as a function of strain, though the term may be extended to any numerical operation. {open_quotes}Parent code{close_quotes} means a hydrocode, finite element code, etc. which uses the model and enforces, say, the fundamental laws of motion and thermodynamics. MIG requires the model developer (who creates the model package) to specify model needs in a standardized but flexible way. MIG includes a dictionary of technical terms that allows developers and parent code architects to share a common vocabulary when specifying field variables. For portability, database management is the responsibility of the parent code. Input/output occurs via structured calling arguments. As much model information as possible (such as the lists of required inputs, as well as lists of precharacterized material data and special needs) is supplied by the model developer in an ASCII text file. Every MIG-compliant model also has three required subroutines to check data, to request extra field variables, and to perform model physics. To date, the MIG scheme has proven flexible in beta installations of a simple yield model, plus a more complicated viscodamage yield model, three electromechanical models, and a complicated anisotropic microcrack constitutive model. The MIG yield model has been successfully installed using identical subroutines in three vectorized parent codes and one parallel C++ code, all predicting comparable results. By maintaining one model for many codes, MIG facilitates code-to-code comparisons and reduces duplication of effort, thereby reducing the cost of installing and sharing models in diverse new codes.

  13. Correlations of indoor second-hand smoking, household smoking rules, regional deprivation and children mental health: Scottish Health Survey, 2013.

    Science.gov (United States)

    Shiue, Ivy

    2015-07-01

    It has been known that second-hand smoking and deprivation could cluster together affecting child health. However, little is known on the role of household smoking rules. Therefore, it was aimed to study the relationships among indoor second-hand smoking, household smoking rules, deprivation level and children mental health in a country-wide and population-based setting. Data was retrieved from and analysed in Scottish Health Survey, 2013. Information on demographics, indoor second-hand smoking status, household smoking rules, deprivation level and child mental health by Strengths and Difficulties Questionnaire was obtained by household interview through parents. Statistical analysis included chi-square test and survey-weighted logistic regression modelling. Of 1019 children aged 4-12, 17.9% (n = 182) lived in the 15% most deprivation areas. Deprived areas tended to be where indoor smoking occurred (p Scottish children are greater Glasgow, Ayrshire & Arran and Forth Valley while the top three sub-regions of exposure to the indoor second-hand smoking are Fife, Forth Valley and Ayrshire & Arran. The top three sub-regions with indoor smoking allowed are greater Glasgow, Western Isles and Borders. Children emotional and behavioural problems were reduced when the strict household smoking rules (not allowed or outdoor areas) applied. One in six Scottish children lived in the 15% most deprivation areas and exposed to indoor second-hand smoking that could have led to emotional and behavioural problems. Public health programs promoting strict household smoking rules should be encouraged in order to optimise children mental health.

  14. Code of Conduct for Gas Marketers : rule made under part 3 of the Ontario Energy Board Act, 1998

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-02

    Text of the code of conduct for gas marketers in Ontario is presented. This code sets the minimum standards under which a gas marketer may sell or offer to sell gas to a low-volume consumer, or act as an agent or broker with respect to the sale of gas. The document describes the standards and principles regarding: (1) fair marketing practices, (2) identification, (3) information to be maintained by a gas marketer, (4) confidentiality of consumer information, (5) conditions in offers, (6) contracts, (7) contract renewals, (8) assignment, sale and transfer contracts, (9) independent arms-length consumer complaints resolution process, and (10) penalties for breach of this code.

  15. Code of Conduct for Gas Marketers : rule made under part 3 of the Ontario Energy Board Act, 1998

    International Nuclear Information System (INIS)

    1999-01-01

    Text of the code of conduct for gas marketers in Ontario is presented. This code sets the minimum standards under which a gas marketer may sell or offer to sell gas to a low-volume consumer, or act as an agent or broker with respect to the sale of gas. The document describes the standards and principles regarding: (1) fair marketing practices, (2) identification, (3) information to be maintained by a gas marketer, (4) confidentiality of consumer information, (5) conditions in offers, (6) contracts, (7) contract renewals, (8) assignment, sale and transfer contracts, (9) independent arms-length consumer complaints resolution process, and (10) penalties for breach of this code

  16. General rule antielisive chartered the National Tax Code confrontation between the principle of ability to pay and the rule of closed typicality and the alleged tax by analogy

    Directory of Open Access Journals (Sweden)

    Willian Robert Nahra Filho

    2012-04-01

    Full Text Available Check the possibility of the general standard employment antielisiva the parental right, ouseja, taxation by analogy legal fact extratípico effects econômicosequivalentes the typical legal fact, based on the abuse of rights doctrine and noprincípio of ability. Analysis in the face of the principles of legalidadeestrita and closed typicality, the principle of security developments jurídica.Conclui the impossibility of taxation by analogy for the offense to dasegurança legal principle that stands for certainty and predictability in entreEstado relations and taxpayers. The breach of the principle of strict legality because deexigência specific and qualified law to detributos institution. The offense aoprincípio closed typicality that prevents the tax nãodescrito legal fact with all its details by law. These principles not passíveissequer limitation, since they are immutable clauses. Inability to restriçãoda full effectiveness of the rule of the principle of typicality contributiva.Impossibilidade ability to taxation by the integrative method of analogy, therefore existecerta charge, even if relative, creativity inherent in the method and dependent inexistirlacunas fill in relevant matters to detributos institution , existing in reality free of the right spaces.

  17. Open-source tool for automatic import of coded surveying data to multiple vector layers in GIS environment

    Directory of Open Access Journals (Sweden)

    Eva Stopková

    2016-12-01

    Full Text Available This paper deals with a tool that enables import of the coded data in a singletext file to more than one vector layers (including attribute tables, together withautomatic drawing of line and polygon objects and with optional conversion toCAD. Python script v.in.survey is available as an add-on for open-source softwareGRASS GIS (GRASS Development Team. The paper describes a case study basedon surveying at the archaeological mission at Tell-el Retaba (Egypt. Advantagesof the tool (e.g. significant optimization of surveying work and its limits (demandson keeping conventions for the points’ names coding are discussed here as well.Possibilities of future development are suggested (e.g. generalization of points’names coding or more complex attribute table creation.

  18. Monetary Policy Rules, Learning and Stability: a Survey of the Recent Literature (In French)

    OpenAIRE

    Martin ZUMPE (GREThA UMR CNRS 5113)

    2010-01-01

    This paper presents the literature about econometric learning and its impact on the performances of monetary policy rules in the framework of the new canonical macroeconomic model. Rational expectations which are a building block of the original model can thus be replaced by expectations based on estimation algorithms. The permanent updating of these estimations can be interpreted as a learning proces of the model’s agents. This learning proces induces additional dynamics into the model. The ...

  19. Structural evaluation method for class 1 vessels by using elastic-plastic finite element analysis in code case of JSME rules on design and construction

    International Nuclear Information System (INIS)

    Asada, Seiji; Hirano, Takashi; Nagata, Tetsuya; Kasahara, Naoto

    2008-01-01

    A structural evaluation method by using elastic-plastic finite element analysis has been developed and published as a code case of Rules on Design and Construction for Nuclear Power Plants (The First Part: Light Water Reactor Structural Design Standard) in the JSME Codes for Nuclear Power Generation Facilities. Its title is 'Alternative Structural Evaluation Criteria for Class 1 Vessels Based on Elastic-Plastic Finite Element Analysis' (NC-CC-005). This code case applies elastic-plastic analysis to evaluation of such failure modes as plastic collapse, thermal ratchet, fatigue and so on. Advantage of this evaluation method is free from stress classification, consistently use of Mises stress and applicability to complex 3-dimensional structures which are hard to be treated by the conventional stress classification method. The evaluation method for plastic collapse has such variation as the Lower Bound Approach Method, Twice-Elastic-Slope Method and Elastic Compensation Method. Cyclic Yield Area (CYA) based on elastic analysis is applied to screening evaluation of thermal ratchet instead of secondary stress evaluation, and elastic-plastic analysis is performed when the CYA screening criteria is not satisfied. Strain concentration factors can be directly calculated based on elastic-plastic analysis. (author)

  20. The rule on granting subsidies for survey of hot drainage influences

    International Nuclear Information System (INIS)

    1980-01-01

    The regulation is established under the provisions of the law concerning the proper execution of subsidy budgets and the ordinance for enforcing the law, to execute these provisions. The subsidies under the ordinance for enforcing the law concerning the special account for the measures of promoting power source development are delivered according to the provisions of the regulation as well as the law concerning the proper execution of subsidy budgets and the ordinance for enforcing the law. Basic terms are defined, such as nuclear power generating facilities; business for arranging the survey facilities for hot drainage influences; business for the prior-survey of hot drainage; business for the survey of hot drainage influences; place of business; expected date of beginning the operation. The Minister of International Trade Industry delivers subsidies to a prefecture where nuclear power generating facilities are set up or expected to be set up, or its neighboring prefectures to cover all or a part of expenses necessary for the businesses for arranging the survey facilities for hot drainage influences, the prior-survey of hot drainage and the survey of hot drainage influences. Subsidies are paid during the specified periods ranging from 2 to 7 years. The subsidy delivered to a prefecture in each fiscal year is limited to from 5 to 14 million yen. An application for the subsidies shall be filed by an applicant prefecture to the Minister of International Trade Industry, attached with the specified summary reports of a subsidized business and nuclear power generating facilities. (Okada, K.)

  1. Greying of the human hair: a worldwide survey, revisiting the '50' rule of thumb.

    Science.gov (United States)

    Panhard, S; Lozano, I; Loussouarn, G

    2012-10-01

    While numerous papers have reported on the biological mechanisms of human hair pigmentation and greying, epidemiological descriptions of both natural hair colour and the greying process, worldwide, remain scarce. To assess hair colour and greying in a large world sample of human subjects, and to revisit the validity of the 50/50/50 rule of thumb, which states that 'at age 50 years, 50% of the population has at least 50% grey hair'. The natural hair colour of 4192 healthy male and female volunteers was assessed using a sensorial expert evaluation through the comparison of each volunteer's hair with standard swatches. Hair colour was studied according to age, gender and ethnic or geographical origin. Overall we observed that between 45 and 65 years of age, 74% of people were affected by grey hair with a mean intensity of 27%. Men harboured significantly more grey hair than women. Both age at onset and rate of greying with age appeared to be clearly linked to ethnic/geographical origin. Subjects of Asian and African descent showed less grey hair than those of caucasian origin, at comparable ages, confirming previously reported data. Calculating the percentage of people showing at least 50% grey hair coverage at age 50 years leads to a global range of 6-23%, according to ethnic/geographical origin and natural hair colour: well below that expressed by the '50' rule of thumb. © 2012 The Authors. BJD © 2012 British Association of Dermatologists.

  2. Fundamental Rules of Civil Procedure : The Tuning of the Federal Constitution and the New Code of Civil Procedure in The Guarantee and Protection of Fundamental Rights

    Directory of Open Access Journals (Sweden)

    Fernanda Sell de Souto Goulart Fernandes

    2016-10-01

    Full Text Available On  March  16th,  2015  was  enacted  Law  13,105.  Known  for  having  the  intention  to democratize the process, the new Civil Procedure Code innovated in many ways, and one of those that highlights is the introduction on the legal text of the Procedure Constitutional Principles, already provide in the Constitution. The legislator's attitude positivate in the Ordinary   legislation   the   constitutional   principles   only   embodies   the   wave   of constitutionalization of rights. And the Civil Procedure could not be averse to this trend. Thus, this article aims to analyze the basic rules of civil procedure.

  3. New limits to the remote monitoring of workers' activities at the intersection between the rules of the Statute and the privacy Code

    Directory of Open Access Journals (Sweden)

    Ilario Alvino

    2016-02-01

    Full Text Available This paper examines the provisions contained in the new article 4 of the Worker’s Statute that limit the employer’s monitoring powers.After more 40 years, this article is being changed by article 23 of d.lgs. 151/2015 with the purpose to revise the legislation in connection with development of modern technologies.In particular, emphasis is given to the difficult to implement and interpret the law in relation to the scope for employers to control how employees use the internet and emails at work.The new article is analysed in accordance with the rules of Italian Data Protection Code (d.lgs. 196/2003 and the norms laid down by the Italian Data Protection Authority.

  4. Pediatric biobanking: a pilot qualitative survey of practices, rules and researcher opinions in ten European countries

    DEFF Research Database (Denmark)

    Salvaterra, Elena; Giorda, Roberto; Bassi, Maria Teresa

    2012-01-01

    Ethical, legal, and social issues related to the collection, storage, and use of biospecimens and data derived from children raise critical concerns in the international debate. So far, a number of studies have considered a variety of the individual issues crucial to pediatric biobanking such as ......Ethical, legal, and social issues related to the collection, storage, and use of biospecimens and data derived from children raise critical concerns in the international debate. So far, a number of studies have considered a variety of the individual issues crucial to pediatric biobanking...... such as decision making, privacy protection, minor recontact, and research withdrawal by focusing on theoretical or empirical perspectives. Our research attempted to analyze such issues in a comprehensive manner by exploring practices, rules, and researcher opinions regarding proxy consent, minor assent, specimens...

  5. Research Integrity and Research Ethics in Professional Codes of Ethics: Survey of Terminology Used by Professional Organizations across Research Disciplines.

    Science.gov (United States)

    Komić, Dubravka; Marušić, Stjepan Ljudevit; Marušić, Ana

    2015-01-01

    Professional codes of ethics are social contracts among members of a professional group, which aim to instigate, encourage and nurture ethical behaviour and prevent professional misconduct, including research and publication. Despite the existence of codes of ethics, research misconduct remains a serious problem. A survey of codes of ethics from 795 professional organizations from the Illinois Institute of Technology's Codes of Ethics Collection showed that 182 of them (23%) used research integrity and research ethics terminology in their codes, with differences across disciplines: while the terminology was common in professional organizations in social sciences (82%), mental health (71%), sciences (61%), other organizations had no statements (construction trades, fraternal social organizations, real estate) or a few of them (management, media, engineering). A subsample of 158 professional organizations we judged to be directly involved in research significantly more often had statements on research integrity/ethics terminology than the whole sample: an average of 10.4% of organizations with a statement (95% CI = 10.4-23-5%) on any of the 27 research integrity/ethics terms compared to 3.3% (95% CI = 2.1-4.6%), respectively (Porganizations should define research integrity and research ethics issues in their ethics codes and collaborate within and across disciplines to adequately address responsible conduct of research and meet contemporary needs of their communities.

  6. Research Integrity and Research Ethics in Professional Codes of Ethics: Survey of Terminology Used by Professional Organizations across Research Disciplines

    Science.gov (United States)

    Komić, Dubravka; Marušić, Stjepan Ljudevit; Marušić, Ana

    2015-01-01

    Professional codes of ethics are social contracts among members of a professional group, which aim to instigate, encourage and nurture ethical behaviour and prevent professional misconduct, including research and publication. Despite the existence of codes of ethics, research misconduct remains a serious problem. A survey of codes of ethics from 795 professional organizations from the Illinois Institute of Technology’s Codes of Ethics Collection showed that 182 of them (23%) used research integrity and research ethics terminology in their codes, with differences across disciplines: while the terminology was common in professional organizations in social sciences (82%), mental health (71%), sciences (61%), other organizations had no statements (construction trades, fraternal social organizations, real estate) or a few of them (management, media, engineering). A subsample of 158 professional organizations we judged to be directly involved in research significantly more often had statements on research integrity/ethics terminology than the whole sample: an average of 10.4% of organizations with a statement (95% CI = 10.4-23-5%) on any of the 27 research integrity/ethics terms compared to 3.3% (95% CI = 2.1–4.6%), respectively (Pethics concepts used prescriptive language in describing the standard of practice. Professional organizations should define research integrity and research ethics issues in their ethics codes and collaborate within and across disciplines to adequately address responsible conduct of research and meet contemporary needs of their communities. PMID:26192805

  7. Local health rules and building regulations: a survey on local hygiene and building regulations in Italian municipalities.

    Science.gov (United States)

    Gola, Marco; Signorelli, Carlo; Buffoli, Maddalena; Rebecchi, Andrea; Capolongo, Stefano

    2017-01-01

    WHO has highlighted the need to strengthen the relationship between health and built environment factors, such as inappropriate housing conditions. Local Health Rules (LHRs) and Building Regulations (BRs) are tools which provide safety and building hygiene in construction practices. Currently the Italian Government is considering to establish a National Building Regulation and, related to the following purpose, this paper presents a survey on the status of adoption and updating of LHRs and BRs in Italian municipalities. The current Italian state of LHRs, BRs and Municipal Development Plans (MDPs) have been examined by a survey considering a sample of about 550 cities, with different demo graphic and geographic features, starting from the previous research work by Signorelli et al. (1999). The analysis underlines a serious shortage of updated LHRs, especially in small and medium-sized municipalities whereas BRs and MDPs are widespread. Only 30% of them are previously approved and validated by Local Health Authorities. Starting from a survey, the present scenario of Building Regulations requires the introduction of further performance guidelines instead of normative ones and, therefore, the current actions to give rise to a National Building Regulation could be integrated by building hygiene contents of LHRs.

  8. Adolescent in-school cellphone habits: a census of rules, survey of their effectiveness, and fertility implications.

    Science.gov (United States)

    Redmayne, Mary; Smith, Euan; Abramson, Michael J

    2011-11-01

    We explored school cellphone rules and adolescent exposure to cellphone microwave emissions during school with a census and survey, respectively. The data were used to assess health and policy implications through a review of papers assessing reproductive bio-effects after exposure to cellphone emissions, this being most relevant to students' exposure. All schools banned private use of cellphones in class. However, 43% of student participants admitted breaking this rule. A high-exposure group of risk-takers was identified for whom prohibited in-school use was positively associated with high texting rates, carrying the phone switched-on >10h/day, and in-pocket use. The fertility literature is inconclusive, but increasingly points towards significant time- and dose-dependent deleterious effects from cellphone exposure on sperm. Genotoxic effects have been demonstrated from 'non-thermal' exposures, but not consistently. There is sufficient evidence and expert opinion to warrant an enforced school policy removing cellphones from students during the day. Copyright © 2011 Elsevier Inc. All rights reserved.

  9. The rule on granting subsidies for survey of hot drainage influences

    International Nuclear Information System (INIS)

    1979-01-01

    The rule is defined under the law concerning subsidies and the provisions of the order for execution of the law. Basic terms are explained, such as: nuclear power generating facilities; arrangement business of research equipment for hot drainage influences; pre-research business of hot drainage; research business of hot drainage influences; place of enterprise; and expected time of beginning of the use. The Minister of International Trade and Industry grants subsidies to those prefectures where nuclear power generating facilities are or are expected to be established, or their neighboring prefectures to support all or a part of expenses of arrangement of research equipment, pre-research and research of hot drainage influences. Limits of subsidies are for a place of enterprise in a prefecture 14 million yen for a fiscal year for arrangement of research equipment, 5 million yen for pre-research and research respectively. Prefectures shall file an application for subsidies to the Minister of International Trade and Industry with gists of business and outlines of nuclear power generating facilities according to the forms attached. Receiving the application, the minister shall examine it and notify without delay the decision of delivery and its conditions to the applicant in writing, when such settlement is made. Receivers of subsidies shall present to the minister for each quarter reports of subsidized business. Terms and conditions of delivery and others are prescribed particularly. (Okada, K.)

  10. Health sciences librarians' awareness and assessment of the Medical Library Association Code of Ethics for Health Sciences Librarianship: the results of a membership survey.

    Science.gov (United States)

    Byrd, Gary D; Devine, Patricia J; Corcoran, Kate E

    2014-10-01

    The Medical Library Association (MLA) Board of Directors and president charged an Ethical Awareness Task Force and recommended a survey to determine MLA members' awareness of and opinions about the current Code of Ethics for Health Sciences Librarianship. THE TASK FORCE AND MLA STAFF CRAFTED A SURVEY TO DETERMINE: (1) awareness of the MLA code and its provisions, (2) use of the MLA code to resolve professional ethical issues, (3) consultation of other ethical codes or guides, (4) views regarding the relative importance of the eleven MLA code statements, (5) challenges experienced in following any MLA code provisions, and (6) ethical problems not clearly addressed by the code. Over 500 members responded (similar to previous MLA surveys), and while most were aware of the code, over 30% could not remember when they had last read or thought about it, and nearly half had also referred to other codes or guidelines. The large majority thought that: (1) all code statements were equally important, (2) none were particularly difficult or challenging to follow, and (3) the code covered every ethical challenge encountered in their professional work. Comments provided by respondents who disagreed with the majority views suggest that the MLA code could usefully include a supplementary guide with practical advice on how to reason through a number of ethically challenging situations that are typically encountered by health sciences librarians.

  11. Structural dynamics in LMFBR containment analysis: a brief survey of computational methods and codes

    International Nuclear Information System (INIS)

    Chang, Y.W.; Gvildys, J.

    1977-01-01

    In recent years, the use of computer codes to study the response of primary containment of large, liquid-metal fast breeder reactors (LMFBR) under postulated accident conditions has been adopted by most fast reactor projects. Since the first introduction of REXCO-H containment code in 1969, a number of containment codes have evolved and been reported in the literature. The paper briefly summarizes the various numerical methods commonly used in containment analysis in computer programs. They are compared on the basis of truncation errors resulting in the numerical approximation, the method of integration, the resolution of the computed results, and the ease of programming in computer codes. The aim of the paper is to provide enough information to an analyst so that he can suitably define his choice of method, and hence his choice of programs

  12. Survey of computer codes which produce multigroup data from ENDF/B-IV

    International Nuclear Information System (INIS)

    Greene, N.M.

    1975-01-01

    The features of three code systems that produce multigroup neutron data are contrasted. This includes the ETOE-2/MC 2 -2/SDX, MINX/SPHINX and AMPX code packages. These systems all contain a fairly extensive set of processing capabilities with the current evaluated nuclear data files--ENDF/B. They were designed with different goals and applications in mind. This paper discusses some of their differences and the implications for particular situations

  13. Should International Classification of Diseases codes be used to survey hospital-acquired pneumonia?

    Science.gov (United States)

    Wolfensberger, A; Meier, A H; Kuster, S P; Mehra, T; Meier, M-T; Sax, H

    2018-05-01

    As surveillance of hospital-acquired pneumonia (HAP) is very resource intensive, alternatives for HAP surveillance are needed urgently. This study compared HAP rates according to routine discharge diagnostic codes of the International Classification of Diseases, 10 th Revision (ICD-10; ICD-HAP) with HAP rates according to the validated surveillance definitions of the Hospitals in Europe Link for Infection Control through Surveillance (HELICS/IPSE; HELICS-HAP) by manual retrospective re-evaluation of patient records. The positive predictive value of ICD-HAP for HELICS-HAP was 0.35, and sensitivity was 0.59. Therefore, the currently available ICD-10-based routine discharge data do not allow reliable identification of patients with HAP. Copyright © 2018 The Healthcare Infection Society. Published by Elsevier Ltd. All rights reserved.

  14. Smoke-Free Rules and Secondhand Smoke Exposure in Vehicles among U.S. Adults-National Adult Tobacco Survey, 2009-2010 and 2013-2014.

    Science.gov (United States)

    Kruger, Judy; Jama, Amal; Kegler, Michelle; Baker Holmes, Carissa; Hu, Sean; King, Brian

    2016-10-26

    In the United States (U.S.), secondhand smoke (SHS) exposure causes more than 41,000 deaths among nonsmoking adults annually. Adoption of smoke-free laws in public areas has increased, but private settings such as vehicles remain a source of SHS exposure. This study assessed change in voluntary smoke-free vehicle rules and SHS exposure in personal vehicles among U.S. adults between two periods, 2009-2010 and 2013-2014, using data from the National Adult Tobacco Survey (NATS). NATS is a national landline and cellular telephone survey of non-institutionalized adults aged ≥18 years in the 50 U.S. states and the District of Columbia. We assessed percentage change in the prevalence of smoke-free vehicle rules among all adults and SHS exposure in vehicles among nonsmoking adults, overall, by sociodemographic factors (sex, age, race/ethnicity, education, marital status, annual household income, U.S. region), and by cigarette smoking status. During 2009-2010 to 2013-2014, the percentage of adults with a 100% smoke-free vehicle rule increased from 73.6% to 79.5% (% change = +8.0%; p exposure in vehicles in the previous 7 days decreased from 9.2% to 8.2% (% change = -10.9%; p Smoke-free rules in private settings such as vehicles, in coordination with comprehensive smoke-free policies in indoor public settings, can help reduce SHS exposure and promote smoke-free norms.

  15. Smoke-Free Rules and Secondhand Smoke Exposure in Vehicles among U.S. Adults—National Adult Tobacco Survey, 2009–2010 and 2013–2014

    Science.gov (United States)

    Kruger, Judy; Jama, Amal; Kegler, Michelle; Baker Holmes, Carissa; Hu, Sean; King, Brian

    2016-01-01

    In the United States (U.S.), secondhand smoke (SHS) exposure causes more than 41,000 deaths among nonsmoking adults annually. Adoption of smoke-free laws in public areas has increased, but private settings such as vehicles remain a source of SHS exposure. This study assessed change in voluntary smoke-free vehicle rules and SHS exposure in personal vehicles among U.S. adults between two periods, 2009–2010 and 2013–2014, using data from the National Adult Tobacco Survey (NATS). NATS is a national landline and cellular telephone survey of non-institutionalized adults aged ≥18 years in the 50 U.S. states and the District of Columbia. We assessed percentage change in the prevalence of smoke-free vehicle rules among all adults and SHS exposure in vehicles among nonsmoking adults, overall, by sociodemographic factors (sex, age, race/ethnicity, education, marital status, annual household income, U.S. region), and by cigarette smoking status. During 2009–2010 to 2013–2014, the percentage of adults with a 100% smoke-free vehicle rule increased from 73.6% to 79.5% (% change = +8.0%; p exposure in vehicles in the previous 7 days decreased from 9.2% to 8.2% (% change = −10.9%; p Smoke-free rules in private settings such as vehicles, in coordination with comprehensive smoke-free policies in indoor public settings, can help reduce SHS exposure and promote smoke-free norms. PMID:27792208

  16. Generating Health Estimates by Zip Code: A Semiparametric Small Area Estimation Approach Using the California Health Interview Survey.

    Science.gov (United States)

    Wang, Yueyan; Ponce, Ninez A; Wang, Pan; Opsomer, Jean D; Yu, Hongjian

    2015-12-01

    We propose a method to meet challenges in generating health estimates for granular geographic areas in which the survey sample size is extremely small. Our generalized linear mixed model predicts health outcomes using both individual-level and neighborhood-level predictors. The model's feature of nonparametric smoothing function on neighborhood-level variables better captures the association between neighborhood environment and the outcome. Using 2011 to 2012 data from the California Health Interview Survey, we demonstrate an empirical application of this method to estimate the fraction of residents without health insurance for Zip Code Tabulation Areas (ZCTAs). Our method generated stable estimates of uninsurance for 1519 of 1765 ZCTAs (86%) in California. For some areas with great socioeconomic diversity across adjacent neighborhoods, such as Los Angeles County, the modeled uninsured estimates revealed much heterogeneity among geographically adjacent ZCTAs. The proposed method can increase the value of health surveys by providing modeled estimates for health data at a granular geographic level. It can account for variations in health outcomes at the neighborhood level as a result of both socioeconomic characteristics and geographic locations.

  17. Ethical and educational considerations in coding hand surgeries.

    Science.gov (United States)

    Lifchez, Scott D; Leinberry, Charles F; Rivlin, Michael; Blazar, Philip E

    2014-07-01

    To assess treatment coding knowledge and practices among residents, fellows, and attending hand surgeons. Through the use of 6 hypothetical cases, we developed a coding survey to assess coding knowledge and practices. We e-mailed this survey to residents, fellows, and attending hand surgeons. In additionally, we asked 2 professional coders to code these cases. A total of 71 participants completed the survey out of 134 people to whom the survey was sent (response rate = 53%). We observed marked disparity in codes chosen among surgeons and among professional coders. Results of this study indicate that coding knowledge, not just its ethical application, had a major role in coding procedures accurately. Surgical coding is an essential part of a hand surgeon's practice and is not well learned during residency or fellowship. Whereas ethical issues such as deliberate unbundling and upcoding may have a role in inaccurate coding, lack of knowledge among surgeons and coders has a major role as well. Coding has a critical role in every hand surgery practice. Inconstancies among those polled in this study reveal that an increase in education on coding during training and improvement in the clarity and consistency of the Current Procedural Terminology coding rules themselves are needed. Copyright © 2014 American Society for Surgery of the Hand. Published by Elsevier Inc. All rights reserved.

  18. Symptom screening rules to identify active pulmonary tuberculosis: Findings from the Zambian South African Tuberculosis and HIV/AIDS Reduction (ZAMSTAR trial prevalence surveys.

    Directory of Open Access Journals (Sweden)

    M M Claassens

    Full Text Available High tuberculosis (TB burden countries should consider systematic screening among adults in the general population. We identified symptom screening rules to be used in addition to cough ≥2 weeks, in a context where X-ray screening is not feasible, aiming to increase the sensitivity of screening while achieving a specificity of ≥85%.We used 2010 Zambia South Africa Tuberculosis and HIV/AIDS Reduction (ZAMSTAR survey data: a South African (SA training dataset, a SA testing dataset for internal validation and a Zambian dataset for external validation. Regression analyses investigated relationships between symptoms or combinations of symptoms and active disease. Sensitivity and specificity were calculated for candidate rules.Among all participants, the sensitivity of using only cough ≥2 weeks as a screening rule was less than 25% in both SA and Zambia. The addition of any three of six TB symptoms (cough <2 weeks, night sweats, weight loss, fever, chest pain, shortness of breath, or 2 or more of cough <2 weeks, night sweats, and weight loss, increased the sensitivity to ~38%, while reducing specificity from ~95% to ~85% in SA and ~97% to ~92% in Zambia. Among HIV-negative adults, findings were similar in SA, whereas in Zambia the increase in sensitivity was relatively small (15% to 22%.High TB burden countries should investigate cost-effective strategies for systematic screening: one such strategy could be to use our rule in addition to cough ≥2 weeks.

  19. 15 CFR 801.11 - Rules and regulations for the BE-80, Benchmark Survey of Financial Services Transactions Between...

    Science.gov (United States)

    2010-01-01

    ..., Benchmark Survey of Financial Services Transactions Between U.S. Financial Services Providers and..., Benchmark Survey of Financial Services Transactions Between U.S. Financial Services Providers and Unaffiliated Foreign Persons. A BE-80, Benchmark Survey of Financial Services Transactions Between U.S...

  20. Communicating rules in recreation areas

    Science.gov (United States)

    Terence L. Ross; George H. Moeller

    1974-01-01

    Five hundred fifty-eight campers were surveyed on the Allegheny National Forest to determine their knowledge of rules governing recreation behavior. Most of them were uninformed about the rules. Results of the study suggest that previous camping experience, age, camping style, and residence significantly affect knowledge of rules. Campers who received rule brochures or...

  1. Pharmaceutical Industry Off-label Promotion and Self-regulation: A Document Analysis of Off-label Promotion Rulings by the United Kingdom Prescription Medicines Code of Practice Authority 2003-2012.

    Directory of Open Access Journals (Sweden)

    Andreas Vilhelmsson

    2016-01-01

    Full Text Available European Union law prohibits companies from marketing drugs off-label. In the United Kingdom--as in some other European countries, but unlike the United States--industry self-regulatory bodies are tasked with supervising compliance with marketing rules. The objectives of this study were to (1 characterize off-label promotion rulings in the UK compared to the whistleblower-initiated cases in the US and (2 shed light on the UK self-regulatory mechanism for detecting, deterring, and sanctioning off-label promotion.We conducted structured reviews of rulings by the UK self-regulatory authority, the Prescription Medicines Code of Practice Authority (PMCPA, between 2003 and 2012. There were 74 off-label promotion rulings involving 43 companies and 65 drugs. Nineteen companies were ruled in breach more than once, and ten companies were ruled in breach three or more times over the 10-y period. Drawing on a typology previously developed to analyse US whistleblower complaints, we coded and analysed the apparent strategic goals of each off-label marketing scheme and the practices consistent with those alleged goals. 50% of rulings cited efforts to expand drug use to unapproved indications, and 39% and 38% cited efforts to expand beyond approved disease entities and dosing strategies, respectively. The most frequently described promotional tactic was attempts to influence prescribers (n = 72, 97%, using print material (70/72, 97%, for example, advertisements (21/70, 30%. Although rulings cited prescribers as the prime target of off-label promotion, competing companies lodged the majority of complaints (prescriber: n = 16, 22%, versus companies: n = 42, 57%. Unlike US whistleblower complaints, few UK rulings described practices targeting consumers (n = 3, 4%, payers (n = 2, 3%, or company staff (n = 2, 3%. Eight UK rulings (11% pertaining to six drugs described promotion of the same drug for the same off-label use as was alleged by whistleblowers in the US

  2. Pharmaceutical Industry Off-label Promotion and Self-regulation: A Document Analysis of Off-label Promotion Rulings by the United Kingdom Prescription Medicines Code of Practice Authority 2003-2012.

    Science.gov (United States)

    Vilhelmsson, Andreas; Davis, Courtney; Mulinari, Shai

    2016-01-01

    European Union law prohibits companies from marketing drugs off-label. In the United Kingdom--as in some other European countries, but unlike the United States--industry self-regulatory bodies are tasked with supervising compliance with marketing rules. The objectives of this study were to (1) characterize off-label promotion rulings in the UK compared to the whistleblower-initiated cases in the US and (2) shed light on the UK self-regulatory mechanism for detecting, deterring, and sanctioning off-label promotion. We conducted structured reviews of rulings by the UK self-regulatory authority, the Prescription Medicines Code of Practice Authority (PMCPA), between 2003 and 2012. There were 74 off-label promotion rulings involving 43 companies and 65 drugs. Nineteen companies were ruled in breach more than once, and ten companies were ruled in breach three or more times over the 10-y period. Drawing on a typology previously developed to analyse US whistleblower complaints, we coded and analysed the apparent strategic goals of each off-label marketing scheme and the practices consistent with those alleged goals. 50% of rulings cited efforts to expand drug use to unapproved indications, and 39% and 38% cited efforts to expand beyond approved disease entities and dosing strategies, respectively. The most frequently described promotional tactic was attempts to influence prescribers (n = 72, 97%), using print material (70/72, 97%), for example, advertisements (21/70, 30%). Although rulings cited prescribers as the prime target of off-label promotion, competing companies lodged the majority of complaints (prescriber: n = 16, 22%, versus companies: n = 42, 57%). Unlike US whistleblower complaints, few UK rulings described practices targeting consumers (n = 3, 4%), payers (n = 2, 3%), or company staff (n = 2, 3%). Eight UK rulings (11%) pertaining to six drugs described promotion of the same drug for the same off-label use as was alleged by whistleblowers in the US. However

  3. Pharmaceutical Industry Off-label Promotion and Self-regulation: A Document Analysis of Off-label Promotion Rulings by the United Kingdom Prescription Medicines Code of Practice Authority 2003–2012

    Science.gov (United States)

    Vilhelmsson, Andreas; Davis, Courtney; Mulinari, Shai

    2016-01-01

    Background European Union law prohibits companies from marketing drugs off-label. In the United Kingdom—as in some other European countries, but unlike the United States—industry self-regulatory bodies are tasked with supervising compliance with marketing rules. The objectives of this study were to (1) characterize off-label promotion rulings in the UK compared to the whistleblower-initiated cases in the US and (2) shed light on the UK self-regulatory mechanism for detecting, deterring, and sanctioning off-label promotion. Methods and Findings We conducted structured reviews of rulings by the UK self-regulatory authority, the Prescription Medicines Code of Practice Authority (PMCPA), between 2003 and 2012. There were 74 off-label promotion rulings involving 43 companies and 65 drugs. Nineteen companies were ruled in breach more than once, and ten companies were ruled in breach three or more times over the 10-y period. Drawing on a typology previously developed to analyse US whistleblower complaints, we coded and analysed the apparent strategic goals of each off-label marketing scheme and the practices consistent with those alleged goals. 50% of rulings cited efforts to expand drug use to unapproved indications, and 39% and 38% cited efforts to expand beyond approved disease entities and dosing strategies, respectively. The most frequently described promotional tactic was attempts to influence prescribers (n = 72, 97%), using print material (70/72, 97%), for example, advertisements (21/70, 30%). Although rulings cited prescribers as the prime target of off-label promotion, competing companies lodged the majority of complaints (prescriber: n = 16, 22%, versus companies: n = 42, 57%). Unlike US whistleblower complaints, few UK rulings described practices targeting consumers (n = 3, 4%), payers (n = 2, 3%), or company staff (n = 2, 3%). Eight UK rulings (11%) pertaining to six drugs described promotion of the same drug for the same off-label use as was alleged by

  4. INF Code related matters. Joint IAEA/IMO literature survey on potential consequences of severe maritime accidents involving the transport of radioactive material. 2 volumes. Vol. I - Report and publication titles. Vol. II - Relevant abstracts

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-07-10

    This literature survey was undertaken jointly by the International Maritime Organization (IMO) and the International Atomic Energy Agency (IAEA) as a step in addressing the subject of environmental impact of accidents involving materials subject to the IMO's Code for the Safe Carriage of Irradiated Nuclear Fuel, Plutonium and High-Level Radioactive Wastes in Flasks on Board Ships, also known as the INF Code. The results of the survey are provided in two volumes: the first one containing the description of the search and search results with the list of generated publication titles, and the second volume containing the abstracts of those publications deemed relevant for the purposes of the literature survey. Literature published between 1980 and mid-1999 was reviewed by two independent consultants who generated publication titles by performing searches of appropriate databases, and selected the abstracts of relevant publications for inclusion in this survey. The IAEA operates INIS, the world's leading computerised bibliographical information system on the peaceful uses of nuclear energy. The acronym INIS stands for International Nuclear Information System. INIS Members are responsible for determining the relevant nuclear literature produced within their borders or organizational confines, and then preparing the associated input in accordance with INIS rules. INIS records are included in other major databases such as the Energy, Science and Technology database of the DIALOG service. Because it is the INIS Members, rather than the IAEA Secretariat, who are responsible for its contents, it was considered appropriate that INIS be the primary source of information for this literature review. Selected unpublished reports were also reviewed, e.g. Draft Proceedings of the Special Consultative Meeting of Entities involved in the maritime transport of materials covered by the INF Code (SCM 5), March 1996. Many of the formal papers at SCM 5 were included in the literature

  5. INF Code related matters. Joint IAEA/IMO literature survey on potential consequences of severe maritime accidents involving the transport of radioactive material. 2 volumes. Vol. I - Report and publication titles. Vol. II - Relevant abstracts

    International Nuclear Information System (INIS)

    2000-01-01

    This literature survey was undertaken jointly by the International Maritime Organization (IMO) and the International Atomic Energy Agency (IAEA) as a step in addressing the subject of environmental impact of accidents involving materials subject to the IMO's Code for the Safe Carriage of Irradiated Nuclear Fuel, Plutonium and High-Level Radioactive Wastes in Flasks on Board Ships, also known as the INF Code. The results of the survey are provided in two volumes: the first one containing the description of the search and search results with the list of generated publication titles, and the second volume containing the abstracts of those publications deemed relevant for the purposes of the literature survey. Literature published between 1980 and mid-1999 was reviewed by two independent consultants who generated publication titles by performing searches of appropriate databases, and selected the abstracts of relevant publications for inclusion in this survey. The IAEA operates INIS, the world's leading computerised bibliographical information system on the peaceful uses of nuclear energy. The acronym INIS stands for International Nuclear Information System. INIS Members are responsible for determining the relevant nuclear literature produced within their borders or organizational confines, and then preparing the associated input in accordance with INIS rules. INIS records are included in other major databases such as the Energy, Science and Technology database of the DIALOG service. Because it is the INIS Members, rather than the IAEA Secretariat, who are responsible for its contents, it was considered appropriate that INIS be the primary source of information for this literature review. Selected unpublished reports were also reviewed, e.g. Draft Proceedings of the Special Consultative Meeting of Entities involved in the maritime transport of materials covered by the INF Code (SCM 5), March 1996. Many of the formal papers at SCM 5 were included in the literature

  6. Verification of business rules programs

    CERN Document Server

    Silva, Bruno Berstel-Da

    2013-01-01

    Rules represent a simplified means of programming, congruent with our understanding of human brain constructs. With the advent of business rules management systems, it has been possible to introduce rule-based programming to nonprogrammers, allowing them to map expert intent into code in applications such as fraud detection, financial transactions, healthcare, retail, and marketing. However, a remaining concern is the quality, safety, and reliability of the resulting programs.  This book is on business rules programs, that is, rule programs as handled in business rules management systems. Its

  7. Survey of International Rules and Practices Regarding Delineation of and Access to Regulated Areas for Radiation Protection - Final report

    International Nuclear Information System (INIS)

    Schieber, C.; Crouail, P.; Beltrami, L.-A.; Reaud, C.; Lehtinen, Maaret; Stritt, Nicolas; Thomas, Gareth

    2013-06-01

    European requirements for radiological protection, especially work on transposing the new EURATOM Directive on the basic radiological protection standards, are currently being revised. The Direction generale du travail (DGT - General Directorate of Labour) and the Autorite de Surete Nucleaire (ASN - Nuclear Safety Authority) therefore commissioned the Radiological Protection Standing Groups of experts (GPRAD and GPMED)1 to engage in a forward-looking debate on the delimitation of and access to regulated areas, within an ad hoc working group (called hereafter 'Classification of Area WG'). To fuel its debates, the 'Classification of Area WG' sought elements on international regulations and practices focusing on problem exposure situations in various areas of activity (nuclear, industrial, research, medical, transport and natural boosted). CEPN was entrusted with this study. This report presents a summary of rules applicable in seven countries in terms of delimitation of and access to regulated radiological protection areas. The countries are: Belgium, Spain, United States, Finland, United Kingdom, Sweden and Switzerland. Detailed sheets for each country can be found in the Annex. Based on these summaries, three countries have been selected to apply their rules and practices in force to a dozen or so particular cases put together by the 'Classification of Area WG' that are representative of exposure situations. The three countries are Finland, United Kingdom and Switzerland. The case studies applied to each country are presented in the second part of this report

  8. Binary translation using peephole translation rules

    Science.gov (United States)

    Bansal, Sorav; Aiken, Alex

    2010-05-04

    An efficient binary translator uses peephole translation rules to directly translate executable code from one instruction set to another. In a preferred embodiment, the translation rules are generated using superoptimization techniques that enable the translator to automatically learn translation rules for translating code from the source to target instruction set architecture.

  9. Monitoring compliance with the International Code of Marketing of Breastmilk Substitutes in west Africa: multisite cross sectional survey in Togo and Burkina Faso.

    Science.gov (United States)

    Aguayo, Victor M; Ross, Jay S; Kanon, Souleyman; Ouedraogo, Andre N

    2003-01-18

    To monitor compliance with the International Code of Marketing of Breastmilk Substitutes in health systems, sales outlets, distribution points, and the news media in Togo and Burkina Faso, west Africa. Multisite cross sectional survey. Staff at 43 health facilities and 66 sales outlets and distribution points, 186 health providers, and 105 mothers of infants aged market commercial breast milk substitutes were found in 29 (44%) sales and distribution points. Forty commercial breast milk substitutes violated the labelling standards of the code: 21 were manufactured by Danone, 11 by Nestlé, and eight by other national and international manufacturers. Most (148, 90%) health providers had never heard of the code, and 66 mothers (63%) had never received any counselling on breast feeding by their health providers. In west Africa manufacturers are violating the code of marketing of breast milk substitutes. Comparable levels of code violations are observed with (Burkina Faso) or without (Togo) regulating legislation. Legislation must be accompanied by effective information, training, and monitoring systems to ensure that healthcare providers and manufacturers comply with evidence based practice and the code.

  10. Changes in community perspectives on the roles and rules of church forests in northern Ethiopia: evidence from a panel survey of four Ethiopian Orthodox communities

    Directory of Open Access Journals (Sweden)

    Travis William Reynolds

    2017-04-01

    Full Text Available Some of the only Afromontane forest in northern Ethiopia today is on lands managed by followers of the Ethiopian Orthodox Church, where for centuries priests and communities have conserved forest groves around church buildings. The ecological value of the thousands of church forests in Ethiopia has been widely acknowledged, but little is known about the diverse local institutions that govern these resources, or how such institutions might be changing in response to Ethiopia’s rapid recent economic development. This study uses a unique panel survey to explore changes in community perspectives on the social and ecological roles of church forests, and rules governing church forest use, in four Orthodox communities over time. Our sample consists of 122 household surveys conducted in 2002 and a further 122 surveys from 2014, with 71 households interviewed in both periods. We find that reported uses of church forests vary across forests and over time, with larger forests more likely to be used for extractive purposes such as firewood and construction timber, while smaller forests have become more restricted to renewable or non-extractive uses such as natural medicines, honey, and prayer. Results of logistic regression suggest church followers’ support for preserving church forests increases with age and access to alternative sources of firewood – including exotic Eucalyptus spp. plantations which are increasingly widespread in northern Ethiopia. We also observe a shift since 2002 away from an expectation that church followers themselves hold responsibility for rule enforcement in church forests to a perceived sharing of responsibility by church authorities (i.e. priests and government (i.e. police in 2014. Together the progressive introduction of exotic tree species in church forests combined with the erosion of religious norms surrounding local forest governance may threaten the integrity and diversity of these unique social-ecological systems.

  11. A survey of the existing international legal rules on the dumping of radioactive waste into the sea

    International Nuclear Information System (INIS)

    Cornelis, J.C.

    All nuclear activities generate radioactive wastes and, in the context of the problems raised by such wastes, the author analyses the international rules regulating their safe disposal into the sea and the motives underlying their elaboration. The review therefore covers the London Convention on the Prevention of Marine Pollution by Dumping of Waste and Other Matter, together with the IAEA provisional definition and recommendations in this respect, and the recently adopted OECD Multilateral Consultation and Surveillance Mechanism for Sea Dumping of Radioactive Waste. It is emphasized that while the London Convention deals with a wide range of products, the OECD Mechanism deals solely with radioactive waste. Finally, consideration is given to whether the Paris Convention and the Euratom Treaty may be of relevance in this field. (NEA) [fr

  12. Survey of existing literature in the field of shock-absorbing materials with a view to subsequent adaptation of plastic deformation codes. Phase 1

    International Nuclear Information System (INIS)

    Draulans, J.; Fabry, J.P.; Lafontaine, I.; Richel, H.; Guyette, M.

    1985-01-01

    Shock-absorbing materials and structures can be used as part of the transport container structure or of the truck equipment. An extensive survey of the literature has provided much information. Investigation has been made to define the required experimental procedures necessary to measure the misssing material properties. Three codes had been selected: EURDYN, MARC-CDC and SAMCEF. For code evaluation, a schematic container model has been considered to serve as a benchmark for the evaluation of plastic deformation. For the shock-calculation, the container falls from a height of 9 meters along the direction of its cylinder axis on an unyielded flat surface. The EURDYN computer code, has been selected first as it is especially designed to handle dynamic problems, preferably plastic ones. Indeed, EURDYN uses an explicit integration scheme versus time, which makes it quite efficient to run short deformation processes such as absorber collapses. The SAMCEF computer code could not readily calculate the benchmark, also a visco-plastic flow model has been added to it. The MARC computer code was supposed to be a candidate to run shock-calculation but extensive computing time and engineering efforts would be required, it was replaced by the PLEXUS code. The results obtained using the SAMCEF programme confirm those obtained with EURDYN. The PLEXUS results are in between. The proposed benchmark calculation is at the border of the capabilities of the most advanced computer codes for plastic-dynamic calculations. Indeed, a complex energy absorption process seems to take place in a narrow region, moving versus time, where very large shape inversions occur. That requires an accurate modelling of the system in the deformed regions and a skilful choice of the numerical parameters of the computer run. The three tested codes gave qualitatively consistent results and confirm some scarce experimental results

  13. Geodatabase of sites, basin boundaries, and topology rules used to store drainage basin boundaries for the U.S. Geological Survey, Colorado Water Science Center

    Science.gov (United States)

    Dupree, Jean A.; Crowfoot, Richard M.

    2012-01-01

    This geodatabase and its component datasets are part of U.S. Geological Survey Digital Data Series 650 and were generated to store basin boundaries for U.S. Geological Survey streamgages and other sites in Colorado. The geodatabase and its components were created by the U.S. Geological Survey, Colorado Water Science Center, and are used to derive the numeric drainage areas for Colorado that are input into the U.S. Geological Survey's National Water Information System (NWIS) database and also published in the Annual Water Data Report and on NWISWeb. The foundational dataset used to create the basin boundaries in this geodatabase was the National Watershed Boundary Dataset. This geodatabase accompanies a U.S. Geological Survey Techniques and Methods report (Book 11, Section C, Chapter 6) entitled "Digital Database Architecture and Delineation Methodology for Deriving Drainage Basins, and Comparison of Digitally and Non-Digitally Derived Numeric Drainage Areas." The Techniques and Methods report details the geodatabase architecture, describes the delineation methodology and workflows used to develop these basin boundaries, and compares digitally derived numeric drainage areas in this geodatabase to non-digitally derived areas. 1. COBasins.gdb: This geodatabase contains site locations and basin boundaries for Colorado. It includes a single feature dataset, called BasinsFD, which groups the component feature classes and topology rules. 2. BasinsFD: This feature dataset in the "COBasins.gdb" geodatabase is a digital container that holds the feature classes used to archive site locations and basin boundaries as well as the topology rules that govern spatial relations within and among component feature classes. This feature dataset includes three feature classes: the sites for which basins have been delineated (the "Sites" feature class), basin bounding lines (the "BasinLines" feature class), and polygonal basin areas (the "BasinPolys" feature class). The feature dataset

  14. The Filiation by Assisted Human Reproductions Techniques in the Argentinian Civil and Commercial Code. An Advance that Allows to Harmonize the Rule with the Reality

    Directory of Open Access Journals (Sweden)

    Adriana Noemí Krasnow

    2017-07-01

    Full Text Available This article describes the contributions and changes that the Argentinian Civil and Commercial Code introduce in the filiation. The focus of attention is moved to the assisted human reproduction techniques in relation with the informed consent as an exteriorization of the will to procreate. Moreover, it is intended a study space about two proceedings that were silenced in the norm as the gestational surrogacy and the post mortem fertilization.

  15. Challenges for Rule Systems on the Web

    Science.gov (United States)

    Hu, Yuh-Jong; Yeh, Ching-Long; Laun, Wolfgang

    The RuleML Challenge started in 2007 with the objective of inspiring the issues of implementation for management, integration, interoperation and interchange of rules in an open distributed environment, such as the Web. Rules are usually classified as three types: deductive rules, normative rules, and reactive rules. The reactive rules are further classified as ECA rules and production rules. The study of combination rule and ontology is traced back to an earlier active rule system for relational and object-oriented (OO) databases. Recently, this issue has become one of the most important research problems in the Semantic Web. Once we consider a computer executable policy as a declarative set of rules and ontologies that guides the behavior of entities within a system, we have a flexible way to implement real world policies without rewriting the computer code, as we did before. Fortunately, we have de facto rule markup languages, such as RuleML or RIF to achieve the portability and interchange of rules for different rule systems. Otherwise, executing real-life rule-based applications on the Web is almost impossible. Several commercial or open source rule engines are available for the rule-based applications. However, we still need a standard rule language and benchmark for not only to compare the rule systems but also to measure the progress in the field. Finally, a number of real-life rule-based use cases will be investigated to demonstrate the applicability of current rule systems on the Web.

  16. SARNET, a success story. Survey of major achievements on severe accidents and of knowledge capitalization within the ASTEC code

    International Nuclear Information System (INIS)

    Albiol, T.; Van Dorsselaere, J.P.; Reinke, N.

    2013-01-01

    51 organizations from Europe and Canada cooperated within SARNET (Severe Accident Research Network of Excellence) joining their capacities of research in order to resolve the most important pending issues for enhancing, in regard to Severe Accidents (SA), the safety of existing and future Nuclear Power Plants (NPPs). SARNET defines common research programmes and develops common computer codes and methodologies for safety assessment. The ASTEC integral code, jointly developed by IRSN (France) and GRS (Germany) for Light Water Reactor (LWR) source term SA evaluation, Probabilistic Safety Assessment (PSA) level-2 studies and SA management evaluation, is the main integrating component of SARNET. The scientific knowledge generated in the Corium, Source Term and Containment Topics has been integrated into the code through improved or new physical models. ASTEC constitutes now the reference European SA integral code. During the 4 and half years of SARNET, 30 partners have assessed the successive versions of the ASTEC V1 code through validation. More than 60 scientists have been trained on the code use. Validation tasks on about 65 experiments were performed to cover all physical phenomena occurring in a severe accident: circuit thermalhydraulic, core degradation, fission products (FP) release and transport, Molten-Corium-Concrete-Interaction (MCCI), and in the containment, thermalhydraulic, aerosol and iodine as well as hydrogen behaviour. The overall status of validation can be considered as good, with results often close to results of mechanistic codes. Some reach the limits of present knowledge, for instance on MCCI, and, like in most codes, an adequate model for reflooding of a degraded core is still missing. IRSN and GRS are currently preparing the new series of ASTEC V2 versions that will account for most of the needs of evolution expressed by the SARNET partners. The first version V2.0, planned for March 09, will be applicable to EPR and will include the ICARE2

  17. Monitoring compliance with the International Code of Marketing of Breastmilk Substitutes in west Africa: multisite cross sectional survey in Togo and Burkina Faso

    Science.gov (United States)

    Aguayo, Victor M; Ross, Jay S; Kanon, Souleyman; Ouedraogo, Andre N

    2003-01-01

    Objectives To monitor compliance with the International Code of Marketing of Breastmilk Substitutes in health systems, sales outlets, distribution points, and the news media in Togo and Burkina Faso, west Africa. Design Multisite cross sectional survey. Participants Staff at 43 health facilities and 66 sales outlets and distribution points, 186 health providers, and 105 mothers of infants aged ⩽5 months in 16 cities. Results Six (14%) health facilities had received donations of breast milk substitutes. All donations were being given to mothers free of charge. Health providers in five (12%) health facilities had received free samples of breast milk substitutes for purposes other than professional research or evaluation. Health professionals in five (12%) health facilities had received promotional gifts from manufacturers. Promotional materials of commercial breast milk substitutes were found in seven (16%) health facilities. Special displays to market commercial breast milk substitutes were found in 29 (44%) sales and distribution points. Forty commercial breast milk substitutes violated the labelling standards of the code: 21 were manufactured by Danone, 11 by Nestlé, and eight by other national and international manufacturers. Most (148, 90%) health providers had never heard of the code, and 66 mothers (63%) had never received any counselling on breast feeding by their health providers. Conclusion In west Africa manufacturers are violating the code of marketing of breast milk substitutes. Comparable levels of code violations are observed with (Burkina Faso) or without (Togo) regulating legislation. Legislation must be accompanied by effective information, training, and monitoring systems to ensure that healthcare providers and manufacturers comply with evidence based practice and the code. What is already known on this topicAll member states of the World Health Assembly have reaffirmed their support for the International Code of Marketing of Breastmilk

  18. Determination of Death and the Dead Donor Rule: A Survey of the Current Law on Brain Death

    Science.gov (United States)

    Nikas, Nikolas T.; Bordlee, Dorinda C.; Moreira, Madeline

    2016-01-01

    Despite seeming uniformity in the law, end-of-life controversies have highlighted variations among state brain death laws and their interpretation by courts. This article provides a survey of the current legal landscape regarding brain death in the United States, for the purpose of assisting professionals who seek to formulate or assess proposals for changes in current law and hospital policy. As we note, the public is increasingly wary of the role of organ transplantation in determinations of death, and of the variability of brain death diagnosing criteria. We urge that any attempt to alter current state statutes or to adopt a national standard must balance the need for medical accuracy with sound ethical principles which reject the utilitarian use of human beings and are consistent with the dignity of the human person. Only in this way can public trust be rebuilt. PMID:27097648

  19. Determination of national midwifery ethical values and ethical codes: in Turkey.

    Science.gov (United States)

    Ergin, Ayla; Özcan, Müesser; Acar, Zeynep; Ersoy, Nermin; Karahan, Nazan

    2013-11-01

    It is important to define and practice ethical rules and codes for professionalisation. Several national and international associations have determined midwifery ethical codes. In Turkey, ethical rules and codes that would facilitate midwifery becoming professionalised have not yet been determined. This study was planned to contribute to the professionalisation of midwifery by determining national ethical values and codes. A total of 1067 Turkish midwives completed the survey. The most prevalent values of Turkish midwives were care for mother-child health, responsibility and professional adequacy. The preferred professional codes chosen by Turkish midwives were absence of conflicts of interest, respect for privacy, avoidance of deception, reporting of faulty practices, consideration of mothers and newborns as separate beings and prevention of harm. In conclusion, cultural values, beliefs and expectations of society cannot be underestimated, although the international professional values and codes of ethics contribute significantly to professionalisation of the midwifery profession.

  20. Application of InSAR and gravimetric surveys for developing construction codes in zones of land subsidence induced by groundwater extraction: case study of Aguascalientes, Mexico

    Directory of Open Access Journals (Sweden)

    J. Pacheco-Martínez

    2015-11-01

    Full Text Available Interferometric Synthetic Aperture Radar (InSAR has become a valuable tool for surface deformation monitoring, including land subsidence associated with groundwater extraction. Another useful tools for studying Earth's surface processes are geophysical methods such as Gravimetry. In this work we present the application of InSAR analysis and gravimetric surveying to generate valuable information for risk management related to land subsidence and surface faulting. Subsidence of the city of Aguascalientes, Mexico is presented as study case. Aguascalientes local governments have addressed land subsidence issues by including new requirements for new constructions projects in the State Urban Construction Code. Nevertheless, the resulting zoning proposed in the code is still subjective and not clearly defined. Our work based on gravimetric and InSAR surveys is aimed for improving the subsidence hazard zoning proposed in the State Urban Code in a more comprehensive way. The study includes a 2007–2011 ALOS InSAR time-series analysis of the Aguascalientes valley, an interpretation of the compete Bouguer gravimetric anomaly of the Aguascalientes urban area, and the application of time series and gravimetric anomaly maps for improve the subsidence hazard zoning of Aguascalientes City.

  1. Vector Quantization of Harmonic Magnitudes in Speech Coding Applications—A Survey and New Technique

    Directory of Open Access Journals (Sweden)

    Wai C. Chu

    2004-12-01

    Full Text Available A harmonic coder extracts the harmonic components of a signal and represents them efficiently using a few parameters. The principles of harmonic coding have become quite successful and several standardized speech and audio coders are based on it. One of the key issues in harmonic coder design is in the quantization of harmonic magnitudes, where many propositions have appeared in the literature. The objective of this paper is to provide a survey of the various techniques that have appeared in the literature for vector quantization of harmonic magnitudes, with emphasis on those adopted by the major speech coding standards; these include constant magnitude approximation, partial quantization, dimension conversion, and variable-dimension vector quantization (VDVQ. In addition, a refined VDVQ technique is proposed where experimental data are provided to demonstrate its effectiveness.

  2. A survey of the effective factors in students’ adherence to university dress code policy, using the theory of reasoned action

    Directory of Open Access Journals (Sweden)

    MOHAMMAD HOSSEIN KAVEH

    2015-07-01

    Full Text Available Introduction: Recognizing the determinants of behavior plays a major role in identification and application of effective strategies for encouraging individuals to follow the intended pattern of behavior. The present study aimed to analyze the university students’ behaviors regarding the amenability to dress code, using the theory of reasoned action (TRA. Methods: In this cross sectional study, 472 students were selected through multi-stage random sampling. The data were collected using a researcher-made questionnaire whose validity was confirmed by specialists. Besides, its reliability was confirmed by conducting a pilot study revealing Cronbach’s alpha coefficients of 0.93 for attitude, 0.83 for subjective norms, 0.94 for behavioral intention and 0.77 for behavior. The data were entered into the SPSS statistical software and analyzed using descriptive and inferential statistics (Mann-Whitney, correlation and regression analysis. Results: Based on the students’ self-reports, conformity of clothes to the university’s dress code was below the expected level in 28.87% of the female students and 28.55% of the male ones. The mean scores of attitude, subjective norms, and behavioral intention to comply with dress code policy were 28.78±10.08, 28.51±8.25 and 11.12±3.84, respectively. The students of different colleges were different from each other concerning TRA constructs. Yet, subjective norms played a more critical role in explaining the variance of dress code behavior among the students. Conclusion: Theory of reasoned action explained the students’ dress code behaviors relatively well. The study results suggest paying attention to appropriate approaches in educational, cultural activities, including promotion of student-teacher communication.

  3. A survey of the effective factors in students' adherence to university dress code policy, using the theory of reasoned action.

    Science.gov (United States)

    Kaveh, Mohammad Hossein; Moradi, Leila; Hesampour, Maryam; Hasan Zadeh, Jafar

    2015-07-01

    Recognizing the determinants of behavior plays a major role in identification and application of effective strategies for encouraging individuals to follow the intended pattern of behavior. The present study aimed to analyze the university students' behaviors regarding the amenability to dress code, using the theory of reasoned action (TRA). In this cross sectional study, 472 students were selected through multi-stage random sampling. The data were collected using a researcher-made questionnaire whose validity was confirmed by specialists. Besides, its reliability was confirmed by conducting a pilot study revealing Cronbach's alpha coefficients of 0.93 for attitude, 0.83 for subjective norms, 0.94 for behavioral intention and 0.77 for behavior. The data were entered into the SPSS statistical software and analyzed using descriptive and inferential statistics (Mann-Whitney, correlation and regression analysis). Based on the students' self-reports, conformity of clothes to the university's dress code was below the expected level in 28.87% of the female students and 28.55% of the male ones. The mean scores of attitude, subjective norms, and behavioral intention to comply with dress code policy were 28.78±10.08, 28.51±8.25 and 11.12±3.84, respectively. The students of different colleges were different from each other concerning TRA constructs. Yet, subjective norms played a more critical role in explaining the variance of dress code behavior among the students. Theory of reasoned action explained the students' dress code behaviors relatively well. The study results suggest paying attention to appropriate approaches in educational, cultural activities, including promotion of student-teacher communication.

  4. Methodological approaches based on business rules

    OpenAIRE

    Anca Ioana ANDREESCU; Adina UTA

    2008-01-01

    Business rules and business processes are essential artifacts in defining the requirements of a software system. Business processes capture business behavior, while rules connect processes and thus control processes and business behavior. Traditionally, rules are scattered inside application code. This approach makes it very difficult to change rules and shorten the life cycle of the software system. Because rules change more quickly than the application itself, it is desirable to externalize...

  5. Replacing the IRAF/PyRAF Code-base at STScI: The Advanced Camera for Surveys (ACS)

    Science.gov (United States)

    Lucas, Ray A.; Desjardins, Tyler D.; STScI ACS (Advanced Camera for Surveys) Team

    2018-06-01

    IRAF/PyRAF are no longer viable on the latest hardware often used by HST observers, therefore STScI no longer actively supports IRAF or PyRAF for most purposes. STScI instrument teams are in the process of converting all of our data processing and analysis code from IRAF/PyRAF to Python, including our calibration reference file pipelines and data reduction software. This is exemplified by our latest ACS Data Handbook, version 9.0, which was recently published in February 2018. Examples of IRAF and PyRAF commands have now been replaced by code blocks in Python, with references linked to documentation on how to download and install the latest Python software via Conda and AstroConda. With the temporary exception of the ACS slitless spectroscopy tool aXe, all ACS-related software is now independent of IRAF/PyRAF. A concerted effort has been made across STScI divisions to help the astronomical community transition from IRAF/PyRAF to Python, with tools such as Python Jupyter notebooks being made to give users workable examples. In addition to our code changes, the new ACS data handbook discusses the latest developments in charge transfer efficiency (CTE) correction, bias de-striping, and updates to the creation and format of calibration reference files among other topics.

  6. Rule-Based Event Processing and Reaction Rules

    Science.gov (United States)

    Paschke, Adrian; Kozlenkov, Alexander

    Reaction rules and event processing technologies play a key role in making business and IT / Internet infrastructures more agile and active. While event processing is concerned with detecting events from large event clouds or streams in almost real-time, reaction rules are concerned with the invocation of actions in response to events and actionable situations. They state the conditions under which actions must be taken. In the last decades various reaction rule and event processing approaches have been developed, which for the most part have been advanced separately. In this paper we survey reaction rule approaches and rule-based event processing systems and languages.

  7. Analysis of preservice inspection relief requests and recommendations for ASME code changes

    International Nuclear Information System (INIS)

    Cook, J.F.

    1985-05-01

    NRC regulations require that preservice inspection (PSI) of nuclear plants be performed in accordance with referenced editions and addenda of Division 1 rules of Section XI, ''Rules for Inservice Inspection of Nuclear Power Plant Components'', of the ASME Boiler and Pressure Vessel Code (ASME Code). The regulations permit applicants to request and obtain relief from the NRC from specific ASME Code requirements that are determined to be impractical. Applicant requests for relief from preservice inspection (PSI) requirements were compiled and analyzed. From this data, covering a total of 178 relief requests, common problems with examination requirements were identified. Changes to examination requirements to solve selected problems are proposed. By following later ASME Code requirements, 46 out of the 178 relief requests can be eliminated. Implementing proposed Code changes would eliminate another 25 relief requests, leaving 107 relief requests out of the original 178 relief requests covered by this survey

  8. Idioms-based Business Rule Extraction

    NARCIS (Netherlands)

    R Smit (Rob)

    2011-01-01

    htmlabstractThis thesis studies the extraction of embedded business rules, using the idioms of the used framework to identify them. Embedded business rules exist as source code in the software system and knowledge about them may get lost. Extraction of those business rules could make them accessible

  9. Coding chaotic billiards. Pt. 3

    International Nuclear Information System (INIS)

    Ullmo, D.; Giannoni, M.J.

    1993-01-01

    Non-tiling compact billiard defined on the pseudosphere is studied 'a la Morse coding'. As for most bounded systems, the coding is non exact. However, two sets of approximate grammar rules can be obtained, one specifying forbidden codes, and the other allowed ones. In-between some sequences remain in the 'unknown' zone, but their relative amount can be reduced to zero if one lets the length of the approximate grammar rules goes to infinity. The relationship between these approximate grammar rules and the 'pruning front' introduced by Cvitanovic et al. is discussed. (authors). 13 refs., 10 figs., 1 tab

  10. Awareness and reported violations of the WHO International Code and Pakistan's national breastfeeding legislation; a descriptive cross-sectional survey

    Directory of Open Access Journals (Sweden)

    Faragher Brian

    2008-10-01

    Full Text Available Abstract Background National legislation in Pakistan adopted the International Code of Marketing of Breastmilk Substitutes in 2002 to restrict the promotion of infant formula feeding. Our objectives were to assess health professionals' awareness of this law in urban government hospitals and describe their reports of violations, including receiving free samples, gifts and sponsorship. Methods Structured interviews were conducted with health staff between July and August 2006 at 12 urban government hospitals in Islamabad, Rawalpindi and Peshawar including paediatricians, obstetricians, nurses, resident doctors, midwives and lady health visitors (LHVs. Results Of the 427 health workers interviewed, the majority were not aware of the national breastfeeding law (70.5%; n = 301 or the International Code (79.6%; n = 340. Paediatricians, and staff who had been working for 10 years or more, were more likely to be aware of the law [OR = 7.00, 95% CI 3.12, 15.7 (paediatricians; OR = 2.48, 95% CI 1.45, 4.24 (10 years working]. More than one third (38.4%, n = 164 had received small gifts such as pens, pencils and calendars; 12.4% (n = 53 had received sponsorship for training or conferences; and 15.9% (n = 68 had received free samples of infant formula from the Companies. Staff who were aware of the law were also more likely to report receiving gifts (OR = 1.64, 95% CI 1.08, 2.51 and free samples (OR = 1.86, 95% CI 1.09, 3.19. Conclusion Most hospital health professionals were unaware of national breastfeeding legislation in Pakistan, and infant formula companies were continuing to flout the ban on gifts, free samples and sponsorship for health staff.

  11. Code Cactus; Code Cactus

    Energy Technology Data Exchange (ETDEWEB)

    Fajeau, M; Nguyen, L T; Saunier, J [Commissariat a l' Energie Atomique, Centre d' Etudes Nucleaires de Saclay, 91 - Gif-sur-Yvette (France)

    1966-09-01

    This code handles the following problems: -1) Analysis of thermal experiments on a water loop at high or low pressure; steady state or transient behavior; -2) Analysis of thermal and hydrodynamic behavior of water-cooled and moderated reactors, at either high or low pressure, with boiling permitted; fuel elements are assumed to be flat plates: - Flowrate in parallel channels coupled or not by conduction across plates, with conditions of pressure drops or flowrate, variable or not with respect to time is given; the power can be coupled to reactor kinetics calculation or supplied by the code user. The code, containing a schematic representation of safety rod behavior, is a one dimensional, multi-channel code, and has as its complement (FLID), a one-channel, two-dimensional code. (authors) [French] Ce code permet de traiter les problemes ci-dessous: 1. Depouillement d'essais thermiques sur boucle a eau, haute ou basse pression, en regime permanent ou transitoire; 2. Etudes thermiques et hydrauliques de reacteurs a eau, a plaques, a haute ou basse pression, ebullition permise: - repartition entre canaux paralleles, couples on non par conduction a travers plaques, pour des conditions de debit ou de pertes de charge imposees, variables ou non dans le temps; - la puissance peut etre couplee a la neutronique et une representation schematique des actions de securite est prevue. Ce code (Cactus) a une dimension d'espace et plusieurs canaux, a pour complement Flid qui traite l'etude d'un seul canal a deux dimensions. (auteurs)

  12. Interactive Synthesis of Code Level Security Rules

    Science.gov (United States)

    2017-04-01

    Proceedings of the 9th ACM conference on Computer and communications security, pages 235–244. ACM, 2002. [19] J. Davis. Hacking of government computers...Inductive programming meets the real world. Communications of the ACM, 58(11):90–99, 2015. [24] S. Hallem, B. Chelf, Y. Xie, and D. Engler. A system and...Software Engineering, pages 462–473. ACM, 2015. [37] S. H. Muggleton, D. Lin, and A. Tamaddoni-Nezhad. Meta-interpretive learning of higher- order dyadic

  13. Methodological approaches based on business rules

    Directory of Open Access Journals (Sweden)

    Anca Ioana ANDREESCU

    2008-01-01

    Full Text Available Business rules and business processes are essential artifacts in defining the requirements of a software system. Business processes capture business behavior, while rules connect processes and thus control processes and business behavior. Traditionally, rules are scattered inside application code. This approach makes it very difficult to change rules and shorten the life cycle of the software system. Because rules change more quickly than the application itself, it is desirable to externalize the rules and move them outside the application. This paper analyzes and evaluates three well-known business rules approaches. It also outlines some critical factors that have to be taken into account in the decision to introduce business rules facilities in a software system. Based on the concept of explicit manipulation of business rules in a software system, the need for a general approach based on business rules is discussed.

  14. Code, standard and specifications

    International Nuclear Information System (INIS)

    Abdul Nassir Ibrahim; Azali Muhammad; Ab. Razak Hamzah; Abd. Aziz Mohamed; Mohamad Pauzi Ismail

    2008-01-01

    Radiography also same as the other technique, it need standard. This standard was used widely and method of used it also regular. With that, radiography testing only practical based on regulations as mentioned and documented. These regulation or guideline documented in code, standard and specifications. In Malaysia, level one and basic radiographer can do radiography work based on instruction give by level two or three radiographer. This instruction was produced based on guideline that mention in document. Level two must follow the specifications mentioned in standard when write the instruction. From this scenario, it makes clearly that this radiography work is a type of work that everything must follow the rule. For the code, the radiography follow the code of American Society for Mechanical Engineer (ASME) and the only code that have in Malaysia for this time is rule that published by Atomic Energy Licensing Board (AELB) known as Practical code for radiation Protection in Industrial radiography. With the existence of this code, all the radiography must follow the rule or standard regulated automatically.

  15. Coded-Wire Tag Expansion Factors for Chinook Salmon Carcass Surveys in California: Estimating the Numbers and Proportions of Hatchery-Origin Fish

    Directory of Open Access Journals (Sweden)

    Michael S. Mohr

    2013-12-01

    Full Text Available Recovery of fish with adipose fin clips (adc and coded-wire tags (cwt in escapement surveys allows calculation of expansion factors used in estimation of the total number of fish from each adc,cwt release group, allowing escapement to be resolved by age and stock of origin. Expanded recoveries are used to derive important estimates such as the total number and proportion of hatchery-origin fish present. The standard estimation scheme assumes accurate visual classification of adc status, which can be problematic for decomposing carcasses. Failure to account for this potential misclassification can lead to significant estimation bias. We reviewed sample expansion factors used for the California Central Valley Chinook salmon 2010 carcass surveys in this context. For upper Sacramento River fall-run and late fall-run carcass surveys, the estimated proportions of adc,cwt fish for fresh and non-fresh carcasses differed substantially, likely from the under-recognition of adc fish in non-fresh carcasses. The resulting estimated proportions of hatchery-origin fish in the upper Sacramento River fall-run and late fall-run carcass surveys were 2.33 to 2.89 times higher if only fresh carcasses are considered. Similar biases can be avoided by consideration of only fresh carcasses for which determination of adc status is relatively straightforward; however, restricting the analysis entirely to fresh carcasses may limit precision because of reduced sample size, and is only possible if protocols for sampling and recording data ensure that the sample data and results for fresh carcasses can be extracted. Thus we recommend sampling protocols that are clearly documented and separately track fresh versus non-fresh carcasses, either collecting only definitively adc fish or that carefully track non-fresh carcasses that are definitively adc versus those that are possibly adc. This would allow judicious use of non-fresh carcass data when sample sizes are otherwise

  16. Electronic Code of Federal Regulations

    Data.gov (United States)

    National Archives and Records Administration — The Electronic Code of Federal Regulations (e-CFR) is the codification of the general and permanent rules published in the Federal Register by the executive...

  17. 15 CFR 806.17 - Rules and regulations for BE-12, 2007 Benchmark Survey of Foreign Direct Investment in the United...

    Science.gov (United States)

    2010-01-01

    ... Benchmark Survey of Foreign Direct Investment in the United States. 806.17 Section 806.17 Commerce and... Survey of Foreign Direct Investment in the United States. A BE-12, Benchmark Survey of Foreign Direct... of the BE-12, 2007 Benchmark Survey of Foreign Direct Investment in the United States, contained in...

  18. Revised C++ coding conventions

    CERN Document Server

    Callot, O

    2001-01-01

    This document replaces the note LHCb 98-049 by Pavel Binko. After a few years of practice, some simplification and clarification of the rules was needed. As many more people have now some experience in writing C++ code, their opinion was also taken into account to get a commonly agreed set of conventions

  19. Health App Use Among Individuals With Symptoms of Depression and Anxiety: A Survey Study With Thematic Coding.

    Science.gov (United States)

    Rubanovich, Caryn Kseniya; Mohr, David C; Schueller, Stephen M

    2017-06-23

    Researchers have largely turned to commercial app stores, randomized trials, and systematic reviews to make sense of the mHealth landscape. Few studies have approached understanding by collecting information from target end users. The end user perspective is critical as end user interest in and use of mHealth technologies will ultimately drive the efficacy of these tools. The purpose of this study was to obtain information from end users of mHealth technologies to better understand the physical and mental health apps people use and for what purposes. People with depressive or anxious symptoms (N=176) seeking entry into a trial of mental health and well-being apps for Android devices completed online questionnaires assessing depression and anxiety (Patient Health Questionnaire-9 and Generalized Anxiety Disorder-7), past and current mental health treatment-seeking behavior, overall mobile device use, and use of mobile health apps. Participants reported the physical health and mental health apps on their devices and their reasons for using them. Data were extracted from the participant self-reports and apps and app purposes were coded in order to categorize them. Participants were largely white, middle-aged females from the Midwest region of the United States recruited via a health care organization and Web-based advertising (135 female, 41 male, mean age 38.64 years, age range 19-75 years.) Over three-quarters (137/176, 77.8%) of participants indicated having a health app on their device. The top 3 kinds of apps were exercise, fitness, and pedometers or heart rate monitoring apps (93/176, 52.8%); diet, food, or calorie counting apps (65/177, 36.9%); and mental health/wellness apps (46/177, 26.1%). The mean number of mobile physical and mental health apps on a participant's phone was 2.15 (SD 3.195). Of 176 participants, 107 (60.8%) specifically reported the top 5 health apps that they used and their purposes. Across the 107 participants, a total of 285 apps were

  20. The influence of work characteristics, emotional display rules and affectivity on burnout and job satisfaction: A survey among geriatric care workers.

    Science.gov (United States)

    Rouxel, Géraldine; Michinov, Estelle; Dodeler, Virginie

    2016-10-01

    Previous studies have demonstrated that geriatric care employees are exposed to a large number of factors that can affect their levels of job satisfaction and occupational stress. Although working with elderly people is emotionally demanding, little research has been done on the role played by perceptions of emotional display rules, alongside more traditional work characteristics and individual factors, in the prediction of geriatric care employees' wellbeing. The aim of the present study was to examine the role played by work characteristics (job demands, job control, emotional display rules) and individual (affectivity) factors to predict job satisfaction and burnout among French geriatric care nurses. Questionnaires were sent to 891 employees working in 32 geriatric care centers in France. A total of 371 valid questionnaires (response rate: 41.60%) were analyzed using structural equation modeling techniques. Results revealed two main processes of burnout and job satisfaction among women geriatric care workers, namely a salutogenic process and a pathogenic process. As expected, negative affectivity, low job status, perceived negative display rules and job demands are involved in the pathogenic process; while positive affectivity, perceived positive display rules and job control are implied in the salutogenic one. More specifically, as expected, negative affectivity is a positive predictor of burnout, both directly and indirectly through its impact on perceived negative display rules and job demands. Moreover, negative affectivity was negatively related to job satisfaction. Simultaneously, positive affectivity can predict job satisfaction, both directly and indirectly through its impact on perceived positive display rules and job control. Positive affectivity is also a negative predictor of burnout. Practical implications are discussed to support intervention programs that develop healthy workplaces, and also to inform nurses about how to manage emotional display

  1. 15 CFR 801.12 - Rules and regulations for the BE-140, Benchmark Survey of Insurance Transactions by U.S...

    Science.gov (United States)

    2010-01-01

    ...) BUREAU OF ECONOMIC ANALYSIS, DEPARTMENT OF COMMERCE SURVEY OF INTERNATIONAL TRADE IN SERVICES BETWEEN U.S... survey is intended to collect information on U.S. international insurance transactions. The types of...

  2. RFQ simulation code

    International Nuclear Information System (INIS)

    Lysenko, W.P.

    1984-04-01

    We have developed the RFQLIB simulation system to provide a means to systematically generate the new versions of radio-frequency quadrupole (RFQ) linac simulation codes that are required by the constantly changing needs of a research environment. This integrated system simplifies keeping track of the various versions of the simulation code and makes it practical to maintain complete and up-to-date documentation. In this scheme, there is a certain standard version of the simulation code that forms a library upon which new versions are built. To generate a new version of the simulation code, the routines to be modified or added are appended to a standard command file, which contains the commands to compile the new routines and link them to the routines in the library. The library itself is rarely changed. Whenever the library is modified, however, this modification is seen by all versions of the simulation code, which actually exist as different versions of the command file. All code is written according to the rules of structured programming. Modularity is enforced by not using COMMON statements, simplifying the relation of the data flow to a hierarchy diagram. Simulation results are similar to those of the PARMTEQ code, as expected, because of the similar physical model. Different capabilities, such as those for generating beams matched in detail to the structure, are available in the new code for help in testing new ideas in designing RFQ linacs

  3. Coding in pigeons: Multiple-coding versus single-code/default strategies.

    Science.gov (United States)

    Pinto, Carlos; Machado, Armando

    2015-05-01

    To investigate the coding strategies that pigeons may use in a temporal discrimination tasks, pigeons were trained on a matching-to-sample procedure with three sample durations (2s, 6s and 18s) and two comparisons (red and green hues). One comparison was correct following 2-s samples and the other was correct following both 6-s and 18-s samples. Tests were then run to contrast the predictions of two hypotheses concerning the pigeons' coding strategies, the multiple-coding and the single-code/default. According to the multiple-coding hypothesis, three response rules are acquired, one for each sample. According to the single-code/default hypothesis, only two response rules are acquired, one for the 2-s sample and a "default" rule for any other duration. In retention interval tests, pigeons preferred the "default" key, a result predicted by the single-code/default hypothesis. In no-sample tests, pigeons preferred the key associated with the 2-s sample, a result predicted by multiple-coding. Finally, in generalization tests, when the sample duration equaled 3.5s, the geometric mean of 2s and 6s, pigeons preferred the key associated with the 6-s and 18-s samples, a result predicted by the single-code/default hypothesis. The pattern of results suggests the need for models that take into account multiple sources of stimulus control. © Society for the Experimental Analysis of Behavior.

  4. Applications of American design codes for elevated temperature environment

    International Nuclear Information System (INIS)

    Severud, L.K.

    1980-03-01

    A brief summary of the ASME Code rules of Case N-47 is presented. An overview of the typical procedure used to demonstrate Code compliance is provided. Application experience and some examples of detailed inelastic analysis and simplified-approximate methods are given. Recent developments and future trends in design criteria and ASME Code rules are also presented

  5. Collaboration rules.

    Science.gov (United States)

    Evans, Philip; Wolf, Bob

    2005-01-01

    Corporate leaders seeking to boost growth, learning, and innovation may find the answer in a surprising place: the Linux open-source software community. Linux is developed by an essentially volunteer, self-organizing community of thousands of programmers. Most leaders would sell their grandmothers for workforces that collaborate as efficiently, frictionlessly, and creatively as the self-styled Linux hackers. But Linux is software, and software is hardly a model for mainstream business. The authors have, nonetheless, found surprising parallels between the anarchistic, caffeinated, hirsute world of Linux hackers and the disciplined, tea-sipping, clean-cut world of Toyota engineering. Specifically, Toyota and Linux operate by rules that blend the self-organizing advantages of markets with the low transaction costs of hierarchies. In place of markets' cash and contracts and hierarchies' authority are rules about how individuals and groups work together (with rigorous discipline); how they communicate (widely and with granularity); and how leaders guide them toward a common goal (through example). Those rules, augmented by simple communication technologies and a lack of legal barriers to sharing information, create rich common knowledge, the ability to organize teams modularly, extraordinary motivation, and high levels of trust, which radically lowers transaction costs. Low transaction costs, in turn, make it profitable for organizations to perform more and smaller transactions--and so increase the pace and flexibility typical of high-performance organizations. Once the system achieves critical mass, it feeds on itself. The larger the system, the more broadly shared the knowledge, language, and work style. The greater individuals' reputational capital, the louder the applause and the stronger the motivation. The success of Linux is evidence of the power of that virtuous circle. Toyota's success is evidence that it is also powerful in conventional companies.

  6. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, transparency, neutrality, impartiality, effectiveness, accountability, and legality. The normative context of public administration, as expressed in codes, seems to ignore the New Public Management and Reinventing Government reform movements....

  7. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  8. Australian road rules

    Science.gov (United States)

    2009-02-01

    *These are national-level rules. Australian Road Rules - 2009 Version, Part 18, Division 1, Rule 300 "Use of Mobile Phones" describes restrictions of mobile phone use while driving. The rule basically states that drivers cannot make or receive calls ...

  9. Choosing the rules: distinct and overlapping frontoparietal representations of task rules for perceptual decisions.

    Science.gov (United States)

    Zhang, Jiaxiang; Kriegeskorte, Nikolaus; Carlin, Johan D; Rowe, James B

    2013-07-17

    Behavior is governed by rules that associate stimuli with responses and outcomes. Human and monkey studies have shown that rule-specific information is widely represented in the frontoparietal cortex. However, it is not known how establishing a rule under different contexts affects its neural representation. Here, we use event-related functional MRI (fMRI) and multivoxel pattern classification methods to investigate the human brain's mechanisms of establishing and maintaining rules for multiple perceptual decision tasks. Rules were either chosen by participants or specifically instructed to them, and the fMRI activation patterns representing rule-specific information were compared between these contexts. We show that frontoparietal regions differ in the properties of their rule representations during active maintenance before execution. First, rule-specific information maintained in the dorsolateral and medial frontal cortex depends on the context in which it was established (chosen vs specified). Second, rule representations maintained in the ventrolateral frontal and parietal cortex are independent of the context in which they were established. Furthermore, we found that the rule-specific coding maintained in anticipation of stimuli may change with execution of the rule: representations in context-independent regions remain invariant from maintenance to execution stages, whereas rule representations in context-dependent regions do not generalize to execution stage. The identification of distinct frontoparietal systems with context-independent and context-dependent task rule representations, and the distinction between anticipatory and executive rule representations, provide new insights into the functional architecture of goal-directed behavior.

  10. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  11. Code of Ethics for Electrical Engineers

    Science.gov (United States)

    Matsuki, Junya

    The Institute of Electrical Engineers of Japan (IEEJ) has established the rules of practice for its members recently, based on its code of ethics enacted in 1998. In this paper, first, the characteristics of the IEEJ 1998 ethical code are explained in detail compared to the other ethical codes for other fields of engineering. Secondly, the contents which shall be included in the modern code of ethics for electrical engineers are discussed. Thirdly, the newly-established rules of practice and the modified code of ethics are presented. Finally, results of questionnaires on the new ethical code and rules which were answered on May 23, 2007, by 51 electrical and electronic students of the University of Fukui are shown.

  12. IE Information Notice No. 85-33: Undersized nozzle-to-shell welded joints in tanks and heat exchangers constructed under the rules of the ASME boiler and vessel code

    International Nuclear Information System (INIS)

    Jordan, E.L.

    1993-01-01

    During the CAT (Construction Appraisal Team) inspections conducted at the River Bend, Shearon Harris, and Braidwood nuclear power projects, the NRC identified undersized nozzle-to-shell welded joints (ASME Category D joints) in tanks and heat exchangers manufactured by various vendors. Specifically, four main steam isolation valve air accumulator tanks were found to have undersized nozzle-to-shell joints at the River Bend plant; seven tanks were found to have undersized nozzle-to-shell weld reinforcements at the Shearon Harris Station; eight tanks and two heat exchangers were found to have undersized nozzle-to-shell weld reinforcements at Braidwood Station. These tanks and heat exchangers were Code stamped and certified as being constructed in accordance with the requirements of the ASME Code. The ASME Code, Section III (NX-3352.4) requires that nozzle-to-shell welded joints have reinforcement (t c ) of 0.7t p or 1/4 inch, whichever is less, where t p is the thickness of the penetrating part. Some of the inspected welded joints did not have the minimum weld reinforcement (t c ) required by the Code. Other joints had the minimum weld reinforcement (t c ) required by the Code, but were found to be undersized with respect to the sizes specified on the applicable construction drawings

  13. Pump Component Model in SPACE Code

    International Nuclear Information System (INIS)

    Kim, Byoung Jae; Kim, Kyoung Doo

    2010-08-01

    This technical report describes the pump component model in SPACE code. A literature survey was made on pump models in existing system codes. The models embedded in SPACE code were examined to check the confliction with intellectual proprietary rights. Design specifications, computer coding implementation, and test results are included in this report

  14. Code of Federal Regulations in XML

    Data.gov (United States)

    National Archives and Records Administration — The Code of Federal Regulations (CFR) is the codification of the general and permanent rules published in the Federal Register by the executive departments and...

  15. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...

  16. Atlas C++ Coding Standard Specification

    CERN Document Server

    Albrand, S; Barberis, D; Bosman, M; Jones, B; Stavrianakou, M; Arnault, C; Candlin, D; Candlin, R; Franck, E; Hansl-Kozanecka, Traudl; Malon, D; Qian, S; Quarrie, D; Schaffer, R D

    2001-01-01

    This document defines the ATLAS C++ coding standard, that should be adhered to when writing C++ code. It has been adapted from the original "PST Coding Standard" document (http://pst.cern.ch/HandBookWorkBook/Handbook/Programming/programming.html) CERN-UCO/1999/207. The "ATLAS standard" comprises modifications, further justification and examples for some of the rules in the original PST document. All changes were discussed in the ATLAS Offline Software Quality Control Group and feedback from the collaboration was taken into account in the "current" version.

  17. Translating Answers to Open-Ended Survey Questions in Cross-Cultural Research: A Case Study on the Interplay between Translation, Coding, and Analysis

    Science.gov (United States)

    Behr, Dorothée

    2015-01-01

    Open-ended probing questions in cross-cultural surveys help uncover equivalence problems in cross-cultural survey research. For languages that a project team does not understand, probe answers need to be translated into a common project language. This article presents a case study on translating open-ended, that is, narrative answers. It describes…

  18. Is integrative use of techniques in psychotherapy the exception or the rule? Results of a national survey of doctoral-level practitioners.

    Science.gov (United States)

    Thoma, Nathan C; Cecero, John J

    2009-12-01

    This study sought to investigate the extent to which therapists endorse techniques outside of their self-identified orientation and which techniques are endorsed across orientations. A survey consisting of 127 techniques from 8 major theories of psychotherapy was administered via U.S. mail to a national random sample of doctoral-level psychotherapy practitioners. The 201 participants endorsed substantial numbers of techniques from outside their respective orientations. Many of these techniques were quite different from those of the core theories of the respective orientations. Further examining when and why experienced practitioners switch to techniques outside their primary orientation may help reveal where certain techniques fall short and where others excel, indicating a need for further research that taps the collective experience of practitioners. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  19. Is rule of halves still an occurrence in South India: Findings from community-based survey in a selected urban area of Puducherry

    Directory of Open Access Journals (Sweden)

    S S Kar

    2017-01-01

    Full Text Available Background: The objective of the present study was to assess the applicability of the rule of halves in an urban population of Puducherry, South India. We also aimed to find the correlates associated with undiagnosed hypertension to facilitate targeted screening. Methodology: We derive our observation from a community-based cross-sectional study conducted using the World Health Organization STEPwise approach to surveillance in urban slum of Puducherry during 2014–15. Blood pressure (BP was measured for all the study subjects (n = 2399, and the subjects were classified as hypertensive using Joint National Committee 8 criteria, systolic BP (SBP ≥140 mm Hg and/or diastolic BP (DBP ≥90 mmHg and/or known hypertensives and/or treatment with antihypertensive drugs. Controlled hypertension was defined as SBP <140 mmHg and DBP <90 mmHg. Results: Of 2399, 799 (33.3%; 95% confidence interval [CI]: 31.4%–35.2% adults were found to have raised BP by any means (known and unknown hypertensives. Of the 799, 367 (15.3%; 95%CI: 13.9%–16.8% of study participants were known hypertensives. Of the known hypertensives, 74.7% (274/367 were put on treatment (drugs and or lifestyle modification, and 80% (218/274 were on regular treatment. Higher proportions of men were found to have undiagnosed hypertension compared to women (26.1 vs. 19.8%, P < 0.001. Similarly, adult from below poverty line (23.8 vs. 20%, P < 0.001, unskilled laborer (26.6 vs. 20%, P < 0.001, and literacy less than middle school (12.3 vs. 23%, P < 0.001 had more undiagnosed hypertension. Conclusion: In the selected urban area of Puducherry around one-third of the adult populations are having hypertension, including the 54% of undiagnosed hypertension. Adults from the vulnerable subgroups such as lower level of literacy, below poverty line, and unskilled work are found to have higher proportions of undiagnosed hypertension.

  20. Ethical codes in business practice

    OpenAIRE

    Kobrlová, Marie

    2013-01-01

    The diploma thesis discusses the issues of ethics and codes of ethics in business. The theoretical part defines basic concepts of ethics, presents its historical development and the methods and tools of business ethics. It also focuses on ethical codes and the area of law and ethics. The practical part consists of a quantitative survey, which provides views of selected business entities of business ethics and the use of codes of ethics in practice.

  1. Organisational Rules in Schools: Teachers' Opinions about Functions of Rules, Rule-Following and Breaking Behaviours in Relation to Their Locus of Control

    Science.gov (United States)

    Demirkasimoglu, Nihan; Aydin, Inayet; Erdogan, Cetin; Akin, Ugur

    2012-01-01

    The main aim of this research is to examine teachers' opinions about functions of school rules, reasons for rule-breaking and results of rule-breaking in relation to their locus of control, gender, age, seniority and branch. 350 public elementary school teachers in Ankara are included in the correlational survey model study. According to the…

  2. Coding Labour

    Directory of Open Access Journals (Sweden)

    Anthony McCosker

    2014-03-01

    Full Text Available As well as introducing the Coding Labour section, the authors explore the diffusion of code across the material contexts of everyday life, through the objects and tools of mediation, the systems and practices of cultural production and organisational management, and in the material conditions of labour. Taking code beyond computation and software, their specific focus is on the increasingly familiar connections between code and labour with a focus on the codification and modulation of affect through technologies and practices of management within the contemporary work organisation. In the grey literature of spreadsheets, minutes, workload models, email and the like they identify a violence of forms through which workplace affect, in its constant flux of crisis and ‘prodromal’ modes, is regulated and governed.

  3. Rulemaking efforts on codes and standards

    International Nuclear Information System (INIS)

    Millman, G.C.

    1992-01-01

    Section 50.55a of the NRC regulations provides a mechanism for incorporating national codes and standards into the regulatory process. It incorporates by reference ASME Boiler and Pressure Vessel Code (ASME B and PV Code) Section 3 rules for construction and Section 11 rules for inservice inspection and inservice testing. The regulation is periodically amended to update these references. The rulemaking process, as applied to Section 50.55a amendments, is overviewed to familiarize users with associated internal activities of the NRC staff and the manner in which public comments are integrated into the process. The four ongoing rulemaking actions that would individually amend Section 50.55a are summarized. Two of the actions would directly impact requirements for inservice testing. Benefits accrued with NRC endorsement of the ASME B and PV Code, and possible future endorsement of the ASME Operations and Maintenance Code (ASME OM Code), are identified. Emphasis is placed on the need for code writing committees to be especially sensitive to user feedback on code rules incorporated into the regulatory process to ensure that the rules are complete, technically accurate, clear, practical, and enforceable

  4. The merchant shipping (dangerous goods) (amendment) rules 1980 No. 789

    International Nuclear Information System (INIS)

    1980-01-01

    These Rules amend the Merchant Shipping Rules 1978 and revoke the Merchant Shipping (Dangerous Goods) (Amendment) Rules 1979. The purpose of this amendment is to update the references to the 1978 Report of the Department of Trade's Standing Advisory Committee on the Carriage of Dangerous Goods in Ships (the Blue Book) and the 1977 Edition of the International Maritime Dangerous Goods Code of IMCO (the IMDG Code), referred to in the 1978 Rules. The amendments concern, inter alia, marking of packages on board ship which contain dangerous goods, including radioactive materials (NEA) [fr

  5. Nondestructive testing standards and the ASME code

    International Nuclear Information System (INIS)

    Spanner, J.C.

    1991-04-01

    Nondestructive testing (NDT) requirements and standards are an important part of the ASME Boiler and Pressure Vessel Code. In this paper, the evolution of these requirements and standards is reviewed in the context of the unique technical and legal stature of the ASME Code. The coherent and consistent manner by which the ASME Code rules are organized is described, and the interrelationship between the various ASME Code sections, the piping codes, and the ASTM Standards is discussed. Significant changes occurred in ASME Sections 5 and 11 during the 1980s, and these are highlighted along with projections and comments regarding future trends and changes in these important documents. 4 refs., 8 tabs

  6. Fatigue and rupture codified rules comparison

    International Nuclear Information System (INIS)

    Faidy, C.

    2004-01-01

    The European Directive on Pressure Equipment requests risk studies and in particular to assure no risk of fatigue and rupture in operation. The answers to these questions are different in the different existing design codes (EN Standards, ASME III and VIII or RCC-M or CODAP-CODETI codes) and corresponding in operation codes (ASME or RSE-M). Design safety factors, material properties, fabrication, refinement in the analysis methods, monitoring in operation, hydro-proof test level... Around these Codes, different rules are under development. A16 in France, R6 in UK or FITNET at the EC level. This paper is concerned by a comparison between 2 different Codes to analyze the risk of fatigue or rupture of pressure equipments and mainly a comparison between RCC-M Code and EN 13445 standard for pressure vessel. Recommendations for future work will be proposed. (authors)

  7. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  8. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe ...

  9. FeynRules - Feynman rules made easy

    OpenAIRE

    Christensen, Neil D.; Duhr, Claude

    2008-01-01

    In this paper we present FeynRules, a new Mathematica package that facilitates the implementation of new particle physics models. After the user implements the basic model information (e.g. particle content, parameters and Lagrangian), FeynRules derives the Feynman rules and stores them in a generic form suitable for translation to any Feynman diagram calculation program. The model can then be translated to the format specific to a particular Feynman diagram calculator via F...

  10. Delayed rule following

    OpenAIRE

    Schmitt, David R.

    2001-01-01

    Although the elements of a fully stated rule (discriminative stimulus [SD], some behavior, and a consequence) can occur nearly contemporaneously with the statement of the rule, there is often a delay between the rule statement and the SD. The effects of this delay on rule following have not been studied in behavior analysis, but they have been investigated in rule-like settings in the areas of prospective memory (remembering to do something in the future) and goal pursuit. Discriminative even...

  11. Design and operation of ventilation in low energy residences – A survey on code requirements and building reality from six European countries and China

    DEFF Research Database (Denmark)

    del Carmen Bocanegra-Yanez, Maria; Rojas, Gabriel; Zukowska-Tejsen, Daria

    involved in the Annex. There were two main objectives, firstly, to describe and analyse a transition between actual requirements (national building codes and standards) and current practice. Secondly, to investigate current barriers and challenges regarding installation of mechanical ventilation......One of the key objectives of the IEA Annex 68 research programme entitled “Indoor Air Quality Design and Control in Low Energy Residential Buildings” is to provide a generic guideline for the design and operation of ventilation in residential buildings. Modern and refurnished domestic buildings...

  12. Aztheca Code

    International Nuclear Information System (INIS)

    Quezada G, S.; Espinosa P, G.; Centeno P, J.; Sanchez M, H.

    2017-09-01

    This paper presents the Aztheca code, which is formed by the mathematical models of neutron kinetics, power generation, heat transfer, core thermo-hydraulics, recirculation systems, dynamic pressure and level models and control system. The Aztheca code is validated with plant data, as well as with predictions from the manufacturer when the reactor operates in a stationary state. On the other hand, to demonstrate that the model is applicable during a transient, an event occurred in a nuclear power plant with a BWR reactor is selected. The plant data are compared with the results obtained with RELAP-5 and the Aztheca model. The results show that both RELAP-5 and the Aztheca code have the ability to adequately predict the behavior of the reactor. (Author)

  13. Vocable Code

    DEFF Research Database (Denmark)

    Soon, Winnie; Cox, Geoff

    2018-01-01

    a computational and poetic composition for two screens: on one of these, texts and voices are repeated and disrupted by mathematical chaos, together exploring the performativity of code and language; on the other, is a mix of a computer programming syntax and human language. In this sense queer code can...... be understood as both an object and subject of study that intervenes in the world’s ‘becoming' and how material bodies are produced via human and nonhuman practices. Through mixing the natural and computer language, this article presents a script in six parts from a performative lecture for two persons...

  14. NSURE code

    International Nuclear Information System (INIS)

    Rattan, D.S.

    1993-11-01

    NSURE stands for Near-Surface Repository code. NSURE is a performance assessment code. developed for the safety assessment of near-surface disposal facilities for low-level radioactive waste (LLRW). Part one of this report documents the NSURE model, governing equations and formulation of the mathematical models, and their implementation under the SYVAC3 executive. The NSURE model simulates the release of nuclides from an engineered vault, their subsequent transport via the groundwater and surface water pathways tot he biosphere, and predicts the resulting dose rate to a critical individual. Part two of this report consists of a User's manual, describing simulation procedures, input data preparation, output and example test cases

  15. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  16. Coding Class

    DEFF Research Database (Denmark)

    Ejsing-Duun, Stine; Hansbøl, Mikala

    Denne rapport rummer evaluering og dokumentation af Coding Class projektet1. Coding Class projektet blev igangsat i skoleåret 2016/2017 af IT-Branchen i samarbejde med en række medlemsvirksomheder, Københavns kommune, Vejle Kommune, Styrelsen for IT- og Læring (STIL) og den frivillige forening...... Coding Pirates2. Rapporten er forfattet af Docent i digitale læringsressourcer og forskningskoordinator for forsknings- og udviklingsmiljøet Digitalisering i Skolen (DiS), Mikala Hansbøl, fra Institut for Skole og Læring ved Professionshøjskolen Metropol; og Lektor i læringsteknologi, interaktionsdesign......, design tænkning og design-pædagogik, Stine Ejsing-Duun fra Forskningslab: It og Læringsdesign (ILD-LAB) ved Institut for kommunikation og psykologi, Aalborg Universitet i København. Vi har fulgt og gennemført evaluering og dokumentation af Coding Class projektet i perioden november 2016 til maj 2017...

  17. Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the objectives, meeting goals and overall NASA goals for the NASA Data Standards Working Group. The presentation includes information on the technical progress surrounding the objective, short LDPC codes, and the general results on the Pu-Pw tradeoff.

  18. ANIMAL code

    International Nuclear Information System (INIS)

    Lindemuth, I.R.

    1979-01-01

    This report describes ANIMAL, a two-dimensional Eulerian magnetohydrodynamic computer code. ANIMAL's physical model also appears. Formulated are temporal and spatial finite-difference equations in a manner that facilitates implementation of the algorithm. Outlined are the functions of the algorithm's FORTRAN subroutines and variables

  19. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621 ...

  20. MCNP code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The MCNP code is the major Monte Carlo coupled neutron-photon transport research tool at the Los Alamos National Laboratory, and it represents the most extensive Monte Carlo development program in the United States which is available in the public domain. The present code is the direct descendent of the original Monte Carlo work of Fermi, von Neumaum, and Ulam at Los Alamos in the 1940s. Development has continued uninterrupted since that time, and the current version of MCNP (or its predecessors) has always included state-of-the-art methods in the Monte Carlo simulation of radiation transport, basic cross section data, geometry capability, variance reduction, and estimation procedures. The authors of the present code have oriented its development toward general user application. The documentation, though extensive, is presented in a clear and simple manner with many examples, illustrations, and sample problems. In addition to providing the desired results, the output listings give a a wealth of detailed information (some optional) concerning each state of the calculation. The code system is continually updated to take advantage of advances in computer hardware and software, including interactive modes of operation, diagnostic interrupts and restarts, and a variety of graphical and video aids

  1. Expander Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 10; Issue 1. Expander Codes - The Sipser–Spielman Construction. Priti Shankar. General Article Volume 10 ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science Bangalore 560 012, India.

  2. Whitelisting and the Rule of Law

    DEFF Research Database (Denmark)

    Leander, Anna

    2016-01-01

    Leander’s chapter argues that whitelists in commercial security are establishing and consolidating a rule of law marked by managerialism. It closely describes the significance of the mundane, seemingly innocuous whitelists. Whitelists have proliferated as part of governance through Codes of Condu...

  3. Boiling water reactors with uranium-plutonium mixed oxide fuel. Report 2: A survey of the accuracy of the Studsvik of America CMS codes

    International Nuclear Information System (INIS)

    Demaziere, C.

    1999-02-01

    This report is a part of the project titled 'Boiling Water Reactors With Uranium-Plutonium Mixed Oxide (MOx) Fuel'. The aim of this study is to model the impact of a core loading pattern containing MOx bundles upon the main characteristics of a BWR (reactivity coefficients, stability, etc.). The tools that are available to perform a modeling in the Department of Reactor Physics in Chalmers are CASMO-4/TABLES-3/SIMULATE-3 from Studsvik of America. Thus, before performing any kind of calculation with MOx fuels, it is necessary to be able to establish the reliability and the accuracy of these Core Management System (CMS) codes. This report presents a quantitative analysis of the models used in the package. A qualitative presentation is realized in a coming report

  4. Polar Codes

    Science.gov (United States)

    2014-12-01

    independently has a 10% chance of being flipped. Then the decoder should use the majority vote rule: if y is (0, 0, 0), (0, 0, 1), (0, 1, 0), or (1, 0, 0... tensor power, and BN is a square matrix called the bit-reversal operator. Therefore G−1N = (F ⊗n) −1 B−1N . Section VII.B of [1] shows that B −1 N...BN . 18 Also we see by direct computation that FF = I2. Using the tensor product identity (AC) ⊗ (BD) = (A⊗B)(C⊗D), we get that (F ⊗F )(F ⊗F ) = I2

  5. Response to FESAC survey, non-fusion connections to Fusion Energy Sciences. Applications of the FES-supported beam and plasma simulation code, Warp

    Energy Technology Data Exchange (ETDEWEB)

    Friedman, A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Grote, D. P. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Vay, J. L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-05-29

    The Fusion Energy Sciences Advisory Committee’s subcommittee on non-fusion applications (FESAC NFA) is conducting a survey to obtain information from the fusion community about non-fusion work that has resulted from their DOE-funded fusion research. The subcommittee has requested that members of the community describe recent developments connected to the activities of the DOE Office of Fusion Energy Sciences. Two questions in particular were posed by the subcommittee. This document contains the authors’ responses to those questions.

  6. Panda code

    International Nuclear Information System (INIS)

    Altomare, S.; Minton, G.

    1975-02-01

    PANDA is a new two-group one-dimensional (slab/cylinder) neutron diffusion code designed to replace and extend the FAB series. PANDA allows for the nonlinear effects of xenon, enthalpy and Doppler. Fuel depletion is allowed. PANDA has a completely general search facility which will seek criticality, maximize reactivity, or minimize peaking. Any single parameter may be varied in a search. PANDA is written in FORTRAN IV, and as such is nearly machine independent. However, PANDA has been written with the present limitations of the Westinghouse CDC-6600 system in mind. Most computation loops are very short, and the code is less than half the useful 6600 memory size so that two jobs can reside in the core at once. (auth)

  7. Phonological reduplication in sign language: rules rule

    Directory of Open Access Journals (Sweden)

    Iris eBerent

    2014-06-01

    Full Text Available Productivity—the hallmark of linguistic competence—is typically attributed to algebraic rules that support broad generalizations. Past research on spoken language has documented such generalizations in both adults and infants. But whether algebraic rules form part of the linguistic competence of signers remains unknown. To address this question, here we gauge the generalization afforded by American Sign Language (ASL. As a case study, we examine reduplication (X→XX—a rule that, inter alia, generates ASL nouns from verbs. If signers encode this rule, then they should freely extend it to novel syllables, including ones with features that are unattested in ASL. And since reduplicated disyllables are preferred in ASL, such rule should favor novel reduplicated signs. Novel reduplicated signs should thus be preferred to nonreduplicative controls (in rating, and consequently, such stimuli should also be harder to classify as nonsigns (in the lexical decision task. The results of four experiments support this prediction. These findings suggest that the phonological knowledge of signers includes powerful algebraic rules. The convergence between these conclusions and previous evidence for phonological rules in spoken language suggests that the architecture of the phonological mind is partly amodal.

  8. CANAL code

    International Nuclear Information System (INIS)

    Gara, P.; Martin, E.

    1983-01-01

    The CANAL code presented here optimizes a realistic iron free extraction channel which has to provide a given transversal magnetic field law in the median plane: the current bars may be curved, have finite lengths and cooling ducts and move in a restricted transversal area; terminal connectors may be added, images of the bars in pole pieces may be included. A special option optimizes a real set of circular coils [fr

  9. A Better Budget Rule

    Science.gov (United States)

    Dothan, Michael; Thompson, Fred

    2009-01-01

    Debt limits, interest coverage ratios, one-off balanced budget requirements, pay-as-you-go rules, and tax and expenditure limits are among the most important fiscal rules for constraining intertemporal transfers. There is considerable evidence that the least costly and most effective of such rules are those that focus directly on the rate of…

  10. New Safety rules

    CERN Multimedia

    Safety Commission

    2008-01-01

    The revision of CERN Safety rules is in progress and the following new Safety rules have been issued on 15-04-2008: Safety Procedure SP-R1 Establishing, Updating and Publishing CERN Safety rules: http://cern.ch/safety-rules/SP-R1.htm; Safety Regulation SR-S Smoking at CERN: http://cern.ch/safety-rules/SR-S.htm; Safety Regulation SR-M Mechanical Equipment: http://cern.ch/safety-rules/SR-M.htm; General Safety Instruction GSI-M1 Standard Lifting Equipment: http://cern.ch/safety-rules/GSI-M1.htm; General Safety Instruction GSI-M2 Standard Pressure Equipment: http://cern.ch/safety-rules/GSI-M2.htm; General Safety Instruction GSI-M3 Special Mechanical Equipment: http://cern.ch/safety-rules/GSI-M3.htm. These documents apply to all persons under the Director General’s authority. All Safety rules are available at the web page: http://www.cern.ch/safety-rules The Safety Commission

  11. Building Codes

    DEFF Research Database (Denmark)

    Rindel, Jens Holger; Rasmussen, Birgit

    1996-01-01

    A state-of-the-art survey concerning acoustic conditions in dwellings has been carried out in 1994. A review of existing investigations related to subjective and/or objective evaluation of dwellings was done, and several countries were contacted to get up-to-date information about the legal acous...

  12. Action Rules Mining

    CERN Document Server

    Dardzinska, Agnieszka

    2013-01-01

    We are surrounded by data, numerical, categorical and otherwise, which must to be analyzed and processed to convert it into information that instructs, answers or aids understanding and decision making. Data analysts in many disciplines such as business, education or medicine, are frequently asked to analyze new data sets which are often composed of numerous tables possessing different properties. They try to find completely new correlations between attributes and show new possibilities for users.   Action rules mining discusses some of data mining and knowledge discovery principles and then describe representative concepts, methods and algorithms connected with action. The author introduces the formal definition of action rule, notion of a simple association action rule and a representative action rule, the cost of association action rule, and gives a strategy how to construct simple association action rules of a lowest cost. A new approach for generating action rules from datasets with numerical attributes...

  13. 18 CFR 385.104 - Rule of construction (Rule 104).

    Science.gov (United States)

    2010-04-01

    ... Definitions § 385.104 Rule of construction (Rule 104). To the extent that the text of a rule is inconsistent with its caption, the text of the rule controls. [Order 376, 49 FR 21705, May 23, 1984] ...

  14. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  15. Definition of Business Rules Using Business Vocabulary and Semantics

    Directory of Open Access Journals (Sweden)

    Roman Hypský

    2017-12-01

    Full Text Available This paper discusses the definition of business rules using business vocabulary and semantics. At the beginning business rules, business vocabulary and semantics of business rules are specified. There is also outlined the current state of research on this topic. Then the definition and formalization of business rules using semantics and business vocabulary is described. Based on these proposed procedures was created a tool that implements and simulate these processes. The main advantage of this tool is “Business Rules Layer”, which implements business rules into the system but is separated from this system. Source code of the rules and the system are not mixed together. Finally, the results are evaluated and future development is suggested.

  16. Single neurons in prefrontal cortex encode abstract rules.

    Science.gov (United States)

    Wallis, J D; Anderson, K C; Miller, E K

    2001-06-21

    The ability to abstract principles or rules from direct experience allows behaviour to extend beyond specific circumstances to general situations. For example, we learn the 'rules' for restaurant dining from specific experiences and can then apply them in new restaurants. The use of such rules is thought to depend on the prefrontal cortex (PFC) because its damage often results in difficulty in following rules. Here we explore its neural basis by recording from single neurons in the PFC of monkeys trained to use two abstract rules. They were required to indicate whether two successively presented pictures were the same or different depending on which rule was currently in effect. The monkeys performed this task with new pictures, thus showing that they had learned two general principles that could be applied to stimuli that they had not yet experienced. The most prevalent neuronal activity observed in the PFC reflected the coding of these abstract rules.

  17. Update on ASME rules for spent nuclear fuel and high level radioactive material and waste storage containments

    International Nuclear Information System (INIS)

    Ralph S. Hill III; Foster, G.M.

    2005-01-01

    In 2004, a new Code Case, N-717, of the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Code (Code) was published. The Code Case provides rules for construction of containments used for storage of spent nuclear fuel and high level radioactive material and waste. The Code Case has been incorporated into Section III of the Code as Division 3, Subsection WC, Class SC Storage Containments, and will be published in the 2005 Addenda. This paper provides an informative background and insight for these rules to provide Owners, regulators, designers, and fabricators with a more comprehensive understanding of the technical basis for these rules. (authors)

  18. Code-Mixing and Code Switchingin The Process of Learning

    Directory of Open Access Journals (Sweden)

    Diyah Atiek Mustikawati

    2016-09-01

    Full Text Available This study aimed to describe a form of code switching and code mixing specific form found in the teaching and learning activities in the classroom as well as determining factors influencing events stand out that form of code switching and code mixing in question.Form of this research is descriptive qualitative case study which took place in Al Mawaddah Boarding School Ponorogo. Based on the analysis and discussion that has been stated in the previous chapter that the form of code mixing and code switching learning activities in Al Mawaddah Boarding School is in between the use of either language Java language, Arabic, English and Indonesian, on the use of insertion of words, phrases, idioms, use of nouns, adjectives, clauses, and sentences. Code mixing deciding factor in the learning process include: Identification of the role, the desire to explain and interpret, sourced from the original language and its variations, is sourced from a foreign language. While deciding factor in the learning process of code, includes: speakers (O1, partners speakers (O2, the presence of a third person (O3, the topic of conversation, evoke a sense of humour, and just prestige. The significance of this study is to allow readers to see the use of language in a multilingual society, especially in AL Mawaddah boarding school about the rules and characteristics variation in the language of teaching and learning activities in the classroom. Furthermore, the results of this research will provide input to the ustadz / ustadzah and students in developing oral communication skills and the effectiveness of teaching and learning strategies in boarding schools.

  19. Multiuser Random Coding Techniques for Mismatched Decoding

    OpenAIRE

    Scarlett, Jonathan; Martinez, Alfonso; Guillén i Fàbregas, Albert

    2016-01-01

    This paper studies multiuser random coding techniques for channel coding with a given (possibly suboptimal) decoding rule. For the mismatched discrete memoryless multiple-access channel, an error exponent is obtained that is tight with respect to the ensemble average, and positive within the interior of Lapidoth's achievable rate region. This exponent proves the ensemble tightness of the exponent of Liu and Hughes in the case of maximum-likelihood decoding. An equivalent dual form of Lapidoth...

  20. Technical rules in law

    Energy Technology Data Exchange (ETDEWEB)

    Debelius, J

    1978-08-01

    An important source of knowledge for technical experts is the state of the art reflected by catalogues of technical rules. Technical rules may also achieve importance in law due to a legal transformation standard. Here, rigid and flexible reference are controversial with regard to their admissibility from the point of view of constitutional law. In case of a divergence from the generally accepted technical rules, it is assumed - refutably - that the necessary care had not been taken. Technical rules are one out of several sources of information; they have no normative effect. This may result in a duty of anyone applying them to review the state of technology himself.

  1. Technical rules in law

    International Nuclear Information System (INIS)

    Debelius, J.

    1978-01-01

    An important source of knowledge for technical experts is the state of the art reflected by catalogues of technical rules. Technical rules may also achieve importance in law due to a legal transformation standard. Here, rigid and flexible reference are controversial with regard to their admissibility from the point of view of constitutional law. In case of a divergence from the generally accepted technical rules, it is assumed - refutably - that the necessary care had not been taken. Technical rules are one out of several sources of information; they have no normative effect. This may result in a duty of anyone applying them to review the state of technology himself. (orig.) [de

  2. Class Association Rule Pada Metode Associative Classification

    Directory of Open Access Journals (Sweden)

    Eka Karyawati

    2011-11-01

    Full Text Available Frequent patterns (itemsets discovery is an important problem in associative classification rule mining.  Differents approaches have been proposed such as the Apriori-like, Frequent Pattern (FP-growth, and Transaction Data Location (Tid-list Intersection algorithm. This paper focuses on surveying and comparing the state of the art associative classification techniques with regards to the rule generation phase of associative classification algorithms.  This phase includes frequent itemsets discovery and rules mining/extracting methods to generate the set of class association rules (CARs.  There are some techniques proposed to improve the rule generation method.  A technique by utilizing the concepts of discriminative power of itemsets can reduce the size of frequent itemset.  It can prune the useless frequent itemsets. The closed frequent itemset concept can be utilized to compress the rules to be compact rules.  This technique may reduce the size of generated rules.  Other technique is in determining the support threshold value of the itemset. Specifying not single but multiple support threshold values with regard to the class label frequencies can give more appropriate support threshold value.  This technique may generate more accurate rules. Alternative technique to generate rule is utilizing the vertical layout to represent dataset.  This method is very effective because it only needs one scan over dataset, compare with other techniques that need multiple scan over dataset.   However, one problem with these approaches is that the initial set of tid-lists may be too large to fit into main memory. It requires more sophisticated techniques to compress the tid-lists.

  3. EPR-technical codes - a common basis for the EPR

    International Nuclear Information System (INIS)

    Zaiss, W.; Appell, B.

    1997-01-01

    The design and construction of Nuclear Power Plants implies a full set of codes and standards to define the construction rules of components and equipment. Rules are existing and are currently implemented, respectively in France and Germany (mainly RCCs and KTA safety standards). In the frame of the EPR-project, the common objective requires an essential industrial work programme between engineers from both countries to elaborate a common set of codes and regulations. These new industrial rules are called the ETCs (EPR Technical Codes). In the hierarchy the ETCs are - in case of France - on the common level of basic safety rules (RFS), design and construction rules (RCC) and - in Germany - belonging to RSK guidelines and KTA safety standards. A set of six ETCs will be elaborated to cover: safety and process, mechanical components, electrical equipment, instrumentation and control, civil works, fire protection. (orig.)

  4. Strategy as simple rules.

    Science.gov (United States)

    Eisenhardt, K M; Sull, D N

    2001-01-01

    The success of Yahoo!, eBay, Enron, and other companies that have become adept at morphing to meet the demands of changing markets can't be explained using traditional thinking about competitive strategy. These companies have succeeded by pursuing constantly evolving strategies in market spaces that were considered unattractive according to traditional measures. In this article--the third in an HBR series by Kathleen Eisenhardt and Donald Sull on strategy in the new economy--the authors ask, what are the sources of competitive advantage in high-velocity markets? The secret, they say, is strategy as simple rules. The companies know that the greatest opportunities for competitive advantage lie in market confusion, but they recognize the need for a few crucial strategic processes and a few simple rules. In traditional strategy, advantage comes from exploiting resources or stable market positions. In strategy as simple rules, advantage comes from successfully seizing fleeting opportunities. Key strategic processes, such as product innovation, partnering, or spinout creation, place the company where the flow of opportunities is greatest. Simple rules then provide the guidelines within which managers can pursue such opportunities. Simple rules, which grow out of experience, fall into five broad categories: how- to rules, boundary conditions, priority rules, timing rules, and exit rules. Companies with simple-rules strategies must follow the rules religiously and avoid the temptation to change them too frequently. A consistent strategy helps managers sort through opportunities and gain short-term advantage by exploiting the attractive ones. In stable markets, managers rely on complicated strategies built on detailed predictions of the future. But when business is complicated, strategy should be simple.

  5. Rules, culture, and fitness.

    Science.gov (United States)

    Baum, W M

    1995-01-01

    Behavior analysis risks intellectual isolation unless it integrates its explanations with evolutionary theory. Rule-governed behavior is an example of a topic that requires an evolutionary perspective for a full understanding. A rule may be defined as a verbal discriminative stimulus produced by the behavior of a speaker under the stimulus control of a long-term contingency between the behavior and fitness. As a discriminative stimulus, the rule strengthens listener behavior that is reinforced in the short run by socially mediated contingencies, but which also enters into the long-term contingency that enhances the listener's fitness. The long-term contingency constitutes the global context for the speaker's giving the rule. When a rule is said to be "internalized," the listener's behavior has switched from short- to long-term control. The fitness-enhancing consequences of long-term contingencies are health, resources, relationships, or reproduction. This view ties rules both to evolutionary theory and to culture. Stating a rule is a cultural practice. The practice strengthens, with short-term reinforcement, behavior that usually enhances fitness in the long run. The practice evolves because of its effect on fitness. The standard definition of a rule as a verbal statement that points to a contingency fails to distinguish between a rule and a bargain ("If you'll do X, then I'll do Y"), which signifies only a single short-term contingency that provides mutual reinforcement for speaker and listener. In contrast, the giving and following of a rule ("Dress warmly; it's cold outside") can be understood only by reference also to a contingency providing long-term enhancement of the listener's fitness or the fitness of the listener's genes. Such a perspective may change the way both behavior analysts and evolutionary biologists think about rule-governed behavior.

  6. Automatic coding method of the ACR Code

    International Nuclear Information System (INIS)

    Park, Kwi Ae; Ihm, Jong Sool; Ahn, Woo Hyun; Baik, Seung Kook; Choi, Han Yong; Kim, Bong Gi

    1993-01-01

    The authors developed a computer program for automatic coding of ACR(American College of Radiology) code. The automatic coding of the ACR code is essential for computerization of the data in the department of radiology. This program was written in foxbase language and has been used for automatic coding of diagnosis in the Department of Radiology, Wallace Memorial Baptist since May 1992. The ACR dictionary files consisted of 11 files, one for the organ code and the others for the pathology code. The organ code was obtained by typing organ name or code number itself among the upper and lower level codes of the selected one that were simultaneous displayed on the screen. According to the first number of the selected organ code, the corresponding pathology code file was chosen automatically. By the similar fashion of organ code selection, the proper pathologic dode was obtained. An example of obtained ACR code is '131.3661'. This procedure was reproducible regardless of the number of fields of data. Because this program was written in 'User's Defined Function' from, decoding of the stored ACR code was achieved by this same program and incorporation of this program into program in to another data processing was possible. This program had merits of simple operation, accurate and detail coding, and easy adjustment for another program. Therefore, this program can be used for automation of routine work in the department of radiology

  7. Error-correction coding

    Science.gov (United States)

    Hinds, Erold W. (Principal Investigator)

    1996-01-01

    This report describes the progress made towards the completion of a specific task on error-correcting coding. The proposed research consisted of investigating the use of modulation block codes as the inner code of a concatenated coding system in order to improve the overall space link communications performance. The study proposed to identify and analyze candidate codes that will complement the performance of the overall coding system which uses the interleaved RS (255,223) code as the outer code.

  8. Binary effectivity rules

    DEFF Research Database (Denmark)

    Keiding, Hans; Peleg, Bezalel

    2006-01-01

    is binary if it is rationalized by an acyclic binary relation. The foregoing result motivates our definition of a binary effectivity rule as the effectivity rule of some binary SCR. A binary SCR is regular if it satisfies unanimity, monotonicity, and independence of infeasible alternatives. A binary...

  9. Delayed rule following.

    Science.gov (United States)

    Schmitt, D R

    2001-01-01

    Although the elements of a fully stated rule (discriminative stimulus [S(D)], some behavior, and a consequence) can occur nearly contemporaneously with the statement of the rule, there is often a delay between the rule statement and the S(D). The effects of this delay on rule following have not been studied in behavior analysis, but they have been investigated in rule-like settings in the areas of prospective memory (remembering to do something in the future) and goal pursuit. Discriminative events for some behavior can be event based (a specific setting stimulus) or time based. The latter are more demanding with respect to intention following and show age-related deficits. Studies suggest that the specificity with which the components of a rule (termed intention) are stated has a substantial effect on intention following, with more detailed specifications increasing following. Reminders of an intention, too, are most effective when they refer specifically to both the behavior and its occasion. Covert review and written notes are two effective strategies for remembering everyday intentions, but people who use notes appear not to be able to switch quickly to covert review. By focusing on aspects of the setting and rule structure, research on prospective memory and goal pursuit expands the agenda for a more complete explanation of rule effects.

  10. "Chaos Rules" Revisited

    Science.gov (United States)

    Murphy, David

    2011-01-01

    About 20 years ago, while lost in the midst of his PhD research, the author mused over proposed titles for his thesis. He was pretty pleased with himself when he came up with "Chaos Rules" (the implied double meaning was deliberate), or more completely, "Chaos Rules: An Exploration of the Work of Instructional Designers in Distance Education." He…

  11. Dynamic Shannon Coding

    OpenAIRE

    Gagie, Travis

    2005-01-01

    We present a new algorithm for dynamic prefix-free coding, based on Shannon coding. We give a simple analysis and prove a better upper bound on the length of the encoding produced than the corresponding bound for dynamic Huffman coding. We show how our algorithm can be modified for efficient length-restricted coding, alphabetic coding and coding with unequal letter costs.

  12. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  13. Codes Over Hyperfields

    Directory of Open Access Journals (Sweden)

    Atamewoue Surdive

    2017-12-01

    Full Text Available In this paper, we define linear codes and cyclic codes over a finite Krasner hyperfield and we characterize these codes by their generator matrices and parity check matrices. We also demonstrate that codes over finite Krasner hyperfields are more interesting for code theory than codes over classical finite fields.

  14. Electronuclear sum rules

    International Nuclear Information System (INIS)

    Arenhoevel, H.; Drechsel, D.; Weber, H.J.

    1978-01-01

    Generalized sum rules are derived by integrating the electromagnetic structure functions along lines of constant ratio of momentum and energy transfer. For non-relativistic systems these sum rules are related to the conventional photonuclear sum rules by a scaling transformation. The generalized sum rules are connected with the absorptive part of the forward scattering amplitude of virtual photons. The analytic structure of the scattering amplitudes and the possible existence of dispersion relations have been investigated in schematic relativistic and non-relativistic models. While for the non-relativistic case analyticity does not hold, the relativistic scattering amplitude is analytical for time-like (but not for space-like) photons and relations similar to the Gell-Mann-Goldberger-Thirring sum rule exist. (Auth.)

  15. Medicare and Medicaid programs; CY 2015 Home Health Prospective Payment System rate update; Home Health Quality Reporting Requirements; and survey and enforcement requirements for home health agencies. Final rule.

    Science.gov (United States)

    2014-11-06

    This final rule updates Home Health Prospective Payment System (HH PPS) rates, including the national, standardized 60-day episode payment rates, the national per-visit rates, and the non-routine medical supply (NRS) conversion factor under the Medicare prospective payment system for home health agencies (HHAs), effective for episodes ending on or after January 1, 2015. As required by the Affordable Care Act, this rule implements the second year of the four-year phase-in of the rebasing adjustments to the HH PPS payment rates. This rule provides information on our efforts to monitor the potential impacts of the rebasing adjustments and the Affordable Care Act mandated face-to-face encounter requirement. This rule also implements: Changes to simplify the face-to-face encounter regulatory requirements; changes to the HH PPS case-mix weights; changes to the home health quality reporting program requirements; changes to simplify the therapy reassessment timeframes; a revision to the Speech-Language Pathology (SLP) personnel qualifications; minor technical regulations text changes; and limitations on the reviewability of the civil monetary penalty provisions. Finally, this rule also discusses Medicare coverage of insulin injections under the HH PPS, the delay in the implementation of the International Classification of Diseases, Tenth Revision, Clinical Modification (ICD-10-CM), and a HH value-based purchasing (HH VBP) model.

  16. RIGHTS, RULES, AND DEMOCRACY

    Directory of Open Access Journals (Sweden)

    Richard S. Kay, University of Connecticut-School of Law, Estados Unidos

    2012-11-01

    Full Text Available Abstract: Democracy require protection of certain fundamental rights, but can we expect courts to follow rules? There seems little escape from the proposition that substantive constitutional review by an unelected judiciary is a presumptive abridgement of democratic decision-making. Once we have accepted the proposition that there exist human rights that ought to be protected, this should hardly surprise us. No one thinks courts are perfect translators of the rules invoked before them on every occasion. But it is equally clear that rules sometimes do decide cases. In modern legal systems the relative roles of courts and legislators with respect to the rules of the system is a commonplace. Legislatures make rules. Courts apply them in particular disputes. When we are talking about human rights, however, that assumption must be clarified in at least one way. The defense of the practice of constitutional review in this article assumes courts can and do enforce rules. This article also makes clear what is the meaning of “following rules”. Preference for judicial over legislative interpretation of rights, therefore, seems to hang on the question of whether or not judges are capable of subordinating their own judgment to that incorporated in the rules by their makers. This article maintains that, in general, entrenched constitutional rules (and not just constitutional courts can and do constrain public conduct and protect human rights. The article concludes that the value judgments will depend on our estimate of the benefits we derive from the process of representative self-government. Against those benefits we will have to measure the importance we place on being able to live our lives with the security created by a regime of human rights protected by the rule of law. Keywords: Democracy. Human Rights. Rules. Judicial Review.

  17. Electrical, instrumentation, and control codes and standards

    International Nuclear Information System (INIS)

    Kranning, A.N.

    1978-01-01

    During recent years numerous documents in the form of codes and standards have been developed and published to provide design, fabrication and construction rules and criteria applicable to instrumentation, control and power distribution facilities for nuclear power plants. The contents of this LTR were prepared by NUS Corporation under Subcontract K5108 and provide a consolidated index and listing of the documents selected for their application to procurement of materials and design of modifications and new construction at the LOFT facility. These codes and standards should be applied together with the National Electrical Code, the ID Engineering Standards and LOFT Specifications to all LOFT instrument and electrical design activities

  18. 77 FR 43535 - Grantee Codes for Certified Radiofrequency Equipment

    Science.gov (United States)

    2012-07-25

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 2 [FCC 12-60] Grantee Codes for Certified Radiofrequency Equipment AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY: This document... authorization program for radiofrequency (RF) devices under part 2 of its rules. This program is one of the...

  19. Rules of Thumb for Up-and-Down Economics.

    Science.gov (United States)

    Kennedy, Peter

    1994-01-01

    Reports that economist Paul Krugman identifies three types of economic writing. Asserts that the major principles of macroeconomics can be synthesized into "Five Rules of Thumb" which can help to interpret economic news. Presents and discusses these five rules and includes a survey summary of journalists and economists on this issue.…

  20. Totally optimal decision rules

    KAUST Repository

    Amin, Talha

    2017-11-22

    Optimality of decision rules (patterns) can be measured in many ways. One of these is referred to as length. Length signifies the number of terms in a decision rule and is optimally minimized. Another, coverage represents the width of a rule’s applicability and generality. As such, it is desirable to maximize coverage. A totally optimal decision rule is a decision rule that has the minimum possible length and the maximum possible coverage. This paper presents a method for determining the presence of totally optimal decision rules for “complete” decision tables (representations of total functions in which different variables can have domains of differing values). Depending on the cardinalities of the domains, we can either guarantee for each tuple of values of the function that totally optimal rules exist for each row of the table (as in the case of total Boolean functions where the cardinalities are equal to 2) or, for each row, we can find a tuple of values of the function for which totally optimal rules do not exist for this row.

  1. Totally optimal decision rules

    KAUST Repository

    Amin, Talha M.; Moshkov, Mikhail

    2017-01-01

    Optimality of decision rules (patterns) can be measured in many ways. One of these is referred to as length. Length signifies the number of terms in a decision rule and is optimally minimized. Another, coverage represents the width of a rule’s applicability and generality. As such, it is desirable to maximize coverage. A totally optimal decision rule is a decision rule that has the minimum possible length and the maximum possible coverage. This paper presents a method for determining the presence of totally optimal decision rules for “complete” decision tables (representations of total functions in which different variables can have domains of differing values). Depending on the cardinalities of the domains, we can either guarantee for each tuple of values of the function that totally optimal rules exist for each row of the table (as in the case of total Boolean functions where the cardinalities are equal to 2) or, for each row, we can find a tuple of values of the function for which totally optimal rules do not exist for this row.

  2. A Survey of Automatic Code Generating Software

    Science.gov (United States)

    1988-09-01

    ID that matches a name in the user’s database file and must then match the password specified for that user. A successful login will allow access to...Software Corp. P.O. Box 10089 Chicago, IL 60610 312-743-2755 PRO-2 Prodata, Inc. 4477 Emerald Suite C-100 Boise, ID 83706 208-342-6878 67 GTP Allen, Emerson

  3. "Hour of Code": A Case Study

    Science.gov (United States)

    Du, Jie; Wimmer, Hayden; Rada, Roy

    2018-01-01

    This study investigates the delivery of the "Hour of Code" tutorials to college students. The college students who participated in this study were surveyed about their opinion of the Hour of Code. First, the students' comments were discussed. Next, a content analysis of the offered tutorials highlights their reliance on visual…

  4. International Accreditation of ASME Codes and Standards

    International Nuclear Information System (INIS)

    Green, Mervin R.

    1989-01-01

    ASME established a Boiler Code Committee to develop rules for the design, fabrication and inspection of boilers. This year we recognize 75 years of that Code and will publish a history of that 75 years. The first Code and subsequent editions provided for a Code Symbol Stamp or mark which could be affixed by a manufacturer to a newly constructed product to certify that the manufacturer had designed, fabricated and had inspected it in accordance with Code requirements. The purpose of the ASME Mark is to identify those boilers that meet ASME Boiler and Pressure Vessel Code requirements. Through thousands of updates over the years, the Code has been revised to reflect technological advances and changing safety needs. Its scope has been broadened from boilers to include pressure vessels, nuclear components and systems. Proposed revisions to the Code are published for public review and comment four times per year and revisions and interpretations are published annually; it's a living and constantly evolving Code. You and your organizations are a vital part of the feedback system that keeps the Code alive. Because of this dynamic Code, we no longer have columns in newspapers listing boiler explosions. Nevertheless, it has been argued recently that ASME should go further in internationalizing its Code. Specifically, representatives of several countries, have suggested that ASME delegate to them responsibility for Code implementation within their national boundaries. The question is, thus, posed: Has the time come to franchise responsibility for administration of ASME's Code accreditation programs to foreign entities or, perhaps, 'institutes.' And if so, how should this be accomplished?

  5. Following the Rules.

    Science.gov (United States)

    Katz, Anne

    2016-05-01

    I am getting better at following the rules as I grow older, although I still bristle at many of them. I was a typical rebellious teenager; no one understood me, David Bowie was my idol, and, one day, my generation was going to change the world. Now I really want people to understand me: David Bowie remains one of my favorite singers and, yes, my generation has changed the world, and not necessarily for the better. Growing up means that you have to make the rules, not just follow those set by others, and, at times, having rules makes a lot of sense.
.

  6. Do Fiscal Rules Matter?

    DEFF Research Database (Denmark)

    Grembi, Veronica; Nannicini, Tommaso; Troiano, Ugo

    2016-01-01

    , the central government imposed fiscal rules on municipal governments, and in 2001 relaxed them below 5,000 inhabitants. We exploit the before/after and discontinuous policy variation, and show that relaxing fiscal rules increases deficits and lowers taxes. The effect is larger if the mayor can be reelected......Fiscal rules are laws aimed at reducing the incentive to accumulate debt, and many countries adopt them to discipline local governments. Yet, their effectiveness is disputed because of commitment and enforcement problems. We study their impact applying a quasi-experimental design in Italy. In 1999...

  7. Vector Network Coding Algorithms

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L x L coding matrices that play a similar role as coding c in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector coding, our algori...

  8. Homological stabilizer codes

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Jonas T., E-mail: jonastyleranderson@gmail.com

    2013-03-15

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

  9. Do you write secure code?

    CERN Multimedia

    Computer Security Team

    2011-01-01

    At CERN, we are excellent at producing software, such as complex analysis jobs, sophisticated control programs, extensive monitoring tools, interactive web applications, etc. This software is usually highly functional, and fulfils the needs and requirements as defined by its author. However, due to time constraints or unintentional ignorance, security aspects are often neglected. Subsequently, it was even more embarrassing for the author to find out that his code flawed and was used to break into CERN computers, web pages or to steal data…   Thus, if you have the pleasure or task of producing software applications, take some time before and familiarize yourself with good programming practices. They should not only prevent basic security flaws in your code, but also improve its readability, maintainability and efficiency. Basic rules for good programming, as well as essential books on proper software development, can be found in the section for software developers on our security we...

  10. Staff rules and regulations

    CERN Multimedia

    HR Department

    2007-01-01

    The 11th edition of the Staff Rules and Regulations, dated 1 January 2007, adopted by the Council and the Finance Committee in December 2006, is currently being distributed to departmental secretariats. The Staff Rules and Regulations, together with a summary of the main modifications made, will be available, as from next week, on the Human Resources Department's intranet site: http://cern.ch/hr-web/internal/admin_services/rules/default.asp The main changes made to the Staff Rules and Regulations stem from the five-yearly review of employment conditions of members of the personnel. The changes notably relate to: the categories of members of the personnel (e.g. removal of the local staff category); the careers structure and the merit recognition system; the non-residence, installation and re-installation allowances; the definition of family, family allowances and family-related leave; recognition of partnerships; education fees. The administrative circulars, some of which are being revised following the ...

  11. Data breaches. Final rule.

    Science.gov (United States)

    2008-04-11

    This document adopts, without change, the interim final rule that was published in the Federal Register on June 22, 2007, addressing data breaches of sensitive personal information that is processed or maintained by the Department of Veterans Affairs (VA). This final rule implements certain provisions of the Veterans Benefits, Health Care, and Information Technology Act of 2006. The regulations prescribe the mechanisms for taking action in response to a data breach of sensitive personal information.

  12. Amendments to excepted benefits. Final rules.

    Science.gov (United States)

    2014-10-01

    This document contains final regulations that amend the regulations regarding excepted benefits under the Employee Retirement Income Security Act of 1974, the Internal Revenue Code (the Code), and the Public Health Service Act. Excepted benefits are generally exempt from the health reform requirements that were added to those laws by the Health Insurance Portability and Accountability Act and the Patient Protection and Affordable Care Act. In addition, eligibility for excepted benefits does not preclude an individual from eligibility for a premium tax credit under section 36B of the Code if an individual chooses to enroll in coverage under a Qualified Health Plan through an Affordable Insurance Exchange. These regulations finalize some but not all of the proposed rules with minor modifications; additional guidance on limited wraparound coverage is forthcoming.

  13. Diagnostic Coding for Epilepsy.

    Science.gov (United States)

    Williams, Korwyn; Nuwer, Marc R; Buchhalter, Jeffrey R

    2016-02-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  14. Coding of Neuroinfectious Diseases.

    Science.gov (United States)

    Barkley, Gregory L

    2015-12-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  15. Motivations For Code-Switching Among Igboenglish Bilinguals: A ...

    African Journals Online (AJOL)

    Studies have shown that code-switching is not a manifestation of mental confusion but a rule-governed behaviour among bilinguals which is motivated by various socio-psychological as well as linguistic factors. It has been observed that code-switching is more predominant among Igbo-English bilinguals compared to any ...

  16. 42 CFR 414.40 - Coding and ancillary policies.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Coding and ancillary policies. 414.40 Section 414.40 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES... Practitioners § 414.40 Coding and ancillary policies. (a) General rule. CMS establishes uniform national...

  17. Civil Behavior, Safe-School Planning, and Dress Codes

    Science.gov (United States)

    Studak, Cathryn M.; Workman, Jane E.

    2007-01-01

    This research examined news reports in order to identify incidents that precipitated dress code revisions. News reports were examined within the framework of rules for civil behavior. Using key words "school dress codes" and "violence," LEXIS/NEXIS was used to access 104 articles from 44 U.S. newspapers from December 3, 2004 to December 2, 2005.…

  18. Mechanisms of rule acquisition and rule following in inductive reasoning.

    Science.gov (United States)

    Crescentini, Cristiano; Seyed-Allaei, Shima; De Pisapia, Nicola; Jovicich, Jorge; Amati, Daniele; Shallice, Tim

    2011-05-25

    Despite the recent interest in the neuroanatomy of inductive reasoning processes, the regional specificity within prefrontal cortex (PFC) for the different mechanisms involved in induction tasks remains to be determined. In this study, we used fMRI to investigate the contribution of PFC regions to rule acquisition (rule search and rule discovery) and rule following. Twenty-six healthy young adult participants were presented with a series of images of cards, each consisting of a set of circles numbered in sequence with one colored blue. Participants had to predict the position of the blue circle on the next card. The rules that had to be acquired pertained to the relationship among succeeding stimuli. Responses given by subjects were categorized in a series of phases either tapping rule acquisition (responses given up to and including rule discovery) or rule following (correct responses after rule acquisition). Mid-dorsolateral PFC (mid-DLPFC) was active during rule search and remained active until successful rule acquisition. By contrast, rule following was associated with activation in temporal, motor, and medial/anterior prefrontal cortex. Moreover, frontopolar cortex (FPC) was active throughout the rule acquisition and rule following phases before a rule became familiar. We attributed activation in mid-DLPFC to hypothesis generation and in FPC to integration of multiple separate inferences. The present study provides evidence that brain activation during inductive reasoning involves a complex network of frontal processes and that different subregions respond during rule acquisition and rule following phases.

  19. Development of ASME Code Section 11 visual examination requirements

    International Nuclear Information System (INIS)

    Cook, J.F.

    1990-01-01

    Section XI of the American Society for Mechanical Engineers Boiler and Pressure Vessel Code (ASME Code) defines three types of nondestructive examinations, visual, surface, and volumetric. Visual examination is important since it is the primary examination method for many safety-related components and systems and is also used as a backup examination for the components and systems which receive surface or volumetric examinations. Recent activity in the Section XI Code organization to improve the rules for visual examinations is reviewed and the technical basis for the new rules, which cover illumination, vision acuity, and performance demonstration, is explained

  20. Vector Network Coding

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L X L coding matrices that play a similar role as coding coefficients in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector co...

  1. Entropy Coding in HEVC

    OpenAIRE

    Sze, Vivienne; Marpe, Detlev

    2014-01-01

    Context-Based Adaptive Binary Arithmetic Coding (CABAC) is a method of entropy coding first introduced in H.264/AVC and now used in the latest High Efficiency Video Coding (HEVC) standard. While it provides high coding efficiency, the data dependencies in H.264/AVC CABAC make it challenging to parallelize and thus limit its throughput. Accordingly, during the standardization of entropy coding for HEVC, both aspects of coding efficiency and throughput were considered. This chapter describes th...

  2. Generalized concatenated quantum codes

    International Nuclear Information System (INIS)

    Grassl, Markus; Shor, Peter; Smith, Graeme; Smolin, John; Zeng Bei

    2009-01-01

    We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length but also asymptotically meet the quantum Hamming bound for large block length.

  3. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  4. A Graphical-User Interface for the U. S. Geological Survey's SUTRA Code using Argus ONE (for simulation of variable-density saturated-unsaturated ground-water flow with solute or energy transport)

    Science.gov (United States)

    Voss, Clifford I.; Boldt, David; Shapiro, Allen M.

    1997-01-01

    This report describes a Graphical-User Interface (GUI) for SUTRA, the U.S. Geological Survey (USGS) model for saturated-unsaturated variable-fluid-density ground-water flow with solute or energy transport,which combines a USGS-developed code that interfaces SUTRA with Argus ONE, a commercial software product developed by Argus Interware. This product, known as Argus Open Numerical Environments (Argus ONETM), is a programmable system with geographic-information-system-like (GIS-like) functionality that includes automated gridding and meshing capabilities for linking geospatial information with finite-difference and finite-element numerical model discretizations. The GUI for SUTRA is based on a public-domain Plug-In Extension (PIE) to Argus ONE that automates the use of ArgusONE to: automatically create the appropriate geospatial information coverages (information layers) for SUTRA, provide menus and dialogs for inputting geospatial information and simulation control parameters for SUTRA, and allow visualization of SUTRA simulation results. Following simulation control data and geospatial data input bythe user through the GUI, ArgusONE creates text files in a format required for normal input to SUTRA,and SUTRA can be executed within the Argus ONE environment. Then, hydraulic head, pressure, solute concentration, temperature, saturation and velocity results from the SUTRA simulation may be visualized. Although the GUI for SUTRA discussed in this report provides all of the graphical pre- and post-processor functions required for running SUTRA, it is also possible for advanced users to apply programmable features within Argus ONE to modify the GUI to meet the unique demands of particular ground-water modeling projects.

  5. A new algorithm for coding geological terminology

    Science.gov (United States)

    Apon, W.

    The Geological Survey of The Netherlands has developed an algorithm to convert the plain geological language of lithologic well logs into codes suitable for computer processing and link these to existing plotting programs. The algorithm is based on the "direct method" and operates in three steps: (1) searching for defined word combinations and assigning codes; (2) deleting duplicated codes; (3) correcting incorrect code combinations. Two simple auxiliary files are used. A simple PC demonstration program is included to enable readers to experiment with this algorithm. The Department of Quarternary Geology of the Geological Survey of The Netherlands possesses a large database of shallow lithologic well logs in plain language and has been using a program based on this algorithm for about 3 yr. Erroneous codes resulting from using this algorithm are less than 2%.

  6. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  7. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  8. Piping design and analysis: Comparison between the Belgian applications of French and American rules

    International Nuclear Information System (INIS)

    Daoust, P.H.; Geraets, L.H.; Lafaille, J.P.

    1987-01-01

    In the process of a feasibility study of a new nuclear power plant in Belgium, the French and American rules for piping design have been compared. The Belgian method rests on the American nuclear set of rules and uses the ASME code. French rules were initially based on the American rules (1978). Subsequent individual development led to a differentiation of the rules. Presently the mechanical part of the French rules is mainly contained in the RCC-P ('Regles de Conception et de Construction relatives aux Procedes') and the RCC-M ('Regles de Conception et de Construction des Materiels Mecaniques'). This paper compares the piping design rules from a general point of view; examples of applications allow to identify benefits or drawbacks of the use of ASME or RCCM codes. (orig.)

  9. Piping design and analysis: comparison between the Belgian applications of French and American rules

    International Nuclear Information System (INIS)

    Daoust, Ph.; Geraets, L.H.; Lafaille, J.P.

    1989-01-01

    In the process of a feasibility study of a new nuclear power plant in Belgium, the French and American rules for piping design have been compared. The Belgian method rests on the American nuclear set of rules and uses the ASME code. French rules were initially based on the American rules (1978). Subsequent individual development led to a differentiation of the rules. Presently, the mechanical part of the French rules is mainly contained in the RCCP ('Regles de Conception et de Construction relatives aux Procedes') and the RCCM ('Regles de Conception et de Construction des materiels Mecaniques'). This paper compares the piping design rules from a general point of view; examples of applications allow benefits or drawbacks of the use of ASME or RCCM codes to identified. (author)

  10. Coding training for medical students: How good is diagnoses coding with ICD-10 by novices?

    Directory of Open Access Journals (Sweden)

    Stausberg, Jürgen

    2005-04-01

    Full Text Available Teaching of knowledge and competence in documentation and coding is an essential part of medical education. Therefore, coding training had been placed within the course of epidemiology, medical biometry, and medical informatics. From this, we can draw conclusions about the quality of coding by novices. One hundred and eighteen students coded diagnoses from 15 nephrological cases in homework. In addition to interrater reliability, validity was calculated by comparison with a reference coding. On the level of terminal codes, 59.3% of the students' results were correct. The completeness was calculated as 58.0%. The results on the chapter level increased up to 91.5% and 87.7% respectively. For the calculation of reliability a new, simple measure was developed that leads to values of 0.46 on the level of terminal codes and 0.87 on the chapter level for interrater reliability. The figures of concordance with the reference coding are quite similar. In contrary, routine data show considerably lower results with 0.34 and 0.63 respectively. Interrater reliability and validity of coding by novices is as good as coding by experts. The missing advantage of experts could be explained by the workload of documentation and a negative attitude to coding on the one hand. On the other hand, coding in a DRG-system is handicapped by a large number of detailed coding rules, which do not end in uniform results but rather lead to wrong and random codes. Anyway, students left the course well prepared for coding.

  11. Life fraction rules

    International Nuclear Information System (INIS)

    Maile, K.

    1989-01-01

    Evaluations for lifetime estimation of high temperature loaded HTR-components under creep fatigue load had been performed. The evaluations were carried out on the basis of experimental data of strain controlled fatigue tests with respectively without hold times performed on material NiCr 22 Co 12 Mo (Inconel 617). Life prediction was made by means of the linear damage accumulation rule. Due to the high temperatures no realistic estimates of creep damage can be obtained with this rule. Therefore the rule was modified. The modifications consist in a different analysis of the relaxation curve including different calculation of the creep damage estimate resp. in an extended rule, taking into consideration the interaction between creep and fatigue. In order to reach a better result transparency and to reduce data set dependent result scattering a round robin with a given data set was carried out. The round robin yielded that for a given test temperature of T = 950deg C realistic estimate of damage can be obtained with each modification. Furthermore a reduction of resulting scatterbands in the interaction diagram can be observed, i.e. the practicability of the rule has been increased. (orig.)

  12. Verifying Architectural Design Rules of the Flight Software Product Line

    Science.gov (United States)

    Ganesan, Dharmalingam; Lindvall, Mikael; Ackermann, Chris; McComas, David; Bartholomew, Maureen

    2009-01-01

    This paper presents experiences of verifying architectural design rules of the NASA Core Flight Software (CFS) product line implementation. The goal of the verification is to check whether the implementation is consistent with the CFS architectural rules derived from the developer's guide. The results indicate that consistency checking helps a) identifying architecturally significant deviations that were eluded during code reviews, b) clarifying the design rules to the team, and c) assessing the overall implementation quality. Furthermore, it helps connecting business goals to architectural principles, and to the implementation. This paper is the first step in the definition of a method for analyzing and evaluating product line implementations from an architecture-centric perspective.

  13. The role of traffic rules.

    NARCIS (Netherlands)

    Noordzij, P.C.

    1988-01-01

    Experienced road users seem to have their own set of traffic rules (including rules about when to violate the official rules). The number of violations is enormous, causing great concern for the authorities. The situation could be improved by separating a set of rules with the aim of deterring road

  14. The reform of the Italian Yachting Code

    Directory of Open Access Journals (Sweden)

    Alberto Pasino

    2018-02-01

    Full Text Available The purpose of this paper is to address the legislative reform of the recreational boating legislation currently pending in Italy (Law 167/2015, which has delegated the power to reform the Yachting Code to the Italian Government with a specific focus on the relationship between the Yachting Code and the Navigation Code. The issue will be addressed through an analysis of the history of the relationship between the rules governing recreational boating and the general navigation legislation in Italy. Starting with an analysis of the first few rules of the Navigation Code devoted to recreational boating, which had been regulated together with the forms of operation of the ship for economic purposes, the discussion will then review the contents of Law 50/1971 (s.c. ‘’piccolo codice della nautica da diporto’’, which led to the first division between recreational boating and general navigation legislation. Law 172/2003 – a piece of legislation which was intended to reorganize and boost recreational boating and nautical tourism – will also be mentioned, considering the legislator’s attempt to make the rules governing recreational boating fully autonomous from the general maritime legislation. Law 171/2005 (s.c. ‘’codice della nautica da diporto’’ will then be briefly reviewed, with particular emphasis on the legislator’s choice to recognize that recreational boating rules have a special nature in relation to general navigation legislation, but are not fully autonomous from it. The paper will finally focus on the choice made by the legislator through Law 167/2015 – an act which delegates the Government to reform the Yacting Code – which confirms the approach chosen by the ‘’codice della nautica da diporto’’, and on the consequences of such choice on legal institutions such as the shipowner’s limitation of liability.

  15. The rule of law

    Directory of Open Access Journals (Sweden)

    Besnik Murati

    2015-07-01

    Full Text Available The state as an international entity and its impact on the individual’s right has been and still continues to be a crucial factor in the relationship between private and public persons. States vary in terms of their political system, however, democratic states are based on the separation of powers and human rights within the state. Rule of law is the product of many actors in a state, including laws, individuals, society, political system, separation of powers, human rights, the establishment of civil society, the relationship between law and the individual, as well as, individual-state relations. Purpose and focus of this study is the importance of a functioning state based on law, characteristics of the rule of law, separation of powers and the basic concepts of the rule of law.

  16. Robert's rules of order

    CERN Document Server

    Robert, Henry M; Balch, Thomas J; Seabold, Daniel E; Gerber, Shmuel

    2011-01-01

    The only authorized edition of the classic work on parliamentary procedure, with new and enhanced features, including how to conduct electronic meetings. Robert's Rules of Order is the book on parliamentary procedure for parliamentarians and anyone involved in an organization, association, club, or group and the authoritative guide to smooth, orderly, and fairly conducted meetings and assemblies. This newly revised edition is the only book on parliamentary procedure to have been updated since 1876 under the continuing program of review established by General Henry M. Robert himself, in cooperation with the official publisher of Robert's Rules. The eleventh edition has been thoroughly revised to address common inquiries and incorporate new rules, interpretations, and procedures made necessary by the evolution of parliamentary procedure, including new material relating to electronic communication and "electronic meetings."

  17. Reducing Computational Overhead of Network Coding with Intrinsic Information Conveying

    DEFF Research Database (Denmark)

    Heide, Janus; Zhang, Qi; Pedersen, Morten V.

    is RLNC (Random Linear Network Coding) and the goal is to reduce the amount of coding operations both at the coding and decoding node, and at the same time remove the need for dedicated signaling messages. In a traditional RLNC system, coding operation takes up significant computational resources and adds...... the coding operations must be performed in a particular way, which we introduce. Finally we evaluate the suggested system and find that the amount of coding can be significantly reduced both at nodes that recode and decode.......This paper investigated the possibility of intrinsic information conveying in network coding systems. The information is embedded into the coding vector by constructing the vector based on a set of predefined rules. This information can subsequently be retrieved by any receiver. The starting point...

  18. Review and comparison of WWER and LWR Codes and Standards

    International Nuclear Information System (INIS)

    Buckthorpe, D.; Tashkinov, A.; Brynda, J.; Davies, L.M.; Cueto-Felgeueroso, C.; Detroux, P.; Bieniussa, K.; Guinovart, J.

    2003-01-01

    The results of work on a collaborative project on comparison of Codes and Standards used for safety related components of the WWER and LWR type reactors is presented. This work was performed on behalf of the European Commission, Working Group Codes and Standards and considers areas such as rules, criteria and provisions, failure mechanisms , derivation and understanding behind the fatigue curves, piping, materials and aging, manufacturing and ISI. WWERs are essentially designed and constructed using the Russian PNAE Code together with special provisions in a few countries (e.g. Czech Republic) from national standards. The LWR Codes have a strong dependence on the ASME Code. Also within Western Europe other codes are used including RCC-M, KTA and British Standards. A comparison of procedures used in all these codes and standards have been made to investigate the potential for equivalencies between the codes and any grounds for future cooperation between eastern and western experts in this field. (author)

  19. Cosmic Sum Rules

    DEFF Research Database (Denmark)

    T. Frandsen, Mads; Masina, Isabella; Sannino, Francesco

    2011-01-01

    We introduce new sum rules allowing to determine universal properties of the unknown component of the cosmic rays and show how it can be used to predict the positron fraction at energies not yet explored by current experiments and to constrain specific models.......We introduce new sum rules allowing to determine universal properties of the unknown component of the cosmic rays and show how it can be used to predict the positron fraction at energies not yet explored by current experiments and to constrain specific models....

  20. Discussion on LDPC Codes and Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  1. An Embedded Rule-Based Diagnostic Expert System in Ada

    Science.gov (United States)

    Jones, Robert E.; Liberman, Eugene M.

    1992-01-01

    Ada is becoming an increasingly popular programming language for large Government-funded software projects. Ada with it portability, transportability, and maintainability lends itself well to today's complex programming environment. In addition, expert systems have also assumed a growing role in providing human-like reasoning capability expertise for computer systems. The integration is discussed of expert system technology with Ada programming language, especially a rule-based expert system using an ART-Ada (Automated Reasoning Tool for Ada) system shell. NASA Lewis was chosen as a beta test site for ART-Ada. The test was conducted by implementing the existing Autonomous Power EXpert System (APEX), a Lisp-based power expert system, in ART-Ada. Three components, the rule-based expert systems, a graphics user interface, and communications software make up SMART-Ada (Systems fault Management with ART-Ada). The rules were written in the ART-Ada development environment and converted to Ada source code. The graphics interface was developed with the Transportable Application Environment (TAE) Plus, which generates Ada source code to control graphics images. SMART-Ada communicates with a remote host to obtain either simulated or real data. The Ada source code generated with ART-Ada, TAE Plus, and communications code was incorporated into an Ada expert system that reads the data from a power distribution test bed, applies the rule to determine a fault, if one exists, and graphically displays it on the screen. The main objective, to conduct a beta test on the ART-Ada rule-based expert system shell, was achieved. The system is operational. New Ada tools will assist in future successful projects. ART-Ada is one such tool and is a viable alternative to the straight Ada code when an application requires a rule-based or knowledge-based approach.

  2. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  3. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    Shannon limit of the channel. Among the earliest discovered codes that approach the. Shannon limit were the low density parity check (LDPC) codes. The term low density arises from the property of the parity check matrix defining the code. We will now define this matrix and the role that it plays in decoding. 2. Linear Codes.

  4. Manually operated coded switch

    International Nuclear Information System (INIS)

    Barnette, J.H.

    1978-01-01

    The disclosure related to a manually operated recodable coded switch in which a code may be inserted, tried and used to actuate a lever controlling an external device. After attempting a code, the switch's code wheels must be returned to their zero positions before another try is made

  5. Coding in Muscle Disease.

    Science.gov (United States)

    Jones, Lyell K; Ney, John P

    2016-12-01

    Accurate coding is critically important for clinical practice and research. Ongoing changes to diagnostic and billing codes require the clinician to stay abreast of coding updates. Payment for health care services, data sets for health services research, and reporting for medical quality improvement all require accurate administrative coding. This article provides an overview of administrative coding for patients with muscle disease and includes a case-based review of diagnostic and Evaluation and Management (E/M) coding principles in patients with myopathy. Procedural coding for electrodiagnostic studies and neuromuscular ultrasound is also reviewed.

  6. General rules applicable to quality assurance

    International Nuclear Information System (INIS)

    1981-11-01

    RFS or Regles Fondamentales de Surete (Basic Safety Rules) applicable to certain types of nuclear facilities lay down requirements with which compliance, for the type of facilities and within the scope of application covered by the RFS, is considered to be equivalent to compliance with technical French regulatory practice. The object of the RFS is to take advantage of standardization in the field of safety, while allowing for technical progress in that field. They are designed to enable the operating utility and contractors to know the rules pertaining to various subjects which are considered to be acceptable by the Service Central de Surete des Installations Nucleaires, or the SCSIN (Central Department for the Safety of Nuclear Facilities). These RFS should make safety analysis easier and lead to better understanding between experts and individuals concerned with the problems of nuclear safety. The SCSIN reserves the right to modify, when considered necessary, any RFS and specify, if need be, the terms under which a modification is deemed retroactive. The aim of this rule is to define a series of measures to meet these general regulatory equipments. By applying this rule, the quality assurance code of practice for nuclear power plant safety, established by the International Atomic Energy Agency (I.A.E.A.), is considered to be observed

  7. Business judgement rule in Czech Corporations Act

    Directory of Open Access Journals (Sweden)

    Jaromír KOŽIAK

    2013-12-01

    Full Text Available Czech private law is currently undergoing a thorough transformation. This inclundes adoption of a brand new Corporations Act, which is to supersede the current Commercial Code. The new legislation introduces several new rules governing liability of company executive officers. One of these is business judgment rule. It should provide company executive officers with a certain level of protection against litigantion – if specific terms are met, it is presumed, that they carried out their responsibilities with proper care. I intend to demonstrate, that the czech business judgment rule is flawed, despite the fact that it draws from foreign examples and that this regulation, although seemingly groundbreaking, in fact changes nothing in examination of the decisions of the company executive officers in Czech Republic. The main goal of this article is therefore to analyze and criticize the business judgment rule in the new Czech legislation and to compare it to notable foreign legal systems. The methods used are inductive and deductive reasoning, author‘s own analysis of legal text, comparative method and compilation of available resources relating to the topic of the article.

  8. Conservation of concrete structures according to fib Model Code 2010

    NARCIS (Netherlands)

    Matthews, S.; Bigaj-Van Vliet, A.; Ueda, T.

    2013-01-01

    Conservation of concrete structures forms an essential part of the fib Model Code for Concrete Structures 2010 (fib Model Code 2010). In particular, Chapter 9 of fib Model Code 2010 addresses issues concerning conservation strategies and tactics, conservation management, condition surveys, condition

  9. Cramer's Rule Revisited

    Science.gov (United States)

    Ayoub, Ayoub B.

    2005-01-01

    In 1750, the Swiss mathematician Gabriel Cramer published a well-written algebra book entitled "Introduction a l'Analyse des Lignes Courbes Algebriques." In the appendix to this book, Cramer gave, without proof, the rule named after him for solving a linear system of equations using determinants (Kosinki, 2001). Since then several derivations of…

  10. Crispen's Five Antivirus Rules.

    Science.gov (United States)

    Crispen, Patrick Douglas

    2000-01-01

    Explains five rules to protect computers from viruses. Highlights include commercial antivirus software programs and the need to upgrade them periodically (every year to 18 months); updating virus definitions at least weekly; scanning attached files from email with antivirus software before opening them; Microsoft Word macro protection; and the…

  11. Staff rules and regulations

    CERN Multimedia

    HR Department

    2007-01-01

    The 11th edition of the Staff Rules and Regulations, dated 1 January 2007, adopted by the Council and the Finance Committee in December 2006, is currently being distributed to departmental secretariats. The Staff Rules and Regulations, together with a summary of the main modifications made, will be available, as from next week, on the Human Resources Department's intranet site: http://cern.ch/hr-web/internal/admin_services/rules/default.asp The main changes made to the Staff Rules and Regulations stem from the five-yearly review of employment conditions of members of the personnel. The changes notably relate to: the categories of members of the personnel (e.g. removal of the local staff category); the careers structure and the merit recognition system; the non-residence, installation and re-installation allowances; the definition of family, family allowances and family-related leave; recognition of partnerships; education fees. The administrative circulars, some of which are being revised following the m...

  12. Rules of (Student) Engagement

    Science.gov (United States)

    Buskist, William; Busler, Jessica N.; Kirby, Lauren A. J.

    2018-01-01

    Teachers often think of student engagement in terms of hands-on activities that get students involved in their courses. They seldom consider the larger aspects of the teaching--learning environment that often influence the extent to which students are willing to become engaged in their coursework. In this chapter, we describe five "rules of…

  13. Ruled Laguerre minimal surfaces

    KAUST Repository

    Skopenkov, Mikhail; Pottmann, Helmut; Grohs, Philipp

    2011-01-01

    A Laguerre minimal surface is an immersed surface in ℝ 3 being an extremal of the functional ∫ (H 2/K-1)dA. In the present paper, we prove that the only ruled Laguerre minimal surfaces are up to isometry the surfaces ℝ (φλ) = (Aφ, Bφ, Cφ + D cos 2φ

  14. Ten-day rule

    International Nuclear Information System (INIS)

    Knox, E.G.; Stewart, A.M.; Kneale, G.W.; Gilman, E.A.

    1987-01-01

    The authors argue against R.H. Mole's paper (Lancet, Dec. 12 1987), supporting the relaxation of ICRP recommendations and the DHSS decision to withdraw the 10 day rule in relation to diagnostic radiography for menstruating women, and draw attention to the recent refinement of estimates of the enhanced risk of childhood cancers, following diagnostic radiography during pregnancy. (U.K.)

  15. TEDXCERN BREAKS THE RULES

    CERN Multimedia

    CERN, Bulletin

    2015-01-01

    On Friday, 9 October, TEDxCERN brought together 14 ‘rule-breakers’ to explore ideas that push beyond the boundaries of academia. They addressed a full house of 600 audience members, as well as thousands watching the event online.

  16. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  17. American Housing Survey (AHS)

    Science.gov (United States)

    Employment and Payroll Survey of Business Owners Work from Home Our statistics highlight trends in household statistics from multiple surveys. Data Tools & Apps Main American FactFinder Census Business Builder My Classification Codes (i.e., NAICS) Economic Census Economic Indicators Economic Studies Industry Statistics

  18. Our Surveys & Programs

    Science.gov (United States)

    Employment and Payroll Survey of Business Owners Work from Home Our statistics highlight trends in household statistics from multiple surveys. Data Tools & Apps Main American FactFinder Census Business Builder My Classification Codes (i.e., NAICS) Economic Census Economic Indicators Economic Studies Industry Statistics

  19. Coding Theory and Applications : 4th International Castle Meeting

    CERN Document Server

    Malonek, Paula; Vettori, Paolo

    2015-01-01

    The topics covered in this book, written by researchers at the forefront of their field, represent some of the most relevant research areas in modern coding theory: codes and combinatorial structures, algebraic geometric codes, group codes, quantum codes, convolutional codes, network coding and cryptography. The book includes a survey paper on the interconnections of coding theory with constrained systems, written by an invited speaker, as well as 37 cutting-edge research communications presented at the 4th International Castle Meeting on Coding Theory and Applications (4ICMCTA), held at the Castle of Palmela in September 2014. The event’s scientific program consisted of four invited talks and 39 regular talks by authors from 24 different countries. This conference provided an ideal opportunity for communicating new results, exchanging ideas, strengthening international cooperation, and introducing young researchers into the coding theory community.

  20. Struggle against violations of the rules for radioactive materials storage, utilization, accounting and transport

    International Nuclear Information System (INIS)

    Iojrysh, A.I.

    1986-01-01

    Criminal punishments for violation of the rules of radioactive materials accounting, storage, utilization and transport or those for illegimate sending of these materials presupposed by the RSFSR criminal code are considered

  1. 75 FR 28077 - Small Business Size Standards: Waiver of the Nonmanufacturer Rule

    Science.gov (United States)

    2010-05-19

    ... class waiver of the Nonmanufacturer Rule for Improved Outer Tactical Vests and related accessories under... Class Waiver for Improved Outer Tactical Vests, PSC 8470, NAICS code 339113, Federal Register Notice...

  2. 78 FR 18235 - Unified Rule for Loss on Subsidiary Stock

    Science.gov (United States)

    2013-03-26

    ... DEPARTMENT OF THE TREASURY Internal Revenue Service 26 CFR Part 1 Unified Rule for Loss on... first sentence, reinstate the following sentence: Sec. 1.1502-32 Investment adjustments. * * * * * (c... than the time the distribution is taken into account under the Internal Revenue Code (e.g., under...

  3. Coding conventions and principles for a National Land-Change Modeling Framework

    Science.gov (United States)

    Donato, David I.

    2017-07-14

    This report establishes specific rules for writing computer source code for use with the National Land-Change Modeling Framework (NLCMF). These specific rules consist of conventions and principles for writing code primarily in the C and C++ programming languages. Collectively, these coding conventions and coding principles create an NLCMF programming style. In addition to detailed naming conventions, this report provides general coding conventions and principles intended to facilitate the development of high-performance software implemented with code that is extensible, flexible, and interoperable. Conventions for developing modular code are explained in general terms and also enabled and demonstrated through the appended templates for C++ base source-code and header files. The NLCMF limited-extern approach to module structure, code inclusion, and cross-module access to data is both explained in the text and then illustrated through the module templates. Advice on the use of global variables is provided.

  4. Codes and curves

    CERN Document Server

    Walker, Judy L

    2000-01-01

    When information is transmitted, errors are likely to occur. Coding theory examines efficient ways of packaging data so that these errors can be detected, or even corrected. The traditional tools of coding theory have come from combinatorics and group theory. Lately, however, coding theorists have added techniques from algebraic geometry to their toolboxes. In particular, by re-interpreting the Reed-Solomon codes, one can see how to define new codes based on divisors on algebraic curves. For instance, using modular curves over finite fields, Tsfasman, Vladut, and Zink showed that one can define a sequence of codes with asymptotically better parameters than any previously known codes. This monograph is based on a series of lectures the author gave as part of the IAS/PCMI program on arithmetic algebraic geometry. Here, the reader is introduced to the exciting field of algebraic geometric coding theory. Presenting the material in the same conversational tone of the lectures, the author covers linear codes, inclu...

  5. New selection criteria for channel refueling of a Candu-6 reactor: introduction to floppy rules

    International Nuclear Information System (INIS)

    Brissette, D.

    2001-01-01

    A revised set of rules is in use at Gentilly-2 NGS for the selection of channels for refuelling. Traditional hard channel rejection rules (of go/no-go type) have been replaced by a more efficient set of soft evaluation rules based on concepts borrowed to the Fuzzy Logic. New evaluation rules, labelled as 'Floppy Rules', enable to assess and rate the channel suitability for refuelling by using a smooth and natural continuum of values qualifying excellent, good, fair and poor choices. Global channel suitability for refuelling is measured by combining separate ratings obtained from individual evaluation rules. Each evaluation rule is based on a specific control parameter related to local or lumped core properties. Two new software codes (NEWRULES and REFUEL) designed around the concept of Floppy Rules enable to perform a very efficient selection of optimized channel refuelling sequences either in manual and automatic mode. (author)

  6. [Oral communication: short history and some rules].

    Science.gov (United States)

    Panini, Roberta; Fiorini, Fulvio

    2015-01-01

    The verbal communication represents the first human communication, that even more used and one most immediate. History and the development of communication is divided into historical periods, is complex and is bound to the period contingencies and to the social reference community. The oral communication is never isolated but is always taken by the not verbal one, including the silences, the position and the spaces (c.d. proxemics). The good communicator stimulates the cooperation through the conversation rule respect (qualities, amounts, way and relation) and reduces the possible asymmetry between broadcaster and receiver fitting its code to that of the interlocutor.

  7. Design rules against buckling of dished heads

    International Nuclear Information System (INIS)

    Roche, R.L.; Alix, M.; Autrusson, B.

    1984-01-01

    The aim of this paper is to present the validation of the rules of the French code of presure vessels CODAP. First, it is shown that the theories of buckling cannot give alone a sufficient base of validation and that the experimental justification is necessary. Then, the admissible pressure values corresponding to the CODAP formules are compared with the experimental results. This comparison furnishes the safety margins given by the CODAP formules. Finally, buckling tests of torispherical shells carried out at the CEA Saclay (France) are presented. The results obtained can be represented by a simple semi-empiric formula [fr

  8. Application of American and French rules for the next belgian PWR

    International Nuclear Information System (INIS)

    Roch, M.; Cavaco, A.

    1987-01-01

    The licensing practice in Belgium is evolving from the precedent compliance with the USNRC rules (as applied to the 4 last Belgian PWRs) to a more sophisticated approach applied to the next Belgian PWR (N8), which incorporates a mixed compliance with the USNRC or with French rules, depending on the equipment, the structure or the system considered. In this paper, we present the approach concerning the licensing rules applicable to N8. The following aspects are covered: rules applicable to the NSSS; rules applicable to the BOP (codes of design for systems and structures); rules applicable to the equipment (code of construction for mechanical and electrical components); impact on the lay-out of the plant. Some examples of application of this methodology are given. (author)

  9. Convention on nuclear safety. Rules of procedure and financial rules

    International Nuclear Information System (INIS)

    1998-01-01

    The document presents the Rules of Procedure and Financial Rules that apply mutatis mutandis to any meeting of the Contracting Parties to the Convention on Nuclear Safety (INFCIRC/449) convened in accordance with Chapter 3 of the Convention. It includes four parts: General provisions, Preparatory process for review meetings, Review meetings, and Amendment and interpretation of rules

  10. Use of the algebraic coding theory in nuclear electronics

    International Nuclear Information System (INIS)

    Nikityuk, N.M.

    1990-01-01

    New results of studies of the development and use of the syndrome coding method in nuclear electronics are described. Two aspects of using the syndrome coding method are considered for sequential coding devices and for the creation of fast parallel data compression devices. Specific examples of the creation of time-to-digital converters based on circular counters are described. Several time intervals can be coded very fast and with a high resolution by means of these converters. The effective coding matrix which can be used for light signal coding. The rule of constructing such coding matrices for arbitrary number of channels and multiplicity n is given. The methods for solving ambiguities in silicon detectors and for creating the special-purpose processors for high-energy spectrometers are given. 21 refs.; 9 figs.; 3 tabs

  11. Rules of Deception

    DEFF Research Database (Denmark)

    Juhlin, Jonas

    In all wars, deception has been an important element for the military planners, on both the tactical level and the operational level. The good, effective deception operation is of great risk of conflicting with the current Laws of Armed Conflicts, which will be of great concern for the deception ......, the paper will discuss how the inclusion of mission specific rules of deception can greatly help define the boundaries, and give necessary guide lines for conducting deception operations within the laws of armed conflict....

  12. [Student nurses and the code of ethics].

    Science.gov (United States)

    Trolliet, Julie

    2017-09-01

    Student nurses, just like all practising professionals, are expected to be aware of and to respect the code of ethics governing their profession. Since the publication of this code, actions to raise awareness of it and explain it to all the relevant players have been put in place. The French National Federation of Student Nurses decided to survey future professionals regarding this new text. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  13. Consistence of Network Filtering Rules

    Institute of Scientific and Technical Information of China (English)

    SHE Kun; WU Yuancheng; HUANG Juncai; ZHOU Mingtian

    2004-01-01

    The inconsistence of firewall/VPN(Virtual Private Network) rule makes a huge maintainable cost.With development of Multinational Company,SOHO office,E-government the number of firewalls/VPN will increase rapidly.Rule table in stand-alone or network will be increased in geometric series accordingly.Checking the consistence of rule table manually is inadequate.A formal approach can define semantic consistence,make a theoretic foundation of intelligent management about rule tables.In this paper,a kind of formalization of host rules and network ones for auto rule-validation based on SET theory were proporsed and a rule validation scheme was defined.The analysis results show the superior performance of the methods and demonstrate its potential for the intelligent management based on rule tables.

  14. 76 FR 12082 - U.S. Court of Appeals for the Armed Forces Proposed Rules Changes

    Science.gov (United States)

    2011-03-04

    ... the Court. (b) Any violation of this rule will be deemed a contempt of this Court and, after due... rule will be deemed a contempt of this Court and, after due notice and hearing, may be punished... Article 48, Uniform Code of Military Justice, to give express contempt power to the United States Court of...

  15. 42 CFR 414.46 - Additional rules for payment of anesthesia services.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Additional rules for payment of anesthesia services... Physicians and Other Practitioners § 414.46 Additional rules for payment of anesthesia services. (a... each anesthesia code that reflects all activities other than anesthesia time. These activities include...

  16. 75 FR 55295 - List of Rules To Be Reviewed Pursuant to the Regulatory Flexibility Act

    Science.gov (United States)

    2010-09-10

    ... securities held or to be acquired by the fund. The rule requires 17j-1 organizations to adopt codes of ethics... liability for manipulation under Sections 9(a)(2) and 10(b) of the Exchange Act, and Rule 10b-5 thereunder...

  17. 26 CFR 1.6662-3 - Negligence or disregard of rules or regulations.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 13 2010-04-01 2010-04-01 false Negligence or disregard of rules or regulations... Penalties § 1.6662-3 Negligence or disregard of rules or regulations. (a) In general. If any portion of an... Internal Revenue Code that is required to be shown on a return is attributable to negligence or disregard...

  18. 78 FR 12684 - Proposed Significant New Use Rules on Certain Chemical Substances

    Science.gov (United States)

    2013-02-25

    ..., importers, or processors of one or more subject chemical substances (NAICS codes 325 and 324110), e.g... a use changes the type or form of exposure of human beings or the environment to a chemical... assigned in the regulatory text section of this proposed rule. This proposed rule includes 14 PMN...

  19. 76 FR 46805 - Notice of Utah Adoption by Reference of the Pesticide Container Containment Rule

    Science.gov (United States)

    2011-08-03

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9447-8] Notice of Utah Adoption by Reference of the Pesticide Container Containment Rule AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: This... Pesticide Container Containment (PCC) Rule regulations. In accordance with State of Utah Agricultural Code...

  20. 26 CFR 48.4223-1 - Special rules relating to further manufacture.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 16 2010-04-01 2010-04-01 true Special rules relating to further manufacture.... § 48.4223-1 Special rules relating to further manufacture. (a) Purchasing manufacturer to be treated as... resold tax free under section 4221(a)(1) of the Code for use by it in further manufacture shall be...

  1. Achieving 95% probability level using best estimate codes and the code scaling, applicability and uncertainty (CSAU) [Code Scaling, Applicability and Uncertainty] methodology

    International Nuclear Information System (INIS)

    Wilson, G.E.; Boyack, B.E.; Duffey, R.B.; Griffith, P.; Katsma, K.R.; Lellouche, G.S.; Rohatgi, U.S.; Wulff, W.; Zuber, N.

    1988-01-01

    Issue of a revised rule for loss of coolant accident/emergency core cooling system (LOCA/ECCS) analysis of light water reactors will allow the use of best estimate (BE) computer codes in safety analysis, with uncertainty analysis. This paper describes a systematic methodology, CSAU (Code Scaling, Applicability and Uncertainty), which will provide uncertainty bounds in a cost effective, auditable, rational and practical manner. 8 figs., 2 tabs

  2. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    This essay studies the source code of an artwork from a software studies perspective. By examining code that come close to the approach of critical code studies (Marino, 2006), I trace the network artwork, Pupufu (Lin, 2009) to understand various real-time approaches to social media platforms (MSN......, Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...... to understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  3. Coding for optical channels

    CERN Document Server

    Djordjevic, Ivan; Vasic, Bane

    2010-01-01

    This unique book provides a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory and optical communication.

  4. SEVERO code - user's manual

    International Nuclear Information System (INIS)

    Sacramento, A.M. do.

    1989-01-01

    This user's manual contains all the necessary information concerning the use of SEVERO code. This computer code is related to the statistics of extremes = extreme winds, extreme precipitation and flooding hazard risk analysis. (A.C.A.S.)

  5. Synthesizing Certified Code

    OpenAIRE

    Whalen, Michael; Schumann, Johann; Fischer, Bernd

    2002-01-01

    Code certification is a lightweight approach for formally demonstrating software quality. Its basic idea is to require code producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates that can be checked independently. Since code certification uses the same underlying technology as program verification, it requires detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding annotations to th...

  6. FERRET data analysis code

    International Nuclear Information System (INIS)

    Schmittroth, F.

    1979-09-01

    A documentation of the FERRET data analysis code is given. The code provides a way to combine related measurements and calculations in a consistent evaluation. Basically a very general least-squares code, it is oriented towards problems frequently encountered in nuclear data and reactor physics. A strong emphasis is on the proper treatment of uncertainties and correlations and in providing quantitative uncertainty estimates. Documentation includes a review of the method, structure of the code, input formats, and examples

  7. Stylize Aesthetic QR Code

    OpenAIRE

    Xu, Mingliang; Su, Hao; Li, Yafei; Li, Xi; Liao, Jing; Niu, Jianwei; Lv, Pei; Zhou, Bing

    2018-01-01

    With the continued proliferation of smart mobile devices, Quick Response (QR) code has become one of the most-used types of two-dimensional code in the world. Aiming at beautifying the appearance of QR codes, existing works have developed a series of techniques to make the QR code more visual-pleasant. However, these works still leave much to be desired, such as visual diversity, aesthetic quality, flexibility, universal property, and robustness. To address these issues, in this paper, we pro...

  8. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  9. Proof Rules for Recursive Procedures

    NARCIS (Netherlands)

    Hesselink, Wim H.

    1993-01-01

    Four proof rules for recursive procedures in a Pascal-like language are presented. The main rule deals with total correctness and is based on results of Gries and Martin. The rule is easier to apply than Martin's. It is introduced as an extension of a specification format for Pascal-procedures, with

  10. Endogeneously arising network allocation rules

    NARCIS (Netherlands)

    Slikker, M.

    2006-01-01

    In this paper we study endogenously arising network allocation rules. We focus on three allocation rules: the Myerson value, the position value and the component-wise egalitarian solution. For any of these three rules we provide a characterization based on component efficiency and some balanced

  11. Transformation of Graphical ECA Policies into Executable PonderTalk Code

    Science.gov (United States)

    Romeikat, Raphael; Sinsel, Markus; Bauer, Bernhard

    Rules are becoming more and more important in business modeling and systems engineering and are recognized as a high-level programming paradigma. For the effective development of rules it is desired to start at a high level, e.g. with graphical rules, and to refine them into code of a particular rule language for implementation purposes later. An model-driven approach is presented in this paper to transform graphical rules into executable code in a fully automated way. The focus is on event-condition-action policies as a special rule type. These are modeled graphically and translated into the PonderTalk language. The approach may be extended to integrate other rule types and languages as well.

  12. Canadian energy standards : residential energy code requirements

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, K. [SAR Engineering Ltd., Burnaby, BC (Canada)

    2006-09-15

    A survey of residential energy code requirements was discussed. New housing is approximately 13 per cent more efficient than housing built 15 years ago, and more stringent energy efficiency requirements in building codes have contributed to decreased energy use and greenhouse gas (GHG) emissions. However, a survey of residential energy codes across Canada has determined that explicit demands for energy efficiency are currently only present in British Columbia (BC), Manitoba, Ontario and Quebec. The survey evaluated more than 4300 single-detached homes built between 2000 and 2005 using data from the EnerGuide for Houses (EGH) database. House area, volume, airtightness and construction characteristics were reviewed to create archetypes for 8 geographic areas. The survey indicated that in Quebec and the Maritimes, 90 per cent of houses comply with ventilation system requirements of the National Building Code, while compliance in the rest of Canada is much lower. Heat recovery ventilation use is predominant in the Atlantic provinces. Direct-vent or condensing furnaces constitute the majority of installed systems in provinces where natural gas is the primary space heating fuel. Details of Insulation levels for walls, double-glazed windows, and building code insulation standards were also reviewed. It was concluded that if R-2000 levels of energy efficiency were applied, total average energy consumption would be reduced by 36 per cent in Canada. 2 tabs.

  13. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    doing formal coding and when doing more “traditional” conversation analysis research based on collections. We are more wary, however, of the implication that coding-based research is the end result of a process that starts with qualitative investigations and ends with categories that can be coded...

  14. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow...

  15. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  16. Development and validation of a measure of display rule knowledge: the display rule assessment inventory.

    Science.gov (United States)

    Matsumoto, David; Yoo, Seung Hee; Hirayama, Satoko; Petrova, Galina

    2005-03-01

    As one component of emotion regulation, display rules, which reflect the regulation of expressive behavior, have been the topic of many studies. Despite their theoretical and empirical importance, however, to date there is no measure of display rules that assesses a full range of behavioral responses that are theoretically possible when emotion is elicited. This article reports the development of a new measure of display rules that surveys 5 expressive modes: expression, deamplification, amplification, qualification, and masking. Two studies provide evidence for its internal and temporal reliability and for its content, convergent, discriminant, external, and concurrent predictive validity. Additionally, Study 1, involving American, Russian, and Japanese participants, demonstrated predictable cultural differences on each of the expressive modes. Copyright 2005 APA, all rights reserved.

  17. SHORT OVERVIEW OF INTERNATIONAL ARBITRATION RULING IN ROMANIA FROM THE PERSPECTIVE OF THE RULES OF NEWLY ESTABLISHED ARBITRATION FORUMS

    Directory of Open Access Journals (Sweden)

    Beatrice Onica-Jarka

    2016-11-01

    Full Text Available In Romania there are several traditional or new arbitral Courtsthat are willing to provide their services to legal entities in an international context and in a competent and efficient semblance. Two of these, the Arbitration Court of the Romanian-German Chamber of Industry and Commerce and Bucharest International Arbitration Court, adopted their Rules relatively recent and eluded from practitionersreviews. Therefore, the present article will analyze the Rules of the mentioned arbitral Courts by comparison with the ICC Rules, LCIA Rules and HKIAC Rules, starting from the most valuable characteristics of international arbitration, as determined in the 2015 International Arbitration Survey, with the purpose of concluding if the new arbitral Courts of Romania are important competitors in the field and if their recommended arbitration agreement should be included in the commercial agreements.

  18. Software Certification - Coding, Code, and Coders

    Science.gov (United States)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  19. Learning and coding in biological neural networks

    Science.gov (United States)

    Fiete, Ila Rani

    How can large groups of neurons that locally modify their activities learn to collectively perform a desired task? Do studies of learning in small networks tell us anything about learning in the fantastically large collection of neurons that make up a vertebrate brain? What factors do neurons optimize by encoding sensory inputs or motor commands in the way they do? In this thesis I present a collection of four theoretical works: each of the projects was motivated by specific constraints and complexities of biological neural networks, as revealed by experimental studies; together, they aim to partially address some of the central questions of neuroscience posed above. We first study the role of sparse neural activity, as seen in the coding of sequential commands in a premotor area responsible for birdsong. We show that the sparse coding of temporal sequences in the songbird brain can, in a network where the feedforward plastic weights must translate the sparse sequential code into a time-varying muscle code, facilitate learning by minimizing synaptic interference. Next, we propose a biologically plausible synaptic plasticity rule that can perform goal-directed learning in recurrent networks of voltage-based spiking neurons that interact through conductances. Learning is based on the correlation of noisy local activity with a global reward signal; we prove that this rule performs stochastic gradient ascent on the reward. Thus, if the reward signal quantifies network performance on some desired task, the plasticity rule provably drives goal-directed learning in the network. To assess the convergence properties of the learning rule, we compare it with a known example of learning in the brain. Song-learning in finches is a clear example of a learned behavior, with detailed available neurophysiological data. With our learning rule, we train an anatomically accurate model birdsong network that drives a sound source to mimic an actual zebrafinch song. Simulation and

  20. The network code

    International Nuclear Information System (INIS)

    1997-01-01

    The Network Code defines the rights and responsibilities of all users of the natural gas transportation system in the liberalised gas industry in the United Kingdom. This report describes the operation of the Code, what it means, how it works and its implications for the various participants in the industry. The topics covered are: development of the competitive gas market in the UK; key points in the Code; gas transportation charging; impact of the Code on producers upstream; impact on shippers; gas storage; supply point administration; impact of the Code on end users; the future. (20 tables; 33 figures) (UK)

  1. Coding for Electronic Mail

    Science.gov (United States)

    Rice, R. F.; Lee, J. J.

    1986-01-01

    Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.

  2. Section 60 revisited (The Ontario Electrical Safety Code)

    Energy Technology Data Exchange (ETDEWEB)

    Olechna, T.

    2003-06-01

    Recent changes to the Ontario Electrical Safety Code (OESC), specifically the deletion of Section 60, Electrical Communication Systems, are discussed in an effort to explain the history behind the decision and the time frame of the changes. Communication systems include telephone, telegraph, data communications, intercommunications, wired music and paging systems. In brief, the deletion of Section 60 occurred in 1983, and resulted from the fact that communication-type wiring was historically the property of the communications utility and under federal jurisdiction. Since such equipment was under federal jurisdiction, they were not inspected in Ontario, hence the deletion of Section 60 from the Ontario Code. It should be noted that although Section 60 is deleted, a number of rules applicable to communications circuits are spread throughout various sections of the Code, notably in Rule 1-032 dealing with damage and interference, Rule 4-022 involving harmonics issues, Rule 12-904(2) regulates the use of conductors that are of different sources of voltage, and Rule 10-708 which specifies the spacing and bonding requirements for communications systems. The end result is that even though Section 60 was deleted, there are these and other rules in the OESC that have direct impact on communications circuits and in effect help to protect the integrity of the system.

  3. Business rules for creating process flexibility : Mapping RIF rules and BDI rules

    NARCIS (Netherlands)

    Gong, Y.; Overbeek, S.J.; Janssen, M.

    2011-01-01

    Business rules and software agents can be used for creating flexible business processes. The Rule Interchange Format (RIF) is a new W3C recommendation standard for exchanging rules among disparate systems. Yet, the impact that the introduction of RIF has on the design of flexible business processes

  4. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  5. XSOR codes users manual

    International Nuclear Information System (INIS)

    Jow, Hong-Nian; Murfin, W.B.; Johnson, J.D.

    1993-11-01

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ''XSOR''. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms

  6. Post Rule of Law

    DEFF Research Database (Denmark)

    Carlson, Kerstin Bree

    2016-01-01

    The value of developing hybrid international criminal procedure (ICP) is that it is arguably inclusive (representing two major legal traditions) and distinct from any domestic system, thus creating a separate, sui generis realm for international criminal law (ICL) jurists to meet. Since its...... addresses the practice of hybridity in ICP, drawing examples from the construction and evolution of hybrid procedure at the International Criminal Tribunal for the Former Yugoslavia (ICTY), to argue that the hybridity practiced by international criminal tribunals renders them ‘post rule of law’ institutions...

  7. OZI rule and instantons

    International Nuclear Information System (INIS)

    Nowak, M.A.; Zahed, I.; Verbaarschot, J.J.M.

    1989-01-01

    We investigate the effects of strangeness mixing in the QCD vacuum described as a quantum disordered phase of instantons and anti-instantons. We find that the constituent mass of the light quarks is a decreasing function of the current quark masses, and that its mass is almost insensitive to the value of the strange quark mass. Our results cannot account for a breach in the OZI rule in the vacuum. The relevance of this result for the amount of santi s pairs in the nucleon and the pion-nucleon sigma term is discussed. (orig.)

  8. Description logic rules

    CERN Document Server

    Krötzsch, M

    2010-01-01

    Ontological modelling today is applied in many areas of science and technology,including the Semantic Web. The W3C standard OWL defines one of the most important ontology languages based on the semantics of description logics. An alternative is to use rule languages in knowledge modelling, as proposed in the W3C's RIF standard. So far, it has often been unclear how to combine both technologies without sacrificing essential computational properties. This book explains this problem and presents new solutions that have recently been proposed. Extensive introductory chapters provide the necessary

  9. Reactor lattice codes

    International Nuclear Information System (INIS)

    Kulikowska, T.

    1999-01-01

    The present lecture has a main goal to show how the transport lattice calculations are realised in a standard computer code. This is illustrated on the example of the WIMSD code, belonging to the most popular tools for reactor calculations. Most of the approaches discussed here can be easily modified to any other lattice code. The description of the code assumes the basic knowledge of reactor lattice, on the level given in the lecture on 'Reactor lattice transport calculations'. For more advanced explanation of the WIMSD code the reader is directed to the detailed descriptions of the code cited in References. The discussion of the methods and models included in the code is followed by the generally used homogenisation procedure and several numerical examples of discrepancies in calculated multiplication factors based on different sources of library data. (author)

  10. DLLExternalCode

    Energy Technology Data Exchange (ETDEWEB)

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  11. High Level Rule Modeling Language for Airline Crew Pairing

    Science.gov (United States)

    Mutlu, Erdal; Birbil, Ş. Ilker; Bülbül, Kerem; Yenigün, Hüsnü

    2011-09-01

    The crew pairing problem is an airline optimization problem where a set of least costly pairings (consecutive flights to be flown by a single crew) that covers every flight in a given flight network is sought. A pairing is defined by using a very complex set of feasibility rules imposed by international and national regulatory agencies, and also by the airline itself. The cost of a pairing is also defined by using complicated rules. When an optimization engine generates a sequence of flights from a given flight network, it has to check all these feasibility rules to ensure whether the sequence forms a valid pairing. Likewise, the engine needs to calculate the cost of the pairing by using certain rules. However, the rules used for checking the feasibility and calculating the costs are usually not static. Furthermore, the airline companies carry out what-if-type analyses through testing several alternate scenarios in each planning period. Therefore, embedding the implementation of feasibility checking and cost calculation rules into the source code of the optimization engine is not a practical approach. In this work, a high level language called ARUS is introduced for describing the feasibility and cost calculation rules. A compiler for ARUS is also implemented in this work to generate a dynamic link library to be used by crew pairing optimization engines.

  12. Inelasticity and the ASME code

    International Nuclear Information System (INIS)

    Berman, I.

    1978-01-01

    Although it may have more general applicability, this paper is specifically concerned with some aspects of plasticity for class I nuclear components that are contained in section III of the ASME Boiler and Pressure Vessel Code. It directly addresses design for components at temperatures at which creep is not a factor. A review is made of the relationship of plasticity to each of the three failure modes that the stress limits are intended to prevent. It is found that the prevention of bursting and gross distortion from a single application of pressure and the prevention of fatigue failure caused by repeated cycles of peak stresses are well supported by experimental results. The experimental verification for the rules to show that the primary plus secondary stresses shakedown to elastic behavior is not clear. Various directed efforts which could lead to greater assurance of shakedown to elastic behavior are suggested. The major approach should be a massive program to develop a test matrix of experimental information for various portions of each component of interest in the Code. (Auth.)

  13. 75 FR 60632 - Hazardous Waste Management System; Identification and Listing of Hazardous Waste; Direct Final Rule

    Science.gov (United States)

    2010-10-01

    ... Waste Management System; Identification and Listing of Hazardous Waste; Direct Final Rule AGENCY... management and treatment of several F- and K-waste codes. These waste codes are F037, F038, K048, K049, K051... released from the waste, plausible and specific types of management of the petitioned waste, the quantities...

  14. 75 FR 20870 - Small Business Size Standards: Waiver of the Nonmanufacturer Rule

    Science.gov (United States)

    2010-04-21

    ... for Improved Outer Tactical Vests and related accessories under Product Service Code (PSC) 8470 (Armor... granting a waiver of the Nonmanufacturer Rule for Improved Outer Tactical Vests. According to a request, no... Outer Tactical Vests and related accessories under NAICS code 339113, Surgical Appliance and Supplies...

  15. Hominoid-specific de novo protein-coding genes originating from long non-coding RNAs.

    Directory of Open Access Journals (Sweden)

    Chen Xie

    2012-09-01

    Full Text Available Tinkering with pre-existing genes has long been known as a major way to create new genes. Recently, however, motherless protein-coding genes have been found to have emerged de novo from ancestral non-coding DNAs. How these genes originated is not well addressed to date. Here we identified 24 hominoid-specific de novo protein-coding genes with precise origination timing in vertebrate phylogeny. Strand-specific RNA-Seq analyses were performed in five rhesus macaque tissues (liver, prefrontal cortex, skeletal muscle, adipose, and testis, which were then integrated with public transcriptome data from human, chimpanzee, and rhesus macaque. On the basis of comparing the RNA expression profiles in the three species, we found that most of the hominoid-specific de novo protein-coding genes encoded polyadenylated non-coding RNAs in rhesus macaque or chimpanzee with a similar transcript structure and correlated tissue expression profile. According to the rule of parsimony, the majority of these hominoid-specific de novo protein-coding genes appear to have acquired a regulated transcript structure and expression profile before acquiring coding potential. Interestingly, although the expression profile was largely correlated, the coding genes in human often showed higher transcriptional abundance than their non-coding counterparts in rhesus macaque. The major findings we report in this manuscript are robust and insensitive to the parameters used in the identification and analysis of de novo genes. Our results suggest that at least a portion of long non-coding RNAs, especially those with active and regulated transcription, may serve as a birth pool for protein-coding genes, which are then further optimized at the transcriptional level.

  16. Code of Practice for Protection Against Ionizing Radiation Emitted from X-ray Analysis Equipment (1984)

    International Nuclear Information System (INIS)

    1984-01-01

    Appropriate working rules, safety features and monitoring requirements for general X-ray analysis units or equipment are laid down in this Code which is intended for users of such equipment. The Code advises that establishments draw up their own working procedures based on appropriate legislation and on the recommendations contained in this Code. The Code also describes the requirements for X-ray analysis equipment necessary to ensure safety. (NEA) [fr

  17. Toric Varieties and Codes, Error-correcting Codes, Quantum Codes, Secret Sharing and Decoding

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    We present toric varieties and associated toric codes and their decoding. Toric codes are applied to construct Linear Secret Sharing Schemes (LSSS) with strong multiplication by the Massey construction. Asymmetric Quantum Codes are obtained from toric codes by the A.R. Calderbank P.W. Shor and A.......M. Steane construction of stabilizer codes (CSS) from linear codes containing their dual codes....

  18. RCC-CW - Rules for design and construction of PWR nuclear civil works

    International Nuclear Information System (INIS)

    2016-01-01

    RCC-CW describes the rules for designing, building and testing civil engineering works in PWR reactors. It explains the principles and requirements for the safety, serviceability and durability of concrete and metal frame structures, based on Eurocode design principles (European standards for the structural design of construction works) combined with specific measures for safety-class buildings. The code is produced as part of the RCC-CW Subcommittee, which includes all the parties involved in civil engineering works in the nuclear sector: clients, contractors, general and specialized firms, consultancies and inspection offices. The code covers the following areas relating to the design and construction of civil engineering works that play an important safety role: geotechnical aspects, reinforced concrete structures and galleries, pre-stressed containments with metal liner, metal containment and pool liners, metal frames, anchors, concrete cylinder pipes, containment leak tests. The RCC-CW code is available as an ETC-C version specific to EPR projects (European pressurized reactor). Contents of the 2016 edition of the RCC-CW Code: Part G - General: scope, standards, notations, quality management, general principles; Part D - Design: actions and combinations of actions, geotechnical aspects, pre-stressed or reinforced concrete structures, metal containment liners, metal pool liners, metal frames, anchors; Part C - Construction: geotechnical aspects, concrete, surface finish and formwork, reinforcement for reinforced concrete, pre-stressing processes, prefabricated concrete elements, metal containment liners, metal pool liners, metal frames, anchors, embedded pipelines, joint sealing, survey networks and tolerances; Part M - Maintenance and monitoring: containment integrity and rate tests

  19. The Product and Quotient Rules Revisited

    Science.gov (United States)

    Eggleton, Roger; Kustov, Vladimir

    2011-01-01

    Mathematical elegance is illustrated by strikingly parallel versions of the product and quotient rules of basic calculus, with some applications. Corresponding rules for second derivatives are given: the product rule is familiar, but the quotient rule is less so.

  20. Hamburg rules V Hague Visby rules an English perspective

    OpenAIRE

    Tozaj Dorian; Xhelilaj Ermal

    2010-01-01

    It has often been argued for the effect of defences provided to carriers under Art IV (2) of Hague Visby Rules to almost nullify the protection guaranteed to shippers in other provisions of this convention. Therefore an all embracing universal shipper friendly convention, merely the Hamburg Rules, need be incorporated in all countries in order to address this issue and fully satisfy the intentions of the parties for the establishment of international rules in international trade

  1. Comparison of Thermal Creep Strain Calculation Results Using Time Hardening and Strain Hardening Rules

    International Nuclear Information System (INIS)

    Kim, Junehyung; Cheon, Jinsik; Lee, Byoungoon; Lee, Chanbock

    2014-01-01

    One of the design criteria for the fuel rod in PGSFR is the thermal creep strain of the cladding, because the cladding is exposed to a high temperature for a long time during reactor operation period. In general, there are two kind of calculation scheme for thermal creep strain: time hardening and strain hardening rules. In this work, thermal creep strain calculation results for HT9 cladding by using time hardening and strain hardening rules are compared by employing KAERI's current metallic fuel performance analysis code, MACSIS. Also, thermal creep strain calculation results by using ANL's metallic fuel performance analysis code, LIFE-METAL which adopts strain hardening rule are compared with those by using MACSIS. Thermal creep strain calculation results for HT9 cladding by using time hardening and strain hardening rules were compared by employing KAERI's current metallic fuel performance analysis code, MACSIS. Also, thermal creep strain calculation results by using ANL's metallic fuel performance analysis code, LIFE-METAL which adopts strain hardening rule were compared with those by using MACSIS. Tertiary creep started earlier in time hardening rule than in strain hardening rule. Also, calculation results by MACSIS with strain hardening and those obtained by using LIFE-METAL were almost identical to each other

  2. An Optimal Linear Coding for Index Coding Problem

    OpenAIRE

    Pezeshkpour, Pouya

    2015-01-01

    An optimal linear coding solution for index coding problem is established. Instead of network coding approach by focus on graph theoric and algebraic methods a linear coding program for solving both unicast and groupcast index coding problem is presented. The coding is proved to be the optimal solution from the linear perspective and can be easily utilize for any number of messages. The importance of this work is lying mostly on the usage of the presented coding in the groupcast index coding ...

  3. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  4. Majorana fermion codes

    International Nuclear Information System (INIS)

    Bravyi, Sergey; Terhal, Barbara M; Leemhuis, Bernhard

    2010-01-01

    We initiate the study of Majorana fermion codes (MFCs). These codes can be viewed as extensions of Kitaev's one-dimensional (1D) model of unpaired Majorana fermions in quantum wires to higher spatial dimensions and interacting fermions. The purpose of MFCs is to protect quantum information against low-weight fermionic errors, that is, operators acting on sufficiently small subsets of fermionic modes. We examine to what extent MFCs can surpass qubit stabilizer codes in terms of their stability properties. A general construction of 2D MFCs is proposed that combines topological protection based on a macroscopic code distance with protection based on fermionic parity conservation. Finally, we use MFCs to show how to transform any qubit stabilizer code to a weakly self-dual CSS code.

  5. Theory of epigenetic coding.

    Science.gov (United States)

    Elder, D

    1984-06-07

    The logic of genetic control of development may be based on a binary epigenetic code. This paper revises the author's previous scheme dealing with the numerology of annelid metamerism in these terms. Certain features of the code had been deduced to be combinatorial, others not. This paradoxical contrast is resolved here by the interpretation that these features relate to different operations of the code; the combinatiorial to coding identity of units, the non-combinatorial to coding production of units. Consideration of a second paradox in the theory of epigenetic coding leads to a new solution which further provides a basis for epimorphic regeneration, and may in particular throw light on the "regeneration-duplication" phenomenon. A possible test of the model is also put forward.

  6. DISP1 code

    International Nuclear Information System (INIS)

    Vokac, P.

    1999-12-01

    DISP1 code is a simple tool for assessment of the dispersion of the fission product cloud escaping from a nuclear power plant after an accident. The code makes it possible to tentatively check the feasibility of calculations by more complex PSA3 codes and/or codes for real-time dispersion calculations. The number of input parameters is reasonably low and the user interface is simple enough to allow a rapid processing of sensitivity analyses. All input data entered through the user interface are stored in the text format. Implementation of dispersion model corrections taken from the ARCON96 code enables the DISP1 code to be employed for assessment of the radiation hazard within the NPP area, in the control room for instance. (P.A.)

  7. Introducing an interface between FeynRules and WHIZARD

    Energy Technology Data Exchange (ETDEWEB)

    Christensen, Neil D. [Pittsburgh Univ., PA (United States). PITTsburgh Particle Physics, Astrophysics and Cosmology Center; Duhr, Claude [Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenology; Fuks, Benjamin [Strasbourg Univ. (France). Inst. Pluridisciplinaire Hubert Curien - Dept. Recherches Subatomiques; Reuter, Juergen [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany). Theory Group; Freiburg Univ. (Germany). Physikalisches Inst.; Edinburgh Univ. (United Kingdom). School of Physics and Astronomy; Speckner, Christian [Freiburg Univ. (Germany). Physikalisches Inst.

    2012-04-15

    While Monte Carlo event generators like WHIZARD have become indispensable tools in studying the impact of new physics on collider observables over the last decades, the implementation of new models in such packages has remained a rather awkward and error-prone process. Recently, the FeynRules package was introduced which greatly simplifies this process by providing a single unified model format from which model implementations for many different Monte Carlo codes can be derived automatically. In this note, we present an interface which extends FeynRules to provide this functionality also for the WHIZARD package, thus making WHIZARD's strengths and performance easily available to model builders.

  8. Removal of regulations on black lung benefits. Final rule.

    Science.gov (United States)

    2012-03-30

    This final rule removes regulations on the Black Lung program from the Social Security Administration's (SSA) chapter of the Code of Federal Regulations (CFR). The Black Lung Consolidation of Administrative Responsibility Act transferred the responsibility for administering Part B of the Black Lung benefits program from SSA to the Department of Labor (DOL), and we are removing the regulations in recognition of the fact that we are no longer responsible for administering any aspect of the Part B Black Lung program. DOL concurs with this final rule removing the regulations.

  9. Introducing an interface between FeynRules and WHIZARD

    International Nuclear Information System (INIS)

    Christensen, Neil D.; Duhr, Claude; Fuks, Benjamin; Reuter, Juergen; Freiburg Univ.; Edinburgh Univ.; Speckner, Christian

    2012-04-01

    While Monte Carlo event generators like WHIZARD have become indispensable tools in studying the impact of new physics on collider observables over the last decades, the implementation of new models in such packages has remained a rather awkward and error-prone process. Recently, the FeynRules package was introduced which greatly simplifies this process by providing a single unified model format from which model implementations for many different Monte Carlo codes can be derived automatically. In this note, we present an interface which extends FeynRules to provide this functionality also for the WHIZARD package, thus making WHIZARD's strengths and performance easily available to model builders.

  10. Phonological coding during reading.

    Science.gov (United States)

    Leinenger, Mallorie

    2014-11-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early [prelexical] or that phonological codes come online late [postlexical]) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eye-tracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model, Van Orden, 1987; dual-route model, e.g., M. Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001; parallel distributed processing model, Seidenberg & McClelland, 1989) are discussed. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  11. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  12. New Games, New Rules

    DEFF Research Database (Denmark)

    Constantiou, Ioanna; Kallinikos, Jannis

    2015-01-01

    Big data and the mechanisms by which it is produced and disseminated introduce important changes in the ways information is generated and made relevant for organizations. Big data often represents miscellaneous records of the whereabouts of large and shifting online crowds. It is frequently......, the usefulness of big data rests on their steady updatability, a condition that reduces the time span within which this data is useful or relevant. Jointly, these attributes challenge established rules of strategy making as these are manifested in the canons of procuring structured information of lasting value...... that addresses specific and long-term organizational objectives. The developments underlying big data thus seem to carry important implications for strategy making, and the data and information practices with which strategy has been associated. We conclude by placing the understanding of these changes within...

  13. Ruled Laguerre minimal surfaces

    KAUST Repository

    Skopenkov, Mikhail

    2011-10-30

    A Laguerre minimal surface is an immersed surface in ℝ 3 being an extremal of the functional ∫ (H 2/K-1)dA. In the present paper, we prove that the only ruled Laguerre minimal surfaces are up to isometry the surfaces ℝ (φλ) = (Aφ, Bφ, Cφ + D cos 2φ) + λ(sin φ, cos φ, 0), where A,B,C,D ε ℝ are fixed. To achieve invariance under Laguerre transformations, we also derive all Laguerre minimal surfaces that are enveloped by a family of cones. The methodology is based on the isotropic model of Laguerre geometry. In this model a Laguerre minimal surface enveloped by a family of cones corresponds to a graph of a biharmonic function carrying a family of isotropic circles. We classify such functions by showing that the top view of the family of circles is a pencil. © 2011 Springer-Verlag.

  14. The biosphere rules.

    Science.gov (United States)

    Unruh, Gregory C

    2008-02-01

    Sustainability, defined by natural scientists as the capacity of healthy ecosystems to function indefinitely, has become a clarion call for business. Leading companies have taken high-profile steps toward achieving it: Wal-Mart, for example, with its efforts to reduce packaging waste, and Nike, which has removed toxic chemicals from its shoes. But, says Unruh, the director of Thunderbird's Lincoln Center for Ethics in Global Management, sustainability is more than an endless journey of incremental steps. It is a destination, for which the biosphere of planet Earth--refined through billions of years of trial and error--is a perfect model. Unruh distills some lessons from the biosphere into three rules: Use a parsimonious palette. Managers can rethink their sourcing strategies and dramatically simplify the number and types of materials their companies use in production, making recycling cost-effective. After the furniture manufacturer Herman Miller discovered that its leading desk chair had 200 components made from more than 800 chemical compounds, it designed an award-winning successor whose far more limited materials palette is 96% recyclable. Cycle up, virtuously. Manufacturers should design recovery value into their products at the outset. Shaw Industries, for example, recycles the nylon fiber from its worn-out carpet into brand-new carpet tile. Exploit the power of platforms. Platform design in industry tends to occur at the component level--but the materials in those components constitute a more fundamental platform. Patagonia, by recycling Capilene brand performance underwear, has achieved energy costs 76% below those for virgin sourcing. Biosphere rules can teach companies how to build ecologically friendly products that both reduce manufacturing costs and prove highly attractive to consumers. And managers need not wait for a green technological revolution to implement them.

  15. MORSE Monte Carlo code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described

  16. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  17. Tokamak Systems Code

    International Nuclear Information System (INIS)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged

  18. A NEAR-INFRARED SPECTROSCOPIC SURVEY OF K-SELECTED GALAXIES AT z∼ 2.3: COMPARISON OF STELLAR POPULATION SYNTHESIS CODES AND CONSTRAINTS FROM THE REST-FRAME NIR

    International Nuclear Information System (INIS)

    Muzzin, Adam; Marchesini, Danilo; Van Dokkum, Pieter G.; Labbe, Ivo; Kriek, Mariska; Franx, Marijn

    2009-01-01

    We present spectral energy distribution (SED) modeling of a sample of 34 K-selected galaxies at z∼ 2.3. These galaxies have near-infrared (NIR) spectroscopy that samples the rest-frame Balmer/4000 A break as well as deep photometry in 13 broadband filters. New to our analysis is Infrared Array Camera (IRAC) data that extend the SEDs into the rest-frame NIR. Comparing parameters determined from SED fits with and without the IRAC data we find that the IRAC photometry significantly improves the confidence intervals of τ, A v , M star , and SFR for individual galaxies, but does not systematically alter the mean parameters of the sample. We use the IRAC data to assess how well current stellar population synthesis codes describe the rest-frame NIR SEDs of young galaxies where discrepancies between treatments of the thermally pulsating asymptotic giant branch phase of stellar evolution are most pronounced. The models of Bruzual and Charlot, Maraston, and Charlot and Bruzual all successfully reproduce the SEDs of our galaxies with ≤5% differences in the quality of fit; however, the best-fit masses from each code differ systematically by as much as a factor of 1.5, and other parameters vary more, up to factors of 2-3. A comparison of best-fit stellar population parameters from different stellar population synthesis (SPS) codes, dust laws, and metallicities shows that the choice of SPS code is the largest systematic uncertainty in most parameters, and that systematic uncertainties are typically larger than the formal random uncertainties. The SED fitting confirms our previous result that galaxies with strongly suppressed SF account for ∼50% of the K-bright population at z∼ 2.3; however, the uncertainty in this fraction is large due to systematic differences in the specific star formation rates derived from the three SPS models.

  19. Surveying Future Surveys

    Science.gov (United States)

    Carlstrom, John E.

    2016-06-01

    The now standard model of cosmology has been tested and refined by the analysis of increasingly sensitive, large astronomical surveys, especially with statistically significant millimeter-wave surveys of the cosmic microwave background and optical surveys of the distribution of galaxies. This talk will offer a glimpse of the future, which promises an acceleration of this trend with cosmological information coming from new surveys across the electromagnetic spectrum as well as particles and even gravitational waves.

  20. SIMCRI: a simple computer code for calculating nuclear criticality parameters

    International Nuclear Information System (INIS)

    Nakamaru, Shou-ichi; Sugawara, Nobuhiko; Naito, Yoshitaka; Katakura, Jun-ichi; Okuno, Hiroshi.

    1986-03-01

    This is a user's manual for a simple criticality calculation code SIMCRI. The code has been developed to facilitate criticality calculation on a single unit of nuclear fuel. SIMCRI makes an extensive survey with a little computing time. Cross section library MGCL for SIMCRI is the same one for the Monte Carlo criticality code KENOIV; it is, therefore, easy to compare the results of the two codes. SIMCRI solves eigenvalue problems and fixed source problems based on the one space point B 1 equation. The results include infinite and effective multiplication factor, critical buckling, migration area, diffusion coefficient and so on. SIMCRI is comprised in the criticality safety evaluation code system JACS. (author)

  1. Efficient Coding of Information: Huffman Coding -RE ...

    Indian Academy of Sciences (India)

    to a stream of equally-likely symbols so as to recover the original stream in the event of errors. The for- ... The source-coding problem is one of finding a mapping from U to a ... probability that the random variable X takes the value x written as ...

  2. NR-code: Nonlinear reconstruction code

    Science.gov (United States)

    Yu, Yu; Pen, Ue-Li; Zhu, Hong-Ming

    2018-04-01

    NR-code applies nonlinear reconstruction to the dark matter density field in redshift space and solves for the nonlinear mapping from the initial Lagrangian positions to the final redshift space positions; this reverses the large-scale bulk flows and improves the precision measurement of the baryon acoustic oscillations (BAO) scale.

  3. The Merchant Shipping (Dangerous Goods) Rules 1978 (Statutory Instrument 1543, 25 October 1978)

    International Nuclear Information System (INIS)

    1978-01-01

    These Rules supersede the Merchant Shipping (Dangerous Goods) Rule of 1965 as amended by the Merchant Shipping (Dangerous Goods) (Amendment) Rules of 1968 and 1972. The Rules now define 'dangerous goods' by reference to goods classified as dangerous for carriage by sea as well as any other goods whose properties might be dangerous it they were carried by sea. This classification is based on that of the 1978 Report of the Standing Advisory Committee on the Carriage of Dangerous Goods of the Department of Trade, and the 1977 Edition of the International Maritime Dangerous Goods Code published by the Intergovernmental Maritime consultative Organisation. (NEA) [fr

  4. Food rules in the Koran

    OpenAIRE

    Kocturk, Tahire O.

    2002-01-01

    Islam is now the second largest religion in Scandinavia and has a high representation among immigrant groups. Knowledge of food rules in Islam is a necessity for nutritionists in multicultural settings. Food rules as they appear in the Koran are contained within the concepts of halal and haram. Halal means lawful, permitted and recommended by the Islamic law. Haram is the opposite, meaning unlawful, prohibited. Food rules are meant to be observed by postpubertal people in good physical and me...

  5. Atomic Energy (factories) rules: 1988

    International Nuclear Information System (INIS)

    1988-01-01

    These rules are made by the Central Government under the Factories Act, 1948 and extend to all factories engaged in carrying out the purposes of the Atomic Energy Act, 1962. The rules cover the requirements of inspecting staff, health aspects, personnel safety, personnel welfare, working hours, employment of young persons, special provisions in case of dangerous manufacturing processes or operations, supplemental rules for administrative aspects and special powers of competent authority. (M.G.B.)

  6. Elastic creep-fatigue evaluation for ASME [American Society of Mechanical Engineers] code

    International Nuclear Information System (INIS)

    Severud, L.K.; Winkel, B.V.

    1987-02-01

    Reassessment of past ASME N-47 creep-fatigue rules have been under way by committee members. The new proposed elastic creep-fatigue methods are easier to apply than those previously in the code case. They also provide a wider range of practical application while still providing conservative assessments. It is expected that new N-47 code rules for elastic creep-fatigue evaluation will be adopted in the near future

  7. Convention on nuclear safety. Rules of procedure and financial rules

    International Nuclear Information System (INIS)

    1999-01-01

    The document is the first revision of the Rules of Procedures and Financial Rules that apply mutatis mutandis to any meetings of the Contracting Parties to the Convention on Nuclear Safety (INFCIRC/573), convened in accordance with the Chapter 3 of the Convention

  8. Convention on Nuclear Safety. Rules of procedure and financial rules

    International Nuclear Information System (INIS)

    2002-01-01

    The document is the second revision of the Rules of Procedures and Financial Rules that apply mutatis mutandis to any meetings of the Contracting Parties to the Convention on Nuclear Safety (INFCIRC/573), convened in accordance with the Chapter 3 of the Convention

  9. Rule Versus the Causality Rule in Insurance Law

    DEFF Research Database (Denmark)

    Lando, Henrik

    When the Buyer of insurance has negligently kept silent or misrepresented a (material) fact to the Seller, one of two rules will determine the extent to which cover will consequently be reduced. The pro-rata rule lowers cover in proportion to how much the Seller would have increased the premium had...... he been correctly informed; the causality rule provides either zero cover if the omitted fact has caused the insurance event, or full cover if the event would have occurred regardless of the fact. This article explores which rule is more efficient. Using the framework proposed by Picard and Dixit...... it subjects the risk averse Buyer of insurance to less variance. This implies that the pro rata rule should apply when there is significant risk for a Buyer of unintentional misrepresentation, and when the incentive to intentionally misrepresent can be curtailed through frequent verification of the Buyer...

  10. Use of ontology structure and Bayesian models to aid the crowdsourcing of ICD-11 sanctioning rules.

    Science.gov (United States)

    Lou, Yun; Tu, Samson W; Nyulas, Csongor; Tudorache, Tania; Chalmers, Robert J G; Musen, Mark A

    2017-04-01

    The International Classification of Diseases (ICD) is the de facto standard international classification for mortality reporting and for many epidemiological, clinical, and financial use cases. The next version of ICD, ICD-11, will be submitted for approval by the World Health Assembly in 2018. Unlike previous versions of ICD, where coders mostly select single codes from pre-enumerated disease and disorder codes, ICD-11 coding will allow extensive use of multiple codes to give more detailed disease descriptions. For example, "severe malignant neoplasms of left breast" may be coded using the combination of a "stem code" (e.g., code for malignant neoplasms of breast) with a variety of "extension codes" (e.g., codes for laterality and severity). The use of multiple codes (a process called post-coordination), while avoiding the pitfall of having to pre-enumerate vast number of possible disease and qualifier combinations, risks the creation of meaningless expressions that combine stem codes with inappropriate qualifiers. To prevent that from happening, "sanctioning rules" that define legal combinations are necessary. In this work, we developed a crowdsourcing method for obtaining sanctioning rules for the post-coordination of concepts in ICD-11. Our method utilized the hierarchical structures in the domain to improve the accuracy of the sanctioning rules and to lower the crowdsourcing cost. We used Bayesian networks to model crowd workers' skills, the accuracy of their responses, and our confidence in the acquired sanctioning rules. We applied reinforcement learning to develop an agent that constantly adjusted the confidence cutoffs during the crowdsourcing process to maximize the overall quality of sanctioning rules under a fixed budget. Finally, we performed formative evaluations using a skin-disease branch of the draft ICD-11 and demonstrated that the crowd-sourced sanctioning rules replicated those defined by an expert dermatologist with high precision and recall

  11. Legal Rules on the Purchase Contract under the Czech new Civil Code – – Selected Problems / Právní Úprava Kupní Smlouvy Ve Světle Nového Občanského Zákoníku Čr – – Vybrané Problémy

    Directory of Open Access Journals (Sweden)

    Janků Martin

    2016-06-01

    Full Text Available The goal of the present paper is to draw attention to some key rules and principles of the purchase contract. After the specification of this contract type we will deal in more details with the defective performance and the procedure of its complaint. As suggest the first assessment and reviews of the application of new legislation in its practical use and by the case law, in the achievement of the objective desired by the NCC - to increase the transparency of the procedure of complaints - the new legislation stacked in the middle of the way. The paper compares the impact of the new the previous and the current regulations, We will use the method of functional analysis as well as the method of legal formalistic comparison. It is obvious that the new rules respect the former régime of commercial contracts. The business sphere has undoubtedly welcomed this feature of the legal regime as the merchandisers are familiar with these rules. The second issue is, however, how this modification in the general regulation meets the expectations of the to provide sufficient legal certainty in the interpretation of contractual provisions and in the access to the protection of their interests by courts in the event of disputes.

  12. Synthesizing Certified Code

    Science.gov (United States)

    Whalen, Michael; Schumann, Johann; Fischer, Bernd

    2002-01-01

    Code certification is a lightweight approach to demonstrate software quality on a formal level. Its basic idea is to require producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates which can be checked independently. Since code certification uses the same underlying technology as program verification, it also requires many detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding theses annotations to the code is time-consuming and error-prone. We address this problem by combining code certification with automatic program synthesis. We propose an approach to generate simultaneously, from a high-level specification, code and all annotations required to certify generated code. Here, we describe a certification extension of AUTOBAYES, a synthesis tool which automatically generates complex data analysis programs from compact specifications. AUTOBAYES contains sufficient high-level domain knowledge to generate detailed annotations. This allows us to use a general-purpose verification condition generator to produce a set of proof obligations in first-order logic. The obligations are then discharged using the automated theorem E-SETHEO. We demonstrate our approach by certifying operator safety for a generated iterative data classification program without manual annotation of the code.

  13. Code of Ethics

    Science.gov (United States)

    Division for Early Childhood, Council for Exceptional Children, 2009

    2009-01-01

    The Code of Ethics of the Division for Early Childhood (DEC) of the Council for Exceptional Children is a public statement of principles and practice guidelines supported by the mission of DEC. The foundation of this Code is based on sound ethical reasoning related to professional practice with young children with disabilities and their families…

  14. Interleaved Product LDPC Codes

    OpenAIRE

    Baldi, Marco; Cancellieri, Giovanni; Chiaraluce, Franco

    2011-01-01

    Product LDPC codes take advantage of LDPC decoding algorithms and the high minimum distance of product codes. We propose to add suitable interleavers to improve the waterfall performance of LDPC decoding. Interleaving also reduces the number of low weight codewords, that gives a further advantage in the error floor region.

  15. Insurance billing and coding.

    Science.gov (United States)

    Napier, Rebecca H; Bruelheide, Lori S; Demann, Eric T K; Haug, Richard H

    2008-07-01

    The purpose of this article is to highlight the importance of understanding various numeric and alpha-numeric codes for accurately billing dental and medically related services to private pay or third-party insurance carriers. In the United States, common dental terminology (CDT) codes are most commonly used by dentists to submit claims, whereas current procedural terminology (CPT) and International Classification of Diseases, Ninth Revision, Clinical Modification (ICD.9.CM) codes are more commonly used by physicians to bill for their services. The CPT and ICD.9.CM coding systems complement each other in that CPT codes provide the procedure and service information and ICD.9.CM codes provide the reason or rationale for a particular procedure or service. These codes are more commonly used for "medical necessity" determinations, and general dentists and specialists who routinely perform care, including trauma-related care, biopsies, and dental treatment as a result of or in anticipation of a cancer-related treatment, are likely to use these codes. Claim submissions for care provided can be completed electronically or by means of paper forms.

  16. Error Correcting Codes

    Indian Academy of Sciences (India)

    Science and Automation at ... the Reed-Solomon code contained 223 bytes of data, (a byte ... then you have a data storage system with error correction, that ..... practical codes, storing such a table is infeasible, as it is generally too large.

  17. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Lene; Pries-Heje, Jan; Dalgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  18. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 3. Error Correcting Codes - Reed Solomon Codes. Priti Shankar. Series Article Volume 2 Issue 3 March ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560 012, India ...

  19. 78 FR 18321 - International Code Council: The Update Process for the International Codes and Standards

    Science.gov (United States)

    2013-03-26

    ... Energy Conservation Code. International Existing Building Code. International Fire Code. International... Code. International Property Maintenance Code. International Residential Code. International Swimming Pool and Spa Code International Wildland-Urban Interface Code. International Zoning Code. ICC Standards...

  20. Validation of thermalhydraulic codes

    International Nuclear Information System (INIS)

    Wilkie, D.

    1992-01-01

    Thermalhydraulic codes require to be validated against experimental data collected over a wide range of situations if they are to be relied upon. A good example is provided by the nuclear industry where codes are used for safety studies and for determining operating conditions. Errors in the codes could lead to financial penalties, to the incorrect estimation of the consequences of accidents and even to the accidents themselves. Comparison between prediction and experiment is often described qualitatively or in approximate terms, e.g. ''agreement is within 10%''. A quantitative method is preferable, especially when several competing codes are available. The codes can then be ranked in order of merit. Such a method is described. (Author)

  1. Fracture flow code

    International Nuclear Information System (INIS)

    Dershowitz, W; Herbert, A.; Long, J.

    1989-03-01

    The hydrology of the SCV site will be modelled utilizing discrete fracture flow models. These models are complex, and can not be fully cerified by comparison to analytical solutions. The best approach for verification of these codes is therefore cross-verification between different codes. This is complicated by the variation in assumptions and solution techniques utilized in different codes. Cross-verification procedures are defined which allow comparison of the codes developed by Harwell Laboratory, Lawrence Berkeley Laboratory, and Golder Associates Inc. Six cross-verification datasets are defined for deterministic and stochastic verification of geometric and flow features of the codes. Additional datasets for verification of transport features will be documented in a future report. (13 figs., 7 tabs., 10 refs.) (authors)

  2. A survey of TRIPOLI-4

    International Nuclear Information System (INIS)

    Both, J.P.; Derriennic, H.; Morillon, B.; Nimal, J.C.

    1994-01-01

    A survey of the new version of the TRIPOLI code used in shielding calculations, is presented. The main new features introduced in this version are: combinatorial geometry, a multigroup automatic weighting scheme, and complete treatment of nuclear evaluation files; a simulation implementation including strategy for parallelization of the code is presented. Some benchmark calculations are also presented. 7 figs., 5 tabs., 4 refs

  3. Site surveying and levelling

    CERN Document Server

    Clancy, John

    2013-01-01

    This popular and useful text has been completely revised and up-dated so that it forms and indipensible handbook for any student of surveying. An additional chapter on modern developments is included and the text has also been extended to cover ordnance survey; calculation of areas; computation of true horizontal length; measurement of vertical angles; Code of Measuring Practice; curve ranging and calculations of volumes for earthworks.

  4. Revised Rules for Concrete Bridges

    DEFF Research Database (Denmark)

    Thoft-Christensen, Palle; Jensen, F. M.; Middleton, C.

    This paper is based on research performed for the Highway Agency, London, UK under the project DPU/9/44 "Revision of Bridge Assessment Rules Based on Whole Life Performance: Concrete Bridges" It contains details of a methodology which can be used to generate Whole Life (WL) reliability profiles....... These WL reliability profiles may be used to establish revised rules for Concrete Bridges....

  5. Business model for business rules

    NARCIS (Netherlands)

    Eline Haan; Martin Zoet; Koen Smit

    2014-01-01

    Business rule models are widely applied, standalone and embedded in smart objects. They have become segregated from information technology and they are now a valuable asset in their own right. As more business rule models are becoming assets, business models to monetize these assets are designed.

  6. Statistical Rules-of-Thumb.

    Science.gov (United States)

    Brewer, James K.

    1988-01-01

    Six best-selling introductory behavioral statistics textbooks that were published in 1982 and two well-known sampling theory textbooks were reviewed to determine the presence of rules-of-thumb--useful principles with wide application that are not intended to be strictly accurate. The relative frequency and type of rules are reported along with a…

  7. Huffman coding in advanced audio coding standard

    Science.gov (United States)

    Brzuchalski, Grzegorz

    2012-05-01

    This article presents several hardware architectures of Advanced Audio Coding (AAC) Huffman noiseless encoder, its optimisations and working implementation. Much attention has been paid to optimise the demand of hardware resources especially memory size. The aim of design was to get as short binary stream as possible in this standard. The Huffman encoder with whole audio-video system has been implemented in FPGA devices.

  8. The Development of the World Anti-Doping Code.

    Science.gov (United States)

    Young, Richard

    2017-01-01

    This chapter addresses both the development and substance of the World Anti-Doping Code, which came into effect in 2003, as well as the subsequent Code amendments, which came into effect in 2009 and 2015. Through an extensive process of stakeholder input and collaboration, the World Anti-Doping Code has transformed the hodgepodge of inconsistent and competing pre-2003 anti-doping rules into a harmonized and effective approach to anti-doping. The Code, as amended, is now widely recognized worldwide as the gold standard in anti-doping. The World Anti-Doping Code originally went into effect on January 1, 2004. The first amendments to the Code went into effect on January 1, 2009, and the second amendments on January 1, 2015. The Code and the related international standards are the product of a long and collaborative process designed to make the fight against doping more effective through the adoption and implementation of worldwide harmonized rules and best practices. © 2017 S. Karger AG, Basel.

  9. On the Organizational Dynamics of the Genetic Code

    KAUST Repository

    Zhang, Zhang

    2011-06-07

    The organization of the canonical genetic code needs to be thoroughly illuminated. Here we reorder the four nucleotides—adenine, thymine, guanine and cytosine—according to their emergence in evolution, and apply the organizational rules to devising an algebraic representation for the canonical genetic code. Under a framework of the devised code, we quantify codon and amino acid usages from a large collection of 917 prokaryotic genome sequences, and associate the usages with its intrinsic structure and classification schemes as well as amino acid physicochemical properties. Our results show that the algebraic representation of the code is structurally equivalent to a content-centric organization of the code and that codon and amino acid usages under different classification schemes were correlated closely with GC content, implying a set of rules governing composition dynamics across a wide variety of prokaryotic genome sequences. These results also indicate that codons and amino acids are not randomly allocated in the code, where the six-fold degenerate codons and their amino acids have important balancing roles for error minimization. Therefore, the content-centric code is of great usefulness in deciphering its hitherto unknown regularities as well as the dynamics of nucleotide, codon, and amino acid compositions.

  10. On the Organizational Dynamics of the Genetic Code

    KAUST Repository

    Zhang, Zhang; Yu, Jun

    2011-01-01

    The organization of the canonical genetic code needs to be thoroughly illuminated. Here we reorder the four nucleotides—adenine, thymine, guanine and cytosine—according to their emergence in evolution, and apply the organizational rules to devising an algebraic representation for the canonical genetic code. Under a framework of the devised code, we quantify codon and amino acid usages from a large collection of 917 prokaryotic genome sequences, and associate the usages with its intrinsic structure and classification schemes as well as amino acid physicochemical properties. Our results show that the algebraic representation of the code is structurally equivalent to a content-centric organization of the code and that codon and amino acid usages under different classification schemes were correlated closely with GC content, implying a set of rules governing composition dynamics across a wide variety of prokaryotic genome sequences. These results also indicate that codons and amino acids are not randomly allocated in the code, where the six-fold degenerate codons and their amino acids have important balancing roles for error minimization. Therefore, the content-centric code is of great usefulness in deciphering its hitherto unknown regularities as well as the dynamics of nucleotide, codon, and amino acid compositions.

  11. Spatio-Temporal Rule Mining

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Pedersen, Torben Bach

    2005-01-01

    Recent advances in communication and information technology, such as the increasing accuracy of GPS technology and the miniaturization of wireless communication devices pave the road for Location-Based Services (LBS). To achieve high quality for such services, spatio-temporal data mining techniques...... are needed. In this paper, we describe experiences with spatio-temporal rule mining in a Danish data mining company. First, a number of real world spatio-temporal data sets are described, leading to a taxonomy of spatio-temporal data. Second, the paper describes a general methodology that transforms...... the spatio-temporal rule mining task to the traditional market basket analysis task and applies it to the described data sets, enabling traditional association rule mining methods to discover spatio-temporal rules for LBS. Finally, unique issues in spatio-temporal rule mining are identified and discussed....

  12. 78 FR 48528 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change to Amend...

    Science.gov (United States)

    2013-08-08

    ... to and system coding for exchange systems and would reduce the systemic and administrative burdens on... the Affiliated Exchange enforce the Exchange's rules. The Exchange believes that adding NYSE MKT to...

  13. Exploring Trilingual Code-Switching: The Case of "Hokaglish"

    Science.gov (United States)

    Gonzales, Wilkinson Daniel Wong

    2016-01-01

    This paper presents findings of an initial study on a trilingual code-switching (CS) phenomenon called "Hokaglish" in Binondo, Manila, The Philippines. Beginning with descriptions of multiculturalism and multilingualism in the Philippines, the discussion eventually leads to the description and survey of the code-switching phenomenon…

  14. Blending Classroom Teaching and Learning with QR Codes

    Science.gov (United States)

    Rikala, Jenni; Kankaanranta, Marja

    2014-01-01

    The aim of this case study was to explore the feasibility of the Quick Response (QR) codes and mobile devices in the context of Finnish basic education. The interest was especially to explore how mobile devices and QR codes can enhance and blend teaching and learning. The data were collected with a teacher interview and pupil surveys. The learning…

  15. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  16. Report number codes

    International Nuclear Information System (INIS)

    Nelson, R.N.

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name

  17. Rate adaptive multilevel coded modulation with high coding gain in intensity modulation direct detection optical communication

    Science.gov (United States)

    Xiao, Fei; Liu, Bo; Zhang, Lijia; Xin, Xiangjun; Zhang, Qi; Tian, Qinghua; Tian, Feng; Wang, Yongjun; Rao, Lan; Ullah, Rahat; Zhao, Feng; Li, Deng'ao

    2018-02-01

    A rate-adaptive multilevel coded modulation (RA-MLC) scheme based on fixed code length and a corresponding decoding scheme is proposed. RA-MLC scheme combines the multilevel coded and modulation technology with the binary linear block code at the transmitter. Bits division, coding, optional interleaving, and modulation are carried out by the preset rule, then transmitted through standard single mode fiber span equal to 100 km. The receiver improves the accuracy of decoding by means of soft information passing through different layers, which enhances the performance. Simulations are carried out in an intensity modulation-direct detection optical communication system using MATLAB®. Results show that the RA-MLC scheme can achieve bit error rate of 1E-5 when optical signal-to-noise ratio is 20.7 dB. It also reduced the number of decoders by 72% and realized 22 rate adaptation without significantly increasing the computing time. The coding gain is increased by 7.3 dB at BER=1E-3.

  18. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  19. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  20. Transport theory and codes

    International Nuclear Information System (INIS)

    Clancy, B.E.

    1986-01-01

    This chapter begins with a neutron transport equation which includes the one dimensional plane geometry problems, the one dimensional spherical geometry problems, and numerical solutions. The section on the ANISN code and its look-alikes covers problems which can be solved; eigenvalue problems; outer iteration loop; inner iteration loop; and finite difference solution procedures. The input and output data for ANISN is also discussed. Two dimensional problems such as the DOT code are given. Finally, an overview of the Monte-Carlo methods and codes are elaborated on

  1. Gravity inversion code

    International Nuclear Information System (INIS)

    Burkhard, N.R.

    1979-01-01

    The gravity inversion code applies stabilized linear inverse theory to determine the topography of a subsurface density anomaly from Bouguer gravity data. The gravity inversion program consists of four source codes: SEARCH, TREND, INVERT, and AVERAGE. TREND and INVERT are used iteratively to converge on a solution. SEARCH forms the input gravity data files for Nevada Test Site data. AVERAGE performs a covariance analysis on the solution. This document describes the necessary input files and the proper operation of the code. 2 figures, 2 tables

  2. The rule of rescue.

    Science.gov (United States)

    McKie, John; Richardson, Jeff

    2003-06-01

    Jonsen coined the term "Rule of Rescue"(RR) to describe the imperative people feel to rescue identifiable individuals facing avoidable death. In this paper we attempt to draw a more detailed picture of the RR, identifying its conflict with cost-effectiveness analysis, the preference it entails for identifiable over statistical lives, the shock-horror response it elicits, the preference it entails for lifesaving over non-lifesaving measures, its extension to non-life-threatening conditions, and whether it is motivated by duty or sympathy. We also consider the measurement problems it raises, and argue that quantifying the RR would probably require a two-stage procedure. In the first stage the size of the individual utility gain from a health intervention would be assessed using a technique such as the Standard Gamble or the Time Trade-Off, and in the second the social benefits arising from the RR would be quantified employing the Person Trade-Off. We also consider the normative status of the RR. We argue that it can be defended from a utilitarian point of view, on the ground that rescues increase well-being by reinforcing people's belief that they live in a community that places great value upon life. However, utilitarianism has long been criticised for failing to take sufficient account of fairness, and the case is no different here: fairness requires that we do not discriminate between individuals on morally irrelevant grounds, whereas being "identifiable" does not seem to be a morally relevant ground for discrimination.

  3. Advancing Kohlberg through Codes: Using Professional Codes To Reach the Moral Reasoning Objective in Undergraduate Ethics Courses.

    Science.gov (United States)

    Whitehouse, Ginny; Ingram, Michael T.

    The development of moral reasoning as a key course objective in undergraduate communication ethics classes can be accomplished by the critical and deliberate introduction of professional codes of ethics and the internalization of values found in those codes. Notably, "fostering moral reasoning skills" and "surveying current ethical…

  4. Service without a Smile: Comparing the Consequences of Neutral and Positive Display Rules

    Science.gov (United States)

    Trougakos, John P.; Jackson, Christine L.; Beal, Daniel J.

    2011-01-01

    We used an experimental design to examine the intrapersonal and interpersonal processes through which neutral display rules, compared to positive display rules, influence objective task performance of poll workers and ratings provided by survey respondents of the poll workers. Student participants (N = 140) were trained to adhere to 1 of the 2…

  5. Audit of Clinical Coding of Major Head and Neck Operations

    Science.gov (United States)

    Mitra, Indu; Malik, Tass; Homer, Jarrod J; Loughran, Sean

    2009-01-01

    INTRODUCTION Within the NHS, operations are coded using the Office of Population Censuses and Surveys (OPCS) classification system. These codes, together with diagnostic codes, are used to generate Healthcare Resource Group (HRG) codes, which correlate to a payment bracket. The aim of this study was to determine whether allocated procedure codes for major head and neck operations were correct and reflective of the work undertaken. HRG codes generated were assessed to determine accuracy of remuneration. PATIENTS AND METHODS The coding of consecutive major head and neck operations undertaken in a tertiary referral centre over a retrospective 3-month period were assessed. Procedure codes were initially ascribed by professional hospital coders. Operations were then recoded by the surgical trainee in liaison with the head of clinical coding. The initial and revised procedure codes were compared and used to generate HRG codes, to determine whether the payment banding had altered. RESULTS A total of 34 cases were reviewed. The number of procedure codes generated initially by the clinical coders was 99, whereas the revised codes generated 146. Of the original codes, 47 of 99 (47.4%) were incorrect. In 19 of the 34 cases reviewed (55.9%), the HRG code remained unchanged, thus resulting in the correct payment. Six cases were never coded, equating to £15,300 loss of payment. CONCLUSIONS These results highlight the inadequacy of this system to reward hospitals for the work carried out within the NHS in a fair and consistent manner. The current coding system was found to be complicated, ambiguous and inaccurate, resulting in loss of remuneration. PMID:19220944

  6. How to Crack the Sugar Code.

    Science.gov (United States)

    Gabius, H-J

    2017-01-01

    The known ubiquitous presence of glycans fulfils an essential prerequisite for fundamental roles in cell sociology. Since carbohydrates are chemically predestined to form biochemical messages of a maximum of structural diversity in a minimum of space, coding of biological information by sugars is the reason for the broad occurrence of cellular glycoconjugates. Their glycans originate from sophisticated enzymatic assembly and dynamically adaptable remodelling. These signals are read and translated into effects by receptors (lectins). The functional pairing between lectins and their counterreceptor(s) is highly specific, often orchestrated by intimate co-regulation of the receptor, the cognate glycan and the bioactive scaffold (e.g., an integrin). Bottom-up approaches, teaming up synthetic and supramolecular chemistry to prepare fully programmable nanoparticles as binding partners with systematic network analysis of lectins and rational design of variants, enable us to delineate the rules of the sugar code.

  7. Modeling Guidelines for Code Generation in the Railway Signaling Context

    Science.gov (United States)

    Ferrari, Alessio; Bacherini, Stefano; Fantechi, Alessandro; Zingoni, Niccolo

    2009-01-01

    Modeling guidelines constitute one of the fundamental cornerstones for Model Based Development. Their relevance is essential when dealing with code generation in the safety-critical domain. This article presents the experience of a railway signaling systems manufacturer on this issue. Introduction of Model-Based Development (MBD) and code generation in the industrial safety-critical sector created a crucial paradigm shift in the development process of dependable systems. While traditional software development focuses on the code, with MBD practices the focus shifts to model abstractions. The change has fundamental implications for safety-critical systems, which still need to guarantee a high degree of confidence also at code level. Usage of the Simulink/Stateflow platform for modeling, which is a de facto standard in control software development, does not ensure by itself production of high-quality dependable code. This issue has been addressed by companies through the definition of modeling rules imposing restrictions on the usage of design tools components, in order to enable production of qualified code. The MAAB Control Algorithm Modeling Guidelines (MathWorks Automotive Advisory Board)[3] is a well established set of publicly available rules for modeling with Simulink/Stateflow. This set of recommendations has been developed by a group of OEMs and suppliers of the automotive sector with the objective of enforcing and easing the usage of the MathWorks tools within the automotive industry. The guidelines have been published in 2001 and afterwords revisited in 2007 in order to integrate some additional rules developed by the Japanese division of MAAB [5]. The scope of the current edition of the guidelines ranges from model maintainability and readability to code generation issues. The rules are conceived as a reference baseline and therefore they need to be tailored to comply with the characteristics of each industrial context. Customization of these

  8. Renewable Fuel Pathways II Final Rule to Identify Additional Fuel Pathways under Renewable Fuel Standard Program

    Science.gov (United States)

    This final rule describes EPA’s evaluation of biofuels derived from biogas fuel pathways under the RFS program and other minor amendments related to survey requirements associated with ULSD program and misfueling mitigation regulations for E15.

  9. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  10. Supervised Convolutional Sparse Coding

    KAUST Repository

    Affara, Lama Ahmed; Ghanem, Bernard; Wonka, Peter

    2018-01-01

    coding, which aims at learning discriminative dictionaries instead of purely reconstructive ones. We incorporate a supervised regularization term into the traditional unsupervised CSC objective to encourage the final dictionary elements

  11. SASSYS LMFBR systems code

    International Nuclear Information System (INIS)

    Dunn, F.E.; Prohammer, F.G.; Weber, D.P.

    1983-01-01

    The SASSYS LMFBR systems analysis code is being developed mainly to analyze the behavior of the shut-down heat-removal system and the consequences of failures in the system, although it is also capable of analyzing a wide range of transients, from mild operational transients through more severe transients leading to sodium boiling in the core and possible melting of clad and fuel. The code includes a detailed SAS4A multi-channel core treatment plus a general thermal-hydraulic treatment of the primary and intermediate heat-transport loops and the steam generators. The code can handle any LMFBR design, loop or pool, with an arbitrary arrangement of components. The code is fast running: usually faster than real time

  12. OCA Code Enforcement

    Data.gov (United States)

    Montgomery County of Maryland — The Office of the County Attorney (OCA) processes Code Violation Citations issued by County agencies. The citations can be viewed by issued department, issued date...

  13. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  14. Code Disentanglement: Initial Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wohlbier, John Greaton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kelley, Timothy M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rockefeller, Gabriel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Calef, Matthew Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  15. Induction technology optimization code

    International Nuclear Information System (INIS)

    Caporaso, G.J.; Brooks, A.L.; Kirbie, H.C.

    1992-01-01

    A code has been developed to evaluate relative costs of induction accelerator driver systems for relativistic klystrons. The code incorporates beam generation, transport and pulsed power system constraints to provide an integrated design tool. The code generates an injector/accelerator combination which satisfies the top level requirements and all system constraints once a small number of design choices have been specified (rise time of the injector voltage and aspect ratio of the ferrite induction cores, for example). The code calculates dimensions of accelerator mechanical assemblies and values of all electrical components. Cost factors for machined parts, raw materials and components are applied to yield a total system cost. These costs are then plotted as a function of the two design choices to enable selection of an optimum design based on various criteria. (Author) 11 refs., 3 figs

  16. VT ZIP Code Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) A ZIP Code Tabulation Area (ZCTA) is a statistical geographic entity that approximates the delivery area for a U.S. Postal Service five-digit...

  17. Bandwidth efficient coding

    CERN Document Server

    Anderson, John B

    2017-01-01

    Bandwidth Efficient Coding addresses the major challenge in communication engineering today: how to communicate more bits of information in the same radio spectrum. Energy and bandwidth are needed to transmit bits, and bandwidth affects capacity the most. Methods have been developed that are ten times as energy efficient at a given bandwidth consumption as simple methods. These employ signals with very complex patterns and are called "coding" solutions. The book begins with classical theory before introducing new techniques that combine older methods of error correction coding and radio transmission in order to create narrowband methods that are as efficient in both spectrum and energy as nature allows. Other topics covered include modulation techniques such as CPM, coded QAM and pulse design.

  18. Reactor lattice codes

    International Nuclear Information System (INIS)

    Kulikowska, T.

    2001-01-01

    The description of reactor lattice codes is carried out on the example of the WIMSD-5B code. The WIMS code in its various version is the most recognised lattice code. It is used in all parts of the world for calculations of research and power reactors. The version WIMSD-5B is distributed free of charge by NEA Data Bank. The description of its main features given in the present lecture follows the aspects defined previously for lattice calculations in the lecture on Reactor Lattice Transport Calculations. The spatial models are described, and the approach to the energy treatment is given. Finally the specific algorithm applied in fuel depletion calculations is outlined. (author)

  19. Code of safety for nuclear merchant ships

    International Nuclear Information System (INIS)

    1982-01-01

    The Code is in chapters, entitled: general (including general safety principles and principles of risk acceptance); design criteria and conditions; ship design, construction and equipment; nuclear steam supply system; machinery and electrical installations; radiation safety (including radiological protection design; protection of persons; dosimetry; radioactive waste management); operation (including emergency operation procedures); surveys. Appendices cover: sinking velocity calculations; seaway loads depending on service periods; safety assessment; limiting dose-equivalent rates for different areas and spaces; quality assurance programme; application of single failure criterion. Initial application of the Code is restricted to conventional types of ships propelled by nuclear propulsion plants with pressurized light water type reactors. (U.K.)

  20. Should managers have a code of conduct?

    Science.gov (United States)

    Bayliss, P

    1994-02-01

    Much attention is currently being given to values and ethics in the NHS. Issues of accountability are being explored as a consequence of the Cadbury report. The Institute of Health Services Management (IHSM) is considering whether managers should have a code of ethics. Central to this issue is what managers themselves think; the application of such a code may well stand or fall by whether managers are prepared to have ownership of it, and are prepared to make it work. Paul Bayliss reports on a survey of managers' views.

  1. Critical Care Coding for Neurologists.

    Science.gov (United States)

    Nuwer, Marc R; Vespa, Paul M

    2015-10-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  2. Lattice Index Coding

    OpenAIRE

    Natarajan, Lakshmi; Hong, Yi; Viterbo, Emanuele

    2014-01-01

    The index coding problem involves a sender with K messages to be transmitted across a broadcast channel, and a set of receivers each of which demands a subset of the K messages while having prior knowledge of a different subset as side information. We consider the specific case of noisy index coding where the broadcast channel is Gaussian and every receiver demands all the messages from the source. Instances of this communication problem arise in wireless relay networks, sensor networks, and ...

  3. Towards advanced code simulators

    International Nuclear Information System (INIS)

    Scriven, A.H.

    1990-01-01

    The Central Electricity Generating Board (CEGB) uses advanced thermohydraulic codes extensively to support PWR safety analyses. A system has been developed to allow fully interactive execution of any code with graphical simulation of the operator desk and mimic display. The system operates in a virtual machine environment, with the thermohydraulic code executing in one virtual machine, communicating via interrupts with any number of other virtual machines each running other programs and graphics drivers. The driver code itself does not have to be modified from its normal batch form. Shortly following the release of RELAP5 MOD1 in IBM compatible form in 1983, this code was used as the driver for this system. When RELAP5 MOD2 became available, it was adopted with no changes needed in the basic system. Overall the system has been used for some 5 years for the analysis of LOBI tests, full scale plant studies and for simple what-if studies. For gaining rapid understanding of system dependencies it has proved invaluable. The graphical mimic system, being independent of the driver code, has also been used with other codes to study core rewetting, to replay results obtained from batch jobs on a CRAY2 computer system and to display suitably processed experimental results from the LOBI facility to aid interpretation. For the above work real-time execution was not necessary. Current work now centers on implementing the RELAP 5 code on a true parallel architecture machine. Marconi Simulation have been contracted to investigate the feasibility of using upwards of 100 processors, each capable of a peak of 30 MIPS to run a highly detailed RELAP5 model in real time, complete with specially written 3D core neutronics and balance of plant models. This paper describes the experience of using RELAP5 as an analyzer/simulator, and outlines the proposed methods and problems associated with parallel execution of RELAP5

  4. Cracking the Gender Codes

    DEFF Research Database (Denmark)

    Rennison, Betina Wolfgang

    2016-01-01

    extensive work to raise the proportion of women. This has helped slightly, but women remain underrepresented at the corporate top. Why is this so? What can be done to solve it? This article presents five different types of answers relating to five discursive codes: nature, talent, business, exclusion...... in leadership management, we must become more aware and take advantage of this complexity. We must crack the codes in order to crack the curve....

  5. INTRA/Mod3.2. Manual and Code Description. Volume I - Physical Modelling

    International Nuclear Information System (INIS)

    Andersson, Jenny; Edlund, O.; Hermann, J.; Johansson, Lise-Lotte

    1999-01-01

    The INTRA Manual consists of two volumes. Volume I of the manual is a thorough description of the code INTRA, the Physical modelling of INTRA and the ruling numerical methods and volume II, the User's Manual is an input description. This document, the Physical modelling of INTRA, contains code characteristics, integration methods and applications

  6. INTRA/Mod3.2. Manual and Code Description. Volume I - Physical Modelling

    Energy Technology Data Exchange (ETDEWEB)

    Andersson, Jenny; Edlund, O; Hermann, J; Johansson, Lise-Lotte

    1999-01-01

    The INTRA Manual consists of two volumes. Volume I of the manual is a thorough description of the code INTRA, the Physical modelling of INTRA and the ruling numerical methods and volume II, the User`s Manual is an input description. This document, the Physical modelling of INTRA, contains code characteristics, integration methods and applications

  7. AERA Code of Ethics: American Educational Research Association Approved by the AERA Council February 2011

    Science.gov (United States)

    Educational Researcher, 2011

    2011-01-01

    The Code of Ethics of the American Educational Research Association (AERA) articulates a common set of values upon which education researchers build their professional and scientific work. The Code is intended to provide both the principles and the rules to cover professional situations encountered by education researchers. It has as its primary…

  8. Implementation of the SAMPO computer code in the Cyber 170-750

    International Nuclear Information System (INIS)

    Chagas, E.F.; Liguori Neto, R.; Gomes, P.R.S.

    1985-01-01

    The code SAMPO, in this available version, incorporates algorithms that determine energy, eficiency and peak shape. The code also includes processing subroutines that provide automatic surveys of peaks raising all their characteristics. The handling of the code has been improved and its analysing capacity in each region of the spectrum has been amplified. Practical information regarding the use of the code is enclosed. Tests made guarantee the good performance of the code SAMPO in the Cyber system-IEAv. (Author) [pt

  9. 77 FR 39554 - Self-Regulatory Organizations; NYSE Arca, Inc.; Order Granting Approval of Proposed Rule Change...

    Science.gov (United States)

    2012-07-03

    ... later date at a fixed price. The Fund may not (i) with respect to 75% of its total assets, purchase... security. The Fund will not purchase illiquid securities, including Rule 144A securities and loan... 204A-1 under the Advisers Act relating to codes of ethics. This Rule requires investment advisers to...

  10. 77 FR 32161 - Self-Regulatory Organizations; NYSE Arca, Inc.; Order Granting Approval of Proposed Rule Change...

    Science.gov (United States)

    2012-05-31

    ..., forward contracts, swap contracts, the purchase of securities on a when-issued or delayed delivery basis... be designed to prevent fraudulent and manipulative acts and practices, to promote just and equitable... provisions of Rule 204A-1 under the Advisers Act relating to codes of ethics. This Rule requires investment...

  11. 17 CFR 200.80c - Appendix C-Rules and miscellaneous publications available from the Government Printing Office.

    Science.gov (United States)

    2010-04-01

    ... Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND... Commission in pamphlet form. All SEC public rules and regulations, including its Rules of Practice, are contained in title 17 of the Code of Federal Regulations, which also is available for purchase from the...

  12. A quick survey of text categorization algorithms

    Directory of Open Access Journals (Sweden)

    Dan MUNTEANU

    2007-12-01

    Full Text Available This paper contains an overview of basic formulations and approaches to text classification. This paper surveys the algorithms used in text categorization: handcrafted rules, decision trees, decision rules, on-line learning, linear classifier, Rocchio’s algorithm, k Nearest Neighbor (kNN, Support Vector Machines (SVM.

  13. Firm heterogeneity, Rules of Origin and Rules of Cumulation

    OpenAIRE

    Bombarda , Pamela; Gamberoni , Elisa

    2013-01-01

    We analyse the impact of relaxing rules of origin (ROOs) in a simple setting with heterogeneous firms that buy intermediate inputs from domestic and foreign sources. In particular, we consider the impact of switching from bilateral to diagonal cumulation when using preferences (instead of paying the MFN tariff) involving the respect of rules of origin. We find that relaxing the restrictiveness of the ROOs leads the least productive exporters to stop exporting. The empirical part confirms thes...

  14. PEAR code review

    International Nuclear Information System (INIS)

    De Wit, R.; Jamieson, T.; Lord, M.; Lafortune, J.F.

    1997-07-01

    As a necessary component in the continuous improvement and refinement of methodologies employed in the nuclear industry, regulatory agencies need to periodically evaluate these processes to improve confidence in results and ensure appropriate levels of safety are being achieved. The independent and objective review of industry-standard computer codes forms an essential part of this program. To this end, this work undertakes an in-depth review of the computer code PEAR (Public Exposures from Accidental Releases), developed by Atomic Energy of Canada Limited (AECL) to assess accidental releases from CANDU reactors. PEAR is based largely on the models contained in the Canadian Standards Association (CSA) N288.2-M91. This report presents the results of a detailed technical review of the PEAR code to identify any variations from the CSA standard and other supporting documentation, verify the source code, assess the quality of numerical models and results, and identify general strengths and weaknesses of the code. The version of the code employed in this review is the one which AECL intends to use for CANDU 9 safety analyses. (author)

  15. KENO-V code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The KENO-V code is the current release of the Oak Ridge multigroup Monte Carlo criticality code development. The original KENO, with 16 group Hansen-Roach cross sections and P 1 scattering, was one ot the first multigroup Monte Carlo codes and it and its successors have always been a much-used research tool for criticality studies. KENO-V is able to accept large neutron cross section libraries (a 218 group set is distributed with the code) and has a general P/sub N/ scattering capability. A supergroup feature allows execution of large problems on small computers, but at the expense of increased calculation time and system input/output operations. This supergroup feature is activated automatically by the code in a manner which utilizes as much computer memory as is available. The primary purpose of KENO-V is to calculate the system k/sub eff/, from small bare critical assemblies to large reflected arrays of differing fissile and moderator elements. In this respect KENO-V neither has nor requires the many options and sophisticated biasing techniques of general Monte Carlo codes

  16. Operator algebra from fusion rules

    International Nuclear Information System (INIS)

    Fuchs, J.

    1989-03-01

    It is described how the fusion rules of a conformal field theory can be employed to derive differential equations for the four-point functions of the theory, and thus to determine eventually the operator product coeffients for primary fields. The results are applied to the Ising fusion rules. A set of theories possessing these function rules is found which is labelled by two discrete parameters. For a specific value of one of the parameters, these are the level one Spin(2m+1) Wess-Zusimo-Witten theories; it is shown that they represent an infinite number of inequivalent theories. (author). 38 refs

  17. Fast Coding Unit Encoding Mechanism for Low Complexity Video Coding

    OpenAIRE

    Gao, Yuan; Liu, Pengyu; Wu, Yueying; Jia, Kebin; Gao, Guandong

    2016-01-01

    In high efficiency video coding (HEVC), coding tree contributes to excellent compression performance. However, coding tree brings extremely high computational complexity. Innovative works for improving coding tree to further reduce encoding time are stated in this paper. A novel low complexity coding tree mechanism is proposed for HEVC fast coding unit (CU) encoding. Firstly, this paper makes an in-depth study of the relationship among CU distribution, quantization parameter (QP) and content ...

  18. Are You in a Survey?

    Science.gov (United States)

    Employment and Payroll Survey of Business Owners Work from Home Our statistics highlight trends in household statistics from multiple surveys. Data Tools & Apps Main American FactFinder Census Business Builder My Classification Codes (i.e., NAICS) Economic Census Economic Indicators Economic Studies Industry Statistics

  19. Decision Mining Revisited – Discovering Overlapping Rules

    NARCIS (Netherlands)

    Mannhardt, F.; de Leoni, M.; Reijers, H.A.; van der Aalst, W.M.P.

    2016-01-01

    Decision mining enriches process models with rules underlying decisions in processes using historical process execution data. Choices between multiple activities are specified through rules defined over process data. Existing decision mining methods focus on discovering mutually-exclusive rules,

  20. Decision Mining Revisited - Discovering Overlapping Rules

    NARCIS (Netherlands)

    Mannhardt, F.; De Leoni, M.; Reijers, H.A.; van der Aalst, W.M.P.; Nurcan, S.; Soffer, P.; Bajec, M.; Eder, J.

    2016-01-01

    Decision mining enriches process models with rules underlying decisions in processes using historical process execution data. Choices between multiple activities are specified through rules defined over process data. Existing decision mining methods focus on discovering mutually-exclusive rules,

  1. Decision mining revisited - Discovering overlapping rules

    NARCIS (Netherlands)

    Mannhardt, Felix; De Leoni, Massimiliano; Reijers, Hajo A.; Van Der Aalst, Wil M P

    2016-01-01

    Decision mining enriches process models with rules underlying decisions in processes using historical process execution data. Choices between multiple activities are specified through rules defined over process data. Existing decision mining methods focus on discovering mutually-exclusive rules,

  2. Choice Rules and Accumulator Networks

    Science.gov (United States)

    2015-01-01

    This article presents a preference accumulation model that can be used to implement a number of different multi-attribute heuristic choice rules, including the lexicographic rule, the majority of confirming dimensions (tallying) rule and the equal weights rule. The proposed model differs from existing accumulators in terms of attribute representation: Leakage and competition, typically applied only to preference accumulation, are also assumed to be involved in processing attribute values. This allows the model to perform a range of sophisticated attribute-wise comparisons, including comparisons that compute relative rank. The ability of a preference accumulation model composed of leaky competitive networks to mimic symbolic models of heuristic choice suggests that these 2 approaches are not incompatible, and that a unitary cognitive model of preferential choice, based on insights from both these approaches, may be feasible. PMID:28670592

  3. Comparison of design margin for core shroud in between design and construction code and fitness-for-service code

    International Nuclear Information System (INIS)

    Dozaki, Koji

    2007-01-01

    Structural design methods for core shroud of BWR are specified in JSME Design and Construction Code, like ASME Boiler and Pressure Vessel Code Sec. III, as a part of core support structure. Design margins are defined according to combination of the structural design method selected and service limit considered. Basically, those margins in JSME Code were determined after ASME Sec. III. Designers can select so-called twice-slope method for core shroud design among those design methods. On the other hand, flaw evaluation rules have been established for core shroud in JSME Fitness-for-Service Code. Twice-slope method is also adopted for fracture evaluation in that code even when the core shroud contains a flaw. Design margin was determined as structural factors separately from Design and Construction Code. As a natural consequence, there is a difference in those design margins between the two codes. In this paper, it is shown that the design margin in Fitness-for-Service Code is conservative by experimental evidences. Comparison of design margins between the two codes is discussed. (author)

  4. 'Sum rules' for preequilibrium reactions

    International Nuclear Information System (INIS)

    Hussein, M.S.

    1981-03-01

    Evidence that suggests a correct relationship between the optical transmission matrix, P, and the several correlation widths, gamma sub(n), found in nsmission matrix, P, and the several correlation widths, n, found in multistep compound (preequilibrium) nuclear reactions, is presented. A second sum rule is also derived within the shell model approach to nuclear reactions. Indications of the potential usefulness of the sum rules in preequilibrium studies are given. (Author) [pt

  5. Cellular automata with voting rule

    International Nuclear Information System (INIS)

    Makowiec, D.

    1996-01-01

    The chosen local interaction - the voting (majority) rule applied to the square lattice is known to cause the non ergodic cellular automata behaviour. Presented computer simulation results verify two cases of non ergodicity. The first one is implicated by the noise introduced to the local interactions and the second one follows properties of the initial lattice configuration selected at random. For the simplified voting rule - non symmetric voting, the critical behaviour has been explained rigorously. (author)

  6. SPECTRAL AMPLITUDE CODING OCDMA SYSTEMS USING ENHANCED DOUBLE WEIGHT CODE

    Directory of Open Access Journals (Sweden)

    F.N. HASOON

    2006-12-01

    Full Text Available A new code structure for spectral amplitude coding optical code division multiple access systems based on double weight (DW code families is proposed. The DW has a fixed weight of two. Enhanced double-weight (EDW code is another variation of a DW code family that can has a variable weight greater than one. The EDW code possesses ideal cross-correlation properties and exists for every natural number n. A much better performance can be provided by using the EDW code compared to the existing code such as Hadamard and Modified Frequency-Hopping (MFH codes. It has been observed that theoretical analysis and simulation for EDW is much better performance compared to Hadamard and Modified Frequency-Hopping (MFH codes.

  7. Nuclear code abstracts (1975 edition)

    International Nuclear Information System (INIS)

    Akanuma, Makoto; Hirakawa, Takashi

    1976-02-01

    Nuclear Code Abstracts is compiled in the Nuclear Code Committee to exchange information of the nuclear code developments among members of the committee. Enlarging the collection, the present one includes nuclear code abstracts obtained in 1975 through liaison officers of the organizations in Japan participating in the Nuclear Energy Agency's Computer Program Library at Ispra, Italy. The classification of nuclear codes and the format of code abstracts are the same as those in the library. (auth.)

  8. Some new ternary linear codes

    Directory of Open Access Journals (Sweden)

    Rumen Daskalov

    2017-07-01

    Full Text Available Let an $[n,k,d]_q$ code be a linear code of length $n$, dimension $k$ and minimum Hamming distance $d$ over $GF(q$. One of the most important problems in coding theory is to construct codes with optimal minimum distances. In this paper 22 new ternary linear codes are presented. Two of them are optimal. All new codes improve the respective lower bounds in [11].

  9. Sum rules in classical scattering

    International Nuclear Information System (INIS)

    Bolle, D.; Osborn, T.A.

    1981-01-01

    This paper derives sum rules associated with the classical scattering of two particles. These sum rules are the analogs of Levinson's theorem in quantum mechanics which provides a relationship between the number of bound-state wavefunctions and the energy integral of the time delay of the scattering process. The associated classical relation is an identity involving classical time delay and an integral over the classical bound-state density. We show that equalities between the Nth-order energy moment of the classical time delay and the Nth-order energy moment of the classical bound-state density hold in both a local and a global form. Local sum rules involve the time delay defined on a finite but otherwise arbitrary coordinate space volume S and the bound-state density associated with this same region. Global sum rules are those that obtain when S is the whole coordinate space. Both the local and global sum rules are derived for potentials of arbitrary shape and for scattering in any space dimension. Finally the set of classical sum rules, together with the known quantum mechanical analogs, are shown to provide a unified method of obtaining the high-temperature expansion of the classical, respectively the quantum-mechanical, virial coefficients

  10. Using the Chain Rule as the Key Link in Deriving the General Rules for Differentiation

    Science.gov (United States)

    Sprows, David

    2011-01-01

    The standard approach to the general rules for differentiation is to first derive the power, product, and quotient rules and then derive the chain rule. In this short article we give an approach to these rules which uses the chain rule as the main tool in deriving the power, product, and quotient rules in a manner which is more student-friendly…

  11. ACE - Manufacturer Identification Code (MID)

    Data.gov (United States)

    Department of Homeland Security — The ACE Manufacturer Identification Code (MID) application is used to track and control identifications codes for manufacturers. A manufacturer is identified on an...

  12. Algebraic and stochastic coding theory

    CERN Document Server

    Kythe, Dave K

    2012-01-01

    Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.

  13. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  14. The Aster code

    International Nuclear Information System (INIS)

    Delbecq, J.M.

    1999-01-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  15. Adaptive distributed source coding.

    Science.gov (United States)

    Varodayan, David; Lin, Yao-Chung; Girod, Bernd

    2012-05-01

    We consider distributed source coding in the presence of hidden variables that parameterize the statistical dependence among sources. We derive the Slepian-Wolf bound and devise coding algorithms for a block-candidate model of this problem. The encoder sends, in addition to syndrome bits, a portion of the source to the decoder uncoded as doping bits. The decoder uses the sum-product algorithm to simultaneously recover the source symbols and the hidden statistical dependence variables. We also develop novel techniques based on density evolution (DE) to analyze the coding algorithms. We experimentally confirm that our DE analysis closely approximates practical performance. This result allows us to efficiently optimize parameters of the algorithms. In particular, we show that the system performs close to the Slepian-Wolf bound when an appropriate doping rate is selected. We then apply our coding and analysis techniques to a reduced-reference video quality monitoring system and show a bit rate saving of about 75% compared with fixed-length coding.

  16. Speech coding code- excited linear prediction

    CERN Document Server

    Bäckström, Tom

    2017-01-01

    This book provides scientific understanding of the most central techniques used in speech coding both for advanced students as well as professionals with a background in speech audio and or digital signal processing. It provides a clear connection between the whys hows and whats thus enabling a clear view of the necessity purpose and solutions provided by various tools as well as their strengths and weaknesses in each respect Equivalently this book sheds light on the following perspectives for each technology presented Objective What do we want to achieve and especially why is this goal important Resource Information What information is available and how can it be useful and Resource Platform What kind of platforms are we working with and what are their capabilities restrictions This includes computational memory and acoustic properties and the transmission capacity of devices used. The book goes on to address Solutions Which solutions have been proposed and how can they be used to reach the stated goals and ...

  17. Spatially coded backscatter radiography

    International Nuclear Information System (INIS)

    Thangavelu, S.; Hussein, E.M.A.

    2007-01-01

    Conventional radiography requires access to two opposite sides of an object, which makes it unsuitable for the inspection of extended and/or thick structures (airframes, bridges, floors etc.). Backscatter imaging can overcome this problem, but the indications obtained are difficult to interpret. This paper applies the coded aperture technique to gamma-ray backscatter-radiography in order to enhance the detectability of flaws. This spatial coding method involves the positioning of a mask with closed and open holes to selectively permit or block the passage of radiation. The obtained coded-aperture indications are then mathematically decoded to detect the presence of anomalies. Indications obtained from Monte Carlo calculations were utilized in this work to simulate radiation scattering measurements. These simulated measurements were used to investigate the applicability of this technique to the detection of flaws by backscatter radiography

  18. Aztheca Code; Codigo Aztheca

    Energy Technology Data Exchange (ETDEWEB)

    Quezada G, S.; Espinosa P, G. [Universidad Autonoma Metropolitana, Unidad Iztapalapa, San Rafael Atlixco No. 186, Col. Vicentina, 09340 Ciudad de Mexico (Mexico); Centeno P, J.; Sanchez M, H., E-mail: sequga@gmail.com [UNAM, Facultad de Ingenieria, Ciudad Universitaria, Circuito Exterior s/n, 04510 Ciudad de Mexico (Mexico)

    2017-09-15

    This paper presents the Aztheca code, which is formed by the mathematical models of neutron kinetics, power generation, heat transfer, core thermo-hydraulics, recirculation systems, dynamic pressure and level models and control system. The Aztheca code is validated with plant data, as well as with predictions from the manufacturer when the reactor operates in a stationary state. On the other hand, to demonstrate that the model is applicable during a transient, an event occurred in a nuclear power plant with a BWR reactor is selected. The plant data are compared with the results obtained with RELAP-5 and the Aztheca model. The results show that both RELAP-5 and the Aztheca code have the ability to adequately predict the behavior of the reactor. (Author)

  19. The Coding Question.

    Science.gov (United States)

    Gallistel, C R

    2017-07-01

    Recent electrophysiological results imply that the duration of the stimulus onset asynchrony in eyeblink conditioning is encoded by a mechanism intrinsic to the cerebellar Purkinje cell. This raises the general question - how is quantitative information (durations, distances, rates, probabilities, amounts, etc.) transmitted by spike trains and encoded into engrams? The usual assumption is that information is transmitted by firing rates. However, rate codes are energetically inefficient and computationally awkward. A combinatorial code is more plausible. If the engram consists of altered synaptic conductances (the usual assumption), then we must ask how numbers may be written to synapses. It is much easier to formulate a coding hypothesis if the engram is realized by a cell-intrinsic molecular mechanism. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. Revised SRAC code system

    International Nuclear Information System (INIS)

    Tsuchihashi, Keichiro; Ishiguro, Yukio; Kaneko, Kunio; Ido, Masaru.

    1986-09-01

    Since the publication of JAERI-1285 in 1983 for the preliminary version of the SRAC code system, a number of additions and modifications to the functions have been made to establish an overall neutronics code system. Major points are (1) addition of JENDL-2 version of data library, (2) a direct treatment of doubly heterogeneous effect on resonance absorption, (3) a generalized Dancoff factor, (4) a cell calculation based on the fixed boundary source problem, (5) the corresponding edit required for experimental analysis and reactor design, (6) a perturbation theory calculation for reactivity change, (7) an auxiliary code for core burnup and fuel management, etc. This report is a revision of the users manual which consists of the general description, input data requirements and their explanation, detailed information on usage, mathematics, contents of libraries and sample I/O. (author)

  1. The correspondence between projective codes and 2-weight codes

    NARCIS (Netherlands)

    Brouwer, A.E.; Eupen, van M.J.M.; Tilborg, van H.C.A.; Willems, F.M.J.

    1994-01-01

    The hyperplanes intersecting a 2-weight code in the same number of points obviously form the point set of a projective code. On the other hand, if we have a projective code C, then we can make a 2-weight code by taking the multiset of points E PC with multiplicity "Y(w), where W is the weight of

  2. Visualizing code and coverage changes for code review

    NARCIS (Netherlands)

    Oosterwaal, Sebastiaan; van Deursen, A.; De Souza Coelho, R.; Sawant, A.A.; Bacchelli, A.

    2016-01-01

    One of the tasks of reviewers is to verify that code modifications are well tested. However, current tools offer little support in understanding precisely how changes to the code relate to changes to the tests. In particular, it is hard to see whether (modified) test code covers the changed code.

  3. Turbo-Gallager Codes: The Emergence of an Intelligent Coding ...

    African Journals Online (AJOL)

    Today, both turbo codes and low-density parity-check codes are largely superior to other code families and are being used in an increasing number of modern communication systems including 3G standards, satellite and deep space communications. However, the two codes have certain distinctive characteristics that ...

  4. Improving the accuracy of operation coding in surgical discharge summaries

    Science.gov (United States)

    Martinou, Eirini; Shouls, Genevieve; Betambeau, Nadine

    2014-01-01

    Procedural coding in surgical discharge summaries is extremely important; as well as communicating to healthcare staff which procedures have been performed, it also provides information that is used by the hospital's coding department. The OPCS code (Office of Population, Censuses and Surveys Classification of Surgical Operations and Procedures) is used to generate the tariff that allows the hospital to be reimbursed for the procedure. We felt that the OPCS coding on discharge summaries was often incorrect within our breast and endocrine surgery department. A baseline measurement over two months demonstrated that 32% of operations had been incorrectly coded, resulting in an incorrect tariff being applied and an estimated loss to the Trust of £17,000. We developed a simple but specific OPCS coding table in collaboration with the clinical coding team and breast surgeons that summarised all operations performed within our department. This table was disseminated across the team, specifically to the junior doctors who most frequently complete the discharge summaries. Re-audit showed 100% of operations were accurately coded, demonstrating the effectiveness of the coding table. We suggest that specifically designed coding tables be introduced across each surgical department to ensure accurate OPCS codes are used to produce better quality surgical discharge summaries and to ensure correct reimbursement to the Trust. PMID:26734286

  5. 78 FR 66396 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change, as...

    Science.gov (United States)

    2013-11-05

    ... relating to codes of ethics. This Rule requires investment advisers to adopt a code of ethics that reflects.... Forwards on securities are contracts to purchase or sell securities for a fixed price at a future date beyond normal settlement time. Forwards on Fixed Income Instruments are contracts to purchase or sell...

  6. 78 FR 12110 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change, as...

    Science.gov (United States)

    2013-02-21

    ... the Advisers Act relating to codes of ethics. This Rule requires investment advisers to adopt a code of ethics that reflects the fiduciary nature of the relationship to clients as well as compliance... quantitative model to identify which securities the Fund might purchase and sell and opportune times for...

  7. 77 FR 36314 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change Relating...

    Science.gov (United States)

    2012-06-18

    ... relating to codes of ethics. This Rule requires investment advisers to adopt a code of ethics that reflects... writer of the option is obligated to purchase the requisite amount of the asset underlying the option to... amount of cash or cash equivalents sufficient to cover the purchase price of the asset underlying the...

  8. Classical diffusion: theory and simulation codes

    International Nuclear Information System (INIS)

    Grad, H.; Hu, P.N.

    1978-03-01

    A survey is given of the development of classical diffusion theory which arose from the observation of Grad and Hogan that the Pfirsch-Schluter and Neoclassical theories are very special and frequently inapplicable because they require that plasma mass flow be treated as transport rather than as a state variable of the plasma. The subsequent theory, efficient numerical algorithms, and results of various operating codes are described

  9. Code of Medical Ethics

    Directory of Open Access Journals (Sweden)

    . SZD-SZZ

    2017-03-01

    Full Text Available Te Code was approved on December 12, 1992, at the 3rd regular meeting of the General Assembly of the Medical Chamber of Slovenia and revised on April 24, 1997, at the 27th regular meeting of the General Assembly of the Medical Chamber of Slovenia. The Code was updated and harmonized with the Medical Association of Slovenia and approved on October 6, 2016, at the regular meeting of the General Assembly of the Medical Chamber of Slovenia.

  10. Supervised Convolutional Sparse Coding

    KAUST Repository

    Affara, Lama Ahmed

    2018-04-08

    Convolutional Sparse Coding (CSC) is a well-established image representation model especially suited for image restoration tasks. In this work, we extend the applicability of this model by proposing a supervised approach to convolutional sparse coding, which aims at learning discriminative dictionaries instead of purely reconstructive ones. We incorporate a supervised regularization term into the traditional unsupervised CSC objective to encourage the final dictionary elements to be discriminative. Experimental results show that using supervised convolutional learning results in two key advantages. First, we learn more semantically relevant filters in the dictionary and second, we achieve improved image reconstruction on unseen data.

  11. CONCEPT computer code

    International Nuclear Information System (INIS)

    Delene, J.

    1984-01-01

    CONCEPT is a computer code that will provide conceptual capital investment cost estimates for nuclear and coal-fired power plants. The code can develop an estimate for construction at any point in time. Any unit size within the range of about 400 to 1300 MW electric may be selected. Any of 23 reference site locations across the United States and Canada may be selected. PWR, BWR, and coal-fired plants burning high-sulfur and low-sulfur coal can be estimated. Multiple-unit plants can be estimated. Costs due to escalation/inflation and interest during construction are calculated

  12. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  13. Austenitic stainless steels, status of the properties database and design rule development

    Energy Technology Data Exchange (ETDEWEB)

    Tavassoli, A.-A. [Commissariat a l`Energie Atomique, CEA-Saclay, Gif-sur Yvette (France). CEREM; Touboul, F. [DMT, Commissariat a l`Energie Atomique, CEA Saclay, Gif-sur-Yvette (France)

    1996-10-01

    In parallel with the new tasks initiated to substantiate the existing database for the reference structural material (type 316LN-IG) of ITER, interim design criteria are being developed to guide subsequent design stages. The French RCC-MR codes for fast breeder reactors, incorporating rules from other ITER partner codes and those needed to meet specific fusion requirements, are used for this purpose. This paper presents the current status of materials data and design rules for type 316LN-IG steel and describes how the irradiation effects are taken into account. (orig.).

  14. Threats to bioethical principles in medical practice in Brazil: new medical ethics code period.

    Science.gov (United States)

    Gracindo, G C L; da Silva Gallo, J H; Nunes, R

    2018-03-15

    We aimed to outline the profile of medical professionals in Brazil who have violated the deontological norms set forth in the ethics code of the profession, and whose cases were judged by the higher tribunal for medical ethics between 2010 and 2016. This survey was conducted using a database formed from professional ethics cases extracted from the plenary of the medical ethics tribunal of the Federal Council of Medicine. These were disciplinary ethics cases that were judged at appeal level between 2010 and 2016. Most of these professionals were male (88.5%) and their mean age was 59.9 years (SD=11.62) on the date of judgment of their appeals, ranging from 28 to 95 years. Most of them were based in the southeastern region of Brazil (50.89%). Articles 1 and 18 of the medical ethics code were the rules most frequently violated. The sentence given most often was the cancellation of their professional license (37.6%) and the acts most often sentenced involved malpractice, imprudence, and negligence (18.49%). It is acknowledged that concern for the principles of bioethics was present in the appeal decisions made by the plenary of the medical ethics tribunal of the Federal Council of Medicine.

  15. Threats to bioethical principles in medical practice in Brazil: new medical ethics code period

    Directory of Open Access Journals (Sweden)

    G.C.L. Gracindo

    2018-03-01

    Full Text Available We aimed to outline the profile of medical professionals in Brazil who have violated the deontological norms set forth in the ethics code of the profession, and whose cases were judged by the higher tribunal for medical ethics between 2010 and 2016. This survey was conducted using a database formed from professional ethics cases extracted from the plenary of the medical ethics tribunal of the Federal Council of Medicine. These were disciplinary ethics cases that were judged at appeal level between 2010 and 2016. Most of these professionals were male (88.5% and their mean age was 59.9 years (SD=11.62 on the date of judgment of their appeals, ranging from 28 to 95 years. Most of them were based in the southeastern region of Brazil (50.89%. Articles 1 and 18 of the medical ethics code were the rules most frequently violated. The sentence given most often was the cancellation of their professional license (37.6% and the acts most often sentenced involved malpractice, imprudence, and negligence (18.49%. It is acknowledged that concern for the principles of bioethics was present in the appeal decisions made by the plenary of the medical ethics tribunal of the Federal Council of Medicine.

  16. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...... includes a reformulation of the usual methods to estimate the minimum distances of evaluation codes into the setting of affine variety codes. Finally we describe the connection to the theory of one-pointgeometric Goppa codes. Contents 4.1 Introduction...... . . . . . . . . . . . . . . . . . . . . . . . 171 4.9 Codes form order domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 4.10 One-point geometric Goppa codes . . . . . . . . . . . . . . . . . . . . . . . . 176 4.11 Bibliographical Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 References...

  17. RCC-F: Design and construction rules for PWR fire protection systems

    International Nuclear Information System (INIS)

    2013-01-01

    The RCC-F code defines the rules for designing, building and installing the fire protection systems used to manage the nuclear hazards inherent in the outbreak of a fire inside the facility and thereby control the fundamental nuclear functions. The code provides fire protection recommendations in terms of: the industrial risk (loss of assets and/or operation), personnel safety, the environment. The code is divided into five main sections: generalities, design safety principles, fire protection design bases, construction provisions, rules for installing the fire protection components and equipment. The RCC-F code is available as an ETC-F version specifically for EPR projects (European pressurized reactor). Contents of the 2013 edition of the ETC-F code: Volume A - Generalities: Structure of ETC-F general points, documentation (in progress), chapter (provision) quality assurance; Volume B - Design safety principles: design nuclear safety principles; Volume C - Fire protection design bases: fire protection design bases; Volume D - Construction provisions: construction provisions; Volume E - Installation rules for fire protection: rules for installing the fire protection, components and equipment

  18. Sum rules for collisional processes

    International Nuclear Information System (INIS)

    Oreg, J.; Goldstein, W.H.; Bar-Shalom, A.; Klapisch, M.

    1991-01-01

    We derive level-to-configuration sum rules for dielectronic capture and for collisional excitation and ionization. These sum rules give the total transition rate from a detailed atomic level to an atomic configuration. For each process, we show that it is possible to factor out the dependence on continuum-electron wave functions. The remaining explicit level dependence of each rate is then obtained from the matrix element of an effective operator acting on the bound orbitals only. In a large class of cases, the effective operator reduces to a one-electron monopole whose matrix element is proportional to the statistical weight of the level. We show that even in these cases, nonstatistical level dependence enters through the dependence of radial integrals on continuum orbitals. For each process, explicit analytic expressions for the level-to-configuration sum rules are given for all possible cases. Together with the well-known J-file sum rule for radiative rates [E. U. Condon and G. H. Shortley, The Theory of Atomic Spectra (University Press, Cambridge, 1935)], the sum rules offer a systematic and efficient procedure for collapsing high-multiplicity configurations into ''effective'' levels for the purpose of modeling the population kinetics of ionized heavy atoms in plasma

  19. [Towards a new Tunisian Medical Code of Deontology].

    Science.gov (United States)

    Aissaoui, Abir; Haj Salem, Nidhal; Chadly, Ali

    2010-06-01

    The Medical Code of Deontology is a legal text including the physician's duties towards his patients, colleagues, auxiliaries and the community. Considering the scientific, legal and social changes, the deontology code should be revised periodically. The first Tunisian Medical Code of Deontology (TMCD) was promulgated in 1973 and abrogated in 1993 by the new Code. This version has never been reviewed and does not seem to fit the current conditions of medical practice. The TMCD does not contain texts referring to information given to the patient, pain control, palliative care and management of the end of life as well as protection of medical data. Furthermore, the TMCD does not include rules related to tissues and organs transplantation and medical assisted human reproduction in accordance with Tunisian legal texts. We aim in this paper at analyzing the insufficiencies of the TMCD and suggesting modifications in order to update it.

  20. EUROPEAN CIVIL CODE BETWEEN DESIDERATUM AND REALITY

    Directory of Open Access Journals (Sweden)

    Liviu-Bogdan Ciucă

    2015-11-01

    Full Text Available The principle of priority and direct application of European rules in relation to the provisions that we find in the national legislation, once assumed at European level, it has generated debates and concerns about the usefulness of a single legal act in private law matters. The idea of European Civil Code, appeared somewhere in the early 80s, is becoming more current and triggers a justified and sustained interest. Considering that the civil legislation of Community Member is a legislation dominated by tradition and peculiarities of culture, religion and temper, the issue of a European Civil Code forms as a project generating discussions, restraints and even rejec tions of the Member States in relation to this proposal. The current system of European legislative acts that apply immediately and priority in EU member states remains only a temporary solution and which generates difficulties in interpretation and affects the utility of the enactment. Clarifications on the pros and cons to promote a European Civil Codex will be analyzed primarily in terms of law and, last but not least in terms of political perspective, taking into account the Community objectives undertaken by accession treaties and the need for a legislative norm, especially European, to be predictable, transparent, useful and accessible. This paper intends to submit to debate both current doctrinal arguments, the blocking of such an approach, based on the principle of autonomy and the peculiarities of the legal system of each Member State, but also considering the practical arguments and of simplification of rules met in a European Civil Code assumed and applicable in the European space.

  1. Dual Coding in Children.

    Science.gov (United States)

    Burton, John K.; Wildman, Terry M.

    The purpose of this study was to test the applicability of the dual coding hypothesis to children's recall performance. The hypothesis predicts that visual interference will have a small effect on the recall of visually presented words or pictures, but that acoustic interference will cause a decline in recall of visually presented words and…

  2. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  3. Radioactive action code

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    A new coding system, 'Hazrad', for buildings and transportation containers for alerting emergency services personnel to the presence of radioactive materials has been developed in the United Kingdom. The hazards of materials in the buildings or transport container, together with the recommended emergency action, are represented by a number of codes which are marked on the building or container and interpreted from a chart carried as a pocket-size guide. Buildings would be marked with the familiar yellow 'radioactive' trefoil, the written information 'Radioactive materials' and a list of isotopes. Under this the 'Hazrad' code would be written - three symbols to denote the relative radioactive risk (low, medium or high), the biological risk (also low, medium or high) and the third showing the type of radiation emitted, alpha, beta or gamma. The response cards indicate appropriate measures to take, eg for a high biological risk, Bio3, the wearing of a gas-tight protection suit is advised. The code and its uses are explained. (U.K.)

  4. Building Codes and Regulations.

    Science.gov (United States)

    Fisher, John L.

    The hazard of fire is of great concern to libraries due to combustible books and new plastics used in construction and interiors. Building codes and standards can offer architects and planners guidelines to follow but these standards should be closely monitored, updated, and researched for fire prevention. (DS)

  5. Physics of codes

    International Nuclear Information System (INIS)

    Cooper, R.K.; Jones, M.E.

    1989-01-01

    The title given this paper is a bit presumptuous, since one can hardly expect to cover the physics incorporated into all the codes already written and currently being written. The authors focus on those codes which have been found to be particularly useful in the analysis and design of linacs. At that the authors will be a bit parochial and discuss primarily those codes used for the design of radio-frequency (rf) linacs, although the discussions of TRANSPORT and MARYLIE have little to do with the time structures of the beams being analyzed. The plan of this paper is first to describe rather simply the concepts of emittance and brightness, then to describe rather briefly each of the codes TRANSPORT, PARMTEQ, TBCI, MARYLIE, and ISIS, indicating what physics is and is not included in each of them. It is expected that the vast majority of what is covered will apply equally well to protons and electrons (and other particles). This material is intended to be tutorial in nature and can in no way be expected to be exhaustive. 31 references, 4 figures

  6. Reliability and code level

    NARCIS (Netherlands)

    Kasperski, M.; Geurts, C.P.W.

    2005-01-01

    The paper describes the work of the IAWE Working Group WBG - Reliability and Code Level, one of the International Codification Working Groups set up at ICWE10 in Copenhagen. The following topics are covered: sources of uncertainties in the design wind load, appropriate design target values for the

  7. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  8. CERN Code of Conduct

    CERN Document Server

    Department, HR

    2010-01-01

    The Code is intended as a guide in helping us, as CERN contributors, to understand how to conduct ourselves, treat others and expect to be treated. It is based around the five core values of the Organization. We should all become familiar with it and try to incorporate it into our daily life at CERN.

  9. Nuclear safety code study

    Energy Technology Data Exchange (ETDEWEB)

    Hu, H.H.; Ford, D.; Le, H.; Park, S.; Cooke, K.L.; Bleakney, T.; Spanier, J.; Wilburn, N.P.; O' Reilly, B.; Carmichael, B.

    1981-01-01

    The objective is to analyze an overpower accident in an LMFBR. A simplified model of the primary coolant loop was developed in order to understand the instabilities encountered with the MELT III and SAS codes. The computer programs were translated for switching to the IBM 4331. Numerical methods were investigated for solving the neutron kinetics equations; the Adams and Gear methods were compared. (DLC)

  10. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and

  11. Error Correcting Codes -34 ...

    Indian Academy of Sciences (India)

    information and coding theory. A large scale relay computer had failed to deliver the expected results due to a hardware fault. Hamming, one of the active proponents of computer usage, was determined to find an efficient means by which computers could detect and correct their own faults. A mathematician by train-.

  12. Broadcast Coded Slotted ALOHA

    DEFF Research Database (Denmark)

    Ivanov, Mikhail; Brännström, Frederik; Graell i Amat, Alexandre

    2016-01-01

    We propose an uncoordinated medium access control (MAC) protocol, called all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all broadcast with strict latency constraints. In B-CSA, each user acts as both transmitter and receiver in a half-duplex mode. The half-duplex mode gives ...

  13. Software Defined Coded Networking

    DEFF Research Database (Denmark)

    Di Paola, Carla; Roetter, Daniel Enrique Lucani; Palazzo, Sergio

    2017-01-01

    the quality of each link and even across neighbouring links and using simulations to show that an additional reduction of packet transmission in the order of 40% is possible. Second, to advocate for the use of network coding (NC) jointly with software defined networking (SDN) providing an implementation...

  14. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  15. (Almost) practical tree codes

    KAUST Repository

    Khina, Anatoly

    2016-08-15

    We consider the problem of stabilizing an unstable plant driven by bounded noise over a digital noisy communication link, a scenario at the heart of networked control. To stabilize such a plant, one needs real-time encoding and decoding with an error probability profile that decays exponentially with the decoding delay. The works of Schulman and Sahai over the past two decades have developed the notions of tree codes and anytime capacity, and provided the theoretical framework for studying such problems. Nonetheless, there has been little practical progress in this area due to the absence of explicit constructions of tree codes with efficient encoding and decoding algorithms. Recently, linear time-invariant tree codes were proposed to achieve the desired result under maximum-likelihood decoding. In this work, we take one more step towards practicality, by showing that these codes can be efficiently decoded using sequential decoding algorithms, up to some loss in performance (and with some practical complexity caveats). We supplement our theoretical results with numerical simulations that demonstrate the effectiveness of the decoder in a control system setting.

  16. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    having a probability Pi of being equal to a 1. Let us assume ... equal to a 0/1 has no bearing on the probability of the. It is often ... bits (call this set S) whose individual bits add up to zero ... In the context of binary error-correct~ng codes, specifi-.

  17. The Redox Code.

    Science.gov (United States)

    Jones, Dean P; Sies, Helmut

    2015-09-20

    The redox code is a set of principles that defines the positioning of the nicotinamide adenine dinucleotide (NAD, NADP) and thiol/disulfide and other redox systems as well as the thiol redox proteome in space and time in biological systems. The code is richly elaborated in an oxygen-dependent life, where activation/deactivation cycles involving O₂ and H₂O₂ contribute to spatiotemporal organization for differentiation, development, and adaptation to the environment. Disruption of this organizational structure during oxidative stress represents a fundamental mechanism in system failure and disease. Methodology in assessing components of the redox code under physiological conditions has progressed, permitting insight into spatiotemporal organization and allowing for identification of redox partners in redox proteomics and redox metabolomics. Complexity of redox networks and redox regulation is being revealed step by step, yet much still needs to be learned. Detailed knowledge of the molecular patterns generated from the principles of the redox code under defined physiological or pathological conditions in cells and organs will contribute to understanding the redox component in health and disease. Ultimately, there will be a scientific basis to a modern redox medicine.

  18. Opinion evolution based on cellular automata rules in small world networks

    Science.gov (United States)

    Shi, Xiao-Ming; Shi, Lun; Zhang, Jie-Fang

    2010-03-01

    In this paper, we apply cellular automata rules, which can be given by a truth table, to human memory. We design each memory as a tracking survey mode that keeps the most recent three opinions. Each cellular automata rule, as a personal mechanism, gives the final ruling in one time period based on the data stored in one's memory. The key focus of the paper is to research the evolution of people's attitudes to the same question. Based on a great deal of empirical observations from computer simulations, all the rules can be classified into 20 groups. We highlight the fact that the phenomenon shown by some rules belonging to the same group will be altered within several steps by other rules in different groups. It is truly amazing that, compared with the last hundreds of presidential voting in America, the eras of important events in America's history coincide with the simulation results obtained by our model.

  19. Computing Challenges in Coded Mask Imaging

    Science.gov (United States)

    Skinner, Gerald

    2009-01-01

    This slide presaentation reviews the complications and challenges in developing computer systems for Coded Mask Imaging telescopes. The coded mask technique is used when there is no other way to create the telescope, (i.e., when there are wide fields of view, high energies for focusing or low energies for the Compton/Tracker Techniques and very good angular resolution.) The coded mask telescope is described, and the mask is reviewed. The coded Masks for the INTErnational Gamma-Ray Astrophysics Laboratory (INTEGRAL) instruments are shown, and a chart showing the types of position sensitive detectors used for the coded mask telescopes is also reviewed. Slides describe the mechanism of recovering an image from the masked pattern. The correlation with the mask pattern is described. The Matrix approach is reviewed, and other approaches to image reconstruction are described. Included in the presentation is a review of the Energetic X-ray Imaging Survey Telescope (EXIST) / High Energy Telescope (HET), with information about the mission, the operation of the telescope, comparison of the EXIST/HET with the SWIFT/BAT and details of the design of the EXIST/HET.

  20. Z₂-double cyclic codes

    OpenAIRE

    Borges, J.

    2014-01-01

    A binary linear code C is a Z2-double cyclic code if the set of coordinates can be partitioned into two subsets such that any cyclic shift of the coordinates of both subsets leaves invariant the code. These codes can be identified as submodules of the Z2[x]-module Z2[x]/(x^r − 1) × Z2[x]/(x^s − 1). We determine the structure of Z2-double cyclic codes giving the generator polynomials of these codes. The related polynomial representation of Z2-double cyclic codes and its duals, and the relation...