WorldWideScience

Sample records for survey coding rules

  1. Setting new global rules? : TNCs and codes of conduct

    NARCIS (Netherlands)

    Kolk, A.; van Tulder, R.

    2005-01-01

    The introduction of codes of conduct can be seen as an expression of corporate social responsibility, but also as rule-setting behaviour - attempts to help fill some of the existing international instutitional voids. To shed light on these aspects and the (potential) effectiveness of codes, this

  2. Setting new global rules? : TNCs and codes of conduct

    NARCIS (Netherlands)

    Kolk, A.; van Tulder, R.

    2005-01-01

    The introduction of codes of conduct can be seen as an expression of corporate social responsibility, but also as rule-setting behaviour - attempts to help fill some of the existing international instutitional voids. To shed light on these aspects and the (potential) effectiveness of codes, this art

  3. Survey of nuclear fuel-cycle codes

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, C.R.; de Saussure, G.; Marable, J.H.

    1981-04-01

    A two-month survey of nuclear fuel-cycle models was undertaken. This report presents the information forthcoming from the survey. Of the nearly thirty codes reviewed in the survey, fifteen of these codes have been identified as potentially useful in fulfilling the tasks of the Nuclear Energy Analysis Division (NEAD) as defined in their FY 1981-1982 Program Plan. Six of the fifteen codes are given individual reviews. The individual reviews address such items as the funding agency, the author and organization, the date of completion of the code, adequacy of documentation, computer requirements, history of use, variables that are input and forecast, type of reactors considered, part of fuel cycle modeled and scope of the code (international or domestic, long-term or short-term, regional or national). The report recommends that the Model Evaluation Team perform an evaluation of the EUREKA uranium mining and milling code.

  4. Automatic Coding Rule Conformance Checking Using Logic Programs

    CERN Document Server

    Marpons-Ucero, Guillem; Herranz, Ángel; Fredlund, Lars-Åke; Carro, Manuel; Moreno-Navarro, Juan José

    2007-01-01

    Some approaches to increasing program reliability involve a disciplined use of programming languages so as to minimise the hazards introduced by error-prone features. This is realised by writing code that is constrained to a subset of the a priori admissible programs, and that, moreover, may use only a subset of the language. These subsets are determined by a collection of so-called coding rules.

  5. Report on FY15 alloy 617 code rules development

    Energy Technology Data Exchange (ETDEWEB)

    Sham, Sam [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Jetter, Robert I [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Hollinger, Greg [Becht Engineering Co., Inc., Liberty Corner, NJ (United States); Pease, Derrick [Becht Engineering Co., Inc., Liberty Corner, NJ (United States); Carter, Peter [Stress Engineering Services, Inc., Houston, TX (United States); Pu, Chao [Univ. of Tennessee, Knoxville, TN (United States); Wang, Yanli [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2015-09-01

    Due to its strength at very high temperatures, up to 950°C (1742°F), Alloy 617 is the reference construction material for structural components that operate at or near the outlet temperature of the very high temperature gas-cooled reactors. However, the current rules in the ASME Section III, Division 5 Subsection HB, Subpart B for the evaluation of strain limits and creep-fatigue damage using simplified methods based on elastic analysis have been deemed inappropriate for Alloy 617 at temperatures above 650°C (1200°F) (Corum and Brass, Proceedings of ASME 1991 Pressure Vessels and Piping Conference, PVP-Vol. 215, p.147, ASME, NY, 1991). The rationale for this exclusion is that at higher temperatures it is not feasible to decouple plasticity and creep, which is the basis for the current simplified rules. This temperature, 650°C (1200°F), is well below the temperature range of interest for this material for the high temperature gas-cooled reactors and the very high temperature gas-cooled reactors. The only current alternative is, thus, a full inelastic analysis requiring sophisticated material models that have not yet been formulated and verified. To address these issues, proposed code rules have been developed which are based on the use of elastic-perfectly plastic (EPP) analysis methods applicable to very high temperatures. The proposed rules for strain limits and creep-fatigue evaluation were initially documented in the technical literature (Carter, Jetter and Sham, Proceedings of ASME 2012 Pressure Vessels and Piping Conference, papers PVP 2012 28082 and PVP 2012 28083, ASME, NY, 2012), and have been recently revised to incorporate comments and simplify their application. Background documents have been developed for these two code cases to support the ASME Code committee approval process. These background documents for the EPP strain limits and creep-fatigue code cases are documented in this report.

  6. Low back pain status in elite and semi-elite Australian football codes: a cross-sectional survey of football (soccer, Australian rules, rugby league, rugby union and non-athletic controls

    Directory of Open Access Journals (Sweden)

    McHardy Andrew

    2009-04-01

    Full Text Available Abstract Background Our understanding of the effects of football code participation on low back pain (LBP is limited. It is unclear whether LBP is more prevalent in athletic populations or differs between levels of competition. Thus it was the aim of this study to document and compare the prevalence, intensity, quality and frequency of LBP between elite and semi-elite male Australian football code participants and a non-athletic group. Methods A cross-sectional survey of elite and semi-elite male Australian football code participants and a non-athletic group was performed. Participants completed a self-reported questionnaire incorporating the Quadruple Visual Analogue Scale (QVAS and McGill Pain Questionnaire (short form (MPQ-SF, along with additional questions adapted from an Australian epidemiological study. Respondents were 271 elite players (mean age 23.3, range 17–39, 360 semi-elite players (mean age 23.8, range 16–46 and 148 non-athletic controls (mean age 23.9, range 18–39. Results Groups were matched for age (p = 0.42 and experienced the same age of first onset LBP (p = 0.40. A significant linear increase in LBP from the non-athletic group, to the semi-elite and elite groups for the QVAS and the MPQ-SF was evident (p Conclusion Foolers in Australia have significantly more severe and frequent LBP than a non-athletic group and this escalates with level of competition.

  7. A neuronal learning rule for sub-millisecond temporal coding

    Science.gov (United States)

    Gerstner, Wulfram; Kempter, Richard; van Hemmen, J. Leo; Wagner, Hermann

    1996-09-01

    A PARADOX that exists in auditory and electrosensory neural systems1,2 is that they encode behaviourally relevant signals in the range of a few microseconds with neurons that are at least one order of magnitude slower. The importance of temporal coding in neural information processing is not clear yet3-8. A central question is whether neuronal firing can be more precise than the time constants of the neuronal processes involved9. Here we address this problem using the auditory system of the barn owl as an example. We present a modelling study based on computer simulations of a neuron in the laminar nucleus. Three observations explain the paradox. First, spiking of an 'integrate-and-fire' neuron driven by excitatory postsynaptic potentials with a width at half-maximum height of 250 μs, has an accuracy of 25 μs if the presynaptic signals arrive coherently. Second, the necessary degree of coherence in the signal arrival times can be attained during ontogenetic development by virtue of an unsupervised hebbian learning rule. Learning selects connections with matching delays from a broad distribution of axons with random delays. Third, the learning rule also selects the correct delays from two independent groups of inputs, for example, from the left and right ear.

  8. Low back pain status in elite and semi-elite Australian football codes: a cross-sectional survey of football (soccer), Australian rules, rugby league, rugby union and non-athletic controls.

    Science.gov (United States)

    Hoskins, Wayne; Pollard, Henry; Daff, Chris; Odell, Andrew; Garbutt, Peter; McHardy, Andrew; Hardy, Kate; Dragasevic, George

    2009-04-17

    Our understanding of the effects of football code participation on low back pain (LBP) is limited. It is unclear whether LBP is more prevalent in athletic populations or differs between levels of competition. Thus it was the aim of this study to document and compare the prevalence, intensity, quality and frequency of LBP between elite and semi-elite male Australian football code participants and a non-athletic group. A cross-sectional survey of elite and semi-elite male Australian football code participants and a non-athletic group was performed. Participants completed a self-reported questionnaire incorporating the Quadruple Visual Analogue Scale (QVAS) and McGill Pain Questionnaire (short form) (MPQ-SF), along with additional questions adapted from an Australian epidemiological study. Respondents were 271 elite players (mean age 23.3, range 17-39), 360 semi-elite players (mean age 23.8, range 16-46) and 148 non-athletic controls (mean age 23.9, range 18-39). Groups were matched for age (p = 0.42) and experienced the same age of first onset LBP (p = 0.40). A significant linear increase in LBP from the non-athletic group, to the semi-elite and elite groups for the QVAS and the MPQ-SF was evident (p < 0.001). Elite subjects were more likely to experience more frequent (daily or weekly OR 1.77, 95% CI 1.29-2.42) and severe LBP (discomforting and greater OR 1.75, 95% CI 1.29-2.38). Foolers in Australia have significantly more severe and frequent LBP than a non-athletic group and this escalates with level of competition.

  9. Optimization of Mapping Rule of Bit-Interleaved Turbo Coded Modulation with 16QAM

    Institute of Scientific and Technical Information of China (English)

    FEI Ze-song; YANG Yu; LIU Lin-nan; KUANG Jing-ming

    2005-01-01

    Optimization of mapping rule of bit-interleaved Turbo coded modulation with 16 quadrature amplitude modulation (QAM) is investigated based on different impacts of various encoded bits sequence on Turbo decoding performance. Furthermore, bit-interleaved in-phase and quadrature phase (I-Q) Turbo coded modulation scheme are designed similarly with I-Q trellis coded modulation (TCM). Through performance evaluation and analysis, it can be seen that the novel mapping rule outperforms traditional one and the I-Q Turbo coded modulation can not achieve good performance as expected. Therefore, there is not obvious advantage in using I-Q method in bit-interleaved Turbo coded modulation.

  10. A Survey of Association Rule Mining Using Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Anubha Sharma

    2012-08-01

    Full Text Available Data mining is the analysis step of the "Knowledge Discovery in Databases" process, or KDD. It is the process that results in the discovery of new patterns in large data sets. It utilizes methods at the intersection of artificial intelligence, machine learning, statistics, and database systems. The overall goal of the data mining process is to extract knowledge from an existing data set and transform it into a human-understandable structure. In data mining, association rule learning is a popular and well researched method for discovering interesting relations between variables in large databases. Association rules are usually required to satisfy a user-specified minimum support and a user-specified minimum confidence at the same time. Genetic algorithm (GA is a search heuristic that mimics the process of natural evolution. This heuristic is routinely used to generate useful solutions to optimization and search problems. Genetic algorithms belong to the larger class of evolutionary algorithms, which generate solutions to optimization problems using techniques inspired by natural evolution, such as inheritance, mutation, selection, and crossover. In previous, many researchers have proposed Genetic Algorithms for mining interesting association rules from quantitative data. In this paper we represent a survey of Association Rule Mining Using Genetic Algorithm. The techniques are categorized based upon different approaches. This paper provides the major advancement in the approaches for association rule mining using genetic algorithms.

  11. Cracking the chromatin code: Precise rule of nucleosome positioning

    Science.gov (United States)

    Trifonov, Edward N.

    2011-03-01

    Various aspects of packaging DNA in eukaryotic cells are outlined in physical rather than biological terms. The informational and physical nature of packaging instructions encoded in DNA sequences is discussed with the emphasis on signal processing difficulties - very low signal-to-noise ratio and high degeneracy of the nucleosome positioning signal. As the author has been contributing to the field from its very onset in 1980, the review is mostly focused at the works of the author and his colleagues. The leading concept of the overview is the role of deformational properties of DNA in the nucleosome positioning. The target of the studies is to derive the DNA bendability matrix describing where along the DNA various dinucleotide elements should be positioned, to facilitate its bending in the nucleosome. Three different approaches are described leading to derivation of the DNA deformability sequence pattern, which is a simplified linear presentation of the bendability matrix. All three approaches converge to the same unique sequence motif CGRAAATTTYCG or, in binary form, YRRRRRYYYYYR, both representing the chromatin code.

  12. Sparse coding joint decision rule for ear print recognition

    Science.gov (United States)

    Guermoui, Mawloud; Melaab, Djamel; Mekhalfi, Mohamed Lamine

    2016-09-01

    Human ear recognition has been promoted as a profitable biometric over the past few years. With respect to other modalities, such as the face and iris, that have undergone a significant investigation in the literature, ear pattern is relatively still uncommon. We put forth a sparse coding-induced decision-making for ear recognition. It jointly involves the reconstruction residuals and the respective reconstruction coefficients pertaining to the input features (co-occurrence of adjacent local binary patterns) for a further fusion. We particularly show that combining both components (i.e., the residuals as well as the coefficients) yields better outcomes than the case when either of them is deemed singly. The proposed method has been evaluated on two benchmark datasets, namely IITD1 (125 subject) and IITD2 (221 subjects). The recognition rates of the suggested scheme amount for 99.5% and 98.95% for both datasets, respectively, which suggest that our method decently stands out against reference state-of-the-art methodologies. Furthermore, experiments conclude that the presented scheme manifests a promising robustness under large-scale occlusion scenarios.

  13. QEFSM model and Markov Algorithm for translating Quran reciting rules into Braille code

    Directory of Open Access Journals (Sweden)

    Abdallah M. Abualkishik

    2015-07-01

    Full Text Available The Holy Quran is the central religious verbal text of Islam. Muslims are expected to read, understand, and apply the teachings of the Holy Quran. The Holy Quran was translated to Braille code as a normal Arabic text without having its reciting rules included. It is obvious that the users of this transliteration will not be able to recite the Quran the right way. Through this work, Quran Braille Translator (QBT presents a specific translator to translate Quran verses and their reciting rules into the Braille code. Quran Extended Finite State Machine (QEFSM model is proposed through this study as it is able to detect the Quran reciting rules (QRR from the Quran text. Basis path testing was used to evaluate the inner work for the model by checking all the test cases for the model. Markov Algorithm (MA was used for translating the detected QRR and Quran text into the matched Braille code. The data entries for QBT are Arabic letters and diacritics. The outputs of this study are seen in the double lines of Braille symbols; the first line is the proposed Quran reciting rules and the second line is for the Quran scripts.

  14. The sign rule and beyond: boundary effects, flexibility, and noise correlations in neural population codes.

    Directory of Open Access Journals (Sweden)

    Yu Hu

    2014-02-01

    Full Text Available Over repeat presentations of the same stimulus, sensory neurons show variable responses. This "noise" is typically correlated between pairs of cells, and a question with rich history in neuroscience is how these noise correlations impact the population's ability to encode the stimulus. Here, we consider a very general setting for population coding, investigating how information varies as a function of noise correlations, with all other aspects of the problem - neural tuning curves, etc. - held fixed. This work yields unifying insights into the role of noise correlations. These are summarized in the form of theorems, and illustrated with numerical examples involving neurons with diverse tuning curves. Our main contributions are as follows. (1 We generalize previous results to prove a sign rule (SR - if noise correlations between pairs of neurons have opposite signs vs. their signal correlations, then coding performance will improve compared to the independent case. This holds for three different metrics of coding performance, and for arbitrary tuning curves and levels of heterogeneity. This generality is true for our other results as well. (2 As also pointed out in the literature, the SR does not provide a necessary condition for good coding. We show that a diverse set of correlation structures can improve coding. Many of these violate the SR, as do experimentally observed correlations. There is structure to this diversity: we prove that the optimal correlation structures must lie on boundaries of the possible set of noise correlations. (3 We provide a novel set of necessary and sufficient conditions, under which the coding performance (in the presence of noise will be as good as it would be if there were no noise present at all.

  15. Do UK television alcohol advertisements abide by the code of broadcast advertising rules regarding the portrayal of alcohol?

    Science.gov (United States)

    Searle, Rebecca; Alston, Daisy; French, David P

    2014-01-01

    The aim of the study was to assess the extent to which members of the UK general public perceive television alcohol advertisements to comply with the regulatory code governing these: the Advertising Standards Authority Code of Broadcast Advertising (BCAP Code). The Code provides a general principle and 16 rules to prevent such adverts implying, condoning or encouraging immoderate, irresponsible or anti-social drinking. Quota sample of 373 adults, representative of the UK population aged 18-74 years in terms of age and gender, were recruited at a train station. Participants were shown one of seven advertisements that had been broadcast in the previous month on the two leading commercial television channels, and then completed a questionnaire with 40 statements representing the BCAP Code rules. Overall, 75% of the participants rated the advertisements as breaching at least one rule from the BCAP Code. Breaches were observed for all the seven advertisements, ranging from 49 to 91% non-compliant. Rules regarding alcohol being presented as contributing to popularity or confidence, and implying that alcohol is capable of changing mood, physical condition, behaviour, or as nourishment, were seen as being breached by over 50% of participants. A clear majority of the UK general public perceive alcohol advertisements to breach the BCAP Code, suggesting that the current regulatory system for UK television alcohol advertisements is inadequate. © The Author 2014. Medical Council on Alcohol and Oxford University Press. All rights reserved.

  16. DEVELOPMENT OF ASME SECTION X CODE RULES FOR HIGH PRESSURE COMPOSITE HYDROGEN PRESSURE VESSELS WITH NON-LOAD SHARING LINERS

    Energy Technology Data Exchange (ETDEWEB)

    Rawls, G.; Newhouse, N.; Rana, M.; Shelley, B.; Gorman, M.

    2010-04-13

    The Boiler and Pressure Vessel Project Team on Hydrogen Tanks was formed in 2004 to develop Code rules to address the various needs that had been identified for the design and construction of up to 15000 psi hydrogen storage vessel. One of these needs was the development of Code rules for high pressure composite vessels with non-load sharing liners for stationary applications. In 2009, ASME approved new Appendix 8, for Section X Code which contains the rules for these vessels. These vessels are designated as Class III vessels with design pressure ranging from 20.7 MPa (3,000 ps)i to 103.4 MPa (15,000 psi) and maximum allowable outside liner diameter of 2.54 m (100 inches). The maximum design life of these vessels is limited to 20 years. Design, fabrication, and examination requirements have been specified, included Acoustic Emission testing at time of manufacture. The Code rules include the design qualification testing of prototype vessels. Qualification includes proof, expansion, burst, cyclic fatigue, creep, flaw, permeability, torque, penetration, and environmental testing.

  17. Current coding practices and patterns of code use of registered dietitian nutritionists: the Academy of Nutrition and Dietetics 2013 coding survey.

    Science.gov (United States)

    Parrott, J Scott; White, Jane V; Schofield, Marsha; Hand, Rosa K; Gregoire, Mary B; Ayoob, Keith T; Pavlinac, Jessie; Lewis, Jaime Lynn; Smith, Karen

    2014-10-01

    Coding, coverage, and reimbursement for nutrition services are vital to the dietetics profession, particularly to registered dietitian nutritionists (RDNs) who provide clinical care. The objective of this study was to assess RDN understanding and use of the medical nutrition therapy (MNT) procedure codes in the delivery of nutrition services. Its design was an Internet survey of all RDNs listed in the Academy of Nutrition and Dietetics (Academy)/Commission on Dietetics Registration database as of September 2013 who resided in the United States and were not retired. Prior coding and coverage surveys provided a basis for survey development. Parameters assessed included knowledge and use of existing MNT and/or alternative procedure codes, barriers to code use, payer reimbursement patterns, complexity of the patient population served, time spent in the delivery of initial and subsequent care, and practice demographics and management. Results show that a majority of respondents were employed by another and provided outpatient MNT services on a part-time basis. MNT codes were used for the provision of individual services, with minimal use of the MNT codes for group services and subsequent care. The typical patient carries two or more diagnoses. The majority of RDNs uses internal billing departments and support staff in their practices. The payer mix is predominantly Medicare and private/commercial insurance. Managers and manager/providers were more likely than providers to carry malpractice insurance. Results point to the need for further education regarding the full spectrum of Current Procedural Terminology codes available for RDN use and the business side of ambulatory MNT practice, including the need to carry malpractice insurance. This survey is part of continuing Academy efforts to understand the complex web of relationships among clinical practice, coverage, MNT code use, and reimbursement so as to further support nutrition services codes revision and/or expansion

  18. An international survey of building energy codes and their implementation

    Energy Technology Data Exchange (ETDEWEB)

    Evans, Meredydd; Roshchanka, Volha; Graham, Peter

    2017-08-01

    Buildings are key to low-carbon development everywhere, and many countries have introduced building energy codes to improve energy efficiency in buildings. Yet, building energy codes can only deliver results when the codes are implemented. For this reason, studies of building energy codes need to consider implementation of building energy codes in a consistent and comprehensive way. This research identifies elements and practices in implementing building energy codes, covering codes in 22 countries that account for 70% of global energy demand from buildings. Access to benefits of building energy codes depends on comprehensive coverage of buildings by type, age, size, and geographic location; an implementation framework that involves a certified agency to inspect construction at critical stages; and independently tested, rated, and labeled building energy materials. Training and supporting tools are another element of successful code implementation, and their role is growing in importance, given the increasing flexibility and complexity of building energy codes. Some countries have also introduced compliance evaluation and compliance checking protocols to improve implementation. This article provides examples of practices that countries have adopted to assist with implementation of building energy codes.

  19. Comparative Analysis and Survey of Ant Colony Optimization based Rule Miners

    Directory of Open Access Journals (Sweden)

    Zulfiqar Ali

    2017-01-01

    Full Text Available In this research study, we analyze the performance of bio inspired classification approaches by selecting Ant-Miners (Ant-Miner, cAnt_Miner, cAnt_Miner2 and cAnt_MinerPB for the discovery of classification rules in terms of accuracy, terms per rule, number of rules, running time and model size discovered by the corresponding rule mining algorithm. Classification rule discovery is still a challenging and emerging research problem in the field of data mining and knowledge discovery. Rule based classification has become cutting edge research area due to its importance and popular application areas in the banking, market basket analysis, credit card fraud detection, costumer behaviour, stock market prediction and protein sequence analysis. There are various approaches proposed for the discovery of classification rules like Artificial Neural Networks, Genetic Algorithm, Evolutionary Programming, SVM and Swarm Intelligence. This research study is focused on classification rule discovery by Ant Colony Optimization. For the performance analysis, Myra Tool is used for experiments on the 18 public datasets (available on the UCI repository. Data sets are selected with varying number of instances, number of attributes and number of classes. This research paper also provides focused survey of Ant-Miners for the discovery of classification rules.

  20. A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING

    Directory of Open Access Journals (Sweden)

    K.Sathiyapriya

    2013-03-01

    Full Text Available Businesses share data, outsourcing for specific business problems. Large companies stake a large part of their business on analysis of private data. Consulting firms often handle sensitive third party data as part of client projects. Organizations face great risks while sharing their data. Most of this sharing takes place with little secrecy. It also increases the legal responsibility of the parties involved in the process. So, it is crucial to reliably protect their data due to legal and customer concerns. In this paper, a review of the state-of-the-art methods for privacy preservation is presented. It also analyzes the techniques for privacy preserving association rule mining and points out their merits and demerits. Finally the challenges and directions for future research are discussed.

  1. Mining Branching Rules from Past Survey Data with an Illustration Using a Geriatric Assessment Survey for Older Adults with Cancer

    Directory of Open Access Journals (Sweden)

    Daniel R. Jeske

    2016-05-01

    Full Text Available We construct a fast data mining algorithm that can be used to identify high-frequency response patterns in historical surveys. Identification of these patterns leads to the derivation of question branching rules that shorten the time required to complete a survey. The data mining algorithm allows the user to control the error rate that is incurred through the use of implied answers that go along with each branching rule. The context considered is binary response questions, which can be obtained from multi-level response questions through dichotomization. The algorithm is illustrated by the analysis of four sections of a geriatric assessment survey used by oncologists. Reductions in the number of questions that need to be asked in these four sections range from 33% to 54%.

  2. Barriers to apply cardiovascular prediction rules in primary care: a postal survey

    Science.gov (United States)

    Eichler, Klaus; Zoller, Marco; Tschudi, Peter; Steurer, Johann

    2007-01-01

    Background Although cardiovascular prediction rules are recommended by guidelines to evaluate global cardiovascular risk for primary prevention, they are rarely used in primary care. Little is known about barriers for application. The objective of this study was to evaluate barriers impeding the application of cardiovascular prediction rules in primary prevention. Methods We performed a postal survey among general physicians in two Swiss Cantons by a purpose designed questionnaire. Results 356 of 772 dispatched questionnaires were returned (response rate 49.3%). About three quarters (74%) of general physicians rarely or never use cardiovascular prediction rules. Most often stated barriers to apply prediction rules among rarely- or never-users are doubts concerning over-simplification of risk assessment using these instruments (58%) and potential risk of (medical) over-treatment (54%). 57% report that the numerical information resulting from prediction rules is often not helpful for decision-making in practice. Conclusion If regular application of cardiovascular prediction rules in primary care is in demand additional interventions are needed to increase acceptance of these tools for patient management among general physicians. PMID:17201905

  3. Establishment of a New Drug Code for Marihuana Extract. Final rule.

    Science.gov (United States)

    2016-12-14

    The Drug Enforcement Administration is creating a new Administration Controlled Substances Code Number for "Marihuana Extract." This code number will allow DEA and DEA-registered entities to track quantities of this material separately from quantities of marihuana. This, in turn, will aid in complying with relevant treaty provisions. Under international drug control treaties administered by the United Nations, some differences exist between the regulatory controls pertaining to marihuana extract versus those for marihuana and tetrahydrocannabinols. The DEA has previously established separate code numbers for marihuana and for tetrahydrocannabinols, but not for marihuana extract. To better track these materials and comply with treaty provisions, DEA is creating a separate code number for marihuana extract with the following definition: "Meaning an extract containing one or more cannabinoids that has been derived from any plant of the genus Cannabis, other than the separated resin (whether crude or purified) obtained from the plant." Extracts of marihuana will continue to be treated as Schedule I controlled substances.

  4. A Survey of Challenges Experienced by New Learners Coding the Rorschach.

    Science.gov (United States)

    Viglione, Donald J; Meyer, Gregory J; Resende, Ana Cristina; Pignolo, Claudia

    2016-10-21

    Learning to code the imagery, communication, and behavior associated with Rorschach responding is challenging. Although there is some survey research on graduate students' impressions of their Rorschach training, research has not identified which coding decisions students find to be the most problematic and time-consuming. We surveyed students to identify what they struggled with most when learning coding and to quantify how difficult it is to learn how to code. Participants (n = 191) from the United States, Brazil, Denmark, Israel, and Italy rated 57 aspects of coding using a 4-point scale that encompassed both the time required to code and the subjective difficulty of doing so. Mean ratings for coding in general indicated that students considered the overall task challenging. Ratings also revealed that students struggled most with Cognitive Special Scores, Determinants, and extrapolating from the tables to code Form Quality for objects that were not specifically listed. The findings offer suggestions about how to improve the guidelines for some of the more difficult variables and where it is most necessary to focus teaching time. Taking these steps might help new students in learning the Rorschach.

  5. Change to CERN Safety Rules: Abolition of Safety Code A7

    CERN Multimedia

    2016-01-01

    As from 3 June 2016 Safety Code A7 “Road traffic at CERN” is abolished.   CERN's current practice to follow French or Swiss road traffic regulations on the corresponding parts of the CERN site will continue to apply. HSE Unit

  6. Studying Co-evolution of Production and Test Code Using Association Rule Mining

    NARCIS (Netherlands)

    Lubsen, Z.; Zaidman, A.; Pinzger, M.

    2009-01-01

    Long version of the short paper accepted for publication in the proceedings of the 6th International Working Conference on Mining Software Repositories (MSR 2009). Unit tests are generally acknowledged as an important aid to produce high quality code, as they provide quick feedback to developers on

  7. Russian Proposals on the Polar Code: Contributing to Common Rules or Furthering State Interests?

    Directory of Open Access Journals (Sweden)

    Dorottya Bognar

    2016-11-01

    Full Text Available The mandatory Polar Code was finally adopted by the International Maritime Organization (IMO in May 2015. The present article examines the role and contribution of the Russian Federation in the decision-making process of the Polar Code through its proposals, in the form of submissions, statements, and oral interventions. The purpose of these proposals is investigated with respect to the safety and environmental protection goals of the IMO and Russian interests in the Arctic, by looking at the reasoning used by Russia in its proposals. The major issue areas represented in the Russian proposals include, among others, the role of coastal State legislation, environmental regulations, and icebreaker assistance; however, the majority of these do not contribute to the IMO's goals of creating globally uniform standards for maritime safety and protecting the marine environment. The Russian proposals served State interests through misrepresentation and reference to Russia's experience in Arctic shipping. While the latter frames Russia as a leading user of Arctic waters, the role that Russia played in the Polar Code negotiations indicates that Russia has more than shipping interests to protect in the Arctic.

  8. Synaptic learning rules and sparse coding in a model sensory system.

    Directory of Open Access Journals (Sweden)

    Luca A Finelli

    2008-04-01

    Full Text Available Neural circuits exploit numerous strategies for encoding information. Although the functional significance of individual coding mechanisms has been investigated, ways in which multiple mechanisms interact and integrate are not well understood. The locust olfactory system, in which dense, transiently synchronized spike trains across ensembles of antenna lobe (AL neurons are transformed into a sparse representation in the mushroom body (MB; a region associated with memory, provides a well-studied preparation for investigating the interaction of multiple coding mechanisms. Recordings made in vivo from the insect MB demonstrated highly specific responses to odors in Kenyon cells (KCs. Typically, only a few KCs from the recorded population of neurons responded reliably when a specific odor was presented. Different odors induced responses in different KCs. Here, we explored with a biologically plausible model the possibility that a form of plasticity may control and tune synaptic weights of inputs to the mushroom body to ensure the specificity of KCs' responses to familiar or meaningful odors. We found that plasticity at the synapses between the AL and the MB efficiently regulated the delicate tuning necessary to selectively filter the intense AL oscillatory output and condense it to a sparse representation in the MB. Activity-dependent plasticity drove the observed specificity, reliability, and expected persistence of odor representations, suggesting a role for plasticity in information processing and making a testable prediction about synaptic plasticity at AL-MB synapses.

  9. Reliable and adequateengineering surveys for construction: the rule of two D

    Directory of Open Access Journals (Sweden)

    Rakitina Natal'ya Nikolaevna

    2014-01-01

    Full Text Available In the article the current state of quality supply of engineering surveys for construction is discussed. The main criteria for improving the design quality of buildings and structures for industrial, civil and other purposes is the reliability and adequacy of the results of engineering-geological surveys. The authors show the examples of inadequate study of engineering-geological conditions in the design of structures that led to emergency situations. Consideration of the reasons of accidents in structures showed that they are caused by lack of research conducted, the underestimation of the complexity of geological conditions. In the process of conducting geotechnical investigations the works were focused directly in the enclosure of a designed building, and the features of geological and hydrogeological conditions of the off-site were much more complex. In the process of construction during the sinking of the pit activation suffusion processes occurred, which led to an accident. Underestimation of the use of these geological funds in this example shows that even in the presence of fund materials, which are currently almost not increased, errors may occur due to the notorious savings for research. The requirements to ensuring the reliability and adequacy of engineering-geological surveys, which the authors call "The Rule of two D" (in Russian — Reliability and Adequacy, lie in the existing legal acts. The practice of fulfilling requirements to a large extend shows that the desire to save money at the stage of design and exploration works results in additional costs for additional design, recovery from accidents and works on a new project. The authors critically evaluated the development of engineering and geotechnical engineering instead of geological survey, which is not methodologically and theoretically substantiated and leads to the excluding from engineering surveys the consideration of the off-site geotechnical conditions directly below

  10. International survey of emergency physicians' awareness and use of the Canadian Cervical-Spine Rule and the Canadian Computed Tomography Head Rule.

    Science.gov (United States)

    Eagles, Debra; Stiell, Ian G; Clement, Catherine M; Brehaut, Jamie; Taljaard, Monica; Kelly, Anne-Maree; Mason, Suzanne; Kellermann, Arthur; Perry, Jeffrey J

    2008-12-01

    The derivation and validation studies for the Canadian Cervical-Spine (C-Spine) Rule (CCR) and the Canadian Computed Tomography (CT) Head Rule (CCHR) have been published in major medical journals. The objectives were to determine: 1) physician awareness and use of these rules in Australasia, Canada, the United Kingdom, and the United States and 2) physician characteristics associated with awareness and use. A self-administered e-mail and postal survey was sent to members of four national emergency physician (EP) associations using a modified Dillman technique. Results were analyzed using repeated-measures logistic regression models. The response rate was 54.8% (1,150/2,100). Reported awareness of the CCR ranged from 97% (Canada) to 65% (United States); for the CCHR it ranged from 86% (Canada) to 31% (United States). Reported use of the CCR ranged from 73% (Canada) to 30% (United States); for the CCHR, it was 57% (Canada) to 12% (United States). Predictors of awareness were country, type of rule, full-time employment, younger age, and teaching hospital (p rules were highest in Canada and lowest in the United States. While younger physicians, those employed full-time, and those working in teaching hospitals were more likely to be aware of a decision rule, age and employment status were not significant predictors of use. A better understanding of factors related to awareness and use of emergency medicine (EM) decision rules will enhance our understanding of knowledge translation and facilitate strategies to enhance dissemination and implementation of future rules.

  11. Applying Rules of the Code of Conduct to the First Crews on Board the International Space Station

    Science.gov (United States)

    Catalano, Sgrosso G.

    2002-01-01

    Three years after the launch of the first Russian module Zarya, the Space Station is now operational, being made up of a central block, to which the various pressurised modules where the astronauts live and work during their stay on board are connected, of a first linking and docking node, "Unity", of the first of the four research labs, the American module"Destiny", and of the Russian module "Zvezda" with control and living functions. During these first years of the Station, the astronauts live in the service module Zvezda. The fourth crew has been positioned in the Station, carrying out maintenance and control operations of the Station itself, scientific experiments and space walks. The paper intends to analyse the rules of the code of conduct, agreed upon by all Partners, in accordance with art. 11 of the IGA. Together with the standards of conduct, applicable to all crew members, the paper will focus on the exercise of the Commander's authority, the chain of command on orbit and the relationship with the Flight Director on ground. In order to transport goods and experiments, some Multi-Purpose Logistic Modules have already been used (Leonardo, Donatello, Raffaello), transported to the Space Shuttle Station at times together with the new Station crew. Attention will be placed on the flight rules which should be issued, in such cases, in order to regulate the relationship between the ISS Commander, the ETOV (Earth to Orbit Vehicle) Commander and the Rescue Vehicle Commander. Jurisdiction over the astronauts, during the time spent in activities outside the vehicle - which are becoming more and more frequent in order to control the functionality and docking of the modules - is a new question to be solved. Finally, the paper will cover the questions concerning jurisdiction, responsibility and relationship with the crew in view of the transportation and subsequent presence in the Station of "space tourists".

  12. PREMOR: a point reactor exposure model computer code for survey analysis of power plant performance

    Energy Technology Data Exchange (ETDEWEB)

    Vondy, D.R.

    1979-10-01

    The PREMOR computer code was written to exploit a simple, two-group point nuclear reactor power plant model for survey analysis. Up to thirteen actinides, fourteen fission products, and one lumped absorber nuclide density are followed over a reactor history. Successive feed batches are accounted for with provision for from one to twenty batches resident. The effect of exposure of each of the batches to the same neutron flux is determined.

  13. Joint Source-Channel Decoding of Variable-Length Codes with Soft Information: A Survey

    Directory of Open Access Journals (Sweden)

    Siohan Pierre

    2005-01-01

    Full Text Available Multimedia transmission over time-varying wireless channels presents a number of challenges beyond existing capabilities conceived so far for third-generation networks. Efficient quality-of-service (QoS provisioning for multimedia on these channels may in particular require a loosening and a rethinking of the layer separation principle. In that context, joint source-channel decoding (JSCD strategies have gained attention as viable alternatives to separate decoding of source and channel codes. A statistical framework based on hidden Markov models (HMM capturing dependencies between the source and channel coding components sets the foundation for optimal design of techniques of joint decoding of source and channel codes. The problem has been largely addressed in the research community, by considering both fixed-length codes (FLC and variable-length source codes (VLC widely used in compression standards. Joint source-channel decoding of VLC raises specific difficulties due to the fact that the segmentation of the received bitstream into source symbols is random. This paper makes a survey of recent theoretical and practical advances in the area of JSCD with soft information of VLC-encoded sources. It first describes the main paths followed for designing efficient estimators for VLC-encoded sources, the key component of the JSCD iterative structure. It then presents the main issues involved in the application of the turbo principle to JSCD of VLC-encoded sources as well as the main approaches to source-controlled channel decoding. This survey terminates by performance illustrations with real image and video decoding systems.

  14. Galaxia: a code to generate a synthetic survey of the Milky Way

    CERN Document Server

    Sharma, Sanjib; Johnston, Kathryn V; Binney, James

    2011-01-01

    We present here a fast code for creating a synthetic survey of the Milky Way. Given one or more color-magnitude bounds, a survey size and geometry, the code returns a catalog of stars in accordance with a given model of the Milky Way. The model can be specified by a set of density distributions or as an N-body realization. We provide fast and efficient algorithms for sampling both types of models. As compared to earlier sampling schemes which generate stars at specified locations along a line of sight, our scheme can generate a continuous and smooth distribution of stars over any given volume. The code is quite general and flexible and can accept input in the form of a star formation rate, age metallicity relation, age velocity dispersion relation and analytic density distribution functions. Theoretical isochrones are then used to generate a catalog of stars and support is available for a wide range of photometric bands. As a concrete example we implement the Besancon Milky Way model for the disc. For the ste...

  15. Survey of emergency physicians' requirements for a clinical decision rule for acute respiratory illnesses in three countries.

    Science.gov (United States)

    Perry, Jeffrey J; Goindi, Reena; Symington, Cheryl; Brehaut, Jamie; Taljaard, Monica; Schneider, Sandra; Stiell, Ian G

    2012-03-01

    ABSTRACTObjective:There are currently no widely used guidelines to determine which older patients with acute respiratory conditions require hospital admission. This study assessed the need for clinical decision rules to help determine whether hospital admission is required for patients over 50 years for three common respiratory conditions: chronic obstructive pulmonary disease (COPD), heart failure (HF), and community-acquired pneumonia (CAP). Postal survey. Emergency physicians (EPs) from the United States, Canada, and Australasia. A random sample of EPs from the United States, Canada, and Australasia. A modified Dillman technique with a prenotification letter and up to three postal surveys. EP opinions regarding the need for and willingness to use clinical decision rules for emergency department (ED) patients over 50 years with COPD, HF, or CAP to predict hospital admission. We assessed the required sensitivity of each rule for return ED visit or death within 14 days. A total of 801 responses from 1,493 surveys were received, with response rates of 55%, 60%, and 46% for Australasia, Canada, and the United States, respectively. Over 90% of EPs reported that they would consider using clinical decision rules for HF, CAP, and COPD. The median required sensitivity for death within 14 days was 97 to 98% for all conditions. EPs are likely to adopt highly sensitive clinical decision rules to predict the need for hospital admission for patients over 50 years with COPD, HF, or CAP.

  16. Surveying Multidisciplinary Aspects in Real-Time Distributed Coding for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Carlo Braccini

    2015-01-01

    Full Text Available Wireless Sensor Networks (WSNs, where a multiplicity of sensors observe a physical phenomenon and transmit their measurements to one or more sinks, pertain to the class of multi-terminal source and channel coding problems of Information Theory. In this category, “real-time” coding is often encountered for WSNs, referring to the problem of finding the minimum distortion (according to a given measure, under transmission power constraints, attainable by encoding and decoding functions, with stringent limits on delay and complexity. On the other hand, the Decision Theory approach seeks to determine the optimal coding/decoding strategies or some of their structural properties. Since encoder(s and decoder(s possess different information, though sharing a common goal, the setting here is that of Team Decision Theory. A more pragmatic vision rooted in Signal Processing consists of fixing the form of the coding strategies (e.g., to linear functions and, consequently, finding the corresponding optimal decoding strategies and the achievable distortion, generally by applying parametric optimization techniques. All approaches have a long history of past investigations and recent results. The goal of the present paper is to provide the taxonomy of the various formulations, a survey of the vast related literature, examples from the authors’ own research, and some highlights on the inter-play of the different theories.

  17. ICF-CY code set for infants with early delay and disabilities (EDD Code Set) for interdisciplinary assessment: a global experts survey.

    Science.gov (United States)

    Pan, Yi-Ling; Hwang, Ai-Wen; Simeonsson, Rune J; Lu, Lu; Liao, Hua-Fang

    2015-01-01

    Comprehensive description of functioning is important in providing early intervention services for infants with developmental delay/disabilities (DD). A code set of the International Classification of Functioning, Disability and Health: Children and Youth Version (ICF-CY) could facilitate the practical use of the ICF-CY in team evaluation. The purpose of this study was to derive an ICF-CY code set for infants under three years of age with early delay and disabilities (EDD Code Set) for initial team evaluation. The EDD Code Set based on the ICF-CY was developed on the basis of a Delphi survey of international professionals experienced in implementing the ICF-CY and professionals in early intervention service system in Taiwan. Twenty-five professionals completed the Delphi survey. A total of 82 ICF-CY second-level categories were identified for the EDD Code Set, including 28 categories from the domain Activities and Participation, 29 from body functions, 10 from body structures and 15 from environmental factors. The EDD Code Set of 82 ICF-CY categories could be useful in multidisciplinary team evaluations to describe functioning of infants younger than three years of age with DD, in a holistic manner. Future validation of the EDD Code Set and examination of its clinical utility are needed. The EDD Code Set with 82 essential ICF-CY categories could be useful in the initial team evaluation as a common language to describe functioning of infants less than three years of age with developmental delay/disabilities, with a more holistic view. The EDD Code Set including essential categories in activities and participation, body functions, body structures and environmental factors could be used to create a functional profile for each infant with special needs and to clarify the interaction of child and environment accounting for the child's functioning.

  18. 15 CFR 806.16 - Rules and regulations for BE-10, Benchmark Survey of U.S. Direct Investment Abroad-2004.

    Science.gov (United States)

    2010-01-01

    ..., Benchmark Survey of U.S. Direct Investment Abroad-2004. 806.16 Section 806.16 Commerce and Foreign Trade... COMMERCE DIRECT INVESTMENT SURVEYS § 806.16 Rules and regulations for BE-10, Benchmark Survey of U.S. Direct Investment Abroad—2004. A BE-10, Benchmark Survey of U.S. Direct Investment Abroad will...

  19. The importance of code status discussions in the psychiatric hospital: results of a single site survey of psychiatrists.

    Science.gov (United States)

    McKean, Alastair J S; Lapid, Maria I; Geske, Jennifer R; Kung, Simon

    2015-04-01

    Documentation of code status is a requirement with hospital admission, yet this discussion may present unique challenges with psychiatric inpatients. Currently, no standards exist on conducting these discussions with psychiatric inpatients. The authors surveyed psychiatry trainees and faculty regarding their perceptions and practice to gain further insight into the types of approaches used. The authors conducted an IRB-approved, Web-based survey of psychiatry faculty and trainees using a 25-item questionnaire of demographics and opinions about code status among psychiatric inpatients. The response rate was 36.1 % (n = 30; 15 faculty and 15 trainees). Respondents felt that it was important to discuss code status with each admission. Faculty placed a higher emphasis on assessing patients with a recent suicide attempt (p = 0.024). Psychiatric faculty and trainees endorsed the importance of assessing code status with each admission. The authors suggest that educational programs are needed on strategies to conduct code status discussions properly and effectively in psychiatric populations.

  20. 关联规则挖掘研究述评%Association Rule Mining: A Survey

    Institute of Scientific and Technical Information of China (English)

    贾彩燕; 倪现君

    2003-01-01

    Association rule mining has been one of the most popular data mining subejcts and has a wide range of applicability. In this paper, we first investigate the main approaches for the task of association rule mining, and analyzed the essence of the algorithms. Then we review foundations of assocation rule mining based on the several possible theoretical frameworks for data mining. What's more,we show the open problems in field of the association rule mining and figure out the tendency of its development in recent years.

  1. Correlations of indoor second-hand smoking, household smoking rules, regional deprivation and children mental health: Scottish Health Survey, 2013.

    Science.gov (United States)

    Shiue, Ivy

    2015-07-01

    It has been known that second-hand smoking and deprivation could cluster together affecting child health. However, little is known on the role of household smoking rules. Therefore, it was aimed to study the relationships among indoor second-hand smoking, household smoking rules, deprivation level and children mental health in a country-wide and population-based setting. Data was retrieved from and analysed in Scottish Health Survey, 2013. Information on demographics, indoor second-hand smoking status, household smoking rules, deprivation level and child mental health by Strengths and Difficulties Questionnaire was obtained by household interview through parents. Statistical analysis included chi-square test and survey-weighted logistic regression modelling. Of 1019 children aged 4-12, 17.9% (n = 182) lived in the 15% most deprivation areas. Deprived areas tended to be where indoor smoking occurred (p health programs promoting strict household smoking rules should be encouraged in order to optimise children mental health.

  2. Classiifcation of ship surveys and regulations/rules%船舶检验与规则规范分类

    Institute of Scientific and Technical Information of China (English)

    林德辉

    2014-01-01

    船舶及其产品的检验分为法定检验和入级检验。在法定检验规则中,重点介绍了IMO的公约、规则、决议和通函的性质和特点,将与船舶有关的ILO第92号、第133号公约与MLC2006进行了比较,列出了各国部分法定检验机构的缩写。在入级检验规范中,涉及IACS共同规范、HCSR、统一要求和统一解释,并简要阐明13个IACS会员船级社的中英文全称、缩写、网址和E-mail。值得注意的是,规则和规范均处于不断修正中,必须采用合同签字日已生效的现行有效文本。%The survey of ships and their products are divided into statutory survey and classification survey. The statutory survey regulations focus on the nature and characteristics of the conventions, regulations, resolutions and circulars of IMO. Convention C092 and C133 of ILO relating to ship are compared with MLC 2006, and abbreviations of some statutory survey authorities are listed. The classification survey rules involve the common rules of IACS, HCSR, unified requirements and unified interpretation, and briefly clarify Chinese and English full name, abbreviation, website and E-mail address of 13 classification societies in IACS member. It should be noticed that the regulations and rules are amended constantly, and must adopt the current texts which have already been effective from the date that the contract is signed.

  3. MIG version 0.0 model interface guidelines: Rules to accelerate installation of numerical models into any compliant parent code

    Energy Technology Data Exchange (ETDEWEB)

    Brannon, R.M.; Wong, M.K.

    1996-08-01

    A set of model interface guidelines, called MIG, is presented as a means by which any compliant numerical material model can be rapidly installed into any parent code without having to modify the model subroutines. Here, {open_quotes}model{close_quotes} usually means a material model such as one that computes stress as a function of strain, though the term may be extended to any numerical operation. {open_quotes}Parent code{close_quotes} means a hydrocode, finite element code, etc. which uses the model and enforces, say, the fundamental laws of motion and thermodynamics. MIG requires the model developer (who creates the model package) to specify model needs in a standardized but flexible way. MIG includes a dictionary of technical terms that allows developers and parent code architects to share a common vocabulary when specifying field variables. For portability, database management is the responsibility of the parent code. Input/output occurs via structured calling arguments. As much model information as possible (such as the lists of required inputs, as well as lists of precharacterized material data and special needs) is supplied by the model developer in an ASCII text file. Every MIG-compliant model also has three required subroutines to check data, to request extra field variables, and to perform model physics. To date, the MIG scheme has proven flexible in beta installations of a simple yield model, plus a more complicated viscodamage yield model, three electromechanical models, and a complicated anisotropic microcrack constitutive model. The MIG yield model has been successfully installed using identical subroutines in three vectorized parent codes and one parallel C++ code, all predicting comparable results. By maintaining one model for many codes, MIG facilitates code-to-code comparisons and reduces duplication of effort, thereby reducing the cost of installing and sharing models in diverse new codes.

  4. Run-length encoding graphic rules, biochemically editable designs and steganographical numeric data embedment for DNA-based cryptographical coding system.

    Science.gov (United States)

    Kawano, Tomonori

    2013-03-01

    There have been a wide variety of approaches for handling the pieces of DNA as the "unplugged" tools for digital information storage and processing, including a series of studies applied to the security-related area, such as DNA-based digital barcodes, water marks and cryptography. In the present article, novel designs of artificial genes as the media for storing the digitally compressed data for images are proposed for bio-computing purpose while natural genes principally encode for proteins. Furthermore, the proposed system allows cryptographical application of DNA through biochemically editable designs with capacity for steganographical numeric data embedment. As a model case of image-coding DNA technique application, numerically and biochemically combined protocols are employed for ciphering the given "passwords" and/or secret numbers using DNA sequences. The "passwords" of interest were decomposed into single letters and translated into the font image coded on the separate DNA chains with both the coding regions in which the images are encoded based on the novel run-length encoding rule, and the non-coding regions designed for biochemical editing and the remodeling processes revealing the hidden orientation of letters composing the original "passwords." The latter processes require the molecular biological tools for digestion and ligation of the fragmented DNA molecules targeting at the polymerase chain reaction-engineered termini of the chains. Lastly, additional protocols for steganographical overwriting of the numeric data of interests over the image-coding DNA are also discussed.

  5. Open-source tool for automatic import of coded surveying data to multiple vector layers in GIS environment

    Directory of Open Access Journals (Sweden)

    Eva Stopková

    2016-12-01

    Full Text Available This paper deals with a tool that enables import of the coded data in a singletext file to more than one vector layers (including attribute tables, together withautomatic drawing of line and polygon objects and with optional conversion toCAD. Python script v.in.survey is available as an add-on for open-source softwareGRASS GIS (GRASS Development Team. The paper describes a case study basedon surveying at the archaeological mission at Tell-el Retaba (Egypt. Advantagesof the tool (e.g. significant optimization of surveying work and its limits (demandson keeping conventions for the points’ names coding are discussed here as well.Possibilities of future development are suggested (e.g. generalization of points’names coding or more complex attribute table creation.

  6. 15 CFR 801.12 - Rules and regulations for the BE-140, Benchmark Survey of Insurance Transactions by U.S...

    Science.gov (United States)

    2010-01-01

    ..., Benchmark Survey of Insurance Transactions by U.S. Insurance Companies with Foreign Persons. 801.12 Section.... AND FOREIGN PERSONS § 801.12 Rules and regulations for the BE-140, Benchmark Survey of Insurance Transactions by U.S. Insurance Companies with Foreign Persons. (a) The BE-140, Benchmark Survey of...

  7. General rule antielisive chartered the National Tax Code confrontation between the principle of ability to pay and the rule of closed typicality and the alleged tax by analogy

    Directory of Open Access Journals (Sweden)

    Willian Robert Nahra Filho

    2012-04-01

    Full Text Available Check the possibility of the general standard employment antielisiva the parental right, ouseja, taxation by analogy legal fact extratípico effects econômicosequivalentes the typical legal fact, based on the abuse of rights doctrine and noprincípio of ability. Analysis in the face of the principles of legalidadeestrita and closed typicality, the principle of security developments jurídica.Conclui the impossibility of taxation by analogy for the offense to dasegurança legal principle that stands for certainty and predictability in entreEstado relations and taxpayers. The breach of the principle of strict legality because deexigência specific and qualified law to detributos institution. The offense aoprincípio closed typicality that prevents the tax nãodescrito legal fact with all its details by law. These principles not passíveissequer limitation, since they are immutable clauses. Inability to restriçãoda full effectiveness of the rule of the principle of typicality contributiva.Impossibilidade ability to taxation by the integrative method of analogy, therefore existecerta charge, even if relative, creativity inherent in the method and dependent inexistirlacunas fill in relevant matters to detributos institution , existing in reality free of the right spaces.

  8. Opportunities and challenges for quality and safety applications in ICD-11: an international survey of users of coded health data.

    Science.gov (United States)

    Southern, Danielle A; Hall, Marc; White, Deborah E; Romano, Patrick S; Sundararajan, Vijaya; Droesler, Saskia E; Pincus, Harold A; Ghali, William A

    2016-02-01

    In 2018, the World Health Organization (WHO) plans to release the 11th revision of the International Classification of Diseases (ICD). The overall goal of the WHO is to produce a new disease classification that has an enhanced ability to capture health concepts in a manner that is compatible with contemporary information systems. Accordingly, our objective was to identify opportunities and challenges in improving the utility of ICD-11 for quality and safety applications. A survey study of international stakeholders with expertise in either the production or use of coded health data. International producers or users of ICD-coded health care data. We used a snowball sampling approach to identify individuals with relevant expertise in 12 countries, mostly from North America, Europe, and Australasia. An 8-item online survey included questions on demographic characteristics, familiarity with ICD, experience using ICD-coded data on healthcare quality and safety, opinions regarding the use of ICD classification systems for quality and safety measurement, and current limitations and potential future improvements that would permit better coding of quality and safety concepts in ICD-11. Two-hundred fifty-eight unique individuals accessed the online survey; 246 provided complete responses. The respondents identified specific desires for the ICD revision: more code content for adverse events/complications; a desire for code clustering mechanisms; the need for diagnosis timing information; and the addition of better code definitions to reference materials. These findings reinforce the vision and existing work plan of the WHO's ICD revision process, because each of these desires is being addressed. © The Author 2015. Published by Oxford University Press in association with the International Society for Quality in Health Care; all rights reserved.

  9. Motivations of Code-switching among People of Different English Profi-ciency:A Sociolinguistics Survey

    Institute of Scientific and Technical Information of China (English)

    GUAN Hui

    2015-01-01

    Code-switching is a linguistic behavior that arises as a result of languages coming into contact. The idea of code-switching was proposed since the 1970s and has been heatedly discussed. This study will particularly focus on the motivations for code-switching on campus, especially for the reason of college students and teachers as frequent users. The study aims to find out if there is any relevance between one’s English proficiency and motivation for code-switching.

  10. Suggested Rules for Designing Secure Communication Systems Utilizing Chaotic Lasers: A Survey

    CERN Document Server

    Zhao, Qingchun

    2010-01-01

    Chaotic communications based on semiconductor lasers have aroused great research interest since 1990s. Physical-layer encryption using chaotic lasers is an alternative to transmit message rapidly and confidentially. There are some practical devices and setups for optical chaotic communications, which are intuitively considered to be secure. However, there is lack of a set of security evaluation rules for these communication setups. According to the recent literature, we summarize several criteria for optical chaotic communications to evaluate the security and point out some methods to enhance the security. These criteria and suggested rules are very helpful in designing secure communication systems using chaotic lasers. Finally we propose some possible hot topics on security analysis of optical chaotic communications in future.

  11. Research Integrity and Research Ethics in Professional Codes of Ethics: Survey of Terminology Used by Professional Organizations across Research Disciplines

    Science.gov (United States)

    Komić, Dubravka; Marušić, Stjepan Ljudevit; Marušić, Ana

    2015-01-01

    Professional codes of ethics are social contracts among members of a professional group, which aim to instigate, encourage and nurture ethical behaviour and prevent professional misconduct, including research and publication. Despite the existence of codes of ethics, research misconduct remains a serious problem. A survey of codes of ethics from 795 professional organizations from the Illinois Institute of Technology’s Codes of Ethics Collection showed that 182 of them (23%) used research integrity and research ethics terminology in their codes, with differences across disciplines: while the terminology was common in professional organizations in social sciences (82%), mental health (71%), sciences (61%), other organizations had no statements (construction trades, fraternal social organizations, real estate) or a few of them (management, media, engineering). A subsample of 158 professional organizations we judged to be directly involved in research significantly more often had statements on research integrity/ethics terminology than the whole sample: an average of 10.4% of organizations with a statement (95% CI = 10.4-23-5%) on any of the 27 research integrity/ethics terms compared to 3.3% (95% CI = 2.1–4.6%), respectively (Pethics concepts used prescriptive language in describing the standard of practice. Professional organizations should define research integrity and research ethics issues in their ethics codes and collaborate within and across disciplines to adequately address responsible conduct of research and meet contemporary needs of their communities. PMID:26192805

  12. Research Integrity and Research Ethics in Professional Codes of Ethics: Survey of Terminology Used by Professional Organizations across Research Disciplines.

    Science.gov (United States)

    Komić, Dubravka; Marušić, Stjepan Ljudevit; Marušić, Ana

    2015-01-01

    Professional codes of ethics are social contracts among members of a professional group, which aim to instigate, encourage and nurture ethical behaviour and prevent professional misconduct, including research and publication. Despite the existence of codes of ethics, research misconduct remains a serious problem. A survey of codes of ethics from 795 professional organizations from the Illinois Institute of Technology's Codes of Ethics Collection showed that 182 of them (23%) used research integrity and research ethics terminology in their codes, with differences across disciplines: while the terminology was common in professional organizations in social sciences (82%), mental health (71%), sciences (61%), other organizations had no statements (construction trades, fraternal social organizations, real estate) or a few of them (management, media, engineering). A subsample of 158 professional organizations we judged to be directly involved in research significantly more often had statements on research integrity/ethics terminology than the whole sample: an average of 10.4% of organizations with a statement (95% CI = 10.4-23-5%) on any of the 27 research integrity/ethics terms compared to 3.3% (95% CI = 2.1-4.6%), respectively (Pethics concepts used prescriptive language in describing the standard of practice. Professional organizations should define research integrity and research ethics issues in their ethics codes and collaborate within and across disciplines to adequately address responsible conduct of research and meet contemporary needs of their communities.

  13. Research Integrity and Research Ethics in Professional Codes of Ethics: Survey of Terminology Used by Professional Organizations across Research Disciplines.

    Directory of Open Access Journals (Sweden)

    Dubravka Komić

    Full Text Available Professional codes of ethics are social contracts among members of a professional group, which aim to instigate, encourage and nurture ethical behaviour and prevent professional misconduct, including research and publication. Despite the existence of codes of ethics, research misconduct remains a serious problem. A survey of codes of ethics from 795 professional organizations from the Illinois Institute of Technology's Codes of Ethics Collection showed that 182 of them (23% used research integrity and research ethics terminology in their codes, with differences across disciplines: while the terminology was common in professional organizations in social sciences (82%, mental health (71%, sciences (61%, other organizations had no statements (construction trades, fraternal social organizations, real estate or a few of them (management, media, engineering. A subsample of 158 professional organizations we judged to be directly involved in research significantly more often had statements on research integrity/ethics terminology than the whole sample: an average of 10.4% of organizations with a statement (95% CI = 10.4-23-5% on any of the 27 research integrity/ethics terms compared to 3.3% (95% CI = 2.1-4.6%, respectively (P<0.001. Overall, 62% of all statements addressing research integrity/ethics concepts used prescriptive language in describing the standard of practice. Professional organizations should define research integrity and research ethics issues in their ethics codes and collaborate within and across disciplines to adequately address responsible conduct of research and meet contemporary needs of their communities.

  14. New limits to the remote monitoring of workers' activities at the intersection between the rules of the Statute and the privacy Code

    Directory of Open Access Journals (Sweden)

    Ilario Alvino

    2016-02-01

    Full Text Available This paper examines the provisions contained in the new article 4 of the Worker’s Statute that limit the employer’s monitoring powers.After more 40 years, this article is being changed by article 23 of d.lgs. 151/2015 with the purpose to revise the legislation in connection with development of modern technologies.In particular, emphasis is given to the difficult to implement and interpret the law in relation to the scope for employers to control how employees use the internet and emails at work.The new article is analysed in accordance with the rules of Italian Data Protection Code (d.lgs. 196/2003 and the norms laid down by the Italian Data Protection Authority.

  15. Relative validity of the pre-coded food diary used in the Danish National Survey of Diet and Physical Activity

    DEFF Research Database (Denmark)

    Knudsen, Vibeke Kildegaard; Gille, Maj-Britt; Nielsen, Trine Holmgaard

    2011-01-01

    Objective: To determine the relative validity of the pre-coded food diary applied in the Danish National Survey of Dietary Habits and Physical Activity. Design: A cross-over study among seventy-two adults (aged 20 to 69 years) recording diet by means of a pre-coded food diary over 4 d and a 4 d...... weighed food record. Intakes of foods and drinks were estimated, and nutrient intakes were calculated. Means and medians of intake were compared, and crossclassification of individuals according to intake was performed. To assess agreement between the two methods, Pearson and Spearman’s correlation...... coefficients and weighted kappa coefficients were calculated. Setting: Validation study of the pre-coded food diary against a 4 d weighed food record. Subjects: Seventy-two volunteer, healthy free-living adults (thirty-five males, thirty-seven females). Results: Intakes of cereals and vegetables were higher...

  16. Pediatric biobanking: a pilot qualitative survey of practices, rules and researcher opinions in ten European countries

    DEFF Research Database (Denmark)

    Salvaterra, Elena; Giorda, Roberto; Bassi, Maria Teresa

    2012-01-01

    such as decision making, privacy protection, minor recontact, and research withdrawal by focusing on theoretical or empirical perspectives. Our research attempted to analyze such issues in a comprehensive manner by exploring practices, rules, and researcher opinions regarding proxy consent, minor assent, specimens...... was subjected to national or local regulations covering adult biobanks (n=26). Informed consent was generally given by parents or legal representatives (n=17). Children's opinions were frequently sought and taken into account (n=16). However, minors were usually not recontacted at the age of maturity to express......Ethical, legal, and social issues related to the collection, storage, and use of biospecimens and data derived from children raise critical concerns in the international debate. So far, a number of studies have considered a variety of the individual issues crucial to pediatric biobanking...

  17. Local health rules and building regulations: a survey on local hygiene and building regulations in Italian municipalities.

    Science.gov (United States)

    Gola, Marco; Signorelli, Carlo; Buffoli, Maddalena; Rebecchi, Andrea; Capolongo, Stefano

    2017-01-01

    WHO has highlighted the need to strengthen the relationship between health and built environment factors, such as inappropriate housing conditions. Local Health Rules (LHRs) and Building Regulations (BRs) are tools which provide safety and building hygiene in construction practices. Currently the Italian Government is considering to establish a National Building Regulation and, related to the following purpose, this paper presents a survey on the status of adoption and updating of LHRs and BRs in Italian municipalities. The current Italian state of LHRs, BRs and Municipal Development Plans (MDPs) have been examined by a survey considering a sample of about 550 cities, with different demo graphic and geographic features, starting from the previous research work by Signorelli et al. (1999). The analysis underlines a serious shortage of updated LHRs, especially in small and medium-sized municipalities whereas BRs and MDPs are widespread. Only 30% of them are previously approved and validated by Local Health Authorities. Starting from a survey, the present scenario of Building Regulations requires the introduction of further performance guidelines instead of normative ones and, therefore, the current actions to give rise to a National Building Regulation could be integrated by building hygiene contents of LHRs.

  18. Administrative simplification: change to the compliance date for the International Classification of Diseases, 10th Revision (ICD-10-CM and ICD-10-PCS) medical data code sets. Final rule.

    Science.gov (United States)

    2014-08-04

    This final rule implements section 212 of the Protecting Access to Medicare Act of 2014 by changing the compliance date for the International Classification of Diseases, 10th Revision, Clinical Modification (ICD-10-CM) for diagnosis coding, including the Official ICD-10-CM Guidelines for Coding and Reporting, and the International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) for inpatient hospital procedure coding, including the Official ICD-10-PCS Guidelines for Coding and Reporting, from October 1, 2014 to October 1, 2015. It also requires the continued use of the International Classification of Diseases, 9th Revision, Clinical Modification, Volumes 1 and 2 (diagnoses), and 3 (procedures) (ICD-9-CM), including the Official ICD-9-CM Guidelines for Coding and Reporting, through September 30, 2015.

  19. A systematic survey of loss-of-function variants in human protein-coding genes

    NARCIS (Netherlands)

    MacArthur, D.G.; Balasubramanian, S.; Frankish, A.; Huang, N.; Morris, J.; Walter, K.; Jostins, L.; Habegger, L.; Pickrell, J.K.; Montgomery, S.B.; Albers, C.A.; Zhang, Z.D.; Conrad, D.F.; Lunter, G.; Zheng, H.; Ayub, Q.; DePristo, M.A.; Banks, E.; Hu, M.; Handsaker, R.E.; Rosenfeld, J.A.; Fromer, M.; Jin, M.; Mu, X.J.; Khurana, E.; Ye, K.; Kay, M.; Saunders, G.I.; Suner, M.M.; Hunt, T.; Barnes, I.H.; Amid, C.; Carvalho-Silva, D.R.; Bignell, A.H.; Snow, C.; Yngvadottir, B.; Bumpstead, S.; Cooper, D.N.; Xue, Y.; Romero, I.G.; Genomes Project, C.; Wang, J.; Li, Y.; Gibbs, R.A.; McCarroll, S.A.; Dermitzakis, E.T.; Pritchard, J.K.; Barrett, J.C.; Harrow, J.; Hurles, M.E.; Gerstein, M.B.; Tyler-Smith, C.

    2012-01-01

    Genome-sequencing studies indicate that all humans carry many genetic variants predicted to cause loss of function (LoF) of protein-coding genes, suggesting unexpected redundancy in the human genome. Here we apply stringent filters to 2951 putative LoF variants obtained from 185 human genomes to det

  20. Statistical inference of static analysis rules

    Science.gov (United States)

    Engler, Dawson Richards (Inventor)

    2009-01-01

    Various apparatus and methods are disclosed for identifying errors in program code. Respective numbers of observances of at least one correctness rule by different code instances that relate to the at least one correctness rule are counted in the program code. Each code instance has an associated counted number of observances of the correctness rule by the code instance. Also counted are respective numbers of violations of the correctness rule by different code instances that relate to the correctness rule. Each code instance has an associated counted number of violations of the correctness rule by the code instance. A respective likelihood of the validity is determined for each code instance as a function of the counted number of observances and counted number of violations. The likelihood of validity indicates a relative likelihood that a related code instance is required to observe the correctness rule. The violations may be output in order of the likelihood of validity of a violated correctness rule.

  1. CPT coding patterns at nurse-managed health centers: data from a national survey.

    Science.gov (United States)

    Vonderheid, Susan C; Pohl, Joanne M; Tanner, Clare; Newland, Jamesetta A; Gans, Dave N

    2009-01-01

    Nurse-managed health centers (NMHCs) play an important role in delivering health care services to a wide range of communities and often serve as our nation's safety net providers. Unfortunately, NMHCs struggle to remain in business for a variety of reasons, including underdeveloped business practices. Until now, NMHCs had only data from the Centers for Medicare and Medicaid Services and the Medical Group Management Assocation for comparison with coding patterns in individual centers. This article is the first published report of national data for NMHCs that is available for comparison. Providers need to possess financial acumen to remain open for business. Assessment of CPT coding patterns is a key strategy to support long-term sustainability.

  2. Survey evidence fights in criminal matters in accordance with the Islamic Penal Code Act 2013

    Directory of Open Access Journals (Sweden)

    Saeid Darougari

    2014-08-01

    Full Text Available Sets lawsuit is evidence to prove the claim in the courts, used and Article 166 of the Constitution, emphasizes this is a criminal trial evidence, as one of the most important issues of criminal justice, there has been a dramatic transformation. Throughout history, testimony and confession, the crime proved a major role, and often inevitable, especially in the period legal reasons played. Basically, though, some common evidence in criminal and civil, but there is evidence of criminal, has unique characteristics that distinguish it from civil evidence. Provided out evidence in criminal proceedings, should be in terms of its relation to crime and punishment, and dealing with the rights and freedoms of the individual and society, the legislator should be. The lack of exposition, in the form of rules Iran, particularly in the Procedures Public and Revolutionary Courts in criminal matters in the plant ambiguity remains is perhaps for this reason that legislators and place less importance because, in criminal matters have noticed. While the fundamentals of a subject makes legislators, compared to those rules, it wrote. In this paper an attempt has been subject to criminal evidence, the definition and its history, discussed and reviewed. In this paper analyzes the status and importance of criminal evidence, the Iranian legal system explains.

  3. Medicare program; Home Health Prospective Payment System rate update for calendar year 2013, hospice quality reporting requirements, and survey and enforcement requirements for home health agencies. Final rule.

    Science.gov (United States)

    2012-11-08

    This final rule updates the Home Health Prospective Payment System (HH PPS) rates, including the national standardized 60-day episode rates, the national per-visit rates, the low-utilization payment amount (LUPA), the non-routine medical supplies (NRS) conversion factor, and outlier payments under the Medicare prospective payment system for home health agencies effective January 1, 2013. This rule also establishes requirements for the Home Health and Hospice quality reporting programs. This final rule will also establish requirements for unannounced, standard and extended surveys of home health agencies (HHAs) and sets forth alternative sanctions that could be imposed instead of, or in addition to, termination of the HHA's participation in the Medicare program, which could remain in effect up to a maximum of 6 months, until an HHA achieves compliance with the HHA Conditions of Participation (CoPs) or until the HHA's provider agreement is terminated.

  4. Paired Comparison Survey Analyses Utilizing Rasch Methodology of the Relative Difficulty and Estimated Work Relative Value Units of CPT® Code 27279

    Science.gov (United States)

    Lorio, Morgan; Ferrara, Lisa

    2016-01-01

    Background Minimally invasive sacroiliac joint arthrodesis (“MI SIJ fusion”) received a Category I CPT® code (27279) effective January 1, 2015 and was assigned a work relative value unit (“RVU”) of 9.03. The International Society for the Advancement of Spine Surgery (“ISASS”) conducted a study consisting of a Rasch analysis of two separate surveys of surgeons to assess the accuracy of the assigned work RVU. Methods A survey was developed and sent to ninety-three ISASS surgeon committee members. Respondents were asked to compare CPT® 27279 to ten other comparator CPT® codes reflective of common spine surgeries. The survey presented each comparator CPT® code with its code descriptor as well as the description of CPT® 27279 and asked respondents to indicate whether CPT® 27279 was greater, equal, or less in terms of work effort than the comparator code. A second survey was sent to 557 U.S.-based spine surgeon members of ISASS and 241 spine surgeon members of the Society for Minimally Invasive Spine Surgery (“SMISS”). The design of the second survey mirrored that of the first survey except for the use of a broader set of comparator CPT® codes (27 vs. 10). Using the work RVUs of the comparator codes, a Rasch analysis was performed to estimate the relative difficulty of CPT® 27279, after which the work RVU of CPT® 27279 was estimated by regression analysis. Results Twenty surgeons responded to the first survey and thirty-four surgeons responded to the second survey. The results of the regression analysis of the first survey indicate a work RVU for CPT® 27279 of 14.36 and the results of the regression analysis of the second survey indicate a work RVU for CPT® 27279 of 14.1. Conclusion The Rasch analysis indicates that the current work RVU assigned to CPT® 27279 is undervalued at 9.03. Averaging the results of the regression analyses of the two surveys indicates a work RVU for CPT® 27279 of 14.23.

  5. Monitoring compliance with the International Code of Marketing of Breastmilk Substitutes in west Africa: multisite cross sectional survey in Togo and Burkina Faso.

    Science.gov (United States)

    Aguayo, Victor M; Ross, Jay S; Kanon, Souleyman; Ouedraogo, Andre N

    2003-01-18

    To monitor compliance with the International Code of Marketing of Breastmilk Substitutes in health systems, sales outlets, distribution points, and the news media in Togo and Burkina Faso, west Africa. Multisite cross sectional survey. Staff at 43 health facilities and 66 sales outlets and distribution points, 186 health providers, and 105 mothers of infants aged Danone, 11 by Nestlé, and eight by other national and international manufacturers. Most (148, 90%) health providers had never heard of the code, and 66 mothers (63%) had never received any counselling on breast feeding by their health providers. In west Africa manufacturers are violating the code of marketing of breast milk substitutes. Comparable levels of code violations are observed with (Burkina Faso) or without (Togo) regulating legislation. Legislation must be accompanied by effective information, training, and monitoring systems to ensure that healthcare providers and manufacturers comply with evidence based practice and the code.

  6. Symptom screening rules to identify active pulmonary tuberculosis: Findings from the Zambian South African Tuberculosis and HIV/AIDS Reduction (ZAMSTAR) trial prevalence surveys

    Science.gov (United States)

    Claassens, M. M.; Floyd, S.; Ayles, H.; Beyers, N.

    2017-01-01

    Background High tuberculosis (TB) burden countries should consider systematic screening among adults in the general population. We identified symptom screening rules to be used in addition to cough ≥2 weeks, in a context where X-ray screening is not feasible, aiming to increase the sensitivity of screening while achieving a specificity of ≥85%. Methods We used 2010 Zambia South Africa Tuberculosis and HIV/AIDS Reduction (ZAMSTAR) survey data: a South African (SA) training dataset, a SA testing dataset for internal validation and a Zambian dataset for external validation. Regression analyses investigated relationships between symptoms or combinations of symptoms and active disease. Sensitivity and specificity were calculated for candidate rules. Results Among all participants, the sensitivity of using only cough ≥2 weeks as a screening rule was less than 25% in both SA and Zambia. The addition of any three of six TB symptoms (cough <2 weeks, night sweats, weight loss, fever, chest pain, shortness of breath), or 2 or more of cough <2 weeks, night sweats, and weight loss, increased the sensitivity to ~38%, while reducing specificity from ~95% to ~85% in SA and ~97% to ~92% in Zambia. Among HIV-negative adults, findings were similar in SA, whereas in Zambia the increase in sensitivity was relatively small (15% to 22%). Conclusion High TB burden countries should investigate cost-effective strategies for systematic screening: one such strategy could be to use our rule in addition to cough ≥2 weeks. PMID:28257424

  7. High Interest Scales on the Strong Vocational Interest Blank and the Kuder Occupational Interest Survey Using Holland's Occupational Codes. Research Report No. 1-75.

    Science.gov (United States)

    Westbrook, Franklin D.

    This study compared the arrays of high interest occupations produced by the Strong Vocational Interest Blank, T-399 and the Kuder Occupational Interest Survey, Form DD when the instruments were administered to the same Subjects. Holland type Summary Codes were devised from the arrays of occupations and were analyzed by correlated t tests and…

  8. Informal Control code logic

    CERN Document Server

    Bergstra, Jan A

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

  9. Pharmaceutical Industry Off-label Promotion and Self-regulation: A Document Analysis of Off-label Promotion Rulings by the United Kingdom Prescription Medicines Code of Practice Authority 2003–2012

    Science.gov (United States)

    Vilhelmsson, Andreas; Davis, Courtney; Mulinari, Shai

    2016-01-01

    Background European Union law prohibits companies from marketing drugs off-label. In the United Kingdom—as in some other European countries, but unlike the United States—industry self-regulatory bodies are tasked with supervising compliance with marketing rules. The objectives of this study were to (1) characterize off-label promotion rulings in the UK compared to the whistleblower-initiated cases in the US and (2) shed light on the UK self-regulatory mechanism for detecting, deterring, and sanctioning off-label promotion. Methods and Findings We conducted structured reviews of rulings by the UK self-regulatory authority, the Prescription Medicines Code of Practice Authority (PMCPA), between 2003 and 2012. There were 74 off-label promotion rulings involving 43 companies and 65 drugs. Nineteen companies were ruled in breach more than once, and ten companies were ruled in breach three or more times over the 10-y period. Drawing on a typology previously developed to analyse US whistleblower complaints, we coded and analysed the apparent strategic goals of each off-label marketing scheme and the practices consistent with those alleged goals. 50% of rulings cited efforts to expand drug use to unapproved indications, and 39% and 38% cited efforts to expand beyond approved disease entities and dosing strategies, respectively. The most frequently described promotional tactic was attempts to influence prescribers (n = 72, 97%), using print material (70/72, 97%), for example, advertisements (21/70, 30%). Although rulings cited prescribers as the prime target of off-label promotion, competing companies lodged the majority of complaints (prescriber: n = 16, 22%, versus companies: n = 42, 57%). Unlike US whistleblower complaints, few UK rulings described practices targeting consumers (n = 3, 4%), payers (n = 2, 3%), or company staff (n = 2, 3%). Eight UK rulings (11%) pertaining to six drugs described promotion of the same drug for the same off-label use as was alleged by

  10. Pharmaceutical Industry Off-label Promotion and Self-regulation: A Document Analysis of Off-label Promotion Rulings by the United Kingdom Prescription Medicines Code of Practice Authority 2003-2012.

    Directory of Open Access Journals (Sweden)

    Andreas Vilhelmsson

    2016-01-01

    Full Text Available European Union law prohibits companies from marketing drugs off-label. In the United Kingdom--as in some other European countries, but unlike the United States--industry self-regulatory bodies are tasked with supervising compliance with marketing rules. The objectives of this study were to (1 characterize off-label promotion rulings in the UK compared to the whistleblower-initiated cases in the US and (2 shed light on the UK self-regulatory mechanism for detecting, deterring, and sanctioning off-label promotion.We conducted structured reviews of rulings by the UK self-regulatory authority, the Prescription Medicines Code of Practice Authority (PMCPA, between 2003 and 2012. There were 74 off-label promotion rulings involving 43 companies and 65 drugs. Nineteen companies were ruled in breach more than once, and ten companies were ruled in breach three or more times over the 10-y period. Drawing on a typology previously developed to analyse US whistleblower complaints, we coded and analysed the apparent strategic goals of each off-label marketing scheme and the practices consistent with those alleged goals. 50% of rulings cited efforts to expand drug use to unapproved indications, and 39% and 38% cited efforts to expand beyond approved disease entities and dosing strategies, respectively. The most frequently described promotional tactic was attempts to influence prescribers (n = 72, 97%, using print material (70/72, 97%, for example, advertisements (21/70, 30%. Although rulings cited prescribers as the prime target of off-label promotion, competing companies lodged the majority of complaints (prescriber: n = 16, 22%, versus companies: n = 42, 57%. Unlike US whistleblower complaints, few UK rulings described practices targeting consumers (n = 3, 4%, payers (n = 2, 3%, or company staff (n = 2, 3%. Eight UK rulings (11% pertaining to six drugs described promotion of the same drug for the same off-label use as was alleged by whistleblowers in the US

  11. Pharmaceutical Industry Off-label Promotion and Self-regulation: A Document Analysis of Off-label Promotion Rulings by the United Kingdom Prescription Medicines Code of Practice Authority 2003-2012.

    Science.gov (United States)

    Vilhelmsson, Andreas; Davis, Courtney; Mulinari, Shai

    2016-01-01

    European Union law prohibits companies from marketing drugs off-label. In the United Kingdom--as in some other European countries, but unlike the United States--industry self-regulatory bodies are tasked with supervising compliance with marketing rules. The objectives of this study were to (1) characterize off-label promotion rulings in the UK compared to the whistleblower-initiated cases in the US and (2) shed light on the UK self-regulatory mechanism for detecting, deterring, and sanctioning off-label promotion. We conducted structured reviews of rulings by the UK self-regulatory authority, the Prescription Medicines Code of Practice Authority (PMCPA), between 2003 and 2012. There were 74 off-label promotion rulings involving 43 companies and 65 drugs. Nineteen companies were ruled in breach more than once, and ten companies were ruled in breach three or more times over the 10-y period. Drawing on a typology previously developed to analyse US whistleblower complaints, we coded and analysed the apparent strategic goals of each off-label marketing scheme and the practices consistent with those alleged goals. 50% of rulings cited efforts to expand drug use to unapproved indications, and 39% and 38% cited efforts to expand beyond approved disease entities and dosing strategies, respectively. The most frequently described promotional tactic was attempts to influence prescribers (n = 72, 97%), using print material (70/72, 97%), for example, advertisements (21/70, 30%). Although rulings cited prescribers as the prime target of off-label promotion, competing companies lodged the majority of complaints (prescriber: n = 16, 22%, versus companies: n = 42, 57%). Unlike US whistleblower complaints, few UK rulings described practices targeting consumers (n = 3, 4%), payers (n = 2, 3%), or company staff (n = 2, 3%). Eight UK rulings (11%) pertaining to six drugs described promotion of the same drug for the same off-label use as was alleged by whistleblowers in the US. However

  12. Nature and Function of Rules.

    Science.gov (United States)

    Fields, Barry A.

    1997-01-01

    Surveyed Year 1 and 2 teachers in Australia about their classroom rules. Found that teachers have about six rules for their classes relating to pupil-pupil relations, completing academic tasks, movement around the classroom, property, safety, and other. Most rules concerned pupil-pupil interactions, and all rules can be seen as a way of…

  13. 15 CFR 801.10 - Rules and regulations for the BE-120, Benchmark Survey of Transactions in Selected Services and...

    Science.gov (United States)

    2010-01-01

    ...; educational and training services; engineering, architectural, and surveying services; financial services... news; disbursements to maintain government tourism and business promotion offices; disbursements for...

  14. 基于用友系统中物料编码规则及存货分类规划%Material coding rule and inventory classification planning based on UFIDA software

    Institute of Scientific and Technical Information of China (English)

    薛伟良

    2012-01-01

    介绍了ERP软件运行的编码规则,以及在企业运行中的应用.可以提升企业运行效率、快速响应订单,提高企业市场竞争力.%The coding rule of the ERP has been introduced in the text. The application of ERP in the enterprise has been put forward, which improves the running efficiency with quick response to the order, which can improve th competitive power of the enterprise.

  15. [Does the amendment of the rules of Criminal Code referring to mandatory treatment mean paradigm change in the judgement of mentally ill criminals?].

    Science.gov (United States)

    Kalapos, Miklós Péter

    2011-01-01

    Talking of the Act LXXX. of 2009, the amendment of the Act IV. of 1978 on Criminal Code, the author reviews the Hungarian history of the changes of regulations referring to mentally ill criminals. He discusses the treatment regulations referring to criminals identified as insane, too. From historical and legal philosophical points of view, those parts of the modification of Criminal Code are analyzed that deal with mandatory treatment and took effect in he May 2010. The changes are judged as paradigm changing in a negative course that represents a doubtful step from the direction of perpetrator based criminal law to criminal act based criminal law.

  16. 15 CFR 801.11 - Rules and regulations for the BE-80, Benchmark Survey of Financial Services Transactions Between...

    Science.gov (United States)

    2010-01-01

    ... and commodity exchanges; other financial investment activities (including miscellaneous intermediation, portfolio management, investment advice, and all other financial investment activities); insurance carriers..., Benchmark Survey of Financial Services Transactions Between U.S. Financial Services Providers and...

  17. Defeating the coding monsters.

    Science.gov (United States)

    Colt, Ross

    2007-02-01

    Accuracy in coding is rapidly becoming a required skill for military health care providers. Clinic staffing, equipment purchase decisions, and even reimbursement will soon be based on the coding data that we provide. Learning the complicated myriad of rules to code accurately can seem overwhelming. However, the majority of clinic visits in a typical outpatient clinic generally fall into two major evaluation and management codes, 99213 and 99214. If health care providers can learn the rules required to code a 99214 visit, then this will provide a 90% solution that can enable them to accurately code the majority of their clinic visits. This article demonstrates a step-by-step method to code a 99214 visit, by viewing each of the three requirements as a monster to be defeated.

  18. Binary translation using peephole translation rules

    Science.gov (United States)

    Bansal, Sorav; Aiken, Alex

    2010-05-04

    An efficient binary translator uses peephole translation rules to directly translate executable code from one instruction set to another. In a preferred embodiment, the translation rules are generated using superoptimization techniques that enable the translator to automatically learn translation rules for translating code from the source to target instruction set architecture.

  19. Verification of business rules programs

    CERN Document Server

    Silva, Bruno Berstel-Da

    2013-01-01

    Rules represent a simplified means of programming, congruent with our understanding of human brain constructs. With the advent of business rules management systems, it has been possible to introduce rule-based programming to nonprogrammers, allowing them to map expert intent into code in applications such as fraud detection, financial transactions, healthcare, retail, and marketing. However, a remaining concern is the quality, safety, and reliability of the resulting programs.  This book is on business rules programs, that is, rule programs as handled in business rules management systems. Its

  20. Changes in community perspectives on the roles and rules of church forests in northern Ethiopia: evidence from a panel survey of four Ethiopian Orthodox communities

    Directory of Open Access Journals (Sweden)

    Travis William Reynolds

    2017-04-01

    Full Text Available Some of the only Afromontane forest in northern Ethiopia today is on lands managed by followers of the Ethiopian Orthodox Church, where for centuries priests and communities have conserved forest groves around church buildings. The ecological value of the thousands of church forests in Ethiopia has been widely acknowledged, but little is known about the diverse local institutions that govern these resources, or how such institutions might be changing in response to Ethiopia’s rapid recent economic development. This study uses a unique panel survey to explore changes in community perspectives on the social and ecological roles of church forests, and rules governing church forest use, in four Orthodox communities over time. Our sample consists of 122 household surveys conducted in 2002 and a further 122 surveys from 2014, with 71 households interviewed in both periods. We find that reported uses of church forests vary across forests and over time, with larger forests more likely to be used for extractive purposes such as firewood and construction timber, while smaller forests have become more restricted to renewable or non-extractive uses such as natural medicines, honey, and prayer. Results of logistic regression suggest church followers’ support for preserving church forests increases with age and access to alternative sources of firewood – including exotic Eucalyptus spp. plantations which are increasingly widespread in northern Ethiopia. We also observe a shift since 2002 away from an expectation that church followers themselves hold responsibility for rule enforcement in church forests to a perceived sharing of responsibility by church authorities (i.e. priests and government (i.e. police in 2014. Together the progressive introduction of exotic tree species in church forests combined with the erosion of religious norms surrounding local forest governance may threaten the integrity and diversity of these unique social-ecological systems.

  1. The Filiation by Assisted Human Reproductions Techniques in the Argentinian Civil and Commercial Code. An Advance that Allows to Harmonize the Rule with the Reality

    Directory of Open Access Journals (Sweden)

    Adriana Noemí Krasnow

    2017-07-01

    Full Text Available This article describes the contributions and changes that the Argentinian Civil and Commercial Code introduce in the filiation. The focus of attention is moved to the assisted human reproduction techniques in relation with the informed consent as an exteriorization of the will to procreate. Moreover, it is intended a study space about two proceedings that were silenced in the norm as the gestational surrogacy and the post mortem fertilization.

  2. Geodatabase of sites, basin boundaries, and topology rules used to store drainage basin boundaries for the U.S. Geological Survey, Colorado Water Science Center

    Science.gov (United States)

    Dupree, Jean A.; Crowfoot, Richard M.

    2012-01-01

    This geodatabase and its component datasets are part of U.S. Geological Survey Digital Data Series 650 and were generated to store basin boundaries for U.S. Geological Survey streamgages and other sites in Colorado. The geodatabase and its components were created by the U.S. Geological Survey, Colorado Water Science Center, and are used to derive the numeric drainage areas for Colorado that are input into the U.S. Geological Survey's National Water Information System (NWIS) database and also published in the Annual Water Data Report and on NWISWeb. The foundational dataset used to create the basin boundaries in this geodatabase was the National Watershed Boundary Dataset. This geodatabase accompanies a U.S. Geological Survey Techniques and Methods report (Book 11, Section C, Chapter 6) entitled "Digital Database Architecture and Delineation Methodology for Deriving Drainage Basins, and Comparison of Digitally and Non-Digitally Derived Numeric Drainage Areas." The Techniques and Methods report details the geodatabase architecture, describes the delineation methodology and workflows used to develop these basin boundaries, and compares digitally derived numeric drainage areas in this geodatabase to non-digitally derived areas. 1. COBasins.gdb: This geodatabase contains site locations and basin boundaries for Colorado. It includes a single feature dataset, called BasinsFD, which groups the component feature classes and topology rules. 2. BasinsFD: This feature dataset in the "COBasins.gdb" geodatabase is a digital container that holds the feature classes used to archive site locations and basin boundaries as well as the topology rules that govern spatial relations within and among component feature classes. This feature dataset includes three feature classes: the sites for which basins have been delineated (the "Sites" feature class), basin bounding lines (the "BasinLines" feature class), and polygonal basin areas (the "BasinPolys" feature class). The feature dataset

  3. Notable minimum value of relative risk recognized by Japanese epidemiologists and rule of proof in civil trial: questionnaire survey.

    Science.gov (United States)

    Sugita, M; Watanabe, S; Kanamori, M; Izuno, T

    1993-09-01

    Members of The Japanese Society of Cancer Epidemiology were questioned about relative risk in cancer epidemiology. The notable minimum value of relative risk recognized by the epidemiologists distributed from 1.1 to 5.0, and the mean and the standard deviation of the notable minimum value were 1.92 and 0.760. In civil litigation of United States a plaintiff must prove one's case by a "preponderance of evidence," which means that a causal relationship between risk factors and a health disturbance to a plaintiff is proved when relative risk is 2.0 or more. The mean value 1.92 of the notable minimum value of relative risk nearly corresponded to the relative risk 2.0, which indicates that opinion of Japanese epidemiologists did not disagree with the rule of the proof in civil litigation of United States. It is mentioned that the standard of the proof should be "high probability" based on "a high level of conviction in the judge's own mind" in Japanese civil trials, and that the "high probability" means that relative risk is 5.0 or more if we dare to quantify the vagueness. This value corresponded to the maximum value of the notable minimum relative risk in the questionnaire to the Japanese epidemiologists. In civil litigation of Japan, the standard of the proof based on epidemiological results may be more conservative than the opinion of Japanese epidemiologists.

  4. Application of InSAR and gravimetric surveys for developing construction codes in zones of land subsidence induced by groundwater extraction: case study of Aguascalientes, Mexico

    Science.gov (United States)

    Pacheco-Martínez, J.; Wdowinski, S.; Cabral-Cano, E.; Hernández-Marín, M.; Ortiz-Lozano, J. A.; Oliver-Cabrera, T.; Solano-Rojas, D.; Havazli, E.

    2015-11-01

    Interferometric Synthetic Aperture Radar (InSAR) has become a valuable tool for surface deformation monitoring, including land subsidence associated with groundwater extraction. Another useful tools for studying Earth's surface processes are geophysical methods such as Gravimetry. In this work we present the application of InSAR analysis and gravimetric surveying to generate valuable information for risk management related to land subsidence and surface faulting. Subsidence of the city of Aguascalientes, Mexico is presented as study case. Aguascalientes local governments have addressed land subsidence issues by including new requirements for new constructions projects in the State Urban Construction Code. Nevertheless, the resulting zoning proposed in the code is still subjective and not clearly defined. Our work based on gravimetric and InSAR surveys is aimed for improving the subsidence hazard zoning proposed in the State Urban Code in a more comprehensive way. The study includes a 2007-2011 ALOS InSAR time-series analysis of the Aguascalientes valley, an interpretation of the compete Bouguer gravimetric anomaly of the Aguascalientes urban area, and the application of time series and gravimetric anomaly maps for improve the subsidence hazard zoning of Aguascalientes City.

  5. NHES:91/93/95/96 Electronic CodeBook (ECB) User's Guide. National Household Education Survey.

    Science.gov (United States)

    Collins, Mary A.; Chandler, Kathryn

    The National Household Education Survey (NHES) is a random digit dial telephone survey of households developed by the National Center for Education Statistics. It has been conducted in 1991, 1993, 1995, and 1996, with varying components each year. The NHES 91/93/95/96 CD-ROM contains an electronic codebook (ECB) program that, after being installed…

  6. Vector Quantization of Harmonic Magnitudes in Speech Coding Applications—A Survey and New Technique

    Directory of Open Access Journals (Sweden)

    Wai C. Chu

    2004-12-01

    Full Text Available A harmonic coder extracts the harmonic components of a signal and represents them efficiently using a few parameters. The principles of harmonic coding have become quite successful and several standardized speech and audio coders are based on it. One of the key issues in harmonic coder design is in the quantization of harmonic magnitudes, where many propositions have appeared in the literature. The objective of this paper is to provide a survey of the various techniques that have appeared in the literature for vector quantization of harmonic magnitudes, with emphasis on those adopted by the major speech coding standards; these include constant magnitude approximation, partial quantization, dimension conversion, and variable-dimension vector quantization (VDVQ. In addition, a refined VDVQ technique is proposed where experimental data are provided to demonstrate its effectiveness.

  7. High Scales On the Strong Vocational Interest Blank and the Kuder Occupational Interest Survey Using Holland's Occupational Codes

    Science.gov (United States)

    Westbrook, Franklin D.

    1975-01-01

    The study compared the arrays of high-interest occupations produced by the Strong and the Kuder. A frequency percentage count showed 85 percent of the pairs of summary codes had two identical characteristics, and some support was found for Holland's hexagon. The implications for further studies comparing the two instruments are discussed. (Author)

  8. Research survey on physical layer network coding%物理层网络编码研究进展

    Institute of Scientific and Technical Information of China (English)

    赵明峰; 周亚建; 原泉; 杨义先

    2011-01-01

    It has been proved that Physical Layer Network Coding (PLNC) can also improve the system throughput and spectral efficiency by taking the advantage of the broadcast nature of electromagnetic waves in wireless cooperative environments. In this paper, the basic idea of the PLNC was introduced and its benefit over traditional forward and straightforward network coding under the two-way relay scenario was illustrated. Firstly, three types of physical layer network coding-Physical Network Coding over Finite Field (PNCF), Analog Network Coding (ANC) and Complex Field Network Coding (CFNC) were presented, the theory research development of the three kinds of PLNC were overviewed and new theory and technology related to it were introduced. Secondly, the application and implementation for the ANC scheme in the real wireless cooperative environments were overviewed. Finally, the opening issues and challenges for PLNC concerning both theory and implementation in near future were proposed. It is an important trend to improve the theory and implementation of PLNC, research the security of PLNC, and combine PLNC with other technologies, such as channel coding and modulation,relay choice, effective scheduling and resource allocation.%在无线协作环境下,充分利用无线电磁波的广播特性进行物理层网络编码(PLNC)可获得更大的吞吐量和频谱利用率.在物理层网络编码基本思想的基础上,首先着重介绍三类物理层网络编码技术--有限域上的物理层网络编码、模拟网络编码和复数域上的网络编码,给出它们相关理论的研究现状,并对与此相结合的新技术进行了介绍;然后论述目前物理层网络编码应用实现的现状;最后对物理层网络编码相关理论及其应用实现的发展趋势进行了分析与展望.物理层网络编码理论的进一步完善,相关安全性的研究,以及与协作通信理论,如信道编码与调制、中继选择、调度及资源分配等进一

  9. A survey of the effective factors in students' adherence to university dress code policy, using the theory of reasoned action.

    Science.gov (United States)

    Kaveh, Mohammad Hossein; Moradi, Leila; Hesampour, Maryam; Hasan Zadeh, Jafar

    2015-07-01

    Recognizing the determinants of behavior plays a major role in identification and application of effective strategies for encouraging individuals to follow the intended pattern of behavior. The present study aimed to analyze the university students' behaviors regarding the amenability to dress code, using the theory of reasoned action (TRA). In this cross sectional study, 472 students were selected through multi-stage random sampling. The data were collected using a researcher-made questionnaire whose validity was confirmed by specialists. Besides, its reliability was confirmed by conducting a pilot study revealing Cronbach's alpha coefficients of 0.93 for attitude, 0.83 for subjective norms, 0.94 for behavioral intention and 0.77 for behavior. The data were entered into the SPSS statistical software and analyzed using descriptive and inferential statistics (Mann-Whitney, correlation and regression analysis). Based on the students' self-reports, conformity of clothes to the university's dress code was below the expected level in 28.87% of the female students and 28.55% of the male ones. The mean scores of attitude, subjective norms, and behavioral intention to comply with dress code policy were 28.78±10.08, 28.51±8.25 and 11.12±3.84, respectively. The students of different colleges were different from each other concerning TRA constructs. Yet, subjective norms played a more critical role in explaining the variance of dress code behavior among the students. Theory of reasoned action explained the students' dress code behaviors relatively well. The study results suggest paying attention to appropriate approaches in educational, cultural activities, including promotion of student-teacher communication.

  10. A survey of the effective factors in students' adherence to university dress code policy, using the theory of reasoned action

    Science.gov (United States)

    KAVEH, MOHAMMAD HOSSEIN; MORADI, LEILA; HESAMPOUR, MARYAM; HASAN ZADEH, JAFAR

    2015-01-01

    Introduction Recognizing the determinants of behavior plays a major role in identification and application of effective strategies for encouraging individuals to follow the intended pattern of behavior. The present study aimed to analyze the university students’ behaviors regarding the amenability to dress code, using the theory of reasoned action (TRA). Methods In this cross sectional study, 472 students were selected through multi-stage random sampling. The data were collected using a researcher-made questionnaire whose validity was confirmed by specialists. Besides, its reliability was confirmed by conducting a pilot study revealing Cronbach’s alpha coefficients of 0.93 for attitude, 0.83 for subjective norms, 0.94 for behavioral intention and 0.77 for behavior. The data were entered into the SPSS statistical software and analyzed using descriptive and inferential statistics (Mann-Whitney, correlation and regression analysis). Results Based on the students’ self-reports, conformity of clothes to the university’s dress code was below the expected level in 28.87% of the female students and 28.55% of the male ones. The mean scores of attitude, subjective norms, and behavioral intention to comply with dress code policy were 28.78±10.08, 28.51±8.25 and 11.12±3.84, respectively. The students of different colleges were different from each other concerning TRA constructs. Yet, subjective norms played a more critical role in explaining the variance of dress code behavior among the students. Conclusion Theory of reasoned action explained the students’ dress code behaviors relatively well. The study results suggest paying attention to appropriate approaches in educational, cultural activities, including promotion of student-teacher communication. PMID:26269790

  11. A survey of the effective factors in students’ adherence to university dress code policy, using the theory of reasoned action

    Directory of Open Access Journals (Sweden)

    MOHAMMAD HOSSEIN KAVEH

    2015-07-01

    Full Text Available Introduction: Recognizing the determinants of behavior plays a major role in identification and application of effective strategies for encouraging individuals to follow the intended pattern of behavior. The present study aimed to analyze the university students’ behaviors regarding the amenability to dress code, using the theory of reasoned action (TRA. Methods: In this cross sectional study, 472 students were selected through multi-stage random sampling. The data were collected using a researcher-made questionnaire whose validity was confirmed by specialists. Besides, its reliability was confirmed by conducting a pilot study revealing Cronbach’s alpha coefficients of 0.93 for attitude, 0.83 for subjective norms, 0.94 for behavioral intention and 0.77 for behavior. The data were entered into the SPSS statistical software and analyzed using descriptive and inferential statistics (Mann-Whitney, correlation and regression analysis. Results: Based on the students’ self-reports, conformity of clothes to the university’s dress code was below the expected level in 28.87% of the female students and 28.55% of the male ones. The mean scores of attitude, subjective norms, and behavioral intention to comply with dress code policy were 28.78±10.08, 28.51±8.25 and 11.12±3.84, respectively. The students of different colleges were different from each other concerning TRA constructs. Yet, subjective norms played a more critical role in explaining the variance of dress code behavior among the students. Conclusion: Theory of reasoned action explained the students’ dress code behaviors relatively well. The study results suggest paying attention to appropriate approaches in educational, cultural activities, including promotion of student-teacher communication.

  12. Determination of Death and the Dead Donor Rule: A Survey of the Current Law on Brain Death.

    Science.gov (United States)

    Nikas, Nikolas T; Bordlee, Dorinda C; Moreira, Madeline

    2016-06-01

    Despite seeming uniformity in the law, end-of-life controversies have highlighted variations among state brain death laws and their interpretation by courts. This article provides a survey of the current legal landscape regarding brain death in the United States, for the purpose of assisting professionals who seek to formulate or assess proposals for changes in current law and hospital policy. As we note, the public is increasingly wary of the role of organ transplantation in determinations of death, and of the variability of brain death diagnosing criteria. We urge that any attempt to alter current state statutes or to adopt a national standard must balance the need for medical accuracy with sound ethical principles which reject the utilitarian use of human beings and are consistent with the dignity of the human person. Only in this way can public trust be rebuilt. © The Author 2016. Published by Oxford University Press, on behalf of the Journal of Medicine and Philosophy Inc. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  13. A survey of the effective factors in students' adherence to university dress code policy, using the theory of reasoned action

    OpenAIRE

    MOHAMMAD HOSSEIN KAVEH; LEILA MORADI; MARYAM HESAMPOUR; JAFAR HASAN ZADEH

    2015-01-01

    Introduction: Recognizing the determinants of behavior plays a major role in identification and application of effective strategies for encouraging individuals to follow the intended pattern of behavior. The present study aimed to analyze the university students’ behaviors regarding the amenability to dress code, using the theory of reasoned action (TRA). Methods: In this cross sectional study, 472 students were selected through multi-stage random sampling. The data were ...

  14. Classifying Open-Ended Reports: Factors Affecting the Reliability of Occupation Codes

    Directory of Open Access Journals (Sweden)

    Conrad Frederick G.

    2016-03-01

    Full Text Available A source of survey processing error that has received insufficient study to date is the misclassification of open-ended responses. We report on efforts to understand the misclassification of open occupation descriptions in the Current Population Survey (CPS. We analyzed double-coded CPS descriptions to identify which features vary with intercoder reliability. One factor strongly related to reliability was the length of the occupation description: longer descriptions were less reliably coded than shorter ones. This effect was stronger for particular occupation terms. We then carried out an experiment to examine the joint effects of description length and classification “difficulty” of particular occupation terms. For easy occupation terms longer descriptions were less reliably coded, but for difficult occupation terms longer descriptions were slightly more reliably coded than short descriptions. Finally, we observed as coders provided verbal reports on their decision making. One practice, evident in coders’ verbal reports, is their use of informal coding rules based on superficial features of the description. Such rules are likely to promote reliability, though not necessarily validity, of coding. To the extent that coders use informal rules for long descriptions involving difficult terms, this could help explain the observed relationship between description length and difficulty of coding particular terms.

  15. DNA Coding Based Knowledge Discovery Algorithm

    Institute of Scientific and Technical Information of China (English)

    LI Ji-yun; GENG Zhao-feng; SHAO Shi-huang

    2002-01-01

    A novel DNA coding based knowledge discovery algorithm was proposed, an example which verified its validity was given. It is proved that this algorithm can discover new simplified rules from the original rule set efficiently.

  16. Awareness and reported violations of the WHO International Code and Pakistan's national breastfeeding legislation; a descriptive cross-sectional survey

    Directory of Open Access Journals (Sweden)

    Faragher Brian

    2008-10-01

    Full Text Available Abstract Background National legislation in Pakistan adopted the International Code of Marketing of Breastmilk Substitutes in 2002 to restrict the promotion of infant formula feeding. Our objectives were to assess health professionals' awareness of this law in urban government hospitals and describe their reports of violations, including receiving free samples, gifts and sponsorship. Methods Structured interviews were conducted with health staff between July and August 2006 at 12 urban government hospitals in Islamabad, Rawalpindi and Peshawar including paediatricians, obstetricians, nurses, resident doctors, midwives and lady health visitors (LHVs. Results Of the 427 health workers interviewed, the majority were not aware of the national breastfeeding law (70.5%; n = 301 or the International Code (79.6%; n = 340. Paediatricians, and staff who had been working for 10 years or more, were more likely to be aware of the law [OR = 7.00, 95% CI 3.12, 15.7 (paediatricians; OR = 2.48, 95% CI 1.45, 4.24 (10 years working]. More than one third (38.4%, n = 164 had received small gifts such as pens, pencils and calendars; 12.4% (n = 53 had received sponsorship for training or conferences; and 15.9% (n = 68 had received free samples of infant formula from the Companies. Staff who were aware of the law were also more likely to report receiving gifts (OR = 1.64, 95% CI 1.08, 2.51 and free samples (OR = 1.86, 95% CI 1.09, 3.19. Conclusion Most hospital health professionals were unaware of national breastfeeding legislation in Pakistan, and infant formula companies were continuing to flout the ban on gifts, free samples and sponsorship for health staff.

  17. Administrative simplification: adoption of a standard for a unique health plan identifier; addition to the National Provider Identifier requirements; and a change to the compliance date for the International Classification of Diseases, 10th Edition (ICD-10-CM and ICD-10-PCS) medical data code sets. Final rule.

    Science.gov (United States)

    2012-09-05

    This final rule adopts the standard for a national unique health plan identifier (HPID) and establishes requirements for the implementation of the HPID. In addition, it adopts a data element that will serve as an other entity identifier (OEID), or an identifier for entities that are not health plans, health care providers, or individuals, but that need to be identified in standard transactions. This final rule also specifies the circumstances under which an organization covered health care provider must require certain noncovered individual health care providers who are prescribers to obtain and disclose a National Provider Identifier (NPI). Lastly, this final rule changes the compliance date for the International Classification of Diseases, 10th Revision, Clinical Modification (ICD-10-CM) for diagnosis coding, including the Official ICD-10-CM Guidelines for Coding and Reporting, and the International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) for inpatient hospital procedure coding, including the Official ICD-10-PCS Guidelines for Coding and Reporting, from October 1, 2013 to October 1, 2014.

  18. Idioms-based Business Rule Extraction

    NARCIS (Netherlands)

    Smit, R

    2011-01-01

    This thesis studies the extraction of embedded business rules, using the idioms of the used framework to identify them. Embedded business rules exist as source code in the software system and knowledge about them may get lost. Extraction of those business rules could make them accessible and managea

  19. Electronic Code of Federal Regulations

    Data.gov (United States)

    National Archives and Records Administration — The Electronic Code of Federal Regulations (e-CFR) is the codification of the general and permanent rules published in the Federal Register by the executive...

  20. Does the use of a prescriptive clinical prediction rule increase the likelihood of applying inappropriate treatments? A survey using clinical vignettes.

    Science.gov (United States)

    Learman, Kenneth; Showalter, Christopher; Cook, Chad

    2012-12-01

    Clinical prediction rules (CPR) have been promoted as a natural progression in treatment decision-making. Methodological limitations of derivation and validation studies have resulted in some researchers questioning the indiscriminate use of CPRs. The purpose of this study was to explore the influence of the lumbar spine manipulation CPR (LCPR) use on clinical decision making through a survey of practicing clinicians. A sample of 535 physiotherapists from the United States, who routinely use thrust manipulation (TM), agreed to participate in this study. Those who use and those who do not use the LCPR determined group designation. A 9-step clinical vignette progressed a fictitious patient meeting the LCPR from no medical concern to significant concern for general health. A 2 × 9 chi-square was used to analyze the progression of decision-making. APTA board certification (P = 0.04), gender (P < 0.01), and manual therapy course attendance (P = 0.04) may increase and following the McKenzie philosophy (P < 0.01) may decrease the use of the LCPR. Subjects using the LCPR were more likely to choose to manipulate the patient (P < 0.01 and P = 0.02) during the first 2 scenarios of the vignette but both groups avoided TM equally as the medical concerns progressed. The results would suggest that subjects who routinely use TM would modify their decision-making to accommodate medical complications that preclude the indication for TM, and hence a potentially harmful intervention. This propensity to modify behaviour, was seen in both groups, regardless of their initial tendency to use the LCPR.

  1. Interactive Synthesis of Code Level Security Rules

    Science.gov (United States)

    2017-04-01

    providing valid, invalid, and random inputs to a program and testing its behavior for exceptions or crashes. Examples include American Fuzzy lop [55] and...semantic cross-checking. In 25th USENIX Security Symposium (USENIX Security 16), pages 363–378. USENIX Association. [55] M. Zalewski. American fuzzy lop

  2. Dress Codes for Teachers?

    Science.gov (United States)

    Million, June

    2004-01-01

    In this article, the author discusses an e-mail survey of principals from across the country regarding whether or not their school had a formal staff dress code. The results indicate that most did not have a formal dress code, but agreed that professional dress for teachers was not only necessary, but showed respect for the school and had a…

  3. Stellar populations of galaxies in the ALHAMBRA survey up to $z \\sim 1$. I. MUFFIT: A Multi-Filter Fitting code for stellar population diagnostics

    CERN Document Server

    Díaz-García, L A; López-Sanjuan, C; Ferreras, I; Varela, J; Viironen, K; Cristóbal-Hornillos, D; Moles, M; Marín-Franch, A; Arnalte-Mur, P; Ascaso, B; Cerviño, M; González-Delgado, R M; Márquez, I; Masegosa, J; Molino, A; Pović, M; Alfaro, E; Aparicio-Villegas, T; Benítez, N; Broadhurst, T; Cabrera-Caño, J; Castander, F J; Fernández-Soto, A; Husillos, C; Infante, L; Aguerri, J A L; Martínez, V J; del Olmo, A; Perea, J; Prada, F; Quintana, J M

    2015-01-01

    We present MUFFIT, a new generic code optimized to retrieve the main stellar population parameters of galaxies in photometric multi-filter surveys, and we check its reliability and feasibility with real galaxy data from the ALHAMBRA survey. Making use of an error-weighted $\\chi^2$-test, we compare the multi-filter fluxes of galaxies with the synthetic photometry of mixtures of two single stellar populations at different redshifts and extinctions, to provide through a Monte Carlo method the most likely range of stellar population parameters (mainly ages and metallicities), extinctions, redshifts, and stellar masses. To improve the diagnostic reliability, MUFFIT identifies and removes from the analysis those bands that are significantly affected by emission lines. We highlight that the retrieved age-metallicity locus for a sample of $z \\le 0.22$ early-type galaxies in ALHAMBRA at different stellar mass bins are in very good agreement with the ones from SDSS spectroscopic diagnostics. Moreover, a one-to-one comp...

  4. Health App Use Among Individuals With Symptoms of Depression and Anxiety: A Survey Study With Thematic Coding.

    Science.gov (United States)

    Rubanovich, Caryn Kseniya; Mohr, David C; Schueller, Stephen M

    2017-06-23

    Researchers have largely turned to commercial app stores, randomized trials, and systematic reviews to make sense of the mHealth landscape. Few studies have approached understanding by collecting information from target end users. The end user perspective is critical as end user interest in and use of mHealth technologies will ultimately drive the efficacy of these tools. The purpose of this study was to obtain information from end users of mHealth technologies to better understand the physical and mental health apps people use and for what purposes. People with depressive or anxious symptoms (N=176) seeking entry into a trial of mental health and well-being apps for Android devices completed online questionnaires assessing depression and anxiety (Patient Health Questionnaire-9 and Generalized Anxiety Disorder-7), past and current mental health treatment-seeking behavior, overall mobile device use, and use of mobile health apps. Participants reported the physical health and mental health apps on their devices and their reasons for using them. Data were extracted from the participant self-reports and apps and app purposes were coded in order to categorize them. Participants were largely white, middle-aged females from the Midwest region of the United States recruited via a health care organization and Web-based advertising (135 female, 41 male, mean age 38.64 years, age range 19-75 years.) Over three-quarters (137/176, 77.8%) of participants indicated having a health app on their device. The top 3 kinds of apps were exercise, fitness, and pedometers or heart rate monitoring apps (93/176, 52.8%); diet, food, or calorie counting apps (65/177, 36.9%); and mental health/wellness apps (46/177, 26.1%). The mean number of mobile physical and mental health apps on a participant's phone was 2.15 (SD 3.195). Of 176 participants, 107 (60.8%) specifically reported the top 5 health apps that they used and their purposes. Across the 107 participants, a total of 285 apps were

  5. 15 CFR 806.17 - Rules and regulations for BE-12, 2007 Benchmark Survey of Foreign Direct Investment in the United...

    Science.gov (United States)

    2010-01-01

    ... Benchmark Survey of Foreign Direct Investment in the United States. 806.17 Section 806.17 Commerce and... Survey of Foreign Direct Investment in the United States. A BE-12, Benchmark Survey of Foreign Direct... of the BE-12, 2007 Benchmark Survey of Foreign Direct Investment in the United States, contained...

  6. SURVEY

    DEFF Research Database (Denmark)

    SURVEY er en udbredt metode og benyttes inden for bl.a. samfundsvidenskab, humaniora, psykologi og sundhedsforskning. Også uden for forskningsverdenen er der mange organisationer som f.eks. konsulentfirmaer og offentlige institutioner samt marketingsafdelinger i private virksomheder, der arbejder...... med surveys. Denne bog gennemgår alle surveyarbejdets faser og giver en praktisk indføring i: • design af undersøgelsen og udvælgelse af stikprøver, • formulering af spørgeskemaer samt indsamling og kodning af data, • metoder til at analysere resultaterne...

  7. A DNA barcode-based survey of terrestrial arthropods in the Society Islands of French Polynesia: host diversity within the SymbioCode Project

    Directory of Open Access Journals (Sweden)

    Thibault Ramage

    2017-02-01

    Full Text Available We report here on the taxonomic and molecular diversity of 10 929 terrestrial arthropod specimens, collected on four islands of the Society Archipelago, French Polynesia. The survey was part of the ‘SymbioCode Project’ that aims to establish the Society Islands as a natural laboratory in which to investigate the flux of bacterial symbionts (e.g., Wolbachia and other genetic material among branches of the arthropod tree. The sample includes an estimated 1127 species, of which 1098 included at least one DNA-barcoded specimen and 29 were identified to species level using morphological traits only. Species counts based on molecular data emphasize that some groups have been understudied in this region and deserve more focused taxonomic effort, notably Diptera, Lepidoptera and Hymenoptera. Some taxa that were also subjected to morphological scrutiny reveal a consistent match between DNA and morphology-based species boundaries in 90% of the cases, with a larger than expected genetic diversity in the remaining 10%. Many species from this sample are new to this region or are undescribed. Some are under description, but many await inspection by motivated experts, who can use the online images or request access to ethanol-stored specimens.

  8. Importance of Building Code

    Directory of Open Access Journals (Sweden)

    Reshmi Banerjee

    2015-06-01

    Full Text Available A building code, or building control, is a set of rules that specify the minimum standards for constructed objects such as buildings and non building structures. The main purpose of building codes are to protect public health, safety and general welfare as they relate to the construction and occupancy of buildings and structures. The building code becomes law of a particular jurisdiction when formally enacted by the appropriate governmental or private authority. Building codes are generally intended to be applied by architects, engineers, constructors and regulators but are also used for various purposes by safety inspectors, environmental scientists, real estate developers, subcontractors, manufacturers of building products and materials, insurance companies, facility managers, tenants and others.

  9. 75 FR 12803 - Fingerprint Submission Requirements Rule

    Science.gov (United States)

    2010-03-17

    ...Notice of the Compact Council's establishment of a process for initiating noncriminal justice criminal history record checks during times of emergencies and disasters under the authority of the Fingerprint Submission Requirements Rule, title 28 Code of Federal Regulations (CFR), part...

  10. Schrödinger's code-script: not a genetic cipher but a code of development.

    Science.gov (United States)

    Walsby, A E; Hodge, M J S

    2017-06-01

    In his book What is Life? Erwin Schrödinger coined the term 'code-script', thought by some to be the first published suggestion of a hereditary code and perhaps a forerunner of the genetic code. The etymology of 'code' suggests three meanings relevant to 'code-script which we distinguish as 'cipher-code', 'word-code' and 'rule-code'. Cipher-codes and word-codes entail translation of one set of characters into another. The genetic code comprises not one but two cipher-codes: the first is the DNA 'base-pairing cipher'; the second is the 'nucleotide-amino-acid cipher', which involves the translation of DNA base sequences into amino-acid sequences. We suggest that Schrödinger's code-script is a form of 'rule-code', a set of rules that, like the 'highway code' or 'penal code', requires no translation of a message. Schrödinger first relates his code-script to chromosomal genes made of protein. Ignorant of its properties, however, he later abandons 'protein' and adopts in its place a hypothetical, isomeric 'aperiodic solid' whose atoms he imagines rearranged in countless different conformations, which together are responsible for the patterns of ontogenetic development. In an attempt to explain the large number of combinations required, Schrödinger referred to the Morse code (a cipher) but in doing so unwittingly misled readers into believing that he intended a cipher-code resembling the genetic code. We argue that the modern equivalent of Schrödinger's code-script is a rule-code of organismal development based largely on the synthesis, folding, properties and interactions of numerous proteins, each performing a specific task. Copyright © 2016. Published by Elsevier Ltd.

  11. Genome-Wide Survey of Nuclear Protein-Coding Markers for Beetle Phylogenetics and Their Application in Resolving both Deep and Shallow-Level Divergences.

    Science.gov (United States)

    Che, Li-Heng; Zhang, Shao-Qian; Li, Yun; Liang, Dan; Pang, Hong; Ślipiński, Adam; Zhang, Peng

    2017-03-03

    Beetles (Coleoptera) are the most diverse and species-rich insect group, representing an impressive explosive radiation in the evolutionary history of insects, and their evolutionary relationships are often difficult to resolve. The amount of "traditional markers" (e.g., mitochondrial genes and nuclear rDNAs) for beetle phylogenetics is small and these markers often lack sufficient signals in resolving relationships for such a rapidly radiating lineage. Here, based on the available genome data of beetles and other related insect species, we performed a genome-wide survey to search nuclear protein-coding (NPC) genes suitable for research on beetle phylogenetics. As a result, we identified 1470 candidate loci, which provided a valuable data resource to the beetle evolutionary research community for NPC marker development. We randomly chose 180 candidate loci from the database to design primers and successfully developed 95 NPC markers which can be PCR amplified from standard genomic DNA extracts. These new nuclear markers are universally applicable across Coleoptera, with an average amplification success rate of 90%. To test the phylogenetic utility, we used them to investigate the backbone phylogeny of Coleoptera (18 families sampled) and the family Coccinellidae (39 species sampled). Both phylogenies are well resolved (average bootstrap support > 95%), showing that our markers can be used to address phylogenetic questions of various evolutionary depth (from species level to family level). In general, the newly developed nuclear markers are much easier to use and more phylogenetically informative than the "traditional markers", and show great potential to expedite resolution of many parts in the Beetle Tree of Life. This article is protected by copyright. All rights reserved.

  12. Best Practice Rules about Conflict of Interest

    Institute of Scientific and Technical Information of China (English)

    王昊

    2011-01-01

    @@ 1.Study and describe the Best Practice Rules of the Dutch Corporate Governance Code concerning conflict of Interest Best Practice Rules coIne from the UK corporate governance,which could prevent the worst cases of abuse of rights in company law.

  13. 76 FR 36231 - American Society of Mechanical Engineers (ASME) Codes and New and Revised ASME Code Cases

    Science.gov (United States)

    2011-06-21

    ... Engineers (ASME) Codes and New and Revised ASME Code Cases; Final Rule #0;#0;Federal Register / Vol. 76 , No... 50 RIN 3150-AI35 American Society of Mechanical Engineers (ASME) Codes and New and Revised ASME Code... 2004 ASME Boiler and Pressure Vessel Code, Section III, Division 1; 2007 ASME Boiler and...

  14. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  15. 49 CFR 1152.60 - Special rules.

    Science.gov (United States)

    2010-10-01

    ... OF TRANSPORTATION RULES OF PRACTICE ABANDONMENT AND DISCONTINUANCE OF RAIL LINES AND RAIL... name), which traverses through ___ (ZIP Codes) United States Postal Service ZIP Codes, a distance of... condition and any request for trail use/rail banking will be due no later than 20 days after notice of the...

  16. Collaboration rules.

    Science.gov (United States)

    Evans, Philip; Wolf, Bob

    2005-01-01

    Corporate leaders seeking to boost growth, learning, and innovation may find the answer in a surprising place: the Linux open-source software community. Linux is developed by an essentially volunteer, self-organizing community of thousands of programmers. Most leaders would sell their grandmothers for workforces that collaborate as efficiently, frictionlessly, and creatively as the self-styled Linux hackers. But Linux is software, and software is hardly a model for mainstream business. The authors have, nonetheless, found surprising parallels between the anarchistic, caffeinated, hirsute world of Linux hackers and the disciplined, tea-sipping, clean-cut world of Toyota engineering. Specifically, Toyota and Linux operate by rules that blend the self-organizing advantages of markets with the low transaction costs of hierarchies. In place of markets' cash and contracts and hierarchies' authority are rules about how individuals and groups work together (with rigorous discipline); how they communicate (widely and with granularity); and how leaders guide them toward a common goal (through example). Those rules, augmented by simple communication technologies and a lack of legal barriers to sharing information, create rich common knowledge, the ability to organize teams modularly, extraordinary motivation, and high levels of trust, which radically lowers transaction costs. Low transaction costs, in turn, make it profitable for organizations to perform more and smaller transactions--and so increase the pace and flexibility typical of high-performance organizations. Once the system achieves critical mass, it feeds on itself. The larger the system, the more broadly shared the knowledge, language, and work style. The greater individuals' reputational capital, the louder the applause and the stronger the motivation. The success of Linux is evidence of the power of that virtuous circle. Toyota's success is evidence that it is also powerful in conventional companies.

  17. Rule, Britannia

    DEFF Research Database (Denmark)

    Christensen, Jørgen Riber

    2011-01-01

    Thomas Arne’s The Masque of Alfred (1740) with a libretto by James Thomson and David Mallet was written and performed in the historical context of George II’s reign where a kind of constitutional monarchy based on the Bill of Rights from 1689 was granting civil rights to the early bourgeoisie...... of the Proms, and this article considers it as a global real-time media event. “Rule, Britannia!” is placed in the contexts of political history, cultural history and experience economy....

  18. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  19. Nonzero Solubility Rule

    Institute of Scientific and Technical Information of China (English)

    尉志武; 周蕊; 刘芸

    2002-01-01

    A solubility-related rule, nonzero solubility rule, is introduced in this paper. It is complementary to the existing rules such as the "like dissolves like" rule and can be understood on the basis of classical chemical thermodynamics.

  20. Three Paradigms for Mixing Coding and Games: Coding in a Game, Coding as a Game, and Coding for a Game

    OpenAIRE

    2015-01-01

    Games for teaching coding have been an educational holy grail since at least the early 1980s. Yet for decades, with games more popular than ever and with the need to teach kids coding having been well-recognized, no blockbuster coding games have arisen (see Chapter 2). Over the years, the research community has made various games for teaching computer science: a survey made by shows that most do not teach coding, and of the ones that do teach coding, most are research prototypes (not produc...

  1. Holographic codes

    CERN Document Server

    Latorre, Jose I

    2015-01-01

    There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

  2. [Bioethics in the new Argentinian Civil and Commercial Code].

    Science.gov (United States)

    Bergel, Salvador Darío

    2015-01-01

    Argentine has a new Civil and Commercial Code that will enter into force in August. This Code contains a series of rules relating to bioethics that have served to illustrate a brief comment on its contents.

  3. Sharing code

    OpenAIRE

    Kubilius, Jonas

    2014-01-01

    Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  4. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...

  5. Polar Codes

    Science.gov (United States)

    2014-12-01

    QPSK Gaussian channels . .......................................................................... 39 vi 1. INTRODUCTION Forward error correction (FEC...Capacity of BSC. 7 Figure 5. Capacity of AWGN channel . 8 4. INTRODUCTION TO POLAR CODES Polar codes were introduced by E. Arikan in [1]. This paper...Under authority of C. A. Wilgenbusch, Head ISR Division EXECUTIVE SUMMARY This report describes the results of the project “More reliable wireless

  6. Atlas C++ Coding Standard Specification

    CERN Document Server

    Albrand, S; Barberis, D; Bosman, M; Jones, B; Stavrianakou, M; Arnault, C; Candlin, D; Candlin, R; Franck, E; Hansl-Kozanecka, Traudl; Malon, D; Qian, S; Quarrie, D; Schaffer, R D

    2001-01-01

    This document defines the ATLAS C++ coding standard, that should be adhered to when writing C++ code. It has been adapted from the original "PST Coding Standard" document (http://pst.cern.ch/HandBookWorkBook/Handbook/Programming/programming.html) CERN-UCO/1999/207. The "ATLAS standard" comprises modifications, further justification and examples for some of the rules in the original PST document. All changes were discussed in the ATLAS Offline Software Quality Control Group and feedback from the collaboration was taken into account in the "current" version.

  7. Translating Answers to Open-Ended Survey Questions in Cross-Cultural Research: A Case Study on the Interplay between Translation, Coding, and Analysis

    Science.gov (United States)

    Behr, Dorothée

    2015-01-01

    Open-ended probing questions in cross-cultural surveys help uncover equivalence problems in cross-cultural survey research. For languages that a project team does not understand, probe answers need to be translated into a common project language. This article presents a case study on translating open-ended, that is, narrative answers. It describes…

  8. The Formal Approach to Computer Game Rule Development Automation

    OpenAIRE

    Elena, A

    2009-01-01

    Computer game rules development is one of the weakly automated tasks in game development. This paper gives an overview of the ongoing research project which deals with automation of rules development for turn-based strategy computer games. Rules are the basic elements of these games. This paper proposes a new approach to automation including visual formal rules model creation, model verification and modelbased code generation.

  9. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, however, that national views of good governance reflect different political cultures and institutional heritages. Fourteen national codes of conduct are analyzed. The findings suggest that public values converge and that they match model codes from the United Nations and the European Council as well...... as conceptions of good governance from other international organizations. While values converge, they are balanced and communicated differently, and seem to some extent to be translated into the national cultures. The set of global public values derived from this analysis include public interest, regime dignity...

  10. Organisational Rules in Schools: Teachers' Opinions about Functions of Rules, Rule-Following and Breaking Behaviours in Relation to Their Locus of Control

    Science.gov (United States)

    Demirkasimoglu, Nihan; Aydin, Inayet; Erdogan, Cetin; Akin, Ugur

    2012-01-01

    The main aim of this research is to examine teachers' opinions about functions of school rules, reasons for rule-breaking and results of rule-breaking in relation to their locus of control, gender, age, seniority and branch. 350 public elementary school teachers in Ankara are included in the correlational survey model study. According to the…

  11. Survey of the Pineapple Mealybugs and Their Occurrence Rule in China%菠萝粉蚧种类调查及发生规律研究

    Institute of Scientific and Technical Information of China (English)

    何衍彪; 詹儒林; 刘映红; 孙光明; 李国平; 赵艳龙

    2013-01-01

    菠萝粉蚧是为害菠萝的粉蚧的统称,是菠萝凋萎病的主要传播媒介,本文对我国菠萝粉蚧的种类和发生规律进行了研究.结果表明:在我国,为害菠萝的粉蚧主要是菠萝洁粉蚧,仅在海南乐东菠萝园发现有新菠萝灰粉蚧危害;菠萝洁粉蚧目前仅限在菠萝上为害;新菠萝灰粉蚧主要为害剑麻,也为害菠萝和粉蕉;我国暂未发现2种粉蚧混合发生的现象.秋季是雷州半岛地区菠萝洁粉蚧自然种群快速增长期,12月下旬菠萝洁粉蚧自然种群数量进入高峰期;气温和降雨量是影响菠萝洁粉蚧自然种群增长的重要因子,高温、低温均不利于菠萝洁粉蚧生长和繁殖,降雨量对菠萝洁粉蚧的自然种群数量具有明显的抑制作用.%Pineapple mealybug is cosmopolitan pest of pineapple and the vector of mealybug wile of pineapple,which is a serious threat to commercial pineapple production.The identification and occurrence rule of Dysmicoccus spp.in China were studied in this paper.The results showed that the pink pineapple mealybug (PPM),Dysmicoccus brevipes was the main mealybug on pineapple in China,and only one pineapple orchard at Ledong in Hainan was found damaged by gray pineapple mealybug(GPM),Dysmicoccus neobrevipes.GPM is mostly addicted to Agave sisalana,but also found on Ananas comosus,and Musa nana occasionally.No complex occurrence of the two pineapple mealybugs was found in the investigation.The natural population of PPM developed fast in autumn,and reached the peak in December in Leichou Peninsula.Temperature and rainfall are the critical factors of population growth of PPM,cold and hot exposure are harmful to the growth and reproduction of PPM,and rainfall is obviously inhibitory on developing of the natural population of PPM.

  12. On Construction of Optimal A2-Codes

    Institute of Scientific and Technical Information of China (English)

    HU Lei

    2001-01-01

    Two authentication codes with arbitration (A2-codes) are constrructed from finite affine spaces to illustrate for the first time that the information-theoretic lower bounds for A2-codes can be strictly tighter than the combinatorial ones. The codes also illustrate that the conditional combinatorial lower bounds on numbers of encoding\\ decoding rules are not genuine ones. As an analogue of 3-dimensional case, an A2-code from 4-dimensional finite projective spaces is constructed, which neets both the information-theoretic and combinatorial lower bounds.

  13. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  14. 代码重用攻击与防御机制综述%A Survey of Code Reuse Attack and Defense Mechanisms

    Institute of Scientific and Technical Information of China (English)

    柳童; 史岗; 孟丹

    2016-01-01

    Due to the wide existence of vulnerabilities in computer programs such as C and C++, computer systems is vulnerable to be tampered by adversary changing the original running states. Researchers have made great efforts and take some effective protection mechanisms, for instance, Data Execution Prevention and Address Space Layout Randomization. These security mechanisms have a great effect against the primitive attack patterns like code-injection attack. However, the security of computer system is still not optimistic. Though the adversary could not inject their own codes into the memory then run them ever again, they began to use the original benign codes in the memory, manipulate them to achieve mali-cious purpose by changing their order of operating, which is called code-reuse attack. And it is able to bypass a variety of security mechanisms of commodity computer systems, thus it has become a major threat and the main pattern of hacking. For this reason, researches about code-reuse attack have been taken up in recent years. This paper illustrates the origin of code-reuse attack and achieved way of attack, summarizes the existing defense mechanisms and simply evaluates these defense mechanisms systematically. Meanwhile, this paper analyzes briefly the basic reason of code reuse attack and puts forward an new idea of defense mechanism designing.%由于C与C++等计算机程序中广泛存在的漏洞,攻击者可以通过这些漏洞读取或篡改内存中的数据,改变计算机程序原有的执行状态达到破坏的目的。为此研究者进行了不懈地努力并采取了一些卓有成效的保护机制,例如数据不可执行与内存布局随机化,这些防御机制对于早期的代码注入攻击起到了极好的防御效果,然而计算机系统的安全性依然不容乐观。攻击者在无法通过向内存中注入自己的代码并执行的方式完成攻击后,开始利用内存中原有的代码,通过控制它们执行的

  15. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    ; alternatives to mainstream development, from performances of the live-coding scene to the organizational forms of commons-based peer production; the democratic promise of social media and their paradoxical role in suppressing political expression; and the market’s emptying out of possibilities for free...... development, Speaking Code unfolds an argument to undermine the distinctions between criticism and practice, and to emphasize the aesthetic and political aspects of software studies. Not reducible to its functional aspects, program code mirrors the instability inherent in the relationship of speech...... expression in the public realm. The book’s line of argument defends language against its invasion by economics, arguing that speech continues to underscore the human condition, however paradoxical this may seem in an era of pervasive computing....

  16. Source Code Plagiarism--A Student Perspective

    Science.gov (United States)

    Joy, M.; Cosma, G.; Yau, J. Y.-K.; Sinclair, J.

    2011-01-01

    This paper considers the problem of source code plagiarism by students within the computing disciplines and reports the results of a survey of students in Computing departments in 18 institutions in the U.K. This survey was designed to investigate how well students understand the concept of source code plagiarism and to discover what, if any,…

  17. Source Code Plagiarism--A Student Perspective

    Science.gov (United States)

    Joy, M.; Cosma, G.; Yau, J. Y.-K.; Sinclair, J.

    2011-01-01

    This paper considers the problem of source code plagiarism by students within the computing disciplines and reports the results of a survey of students in Computing departments in 18 institutions in the U.K. This survey was designed to investigate how well students understand the concept of source code plagiarism and to discover what, if any,…

  18. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  19. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe...... the codes succinctly using Gröbner bases....

  20. 77 FR 18716 - Transportation Security Administration Postal Zip Code Change; Technical Amendment

    Science.gov (United States)

    2012-03-28

    ... Postal Zip Code Change; Technical Amendment AGENCY: Transportation Security Administration, DHS. ACTION: Final rule. SUMMARY: This rule is a technical change to correct a regulatory reference to TSA's postal zip code. This rule revises existing regulations to reflect organizational changes and it has no...

  1. Response to FESAC survey, non-fusion connections to Fusion Energy Sciences. Applications of the FES-supported beam and plasma simulation code, Warp

    Energy Technology Data Exchange (ETDEWEB)

    Friedman, A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Grote, D. P. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Vay, J. L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-05-29

    The Fusion Energy Sciences Advisory Committee’s subcommittee on non-fusion applications (FESAC NFA) is conducting a survey to obtain information from the fusion community about non-fusion work that has resulted from their DOE-funded fusion research. The subcommittee has requested that members of the community describe recent developments connected to the activities of the DOE Office of Fusion Energy Sciences. Two questions in particular were posed by the subcommittee. This document contains the authors’ responses to those questions.

  2. Total Station Coding Method Application in the Surveying the Vertical Side of Building%全站仪编码法在建筑物立面测量中的应用

    Institute of Scientific and Technical Information of China (English)

    史经; 曾庆连

    2013-01-01

    Total station coding method is proposed in this paper is the elevation measurement , measuring without prism according to a certain coding rules by using total station ,the 3 D coordinates of feature points collection building fa-cade,the data processing program ,the 3D coordinates acquisition conversion two-dimensional coordinates for distance and elevation ,display the orthographic projection elevation plot automatic visual the elements of drawing ,editing,size de-scription tagging and cartouche process , complete the whole process of elevation measurement .The elevation measure-ment has not contact,fast,simple operation,direct point.%全站仪编码法立面测量,是利用全站仪免棱镜测距技术按一定的编码法则,采集建筑立面特征点三维坐标,再由数据处理程序,将采集的三维坐标转换为距离和高程组成的二维坐标,自动直观的显示正射投影的立面展点图,最后经要素绘编、尺寸说明标注和图廓整饰等流程,完成立面测量的全过程。这种立面测量方法具有可不接触、快速、操作简单和展点直观等优点。

  3. Survey of fountain codes in underwater acoustic sensor networks%水声网络中喷泉码的应用研究现状与发展前景

    Institute of Scientific and Technical Information of China (English)

    赵旦峰; 梁明糰; 段晋珏

    2014-01-01

    水声传感器网络能够在一定范围内实现信息的传输和处理,是实现海洋数据收集、污染监测、军事侦察等水下应用的重要途径。然而水声信道固有的时空频变参数以及窄带、高噪、长时延等特征,使得构建鲁棒性水声网络面临巨大挑战。基于数字喷泉码的数据传输模式不需要有序的数据序列,从而简化了网络中数据传输方式,使得喷泉码成为一类适用于水声网络可靠通信的有效编码技术。综述了数字喷泉码的算法原理及研究现状,探讨了数字喷泉码在水声网络中的研究应用,最后对喷泉码在水声网络中的研究方向及发展前景进行展望。%Underwater acoustic sensor networks (UASNs)can transport and manage information in a spe-cific range and become a key route to achieve underwater applications such as ocean data acquisition,pollution monitoring and military reconnaissance.However,the underwater acoustic channel is labeled with some inher-ent characteristics such as space-time-frequency variable parameters,narrow band,high noise and long time de-lay,posing a huge challenge in structuring robust UASNs.Digital fountain codes-based data transmission para-digm obviates the need for ordered data and simplifies data delivery as a result,making fountain codes a kind of efficient coding technique applied to reliable communication in UASNs.This paper surveys the algorithm theory and research status of fountain codes,discusses its applications in UASNs and makes prospect of fountain codes on research directions and potential applications in UASNs in the end.

  4. The Defects of WTO Anti-Dumping Rules and Related Reform

    Institute of Scientific and Technical Information of China (English)

    Xiao Wenhong

    2008-01-01

    @@ Since Canada made the first anti-dumping code in 1904, United States, Australia and France made their domestic anti-dumping codes successively.In 1947,the contracting parties made anti-dumping rules part of GATT (Article VI).

  5. Neural Codes: Firing Rates and beyond

    Science.gov (United States)

    Gerstner, Wulfram; Kreiter, Andreas K.; Markram, Henry; Herz, Andreas V. M.

    1997-11-01

    Computational neuroscience has contributed significantly to our understanding of higher brain function by combining experimental neurobiology, psychophysics, modeling, and mathematical analysis. This article reviews recent advances in a key area: neural coding and information processing. It is shown that synapses are capable of supporting computations based on highly structured temporal codes. Such codes could provide a substrate for unambiguous representations of complex stimuli and be used to solve difficult cognitive tasks, such as the binding problem. Unsupervised learning rules could generate the circuitry required for precise temporal codes. Together, these results indicate that neural systems perform a rich repertoire of computations based on action potential timing.

  6. PARAVT: Parallel Voronoi tessellation code

    Science.gov (United States)

    González, R. E.

    2016-10-01

    In this study, we present a new open source code for massive parallel computation of Voronoi tessellations (VT hereafter) in large data sets. The code is focused for astrophysical purposes where VT densities and neighbors are widely used. There are several serial Voronoi tessellation codes, however no open source and parallel implementations are available to handle the large number of particles/galaxies in current N-body simulations and sky surveys. Parallelization is implemented under MPI and VT using Qhull library. Domain decomposition takes into account consistent boundary computation between tasks, and includes periodic conditions. In addition, the code computes neighbors list, Voronoi density, Voronoi cell volume, density gradient for each particle, and densities on a regular grid. Code implementation and user guide are publicly available at https://github.com/regonzar/paravt.

  7. Building Codes

    DEFF Research Database (Denmark)

    Rindel, Jens Holger; Rasmussen, Birgit

    1996-01-01

    A state-of-the-art survey concerning acoustic conditions in dwellings has been carried out in 1994. A review of existing investigations related to subjective and/or objective evaluation of dwellings was done, and several countries were contacted to get up-to-date information about the legal...

  8. Building Codes

    DEFF Research Database (Denmark)

    Rindel, Jens Holger; Rasmussen, Birgit

    1996-01-01

    A state-of-the-art survey concerning acoustic conditions in dwellings has been carried out in 1994. A review of existing investigations related to subjective and/or objective evaluation of dwellings was done, and several countries were contacted to get up-to-date information about the legal acous...

  9. NOVEL BIPHASE CODE -INTEGRATED SIDELOBE SUPPRESSION CODE

    Institute of Scientific and Technical Information of China (English)

    Wang Feixue; Ou Gang; Zhuang Zhaowen

    2004-01-01

    A kind of novel binary phase code named sidelobe suppression code is proposed in this paper. It is defined to be the code whose corresponding optimal sidelobe suppression filter outputs the minimum sidelobes. It is shown that there do exist sidelobe suppression codes better than the conventional optimal codes-Barker codes. For example, the sidelobe suppression code of length 11 with filter of length 39 has better sidelobe level up to 17dB than that of Barker code with the same code length and filter length.

  10. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  11. Deductive Glue Code Synthesis for Embedded Software Systems Based on Code Patterns

    Science.gov (United States)

    Liu, Jian; Fu, Jicheng; Zhang, Yansheng; Bastani, Farokh; Yen, I-Ling; Tai, Ann; Chau, Savio N.

    2006-01-01

    Automated code synthesis is a constructive process that can be used to generate programs from specifications. It can, thus, greatly reduce the software development cost and time. The use of formal code synthesis approach for software generation further increases the dependability of the system. Though code synthesis has many potential benefits, the synthesis techniques are still limited. Meanwhile, components are widely used in embedded system development. Applying code synthesis to component based software development (CBSD) process can greatly enhance the capability of code synthesis while reducing the component composition efforts. In this paper, we discuss the issues and techniques for applying deductive code synthesis techniques to CBSD. For deductive synthesis in CBSD, a rule base is the key for inferring appropriate component composition. We use the code patterns to guide the development of rules. Code patterns have been proposed to capture the typical usages of the components. Several general composition operations have been identified to facilitate systematic composition. We present the technique for rule development and automated generation of new patterns from existing code patterns. A case study of using this method in building a real-time control system is also presented.

  12. Bonnet Ruled Surfaces

    Institute of Scientific and Technical Information of China (English)

    Filiz KANBAY

    2005-01-01

    We consider the Bonnet ruled surfaces which admit only one non-trivial isometry that preserves the principal curvatures. We determine the Bonnet ruled surfaces whose generators and orthogonal trajectories form a special net called an A-net.

  13. Cosmological diagrammatic rules

    CERN Document Server

    Giddings, Steven B

    2010-01-01

    A simple set of diagrammatic rules is formulated for perturbative evaluation of ``in-in" correlators, as is needed in cosmology and other nonequilibrium problems. These rules are both intuitive, and efficient for calculational purposes.

  14. Cosmological diagrammatic rules

    Energy Technology Data Exchange (ETDEWEB)

    Giddings, Steven B. [Department of Physics, University of California, Santa Barbara, CA 93106 (United States); Sloth, Martin S., E-mail: giddings@physics.ucsb.edu, E-mail: sloth@cern.ch [CERN, Physics Department, Theory Unit, CH-1211 Geneva 23 (Switzerland)

    2010-07-01

    A simple set of diagrammatic rules is formulated for perturbative evaluation of ''in-in'' correlators, as is needed in cosmology and other nonequilibrium problems. These rules are both intuitive, and efficient for calculational purposes.

  15. Phonological reduplication in sign language: rules rule

    Directory of Open Access Journals (Sweden)

    Iris eBerent

    2014-06-01

    Full Text Available Productivity—the hallmark of linguistic competence—is typically attributed to algebraic rules that support broad generalizations. Past research on spoken language has documented such generalizations in both adults and infants. But whether algebraic rules form part of the linguistic competence of signers remains unknown. To address this question, here we gauge the generalization afforded by American Sign Language (ASL. As a case study, we examine reduplication (X→XX—a rule that, inter alia, generates ASL nouns from verbs. If signers encode this rule, then they should freely extend it to novel syllables, including ones with features that are unattested in ASL. And since reduplicated disyllables are preferred in ASL, such rule should favor novel reduplicated signs. Novel reduplicated signs should thus be preferred to nonreduplicative controls (in rating, and consequently, such stimuli should also be harder to classify as nonsigns (in the lexical decision task. The results of four experiments support this prediction. These findings suggest that the phonological knowledge of signers includes powerful algebraic rules. The convergence between these conclusions and previous evidence for phonological rules in spoken language suggests that the architecture of the phonological mind is partly amodal.

  16. Systematic survey on the prevalence of genes coding for staphylococcal enterotoxins SElM, SElO, and SElN.

    Science.gov (United States)

    Becker, Karsten; Friedrich, Alexander W; Peters, Georg; von Eiff, Christof

    2004-12-01

    Staphylococcus aureus remains a leading cause of food-poisoning with substantial impact on public health. Using a multiplex polymerase chain reaction-DNA enzyme immunoassay (PCR-DEIA), we studied the presence of genes encoding staphylococcal enterotoxin-like (SEl) superantigens sem, sen, and seo, associated with the enterotoxin gene cluster (egc), in 429 clinical Staphylococcus aureus isolates. 294 (68.5%) isolates tested positive for at least one of the three SEl genes. In contrast to the fixed gene combination seg/sei also located on egc, a substantial number of isolates (n = 108) were found to bear only one or two of the genes encoding SElM, SElN, and SElO. Regarding the origin of the S. aureus isolates, a significant difference (P = 0.022) was found for the possession of seo (61.2% of blood isolates versus 42.9% of nasal strains). Also sem (not significantly) was found more common in blood isolates (52.1% versus 40.5%). The survey of the newly described SEl genes sem-seo supports the concept that most clinical S. aureus isolates harbor subsets of pyrogenic toxin superantigens. The potential contribution of seo and sem to the pathogenic potential of S. aureus has to be further evaluated.

  17. Parton model sum rules

    CERN Document Server

    Hinchliffe, Ian; Hinchliffe, Ian; Kwiatkowski, Axel

    1996-01-01

    This review article discusses the experimental and theoretical status of various Parton Model sum rules. The basis of the sum rules in perturbative QCD is discussed. Their use in extracting the value of the strong coupling constant is evaluated and the failure of the naive version of some of these rules is assessed.

  18. Modifying Intramural Rules.

    Science.gov (United States)

    Rokosz, Francis M.

    1981-01-01

    Standard sports rules can be altered to improve the game for intramural participants. These changes may improve players' attitudes, simplify rules for officials, and add safety features to a game. Specific rule modifications are given for volleyball, football, softball, floor hockey, basketball, and soccer. (JN)

  19. A genome-wide survey of highly expressed non-coding RNAs and biological validation of selected candidates in Agrobacterium tumefaciens.

    Directory of Open Access Journals (Sweden)

    Keunsub Lee

    Full Text Available Agrobacterium tumefaciens is a plant pathogen that has the natural ability of delivering and integrating a piece of its own DNA into plant genome. Although bacterial non-coding RNAs (ncRNAs have been shown to regulate various biological processes including virulence, we have limited knowledge of how Agrobacterium ncRNAs regulate this unique inter-Kingdom gene transfer. Using whole transcriptome sequencing and an ncRNA search algorithm developed for this work, we identified 475 highly expressed candidate ncRNAs from A. tumefaciens C58, including 101 trans-encoded small RNAs (sRNAs, 354 antisense RNAs (asRNAs, 20 5' untranslated region (UTR leaders including a RNA thermosensor and 6 riboswitches. Moreover, transcription start site (TSS mapping analysis revealed that about 51% of the mapped mRNAs have 5' UTRs longer than 60 nt, suggesting that numerous cis-acting regulatory elements might be encoded in the A. tumefaciens genome. Eighteen asRNAs were found on the complementary strands of virA, virB, virC, virD, and virE operons. Fifteen ncRNAs were induced and 7 were suppressed by the Agrobacterium virulence (vir gene inducer acetosyringone (AS, a phenolic compound secreted by the plants. Interestingly, fourteen of the AS-induced ncRNAs have putative vir box sequences in the upstream regions. We experimentally validated expression of 36 ncRNAs using Northern blot and Rapid Amplification of cDNA Ends analyses. We show functional relevance of two 5' UTR elements: a RNA thermonsensor (C1_109596F that may regulate translation of the major cold shock protein cspA, and a thi-box riboswitch (C1_2541934R that may transcriptionally regulate a thiamine biosynthesis operon, thiCOGG. Further studies on ncRNAs functions in this bacterium may provide insights and strategies that can be used to better manage pathogenic bacteria for plants and to improve Agrobacterum-mediated plant transformation.

  20. Good Codes From Generalised Algebraic Geometry Codes

    CERN Document Server

    Jibril, Mubarak; Ahmed, Mohammed Zaki; Tjhai, Cen

    2010-01-01

    Algebraic geometry codes or Goppa codes are defined with places of degree one. In constructing generalised algebraic geometry codes places of higher degree are used. In this paper we present 41 new codes over GF(16) which improve on the best known codes of the same length and rate. The construction method uses places of small degree with a technique originally published over 10 years ago for the construction of generalised algebraic geometry codes.

  1. A cybernetic approach to the origin of the genetic coding mechanism. II. Formation of the code series.

    Science.gov (United States)

    Batchinsky, A G; Ratner, V A

    1976-08-01

    The sequential fulfillment of the principle of succession necessarily guides the main steps of the genetic code evolution to be reflected in its structure. The general scheme of the code series formation is proposed basing on the idea of "group coding" (Woese, 1970). The genetic code supposedly evolved by means of successive divergence of pra-ARS's loci, accompanied by increasing specification of recognition capacity of amino acids and triplets. The sense of codons had not been changed on any step of stochastic code evolution. The formulated rules for code series formation produce a code version, similar to the contemporary one. Based on these rules the scheme of pra-ARS's divergence is proposed resulting in the grouping of amino acids by their polarity and size. Later steps in the evolution of the genetic code were probably based on more detailed features of the amino acids (for example, on their functional similarities like their interchangeabilities in isofunctional proteins).

  2. Binary effectivity rules

    DEFF Research Database (Denmark)

    Keiding, Hans; Peleg, Bezalel

    2006-01-01

    is binary if it is rationalized by an acyclic binary relation. The foregoing result motivates our definition of a binary effectivity rule as the effectivity rule of some binary SCR. A binary SCR is regular if it satisfies unanimity, monotonicity, and independence of infeasible alternatives. A binary...... effectivity rule is regular if it is the effectivity rule of some regular binary SCR. We characterize completely the family of regular binary effectivity rules. Quite surprisingly, intrinsically defined von Neumann-Morgenstern solutions play an important role in this characterization...

  3. Code-Mixing and Code Switchingin The Process of Learning

    Directory of Open Access Journals (Sweden)

    Diyah Atiek Mustikawati

    2016-09-01

    Full Text Available This study aimed to describe a form of code switching and code mixing specific form found in the teaching and learning activities in the classroom as well as determining factors influencing events stand out that form of code switching and code mixing in question.Form of this research is descriptive qualitative case study which took place in Al Mawaddah Boarding School Ponorogo. Based on the analysis and discussion that has been stated in the previous chapter that the form of code mixing and code switching learning activities in Al Mawaddah Boarding School is in between the use of either language Java language, Arabic, English and Indonesian, on the use of insertion of words, phrases, idioms, use of nouns, adjectives, clauses, and sentences. Code mixing deciding factor in the learning process include: Identification of the role, the desire to explain and interpret, sourced from the original language and its variations, is sourced from a foreign language. While deciding factor in the learning process of code, includes: speakers (O1, partners speakers (O2, the presence of a third person (O3, the topic of conversation, evoke a sense of humour, and just prestige. The significance of this study is to allow readers to see the use of language in a multilingual society, especially in AL Mawaddah boarding school about the rules and characteristics variation in the language of teaching and learning activities in the classroom. Furthermore, the results of this research will provide input to the ustadz / ustadzah and students in developing oral communication skills and the effectiveness of teaching and learning strategies in boarding schools.

  4. APPLICATION OF CODES WITH NATURAL REDUNDANCY FOR INFORMATION PROTECTION

    Directory of Open Access Journals (Sweden)

    Jablonovsky Y. A.

    2014-04-01

    Full Text Available In the article we provide a survey of cryptographic systems on the basis of unjammable coding; we offer the aspect of codes with natural redundancy for the solution of a problem of simultaneous protection of the information and detection and correction of errors; the demonstration is resulted that codes with natural redundancy are group codes

  5. New Safety rules

    CERN Multimedia

    Safety Commission

    2008-01-01

    The revision of CERN Safety rules is in progress and the following new Safety rules have been issued on 15-04-2008: Safety Procedure SP-R1 Establishing, Updating and Publishing CERN Safety rules: http://cern.ch/safety-rules/SP-R1.htm; Safety Regulation SR-S Smoking at CERN: http://cern.ch/safety-rules/SR-S.htm; Safety Regulation SR-M Mechanical Equipment: http://cern.ch/safety-rules/SR-M.htm; General Safety Instruction GSI-M1 Standard Lifting Equipment: http://cern.ch/safety-rules/GSI-M1.htm; General Safety Instruction GSI-M2 Standard Pressure Equipment: http://cern.ch/safety-rules/GSI-M2.htm; General Safety Instruction GSI-M3 Special Mechanical Equipment: http://cern.ch/safety-rules/GSI-M3.htm. These documents apply to all persons under the Director General’s authority. All Safety rules are available at the web page: http://www.cern.ch/safety-rules The Safety Commission

  6. Action Rules Mining

    CERN Document Server

    Dardzinska, Agnieszka

    2013-01-01

    We are surrounded by data, numerical, categorical and otherwise, which must to be analyzed and processed to convert it into information that instructs, answers or aids understanding and decision making. Data analysts in many disciplines such as business, education or medicine, are frequently asked to analyze new data sets which are often composed of numerous tables possessing different properties. They try to find completely new correlations between attributes and show new possibilities for users.   Action rules mining discusses some of data mining and knowledge discovery principles and then describe representative concepts, methods and algorithms connected with action. The author introduces the formal definition of action rule, notion of a simple association action rule and a representative action rule, the cost of association action rule, and gives a strategy how to construct simple association action rules of a lowest cost. A new approach for generating action rules from datasets with numerical attributes...

  7. Overview of Recent Grid Codes for PV Power Integration

    DEFF Research Database (Denmark)

    Craciun, Bogdan-Ionut; Kerekes, Tamas; Sera, Dezso;

    2012-01-01

    and Distribution System Operators (DSOs) had to keep the safety and reliability of the network under strict rules and regulations. The aim of the paper is to realize a survey of recent Grid Codes (GC) and regulations for grid connected PV systems. The focus is on grid interface requirements, power quality concerns...... and Anti-Islanding (AI) issues regarding PV systems connected to low voltage (LV) and medium voltage (MV) levels of the network.......The challenge to bring down the cost of produced photovoltaic (PV) power had a major impact on the PV market and in consequence the grid operators experienced higher and higher PV power penetration. The growing share of this decentralized generation plants started to affect the grid stability...

  8. The Proteomic Code: a molecular recognition code for proteins

    Directory of Open Access Journals (Sweden)

    Biro Jan C

    2007-11-01

    Full Text Available Abstract Background The Proteomic Code is a set of rules by which information in genetic material is transferred into the physico-chemical properties of amino acids. It determines how individual amino acids interact with each other during folding and in specific protein-protein interactions. The Proteomic Code is part of the redundant Genetic Code. Review The 25-year-old history of this concept is reviewed from the first independent suggestions by Biro and Mekler, through the works of Blalock, Root-Bernstein, Siemion, Miller and others, followed by the discovery of a Common Periodic Table of Codons and Nucleic Acids in 2003 and culminating in the recent conceptualization of partial complementary coding of interacting amino acids as well as the theory of the nucleic acid-assisted protein folding. Methods and conclusions A novel cloning method for the design and production of specific, high-affinity-reacting proteins (SHARP is presented. This method is based on the concept of proteomic codes and is suitable for large-scale, industrial production of specifically interacting peptides.

  9. Reducing Computational Overhead of Network Coding with Intrinsic Information Conveying

    DEFF Research Database (Denmark)

    Heide, Janus; Zhang, Qi; Pedersen, Morten V.;

    is RLNC (Random Linear Network Coding) and the goal is to reduce the amount of coding operations both at the coding and decoding node, and at the same time remove the need for dedicated signaling messages. In a traditional RLNC system, coding operation takes up significant computational resources and adds......This paper investigated the possibility of intrinsic information conveying in network coding systems. The information is embedded into the coding vector by constructing the vector based on a set of predefined rules. This information can subsequently be retrieved by any receiver. The starting point...

  10. Space Time Codes from Permutation Codes

    CERN Document Server

    Henkel, Oliver

    2006-01-01

    A new class of space time codes with high performance is presented. The code design utilizes tailor-made permutation codes, which are known to have large minimal distances as spherical codes. A geometric connection between spherical and space time codes has been used to translate them into the final space time codes. Simulations demonstrate that the performance increases with the block lengths, a result that has been conjectured already in previous work. Further, the connection to permutation codes allows for moderate complex en-/decoding algorithms.

  11. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  12. Measuring interesting rules in Characteristic rule

    CERN Document Server

    Warnars, Spits

    2010-01-01

    Finding interesting rule in the sixth strategy step about threshold control on generalized relations in attribute oriented induction, there is possibility to select candidate attribute for further generalization and merging of identical tuples until the number of tuples is no greater than the threshold value, as implemented in basic attribute oriented induction algorithm. At this strategy step there is possibility the number of tuples in final generalization result still greater than threshold value. In order to get the final generalization result which only small number of tuples and can be easy to transfer into simple logical formula, the seventh strategy step about rule transformation is evolved where there will be simplification by unioning or grouping the identical attribute. Our approach to measure interesting rule is opposite with heuristic measurement approach by Fudger and Hamilton where the more complex concept hierarchies, more interesting results are likely to be found, but our approach the simple...

  13. Class Association Rule Pada Metode Associative Classification

    Directory of Open Access Journals (Sweden)

    Eka Karyawati

    2011-11-01

    Full Text Available Frequent patterns (itemsets discovery is an important problem in associative classification rule mining.  Differents approaches have been proposed such as the Apriori-like, Frequent Pattern (FP-growth, and Transaction Data Location (Tid-list Intersection algorithm. This paper focuses on surveying and comparing the state of the art associative classification techniques with regards to the rule generation phase of associative classification algorithms.  This phase includes frequent itemsets discovery and rules mining/extracting methods to generate the set of class association rules (CARs.  There are some techniques proposed to improve the rule generation method.  A technique by utilizing the concepts of discriminative power of itemsets can reduce the size of frequent itemset.  It can prune the useless frequent itemsets. The closed frequent itemset concept can be utilized to compress the rules to be compact rules.  This technique may reduce the size of generated rules.  Other technique is in determining the support threshold value of the itemset. Specifying not single but multiple support threshold values with regard to the class label frequencies can give more appropriate support threshold value.  This technique may generate more accurate rules. Alternative technique to generate rule is utilizing the vertical layout to represent dataset.  This method is very effective because it only needs one scan over dataset, compare with other techniques that need multiple scan over dataset.   However, one problem with these approaches is that the initial set of tid-lists may be too large to fit into main memory. It requires more sophisticated techniques to compress the tid-lists.

  14. Symmetrization Selection Rules, 2

    CERN Document Server

    Page, P R

    1996-01-01

    We introduce strong interaction selection rules for the two-body decay and production of hybrid and conventional mesons coupling to two S-wave hybrid or conventional mesons. The rules arise from symmetrization in states in the limit of non-relativistically moving quarks. The conditions under which hybrid coupling to S-wave states is suppressed are determined by the rules, and the nature of their breaking is indicated.

  15. Coding and Interpreting Movement on the Rorschach.

    Science.gov (United States)

    Holaday, Margot

    1996-01-01

    A survey of 26 Rorschach experts and 19 students of Rorschach use was conducted to help students using the Exner Comprehensive System determine whether to code movement for nouns with definitions that include movement. Experts and students did not reach agreement, but a literature review suggests such nouns should often be coded as movement. (SLD)

  16. Linguistic Valued Association Rules

    Institute of Scientific and Technical Information of China (English)

    LU Jian-jiang; QIAN Zuo-ping

    2002-01-01

    Association rules discovering and prediction with data mining method are two topics in the field of information processing. In this paper, the records in database are divided into many linguistic values expressed with normal fuzzy numbers by fuzzy c-means algorithm, and a series of linguistic valued association rules are generated. Then the records in database are mapped onto the linguistic values according to largest subject principle, and the support and confidence definitions of linguistic valued association rules are also provided. The discovering and prediction methods of the linguistic valued association rules are discussed through a weather example last.

  17. Strong Trinucleotide Circular Codes

    Directory of Open Access Journals (Sweden)

    Christian J. Michel

    2011-01-01

    Full Text Available Recently, we identified a hierarchy relation between trinucleotide comma-free codes and trinucleotide circular codes (see our previous works. Here, we extend our hierarchy with two new classes of codes, called DLD and LDL codes, which are stronger than the comma-free codes. We also prove that no circular code with 20 trinucleotides is a DLD code and that a circular code with 20 trinucleotides is comma-free if and only if it is a LDL code. Finally, we point out the possible role of the symmetric group ∑4 in the mathematical study of trinucleotide circular codes.

  18. Only Speech Codes Should Be Censored

    Science.gov (United States)

    Pavela, Gary

    2006-01-01

    In this article, the author discusses the enforcement of "hate speech" codes and confirms research that considers why U.S. colleges and universities continue to promulgate student disciplinary rules prohibiting expression that "subordinates" others or is "demeaning, offensive, or hateful." Such continued adherence to…

  19. A neuronal learning rule for sub-millisecond temporal coding

    OpenAIRE

    Gerstner, W.; Kempter, R.; van Hemmen, J. Leo; Wagner, H.

    1996-01-01

    An unresolved paradox exists in auditory and electrosensory neural systems {Carr93,Heiligenberg91}: they encode behaviourally relevant signals in the range of a few microseconds with neurons that are at least one order of magnitude slower. We take the barn owl's auditory system as an example and present a modeling study based on computer simulations of a neuron in the laminar nucleus. Three observations resolve the paradox. First, spiking of an integrate-and-fire neuron driven by excitatory p...

  20. Joint source channel coding using arithmetic codes

    CERN Document Server

    Bi, Dongsheng

    2009-01-01

    Based on the encoding process, arithmetic codes can be viewed as tree codes and current proposals for decoding arithmetic codes with forbidden symbols belong to sequential decoding algorithms and their variants. In this monograph, we propose a new way of looking at arithmetic codes with forbidden symbols. If a limit is imposed on the maximum value of a key parameter in the encoder, this modified arithmetic encoder can also be modeled as a finite state machine and the code generated can be treated as a variable-length trellis code. The number of states used can be reduced and techniques used fo

  1. 78 FR 19766 - Self-Regulatory Organizations; NYSE Arca, Inc.; Order Granting Approval of Proposed Rule Change...

    Science.gov (United States)

    2013-04-02

    ... payments to which it is entitled. By virtue of their senior position and collateral, Senior Loans typically... relating to codes of ethics. This Rule requires investment advisers to adopt a code of ethics that reflects...

  2. 77 FR 65920 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change Relating...

    Science.gov (United States)

    2012-10-31

    ... relating to codes of ethics. This Rule requires investment advisers to adopt a code of ethics that reflects... Loan Marketing Association, the National Credit Union Administration and the Federal...

  3. Universality and individuality in a neural code

    CERN Document Server

    Schneidman, E; Tishby, N; De Ruyter van Steveninck, R R; Bialek, W; Schneidman, Elad; Brenner, Naama; Tishby, Naftali; De Ruyter van Steveninck, Rob R.; Bialek, William

    2000-01-01

    The problem of neural coding is to understand how sequences of action potentials (spikes) are related to sensory stimuli, motor outputs, or (ultimately) thoughts and intentions. One clear question is whether the same coding rules are used by different neurons, or by corresponding neurons in different individuals. We present a quantitative formulation of this problem using ideas from information theory, and apply this approach to the analysis of experiments in the fly visual system. We find significant individual differences in the structure of the code, particularly in the way that temporal patterns of spikes are used to convey information beyond that available from variations in spike rate. On the other hand, all the flies in our ensemble exhibit a high coding efficiency, so that every spike carries the same amount of information in all the individuals. Thus the neural code has a quantifiable mixture of individuality and universality.

  4. Stable canonical rules

    NARCIS (Netherlands)

    Iemhoff, R.; Bezhanishvili, N.; Bezhanishvili, Guram

    2016-01-01

    We introduce stable canonical rules and prove that each normal modal multi-conclusion consequence relation is axiomatizable by stable canonical rules. We apply these results to construct finite refutation patterns for modal formulas, and prove that each normal modal logic is axiomatizable by stable

  5. Branes and wrapping rules

    CERN Document Server

    Bergshoeff, Eric A

    2011-01-01

    We show that the branes of ten-dimensional IIA/IIB string theory must satisfy, upon toroidal compactification, specific wrapping rules in order to reproduce the number of supersymmetric branes that follows from a supergravity analysis. The realization of these wrapping rules suggests that IIA/IIB string theory contains a whole class of generalized Kaluza-Klein monopoles.

  6. Branes and Wrapping Rules

    NARCIS (Netherlands)

    Bergshoeff, E.; Riccioni, F.

    2012-01-01

    We show that the branes of ten-dimensional IA/IIB string theory must satisfy, upon toroidal compactification, specific wrapping rules in order to reproduce the number of supersymmetric branes that follows from a supergravity analysis. The realization of these wrapping rules suggests that IA/IIB stri

  7. Scoped Dynamic Rewrite Rules

    NARCIS (Netherlands)

    Visser, Eelco

    2002-01-01

    The applicability of term rewriting to program transformation is limited by the lack of control over rule application and by the context-free nature of rewrite rules. The first problem is addressed by languages supporting user-definable rewriting strategies. This paper addresses the second problem b

  8. Rules of Thumb for Up-and-Down Economics.

    Science.gov (United States)

    Kennedy, Peter

    1994-01-01

    Reports that economist Paul Krugman identifies three types of economic writing. Asserts that the major principles of macroeconomics can be synthesized into "Five Rules of Thumb" which can help to interpret economic news. Presents and discusses these five rules and includes a survey summary of journalists and economists on this issue.…

  9. Medicare and Medicaid programs; CY 2015 Home Health Prospective Payment System rate update; Home Health Quality Reporting Requirements; and survey and enforcement requirements for home health agencies. Final rule.

    Science.gov (United States)

    2014-11-06

    This final rule updates Home Health Prospective Payment System (HH PPS) rates, including the national, standardized 60-day episode payment rates, the national per-visit rates, and the non-routine medical supply (NRS) conversion factor under the Medicare prospective payment system for home health agencies (HHAs), effective for episodes ending on or after January 1, 2015. As required by the Affordable Care Act, this rule implements the second year of the four-year phase-in of the rebasing adjustments to the HH PPS payment rates. This rule provides information on our efforts to monitor the potential impacts of the rebasing adjustments and the Affordable Care Act mandated face-to-face encounter requirement. This rule also implements: Changes to simplify the face-to-face encounter regulatory requirements; changes to the HH PPS case-mix weights; changes to the home health quality reporting program requirements; changes to simplify the therapy reassessment timeframes; a revision to the Speech-Language Pathology (SLP) personnel qualifications; minor technical regulations text changes; and limitations on the reviewability of the civil monetary penalty provisions. Finally, this rule also discusses Medicare coverage of insulin injections under the HH PPS, the delay in the implementation of the International Classification of Diseases, Tenth Revision, Clinical Modification (ICD-10-CM), and a HH value-based purchasing (HH VBP) model.

  10. A Survey of Electric Laser Codes.

    Science.gov (United States)

    1983-06-01

    William F. Bailey (513) 255-2012 RfcD Associates Peter Crowell (S05) 844-3013 Joint Inst, for Lab. Astrophysik L. C. Pitchford (303) 492-8255...Morns (213) 341-9172 Physical Science, inc. Paul Lewi» (617) 933-8500 also Raymond Taylor (617) 546-7798 Rocketdyne E. Wheat ley (213... Pitchford (originator) Organization: to 11/28/BO J.I.L.A. Address:’-1- of Colorado, Boulder, CO 80309 After 1/1/81-Sandia Laboratories

  11. The Users’ Survey of Network Ethics in Taiwan Academic Network

    Directory of Open Access Journals (Sweden)

    Tao-Ming Chuang

    1998-12-01

    Full Text Available The research using the questionnaire methods is to survey the status of users in TANet and to investigate users' valuing system on network moral norms. The purposes have following: 1. analyzing and comparing different kinds of network policies, computing policies, or codes of information ethics in order to conceive the new rules on the information superhighway; 2. investigating users' background, motivation, and valuing system on network ethics; 3. analyzing network educator's attitudes on network moral norms and the methodology of ethical education in network courses; and 4. establishing the course's foundation of network ethics. [Article content in Chinese

  12. Do you write secure code?

    CERN Multimedia

    Computer Security Team

    2011-01-01

    At CERN, we are excellent at producing software, such as complex analysis jobs, sophisticated control programs, extensive monitoring tools, interactive web applications, etc. This software is usually highly functional, and fulfils the needs and requirements as defined by its author. However, due to time constraints or unintentional ignorance, security aspects are often neglected. Subsequently, it was even more embarrassing for the author to find out that his code flawed and was used to break into CERN computers, web pages or to steal data…   Thus, if you have the pleasure or task of producing software applications, take some time before and familiarize yourself with good programming practices. They should not only prevent basic security flaws in your code, but also improve its readability, maintainability and efficiency. Basic rules for good programming, as well as essential books on proper software development, can be found in the section for software developers on our security we...

  13. Model Children's Code.

    Science.gov (United States)

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  14. Civil Behavior, Safe-School Planning, and Dress Codes

    Science.gov (United States)

    Studak, Cathryn M.; Workman, Jane E.

    2007-01-01

    This research examined news reports in order to identify incidents that precipitated dress code revisions. News reports were examined within the framework of rules for civil behavior. Using key words "school dress codes" and "violence," LEXIS/NEXIS was used to access 104 articles from 44 U.S. newspapers from December 3, 2004 to December 2, 2005.…

  15. Civil Behavior, Safe-School Planning, and Dress Codes

    Science.gov (United States)

    Studak, Cathryn M.; Workman, Jane E.

    2007-01-01

    This research examined news reports in order to identify incidents that precipitated dress code revisions. News reports were examined within the framework of rules for civil behavior. Using key words "school dress codes" and "violence," LEXIS/NEXIS was used to access 104 articles from 44 U.S. newspapers from December 3, 2004 to December 2, 2005.…

  16. Rationale for Student Dress Codes: A Review of School Handbooks

    Science.gov (United States)

    Freeburg, Elizabeth W.; Workman, Jane E.; Lentz-Hees, Elizabeth S.

    2004-01-01

    Through dress codes, schools establish rules governing student appearance. This study examined stated rationales for dress and appearance codes in secondary school handbooks; 182 handbooks were received. Of 150 handbooks containing a rationale, 117 related dress and appearance regulations to students' right to a non-disruptive educational…

  17. Source Code Analysis Laboratory (SCALe) for Energy Delivery Systems

    Science.gov (United States)

    2010-12-01

    and standar - dizing them through the ISO/IEC process should eliminate many of the problems encountered at the NIST SATE and also increase the...view the source code, using both structured and unstruct ons of secure coding rules discovered. However, manua than automated analysis, and the

  18. 77 FR 48007 - Administrative Simplification: Adoption of Operating Rules for Health Care Electronic Funds...

    Science.gov (United States)

    2012-08-10

    ...-required Code Combinations for CORE-defined Business Scenarios. In its August 1, 2011 letter to the NCVHS... Remittance Advice Remark Codes (835) Rule; (4) CORE-required Code Combinations for CORE-defined Business... identifiable or confidential business information that is included in a comment. We post all comments...

  19. Rules on Paper, Rules in Practice

    OpenAIRE

    Al-Dahdah, Edouard; Corduneanu-Huci, Cristina; Raballand, Gael; Sergenti, Ernest; Ababsa, Myriam

    2016-01-01

    The primary focus of this book is on a specific outcome of the rule of law: the practical enforcement of laws and policies, and the determinants of this enforcement, or lack thereof. Are there significant and persistent differences in implementation across countries? Why are some laws and policies more systematically enforced than others? Are “good” laws likely to be enacted, and if not, what stands in the way? We answer these questions using a theoretical framework and detailed empirical...

  20. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  1. Measuring acceptability of clinical decision rules: validation of the Ottawa acceptability of decision rules instrument (OADRI) in four countries.

    Science.gov (United States)

    Brehaut, Jamie C; Graham, Ian D; Wood, Timothy J; Taljaard, Monica; Eagles, Debra; Lott, Alison; Clement, Catherine; Kelly, Anne-Maree; Mason, Suzanne; Stiell, Ian G

    2010-01-01

    Clinical decision rules can benefit clinicians, patients, and health systems, but they involve considerable up-front development costs and must be acceptable to the target audience. No existing instrument measures the acceptability of a rule. The current study validated such an instrument. The authors administered the Ottawa Acceptability of Decision Rules Instrument (OADRI) via postal survey to emergency physicians from 4 regions (Australasia, Canada, United Kingdom, and United States), in the context of 2 recently developed rules, the Canadian C-Spine Rule (C-Spine) and the Canadian CT Head Rule (CT-Head). Construct validity of the 12-item instrument was evaluated by hypothesis testing. As predicted by a priori hypotheses, OADRI scores were 1) higher among rule users than nonusers, 2) higher among those using the rule ''all of the time'' v. ''most of the time'' v. ''some of the time,'' and 3) higher among rule nonusers who would consider using a rule v. those who would not. We also examined explicit reasons given by respondents who said they would not use these rules. Items in the OADRI accounted for 85.5% (C- Spine) and 90.2% (CT-Head) of the reasons given for not considering a rule acceptable. The OADRI is a simple, 12-item instrument that evaluates rule acceptability among clinicians. Potential uses include comparing multiple ''protorules'' during development, examining acceptability of a rule to a new audience prior to implementation, indicating barriers to rule use addressable by knowledge translation interventions, and potentially serving as a proxy measure for future rule use.

  2. Do Fiscal Rules Matter?

    DEFF Research Database (Denmark)

    Grembi, Veronica; Nannicini, Tommaso; Troiano, Ugo

    2016-01-01

    Fiscal rules are laws aimed at reducing the incentive to accumulate debt, and many countries adopt them to discipline local governments. Yet, their effectiveness is disputed because of commitment and enforcement problems. We study their impact applying a quasi-experimental design in Italy. In 1999......, the central government imposed fiscal rules on municipal governments, and in 2001 relaxed them below 5,000 inhabitants. We exploit the before/after and discontinuous policy variation, and show that relaxing fiscal rules increases deficits and lowers taxes. The effect is larger if the mayor can be reelected...

  3. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  4. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  5. THE CONCLUSION OF THE CONTRACT FROM THE PERSPECTIVE OF THE NEW CIVIL CODE

    Directory of Open Access Journals (Sweden)

    Stanciu D. C RPENARU

    2012-06-01

    Full Text Available The New Civil Code regulates in large the general rules regarding the conclusion of the contract. These rules regard the formation of the contract, between parties that are either present or at a distance. The rules in question have as foundation the classical principles regarding the formation of the contract and also reflect the realities of the modern society.

  6. Dodgson's Rule Approximations and Absurdity

    CERN Document Server

    McCabe-Dansted, John C

    2010-01-01

    With the Dodgson rule, cloning the electorate can change the winner, which Young (1977) considers an "absurdity". Removing this absurdity results in a new rule (Fishburn, 1977) for which we can compute the winner in polynomial time (Rothe et al., 2003), unlike the traditional Dodgson rule. We call this rule DC and introduce two new related rules (DR and D&). Dodgson did not explicitly propose the "Dodgson rule" (Tideman, 1987); we argue that DC and DR are better realizations of the principle behind the Dodgson rule than the traditional Dodgson rule. These rules, especially D&, are also effective approximations to the traditional Dodgson's rule. We show that, unlike the rules we have considered previously, the DC, DR and D& scores differ from the Dodgson score by no more than a fixed amount given a fixed number of alternatives, and thus these new rules converge to Dodgson under any reasonable assumption on voter behaviour, including the Impartial Anonymous Culture assumption.

  7. General Quantization Rule

    CERN Document Server

    Maiz, F

    2012-01-01

    A general quantization rule for bound states of the Schrodinger equation is presented. Like fundamental theory of integral, our idea is mainly based on dividing the potential into many pieces, solving the Schr\\"odinger equation, and deriving the general quantization rule. For both exactly and non-exactly solvable systems, the energy levels of all the bound states can be easily calculated from the general quantization rule. Using this new general quantization rule, we re-calculate the energy levels for the one-dimensional system, with an infinite square well, with the harmonic oscillator potential, with the Morse Potential, with the symmetric and asymmetric Rosen-Morse potentials, with the first P\\"oschl-Teller potential, with the Coulomb Potential, with the V-shape Potential, and the ax^4 potential, and for the three dimensions systems, with the harmonic oscillator potential, with the ordinary Coulomb potential, and for the hydrogen atom.

  8. Drug Plan Coverage Rules

    Science.gov (United States)

    ... get about Medicare Lost/incorrect Medicare card Report fraud & abuse File a complaint Identity theft: protect yourself ... drug plan How Part D works with other insurance Find health & drug plans Drug plan coverage rules ...

  9. Staff rules and regulations

    CERN Multimedia

    HR Department

    2007-01-01

    The 11th edition of the Staff Rules and Regulations, dated 1 January 2007, adopted by the Council and the Finance Committee in December 2006, is currently being distributed to departmental secretariats. The Staff Rules and Regulations, together with a summary of the main modifications made, will be available, as from next week, on the Human Resources Department's intranet site: http://cern.ch/hr-web/internal/admin_services/rules/default.asp The main changes made to the Staff Rules and Regulations stem from the five-yearly review of employment conditions of members of the personnel. The changes notably relate to: the categories of members of the personnel (e.g. removal of the local staff category); the careers structure and the merit recognition system; the non-residence, installation and re-installation allowances; the definition of family, family allowances and family-related leave; recognition of partnerships; education fees. The administrative circulars, some of which are being revised following the ...

  10. TANF Rules Data Base

    Data.gov (United States)

    U.S. Department of Health & Human Services — Single source providing information on Temporary Assistance for Needy Families (TANF) program rules among States and across years (currently 1996-2010), including...

  11. Generalized Multidimensional Association Rules

    Institute of Scientific and Technical Information of China (English)

    周傲英; 周水庚; 金文; 田增平

    2000-01-01

    The problem of association rule mining has gained considerable prominence in the data mining community for its use as an important tool of knowl-edge discovery from large-scale databases. And there has been a spurt of research activities around this problem. Traditional association rule mining is limited to intra-transaction. Only recently the concept of N-dimensional inter-transaction as-sociation rule (NDITAR) was proposed by H.J. Lu. This paper modifies and extends Lu's definition of NDITAR based on the analysis of its limitations, and the general-ized multidimensional association rule (GMDAR) is subsequently introduced, which is more general, flexible and reasonable than NDITAR.

  12. Revised Total Coliform Rule

    Science.gov (United States)

    The Revised Total Coliform Rule (RTCR) aims to increase public health protection through the reduction of potential pathways for fecal contamination in the distribution system of a public water system (PWS).

  13. (FIELD) SYMMETRIZATION SELECTION RULES

    Energy Technology Data Exchange (ETDEWEB)

    P. PAGE

    2000-08-01

    QCD and QED exhibit an infinite set of three-point Green's functions that contain only OZI rule violating contributions, and (for QCD) are subleading in the large N{sub c} expansion. We prove that the QCD amplitude for a neutral hybrid {l_brace}1,3,5. . .{r_brace}{+-} exotic current to create {eta}{pi}{sup 0} only comes from OZI rule violating contributions under certain conditions, and is subleading in N{sub c}.

  14. Symmetrization Selection Rules, 1

    CERN Document Server

    Page, P R

    1996-01-01

    We introduce a category of strong and electromagnetic interaction selection rules for the two-body connected decay and production of exotic J^{PC} = 0^{+-}, 1^{-+}, 2^{+-}, 3^{-+}, ... hybrid and four-quark mesons. The rules arise from symmetrization in states in addition to Bose symmetry and CP invariance. Examples include various decays to \\eta'\\eta, \\eta\\pi, \\eta'\\pi and four-quark interpretations of a 1^{-+} signal.

  15. News and Trading Rules

    Science.gov (United States)

    2003-01-01

    indexes or small groups of forex series. Although I use a shorter time period – five years for the work on technical analysis and machine learning, only...I start with practitioner-developed technical analysis constructs, sys- tematically examining their ability to generate trading rules profitable on...a large universe of stocks. Then, I use these technical analysis constructs as the underlying representation for a simple trading rule leaner, with

  16. Data breaches. Final rule.

    Science.gov (United States)

    2008-04-11

    This document adopts, without change, the interim final rule that was published in the Federal Register on June 22, 2007, addressing data breaches of sensitive personal information that is processed or maintained by the Department of Veterans Affairs (VA). This final rule implements certain provisions of the Veterans Benefits, Health Care, and Information Technology Act of 2006. The regulations prescribe the mechanisms for taking action in response to a data breach of sensitive personal information.

  17. Mechanisms of rule acquisition and rule following in inductive reasoning.

    Science.gov (United States)

    Crescentini, Cristiano; Seyed-Allaei, Shima; De Pisapia, Nicola; Jovicich, Jorge; Amati, Daniele; Shallice, Tim

    2011-05-25

    Despite the recent interest in the neuroanatomy of inductive reasoning processes, the regional specificity within prefrontal cortex (PFC) for the different mechanisms involved in induction tasks remains to be determined. In this study, we used fMRI to investigate the contribution of PFC regions to rule acquisition (rule search and rule discovery) and rule following. Twenty-six healthy young adult participants were presented with a series of images of cards, each consisting of a set of circles numbered in sequence with one colored blue. Participants had to predict the position of the blue circle on the next card. The rules that had to be acquired pertained to the relationship among succeeding stimuli. Responses given by subjects were categorized in a series of phases either tapping rule acquisition (responses given up to and including rule discovery) or rule following (correct responses after rule acquisition). Mid-dorsolateral PFC (mid-DLPFC) was active during rule search and remained active until successful rule acquisition. By contrast, rule following was associated with activation in temporal, motor, and medial/anterior prefrontal cortex. Moreover, frontopolar cortex (FPC) was active throughout the rule acquisition and rule following phases before a rule became familiar. We attributed activation in mid-DLPFC to hypothesis generation and in FPC to integration of multiple separate inferences. The present study provides evidence that brain activation during inductive reasoning involves a complex network of frontal processes and that different subregions respond during rule acquisition and rule following phases.

  18. Codeword stabilized quantum codes: Algorithm and structure

    Science.gov (United States)

    Chuang, Isaac; Cross, Andrew; Smith, Graeme; Smolin, John; Zeng, Bei

    2009-04-01

    The codeword stabilized (CWS) quantum code formalism presents a unifying approach to both additive and nonadditive quantum error-correcting codes [IEEE Trans. Inf. Theory 55, 433 (2009)]. This formalism reduces the problem of constructing such quantum codes to finding a binary classical code correcting an error pattern induced by a graph state. Finding such a classical code can be very difficult. Here, we consider an algorithm which maps the search for CWS codes to a problem of identifying maximum cliques in a graph. While solving this problem is in general very hard, we provide three structure theorems which reduce the search space, specifying certain admissible and optimal ((n,K,d)) additive codes. In particular, we find that the re does not exist any ((7,3,3)) CWS code though the linear programming bound does not rule it out. The complexity of the CWS-search algorithm is compared with the contrasting method introduced by Aggarwal and Calderbank [IEEE Trans. Inf. Theory 54, 1700 (2008)].

  19. FREQUENCY-CODED OPTIMIZATION OF HOPPED-FREQUENCY PULSE SIGNAL BASED ON GENETIC ALGORITHM

    Institute of Scientific and Technical Information of China (English)

    Liu Zheng; Mu Xuehua

    2005-01-01

    The Frequency-Coded Pulse (FCP) signal has good performance of range and Doppler resolution. This paper first gives the mathematical expression of the ambiguity function for FCP signals, and then presents a coding rule for optimizing FCP signal. The genetic algorithm is presented to solve this kind of problem for optimizing codes. Finally, an example for optimizing calculation is illustrated and the optimized frequency coding results are given with the code length N=64 and N=128 respectively.

  20. Locally Orderless Registration Code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  1. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  2. Verifying Architectural Design Rules of the Flight Software Product Line

    Science.gov (United States)

    Ganesan, Dharmalingam; Lindvall, Mikael; Ackermann, Chris; McComas, David; Bartholomew, Maureen

    2009-01-01

    This paper presents experiences of verifying architectural design rules of the NASA Core Flight Software (CFS) product line implementation. The goal of the verification is to check whether the implementation is consistent with the CFS architectural rules derived from the developer's guide. The results indicate that consistency checking helps a) identifying architecturally significant deviations that were eluded during code reviews, b) clarifying the design rules to the team, and c) assessing the overall implementation quality. Furthermore, it helps connecting business goals to architectural principles, and to the implementation. This paper is the first step in the definition of a method for analyzing and evaluating product line implementations from an architecture-centric perspective.

  3. 78 FR 10233 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change Relating...

    Science.gov (United States)

    2013-02-13

    ... Rule 204A-1 under the Advisers Act relating to codes of ethics. This Rule requires investment advisers to adopt a code of ethics that reflects the fiduciary nature of the relationship to clients as well... not receive all the payments to which it is entitled. By virtue of their senior position and...

  4. 76 FR 76464 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change Relating...

    Science.gov (United States)

    2011-12-07

    ... the provisions of Rule 204A-1 under the Advisers Act relating to codes of ethics. This Rule requires investment advisers to adopt a code of ethics that reflects the fiduciary nature of the relationship to.... The Real Assets Portfolio's indirect holdings by virtue of investing in ETPs representing those asset...

  5. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  6. Constructing quantum codes

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Quantum error correcting codes are indispensable for quantum information processing and quantum computation.In 1995 and 1996,Shor and Steane gave first several examples of quantum codes from classical error correcting codes.The construction of efficient quantum codes is now an active multi-discipline research field.In this paper we review the known several constructions of quantum codes and present some examples.

  7. Perceptions of teamwork among code team members.

    Science.gov (United States)

    Mahramus, Tara; Frewin, Sarah; Penoyer, Daleen Aragon; Sole, Mary Lou

    2013-01-01

    Cardiopulmonary arrest (CPA) teams, known as code teams, provide coordinated and evidenced-based interventions by various disciplines during a CPA. Teamwork behaviors are essential during CPA resuscitation and may have an impact on patient outcomes. The purpose of this study was to explore the perceptions of teamwork during CPA events among code team members and to determine if differences in perception existed between disciplines within the code team. A prospective, descriptive, comparative design using the Code Teamwork Perception Tool online survey was used to assess the perception of teamwork during CPA events by medical residents, critical care nurses, and respiratory therapists. Sixty-six code team members completed the Code Teamwork Perception Tool. Mean teamwork scores were 2.63 on a 5-point scale (0-4). No significant differences were found in mean scores among disciplines. Significant differences among scores were found on 7 items related to code leadership, roles and responsibilities between disciplines, and in those who had participated on a code team for less than 2 years and certified in Advanced Cardiac Life Support for less than 4 years. Teamwork perception among members of the code team was average. Teamwork training for resuscitation with all disciplines on the code team may promote more effective teamwork during actual CPA events. Clinical nurse specialists can aid in resuscitation efforts by actively participating on committees, identifying opportunities for improvement, being content experts, leading the development of team training programs, and conducting research in areas lacking evidence.

  8. Coding Theory and Applications : 4th International Castle Meeting

    CERN Document Server

    Malonek, Paula; Vettori, Paolo

    2015-01-01

    The topics covered in this book, written by researchers at the forefront of their field, represent some of the most relevant research areas in modern coding theory: codes and combinatorial structures, algebraic geometric codes, group codes, quantum codes, convolutional codes, network coding and cryptography. The book includes a survey paper on the interconnections of coding theory with constrained systems, written by an invited speaker, as well as 37 cutting-edge research communications presented at the 4th International Castle Meeting on Coding Theory and Applications (4ICMCTA), held at the Castle of Palmela in September 2014. The event’s scientific program consisted of four invited talks and 39 regular talks by authors from 24 different countries. This conference provided an ideal opportunity for communicating new results, exchanging ideas, strengthening international cooperation, and introducing young researchers into the coding theory community.

  9. Some mathematical refinements concerning error minimization in the genetic code.

    Science.gov (United States)

    Buhrman, Harry; van der Gulik, Peter T S; Kelk, Steven M; Koolen, Wouter M; Stougie, Leen

    2011-01-01

    The genetic code is known to have a high level of error robustness and has been shown to be very error robust compared to randomly selected codes, but to be significantly less error robust than a certain code found by a heuristic algorithm. We formulate this optimization problem as a Quadratic Assignment Problem and use this to formally verify that the code found by the heuristic algorithm is the global optimum. We also argue that it is strongly misleading to compare the genetic code only with codes sampled from the fixed block model, because the real code space is orders of magnitude larger. We thus enlarge the space from which random codes can be sampled from approximately 2.433 × 10(18) codes to approximately 5.908 × 10(45) codes. We do this by leaving the fixed block model, and using the wobble rules to formulate the characteristics acceptable for a genetic code. By relaxing more constraints, three larger spaces are also constructed. Using a modified error function, the genetic code is found to be more error robust compared to a background of randomly generated codes with increasing space size. We point out that these results do not necessarily imply that the code was optimized during evolution for error minimization, but that other mechanisms could be the reason for this error robustness.

  10. The Defects of WTO Antidumping Rules and Related Reform

    Institute of Scientific and Technical Information of China (English)

    Liu Yajun

    2005-01-01

    @@ Since Canada made the first anti-dumping code in 1904, United States, Australia and France made their domestic anti-dumping codes successively. In 1947, the contracting parties made antidumping rules part of GATT (Article VI). Due to the broad use of tariff and non-tariff trade barriers, few countries turned to anti-dumping measures in 1950s.Changshu Jiangnan Adhesive Tane Co., Ltd.

  11. The Defects of WTO Antidumping Rules and Related Reform

    Institute of Scientific and Technical Information of China (English)

    Liu; Yajun

    2005-01-01

      Since Canada made the first anti-dumping code in 1904, United States, Australia and France made their domestic anti-dumping codes successively. In 1947, the contracting parties made antidumping rules part of GATT (Article VI). Due to the broad use of tariff and non-tariff trade barriers, few countries turned to anti-dumping measures in 1950s.Changshu Jiangnan Adhesive Tane Co., Ltd.……

  12. Prospective Coding by Spiking Neurons.

    Directory of Open Access Journals (Sweden)

    Johanni Brea

    2016-06-01

    Full Text Available Animals learn to make predictions, such as associating the sound of a bell with upcoming feeding or predicting a movement that a motor command is eliciting. How predictions are realized on the neuronal level and what plasticity rule underlies their learning is not well understood. Here we propose a biologically plausible synaptic plasticity rule to learn predictions on a single neuron level on a timescale of seconds. The learning rule allows a spiking two-compartment neuron to match its current firing rate to its own expected future discounted firing rate. For instance, if an originally neutral event is repeatedly followed by an event that elevates the firing rate of a neuron, the originally neutral event will eventually also elevate the neuron's firing rate. The plasticity rule is a form of spike timing dependent plasticity in which a presynaptic spike followed by a postsynaptic spike leads to potentiation. Even if the plasticity window has a width of 20 milliseconds, associations on the time scale of seconds can be learned. We illustrate prospective coding with three examples: learning to predict a time varying input, learning to predict the next stimulus in a delayed paired-associate task and learning with a recurrent network to reproduce a temporally compressed version of a sequence. We discuss the potential role of the learning mechanism in classical trace conditioning. In the special case that the signal to be predicted encodes reward, the neuron learns to predict the discounted future reward and learning is closely related to the temporal difference learning algorithm TD(λ.

  13. Novice Rules for Projectile Motion.

    Science.gov (United States)

    Maloney, David P.

    1988-01-01

    Investigates several aspects of undergraduate students' rules for projectile motion including general patterns; rules for questions about time, distance, solids and liquids; and changes in rules when asked to ignore air resistance. Reports approach differences by sex and high school physics experience, and that novice rules are situation…

  14. The role of traffic rules.

    NARCIS (Netherlands)

    Noordzij, P.C.

    1988-01-01

    Experienced road users seem to have their own set of traffic rules (including rules about when to violate the official rules). The number of violations is enormous, causing great concern for the authorities. The situation could be improved by separating a set of rules with the aim of deterring road

  15. Turbo Codes Extended with Outer BCH Code

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1996-01-01

    The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is proposed...

  16. An Embedded Rule-Based Diagnostic Expert System in Ada

    Science.gov (United States)

    Jones, Robert E.; Liberman, Eugene M.

    1992-01-01

    Ada is becoming an increasingly popular programming language for large Government-funded software projects. Ada with it portability, transportability, and maintainability lends itself well to today's complex programming environment. In addition, expert systems have also assumed a growing role in providing human-like reasoning capability expertise for computer systems. The integration is discussed of expert system technology with Ada programming language, especially a rule-based expert system using an ART-Ada (Automated Reasoning Tool for Ada) system shell. NASA Lewis was chosen as a beta test site for ART-Ada. The test was conducted by implementing the existing Autonomous Power EXpert System (APEX), a Lisp-based power expert system, in ART-Ada. Three components, the rule-based expert systems, a graphics user interface, and communications software make up SMART-Ada (Systems fault Management with ART-Ada). The rules were written in the ART-Ada development environment and converted to Ada source code. The graphics interface was developed with the Transportable Application Environment (TAE) Plus, which generates Ada source code to control graphics images. SMART-Ada communicates with a remote host to obtain either simulated or real data. The Ada source code generated with ART-Ada, TAE Plus, and communications code was incorporated into an Ada expert system that reads the data from a power distribution test bed, applies the rule to determine a fault, if one exists, and graphically displays it on the screen. The main objective, to conduct a beta test on the ART-Ada rule-based expert system shell, was achieved. The system is operational. New Ada tools will assist in future successful projects. ART-Ada is one such tool and is a viable alternative to the straight Ada code when an application requires a rule-based or knowledge-based approach.

  17. The rule of law

    Directory of Open Access Journals (Sweden)

    Besnik Murati

    2015-07-01

    Full Text Available The state as an international entity and its impact on the individual’s right has been and still continues to be a crucial factor in the relationship between private and public persons. States vary in terms of their political system, however, democratic states are based on the separation of powers and human rights within the state. Rule of law is the product of many actors in a state, including laws, individuals, society, political system, separation of powers, human rights, the establishment of civil society, the relationship between law and the individual, as well as, individual-state relations. Purpose and focus of this study is the importance of a functioning state based on law, characteristics of the rule of law, separation of powers and the basic concepts of the rule of law.

  18. Hybrid Noncoherent Network Coding

    CERN Document Server

    Skachek, Vitaly; Nedic, Angelia

    2011-01-01

    We describe a novel extension of subspace codes for noncoherent networks, suitable for use when the network is viewed as a communication system that introduces both dimension and symbol errors. We show that when symbol erasures occur in a significantly large number of different basis vectors transmitted through the network and when the min-cut of the networks is much smaller then the length of the transmitted codewords, the new family of codes outperforms their subspace code counterparts. For the proposed coding scheme, termed hybrid network coding, we derive two upper bounds on the size of the codes. These bounds represent a variation of the Singleton and of the sphere-packing bound. We show that a simple concatenated scheme that represents a combination of subspace codes and Reed-Solomon codes is asymptotically optimal with respect to the Singleton bound. Finally, we describe two efficient decoding algorithms for concatenated subspace codes that in certain cases have smaller complexity than subspace decoder...

  19. Coding conventions and principles for a National Land-Change Modeling Framework

    Science.gov (United States)

    Donato, David I.

    2017-07-14

    This report establishes specific rules for writing computer source code for use with the National Land-Change Modeling Framework (NLCMF). These specific rules consist of conventions and principles for writing code primarily in the C and C++ programming languages. Collectively, these coding conventions and coding principles create an NLCMF programming style. In addition to detailed naming conventions, this report provides general coding conventions and principles intended to facilitate the development of high-performance software implemented with code that is extensible, flexible, and interoperable. Conventions for developing modular code are explained in general terms and also enabled and demonstrated through the appended templates for C++ base source-code and header files. The NLCMF limited-extern approach to module structure, code inclusion, and cross-module access to data is both explained in the text and then illustrated through the module templates. Advice on the use of global variables is provided.

  20. Cosmic Sum Rules

    DEFF Research Database (Denmark)

    T. Frandsen, Mads; Masina, Isabella; Sannino, Francesco

    2011-01-01

    We introduce new sum rules allowing to determine universal properties of the unknown component of the cosmic rays and show how it can be used to predict the positron fraction at energies not yet explored by current experiments and to constrain specific models.......We introduce new sum rules allowing to determine universal properties of the unknown component of the cosmic rays and show how it can be used to predict the positron fraction at energies not yet explored by current experiments and to constrain specific models....

  1. Generalized Deterministic Traffic Rules

    CERN Document Server

    Fuks, H; Fuks, Henryk; Boccara, Nino

    1997-01-01

    We study a family of deterministic models for highway traffic flow which generalize cellular automaton rule 184. This family is parametrized by the speed limit $m$ and another parameter $k$ that represents a ``degree of aggressiveness'' in driving, strictly related to the distance between two consecutive cars. We compare two driving strategies with identical maximum throughput: ``conservative'' driving with high speed limit and ``aggressive'' driving with low speed limit. Those two strategies are evaluated in terms of accident probability. We also discuss fundamental diagrams of generalized traffic rules and examine limitations of maximum achievable throughput. Possible modifications of the model are considered.

  2. Similarities between Students Receiving Dress Code Violations and Discipline Referrals at Newport Junior High School

    Science.gov (United States)

    Nicholson, Nikki

    2007-01-01

    Background: Looking at dress code violations and demographics surrounding kids breaking the rules. Purpose: To see if there is a connection between dress code violations and discipline referrals. Setting: Jr. High School; Study Sample: Students with dress code violations for one week; Intervention: N/A; Research Design: Correlational; and Control…

  3. 78 FR 37885 - Approval of American Society of Mechanical Engineers' Code Cases

    Science.gov (United States)

    2013-06-24

    ... Mechanical Engineers' Code Cases; Proposed Rule #0;#0;Federal Register / Vol. 78, No. 121 / Monday, June 24... American Society of Mechanical Engineers' Code Cases AGENCY: Nuclear Regulatory Commission. ACTION... revised Code Cases published by the American Society of Mechanical Engineers (ASME). This proposed...

  4. Fuzzy Rule Base System for Software Classification

    Directory of Open Access Journals (Sweden)

    Adnan Shaout

    2013-07-01

    Full Text Available Given the central role that software development plays in the delivery and application of informationtechnology, managers have been focusing on process improvement in the software development area. Thisimprovement has increased the demand for software measures, or metrics to manage the process. Thismetrics provide a quantitative basis for the development and validation of models during the softwaredevelopment process. In this paper a fuzzy rule-based system will be developed to classify java applicationsusing object oriented metrics. The system will contain the following features:Automated method to extract the OO metrics from the source code,Default/base set of rules that can be easily configured via XML file so companies, developers, teamleaders,etc, can modify the set of rules according to their needs,Implementation of a framework so new metrics, fuzzy sets and fuzzy rules can be added or removeddepending on the needs of the end user,General classification of the software application and fine-grained classification of the java classesbased on OO metrics, andTwo interfaces are provided for the system: GUI and command.

  5. Business judgement rule in Czech Corporations Act

    Directory of Open Access Journals (Sweden)

    Jaromír KOŽIAK

    2013-12-01

    Full Text Available Czech private law is currently undergoing a thorough transformation. This inclundes adoption of a brand new Corporations Act, which is to supersede the current Commercial Code. The new legislation introduces several new rules governing liability of company executive officers. One of these is business judgment rule. It should provide company executive officers with a certain level of protection against litigantion – if specific terms are met, it is presumed, that they carried out their responsibilities with proper care. I intend to demonstrate, that the czech business judgment rule is flawed, despite the fact that it draws from foreign examples and that this regulation, although seemingly groundbreaking, in fact changes nothing in examination of the decisions of the company executive officers in Czech Republic. The main goal of this article is therefore to analyze and criticize the business judgment rule in the new Czech legislation and to compare it to notable foreign legal systems. The methods used are inductive and deductive reasoning, author‘s own analysis of legal text, comparative method and compilation of available resources relating to the topic of the article.

  6. UFO - The Universal FeynRules Output

    CERN Document Server

    Degrande, Céline; Fuks, Benjamin; Grellscheid, David; Mattelaer, Olivier; Reiter, Thomas

    2011-01-01

    We present a new model format for automatized matrix-element generators, the so- called Universal FeynRules Output (UFO). The format is universal in the sense that it features compatibility with more than one single generator and is designed to be flexible, modular and agnostic of any assumption such as the number of particles or the color and Lorentz structures appearing in the interaction vertices. Unlike other model formats where text files need to be parsed, the information on the model is encoded into a Python module that can easily be linked to other computer codes. We then describe an interface for the Mathematica package FeynRules that allows for an automatic output of models in the UFO format.

  7. Network coding for computing: Linear codes

    CERN Document Server

    Appuswamy, Rathinakumar; Karamchandani, Nikhil; Zeger, Kenneth

    2011-01-01

    In network coding it is known that linear codes are sufficient to achieve the coding capacity in multicast networks and that they are not sufficient in general to achieve the coding capacity in non-multicast networks. In network computing, Rai, Dey, and Shenvi have recently shown that linear codes are not sufficient in general for solvability of multi-receiver networks with scalar linear target functions. We study single receiver networks where the receiver node demands a target function of the source messages. We show that linear codes may provide a computing capacity advantage over routing only when the receiver demands a `linearly-reducible' target function. % Many known target functions including the arithmetic sum, minimum, and maximum are not linearly-reducible. Thus, the use of non-linear codes is essential in order to obtain a computing capacity advantage over routing if the receiver demands a target function that is not linearly-reducible. We also show that if a target function is linearly-reducible,...

  8. Adler sum rule

    CERN Document Server

    Adler, Stephen L

    2009-01-01

    The Adler sum rule states that the integral over energy of a difference of neutrino-nucleon and antineutrino-nucleon structure functions is a constant, independent of the four-momentum transfer squared. This constancy is a consequence of the local commutation relations of the time components of the hadronic weak current, which follow from the underlying quark structure of the standard model.

  9. TEDXCERN BREAKS THE RULES

    CERN Multimedia

    CERN, Bulletin

    2015-01-01

    On Friday, 9 October, TEDxCERN brought together 14 ‘rule-breakers’ to explore ideas that push beyond the boundaries of academia. They addressed a full house of 600 audience members, as well as thousands watching the event online.

  10. 13 Rules That Expire

    Science.gov (United States)

    Karp, Karen S.; Bush, Sarah B.; Dougherty, Barbara J.

    2014-01-01

    Overgeneralizing commonly accepted strategies, using imprecise vocabulary, and relying on tips and tricks that do not promote conceptual mathematical understanding can lead to misunderstanding later in students' math careers. In this article, the authors present thirteen pervasive mathematics rules that "expire." With the…

  11. Staff rules and regulations

    CERN Document Server

    HR Department

    2007-01-01

    The 11th edition of the Staff Rules and Regulations, dated 1 January 2007, adopted by the Council and the Finance Committee in December 2006, is currently being distributed to departmental secretariats. The Staff Rules and Regulations, together with a summary of the main modifications made, will be available, as from next week, on the Human Resources Department's intranet site: http://cern.ch/hr-web/internal/admin_services/rules/default.asp The main changes made to the Staff Rules and Regulations stem from the five-yearly review of employment conditions of members of the personnel. The changes notably relate to: the categories of members of the personnel (e.g. removal of the local staff category); the careers structure and the merit recognition system; the non-residence, installation and re-installation allowances; the definition of family, family allowances and family-related leave; recognition of partnerships; education fees. The administrative circulars, some of which are being revised following the m...

  12. Post Rule of Law

    DEFF Research Database (Denmark)

    Carlson, Kerstin Bree

    2016-01-01

    addresses the practice of hybridity in ICP, drawing examples from the construction and evolution of hybrid procedure at the International Criminal Tribunal for the Former Yugoslavia (ICTY), to argue that the hybridity practiced by international criminal tribunals renders them ‘post rule of law’ institutions...

  13. Comment concerning Leonardo's rule

    CERN Document Server

    Sotolongo-Costa, O; Oseguera-Manzanilla, T; Díaz-Guerrero, D S

    2016-01-01

    In this comment we propose a novel explanation for the Leonardo's rule concerning the tree branching. According to Leonardo's notebooks he observed that if one observes the branches of a tree, the squared radius of the principal branch is equal to the sum of the squared radius of the branch daughters.

  14. Willpower and Personal Rules.

    Science.gov (United States)

    Benabou, Roland; Tirole, Jean

    2004-01-01

    We develop a theory of internal commitments or "personal rules" based on self-reputation over one's willpower, which transforms lapses into precedents that undermine future self-restraint. The foundation for this mechanism is the imperfect recall of past motives and feelings, leading people to draw inferences from their past actions. The degree of…

  15. Nonlinear network coding based on multiplication and exponentiation in GF(2m)

    Institute of Scientific and Technical Information of China (English)

    JIANG An-you; ZHU Jin-kang

    2009-01-01

    This article proposes a novel nonlinear network code in the GF(2m) finite field. Different from previous linear network codes that linearly mix multiple input flows, the proposed nonlinear network code mixes input flows through both multiplication and exponentiation in the GF(2m). Three relevant rules for selecting proper parameters for the proposed nonlinear network code are discussed, and the relationship between the power parameter and the coding coefficient K is explored. Further analysis shows that the proposed nonlinear network code is equivalent to a linear network code with deterministic coefficients.

  16. Practices in Code Discoverability

    CERN Document Server

    Teuben, Peter; Nemiroff, Robert J; Shamir, Lior

    2012-01-01

    Much of scientific progress now hinges on the reliability, falsifiability and reproducibility of computer source codes. Astrophysics in particular is a discipline that today leads other sciences in making useful scientific components freely available online, including data, abstracts, preprints, and fully published papers, yet even today many astrophysics source codes remain hidden from public view. We review the importance and history of source codes in astrophysics and previous efforts to develop ways in which information about astrophysics codes can be shared. We also discuss why some scientist coders resist sharing or publishing their codes, the reasons for and importance of overcoming this resistance, and alert the community to a reworking of one of the first attempts for sharing codes, the Astrophysics Source Code Library (ASCL). We discuss the implementation of the ASCL in an accompanying poster paper. We suggest that code could be given a similar level of referencing as data gets in repositories such ...

  17. Coding for optical channels

    CERN Document Server

    Djordjevic, Ivan; Vasic, Bane

    2010-01-01

    This unique book provides a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory and optical communication.

  18. 77 FR 64431 - Civil Monetary Penalty Inflation Adjustment Rule

    Science.gov (United States)

    2012-10-22

    ... final rule, without opportunity for public notice and comment. The Administrative Procedure Act (APA), 5... entities. Because the Board has determined that notice and comment are not required under the APA for this...: Adjusted Maximum maximum U.S. Code citation Civil monetary penalty description penalty amount...

  19. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  20. Three Methods for Occupation Coding Based on Statistical Learning

    Directory of Open Access Journals (Sweden)

    Gweon Hyukjun

    2017-03-01

    Full Text Available Occupation coding, an important task in official statistics, refers to coding a respondent’s text answer into one of many hundreds of occupation codes. To date, occupation coding is still at least partially conducted manually, at great expense. We propose three methods for automatic coding: combining separate models for the detailed occupation codes and for aggregate occupation codes, a hybrid method that combines a duplicate-based approach with a statistical learning algorithm, and a modified nearest neighbor approach. Using data from the German General Social Survey (ALLBUS, we show that the proposed methods improve on both the coding accuracy of the underlying statistical learning algorithm and the coding accuracy of duplicates where duplicates exist. Further, we find defining duplicates based on ngram variables (a concept from text mining is preferable to one based on exact string matches.

  1. [Oral communication: short history and some rules].

    Science.gov (United States)

    Panini, Roberta; Fiorini, Fulvio

    2015-01-01

    The verbal communication represents the first human communication, that even more used and one most immediate. History and the development of communication is divided into historical periods, is complex and is bound to the period contingencies and to the social reference community. The oral communication is never isolated but is always taken by the not verbal one, including the silences, the position and the spaces (c.d. proxemics). The good communicator stimulates the cooperation through the conversation rule respect (qualities, amounts, way and relation) and reduces the possible asymmetry between broadcaster and receiver fitting its code to that of the interlocutor.

  2. Exploring Consumer Behavior: Use of Association Rules

    Directory of Open Access Journals (Sweden)

    Pavel Turčínek

    2015-01-01

    Full Text Available This paper focuses on problematic of use of association rules in exploring consumer behavior and presents selected results of applied data analyses on data collected via questionnaire survey on a sample of 1127 Czech respondents with structure close to representative sample of population the Czech Republic. The questionnaire survey deals with problematic of shopping for meat products. The objective was to explore possibilities of less frequently used data-mining techniques in processing of customer preference. For the data analyses, two methods for generating association rules are used: Apriori algorithm and FP-grow algorithm. Both of them were executed in Weka software. The Apriori algorithm seemed to be a better tool, because it has provided finer data, due to the fact that FP-growth algorithm needed reduction of preference scale to only two extreme values, because the input data must be binary. For consumer preferences we also calculated their means. This paper explores the different preferences and expectations of what customers’ favorite outlet should provide, and offer. Customers based on the type of their outlet loyalty were divided into five segments and further explored in more detail. Some of the found best association rules suggest similar patterns across the whole sample, e.g. the results suggest that the respondents for whom a quality of merchandise is a very important factor typically also base their outlet selection on freshness of products. This finding applies to all types of retail loyalty categores. Other rules seem to indicate a behavior more specific for a particular segment of customers. The results suggest that application of association rules in customer research can provide more insight and can be a good supplementary analysis for consumer data exploration when Likert scales were used.

  3. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  4. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow...

  5. Refactoring test code

    NARCIS (Netherlands)

    Deursen, A. van; Moonen, L.M.F.; Bergh, A. van den; Kok, G.

    2001-01-01

    Two key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from refactoring product

  6. ARC Code TI: CODE Software Framework

    Data.gov (United States)

    National Aeronautics and Space Administration — CODE is a software framework for control and observation in distributed environments. The basic functionality of the framework allows a user to observe a distributed...

  7. ARC Code TI: ROC Curve Code Augmentation

    Data.gov (United States)

    National Aeronautics and Space Administration — ROC (Receiver Operating Characteristic) curve Code Augmentation was written by Rodney Martin and John Stutz at NASA Ames Research Center and is a modification of ROC...

  8. Fountain Codes: LT And Raptor Codes Implementation

    Directory of Open Access Journals (Sweden)

    Ali Bazzi, Hiba Harb

    2017-01-01

    Full Text Available Digital fountain codes are a new class of random error correcting codes designed for efficient and reliable data delivery over erasure channels such as internet. These codes were developed to provide robustness against erasures in a way that resembles a fountain of water. A digital fountain is rateless in a way that sender can send limitless number of encoded packets. The receiver doesn’t care which packets are received or lost as long as the receiver gets enough packets to recover original data. In this paper, the design of the fountain codes is explored with its implementation of the encoding and decoding algorithm so that the performance in terms of encoding/decoding symbols, reception overhead, data length, and failure probability is studied.

  9. Rough Set Model for Discovering Hybrid Association Rules

    CERN Document Server

    Pandey, Anjana

    2009-01-01

    In this paper, the mining of hybrid association rules with rough set approach is investigated as the algorithm RSHAR.The RSHAR algorithm is constituted of two steps mainly. At first, to join the participant tables into a general table to generate the rules which is expressing the relationship between two or more domains that belong to several different tables in a database. Then we apply the mapping code on selected dimension, which can be added directly into the information system as one certain attribute. To find the association rules, frequent itemsets are generated in second step where candidate itemsets are generated through equivalence classes and also transforming the mapping code in to real dimensions. The searching method for candidate itemset is similar to apriori algorithm. The analysis of the performance of algorithm has been carried out.

  10. Universal Rateless Codes From Coupled LT Codes

    CERN Document Server

    Aref, Vahid

    2011-01-01

    It was recently shown that spatial coupling of individual low-density parity-check codes improves the belief-propagation threshold of the coupled ensemble essentially to the maximum a posteriori threshold of the underlying ensemble. We study the performance of spatially coupled low-density generator-matrix ensembles when used for transmission over binary-input memoryless output-symmetric channels. We show by means of density evolution that the threshold saturation phenomenon also takes place in this setting. Our motivation for studying low-density generator-matrix codes is that they can easily be converted into rateless codes. Although there are already several classes of excellent rateless codes known to date, rateless codes constructed via spatial coupling might offer some additional advantages. In particular, by the very nature of the threshold phenomenon one expects that codes constructed on this principle can be made to be universal, i.e., a single construction can uniformly approach capacity over the cl...

  11. Software Certification - Coding, Code, and Coders

    Science.gov (United States)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  12. Transformation of Graphical ECA Policies into Executable PonderTalk Code

    Science.gov (United States)

    Romeikat, Raphael; Sinsel, Markus; Bauer, Bernhard

    Rules are becoming more and more important in business modeling and systems engineering and are recognized as a high-level programming paradigma. For the effective development of rules it is desired to start at a high level, e.g. with graphical rules, and to refine them into code of a particular rule language for implementation purposes later. An model-driven approach is presented in this paper to transform graphical rules into executable code in a fully automated way. The focus is on event-condition-action policies as a special rule type. These are modeled graphically and translated into the PonderTalk language. The approach may be extended to integrate other rule types and languages as well.

  13. Coding for Electronic Mail

    Science.gov (United States)

    Rice, R. F.; Lee, J. J.

    1986-01-01

    Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.

  14. Testing the reduction rule

    CERN Document Server

    Hegerfeldt, G C

    2011-01-01

    The reduction rule, also known as the projection postulate, specifies the state after an ideal measurement. There are two forms, the original rule of von Neumann and a nowadays mostly used modification thereof due to L\\"uders, but sometimes also attributed to von Neumann. However, which form applies depends on the details of the measuring apparatus. Here we therefore consider the following problem: Given an ensemble of systems in an unknown pure or mixed state, an observable $\\hat A$ and an apparatus which performs a measurement of $\\hat A$ on the ensemble, but whose detailed working is unknown ('black box'), how can one test whether the apparatus performs a L\\"uders or von Neumann measurement?

  15. Chaos Rules Revisited

    Directory of Open Access Journals (Sweden)

    David Murphy

    2011-11-01

    Full Text Available About 20 years ago, while lost in the midst of my PhD research, I mused over proposed titles for my thesis. I was pretty pleased with myself when I came up with Chaos Rules (the implied double meaning was deliberate, or more completely, Chaos Rules: An Exploration of the Work of Instructional Designers in Distance Education. I used the then-emerging theories of chaos and complexity to underpin my analysis. So it was with more than a little excitement that I read the call for contributions to this special issue of IRRODL. What follows is a walk-through of my thesis with an emphasis on the contribution of chaos and complexity theory.

  16. Noisy Network Coding

    CERN Document Server

    Lim, Sung Hoon; Gamal, Abbas El; Chung, Sae-Young

    2010-01-01

    A noisy network coding scheme for sending multiple sources over a general noisy network is presented. For multi-source multicast networks, the scheme naturally extends both network coding over noiseless networks by Ahlswede, Cai, Li, and Yeung, and compress-forward coding for the relay channel by Cover and El Gamal to general discrete memoryless and Gaussian networks. The scheme also recovers as special cases the results on coding for wireless relay networks and deterministic networks by Avestimehr, Diggavi, and Tse, and coding for wireless erasure networks by Dana, Gowaikar, Palanki, Hassibi, and Effros. The scheme involves message repetition coding, relay signal compression, and simultaneous decoding. Unlike previous compress--forward schemes, where independent messages are sent over multiple blocks, the same message is sent multiple times using independent codebooks as in the network coding scheme for cyclic networks. Furthermore, the relays do not use Wyner--Ziv binning as in previous compress-forward sch...

  17. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2009-01-01

    Property testing was initially studied from various motivations in 1990's.A code C (∩)GF(r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector's coordinates.The problem of testing codes was firstly studied by Blum,Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs).How to characterize locally testable codes is a complex and challenge problem.The local tests have been studied for Reed-Solomon (RS),Reed-Muller (RM),cyclic,dual of BCH and the trace subcode of algebraicgeometric codes.In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions).We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  18. Chinese remainder codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Aili; LIU Xiufeng

    2006-01-01

    Chinese remainder codes are constructed by applying weak block designs and the Chinese remainder theorem of ring theory.The new type of linear codes take the congruence class in the congruence class ring R/I1 ∩ I2 ∩…∩ In for the information bit,embed R/Ji into R/I1 ∩ I2 ∩…∩ In,and assign the cosets of R/Ji as the subring of R/I1 ∩ I2 ∩…∩ In and the cosets of R/Ji in R/I1 ∩ I2 ∩…∩ In as check lines.Many code classes exist in the Chinese remainder codes that have high code rates.Chinese remainder codes are the essential generalization of Sun Zi codes.

  19. Chinese Remainder Codes

    Institute of Scientific and Technical Information of China (English)

    张爱丽; 刘秀峰; 靳蕃

    2004-01-01

    Chinese Remainder Codes are constructed by applying weak block designs and Chinese Remainder Theorem of ring theory. The new type of linear codes take the congruence class in the congruence class ring R/I1∩I2∩…∩In for the information bit, embed R/Ji into R/I1∩I2∩…∩In, and asssign the cosets of R/Ji as the subring of R/I1∩I2∩…∩In and the cosets of R/Ji in R/I1∩I2∩…∩In as check lines. There exist many code classes in Chinese Remainder Codes, which have high code rates. Chinese Remainder Codes are the essential generalization of Sun Zi Codes.

  20. Code of Ethics

    DEFF Research Database (Denmark)

    Adelstein, Jennifer; Clegg, Stewart

    2016-01-01

    Ethical codes have been hailed as an explicit vehicle for achieving more sustainable and defensible organizational practice. Nonetheless, when legal compliance and corporate governance codes are conflated, codes can be used to define organizational interests ostentatiously by stipulating norms...... for employee ethics. Such codes have a largely cosmetic and insurance function, acting subtly and strategically to control organizational risk management and protection. In this paper, we conduct a genealogical discourse analysis of a representative code of ethics from an international corporation...... to understand how management frames expectations of compliance. Our contribution is to articulate the problems inherent in codes of ethics, and we make some recommendations to address these to benefit both an organization and its employees. In this way, we show how a code of ethics can provide a foundation...

  1. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Property testing was initially studied from various motivations in 1990’s. A code C  GF (r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector’s coordinates. The problem of testing codes was firstly studied by Blum, Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs). How to characterize locally testable codes is a complex and challenge problem. The local tests have been studied for Reed-Solomon (RS), Reed-Muller (RM), cyclic, dual of BCH and the trace subcode of algebraicgeometric codes. In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions). We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  2. Serially Concatenated IRA Codes

    CERN Document Server

    Cheng, Taikun; Belzer, Benjamin J

    2007-01-01

    We address the error floor problem of low-density parity check (LDPC) codes on the binary-input additive white Gaussian noise (AWGN) channel, by constructing a serially concatenated code consisting of two systematic irregular repeat accumulate (IRA) component codes connected by an interleaver. The interleaver is designed to prevent stopping-set error events in one of the IRA codes from propagating into stopping set events of the other code. Simulations with two 128-bit rate 0.707 IRA component codes show that the proposed architecture achieves a much lower error floor at higher SNRs, compared to a 16384-bit rate 1/2 IRA code, but incurs an SNR penalty of about 2 dB at low to medium SNRs. Experiments indicate that the SNR penalty can be reduced at larger blocklengths.

  3. New Games, New Rules

    DEFF Research Database (Denmark)

    Constantiou, Ioanna; Kallinikos, Jannis

    2015-01-01

    , the usefulness of big data rests on their steady updatability, a condition that reduces the time span within which this data is useful or relevant. Jointly, these attributes challenge established rules of strategy making as these are manifested in the canons of procuring structured information of lasting value...... the wider social and institutional context of longstanding data practices and the significance they carry for management and organizations....

  4. Real Rules of Inference

    Science.gov (United States)

    1986-01-01

    Robert Nozick’s acceptance rule [Noz81], Acc(h) iff Prob(K I h) > = I- e and Prob(K I -h) <= e and Prob(h) > Prob(K I -h), for small e: and I.J. Good and...Solving," IJCAI 1983. [Noz8ll Nozick , R. Philosophical Explanations, Harvard, 1981. (Nut84] Nute, D. "Logical Relations," Philosophical Studies 46, 1984

  5. Modal extension rule

    Institute of Scientific and Technical Information of China (English)

    WU Xia; SUN Jigui; LIN Hai; FENG Shasha

    2005-01-01

    Modal logics are good candidates for a formal theory of agents. The efficiency of reasoning method in modal logics is very important, because it determines whether or not the reasoning method can be widely used in systems based on agent. In this paper,we modify the extension rule theorem proving method we presented before, and then apply it to P-logic that is translated from modal logic by functional transformation. At last, we give the proof of its soundness and completeness.

  6. Authentication-secrecy code based on conies over finite fields

    Institute of Scientific and Technical Information of China (English)

    裴定一; 王学理

    1996-01-01

    An authentication-secrecy code based on the rational normal curves over finite fields was constructed,whose probabilities of successful deception achieve their information-theoretic bounds.The set of encoding rules for this code is a representation system for cosets of a certain subgroup in the projective transformation group.A special case is studied,i.e.the rational normal curves are the conies over finite fields.The representation system for the cosets which determines the set of encoding rules will be given.

  7. Consistence of Network Filtering Rules

    Institute of Scientific and Technical Information of China (English)

    SHE Kun; WU Yuancheng; HUANG Juncai; ZHOU Mingtian

    2004-01-01

    The inconsistence of firewall/VPN(Virtual Private Network) rule makes a huge maintainable cost.With development of Multinational Company,SOHO office,E-government the number of firewalls/VPN will increase rapidly.Rule table in stand-alone or network will be increased in geometric series accordingly.Checking the consistence of rule table manually is inadequate.A formal approach can define semantic consistence,make a theoretic foundation of intelligent management about rule tables.In this paper,a kind of formalization of host rules and network ones for auto rule-validation based on SET theory were proporsed and a rule validation scheme was defined.The analysis results show the superior performance of the methods and demonstrate its potential for the intelligent management based on rule tables.

  8. REx: An Efficient Rule Generator

    CERN Document Server

    Kamruzzaman, S M

    2010-01-01

    This paper describes an efficient algorithm REx for generating symbolic rules from artificial neural network (ANN). Classification rules are sought in many areas from automatic knowledge acquisition to data mining and ANN rule extraction. This is because classification rules possess some attractive features. They are explicit, understandable and verifiable by domain experts, and can be modified, extended and passed on as modular knowledge. REx exploits the first order information in the data and finds shortest sufficient conditions for a rule of a class that can differentiate it from patterns of other classes. It can generate concise and perfect rules in the sense that the error rate of the rules is not worse than the inconsistency rate found in the original data. An important feature of rule extraction algorithm, REx, is its recursive nature. They are concise, comprehensible, order insensitive and do not involve any weight values. Extensive experimental studies on several benchmark classification problems, s...

  9. Hominoid-specific de novo protein-coding genes originating from long non-coding RNAs.

    Directory of Open Access Journals (Sweden)

    Chen Xie

    2012-09-01

    Full Text Available Tinkering with pre-existing genes has long been known as a major way to create new genes. Recently, however, motherless protein-coding genes have been found to have emerged de novo from ancestral non-coding DNAs. How these genes originated is not well addressed to date. Here we identified 24 hominoid-specific de novo protein-coding genes with precise origination timing in vertebrate phylogeny. Strand-specific RNA-Seq analyses were performed in five rhesus macaque tissues (liver, prefrontal cortex, skeletal muscle, adipose, and testis, which were then integrated with public transcriptome data from human, chimpanzee, and rhesus macaque. On the basis of comparing the RNA expression profiles in the three species, we found that most of the hominoid-specific de novo protein-coding genes encoded polyadenylated non-coding RNAs in rhesus macaque or chimpanzee with a similar transcript structure and correlated tissue expression profile. According to the rule of parsimony, the majority of these hominoid-specific de novo protein-coding genes appear to have acquired a regulated transcript structure and expression profile before acquiring coding potential. Interestingly, although the expression profile was largely correlated, the coding genes in human often showed higher transcriptional abundance than their non-coding counterparts in rhesus macaque. The major findings we report in this manuscript are robust and insensitive to the parameters used in the identification and analysis of de novo genes. Our results suggest that at least a portion of long non-coding RNAs, especially those with active and regulated transcription, may serve as a birth pool for protein-coding genes, which are then further optimized at the transcriptional level.

  10. Hominoid-specific de novo protein-coding genes originating from long non-coding RNAs.

    Directory of Open Access Journals (Sweden)

    Chen Xie

    2012-09-01

    Full Text Available Tinkering with pre-existing genes has long been known as a major way to create new genes. Recently, however, motherless protein-coding genes have been found to have emerged de novo from ancestral non-coding DNAs. How these genes originated is not well addressed to date. Here we identified 24 hominoid-specific de novo protein-coding genes with precise origination timing in vertebrate phylogeny. Strand-specific RNA-Seq analyses were performed in five rhesus macaque tissues (liver, prefrontal cortex, skeletal muscle, adipose, and testis, which were then integrated with public transcriptome data from human, chimpanzee, and rhesus macaque. On the basis of comparing the RNA expression profiles in the three species, we found that most of the hominoid-specific de novo protein-coding genes encoded polyadenylated non-coding RNAs in rhesus macaque or chimpanzee with a similar transcript structure and correlated tissue expression profile. According to the rule of parsimony, the majority of these hominoid-specific de novo protein-coding genes appear to have acquired a regulated transcript structure and expression profile before acquiring coding potential. Interestingly, although the expression profile was largely correlated, the coding genes in human often showed higher transcriptional abundance than their non-coding counterparts in rhesus macaque. The major findings we report in this manuscript are robust and insensitive to the parameters used in the identification and analysis of de novo genes. Our results suggest that at least a portion of long non-coding RNAs, especially those with active and regulated transcription, may serve as a birth pool for protein-coding genes, which are then further optimized at the transcriptional level.

  11. Modifications of Team Sports Rules.

    Science.gov (United States)

    Rokosz, Francis M.

    In general, there are two reasons for modifying the rules in sport activities: (1) to meet a specific objective or (2) to solve a perceived problem. The sense of the original game is usually not altered significantly because the number of rule changes is kept to a minimum. Changes in rules may be made for administrative or financial reasons, or to…

  12. Rule activity related to spatial and numerical magnitudes: comparison of prefrontal, premotor, and cingulate motor cortices.

    Science.gov (United States)

    Eiselt, Anne-Kathrin; Nieder, Andreas

    2014-05-01

    In everyday situations, quantitative rules, such as "greater than/less than," need to be applied to a multitude of magnitude comparisons, be they sensory, spatial, temporal, or numerical. We have previously shown that rules applied to different magnitudes are encoded in the lateral PFC. To investigate if and how other frontal lobe areas also contribute to the encoding of quantitative rules applied to multiple magnitudes, we trained monkeys to switch between "greater than/less than" rules applied to either line lengths (spatial magnitudes) or dot numerosities (discrete numerical magnitudes). We recorded single-cell activity from the dorsal premotor cortex (dPMC) and cingulate motor cortex (CMA) and compared it with PFC activity. We found the largest proportion of quantitative rule-selective cells in PFC (24% of randomly selected cells), whereas neurons in dPMC and CMA rarely encoded the rule (6% of the cells). In addition, rule selectivity of individual cells was highest in PFC neurons compared with dPMC and CMA neurons. Rule-selective neurons that simultaneously represented the "greater than/less than" rules applied to line lengths and numerosities ("rule generalists") were exclusively present in PFC. In dPMC and CMA, however, neurons primarily encoded rules applied to only one of the two magnitude types ("rule specialists"). Our data suggest a special involvement of PFC in representing quantitative rules at an abstract level, both in terms of the proportion of neurons engaged and the coding capacities.

  13. Rewriting the Genetic Code.

    Science.gov (United States)

    Mukai, Takahito; Lajoie, Marc J; Englert, Markus; Söll, Dieter

    2017-09-08

    The genetic code-the language used by cells to translate their genomes into proteins that perform many cellular functions-is highly conserved throughout natural life. Rewriting the genetic code could lead to new biological functions such as expanding protein chemistries with noncanonical amino acids (ncAAs) and genetically isolating synthetic organisms from natural organisms and viruses. It has long been possible to transiently produce proteins bearing ncAAs, but stabilizing an expanded genetic code for sustained function in vivo requires an integrated approach: creating recoded genomes and introducing new translation machinery that function together without compromising viability or clashing with endogenous pathways. In this review, we discuss design considerations and technologies for expanding the genetic code. The knowledge obtained by rewriting the genetic code will deepen our understanding of how genomes are designed and how the canonical genetic code evolved.

  14. On Polynomial Remainder Codes

    CERN Document Server

    Yu, Jiun-Hung

    2012-01-01

    Polynomial remainder codes are a large class of codes derived from the Chinese remainder theorem that includes Reed-Solomon codes as a special case. In this paper, we revisit these codes and study them more carefully than in previous work. We explicitly allow the code symbols to be polynomials of different degrees, which leads to two different notions of weight and distance. Algebraic decoding is studied in detail. If the moduli are not irreducible, the notion of an error locator polynomial is replaced by an error factor polynomial. We then obtain a collection of gcd-based decoding algorithms, some of which are not quite standard even when specialized to Reed-Solomon codes.

  15. 76 FR 5735 - Revisions to EPA's Rule on Protections for Subjects in Human Research Involving Pesticides

    Science.gov (United States)

    2011-02-02

    ... requirement that human studies be ``designed and based on the results of animal experimentation.'' Finally... the principles of the Nuremberg Code with respect to human experimentation; and shall establish an... Nuremberg Code pertaining to human experimentation. Petitioners argued that the 2006 rule was...

  16. Generating code adapted for interlinking legacy scalar code and extended vector code

    Science.gov (United States)

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  17. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  18. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    We welcome Tanya Stivers’s discussion (Stivers, 2015/this issue) of coding social interaction and find that her descriptions of the processes of coding open up important avenues for discussion, among other things of the precise ad hoc considerations that researchers need to bear in mind, both when....... Instead we propose that the promise of coding-based research lies in its ability to open up new qualitative questions....

  19. Industrial Computer Codes

    Science.gov (United States)

    Shapiro, Wilbur

    1996-01-01

    This is an overview of new and updated industrial codes for seal design and testing. GCYLT (gas cylindrical seals -- turbulent), SPIRALI (spiral-groove seals -- incompressible), KTK (knife to knife) Labyrinth Seal Code, and DYSEAL (dynamic seal analysis) are covered. CGYLT uses G-factors for Poiseuille and Couette turbulence coefficients. SPIRALI is updated to include turbulence and inertia, but maintains the narrow groove theory. KTK labyrinth seal code handles straight or stepped seals. And DYSEAL provides dynamics for the seal geometry.

  20. ARC Code TI: ACCEPT

    Data.gov (United States)

    National Aeronautics and Space Administration — ACCEPT consists of an overall software infrastructure framework and two main software components. The software infrastructure framework consists of code written to...

  1. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  2. Tokamak Systems Code

    Energy Technology Data Exchange (ETDEWEB)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.

  3. MORSE Monte Carlo code

    Energy Technology Data Exchange (ETDEWEB)

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described.

  4. Description logic rules

    CERN Document Server

    Krötzsch, M

    2010-01-01

    Ontological modelling today is applied in many areas of science and technology,including the Semantic Web. The W3C standard OWL defines one of the most important ontology languages based on the semantics of description logics. An alternative is to use rule languages in knowledge modelling, as proposed in the W3C's RIF standard. So far, it has often been unclear how to combine both technologies without sacrificing essential computational properties. This book explains this problem and presents new solutions that have recently been proposed. Extensive introductory chapters provide the necessary

  5. Service dogs. Final rule.

    Science.gov (United States)

    2012-09-05

    The Department of Veterans Affairs (VA) amends its regulations concerning veterans in need of service dogs. Under this final rule, VA will provide to veterans with visual, hearing, or mobility impairments benefits to support the use of a service dog as part of the management of such impairments. The benefits include assistance with veterinary care, travel benefits associated with obtaining and training a dog, and the provision, maintenance, and replacement of hardware required for the dog to perform the tasks necessary to assist such veterans.

  6. Efficient coding of wavelet trees and its applications in image coding

    Science.gov (United States)

    Zhu, Bin; Yang, En-hui; Tewfik, Ahmed H.; Kieffer, John C.

    1996-02-01

    We propose in this paper a novel lossless tree coding algorithm. The technique is a direct extension of the bisection method, the simplest case of the complexity reduction method proposed recently by Kieffer and Yang, that has been used for lossless data string coding. A reduction rule is used to obtain the irreducible representation of a tree, and this irreducible tree is entropy-coded instead of the input tree itself. This reduction is reversible, and the original tree can be fully recovered from its irreducible representation. More specifically, we search for equivalent subtrees from top to bottom. When equivalent subtrees are found, a special symbol is appended to the value of the root node of the first equivalent subtree, and the root node of the second subtree is assigned to the index which points to the first subtree, an all other nodes in the second subtrees are removed. This procedure is repeated until it cannot be reduced further. This yields the irreducible tree or irreducible representation of the original tree. The proposed method can effectively remove the redundancy in an image, and results in more efficient compression. It is proved that when the tree size approaches infinity, the proposed method offers the optimal compression performance. It is generally more efficient in practice than direct coding of the input tree. The proposed method can be directly applied to code wavelet trees in non-iterative wavelet-based image coding schemes. A modified method is also proposed for coding wavelet zerotrees in embedded zerotree wavelet (EZW) image coding. Although its coding efficiency is slightly reduced, the modified version maintains exact control of bit rate and the scalability of the bit stream in EZW coding.

  7. Communicating transparancy : a genre network approach : how do corporate governance codes - the SOX and the Tabaksblad Code - affect Dutch cross-listed companies' corporate communication?

    NARCIS (Netherlands)

    Laval, S.C.

    2010-01-01

    The financial scandals around 2000 caused the need for changes in the corporate governance systems. The consequence was the establishment of the US Sarbanes-Oxley Act and the Dutch Tabaksblat Code. These corporate governance codes include rules for 'good governance'. The goal of 'good governance' is

  8. Communicating transparancy : a genre network approach : how do corporate governance codes - the SOX and the Tabaksblad Code - affect Dutch cross-listed companies' corporate communication?

    NARCIS (Netherlands)

    Laval, S.C.

    2010-01-01

    The financial scandals around 2000 caused the need for changes in the corporate governance systems. The consequence was the establishment of the US Sarbanes-Oxley Act and the Dutch Tabaksblat Code. These corporate governance codes include rules for 'good governance'. The goal of 'good governance' is

  9. Comparison of Thermal Creep Strain Calculation Results Using Time Hardening and Strain Hardening Rules

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Junehyung; Cheon, Jinsik; Lee, Byoungoon; Lee, Chanbock [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-05-15

    One of the design criteria for the fuel rod in PGSFR is the thermal creep strain of the cladding, because the cladding is exposed to a high temperature for a long time during reactor operation period. In general, there are two kind of calculation scheme for thermal creep strain: time hardening and strain hardening rules. In this work, thermal creep strain calculation results for HT9 cladding by using time hardening and strain hardening rules are compared by employing KAERI's current metallic fuel performance analysis code, MACSIS. Also, thermal creep strain calculation results by using ANL's metallic fuel performance analysis code, LIFE-METAL which adopts strain hardening rule are compared with those by using MACSIS. Thermal creep strain calculation results for HT9 cladding by using time hardening and strain hardening rules were compared by employing KAERI's current metallic fuel performance analysis code, MACSIS. Also, thermal creep strain calculation results by using ANL's metallic fuel performance analysis code, LIFE-METAL which adopts strain hardening rule were compared with those by using MACSIS. Tertiary creep started earlier in time hardening rule than in strain hardening rule. Also, calculation results by MACSIS with strain hardening and those obtained by using LIFE-METAL were almost identical to each other.

  10. Origin and evolution of the genetic code: the universal enigma.

    Science.gov (United States)

    Koonin, Eugene V; Novozhilov, Artem S

    2009-02-01

    The genetic code is nearly universal, and the arrangement of the codons in the standard codon table is highly nonrandom. The three main concepts on the origin and evolution of the code are the stereochemical theory, according to which codon assignments are dictated by physicochemical affinity between amino acids and the cognate codons (anticodons); the coevolution theory, which posits that the code structure coevolved with amino acid biosynthesis pathways; and the error minimization theory under which selection to minimize the adverse effect of point mutations and translation errors was the principal factor of the code's evolution. These theories are not mutually exclusive and are also compatible with the frozen accident hypothesis, that is, the notion that the standard code might have no special properties but was fixed simply because all extant life forms share a common ancestor, with subsequent changes to the code, mostly, precluded by the deleterious effect of codon reassignment. Mathematical analysis of the structure and possible evolutionary trajectories of the code shows that it is highly robust to translational misreading but there are numerous more robust codes, so the standard code potentially could evolve from a random code via a short sequence of codon series reassignments. Thus, much of the evolution that led to the standard code could be a combination of frozen accident with selection for error minimization although contributions from coevolution of the code with metabolic pathways and weak affinities between amino acids and nucleotide triplets cannot be ruled out. However, such scenarios for the code evolution are based on formal schemes whose relevance to the actual primordial evolution is uncertain. A real understanding of the code origin and evolution is likely to be attainable only in conjunction with a credible scenario for the evolution of the coding principle itself and the translation system.

  11. Research on universal combinatorial coding.

    Science.gov (United States)

    Lu, Jun; Zhang, Zhuo; Mo, Juan

    2014-01-01

    The conception of universal combinatorial coding is proposed. Relations exist more or less in many coding methods. It means that a kind of universal coding method is objectively existent. It can be a bridge connecting many coding methods. Universal combinatorial coding is lossless and it is based on the combinatorics theory. The combinational and exhaustive property make it closely related with the existing code methods. Universal combinatorial coding does not depend on the probability statistic characteristic of information source, and it has the characteristics across three coding branches. It has analyzed the relationship between the universal combinatorial coding and the variety of coding method and has researched many applications technologies of this coding method. In addition, the efficiency of universal combinatorial coding is analyzed theoretically. The multicharacteristic and multiapplication of universal combinatorial coding are unique in the existing coding methods. Universal combinatorial coding has theoretical research and practical application value.

  12. Learning from the Experience of Others: The Evolution of Faculty Tenure and Promotion Rules in Comprehensive Institutions

    Science.gov (United States)

    Youn, Ted I. K.; Price, Tanya M.

    2009-01-01

    Organizational rules explain organizational stability and change. Using national surveys and fieldwork, we examine changes in tenure and promotion rules at comprehensive colleges and universities from 1969 to 2002. We find that increased rule founding and change arise from the increasingly rationalized environment, such as the academic…

  13. A survey of TRIPOLI-4

    Energy Technology Data Exchange (ETDEWEB)

    Both, J.P.; Derriennic, H.; Morillon, B.; Nimal, J.C.

    1994-12-31

    A survey of the new version of the TRIPOLI code used in shielding calculations, is presented. The main new features introduced in this version are: combinatorial geometry, a multigroup automatic weighting scheme, and complete treatment of nuclear evaluation files; a simulation implementation including strategy for parallelization of the code is presented. Some benchmark calculations are also presented. 7 figs., 5 tabs., 4 refs.

  14. The Product and Quotient Rules Revisited

    Science.gov (United States)

    Eggleton, Roger; Kustov, Vladimir

    2011-01-01

    Mathematical elegance is illustrated by strikingly parallel versions of the product and quotient rules of basic calculus, with some applications. Corresponding rules for second derivatives are given: the product rule is familiar, but the quotient rule is less so.

  15. Safety Code A12

    CERN Multimedia

    SC Secretariat

    2005-01-01

    Please note that the Safety Code A12 (Code A12) entitled "THE SAFETY COMMISSION (SC)" is available on the web at the following url: https://edms.cern.ch/document/479423/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  16. Nuremberg code turns 60

    OpenAIRE

    Thieren, Michel; Mauron, Alex

    2007-01-01

    This month marks sixty years since the Nuremberg code – the basic text of modern medical ethics – was issued. The principles in this code were articulated in the context of the Nuremberg trials in 1947. We would like to use this anniversary to examine its ability to address the ethical challenges of our time.

  17. Pseudonoise code tracking loop

    Science.gov (United States)

    Laflame, D. T. (Inventor)

    1980-01-01

    A delay-locked loop is presented for tracking a pseudonoise (PN) reference code in an incoming communication signal. The loop is less sensitive to gain imbalances, which can otherwise introduce timing errors in the PN reference code formed by the loop.

  18. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  19. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  20. READING A NEURAL CODE

    NARCIS (Netherlands)

    BIALEK, W; RIEKE, F; VANSTEVENINCK, RRD; WARLAND, D

    1991-01-01

    Traditional approaches to neural coding characterize the encoding of known stimuli in average neural responses. Organisms face nearly the opposite task - extracting information about an unknown time-dependent stimulus from short segments of a spike train. Here the neural code was characterized from

  1. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    , Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...

  2. Introducing an interface between FeynRules and WHIZARD

    Energy Technology Data Exchange (ETDEWEB)

    Christensen, Neil D. [Pittsburgh Univ., PA (United States). PITTsburgh Particle Physics, Astrophysics and Cosmology Center; Duhr, Claude [Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenology; Fuks, Benjamin [Strasbourg Univ. (France). Inst. Pluridisciplinaire Hubert Curien - Dept. Recherches Subatomiques; Reuter, Juergen [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany). Theory Group; Freiburg Univ. (Germany). Physikalisches Inst.; Edinburgh Univ. (United Kingdom). School of Physics and Astronomy; Speckner, Christian [Freiburg Univ. (Germany). Physikalisches Inst.

    2012-04-15

    While Monte Carlo event generators like WHIZARD have become indispensable tools in studying the impact of new physics on collider observables over the last decades, the implementation of new models in such packages has remained a rather awkward and error-prone process. Recently, the FeynRules package was introduced which greatly simplifies this process by providing a single unified model format from which model implementations for many different Monte Carlo codes can be derived automatically. In this note, we present an interface which extends FeynRules to provide this functionality also for the WHIZARD package, thus making WHIZARD's strengths and performance easily available to model builders.

  3. Blending Classroom Teaching and Learning with QR Codes

    Science.gov (United States)

    Rikala, Jenni; Kankaanranta, Marja

    2014-01-01

    The aim of this case study was to explore the feasibility of the Quick Response (QR) codes and mobile devices in the context of Finnish basic education. The interest was especially to explore how mobile devices and QR codes can enhance and blend teaching and learning. The data were collected with a teacher interview and pupil surveys. The learning…

  4. Exploring Trilingual Code-Switching: The Case of "Hokaglish"

    Science.gov (United States)

    Gonzales, Wilkinson Daniel Wong

    2016-01-01

    This paper presents findings of an initial study on a trilingual code-switching (CS) phenomenon called "Hokaglish" in Binondo, Manila, The Philippines. Beginning with descriptions of multiculturalism and multilingualism in the Philippines, the discussion eventually leads to the description and survey of the code-switching phenomenon…

  5. Transformation invariant sparse coding

    DEFF Research Database (Denmark)

    Mørup, Morten; Schmidt, Mikkel Nørgaard

    2011-01-01

    Sparse coding is a well established principle for unsupervised learning. Traditionally, features are extracted in sparse coding in specific locations, however, often we would prefer invariant representation. This paper introduces a general transformation invariant sparse coding (TISC) model....... The model decomposes images into features invariant to location and general transformation by a set of specified operators as well as a sparse coding matrix indicating where and to what degree in the original image these features are present. The TISC model is in general overcomplete and we therefore invoke...... sparse coding to estimate its parameters. We demonstrate how the model can correctly identify components of non-trivial artificial as well as real image data. Thus, the model is capable of reducing feature redundancies in terms of pre-specified transformations improving the component identification....

  6. The SIFT Code Specification

    Science.gov (United States)

    1983-01-01

    The specification of Software Implemented Fault Tolerance (SIFT) consists of two parts, the specifications of the SIFT models and the specifications of the SIFT PASCAL program which actually implements the SIFT system. The code specifications are the last of a hierarchy of models describing the operation of the SIFT system and are related to the SIFT models as well as the PASCAL program. These Specifications serve to link the SIFT models to the running program. The specifications are very large and detailed and closely follow the form and organization of the PASCAL code. In addition to describing each of the components of the SIFT code, the code specifications describe the assumptions of the upper SIFT models which are required to actually prove that the code will work as specified. These constraints are imposed primarily on the schedule tables.

  7. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    discusses code as the artist’s material and, further, formulates a critique of Cramer. The seductive magic in computer-generated art does not lie in the magical expression, but nor does it lie in the code/material/text itself. It lies in the nature of code to do something – as if it was magic......Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  8. Combustion chamber analysis code

    Science.gov (United States)

    Przekwas, A. J.; Lai, Y. G.; Krishnan, A.; Avva, R. K.; Giridharan, M. G.

    1993-05-01

    A three-dimensional, time dependent, Favre averaged, finite volume Navier-Stokes code has been developed to model compressible and incompressible flows (with and without chemical reactions) in liquid rocket engines. The code has a non-staggered formulation with generalized body-fitted-coordinates (BFC) capability. Higher order differencing methodologies such as MUSCL and Osher-Chakravarthy schemes are available. Turbulent flows can be modeled using any of the five turbulent models present in the code. A two-phase, two-liquid, Lagrangian spray model has been incorporated into the code. Chemical equilibrium and finite rate reaction models are available to model chemically reacting flows. The discrete ordinate method is used to model effects of thermal radiation. The code has been validated extensively against benchmark experimental data and has been applied to model flows in several propulsion system components of the SSME and the STME.

  9. Astrophysics Source Code Library

    CERN Document Server

    Allen, Alice; Berriman, Bruce; Hanisch, Robert J; Mink, Jessica; Teuben, Peter J

    2012-01-01

    The Astrophysics Source Code Library (ASCL), founded in 1999, is a free on-line registry for source codes of interest to astronomers and astrophysicists. The library is housed on the discussion forum for Astronomy Picture of the Day (APOD) and can be accessed at http://ascl.net. The ASCL has a comprehensive listing that covers a significant number of the astrophysics source codes used to generate results published in or submitted to refereed journals and continues to grow. The ASCL currently has entries for over 500 codes; its records are citable and are indexed by ADS. The editors of the ASCL and members of its Advisory Committee were on hand at a demonstration table in the ADASS poster room to present the ASCL, accept code submissions, show how the ASCL is starting to be used by the astrophysics community, and take questions on and suggestions for improving the resource.

  10. Sanctions Connected to Dress Code Violations in Secondary School Handbooks

    Science.gov (United States)

    Workman, Jane E.; Freeburg, Elizabeth W.; Lentz-Hees, Elizabeth S.

    2004-01-01

    This study identifies and evaluates sanctions for dress code violations in secondary school handbooks. Sanctions, or consequences for breaking rules, vary along seven interrelated dimensions: source, formality, retribution, obtrusiveness, magnitude, severity, and pervasiveness. A content analysis of handbooks from 155 public secondary schools…

  11. Sanctions Connected to Dress Code Violations in Secondary School Handbooks

    Science.gov (United States)

    Workman, Jane E.; Freeburg, Elizabeth W.; Lentz-Hees, Elizabeth S.

    2004-01-01

    This study identifies and evaluates sanctions for dress code violations in secondary school handbooks. Sanctions, or consequences for breaking rules, vary along seven interrelated dimensions: source, formality, retribution, obtrusiveness, magnitude, severity, and pervasiveness. A content analysis of handbooks from 155 public secondary schools…

  12. Code Generation for a Simple First-Order Prover

    DEFF Research Database (Denmark)

    Villadsen, Jørgen; Schlichtkrull, Anders; Halkjær From, Andreas

    2016-01-01

    We present Standard ML code generation in Isabelle/HOL of a sound and complete prover for first-order logic, taking formalizations by Tom Ridge and others as the starting point. We also define a set of so-called unfolding rules and show how to use these as a simple prover, with the aim of using...

  13. Simulation of large-scale rule-based models

    Energy Technology Data Exchange (ETDEWEB)

    Hlavacek, William S [Los Alamos National Laboratory; Monnie, Michael I [Los Alamos National Laboratory; Colvin, Joshua [NON LANL; Faseder, James [NON LANL

    2008-01-01

    Interactions of molecules, such as signaling proteins, with multiple binding sites and/or multiple sites of post-translational covalent modification can be modeled using reaction rules. Rules comprehensively, but implicitly, define the individual chemical species and reactions that molecular interactions can potentially generate. Although rules can be automatically processed to define a biochemical reaction network, the network implied by a set of rules is often too large to generate completely or to simulate using conventional procedures. To address this problem, we present DYNSTOC, a general-purpose tool for simulating rule-based models. DYNSTOC implements a null-event algorithm for simulating chemical reactions in a homogenous reaction compartment. The simulation method does not require that a reaction network be specified explicitly in advance, but rather takes advantage of the availability of the reaction rules in a rule-based specification of a network to determine if a randomly selected set of molecular components participates in a reaction during a time step. DYNSTOC reads reaction rules written in the BioNetGen language which is useful for modeling protein-protein interactions involved in signal transduction. The method of DYNSTOC is closely related to that of STOCHSIM. DYNSTOC differs from STOCHSIM by allowing for model specification in terms of BNGL, which extends the range of protein complexes that can be considered in a model. DYNSTOC enables the simulation of rule-based models that cannot be simulated by conventional methods. We demonstrate the ability of DYNSTOC to simulate models accounting for multisite phosphorylation and multivalent binding processes that are characterized by large numbers of reactions. DYNSTOC is free for non-commercial use. The C source code, supporting documentation and example input files are available at .

  14. Unanimity rule on networks

    Science.gov (United States)

    Lambiotte, Renaud; Thurner, Stefan; Hanel, Rudolf

    2007-10-01

    We present a model for innovation, evolution, and opinion dynamics whose spreading is dictated by a unanimity rule. The underlying structure is a directed network, the state of a node is either activated or inactivated. An inactivated node will change only if all of its incoming links come from nodes that are activated, while an activated node will remain activated forever. It is shown that a transition takes place depending on the initial condition of the problem. In particular, a critical number of initially activated nodes is necessary for the whole system to get activated in the long-time limit. The influence of the degree distribution of the nodes is naturally taken into account. For simple network topologies we solve the model analytically; the cases of random and small world are studied in detail. Applications for food-chain dynamics and viral marketing are discussed.

  15. Ruled Laguerre minimal surfaces

    KAUST Repository

    Skopenkov, Mikhail

    2011-10-30

    A Laguerre minimal surface is an immersed surface in ℝ 3 being an extremal of the functional ∫ (H 2/K-1)dA. In the present paper, we prove that the only ruled Laguerre minimal surfaces are up to isometry the surfaces ℝ (φλ) = (Aφ, Bφ, Cφ + D cos 2φ) + λ(sin φ, cos φ, 0), where A,B,C,D ε ℝ are fixed. To achieve invariance under Laguerre transformations, we also derive all Laguerre minimal surfaces that are enveloped by a family of cones. The methodology is based on the isotropic model of Laguerre geometry. In this model a Laguerre minimal surface enveloped by a family of cones corresponds to a graph of a biharmonic function carrying a family of isotropic circles. We classify such functions by showing that the top view of the family of circles is a pencil. © 2011 Springer-Verlag.

  16. The biosphere rules.

    Science.gov (United States)

    Unruh, Gregory C

    2008-02-01

    Sustainability, defined by natural scientists as the capacity of healthy ecosystems to function indefinitely, has become a clarion call for business. Leading companies have taken high-profile steps toward achieving it: Wal-Mart, for example, with its efforts to reduce packaging waste, and Nike, which has removed toxic chemicals from its shoes. But, says Unruh, the director of Thunderbird's Lincoln Center for Ethics in Global Management, sustainability is more than an endless journey of incremental steps. It is a destination, for which the biosphere of planet Earth--refined through billions of years of trial and error--is a perfect model. Unruh distills some lessons from the biosphere into three rules: Use a parsimonious palette. Managers can rethink their sourcing strategies and dramatically simplify the number and types of materials their companies use in production, making recycling cost-effective. After the furniture manufacturer Herman Miller discovered that its leading desk chair had 200 components made from more than 800 chemical compounds, it designed an award-winning successor whose far more limited materials palette is 96% recyclable. Cycle up, virtuously. Manufacturers should design recovery value into their products at the outset. Shaw Industries, for example, recycles the nylon fiber from its worn-out carpet into brand-new carpet tile. Exploit the power of platforms. Platform design in industry tends to occur at the component level--but the materials in those components constitute a more fundamental platform. Patagonia, by recycling Capilene brand performance underwear, has achieved energy costs 76% below those for virgin sourcing. Biosphere rules can teach companies how to build ecologically friendly products that both reduce manufacturing costs and prove highly attractive to consumers. And managers need not wait for a green technological revolution to implement them.

  17. On the Organizational Dynamics of the Genetic Code

    KAUST Repository

    Zhang, Zhang

    2011-06-07

    The organization of the canonical genetic code needs to be thoroughly illuminated. Here we reorder the four nucleotides—adenine, thymine, guanine and cytosine—according to their emergence in evolution, and apply the organizational rules to devising an algebraic representation for the canonical genetic code. Under a framework of the devised code, we quantify codon and amino acid usages from a large collection of 917 prokaryotic genome sequences, and associate the usages with its intrinsic structure and classification schemes as well as amino acid physicochemical properties. Our results show that the algebraic representation of the code is structurally equivalent to a content-centric organization of the code and that codon and amino acid usages under different classification schemes were correlated closely with GC content, implying a set of rules governing composition dynamics across a wide variety of prokaryotic genome sequences. These results also indicate that codons and amino acids are not randomly allocated in the code, where the six-fold degenerate codons and their amino acids have important balancing roles for error minimization. Therefore, the content-centric code is of great usefulness in deciphering its hitherto unknown regularities as well as the dynamics of nucleotide, codon, and amino acid compositions.

  18. On the organizational dynamics of the genetic code.

    Science.gov (United States)

    Zhang, Zhang; Yu, Jun

    2011-04-01

    The organization of the canonical genetic code needs to be thoroughly illuminated. Here we reorder the four nucleotides-adenine, thymine, guanine and cytosine-according to their emergence in evolution, and apply the organizational rules to devising an algebraic representation for the canonical genetic code. Under a framework of the devised code, we quantify codon and amino acid usages from a large collection of 917 prokaryotic genome sequences, and associate the usages with its intrinsic structure and classification schemes as well as amino acid physicochemical properties. Our results show that the algebraic representation of the code is structurally equivalent to a content-centric organization of the code and that codon and amino acid usages under different classification schemes were correlated closely with GC content, implying a set of rules governing composition dynamics across a wide variety of prokaryotic genome sequences. These results also indicate that codons and amino acids are not randomly allocated in the code, where the six-fold degenerate codons and their amino acids have important balancing roles for error minimization. Therefore, the content-centric code is of great usefulness in deciphering its hitherto unknown regularities as well as the dynamics of nucleotide, codon, and amino acid compositions.

  19. Error Correcting Coding for a Non-symmetric Ternary Channel

    CERN Document Server

    Bitouze, Nicolas; Rosnes, Eirik

    2009-01-01

    Ternary channels can be used to model the behavior of some memory devices, where information is stored in three different levels. In this paper, error correcting coding for a ternary channel where some of the error transitions are not allowed, is considered. The resulting channel is non-symmetric, therefore classical linear codes are not optimal for this channel. We define the maximum-likelihood (ML) decoding rule for ternary codes over this channel and show that it is complex to compute, since it depends on the channel error probability. A simpler alternative decoding rule which depends only on code properties, called $\\da$-decoding, is then proposed. It is shown that $\\da$-decoding and ML decoding are equivalent, i.e., $\\da$-decoding is optimal, under certain conditions. Assuming $\\da$-decoding, we characterize the error correcting capabilities of ternary codes over the non-symmetric ternary channel. We also derive an upper bound and a constructive lower bound on the size of codes, given the code length and...

  20. Use of Ontology Structure and Bayesian Models to Aid the Crowdsourcing of ICD-11 Sanctioning Rules.

    Science.gov (United States)

    Lou, Yun; Tu, Samson W; Nyulas, Csongor; Tudorache, Tania; Chalmers, Robert J G; Musen, Mark A

    2017-02-10

    The International Classification of Diseases (ICD) is the de facto standard international classification for mortality reporting and for many epidemiological, clinical, and financial use cases. The next version of ICD, ICD-11, will be submitted for approval by the World Health Assembly in 2018. Unlike previous versions of ICD, where coders mostly select single codes from pre-enumerated disease and disorder codes, ICD-11 coding will allow extensive use of multiple codes to give more detailed disease descriptions. For example, "severe malignant neoplasms of left breast" may be coded using the combination of a "stem code" (e.g., code for malignant neoplasms of breast) with a variety of "extension codes" (e.g., codes for laterality and severity). The use of multiple codes (a process called post-coordination), while avoiding the pitfall of having to pre-enumerate vast number of possible disease and qualifier combinations, risks the creation of meaningless expressions that combine stem codes with inappropriate qualifiers. To prevent that from happening, "sanctioning rules" that define legal combinations are necessary. In this work, we developed a crowdsourcing method for obtaining sanctioning rules for the post-coordination of concepts in ICD-11. Our method utilized the hierarchical structures in the domain to improve the accuracy of the sanctioning rules and to lower the crowdsourcing cost. We used Bayesian networks to model crowd workers' skills, the accuracy of their responses, and our confidence in the acquired sanctioning rules. We applied reinforcement learning to develop an agent that constantly adjusted the confidence cutoffs during the crowdsourcing process to maximize the overall quality of sanctioning rules under a fixed budget. Finally, we performed formative evaluations using a skin-disease branch of the draft ICD-11 and demonstrated that the crowd-sourced sanctioning rules replicated those defined by an expert dermatologist with high precision and recall

  1. First-order formative rules

    OpenAIRE

    Fuhs, Carsten; Kop, C.

    2014-01-01

    This paper discusses the method of formative rules for first-order term rewriting, which was previously defined for a higher-order setting. Dual to the well-known usable rules, formative rules allow dropping some of the term constraints that need to be solved during a termination proof. Compared to the higher-order definition, the first-order setting allows for significant improvements of the technique.

  2. Remarks on kernel Bayes' rule

    OpenAIRE

    Johno, Hisashi; Nakamoto, Kazunori; Saigo, Tatsuhiko

    2015-01-01

    Kernel Bayes' rule has been proposed as a nonparametric kernel-based method to realize Bayesian inference in reproducing kernel Hilbert spaces. However, we demonstrate both theoretically and experimentally that the prediction result by kernel Bayes' rule is in some cases unnatural. We consider that this phenomenon is in part due to the fact that the assumptions in kernel Bayes' rule do not hold in general.

  3. Rule-Based Semantic Sensing

    CERN Document Server

    Woznowski, Przemyslaw

    2011-01-01

    Rule-Based Systems have been in use for decades to solve a variety of problems but not in the sensor informatics domain. Rules aid the aggregation of low-level sensor readings to form a more complete picture of the real world and help to address 10 identified challenges for sensor network middleware. This paper presents the reader with an overview of a system architecture and a pilot application to demonstrate the usefulness of a system integrating rules with sensor middleware.

  4. 77 FR 3073 - American Society of Mechanical Engineers (ASME) Codes and New and Revised ASME Code Cases...

    Science.gov (United States)

    2012-01-23

    ... Maintenance of Nuclear Power Plants (OM Code). The final rule also incorporated by reference (with conditions... described in the GALL report, or propose alternatives (exceptions) for the NRC to review as part of a plant... acceptable approach for aging management--through inservice inspection--of PWR nickel-alloy upper vessel head...

  5. Legal Rules on the Purchase Contract under the Czech new Civil Code – – Selected Problems / Právní Úprava Kupní Smlouvy Ve Světle Nového Občanského Zákoníku Čr – – Vybrané Problémy

    Directory of Open Access Journals (Sweden)

    Janků Martin

    2016-06-01

    Full Text Available The goal of the present paper is to draw attention to some key rules and principles of the purchase contract. After the specification of this contract type we will deal in more details with the defective performance and the procedure of its complaint. As suggest the first assessment and reviews of the application of new legislation in its practical use and by the case law, in the achievement of the objective desired by the NCC - to increase the transparency of the procedure of complaints - the new legislation stacked in the middle of the way. The paper compares the impact of the new the previous and the current regulations, We will use the method of functional analysis as well as the method of legal formalistic comparison. It is obvious that the new rules respect the former régime of commercial contracts. The business sphere has undoubtedly welcomed this feature of the legal regime as the merchandisers are familiar with these rules. The second issue is, however, how this modification in the general regulation meets the expectations of the to provide sufficient legal certainty in the interpretation of contractual provisions and in the access to the protection of their interests by courts in the event of disputes.

  6. Embedded foveation image coding.

    Science.gov (United States)

    Wang, Z; Bovik, A C

    2001-01-01

    The human visual system (HVS) is highly space-variant in sampling, coding, processing, and understanding. The spatial resolution of the HVS is highest around the point of fixation (foveation point) and decreases rapidly with increasing eccentricity. By taking advantage of this fact, it is possible to remove considerable high-frequency information redundancy from the peripheral regions and still reconstruct a perceptually good quality image. Great success has been obtained previously by a class of embedded wavelet image coding algorithms, such as the embedded zerotree wavelet (EZW) and the set partitioning in hierarchical trees (SPIHT) algorithms. Embedded wavelet coding not only provides very good compression performance, but also has the property that the bitstream can be truncated at any point and still be decoded to recreate a reasonably good quality image. In this paper, we propose an embedded foveation image coding (EFIC) algorithm, which orders the encoded bitstream to optimize foveated visual quality at arbitrary bit-rates. A foveation-based image quality metric, namely, foveated wavelet image quality index (FWQI), plays an important role in the EFIC system. We also developed a modified SPIHT algorithm to improve the coding efficiency. Experiments show that EFIC integrates foveation filtering with foveated image coding and demonstrates very good coding performance and scalability in terms of foveated image quality measurement.

  7. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity in the net...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof.......Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...

  8. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  9. Application of RS Codes in Decoding QR Code

    Institute of Scientific and Technical Information of China (English)

    Zhu Suxia(朱素霞); Ji Zhenzhou; Cao Zhiyan

    2003-01-01

    The QR Code is a 2-dimensional matrix code with high error correction capability. It employs RS codes to generate error correction codewords in encoding and recover errors and damages in decoding. This paper presents several QR Code's virtues, analyzes RS decoding algorithm and gives a software flow chart of decoding the QR Code with RS decoding algorithm.

  10. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...

  11. Admissibility of logical inference rules

    CERN Document Server

    Rybakov, VV

    1997-01-01

    The aim of this book is to present the fundamental theoretical results concerning inference rules in deductive formal systems. Primary attention is focused on: admissible or permissible inference rules the derivability of the admissible inference rules the structural completeness of logics the bases for admissible and valid inference rules. There is particular emphasis on propositional non-standard logics (primary, superintuitionistic and modal logics) but general logical consequence relations and classical first-order theories are also considered. The book is basically self-contained and

  12. Fluctuations in classical sum rules.

    Science.gov (United States)

    Elton, John R; Lakshminarayan, Arul; Tomsovic, Steven

    2010-10-01

    Classical sum rules arise in a wide variety of physical contexts. Asymptotic expressions have been derived for many of these sum rules in the limit of long orbital period (or large action). Although sum-rule convergence may well be exponentially rapid for chaotic systems in a global phase-space sense with time, individual contributions to the sums may fluctuate with a width which diverges in time. Our interest is in the global convergence of sum rules as well as their local fluctuations. It turns out that a simple version of a lazy baker map gives an ideal system in which classical sum rules, their corrections, and their fluctuations can be worked out analytically. This is worked out in detail for the Hannay-Ozorio sum rule. In this particular case the rate of convergence of the sum rule is found to be governed by the Pollicott-Ruelle resonances, and both local and global boundaries for which the sum rule may converge are given. In addition, the width of the fluctuations is considered and worked out analytically, and it is shown to have an interesting dependence on the location of the region over which the sum rule is applied. It is also found that as the region of application is decreased in size the fluctuations grow. This suggests a way of controlling the length scale of the fluctuations by considering a time dependent phase-space volume, which for the lazy baker map decreases exponentially rapidly with time.

  13. Changing the Rules? RDA and cataloguing in Europe

    Directory of Open Access Journals (Sweden)

    Alan Danskin

    2014-11-01

    Full Text Available This paper provides an overview of plans to implement RDA: Resource Description & Access in Europe to replace existing cataloguing rules.  It is based on survey information gathered by EURIG and CILIP CIG.  It includes background on the development of RDA as a replacement for AACR2.

  14. Distributed multiple description coding

    CERN Document Server

    Bai, Huihui; Zhao, Yao

    2011-01-01

    This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed to address the problems of conventional image and video compression coding. Covering all fundamental concepts and core technologies, the chapters can also be read as independent and self-sufficient, describing each methodology in sufficient detail to enable readers to repeat the corresponding experiments easily. Topics and features: provides a broad overview of DVC and MDC, from the basic principles to the latest research; covers sub-sampling based MDC, quantization based MDC,

  15. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  16. Coded MapReduce

    OpenAIRE

    Li, Songze; Maddah-Ali, Mohammad Ali; Avestimehr, A. Salman

    2015-01-01

    MapReduce is a commonly used framework for executing data-intensive jobs on distributed server clusters. We introduce a variant implementation of MapReduce, namely "Coded MapReduce", to substantially reduce the inter-server communication load for the shuffling phase of MapReduce, and thus accelerating its execution. The proposed Coded MapReduce exploits the repetitive mapping of data blocks at different servers to create coding opportunities in the shuffling phase to exchange (key,value) pair...

  17. Classical Holographic Codes

    CERN Document Server

    Brehm, Enrico M

    2016-01-01

    In this work, we introduce classical holographic codes. These can be understood as concatenated probabilistic codes and can be represented as networks uniformly covering hyperbolic space. In particular, classical holographic codes can be interpreted as maps from bulk degrees of freedom to boundary degrees of freedom. Interestingly, they are shown to exhibit features similar to those expected from the AdS/CFT correspondence. Among these are a version of the Ryu-Takayanagi formula and intriguing properties regarding bulk reconstruction and boundary representations of bulk operations. We discuss the relation of our findings with expectations from AdS/CFT and, in particular, with recent results from quantum error correction.

  18. Reducing Computational Overhead of Network Coding with Intrinsic Information Conveying

    DEFF Research Database (Denmark)

    Heide, Janus; Zhang, Qi; Pedersen, Morten V.

    This paper investigated the possibility of intrinsic information conveying in network coding systems. The information is embedded into the coding vector by constructing the vector based on a set of predefined rules. This information can subsequently be retrieved by any receiver. The starting point...... to the overall energy consumption, which is particular problematic for mobile battery-driven devices. In RLNC coding is performed over a FF (Finite Field). We propose to divide this field into sub fields, and let each sub field signify some information or state. In order to embed the information correctly...... the coding operations must be performed in a particular way, which we introduce. Finally we evaluate the suggested system and find that the amount of coding can be significantly reduced both at nodes that recode and decode....

  19. An Efficient Retransmission Based on Network Coding with Unicast Flows

    CERN Document Server

    Zhou, Zhiheng; Tan, Yuanquan; Wang, Xing

    2010-01-01

    Recently, network coding technique has emerged as a promising approach that supports reliable transmission over wireless loss channels. In existing protocols where users have no interest in considering the encoded packets they had in coding or decoding operations, this rule is expensive and inef-ficient. This paper studies the impact of encoded packets in the reliable unicast network coding via some theoretical analysis. Using our approach, receivers do not only store the encoded packets they overheard, but also report these information to their neighbors, such that users enable to take account of encoded packets in their coding decisions as well as decoding operations. Moreover, we propose a redistribution algorithm to maximize the coding opportunities, which achieves better retransmission efficiency. Finally, theoretical analysis and simulation results for a wheel network illustrate the improve-ment in retransmissions efficiency due to the encoded packets.

  20. Research and implementation of flexible coding system oriented multi-view

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xuhui; ZHANG Xu; NING Ruxin

    2007-01-01

    On the basis of the requirements of a product data management system (PDM) for the flexible coding system,the principle of the flexible coding system oriented multiview is analyzed. Generation and utilization of coding should be associated with the context of the object. The architecture of the flexible coding system oriented multi-view is studied and the implementation class diagram of the system is designed. The system can support the establishment of five types of code segments, provide the tools of flexible defining coding rules and drive the automatic generation of object coding in different views (contexts). On the foundation of the characteristics of the system, coding for parts is taken as a sample to validate and elaborate the flexible coding process of the system.

  1. Family Enterprise in Czech Civil Code

    Directory of Open Access Journals (Sweden)

    Janku Martin

    2016-12-01

    Full Text Available For more than two decades the family business enterprises of the first generation (generation of founders are more and more dominating in the category of today’s small and medium–sized enterprises in the Czech Republic. The necessary legal background defining the legal relationships and rights of all participating persons was, however, limited to general provisions in the Commercial Code that has not solved many of the problems associated thereto. Only in 2012 the new Czech Civil Code, Act. No 89/2012 Coll., introduced the institute of family enterprise as completely new term in the Czech Civil law. The presented paper aims to analyse the key rules of this new legal regulation, focusing on significant aspects of the institute in the context of commercial law and family law, as well as, to highlight the potential weaknesses and gaps existing in the regulation.

  2. 78 FR 66409 - Self-Regulatory Organizations; NYSE Arca, Inc.; Order Granting Approval of Proposed Rule Change...

    Science.gov (United States)

    2013-11-05

    .... This Rule requires investment advisers to adopt a code of ethics that reflects the fiduciary nature of the relationship to clients as well as compliance with other applicable securities laws. Accordingly...

  3. Modeling Guidelines for Code Generation in the Railway Signaling Context

    Science.gov (United States)

    Ferrari, Alessio; Bacherini, Stefano; Fantechi, Alessandro; Zingoni, Niccolo

    2009-01-01

    Modeling guidelines constitute one of the fundamental cornerstones for Model Based Development. Their relevance is essential when dealing with code generation in the safety-critical domain. This article presents the experience of a railway signaling systems manufacturer on this issue. Introduction of Model-Based Development (MBD) and code generation in the industrial safety-critical sector created a crucial paradigm shift in the development process of dependable systems. While traditional software development focuses on the code, with MBD practices the focus shifts to model abstractions. The change has fundamental implications for safety-critical systems, which still need to guarantee a high degree of confidence also at code level. Usage of the Simulink/Stateflow platform for modeling, which is a de facto standard in control software development, does not ensure by itself production of high-quality dependable code. This issue has been addressed by companies through the definition of modeling rules imposing restrictions on the usage of design tools components, in order to enable production of qualified code. The MAAB Control Algorithm Modeling Guidelines (MathWorks Automotive Advisory Board)[3] is a well established set of publicly available rules for modeling with Simulink/Stateflow. This set of recommendations has been developed by a group of OEMs and suppliers of the automotive sector with the objective of enforcing and easing the usage of the MathWorks tools within the automotive industry. The guidelines have been published in 2001 and afterwords revisited in 2007 in order to integrate some additional rules developed by the Japanese division of MAAB [5]. The scope of the current edition of the guidelines ranges from model maintainability and readability to code generation issues. The rules are conceived as a reference baseline and therefore they need to be tailored to comply with the characteristics of each industrial context. Customization of these

  4. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  5. VT ZIP Code Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) A ZIP Code Tabulation Area (ZCTA) is a statistical geographic entity that approximates the delivery area for a U.S. Postal Service five-digit...

  6. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  7. GOOGLE SUMMER OF CODE

    National Research Council Canada - National Science Library

    Leslie Hawthorn

    2008-01-01

      This article examines the Google Summer of Code (GSoC) program, the world's first global initiative to introduce College and University students to free/libre open source software (F/LOSS) development...

  8. Bandwidth efficient coding

    CERN Document Server

    Anderson, John B

    2017-01-01

    Bandwidth Efficient Coding addresses the major challenge in communication engineering today: how to communicate more bits of information in the same radio spectrum. Energy and bandwidth are needed to transmit bits, and bandwidth affects capacity the most. Methods have been developed that are ten times as energy efficient at a given bandwidth consumption as simple methods. These employ signals with very complex patterns and are called "coding" solutions. The book begins with classical theory before introducing new techniques that combine older methods of error correction coding and radio transmission in order to create narrowband methods that are as efficient in both spectrum and energy as nature allows. Other topics covered include modulation techniques such as CPM, coded QAM and pulse design.

  9. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi

    2015-01-01

    , in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of coded......The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered...... as waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access...

  10. Code Disentanglement: Initial Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wohlbier, John Greaton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kelley, Timothy M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rockefeller, Gabriel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Calef, Matthew Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  11. Annotated Raptor Codes

    CERN Document Server

    Mahdaviani, Kaveh; Tellambura, Chintha

    2011-01-01

    In this paper, an extension of raptor codes is introduced which keeps all the desirable properties of raptor codes, including the linear complexity of encoding and decoding per information bit, unchanged. The new design, however, improves the performance in terms of the reception rate. Our simulations show a 10% reduction in the needed overhead at the benchmark block length of 64,520 bits and with the same complexity per information bit.

  12. Robust Nonlinear Neural Codes

    Science.gov (United States)

    Yang, Qianli; Pitkow, Xaq

    2015-03-01

    Most interesting natural sensory stimuli are encoded in the brain in a form that can only be decoded nonlinearly. But despite being a core function of the brain, nonlinear population codes are rarely studied and poorly understood. Interestingly, the few existing models of nonlinear codes are inconsistent with known architectural features of the brain. In particular, these codes have information content that scales with the size of the cortical population, even if that violates the data processing inequality by exceeding the amount of information entering the sensory system. Here we provide a valid theory of nonlinear population codes by generalizing recent work on information-limiting correlations in linear population codes. Although these generalized, nonlinear information-limiting correlations bound the performance of any decoder, they also make decoding more robust to suboptimal computation, allowing many suboptimal decoders to achieve nearly the same efficiency as an optimal decoder. Although these correlations are extremely difficult to measure directly, particularly for nonlinear codes, we provide a simple, practical test by which one can use choice-related activity in small populations of neurons to determine whether decoding is suboptimal or optimal and limited by correlated noise. We conclude by describing an example computation in the vestibular system where this theory applies. QY and XP was supported by a grant from the McNair foundation.

  13. Scalable motion vector coding

    Science.gov (United States)

    Barbarien, Joeri; Munteanu, Adrian; Verdicchio, Fabio; Andreopoulos, Yiannis; Cornelis, Jan P.; Schelkens, Peter

    2004-11-01

    Modern video coding applications require transmission of video data over variable-bandwidth channels to a variety of terminals with different screen resolutions and available computational power. Scalable video coding is needed to optimally support these applications. Recently proposed wavelet-based video codecs employing spatial domain motion compensated temporal filtering (SDMCTF) provide quality, resolution and frame-rate scalability while delivering compression performance comparable to that of the state-of-the-art non-scalable H.264-codec. These codecs require scalable coding of the motion vectors in order to support a large range of bit-rates with optimal compression efficiency. Scalable motion vector coding algorithms based on the integer wavelet transform followed by embedded coding of the wavelet coefficients were recently proposed. In this paper, a new and fundamentally different scalable motion vector codec (MVC) using median-based motion vector prediction is proposed. Extensive experimental results demonstrate that the proposed MVC systematically outperforms the wavelet-based state-of-the-art solutions. To be able to take advantage of the proposed scalable MVC, a rate allocation mechanism capable of optimally dividing the available rate among texture and motion information is required. Two rate allocation strategies are proposed and compared. The proposed MVC and rate allocation schemes are incorporated into an SDMCTF-based video codec and the benefits of scalable motion vector coding are experimentally demonstrated.

  14. On Expanded Cyclic Codes

    CERN Document Server

    Wu, Yingquan

    2008-01-01

    The paper has a threefold purpose. The first purpose is to present an explicit description of expanded cyclic codes defined in $\\GF(q^m)$. The proposed explicit construction of expanded generator matrix and expanded parity check matrix maintains the symbol-wise algebraic structure and thus keeps many important original characteristics. The second purpose of this paper is to identify a class of constant-weight cyclic codes. Specifically, we show that a well-known class of $q$-ary BCH codes excluding the all-zero codeword are constant-weight cyclic codes. Moreover, we show this class of codes achieve the Plotkin bound. The last purpose of the paper is to characterize expanded cyclic codes utilizing the proposed expanded generator matrix and parity check matrix. We analyze the properties of component codewords of a codeword and particularly establish the precise conditions under which a codeword can be represented by a subbasis. With the new insights, we present an improved lower bound on the minimum distance of...

  15. AERA Code of Ethics: American Educational Research Association Approved by the AERA Council February 2011

    Science.gov (United States)

    Educational Researcher, 2011

    2011-01-01

    The Code of Ethics of the American Educational Research Association (AERA) articulates a common set of values upon which education researchers build their professional and scientific work. The Code is intended to provide both the principles and the rules to cover professional situations encountered by education researchers. It has as its primary…

  16. Amendment of the Provisions of the Dutch Penal Code Pertaining to the Exercise of Extraterritorial Jurisdiction

    NARCIS (Netherlands)

    Ryngaert, Cedric

    2014-01-01

    By the Act of 27 November 2013, the Dutch Government has radically changed the provisions of its Penal Code pertaining to the exercise of extraterritorial jurisdiction (Arts. 4-8 Penal Code). The new rules take effect from July 1st 2014 onwards. Most importantly, the Act widens the scope of the

  17. INTRA/Mod3.2. Manual and Code Description. Volume I - Physical Modelling

    Energy Technology Data Exchange (ETDEWEB)

    Andersson, Jenny; Edlund, O.; Hermann, J.; Johansson, Lise-Lotte

    1999-01-01

    The INTRA Manual consists of two volumes. Volume I of the manual is a thorough description of the code INTRA, the Physical modelling of INTRA and the ruling numerical methods and volume II, the User`s Manual is an input description. This document, the Physical modelling of INTRA, contains code characteristics, integration methods and applications

  18. Revised Rules for Concrete Bridges

    DEFF Research Database (Denmark)

    Thoft-Christensen, Palle; Jensen, F. M.; Middleton, C.;

    This paper is based on research performed for the Highway Agency, London, UK under the project DPU/9/44 "Revision of Bridge Assessment Rules Based on Whole Life Performance: Concrete Bridges" It contains details of a methodology which can be used to generate Whole Life (WL) reliability profiles....... These WL reliability profiles may be used to establish revised rules for Concrete Bridges....

  19. Optimising synaptic learning rules in linear associative memories.

    Science.gov (United States)

    Dayan, P; Willshaw, D J

    1991-01-01

    Associative matrix memories with real-valued synapses have been studied in many incarnations. We consider how the signal/noise ratio for associations depends on the form of the learning rule, and we show that a covariance rule is optimal. Two other rules, which have been suggested in the neurobiology literature, are asymptotically optimal in the limit of sparse coding. The results appear to contradict a line of reasoning particularly prevalent in the physics community. It turns out that the apparent conflict is due to the adoption of different underlying models. Ironically, they perform identically at their co-incident optima. We give details of the mathematical results, and discuss some other possible derivations and definitions of the signal/noise ratio.

  20. Generalisation of the Ostwald's rule

    Science.gov (United States)

    Anisimov, M. P.; Petrova-Bogdanova, O. O.

    2013-05-01

    More than century ago, Ostwald (1897) [1] manifested a rule, which, according his assumption, was a general principle for any process in nature. The rule was formulated by Ostwald and named as a rule of stages with is giving a formation sequence of different phases. Schmelzer et al. [2] generalized this rule of stages for nucleation. In the present research the dynamics of phase transformations is considered using the recent idea (Anisimov et al. [3]) for a semiempirical design of the nucleation rate surfaces. The current generalization of the Ostwald's rule for the formation sequences of phases is proved on the basis of common results on nucleation studies. It is very natural to think that any new phase formation (not prohibited by thermodynamic constrains) can be realized for each channel of phase transformation even the probability of some kind of the new phases is low. The relative efficiency of each channel can be dramatically changed when parameters of process are varied.

  1. Spatio-Temporal Rule Mining

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Pedersen, Torben Bach

    2005-01-01

    Recent advances in communication and information technology, such as the increasing accuracy of GPS technology and the miniaturization of wireless communication devices pave the road for Location-Based Services (LBS). To achieve high quality for such services, spatio-temporal data mining techniques...... are needed. In this paper, we describe experiences with spatio-temporal rule mining in a Danish data mining company. First, a number of real world spatio-temporal data sets are described, leading to a taxonomy of spatio-temporal data. Second, the paper describes a general methodology that transforms...... the spatio-temporal rule mining task to the traditional market basket analysis task and applies it to the described data sets, enabling traditional association rule mining methods to discover spatio-temporal rules for LBS. Finally, unique issues in spatio-temporal rule mining are identified and discussed....

  2. Non-Binary Polar Codes using Reed-Solomon Codes and Algebraic Geometry Codes

    CERN Document Server

    Mori, Ryuhei

    2010-01-01

    Polar codes, introduced by Arikan, achieve symmetric capacity of any discrete memoryless channels under low encoding and decoding complexity. Recently, non-binary polar codes have been investigated. In this paper, we calculate error probability of non-binary polar codes constructed on the basis of Reed-Solomon matrices by numerical simulations. It is confirmed that 4-ary polar codes have significantly better performance than binary polar codes on binary-input AWGN channel. We also discuss an interpretation of polar codes in terms of algebraic geometry codes, and further show that polar codes using Hermitian codes have asymptotically good performance.

  3. Distributed Video Coding: Iterative Improvements

    DEFF Research Database (Denmark)

    Luong, Huynh Van

    Nowadays, emerging applications such as wireless visual sensor networks and wireless video surveillance are requiring lightweight video encoding with high coding efficiency and error-resilience. Distributed Video Coding (DVC) is a new coding paradigm which exploits the source statistics...

  4. Polynomial weights and code constructions

    DEFF Research Database (Denmark)

    Massey, J; Costello, D; Justesen, Jørn

    1973-01-01

    polynomial included. This fundamental property is then used as the key to a variety of code constructions including 1) a simplified derivation of the binary Reed-Muller codes and, for any primepgreater than 2, a new extensive class ofp-ary "Reed-Muller codes," 2) a new class of "repeated-root" cyclic codes...... that are subcodes of the binary Reed-Muller codes and can be very simply instrumented, 3) a new class of constacyclic codes that are subcodes of thep-ary "Reed-Muller codes," 4) two new classes of binary convolutional codes with large "free distance" derived from known binary cyclic codes, 5) two new classes...... of long constraint length binary convolutional codes derived from2^r-ary Reed-Solomon codes, and 6) a new class ofq-ary "repeated-root" constacyclic codes with an algebraic decoding algorithm....

  5. China to Develop Rules for Composing a Standards System for Enterprise Energy Efficiency

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    @@ April 11, 2007, SAC announced a survey on a standards system for enterprise energy efficiency. According to the announcement, "Rules for the Composing of a Standards System for Enterprise Energy Efficiency" shall be developed based on the results of the survey. The rules are designed to better manage energy efficiency through standards and to give advice to companies on energy efficiency. In this way, China will be able to assist companies in energy efficiency on a more professional, strict, and comprehensive basis.

  6. Product Codes for Optical Communication

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    2002-01-01

    Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes.......Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes....

  7. Some new ternary linear codes

    Directory of Open Access Journals (Sweden)

    Rumen Daskalov

    2017-07-01

    Full Text Available Let an $[n,k,d]_q$ code be a linear code of length $n$, dimension $k$ and minimum Hamming distance $d$ over $GF(q$. One of the most important problems in coding theory is to construct codes with optimal minimum distances. In this paper 22 new ternary linear codes are presented. Two of them are optimal. All new codes improve the respective lower bounds in [11].

  8. Algebraic geometric codes with applications

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2007-01-01

    The theory of linear error-correcting codes from algebraic geomet-ric curves (algebraic geometric (AG) codes or geometric Goppa codes) has been well-developed since the work of Goppa and Tsfasman, Vladut, and Zink in 1981-1982. In this paper we introduce to readers some recent progress in algebraic geometric codes and their applications in quantum error-correcting codes, secure multi-party computation and the construction of good binary codes.

  9. 78 FR 42036 - Radio Broadcasting Services; Port Lions, AK, De Beque, CO, Benjamin, Cisco, Rule, and Shamrock, TX

    Science.gov (United States)

    2013-07-15

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Port Lions, AK, De Beque, CO, Benjamin, Cisco, Rule... 237C3; Cisco, Channel 261C3; Rule, Channel 288C2; and Shamrock, Channel 225C2. BILLING CODE 6712-01-P...

  10. The rule of rescue.

    Science.gov (United States)

    McKie, John; Richardson, Jeff

    2003-06-01

    Jonsen coined the term "Rule of Rescue"(RR) to describe the imperative people feel to rescue identifiable individuals facing avoidable death. In this paper we attempt to draw a more detailed picture of the RR, identifying its conflict with cost-effectiveness analysis, the preference it entails for identifiable over statistical lives, the shock-horror response it elicits, the preference it entails for lifesaving over non-lifesaving measures, its extension to non-life-threatening conditions, and whether it is motivated by duty or sympathy. We also consider the measurement problems it raises, and argue that quantifying the RR would probably require a two-stage procedure. In the first stage the size of the individual utility gain from a health intervention would be assessed using a technique such as the Standard Gamble or the Time Trade-Off, and in the second the social benefits arising from the RR would be quantified employing the Person Trade-Off. We also consider the normative status of the RR. We argue that it can be defended from a utilitarian point of view, on the ground that rescues increase well-being by reinforcing people's belief that they live in a community that places great value upon life. However, utilitarianism has long been criticised for failing to take sufficient account of fairness, and the case is no different here: fairness requires that we do not discriminate between individuals on morally irrelevant grounds, whereas being "identifiable" does not seem to be a morally relevant ground for discrimination.

  11. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  12. Algebraic and stochastic coding theory

    CERN Document Server

    Kythe, Dave K

    2012-01-01

    Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.

  13. Golden Coded Multiple Beamforming

    CERN Document Server

    Li, Boyu

    2010-01-01

    The Golden Code is a full-rate full-diversity space-time code, which achieves maximum coding gain for Multiple-Input Multiple-Output (MIMO) systems with two transmit and two receive antennas. Since four information symbols taken from an M-QAM constellation are selected to construct one Golden Code codeword, a maximum likelihood decoder using sphere decoding has the worst-case complexity of O(M^4), when the Channel State Information (CSI) is available at the receiver. Previously, this worst-case complexity was reduced to O(M^(2.5)) without performance degradation. When the CSI is known by the transmitter as well as the receiver, beamforming techniques that employ singular value decomposition are commonly used in MIMO systems. In the absence of channel coding, when a single symbol is transmitted, these systems achieve the full diversity order provided by the channel. Whereas this property is lost when multiple symbols are simultaneously transmitted. However, uncoded multiple beamforming can achieve the full div...

  14. Coded source neutron imaging

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; Santos-Villalobos, Hector J [ORNL

    2011-01-01

    Coded aperture techniques have been applied to neutron radiography to address limitations in neutron flux and resolution of neutron detectors in a system labeled coded source imaging (CSI). By coding the neutron source, a magnified imaging system is designed with small spot size aperture holes (10 and 100 m) for improved resolution beyond the detector limits and with many holes in the aperture (50% open) to account for flux losses due to the small pinhole size. An introduction to neutron radiography and coded aperture imaging is presented. A system design is developed for a CSI system with a development of equations for limitations on the system based on the coded image requirements and the neutron source characteristics of size and divergence. Simulation has been applied to the design using McStas to provide qualitative measures of performance with simulations of pinhole array objects followed by a quantitative measure through simulation of a tilted edge and calculation of the modulation transfer function (MTF) from the line spread function. MTF results for both 100um and 10um aperture hole diameters show resolutions matching the hole diameters.

  15. Coded source neutron imaging

    Science.gov (United States)

    Bingham, Philip; Santos-Villalobos, Hector; Tobin, Ken

    2011-03-01

    Coded aperture techniques have been applied to neutron radiography to address limitations in neutron flux and resolution of neutron detectors in a system labeled coded source imaging (CSI). By coding the neutron source, a magnified imaging system is designed with small spot size aperture holes (10 and 100μm) for improved resolution beyond the detector limits and with many holes in the aperture (50% open) to account for flux losses due to the small pinhole size. An introduction to neutron radiography and coded aperture imaging is presented. A system design is developed for a CSI system with a development of equations for limitations on the system based on the coded image requirements and the neutron source characteristics of size and divergence. Simulation has been applied to the design using McStas to provide qualitative measures of performance with simulations of pinhole array objects followed by a quantitative measure through simulation of a tilted edge and calculation of the modulation transfer function (MTF) from the line spread function. MTF results for both 100μm and 10μm aperture hole diameters show resolutions matching the hole diameters.

  16. 9 CFR 11.3 - Scar rule.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Scar rule. 11.3 Section 11.3 Animals... WELFARE HORSE PROTECTION REGULATIONS § 11.3 Scar rule. The scar rule applies to all horses born on or after October 1, 1975. Horses subject to this rule that do not meet the following scar rule...

  17. Speech coding code- excited linear prediction

    CERN Document Server

    Bäckström, Tom

    2017-01-01

    This book provides scientific understanding of the most central techniques used in speech coding both for advanced students as well as professionals with a background in speech audio and or digital signal processing. It provides a clear connection between the whys hows and whats thus enabling a clear view of the necessity purpose and solutions provided by various tools as well as their strengths and weaknesses in each respect Equivalently this book sheds light on the following perspectives for each technology presented Objective What do we want to achieve and especially why is this goal important Resource Information What information is available and how can it be useful and Resource Platform What kind of platforms are we working with and what are their capabilities restrictions This includes computational memory and acoustic properties and the transmission capacity of devices used. The book goes on to address Solutions Which solutions have been proposed and how can they be used to reach the stated goals and ...

  18. Phase-coded pulse aperiodic transmitter coding

    Directory of Open Access Journals (Sweden)

    I. I. Virtanen

    2009-07-01

    Full Text Available Both ionospheric and weather radar communities have already adopted the method of transmitting radar pulses in an aperiodic manner when measuring moderately overspread targets. Among the users of the ionospheric radars, this method is called Aperiodic Transmitter Coding (ATC, whereas the weather radar users have adopted the term Simultaneous Multiple Pulse-Repetition Frequency (SMPRF. When probing the ionosphere at the carrier frequencies of the EISCAT Incoherent Scatter Radar facilities, the range extent of the detectable target is typically of the order of one thousand kilometers – about seven milliseconds – whereas the characteristic correlation time of the scattered signal varies from a few milliseconds in the D-region to only tens of microseconds in the F-region. If one is interested in estimating the scattering autocorrelation function (ACF at time lags shorter than the F-region correlation time, the D-region must be considered as a moderately overspread target, whereas the F-region is a severely overspread one. Given the technical restrictions of the radar hardware, a combination of ATC and phase-coded long pulses is advantageous for this kind of target. We evaluate such an experiment under infinitely low signal-to-noise ratio (SNR conditions using lag profile inversion. In addition, a qualitative evaluation under high-SNR conditions is performed by analysing simulated data. The results show that an acceptable estimation accuracy and a very good lag resolution in the D-region can be achieved with a pulse length long enough for simultaneous E- and F-region measurements with a reasonable lag extent. The new experiment design is tested with the EISCAT Tromsø VHF (224 MHz radar. An example of a full D/E/F-region ACF from the test run is shown at the end of the paper.

  19. Nested Quantum Error Correction Codes

    CERN Document Server

    Wang, Zhuo; Fan, Hen; Vedral, Vlatko

    2009-01-01

    The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

  20. MHD Generation Code

    CERN Document Server

    Frutos-Alfaro, Francisco

    2015-01-01

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

  1. Autocatalysis, information and coding.

    Science.gov (United States)

    Wills, P R

    2001-01-01

    Autocatalytic self-construction in macromolecular systems requires the existence of a reflexive relationship between structural components and the functional operations they perform to synthesise themselves. The possibility of reflexivity depends on formal, semiotic features of the catalytic structure-function relationship, that is, the embedding of catalytic functions in the space of polymeric structures. Reflexivity is a semiotic property of some genetic sequences. Such sequences may serve as the basis for the evolution of coding as a result of autocatalytic self-organisation in a population of assignment catalysts. Autocatalytic selection is a mechanism whereby matter becomes differentiated in primitive biochemical systems. In the case of coding self-organisation, it corresponds to the creation of symbolic information. Prions are present-day entities whose replication through autocatalysis reflects aspects of biological semiotics less obvious than genetic coding.

  2. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  3. Adjoint code generator

    Institute of Scientific and Technical Information of China (English)

    CHENG Qiang; CAO JianWen; WANG Bin; ZHANG HaiBin

    2009-01-01

    The adjoint code generator (ADG) is developed to produce the adjoint codes, which are used to analytically calculate gradients and the Hessian-vector products with the costs independent of the number of the independent variables. Different from other automatic differentiation tools, the implementation of ADG has advantages of using the least program behavior decomposition method and several static dependence analysis techniques. In this paper we first address the concerned concepts and fundamentals, and then introduce the functionality and the features of ADG. In particular, we also discuss the design architecture of ADG and implementation details including the recomputation and storing strategy and several techniques for code optimization. Some experimental results in several applications are presented at the end.

  4. Spread codes and spread decoding in network coding

    OpenAIRE

    Manganiello, F; Gorla, E.; Rosenthal, J.

    2008-01-01

    In this paper we introduce the class of spread codes for the use in random network coding. Spread codes are based on the construction of spreads in finite projective geometry. The major contribution of the paper is an efficient decoding algorithm of spread codes up to half the minimum distance.

  5. Graph Codes with Reed-Solomon Component Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2006-01-01

    We treat a specific case of codes based on bipartite expander graphs coming from finite geometries. The code symbols are associated with the branches and the symbols connected to a given node are restricted to be codewords in a Reed-Solomon code. We give results on the parameters of the codes...

  6. Pattern Discovery Using Association Rules

    Directory of Open Access Journals (Sweden)

    Ms Kiruthika M,

    2011-12-01

    Full Text Available The explosive growth of Internet has given rise to many websites which maintain large amount of user information. To utilize this information, identifying usage pattern of users is very important. Web usage mining is one of the processes of finding out this usage pattern and has many practical applications. Our paper discusses how association rules can be used to discover patterns in web usage mining. Our discussion starts with preprocessing of the given weblog, followed by clustering them and finding association rules. These rules provide knowledge that helps to improve website design, in advertising, web personalization etc.

  7. On the physical basis for ambiguity in genetic coding interactions.

    Science.gov (United States)

    Grosjean, H J; de Henau, S; Crothers, D M

    1978-02-01

    We report the relative stabilities, in the form of complex lifetimes, of complexes between the tRNAs complementary, or nearly so, in their anticodons. The results show striking parallels with the genetic coding rules, including the wobble interaction and the role of modified nucleotides S2U and V (a 5-oxyacetic acid derivative of U). One important difference between the genetic code and the pairing rules in the tRNA-tRNA interaction is the stability in the latter of the short wobble pairs, which the wobble hypothesis excludes. We stress the potential of U for translational errors, and suggest a simple stereochemical basis for ribosome-mediated discrimination against short wobble pairs. Surprisingly, the stability of anticodon-anticodon complexes does not vary systematically on base sequence. Because of the close similarity to the genetic coding rules, it is tempting to speculate that the interaction between two RNA loops may have been part of the physical basis for the evolutionary origin of the genetic code, and that this mechanism may still be utilized by folding the mRNA on the ribosome into a loop similar to the anticodon loop.

  8. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  9. Securing mobile code.

    Energy Technology Data Exchange (ETDEWEB)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called &apos

  10. Algorithm Optimally Orders Forward-Chaining Inference Rules

    Science.gov (United States)

    James, Mark

    2008-01-01

    People typically develop knowledge bases in a somewhat ad hoc manner by incrementally adding rules with no specific organization. This often results in a very inefficient execution of those rules since they are so often order sensitive. This is relevant to tasks like Deep Space Network in that it allows the knowledge base to be incrementally developed and have it automatically ordered for efficiency. Although data flow analysis was first developed for use in compilers for producing optimal code sequences, its usefulness is now recognized in many software systems including knowledge-based systems. However, this approach for exhaustively computing data-flow information cannot directly be applied to inference systems because of the ubiquitous execution of the rules. An algorithm is presented that efficiently performs a complete producer/consumer analysis for each antecedent and consequence clause in a knowledge base to optimally order the rules to minimize inference cycles. An algorithm was developed that optimally orders a knowledge base composed of forwarding chaining inference rules such that independent inference cycle executions are minimized, thus, resulting in significantly faster execution. This algorithm was integrated into the JPL tool Spacecraft Health Inference Engine (SHINE) for verification and it resulted in a significant reduction in inference cycles for what was previously considered an ordered knowledge base. For a knowledge base that is completely unordered, then the improvement is much greater.

  11. Automatically generating procedure code and database maintenance scripts

    Energy Technology Data Exchange (ETDEWEB)

    Hatley, J.W. [Sandia National Labs., Albuquerque, NM (United States). Information Technologies and Methodologies Dept.

    1994-10-01

    Over the past couple of years the Information Technology Department at Sandia Laboratories has developed software to automatically generate database/4gl procedure code and database maintenance scripts based on database table information. With this software developers simply enter table and referential integrity information and the software generates code and scripts as required. The generated procedure code includes simple insert/delete/update procedures, transaction logging procedures as well as referential integrity procedures. The generated database maintenance scripts include scripts to modify structures, update remote databases, create views, and create indexes. Additionally, the software can generate EPSI representations of Binder diagrams for the tables. This paper will discuss the software application and use of it in real world applications. The automated generation of procedure code and maintenance scripts allows the developers to concentrate on the development of user interface code. The technique involves generating database/4 gl procedure code and maintenance scripts automatically from the database table information. The database/4gl procedure code provides standard insert/update/delete interfaces for upper level code as well as enforces the data constraints defined in the information model. The maintenance scripts provide maintenance scripts and migration scripts. This has resulted in fully updated database applications with complete rules enforcement and database maintenance scripts within days of a database modification.

  12. Computing Challenges in Coded Mask Imaging

    Science.gov (United States)

    Skinner, Gerald

    2009-01-01

    This slide presaentation reviews the complications and challenges in developing computer systems for Coded Mask Imaging telescopes. The coded mask technique is used when there is no other way to create the telescope, (i.e., when there are wide fields of view, high energies for focusing or low energies for the Compton/Tracker Techniques and very good angular resolution.) The coded mask telescope is described, and the mask is reviewed. The coded Masks for the INTErnational Gamma-Ray Astrophysics Laboratory (INTEGRAL) instruments are shown, and a chart showing the types of position sensitive detectors used for the coded mask telescopes is also reviewed. Slides describe the mechanism of recovering an image from the masked pattern. The correlation with the mask pattern is described. The Matrix approach is reviewed, and other approaches to image reconstruction are described. Included in the presentation is a review of the Energetic X-ray Imaging Survey Telescope (EXIST) / High Energy Telescope (HET), with information about the mission, the operation of the telescope, comparison of the EXIST/HET with the SWIFT/BAT and details of the design of the EXIST/HET.

  13. Simplification Rules for Birdtrack Operators

    CERN Document Server

    Alckock-Zeilinger, Judith

    2016-01-01

    This paper derives a set of easy-to-use tools designed to simplify calculations with birdtrack op- erators comprised of symmetrizers and antisymmetrizers. In particular, we present cancellation rules allowing one to shorten the birdtrack expressions of operators, and propagation rules identifying the circumstances under which it is possible to propagate symmetrizers past antisymmetrizers and vice versa. We exhibit the power of these simplification rules by means of a short example in which we apply the tools derived in this paper on a typical operator that can be encountered in the representation theory of SU(N) over the product space $V^{\\otimes m}$ . These rules form the basis for the construction of compact Hermitian Young projection operators and their transition operators addressed in companion papers.

  14. New code match strategy for wideband code division multiple access code tree management

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Orthogonal variable spreading factor channelization codes are widely used to provide variable data rates for supporting different bandwidth requirements in wideband code division multiple access (WCDMA) systems. A new code match scheme for WCDMA code tree management was proposed. The code match scheme is similar to the existing crowed-first scheme. When choosing a code for a user, the code match scheme only compares the one up layer of the allocated codes, unlike the crowed-first scheme which perhaps compares all up layers. So the operation of code match scheme is simple, and the average time delay is decreased by 5.1%. The simulation results also show that the code match strategy can decrease the average code blocking probability by 8.4%.

  15. Reed-Solomon convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Schmale, W

    2005-01-01

    In this paper we will introduce a specific class of cyclic convolutional codes. The construction is based on Reed-Solomon block codes. The algebraic parameters as well as the distance of these codes are determined. This shows that some of these codes are optimal or near optimal.

  16. Source Code Generator Based on Dynamic Frames

    Directory of Open Access Journals (Sweden)

    Danijel Radošević

    2011-06-01

    Full Text Available Normal 0 21 false false false HR X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Obična tablica"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} This paper presents the model of source code generator based on dynamic frames. The model is named as the SCT model because if its three basic components: Specification (S, which describes the application characteristics, Configuration (C, which describes the rules for building applications, and Templates (T, which refer to application building blocks. The process of code generation dynamically creates XML frames containing all building elements (S, C ant T until final code is produced. This approach is compared to existing XVCL frames based model for source code generating. The SCT model is described by both XML syntax and the appropriate graphical elements. The SCT model is aimed to build complete applications, not just skeletons. The main advantages of the presented model are its textual and graphic description, a fully configurable generator, and the reduced overhead of the generated source code. The presented SCT model is shown on development of web application example in order to demonstrate its features and justify our design choices.

  17. A Novel Rule Induction Algorithm

    Institute of Scientific and Technical Information of China (English)

    ZHENG Jianguo; LIU Fang; WANG Lei; JIAO Licheng

    2001-01-01

    Knowledge discovery in databases is concerned with extracting useful information from databases, and the immune algorithm is a biological theory-based and globally searching algorithm. A specific immune algorithm is designed for discovering a few interesting, high-level prediction rules from databases, rather than discovering classification knowledge as usual in the literatures. Simulations show that this novel algorithm is able to improve the stability of the population, increase the holistic performance and make the rules extracted have higher precision.

  18. Probability Theory without Bayes' Rule

    OpenAIRE

    Rodriques, Samuel G.

    2014-01-01

    Within the Kolmogorov theory of probability, Bayes' rule allows one to perform statistical inference by relating conditional probabilities to unconditional probabilities. As we show here, however, there is a continuous set of alternative inference rules that yield the same results, and that may have computational or practical advantages for certain problems. We formulate generalized axioms for probability theory, according to which the reverse conditional probability distribution P(B|A) is no...

  19. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  20. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  1. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and compositi

  2. Polar Code Validation

    Science.gov (United States)

    1989-09-30

    SUMMARY OF POLAR ACHIEVEMENTS ..... .......... 3 3. POLAR CODE PHYSICAL MODELS ..... ............. 5 3.1 PL- ASMA Su ^"ru5 I1LS SH A...of this problem. 1.1. The Charge-2 Rocket The Charge-2 payload was launched on a Black Brant VB from White Sands Mis- sile Range in New Mexico in

  3. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and

  4. (Almost) practical tree codes

    KAUST Repository

    Khina, Anatoly

    2016-08-15

    We consider the problem of stabilizing an unstable plant driven by bounded noise over a digital noisy communication link, a scenario at the heart of networked control. To stabilize such a plant, one needs real-time encoding and decoding with an error probability profile that decays exponentially with the decoding delay. The works of Schulman and Sahai over the past two decades have developed the notions of tree codes and anytime capacity, and provided the theoretical framework for studying such problems. Nonetheless, there has been little practical progress in this area due to the absence of explicit constructions of tree codes with efficient encoding and decoding algorithms. Recently, linear time-invariant tree codes were proposed to achieve the desired result under maximum-likelihood decoding. In this work, we take one more step towards practicality, by showing that these codes can be efficiently decoded using sequential decoding algorithms, up to some loss in performance (and with some practical complexity caveats). We supplement our theoretical results with numerical simulations that demonstrate the effectiveness of the decoder in a control system setting.

  5. Corner neutronic code

    Directory of Open Access Journals (Sweden)

    V.P. Bereznev

    2015-10-01

    An iterative solution process is used, including external iterations for the fission source and internal iterations for the scattering source. The paper presents the results of a cross-verification against the Monte Carlo MMK code [3] and on a model of the BN-800 reactor core.

  6. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  7. Focusing Automatic Code Inspections

    NARCIS (Netherlands)

    Boogerd, C.J.

    2010-01-01

    Automatic Code Inspection tools help developers in early detection of defects in software. A well-known drawback of many automatic inspection approaches is that they yield too many warnings and require a clearer focus. In this thesis, we provide such focus by proposing two methods to prioritize

  8. 77 FR 20079 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change Relating...

    Science.gov (United States)

    2012-04-03

    ... Advisers Act relating to codes of ethics. This Rule requires investment advisers to adopt a code of ethics..., production, processing, refining, transportation, storage, and marketing of mineral or natural resources.\\11... businesses, including the marketing of the products and logistical services. Propane MLP services include...

  9. Using the Chain Rule as the Key Link in Deriving the General Rules for Differentiation

    Science.gov (United States)

    Sprows, David

    2011-01-01

    The standard approach to the general rules for differentiation is to first derive the power, product, and quotient rules and then derive the chain rule. In this short article we give an approach to these rules which uses the chain rule as the main tool in deriving the power, product, and quotient rules in a manner which is more student-friendly…

  10. Fundamentals of coding and reimbursement.

    Science.gov (United States)

    Price, Paula

    2002-01-01

    After completing this introduction to radiology coding and reimbursement, readers will: Understand how health care reimbursement evolved over the past 50 years. Know the importance of documenting the patient's history. Have an overall picture of the standardized numerical coding system. Understand how accurate coding affects reimbursement. Understand coding functions as they pertain to regulatory compliance in the radiology department. Be familiar with the U.S. Justice Department's use of coding in tracking health care fraud.

  11. On Asymmetric Quantum MDS Codes

    CERN Document Server

    Ezerman, Martianus Frederic; Ling, San

    2010-01-01

    Assuming the validity of the MDS Conjecture, the weight distribution of all MDS codes is known. Using a recently-established characterization of asymmetric quantum error-correcting codes, linear MDS codes can be used to construct asymmetric quantum MDS codes with $d_{z} \\geq d_{x}\\geq 2$ for all possible values of length $n$ for which linear MDS codes over $\\F_{q}$ are known to exist.

  12. A Survey of the Rule Language RL/1

    Institute of Scientific and Technical Information of China (English)

    黄智生

    1993-01-01

    In this paper we introduced the RL project which aims to integrate logic programming,relational databases and constraint solving in a single relational framework.We gave a summary of the architecture of the RL/1 system and shorth discussed the characteristics of the RL/1 language.A target of the project has become to turn the RL/1 system into an industrial strength database interface.

  13. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...

  14. HOTSPOT Health Physics codes for the PC

    Energy Technology Data Exchange (ETDEWEB)

    Homann, S.G.

    1994-03-01

    The HOTSPOT Health Physics codes were created to provide Health Physics personnel with a fast, field-portable calculation tool for evaluating accidents involving radioactive materials. HOTSPOT codes are a first-order approximation of the radiation effects associated with the atmospheric release of radioactive materials. HOTSPOT programs are reasonably accurate for a timely initial assessment. More importantly, HOTSPOT codes produce a consistent output for the same input assumptions and minimize the probability of errors associated with reading a graph incorrectly or scaling a universal nomogram during an emergency. The HOTSPOT codes are designed for short-term (less than 24 hours) release durations. Users requiring radiological release consequences for release scenarios over a longer time period, e.g., annual windrose data, are directed to such long-term models as CAPP88-PC (Parks, 1992). Users requiring more sophisticated modeling capabilities, e.g., complex terrain; multi-location real-time wind field data; etc., are directed to such capabilities as the Department of Energy`s ARAC computer codes (Sullivan, 1993). Four general programs -- Plume, Explosion, Fire, and Resuspension -- calculate a downwind assessment following the release of radioactive material resulting from a continuous or puff release, explosive release, fuel fire, or an area contamination event. Other programs deal with the release of plutonium, uranium, and tritium to expedite an initial assessment of accidents involving nuclear weapons. Additional programs estimate the dose commitment from the inhalation of any one of the radionuclides listed in the database of radionuclides; calibrate a radiation survey instrument for ground-survey measurements; and screen plutonium uptake in the lung (see FIDLER Calibration and LUNG Screening sections).

  15. Fountain Codes with Multiplicatively Repeated Non-Binary LDPC Codes

    CERN Document Server

    Kasai, Kenta

    2010-01-01

    We study fountain codes transmitted over the binary-input symmetric-output channel. For channels with small capacity, receivers needs to collects many channel outputs to recover information bits. Since a collected channel output yields a check node in the decoding Tanner graph, the channel with small capacity leads to large decoding complexity. In this paper, we introduce a novel fountain coding scheme with non-binary LDPC codes. The decoding complexity of the proposed fountain code does not depend on the channel. Numerical experiments show that the proposed codes exhibit better performance than conventional fountain codes, especially for small number of information bits.

  16. Quantum codes from linear codes over finite chain rings

    Science.gov (United States)

    Liu, Xiusheng; Liu, Hualu

    2017-10-01

    In this paper, we provide two methods of constructing quantum codes from linear codes over finite chain rings. The first one is derived from the Calderbank-Shor-Steane (CSS) construction applied to self-dual codes over finite chain rings. The second construction is derived from the CSS construction applied to Gray images of the linear codes over finite chain ring {\\mathbb {F}}_{p^{2m}}+u{\\mathbb {F}}_{p^{2m}}. The good parameters of quantum codes from cyclic codes over finite chain rings are obtained.

  17. Sentinel events, disruptive behavior, and medical staff codes of conduct.

    Science.gov (United States)

    Leiker, Michelle

    2009-09-01

    Regardless of physician concerns, hospitals and other organizations accredited by the Joint Commission are required to comply with the new leadership standard and define acceptable, disruptive, and inappropriate behaviors in a code of conduct. The new standard also requires them to implement a process for managing disruptive and inappropriate behaviors. Rules and standards can be very effective ways to promote safety and quality, but at the same time may be subject to abuse if not properly monitored. As a result, physicians should continue to monitor how hospitals have implemented the new leadership standard and raise concerns about any vague definitions, encroachment on physician rights, and misuse of the code of conduct.

  18. Audel guide to the 2002 national electrical code

    CERN Document Server

    Rosenberg, Paul

    2004-01-01

    Get a grip on the 2002 NECThe 2002 NEC is here-but what do the changes mean for you on the job? This easy-to-follow interpretive guide walks you article by article through the 2002 Code, clarifying terms, explaining new standards, highlighting compliance issues, and providing practical worksite tips. It's the one reference you need to make sense of the NEC-and make sure each job gets done by the book.* Know the rules for wiring design, protection, methods, and materials* Identify standards that apply for general use equipment* Discover what the Code says about electrical re

  19. Reserved-Length Prefix Coding

    CERN Document Server

    Baer, Michael B

    2008-01-01

    Huffman coding finds an optimal prefix code for a given probability mass function. Consider situations in which one wishes to find an optimal code with the restriction that all codewords have lengths that lie in a user-specified set of lengths (or, equivalently, no codewords have lengths that lie in a complementary set). This paper introduces a polynomial-time dynamic programming algorithm that finds optimal codes for this reserved-length prefix coding problem. This has applications to quickly encoding and decoding lossless codes. In addition, one modification of the approach solves any quasiarithmetic prefix coding problem, while another finds optimal codes restricted to the set of codes with g codeword lengths for user-specified g (e.g., g=2).

  20. Decoding Generalized Concatenated Codes Using Interleaved Reed-Solomon Codes

    CERN Document Server

    Senger, Christian; Bossert, Martin; Zyablov, Victor

    2008-01-01

    Generalized Concatenated codes are a code construction consisting of a number of outer codes whose code symbols are protected by an inner code. As outer codes, we assume the most frequently used Reed-Solomon codes; as inner code, we assume some linear block code which can be decoded up to half its minimum distance. Decoding up to half the minimum distance of Generalized Concatenated codes is classically achieved by the Blokh-Zyablov-Dumer algorithm, which iteratively decodes by first using the inner decoder to get an estimate of the outer code words and then using an outer error/erasure decoder with a varying number of erasures determined by a set of pre-calculated thresholds. In this paper, a modified version of the Blokh-Zyablov-Dumer algorithm is proposed, which exploits the fact that a number of outer Reed-Solomon codes with average minimum distance d can be grouped into one single Interleaved Reed-Solomon code which can be decoded beyond d/2. This allows to skip a number of decoding iterations on the one...

  1. The NIMROD Code

    Science.gov (United States)

    Schnack, D. D.; Glasser, A. H.

    1996-11-01

    NIMROD is a new code system that is being developed for the analysis of modern fusion experiments. It is being designed from the beginning to make the maximum use of massively parallel computer architectures and computer graphics. The NIMROD physics kernel solves the three-dimensional, time-dependent two-fluid equations with neo-classical effects in toroidal geometry of arbitrary poloidal cross section. The NIMROD system also includes a pre-processor, a grid generator, and a post processor. User interaction with NIMROD is facilitated by a modern graphical user interface (GUI). The NIMROD project is using Quality Function Deployment (QFD) team management techniques to minimize re-engineering and reduce code development time. This paper gives an overview of the NIMROD project. Operation of the GUI is demonstrated, and the first results from the physics kernel are given.

  2. Epetra developers coding guidelines.

    Energy Technology Data Exchange (ETDEWEB)

    Heroux, Michael Allen; Sexton, Paul Michael

    2003-12-01

    Epetra is a package of classes for the construction and use of serial and distributed parallel linear algebra objects. It is one of the base packages in Trilinos. This document describes guidelines for Epetra coding style. The issues discussed here go beyond correct C++ syntax to address issues that make code more readable and self-consistent. The guidelines presented here are intended to aid current and future development of Epetra specifically. They reflect design decisions that were made in the early development stages of Epetra. Some of the guidelines are contrary to more commonly used conventions, but we choose to continue these practices for the purposes of self-consistency. These guidelines are intended to be complimentary to policies established in the Trilinos Developers Guide.

  3. Efficient convolutional sparse coding

    Energy Technology Data Exchange (ETDEWEB)

    Wohlberg, Brendt

    2017-06-20

    Computationally efficient algorithms may be applied for fast dictionary learning solving the convolutional sparse coding problem in the Fourier domain. More specifically, efficient convolutional sparse coding may be derived within an alternating direction method of multipliers (ADMM) framework that utilizes fast Fourier transforms (FFT) to solve the main linear system in the frequency domain. Such algorithms may enable a significant reduction in computational cost over conventional approaches by implementing a linear solver for the most critical and computationally expensive component of the conventional iterative algorithm. The theoretical computational cost of the algorithm may be reduced from O(M.sup.3N) to O(MN log N), where N is the dimensionality of the data and M is the number of elements in the dictionary. This significant improvement in efficiency may greatly increase the range of problems that can practically be addressed via convolutional sparse representations.

  4. Decoding the productivity code

    DEFF Research Database (Denmark)

    Hansen, David

    .e., to be prepared to initiate improvement. The study shows how the effectiveness of the improvement system depends on the congruent fit between the five elements as well as the bridging coherence between the improvement system and the work system. The bridging coherence depends on how improvements are activated...... approach often ends up with demanding intense employee focus to sustain improvement and engagement. Likewise, a single-minded employee development approach often ends up demanding rationalization to achieve the desired financial results. These ineffective approaches make organizations react like pendulums...... that swing between rationalization and employee development. The productivity code is the lack of alternatives to this ineffective approach. This thesis decodes the productivity code based on the results from a 3-year action research study at a medium-sized manufacturing facility. During the project period...

  5. Confocal coded aperture imaging

    Energy Technology Data Exchange (ETDEWEB)

    Tobin, Jr., Kenneth William (Harriman, TN); Thomas, Jr., Clarence E. (Knoxville, TN)

    2001-01-01

    A method for imaging a target volume comprises the steps of: radiating a small bandwidth of energy toward the target volume; focusing the small bandwidth of energy into a beam; moving the target volume through a plurality of positions within the focused beam; collecting a beam of energy scattered from the target volume with a non-diffractive confocal coded aperture; generating a shadow image of said aperture from every point source of radiation in the target volume; and, reconstructing the shadow image into a 3-dimensional image of the every point source by mathematically correlating the shadow image with a digital or analog version of the coded aperture. The method can comprise the step of collecting the beam of energy scattered from the target volume with a Fresnel zone plate.

  6. Code lists for interoperability - Principles and best practices in INSPIRE

    Science.gov (United States)

    Lutz, M.; Portele, C.; Cox, S.; Murray, K.

    2012-04-01

    Using free text for attribute values when exchanging geoscience data can lead to a number of problems, e.g. because different data providers and consumers use different languages, terminology or spellings. To overcome these issues, well-defined schemes of codes or concepts, known as code lists1, are preferred to free text in defining the value domain of an attribute. The "code list" concept is well established in geospatial modelling standards (e.g. ISO 191032), however, it has been used in many different ways. Here we present some considerations relating to code lists and related interoperability requirements in spatial data infrastructures (SDIs), in particular as discussed in the INSPIRE3 data specifications working groups. These will form the basis for the specification of code list requirements in the INSPIRE Implementing Rules on interoperability of spatial data sets and services4, which provide binding legal obligations for EU Member States for the interoperable provision of data related to the environment. Requirements or recommendations for code lists should address the following aspects: Governance: When modeling an application domain, for each feature attribute whose value is a 'term', should we re-use an existing code list or specify a new code list for the SDI initiative? Use of existing code lists is likely to maximize cross-initiative interoperability. Level of obligation: For each use of a code list, what is the level of obligation? Is use of a specified code list(s) mandatory or just recommended? This is particularly important where the specifications carry a legal mandate (as in the case of INSPIRE). Extensibility: Must data providers use only the specified values or may they extend the code list? Are arbitrary extensions allowed or do additional values have to be specialisations of existing values? Specifying values: For each code list, the allowed values have to be specified, either directly in the specification, or by reference to an existing

  7. Ptolemy Coding Style

    Science.gov (United States)

    2014-09-05

    JavaTemplate.java. In addition useful tools are provided in the directories under $PTII/util/ to help enforce the standards. • lisp /ptjavastyle.el is a... lisp module for GNU Emacs that has appropriate indenting rules. This file works well with Emacs under both Unix and Windows. • testsuite/ptspell is a...key by inserting spaces rather than the tab character. To set up Emacs to follow the Ptolemy II indentation style, see $PTII/util/ lisp /ptemacs.el. To

  8. The Phantom SPH code

    Science.gov (United States)

    Price, Daniel; Wurster, James; Nixon, Chris

    2016-05-01

    I will present the capabilities of the Phantom SPH code for global simulations of dust and gas in protoplanetary discs. I will present our new algorithms for simulating both small and large grains in discs, as well as our progress towards simulating evolving grain populations and coupling with radiation. Finally, I will discuss our recent applications to HL Tau and the physics of dust gap opening.

  9. The Liege Oscillation Code

    CERN Document Server

    Scuflaire, R; Théado, S; Bourge, P -O; Miglio, A; Godart, M; Thoul, A; Noels, A

    2007-01-01

    The Liege Oscillation code can be used as a stand-alone program or as a library of subroutines that the user calls from a Fortran main program of his own to compute radial and non-radial adiabatic oscillations of stellar models. We describe the variables and the equations used by the program and the methods used to solve them. A brief account is given of the use and the output of the program.

  10. Status of MARS Code

    Energy Technology Data Exchange (ETDEWEB)

    N.V. Mokhov

    2003-04-09

    Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

  11. Rule Versus the Causality Rule in Insurance Law

    DEFF Research Database (Denmark)

    Lando, Henrik

    it subjects the risk averse Buyer of insurance to less variance. This implies that the pro rata rule should apply when there is significant risk for a Buyer of unintentional misrepresentation, and when the incentive to intentionally misrepresent can be curtailed through frequent verification of the Buyer......'s true type. On the other hand, when the risk of unintentional misrepresentation is small, when verification is costly, and when the Buyer is sufficiently risk averse, the Buyer conceivably may be more effectively deterred from intentional misrepresentation under the causality rule. It is argued...

  12. Informed Consent and Clinical Research Involving Children and Adolescents: Implications of the Revised APA Ethics Code and HIPAA

    Science.gov (United States)

    Fisher, Celia B.

    2004-01-01

    In 2003, 2 new sets of rules and regulations affecting the conduct of clinical research involving children and adolescents went into effect: the revised American Psychological Association's (APA) Ethical Principles of Psychologists and Code of Conduct (APA, 2002; effective June 1, 2003) and the Privacy Rule (45 CFR Part 160 and A and E of Part…

  13. ARQ for Network Coding

    CERN Document Server

    Sundararajan, Jay Kumar; Médard, Muriel

    2008-01-01

    A new coding and queue management algorithm is proposed for communication networks that employ linear network coding. The algorithm has the feature that the encoding process is truly online, as opposed to a block-by-block approach. The setup assumes a packet erasure broadcast channel with stochastic arrivals and full feedback, but the proposed scheme is potentially applicable to more general lossy networks with link-by-link feedback. The algorithm guarantees that the physical queue size at the sender tracks the backlog in degrees of freedom (also called the virtual queue size). The new notion of a node "seeing" a packet is introduced. In terms of this idea, our algorithm may be viewed as a natural extension of ARQ schemes to coded networks. Our approach, known as the drop-when-seen algorithm, is compared with a baseline queuing approach called drop-when-decoded. It is shown that the expected queue size for our approach is $O(\\frac1{1-\\rho})$ as opposed to $\\Omega(\\frac1{(1-\\rho)^2})$ for the baseline approach...

  14. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  15. low bit rate video coding low bit rate video coding

    African Journals Online (AJOL)

    eobe

    ariable length bit rate (VLBR) broadly encompasses video coding which broadly encompasses ... for motion estimation and compensation to reduce the prediction sation to reduce the ... a special interest among the video coding community ...

  16. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Høholdt, Tom

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K...

  17. Random linear codes in steganography

    Directory of Open Access Journals (Sweden)

    Kamil Kaczyński

    2016-12-01

    Full Text Available Syndrome coding using linear codes is a technique that allows improvement in the steganographic algorithms parameters. The use of random linear codes gives a great flexibility in choosing the parameters of the linear code. In parallel, it offers easy generation of parity check matrix. In this paper, the modification of LSB algorithm is presented. A random linear code [8, 2] was used as a base for algorithm modification. The implementation of the proposed algorithm, along with practical evaluation of algorithms’ parameters based on the test images was made.[b]Keywords:[/b] steganography, random linear codes, RLC, LSB

  18. Medicare determinations and income-related monthly adjustment amounts to Medicare Part B premiums; conforming changes to regulations. Final rule.

    Science.gov (United States)

    2014-03-01

    This final rule adopts, without change, the interim final rule with request for comments we published in the Federal Register on September 18, 2013. The interim final rule modified our rules regarding Medicare Part B income-related monthly adjustment amounts to conform to changes made to the Social Security Act (Act) and Internal Revenue Code by the Affordable Care Act. We also removed provisions that phased in income-related monthly adjustment amounts between 2007 and 2009 and updated a citation to reflect the transfer of authority for hearing appeals under title XVIII of the Act from the Social Security Administration to the Department of Health and Human Services.

  19. ASME code ductile failure criteria for impulsively loaded pressure vessels

    Energy Technology Data Exchange (ETDEWEB)

    Nickell, Robert E.; Duffey, T. A. (Thomas A.); Rodriguez, E. A. (Edward A.)

    2003-01-01

    Ductile failure criteria suitable for application to impulsively loaded high pressure vessels that are designed to the rules of the ASME Code Section VI11 Division 3 are described and justified. The criteria are based upon prevention of load instability and the associated global failure mechanisms, and on protection against progressive distortion for multiple-use vessels. The criteria are demonstrated by the design and analysis of vessels that contain high explosive charges.

  20. Offer and Acceptance under the Russian Civil Code

    Directory of Open Access Journals (Sweden)

    Valery Musin

    2013-01-01

    Full Text Available The article deals with a procedure of entering into a contract under Russian civil law both at the domestic and foreign markets. An offer and an acceptance are considered in the light or relevant provisions of the Russian Civil Codes of 1922, 1964 and that currently effective as compared with rules of the UN Convention on Contracts for the International Sale of Goods 1980 and INIDROIT Principles of International Commercial Contracts 2010.

  1. Offer and Acceptance under the Russian Civil Code

    OpenAIRE

    Valery Musin

    2013-01-01

    The article deals with a procedure of entering in to a contract under Russian civil law both atthe domestic and foreign markets. An offer and an acceptance are considered in the light or relevant provisions of the Russian Civil Codes of 1922, 1964 and that currently effective as compared with rules of the UN Convention on Contracts for the International Sale of Goods 1980 and INIDROIT Principles of International Commercial Contracts 2010.

  2. 76 FR 76815 - Business Opportunity Rule

    Science.gov (United States)

    2011-12-08

    ... ``Amended Franchise Rule'' refers to the amended Franchise Rule published at 72 FR 15444 (Mar. 30, 2007) and... Disclosure Form, available at http://www.ftc.gov/bcp/workshops/bizopps/disclosure-form-report.pdf . ``Original Franchise Rule'' refers to the original Franchise Rule published at 43 FR 59614 (Dec. 21,...

  3. Inferring comprehensible business/ICT alignment rules

    NARCIS (Netherlands)

    Cumps, B.; Martens, D.; De Backer, M.; Haesen, R.; Viaene, S.; Dedene, G.; Baesens, B.; Snoeck, M.

    2009-01-01

    We inferred business rules for business/ICT alignment by applying a novel rule induction algorithm on a data set containing rich alignment information polled from 641 organisations in 7 European countries. The alignment rule set was created using AntMiner+, a rule induction technique with a reputati

  4. A Pieri rule for skew shapes

    CERN Document Server

    Assaf, Sami; Lam, Thomas

    2009-01-01

    The Pieri rule expresses the product of a Schur function and a single row Schur function in terms of Schur functions. We extend the classical Pieri rule by expressing the product of a skew Schur function and a single row Schur function in terms of skew Schur functions. Like the classical rule, our rule involves simple additions of boxes to the original skew shape.

  5. Recognition rules for binding of homeodomains to operator DNA.

    Science.gov (United States)

    Chirgadze, Yu N; Sivozhelezov, V S; Polozov, R V; Stepanenko, V A; Ivanov, V V

    2012-01-01

    The spatial arrangement of interfaces between homeodomain transcription factors and operator DNA has been considered. We analyzed the binding contacts for a representative set of 22 complexes of homeodomain transcription factors with a double-stranded operator DNA in the region of the major groove. It was shown that the recognition of DNA by the recognizing _-helix of protein is governed by two contact groups. Invariant protein-DNA group of contacts includes six contacts, formed by atomic groups of coding and non-coding DNA chains with the groups of amino acids. The recognizing _-helix forms contacts by polar groups of residues Trp2 (NE1), Asn5, and Lys9 with the canonical sequence T(1)A(2)A(3)T(4) of the coding DNA chain, and contacts by residues Lys0, Arg7 and Lys11 with the sequence A(4)X(5)X(6)X(7) of a non-coding DNA chain, where X is any nucleotide. Variable protein-DNA group of contacts comprises two groups bound with the sequence T(3)A(4)X(5)X(6) of the non- coding DNA-chain. These contacts are mainly with the bases and specify the binding pattern of individual homeodomains. The invariant contact group represents a recognition pattern for transcription factors of the homeodomain family: multiple adenine-asparagine contact and six position-specific phosphate contacts mainly with lysine or arginine. Within this group, we have found three most significant invariant contacts which allow deducing the recognition rules for homeodomains. These rules are inherent for different taxonomic groups of the homeodomain family and can distinguishing members of this family from any other family of transcription factors.

  6. Probable relationship between partitions of the set of codons and the origin of the genetic code.

    Science.gov (United States)

    Salinas, Dino G; Gallardo, Mauricio O; Osorio, Manuel I

    2014-03-01

    Here we study the distribution of randomly generated partitions of the set of amino acid-coding codons. Some results are an application from a previous work, about the Stirling numbers of the second kind and triplet codes, both to the cases of triplet codes having four stop codons, as in mammalian mitochondrial genetic code, and hypothetical doublet codes. Extending previous results, in this work it is found that the most probable number of blocks of synonymous codons, in a genetic code, is similar to the number of amino acids when there are four stop codons, as well as it could be for a primigenious doublet code. Also it is studied the integer partitions associated to patterns of synonymous codons and it is shown, for the canonical code, that the standard deviation inside an integer partition is one of the most probable. We think that, in some early epoch, the genetic code might have had a maximum of the disorder or entropy, independent of the assignment between codons and amino acids, reaching a state similar to "code freeze" proposed by Francis Crick. In later stages, maybe deterministic rules have reassigned codons to amino acids, forming the natural codes, such as the canonical code, but keeping the numerical features describing the set partitions and the integer partitions, like a "fossil numbers"; both kinds of partitions about the set of amino acid-coding codons. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  7. Evaluation of Rule Extraction Algorithms

    Directory of Open Access Journals (Sweden)

    Tiruveedula GopiKrishna

    2014-05-01

    Full Text Available For the data mining domain, the lack of explanation facilities seems to be a serious drawback for techniques based on Artificial Neural Networks, or, for that matter, any technique producing opaque models In particular, the ability to generate even limited explanations is absolutely crucial for user acceptance of such systems. Since the purpose of most data mining systems is to support decision making,the need for explanation facilities in these systems is apparent. The task for the data miner is thus to identify the complex but general relationships that are likely to carry over to production data and the explanation facility makes this easier. Also focused the quality of the extracted rules; i.e. how well the required explanation is performed. In this research some important rule extraction algorithms are discussed and identified the algorithmic complexity; i.e. how efficient the underlying rule extraction algorithm is

  8. Integration Rules for Scattering Equations

    CERN Document Server

    Baadsgaard, Christian; Bourjaily, Jacob L; Damgaard, Poul H

    2015-01-01

    As described by Cachazo, He and Yuan, scattering amplitudes in many quantum field theories can be represented as integrals that are fully localized on solutions to the so-called scattering equations. Because the number of solutions to the scattering equations grows quite rapidly, the contour of integration involves contributions from many isolated components. In this paper, we provide a simple, combinatorial rule that immediately provides the result of integration against the scattering equation constraints for any M\\"obius-invariant integrand involving only simple poles. These rules have a simple diagrammatic interpretation that makes the evaluation of any such integrand immediate. Finally, we explain how these rules are related to the computation of amplitudes in the field theory limit of string theory.

  9. Integration rules for scattering equations

    Science.gov (United States)

    Baadsgaard, Christian; Bjerrum-Bohr, N. E. J.; Bourjaily, Jacob L.; Damgaard, Poul H.

    2015-09-01

    As described by Cachazo, He and Yuan, scattering amplitudes in many quantum field theories can be represented as integrals that are fully localized on solutions to the so-called scattering equations. Because the number of solutions to the scattering equations grows quite rapidly, the contour of integration involves contributions from many isolated components. In this paper, we provide a simple, combinatorial rule that immediately provides the result of integration against the scattering equation constraints fo any Möbius-invariant integrand involving only simple poles. These rules have a simple diagrammatic interpretation that makes the evaluation of any such integrand immediate. Finally, we explain how these rules are related to the computation of amplitudes in the field theory limit of string theory.

  10. MKHITAR GOSH'S MEDIEVAL LAW CODE AND ITS IMPLICATIONS FOR ARMENIAN COMMUNITIES ABROAD.

    Science.gov (United States)

    Davtyan, Susanna; Khachatryan, Mikayel; Johrian, Ara; Ghazaryan, Karen

    2014-07-01

    The Law Book of the medieval Armenian legal and economic thought is an exceptional work that encompasses valuable information of the Armenian nation's domestic life. Mkhitar Gosh was considered to be one of the most outstanding figures and lawyers (lawmakers) of all times. Armenian Law Code after Mkhitar Gosh is writhed at 12 century. One of the primary sources for the law code was Armenian customary law. This Code became moral code for guiding for hall Armenians over the world because of high moral spirit reflecting Armenian mentality. This article presents the brief history of extension of legal rules setting out in the Law Code. The Law Code was established and widely used not only in Armenia but also in a number of Armenian communities abroad (Russian, Poland, Georgia, Latvia, India etc.). Law Code was accepted by all Armenians. Moreover, it served for the development of legislation for a number of civilized European and Asian countries.

  11. Convolutional coding techniques for data protection

    Science.gov (United States)

    Massey, J. L.

    1975-01-01

    Results of research on the use of convolutional codes in data communications are presented. Convolutional coding fundamentals are discussed along with modulation and coding interaction. Concatenated coding systems and data compression with convolutional codes are described.

  12. Code Flows : Visualizing Structural Evolution of Source Code

    NARCIS (Netherlands)

    Telea, Alexandru; Auber, David

    2008-01-01

    Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared to the understanding of fine and mid-level scale changes across several file versions. We enhance an existing visual met

  13. Code flows : Visualizing structural evolution of source code

    NARCIS (Netherlands)

    Telea, Alexandru; Auber, David

    2008-01-01

    Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared to the understanding of fine and mid-level scale changes across several file versions. We enhance an existing visual met

  14. Comprehensive Child Welfare Information System. Final rule.

    Science.gov (United States)

    2016-06-01

    This final rule replaces the Statewide and Tribal Automated Child Welfare Information Systems (S/TACWIS) rule with the Comprehensive Child Welfare Information System (CCWIS) rule. The rule also makes conforming amendments in rules in related requirements. This rule will assist title IV-E agencies in developing information management systems that leverage new innovations and technology in order to better serve children and families. More specifically, this final rule supports the use of cost-effective, innovative technologies to automate the collection of high-quality case management data and to promote its analysis, distribution, and use by workers, supervisors, administrators, researchers, and policy makers.

  15. Conformance Testing: Measurement Decision Rules

    Science.gov (United States)

    Mimbs, Scott M.

    2010-01-01

    The goal of a Quality Management System (QMS) as specified in ISO 9001 and AS9100 is to provide assurance to the customer that end products meet specifications. Measuring devices, often called measuring and test equipment (MTE), are used to provide the evidence of product conformity to specified requirements. Unfortunately, processes that employ MTE can become a weak link to the overall QMS if proper attention is not given to the measurement process design, capability, and implementation. Documented "decision rules" establish the requirements to ensure measurement processes provide the measurement data that supports the needs of the QMS. Measurement data are used to make the decisions that impact all areas of technology. Whether measurements support research, design, production, or maintenance, ensuring the data supports the decision is crucial. Measurement data quality can be critical to the resulting consequences of measurement-based decisions. Historically, most industries required simplistic, one-size-fits-all decision rules for measurements. One-size-fits-all rules in some cases are not rigorous enough to provide adequate measurement results, while in other cases are overly conservative and too costly to implement. Ideally, decision rules should be rigorous enough to match the criticality of the parameter being measured, while being flexible enough to be cost effective. The goal of a decision rule is to ensure that measurement processes provide data with a sufficient level of quality to support the decisions being made - no more, no less. This paper discusses the basic concepts of providing measurement-based evidence that end products meet specifications. Although relevant to all measurement-based conformance tests, the target audience is the MTE end-user, which is anyone using MTE other than calibration service providers. Topics include measurement fundamentals, the associated decision risks, verifying conformance to specifications, and basic measurement

  16. Bilinearity, rules, and prefrontal cortex

    Directory of Open Access Journals (Sweden)

    Peter Dayan

    2007-11-01

    Full Text Available Humans can be instructed verbally to perform computationally complex cognitive tasks; their performance then improves relatively slowly over the course of practice. Many skills underlie these abilities; in this paper, we focus on the particular question of a uniform architecture for the instantiation of habitual performance and the storage, recall, and execution of simple rules. Our account builds on models of gated working memory, and involves a bilinear architecture for representing conditional input-output maps and for matching rules to the state of the input and working memory. We demonstrate the performance of our model on two paradigmatic tasks used to investigate prefrontal and basal ganglia function.

  17. Rules Extraction with an Immune Algorithm

    Directory of Open Access Journals (Sweden)

    Deqin Yan

    2007-12-01

    Full Text Available In this paper, a method of extracting rules with immune algorithms from information systems is proposed. Designing an immune algorithm is based on a sharing mechanism to extract rules. The principle of sharing and competing resources in the sharing mechanism is consistent with the relationship of sharing and rivalry among rules. In order to extract rules efficiently, a new concept of flexible confidence and rule measurement is introduced. Experiments demonstrate that the proposed method is effective.

  18. What Froze the Genetic Code?

    National Research Council Canada - National Science Library

    Lluís Ribas de Pouplana; Adrian Gabriel Torres; albert Rafels-Ybern

    2017-01-01

    The frozen accident theory of the Genetic Code was a proposal by Francis Crick that attempted to explain the universal nature of the Genetic Code and the fact that it only contains information for twenty amino acids...

  19. Decoding Xing-Ling codes

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Refslund

    2002-01-01

    This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed.......This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed....

  20. The path of code linting

    CERN Document Server

    CERN. Geneva

    2017-01-01

    Join the path of code linting and discover how it can help you reach higher levels of programming enlightenment. Today we will cover how to embrace code linters to offload cognitive strain on preserving style standards in your code base as well as avoiding error-prone constructs. Additionally, I will show you the journey ahead for integrating several code linters in the programming tools your already use with very little effort.

  1. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...

  2. Code stroke in Asturias.

    Science.gov (United States)

    Benavente, L; Villanueva, M J; Vega, P; Casado, I; Vidal, J A; Castaño, B; Amorín, M; de la Vega, V; Santos, H; Trigo, A; Gómez, M B; Larrosa, D; Temprano, T; González, M; Murias, E; Calleja, S

    2016-04-01

    Intravenous thrombolysis with alteplase is an effective treatment for ischaemic stroke when applied during the first 4.5 hours, but less than 15% of patients have access to this technique. Mechanical thrombectomy is more frequently able to recanalise proximal occlusions in large vessels, but the infrastructure it requires makes it even less available. We describe the implementation of code stroke in Asturias, as well as the process of adapting various existing resources for urgent stroke care in the region. By considering these resources, and the demographic and geographic circumstances of our region, we examine ways of reorganising the code stroke protocol that would optimise treatment times and provide the most appropriate treatment for each patient. We distributed the 8 health districts in Asturias so as to permit referral of candidates for reperfusion therapies to either of the 2 hospitals with 24-hour stroke units and on-call neurologists and providing IV fibrinolysis. Hospitals were assigned according to proximity and stroke severity; the most severe cases were immediately referred to the hospital with on-call interventional neurology care. Patient triage was provided by pre-hospital emergency services according to the NIHSS score. Modifications to code stroke in Asturias have allowed us to apply reperfusion therapies with good results, while emphasising equitable care and managing the severity-time ratio to offer the best and safest treatment for each patient as soon as possible. Copyright © 2015 Sociedad Española de Neurología. Published by Elsevier España, S.L.U. All rights reserved.

  3. MHD Generation Code

    OpenAIRE

    Frutos-Alfaro, Francisco; Carboni-Mendez, Rodrigo

    2015-01-01

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a c...

  4. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  5. Code Optimization in FORM

    CERN Document Server

    Kuipers, J; Vermaseren, J A M

    2013-01-01

    We describe the implementation of output code optimization in the open source computer algebra system FORM. This implementation is based on recently discovered techniques of Monte Carlo tree search to find efficient multivariate Horner schemes, in combination with other optimization algorithms, such as common subexpression elimination. For systems for which no specific knowledge is provided it performs significantly better than other methods we could compare with. Because the method has a number of free parameters, we also show some methods by which to tune them to different types of problems.

  6. Topological code Autotune

    CERN Document Server

    Fowler, Austin G; McInnes, Angus L; Rabbani, Alimohammad

    2012-01-01

    Tailoring a fault-tolerant quantum error correction scheme to a specific physical architecture can be a laborious task. We describe a tool Autotune capable of analyzing and optimizing the classical processing for an arbitrary 2-D qubit architecture making use of arbitrary circuits implementing either the surface code or progressively generated slices of a 3-D topological cluster state with arbitrary stochastic error models for each quantum gate. Autotune is designed to facilitate precise study of the performance of real hardware running topological quantum error correction.

  7. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  8. Memory Code©

    OpenAIRE

    Gómez-Londoño, Ana María

    2013-01-01

    El proyecto Memory Code© pertenece al ámbito de las cosmopolíticas del arte contemporáneo porque se ocupa de una relación singular de lo humano (mujer) con lo no-humano (caballo y técnicas)5. Específicamente enmarca el estudio del Binomio Ecuestre: caballo-jinete en el marco de una relación afectiva y de adiestramiento (doma clásica). Dicha relación estuvo compuesta por los siguientes operadores : a) Elementos de con-tacto entre jinete-caballo: espuelas, estribus, fustas b) Sistemas rítmicos ...

  9. 2013 mask industry survey

    Science.gov (United States)

    Malloy, Matt

    2013-09-01

    A comprehensive survey was sent to merchant and captive mask shops to gather information about the mask industry as an objective assessment of its overall condition. 2013 marks the 12th consecutive year for this process. Historical topics including general mask profile, mask processing, data and write time, yield and yield loss, delivery times, maintenance, and returns were included and new topics were added. Within each category are multiple questions that result in a detailed profile of both the business and technical status of the mask industry. While each year's survey includes minor updates based on feedback from past years and the need to collect additional data on key topics, the bulk of the survey and reporting structure have remained relatively constant. A series of improvements is being phased in beginning in 2013 to add value to a wider audience, while at the same time retaining the historical content required for trend analyses of the traditional metrics. Additions in 2013 include topics such as top challenges, future concerns, and additional details in key aspects of mask masking, such as the number of masks per mask set per ground rule, minimum mask resolution shipped, and yield by ground rule. These expansions beyond the historical topics are aimed at identifying common issues, gaps, and needs. They will also provide a better understanding of real-life mask requirements and capabilities for comparison to the International Technology Roadmap for Semiconductors (ITRS).

  10. A Novel Criterion for Optimum MultilevelCoding Systems in Mobile Fading Channels

    Institute of Scientific and Technical Information of China (English)

    YUAN Dongfeng; WANG Chengxiang; YAO Qi; CAO Zhigang

    2001-01-01

    A novel criterion that is "capac-ity rule" and "mapping rule" for the design of op-timum MLC scheme over mobile fading channels isproposed.According to this theory,the performanceof multilevel coding with multistage decoding schemes(MLC/MSD) in mobile fading channels is investi-gated,in which BCH codes are chosen as componentcodes,and three mapping strategies with 8ASK mod-ulation are used.Numerical results indicate that whencode rates of component codes in MLC scheme are de-signed based on "capacity rule",the performance ofthe system with block partitioning (BP) is optimumfor Rayleigh fading channels,while the performance ofthe system with Ungerboeck partioning (UP) is bestfor AWGN channels.

  11. The new financial architecture: from substantive to procedural rules

    Directory of Open Access Journals (Sweden)

    Mario Sarcinelli

    2004-12-01

    Full Text Available The new international financial architecture is investigated through the works of leading American economists, the Cologne G7 decisions, the implementing work of the IMF (and the World Bank. However, the Washington-consensus policies and the definition of standards and codes have not avoided foreign exchange, banking and debt crises, the therapy of which has been hotly contested as ineffective or unduly harsh. Many critics have proposed to transform the IMF radically. Although no such reform has taken place, the institution set up at Bretton Woods to look after the fixed exchange rate system with substantive rules has turned into a sort of supervisor of macroeconomic, structural and, above all, financial policies aiming to ensure stability through procedural rules. The latter are the product of many institutions and organisations with or without legitimacy, which makes the international monetary andfinancial system ever more dependent on soft law.

  12. Wavefront coding with adaptive optics

    Science.gov (United States)

    Agbana, Temitope E.; Soloviev, Oleg; Bezzubik, Vitalii; Patlan, Vsevolod; Verhaegen, Michel; Vdovin, Gleb

    2015-03-01

    We have implemented an extended depth of field optical system by wavefront coding with a micromachined membrane deformable mirror. This approach provides a versatile extension to standard wavefront coding based on fixed phase mask. First experimental results validate the feasibility of the use of adaptive optics for variable depth wavefront coding in imaging optical systems.

  13. Authorship Attribution of Source Code

    Science.gov (United States)

    Tennyson, Matthew F.

    2013-01-01

    Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…

  14. Strongly-MDS convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Rosenthal, J; Smarandache, R

    2006-01-01

    Maximum-distance separable (MDS) convolutional codes have the property that their free distance is maximal among all codes of the same rate and the same degree. In this paper, a class of MDS convolutional codes is introduced whose column distances reach the generalized Singleton bound at the earlies

  15. Improved code-tracking loop

    Science.gov (United States)

    Laflame, D. T.

    1980-01-01

    Delay-locked loop tracks pseudonoise codes without introducing dc timing errors, because it is not sensitive to gain imbalance between signal processing arms. "Early" and "late" reference codes pass in combined form through both arms, and each arm acts on both codes. Circuit accomodates 1 dB weaker input signals with tracking ability equal to that of tau-dither loops.

  16. On Maximum Lee Distance Codes

    OpenAIRE

    Alderson, Tim L.; Svenja Huntemann

    2013-01-01

    Singleton-type upper bounds on the minimum Lee distance of general (not necessarily linear) Lee codes over ℤq are discussed. Two bounds known for linear codes are shown to also hold in the general case, and several new bounds are established. Codes meeting these bounds are investigated and in some cases characterised.

  17. Coding Issues in Grounded Theory

    Science.gov (United States)

    Moghaddam, Alireza

    2006-01-01

    This paper discusses grounded theory as one of the qualitative research designs. It describes how grounded theory generates from data. Three phases of grounded theory--open coding, axial coding, and selective coding--are discussed, along with some of the issues which are the source of debate among grounded theorists, especially between its…

  18. The Weights in MDS Codes

    CERN Document Server

    Ezerman, Martianus Frederic; Sole, Patrick

    2009-01-01

    The weights in MDS codes of length n and dimension k over the finite field GF(q) are studied. Up to some explicit exceptional cases, the MDS codes with parameters given by the MDS conjecture are shown to contain all k weights in the range n-k+1 to n. The proof uses the covering radius of the dual code

  19. Coding Issues in Grounded Theory

    Science.gov (United States)

    Moghaddam, Alireza

    2006-01-01

    This paper discusses grounded theory as one of the qualitative research designs. It describes how grounded theory generates from data. Three phases of grounded theory--open coding, axial coding, and selective coding--are discussed, along with some of the issues which are the source of debate among grounded theorists, especially between its…

  20. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    1997-01-01

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy...