These are representative sample records from Science.gov related to your search topic.
For comprehensive and current results, perform a real-time search at Science.gov.
1

The Real Code of Leonardo da Vinci  

PubMed Central

Leonardo da Vinci was born in Italy. Among the researchers and scientists, he is favourably known for his remarkable efforts in scientific work. His investigations of atherosclerosis judiciously combine three separate fields of research. In 1506, he finished his masterpiece, painting of Mona Lisa. A careful clinical examination of the famous painting reveals a yellow irregular leather-like spot at the inner end of the left upper eyelid and a soft bumpy well-defined swelling of the dorsum of the right hand beneath the index finger about 3 cm long. This is probably the first case of familial hypercholesterolemia (FH). The FH code of Leonardo da Vinci was given immense consideration by scientists like Carl Muller, who described the xanthomas tuberosum and angina pectoris. On the contrary, Akira Endo searched for microbial metabolites that would inhibit HMG-CoA reductase, the rate-limiting enzyme in the synthesis of cholesterol and finally, Michael Brown and Joseph Goldstein published a remarkable series of elegant and insightful papers in the 70s and 80s. They established that the cellular uptake of low-density lipoprotein (LDL) essentially requires the LDL receptor. In conclusion: this was the real Code of Leonardo da Vinci. PMID:19924278

Ose, Leiv

2008-01-01

2

The Real Code of Leonardo da Vinci  

Microsoft Academic Search

Leonardo da Vinci was born in Italy. Among the researchers and scientists, he is favourably known for his remarkable efforts in scientific work. His investigations of atherosclerosis judiciously combine three separate fields of research. In 1506, he finished his masterpiece, painting of Mona Lisa. A careful clinical examination of the famous painting reveals a yellow irregular leather-like spot at the

Leiv Ose

2008-01-01

3

Leonardo da Vinci and the Downburst.  

NASA Astrophysics Data System (ADS)

Evidence from the drawings, experiments, and writings of Leonardo da Vinci are presented to demonstrate that da Vinci recognized and, possibly, discovered the downburst and understood its associated airflow. Other early references to vortex flows resembling downbursts are mentioned.

Gedzelman, Stanley David

1990-05-01

4

Leonardo da Vinci and the Downburst  

Microsoft Academic Search

Evidence from the drawings, experiments, and writings of Leonardo da Vinci are presented to demonstrate that da Vinci recognized and, possibly, discovered the downburst and understood its associated airflow. Other early references to vortex flows resembling downbursts are mentioned.

Stanley David Gedzelman

1990-01-01

5

Leonardo Da Vinci: A Review  

Microsoft Academic Search

The article reviews scholarship on Leonardo da Vinci during the 20th century. An initial fascination with a handful of paintings has led to a nearly comprehensive understanding of his art. A catalogue raisonnée for Leonardo and his school has yet to be made. Awareness of Leonardo as a scientist began with a vague reputation of a universal genius who never

Kim H. Veltman

2008-01-01

6

Leonardo da Vinci: A Review  

Microsoft Academic Search

The article reviews scholarship on Leonardo da Vinci during the 20th century. An initial fascination with a handful of paintings has led to a nearly comprehensive understanding of his art. A catalogue raisonnée for Leonardo and his school has yet to be made. Awareness of Leonardo as a scientist began with a vague reputation of a universal genius who never

Kim H. Veltman

2008-01-01

7

Leonardo da Vinci's Geometric Sketches  

NSDL National Science Digital Library

How do you solve a problem like solids, mathematically speaking? Well, you could use this rather fascinating resource provided by the Convergence magazine. Offered as an educational resource by the Mathematical Association of America (MAA), this particular resource brings together the work of the Franciscan friar Luca Pacioli (c.1445-1509) and the geometric sketches of Leonardo Da Vinci. Both men were interested in geometry, and this piece offers up a number of plate facsimiles of illustrations created by Da Vinci. Here visitors will find an introduction to this educational resource, along with illustrations of cubes, octahedrons, and cylinders. The accompanying article was written by Frank J. Swetz, and it is easy to see how these materials could be incorporated into a classroom discussion about the history of mathematics.

2008-09-15

8

Leonardo da Vinci's Geometric Sketches  

NSDL National Science Digital Library

How do you solve a problem like solids, mathematically speaking? Well, you could use this rather fascinating resource provided by the Convergence magazine. Offered as an educational resource by the Mathematical Association of America (MAA), this particular resource brings together the work of the Franciscan friar Luca Pacioli (c.1445-1509) and the geometric sketches of Leonardo Da Vinci. Both men were interested in geometry, and this piece offers up a number of plate facsimiles of illustrations created by Da Vinci. Here visitors will find an introduction to this educational resource, along with illustrations of cubes, octahedrons, and cylinders. The accompanying article was written by Frank J. Swetz, and it is easy to see how these materials could be incorporated into a classroom discussion about the history of mathematics.

9

Media Images Abbott and Costello Meet the End of the World: Who Is the Enemy in "The Da Vinci Code" and "An Inconvenient Truth?"  

ERIC Educational Resources Information Center

Popular culture requires readily identifiable villains. Subcultural groups often serve this role, creating controversies. Controversies based on religion are especially bitter. As a rule, religion in the movies is inoffensively sentimental, but "The Da Vinci Code" is both popular and provocative, treading on the dangerous ground of Jesus's…

Beck, Bernard

2007-01-01

10

A Contemporary Version of the Grail Quest: Dan Brown's The Da Vinci Code and its failed appropriation of the mythic legend  

Microsoft Academic Search

Myth can often be seen to supply a response to the yearning of the world, and the legend of the Holy Grail is no exception. The latest version of the quest, Dan Brown's novel The Da Vinci Code, reveals the two sides of the coin that make a mythic symbol mysterious, unattainable, and yet so tantalisingly real. On the one

Geoff Berry

11

Leonardo da Vinci (1452-1519)  

NSDL National Science Digital Library

This is a biographical sketch of Leonardo da Vinci. Leonardo da Vinci was a painter, sculptor, architect, engineer, scientist and genius who best represents the ideals of the Renaissance period. He was one of the greatest painters of all times. Da Vinci was also a great engineer and inventor who designed buildings, bridges, canals, forts and war machines. He was fascinated by birds and flying and drew designs of fantastic flying machines.

Laboratory, Florida S.

1999-01-01

12

Programma "LEONARDO DA VINCI" Progetto UNIPHARMA-GRADUATES 9  

E-print Network

Programma "LEONARDO DA VINCI" Progetto UNIPHARMA-GRADUATES 9 Bando di Concorso 82 contributi per Programma dell'Unione Europea per l'Apprendimento Permanente ­ Programma settoriale "Leonardo da Vinci CONTRIBUTO LEONARDO DA VINCI (LdV): Il contributo LdV rappresenta un rimborso delle spese di viaggio

Guidoni, Leonardo

13

How to Think Like Leonardo da Vinci  

ERIC Educational Resources Information Center

To be effective and relevant in twenty-first-century learning, art needs to be more inclusive. In this article, the author discusses how teachers can find a good example in Leonardo da Vinci for building an art program. His art, design, and curiosity are the perfect foundation for any art program, at any level. (Contains 3 resources and 3 online…

Caouette, Ralph

2008-01-01

14

Das Weimarer Anatomieblatt Leonardo da Vincis  

Microsoft Academic Search

Zum Thema Leonardo da Vinci (1452-1519) hat in seiner 2. Lebenshälfte eine Vielzahl von anatomischen Studien durchgeführt und seine Skizzenblätter zeugen nicht nur von seinem künstlerischem Können, sondern auch von seiner Stellung als Wissenschaftler. Heute befindet sich nahezu die komplette Sammlung der erhaltenen anatomischen Skizzenbücher Leonardos im Besitz des Englischen Königshauses und wird in der Royal Library in Windsor Castle

D. Schultheiss; D. Laurenza; B. Götte; U. Jonas

2000-01-01

15

Leonardo da Vinci's contributions to neuroscience  

Microsoft Academic Search

Leonardo da Vinci (1452–1519) made far-reaching contributions to many areas of science, technology and art. Leonardo's pioneering research into the brain led him to discoveries in neuroanatomy (such as those of the frontal sinus and meningeal vessels) and neurophysiology (he was the first to pith a frog). His injection of hot wax into the brain of an ox provided a

Jonathan Pevsner

2002-01-01

16

Leonardo da vinci e la matematica  

Microsoft Academic Search

Sunto  Lo scopo della presente Nota č quello di illustrare come Leonardo da Vinci, contrariamente a quanto sostengono molti autori,\\u000a possedesse un eccezionale talento matematico, una mentalitŕ tipica dei matematici unita ad una sorprendente originalitŕ. Numerose\\u000a sue idee furono riprese e realizzate nei secoli successivi.

I. S. Fenyö

1985-01-01

17

Leonardo da Vinci and Perpetual Motion  

Microsoft Academic Search

Leonardo da Vinci illustrated several traditional forms of perpetual-motion machine in small pocket books now known as the Codex Forster. He was well aware that these designs, based on waterwheel\\/pump combinations, mechanical overbalancing hammers or rolling balls, would notand could notwork.

Allan A. Mills

2008-01-01

18

A computational theory of da Vinci stereopsis.  

PubMed

In binocular vision, occlusion of one object by another gives rise to monocular occlusions—regions visible only in one eye. Although binocular disparities cannot be computed for these regions, monocular occlusions can be precisely localized in depth and can induce the perception of illusory occluding surfaces. The phenomenon of depth perception from monocular occlusions, known as da Vinci stereopsis, is intriguing, but its mechanisms are not well understood. We first propose a theory of the mechanisms underlying da Vinci stereopsis that is based on the psychophysical and computational literature on monocular occlusions. It postulates, among other principles, that monocular areas are detected explicitly, and depth from occlusions is calculated based on constraints imposed by occlusion geometry. Next, we describe a biologically inspired computational model based on this theory that successfully reconstructs depth in a large range of stimuli and produces results similar to those described in the psychophysical literature. These results demonstrate that the proposed neural architecture could underpin da Vinci stereopsis and other stereoscopic percepts. PMID:24914063

Tsirlin, Inna; Wilcox, Laurie M; Allison, Robert S

2014-01-01

19

Programma Leonardo da Vinci Progetto "Jobs4graduates-2"  

E-print Network

Programma Leonardo da Vinci Progetto "Jobs4graduates-2" Accettazione del contributo I candidati accettare la Borsa di tirocinio del Programma Leonardo da Vinci, come indicato nel formulario di candidatura, debitamente giustificata e potrĂ  costituire motivo di esclusione da eventuali successivi progetti Leonardo da

Di Pillo, Gianni

20

The Case: Bunche-Da Vinci Learning Partnership Academy  

ERIC Educational Resources Information Center

The Bunche-Da Vinci case described in this article presents a situation at Bunche Elementary School that four theorists were asked to address in their evaluation designs (see EJ791771, EJ719772, EJ791773, and EJ792694). The Bunche-Da Vinci Learning Partnership Academy, an elementary school located between an urban port city and a historically…

Eisenberg, Nicole; Winters, Lynn; Alkin, Marvin C.

2005-01-01

21

Leonardo da Vinci's contributions to neuroscience.  

PubMed

Leonardo da Vinci (1452-1519) made far-reaching contributions to many areas of science, technology and art. Leonardo's pioneering research into the brain led him to discoveries in neuroanatomy (such as those of the frontal sinus and meningeal vessels) and neurophysiology (he was the first to pith a frog). His injection of hot wax into the brain of an ox provided a cast of the ventricles, and represents the first known use of a solidifying medium to define the shape and size of an internal body structure. Leonardo developed an original, mechanistic model of sensory physiology. He undertook his research with the broad goal of providing physical explanations of how the brain processes visual and other sensory input, and integrates that information via the soul. PMID:11998691

Pevsner, Jonathan

2002-04-01

22

Leonardo da Vinci: Founder of the science of geological facies  

Microsoft Academic Search

Existing ideas on the history of geology are refined. It is shown that Leonardo da Vinci is the founder of the science of geological facies. His principal geological concepts, which passed several centuries ahead of time, are discussed.

M. G. Berger

2005-01-01

23

Tree Branching: Leonardo da Vinci's Rule versus Biomechanical Models  

PubMed Central

This study examined Leonardo da Vinci's rule (i.e., the sum of the cross-sectional area of all tree branches above a branching point at any height is equal to the cross-sectional area of the trunk or the branch immediately below the branching point) using simulations based on two biomechanical models: the uniform stress and elastic similarity models. Model calculations of the daughter/mother ratio (i.e., the ratio of the total cross-sectional area of the daughter branches to the cross-sectional area of the mother branch at the branching point) showed that both biomechanical models agreed with da Vinci's rule when the branching angles of daughter branches and the weights of lateral daughter branches were small; however, the models deviated from da Vinci's rule as the weights and/or the branching angles of lateral daughter branches increased. The calculated values of the two models were largely similar but differed in some ways. Field measurements of Fagus crenata and Abies homolepis also fit this trend, wherein models deviated from da Vinci's rule with increasing relative weights of lateral daughter branches. However, this deviation was small for a branching pattern in nature, where empirical measurements were taken under realistic measurement conditions; thus, da Vinci's rule did not critically contradict the biomechanical models in the case of real branching patterns, though the model calculations described the contradiction between da Vinci's rule and the biomechanical models. The field data for Fagus crenata fit the uniform stress model best, indicating that stress uniformity is the key constraint of branch morphology in Fagus crenata rather than elastic similarity or da Vinci's rule. On the other hand, mechanical constraints are not necessarily significant in the morphology of Abies homolepis branches, depending on the number of daughter branches. Rather, these branches were often in agreement with da Vinci's rule. PMID:24714065

Minamino, Ryoko; Tateno, Masaki

2014-01-01

24

Leonardo da Vinci (1452-1519)  

Microsoft Academic Search

Painter, inventor and polymath, born in Vinci (near Empolia), Italy. Although astronomy does not figure large in Leonardo's works, he realized the possibility of constructing a telescope (`making glasses to see the Moon enlarged'). He suggested that `... in order to observe the nature of the planets, open the roof and bring the image of a single planet onto the

P. Murdin

2000-01-01

25

First experiences with the da Vinci™ operating robot in thoracic surgery  

Microsoft Academic Search

Objectives: The da Vinci™ surgical robotic system was purchased at our institution in June 2001. The aim of this trial was to evaluate the applicability of the da Vinci™ operation robot for general thoracic procedures. Methods: The da Vinci™ surgical system consists of a console connected to a surgical arm cart, a manipulator unit with two instrument arms and a

J. Bodner; H. Wykypiel; G. Wetscher; T. Schmid

2004-01-01

26

Leonardo da Vinci (1452-1519)  

NASA Astrophysics Data System (ADS)

Painter, inventor and polymath, born in Vinci (near Empolia), Italy. Although astronomy does not figure large in Leonardo's works, he realized the possibility of constructing a telescope (`making glasses to see the Moon enlarged'). He suggested that `… in order to observe the nature of the planets, open the roof and bring the image of a single planet onto the base of a concave mirror. The image o...

Murdin, P.

2000-11-01

27

The Potential da Vinci in All of Us  

ERIC Educational Resources Information Center

The study of the human form is fundamental to both science and art curricula. For vertebrates, perhaps no feature is more important than the skeleton to determine observable form and function. As Leonard da Vinci's famous Proportions of the Human Figure (Virtruvian Man) illustrates, the size, shape, and proportions of the human body are defined by…

Petto, Sarah; Petto, Andrew

2009-01-01

28

Training and Health. Leonardo da Vinci Series: Good Practices.  

ERIC Educational Resources Information Center

This document profiles programs in the fields of health and medicine that are offered through the European Commission's Leonardo da Vinci program. The following programs are profiled: (1) CYTOTRAIN (a transnational vocational training program in cervical cancer screening); (2) Apollo (a program of open and distance learning for paramedical…

Commission of the European Communities, Brussels (Belgium). Directorate-General for Education and Culture.

29

Women and Technical Professions. Leonardo da Vinci Series: Good Practices.  

ERIC Educational Resources Information Center

This document profiles programs for women in technical professions that are offered through the European Commission's Leonardo da Vinci program. The following programs are profiled: (1) Artemis and Diana (vocational guidance programs to help direct girls toward technology-related careers); (2) CEEWIT (an Internet-based information and…

Commission of the European Communities, Brussels (Belgium). Directorate-General for Education and Culture.

30

Studying and Working Abroad. Leonardo da Vinci Series: Good Practices.  

ERIC Educational Resources Information Center

This document profiles recent successful examples of students studying and working abroad as part of the European Commission's Leonardo da Vinci program, which is designed to give students across the European Union the opportunity to experience vocational training in a foreign country. The following examples are presented: (1) 3 Finnish students…

Commission of the European Communities, Brussels (Belgium). Directorate-General for Education and Culture.

31

Leonardo da Vinci's Struggles with Representations of Reality  

Microsoft Academic Search

Virtual reality systems seek to simulate real scenes so that they will be seen as three-dimensional. The issues at the heart of virtual reality are old ones. Leonardo da Vinci struggled with the differences between the perception of a scene and a painting of it, which he reduced to the differences between binocular and monocular vision. He could not produce

Nicholas J. Wade; Hiroshi Ono; Linda Lillakas

2001-01-01

32

Sine ars scientia nihil est: Leonardo da Vinci and beyond  

Microsoft Academic Search

The aim of this article is to reflect on the relationship between art and science so far as it concerns a symposium on neurosciences. We undertake a historical overview of that relationship, paying particular attention to the sui generis case of Leonardo da Vinci, who very often is regarded as the man who worked on art and science with equal

Eduardo H. P. Kickhöfel

2009-01-01

33

A Film on Leonardo da Vinci by Luciano Emmer  

Microsoft Academic Search

Leonardo da Vinci probably did not consider the possibility of realizing images with real movement. Many centuries later, however, the author's father, Luciano Emmer, had the idea of reinterpreting the images of the famous artist and scientist using the technique of cinema.

Michele Emmer

2009-01-01

34

Da Vinci's codex and the anatomy of healthcare.  

PubMed

We usually display a laid-back approach to medical jargon throughout our theatre work. The word 'perioperative' is built from the Greek word 'peri' (around) and the Latin 'operari' (to work). Latin and Greek became the prefixed language of choice for Leonardo da Vinci, and his research was pivotal in determining the way in which surgical procedures are documented. Ancient manuscripts aided the unfolding of the secrets of anatomy, and Leonardo revealed that art was the key in expressive detailed explanation. PMID:23248927

Stephens-Borg, Keith

2012-08-01

35

Visual tracking of da Vinci instruments for laparoscopic surgery  

NASA Astrophysics Data System (ADS)

Intraoperative tracking of laparoscopic instruments is a prerequisite to realize further assistance functions. Since endoscopic images are always available, this sensor input can be used to localize the instruments without special devices or robot kinematics. In this paper, we present an image-based markerless 3D tracking of different da Vinci instruments in near real-time without an explicit model. The method is based on different visual cues to segment the instrument tip, calculates a tip point and uses a multiple object particle filter for tracking. The accuracy and robustness is evaluated with in vivo data.

Speidel, S.; Kuhn, E.; Bodenstedt, S.; Röhl, S.; Kenngott, H.; Müller-Stich, B.; Dillmann, R.

2014-03-01

36

A Creative Approach to the Common Core Standards: The Da Vinci Curriculum  

ERIC Educational Resources Information Center

"A Creative Approach to the Common Core Standards: The Da Vinci Curriculum" challenges educators to design programs that boldly embrace the Common Core State Standards by imaginatively drawing from the genius of great men and women such as Leonardo da Vinci. A central figure in the High Renaissance, Leonardo made extraordinary contributions as a…

Chaucer, Harry

2012-01-01

37

Leonardo da Vinci and Stroke – Vegetarian Diet as a Possible Cause  

Microsoft Academic Search

Leonardo da Vinci (April 15, 1452 to May 2, 1519) was an Italian Renaissance architect, musician, anatomist, inventor, engineer, sculptor, geometer, and painter. It has been gleaned from the many available historical documents that da Vinci was a vegetarian who respected and loved animals, and that he suffered from right hemiparesis in the last 5 years of his life. A

Marta Altieri; Pina Troisi

2010-01-01

38

Robotic laparoscopic surgery: a comparison of the da Vinci and Zeus systems  

Microsoft Academic Search

Objectives. To evaluate two currently available robotic surgical systems in performing various urologic laparoscopic procedures in an acute porcine model.Methods. Robotic laparoscopic surgery was performed in 14 swine. Data were compared between the da Vinci Robotic System and the Zeus Robotic System.Results. During laparoscopic nephrectomy, the da Vinci System (n = 6) had a significantly shorter total operating room time

Gyung Tak Sung; Inderbir S Gill

2001-01-01

39

Page 1 of 4 Real-Time Visualization of the "da Vinci" Surgical Robot  

E-print Network

Page 1 of 4 Real-Time Visualization of the "da Vinci" Surgical Robot Dan Morris, Stanford) The "da Vinci" Surgical Robot allows a surgeon ­ controlling a robot from a manipulator console ­ to perform minimally invasive laparoscopic surgeries that would be difficult or impossible to perform

Salisbury, Kenneth

40

Leonardo da Vinci and the Art of Sculpture  

NSDL National Science Digital Library

This website from the Getty Museum accompanies the exhibition "Leonardo da Vinci and the Art of Sculpture: Inspiration and Invention", organized by the High Museum of Art, Atlanta, and on display in Los Angeles until June 20th, 2010. The website features a slide show with images of 11 works of art, some by Leonardo and some by other artists, including older artists who influenced Leonardo and his followers. An image of Donatello's Bearded Prophet, 1418-20, is accompanied by audio discussing Donatello's impact on Leonardo, while the last three slides examine the master/pupil relationship between Leonardo and a younger artist, Giovanni Francesco Rustici, 1475-1554. Visitors to the site can also listen to an introduction to the exhibition that lays out its overall intent from co-curator Julian Brooks.

41

Leonardo da Vinci: the search for the soul.  

PubMed

The human race has always contemplated the question of the anatomical location of the soul. During the Renaissance the controversy crystallized into those individuals who supported the heart ("cardiocentric soul") and others who supported the brain ("cephalocentric soul") as the abode for this elusive entity. Leonardo da Vinci (1452-1519) joined a long list of other explorers in the "search for the soul." The method he used to resolve this anatomical problem involved the accumulation of information from ancient and contemporary sources, careful notetaking, discussions with acknowledged experts, and his own personal search for the truth. Leonardo used a myriad of innovative methods acquired from his knowledge of painting, sculpture, and architecture to define more clearly the site of the "senso comune"--the soul. In this review the author examines the sources of this ancient question, the knowledge base tapped by Leonardo for his personal search for the soul, and the views of key individuals who followed him. PMID:9817431

Del Maestro, R F

1998-11-01

42

Leonardo Da Vinci and stroke - vegetarian diet as a possible cause.  

PubMed

Leonardo da Vinci (April 15, 1452 to May 2, 1519) was an Italian Renaissance architect, musician, anatomist, inventor, engineer, sculptor, geometer, and painter. It has been gleaned from the many available historical documents that da Vinci was a vegetarian who respected and loved animals, and that he suffered from right hemiparesis in the last 5 years of his life. A vegetarian diet has both positive and negative influences on the cerebrovascular system. In this report, a possible relation between a vegetarian diet and stroke is discussed from various perspectives as related to Leonardo da Vinci's stroke. PMID:20375518

Oztürk, Serefnur; Altieri, Marta; Troisi, Pina

2010-01-01

43

DaVinci Canvas: A Telerobotic Surgical System with Integrated, Robot-Assisted, Laparoscopic Ultrasound Capability  

Microsoft Academic Search

\\u000a We present daVinci Canvas: a telerobotic surgical system with integrated robot-assisted laparoscopic ultrasound capability.\\u000a DaVinci Canvas consists of the integration of a rigid laparoscopic ultrasound probe with the daVinci robot, video tracking\\u000a of ultrasound probe motions, endoscope and ultrasound calibration and registration, autonomous robot motions, and the display\\u000a of registered 2D and 3D ultrasound images. Although we used laparoscopic liver

Joshua Leven; Darius Burschka; Rajesh Kumar; Gary Zhang; Steve Blumenkranz; Michael Awad; Gregory D. Hager; Mike Marohn; Michael A. Choti; Christopher J. Hasser; Russell H. Taylor

2005-01-01

44

Leonardo da Vinci on atherosclerosis and the function of the sinuses of Valsalva  

Microsoft Academic Search

lthough well studied by a medical scholar like Kenneth D. Keele, 1 Leonardo da Vinci’s elaborate study of the heart is not generally known. This article focuses on two of Leonardo’s achievements concerning atherosclerosis and the sinuses of Valsalva. 2 The first is his post-mortem observation on the degeneration of the vascular system in an old man, an early case

B. Boon

45

Leonardo da Vinci on atherosclerosis and the function of the sinuses of Valsalva  

Microsoft Academic Search

\\u000a Abstract  Although well studied by a medical scholar like Kenneth D. Keele, Leonardo da Vinci’s elaborate study of the heart is not\\u000a generally known. This article focuses on two of Leonardo’s achievements concerning atherosclerosis and the sinuses of Valsalva.\\u000a The first is his post-mortem observation on the degeneration of the vascular system in an old man, an early case history.

B. Boon

2009-01-01

46

Maintenance mechanisms of the pipe model relationship and Leonardo da Vinci’s rule in the branching architecture of Acer rufinerve trees  

Microsoft Academic Search

The pipe model relationship (constancy of branch cross-sectional area\\/leaf area) and Leonardo da Vinci’s rule (equality of\\u000a total cross-sectional area of the daughter branches and cross-sectional area of their mother branch) are empirical rules of\\u000a tree branching. Effects of branch manipulation on the pipe model relationships were examined using five Acer rufinerve trees. Half the branches in each tree were

Kosei Sone; Alata Antonio Suzuki; Shin-Ichi Miyazawa; Ko Noguchi; Ichiro Terashima

2009-01-01

47

Transparency of Vocational Qualifications: The Leonardo da Vinci Approach. CEDEFOP Panorama Series.  

ERIC Educational Resources Information Center

This report gives an overview of the situation of transparency of vocational qualifications by presenting measures introduced at the European Community level and by drawing attention to projects within the Leonardo da Vinci Program dealing with the issue. A 16-page executive summary appears first. Chapter 1 provides general background and aims.…

Bjornavold, Jens; Pettersson, Sten

48

Leonardo da Vinci, One Year on...a Different Look at Vocational Training in Europe.  

ERIC Educational Resources Information Center

Discusses the success of the Leonardo da Vinci program, a European laboratory of innovation in vocational training, a priority focus of investment in human resources and intelligence, and a way to mobilize innovative forces beyond national boundaries. Trends identified by the program focus on new information and communication technologies. (JOW)

Le Magazine, 1996

1996-01-01

49

Cutaneous Feedback of Planar Fingertip Deformation and Vibration on a da Vinci Surgical Robot  

E-print Network

. Visual feedback is already available in commercial robotic surgery systems (e.g., the Intuitive SurgicalCutaneous Feedback of Planar Fingertip Deformation and Vibration on a da Vinci Surgical RobotDept. of Advanced Robotics, Istituto Italiano di Tecnologia, Italy. 3Dept. of Mechanical Engineering

Siena, UniversitĂ  di

50

Tenure denied! not ready for promotion! no merit pay increase! poor Leonardo da Vinci!  

Microsoft Academic Search

Most academic institutions convey to faculty that they must have a clearly identified single or dual stream of research. Such a standard inhibits expertise. It stifles creativity and innovation and results in faculty unable to deal effectively with a broad range of doctoral students. People like Leonardo da Vinci, and other outstanding experts, fall outside of such a standard and,

Gary N. McLean

2007-01-01

51

From Sfumato to Transarchitectures and Osmose: Leonardo da Vinci's Virtual Reality  

Microsoft Academic Search

This paper explores the ways in which Leonardo da Vinci's anachronistic skepticism of Renaissance perspective and his subsequent invention of sfumato prefigure contemporary digital technology and its ability to literalize this formal technique. Marcos Novak and Char Davies offer parallel theories on the permeable boundaries among objects and between physical and virtual worlds. The resultant theories, like those of Leonardo,

Cami Nelson

2009-01-01

52

LEONARDO DA VINCI'S TENSILE STRENGTH TESTS: IMPLICATIONS FOR THE DISCOVERY OF ENGINEERING MECHANICS  

Microsoft Academic Search

In one of Leonardo Da Vinci's notebooks, an experiment is described where strengths in tension are measured for various lengths of wire. The notebook indicates that the results of these experiments were that longer wires were weaker than shorter wires. This result defies classical mechanics of materials. This conflict has been explained as a note-taking failure by Leonardo. This short

JAY R. LUND; JOSEPH P. BYRNE

2001-01-01

53

The proportion of the face in younger adults using the thumb rule of leonardo da vinci  

Microsoft Academic Search

The present study was conducted to examine whether the thumb rule of Leonardo da Vinci could be an objective method in the determination of the natural and artistic proportions of human face. In this study, a sample of 400 subjects (200 male and 200 female, 22–25 years old) was used. Measurements were made of the length of thumb, the length

Ö Oguz

1996-01-01

54

Leonardo da vinci, omo sanza lettere: A case of surface dysgraphia?  

Microsoft Academic Search

This paper is intended to analyse Leonardo da Vinci's orthography from a neuropsychological perspective. In his writings many errors are found which are never made by normal subjects as slips of the pen and are specific to a neuropsychological disorder known as surface dysgraphia. Evidence is also given in support of the hypothesis that Leonardo suffered from an analogous disorder

Giuseppe Sartori

1987-01-01

55

Visual degradation in Leonardo da Vinci's iconic self-portrait: A nanoscale study  

NASA Astrophysics Data System (ADS)

The discoloration of ancient paper, due to the development of oxidized groups acting as chromophores in its chief component, cellulose, is responsible for severe visual degradation in ancient artifacts. By adopting a non-destructive approach based on the combination of optical reflectance measurements and time-dependent density functional theory ab-initio calculations, we describe and quantify the chromophores affecting Leonardo da Vinci's iconic self-portrait. Their relative concentrations are very similar to those measured in modern and ancient samples aged in humid environments. This analysis quantifies the present level of optical degradation of the Leonardo da Vinci's self-portrait which, compared with future measurements, will assess its degradation rate. This is a fundamental information in order to plan appropriate conservation strategies.

Conte, A. Mosca; Pulci, O.; Misiti, M. C.; Lojewska, J.; Teodonio, L.; Violante, C.; Missori, M.

2014-06-01

56

The Handedness of Leonardo da Vinci: A Tale of the Complexities of Lateralisation  

ERIC Educational Resources Information Center

The handedness of Leonardo da Vinci is controversial. Although there is little doubt that many of his well-attributed drawings were drawn with the left hand, the hatch marks of the shading going downwards from left to right, it is not clear that he was a natural left-hander, there being some suggestion that he may have become left-handed as the…

McManus, I. C.; Drury, Helena

2004-01-01

57

Urodynamics in the anatomical work of Leonardo da Vinci (1452–1519)  

Microsoft Academic Search

Leonardo da Vinci (1452–1519) incorporates the symbiosis of art and medicine and can be adressed as the founder of medical\\u000a illustration in the time of the Renaissance. His anatomy studies were not published in his time, which explains why Leonardo's\\u000a outstanding knowledge of anatomy, physiology, and medicine had no impact on his scientific contemporaries and is therefore\\u000a primarily of retrospective

Dirk Schultheiss; Volker Grünewald; Udo Jonas

1999-01-01

58

A performance study comparing manual and robotically assisted laparoscopic surgery using the da Vinci system  

Microsoft Academic Search

Background: The objective of this study was to compare the efficacy of the da Vinci robotic system using both the three-dimensional view (3D) and two-dimensional (2D) view options with traditional manually assisted laparoscopic techniques in performing standardized exercises. Methods: To evaluate surgical efficiency in the use of robotically assisted and manual laparoscopic surgery for standardized exercises six, last-year medical students

G. Hubens; H. Coveliers; L. Balliu; M. Ruppert; W. Vaneerdeweg

2003-01-01

59

The handedness of Leonardo da Vinci: A tale of the complexities of lateralisation  

Microsoft Academic Search

The handedness of Leonardo da Vinci is controversial. Although there is little doubt that many of his well-attributed drawings were drawn with the left hand, the hatch marks of the shading going downwards from left to right, it is not clear that he was a natural left-hander, there being some suggestion that he may have become left-handed as the result

I. C. McManus; Helena Drury

2004-01-01

60

Da venerd 28 marzo, per un giorno al mese, secondo il calendario riportato nel seguito il CAM (Centro Ambientale Mobile) di AMSA sar presente in Piazza Leonardo da Vinci per sensibilizzare il quartiere di  

E-print Network

(Centro Ambientale Mobile) di AMSA sarà presente in Piazza Leonardo da Vinci per sensibilizzare il Centro Ambientale Mobile di AMSA approda in Piazza Leonardo da Vinci Per ulteriori informazioni è informazione e comunicazione diretta tra AMSA ed i cittadini. La presenza del CAM in Piazza Leonardo da Vinci

61

[The Vitruvian Man: an anatomical drawing for proportions by Leonardo Da Vinci].  

PubMed

The aim of the study was to find out and to analyse the text by Vitruvius which inspired the famous drawing by Leonardo da Vinci (circa 1490) kept in the Galleria dell'Accademia, in Venezia, Italy: the man inscribed in one circle and in one square. The book "de Architectura" by Vitruvius Marcus Pollio was printed several times since the Renaissance when both the roman architecture of antiquity and this text became very popular. From a French translation by Claude Perrault in 1864, it became easy to find a French translation with the original text in Latin (Paris, 2003, Les Belles Lettres, French text by Pierre Gros). The drawing by Leonardo da Vinci illustrates with great accuracy and fidelity the quotation of Vitruvius (with the exception of two of the 12 main relationships). The genius of Leonardo da Vinci was to keep only one trunk, head and neck for two pairs of limbs: scapular and pelvic; to make the circle tangent to the lower edge of the square; to adjust a few features of the quotation for the equilibrium of the whole figure; and of course to bring his incredible skill as a drawer (one of the best of his century). The drawing was made on a sheet of paper 344x245mm, in black ink which became dark brown with time; several lines complete the figure above and below; a short caption and a horizontal scale appear just under the drawing. The celebrity of the drawing, a symbol of the Renaissance, of the equilibrium of man and mankind, of the universality of the artists and intellectuals of the time (Humanism) made it iconic and it has been constantly reproduced and adapted especially for advertisement and logos, not only in the medical field. PMID:18951824

Le Floch-Prigent, P

2008-12-01

62

OCT structural examination of Madonna dei Fusi by Leonardo da Vinci  

NASA Astrophysics Data System (ADS)

Madonna dei Fusi (`Madonna of the Yarnwider') is a spectacular example of Italian Renaissance painting, attributed to Leonardo da Vinci. The aim of this study is to give an account of past restoration procedures. The evidence of a former retouching campaign will be presented with cross-sectional images obtained non-invasively with Optical Coherence Tomography (OCT). Specifically, the locations of overpaintings/retouchings with respect to the original paint layer and secondary varnishes will be given. Additionally, the evidence of a former transfer of the pictorial layer to the new canvas support by detecting the presence of its structure incised into paint layer will be shown.

Targowski, Piotr; Iwanicka, Magdalena; Sylwestrzak, Marcin; Kaszewska, Ewa A.; Frosinini, Cecilia

2013-05-01

63

X CONVEGNO ANNUALE CODAU 2012 Segreteria Codau c/o Politecnico di Milano Piazza Leonardo da Vinci, 32 20133 Milano  

E-print Network

X CONVEGNO ANNUALE CODAU 2012 Segreteria Codau c/o Politecnico di Milano Piazza Leonardo da #12; X CONVEGNO ANNUALE CODAU 2012 Segreteria Codau c/o Politecnico di Milano Piazza Leonardo da Vinci, 32 20133 Milano tel. 0223992001 fax 0223992225 email: segreteria@codau.it ­ www

Schettini, Raimondo

64

To give or to send to Servizio Offerta Formativa Post Laurea -Campus Leonardo Edificio 2 -Piazza Leonardo da Vinci, 32 20133 Milano -Italy  

E-print Network

- Piazza Leonardo da Vinci, 32 ­ 20133 Milano - Italy Stamp duty at current value CERTIFICATES ON STAMPED Formativa Post Laurea ­ Campus Leonardo ­ Piazza Leonardo da Vinci, 32 ­ Padiglione Nord ­ Edificio 2To give or to send to Servizio Offerta Formativa Post Laurea - Campus Leonardo ­ Edificio 2

65

Educating in the Design and Construction of Built Environments Accessible to Disabled People: The Leonardo da Vinci AWARD Project  

ERIC Educational Resources Information Center

An interdisciplinary partnership within an European Leonardo da Vinci project has developed a new approach aimed at educating secondary school students in the creation of built environments accessible to disabled people and at sensitizing them towards the inclusion of people with disabilities in all realms of social life. The AWARD (Accessible…

Frattari, Antonio; Dalpra, Michela; Bernardi, Fabio

2013-01-01

66

Virtual Mobility in Reality: A Study of the Use of ICT in Finnish Leonardo da Vinci Mobility Projects.  

ERIC Educational Resources Information Center

An e-mail survey and interviews collected data on use of information and communications technology (ICT) in Finnish Leonardo da Vinci mobility projects from 2000-02. Findings showed that the most common ICT tools used were e-mail, digital tools, and the World Wide Web; ICT was used during all project phases; the most common problems concerned…

Valjus, Sonja

67

Science in the Art of the Italian Renaissance II: Leonardo Da Vinci's Representation of Animals in His Works1  

Microsoft Academic Search

Leonardo Da Vinci combined science and art in a number of his works and studies. This combina- tion of science and art is very evident in the depiction of animals in his works. Leonardo studied both the anatomy and physiology of animals in order to render them with scientific precision. This included dissections of numerous animals and studies on their

DOUGLAS D. KANE

2002-01-01

68

Mellon Scholars Program: Leonardo da Vinci, Francis I, and the Struggle for International Prestige in 16th-Century France  

Microsoft Academic Search

Leonardo da Vinci spent his final years at the Manoir du Cloux in the company of the French King, Francis I. In competition with other European states, Francis I did everything he could to forge an image of France as strong, balanced, and formidable—and the arts were an essential part of his quest for prestige. For that reason the King

Athina Alvarez

2011-01-01

69

Urodynamics in the anatomical work of Leonardo da Vinci (1452-1519).  

PubMed

Leonardo da Vinci (1452-1519) incorporates the symbiosis of art and medicine and can be addressed as the founder of medical illustration in the time of the Renaissance. His anatomy studies were not published in his time, which explains why Leonardo's outstanding knowledge of anatomy, physiology, and medicine had no impact on his scientific contemporaries and is therefore primarily of retrospective importance in the history of medicine. The collection of anatomical illustrations remained unknown until their rediscovery in the eighteenth century and their wide publication at the beginning of our century. This article systematically reviews Leonardo's genitourinary drawings with regard to urodynamic aspects of the upper and lower urinary tract, highlighting topics such as vesicoureteral reflux and urinary sphincter mechanisms. PMID:10418086

Schultheiss, D; Grünewald, V; Jonas, U

1999-06-01

70

Microbiological Analysis of Surfaces of Leonardo Da Vinci's Atlantic Codex: Biodeterioration Risk  

PubMed Central

Following the discovery of discoloration on some pages of the Atlantic Codex (AC) of Leonardo da Vinci kept in the Biblioteca Ambrosiana in Milan, some investigations have been carried out to verify the presence of microorganisms, such as bacteria and fungi. To verify the presence of microorganisms a noninvasive method of sampling has been used that was efficient and allowed us to highlight the microbial facies of the material that was examined using conventional microbiological techniques. The microclimatic conditions in the storage room as well as the water content of the volume were also assessed. The combined observations allowed the conclusion that the discoloration of suspected biological origin on some pages of AC is not related to the presence or current attack of microbial agents. PMID:25574171

Moroni, Catia; Pasquariello, Giovanna; Maggi, Oriana

2014-01-01

71

da Vinci fluids, catch-up dynamics and dense granular flow.  

PubMed

We introduce and study a da Vinci fluid, a fluid whose dissipation is dominated by solid friction. We analyse the flow rheology of a discrete model and then coarse-grain it to the continuum. We find that the model gives rise to behaviour that is characteristic of dense granular fluids. In particular, it leads to plug flow. We analyse the nucleation mechanism of plugs and their development. We find that plug boundaries generically expand and we calculate the growth rate of plug regions. In systems whose internal effective dynamic and static friction coefficients are relatively uniform we find that the linear size of plug regions grows as (time)ą(/)ł . The suitability of the model to granular materials is discussed. PMID:20668906

Blumenfeld, R; Edwards, S F; Schwartz, M

2010-08-01

72

Understanding the adoption dynamics of medical innovations: affordances of the da Vinci robot in the Netherlands.  

PubMed

This study explored the rather rapid adoption of a new surgical device - the da Vinci robot - in the Netherlands despite the high costs and its controversial clinical benefits. We used the concept 'affordances' as a conceptual-analytic tool to refer to the perceived promises, symbolic meanings, and utility values of an innovation constructed in the wider social context of use. This concept helps us empirically understand robot adoption. Data from 28 in-depth interviews with diverse purposively-sampled stakeholders, and from medical literature, policy documents, Health Technology Assessment reports, congress websites and patients' weblogs/forums between April 2009 and February 2014 were systematically analysed from the perspective of affordances. We distinguished five interrelated affordances of the robot that accounted for shaping and fulfilling its rapid adoption: 'characteristics-related' affordances such as smart nomenclature and novelty, symbolising high-tech clinical excellence; 'research-related' affordances offering medical-technical scientific excellence; 'entrepreneurship-related' affordances for performing better-than-the-competition; 'policy-related' affordances indicating the robot's liberalised provision and its reduced financial risks; and 'communication-related' affordances of the robot in shaping patients' choices and the public's expectations by resonating promising discourses while pushing uncertainties into the background. These affordances make the take-up and use of the da Vinci robot sound perfectly rational and inevitable. This Dutch case study demonstrates the fruitfulness of the affordances approach to empirically capturing the contextual dynamics of technology adoption in health care: exploring in-depth actors' interaction with the technology while considering the interpretative spaces created in situations of use. This approach can best elicit real-life value of innovations, values as defined through the eyes of (potential) users. PMID:25063968

Abrishami, Payam; Boer, Albert; Horstman, Klasien

2014-09-01

73

From Leonardo to da Vinci: the history of robot-assisted surgery in urology.  

PubMed

What's known on the subject? and What does the study add? Numerous urological procedures can now be performed with robotic assistance. Though not definitely proven to be superior to conventional laparoscopy or traditional open surgery in the setting of a randomised trial, in experienced centres robot-assisted surgery allows for excellent surgical outcomes and is a valuable tool to augment modern surgical practice. Our review highlights the depth of history that underpins the robotic surgical platform we utilise today, whilst also detailing the current place of robot-assisted surgery in urology in 2011. The evolution of robots in general and as platforms to augment surgical practice is an intriguing story that spans cultures, continents and centuries. A timeline from Yan Shi (1023-957 bc), Archytas of Tarentum (400 bc), Aristotle (322 bc), Heron of Alexandria (10-70 ad), Leonardo da Vinci (1495), the Industrial Revolution (1790), 'telepresence' (1950) and to the da Vinci(®) Surgical System (1999), shows the incredible depth of history and development that underpins the modern surgical robot we use to treat our patients. Robot-assisted surgery is now well-established in Urology and although not currently regarded as a 'gold standard' approach for any urological procedure, it is being increasingly used for index operations of the prostate, kidney and bladder. We perceive that robotic evolution will continue infinitely, securing the place of robots in the history of Urological surgery. Herein, we detail the history of robots in general, in surgery and in Urology, highlighting the current place of robot-assisted surgery in radical prostatectomy, partial nephrectomy, pyeloplasty and radical cystectomy. PMID:21951677

Yates, David R; Vaessen, Christophe; Roupret, Morgan

2011-12-01

74

Leonardo da Vinci, Andreas Vesalius, Carlo Ruini, Jean Héroard und die Anatomie des Pferdes im 16. Jahrhundert  

Microsoft Academic Search

1.Die Anatomia del cavallo (1598) ist nicht in Anlehnung an Leonardo da Vinci, sondern2.an Vesals Fabrica entstanden,3.ebenso Héroards Hippostologie (1599). Diese stellt den dem Autor verbliebenen Rest seiner die ganze Anatomie des Pferdes samt anschließender Krankheitslehre umfassenden Arbeit dar,4.deren übrige Teile vermutlich von Carlo Ruini und dessen Neffen Orazio Francini umgestaltet und im Jahre 1598 zu Bologna in Druck gegeben

Richard Schmutzer

1943-01-01

75

Educating in the design and construction of built environments accessible to disabled people: the Leonardo da Vinci AWARD project  

Microsoft Academic Search

An interdisciplinary partnership within an European Leonardo da Vinci project has developed a new approach aimed at educating\\u000a secondary school students in the creation of built environments accessible to disabled people and at sensitizing them towards\\u000a the inclusion of people with disabilities in all realms of social life. The AWARD (Accessible World for All Respecting Differences)\\u000a project is based on

Antonio Frattari; Michela Dalprŕ; Fabio Bernardi

76

Maintenance mechanisms of the pipe model relationship and Leonardo da Vinci's rule in the branching architecture of Acer rufinerve trees.  

PubMed

The pipe model relationship (constancy of branch cross-sectional area/leaf area) and Leonardo da Vinci's rule (equality of total cross-sectional area of the daughter branches and cross-sectional area of their mother branch) are empirical rules of tree branching. Effects of branch manipulation on the pipe model relationships were examined using five Acer rufinerve trees. Half the branches in each tree were untreated (control branches, CBs), and, for the others (manipulated branches, MBs), either light intensity or leaf area (both relating to photosynthetic source activity), or shoot elongation (source + sink activities), was reduced, and responses of the pipe model relationships were followed for 2 years. The pipe model relationship in MBs changed by suppression of source activity, but not by simultaneous suppression of source + sink activities. The manipulations also affected CBs in the year of manipulation and both branches in the next year. The branch diameter growth was most affected by light, followed by shoot elongation and leaf area, in that order. Because of the decussate phyllotaxis of A. rufinerve, one branching node can potentially have one main and two lateral branches. Analysis of 295 branching nodes from 13 untreated trees revealed that the da Vinci's rule held in branching nodes having one shed branch but not in the nodes without branch shedding, indicating the necessity of natural shedding of branches for da Vinci's rule to hold. These analyses highlight the importance of the source-sink balance and branch shedding in maintenance of these empirical rules. PMID:18690411

Sone, Kosei; Suzuki, Alata Antonio; Miyazawa, Shin-Ichi; Noguchi, Ko; Terashima, Ichiro

2009-01-01

77

Realization of a single image haze removal system based on DaVinci DM6467T processor  

NASA Astrophysics Data System (ADS)

Video monitoring system (VMS) has been extensively applied in domains of target recognition, traffic management, remote sensing, auto navigation and national defence. However the VMS has a strong dependence on the weather, for instance, in foggy weather, the quality of images received by the VMS are distinct degraded and the effective range of VMS is also decreased. All in all, the VMS performs terribly in bad weather. Thus the research of fog degraded images enhancement has very high theoretical and practical application value. A design scheme of a fog degraded images enhancement system based on the TI DaVinci processor is presented in this paper. The main function of the referred system is to extract and digital cameras capture images and execute image enhancement processing to obtain a clear image. The processor used in this system is the dual core TI DaVinci DM6467T - ARM@500MHz+DSP@1GH. A MontaVista Linux operating system is running on the ARM subsystem which handles I/O and application processing. The DSP handles signal processing and the results are available to the ARM subsystem in shared memory.The system benefits from the DaVinci processor so that, with lower power cost and smaller volume, it provides the equivalent image processing capability of a X86 computer. The outcome shows that the system in this paper can process images at 25 frames per second on D1 resolution.

Liu, Zhuang

2014-10-01

78

Leonardo da Vinci's "A skull sectioned": skull and dental formula revisited.  

PubMed

What can be learned from historical anatomical drawings and how to incorporate these drawings into anatomical teaching? The drawing "A skull sectioned" (RL 19058v) by Leonardo da Vinci (1452-1519), hides more detailed information than reported earlier. A well-chosen section cut explores sectioned paranasal sinuses and ductus nasolacrimalis. A dissected lateral wall of the maxilla is also present. Furthermore, at the level of the foramen mentale, the drawing displays compact and spongious bony components, together with a cross-section through the foramen mentale and its connection with the canalis mandibulae. Leonardo was the first to describe a correct dental formula (6424) and made efforts to place this formula above the related dental elements. However, taking into account, the morphological features of the individual elements of the maxilla, it can be suggested that Leonardo sketched a "peculiar dental element" on the position of the right maxillary premolar in the dental sketch. The fact that the author did not make any comment on that special element is remarkable. Leonardo could have had sufficient knowledge of the precise morphology of maxillary and mandibular premolars, since the author depicted these elements in the dissected skull. The fact that the author also had access to premolars in situ corroborates our suggestion that "something went wrong" in this part of the drawing. The present study shows that historical anatomical drawings are very useful for interactive learning of detailed anatomy for students in medicine and dentistry. PMID:22431331

Gerrits, Peter O; Veening, Jan G

2013-05-01

79

[Anesthetic management for robot assisted off-pump construction of composite graft using the da Vinci surgical system].  

PubMed

Robot-assisted minimally invasive surgery has become common in recent years. We used the da Vinci surgical system and managed anesthesia in 6 cases of bilateral internal mammary artery dissection and construction of a composite graft using the radial artery. To ensure vision inside the thoracic cavity, endoscopic robotic surgery employs the inflation of the thoracic cavity with carbon dioxide, producing a pneumothorax and turning the thoracic cavity into a positive pressure chamber. Thus, marked acidosis and circulatory changes manifest during anesthetic management. Although robotic surgery is considered "minimally invasive, such surgery involves a number of problems in terms of anesthetic management, and these problems must be examined. PMID:20169956

Takanashi, Yoko; Hamano, Hiroko; Miyata, Kazuto; Matsumoto, Shouhei; Isshiki, Atushi

2010-02-01

80

Het wezen van de schilderkunst volgens Leonardo da Vinci : over de verhouding tussen kunsttheorie en de praktijk van de schilder in de Renaissance  

Microsoft Academic Search

Op 19 oktober houdt prof. dr. Michael Kwakkelstein zijn oratie aan de Universiteit Utrecht over de verhouding tussen kunsttheorie en -praktijk bij Leonardo da Vinci. Kwakkelstein stelt dat Leonardo’s schilderkunst niet altijd beantwoordt aan de criteria voor goede schilderkunst die de grote Renaissance-kunstenaar zelf heeft geformuleerd. In de 'Mona Lisa' liet Leonardo theorie en praktijk echter op ultieme wijze samenvallen.

M. W. Kwakkelstein

2011-01-01

81

SELF GUIDED SELF-ASSESSMENT AND IMPROVEMENT OF VOCATIONAL AND CAREER COUNSELLING SKILLS: NEW STANDARDS AND TOOLS FOR COUNSELLORS DEVELOPED IN THE LEONARDO DA VINCI PROJECT MEVOC  

Microsoft Academic Search

The aim of the Leonardo da Vinci project MEVOC2 is to develop an international quality assurance programme for vocational and career counsellors. The project products include international competence standards for vocational and career counsellors, a self-assessment tool to be used by vocational and career counsellors in order to evaluate the quality of their counselling skills and competences, and a database

JULIA ZDRAHAL-URBANEK; MONIKA THUM-KRAFT

82

Realization and optimization of AES algorithm on the TMS320DM6446 based on DaVinci technology  

NASA Astrophysics Data System (ADS)

The application of AES algorithm in the digital cinema system avoids video data to be illegal theft or malicious tampering, and solves its security problems. At the same time, in order to meet the requirements of the real-time, scene and transparent encryption of high-speed data streams of audio and video in the information security field, through the in-depth analysis of AES algorithm principle, based on the hardware platform of TMS320DM6446, with the software framework structure of DaVinci, this paper proposes the specific realization methods of AES algorithm in digital video system and its optimization solutions. The test results show digital movies encrypted by AES128 can not play normally, which ensures the security of digital movies. Through the comparison of the performance of AES128 algorithm before optimization and after, the correctness and validity of improved algorithm is verified.

Jia, Wen-bin; Xiao, Fu-hai

2013-03-01

83

The oldest anatomical handmade skull of the world c. 1508: 'the ugliness of growing old' attributed to Leonardo da Vinci.  

PubMed

The author discusses a previously unknown early sixteenth-century renaissance handmade anatomical miniature skull. The small, naturalistic skull made from an agate (calcedonia) stone mixture (mistioni) shows remarkable osteologic details. Dr. Saban was the first to link the skull to Leonardo. The three-dimensional perspective of and the search for the senso comune are discussed. Anatomical errors both in the drawings of Leonardo and this skull are presented. The article ends with the issue of physiognomy, his grotesque faces, the Perspective Communis and his experimenting c. 1508 with the stone mixture and the human skull. Evidence, including the Italian scale based on Crazie and Braccia, chemical analysis leading to a mine in Volterra and Leonardo's search for the soul in the skull are presented. Written references in the inventory of Salai (1524), the inventory of the Villa Riposo (Raffaello Borghini 1584) and Don Ambrogio Mazenta (1635) are reviewed. The author attributes the skull c. 1508 to Leonardo da Vinci. PMID:24853982

Missinne, Stefaan J

2014-06-01

84

How did Leonardo perceive himself? Metric iconography of da Vinci's self-portraits  

NASA Astrophysics Data System (ADS)

Some eighteen portraits are now recognized of Leonardo in old age, consolidating the impression from his bestestablished self-portrait of an old man with long white hair and beard. However, his appearance when younger is generally regarded as unknown, although he was described as very beautiful as a youth. Application of the principles of metric iconography, the study of the quantitative analysis of the painted images, provides an avenue for the identification of other portraits that may be proposed as valid portraits of Leonardo during various stages of his life, by himself and by his contemporaries. Overall, this approach identifies portraits of Leonardo by Verrocchio, Raphael, Botticelli, and others. Beyond this physiognomic analysis, Leonardo's first known drawing provides further insight into his core motivations. Topographic considerations make clear that the drawing is of the hills behind Vinci with a view overlooking the rocky promontory of the town and the plain stretching out before it. The outcroppings in the foreground bear a striking resemblance to those of his unique composition, 'The Virgin of the Rocks', suggesting a deep childhood appreciation of this wild terrain. and an identification with that religious man of the mountains, John the Baptist, who was also the topic of Leonardo's last known painting. Following this trail leads to a line of possible selfportraits continuing the age-regression concept back to a self view at about two years of age.

Tyler, Christopher W.

2010-02-01

85

2D and 3D optical diagnostic techniques applied to Madonna dei Fusi by Leonardo da Vinci  

NASA Astrophysics Data System (ADS)

3D measurement and modelling have been traditionally applied to statues, buildings, archeological sites or similar large structures, but rarely to paintings. Recently, however, 3D measurements have been performed successfully also on easel paintings, allowing to detect and document the painting's surface. We used 3D models to integrate the results of various 2D imaging techniques on a common reference frame. These applications show how the 3D shape information, complemented with 2D colour maps as well as with other types of sensory data, provide the most interesting information. The 3D data acquisition was carried out by means of two devices: a high-resolution laser micro-profilometer, composed of a commercial distance meter mounted on a scanning device, and a laser-line scanner. The 2D data acquisitions were carried out using a scanning device for simultaneous RGB colour imaging and IR reflectography, and a UV fluorescence multispectral image acquisition system. We present here the results of the techniques described, applied to the analysis of an important painting of the Italian Reinassance: `Madonna dei Fusi', attributed to Leonardo da Vinci.

Fontana, R.; Gambino, M. C.; Greco, M.; Marras, L.; Materazzi, M.; Pampaloni, E.; Pelagotti, A.; Pezzati, L.; Poggi, P.; Sanapo, C.

2005-06-01

86

Michelangelo in Florence, Leonardo in Vinci.  

ERIC Educational Resources Information Center

Provides background information on the lives and works of Michelangelo and Leonardo da Vinci. Focuses on the artwork of the artists and the museums where their work is displayed. Includes museum photographs of their work. (CMK)

Herberholz, Barbara

2003-01-01

87

Peri-operative comparison between daVinci-assisted radical prostatectomy and open radical prostatectomy in obese patients  

NASA Astrophysics Data System (ADS)

Introduction: While the effects of increasing body mass index on prostate cancer epidemiology and surgical approach have recently been studied, its effects on surgical outcomes are less clear. We studied the perioperative outcomes of obese (BMI >= 30) men treated with daVinci-assisted laparoscopic radical prostatectomy (DLP) and compared them to those treated with open radical retropubic prostatectomy (RRP) in a contemporary time frame. Method: After Institutional Review Board approval, we used the Mayo Clinic Radical Prostatectomy database to identify patients who had undergone DLP by a single surgeon and those who had undergone open RRP by a single surgeon between December 2002 and March 2005. Baseline demographics, peri- and post-operative courses, and complications were collected by retrospective chart review, and variables from the two cohorts compared using chi-square method and least-squares method of linear regression where appropriate. Results: 59 patients who had DLP and 76 undergoing RRP were available for study. Baseline demographics were not statistically different between the two cohorts. Although DLP had a significantly lower clinical stage than RRP (p=0.02), pathological stage was not statistically different (p=0.10). Transfusion rates, hospital stay, overall complications, and pathological Gleason were also not significantly different, nor were PSA progression, positive margin rate, or continence at 1 year. After bilateral nerve-sparing, erections suitable for intercourse with or without therapy at 1 year was 88.5% (23/26) for DLP and 61.2% (30/49) for RRP (p=0.01). Follow-up time was similar. Conclusion: For obese patients, DLP appears to have similar perioperative, as well as short-term oncologic and functional outcomes when compared to open RRP.

Le, Carter Q.; Ho, Khai-Linh V.; Slezak, Jeffrey M.; Blute, Michael L.; Gettman, Matthew T.

2007-02-01

88

Integrating Leonardo da Vinci's principles of demonstration, uncertainty, and cultivation in contemporary nursing education.  

PubMed

Nurses today are facing an ever changing health care system. Stimulated by health care reform and limited resources, nursing education is being challenged to prepare nurses for this uncertain environment. Looking to the past can offer possible solutions to the issues nursing education is confronting. Seven principles of da Vincian thinking have been identified (Gelb, 2004). As a follow-up to an exploration of the curiositŕ principle (Butts & Story, 2013), this article will explore the three principles of dimostrazione, sfumato, and corporalita. Nursing faculty can set the stage for a meaningful educational experience through these principles of demonstration (dimostrazione), uncertainty (sfumato), and cultivation (corporalita). Preparing nurses not only to manage but also to flourish in the current health care environment that will enhance the nurse's and patient's experience. PMID:23830068

Story, Lachel; Butts, Janie

2014-03-01

89

Appropriate set-up of the da Vinci Surgical System in relation to the location of anterior and middle mediastinal tumors.  

PubMed

The da Vinci® Surgical System (dV) and its later version [da Vinci S® Surgical System (dVS)] have been used only in very few cases in selected thoracic surgical areas in Japan. Recently, we used the dV and dVS for various types of anterior and middle mediastinal tumors in clinical practice. We report our experience, and review the settings which depended on tumor location. Six patients gave written informed consent to undergo robotic surgery using the dV or dVS. We evaluated the feasibility, safety and appropriate settings of this system for the surgical treatment of mediastinal tumors. Tumor dissection was performed by two specialists in thoracic surgery certified to use the dV and dVS, and another specialist who acted as an assistant. We were able to access difficult-to-reach areas like the mediastinum. All the resected tumors were classified as benign tumors histologically. Crucial to the success of these operations was the set-up of the dV, which varied according to the location of mediastinal tumors. Robotic surgery enables various types of mediastinal tumor dissection more safely and easily than conventional video-assisted thoracoscopic surgery (VATS). The dV requires the appropriate set-up configuration, which varies according to the location of the mediastinal tumor. PMID:21081552

Kajiwara, Naohiro; Kakihana, Masatoshi; Kawate, Norihiko; Ikeda, Norihiko

2011-02-01

90

Placement of {sup 125}I implants with the da Vinci robotic system after video-assisted thoracoscopic wedge resection: A feasibility study  

SciTech Connect

Purpose: To evaluate the feasibility of using the da Vinci robotic system for radioactive seed placement in the wedge resection margin of pigs' lungs. Methods and materials: Video-assisted thoracoscopic wedge resection was performed in the upper and lower lobes in pigs. Dummy {sup 125}I seeds embedded in absorbable sutures were sewn into the resection margin with the aid of the da Vinci robotic system without complications. In the 'loop technique,' the seeds were placed in a cylindrical pattern; in the 'longitudinal,' they were above and lateral to the resection margin. Orthogonal radiographs were taken in the operating room. For dose calculation, Variseed 66.7 (Build 11312) software was used. Results: With looping seed placement, in the coronal view, the dose at 1 cm from the source was 97.0 Gy; in the lateral view it was 107.3 Gy. For longitudinal seed placement, the numbers were 89.5 Gy and 70.0 Gy, respectively. Conclusion: Robotic technology allows direct placement of radioactive seeds into the resection margin by endoscopic surgery. It overcomes the technical difficulties of manipulating in the narrow chest cavity. With the advent of robotic technology, new options in the treatment of lung cancer, as well as other malignant tumors, will become available.

Pisch, Julianna [Department of Radiation Oncology and Physics, Beth Israel and St. Luke's-Roosevelt Medical Center, New York, NY (United States)]. E-mail: jpisch@bethisraelny.org; Belsley, Scott J. [Department of Thoracic Surgery, Beth Israel and St. Luke's-Roosevelt Medical Center, New York, NY (United States); Ashton, Robert [Department of Thoracic Surgery, Beth Israel and St. Luke's-Roosevelt Medical Center, New York, NY (United States); Wang Lin [Department of Radiation Oncology and Physics, Beth Israel and St. Luke's-Roosevelt Medical Center, New York, NY (United States); Woode, Rudolph [Department of Radiation Oncology and Physics, Beth Israel and St. Luke's-Roosevelt Medical Center, New York, NY (United States); Connery, Cliff [Department of Thoracic Surgery, Beth Israel and St. Luke's-Roosevelt Medical Center, New York, NY (United States)

2004-11-01

91

Elastography Using Multi-Stream GPU: An Application to Online Tracked Ultrasound Elastography, In-Vivo and the da Vinci Surgical System  

PubMed Central

A system for real-time ultrasound (US) elastography will advance interventions for the diagnosis and treatment of cancer by advancing methods such as thermal monitoring of tissue ablation. A multi-stream graphics processing unit (GPU) based accelerated normalized cross-correlation (NCC) elastography, with a maximum frame rate of 78 frames per second, is presented in this paper. A study of NCC window size is undertaken to determine the effect on frame rate and the quality of output elastography images. This paper also presents a novel system for Online Tracked Ultrasound Elastography (O-TRuE), which extends prior work on an offline method. By tracking the US probe with an electromagnetic (EM) tracker, the system selects in-plane radio frequency (RF) data frames for generating high quality elastograms. A novel method for evaluating the quality of an elastography output stream is presented, suggesting that O-TRuE generates more stable elastograms than generated by untracked, free-hand palpation. Since EM tracking cannot be used in all systems, an integration of real-time elastography and the da Vinci Surgical System is presented and evaluated for elastography stream quality based on our metric. The da Vinci surgical robot is outfitted with a laparoscopic US probe, and palpation motions are autonomously generated by customized software. It is found that a stable output stream can be achieved, which is affected by both the frequency and amplitude of palpation. The GPU framework is validated using data from in-vivo pig liver ablation; the generated elastography images identify the ablated region, outlined more clearly than in the corresponding B-mode US images. PMID:25541954

Deshmukh, Nishikant P.; Kang, Hyun Jae; Billings, Seth D.; Taylor, Russell H.; Hager, Gregory D.; Boctor, Emad M.

2014-01-01

92

Da vinci coding? Using renaissance artists' depictions of the brain to engage student interest in neuroanatomy.  

PubMed

This report describes a pair of brief, interactive classroom exercises utilizing Renaissance artists' depictions of the brain to help increase student interest in learning basic neuroanatomy. Undergraduate students provided anonymous quantitative evaluations of both exercises. The feedback data suggest that students found both exercises engaging. The data also suggest that the first exercise increased student interest in learning more about neuroanatomy in general, while the second provided useful practice in identifying major neuroanatomical structures. Overall, the data suggest that these exercises may be a useful addition to courses that introduce or review neuroanatomical concepts. PMID:23805058

Watson, Todd D

2013-01-01

93

Feasibility of an endoscopic approach to the axillary nerve and the nerve to the long head of the triceps brachii with the help of the Da Vinci Robot.  

PubMed

Surgery to transfer the axillary nerve and the nerve of the long head of the triceps presents two obstacles: 1) the access portals are not standardized and 2) the nerves are for their larger part approached through large incisions. The goal of this study was to explore the feasibility of an endoscopic microsurgical approach. The posterior aspect of a cadaver shoulder was approached through three communicating mini-incisions. The Da Vinci robot camera was installed on a central trocart, and the instrument arms on the adjacent trocarts. A gas insufflation distended the soft tissues up to the lateral axillary space. The branches of the axillary nerve and the nerve to the long head of the triceps brachii muscle were identified. The dissection of the axillary nerve trunk and its branches was easy. The posterior humeral circumflex veins and artery were dissected as well without any difficulty. Finding the nerve to the long head of the triceps brachii was found to be more challenging because of its deeper location. Robots properties allow performing conventional microsurgery: elimination of the physiologic tremor and multiplication of the movements. They also facilitate the endoscopic approach of the peripheral nerves, as seen in our results on the terminal branches of the axillary nerve and the nerve to the long head of the triceps brachii. PMID:23867724

Porto de Melo, P M; Garcia, J C; Montero, E F de Souza; Atik, T; Robert, E-G; Facca, S; Liverneaux, P-A

2013-09-01

94

A second Leonardo da Vinci?  

Microsoft Academic Search

We describe a young woman who suddenly began mirror writing with her right hand and has not reverted to normal writing for more than 6 years, although she writes normally with her left hand. She is ambidextrous, although she had previously used only her right hand for writing and drawing. Since it is much easier for her to use right-handed

Mitsuko Nakano; Toshitaka Endo; Shigeki Tanaka

2003-01-01

95

Reforming Upper Secondary Education in Europe. The Leonardo da Vinci Project Post-16 Strategies. Surveys of Strategies for Post-16 Education To Improve the Parity of Esteem for Initial Vocational Education in Eight European Educational Systems. Theory into Practice 92. Institute for Educational Research Publication Series B.  

ERIC Educational Resources Information Center

This book contains the following papers on the Leonardo da Vinci project: "Looking for Post-16 Education Strategies for Parity of Esteem in Europe" (Lasonen); "Improving Parity of Esteem as a Policy Goal" (Makinen, Volanen); "Alternative Strategies for Parity of Esteem between General/Academic and Vocational Education in Europe" (Kamarainen);…

Lasonen, Johanna, Ed.

96

What Is the Moral Imperative of Workplace Learning: Unlocking the DaVinci Code of Human Resource Development?  

ERIC Educational Resources Information Center

In the course of the author's doctoral study, he is exploring the strategic linkages between learning activities in the modern workplace and the long-term success they bring to organisations. For many years, this challenge has been the Holy Grail of human resource (HR) development practitioners, who invest heavily on training and professional…

Short, Tom

2006-01-01

97

VINCI: the VLT Interferometer commissioning instrument  

NASA Astrophysics Data System (ADS)

The Very Large Telescope Interferometer (VLTI) is a complex system, made of a large number of separated elements. To prepare an early successful operation, it will require a period of extensive testing and verification to ensure that the many devices involved work properly together, and can produce meaningful data. This paper describes the concept chosen for the VLTI commissioning instrument, LEONARDO da VINCI, and details its functionalities. It is a fiber based two-way beam combiner, associated with an artificial star and an alignment verification unit. The technical commissioning of the VLTI is foreseen as a stepwise process: fringes will first be obtained with the commissioning instrument in an autonomous mode (no other parts of the VLTI involved); then the VLTI telescopes and optical trains will be tested in autocollimation; finally fringes will be observed on the sky.

Kervella, Pierre; Coudé du Foresto, Vincent; Glindemann, Andreas; Hofmann, Reiner

2000-07-01

98

La perspective arienne de Lonard de Vinci et ses origines dans l'optique d'Ibn al-Haytham (De aspectibus, III, 7)  

E-print Network

for the first time by Leonardo da Vinci (1452- 1519). This article studies its dependence on Ptolemy's Optica Léonard de Vinci (1452-1519). L'article étu- die sa dépendance vis-à-vis de l'Optique de Ptolémée et perspective aérienne Léonard de Vinci (1452-1519) est tenu pour l'inventeur de la « perspective aérienne

Paris-Sud XI, Université de

99

ciclo di conferenze organizzato da Politecnico di Milano,  

E-print Network

'Informazione, Corso di laurea in Ingegneria delle Telecomunicazioni, Liceo Scientifico Statale Leonardo da Vinci al di'Informazione Politecnico di Milano 02.2399.9714 quintafacolta@polimi.it Liceo Scientifico Statale Leonardo da Vinci Centro dello spazio, al di lĂ  del tempo Liceo Scientifico Statale Leonardo da Vinci Centro Congressi

100

Tourism. Leonardo da Vinci Series: Good Practices.  

ERIC Educational Resources Information Center

This brochure, part of a series about good practices in vocational training in the European Union, describes 10 projects that have promoted investment in human resources through training in the tourism sector to promote sustainable, or responsible, tourism. The projects and their countries of origin are as follows: (1) BEEFT, training of mobility…

Commission of the European Communities, Brussels (Belgium). Directorate-General for Education and Culture.

101

www.deepsummeracademy.com Da Vinci Engineering  

E-print Network

diverse pre- university programs in North America. We offer 40 engineering, science, applied science Change the World A World of Water Solar Energy Materials & Cells Sustainable Transportation Engineering

Sislian, J. P.

102

NOTE PER RICHIESTA DUPLICATO PERGAMENA 1. Compilare la domanda di rilascio duplicato pergamena con marca da bollo di  

E-print Network

Sviluppo e Rapporti con le Imprese ­ Servizio Offerta Formativa Post Laurea ­ Piazza Leonardo da Vinci, 32 Offerta Formativa Post Laurea in Piazza Leonardo da Vinci, 32 ­ Padiglione Nord ­ 1° piano ­ Milano Ritiro titolare presso il Servizio Offerta Formativa e Post Laurea in Piazza Leonardo da Vinci, 32 ­ Padiglione

103

DA CONSEGNARE A MANO O SPEDIRE PER POSTA A SERVIZIO OFFERTA FORMATIVA POST LAUREA-POLITECNICO DI MILANO CAMPUS LEONARDO EDIFICO 2 PIAZZA  

E-print Network

MILANO ­ CAMPUS LEONARDO ­ EDIFICO 2 ­ PIAZZA LEONARDO DA VINCI, 32 ­ 20133 MILANO - ITALY Marca da bollo Formativa Post Laurea ­ Campus Leonardo ­ Piazza Leonardo da Vinci, 32 ­ Padiglione Nord ­ Edificio 2 diDA CONSEGNARE A MANO O SPEDIRE PER POSTA A SERVIZIO OFFERTA FORMATIVA POST LAUREA- POLITECNICO DI

104

Distance Learning. Leonardo da Vinci Series: Good Practices.  

ERIC Educational Resources Information Center

This brochure, part of a series about good practices in vocational training in the European Union, describes 12 projects that use distance learning to promote lifelong learning in adults. The projects and their countries of origin are as follows: (1) 3D Project, training in the use of IT tools for 3D simulation and animation and practical…

Commission of the European Communities, Brussels (Belgium). Directorate-General for Education and Culture.

105

The PAKY, HERMES, AESOP, ZEUS, and da Vinci robotic systems.  

PubMed

In 1965 Gordon Moore, cofounder of Intel Corporation, made his famous observation now known as Moore's law. He predicted that computing capacity will double every 18 to 24 months. Since then, Moore's law has held true; the number of transistors per integrated computer circuit has doubled every couple of years. This relentless advance in computer technology ensures future advances in robotic technology. The ultimate goal of robotics is to allow surgeons to perform difficult procedures with a level of precision and improved clinical outcomes not possible by conventional methods. Robotics has the potential to enable surgeons with various levels of surgical skill to achieve a uniform outcome. As long as urologists continue to embrace technological advances and incorporate beneficial technology into their practice, the outlook for patients remains bright. PMID:15474593

Kim, Hyung L; Schulam, Peter

2004-11-01

106

Leonardo da Vinci's (1452-1519) urologisch-anatomische Zeichnungen  

Microsoft Academic Search

Zum Thema Der wesentliche Wandel in der zeichnerischen Wiedergabe urologisch-anatomischer Strukturen wird erstmals im Zeitalter der Renaissance sichtbar. In dieser Periode wurde durch das Zusammenwirken von Künstlern und Ärzten insbesondere bei letzteren der Wunsch rege, auch die inneren Organe des Menschen realistisch abzubilden. Dies war ohne künstlerische Unterstützung nicht möglich, es sei denn, der Anatom war außerdem zeichnerisch außerordentlich begabt.

H. Dietrich

1997-01-01

107

Scientific Aspects of Leonardo da Vinci's Drawings: An Interdisciplinary Model.  

ERIC Educational Resources Information Center

While interdisciplinary courses can help demonstrate the relevance of learning to students and reinforce education from different fields, they can be difficult to implement and are often not cost effective. An interdisciplinary art history course at Ohio's Sinclair Community College incorporates science into the art history curriculum, making use…

Struthers, Sally A.

108

Interferometric observations of ? Carinae with VINCI/VLTI  

NASA Astrophysics Data System (ADS)

Context: The bright star ? Carinae is the most massive and luminous star in our region of the Milky Way. Though it has been extensively studied using many different techniques, its physical nature and the mechanism that led to the creation of the Homunculus nebula are still debated. Aims: We aimed at resolving the central engine of the ? Carinae complex in the near-infrared on angular scales of a few milliarcseconds. Methods: We used the VINCI instrument of the VLTI to recombine coherently the light from two telescopes in the K band. Results: We report a total of 142 visibility measurements of ? Car, part of which were analyzed by Van Boekel et al. (2003, A&A, 410, L37). These observations were carried out on projected baselines ranging from 8 to 112 m in length, using either two 0.35 m siderostats or two 8-m Unit Telescopes. These observations cover the November 2001-January 2004 period. Conclusions: .The reported visibility data are in satisfactory agreement with the recent results obtained with AMBER/VLTI by Weigelt et al. (2006), asuming that the flux of ? Car encircled within 70 mas reaches 56% of the total flux within 1400 mas, in the K band. We also confirm that the squared visibility curve of ? Car as a function of spatial frequency follows closely an exponential model. Table 1 is only available in electronic form at http://www.aanda.org

Kervella, P.

2007-03-01

109

code  

Microsoft Academic Search

\\u000a Numeric value assigned to textual data; e.g. for diagnoses: SNOMED (of the College of American Pathologists), ICD-9 c., ICD-10 c., read clinical classification for diagnoses, signs, symptoms and history; for adverse events: who-adverse reaction terminology\\/who-adverse reaction dictionary or FDA’s COSTART (Coding System for a Thesaurus of Adverse Reaction Terms); for coding medications or treatments resp.: who-drug Dictionary and drug reference

Gerhard Nahler

110

Building Skills and Qualifications among SME Employees. Leonardo da Vinci Good Practices Series.  

ERIC Educational Resources Information Center

This document profiles 10 European programs that exemplify good practice in building skills and qualifications among employees of small and medium enterprises (SMEs). The programs profiled are as follows: (1) TRICTSME (a program providing World Wide Web-based information and communication technologies training for SMEs in manufacturing); (2)…

Commission of the European Communities, Brussels (Belgium). Directorate-General for Education and Culture.

111

Social and Occupational Integration of Disadvantaged People. Leonardo da Vinci Good Practices Series.  

ERIC Educational Resources Information Center

This document profiles nine European programs that exemplify good practice in social and occupational integration of disadvantaged people. The programs profiled are as follows: (1) Restaurant Venezia (a CD-ROM program to improve the reading and writing skills of young people in Luxembourg who have learning difficulties); (2) an integrated…

Commission of the European Communities, Brussels (Belgium). Directorate-General for Education and Culture.

112

Moving towards Optimising Demand-Led Learning: The 2005-2007 ECUANET Leonardo Da Vinci Project  

ERIC Educational Resources Information Center

Purpose: The purpose of this paper is to present the key project learning points and outcomes as a guideline for the future quality management of demand-led learning and development. Design/methodology/approach: The research methodology was based upon a corporate university blueprint architecture and browser toolkit developed by a member of the…

Dealtry, Richard; Howard, Keith

2008-01-01

113

Leonardo da Vinci, 1452-1519 Perhaps the smartest person ever  

E-print Network

, folio 76 v. Biblioteca Ambrosiana di Milano) #12;Galileo Galilei (Pisa, 1564 - Arcetri, 1642): Discorsi of falling bodies, a law deduced by Galileo's experiments and enunciated by Torricelli in 1642. constant 2 1

Ballarini, Roberto

114

Back to the Drawing Board Reconstructing DaVinci's Vitruvian Man to Teach Anatomy  

ERIC Educational Resources Information Center

In today's high tech world, one hardly expects to see the original chalkboard or blackboard utilized in research, teaching, or scientific communication, but having spent an equal number of years doing both art and biology and dabbling in computer graphics, the author has found the simple technology of the chalkboard and chalk to have incredible…

Babaian, C.

2009-01-01

115

A Contribution to the History of Cam Mechanisms – From Leonardo da Vinci Till Today  

Microsoft Academic Search

Cams and cam mechanisms are widely spread in mechanical engineering design, mostly to transform uniform rotary motion into\\u000a non-uniform rotary motion or into linear motion. Sometimes cams and cam mechanisms are coupled with linkages, thus giving\\u000a a broader variety of output motions and applications. From the historical point of view it is possible to derive cam mechanisms\\u000a from some of

Hanfried Kerle; Klaus Mauersberger

116

Da Leonardo da Vinci alla nanotribologia: storia delle ricerche e delle teorie sui fenomeni d'attrito  

Microsoft Academic Search

The most important topics and results of research on friction, from antiquity to now, are outlined: the early laws and theories, from Leonardo to Amontons and Coulomb; the theory of lubrication and the models of rolling friction from 1840 to 1930; the theories of wear, the synthesis of Bowden and Tabor and the birth of tribology; the recent developments, friction

Ugo Besson

117

chaoTIc : (ka tik) adj. 1. in a state of chaos;  

E-print Network

than $300 million to create the hits "X-Men: The Last Stand" and "The Da Vinci Code" visionaries? Were's hopes for black ink are decided by the gods of movie fortune--namely, you and me. Americans may heads, they see "X-Men"; if the coin lands tails, it's "The Da Vinci Code." Since the coin has an equal

Koch, Christof

118

List of codes Language abbreviation codes  

E-print Network

EDU.3 Secondary school (general/vocational) EDU.4 Higher education institution EDU.5 AdultList of codes Language abbreviation codes DA Danish GR Greek DE German IT Italian EN English NL or continuing education provider ASS.1 Non-profit association (regional / national) ASS.2 Non-profit association

119

Process to generate a synthetic diagnostic for microwave imaging reflectometry with the full-wave code FWR2Da)  

NASA Astrophysics Data System (ADS)

A synthetic microwave imaging reflectometer (MIR) diagnostic employing the full-wave reflectometer code (FWR2D) has been developed and is currently being used to guide the design of real systems, such as the one recently installed on DIII-D. The FWR2D code utilizes real plasma profiles as input, and it is combined with optical simulation tools for synthetic diagnostic signal generation. A detailed discussion of FWR2D and the process to generate the synthetic signal are presented in this paper. The synthetic signal is also compared to a prescribed density fluctuation spectrum to quantify the imaging quality. An example is presented with H-mode-like plasma profiles derived from a DIII-D discharge, where the MIR focal is located in the pedestal region. It is shown that MIR is suitable for diagnosing fluctuations with poloidal wavenumber up to 2.0 cm-1 and fluctuation amplitudes less than 5%.

Ren, X.; Domier, C. W.; Kramer, G.; Luhmann, N. C.; Muscatello, C. M.; Shi, L.; Tobias, B. J.; Valeo, E.

2014-11-01

120

Spectral imaging of Leonardo Da Vinci's Mona Lisa: An authentic smile at 1523 dpi with additional infrared data  

Microsoft Academic Search

Two photos of the famous Mona Lisa were taken in October 2004 to contribute towards improving the technical and scientific data of the masterpiece before moving it in April 2005. The capabilities of the multispectral system developed by the LUMIERE TECHNOLOGY Company within the scope of the European CRISATEL project have made it possible to achieve optimal spatial resolution on

P. Cotte; D. Dupraz

121

Non-contact intrawall penetrating radar for heritage survey: the search of the ‘Battle of Anghiari’ by Leonardo da Vinci  

Microsoft Academic Search

In this paper a high-frequency large-bandwidth synthetic aperture penetrating radar intended for the inspection of masonry walls, and its application to intrawall investigation of an important Heritage structure in Florence, Italy, are described. The radar system has been conceived and designed for non-contact operation, in particular for allowing walls covered by paintings to be inspected avoiding damages to the surface

M. Pieraccini; D. Mecatti; G. Luzia; M. Seracini; G. Pinelli; C. Atzeni

2005-01-01

122

The Mother Relationship and Artistic Inhibition in the Lives of Leonardo da Vinci and Erik H. Erikson  

Microsoft Academic Search

In four earlier articles, I focused on the theme of the relationship of melancholia and the mother, and suggested that the\\u000a melancholic self may experience humor (Capps, 2007a), play (Capps, 2008a), dreams (Capps, 2007c), and art (Capps, 2008b) as restorative resources. I argued that Erik H. Erikson found these resources to be valuable remedies for his own melancholic\\u000a condition, which

Donald Capps

2008-01-01

123

2D and 3D optical diagnostic techniques applied to Madonna dei Fusi by Leonardo da Vinci  

Microsoft Academic Search

3D measurement and modelling have been traditionally applied to statues, buildings, archeological sites or similar large structures, but rarely to paintings. Recently, however, 3D measurements have been performed successfully also on easel paintings, allowing to detect and document the painting's surface. We used 3D models to integrate the results of various 2D imaging techniques on a common reference frame. These

R. Fontana; M. C. Gambino; M. Greco; L. Marras; M. Materazzi; E. Pampaloni; A. Pelagotti; L. Pezzati; P. Poggi; C. Sanapo

2005-01-01

124

Duality: Windows to the Mathematical World Ingrid Rewitzky  

E-print Network

;Leonardo da Vinci's perspective Perspective is nothing else than seeing a place or objects behind a plane. Leonardo da Vinci Leonardo da Vinci's window #12;When you think of computer cables, ... mental picture

Breuer, Florian

125

Politecnico di Milano Dipartimento di Architettura e Pianificazione Graduate School in Architectural and Landscape Heritage P.za Leonardo da Vinci, 32, Milano  

E-print Network

OF ENVIRONMENTAL ARCHITECTURE FROM 16TH TO 19TH CENTURY Dean Hawkes, Emeritus Professor, Cardiff University centuryfrom 16th to 19th centuryfrom 16th to 19th century Dean Hawkes This paper explores the relationship in British architecture from the end of the 16th century to the end of the 19th century. The account begins

126

Page 1Classroom Visit Pre/Post Materials1 C L A S S R O O M V I S I T  

E-print Network

that the angle of incidence will equal the angle of reflection. Leonardo Da Vinci: Leonardo da Vinci (1452-1519 that included diagrams of his scientific and mechanical projects. Da Vinci wrote in Italian using a special kind something intended for other people to read did he write left to right. Contemporaries of da Vinci recorded

Weston, Ken

127

Sharing code  

PubMed Central

Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing. PMID:25165519

Kubilius, Jonas

2014-01-01

128

Code constructions and code families for nonbinary quantum stabilizer code  

E-print Network

. . . . . . . . . . . . 6 II CONNECTION BETWEEN CLASSICAL SELF-ORTHOGONAL CODES AND QUANTUM STABILIZER CODES : : : : : : : : 9 A. Error Basis . . . . . . . . . . . . . . . . . . . . . . . . . . 10 B. From Quantum Stabilizer Codes to Classical Codes . . . . 12 1. Connecting... codes) [4, 9, 11]. BCH codes form an extremely important class of error correcting codes. Lemma 16. Let ! be a primitive nth root of unity over Fq and let g(X) be a monic polynomial over Fq of smallest degree that has the 1 numbers !b;!b+1;:::;!b+ 2...

Ketkar, Avanti Ulhas

2005-11-01

129

Nature's Code  

NASA Astrophysics Data System (ADS)

We propose that the mathematical structures related to the `universal rewrite system' define a universal process applicable to Nature, which we may describe as `Nature's code'. We draw attention here to such concepts as 4 basic units, 64- and 20-unit structures, symmetry-breaking and 5-fold symmetry, chirality, double 3-dimensionality, the double helix, the Van der Waals force and the harmonic oscillator mechanism, and our explanation of how they necessarily lead to self-aggregation, complexity and emergence in higher-order systems. Biological concepts, such as translation, transcription, replication, the genetic code and the grouping of amino acids appear to be driven by fundamental processes of this kind, and it would seem that the Platonic solids, pentagonal symmetry and Fibonacci numbers have significant roles in organizing `Nature's code'.

Hill, Vanessa J.; Rowlands, Peter

2008-10-01

130

Free Code  

NSDL National Science Digital Library

Free Code, a service of Andover.Net, is a large index of Internet-related software tool source code. The tools are written in C/C++, Perl, Java, or Visual Basic, and are free for personal and commercial use. They range from handy Perl CGI scripts to Java-based graphics packages. Each tool in the index is briefly described, characterized by language and operating system, and linked to both the home page for the tool and the source code. The total lack of documentation for the search engine makes useful queries hard to create, but the tools are still easy-to-find. This is a very useful index for anyone building Internet or Web-based applications.

131

QR Codes  

ERIC Educational Resources Information Center

This study presents an m-learning method that incorporates Integrated Quick Response (QR) codes. This learning method not only achieves the objectives of outdoor education, but it also increases applications of Cognitive Theory of Multimedia Learning (CTML) (Mayer, 2001) in m-learning for practical use in a diverse range of outdoor locations. When…

Lai, Hsin-Chih; Chang, Chun-Yen; Li, Wen-Shiane; Fan, Yu-Lin; Wu, Ying-Tien

2013-01-01

132

Code division multiple access using Hermitean codes  

Microsoft Academic Search

Reed-Solomon (RS) codes present some desirable properties that make them useful in the generation of hopping sequences, for frequency hopping code division multiple access (FH CDMA). The algebraic geometric codes include the RS codes as a special case, therefore it is natural to propose the former as a candidate to FH CDMA. In this article, a description of such codes,

Francisco M. Assis; M. S. Alencar

1995-01-01

133

Cryptographer  

ERIC Educational Resources Information Center

For the general public, the field of cryptography has recently become famous as the method used to uncover secrets in Dan Brown's fictional bestseller, The Da Vinci Code. But the science of cryptography has been popular for centuries--secret hieroglyphics discovered in Egypt suggest that code-making dates back almost 4,000 years. In today's…

Sullivan, Megan

2005-01-01

134

Area Servizi Bibliotecari di Ateneo Modulo di versamento per il Servizio ILL  

E-print Network

: Politecnico di Milano Intestato a: Politecnico di Milano Piazza Leonardo da Vinci, 32 ­20133 Milano Eseguito : Prestito ILL nr. Timbro avvenuto pagamento Banca Piazza Leonardo da Vinci, 32 ­20133 Milano Eseguito da da Residente in Euro ................. (.....................................) Causale versamento

135

Thyroid Coding Guidelines  

Cancer.gov

Coding Guidelines THYROID GLAND C739 Coding Hormone Therapy Code Hormone Therapy as 01 for follicular and/or papillary thyroid cancer when thyroid hormone therapy is given. Do not code replacement therapy as treatment unless the tumor is papillary

136

Lymphoma Coding Guidelines  

Cancer.gov

Coding Guidelines LYMPHOMA M9590/3-M9738/3 See the Hematopoietic and Lymphoid Neoplasm Case Reportability and Coding Manual and the Hematopoietic Database (DB) for more information and coding instructions. First Course of Therapy Do not code

137

Error-correction coding  

NASA Technical Reports Server (NTRS)

This report describes the progress made towards the completion of a specific task on error-correcting coding. The proposed research consisted of investigating the use of modulation block codes as the inner code of a concatenated coding system in order to improve the overall space link communications performance. The study proposed to identify and analyze candidate codes that will complement the performance of the overall coding system which uses the interleaved RS (255,223) code as the outer code.

Hinds, Erold W. (Principal Investigator)

1996-01-01

138

Coding for Satellite Communication  

Microsoft Academic Search

This paper discusses a number of coding techniques for future satellite communication; they include Reed-Solomon error decoding for message blocks, probabilistic decoding techniques for punctured convolutional codes, and planar Euclidean geometry difference set codes for random multiple access applications. The provision of code concatenation, helical interleaving, and simulation results of new punctured convolutional codes are included. A number of coded

William W. Wu; David Haccoun; Robert Peile; Yasuo Hirata

1987-01-01

139

SPEECH CODING WITH LINEAR PREDICTIVE CODING  

Microsoft Academic Search

Speech coding has been and still is a major issue in the area of digital speech processing in which speech compression is needed for storing digital voice and it requires fixed amount of available memory and compression makes it possible to store longer messages. Several techniques of speech coding such as Linear Predictive Coding (LPC), Waveform Coding and Sub band

G. CHENCHAMMA; P. L. CHOWDARY; K. SHALINI KATYAYANI

140

[The "myologie dynamique" by Girolamo Fabrizi da Aquapendente in the scientific language in the Renaissance age (XVI-XVII)].  

PubMed

Beginning from the XV century, mechanical materialism underwent an evolution in "biological mechanics" within the scientific doctrine. Among the greatest exponents of this new current there were two Italian men, Leonardo da Vinci (1452-1519) and Girolamo da Acquapendente (1533-1619). By the trend given by Leonardo, the myology, instead of being a static science, took a dynamic meaning and valence. Later, Fabrizi resumed and investigated the subject above all in its less known expression, elaborating an original theory. With Acquapendente, the anatomy lost its merely descriptive pecularity and evolved in analysis of the structure in connection with the function. Moreover, he opposed the syllogism against the mechanic language and the mathematical formulation. A new scientific way will be afterwards characterized by Galileo Galilei in the field of the physics and by Giovanni Alfonso Borrelli in the biology. PMID:11640090

Stroppiana, L

1989-01-01

141

Coding for Cooperative Communications  

E-print Network

methods using Raptor codes, which performs within 1.1 dB of the performance limit. Finally, we consider a CRC and develop a practical multi-level dirty-paper coding strategy using LDPC codes for channel coding and trellis-coded quantization for source... . . . . . . . . . . . . . . . . . . . . 48 viii CHAPTER Page 5. CF coding using simplified SWCNSQ . . . . . . . . . 52 D. Practical CF Code Design . . . . . . . . . . . . . . . . . . 53 1. Encoding at the source . . . . . . . . . . . . . . . . . 55 2. DJSCC at the relay...

Uppal, Momin Ayub

2011-10-21

142

Homological stabilizer codes  

SciTech Connect

In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

Anderson, Jonas T., E-mail: jonastyleranderson@gmail.com

2013-03-15

143

Model Children's Code.  

ERIC Educational Resources Information Center

The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

New Mexico Univ., Albuquerque. American Indian Law Center.

144

Generalized Concatenated Quantum Codes  

E-print Network

We introduce the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of new single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length, but also asymptotically achieve the quantum Hamming bound for large block length.

Markus Grassl; Peter Shor; Graeme Smith; John Smolin; Bei Zeng

2009-01-09

145

Codeword Stabilized Quantum Codes  

E-print Network

We present a unifying approach to quantum error correcting code design that encompasses additive (stabilizer) codes, as well as all known examples of nonadditive codes with good parameters. We use this framework to generate new codes with superior parameters to any previously known. In particular, we find ((10,18,3)) and ((10,20,3)) codes. We also show how to construct encoding circuits for all codes within our framework.

Andrew Cross; Graeme Smith; John A. Smolin; Bei Zeng

2007-08-07

146

Accumulate repeat accumulate codes  

NASA Technical Reports Server (NTRS)

In this paper we propose an innovative channel coding scheme called 'Accumulate Repeat Accumulate codes' (ARA). This class of codes can be viewed as serial turbo-like codes, or as a subclass of Low Density Parity Check (LDPC) codes, thus belief propagation can be used for iterative decoding of ARA codes on a graph. The structure of encoder for this class can be viewed as precoded Repeat Accumulate (RA) code or as precoded Irregular Repeat Accumulate (IRA) code, where simply an accumulator is chosen as a precoder. Thus ARA codes have simple, and very fast encoder structure when they representing LDPC codes. Based on density evolution for LDPC codes through some examples for ARA codes, we show that for maximum variable node degree 5 a minimum bit SNR as low as 0.08 dB from channel capacity for rate 1/2 can be achieved as the block size goes to infinity. Thus based on fixed low maximum variable node degree, its threshold outperforms not only the RA and IRA codes but also the best known LDPC codes with the dame maximum node degree. Furthermore by puncturing the accumulators any desired high rate codes close to code rate 1 can be obtained with thresholds that stay close to the channel capacity thresholds uniformly. Iterative decoding simulation results are provided. The ARA codes also have projected graph or protograph representation that allows for high speed decoder implementation.

Abbasfar, Aliazam; Divsalar, Dariush; Yao, Kung

2004-01-01

147

The Straightest Story Ever Told  

Microsoft Academic Search

A revisionary understanding of the Passion of Christ lies at the crux of the spiritual cultural work that Dan Brown’s novel The Da Vinci Code (2003) undertakes no less so than in Mel Gibson’s film The Passion of the Christ (2004). Both works, each highly didactic in its own way, look to make a popular intervention into contemporary spirituality, as

Richard Rambuss

2011-01-01

148

The Straightest Story Ever Told  

Microsoft Academic Search

: A revisionary understanding of the Passion of Christ lies at the crux of the spiritual cultural work that Dan Brown’s novel The Da Vinci Code (2003) undertakes no less so than in Mel Gibson’s film The Passion of the Christ (2004). Both works, each highly didactic in its own way, look to make a popular intervention into contemporary spirituality,

Richard Rambuss

2011-01-01

149

Secret War, Secret Science Brad Osgood  

E-print Network

naval codes. They inform the British who immediately recognize their importance. #12;....The body pressed a policy of "peace without victory" with no success. #12;· Germany sends a secret message war Drawing by Leonardo da Vinci of lancers charging a metal machine #12;The basis of modern war

Osgood, Brad

150

Coset Codes Viewed as Terminated Convolutional Codes  

NASA Technical Reports Server (NTRS)

In this paper, coset codes are considered as terminated convolutional codes. Based on this approach, three new general results are presented. First, it is shown that the iterative squaring construction can equivalently be defined from a convolutional code whose trellis terminates. This convolutional code determines a simple encoder for the coset code considered, and the state and branch labelings of the associated trellis diagram become straightforward. Also, from the generator matrix of the code in its convolutional code form, much information about the trade-off between the state connectivity and complexity at each section, and the parallel structure of the trellis, is directly available. Based on this generator matrix, it is shown that the parallel branches in the trellis diagram of the convolutional code represent the same coset code C(sub 1), of smaller dimension and shorter length. Utilizing this fact, a two-stage optimum trellis decoding method is devised. The first stage decodes C(sub 1), while the second stage decodes the associated convolutional code, using the branch metrics delivered by stage 1. Finally, a bidirectional decoding of each received block starting at both ends is presented. If about the same number of computations is required, this approach remains very attractive from a practical point of view as it roughly doubles the decoding speed. This fact is particularly interesting whenever the second half of the trellis is the mirror image of the first half, since the same decoder can be implemented for both parts.

Fossorier, Marc P. C.; Lin, Shu

1996-01-01

151

Concatenated Coding Using Trellis-Coded Modulation  

NASA Technical Reports Server (NTRS)

In the late seventies and early eighties a technique known as Trellis Coded Modulation (TCM) was developed for providing spectrally efficient error correction coding. Instead of adding redundant information in the form of parity bits, redundancy is added at the modulation stage thereby increasing bandwidth efficiency. A digital communications system can be designed to use bandwidth-efficient multilevel/phase modulation such as Amplitude Shift Keying (ASK), Phase Shift Keying (PSK), Differential Phase Shift Keying (DPSK) or Quadrature Amplitude Modulation (QAM). Performance gain can be achieved by increasing the number of signals over the corresponding uncoded system to compensate for the redundancy introduced by the code. A considerable amount of research and development has been devoted toward developing good TCM codes for severely bandlimited applications. More recently, the use of TCM for satellite and deep space communications applications has received increased attention. This report describes the general approach of using a concatenated coding scheme that features TCM and RS coding. Results have indicated that substantial (6-10 dB) performance gains can be achieved with this approach with comparatively little bandwidth expansion. Since all of the bandwidth expansion is due to the RS code we see that TCM based concatenated coding results in roughly 10-50% bandwidth expansion compared to 70-150% expansion for similar concatenated scheme which use convolution code. We stress that combined coding and modulation optimization is important for achieving performance gains while maintaining spectral efficiency.

Thompson, Michael W.

1997-01-01

152

Sapienza Universit di Roma Area per l'Internazionalizzazione  

E-print Network

/internazionale Modulo accettazione Borsa LLP-Leonardo da Vinci (Progetto YOUR-JOB-IN-EUROPE 2) La mancata consegna del: · accettare la Borsa di tirocinio Leonardo da Vinci di 24 settimane consecutive con una data di inizio motivo di esclusione da eventuali successivi progetti Leonardo da Vinci. AUTORIZZAZIONE AL TRATTAMENTO

Guidoni, Leonardo

153

Discussion on LDPC Codes and Uplink Coding  

NASA Technical Reports Server (NTRS)

This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

2007-01-01

154

ARA type protograph codes  

NASA Technical Reports Server (NTRS)

An apparatus and method for encoding low-density parity check codes. Together with a repeater, an interleaver and an accumulator, the apparatus comprises a precoder, thus forming accumulate-repeat-accumulate (ARA codes). Protographs representing various types of ARA codes, including AR3A, AR4A and ARJA codes, are described. High performance is obtained when compared to the performance of current repeat-accumulate (RA) or irregular-repeat-accumulate (IRA) codes.

Divsalar, Dariush (Inventor); Abbasfar, Aliazam (Inventor); Jones, Christopher R. (Inventor); Dolinar, Samuel J. (Inventor); Thorpe, Jeremy C. (Inventor); Andrews, Kenneth S. (Inventor); Yao, Kung (Inventor)

2008-01-01

155

QR Codes 101  

ERIC Educational Resources Information Center

A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

2012-01-01

156

Overlapping codes within protein-coding sequences  

PubMed Central

Genomes encode multiple signals, raising the question of how these different codes are organized along the linear genome sequence. Within protein-coding regions, the redundancy of the genetic code can, in principle, allow for the overlapping encoding of signals in addition to the amino acid sequence, but it is not known to what extent genomes exploit this potential and, if so, for what purpose. Here, we systematically explore whether protein-coding regions accommodate overlapping codes, by comparing the number of occurrences of each possible short sequence within the protein-coding regions of over 700 species from viruses to plants, to the same number in randomizations that preserve amino acid sequence and codon bias. We find that coding regions across all phyla encode additional information, with bacteria carrying more information than eukaryotes. The detailed signals consist of both known and potentially novel codes, including position-dependent secondary RNA structure, bacteria-specific depletion of transcription and translation initiation signals, and eukaryote-specific enrichment of microRNA target sites. Our results suggest that genomes may have evolved to encode extensive overlapping information within protein-coding regions. PMID:20841429

Itzkovitz, Shalev; Hodis, Eran; Segal, Eran

2010-01-01

157

Clip and Save.  

ERIC Educational Resources Information Center

Focuses on the facial expression in the "Mona Lisa" by Leonardo da Vinci. Offers background information on da Vinci as well as learning activities for students. Includes a reproduction of the "Mona Lisa" and information about the painting. (CMK)

Hubbard, Guy

2003-01-01

158

Turbulenz bezeichnet einen Strmungs-zustand, der durch Unordnung geprgt  

E-print Network

Erkenntnis hatte schon Leonardo da Vinci (1452-1519), was seine Darstellung einer Bachströmung belegt. Der turbulenten Bach- strömung von Leonardo da Vinci. EINBLICKE Nr. 47 / Frühjahr 2008 Carl von Ossietzky

Peinke, Joachim

159

Spiral Laminar Flow: A revolution in understanding?  

E-print Network

30 40 50 60 70 80 Minimal Moderate Severe spiral non-spiral #12;Leonardo da Vinci Spirals in art: (1) the drawings of Leonardo da Vinci from Vindzone Library showing spiral flows in the heart cavity. La Bockeria

Greenaway, Alan

160

Citing Sources Using HARVARD Style in a Bibliography or Works Cited Page  

E-print Network

://elgg.leeds.ac.uk/libajn/weblog/ [23 February 2007]. Wiki 'Art Wikia', Leonardo da Vinci, [wiki article], October 8, 2012, Available from: http://art.wikia.com/wikia/Leonardo_Da_Vinci [26 october 2012]. Facebook, Twitter Smith, P, 2012

Hasýrcý, Vasýf

161

BANDO 2/2011 Procedura comparativa per l'affidamento di un incarico di lavoro autonomo con contratto di  

E-print Network

/IT/489 ­ finanziato nell'ambito del Programma settoriale Leonardo da Vinci; vista la delibera del programma settoriale Leonardo da Vinci e a progetti incentrati su tematiche strettamente connesse al tema di

Guidoni, Leonardo

162

Marie Curie Roadshow@TU/e Nikolaos (Nikos) Athanasopoulos  

E-print Network

-2010), Electrical Engineering Department, Patras, Greece · Leonardo da Vinci scholarship (3 month period, 2008 · Leonardo da Vinci scholarship (3 month period, 2008), Imperial College, London, UK · Post

Franssen, Michael

163

Noname manuscript No. (will be inserted by the editor)  

E-print Network

Dipartimento di Elettronica e Informazione (DEI), Politecnico di Milano, Piazza Leonardo Da Vinci, 32 - 20133 (DEI), Politecnico di Milano, Piazza Leonardo Da Vinci, 32 - 20133 Milan, Italy E-mail: margara

Cugola, Gianpaolo

164

UGST 181: Fall 2012 EARTH ART/GEOART Dr. Vatche P. Tchakerian Office: O&M 810  

E-print Network

- representative works by Leonardo da Vinci, Bellini, Botticelli, van Eyck, Durer, among others. Week 5: Renaissance artists and geological elements in landscape painting ­ representative works by Leonardo da Vinci

165

Deep-Sea Research I 55 (2008) 296323 Habitat use and preferences of cetaceans along the continental  

E-print Network

, Politecnico di Milano, Technical University, P.za Leonardo da Vinci 32, 20133 Milano, Italy b Tethys Research, Environmental and Survey Engineering, Politecnico di Milano, Technical University, P.za Leonardo da Vinci 32

166

Click Coding Coding with Click Modular Router  

E-print Network

;Outline Coding Tools Writing custom elements The Click STL Packet Manipulation Timers and Tasks Handlers threshold, larger: drop packet Download the source code online to avoid copy errors at http The Click STL Packet Manipulation Timers and Tasks Handlers References Element header Necessary

167

Universit degli Studi di Milano Elezioni CNSU 2013 Risultato Elezioni -Voti di Lista mercoled 5 giugno 2013  

E-print Network

, 32 - Campus Leonardo 10 6 Aula 12 - P.zza L. da Vinci, 32 - Campus Leonardo 16 7 Aula 1.3 - p.zza L. da Vinci, 32 - Campus Leonardo 14 8 Aula 1.5 - p.zza L. da Vinci, 32 - Campus Leonardo 32 9 Aula 1.6 - p.zza L. da Vinci, 32 - Campus Leonardo 17 10 Aula CT.2 - via Durando, 10 - Campus Bovisa 22 11 Aula

De Cindio, Fiorella

168

Coding with side information  

E-print Network

analogy between SWCQ and entropy coded quantization in classic source coding. Furthermore, a practical scheme of SWCQ using 1-D nested lattice quantization and LDPC is implemented. For GPC, since the actual design procedure relies on the more precise...

Cheng, Szeming

2005-11-01

169

International Code Council  

NSDL National Science Digital Library

The International Code Council is �a membership association dedicated to building safety and fire prevention, develops the codes used to construct residential and commercial buildings, including homes and schools. Most U.S. cities, counties and states that adopt codes choose the International Codes developed by the International Code Council.� Although some sections of the site are reserved for members only (which requires a fee), there is a remarkable amount of material available to non-members. Available on the website are details about codes development, how to acquire an opinion on a code from multiple sources and how to reach a building code liaison for your locality. Under the �Certification and Testing� tab, users can find sample certification exam questions as well as outlines. The site also provides links to various periodicals, ICC meetings and also includes an event calendar to see dates for industry conferences and upcoming trade shows.

170

Cellulases and coding sequences  

DOEpatents

The present invention provides three fungal cellulases, their coding sequences, recombinant DNA molecules comprising the cellulase coding sequences, recombinant host cells and methods for producing same. The present cellulases are from Orpinomyces PC-2.

Li, Xin-Liang (Athens, GA); Ljungdahl, Lars G. (Athens, GA); Chen, Huizhong (Lawrenceville, GA)

2001-02-20

171

Cellulases and coding sequences  

DOEpatents

The present invention provides three fungal cellulases, their coding sequences, recombinant DNA molecules comprising the cellulase coding sequences, recombinant host cells and methods for producing same. The present cellulases are from Orpinomyces PC-2.

Li, Xin-Liang (Athens, GA); Ljungdahl, Lars G. (Athens, GA); Chen, Huizhong (Lawrenceville, GA)

2001-01-01

172

Honesty and Honor Codes.  

ERIC Educational Resources Information Center

Explores the rise in student cheating and evidence that students cheat less often at schools with an honor code. Discusses effective use of such codes and creation of a peer culture that condemns dishonesty. (EV)

McCabe, Donald; Trevino, Linda Klebe

2002-01-01

173

Morse Code Activity Packet.  

ERIC Educational Resources Information Center

This activity packet offers simple directions for setting up a Morse Code system appropriate to interfacing with any of several personal computer systems. Worksheets are also included to facilitate teaching Morse Code to persons with visual or other disabilities including blindness, as it is argued that the code is best learned auditorily. (PB)

Clinton, Janeen S.

174

Codes of ethics  

Microsoft Academic Search

Partly as a result of much recent evidence of business and government crime, a large proportion of major corporations have adopted codes of ethics; government service is also making more use of them. The electrical manufacturing anti-trust conspiracy and 1973–1976 investigation of foreign and domestic bribery were immediate prods. There are also government codes of which the ASPA code is

George C. S. Benson

1989-01-01

175

Selected New Trends in Scientific Visualization Werner Purgathofer and Helwig Loffelmann  

E-print Network

as Leonardo da Vinci (1452--1519). Most of these visualizations were originally motivated by artistic desires results to which this activity gives rise. Figure 1. Sketches from Leonardo da Vinci visualizing flow, atmospheric clouds). One of them, namely Leonardo da Vinci, used fine particles of sand or dirt and wood

176

Classroom Visit Pre/Post Materials1 C L A S S R O O M V I S I T  

E-print Network

Vinci: Leonardo da Vinci (1452-1519), known as a genius of the Renaissance, was an artist, inventor Snell's Law, which states that the angle of incidence will equal the angle of reflection. Leonardo Da wrote long descriptions that included diagrams of his scientific and mechanical projects. Da Vinci wrote

Weston, Ken

177

DISPOSIZIONE N. 138/2014 PROT. N. 0002375 DEL 16/01/2014  

E-print Network

DISPOSIZIONE N. 138/2014 PROT. N. 0002375 DEL 16/01/2014 Programma "LEONARDO DA VINCI" Progetto'Apprendimento Permanente ­ Programma settoriale "Leonardo da Vinci", Sapienza Università di Roma partecipa al progetto di CONTRIBUTO LEONARDO DA VINCI (LdV): Il contributo LdV rappresenta un rimborso delle spese di viaggio

Guidoni, Leonardo

178

Erasmus + Programme Erasmus Policy Statement (Overall Strategy)  

E-print Network

the Erasmus placement and Leonardo da Vinci programme. For Erasmus placements, the choice of the organization is often made by the Faculties whether for the Leonardo da Vinci we use a centralized approach. The Leonardo da Vinci programme UNIPHARMA-GRADUTES coordinated by Sapienza was shortlisted in 2006

Guidoni, Leonardo

179

Pagina 1 Curriculum Vitae di Gianluca Noto C U R R I C U L U M  

E-print Network

S S I O N A L E INFORMAZIONI PERSONALI Nome GIANLUCA NOTO Indirizzo PIAZZA LEONARDO DA VINCI, 32 ­ 20133 datore di lavoro Politecnico di Milano Piazza Leonardo da Vinci, 32 ­ 20133 Milano · Tipo di impiego ottobre 2006 · Nome e indirizzo del datore di lavoro Politecnico di Milano Piazza Leonardo da Vinci, 32

180

Pagina 1 Curriculum Vitae di Rossella C U R R I C U L U M  

E-print Network

S S I O N A L E INFORMAZIONI PERSONALI Nome MAGNI ROSSELLA Indirizzo P.zza Leonardo da Vinci, 32 ­ 20133 di lavoro Politecnico di Milano p.zza Leonardo da Vinci, 32 ­ 20133 Milano · Tipo di impiego Capo Milano p.zza Leonardo da Vinci, 32 ­ 20133 Milano · Tipo di impiego Capo Servizio ­ Servizi Generali agli

181

ORORGENES DE LA GEOMETRGENES DE LA GEOMETRA PROYECTIVAA PROYECTIVA Mara Emilia Alonso Departamento de lgebra, UCM  

E-print Network

Edad Media. Por eso no es extraño que tengan especial relevancia nombres como Leonardo da Vinci, Rafael GENIOS, Vol. I (Leonardo da Vinci, Dalí), Vol. II (Rafael), Madrid: Orbis-Fabri 1989. TRATADO DE PINTURA, Leonardo da Vinci, Madrid: Akal 1986. PIERO DE LA FRANCESCA, M. Mangione, en Grandes Estilos de la Pintura

Ruiz, JesĂşs M.

182

Nome e in Principali mansi  

E-print Network

20 litecnico di Mi azza Leonardo d nsulente ­ liber ARO RDO DA VINCI, 364 039 za@polimi.it 013 ad e indirizzo del datore di lavoro Politecnico di Milano, Piazza Leonardo da Vinci, 32 ­ 20133 Milano del datore di lavoro Politecnico di Milano, Piazza Leonardo da Vinci, 32 ­ 20133 Milano ­ presso

183

UNIVERSITA' DEGLI STUDI DI TORINO STRUTTURA DIDATTICA SPECIALE VETERINARIA  

E-print Network

UNIVERSITA' DEGLI STUDI DI TORINO STRUTTURA DIDATTICA SPECIALE VETERINARIA Via Leonardo da Vinci Torino, sita in Grugliasco (TO), Via Leonardo da Vinci 44/48. Il suddetto è' stato pubblicato sul sito VETERINARIA Via Leonardo da Vinci, 44/48 - 10095 Grugliasco (Torino) __________________ Sulla base di quanto

Sproston, Jeremy

184

Politecnico di Milano Area Risorse Umane e Organizzazione  

E-print Network

Politecnico di Milano Area Risorse Umane e Organizzazione Piazza Leonardo da Vinci, 32 20133 Milano Milano Area Risorse Umane e Organizzazione Piazza Leonardo da Vinci, 32 20133 Milano Tel. 02 2399 2135 da Vinci Viale Romagna 62 Camere singole/doppie con bagno ad uso esclusivo o condivisione SI - camere

185

124 Los Alamos Science Number 29 2005 The Turbulence Problem  

E-print Network

" of the turbulence problem. Robert Ecke Leonardo da Vinci's illustration of the swirling flow of turbulence. (The fluid motion (McComb 1990, Frisch 1995, Lesieur 1997). Leonardo da Vinci (refer to Richter 1970), who to the principal current, the other to the random and reverse motion." Two aspects of da Vinci's observa- tions

186

UNIVERSITA' DEGLI STUDI DI TORINO STRUTTURA DIDATTICA SPECIALE VETERINARIA  

E-print Network

UNIVERSITA' DEGLI STUDI DI TORINO STRUTTURA DIDATTICA SPECIALE VETERINARIA Via Leonardo da Vinci Torino, sita in Grugliasco (TO), Via Leonardo da Vinci 44/48. Il suddetto è' stato pubblicato sul sito;UNIVERSITA' DEGLI STUDI DI TORINO STRUTTURA DIDATTICA SPECIALE VETERINARIA Via Leonardo da Vinci, 44

Sproston, Jeremy

187

ISTANZA DI ISCRIZIONE E DICHIARAZIONI  

E-print Network

Leonardo da Vinci 44/48" 10095 Grugliasco TO OGGETTO: Istanza di iscrizione all'elenco aperto di soggetti Veterinaria dell'UniversitĂ  degli Studi di Torino, sita in Grugliasco (TO), Via Leonardo da Vinci 44/48. Per da Vinci 44/48. Il sottoscritto

Sproston, Jeremy

188

A Multiagent Interaction Paradigm for Physiological Process Control  

E-print Network

di Elettronica e Informazione; Politecnico di Milano; Piazza Leonardo da Vinci, 32; I-20133 Milano; Politecnico di Milano; Piazza Leonardo da Vinci, 32; I-20133 Milano (MI); Italy ngatti@elet.polimi.it Marco Somalvico Dipartimento di Elettronica e Informazione; Politecnico di Milano; Piazza Leonardo da Vinci, 32; I

Gatti, Nicola

189

Pagina 1 Curriculum Vitae di Giorgia Perga  

E-print Network

S S I O N A L E INFORMAZIONI PERSONALI Nome PERGA GIORGIA Indirizzo Piazza Leonardo da Vinci, 32 ­ 20133 POLITECNICO DI MILANO Piazza Leonardo da Vinci, 32 - Milano · Tipo di impiego Responsabile Funzione di Staff del datore di lavoro POLITECNICO DI MILANO Piazza Leonardo da Vinci, 32 - Milano · Tipo di impiego

190

Pagina 1 Curriculum Vitae di Paola Carlucci C U R R I C U L U M  

E-print Network

S S I O N A L E INFORMAZIONI PERSONALI Nome CARLUCCI Paola Indirizzo 32, Piazza Leonardo da Vinci, 20133 lavoro Politecnico di Milano, Piazza Leonardo da Vinci 32 ­ Milano · Tipo di impiego Capo Servizio, Piazza Leonardo da Vinci 32 - Milano · Tipo di impiego Supporto alla pianificazione e controllo delle

191

Pagina 1 Curriculum Vitae di C U R R I C U L U M  

E-print Network

di lavoro POLITECNICO DI MILANO P.zza Leonardo da Vinci, 32 Milano · Tipo di impiego Dirigente dell indirizzo del datore di lavoro POLITECNICO DI MILANO P.zza Leonardo da Vinci, 32 Milano · Tipo di impiego/12/2012 · Nome e indirizzo del datore di lavoro POLITECNICO DI MILANO P.zza Leonardo da Vinci, 32 Milano · Tipo

192

Accordo con QdG Teatro Leonardo Soc. Consortile a r.l. Stagione Teatrale 2013/2014 -www.teatroleonardo.it  

E-print Network

, l'accesso al Teatro Leonardo Da Vinci per gli studenti universitari(2) con tesserino universitario e definire a cura di Teatro Leonardo da Vinci, estensibili ad uno o piĂą accompagnatori se indicato. Per tutte dello "Studio U.r.p. "(3). (1) Storia e Informazioni su www.teatroleonardo.it Teatro Leonardo da Vinci

De Cindio, Fiorella

193

UNIVERSITA' DEGLI STUDI DI TORINO STRUTTURA DIDATTICA SPECIALE VETERINARIA  

E-print Network

UNIVERSITA' DEGLI STUDI DI TORINO STRUTTURA DIDATTICA SPECIALE VETERINARIA Via Leonardo da Vinci Torino, sita in Grugliasco (TO), Via Leonardo da Vinci 44/48. Il suddetto è' stato pubblicato sul sito TORINO STRUTTURA DIDATTICA SPECIALE VETERINARIA Via Leonardo da Vinci, 44/48 - 10095 Grugliasco (Torino

Sproston, Jeremy

194

UNIVERSITA' DEGLI STUDI DI TORINO STRUTTURA DIDATTICA SPECIALE VETERINARIA  

E-print Network

UNIVERSITA' DEGLI STUDI DI TORINO STRUTTURA DIDATTICA SPECIALE VETERINARIA Via Leonardo da Vinci Torino, sita in Grugliasco (TO), Via Leonardo da Vinci 44/48. Il suddetto è' stato pubblicato sul sito VETERINARIA Via Leonardo da Vinci, 44/48 - 10095 Grugliasco (Torino) __________________ Detto elenco è stato

Sproston, Jeremy

195

Den Dolech 2 Postbus 513 / Traverse 0.17  

E-print Network

within the Leonardo da Vinci Program. What is a Leonardo da Vinci grant? The grants are meant for young, Iceland, Liechtenstein and Turkey. Excluded are Subject Leonardo da Vinci grant #12;the countries where.v.beek@tue.nl Dear candidate for a Leonardo grant, With this letter we want to inform you about the mobility grants

Franssen, Michael

196

E U R O P E A N C U R R I C U L U M V I T A E  

E-print Network

Address Politecnico di Milano ­ P.za Leonardo da Vinci n. 32 20133 Milano Telephone +39 02 2399 2250 Fax.za Leonardo da Vinci, 32 Milano · Type of business or sector · Occupation or position held Rector · Main di Milano ­ P.za Leonardo da Vinci, 32 Milano · Type of business or sector Management Control Systems

197

Pagina 1 Curriculum Vitae di Vincenza Tornatore  

E-print Network

DICA (Sezione Geodesia e Geomatica), Piazza Leonardo da Vinci 32, 20133 Milano, Italia · Tipo di lavoro Politecnico di Milano DIIAR Sezione Rilevamento, Piazza Leonardo da Vinci 32, 20133 Milano, Italia Politecnico di Milano DIIAR Sezione Rilevamento, Piazza Leonardo da Vinci 32, 20133 Milano, Italia · Tipo di

198

UNIVERSITA' DEGLI STUDI DI TORINO STRUTTURA DIDATTICA SPECIALE VETERINARIA  

E-print Network

UNIVERSITA' DEGLI STUDI DI TORINO STRUTTURA DIDATTICA SPECIALE VETERINARIA Via Leonardo da Vinci Torino, sita in Grugliasco (TO), Via Leonardo da Vinci 44/48. Il suddetto è' stato pubblicato sul sito STRUTTURA DIDATTICA SPECIALE VETERINARIA Via Leonardo da Vinci, 44/48 - 10095 Grugliasco (Torino

Sproston, Jeremy

199

Nr. 294 / 2012 // 31. 10. 2012 Bayreuther Spinnen in Paris  

E-print Network

Biomaterialien der Universität Bayreuth sind Teil einer Ausstellung in Paris über Leonardo da Vinci Die Pariser Ausstellung über Leonardo da Vinci zeigt auch Exponate zum Thema Spinnenseide des Lehrstuhls Biomaterialien Museumsverbundes Universcience ist, stehen Aspekte des Lebens und Schaffens von Leonardo da Vinci. In einem

Ullmann, G. Matthias

200

Pagina 1 Curriculum Vitae di Massimo Valentini  

E-print Network

indirizzo del datore di lavoro POLITECNICO DI MILANO ­ piazza Leonardo da Vinci, 32 ­ 20133 MILANO - ITALIA DI MILANO ­ piazza Leonardo da Vinci, 32 ­ 20133 MILANO - ITALIA · Tipo di impiego Tecnico Laureato indirizzo del datore di lavoro POLITECNICO DI MILANO ­ piazza Leonardo da Vinci, 32 ­ 20133 MILANO - ITALIA

201

Pagina 1 Curriculum Vitae di Francesca Teresa Saracino  

E-print Network

LEONARDO DA VINCI, 32, MILANO Telefono 02 2399 2527 Fax 02 2399 2133 E-mail francesca con le Imprese Piazza Leonardo da Vinci, 32 - Milano · Tipo di impiego Capo servizio per l Politecnico di Milano, Career Service ­ Area Comunicazione e Relazioni Esterne Piazza Leonardo da Vinci, 32

202

Soil Erosion Caused by Snow Avalanches: a Case Study in the Aosta Valley Michele Freppaz*{  

E-print Network

Suoli Alpini, 44, Via Leonardo da Vinci, 10095 Grugliasco (TO), Italy {Universita` degli Studi di Torino, NatRisk­Research Centre of Natural Risks in Mountain and Hilly Enviroments, 44, Via Leonardo da Vinci Costruzioni Rurali, 44, Via Leonardo da Vinci, 10095 Grugliasco (TO), Italy 1Institute of Arctic and Alpine

Williams, Mark W.

203

November 3, 2014 Journal of Mathematics and the Arts Leonardov4 To appear in the Journal of Mathematics and the Arts  

E-print Network

in Leonardo da Vinci's Cartelle of the Accademia Vinciana Jessica Hoya and Kenneth C. Millettb Department of knotting and linking are found in many of the drawings and paintings of Leonardo da Vinci, but nowhere of Leonardo's paintings. Keywords: Leonardo da Vinci; engravings; knotting; linking; geometry; symmetry

Akhmedov, Azer

204

VIALEROMAGNA VIA BONARDI  

E-print Network

BONARDI M2 - PIOLA PIAZZA LEONARDO DA VINCI VIA BASSINI VIA CELORIA VIAGOLGI VIACLERICETTI VIA BERNARDO BONARDI M2 - PIOLA PIAZZA LEONARDO DA VINCI EDIFICIO 13 Aula T 1.2 Quando Martedì 29 Ottobre 12:15 - 14 VIA PONZIO VIAPONZIO VIALEROMAGNA VIA BONARDI M2 - PIOLA PIAZZA LEONARDO DA VINCI VIA BASSINI VIA

205

Fast 3D optical reconstruction in turbid media using spatially modulated light  

E-print Network

@POLIMI­Dipartimento di Fisica, Politecnico di Milano, Piazza Leonardo da Vinci 32, I-20133 Milan, Italy 2Instituto di Fotonica e Nanotecnologie (IFN-CNR)­Dipartimento di Fisica, Politecnico di Milano, Piazza Leonardo da Vinci 32, I-20133 Milan, Italy 3Italian Institute of Technology (IIT), Piazza Leonardo da Vinci 32, I-20133

Boyer, Edmond

206

Color code identification in coded structured light.  

PubMed

Color code is widely employed in coded structured light to reconstruct the three-dimensional shape of objects. Before determining the correspondence, a very important step is to identify the color code. Until now, the lack of an effective evaluation standard has hindered the progress in this unsupervised classification. In this paper, we propose a framework based on the benchmark to explore the new frontier. Two basic facets of the color code identification are discussed, including color feature selection and clustering algorithm design. First, we adopt analysis methods to evaluate the performance of different color features, and the order of these color features in the discriminating power is concluded after a large number of experiments. Second, in order to overcome the drawback of K-means, a decision-directed method is introduced to find the initial centroids. Quantitative comparisons affirm that our method is robust with high accuracy, and it can find or closely approach the global peak. PMID:22859022

Zhang, Xu; Li, Youfu; Zhu, Limin

2012-08-01

207

Coding for Electronic Mail  

NASA Technical Reports Server (NTRS)

Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.

Rice, R. F.; Lee, J. J.

1986-01-01

208

Permutation codes for sources.  

NASA Technical Reports Server (NTRS)

Source encoding techniques based on permutation codes are investigated. For a broad class of distortion measures it is shown that optimum encoding of a source permutation code is easy to instrument even for very long block lengths. Also, the nonparametric nature of permutation encoding is well suited to situations involving unknown source statistics. For the squared-error distortion measure a procedure for generating good permutation codes of a given rate and block length is described. The performance of such codes for a memoryless Gaussian source is compared both with the rate-distortion function bound and with the performance of various quantization schemes. The comparison reveals that permutation codes are asymptotically ideal for small rates and perform as well as the best entropy-coded quantizers presently known for intermediate rates. They can be made to compare favorably at high rates, too, provided the coding delay associated with extremely long block lengths is tolerable.

Berger, T.; Jelinek, F.; Wolf, J. K.

1972-01-01

209

Generating code adapted for interlinking legacy scalar code and extended vector code  

DOEpatents

Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

Gschwind, Michael K

2013-06-04

210

Improved codes for space-time trellis-coded modulation  

Microsoft Academic Search

Space-Time Coded Modulation has been shown to eciently use transmit diversity to increase spectral efficiency. In this letter we propose new trellis codes found through systematic code search. These codes achieve the theoretically maximal diversity gain and improved coding gain compared to known codes.

Stephan Bäro; Gerhard Bauch; Axel Hansmann

2000-01-01

211

Cartography from Code...? Barend Kbben  

E-print Network

Cartography from Code...? Barend Köbben ITC ­ Universiteit Twente b.j.kobben@utwente.nl ­ @barendkobben #12;Cartography from Code...? or "how I learned to stop worrying and love coding in cartography;possible...? CARTOGRAPHY FROM CODE #12;...or an oxymoron? CARTOGRAPHY FROM CODE #12;CARTOGRAPHY FROM CODE

Köbben, Barend

212

Reflections on Post-16 Strategies in European Countries. Interim Report of the Leonardo da Vinci/Multiplier Effect Project III.3.a. Priority 2: Forging Links between Educational Establishments and Enterprises (1997-2000) ID 27009. Working Papers, No. 9.  

ERIC Educational Resources Information Center

This four-part publication contains 19 papers on educational practices and promises for post-16 education in European countries. Part I, the introduction, contains these three papers: "Sharpening Post-16 Education Strategies: Building on the Results of the Previous Projects" (Johanna Lasonen); "'Parity of Esteem' and 'Integrated…

Stenstrom, Marja-Leena, Ed.

213

Research on Universal Combinatorial Coding  

PubMed Central

The conception of universal combinatorial coding is proposed. Relations exist more or less in many coding methods. It means that a kind of universal coding method is objectively existent. It can be a bridge connecting many coding methods. Universal combinatorial coding is lossless and it is based on the combinatorics theory. The combinational and exhaustive property make it closely related with the existing code methods. Universal combinatorial coding does not depend on the probability statistic characteristic of information source, and it has the characteristics across three coding branches. It has analyzed the relationship between the universal combinatorial coding and the variety of coding method and has researched many applications technologies of this coding method. In addition, the efficiency of universal combinatorial coding is analyzed theoretically. The multicharacteristic and multiapplication of universal combinatorial coding are unique in the existing coding methods. Universal combinatorial coding has theoretical research and practical application value. PMID:24772019

Lu, Jun; Zhang, Zhuo; Mo, Juan

2014-01-01

214

Theory of epigenetic coding.  

PubMed

The logic of genetic control of development may be based on a binary epigenetic code. This paper revises the author's previous scheme dealing with the numerology of annelid metamerism in these terms. Certain features of the code had been deduced to be combinatorial, others not. This paradoxical contrast is resolved here by the interpretation that these features relate to different operations of the code; the combinatiorial to coding identity of units, the non-combinatorial to coding production of units. Consideration of a second paradox in the theory of epigenetic coding leads to a new solution which further provides a basis for epimorphic regeneration, and may in particular throw light on the "regeneration-duplication" phenomenon. A possible test of the model is also put forward. PMID:6748695

Elder, D

1984-06-01

215

Codes of Ethics Online  

NSDL National Science Digital Library

The Center for the Study of Ethics in the Professions at the Illinois Institute of Technology maintains the Codes of Ethics Online Web site. The Center writes: "With the advent of the Internet, it seemed clear that digitizing the codes and making them accessible over the World-Wide Web would benefit researchers, students, and professionals alike." The science page contains links to over fifty organizations' ethical codes, including the American Institute of Chemists, the American Physical Society, the Water Quality Association, etc.

216

Industrial Computer Codes  

NASA Technical Reports Server (NTRS)

This is an overview of new and updated industrial codes for seal design and testing. GCYLT (gas cylindrical seals -- turbulent), SPIRALI (spiral-groove seals -- incompressible), KTK (knife to knife) Labyrinth Seal Code, and DYSEAL (dynamic seal analysis) are covered. CGYLT uses G-factors for Poiseuille and Couette turbulence coefficients. SPIRALI is updated to include turbulence and inertia, but maintains the narrow groove theory. KTK labyrinth seal code handles straight or stepped seals. And DYSEAL provides dynamics for the seal geometry.

Shapiro, Wilbur

1996-01-01

217

The Gli code  

PubMed Central

The Gli code hypothesis postulates that the three vertebrate Gli transcription factors act together in responding cells to integrate intercellular Hedgehog (Hh) and other signaling inputs, resulting in the regulation of tissue pattern, size and shape. Hh and other inputs are then just ways to modify the Gli code. Recent data confirm this idea and suggest that the Gli code regulates stemness and also tumor progression and metastatic growth, opening exciting possibilities for both regenerative medicine and novel anticancer therapies. PMID:17845852

Ruiz i Altaba, Ariel; Mas, Christophe; Stecca, Barbara

2008-01-01

218

Phonological coding during reading.  

PubMed

The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early [prelexical] or that phonological codes come online late [postlexical]) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eye-tracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model, Van Orden, 1987; dual-route model, e.g., M. Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001; parallel distributed processing model, Seidenberg & McClelland, 1989) are discussed. PMID:25150679

Leinenger, Mallorie

2014-11-01

219

Benchmarking the democritus code  

Microsoft Academic Search

Summary form only given. The DEMOCRITUS code is a particle-based code for plasma-material interaction simulation. The code makes use of particle-in-cell (PIC) method to simulate each plasma species, the material, and their interaction. In this study, we concentrate on a dust particle immersed in a plasma. We start with the simplest case, in which the dust particle is not allowed

N. Arinaminpathy; C. Fichtl; G. Lapenta; G. L. Delzanno

2006-01-01

220

Distributed Video Coding  

Microsoft Academic Search

Distributed coding is a new paradigm for video compression, based on Slepian and Wolf's and Wyner and Ziv's information-theoretic results from the 1970s. This paper reviews the recent development of practical distributed video coding schemes. Wyner-Ziv coding, i.e., lossy compression with receiver side information, enables low-complexity video encoding where the bulk of the computation is shifted to the decoder. Since

Bernd Girod; ANNE MARGOT AARON; Shantanu Rane; David Rebollo-Monedero

2005-01-01

221

Scalable Hyperspectral Image Coding  

Microsoft Academic Search

Here we propose scalable Three-Dimensional Set Partitioned Embedded bloCK (3D-SPECK)–an embedded, block-based, wavelet transform coding algorithm of low complexity for hyperspectral image compression. Scalable 3D-SPECK supports both SNR and resolution progressive coding. After wavelet transform, 3D-SPECK treats each subband as a coding block. To generate SNR scalable bitstream, the stream is organized so that the same indexed bit planes are

Xiaoli Tang; William A. Pearlman

2005-01-01

222

Building Codes and Standards  

NSDL National Science Digital Library

This brief document from David Cohan includes some information on building codes and standards. The purpose of building codes and standards is defined, and how they relate to energy and sustainability topics is also explored. This document would be useful for instructors looking for some notes on how to incorporate building codes and standards into their class work, or for students looking to learn more about the topic. This document may be downloaded in PDF file format.

Cohan, David

223

Tokamak Systems Code  

SciTech Connect

The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.

Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.

1985-03-01

224

MORSE Monte Carlo code  

SciTech Connect

The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described.

Cramer, S.N.

1984-01-01

225

Resistor Color-Code  

NSDL National Science Digital Library

"Resistor manufactures implement the standard EIA color-code using three, four and five color bands to identify nominal resistor values. It is imperative that engineers and technicians know how to interpret the color markings on resistors in order to perform analysis and repairs on electronic products." On this page, visitors will find a key to the code for three, four, and five band resistors and exercises to check for understanding. A Resistor Color-Code chart can also be downloaded and printed from this site, as well as a Resistor Color-Code Converter.

2011-07-19

226

Bar Code Labels  

NASA Technical Reports Server (NTRS)

American Bar Codes, Inc. developed special bar code labels for inventory control of space shuttle parts and other space system components. ABC labels are made in a company-developed anodizing aluminum process and consecutively marketed with bar code symbology and human readable numbers. They offer extreme abrasion resistance and indefinite resistance to ultraviolet radiation, capable of withstanding 700 degree temperatures without deterioration and up to 1400 degrees with special designs. They offer high resistance to salt spray, cleaning fluids and mild acids. ABC is now producing these bar code labels commercially or industrial customers who also need labels to resist harsh environments.

1988-01-01

227

Career of the Month: An Interview with Cryptographer Bruce Schneier  

NSDL National Science Digital Library

For the general public, the field of cryptography has recently become famous as the method used to uncover secrets in Dan Brown's, "The Da Vinci Code." But the science of cryptography has been popular for centuries--secret hieroglyphics discovered in Egypt suggest that code-making dates back almost 4,000 years. In today's society, Cryptographers such as Bruce Schneier provide security systems for computers and networks. Students will be mesmerized as the secrets of this thrilling career are revealed.

Sullivan, Megan

2005-11-01

228

Two-dimensional Fire codes  

Microsoft Academic Search

To improve the reliability of two-dimensional information, codes that can correct two-dimensional bursts (or spots) may be useful. In this paper a class of two-dimensional burst-correcting codes, called two-dimensional Fire codes, is proposed. The definition of these codes is a natural extension of that of the conventional Fire codes. The two-dimensional Fire code is a two-dimensional cyclic code designed for

H. Imai

1973-01-01

229

RFQ simulation code  

SciTech Connect

We have developed the RFQLIB simulation system to provide a means to systematically generate the new versions of radio-frequency quadrupole (RFQ) linac simulation codes that are required by the constantly changing needs of a research environment. This integrated system simplifies keeping track of the various versions of the simulation code and makes it practical to maintain complete and up-to-date documentation. In this scheme, there is a certain standard version of the simulation code that forms a library upon which new versions are built. To generate a new version of the simulation code, the routines to be modified or added are appended to a standard command file, which contains the commands to compile the new routines and link them to the routines in the library. The library itself is rarely changed. Whenever the library is modified, however, this modification is seen by all versions of the simulation code, which actually exist as different versions of the command file. All code is written according to the rules of structured programming. Modularity is enforced by not using COMMON statements, simplifying the relation of the data flow to a hierarchy diagram. Simulation results are similar to those of the PARMTEQ code, as expected, because of the similar physical model. Different capabilities, such as those for generating beams matched in detail to the structure, are available in the new code for help in testing new ideas in designing RFQ linacs.

Lysenko, W.P.

1984-04-01

230

QR code security  

Microsoft Academic Search

This paper examines QR Codes and how they can be used to attack both human interaction and automated systems. As the encoded information is intended to be machine readable only, a human cannot distinguish between a valid and a maliciously manipulated QR code. While humans might fall for phishing attacks, automated readers are most likely vulnerable to SQL injections and

Peter Kieseberg; Manuel Leithner; Martin Mulazzani; Lindsay Munroe; Sebastian Schrittwieser; Mayank Sinha; Edgar Weippl

2010-01-01

231

Lichenase and coding sequences  

DOEpatents

The present invention provides a fungal lichenase, i.e., an endo-1,3-1,4-.beta.-D-glucanohydrolase, its coding sequence, recombinant DNA molecules comprising the lichenase coding sequences, recombinant host cells and methods for producing same. The present lichenase is from Orpinomyces PC-2.

Li, Xin-Liang (Athens, GA); Ljungdahl, Lars G. (Athens, GA); Chen, Huizhong (Lawrenceville, GA)

2000-08-15

232

Synthesizing Certified Code  

NASA Technical Reports Server (NTRS)

Code certification is a lightweight approach to demonstrate software quality on a formal level. Its basic idea is to require producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates which can be checked independently. Since code certification uses the same underlying technology as program verification, it also requires many detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding theses annotations to the code is time-consuming and error-prone. We address this problem by combining code certification with automatic program synthesis. We propose an approach to generate simultaneously, from a high-level specification, code and all annotations required to certify generated code. Here, we describe a certification extension of AUTOBAYES, a synthesis tool which automatically generates complex data analysis programs from compact specifications. AUTOBAYES contains sufficient high-level domain knowledge to generate detailed annotations. This allows us to use a general-purpose verification condition generator to produce a set of proof obligations in first-order logic. The obligations are then discharged using the automated theorem E-SETHEO. We demonstrate our approach by certifying operator safety for a generated iterative data classification program without manual annotation of the code.

Whalen, Michael; Schumann, Johann; Fischer, Bernd

2002-01-01

233

Code of Ethics  

ERIC Educational Resources Information Center

The Code of Ethics of the Division for Early Childhood (DEC) of the Council for Exceptional Children is a public statement of principles and practice guidelines supported by the mission of DEC. The foundation of this Code is based on sound ethical reasoning related to professional practice with young children with disabilities and their families…

Division for Early Childhood, Council for Exceptional Children, 2009

2009-01-01

234

Computerized mega code recording.  

PubMed

A system has been developed to facilitate recording of advanced cardiac life support mega code testing scenarios. By scanning a paper "keyboard" using a bar code wand attached to a portable microcomputer, the person assigned to record the scenario can easily generate an accurate, complete, timed, and typewritten record of the given situations and the obtained responses. PMID:3354937

Burt, T W; Bock, H C

1988-04-01

235

Prostate Surgery Codes  

Cancer.gov

Prostate C619 (Except for M9727, 9733, 9741-9742, 9764-9809, 9832, 9840-9931, 9945-9946, 9950-9967, 9975-9992) Do not code an orchiectomy in this field. For prostate primaries, orchiectomies are coded in the data item “Hematologic Transplant and

236

Did You "Code"  

ERIC Educational Resources Information Center

The problem of solving mathematical equations can be quite tough for some students hence they face a great difficulty when applying ideas to the actual process. Students in algebra classes are taught coding in which they write down what they will need to do to solve the equation and this coding makes the students more adept at solving equations…

Clausen, Mary C.

2005-01-01

237

Hadamard transform image coding  

Microsoft Academic Search

The introduction of the fast Fourier transform algorithm has led to the development of the Fourier transform image coding technique whereby the two-dimensional Fourier transform of an image is transmitted over a channel rather than the image itself. This devlopement has further led to a related image coding technique in which an image is transformed by a Hadamard matrix operator.

W. K. Pratt; J. Kane; H. C. Andrews

1969-01-01

238

Corpus Uteri Surgery Codes  

Cancer.gov

Corpus Uteri C540–C559 (Except for M9727, 9733, 9741-9742, 9764-9809, 9832, 9840-9931, 9945-9946, 9950-9967, 9975-9992) [SEER Note: Do not code dilation and curettage (D&C) as Surgery of Primary Site for invasive cancers] Codes 00 None; no surgery

239

Anus Surgery Codes  

Cancer.gov

Anus C210–C218 (Except for M9727, 9733, 9741-9742, 9764-9809, 9832, 9840-9931, 9945-9946, 9950-9967, 9975-9992) [SEER Note: Do not code infrared coagulation as treatment.] Codes 00 None; no surgery of primary site; autopsy ONLY 10 Local tumor

240

Cervix Uteri Surgery Codes  

Cancer.gov

Cervi x Uteri C530–C539 (Except for M9727, 9733, 9741-9742, 9764-9809, 9832, 9840-9931, 9945-9946, 9950-9967, 9975-9992) [SEER Note: Do not code dilation and curettage (D&C) as Surgery of Primary Site for invasive cancers] Codes 00 None; no surgery

241

New quantum MDS codes derived from constacyclic codes  

NASA Astrophysics Data System (ADS)

Quantum maximal-distance-separable (MDS) codes form an important class of quantum codes. It is very hard to construct quantum MDS codes with relatively large minimum distance. In this paper, based on classical constacyclic codes, we construct two classes of quantum MDS codes with parameters $$[[\\lambda(q-1),\\lambda(q-1)-2d+2,d

Wang, Liqi; Zhu, Shixin

2015-01-01

242

COMIT FRANAIS D'HISTOIRE DE LA GOLOGIE -Troisime srie -  

E-print Network

as the first palaeontologist. At the same time, two autodidacts, Bernard Palissy and Leonardo da Vinci, took: : Agricola - Conrad Gesner - Palissy - Leonardo da Vinci - fossiles - XVIth century. INTRODUCTION Parmi les rappelé que deux autodidactes, Bernard Palissy (v. 1510-1589) et Léonard de Vinci (1452-1519) méritent d

Paris-Sud XI, Université de

243

Evolving genetic code  

PubMed Central

In 1985, we reported that a bacterium, Mycoplasma capricolum, used a deviant genetic code, namely UGA, a “universal” stop codon, was read as tryptophan. This finding, together with the deviant nuclear genetic codes in not a few organisms and a number of mitochondria, shows that the genetic code is not universal, and is in a state of evolution. To account for the changes in codon meanings, we proposed the codon capture theory stating that all the code changes are non-disruptive without accompanied changes of amino acid sequences of proteins. Supporting evidence for the theory is presented in this review. A possible evolutionary process from the ancient to the present-day genetic code is also discussed. PMID:18941287

OHAMA, Takeshi; INAGAKI, Yuji; BESSHO, Yoshitaka; OSAWA, Syozo

2008-01-01

244

Serial Code Optimization  

NSDL National Science Digital Library

This guide presents the main features of serial optimisation for computationally intensive codes with a focus on the HECToR computing resources. From a user point of view, two main avenues can be followed when trying to optimise an application. One type of optimisations DO NOT involve modifying the source code (modification may not be desirable); optimisation consists of searching for the best compiler, set of flags and libraries. Another type of optimisations DO involve modifying the source code; in the first instance the programmer must evaluate if a new algorithm is necessary, followed by writing or rewriting optimised code. According to the these choices this guide presents optimisation as a problem of compiler and library selection, followed by a presentation of the key factors that must be considered when writing numerically intensive code.

245

Astrophysics Source Code Library  

NASA Astrophysics Data System (ADS)

The Astrophysics Source Code Library (ASCL), founded in 1999, is a free on-line registry for source codes of interest to astronomers and astrophysicists. The library is housed on the discussion forum for Astronomy Picture of the Day (APOD) and can be accessed at http://ascl.net. The ASCL has a comprehensive listing that covers a significant number of the astrophysics source codes used to generate results published in or submitted to refereed journals and continues to grow. The ASCL currently has entries for over 500 codes; its records are citable and are indexed by ADS. The editors of the ASCL and members of its Advisory Committee were on hand at a demonstration table in the ADASS poster room to present the ASCL, accept code submissions, show how the ASCL is starting to be used by the astrophysics community, and take questions on and suggestions for improving the resource.

Allen, A.; DuPrie, K.; Berriman, B.; Hanisch, R. J.; Mink, J.; Teuben, P. J.

2013-10-01

246

Rateless Coding for Gaussian Channels  

E-print Network

A rateless code-i.e., a rate-compatible family of codes-has the property that codewords of the higher rate codes are prefixes of those of the lower rate ones. A perfect family of such codes is one in which each of the codes ...

Wornell, Gregory W.

247

Pyramid image codes  

NASA Technical Reports Server (NTRS)

All vision systems, both human and machine, transform the spatial image into a coded representation. Particular codes may be optimized for efficiency or to extract useful image features. Researchers explored image codes based on primary visual cortex in man and other primates. Understanding these codes will advance the art in image coding, autonomous vision, and computational human factors. In cortex, imagery is coded by features that vary in size, orientation, and position. Researchers have devised a mathematical model of this transformation, called the Hexagonal oriented Orthogonal quadrature Pyramid (HOP). In a pyramid code, features are segregated by size into layers, with fewer features in the layers devoted to large features. Pyramid schemes provide scale invariance, and are useful for coarse-to-fine searching and for progressive transmission of images. The HOP Pyramid is novel in three respects: (1) it uses a hexagonal pixel lattice, (2) it uses oriented features, and (3) it accurately models most of the prominent aspects of primary visual cortex. The transform uses seven basic features (kernels), which may be regarded as three oriented edges, three oriented bars, and one non-oriented blob. Application of these kernels to non-overlapping seven-pixel neighborhoods yields six oriented, high-pass pyramid layers, and one low-pass (blob) layer.

Watson, Andrew B.

1990-01-01

248

Embedded foveation image coding.  

PubMed

The human visual system (HVS) is highly space-variant in sampling, coding, processing, and understanding. The spatial resolution of the HVS is highest around the point of fixation (foveation point) and decreases rapidly with increasing eccentricity. By taking advantage of this fact, it is possible to remove considerable high-frequency information redundancy from the peripheral regions and still reconstruct a perceptually good quality image. Great success has been obtained previously by a class of embedded wavelet image coding algorithms, such as the embedded zerotree wavelet (EZW) and the set partitioning in hierarchical trees (SPIHT) algorithms. Embedded wavelet coding not only provides very good compression performance, but also has the property that the bitstream can be truncated at any point and still be decoded to recreate a reasonably good quality image. In this paper, we propose an embedded foveation image coding (EFIC) algorithm, which orders the encoded bitstream to optimize foveated visual quality at arbitrary bit-rates. A foveation-based image quality metric, namely, foveated wavelet image quality index (FWQI), plays an important role in the EFIC system. We also developed a modified SPIHT algorithm to improve the coding efficiency. Experiments show that EFIC integrates foveation filtering with foveated image coding and demonstrates very good coding performance and scalability in terms of foveated image quality measurement. PMID:18255485

Wang, Z; Bovik, A C

2001-01-01

249

Quantum convolutional codes derived from constacyclic codes  

NASA Astrophysics Data System (ADS)

In this paper, three families of quantum convolutional codes are constructed. The first one and the second one can be regarded as a generalization of Theorems 3, 4, 7 and 8 [J. Chen, J. Li, F. Yang and Y. Huang, Int. J. Theor. Phys., doi:10.1007/s10773-014-2214-6 (2014)], in the sense that we drop the constraint q ? 1 (mod 4). Furthermore, the second one and the third one attain the quantum generalized Singleton bound.

Yan, Tingsu; Huang, Xinmei; Tang, Yuansheng

2014-12-01

250

Banner Index Codes The Index code is a data-entry shortcut for the Fund code, Org code, and Program code in Banner  

E-print Network

fund number, your index code is the *same* as your fund number 1 . For older research projects, your index code is the same as the 6-digit ORS research project (the old FRS) number beginning with a 4Banner Index Codes The Index code is a data-entry shortcut for the Fund code, Org code, and Program

251

Three-Dimensional Combined Diversity Coding and Error Control Coding: Code Design and  

E-print Network

-output communications, a general term for complex coding is signal space diversity [?]; 2) for two- dimensional channelsThree-Dimensional Combined Diversity Coding and Error Control Coding: Code Design and Diversity Lab of Information Coding and Transmission Southwest Jiaotong University, Chengdu 610031, China E

Blostein, Steven D.

252

Two-Dimensional Modulation Codes  

Microsoft Academic Search

A new class of run-length-limited codes in introduced. These codes are called two-dimensional or multitrack modulation codes. Two-dimensional modulation codes provide substantial data storage density increases for multitrack recording systems by operating on multiple tracks in parallel. Procedures for computing the capacity of these new codes are given along with fast algorithms for implementing these procedures. Examples of two-dimensional codes

Michael W. Marcellin; Harold J. Weber

1992-01-01

253

What's coming in 2012 codes  

E-print Network

The 2012 IECC America?s Model Building Energy Code November 9, 2011 Presentation to Clean Air Through Energy Efficiency Conference Dallas, TX Eric Lacey Responsible Energy Codes Alliance Responsible Energy Codes Alliance ? A broad....S. EPA) RECA Resources Available ? 2012 IECC RECA Compliance Guides ? Available on www.reca-codes.com ? Hard copies available directly from RECA 202-339-6366 Eric Lacey, Chairman Responsible Energy Codes Alliance eric@reca-codes.com 202...

Lacey, E

2011-01-01

254

Rectosigmoid Junction Coding Guidelines  

Cancer.gov

Coding Guidelines Rectosigmoid Junction C199 Primary Site A tumor is classified as rectosigmoid when differentiation between rectum and sigmoid is not possible. A tumor is classified as rectal if • lower margin lies less than 16 cm from the anal

255

Quantum error control codes  

E-print Network

, the classical Hamming bound can be stated as tX i=0 n i ¶ (q ˇ1)i • qnˇk; (2.9) 16 where t = b(dˇ1)=2c. Codes that attain Hamming bound with equality are classifled as perfect codes. Let every codeword be represented by a sphere of radius t. The interpretation..., the classical Hamming bound can be stated as tX i=0 n i ¶ (q ˇ1)i • qnˇk; (2.9) 16 where t = b(dˇ1)=2c. Codes that attain Hamming bound with equality are classifled as perfect codes. Let every codeword be represented by a sphere of radius t. The interpretation...

Abdelhamid Awad Aly Ahmed, Sala

2008-10-10

256

Subband coding of images  

Microsoft Academic Search

Subband coding has become quite popular for the source encoding of speech. This paper presents a simple yet efficient extension of this concept to the source coding of images. We specify the constraints for a set of two-dimensional quadrature mirror filters (QMF's) for a particular frequency-domain partition, and show that these constraints are satisfied by a separable combination of one-dimensional

JOHN W. WOODS; S. O'Neil

1986-01-01

257

LORASR CODE DEVELOPMENT  

Microsoft Academic Search

The LORASR code is specialized on the beam dynamics design of Separate Function DTL's based on the 'Combined 0 Degree Structure (KONUS)' beam dynamics concept. The code has been used for the beam dynamics design of several linacs which are in operation (GSI-HLI, GSI-HSI, CERN Linac 3, TRIUMF ISAC-I) or are scheduled to start beam operation in the near future

R. Tiede; G. Clemente; H. Podlech; U. Ratzinger; A. Sauer; S. Minaev

2006-01-01

258

Seals Flow Code Development  

NASA Technical Reports Server (NTRS)

In recognition of a deficiency in the current modeling capability for seals, an effort was established by NASA to develop verified computational fluid dynamic concepts, codes, and analyses for seals. The objectives were to develop advanced concepts for the design and analysis of seals, to effectively disseminate the information to potential users by way of annual workshops, and to provide experimental verification for the models and codes under a wide range of operating conditions.

1991-01-01

259

Priority subband image coding  

NASA Astrophysics Data System (ADS)

In this paper a new approach based on the subband decomposition (SBD) for compression and progressive transmission of images is presented. The novelty of this approach is that the transform coefficients of all image subbands are coded and transmitted in absolute magnitude order. The ordered-by-magnitude transmission is accomplished by using partition priority coding (PPC) a new source coding method that allows the simultaneous transmission of the coefficients of a data set in an ordered fashion along with position information. Using this approach, coding and transmission are adaptable to the characteristics of each individual image and therefore very efficient. Another advantage of this approach is its high progression effectiveness. Since the largest transform coefficients that capture the most important characteristics of images are coded and transmitted first this method is well suited for progressive image transmission (PIT). Further compression of the image data is achieved by adaptive multiple subsources distribution technique based on arithmetic coding. Experiments are presented where the new SBD approach was tested. It is shown that it compares favorably with previously reported discrete cosine transform (DCT) and subband image codecs and is also very effective for progressive image transmission.

Yu, Steve S.; Galatsanos, Nikolas P.; Huang, Yunming G.

1992-08-01

260

Punctured Elias Codes for variablelength coding of the integers  

E-print Network

Punctured Elias Codes for variable­length coding of the integers Peter Fenwick Technical Report 137 of the Elias g code which is shown to be better than other codes for some distributions. #12; 1. Compact and are instantaneous or nearly so. Following Elias[3], we first introduce two preliminary representations which

Fenwick, Peter

261

Falcon Codes: Fast, Authenticated LT Codes Cornell Tech  

E-print Network

Falcon Codes: Fast, Authenticated LT Codes Ari Juels Cornell Tech New York City NY, USA juels.triandopoulos@rsa.com Abstract--In this paper, we introduce Falcon codes, a class of authenticated error correcting codes) they allow for very efficient encoding and decoding times, even linear in the message length. We study Falcon

262

Prioritized LT Codes  

NASA Technical Reports Server (NTRS)

The original Luby Transform (LT) coding scheme is extended to account for data transmissions where some information symbols in a message block are more important than others. Prioritized LT codes provide unequal error protection (UEP) of data on an erasure channel by modifying the original LT encoder. The prioritized algorithm improves high-priority data protection without penalizing low-priority data recovery. Moreover, low-latency decoding is also obtained for high-priority data due to fast encoding. Prioritized LT codes only require a slight change in the original encoding algorithm, and no changes at all at the decoder. Hence, with a small complexity increase in the LT encoder, an improved UEP and low-decoding latency performance for high-priority data can be achieved. LT encoding partitions a data stream into fixed-sized message blocks each with a constant number of information symbols. To generate a code symbol from the information symbols in a message, the Robust-Soliton probability distribution is first applied in order to determine the number of information symbols to be used to compute the code symbol. Then, the specific information symbols are chosen uniform randomly from the message block. Finally, the selected information symbols are XORed to form the code symbol. The Prioritized LT code construction includes an additional restriction that code symbols formed by a relatively small number of XORed information symbols select some of these information symbols from the pool of high-priority data. Once high-priority data are fully covered, encoding continues with the conventional LT approach where code symbols are generated by selecting information symbols from the entire message block including all different priorities. Therefore, if code symbols derived from high-priority data experience an unusual high number of erasures, Prioritized LT codes can still reliably recover both high- and low-priority data. This hybrid approach decides not only "how to encode" but also "what to encode" to achieve UEP. Another advantage of the priority encoding process is that the majority of high-priority data can be decoded sooner since only a small number of code symbols are required to reconstruct high-priority data. This approach increases the likelihood that high-priority data is decoded first over low-priority data. The Prioritized LT code scheme achieves an improvement in high-priority data decoding performance as well as overall information recovery without penalizing the decoding of low-priority data, assuming high-priority data is no more than half of a message block. The cost is in the additional complexity required in the encoder. If extra computation resource is available at the transmitter, image, voice, and video transmission quality in terrestrial and space communications can benefit from accurate use of redundancy in protecting data with varying priorities.

Woo, Simon S.; Cheng, Michael K.

2011-01-01

263

Laplacian sparse coding, Hypergraph Laplacian sparse coding, and applications.  

PubMed

Sparse coding exhibits good performance in many computer vision applications. However, due to the overcomplete codebook and the independent coding process, the locality and the similarity among the instances to be encoded are lost. To preserve such locality and similarity information, we propose a Laplacian sparse coding (LSc) framework. By incorporating the similarity preserving term into the objective of sparse coding, our proposed Laplacian sparse coding can alleviate the instability of sparse codes. Furthermore, we propose a Hypergraph Laplacian sparse coding (HLSc), which extends our Laplacian sparse coding to the case where the similarity among the instances defined by a hypergraph. Specifically, this HLSc captures the similarity among the instances within the same hyperedge simultaneously, and also makes the sparse codes of them be similar to each other. Both Laplacian sparse coding and Hypergraph Laplacian sparse coding enhance the robustness of sparse coding. We apply the Laplacian sparse coding to feature quantization in Bag-of-Words image representation, and it outperforms sparse coding and achieves good performance in solving the image classification problem. The Hypergraph Laplacian sparse coding is also successfully used to solve the semi-auto image tagging problem. The good performance of these applications demonstrates the effectiveness of our proposed formulations in locality and similarity preservation. PMID:22392702

Gao, Shenghua; Tsang, Ivor Wai-Hung; Chia, Liang-Tien

2013-01-01

264

Coding for urologic office procedures.  

PubMed

This article summarizes current best practices for documenting, coding, and billing common office-based urologic procedures. Topics covered include general principles, basic and advanced urologic coding, creation of medical records that support compliant coding practices, bundled codes and unbundling, global periods, modifiers for procedure codes, when to bill for evaluation and management services during the same visit, coding for supplies, and laboratory and radiology procedures pertinent to urology practice. Detailed information is included for the most common urology office procedures, and suggested resources and references are provided. This information is of value to physicians, office managers, and their coding staff. PMID:24182979

Dowling, Robert A; Painter, Mark

2013-11-01

265

Accumulate Repeat Accumulate Coded Modulation  

NASA Technical Reports Server (NTRS)

In this paper we propose an innovative coded modulation scheme called 'Accumulate Repeat Accumulate Coded Modulation' (ARA coded modulation). This class of codes can be viewed as serial turbo-like codes, or as a subclass of Low Density Parity Check (LDPC) codes that are combined with high level modulation. Thus at the decoder belief propagation can be used for iterative decoding of ARA coded modulation on a graph, provided a demapper transforms the received in-phase and quadrature samples to reliability of the bits.

Abbasfar, Aliazam; Divsalar, Dariush; Yao, Kung

2004-01-01

266

Quantum convolutional stabilizer codes  

E-print Network

commute or anticommute. 3. Every element of G is unitary, since X, Y and Z are all unitary. From equation 2.5, we get, hĂijEjĂji = hĂijMEjĂji = ˇhĂijEjĂji = 0 (2.6) Therefore the code satisŻes the following condition, hĂijEyaEbjĂji = 0 (2.7) whenever E... Hamming distance between all pairs of distinguish- able codewords of the corresponding truncated code Qi. qdi ´ minfqd(jĂ0ii;jĂ"i i) j hĂ0ijĂ"i i = 0g wherejĂ0ii;jĂ"i i 2 Qi (3.10) The minimum distance qdmin of an (n;k) quantum convolutional code...

Chinthamani, Neelima

2004-09-30

267

Seals Code Development Workshop  

NASA Technical Reports Server (NTRS)

Seals Workshop of 1995 industrial code (INDSEAL) release include ICYL, GCYLT, IFACE, GFACE, SPIRALG, SPIRALI, DYSEAL, and KTK. The scientific code (SCISEAL) release includes conjugate heat transfer and multidomain with rotordynamic capability. Several seals and bearings codes (e.g., HYDROFLEX, HYDROTRAN, HYDROB3D, FLOWCON1, FLOWCON2) are presented and results compared. Current computational and experimental emphasis includes multiple connected cavity flows with goals of reducing parasitic losses and gas ingestion. Labyrinth seals continue to play a significant role in sealing with face, honeycomb, and new sealing concepts under investigation for advanced engine concepts in view of strict environmental constraints. The clean sheet approach to engine design is advocated with program directions and anticipated percentage SFC reductions cited. Future activities center on engine applications with coupled seal/power/secondary flow streams.

Hendricks, Robert C. (Compiler); Liang, Anita D. (Compiler)

1996-01-01

268

Code inspection instructional validation  

NASA Technical Reports Server (NTRS)

The Shuttle Data Systems Branch (SDSB) of the Flight Data Systems Division (FDSD) at Johnson Space Center contracted with Southwest Research Institute (SwRI) to validate the effectiveness of an interactive video course on the code inspection process. The purpose of this project was to determine if this course could be effective for teaching NASA analysts the process of code inspection. In addition, NASA was interested in the effectiveness of this unique type of instruction (Digital Video Interactive), for providing training on software processes. This study found the Carnegie Mellon course, 'A Cure for the Common Code', effective for teaching the process of code inspection. In addition, analysts prefer learning with this method of instruction, or this method in combination with other methods. As is, the course is definitely better than no course at all; however, findings indicate changes are needed. Following are conclusions of this study. (1) The course is instructionally effective. (2) The simulation has a positive effect on student's confidence in his ability to apply new knowledge. (3) Analysts like the course and prefer this method of training, or this method in combination with current methods of training in code inspection, over the way training is currently being conducted. (4) Analysts responded favorably to information presented through scenarios incorporating full motion video. (5) Some course content needs to be changed. (6) Some content needs to be added to the course. SwRI believes this study indicates interactive video instruction combined with simulation is effective for teaching software processes. Based on the conclusions of this study, SwRI has outlined seven options for NASA to consider. SwRI recommends the option which involves creation of new source code and data files, but uses much of the existing content and design from the current course. Although this option involves a significant software development effort, SwRI believes this option will produce the most effective results.

Orr, Kay; Stancil, Shirley

1992-01-01

269

Aeroacoustic Prediction Codes  

NASA Technical Reports Server (NTRS)

This report describes work performed on Contract NAS3-27720AoI 13 as part of the NASA Advanced Subsonic Transport (AST) Noise Reduction Technology effort. Computer codes were developed to provide quantitative prediction, design, and analysis capability for several aircraft engine noise sources. The objective was to provide improved, physics-based tools for exploration of noise-reduction concepts and understanding of experimental results. Methods and codes focused on fan broadband and 'buzz saw' noise and on low-emissions combustor noise and compliment work done by other contractors under the NASA AST program to develop methods and codes for fan harmonic tone noise and jet noise. The methods and codes developed and reported herein employ a wide range of approaches, from the strictly empirical to the completely computational, with some being semiempirical analytical, and/or analytical/computational. Emphasis was on capturing the essential physics while still considering method or code utility as a practical design and analysis tool for everyday engineering use. Codes and prediction models were developed for: (1) an improved empirical correlation model for fan rotor exit flow mean and turbulence properties, for use in predicting broadband noise generated by rotor exit flow turbulence interaction with downstream stator vanes: (2) fan broadband noise models for rotor and stator/turbulence interaction sources including 3D effects, noncompact-source effects. directivity modeling, and extensions to the rotor supersonic tip-speed regime; (3) fan multiple-pure-tone in-duct sound pressure prediction methodology based on computational fluid dynamics (CFD) analysis; and (4) low-emissions combustor prediction methodology and computer code based on CFD and actuator disk theory. In addition. the relative importance of dipole and quadrupole source mechanisms was studied using direct CFD source computation for a simple cascadeigust interaction problem, and an empirical combustor-noise correlation model was developed from engine acoustic test results. This work provided several insights on potential approaches to reducing aircraft engine noise. Code development is described in this report, and those insights are discussed.

Gliebe, P; Mani, R.; Shin, H.; Mitchell, B.; Ashford, G.; Salamah, S.; Connell, S.; Huff, Dennis (Technical Monitor)

2000-01-01

270

Securing mobile code.  

SciTech Connect

If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements on this method as well as demonstrating its implementation for various algorithms. We also examine cryptographic techniques to achieve obfuscation including encrypted functions and offer a new application to digital signature algorithms. To better understand the lack of security proofs for obfuscation techniques, we examine in detail general theoretical models of obfuscation. We explain the need for formal models in order to obtain provable security and the progress made in this direction thus far. Finally we tackle the problem of verifying remote execution. We introduce some methods of verifying remote exponentiation computations and some insight into generic computation checking.

Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

2004-10-01

271

The Code Project  

NSDL National Science Digital Library

The Code Project is an online repository of free tutorials, source code, and articles about a wide variety of programming languages. Sections devoted to C++, HTML, DirectX, and .NET are among the resources available on the site. Discussion forums and message boards are excellent places for developers to get quick answers to their questions from other members of the community (this requires a short registration). Featured articles and industry news keep the site up-to-date. There are some advertisements on the site, but they do not detract from the content.

272

Decode de Code  

NSDL National Science Digital Library

In this activity, users must decode a scientific quote that has been encoded by the computer. The computer will generate an "alphabet" (either random or rotated) and then substitute every letter of the real quote with the computer generated alphabet's letter. To decode the code, you must look for patterns of letters and then substitute guesses for the real letters.

273

Code of Ethics.  

ERIC Educational Resources Information Center

The American Sociological Association's code of ethics for sociologists is presented. For sociological research and practice, 10 requirements for ethical behavior are identified, including: maintaining objectivity and integrity; fully reporting findings and research methods, without omission of significant data; reporting fully all sources of…

American Sociological Association, Washington, DC.

274

Multiple trellis coded modulation  

NASA Technical Reports Server (NTRS)

A technique for designing trellis codes to minimize bit error performance for a fading channel. The invention provides a criteria which may be used in the design of such codes which is significantly different from that used for average white Gaussian noise channels. The method of multiple trellis coded modulation of the present invention comprises the steps of: (a) coding b bits of input data into s intermediate outputs; (b) grouping said s intermediate outputs into k groups of s.sub.i intermediate outputs each where the summation of all s.sub.i,s is equal to s and k is equal to at least 2; (c) mapping each of said k groups of intermediate outputs into one of a plurality of symbols in accordance with a plurality of modulation schemes, one for each group such that the first group is mapped in accordance with a first modulation scheme and the second group is mapped in accordance with a second modulation scheme; and (d) outputting each of said symbols to provide k output symbols for each b bits of input data.

Simon, Marvin K. (Inventor); Divsalar, Dariush (Inventor)

1990-01-01

275

Bladder Surgery Codes  

Cancer.gov

Bladder C670–C679 (Except for M9727, 9733, 9741-9742, 9764-9809, 9832, 9840-9931, 9945-9946, 9950-9967, 9975-9992) Codes 00 None; no surgery of primary site; autopsy ONLY 10 Local tumor destruction, NOS 11 Photodynamic therapy (PDT) 12

276

Minimal TCB Code Execution  

Microsoft Academic Search

We propose an architecture that allows code to execute in complete isolation from other software while trusting only a tiny software base that is orders of magnitude smaller than even minimalist virtual machine monitors. Our technique also enables more meaningful attestation than previous proposals, since only measurements of the security-sensitive portions of an application need to be included. We achieve

Jonathan M. Mccune; Bryan Parno; Adrian Perrig; Michael K. Reiter; Arvind Seshadri

2007-01-01

277

Stomach Surgery Codes  

Cancer.gov

Stomach C160–C169 (Except for M9727, 9733, 9741-9742, 9764-9809, 9832, 9840-9931, 9945-9946, 9950-9967, 9975-9992) Codes 00 None; no surgery of primary site; autopsy ONLY 10 Local tumor destruction, NOS 11 Photodynamic therapy (PDT) 12 Electrocautery;

278

Parotid Surgery Codes  

Cancer.gov

Parotid and Other Unspecified Glands Parotid Gland C079, Major Salivary Glands C080–C089 (Except for M9727, 9733, 9741-9742, 9764-9809, 9832, 9840-9931, 9945-9946, 9950-9967, 9975-9992) Codes 00 None; no surgery of primary site; autopsy ONLY

279

Code Optimization Techniques  

SciTech Connect

Computers transfer data in a number of different ways. Whether through a serial port, a parallel port, over a modem, over an ethernet cable, or internally from a hard disk to memory, some data will be lost. To compensate for that loss, numerous error detection and correction algorithms have been developed. One of the most common error correction codes is the Reed-Solomon code, which is a special subset of BCH (Bose-Chaudhuri-Hocquenghem) linear cyclic block codes. In the AURA project, an unmanned aircraft sends the data it collects back to earth so it can be analyzed during flight and possible flight modifications made. To counter possible data corruption during transmission, the data is encoded using a multi-block Reed-Solomon implementation with a possibly shortened final block. In order to maximize the amount of data transmitted, it was necessary to reduce the computation time of a Reed-Solomon encoding to three percent of the processor's time. To achieve such a reduction, many code optimization techniques were employed. This paper outlines the steps taken to reduce the processing time of a Reed-Solomon encoding and the insight into modern optimization techniques gained from the experience.

MAGEE,GLEN I.

2000-08-03

280

Rectum Surgery Codes  

Cancer.gov

Rectum C209 (Except for M9727, 9733, 9741-9742, 9764-9809, 9832, 9840-9931, 9945-9946, 9950-9967, 9975-9992) Code removal/surgical ablation of single or multiple liver metastases under the data item Surgical Procedure/Other Site (NAACCR Item #1294)

281

Colon Surgery Codes  

Cancer.gov

Colon C180–C189 (Except for M9727, 9733, 9741-9742, 9764-9809, 9832, 9840-9931, 9945-9946, 9950-9967, 9975-9992) Code removal/surgical ablation of single or multiple liver metastases under the data item Surgical Procedure/Other Site (NAACCR Item

282

Esophagus Coding Guidelines  

Cancer.gov

Coding Guidelines ESOPHAGUS C150-C155, C158-C159 Primary Site There are two systems that divide the esophagus into three subsites. The first system divides the esophagus into the upper third, middle third, and lower third. The second system describes

283

George Washington's Secret Code  

NSDL National Science Digital Library

In this online interactive, learners decipher codes used by George Washington to safeguard messages during the American Revolution. Learners use a key to decode an excerpt from "Rules of Civility & Decent Behaviour in Company and Conversation," which Washington copied as a writing exercise when he was a teenager and historians believed influenced the development of his character.

Service, National P.

2011-08-20

284

CODE OF FEDERAL REGULATIONS  

EPA Science Inventory

The Code of Federal Regulations (CFR) is an annually revised codification of the general and permanent rules published in the Federal Register by the executive departments and agencies of the Federal Government. The CFR is divided into 50 titles which represent broad areas subje...

285

Colon Surgery Codes  

Cancer.gov

C olon C180–C189 (Except for M9727, 9733, 9741-9742, 9764-9809, 9832, 9840-9931, 9945-9946, 9950-9967, 9975-9992) Code removal/surgical ablation of single or multiple liver metastases under the data item Surgical Procedure/Other Site (NAACCR Item

286

Embedded foveation image coding  

Microsoft Academic Search

The human visual system {(HVS)} is highly space-variant in sampling, coding, processing, and understanding. The spatial resolution of the {HVS} is highest around the point of fixation (foveation point) and decreases rapidly with increasing eccentricity. By taking advantage of this fact, it is possible to remove considerable high-frequency information redundancy from the peripheral regions and still reconstruct a perceptually good

Zhou Wang; Alan Conrad Bovik

2001-01-01

287

Block-coded communications  

NASA Technical Reports Server (NTRS)

Theory for block-coded telemetry systems is useful in testing performance of one- and two-way, phase-coherent telemetry systems when double-conversion, superheterodyne, phase-locked receiver, preceded by bandpass limiter is used to track carrier.

Lindsey, W. C.

1970-01-01

288

Environmental Fluid Dynamics Code  

EPA Science Inventory

The Environmental Fluid Dynamics Code (EFDC)is a state-of-the-art hydrodynamic model that can be used to simulate aquatic systems in one, two, and three dimensions. It has evolved over the past two decades to become one of the most widely used and technically defensible hydrodyn...

289

Lung Surgery Codes  

Cancer.gov

Lung C340–C349 (Except for M9727, 9733, 9741-9742, 9764-9809, 9832, 9840-9931, 9945-9946, 9950-9967, 9975-9992) Codes 00 None; no surgery of primary site; autopsy ONLY 19 Local tumor destruction or excision, NOS Unknown whether a specimen was

290

Kidney Surgery Codes  

Cancer.gov

Kidney, Renal Pelvis, and Ureter Kidney C649, Renal Pelvis C659, Ureter C669 (Except for M9727, 9733, 9741-9742, 9764-9809, 9832, 9840-9931, 9945-9946, 9950-9967, 9975-9992) Codes 00 None; no surgery of primary site; autopsy ONLY 10 Local tumor

291

Preliminary Assessment of Turbomachinery Codes  

NASA Technical Reports Server (NTRS)

This report assesses different CFD codes developed and currently being used at Glenn Research Center to predict turbomachinery fluid flow and heat transfer behavior. This report will consider the following codes: APNASA, TURBO, GlennHT, H3D, and SWIFT. Each code will be described separately in the following section with their current modeling capabilities, level of validation, pre/post processing, and future development and validation requirements. This report addresses only previously published and validations of the codes. However, the codes have been further developed to extend the capabilities of the codes.

Mazumder, Quamrul H.

2007-01-01

292

Code Patterns for Automatically Validating Requirements-to-Code Traces  

E-print Network

Code Patterns for Automatically Validating Requirements-to-Code Traces Achraf Ghabi Johannes Kepler University 4040 Linz, Austria achraf.ghabi@jku.at Alexander Egyed Johannes Kepler University 4040 Linz

Egyed, Alexander

293

Coding and Payment Changes for Medicare Drug Administration Codes  

Cancer.gov

CODING AND PAYM ENT CHAN GES FOR MEDICARE DRUG ADMINIST RATION CODES (Payment amounts reflect national averages fo r office-bas e d (non-facility ) setting s ) *See notes below for more informa t ion 2 005 Medicare Co des 2005 Code De scription

294

New optimal asymmetric quantum codes from constacyclic codes  

NASA Astrophysics Data System (ADS)

In this paper, we construct two classes of asymmetric quantum codes by using constacyclic codes. The first class is the asymmetric quantum codes with parameters [[q2 + 1, q2 + 1 - 2(t + k + 1), (2k + 2)/(2t + 2)

Zhang, Guanghui; Chen, Bocong; Li, Liangchen

2014-06-01

295

Code division multiplexing lightwave networks based upon optical code conversion  

Microsoft Academic Search

Lightwave networks realized through code division multiple access techniques are extensively studied to determine their ultimate capabilities. Here, these concepts are extended to network implementation by introducing an optical code division multiplexing (OCDM) multihop strategy using optical coding. It is shown that this approach is effective in scaling up existing wavelength division multiplexing (WDM) networks without a significant drain of

Ken-ichi Kitayama

1998-01-01

296

Confocal coded aperture imaging  

DOEpatents

A method for imaging a target volume comprises the steps of: radiating a small bandwidth of energy toward the target volume; focusing the small bandwidth of energy into a beam; moving the target volume through a plurality of positions within the focused beam; collecting a beam of energy scattered from the target volume with a non-diffractive confocal coded aperture; generating a shadow image of said aperture from every point source of radiation in the target volume; and, reconstructing the shadow image into a 3-dimensional image of the every point source by mathematically correlating the shadow image with a digital or analog version of the coded aperture. The method can comprise the step of collecting the beam of energy scattered from the target volume with a Fresnel zone plate.

Tobin, Jr., Kenneth William (Harriman, TN); Thomas, Jr., Clarence E. (Knoxville, TN)

2001-01-01

297

Network coding for anonymous broadcast  

E-print Network

This thesis explores the use of network coding for anonymous broadcast. Network coding, the technique of transmitting or storing mixtures of messages rather than individual messages, can provide anonymity with its mixing ...

Sergeev, Ivan A

2013-01-01

298

Software Cartography and Code Navigation  

E-print Network

Software Cartography and Code Navigation Inauguraldissertation der Philosophisch. Nierstrasz Institut f¨ur Informatik und angewandte Mathematik #12;#12;Software Cartography and Code Cartography, an approach to create spatial on- screen visualization of software systems based on non

Nierstrasz, Oscar

299

Arithmetic coding for data compression  

Microsoft Academic Search

The state of the art in data compression is arithmetic coding, not the better-known Huffman method. Arithmetic coding gives greater compression, is faster for adaptive models, and clearly separates the model from the channel encoding.

Ian H. witten; Radford M. Neal; John Gerald Cleary

1987-01-01

300

Status of MARS Code  

SciTech Connect

Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

N.V. Mokhov

2003-04-09

301

Color-coded Continents  

NSDL National Science Digital Library

Paleogeographic reconstructions for time periods within 620 million years to present are featured on this site. These global paleogeographic maps are viewed by scrolling down the page and are arranged in order of increasing age beginning with the present. Landmasses are color-coded to illustrate the movement of plates through time. The site also discusses how the maps are constructed and what lines of evidence are most commonly used, and includes several links to additional information.

Scotese, C.; Survey, United S.

302

Profile guided code positioning  

Microsoft Academic Search

This paper presents the results of our investigation of code positioning techniques using execution profile data as input into the compilation process. The primary objective of the positioning is to reduce the overhead of the instruction memory hierarchy.After initial investigation in the literature, we decided to implement two prototypes for the Hewlett-Packard Precision Architecture (PA-RISC). The first, built on top

Karl Pettis; Robert C. Hansen; Jack W. Davidson

2004-01-01

303

Reeds computer code  

NASA Technical Reports Server (NTRS)

The REEDS (rocket exhaust effluent diffusion single layer) computer code is used for the estimation of certain rocket exhaust effluent concentrations and dosages and their distributions near the Earth's surface following a rocket launch event. Output from REEDS is used in producing near real time air quality and environmental assessments of the effects of certain potentially harmful effluents, namely HCl, Al2O3, CO, and NO.

Bjork, C.

1981-01-01

304

TYCHO: Stellar evolution code  

NASA Astrophysics Data System (ADS)

TYCHO is a general, one dimensional (spherically symmetric) stellar evolution code written in structured Fortran 77; it is designed for hydrostatic and hydrodynamic stages including mass loss, accretion, pulsations and explosions. Mixing and convection algorithms are based on 3D time-dependent simulations. It offers extensive on-line graphics using Tim Pearson's PGPLOT with X-windows and runs effectively on Linux and Mac OS X laptop and desktop computers.

Arnett, D.

2013-03-01

305

VAC: Versatile Advection Code  

NASA Astrophysics Data System (ADS)

The Versatile Advection Code (VAC) is a freely available general hydrodynamic and magnetohydrodynamic simulation software that works in 1, 2 or 3 dimensions on Cartesian and logically Cartesian grids. VAC runs on any Unix/Linux system with a Fortran 90 (or 77) compiler and Perl interpreter. VAC can run on parallel machines using either the Message Passing Interface (MPI) library or a High Performance Fortran (HPF) compiler.

Tóth, Gábor; Keppens, Rony

2012-07-01

306

Video coding: Death is not near  

Microsoft Academic Search

Efficient compression and network compatibility are two challenging tasks for video coding. This paper provides an overview of advanced techniques for the next generation video coding including high efficiency video coding, content-based video coding, distributed video coding, scalable video coding and multiple description video coding. Keywords—video compression, video transmission. I. INTRODUCTION With the popularity of digital video applications, efficiently representing

Meilin Yang; Ye He; Fengqing Zhu; Marc Bosch; Mary Comer; Edward J. Delp

2011-01-01

307

MELCOR computer code manuals  

SciTech Connect

MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

1995-03-01

308

Time Dependence in Plasma Codes  

E-print Network

Time-dependent plasma codes are a natural extension of static nonequilibrium plasma codes. Comparing relevant timescales will determine whether or not time-dependent treatment is necessary. In this article I outline the ingredients for a time-dependent plasma code in a homogeneous medium and discuss the computational method. In the second half of the article I describe recombination in the early Universe as a detailed example of a problem whose solution requires a time-dependent plasma code.

S. Seager

2001-06-12

309

On Quaternary MacDonald Codes  

E-print Network

This paper studies two families of codes over Z 4 , MacDonald codes of type # and type #. The torsion code, weight distribution, and Gray image properties are studied. Some interesting optimal binary codes are also obtained. Two nonlinear families of binary codes are obtained via the Gray map. Keywords: Codes over rings, Gray image, simplex codes, torsion code, weight distribution, MacDonald codes, projective multiset. 1

Charles Colbourn; Manish K. Gupta

310

Ethical Codes in the Professions.  

ERIC Educational Resources Information Center

Whether the measurement profession should consider developing and adopting a code of professional conduct is explored after a brief review of existing references to standards of conduct and a review of other professional codes. Issues include the need for a code of ethics, its usefulness, and its enforcement. (SLD)

Schmeiser, Cynthia B.

1992-01-01

311

Ptolemy Coding Style Christopher Brooks  

E-print Network

Ptolemy Coding Style Christopher Brooks Edward A. Lee Electrical Engineering and Computer Sciences;Ptolemy Coding Style Christopher Brooks1 , Edward A. Lee1 , 1 {cxh,eal}@eecs.berkeley.edu, 1 University to the academic community. This document describes the coding style used in Ptolemy II, a package with 550K lines

312

Universal space-time coding  

Microsoft Academic Search

A universal framework is developed for constructing full-rate and full-diversity coherent space-time codes for systems with arbitrary numbers of transmit and receive antennas. The pro- posed framework combines space-time layering concepts with al- gebraic component codes optimized for single-input-single-output (SISO) channels. Each component code is assigned to a \\

Hesham El Gamal; Mohamed Oussama Damen

2003-01-01

313

Coding and Cryptography Chris Wuthrich  

E-print Network

£ ¢ ¡ Coding and Cryptography Chris Wuthrich £ ¢ ¡ #12;Contents Information Codes . . . . . . . . . . . . . . . . . . . . 37 II Cryptography 39 II.1 Modular Arithmetic Problem sheets 63 Bibliography 71 2 #12;Coding and Cryptography G13CCR cw '13 £ ¢ ¡ Essential

Wuthrich, Christian

314

(significance maps) (distributed source coding;  

E-print Network

(distributed video coding; DVC) )(XH )(YH XY (entropy) ),( YXH XY Shannon (entropy coding theorem) XY] (wavelet transform) SPIHT[13] Wyner-Ziv frame turbo code SPIHT [12] [11][12] side information Turbo Encoder Encoder Buffer Decoder Buffer Turbo Decoder CRC Decoder Reconstruct Wavelet coefficient

Yang, Shih-Hsuan

315

Hu man minimum redundancy coding  

E-print Network

14 Hu#11;man minimum redundancy coding It has become usual to store data and transmit messages a particular coded text. In a classic paper, published in 1952, David Hu#11;man described an algorithm to #12;nd the set of codes that would minimize the expected length 175 #12; 176 Hu#11;man minimum redundancy

Jones, Geraint

316

ICICLE: groupware for code inspection  

Microsoft Academic Search

ICICLE1 (“Intelligent Code Inspection Environment in a C Language Environment”) is a multifarious software system intended to augment the process of formal code inspection. It offers assistance in a number of activities, including knowledge-based analysis and annotations of source code, and computer supported cooperative discussion and finalization of inspectors' comments during inspection meetings. This paper reports the implementation of ICICLE

Laurence Brothers; V. Sembugamoorthy; M. Muller

1990-01-01

317

Energy Codes and Standards: Facilities  

SciTech Connect

Energy codes and standards play a vital role in the marketplace by setting minimum requirements for energy-efficient design and construction. They outline uniform requirements for new buildings as well as additions and renovations. This article covers basic knowledge of codes and standards; development processes of each; adoption, implementation, and enforcement of energy codes and standards; and voluntary energy efficiency programs.

Bartlett, Rosemarie; Halverson, Mark A.; Shankle, Diana L.

2007-01-01

318

Noiseless Coding Of Magnetometer Signals  

NASA Technical Reports Server (NTRS)

Report discusses application of noiseless data-compression coding to digitized readings of spaceborne magnetometers for transmission back to Earth. Objective of such coding to increase efficiency by decreasing rate of transmission without sacrificing integrity of data. Adaptive coding compresses data by factors ranging from 2 to 6.

Rice, Robert F.; Lee, Jun-Ji

1989-01-01

319

Robust Space Time Code for Channel Coded MIMO Systems  

NASA Astrophysics Data System (ADS)

Various space time code (STC) designs have been proposed to obtain full diversity at full rate in multiple-input multiple-output (MIMO) channels for uncoded systems. However, commercial wireless systems typically employ powerful channel codes such as turbo codes and low density parity check (LDPC) codes together with an STC. For these applications, an STC optimized for uncoded systems may not provide the best performance. In this paper, an STC with relatively good performance over a wide range of code rates is proposed. Simulation results show that the performance of the proposed robust STC is very close to the best performance of the SM and the Golden code in various code rates.

Byun, Ilmu; Hwang, Hae Gwang; Sang, Young Jin; Kim, Kwang Soon

320

Low Density Parity Check Codes: Bandwidth Efficient Channel Coding  

NASA Technical Reports Server (NTRS)

Low Density Parity Check (LDPC) Codes provide near-Shannon Capacity performance for NASA Missions. These codes have high coding rates R=0.82 and 0.875 with moderate code lengths, n=4096 and 8176. Their decoders have inherently parallel structures which allows for high-speed implementation. Two codes based on Euclidean Geometry (EG) were selected for flight ASIC implementation. These codes are cyclic and quasi-cyclic in nature and therefore have a simple encoder structure. This results in power and size benefits. These codes also have a large minimum distance as much as d,,, = 65 giving them powerful error correcting capabilities and error floors less than lo- BER. This paper will present development of the LDPC flight encoder and decoder, its applications and status.

Fong, Wai; Lin, Shu; Maki, Gary; Yeh, Pen-Shu

2003-01-01

321

Structured error recovery for code-word-stabilized quantum codes  

SciTech Connect

Code-word-stabilized (CWS) codes are, in general, nonadditive quantum codes that can correct errors by an exhaustive search of different error patterns, similar to the way that we decode classical nonlinear codes. For an n-qubit quantum code correcting errors on up to t qubits, this brute-force approach consecutively tests different errors of weight t or less and employs a separate n-qubit measurement in each test. In this article, we suggest an error grouping technique that allows one to simultaneously test large groups of errors in a single measurement. This structured error recovery technique exponentially reduces the number of measurements by about 3{sup t} times. While it still leaves exponentially many measurements for a generic CWS code, the technique is equivalent to syndrome-based recovery for the special case of additive CWS codes.

Li Yunfan; Dumer, Ilya; Grassl, Markus; Pryadko, Leonid P. [Department of Electrical Engineering, University of California, Riverside, California 92521 (United States); Centre for Quantum Technologies, National University of Singapore, Singapore 117543 (Singapore); Department of Physics and Astronomy, University of California, Riverside, California 92521 (United States)

2010-05-15

322

Permutation-invariant quantum codes  

NASA Astrophysics Data System (ADS)

A quantum code is a subspace of a Hilbert space of a physical system chosen to be correctable against a given class of errors, where information can be encoded. Ideally, the quantum code lies within the ground space of the physical system. When the physical model is the Heisenberg ferromagnet in the absence of an external magnetic field, the corresponding ground space contains all permutation-invariant states. We use techniques from combinatorics and operator theory to construct families of permutation-invariant quantum codes. These codes have length proportional to t2; one family of codes perfectly corrects arbitrary weight t errors, while the other family of codes approximately correct t spontaneous decay errors. The analysis of our codes' performance with respect to spontaneous decay errors utilizes elementary matrix analysis, where we revisit and extend the quantum error correction criterion of Knill and Laflamme, and Leung, Chuang, Nielsen and Yamamoto.

Ouyang, Yingkai

2014-12-01

323

Continuous-variable topological codes  

NASA Astrophysics Data System (ADS)

Topological code is a stabilizer quantum error correcting code whose generators are local but logical operators are topologically nontrivial and nonlocal. It offers interesting features such as the homological deformations of string operators and anyonic excitations on it. Topological codes are also closely related to the “topological order,” which has been an important concept in condensed-matter physics. In this paper, we consider continuous-variable versions of topological codes, including the toric code by Kitaev [A. Y. Kitaev, Ann. Phys.APNYA60003-491610.1016/S0003-4916(02)00018-0 303, 2 (2003)] with a single type of stabilizer on the checkerboard lattice, and the color code by Bombin and Martin-Delgado [H. Bombin and M. A. Martin-Delgado, Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.97.180501 97, 180501 (2006)]. We show that it is possible to consider continuous-variable analog of these topological codes.

Morimae, Tomoyuki

2013-10-01

324

Multi-rate transmissions on spectral amplitude coding optical code division multiple access system using random diagonal codes  

Microsoft Academic Search

In this paper, we study the use of a new code called random diagonal (RD) code for spectral amplitude coding (SAC) optical code division multiple access (OCDMA) networks, using fiber Bragg-grating (FBG). FBG consists of a fiber segment whose index of reflection varies periodically along its length. RD code is constructed using a code level and data level, one of

HILAL A. FADHIL; S. A. ALJUNID; R. B. AHMAD

2009-01-01

325

Iterative algorithms for lossy source coding  

E-print Network

This thesis explores the problems of lossy source coding and information embedding. For lossy source coding, we analyze low density parity check (LDPC) codes and low density generator matrix (LDGM) codes for quantization ...

Chandar, Venkat (Venkat Bala)

2006-01-01

326

References: [1] Butts DA, Weng C, Jin JZ, Yeh CI, Lesica NA, Alonso JM, Stanley GB  

E-print Network

References: [1] Butts DA, Weng C, Jin JZ, Yeh CI, Lesica NA, Alonso JM, Stanley GB (2007) Temporal precision in the neural code and the time scales of natural vision. Nature 449: 92-5. [2] Butts DA, Weng C in the retina and LGN Daniel A. Butts1 , Alexander R. R. Casti2 1) Dept. of Biology and Program in Neuroscience

Butts, Daniel

327

Diagonal Eigenvalue Unity (DEU) code for spectral amplitude coding-optical code division multiple access  

NASA Astrophysics Data System (ADS)

Code with ideal in-phase cross correlation (CC) and practical code length to support high number of users are required in spectral amplitude coding-optical code division multiple access (SAC-OCDMA) systems. SAC systems are getting more attractive in the field of OCDMA because of its ability to eliminate the influence of multiple access interference (MAI) and also suppress the effect of phase induced intensity noise (PIIN). In this paper, we have proposed new Diagonal Eigenvalue Unity (DEU) code families with ideal in-phase CC based on Jordan block matrix with simple algebraic ways. Four sets of DEU code families based on the code weight W and number of users N for the combination (even, even), (even, odd), (odd, odd) and (odd, even) are constructed. This combination gives DEU code more flexibility in selection of code weight and number of users. These features made this code a compelling candidate for future optical communication systems. Numerical results show that the proposed DEU system outperforms reported codes. In addition, simulation results taken from a commercial optical systems simulator, Virtual Photonic Instrument (VPI™) shown that, using point to multipoint transmission in passive optical network (PON), DEU has better performance and could support long span with high data rate.

Ahmed, Hassan Yousif; Nisar, K. S.

2013-08-01

328

Some easily analyzable convolutional codes  

NASA Technical Reports Server (NTRS)

Convolutional codes have played and will play a key role in the downlink telemetry systems on many NASA deep-space probes, including Voyager, Magellan, and Galileo. One of the chief difficulties associated with the use of convolutional codes, however, is the notorious difficulty of analyzing them. Given a convolutional code as specified, say, by its generator polynomials, it is no easy matter to say how well that code will perform on a given noisy channel. The usual first step in such an analysis is to computer the code's free distance; this can be done with an algorithm whose complexity is exponential in the code's constraint length. The second step is often to calculate the transfer function in one, two, or three variables, or at least a few terms in its power series expansion. This step is quite hard, and for many codes of relatively short constraint lengths, it can be intractable. However, a large class of convolutional codes were discovered for which the free distance can be computed by inspection, and for which there is a closed-form expression for the three-variable transfer function. Although for large constraint lengths, these codes have relatively low rates, they are nevertheless interesting and potentially useful. Furthermore, the ideas developed here to analyze these specialized codes may well extend to a much larger class.

Mceliece, R.; Dolinar, S.; Pollara, F.; Vantilborg, H.

1989-01-01

329

Interframe vector wavelet coding technique  

NASA Astrophysics Data System (ADS)

Wavelet coding is often used to divide an image into multi- resolution wavelet coefficients which are quantized and coded. By 'vectorizing' scalar wavelet coding and combining this with vector quantization (VQ), vector wavelet coding (VWC) can be implemented. Using a finite number of states, finite-state vector quantization (FSVQ) takes advantage of the similarity between frames by incorporating memory into the video coding system. Lattice VQ eliminates the potential mismatch that could occur using pre-trained VQ codebooks. It also eliminates the need for codebook storage in the VQ process, thereby creating a more robust coding system. Therefore, by using the VWC coding method in conjunction with the FSVQ system and lattice VQ, the formulation of a high quality very low bit rate coding systems is proposed. A coding system using a simple FSVQ system where the current state is determined by the previous channel symbol only is developed. To achieve a higher degree of compression, a tree-like FSVQ system is implemented. The groupings are done in this tree-like structure from the lower subbands to the higher subbands in order to exploit the nature of subband analysis in terms of the parent-child relationship. Class A and Class B video sequences from the MPEG-IV testing evaluations are used in the evaluation of this coding method.

Wus, John P.; Li, Weiping

1997-01-01

330

Near-optimum decoding of product codes: block turbo codes  

Microsoft Academic Search

This paper describes an iterative decoding algorithm for any product code built using linear block codes. It is based on soft-input\\/soft-output decoders for decoding the component codes so that near-optimum performance is obtained at each iteration. This soft-input\\/soft-output decoder is a Chase decoder which delivers soft outputs instead of binary decisions. The soft output of the decoder is an estimation

Ramesh Mahendra Pyndiah

1998-01-01

331

Lattice code decoder for space-time codes  

Microsoft Academic Search

We explore the lattice sphere packing representation of a multi-antenna system and the algebraic space-time (ST) codes. We apply the sphere decoding (SD) algorithm to the resulted lattice code. For the uncoded system, SD yields, with small increase in complexity, a huge improvement over the well-known V-BLAST detection algorithm. SD of algebraic ST codes exploits the full diversity of the

Oussama Damen; Ammar Chkeif; Jean-Claude Belfiore

2000-01-01

332

Area Servizi Bibliotecari di Ateneo Modulo di versamento per il Servizio ILL  

E-print Network

IBAN : IT34 T056 9601 6200 00001600X69 Intestato a: Politecnico di Milano Piazza Leonardo da Vinci, 32 di Milano Piazza Leonardo da Vinci, 32 ­20133 Milano Milano, Eseguito da Residente in *Euro ­20133 Milano Milano, Eseguito da Residente in *Euro

333

Area Servizi Bibliotecari di Ateneo Modulo di versamento peril Servizio DD  

E-print Network

IBAN : IT34 T056 9601 6200 00001600X69 Intestato a: Politecnico di Milano Piazza Leonardo da Vinci, 32 di Milano Piazza Leonardo da Vinci, 32 ­20133 Milano Milano, Eseguito da Residente in *Euro ­20133 Milano Milano, Eseguito da Residente in *Euro

334

Adaptive code generators for tree coding of speech  

E-print Network

ADAPTIVE CODE GENERATORS FOR TREE CODING OF SPEECH A Thesis HUI DONG Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE August 1998 Major Subject...: Electrical Engineering ADAPTIVE CODE GENERATORS FOR TREE CODING OF SPEECH A Thesis by HUI DONG Submitted to Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved as to style and content by: erry...

Dong, Hui

2012-06-07

335

Conjugate Codes and Applications to Cryptography  

E-print Network

A conjugate code pair is defined as a pair of linear codes such that one contains the dual of the other. The conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is argued that conjugate code pairs are applicable to quantum cryptography in order to motivate studies on conjugate code pairs.

Mitsuru Hamada

2006-10-23

336

Turbo Codes for PCS Applications  

NASA Technical Reports Server (NTRS)

A number of the claims for turbo codes as a great advance in coding theory are confirmed, and a complete description is presented of an encoder/decoder pair that could be suitable for PCS applications. A new simple method for trellis termination is described, the effect of interleaver choice on the weight distribution of the code is analyzed, and unequal rate components (which yield better performance) are introduced.

Divsalar, D.; Pollara, F.

1995-01-01

337

Practical Loss-Resilient Codes  

Microsoft Academic Search

Abstract We present randomized,constructions of linear-time encodable and decodable,codes that can transmit over lossy channels at rates extremely close to capacity. The encoding and decoding algorithms for these codes have fast and simple software implementations. Partial implementations of our algorithms are faster by orders of magnitude,than the best software implementations,of any previous algorithm for this problem. We expect these codes

M. Luby; M. Mitzenmacher; A. Shokrollahi; D. Spielman; V. Steman

2000-01-01

338

Concatenated Quantum Codes  

E-print Network

One of the main problems for the future of practical quantum computing is to stabilize the computation against unwanted interactions with the environment and imperfections in the applied operations. Existing proposals for quantum memories and quantum channels require gates with asymptotically zero error to store or transmit an input quantum state for arbitrarily long times or distances with fixed error. In this report a method is given which has the property that to store or transmit a qubit with maximum error $\\epsilon$ requires gates with error at most $c\\epsilon$ and storage or channel elements with error at most $\\epsilon$, independent of how long we wish to store the state or how far we wish to transmit it. The method relies on using concatenated quantum codes with hierarchically implemented recovery operations. The overhead of the method is polynomial in the time of storage or the distance of the transmission. Rigorous and heuristic lower bounds for the constant $c$ are given.

Emanuel Knill; Raymond Laflamme

1996-08-08

339

Concatenated quantum codes  

SciTech Connect

One main problem for the future of practial quantum computing is to stabilize the computation against unwanted interactions with the environment and imperfections in the applied operations. Existing proposals for quantum memories and quantum channels require gates with asymptotically zero error to store or transmit an input quantum state for arbitrarily long times or distances with fixed error. This report gives a method which has the property that to store or transmit a qubit with maximum error {epsilon} requires gates with errors at most {ital c}{epsilon} and storage or channel elements with error at most {epsilon}, independent of how long we wish to store the state or how far we wish to transmit it. The method relies on using concatenated quantum codes and hierarchically implemented recovery operations. The overhead of the method is polynomial in the time of storage or the distance of the transmission. Rigorous and heuristic lower bounds for the constant {ital c} are given.

Knill, E.; Laflamme, R.

1996-07-01

340

Electromagnetic particle simulation codes  

NASA Technical Reports Server (NTRS)

Electromagnetic particle simulations solve the full set of Maxwell's equations. They thus include the effects of self-consistent electric and magnetic fields, magnetic induction, and electromagnetic radiation. The algorithms for an electromagnetic code which works directly with the electric and magnetic fields are described. The fields and current are separated into transverse and longitudinal components. The transverse E and B fields are integrated in time using a leapfrog scheme applied to the Fourier components. The particle pushing is performed via the relativistic Lorentz force equation for the particle momentum. As an example, simulation results are presented for the electron cyclotron maser instability which illustrate the importance of relativistic effects on the wave-particle resonance condition and on wave dispersion.

Pritchett, P. L.

1985-01-01

341

Transionospheric Propagation Code (TIPC)  

SciTech Connect

The Transionospheric Propagation Code is a computer program developed at Los Alamos National Lab to perform certain tasks related to the detection of vhf signals following propagation through the ionosphere. The code is written in Fortran 77, runs interactively and was designed to be as machine independent as possible. A menu format in which the user is prompted to supply appropriate parameters for a given task has been adopted for the input while the output is primarily in the form of graphics. The user has the option of selecting from five basic tasks, namely transionospheric propagation, signal filtering, signal processing, DTOA study, and DTOA uncertainty study. For the first task a specified signal is convolved against the impulse response function of the ionosphere to obtain the transionospheric signal. The user is given a choice of four analytic forms for the input pulse or of supplying a tabular form. The option of adding Gaussian-distributed white noise of spectral noise to the input signal is also provided. The deterministic ionosphere is characterized to first order in terms of a total electron content (TEC) along the propagation path. In addition, a scattering model parameterized in terms of a frequency coherence bandwidth is also available. In the second task, detection is simulated by convolving a given filter response against the transionospheric signal. The user is given a choice of a wideband filter or a narrowband Gaussian filter. It is also possible to input a filter response. The third task provides for quadrature detection, envelope detection, and three different techniques for time-tagging the arrival of the transionospheric signal at specified receivers. The latter algorithms can be used to determine a TEC and thus take out the effects of the ionosphere to first order. Task four allows the user to construct a table of delta-times-of-arrival (DTOAs) vs TECs for a specified pair of receivers.

Roussel-Dupre, R.; Kelley, T.A.

1990-10-01

342

Pagina 1 Curriculum Vitae di Fagnani Daniela Rosa C U R R I C U L U M  

E-print Network

E S S I O N A L E INFORMAZIONI PERSONALI Nome Fagnani Daniela Rosa Indirizzo P.zza Leonardo da Vinci Servizi agli Studenti ­P.zza Leonardo da Vinci, 32 ­ 20133 Milano · Nome e indirizzo del datore di lavoro indirizzo del datore di lavoro · Tipo di impiego Politecnico di Milano ­P.zza Leonardo da Vinci, 32 ­ 20133

343

KOOR/BEST ERASMUS-Praktika-  

E-print Network

KOOR/BEST ­ ERASMUS-Praktika- Leonardo da Vinci-Programmg www.hs- karlsruhe.de/koor 1 #12;Themen 1-Praktika-Stipendien 4 L d D Vi i Sti di4. Leonardo Da Vinci-Stipendien 5 Fragen und Kontakt5. Fragen und Kontakt www Leonardo Da Vinci-Stipendien für Graduiertep bundesweit EU Projekt zur Qualitätssicherung vonEU-Projekt zur

Mannheim, Universität

344

DEPARTMENTAL CODE Department of Psychology  

E-print Network

DEPARTMENTAL CODE Department of Psychology Colorado State University Approved May 13, 2009 #12........................................................................... 3 II. Mission of the Department of Psychology

345

The FLUKA Code: an Overview  

SciTech Connect

FLUKA is a multipurpose Monte Carlo code which can transport a variety of particles over a wide energy range in complex geometries. The code is a joint project of INFN and CERN: part of its development is also supported by the University of Houston and NASA. FLUKA is successfully applied in several fields, including but not only, particle physics, cosmic ray physics, dosimetry, radioprotection, hadron therapy, space radiation, accelerator design and neutronics. The code is the standard tool used at CERN for dosimetry, radioprotection and beam-machine interaction studies. Here we give a glimpse into the code physics models with a particular emphasis to the hadronic and nuclear sector.

Ballarini, F.; Battistoni, G.; Campanella, M.; Carboni, M.; Cerutti, F.; Empl, A.; Fasso, A.; Ferrari, A.; Gadioli, E.; Garzelli, M.V.; Lantz, M.; Liotta, M.; Mairani,; Mostacci, A.; Muraro, S.; Ottolenghi, A.; Pelliccioni, M.; Pinsky, L.; Ranft, J.; Roesler, S.; Sala, P.R.; /Milan U. /INFN, Milan /Pavia U. /INFN, Pavia /CERN /Siegen U.

2005-11-09

346

Implementation issues in source coding  

NASA Technical Reports Server (NTRS)

An edge preserving image coding scheme which can be operated in both a lossy and a lossless manner was developed. The technique is an extension of the lossless encoding algorithm developed for the Mars observer spectral data. It can also be viewed as a modification of the DPCM algorithm. A packet video simulator was also developed from an existing modified packet network simulator. The coding scheme for this system is a modification of the mixture block coding (MBC) scheme described in the last report. Coding algorithms for packet video were also investigated.

Sayood, Khalid; Chen, Yun-Chung; Hadenfeldt, A. C.

1989-01-01

347

Lexicographic codes: Error-correcting codes from game theory  

Microsoft Academic Search

Lexicographic codes, or lexicodes, are defined by various versions of the greedy algorithm. The theory of these codes is closely related to the theory of certain impartial games, which leads to a number of surprising properties. For example, lexicodes over an alphabet of size B = 2a are closed under addition, while if B = 22 a the lexicodes are

John H. Conway; Neil J. A. Sloane

1986-01-01

348

Converting Intermediate Code to Assembly Code Using Declarative Machine Descriptions  

E-print Network

Converting Intermediate Code to Assembly Code Using Declarative Machine Descriptions Jo~ao Dias an optimizing back end is expensive, in part because it re- quires mastery of both a target machine and a compiler's internals. We separate these concerns by isolating target-machine knowledge in declarative

Ramsey, Norman

349

Converting Intermediate Code to Assembly Code Using Declarative Machine Descriptions  

E-print Network

Converting Intermediate Code to Assembly Code Using Declarative Machine Descriptions Jo�ao Dias because it re­ quires mastery of both a target machine and a compiler's internals. We separate these concerns by isolating target­machine knowledge in declarative machine de­ scriptions. We then analyze

Ramsey, Norman

350

Developmentally regulated expression of a 78 kDa erythroblast membrane glycoprotein immunologically related to the platelet thrombospondin receptor.  

PubMed Central

We have previously described a monoclonal antibody (FA6-152), obtained by immunizing mice with fetal human erythrocytes [Edelman, Vinci, Villeval, Vainchenker, Henri, Miglierina, Rouger, Reviron, Breton-Gorius, Sureau & Edelman (1986) Blood 67, 56-63]. The antibody labelled fetal, but not adult, erythrocytes and bound to both fetal and adult platelets and monocytes. In the present study we have characterized the antigen recognized by FA6-152 on human platelets and on cells of the erythroid lineage at different stages of maturation. FA6-152 precipitated a chymotrypsin-resistant 88 kDa sialoglycoprotein from both iodinated and periodate/NaB3H4-surface-labelled platelets which corresponds to glycoprotein IV, the platelet thrombospondin (TSP) receptor. After neuraminidase treatment, a shift of the apparent molecular mass from 88 kDa to 85 kDa was observed. Scatchard analysis revealed that 125I-FA6-152 bound saturably with high affinity to a single class of platelet binding sites (Kd 6.4 +/- 0.6 nM). The number of FA6-152 IgG molecules bound per platelet was 25,400 +/- 8,800 (n = 4) and did not change upon thrombin activation of platelets. At low doses of alpha-thrombin (0.025 unit), FA6-152 inhibited platelet aggregation as well as endogenous TSP binding to the platelet surface. Immunofluorescence labelling of bone-marrow cells and of cultures in vitro of burst-forming units-erythroid (BFU-E) and colony-forming units-erythroid (CFU-E) revealed that that FA6-152 antigen is a very early marker of erythroid differentiation and that its expression declines during maturation. Immunochemical identification of the FA6-152 antigen on fetal erythroblasts and fetal mature erythrocytes revealed a 78 kDa glycoprotein migrating just in front of the glycophorin A dimer. The antigen, which was absent from adult mature erythrocytes, was also detected in human erythroleukaemic (HEL) cells where FA6-152 precipitated two bands of molecular mass 85 and 88 kDa. Our data establish the existence of a previously unidentified 78 kDa erythroblast cell-surface glycoprotein whose expression is developmentally regulated during erythroid differentiation and which is immunologically related to the 88 kDa platelet TSP receptor. Images Fig. 1. Fig. 2. Fig. 4. Fig. 5. PMID:2480109

Kieffer, N; Bettaieb, A; Legrand, C; Coulombel, L; Vainchenker, W; Edelman, L; Breton-Gorius, J

1989-01-01

351

Error coding simulations in C  

NASA Technical Reports Server (NTRS)

When data is transmitted through a noisy channel, errors are produced within the data rendering it indecipherable. Through the use of error control coding techniques, the bit error rate can be reduced to any desired level without sacrificing the transmission data rate. The Astrionics Laboratory at Marshall Space Flight Center has decided to use a modular, end-to-end telemetry data simulator to simulate the transmission of data from flight to ground and various methods of error control. The simulator includes modules for random data generation, data compression, Consultative Committee for Space Data Systems (CCSDS) transfer frame formation, error correction/detection, error generation and error statistics. The simulator utilizes a concatenated coding scheme which includes CCSDS standard (255,223) Reed-Solomon (RS) code over GF(2(exp 8)) with interleave depth of 5 as the outermost code, (7, 1/2) convolutional code as an inner code and CCSDS recommended (n, n-16) cyclic redundancy check (CRC) code as the innermost code, where n is the number of information bits plus 16 parity bits. The received signal-to-noise for a desired bit error rate is greatly reduced through the use of forward error correction techniques. Even greater coding gain is provided through the use of a concatenated coding scheme. Interleaving/deinterleaving is necessary to randomize burst errors which may appear at the input of the RS decoder. The burst correction capability length is increased in proportion to the interleave depth. The modular nature of the simulator allows for inclusion or exclusion of modules as needed. This paper describes the development and operation of the simulator, the verification of a C-language Reed-Solomon code, and the possibility of using Comdisco SPW(tm) as a tool for determining optimal error control schemes.

Noble, Viveca K.

1994-01-01

352

on education Code of Ethics  

E-print Network

the forum Abroad on education Code of Ethics for Education Abroad #12;The Forum on Education Abroad Code of Ethics for Education Abroad Contents Page Section I Preamble 2 Section II Ethical Principles for Education Abroad 3 Section III Ethical Guidelines: Examples of Ethical Best 6 Practices for Education Abroad

Illinois at Chicago, University of

353

Using NAEYC's Code of Ethics.  

ERIC Educational Resources Information Center

Considers how to deal with an ethical dilemma concerning a caregiver's dislike for a child. Recognizes that no statement in NAEYC's Code of Ethical Conduct requires that a professional must like each child, and presents some ideals and principles from the code that may guide professionals through similar situations. (BAC)

Young Children, 1995

1995-01-01

354

Automatic Source Code Plagiarism Detection  

Microsoft Academic Search

Plagiarism is one form of academic dishonesty, which is often done by students in programming classes. In a large class, detecting plagiarism manually is both difficult and time-consuming, especially due to the numerous modifications of the source code to conceal the cheating.We designed and developed Deimos, a prototype of a source code plagiarism detector, which can be extended to handle

Cynthia Kustanto; Inggriani Liem

2009-01-01

355

Code Growth in Genetic Programming  

Microsoft Academic Search

Genetic programming is a technique for the automatic generation of computer programs loosely based on the theory of evolution. It has produced successful solutions to a wide variety of problems and can be effective even in noisy and changing environments. However, genetic programming produces solutions with large amounts of unnecessary code. The amount of unnecessary code increases over time and

Terence Soule

1998-01-01

356

Convolutional codes I: Algebraic structure  

Microsoft Academic Search

A convolutional encoder is defined as any constant linear sequential circuit. The associated code is the set of all output sequences resulting from any set of input sequences beginning at any time. Encoders are called equivalent if they generate the same code. The invariant factor theorem is used to determine when a convolutional encoder has a feedback-free inverse, and the

1970-01-01

357

Fibonacci codes for synchronization control  

Microsoft Academic Search

A new family of codes is described for representing serial binary data, subject to constraints on the maximum separation between successive changes in value(0 rightarrow 1, 1 rightarrow, or both), or between successive like digits (0's,1's, or both). These codes have application to the recording or transmission of digital data without an accompanying clock. In such cases, the clock must

WILLIAM H. KAUTZ

1965-01-01

358

ACCELERATION PHYSICS CODE WEB REPOSITORY.  

SciTech Connect

In the framework of the CARE HHH European Network, we have developed a web-based dynamic accelerator-physics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

WEI, J.

2006-06-26

359

Breaking the Code of Silence.  

ERIC Educational Resources Information Center

Schools and communities must break the adolescent code of silence concerning threats of violence. Schools need character education stressing courage, caring, and responsibility; regular discussions of the school discipline code; formal security discussions with parents; 24-hour hotlines; and protocols for handling reports of potential violence.…

Halbig, Wolfgang W.

2000-01-01

360

Hybrid Coding of Pictorial Data  

Microsoft Academic Search

Two hybrid coding systems utilizing a cascade of a unitary transformation and differential pulse code modulators (DPCM) systems are proposed. Both systems encode the transformed data by a bank of DPCM systems. The first system uses a one-dimensional transform of the data where the second one employs two-dimensional transformations. Theoretical results for Markov data and experimental results for a typical

ALI HABIBI

1974-01-01

361

Secure Symmetrical Multilevel Diversity Coding  

E-print Network

Secure symmetrical multilevel diversity coding (S-SMDC) is a source coding problem, where a total of L - N discrete memoryless sources (S1,...,S_L-N) are to be encoded by a total of L encoders. This thesis considers a natural generalization of SMDC...

Li, Shuo

2012-07-16

362

LFSC - Linac Feedback Simulation Code  

SciTech Connect

The computer program LFSC (Code>) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output.

Ivanov, Valentin; /Fermilab

2008-05-01

363

Practical loss-resilient codes  

Microsoft Academic Search

We present randomized constructions of linear-time en- codable and decodable codes that can transmit over lossy channels at rates extremely close to capacity. The encod- ing and decoding algorithms for these codes have fast and simple software implementations. Partial implementations of our algorithms are faster by orders of magnitude than the best software implementations of any previous algorithm for this

Michael G. Luby; Michael Mitzenmacher; Mohammad Amin Shokrollahi; Daniel A. Spielman; Volker Stemann

1997-01-01

364

Practical Loss-Resilient Codes  

Microsoft Academic Search

We present randomized constructions oflinear-time encodable and decodable codes that cantransmit over lossy channels at rates extremely closeto capacity. The encoding and decoding algorithmsfor these codes have fast and simple software implementations.Implementations of our algorithms arefaster by orders of magnitude than the software implementationsof previous algorithms. We expect thesecodes will be extremely useful for applications wherelossy channels are common and

Michael Luby

1998-01-01

365

Video coding with dynamic background  

NASA Astrophysics Data System (ADS)

Motion estimation (ME) and motion compensation (MC) using variable block size, sub-pixel search, and multiple reference frames (MRFs) are the major reasons for improved coding performance of the H.264 video coding standard over other contemporary coding standards. The concept of MRFs is suitable for repetitive motion, uncovered background, non-integer pixel displacement, lighting change, etc. The requirement of index codes of the reference frames, computational time in ME & MC, and memory buffer for coded frames limits the number of reference frames used in practical applications. In typical video sequences, the previous frame is used as a reference frame with 68-92% of cases. In this article, we propose a new video coding method using a reference frame [i.e., the most common frame in scene (McFIS)] generated by dynamic background modeling. McFIS is more effective in terms of rate-distortion and computational time performance compared to the MRFs techniques. It has also inherent capability of scene change detection (SCD) for adaptive group of picture (GOP) size determination. As a result, we integrate SCD (for GOP determination) with reference frame generation. The experimental results show that the proposed coding scheme outperforms the H.264 video coding with five reference frames and the two relevant state-of-the-art algorithms by 0.5-2.0 dB with less computational time.

Paul, Manoranjan; Lin, Weisi; Lau, Chiew Tong; Lee, Bu-Sung

2013-12-01

366

Genetic Code and Number Theory  

Microsoft Academic Search

Living organisms are the most complex, interesting and significant objects regarding all substructures of the universe. Life science is regarded as a science of the 21st century and one can expect great new discoveries in the near futures. This article contains an introductory brief review of genetic information, its coding and translation of genes to proteins through the genetic code.

Branko Dragovich

2009-01-01

367

CODE OF PRACTICE HYDROGEN SULFIDE  

E-print Network

Supervisors · Identify research projects and experiments that use hydrogen sulfide (H2S) or where H2S mayCODE OF PRACTICE HYDROGEN SULFIDE Rev January 2013 1 The following generic Code of Practice applies to all work areas within the University of Alberta that use hydrogen sulfide gas or where hydrogen

Machel, Hans

368

CODE OF PRACTICE HYDROGEN SULFIDE  

E-print Network

OF PRACTICE HYDROGEN SULFIDE 2 Responsibilities Supervisors Identify research projects and experimentsCODE OF PRACTICE HYDROGEN SULFIDE 1 The following generic Code of Practice applies to all work areas within the University of Alberta that use hydrogen sulfide gas. It outlines responsibilities, safe

Machel, Hans

369

Understanding Perception Through Neural “Codes  

Microsoft Academic Search

A major challenge for cognitive scientists is to de- duce and explain the neural mechanisms of the rapid transposition between stimulus energy and recalled memory—between the spe- cific (sensation) and the generic (perception)—in both material and mental aspects. Researchers are attempting three explanations in terms of neural codes. The microscopic code: cellular neurobiolo- gists correlate stimulus properties with the rates

Walter J. Freeman

2011-01-01

370

Stabilizer Codes over Frobenius Rings  

E-print Network

now, the methods for quantum error correction were mainly based on quantum codes that rely on the arithmetic in finite fields. In contrast, this thesis aims to develop a basic framework for quantum error correcting codes over a class of rings known...

Nadella, Sushma

2012-07-16

371

Introduction Space Time Codes Space Time Coding with Feedback New Thoughts Summary Space-Time Coding for Multi-Antenna  

E-print Network

Introduction Space Time Codes Space Time Coding with Feedback New Thoughts Summary Space 2007 #12;Introduction Space Time Codes Space Time Coding with Feedback New Thoughts Summary MIMO: Diversity vs Multiplexing Multiplexing Diversity Pictures taken from lectures notes on Space Time Coding

Veeravalli, Venugopal

372

Portable code development in C  

SciTech Connect

With a new generation of high performance computers appearing around us on a time scale of months, a new challenge for developers of simulation codes is to write and maintain production codes that are both highly portable and maximally efficient. My contention is that C is the language that is both best suited to that goal and is widely available today. GLF is a new code written mainly in C which is intended to have all of the XRASER physics and run on any platform of interest. It demonstrates the power of the C paradigm for code developers and flexibility and ease of use for the users. Three fundamental problems are discussed: the C/UNIX development environment; the supporting tools and libraries which handle data and graphics portability issues; and the advantages of C in numerical simulation code development.

Brown, S.A.

1990-11-06

373

National Transport Code Collaboration (NTCC)  

NASA Astrophysics Data System (ADS)

Progress continues toward achieving NTCC goals, which include the development of -- a library of modules which satisfy clearly defined standards, a framework using modern computer languages to write transport codes, a Web-invocable data server and demonstration code, and an education program to utilize modern computational tools. The development of a flexible framework (using five programming languages -- FORTRAN, C++, PYTHON, CORBA and JAVA, and modern software engineering) allows the design of new customizable, user-friendly, easily maintained transport codes that can address major physics issues facing the fusion program. The demo code runs on up to three computers simultaneously; the GUI Client runs on a local computer, the Physics server advances the transport equations, and the Data server accesses experimental data. The evolutions of plasma discharges using different transport models from the module library are compared using the demo code.

Kritz, A. H.; Bateman, G.; Kinsey, J.; Wiley, J.; Cary, J. R.; Luetkemeyer, K. G.; Cohen, R.; Jong, R.; Lodestro, L.; Yang, T. B.; Houlberg, W.; Greenwood, D.; McCune, D.; Mikkelsen, D.; Pletzer, A.; St. John, H.; Fredian, T.; Sugiyama, L.

1999-11-01

374

Patched Conic Trajectory Code  

NASA Technical Reports Server (NTRS)

PatCon code was developed to help mission designers run trade studies on launch and arrival times for any given planet. Initially developed in Fortran, the required inputs included launch date, arrival date, and other orbital parameters of the launch planet and arrival planets at the given dates. These parameters include the position of the planets, the eccentricity, semi-major axes, argument of periapsis, ascending node, and inclination of the planets. With these inputs, a patched conic approximation is used to determine the trajectory. The patched conic approximation divides the planetary mission into three parts: (1) the departure phase, in which the two relevant bodies are Earth and the spacecraft, and where the trajectory is a departure hyperbola with Earth at the focus; (2) the cruise phase, in which the two bodies are the Sun and the spacecraft, and where the trajectory is a transfer ellipse with the Sun at the focus; and (3) the arrival phase, in which the two bodies are the target planet and the spacecraft, where the trajectory is an arrival hyperbola with the planet as the focus.

Park, Brooke Anderson; Wright, Henry

2012-01-01

375

COM224 -TD 1 Codes de Hamming  

E-print Network

COM224 - TD 1 Codes de Hamming I Code correcteur d'erreur On considère le code en bloc linéaire de deux erreurs ? II Extension d'un code de Hamming On considère le code linéaire en blocs C défini par sa

Rioul, Olivier

376

Elias Coding Mario A. T. Figueiredo,  

E-print Network

Elias Coding M´ario A. T. Figueiredo, Departamento de Engenharia Electrot´ecnica e de Computadores two techniques proposed by Elias to build instantaneous binary codes for arbitrary integers. 1 The Elias Gamma Code The Elias gamma code is the simplest of the Elias codes and is defined as follows

Figueiredo, Mário A. T.

377

Channel Coding: The Road to Channel Capacity  

Microsoft Academic Search

Starting from Shannon's celebrated 1948 channel coding theorem, we trace the evolution of channel coding from Hamming codes to capacity-approaching codes. We focus on the contributions that have led to the most significant improvements in performance versus complexity for practical applications, particularly on the additive white Gaussian noise channel. We discuss algebraic block codes, and why they did not prove

G. D. Forney; D. J. Costello

2007-01-01

378

Facilitating Internet-Scale Code Retrieval  

ERIC Educational Resources Information Center

Internet-Scale code retrieval deals with the representation, storage, and access of relevant source code from a large amount of source code available on the Internet. Internet-Scale code retrieval systems support common emerging practices among software developers related to finding and reusing source code. In this dissertation we focus on some…

Bajracharya, Sushil Krishna

2010-01-01

379

On the Performance of Distributed LT Codes  

Microsoft Academic Search

In this paper we extend previous results on distributed LT codes and focus on the frame erasure rate performance of the corresponding block codes with fixed rate. Specifically, we address modified LT (MLT) codes which resemble LT codes in both structure and performance. First, an MLT code construction scheme for four sources communicating with a single sink via a common

Srinath Puducheri; Thomas E. Fuja

380

Quantum codes over Finite Frobenius Rings  

E-print Network

. We also develop propagation rules to build new codes from existing codes. Non binary codes have been realized as a gray image of linear Z4 code, hence the most natural class of ring that is suitable for coding theory is given by finite Frobenius rings...

Sarma, Anurupa

2012-10-19

381

Bandwidth efficient coding for satellite communications  

NASA Technical Reports Server (NTRS)

An error control coding scheme was devised to achieve large coding gain and high reliability by using coded modulation with reduced decoding complexity. To achieve a 3 to 5 dB coding gain and moderate reliability, the decoding complexity is quite modest. In fact, to achieve a 3 dB coding gain, the decoding complexity is quite simple, no matter whether trellis coded modulation or block coded modulation is used. However, to achieve coding gains exceeding 5 dB, the decoding complexity increases drastically, and the implementation of the decoder becomes very expensive and unpractical. The use is proposed of coded modulation in conjunction with concatenated (or cascaded) coding. A good short bandwidth efficient modulation code is used as the inner code and relatively powerful Reed-Solomon code is used as the outer code. With properly chosen inner and outer codes, a concatenated coded modulation scheme not only can achieve large coding gains and high reliability with good bandwidth efficiency but also can be practically implemented. This combination of coded modulation and concatenated coding really offers a way of achieving the best of three worlds, reliability and coding gain, bandwidth efficiency, and decoding complexity.

Lin, Shu; Costello, Daniel J., Jr.; Miller, Warner H.; Morakis, James C.; Poland, William B., Jr.

1992-01-01

382

Python programming --code comments Finn Arup Nielsen  

E-print Network

Python programming -- code comments Finn °Arup Nielsen DTU Compute Technical University of Denmark November 5, 2013 #12;Python programming -- code comments Code comments Random comments on code provided by students. Finn °Arup Nielsen 1 November 5, 2013 #12;Python programming -- code comments argparse? import

383

How is facial expression coded?  

PubMed

Facial expression is theorized to be visually represented in a multidimensional expression space, relative to a norm. This norm-based coding is typically argued to be implemented by a two-pool opponent coding system. However, the evidence supporting the opponent coding of expression cannot rule out the presence of a third channel tuned to the center of each coded dimension. Here we used a paradigm not previously applied to facial expression to determine whether a central-channel model is necessary to explain expression coding. Participants identified expressions taken from a fear/antifear trajectory, first at baseline and then in two adaptation conditions. In one condition, participants adapted to the expression at the center of the trajectory. In the other condition, participants adapted to alternating images from the two ends of the trajectory. The range of expressions that participants perceived as lying at the center of the trajectory narrowed in both conditions, a pattern that is not predicted by the central-channel model but can be explained by the opponent-coding model. Adaptation to the center of the trajectory also increased identification of both fear and antifear, which may indicate a functional benefit for adaptive coding of facial expression. PMID:25556250

Burton, Nichola; Jeffery, Linda; Calder, Andrew J; Rhodes, Gillian

2015-01-01

384

The Secret World of Codes and Code Breaking  

NSDL National Science Digital Library

This brief article describes the historical contexts in which two types of cipher (code), the shift and the substitution cipher were used. The math concepts involved are substitution, inverse operations and letter frequency analysis.

Claire Ellis

2013-01-01

385

A secure and efficient entropy coding based on arithmetic coding  

NASA Astrophysics Data System (ADS)

A novel security arithmetic coding scheme based on nonlinear dynamic filter (NDF) with changeable coefficients is proposed in this paper. The NDF is employed to generate the pseudorandom number generator (NDF-PRNG) and its coefficients are derived from the plaintext for higher security. During the encryption process, the mapping interval in each iteration of arithmetic coding (AC) is decided by both the plaintext and the initial values of NDF, and the data compression is also achieved with entropy optimality simultaneously. And this modification of arithmetic coding methodology which also provides security is easy to be expanded into the most international image and video standards as the last entropy coding stage without changing the existing framework. Theoretic analysis and numerical simulations both on static and adaptive model show that the proposed encryption algorithm satisfies highly security without loss of compression efficiency respect to a standard AC or computation burden.

Li, Hengjian; Zhang, Jiashu

2009-12-01

386

Surface code implementation of block code state distillation  

PubMed Central

State distillation is the process of taking a number of imperfect copies of a particular quantum state and producing fewer better copies. Until recently, the lowest overhead method of distilling states produced a single improved |A? state given 15 input copies. New block code state distillation methods can produce k improved |A? states given 3k + 8 input copies, potentially significantly reducing the overhead associated with state distillation. We construct an explicit surface code implementation of block code state distillation and quantitatively compare the overhead of this approach to the old. We find that, using the best available techniques, for parameters of practical interest, block code state distillation does not always lead to lower overhead, and, when it does, the overhead reduction is typically less than a factor of three. PMID:23736868

Fowler, Austin G.; Devitt, Simon J.; Jones, Cody

2013-01-01

387

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. > No. TNSRE-2008-00207) < 1  

E-print Network

Leonardo da Vinci, 32, 20133, Milano, Italy (e-mail: mariagabriella.signorini@biomed.polimi.it). S. M, Politecnico di Milano, piazza Leonardo da Vinci, 32, 20133, Milano, Italy (e-mail: sergio, 2008. F. Esposti is with the Dipartimento di Bioingegneria, Politecnico di Milano, piazza Leonardo da

388

Dealing with Changes in Service Orchestrations Leandro Sales Pinto  

E-print Network

Dipartimento di Elettronica e Informazione - DEI Piazza Leonardo Da Vinci, 32 Milano, Italy pinto Elettronica e Informazione - DEI Piazza Leonardo Da Vinci, 32 Milano, Italy ghezzi@elet.polimi.it ABSTRACT@elet.polimi.it Gianpaolo Cugola Politecnico di Milano Dipartimento di Elettronica e Informazione - DEI Piazza Leonardo Da

Cugola, Gianpaolo

389

Pagina 1 Curriculum Vitae di Longoni, Dora M.  

E-print Network

indirizzo del datore di lavoro Politecnico di Milano, P.zza Leonardo da Vinci, 32, 20133 MILANO · Tipo di gestione di 9 progetti finanziati nell'ambito del programma Leonardo da Vinci (fino al 2007) · Dal al Nov S S I O N A L E INFORMAZIONI PERSONALI Nome LONGONI, DORA MARIA CORNELIA Indirizzo P.zza Leonardo da

390

State building energy codes status  

SciTech Connect

This document contains the State Building Energy Codes Status prepared by Pacific Northwest National Laboratory for the U.S. Department of Energy under Contract DE-AC06-76RL01830 and dated September 1996. The U.S. Department of Energy`s Office of Codes and Standards has developed this document to provide an information resource for individuals interested in energy efficiency of buildings and the relevant building energy codes in each state and U.S. territory. This is considered to be an evolving document and will be updated twice a year. In addition, special state updates will be issued as warranted.

NONE

1996-09-01

391

MACCS versus GENII: Code comparison  

SciTech Connect

The computer codes GENII and MACCS, utilized for computing radiation doses, are discussed. The codes are compared from input from the source term from LANL file HW101-SY.INP, run dated 2/19/91. The release of radionuclides was assumed to be from a point source at ground level with a 10 minute release duration.Doses were calculated at a distance of 660 meters with an exposure duration of 2 hours. It was found that the 2 codes differed in how wind direction was treated.

Foster, J.; Chanin, D.I. [Technadyne Engineering Consultants, Inc., Albuquerque, NM (United States)

1991-09-30

392

Design of Serially Concatenated Trellis Coded Modulation  

NASA Technical Reports Server (NTRS)

Serial concatenation of an outer binary convolutional code with an inner TCM code over a multidimensional Euclidean constellation through an interleaver, allows to extend the extremely good performance of turbo codes to the case of high spectral efficiency.

Benedetto, S.; Divsalar, D.; Garello, R.; Montorsi, G.; Pollara, F.

1998-01-01

393

Entanglement-assisted codeword stabilized quantum codes  

SciTech Connect

Entangled qubits can increase the capacity of quantum error-correcting codes based on stabilizer codes. In addition, by using entanglement quantum stabilizer codes can be construct from classical linear codes that do not satisfy the dual-containing constraint. We show that it is possible to construct both additive and nonadditive quantum codes using the codeword stabilized quantum code framework. Nonadditive codes may offer improved performance over the more common stabilizer codes. Like other entanglement-assisted codes, the encoding procedure acts only on the qubits on Alice's side, and only these qubits are assumed to pass through the channel. However, errors in the codeword stabilized quantum code framework give rise to effective Z errors on Bob's side. We use this scheme to construct entanglement-assisted nonadditive quantum codes, in particular, ((5,16,2;1)) and ((7,4,5;4)) codes.

Shin, Jeonghwan; Heo, Jun; Brun, Todd A. [School of Electrical Engineering, Korea University, Seoul (Korea, Republic of); Communication Sciences Institute, University of Southern California, Los Angeles, California 90089 (United States)

2011-12-15

394

Serial-data correlator/code translator  

NASA Technical Reports Server (NTRS)

System, consisting of sampling flip flop, memory (either RAM or ROM), and memory buffer, correlates sampled data with predetermined acceptance code patterns, translates acceptable code patterns to nonreturn-to-zero code, and identifies data dropouts.

Morgan, L. E.

1977-01-01

395

BASS Code Development  

NASA Technical Reports Server (NTRS)

The BASS computational aeroacoustic code solves the fully nonlinear Euler equations in the time domain in two-dimensions. The acoustic response of the stator is determined simultaneously for the first three harmonics of the convected vortical gust of the rotor. The spatial mode generation, propagation and decay characteristics are predicted by assuming the acoustic field away from the stator can be represented as a uniform flow with small harmonic perturbations superimposed. The computed field is then decomposed using a joint temporal-spatial transform to determine the wave amplitudes as a function of rotor harmonic and spatial mode order. This report details the following technical aspects of the computations and analysis. 1) the BASS computational technique; 2) the application of periodic time shifted boundary conditions; 3) the linear theory aspects unique to rotor-stator interactions; and 4) the joint spatial-temporal transform. The computational results presented herein are twofold. In each case, the acoustic response of the stator is determined simultaneously for the first three harmonics of the convected vortical gust of the rotor. The fan under consideration here like modern fans is cut-off at +, and propagating acoustic waves are only expected at 2BPF and 3BPF. In the first case, the computations showed excellent agreement with linear theory predictions. The frequency and spatial mode order of acoustic field was computed and found consistent with linear theory. Further, the propagation of the generated modes was also correctly predicted. The upstream going waves propagated from the domain without reflection from the in ow boundary. However, reflections from the out ow boundary were noticed. The amplitude of the reflected wave was approximately 5% of the incident wave. The second set of computations were used to determine the influence of steady loading on the generated noise. Toward this end, the acoustic response was determined with three steady loading conditions: design, low-loading, high-loading. The overall trend showed significant (approximately 10 dB) increases in the generated noise for the highly loaded stator.

Sawyer, Scott

2004-01-01

396

DC-free error-correcting codes based on convolutional codes  

Microsoft Academic Search

A new construction of direct current (DC)-free error-correcting codes based on convolutional codes is proposed. The new code is constructed by selecting a proper subcode from a convolutional code composed of two different component codes. The encoder employs a Viterbi algorithm as the codeword selector so that the selected code sequences satisfy the DC constraint. A lower bound on the

Mao-Ching Chiu

2001-01-01

397

Network Coding: Exploiting Broadcast and  

E-print Network

Network Coding: Exploiting Broadcast and Superposition in Wireless Networks Jasper Goseling #12 : uur door Jasper GOSELING, elektrotechnisch ingenieur, geboren te Enschede. #12;Dit proefschri a pleasure. Jasper Goseling Enschede, October . #12;#12;Contents Introduction . Challenges in Wireless

Boucherie, Richard J.

398

Seals Flow Code Development 1993  

NASA Technical Reports Server (NTRS)

Seals Workshop of 1993 code releases include SPIRALI for spiral grooved cylindrical and face seal configurations; IFACE for face seals with pockets, steps, tapers, turbulence, and cavitation; GFACE for gas face seals with 'lift pad' configurations; and SCISEAL, a CFD code for research and design of seals of cylindrical configuration. GUI (graphical user interface) and code usage was discussed with hands on usage of the codes, discussions, comparisons, and industry feedback. Other highlights for the Seals Workshop-93 include environmental and customer driven seal requirements; 'what's coming'; and brush seal developments including flow visualization, numerical analysis, bench testing, T-700 engine testing, tribological pairing and ceramic configurations, and cryogenic and hot gas facility brush seal results. Also discussed are seals for hypersonic engines and dynamic results for spiral groove and smooth annular seals.

Liang, Anita D. (compiler); Hendricks, Robert C. (compiler)

1994-01-01

399

Property Control through Bar Coding.  

ERIC Educational Resources Information Center

A public utility company uses laser wands to read bar-coded labels on furniture and equipment. The system allows an 80 percent savings of the time required to create reports for inventory control. (MLF)

Kingma, Gerben J.

1984-01-01

400

Combinatorial Designs and Code Synchronization  

E-print Network

}. The comma-free index (C) of a code C: (C) = min d(z, Ti(x, y)), where d is the Hamming distance, Ti(x, y ­ p. 5/2 #12;Definition. (Levenshtein) A Difference System of Sets (DSS) is a collection of q disjoint. Combinatorial Designs and Code Synchronization ­ p. 10/2 #12;A Lower Bound Theorem. (Levenshtein): rq(n, ) q

Tonchev, Vladimir D.

401

High-speed code validation  

NASA Technical Reports Server (NTRS)

The topics are presented in viewgraph form and include the following: NFL body experiment; high-speed validation problems; 3-D Euler/Navier-Stokes inlet code; two-strut inlet configuration; pressure contours in two longitudinal planes; sidewall pressure distribution; pressure distribution on strut inner surface; inlet/forebody tests in 60 inch helium tunnel; pressure distributions on elliptical missile; code validations; small scale test apparatus; CARS nonintrusive measurements; optimized cone-derived waverider study; etc.

Barnwell, Richard W.; Rogers, R. Clayton; Pittman, James L.; Dwoyer, Douglas L.

1987-01-01

402

Edge equilibrium code for tokamaks  

SciTech Connect

The edge equilibrium code (EEC) described in this paper is developed for simulations of the near edge plasma using the finite element method. It solves the Grad-Shafranov equation in toroidal coordinate and uses adaptive grids aligned with magnetic field lines. Hermite finite elements are chosen for the numerical scheme. A fast Newton scheme which is the same as implemented in the equilibrium and stability code (ESC) is applied here to adjust the grids.

Li, Xujing [Institute of Computational Mathematics and Scientific/Engineering Computing, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, P.O. Box 2719, Beijing 100190 (China)] [Institute of Computational Mathematics and Scientific/Engineering Computing, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, P.O. Box 2719, Beijing 100190 (China); Zakharov, Leonid E. [Princeton Plasma Physics Laboratory Princeton, MS-27 P.O. Box 451, New Jersey (United States)] [Princeton Plasma Physics Laboratory Princeton, MS-27 P.O. Box 451, New Jersey (United States); Drozdov, Vladimir V. [Euratom/CCFE Fusion Association, Culham Science Centre, Abingdon OX14 3DB (United Kingdom)] [Euratom/CCFE Fusion Association, Culham Science Centre, Abingdon OX14 3DB (United Kingdom)

2014-01-15

403

Safety checking of machine code  

Microsoft Academic Search

We show how to determine statically whether it is safe for untrusted machine code to be loaded into a trusted host system.Our safety-checking technique operates directly on the untrusted machine-code program, requiring only that the initial inputs to the untrusted program be annotated with typestate information and linear constraints. This approach opens up the possibility of being able to certify

Zhichen Xu; Barton P. Miller; Thomas Reps

2000-01-01

404

Bit-Interleaved Coded Modulation  

Microsoft Academic Search

It has been recognized by Zehavi (1992) that the performance of coded modulation over a Rayleigh fading channel can be improved by bit-wise interleaving at the encoder output, and by using an appropriate soft-decision metric as an input to a Viterbi (1990) decoder. The paper presents in a comprehensive fashion the theory underlying bit-interleaved coded modulation, provides tools for evaluating

Giuseppe Caire; Giorgio Taricco; Ezio Biglieri

1998-01-01

405

Computer-Access-Code Matrices  

NASA Technical Reports Server (NTRS)

Authorized users respond to changing challenges with changing passwords. Scheme for controlling access to computers defeats eavesdroppers and "hackers". Based on password system of challenge and password or sign, challenge, and countersign correlated with random alphanumeric codes in matrices of two or more dimensions. Codes stored on floppy disk or plug-in card and changed frequently. For even higher security, matrices of four or more dimensions used, just as cubes compounded into hypercubes in concurrent processing.

Collins, Earl R., Jr.

1990-01-01

406

MACCS versus GENII: Code comparison  

Microsoft Academic Search

The computer codes GENII and MACCS, utilized for computing radiation doses, are discussed. The codes are compared from input from the source term from LANL file HW101-SY.INP, run dated 2\\/19\\/91. The release of radionuclides was assumed to be from a point source at ground level with a 10 minute release duration.Doses were calculated at a distance of 660 meters with

J. Foster; D. I. Chanin

2010-01-01

407

Protecting Software Code by Guards  

Microsoft Academic Search

Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers.\\u000a Many software-based mechanisms for protecting program code are too weak (e.g., they have single points of failure) or too\\u000a expensive to apply (e.g., they incur heavy runtime performance penalty to the protected programs). In this paper, we present\\u000a and explore a methodology

Hoi Chang; Mikhail J. Atallah

2001-01-01

408

Arithmetic algorithms for error-coded operands.  

NASA Technical Reports Server (NTRS)

Arithmetic algorithms for separate and nonseparate codes are considered. The nonseparate AN code is formed when an uncoded operand X is multiplied by the check modulus A to give the coded operand AX. The separate codes are the residue code, and the inverse-residue code, which has significant advantages in fault detection of repeated-use faults. A set of algorithms for low-cost AN-coded operands is discussed together with questions of their implementation in a byte-organized arithmetic processor. Algorithms for inverse-residue coded operands of the STAR computer are also examined.

Avizienis, A.

1973-01-01

409

Coordinated design of coding and modulation systems  

NASA Technical Reports Server (NTRS)

The joint optimization of the coding and modulation systems employed in telemetry systems was investigated. Emphasis was placed on formulating inner and outer coding standards used by the Goddard Spaceflight Center. Convolutional codes were found that are nearly optimum for use with Viterbi decoding in the inner coding of concatenated coding systems. A convolutional code, the unit-memory code, was discovered and is ideal for inner system usage because of its byte-oriented structure. Simulations of sequential decoding on the deep-space channel were carried out to compare directly various convolutional codes that are proposed for use in deep-space systems.

Massey, J. L.; Ancheta, T.; Johannesson, R.; Lauer, G.; Lee, L.

1976-01-01

410

Program School/ Career: Descripton ISIS Program Codes  

E-print Network

Program School/ Career: Descripton ISIS Program Codes Program Career: Descripton College School;Program School/ Career: Descripton ISIS Program Codes Program Career: Descripton College School/ College 1

Wisconsin at Madison, University of

411

Coding and reimbursement of electrodiagnostic studies.  

PubMed

Current Procedural Terminology (CPT) codes for electrodiagnostic procedures include codes for nerve conduction studies, nerve tests with preconfigured arrays, reflex tests, electromyography (EMG), and chemodenervation procedures. The codes are updated yearly. For 2012, there are new EMG codes to be used when the patient also receives nerve conduction studies on the same date. Coding for bilateral chemodenervation procedures has also been clarified. The CPT codes for neurologic procedures are not defined to include consultation or other evaluation and management services. When appropriate, codes for these services and skills may be submitted along with the codes for any neurologic procedures. PMID:22361381

Busis, Neil

2012-05-01

412

Spaceflight Validation of Hzetrn Code  

NASA Technical Reports Server (NTRS)

HZETRN is being developed as a fast deterministic radiation transport code applicable to neutrons, protons, and multiply charged ions in the space environment. It was recently applied to 50 hours of IMP8 data measured during the August 4, 1972 solar event to map the hourly exposures within the human body under several shield configurations. This calculation required only 18 hours on a VAX 4000 machine. A similar calculation using the Monte Carlo method would have required two years of dedicated computer time. The code has been benchmarked against well documented and tested Monte Carlo proton transport codes with good success. The code will allow important trade studies to be made with relative ease due to the computational speed and will be useful in assessing design alternatives in an integrated system software environment. Since there are no well tested Monte Carlo codes for HZE particles, we have been engaged in flight validation of the HZETRN results. To date we have made comparison with TEPC, CR-39, charge particle telescopes, and Bonner spheres. This broad range of detectors allows us to test a number of functions related to differing physical processes which add to the complicated radiation fields within a spacecraft or the human body, which functions can be calculated by the HZETRN code system. In the present report we will review these results.

Wilson, J. W.; Shinn, J. L.; Singleterry, R. C.; Badavi, F. F.; Badhwar, G. D.; Reitz, G.; Beaujean, R.; Cucinotta, F. A.

1999-01-01

413

Rotating-Pump Design Code  

NASA Technical Reports Server (NTRS)

Pump Design (PUMPDES) is a computer program for designing a rotating pump for liquid hydrogen, liquid oxygen, liquid nitrogen, water, methane, or ethane. Using realistic properties of these fluids provided by another program called GASPAK, this code performs a station-by-station, mean-line analysis along the pump flow path, obtaining thermodynamic properties of the pumped fluid at each station and evaluating hydraulic losses along the flow path. The variables at each station are obtained under constraints that are consistent with the underlying physical principles. The code evaluates the performance of each stage and the overall pump. In addition, by judiciously choosing the givens and the unknowns, the code can perform a geometric inverse design function: that is, it can compute a pump geometry that yields a closest approximation of given design point. The code contains two major parts: one for an axial-rotor/inducer and one for a multistage centrifugal pump. The inducer and the centrifugal pump are functionally integrated. The code can be used in designing and/or evaluating the inducer/centrifugal-pump combination or the centrifugal pump alone. The code is written in standard Fortran 77.

Walker, James F.; Chen, Shu-Cheng; Scheer, Dean D.

2006-01-01

414

The Cosmic Code Comparison Project  

E-print Network

Current and upcoming cosmological observations allow us to probe structures on smaller and smaller scales, entering highly nonlinear regimes. In order to obtain theoretical predictions in these regimes, large cosmological simulations have to be carried out. The promised high accuracy from observations make the simulation task very demanding: the simulations have to be at least as accurate as the observations. This requirement can only be fulfilled by carrying out an extensive code validation program. The first step of such a program is the comparison of different cosmology codes including gravitation interactions only. In this paper we extend a recently carried out code comparison project to include five more simulation codes. We restrict our analysis to a small cosmological volume which allows us to investigate properties of halos. For the matter power spectrum and the mass function, the previous results hold, with the codes agreeing at the 10% level over wide dynamic ranges. We extend our analysis to the comparison of halo profiles and investigate the halo count as a function of local density. We introduce and discuss ParaView as a flexible analysis tool for cosmological simulations, the use of which immensely simplifies the code comparison task.

Katrin Heitmann; Zarija Lukic; Patricia Fasel; Salman Habib; Michael S. Warren; Martin White; James Ahrens; Lee Ankeny; Ryan Armstrong; Brian O'Shea; Paul M. Ricker; Volker Springel; Joachim Stadel; Hy Trac

2007-06-08

415

A genetic scale of reading frame coding.  

PubMed

The reading frame coding (RFC) of codes (sets) of trinucleotides is a genetic concept which has been largely ignored during the last 50 years. A first objective is the definition of a new and simple statistical parameter PrRFC for analysing the probability (efficiency) of reading frame coding (RFC) of any trinucleotide code. A second objective is to reveal different classes and subclasses of trinucleotide codes involved in reading frame coding: the circular codes of 20 trinucleotides and the bijective genetic codes of 20 trinucleotides coding the 20 amino acids. This approach allows us to propose a genetic scale of reading frame coding which ranges from 1/3 with the random codes (RFC probability identical in the three frames) to 1 with the comma-free circular codes (RFC probability maximal in the reading frame and null in the two shifted frames). This genetic scale shows, in particular, the reading frame coding probabilities of the 12,964,440 circular codes (PrRFC=83.2% in average), the 216 C(3) self-complementary circular codes (PrRFC=84.1% in average) including the code X identified in eukaryotic and prokaryotic genes (PrRFC=81.3%) and the 339,738,624 bijective genetic codes (PrRFC=61.5% in average) including the 52 codes without permuted trinucleotides (PrRFC=66.0% in average). Otherwise, the reading frame coding probabilities of each trinucleotide code coding an amino acid with the universal genetic code are also determined. The four amino acids Gly, Lys, Phe and Pro are coded by codes (not circular) with RFC probabilities equal to 2/3, 1/2, 1/2 and 2/3, respectively. The amino acid Leu is coded by a circular code (not comma-free) with a RFC probability equal to 18/19. The 15 other amino acids are coded by comma-free circular codes, i.e. with RFC probabilities equal to 1. The identification of coding properties in some classes of trinucleotide codes studied here may bring new insights in the origin and evolution of the genetic code. PMID:24698943

Michel, Christian J

2014-08-21

416

DA FALA Ŕ ESCRITA: OS SABERES DA ORALIDADE E O INÍCIO DE PRODUÇĂO DA ESCRITA ESCOLAR  

Microsoft Academic Search

Resumo: Analisa a integraçăo dos saberes da oralidade de a lfabetizandos e o processo de aquisiçăo da escrita escolar embasado em fundamentos da Sociolingüística Educacional. A pesquisa foi desenvolvida considerando princípios metodológicos da Etnografia Colaborativa Educacional. Foi realizada em uma escola da Secretaria de Estado de Educaçăo do Distrito Federal, mais especificamente, em uma sala de alfab etizaçăo. Esta sala

Maria Alice Fernandes de Sousa

417

Some partial-unit-memory convolutional codes  

NASA Technical Reports Server (NTRS)

The results of a study on a class of error correcting codes called partial unit memory (PUM) codes are presented. This class of codes, though not entirely new, has until now remained relatively unexplored. The possibility of using the well developed theory of block codes to construct a large family of promising PUM codes is shown. The performance of several specific PUM codes are compared with that of the Voyager standard (2, 1, 6) convolutional code. It was found that these codes can outperform the Voyager code with little or no increase in decoder complexity. This suggests that there may very well be PUM codes that can be used for deep space telemetry that offer both increased performance and decreased implementational complexity over current coding systems.

Abdel-Ghaffar, K.; Mceliece, R. J.; Solomon, G.

1991-01-01

418

Fotopoética da Cidade  

Microsoft Academic Search

The research considers the imaginary nature of the Urban space through a reading of the aesthetic analysis of images of the photographic creation. Gaston Bachelard's Phenomenology of the creative Imagination and poetic Image brings the conceptual base of the study. Fotografia, Arte, Urbanismo, Bachelard, Imaginaçăo. Apresentaçăo Investigamos a natureza poética do fenômeno urbano, através da análise fenomenológica de imagens da

Carlos Alberto Murad

419

The ATLAS PanDA Monitoring System and its Evolution  

NASA Astrophysics Data System (ADS)

The PanDA (Production and Distributed Analysis) Workload Management System is used for ATLAS distributed production and analysis worldwide. The needs of ATLAS global computing imposed challenging requirements on the design of PanDA in areas such as scalability, robustness, automation, diagnostics, and usability for both production shifters and analysis users. Through a system-wide job database, the PanDA monitor provides a comprehensive and coherent view of the system and job execution, from high level summaries to detailed drill-down job diagnostics. It is (like the rest of PanDA) an Apache-based Python application backed by Oracle. The presentation layer is HTML code generated on the fly in the Python application which is also responsible for managing database queries. However, this approach is lacking in user interface flexibility, simplicity of communication with external systems, and ease of maintenance. A decision was therefore made to migrate the PanDA monitor server to Django Web Application Framework and apply JSON/AJAX technology in the browser front end. This allows us to greatly reduce the amount of application code, separate data preparation from presentation, leverage open source for tools such as authentication and authorization mechanisms, and provide a richer and more dynamic user experience. We describe our approach, design and initial experience with the migration process.

Klimentov, A.; Nevski, P.; Potekhin, M.; Wenaus, T.

2011-12-01

420

NASA Rotor 37 CFD Code Validation: Glenn-HT Code  

NASA Technical Reports Server (NTRS)

In order to advance the goals of NASA aeronautics programs, it is necessary to continuously evaluate and improve the computational tools used for research and design at NASA. One such code is the Glenn-HT code which is used at NASA Glenn Research Center (GRC) for turbomachinery computations. Although the code has been thoroughly validated for turbine heat transfer computations, it has not been utilized for compressors. In this work, Glenn-HT was used to compute the flow in a transonic compressor and comparisons were made to experimental data. The results presented here are in good agreement with this data. Most of the measures of performance are well within the measurement uncertainties and the exit profiles of interest agree with the experimental measurements.

Ameri, Ali A.

2010-01-01

421

Multispectral photoacoustic coded excitation imaging using unipolar orthogonal Golay codes.  

PubMed

We present a method to speed up the acquisition of multispectral photoacoustic data sets by using unipolar orthogonal Golay codes as excitation sequences for the irradiation system. Multispectral photoacoustic coded excitation (MS-PACE) allows acquiring photoacoustic data sets for two irradiation wavelengths simultaneously and separating them afterwards, thus improving the SNR or speeding up the measurement. We derive an analytical estimation of the SNR improvement using MS-PACE compared to time equivalent averaging. We demonstrate the feasibility of the method by successfully imaging a phantom composed of two dyes using unipolar orthogonal Golay codes as excitation sequence for two high power laser diodes operating at two different wavelengths. The experimental results show very good agreement with the theoretical predictions. PMID:20588755

Mienkina, Martin P; Friedrich, Claus-Stefan; Gerhardt, Nils C; Beckmann, Martin F; Schiffner, Martin F; Hofmann, Martin R; Schmitz, Georg

2010-04-26

422

Prediction of the Coding Sequences of Unidentified Human Genes. XI. The Complete Sequences of 100 New cDNA Clones from Brain Which Code for Large Proteins in vitro  

Microsoft Academic Search

In this paper, we report the sequences of 100 cDNA clones newly determined from a set of size- fractionated human brain cDNA libraries and predict the coding sequences of the corresponding genes, named KIAA0819 to KIAA0918. These cDNA clones were selected on the basis of their coding potentials of large proteins (50 kDa and more) by using in vitro transcription\\/translation

Takahiro NAGASE; Ken-ichi ISHIKAWA; Mikita SUYAMA; Nobuyuki MIYAJIMA; Ayako TANAKA; Hirokazu KOTANI; Nobuo NOMURA; Osamu OHARA

1998-01-01

423

Coded modulation with Low Density Parity Check codes  

E-print Network

CODED MODULATION WITH LOW DENSITY PARITY CHECK CODES A Thesis by RAVI NARAYANASWAMI Submitted to the Office of Graduate Studies of Texas A@M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE December..., graduate study at Texas AErM didn't completely revolve around the wireless communication lab. In that regard I'd have to thank the boys, Harsha, K. B, Cheeni, Chow, Rahul and Northgate for some much needed quality time. TABLE OF CONTENTS CHAPTER Page...

Narayanaswami, Ravi

2001-01-01

424

Driver Code for Adaptive Optics  

NASA Technical Reports Server (NTRS)

A special-purpose computer code for a deformable-mirror adaptive-optics control system transmits pixel-registered control from (1) a personal computer running software that generates the control data to (2) a circuit board with 128 digital-to-analog converters (DACs) that generate voltages to drive the deformable-mirror actuators. This program reads control-voltage codes from a text file, then sends them, via the computer s parallel port, to a circuit board with four AD5535 (or equivalent) chips. Whereas a similar prior computer program was capable of transmitting data to only one chip at a time, this program can send data to four chips simultaneously. This program is in the form of C-language code that can be compiled and linked into an adaptive-optics software system. The program as supplied includes source code for integration into the adaptive-optics software, documentation, and a component that provides a demonstration of loading DAC codes from a text file. On a standard Windows desktop computer, the software can update 128 channels in 10 ms. On Real-Time Linux with a digital I/O card, the software can update 1024 channels (8 boards in parallel) every 8 ms.

Rao, Shanti

2007-01-01

425

International assessment of PCA codes  

SciTech Connect

Over the past three years (1991-1993), an extensive international exercise for intercomparison of a group of six Probabilistic Consequence Assessment (PCA) codes was undertaken. The exercise was jointly sponsored by the Commission of European Communities (CEC) and OECD Nuclear Energy Agency. This exercise was a logical continuation of a similar effort undertaken by OECD/NEA/CSNI in 1979-1981. The PCA codes are currently used by different countries for predicting radiological health and economic consequences of severe accidents at nuclear power plants (and certain types of non-reactor nuclear facilities) resulting in releases of radioactive materials into the atmosphere. The codes participating in the exercise were: ARANO (Finland), CONDOR (UK), COSYMA (CEC), LENA (Sweden), MACCS (USA), and OSCAAR (Japan). In parallel with this inter-code comparison effort, two separate groups performed a similar set of calculations using two of the participating codes, MACCS and COSYMA. Results of the intercode and inter-MACCS comparisons are presented in this paper. The MACCS group included four participants: GREECE: Institute of Nuclear Technology and Radiation Protection, NCSR Demokritos; ITALY: ENEL, ENEA/DISP, and ENEA/NUC-RIN; SPAIN: Universidad Politecnica de Madrid (UPM) and Consejo de Seguridad Nuclear; USA: Brookhaven National Laboratory, US NRC and DOE.

Neymotin, L. [Brookhaven National Lab., Upton, NY (United States). Dept. of Advanced Technology; Lui, C.; Glynn, J. [Nuclear Regulatory Commission, Washington, DC (United States). Probabilistic Risk Analysis Branch; Archarya, S. [Dept. of Energy, Washington, DC (United States). Office of Nuclear Safety

1993-11-01

426

Progressive Image Coding on Noisy Channels  

Microsoft Academic Search

We cascade an existing image coder with carefully chosen error control coding, and thus produce a progressive image compression scheme whose performance on a noisy channel is significantly better than that of previously known techniques. The main idea is to trade off the available transmission rate between source coding and channel coding in an efficient manner. This coding system is

P. Greg Sherwood; Kenneth Zeger

1997-01-01

427

Trace-shortened Reed-Solomon codes  

NASA Technical Reports Server (NTRS)

Reed-Solomon (RS) codes have been part of standard NASA telecommunications systems for many years. RS codes are character-oriented error-correcting codes, and their principal use in space applications has been as outer codes in concatenated coding systems. However, for a given character size, say m bits, RS codes are limited to a length of, at most, 2(exp m). It is known in theory that longer character-oriented codes would be superior to RS codes in concatenation applications, but until recently no practical class of 'long' character-oriented codes had been discovered. In 1992, however, Solomon discovered an extensive class of such codes, which are now called trace-shortened Reed-Solomon (TSRS) codes. In this article, we will continue the study of TSRS codes. Our main result is a formula for the dimension of any TSRS code, as a function of its error-correcting power. Using this formula, we will give several examples of TSRS codes, some of which look very promising as candidate outer codes in high-performance coded telecommunications systems.

Mceliece, R. J.; Solomon, G.

1994-01-01

428

Nonlinear hierarchical space-time block codes  

Microsoft Academic Search

Recent designs for space-time block codes (STBCs) have exploited the structure of the codes (unitary, orthogonal) to enable systematic construction. Code sets found by exhaustive search to optimize cost functions can often achieve performance gains of several dB; however, such searches are not feasible for large block or constellation sizes. In this work, properties of searched codes are determined which

Jifeng Geng; Urbashi Mitra

2003-01-01

429

Arithmetic completely regular codes J. H. Koolen  

E-print Network

are in arithmetic progression. In order to better understand these "arithmetic completely regular codes", we focus are in arithmetic progression. We call these codes arithmetic completely regular codes and we classify them underArithmetic completely regular codes J. H. Koolen W. S. Lee W. J. Martin December 4, 2013 Abstract

Martin, Bill

430

Corruption and the Blue Code of Silence  

Microsoft Academic Search

This paper examines the 'Blue Code of Silence' and its contribution to police corruption. After offering evidence for the existence of such a code, the paper locates the origins of the code in the work and culture of policing. The paper also examines cases, commission reports and an original case study to understand how the code is reinforced. Based on

Jerome H. Skolnick

2002-01-01

431

Construction of Two-Weight Codes  

E-print Network

Construction of Two-Weight Codes Axel Kohnert Tokyo November 2005 Bayreuth University Germany axel by the minimum distance. . ­ p.3/33 #12;Linear Code A linear [n, k; q] code C is a k-dimensional subspace A linear [n, k; q] code C is a k-dimensional subspace of the vectorspace GF(q)n . The generator matrix

Laue, Reinhard

432

An Essay on Equivalence of Linear Codes  

E-print Network

of linear codes: When should two linear codes be considered to be the same? · Extrinsic: permute columns treatment Definition 1 A linear code C over a field F is a k-dimensional subspace of the n-dimensional, using Hamming weight. Theorem (MacWilliams, 1961) Two linear codes C1, C2 in Fn are equivalent

Wood, Jay

433

Studies in international Morse Code. IV. \\  

Microsoft Academic Search

313 Morse Code trainees were scored on a 5-item battery: 12-min. recall of a verbal order, dictation of connected prose, immediate digit recall, a code discrimination test (from Thurstone's Code Aptitude Test), and previous code experience. On the basis of a profile, predictions were made before the 8- or 10-week training course began. Analysis of success and failure figures reveals

Joseph E. Morsh; A. F. B. Stannard

1947-01-01

434

Optimal Probabilistic Fingerprint Codes # Gabor Tardos  

E-print Network

Optimal Probabilistic Fingerprint Codes # Gâ??abor Tardos Râ??enyi Institute Pf. 127, H­1354 Budapest, Hungary tardos@renyi.hu Abstract We construct binary codes for fingerprinting digital documents. Our codes imply that randomized fingerprint codes over a binary alphabet are as powerful as over an arbitrary

Tardos, Gábor

435

Procedure Codes for SEER-Medicare Analyses  

Cancer.gov

The tables below contain codes for procedures that are frequently included in SEER-Medicare analyses. Please note that NCI provides these codes to assist researchers in analyses. Codes may change or may not be complete. NCI does not accept responsibility for the completeness or currency of the information below. Investigators should check that all relevant codes are included in their analysis.

436

29 CFR 510.21 - SIC codes.  

Code of Federal Regulations, 2010 CFR

...2010-07-01 2010-07-01 false SIC codes. 510.21 Section 510.21 Labor...Classification of Industries § 510.21 SIC codes. (a) The Conference Report...comparable to the four digit Standard Industry Code (SIC) code level.” (b) The...

2010-07-01

437

On dualities in multiterminal coding problems  

Microsoft Academic Search

It has been shown recently that under certain conditions there exist dualities between different multiterminal (MT) source and channel coding problems. Following these results, we study lossless MT source coding and deterministic MT channel coding problems and point out different dualities between them. In particular, we show that there exists a functional duality between a Slepian-Wolf (SW) coding problem and

Vladimir Stankovic; Samuel Cheng; Zixiang Xiong

2006-01-01

438

Adaptive Coded Modulation for Fading Channels  

Microsoft Academic Search

We apply coset codes to adaptive modulation in fading channels. Adaptive modulation is a powerful technique to improve the energy efficiency and increase the data rate over a fading channel. Coset codes are a natural choice to use with adaptive modulation since the channel coding and modulation designs are separable. Therefore, trellis and lattice codes de- signed for additive white

Soon-ghee Chua; Andrea J. Goldsmith

1997-01-01

439

Adaptive coded modulation for fading channels  

Microsoft Academic Search

We apply coset codes to adaptive modulation in fading channels. Adaptive modulation is a powerful technique to improve the energy efficiency and increase the data rate over a fading channel. Coset codes are a natural choice to use with adaptive modulation since the channel coding and modulation designs are separable. Therefore, trellis and lattice codes designed for additive white Gaussian

Andrea J. Goldsmith; Soon-Ghee Chua

1998-01-01

440

Convolutional coding combined with continuous phase modulation  

NASA Technical Reports Server (NTRS)

Background theory and specific coding designs for combined coding/modulation schemes utilizing convolutional codes and continuous-phase modulation (CPM) are presented. In this paper the case of r = 1/2 coding onto a 4-ary CPM is emphasized, with short-constraint length codes presented for continuous-phase FSK, double-raised-cosine, and triple-raised-cosine modulation. Coding buys several decibels of coding gain over the Gaussian channel, with an attendant increase of bandwidth. Performance comparisons in the power-bandwidth tradeoff with other approaches are made.

Pizzi, S. V.; Wilson, S. G.

1985-01-01

441

A simple family of nonadditive quantum codes  

E-print Network

Most known quantum codes are additive, meaning the codespace can be described as the simultaneous eigenspace of an abelian subgroup of the Pauli group. While in some scenarios such codes are strictly suboptimal, very little is understood about how to construct nonadditive codes with good performance. Here we present a family of nonadditive quantum codes for all odd blocklengths, n, that has a particularly simple form. Our codes correct single qubit erasures while encoding a higher dimensional space than is possible with an additive code or, for n of 11 or greater, any previous codes.

John A. Smolin; Graeme Smith; Stephanie Wehner

2007-01-11

442

Accumulate-Repeat-Accumulate-Accumulate Codes  

NASA Technical Reports Server (NTRS)

Accumulate-repeat-accumulate-accumulate (ARAA) codes have been proposed, inspired by the recently proposed accumulate-repeat-accumulate (ARA) codes. These are error-correcting codes suitable for use in a variety of wireless data-communication systems that include noisy channels. ARAA codes can be regarded as serial turbolike codes or as a subclass of low-density parity-check (LDPC) codes, and, like ARA codes they have projected graph or protograph representations; these characteristics make it possible to design high-speed iterative decoders that utilize belief-propagation algorithms. The objective in proposing ARAA codes as a subclass of ARA codes was to enhance the error-floor performance of ARA codes while maintaining simple encoding structures and low maximum variable node degree.

Divsalar, Dariush; Dolinar, Samuel; Thorpe, Jeremy

2007-01-01

443

Pulse code modulated signal synchronizer  

NASA Technical Reports Server (NTRS)

A bit synchronizer for a split phase PCM transmission is reported that includes three loop circuits which receive incoming phase coded PCM signals. In the first loop, called a Q-loop, a generated, phase coded, PCM signal is multiplied with the incoming signals, and the frequency and phase of the generated signal are nulled to that of the incoming subcarrier signal. In the second loop, called a B-loop, a circuit multiplies a generated signal with incoming signals to null the phase of the generated signal in a bit phase locked relationship to the incoming signal. In a third loop, called the I-loop, a phase coded PCM signal is multiplied with the incoming signals for decoding the bit information from the PCM signal. A counter means is used for timing of the generated signals and timing of sample intervals for each bit period.

Kobayashi, H. S. (inventor)

1974-01-01

444

ASME Code Efforts Supporting HTGRs  

SciTech Connect

In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

D.K. Morton

2011-09-01

445

ASME Code Efforts Supporting HTGRs  

SciTech Connect

In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

D.K. Morton

2012-09-01

446

FLOWTRAN-TF code description  

SciTech Connect

FLOWTRAN-TF is a two-component (air-water), two-phase thermal-hydraulics code designed for performing accident analyses of SRS reactor fuel assemblies during the Emergency Cooling System (ECS) phase of a Double Ended Guillotine Break (DEGB) Loss of Coolant Accident (LOCA). This report provides a brief description of the physical models in the version of FLOWTRAN-TF used to compute the Recommended K-Reactor Restart ECS Power Limit. This document is viewed as an interim report and should ultimately be superseded by a comprehensive user/programmer manual. In general, only high level discussions of governing equations and constitutive laws are presented. Numerical implementation of these models, code architecture and user information are not generally covered. A companion document describing code benchmarking is available.

Flach, G.P. [ed.

1990-12-01

447

FLOWTRAN-TF code description  

SciTech Connect

FLOWTRAN-TF is a two-component (air-water), two-phase thermal-hydraulics code designed for performing accident analyses of SRS reactor fuel assemblies during the Emergency Cooling System (ECS) phase of a Double Ended Guillotine Break (DEGB) Loss of Coolant Accident (LOCA). This report provides a brief description of the physical models in the version of FLOWTRAN-TF used to compute the Recommended K-Reactor Restart ECS Power Limit. This document is viewed as an interim report and should ultimately be superseded by a comprehensive user/programmer manual. In general, only high level discussions of governing equations and constitutive laws are presented. Numerical implementation of these models, code architecture and user information are not generally covered. A companion document describing code benchmarking is available.

Flach, G.P. (ed.)

1991-09-01

448

Reed-Solomon code synchronization revisited  

NASA Astrophysics Data System (ADS)

A concatenated coding consisting of an inner (7, 1/2) convolutional code and an outer (255, 223) Reed-Solomon code was recommended by the Consultative Committee for Space Data Systems for cross-supported space missions. The Reed-Solomon code that was chosen makes use of the Berlekamp encoding algorithm. Some peculiarities of this code that could give rise to synchronization problems are examined. Suggestions are given to alleviate these problems.

Deutsch, L. J.

1985-02-01

449

Reed-solomon Code Synchronization Revisited  

NASA Technical Reports Server (NTRS)

A concatenated coding consisting of an inner (7, 1/2) convolutional code and an outer (255, 223) Reed-Solomon code was recommended by the Consultative Committee for Space Data Systems for cross-supported space missions. The Reed-Solomon code that was chosen makes use of the Berlekamp encoding algorithm. Some peculiarities of this code that could give rise to synchronization problems are examined. Suggestions are given to alleviate these problems.

Deutsch, L. J.

1985-01-01

450

Remote-Handled Transuranic Content Codes  

Microsoft Academic Search

The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document representsthe development of a uniform content code system for RH-TRU waste to be transported in the 72-Bcask. It will be used to convert existing waste form numbers, content codes, and site-specificidentification codes into a system that is uniform across the U.S. Department of Energy (DOE) sites.The existing waste codes at the sites

2001-01-01

451

Trellis-coded CPM for wireless communications  

Microsoft Academic Search

A coded modulation scheme based on trellis codes combined with continuous-phase modulated (CPM) signals is considered. Trellis-coded CPM (TCCPM) is a coded modulation technique for the transmission of digital information over bandwidth- and power-limited channels such as satellite-based terrestrial radio links (MSAT). While trellis codes provide power efficiency, the choice of CPM yields constant-envelope signals with good spectral properties. The

F. Abrishamkar; E. Biglieri

1993-01-01

452

Light-water reactor safety analysis codes  

SciTech Connect

A brief review of the evolution of light-water reactor safety analysis codes is presented. Included is a summary comparison of the technical capabilities of major system codes. Three recent codes are described in more detail to serve as examples of currently used techniques. Example comparisons between calculated results using these codes and experimental data are given. Finally, a brief evaluation of current code capability and future development trends is presented.

Jackson, J.F.; Ransom, V.H.; Ybarrondo, L.J.; Liles, D.R.

1980-01-01

453

SYNAPSE++: Code Dissemination in Wireless Sensor Networks Using Fountain Codes  

Microsoft Academic Search

This paper presents SYNAPSE++, a system for over the air reprogramming of wireless sensor networks (WSNs). In contrast to previous solutions, which implement plain negative acknowledgment-based ARQ strategies, SYNAPSE++ adopts a more sophisticated error recovery approach exploiting rateless fountain codes (FCs). This allows it to scale considerably better in dense networks and to better cope with noisy environments. In order

Michele Rossi; Nicola Bui; Giovanni Zanca; Luca Stabellini; Riccardo Crepaldi; Michele Zorzi

2010-01-01

454

Novel ternary line codes employing Trellis Coded Modulation  

Microsoft Academic Search

The goal of a communication system is to optimally utilise the scarce spectrum and the energy required to transmit information while maintaining a specific quality of service. In this paper, it is proposed to communicate information by using new ternary line coders with code rates R = ˝, 2\\/3 and ľ as invented by Aygolu and Panayirci [1]. The encoding\\/decoding

M. A. Hosany

2010-01-01

455

Robust Streaming Erasure Codes using MDS Constituent Codes  

E-print Network

conferencing, interactive gaming, voice over IP and cloud computing have become widespread. Unlike traditional of Electrical and Computer Engineering University of Toronto Toronto, ON, M5S 3G4, Canada {abadr, akhisti erasures in a given window are also proposed. One disadvantage of these codes is that both use Strongly

Khisti, Ashish

456

Simulation study of photoacoustic coded excitation using Golay Codes  

Microsoft Academic Search

Photoacoustics (PA) is a new imaging modality based on the generation of ultrasound due to laser irradiation. Instead of commonly used Q-switched Nd:YAG lasers the application of pulsed laser diodes as light sources for photoacoustic imaging is proposed. The high pulse repetition frequency of laser diodes enables the usage of coded excitation schemes for SNR improvement. Therefore, the performance of

Martin P. Mienkina; Annika Eder; Georg Schmitz; Claus-Stefan Friedrich; Nils C. Gerhardt; Martin R. Hofmann

2008-01-01

457

Design of proximity detecting codes  

E-print Network

the nuinber of zeros in the data. 2. Another rs = [logs (h + 1)] bits are appended to represent the number of ze- ros in the Is+ ri bits obtained in the first step. (A proof to show that only [logs (h + I)] bits are suillcient for this step is given in [17...]. ) The total number of checkbits for h data bits is r = ri + rs ?? 2[logs (h + I)]. Now we present an example code, followed by a proof that the above construction yields a 1-PD code. Example 3 Consider number of data bits h = 7. Thus, data weight can...

Perisetty, Srinivas

2012-06-07

458

Hybrid codes: Methods and applications  

SciTech Connect

In this chapter we discuss hybrid'' algorithms used in the study of low frequency electromagnetic phenomena, where one or more ion species are treated kinetically via standard PIC methods used in particle codes and the electrons are treated as a single charge neutralizing massless fluid. Other types of hybrid models are possible, as discussed in Winske and Quest, but hybrid codes with particle ions and massless fluid electrons have become the most common for simulating space plasma physics phenomena in the last decade, as we discuss in this paper.

Winske, D. (Los Alamos National Lab., NM (USA)); Omidi, N. (California Univ., San Diego, La Jolla, CA (USA))

1991-01-01

459

Amino acid codes in mitochondria as possible clues to primitive codes  

NASA Technical Reports Server (NTRS)

Differences between mitochondrial codes and the universal code indicate that an evolutionary simplification has taken place, rather than a return to a more primitive code. However, these differences make it evident that the universal code is not the only code possible, and therefore earlier codes may have differed markedly from the previous code. The present universal code is probably a 'frozen accident.' The change in CUN codons from leucine to threonine (Neurospora vs. yeast mitochondria) indicates that neutral or near-neutral changes occurred in the corresponding proteins when this code change took place, caused presumably by a mutation in a tRNA gene.

Jukes, T. H.

1981-01-01

460

EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code  

E-print Network

EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code Project #1 is due partial credit for the work you did do. 2 Extended Hamming Code: Encoding The extended Hamming code adds an additional parity-check bit to the regular Hamming code. This extra parity-check bit is the modulo 2 sum

Howard, Sheryl

461

On Codes with Low Peak-to-Average Power Ratio for Multi-Code CDMA  

E-print Network

second-generation systems using DS-CDMA have been deployed, especially in North America, for example1 On Codes with Low Peak-to-Average Power Ratio for Multi-Code CDMA Kenneth G. Paterson, Member, IEEE Abstract Codes which reduce the peak-to-average power (PAPR) in multi-code code division multiple

Paterson, Kenny

462

The Mystery Behind the Code: Differentiated Instruction with Quick Response Codes in Secondary Physical Education  

ERIC Educational Resources Information Center

Quick response codes, better known as QR codes, are small barcodes scanned to receive information about a specific topic. This article explains QR code technology and the utility of QR codes in the delivery of physical education instruction. Consideration is given to how QR codes can be used to accommodate learners of varying ability levels as…

Adkins, Megan; Wajciechowski, Misti R.; Scantling, Ed

2013-01-01

463

Improving Security in the ATLAS PanDA System  

NASA Astrophysics Data System (ADS)

The security challenges faced by users of the grid are considerably different to those faced in previous environments. The adoption of pilot jobs systems by LHC experiments has mitigated many of the problems associated with the inhomogeneities found on the grid and has greatly improved job reliability; however, pilot jobs systems themselves must then address many security issues, including the execution of multiple users' code under a common 'grid' identity. In this paper we describe the improvements and evolution of the security model in the ATLAS PanDA (Production and Distributed Analysis) system. We describe the security in the PanDA server which is in place to ensure that only authorized members of the VO are allowed to submit work into the system and that jobs are properly audited and monitored. We discuss the security in place between the pilot code itself and the PanDA server, ensuring that only properly authenticated workload is delivered to the pilot for execution. When the code to be executed is from a 'normal' ATLAS user, as opposed to the production system or other privileged actor, then the pilot may use an EGEE developed identity switching tool called gLExec. This changes the grid proxy available to the job and also switches the UNIX user identity to protect the privileges of the pilot code proxy. We describe the problems in using this system and how they are overcome. Finally, we discuss security drills which have been run using PanDA and show how these improved our operational security procedures.

Caballero, J.; Maeno, T.; Nilsson, P.; Stewart, G.; Potekhin, M.; Wenaus, T.

2011-12-01

464

CLOUD SERVICES CODE OF PRACTICE  

E-print Network

Web 2.0 or social media applications and services often have storage capability. Whilst ­ RHUL Code of Practice October2012 Introduction The University is currently considering its policy Protection Act (DPA) 1998; ii. Confidential to the University or a third party; iii. Of such criticality

Royal Holloway, University of London

465

SALT steady state systems code  

Microsoft Academic Search

A steady state system code has been developed at ANL and has been used to analyze or evaluate the following technologies: open cycle magnetohydrodynamics (MHD), liquid metal MHD, fuel cells, combined cycle coal gasification plants, pulverized coal fired power plants with flue gas desulfurization, pressurized and atmospheric fluidized bed combustion plants, municipal solid waste disposal systems, geothermal systems, fusion reactor

G. Berry; H. Geyer

1983-01-01

466

Spring 2014 Cracking the code  

E-print Network

Spring 2014 Cracking the code Regenerating islet cells may lead to a cure for diabetes, medications, and insulin injections. But Jakub Tolar, M.D., Ph.D., director of the University of Minnesota professors James Dutton, Ph.D., and Anannya Banga, Ph.D., for example, are working to convert stem cells

Minnesota, University of

467

Reusable State Machine Code Generator  

NASA Astrophysics Data System (ADS)

The State Machine model is frequently used to represent the behaviour of a system, allowing one to express and execute this behaviour in a deterministic way. A graphical representation such as a UML State Chart diagram tames the complexity of the system, thus facilitating changes to the model and communication between developers and domain experts. We present a reusable state machine code generator, developed by the Universidad Técnica Federico Santa María and the European Southern Observatory. The generator itself is based on the open source project architecture, and uses UML State Chart models as input. This allows for a modular design and a clean separation between generator and generated code. The generated state machine code has well-defined interfaces that are independent of the implementation artefacts such as the middle-ware. This allows using the generator in the substantially different observatory software of the Atacama Large Millimeter Array and the ESO Very Large Telescope. A project-specific mapping layer for event and transition notification connects the state machine code to its environment, which can be the Common Software of these projects, or any other project. This approach even allows to automatically create tests for a generated state machine, using techniques from software testing, such as path-coverage.

Hoffstadt, A. A.; Reyes, C.; Sommer, H.; Andolfato, L.

2010-12-01

468

WESTERN MICHIGAN UNIVERSITY STUDENT CODE  

E-print Network

WESTERN MICHIGAN UNIVERSITY STUDENT CODE Approved by The Western Michigan University Board Michigan University Kalamazoo, MI 49008 Effective August 2008 #12;A UNIVERSITY COMMUNITY IS... ...a for the Advancement of Teaching; Ernest L. Boyer (frwd.); Princeton, New Jersey; 1990 #12;WESTERN MICHIGAN UNIVERSITY

de Doncker, Elise

469

Colon Histology Coding Rules Flowchart  

Cancer.gov

Ne xt Page NO Rule Action Notes and Examples Colon Histology Coding Rules - Flowchart Flowchart Key Flow Direction Notes and Examples Rule Action (Exc ludes lym phom a and leukem ia M9590-9989 and Kapos i sarcoma M9140) (C180-C189) M ULT IPLE TUM ORS ABSTRACTED AS A SINGLE PRIM ARY H20 Are there multiple invasive tumors?

470

Variations in sending Morse code  

Microsoft Academic Search

Studied the deviations from the theoretical Morse code sequence (dot: dash: space ratios) in inexperienced and experienced Ss. Found evidence of variations due to different contextual occurrences of the signals (heterotaxic variation). Confirmed the finding that variations due to repetition of a signal decrease with expertness but did not confirm that heterotaxic variation increases with expertness. 16 references.

Charles Windle

1955-01-01

471

A Code in the Nose  

NSDL National Science Digital Library

The mammalian nose is arguably the best chemical detector on the planet, capable of detecting and discriminating among many thousands of compounds. This ability is mediated at the earliest steps by a large family of G protein (heterotrimeric guanine nucleotide-binding protein)–coupled receptors (GPCRs). The capacity to detect and discriminate odors depends on a combinatorial code, in which any given receptor recognizes many odors and any given odor compound might serve as a ligand at multiple receptors. Recent research adds a layer of complexity to the interpretation of this olfactory code, suggesting that the overall effect of a mixture of odorants is not simply equal to the sum of its parts. Rather, individual odorants can act as antagonists at the level of individual GPCRs, thereby suppressing some of the signaling pathways activated by structurally related compounds. Thus, the odor code not only is a function of the pattern of activated receptors, but also may be further sharpened by the action of antagonism. It seems that odor coding is now a division of pharmacology.

Stuart Firestein (Columbia University; Department of Biological Sciences REV)

2004-04-06

472

Multiplier Architecture for Coding Circuits  

NASA Technical Reports Server (NTRS)

Multipliers based on new algorithm for Galois-field (GF) arithmetic regular and expandable. Pipeline structures used for computing both multiplications and inverses. Designs suitable for implementation in very-large-scale integrated (VLSI) circuits. This general type of inverter and multiplier architecture especially useful in performing finite-field arithmetic of Reed-Solomon error-correcting codes and of some cryptographic algorithms.

Wang, C. C.; Truong, T. K.; Shao, H. M.; Deutsch, L. J.

1986-01-01

473

The FORTRAN automatic coding system  

Microsoft Academic Search

The FORTRAN project was begun in the summer of 1954. Its purpose was to reduce by a large factor the task of preparing scientific problems for IBM's next large computer, the 704. If it were possible for the 704 to code problems for itself and produce as good programs as human coders (but without the errors), it was clear that

J. W. Backus; R. J. Beeber; S. Best; R. Goldberg; L. M. Haibt; H. L. Herrick; R. A. Nelson; D. Sayre; P. B. Sheridan; H. Stern; I. Ziller; R. A. Hughes; R. Nutt

1957-01-01

474

Dependence clusters in source code  

Microsoft Academic Search

A dependence cluster is a set of program statements, all of which are mutually inter-dependent. This paper reports a large scale empirical study of dependence clusters in C program source code. The study reveals that large dependence clusters are surprisingly commonplace. Most of the 45 programs studied have clusters of dependence that consume more than 10% of the whole program.

Mark Harman; David Binkley; Keith Gallagher; Nicolas Gold; Jens Krinke

2009-01-01

475

The linear quotient hash code  

Microsoft Academic Search

A new method of hash coding is presented and is shown to possess desirable attributes. Specifically, the algorithm is simple, efficient, and exhaustive, while needing little time per probe and using few probes per lookup. Performance data and implementation hints are also given.

James R. Bell; Charles H. Kaman

1970-01-01

476

Free Energy Code Online Discussion  

E-print Network

Free Energy Code Online Discussion for Building Department Personnel Join us for this FREE 90 Bruce Cheney from Anchors Aweigh Energy, LLC want to hear from YOU on residential HVAC changeout issues of the California Energy Commission. Date: 3 dates currently offered, choose the one that works for you

477

Corrections to the Vienna Code  

Technology Transfer Automated Retrieval System (TEKTRAN)

Since the publication of the Vienna Code, several errors have been noticed. Most are minor punctuation or cross-referencing errors, or, in the Appendices, inconsistencies in abbreviation, but there was one important omission from Art. 37, the misspelling of two specific epithets and the transpositio...

478

Code for Hydrogen Hydrogen Pipeline  

E-print Network

of the code ­ Materials section ­ Welding and forming section ­ Operation and maintenance section · The above of 30% in toughness & 15% burst strength - Rapid hydrogen assisted fatigue crack growth - Sustained-load cracking in HAZ of welds #12;11 Hydrogen Pipeline Issues · Materials (cont'd) - Are micro-alloyed steels

479

AEDS Property Classification Code Manual.  

ERIC Educational Resources Information Center

The control and inventory of property items using data processing machines requires a form of numerical description or code which will allow a maximum of description in a minimum of space on the data card. An adaptation of a standard industrial classification system is given to cover any expendable warehouse item or non-expendable piece of…

Association for Educational Data Systems, Washington, DC.

480

Tenerife, November 2007 Formalism & Codes  

E-print Network

Lecture IV Wayne Hu Tenerife, November 2007 Formalism & Codes m=0 v Scalars: hot hot cold m=1 vv · Fundamental equations: Einstein equations, covariant conservation of stress-energy tensor: Gµ = 8GTµ µTµ = 0 Tensor · Likewise expand the matter stress energy tensor around a homogeneous density and pressure p: T0

Hu, Wayne

481

PAYMENT VOUCHER Vendor Code: L#  

E-print Network

PAYMENT VOUCHER Vendor Code: L# Vendor Name: Person Picking Up Check* Addrl: Mail Stop AddR: Check#/ DESCRIPTION(20) HumanSbjt Payments ORGN (4) 0000 OBJECT(2) 30 VENDOR INVOICE# (11) AMOUNT 100.00 SUB-OBJECT(2

Hemmers, Oliver

482

Modular optimization code package: MOZAIK  

NASA Astrophysics Data System (ADS)

This dissertation addresses the development of a modular optimization code package, MOZAIK, for geometric shape optimization problems in nuclear engineering applications. MOZAIK's first mission, determining the optimal shape of the D2O moderator tank for the current and new beam tube configurations for the Penn State Breazeale Reactor's (PSBR) beam port facility, is used to demonstrate its capabilities and test its performance. MOZAIK was designed as a modular optimization sequence including three primary independent modules: the initializer, the physics and the optimizer, each having a specific task. By using fixed interface blocks among the modules, the code attains its two most important characteristics: generic form and modularity. The benefit of this modular structure is that the contents of the modules can be switched depending on the requirements of accuracy, computational efficiency, or compatibility with the other modules. Oak Ridge National Laboratory's discrete ordinates transport code TORT was selected as the transport solver in the physics module of MOZAIK, and two different optimizers, Min-max and Genetic Algorithms (GA), were implemented in the optimizer module of the code package. A distributed memory parallelism was also applied to MOZAIK via MPI (Message Passing Interface) to execute the physics module concurrently on a number of processors for various states in the same search. Moreover, dynamic scheduling was enabled to enhance load balance among the processors while running MOZAIK's physics module thus improving the parallel speedup and efficiency. In this way, the total computation time consumed by the physics module is reduced by a factor close to M, where M is the number of processors. This capability also encourages the use of MOZAIK for shape optimization problems in nuclear applications because many traditional codes related to radiation transport do not have parallel execution capability. A set of computational models based on the existing beam port configuration of the Penn State Breazeale Reactor (PSBR) was designed to test and validate the code package in its entirety, as well as its modules separately. The selected physics code, TORT, and the requisite data such as source distribution, cross-sections, and angular quadratures were comprehensively tested with these computational models. The modular feature and the parallel performance of the code package were also examined using these computational models. Another outcome of these computational models is to provide the necessary background information for determining the optimal shape of the D2O moderator tank for the new beam tube configurations for the PSBR's beam port facility. The first mission of the code package was completed successfully by determining the optimal tank shape which was sought for the current beam tube configuration and two new beam tube configurations for the PSBR's beam port facility. The performance of the new beam tube configurations and the current beam tube configuration were evaluated with the new optimal tank shapes determined by MOZAIK. Furthermore, the performance of the code package with the two different optimization strategies were analyzed showing that while GA is capable of achieving higher thermal beam intensity for a given beam tube setup, Min-max produces an optimal shape that is more amenable to machining and manufacturing. The optimal D2O moderator tank shape determined by MOZAIK with the current beam port configuration improves the thermal neutron beam intensity at the beam port exit end by 9.5%. Similarly, the new tangential beam port configuration (beam port near the core interface) with the optimal moderator tank shape determined by MOZAIK improves the thermal neutron beam intensity by a factor of 1.4 compared to the existing beam port configuration (with the existing D2O moderator tank). Another new beam port configuration, radial beam tube configuration, with the optimal moderator tank shape increases the thermal neutron beam intensity at the beam tube exit by a factor of 1.8. All these results

Bekar, Kursat B.

483

Degenerate Quantum Codes for Pauli Channels  

E-print Network

A striking feature of quantum error correcting codes is that they can sometimes be used to correct more errors than they can uniquely identify. Such degenerate codes have long been known, but have remained poorly understood. We provide a heuristic for designing degenerate quantum codes for high noise rates, which is applied to generate codes that can be used to communicate over almost any Pauli channel at rates that are impossible for a nondegenerate code. The gap between nondegenerate and degenerate code performance is quite large, in contrast to the tiny magnitude of the only previous demonstration of this effect. We also identify a channel for which none of our codes outperform the best nondegenerate code and show that it is nevertheless quite unlike any channel for which nondegenerate codes are known to be optimal.

Graeme Smith; John A. Smolin

2006-04-14

484

Exploring Leonardo  

NSDL National Science Digital Library

This online exhibit on Leonardo da Vinci includes references and activities about both his scientific and artistic work. The site is divided into several sections, with each section offering background information about da Vinci, links to more in depth articles and classroom activities.

1997-01-01

485

Physical Activity Monitoring: Gadgets and Uses. Article #6 in a 6-Part Series  

ERIC Educational Resources Information Center

An early 15th century drawing by Leonardo da Vinci depicted a device that used gears and a pendulum that moved in synchronization with the wearer as he or she walked. This is believed to be the early origins of today's physical activity monitoring devices. Today's devices have vastly expanded on da Vinci's ancient concept with a myriad of options…

Mears, Derrick

2010-01-01

486

The impact of Nikola Tesla on the cement industry  

Microsoft Academic Search

Nikola Tesla was perhaps the greatest inventor\\/engineer the world has known since the time of Leonardo da Vinci. Similar to da Vinci, Tesla's work was revolutionary, and Tesla's work was forgotten by the time his work was fully developed by others. Tesla was awarded the original patents that established the foundation for generating, delivering and utilizing the electricity used in

Jeffrey L. Sellon

1997-01-01

487

Collegeweek 2: De Gulden Snede  

E-print Network

Paciola tot Escher (3) · Leonardo da Vinci (1452-1519) tekende op aanwijzing van Vitruvius een man op van illustraties voorzien door Leonardo da Vinci. · In het boek geeft Paciola een overzicht van het regelmatige veelhoeken · VIII. Carl Friedrich Gauss · IX. De rij van Fibonacci · X. Leonardo van Pisa

Broer, H.W.

488

Fluid Mechanics from the Beginning to the Third Millennium*  

E-print Network

of mathematics. (Leonardo da Vinci, 1452±1519) The Greek mathematician Archimedes (287±212 BC) provided an exact followed, only to be re-irrigated by the Renaissance's deluge of art and science. Leonardo da Vinci (1452±1519 the value of wind- breaks to keep top soil in place and to protect fragile crops. ARCHIMEDES TO LEONARDO

Gad-el-Hak, Mohamed

489

Remote Telesurgery Daniel Obenshain and Tom Tantillo  

E-print Network

surgery via robotic tools, as opposed to traditional laproscopy or even more traditional open surgery. #12;Da Vinci Robot · The da Vinci Robot, build by Intuitive Surgical, has become the most commonly to perform a gall bladder surgery while he was in New York and the patient was in France. Image from J

Amir, Yair

490

The Role of Robotic Surgery in Morbid Obesity  

Microsoft Academic Search

The purpose of this review was to form a collaborative opinion regarding the utility of robotic tech- nology, specifically the da Vinci™ robot (Intuitive Surgical, Inc., Sunnyvale, CA), for bariatric surgery. Eleven surgeons are currently using the da Vinci system to perform laparoscopic bariatric surgery. The surgeons were queried about the type of robotic bariatric surgery and number of cases

Garth Jacobsen; Robert Berger; Santiago Horgan

2003-01-01

491

Modeling of Needle-Tissue Interaction Forces During Surgical Suturing Russell C. Jackson and M. Cenk C avusoglu  

E-print Network

the forces experienced during a suture. I. INTRODUCTION Even with the assistance of robotic surgical systems such as the daVinci R system (Intuitive Surgical, Sunnyvale, Califor- nia). Even though the daVinci R robotModeling of Needle-Tissue Interaction Forces During Surgical Suturing Russell C. Jackson and M

Cavusoglu, Cenk

492

Reading Guide for The Golden Ratio: The Story of Chapter 1. Prelude to a Number  

E-print Network

Pacioli, Leonardo da Vinci, , and the divine proportion. 28. According to Pacioli, why is divine? 29. Discuss the philosophy of form behind Leonardo da Vinci's Vitruvian Man. 30. Who was Albrecht D¨urer? 31 of Good Nature 18. Who was Leonardo of Pisa? Note the things he is remembered for. 19. Who was Fibonacci

Anderson, Douglas R.

493

INTERNATIONAL JOB FAIR 7th October 2014  

E-print Network

P.zza Leonardo da Vinci, 32 20133 Milano · Company Stand/desk · Presentations or Workshops.zza Leonardo da Vinci, 32 20133 Milano, Italy #12; COMPANY CAN DO WHY PARTICIPATE TUESDAY OCT 7 2014 10.00 am ­ 6.00 pm Politecnico di Milano Leonardo Campus

494

Damage predictions for wind turbine components using the LIFE2 computer code  

NASA Astrophysics Data System (ADS)

The LIFE2 computer code is a fatigue/fracture analysis code that is specialized to the analysis of wind turbine components. It is a PC-compatible FORTRAN code that is written in a top-down modular format. The service lifetime of a component can be divided into three phases: crack initiation, growth and coalescence of micro-cracks and growth of a macro-crack. In the LIFE2 formulation, a S-n fatigue analysis is used to describe the first two phases and a linear, da/dn fracture analysis is used to describe the third phase. The code is divided into five main sections. The first four describe the wind resource, the constitutive properties of the turbine material, the stress state in which the turbine operates and operational parameters for the turbine system. The fifth uses the data files written by the first four sections to calculate the service lifetime of a turbine component. In addition to the main sections, auxiliary sections are included to permit the storage of data and code calculations and to permit the plotting of results. This report describes the computational framework used in the LIFE2 code to evaluate the damage rules cited above. An example problem is presented here to illustrate the capabilities of the code.

Sutherland, Herbert J.

495

Two-Layer Error Control Codes Combining Rectangular and Hamming Product Codes for Cache Error  

E-print Network

We propose a novel two-layer error control code, combining error detection capability of rectangular codes and error correction capability of Hamming product codes in an efficient way, in order to increase cache error ...

Zhang, Meilin

496

Improved source code editing for effective ad-hoc code reuse  

E-print Network

Code reuse is essential for productivity and software quality. Code reuse based on abstraction mechanisms in programming languages is a standard approach, but programmers also reuse code by taking an ad-hoc approach, in ...

Han, Sangmok

2011-01-01

497

Adaptive code generators for tree coding of speech at 16 kbps  

E-print Network

spent reviewing the final manuscript. TABLE OF CONTENTS CHAPTER I INTRODUCTION A. Digital Coding of Speech Waveforms B. Adaptive Differential Pulse Code Modulation C. Delayed Decision Coding D. Elements of s. Tree Coder E. Research Objectives F.... Summary of Chapters Page I 2 6 9 10 11 II A SURVEY OF PREVIOUS RESEARCH IN TREE CODING . 13 A. Tree Coding Theorems B. Tree Search Algorithms C. Distortion Measures D. Code Generators 13 14 19 20 III SIMULATION DESCRIPTION . A. Sampled...

Haschke, Greg Benjamin

1987-01-01

498

Trellis-Coded Quantization Based on Maximum-Hamming-Distance Binary Codes  

Microsoft Academic Search

Most design approaches for trellis-coded quantiza- tion take advantage of the duality of trellis-coded quantization with trellis-coded modulation, and use the same empirically- found convolutional codes to label the trellis branches. This letter presents an alternative approach that instead takes advantage of maximum-Hamming-distance convolutional codes. The proposed source codes are shown to be competitive with the best in the literature

Lorenzo Cappellari

2007-01-01

499

Near-capacity dirty-paper code design: a source-channel coding approach  

Microsoft Academic Search

This paper examines near-capacity dirty-paper code designs based on source-channel coding. We first point out that the performance loss in signal-to-noise ratio (SNR) in our code designs can be broken into the sum of the packing loss from channel coding and a modulo loss, which is a function of the granular loss from source coding and the target dirty-paper coding

Yong Sun; Yang Yang; Angelos D. Liveris; Vladimir Stankovic ´; Zixiang Xiong

2009-01-01

500

FALCON BUILDING LIST BY CODE rev 03-01-13 Bldg Code Bldg Name PROPERTY  

E-print Network

FALCON BUILDING LIST BY CODE rev 03-01-13 Bldg Code Bldg Name PROPERTY 5 Anatomy Chemistry CAMPUS-5-155 Page 1 of 24 #12;FALCON BUILDING LIST BY CODE rev 03-01-13 Bldg Code Bldg Name PROPERTY 160-Fischer Hall CAMPUS-284 Page 2 of 24 #12;FALCON BUILDING LIST BY CODE rev 03-01-13 Bldg Code Bldg Name PROPERTY

Sharp, Kim