Science.gov

Sample records for identification code bic

  1. Color code identification in coded structured light.

    PubMed

    Zhang, Xu; Li, Youfu; Zhu, Limin

    2012-08-01

    Color code is widely employed in coded structured light to reconstruct the three-dimensional shape of objects. Before determining the correspondence, a very important step is to identify the color code. Until now, the lack of an effective evaluation standard has hindered the progress in this unsupervised classification. In this paper, we propose a framework based on the benchmark to explore the new frontier. Two basic facets of the color code identification are discussed, including color feature selection and clustering algorithm design. First, we adopt analysis methods to evaluate the performance of different color features, and the order of these color features in the discriminating power is concluded after a large number of experiments. Second, in order to overcome the drawback of K-means, a decision-directed method is introduced to find the initial centroids. Quantitative comparisons affirm that our method is robust with high accuracy, and it can find or closely approach the global peak. PMID:22859022

  2. Secure surface identification codes

    NASA Astrophysics Data System (ADS)

    Beekhof, F.; Voloshynovskiy, S.; Koval, O.; Villan, R.; Pun, T.

    2008-02-01

    This paper introduces an identification framework for random microstructures of material surfaces. These microstructures represent a kind of unique fingerprints that can be used to track and trace an item as well as for anti-counterfeiting. We first consider the architecture for mobile phone-based item identification and then introduce a practical identification algorithm enabling fast searching in large databases. The proposed algorithm is based on reference list decoding. The link to digital communications and robust perceptual hashing is shown. We consider a practical construction of reference list decoding, which comprizes computational complexity, security, memory storage and performance requirements. The efficiency of the proposed algorithm is demonstrated on experimental data obtained from natural paper surfaces.

  3. 49 CFR 178.502 - Identification codes for packagings.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Identification codes for packagings. 178.502... FOR PACKAGINGS Non-bulk Performance-Oriented Packaging Standards § 178.502 Identification codes for packagings. (a) Identification codes for designating kinds of packagings consist of the following: (1)...

  4. 49 CFR 178.905 - Large Packaging identification codes.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 3 2011-10-01 2011-10-01 false Large Packaging identification codes. 178.905... PACKAGINGS Large Packagings Standards § 178.905 Large Packaging identification codes. Large packaging code... letter(s) specified in paragraph (b) of this section. (a) Large packaging code number designations are...

  5. 49 CFR 178.905 - Large Packaging identification codes.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 3 2012-10-01 2012-10-01 false Large Packaging identification codes. 178.905... PACKAGINGS Large Packagings Standards § 178.905 Large Packaging identification codes. Large packaging code... letter(s) specified in paragraph (b) of this section. (a) Large packaging code number designations are...

  6. 49 CFR 178.905 - Large Packaging identification codes.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 3 2013-10-01 2013-10-01 false Large Packaging identification codes. 178.905... PACKAGINGS Large Packagings Standards § 178.905 Large Packaging identification codes. Large packaging code... letter(s) specified in paragraph (b) of this section. (a) Large packaging code number designations are...

  7. 49 CFR 178.905 - Large Packaging identification codes.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 3 2014-10-01 2014-10-01 false Large Packaging identification codes. 178.905... PACKAGINGS Large Packagings Standards § 178.905 Large Packaging identification codes. Large packaging code... letter(s) specified in paragraph (b) of this section. (a) Large packaging code number designations are...

  8. 49 CFR 178.905 - Large Packaging identification codes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Large Packaging identification codes. 178.905... FOR PACKAGINGS Large Packagings Standards § 178.905 Large Packaging identification codes. Large packaging code designations consist of: two numerals specified in paragraph (a) of this section; followed...

  9. 49 CFR 178.1005 - Flexible Bulk Container identification code.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 3 2014-10-01 2014-10-01 false Flexible Bulk Container identification code. 178... FOR PACKAGINGS Flexible Bulk Container Standards § 178.1005 Flexible Bulk Container identification code. The Flexible Bulk Container code designation is BK3....

  10. 49 CFR 178.1005 - Flexible Bulk Container identification code.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 3 2013-10-01 2013-10-01 false Flexible Bulk Container identification code. 178... FOR PACKAGINGS Flexible Bulk Container Standards § 178.1005 Flexible Bulk Container identification code. The Flexible Bulk Container code designation is BK3....

  11. 33 CFR 181.31 - Manufacturer identification code assignment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... types and sizes of boats that will be imported. If a nation has a hull identification number system... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Manufacturer identification code... SECURITY (CONTINUED) BOATING SAFETY MANUFACTURER REQUIREMENTS Identification of Boats § 181.31...

  12. 33 CFR 181.31 - Manufacturer identification code assignment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... be imported. If a nation has a hull identification number system which has been accepted by the U.S... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Manufacturer identification code... SECURITY (CONTINUED) BOATING SAFETY MANUFACTURER REQUIREMENTS Identification of Boats § 181.31...

  13. 33 CFR 181.31 - Manufacturer identification code assignment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... be imported. If a nation has a hull identification number system which has been accepted by the U.S... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Manufacturer identification code... SECURITY (CONTINUED) BOATING SAFETY MANUFACTURER REQUIREMENTS Identification of Boats § 181.31...

  14. Improving the Use of Self-Generated Identification Codes

    ERIC Educational Resources Information Center

    Schnell, Rainer; Bachteler, Tobias; Reiher, Jorg

    2010-01-01

    In panel studies on sensitive topics, respondent-generated identification codes are often used to link records across surveys. However, usually a substantial number of cases are lost due to the codes. These losses may cause biased estimates. Using more components and linking the codes by the Levenshtein string distance function will reduce the…

  15. Systematic Functional Analysis of Bicaudal-D Serine Phosphorylation and Intragenic Suppression of a Female Sterile Allele of BicD

    PubMed Central

    Koch, Rafael; Ledermann, Romana; Urwyler, Olivier; Heller, Manfred; Suter, Beat

    2009-01-01

    Protein phosphorylation is involved in posttranslational control of essentially all biological processes. Using mass spectrometry, recent analyses of whole phosphoproteomes led to the identification of numerous new phosphorylation sites. However, the function of most of these sites remained unknown. We chose the Drosophila Bicaudal-D protein to estimate the importance of individual phosphorylation events. Being involved in different cellular processes, BicD is required for oocyte determination, for RNA transport during oogenesis and embryogenesis, and for photoreceptor nuclei migration in the developing eye. The numerous roles of BicD and the available evidence for functional importance of BicD phosphorylation led us to identify eight phosphorylation sites of BicD, and we tested a total of 14 identified and suspected phosphoserine residues for their functional importance in vivo in flies. Surprisingly, all these serines turned out to be dispensable for providing sufficient basal BicD activity for normal growth and development. However, in a genetically sensitized background where the BicDA40V protein variant provides only partial activity, serine 103 substitutions are not neutral anymore, but show surprising differences. The S103D substitution completely inactivates the protein, whereas S103A behaves neutral, and the S103F substitution, isolated in a genetic screen, restores BicDA40V function. Our results suggest that many BicD phosphorylation events may either be fortuitous or play a modulating function as shown for Ser103. Remarkably, amongst the Drosophila serines we found phosphorylated, Ser103 is the only one that is fully conserved in mammalian BicD. PMID:19234596

  16. Identification coding schemes for modulated reflectance systems

    DOEpatents

    Coates, Don M.; Briles, Scott D.; Neagley, Daniel L.; Platts, David; Clark, David D.

    2006-08-22

    An identifying coding apparatus employing modulated reflectance technology involving a base station emitting a RF signal, with a tag, located remotely from the base station, and containing at least one antenna and predetermined other passive circuit components, receiving the RF signal and reflecting back to the base station a modulated signal indicative of characteristics related to the tag.

  17. Bar code technology improves positive patient identification and transfusion safety.

    PubMed

    Sandler, S G; Langeberg, A; Dohnalek, L

    2005-01-01

    As a result of human error, an estimated 1 in 12,000 blood transfusions is given to the wrong patient. The cause of nearly all of these errors is failure of hospital personnel to identify positively intended transfusion recipients, their blood samples for cross-matching, or their correct blood components. We describe our experience using a point-of-care bar code transfusion safety system that links patients' bar-coded wristbands, with bar-coded labels on blood sample tubes, blood component bags, and nurses' identification badges. The result was 100 % accuracy of matching patients, their blood samples, and components for transfusions. For verifying information before starting blood transfusions, nurses preferred bar code "double checks" to conventional visual "double checks" by a second nurse. Methods are needed to reinforce nurses' proficiency with technological approaches to transfusion safety, such as software-driven bar code scanning, in situations where transfusions are administered infrequently. PMID:16050151

  18. BicSPAM: flexible biclustering using sequential patterns

    PubMed Central

    2014-01-01

    Background Biclustering is a critical task for biomedical applications. Order-preserving biclusters, submatrices where the values of rows induce the same linear ordering across columns, capture local regularities with constant, shifting, scaling and sequential assumptions. Additionally, biclustering approaches relying on pattern mining output deliver exhaustive solutions with an arbitrary number and positioning of biclusters. However, existing order-preserving approaches suffer from robustness, scalability and/or flexibility issues. Additionally, they are not able to discover biclusters with symmetries and parameterizable levels of noise. Results We propose new biclustering algorithms to perform flexible, exhaustive and noise-tolerant biclustering based on sequential patterns (BicSPAM). Strategies are proposed to allow for symmetries and to seize efficiency gains from item-indexable properties and/or from partitioning methods with conservative distance guarantees. Results show BicSPAM ability to capture symmetries, handle planted noise, and scale in terms of memory and time. BicSPAM also achieves the best match-scores for the recovery of hidden biclusters in synthetic datasets with varying noise distributions and levels of missing values. Finally, results on gene expression data lead to complete solutions, delivering new biclusters corresponding to putative modules with heightened biological relevance. Conclusions BicSPAM provides an exhaustive way to discover flexible structures of order-preserving biclusters. To the best of our knowledge, BicSPAM is the first attempt to deal with order-preserving biclusters that allow for symmetries and that are robust to varying levels of noise. PMID:24885271

  19. Adaptive error correction codes for face identification

    NASA Astrophysics Data System (ADS)

    Hussein, Wafaa R.; Sellahewa, Harin; Jassim, Sabah A.

    2012-06-01

    Face recognition in uncontrolled environments is greatly affected by fuzziness of face feature vectors as a result of extreme variation in recording conditions (e.g. illumination, poses or expressions) in different sessions. Many techniques have been developed to deal with these variations, resulting in improved performances. This paper aims to model template fuzziness as errors and investigate the use of error detection/correction techniques for face recognition in uncontrolled environments. Error correction codes (ECC) have recently been used for biometric key generation but not on biometric templates. We have investigated error patterns in binary face feature vectors extracted from different image windows of differing sizes and for different recording conditions. By estimating statistical parameters for the intra-class and inter-class distributions of Hamming distances in each window, we encode with appropriate ECC's. The proposed approached is tested for binarised wavelet templates using two face databases: Extended Yale-B and Yale. We shall demonstrate that using different combinations of BCH-based ECC's for different blocks and different recording conditions leads to in different accuracy rates, and that using ECC's results in significantly improved recognition results.

  20. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 1 2013-04-01 2013-04-01 false Controls for identification codes/passwords. 11... identification codes/passwords. Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls...

  1. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 1 2014-04-01 2014-04-01 false Controls for identification codes/passwords. 11... identification codes/passwords. Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls...

  2. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 1 2012-04-01 2012-04-01 false Controls for identification codes/passwords. 11... identification codes/passwords. Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls...

  3. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 1 2011-04-01 2011-04-01 false Controls for identification codes/passwords. 11... identification codes/passwords. Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls...

  4. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Controls for identification codes/passwords. 11... identification codes/passwords. Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls...

  5. Bar Coding MS(2) Spectra for Metabolite Identification.

    PubMed

    Spalding, Jonathan L; Cho, Kevin; Mahieu, Nathaniel G; Nikolskiy, Igor; Llufrio, Elizabeth M; Johnson, Stephen L; Patti, Gary J

    2016-03-01

    Metabolite identifications are most frequently achieved in untargeted metabolomics by matching precursor mass and full, high-resolution MS(2) spectra to metabolite databases and standards. Here we considered an alternative approach for establishing metabolite identifications that does not rely on full, high-resolution MS(2) spectra. First, we select mass-to-charge regions containing the most informative metabolite fragments and designate them as bins. We then translate each metabolite fragmentation pattern into a binary code by assigning 1's to bins containing fragments and 0's to bins without fragments. With 20 bins, this binary-code system is capable of distinguishing 96% of the compounds in the METLIN MS(2) library. A major advantage of the approach is that it extends untargeted metabolomics to low-resolution triple quadrupole (QqQ) instruments, which are typically less expensive and more robust than other types of mass spectrometers. We demonstrate a method of acquiring MS(2) data in which the third quadrupole of a QqQ instrument cycles over 20 wide isolation windows (coinciding with the location and width of our bins) for each precursor mass selected by the first quadrupole. Operating the QqQ instrument in this mode yields diagnostic bar codes for each precursor mass that can be matched to the bar codes of metabolite standards. Furthermore, our data suggest that using low-resolution bar codes enables QqQ instruments to make MS(2)-based identifications in untargeted metabolomics with a specificity and sensitivity that is competitive to high-resolution time-of-flight technologies. PMID:26837423

  6. CRITICA: coding region identification tool invoking comparative analysis

    NASA Technical Reports Server (NTRS)

    Badger, J. H.; Olsen, G. J.; Woese, C. R. (Principal Investigator)

    1999-01-01

    Gene recognition is essential to understanding existing and future DNA sequence data. CRITICA (Coding Region Identification Tool Invoking Comparative Analysis) is a suite of programs for identifying likely protein-coding sequences in DNA by combining comparative analysis of DNA sequences with more common noncomparative methods. In the comparative component of the analysis, regions of DNA are aligned with related sequences from the DNA databases; if the translation of the aligned sequences has greater amino acid identity than expected for the observed percentage nucleotide identity, this is interpreted as evidence for coding. CRITICA also incorporates noncomparative information derived from the relative frequencies of hexanucleotides in coding frames versus other contexts (i.e., dicodon bias). The dicodon usage information is derived by iterative analysis of the data, such that CRITICA is not dependent on the existence or accuracy of coding sequence annotations in the databases. This independence makes the method particularly well suited for the analysis of novel genomes. CRITICA was tested by analyzing the available Salmonella typhimurium DNA sequences. Its predictions were compared with the DNA sequence annotations and with the predictions of GenMark. CRITICA proved to be more accurate than GenMark, and moreover, many of its predictions that would seem to be errors instead reflect problems in the sequence databases. The source code of CRITICA is freely available by anonymous FTP (rdp.life.uiuc.edu in/pub/critica) and on the World Wide Web (http:/(/)rdpwww.life.uiuc.edu).

  7. Identification of protein coding regions in RNA transcripts

    PubMed Central

    Tang, Shiyuyun; Lomsadze, Alexandre; Borodovsky, Mark

    2015-01-01

    Massive parallel sequencing of RNA transcripts by next-generation technology (RNA-Seq) generates critically important data for eukaryotic gene discovery. Gene finding in transcripts can be done by statistical (alignment-free) as well as by alignment-based methods. We describe a new tool, GeneMarkS-T, for ab initio identification of protein-coding regions in RNA transcripts. The algorithm parameters are estimated by unsupervised training which makes unnecessary manually curated preparation of training sets. We demonstrate that (i) the unsupervised training is robust with respect to the presence of transcripts assembly errors and (ii) the accuracy of GeneMarkS-T in identifying protein-coding regions and, particularly, in predicting translation initiation sites in modelled as well as in assembled transcripts compares favourably to other existing methods. PMID:25870408

  8. UniBic: Sequential row-based biclustering algorithm for analysis of gene expression data

    PubMed Central

    Wang, Zhenjia; Li, Guojun; Robinson, Robert W.; Huang, Xiuzhen

    2016-01-01

    Biclustering algorithms, which aim to provide an effective and efficient way to analyze gene expression data by finding a group of genes with trend-preserving expression patterns under certain conditions, have been widely developed since Morgan et al. pioneered a work about partitioning a data matrix into submatrices with approximately constant values. However, the identification of general trend-preserving biclusters which are the most meaningful substructures hidden in gene expression data remains a highly challenging problem. We found an elementary method by which biologically meaningful trend-preserving biclusters can be readily identified from noisy and complex large data. The basic idea is to apply the longest common subsequence (LCS) framework to selected pairs of rows in an index matrix derived from an input data matrix to locate a seed for each bicluster to be identified. We tested it on synthetic and real datasets and compared its performance with currently competitive biclustering tools. We found that the new algorithm, named UniBic, outperformed all previous biclustering algorithms in terms of commonly used evaluation scenarios except for BicSPAM on narrow biclusters. The latter was somewhat better at finding narrow biclusters, the task for which it was specifically designed. PMID:27001340

  9. UniBic: Sequential row-based biclustering algorithm for analysis of gene expression data.

    PubMed

    Wang, Zhenjia; Li, Guojun; Robinson, Robert W; Huang, Xiuzhen

    2016-01-01

    Biclustering algorithms, which aim to provide an effective and efficient way to analyze gene expression data by finding a group of genes with trend-preserving expression patterns under certain conditions, have been widely developed since Morgan et al. pioneered a work about partitioning a data matrix into submatrices with approximately constant values. However, the identification of general trend-preserving biclusters which are the most meaningful substructures hidden in gene expression data remains a highly challenging problem. We found an elementary method by which biologically meaningful trend-preserving biclusters can be readily identified from noisy and complex large data. The basic idea is to apply the longest common subsequence (LCS) framework to selected pairs of rows in an index matrix derived from an input data matrix to locate a seed for each bicluster to be identified. We tested it on synthetic and real datasets and compared its performance with currently competitive biclustering tools. We found that the new algorithm, named UniBic, outperformed all previous biclustering algorithms in terms of commonly used evaluation scenarios except for BicSPAM on narrow biclusters. The latter was somewhat better at finding narrow biclusters, the task for which it was specifically designed. PMID:27001340

  10. Proposing national identification number on dental prostheses as universal personal identification code - A revolution in forensic odontology.

    PubMed

    Baad, Rajendra K; Belgaumi, Uzma; Vibhute, Nupura; Kadashetti, Vidya; Chandrappa, Pramod Redder; Gugwad, Sushma

    2015-01-01

    The proper identification of a decedent is not only important for humanitarian and emotional reasons, but also for legal and administrative purposes. During the reconstructive identification process, all necessary information is gathered from the unknown body of the victim and hence that an objective reconstructed profile can be established. Denture marking systems are being used in various situations, and a number of direct and indirect methods are reported. We propose that national identification numbers be incorporated in all removable and fixed prostheses, so as to adopt a single and definitive universal personal identification code with the aim of achieving a uniform, standardized, easy, and fast identification method worldwide for forensic identification. PMID:26005294

  11. Proposing national identification number on dental prostheses as universal personal identification code - A revolution in forensic odontology

    PubMed Central

    Baad, Rajendra K.; Belgaumi, Uzma; Vibhute, Nupura; Kadashetti, Vidya; Chandrappa, Pramod Redder; Gugwad, Sushma

    2015-01-01

    The proper identification of a decedent is not only important for humanitarian and emotional reasons, but also for legal and administrative purposes. During the reconstructive identification process, all necessary information is gathered from the unknown body of the victim and hence that an objective reconstructed profile can be established. Denture marking systems are being used in various situations, and a number of direct and indirect methods are reported. We propose that national identification numbers be incorporated in all removable and fixed prostheses, so as to adopt a single and definitive universal personal identification code with the aim of achieving a uniform, standardized, easy, and fast identification method worldwide for forensic identification. PMID:26005294

  12. We Are Not Numbers: The Use of Identification Codes in Online Learning

    ERIC Educational Resources Information Center

    Francis-Poscente, Krista; Moisey, Susan Darlene

    2012-01-01

    This paper discusses students' experiences with the use of identification codes in a graduate course delivered asynchronously via the Internet. While teaching an introductory masters level graduate course in distance learning, the authors discovered that the learning management system, Moodle, was programmed to display identification codes rather…

  13. AIC, BIC, Bayesian evidence against the interacting dark energy model

    NASA Astrophysics Data System (ADS)

    Szydłowski, Marek; Krawiec, Adam; Kurek, Aleksandra; Kamionka, Michał

    2015-01-01

    Recent astronomical observations have indicated that the Universe is in a phase of accelerated expansion. While there are many cosmological models which try to explain this phenomenon, we focus on the interacting CDM model where an interaction between the dark energy and dark matter sectors takes place. This model is compared to its simpler alternative—the CDM model. To choose between these models the likelihood ratio test was applied as well as the model comparison methods (employing Occam's principle): the Akaike information criterion (AIC), the Bayesian information criterion (BIC) and the Bayesian evidence. Using the current astronomical data: type Ia supernova (Union2.1), , baryon acoustic oscillation, the Alcock-Paczynski test, and the cosmic microwave background data, we evaluated both models. The analyses based on the AIC indicated that there is less support for the interacting CDM model when compared to the CDM model, while those based on the BIC indicated that there is strong evidence against it in favor of the CDM model. Given the weak or almost non-existing support for the interacting CDM model and bearing in mind Occam's razor we are inclined to reject this model.

  14. 22 CFR 228.03 - Identification of principal geographic code numbers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... codes: (a) Code 000—The United States: The United States of America, any State(s) of the United States... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Identification of principal geographic code..., ORIGIN AND NATIONALITY FOR COMMODITIES AND SERVICES FINANCED BY USAID Definitions and Scope of This...

  15. Thought and Second Language: A Vygotskian Framework for Understanding BICS and CALP

    ERIC Educational Resources Information Center

    Bylund, James

    2011-01-01

    Researchers often point to the work of Cummins (1981), who proposed that two distinct types of language proficiency exist, basic interpersonal communications skills (BICS) and cognitive/academic language proficiency (CALP). BICS includes aspects of language such as basic vocabulary and pronunciation, skills that are readily apparent during…

  16. Identification codes for organizations listed in computerized data systems of the U.S. Geological Survey

    USGS Publications Warehouse

    Edwards, Melvin D.; Drilleau, Margery O.

    1976-01-01

    This report contains codes for the identification of public and private organizations listed in computerized data systems. These codes are used by the U.S. Geological Survey 's National Water Data Exchange (NAWDEX), National Water Data Storage and Retrieval System (WATSTORE), and National Cartographic Information Center (NCIC). The format structure of the codes is discussed and instructions are given for requesting new codes. (Woodard-USGS)

  17. Identification codes for organizations listed in computerized data systems of the U.S. Geological Survey

    USGS Publications Warehouse

    Edwards, Melvin D.; Josefson, Beverly M.

    1982-01-01

    This report contains codes for the identification of public and private organizations listed in computerized data systems. These codes are used by the U.S. Geological Survey 's National Water Data Exchange (NAWDEX), National Water Data Storage and Retrieval System (WATSTORE), National Cartographic Information Center (NCIC), Office of Water Data Coordination (OWDC). The format structure of the codes is discussed and instructions are given for requesting new codes. (USGS)

  18. Identification codes for organizations listed in computerized data systems of the U.S. Geological Survey

    USGS Publications Warehouse

    Edwards, Melvin D.; Myers, Beverly M.

    1979-01-01

    This report contains codes for the identification of public and private organizations listed in computerized data systems. These codes are used by the U.S. Geological Survey 's National Water Data Exchange (NAWDEX), National Water Data Storage and Retrieval System (WATSTORE), National Cartographic Information Center (NCIC), and Office of Water Data Coordination (OWDC). The format structure of the codes is discussed and instructions are given for requesting new codes. (Woodard-USGS)

  19. Identification codes for organizations listed in computerized data systems of the U.S. Geological Survey

    USGS Publications Warehouse

    Edwards, Melvin D.; Drilleau, Margery O.

    1978-01-01

    This report contains codes for the identification of public and private organizations listed in computerized data systems. These codes are used by the U.S. Geological Survey 's National Water Data Exchange (NAWDEX), National Water Data Storage and Retrieval System (WATSTORE), National Cartographic Information Center (NCIC), and Office of Water Data Coordination (OWDC). The format structure of the codes is discussed and instructions are given for requesting new codes. (Woodard-USGS)

  20. Identification codes for organizations listed in computerized data systems of the U.S. Geological Survey

    USGS Publications Warehouse

    Edwards, Melvin D.; Myers, Beverly M.

    1981-01-01

    This report contains codes for the identification of public and private organizations listed in computerized data systems. These codes are used by the U.S. Geological Survey 's National Water Data Exchange (NAWDEX), National Water Data Storage and Retrieval System (WATSTORE), National Cartographic Information Center (NCIC), and Office of Water Data Coordination (OWDC). The format structure of the codes is discussed and instructions are given for requesting new codes. (USGS)

  1. Clathrin heavy chain plays multiple roles in polarizing the Drosophila oocyte downstream of Bic-D.

    PubMed

    Vazquez-Pianzola, Paula; Adam, Jacqueline; Haldemann, Dominique; Hain, Daniel; Urlaub, Henning; Suter, Beat

    2014-05-01

    Bicaudal-D (Bic-D), Egalitarian (Egl), microtubules and their motors form a transport machinery that localizes a remarkable diversity of mRNAs to specific cellular regions during oogenesis and embryogenesis. Bic-D family proteins also promote dynein-dependent transport of Golgi vesicles, lipid droplets, synaptic vesicles and nuclei. However, the transport of these different cargoes is still poorly understood. We searched for novel proteins that either mediate Bic-D-dependent transport processes or are transported by them. Clathrin heavy chain (Chc) co-immunopurifies with Bic-D in embryos and ovaries, and a fraction of Chc colocalizes with Bic-D. Both proteins control posterior patterning of the Drosophila oocyte and endocytosis. Although the role of Chc in endocytosis is well established, our results show that Bic-D is also needed for the elevated endocytic activity at the posterior of the oocyte. Apart from affecting endocytosis indirectly by its role in osk mRNA localization, Bic-D is also required to transport Chc mRNA into the oocyte and for transport and proper localization of Chc protein to the oocyte cortex, pointing to an additional, more direct role of Bic-D in the endocytic pathway. Furthermore, similar to Bic-D, Chc also contributes to proper localization of osk mRNA and to oocyte growth. However, in contrast to other endocytic components and factors of the endocytic recycling pathway, such as Rabenosyn-5 (Rbsn-5) and Rab11, Chc is needed during early stages of oogenesis (from stage 6 onwards) to localize osk mRNA correctly. Moreover, we also uncovered a novel, presumably endocytosis-independent, role of Chc in the establishment of microtubule polarity in stage 6 oocytes. PMID:24718986

  2. The Use of Self-Generated Identification Codes in Longitudinal Research

    ERIC Educational Resources Information Center

    Yurek, Leo A.; Vasey, Joseph; Sullivan Havens, Donna

    2008-01-01

    Longitudinal research designs involve data collection at multiple time points to measure change over time. Therefore, identification of the same respondents is essential at each time point so that data from the same respondents can be matched for comparison over time. Subject-generated identification codes permit an anonymous means to track…

  3. Identification of ICD Codes Suggestive of Child Maltreatment

    ERIC Educational Resources Information Center

    Schnitzer, Patricia G.; Slusher, Paula L.; Kruse, Robin L.; Tarleton, Molly M.

    2011-01-01

    Objective: In order to be reimbursed for the care they provide, hospitals in the United States are required to use a standard system to code all discharge diagnoses: the International Classification of Disease, 9th Revision, Clinical Modification (ICD-9). Although ICD-9 codes specific for child maltreatment exist, they do not identify all…

  4. Identification codes for organizations listed in computerized data systems of the U.S. Geological Survey

    USGS Publications Warehouse

    Blackwell, C.D.

    1988-01-01

    Codes for the unique identification of public and private organizations listed in computerized data systems are presented. These codes are used by the U.S. Geological Survey 's National Water Data Exchange (NAWDEX), National Water Data Storage and Retrieval System (WATSTORE), National Cartographic Information Center (NCIC), and Office of Water Data Coordination (OWDC). The format structure of the codes is discussed and instructions are given for requesting new books. (Author 's abstract)

  5. The effect of a redundant color code on an overlearned identification task

    NASA Technical Reports Server (NTRS)

    Obrien, Kevin

    1992-01-01

    The possibility of finding redundancy gains with overlearned tasks was examined using a paradigm varying familiarity with the stimulus set. Redundant coding in a multidimensional stimulus was demonstrated to result in increased identification accuracy and decreased latency of identification when compared to stimuli varying on only one dimension. The advantages attributable to redundant coding are referred to as redundancy gain and were found for a variety of stimulus dimension combinations, including the use of hue or color as one of the dimensions. Factors that have affected redundancy gain include the discriminability of the levels of one stimulus dimension and the level of stimulus-to-response association. The results demonstrated that response time is in part a function of familiarity, but no effect of redundant color coding was demonstrated. Implications of research on coding in identification tasks for display design are discussed.

  6. A simple and inexpensive bar-coding technique for denture identification

    PubMed Central

    Nalawade, Sonali N; Lagdive, Sanjay B; Gangadhar, SA; Bhandari, Aruna J

    2011-01-01

    A number of commercial methods for identifying dentures are available. They can be either invasive or noninvasive techniques. The less sophisticated procedures include simple engraving with bur, and more sophisticated procedures use labels or chips. Bar coding system is a way of transferring data to the computer and huge data can be stored as a record. Bar coding can be easily incorporated during acrylization of the denture and thus could be used in individual identification. PMID:22408329

  7. A simple and inexpensive bar-coding technique for denture identification.

    PubMed

    Nalawade, Sonali N; Lagdive, Sanjay B; Gangadhar, Sa; Bhandari, Aruna J

    2011-07-01

    A number of commercial methods for identifying dentures are available. They can be either invasive or noninvasive techniques. The less sophisticated procedures include simple engraving with bur, and more sophisticated procedures use labels or chips. Bar coding system is a way of transferring data to the computer and huge data can be stored as a record. Bar coding can be easily incorporated during acrylization of the denture and thus could be used in individual identification. PMID:22408329

  8. Machine readable identification systems: An overview. [Bar code and other labeling methods

    SciTech Connect

    Smith, F.J.; Cantor, S.

    1987-09-01

    The application of automated identification of an item by the use of machine readable methods is improving the accuracy and speed of data capture. Bar codes, optical character recognition, magnetic strips, and magnetic-ink recognition are all current machine readable methods which are used for data collection. Bar code data collection is the most used technology for real time inventory control, tracking, and point of sale applications. Magnetic strip coding is used for highly compact data identification on ID cards and on tags. Optical character recognition is generally used today to capture documents for computer storage and recall. Magnetic-ink character recognition, though used widely in banking, has limited applications elsewhere. Bar code methods are currently experiencing a faster rate of growth than the other technologies. Emphasis of this paper is on bar coding because of its popularity. The fundamentals of bar coding are discussed and labeling and scanning techniques are presented. New, automatic data-collection techniques are being developed, utilizing microcircuits and compact-disk memory media. The greatly increased memory capacity of these systems will likely lead to identification in terms of definitive characteristics of the item.

  9. Identification and function of long non-coding RNA

    PubMed Central

    Ernst, Carl; Morton, Cynthia C.

    2013-01-01

    Long non-coding (lnc) RNAs are defined as non-protein coding RNAs distinct from housekeeping RNAs such as tRNAs, rRNAs, and snRNAs, and independent from small RNAs with specific molecular processing machinery such as micro- or piwi-RNAs. Recent studies of lncRNAs across different species have revealed a diverse population of RNA molecules of differing size and function. RNA sequencing studies suggest transcription throughout the genome, so there is a need to understand how sequence relates to functional and structural relationships amongst RNA molecules. Our synthesis of recent studies suggests that neither size, presence of a poly-A tail, splicing, direction of transcription, nor strand specificity are of importance to lncRNA function. Rather, relative genomic position in relation to a target is fundamentally important. In this review, we describe issues of key importance in functional assessment of lncRNA and how this might apply to lncRNAs important in neurodevelopment. PMID:24106460

  10. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2014-04-01 2014-04-01 false What security controls must I use for identification codes and passwords? 73.12 Section 73.12 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES...

  11. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2012-04-01 2011-04-01 true What security controls must I use for identification codes and passwords? 73.12 Section 73.12 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES...

  12. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2011-04-01 2011-04-01 false What security controls must I use for identification codes and passwords? 73.12 Section 73.12 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES...

  13. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false What security controls must I use for identification codes and passwords? 73.12 Section 73.12 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES...

  14. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2013-04-01 2013-04-01 false What security controls must I use for identification codes and passwords? 73.12 Section 73.12 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES...

  15. 47 CFR 3.22 - Number of accounting authority identification codes per applicant.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... AUTHORIZATION AND ADMINISTRATION OF ACCOUNTING AUTHORITIES IN MARITIME AND MARITIME MOBILE-SATELLITE RADIO SERVICES Application Procedures § 3.22 Number of accounting authority identification codes per applicant... assign U.S. AAICs for entities settling accounts of U.S. licensed vessels in the maritime mobile...

  16. One-time collision arbitration algorithm in radio-frequency identification based on the Manchester code

    NASA Astrophysics Data System (ADS)

    Liu, Chen-Chung; Chan, Yin-Tsung

    2011-02-01

    In radio-requency identification (RFID) systems, when multiple tags transmit data to a reader simultaneously, these data may collide and create unsuccessful identifications; hence, anticollision algorithms are needed to reduce collisions (collision cycles) to improve the tag identification speed. We propose a one-time collision arbitration algorithm to reduce both the number of collisions and the time consumption for tags' identification in RFID. The proposed algorithm uses Manchester coding to detect the locations of collided bits, uses the divide-and-conquer strategy to find the structure of colliding bits to generate 96-bit query strings as the 96-bit candidate query strings (96BCQSs), and uses query-tree anticollision schemes with 96BCQSs to identify tags. The performance analysis and experimental results show that the proposed algorithm has three advantages: (i) reducing the number of collisions to only one, so that the time complexity of tag identification is the simplest O(1), (ii) storing identified identification numbers (IDs) and the 96BCQSs in a register to save the used memory, and (iii) resulting in the number of bits transmitted by both the reader and tags being evidently less than the other algorithms in one-tag identification or in all tags identification.

  17. Stylizing Genderlect Online for Social Action: A Corpus Analysis of "BIC Cristal for Her" Reviews

    ERIC Educational Resources Information Center

    Ray, Brian

    2016-01-01

    This article introduces the concept of stylization and illustrates its usefulness for studying online discourse by examining how writers have employed it in order to parody sexist products such as BIC Cristal for Her, using genderlect in order to introduce dissonance into and reframe patriarchal discourse. A corpus analysis of 671 reviews, written…

  18. 78 FR 25256 - Petition Requesting Exception From Lead Content Limits: BIC USA Inc.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-30

    ... COMMISSION Petition Requesting Exception From Lead Content Limits: BIC USA Inc. AGENCY: Consumer Product...) has received a petition requesting an exception from the 100 ppm lead content limit under section 101... content in excess of 100 ppm are considered to be banned hazardous substances under the Federal...

  19. Identification and characterization of the gene expression profiles for protein coding and non-coding RNAs of pancreatic ductal adenocarcinomas

    PubMed Central

    Gutiérrez, María Laura; Corchete, Luis; Teodosio, Cristina; Sarasquete, María Eugenia; Abad, María del Mar; Iglesias, Manuel; Esteban, Carmen

    2015-01-01

    Significant advances have been achieved in recent years in the identification of the genetic and the molecular alterations of pancreatic ductal adenocarcinoma (PDAC). Despite this, at present the understanding of the precise mechanisms involved in the development and malignant transformation of PDAC remain relatively limited. Here, we evaluated for the first time, the molecular heterogeneity of PDAC tumors, through simultaneous assessment of the gene expression profile (GEP) for both coding and non-coding genes of tumor samples from 27 consecutive PDAC patients. Overall, we identified a common GEP for all PDAC tumors, characterized by an increased expression of genes involved in PDAC cell proliferation, local invasion and metastatic capacity, together with a significant alteration of the early steps of the cellular immune response. At the same time, we confirm and extend on previous observations about the genetic complexity of PDAC tumors as revealed by the demonstration of two clearly distinct and unique GEPs (e.g. epithelial-like vs. mesenchymal-like) reflecting the alteration of different signaling pathways involved in the oncogenesis and progression of these tumors. Our results also highlight the potential role of the immune system microenvironment in these tumors, with potential diagnostic and therapeutic implications. PMID:26053098

  20. Analytical qualification of system identification (modal analysis) codes for use in the dynamic testing of nuclear power plant structures

    SciTech Connect

    Weaver, H.J.; Ng, D.; Lager, D.

    1980-01-02

    The analytical evaluation of two particular system identification codes used at Lawrence Livermore Laboratory is presented. Both codes are eigenparameter identification codes; however, one uses a time domain approach while the other a frequency domain approach. The evaluation was accomplished by analytically generating several time history signals in which the true modal parameters were known. These time histories ranged from widely spaced modes with spacing factors of 100 percent to closely spaced modes with spacing factors of 6 percent. These signals were then polluted with various levels of simulated measurement noise and the ability of our computer codes to extract the parameters from this noisy data was evaluated.

  1. Wind turbine control systems: Dynamic model development using system identification and the fast structural dynamics code

    SciTech Connect

    Stuart, J.G.; Wright, A.D.; Butterfield, C.P.

    1996-10-01

    Mitigating the effects of damaging wind turbine loads and responses extends the lifetime of the turbine and, consequently, reduces the associated Cost of Energy (COE). Active control of aerodynamic devices is one option for achieving wind turbine load mitigation. Generally speaking, control system design and analysis requires a reasonable dynamic model of {open_quotes}plant,{close_quotes} (i.e., the system being controlled). This paper extends the wind turbine aileron control research, previously conducted at the National Wind Technology Center (NWTC), by presenting a more detailed development of the wind turbine dynamic model. In prior research, active aileron control designs were implemented in an existing wind turbine structural dynamics code, FAST (Fatigue, Aerodynamics, Structures, and Turbulence). In this paper, the FAST code is used, in conjunction with system identification, to generate a wind turbine dynamic model for use in active aileron control system design. The FAST code is described and an overview of the system identification technique is presented. An aileron control case study is used to demonstrate this modeling technique. The results of the case study are then used to propose ideas for generalizing this technique for creating dynamic models for other wind turbine control applications.

  2. BicOverlapper 2.0: visual analysis for gene expression

    PubMed Central

    Santamaría, Rodrigo; Therón, Roberto; Quintales, Luis

    2014-01-01

    Motivation: Systems biology demands the use of several point of views to get a more comprehensive understanding of biological problems. This usually leads to take into account different data regarding the problem at hand, but it also has to do with using different perspectives of the same data. This multifaceted aspect of systems biology often requires the use of several tools, and it is often hard to get a seamless integration of all of them, which would help the analyst to have an interactive discourse with the data. Results: Focusing on expression profiling, BicOverlapper 2.0 visualizes the most relevant aspects of the analysis, including expression data, profiling analysis results and functional annotation. It also integrates several state-of-the-art numerical methods, such as differential expression analysis, gene set enrichment or biclustering. Availability and implementation: BicOverlapper 2.0 is available at: http://vis.usal.es/bicoverlapper2 Contact: rodri@usal.es PMID:24590442

  3. What do conscientious people do? Development and validation of the Behavioral Indicators of Conscientiousness (BIC)

    PubMed Central

    Jackson, Joshua J.; Wood, Dustin; Bogg, Tim; Walton, Kate E.; Harms, Peter D.; Roberts, Brent W.

    2011-01-01

    Typical assessments of personality traits collapse behaviors, thoughts, and feelings into a single measure without distinguishing between these different manifestations. To address this lack of specification, the current study develops and validates a measure that assesses a number of broad behaviors associated with the personality trait of conscientiousness (the Behavioral Indicators of Conscientiousness; BIC). Findings suggest that the lower-order structure of conscientious behaviors is mostly similar to the lower-order structure in extant trait measures. Furthermore, a daily diary method was used to validate the BIC against frequency counts of conscientious behavior. Overall, the results identify specific behaviors that conscientious individuals tend to perform and highlight possible advantages of this approach over broad trait assessment. PMID:21278818

  4. Evaluation of periimplant bone neoformation using different scanning electron microscope methods for measuring BIC. A dog study

    PubMed Central

    Aguilar-Salvatierra, Antonio; Guardia, Javier; Delgado-Ruiz, Rafael; Ramírez-Fernández, María P.; Pérez Sánchez, Cristina; Gómez-Moreno, Gerardo

    2012-01-01

    Objetives: The aim of this study was to determine which of three methods for measuring BIC (bone-to-implant contact), using vestibular and lingual scanning electron microscopy (SEM) for different implant systems at 15, 30 and 90 days post-surgery was the most precise. An elemental analysis with SEM was used to evaluate neoformed bone composition for three implant systems at the same study times. Material and Methods: 36 implants were placed in eighteen Beagle dogs mandible about one year old and weighing approximately 12-13 kg in order to evaluate bone apposition to three different implant surfaces. It was used the third and fourth premolar and first molar distal sockets in both quadrants of the mandible (3P3, 4P4 and 1M1). Teeth were hemi-sected and the distal roots were removed. The specimens were prepared for histological examination and each section surface was stained using Masson’s trichrome and hematoxylin and eosin stains. BIC evaluations were performed by the three methods, BIC I (the quantity of mineralized bone in direct contact with the implant’s titanium surface across the entire threaded area); BIC II (along a line that passes from apex to apex of the implant threads); BIC III (both in areas around and above the threads and in between threads). Results: Both BIC and bone content were analyzed for all implants placed in P3, P4 y M1 alveoli on both, the buccal and palatine sides (elemental analysis quantified Ca, P, O and C). It was seen it was only at the ninety-day mark that high percentages of calcium were present. Conclusions: This study suggest that BIC III evaluation is the most certain method for establishing the quantity of bone formed as the BIC area. Key words:Bone-to-impant contact, dogs, extraction socket, implants. PMID:24558531

  5. Identification of long non-coding RNAs involved in neuronal development and intellectual disability.

    PubMed

    D'haene, Eva; Jacobs, Eva Z; Volders, Pieter-Jan; De Meyer, Tim; Menten, Björn; Vergult, Sarah

    2016-01-01

    Recently, exome sequencing led to the identification of causal mutations in 16-31% of patients with intellectual disability (ID), leaving the underlying cause for many patients unidentified. In this context, the noncoding part of the human genome remains largely unexplored. For many long non-coding RNAs (lncRNAs) a crucial role in neurodevelopment and hence the human brain is anticipated. Here we aimed at identifying lncRNAs associated with neuronal development and ID. Therefore, we applied an integrated genomics approach, harnessing several public epigenetic datasets. We found that the presence of neuron-specific H3K4me3 confers the highest specificity for genes involved in neurodevelopment and ID. Based on the presence of this feature and GWAS hits for CNS disorders, we identified 53 candidate lncRNA genes. Extensive expression profiling on human brain samples and other tissues, followed by Gene Set Enrichment Analysis indicates that at least 24 of these lncRNAs are indeed implicated in processes such as synaptic transmission, nervous system development and neurogenesis. The bidirectional or antisense overlapping orientation relative to multiple coding genes involved in neuronal processes supports these results. In conclusion, we identified several lncRNA genes putatively involved in neurodevelopment and CNS disorders, providing a resource for functional studies. PMID:27319317

  6. Identification of long non-coding RNAs involved in neuronal development and intellectual disability

    PubMed Central

    D’haene, Eva; Jacobs, Eva Z.; Volders, Pieter-Jan; De Meyer, Tim; Menten, Björn; Vergult, Sarah

    2016-01-01

    Recently, exome sequencing led to the identification of causal mutations in 16–31% of patients with intellectual disability (ID), leaving the underlying cause for many patients unidentified. In this context, the noncoding part of the human genome remains largely unexplored. For many long non-coding RNAs (lncRNAs) a crucial role in neurodevelopment and hence the human brain is anticipated. Here we aimed at identifying lncRNAs associated with neuronal development and ID. Therefore, we applied an integrated genomics approach, harnessing several public epigenetic datasets. We found that the presence of neuron-specific H3K4me3 confers the highest specificity for genes involved in neurodevelopment and ID. Based on the presence of this feature and GWAS hits for CNS disorders, we identified 53 candidate lncRNA genes. Extensive expression profiling on human brain samples and other tissues, followed by Gene Set Enrichment Analysis indicates that at least 24 of these lncRNAs are indeed implicated in processes such as synaptic transmission, nervous system development and neurogenesis. The bidirectional or antisense overlapping orientation relative to multiple coding genes involved in neuronal processes supports these results. In conclusion, we identified several lncRNA genes putatively involved in neurodevelopment and CNS disorders, providing a resource for functional studies. PMID:27319317

  7. [Evaluation of the GNF computer-coding system for the identification of non-fermentative Gram-negative bacilli].

    PubMed

    Tarng, C M; Chen, M M; Tsai, W C

    1983-05-01

    In order to evaluate the effectiveness of the GNF computer-coding system for the identification of glucose non-fermenting gram-negative bacilli, we employed 406 strains of bacteria including 367 clinical isolates and 39 standard strains for testing. These strains were inoculated into the following eleven conventional biochemical test media: Triple Sugar Iron Agar, Simmon's Citrate Agar, Christensen's Urea Agar, Sulfide-Indole-Motility Medium, Semisolid Voges-Proskauer Test Medium, Moeller's Ornithine Decarboxylase Test Medium, Pyocyanin Test Medium, Oxidation/Fermentation (O/F) Glucose, O/F Fructose, Nitrate Broth, Moeller's Arginine Dihydrolase Test Medium. The results of these tests plus those from the hanging drop motility test and the oxidase test were converted into bacterial code number and then checked with the GNF computer-coding system. It was found that the first preference of agreement was 75.6%, second 15.3%, third 5.9%, and fourth or more 3.2%. In regard to the speed of bacterial identification by using the GNF system and information from hemolysis pattern and flagella stain, it was indicated that 84.7% would be correctly identified within 36-48 hours after isolation. If more confirmational tests were employed, the accurate identification rate would reach to 98.7% after 4 days of isolation. In addition, the use of the GNF computer-coding system can standardize identification procedures, shorten the identification period, and save cost in terms of materials supply, inoculation time, media preparation and media-storing space. Therefore, we conclude that the GNF computer-coding system is an effective tool in the identification of the glucose non-fermenting gram-negative bacilli. PMID:6617315

  8. Codes for the identification of aquifer names and geologic units in the United States and the Caribbean outlying areas

    USGS Publications Warehouse

    U.S. Geological Survey

    1988-01-01

    This standard provides codes to be used for the identification of aquifer names and geologic units in the United States, the Caribbean and other outlying areas. Outlying areas include Puerto Rico, the Virgin Islands, American Samoa, the Midway Islands, Trust Territories of the Pacific Islands, and miscellaneous Pacific Islands. Each code identifies an aquifer or rock-stratigraphic unit and its age designation. The codes provide a standardized base for use by organizations in the storage, retrieval, and exchange of ground-water data; the indexing and inventory of ground-water data and information; the cataloging of ground-water data acquisition activities; and a variety of other applications.

  9. Codes for the identification of aquifer names and geologic units in the United States and the Caribbean outlying areas

    USGS Publications Warehouse

    U.S. Geological Survey

    1985-01-01

    This standard provides codes to be used for the identification of aquifer names and geologic units in the United States, the Caribbean and other outlying areas. Outlying areas include Puerto Rico, the Virgin Islands, American Samoa, the Midway Islands, Trust Territories of the Pacific Islands, and miscellaneous Pacific Islands. Each code identifies an aquifer or rock-stratigraphic unit and its age designation. The codes provide a standardized base for use by organizations in the storage, retrieval, and exchange of ground-water data; the indexing and inventory of ground-water data and information; the cataloging of ground-water data acquisition activities; and a variety of other applications.

  10. bic, a novel gene activated by proviral insertions in avian leukosis virus-induced lymphomas, is likely to function through its noncoding RNA.

    PubMed Central

    Tam, W; Ben-Yehuda, D; Hayward, W S

    1997-01-01

    The bic locus is a common retroviral integration site in avian leukosis virus (ALV)-induced B-cell lymphomas originally identified by infection of chickens with ALVs of two different subgroups (Clurman and Hayward, Mol. Cell. Biol. 9:2657-2664, 1989). Based on its frequent association with c-myc activation and its preferential activation in metastatic tumors, the bic locus is thought to harbor a gene that can collaborate with c-myc in lymphomagenesis and presumably plays a role in late stages of tumor progression. In the present study, we have cloned and characterized two novel genes, bdw and bic, at the bic locus. bdw encoded a putative novel protein of 345 amino acids. However, its expression did not appear to be altered in tumor tissues, suggesting that it is not involved in oncogenesis. The bic gene consisted of two exons and was expressed as two spliced and alternatively polyadenylated transcripts at low levels in lymphoid/hematopoietic tissues. In tumors harboring bic integrations, proviruses drove bic gene expression by promoter insertion, resulting in high levels of expression of a chimeric RNA containing bic exon 2. Interestingly, bic lacked an extensive open reading frame, implying that it may function through its RNA. Computer analysis of RNA from small exon 2 of bic predicted extensive double-stranded structures, including a highly ordered RNA duplex between nucleotides 316 and 461. The possible role of bic in cell growth and differentiation is discussed in view of the emerging evidence that untranslated RNAs play a role in growth control. PMID:9032277

  11. Topology mapping to characterize cyanobacterial bicarbonate transporters: BicA (SulP/SLC26 family) and SbtA.

    PubMed

    Price, G Dean; Howitt, Susan M

    2014-09-01

    This mini-review addresses advances in understanding the transmembrane topologies of two unrelated, single-subunit bicarbonate transporters from cyanobacteria, namely BicA and SbtA. BicA is a Na(+)-dependent bicarbonate transporter that belongs to the SulP/SLC26 family that is widespread in both eukaryotes and prokaryotes. Topology mapping of BicA via the phoA/lacZ fusion reporter method identified 12 transmembrane helices with an unresolved hydrophobic region just beyond helix 8. Re-interpreting this data in the light of a recent topology study on rat prestin leads to a consensus topology of 14 transmembrane domains with a 7+7 inverted repeat structure. SbtA is also a Na(+)-dependent bicarbonate transporter, but of considerably higher affinity (Km 2-5 μM versus >100 μM for BicA). Whilst SbtA is widespread in cyanobacteria and a few bacteria, it appears to be absent from eukaryotes. Topology mapping of SbtA via the phoA/lacZ fusion reporter method identified 10 transmembrane helices. The topology consists of a 5+5 inverted repeat, with the two repeats separated by a large intracellular loop. The unusual location of the N and C-termini outside the cell raises the possibility that SbtA forms a novel fold, not so far identified by structural and topological studies on transport proteins. PMID:25222859

  12. Systematic Identification and Characterization of Long Non-Coding RNAs in the Silkworm, Bombyx mori

    PubMed Central

    Wu, Yuqian; Cheng, Tingcai; Liu, Chun; Liu, Duolian; Zhang, Quan; Long, Renwen; Zhao, Ping; Xia, Qingyou

    2016-01-01

    Long noncoding RNAs (lncRNAs) are emerging as important regulators in various biological processes. However, to date, no systematic characterization of lncRNAs has been reported in the silkworm Bombyx mori. In the present study, we generated eighteen RNA-seq datasets with relatively high depth. Using an in-house designed lncRNA identification pipeline, 11,810 lncRNAs were identified for 5,556 loci. Among these lncRNAs, 474 transcripts were intronic lncRNAs (ilncRNAs), 6,250 transcripts were intergenic lncRNAs (lincRNAs), and 5,086 were natural antisense lncRNAs (lncNATs). Compared with protein-coding mRNAs, silkworm lncRNAs are shorter in terms of full length but longer in terms of exon and intron length. In addition, lncRNAs exhibit a lower level of sequence conservation, more repeat sequences overlapped and higher tissue specificity than protein-coding mRNAs in the silkworm. We found that 69 lncRNA transcripts from 33 gene loci may function as miRNA precursors, and 104 lncRNA transcripts from 72 gene loci may act as competing endogenous RNAs (ceRNAs). In total, 49.47% of all gene loci (2,749/5,556) for which lncRNAs were identified showed sex-biased expression. Co-expression network analysis resulted in 19 modules, 12 of which revealed relatively high tissue specificity. The highlighted darkgoldenrod module was specifically associated with middle and posterior silk glands, and the hub lncRNAs within this module were co-expressed with proteins involved in translation, translocation, and secretory processes, suggesting that these hub lncRNAs may function as regulators of the biosynthesis, translocation, and secretion of silk proteins. This study presents the first comprehensive genome-wide analysis of silkworm lncRNAs and provides an invaluable resource for genetic, evolutionary, and genomic studies of B. mori. PMID:26771876

  13. Systematic Identification and Characterization of Long Non-Coding RNAs in the Silkworm, Bombyx mori.

    PubMed

    Wu, Yuqian; Cheng, Tingcai; Liu, Chun; Liu, Duolian; Zhang, Quan; Long, Renwen; Zhao, Ping; Xia, Qingyou

    2016-01-01

    Long noncoding RNAs (lncRNAs) are emerging as important regulators in various biological processes. However, to date, no systematic characterization of lncRNAs has been reported in the silkworm Bombyx mori. In the present study, we generated eighteen RNA-seq datasets with relatively high depth. Using an in-house designed lncRNA identification pipeline, 11,810 lncRNAs were identified for 5,556 loci. Among these lncRNAs, 474 transcripts were intronic lncRNAs (ilncRNAs), 6,250 transcripts were intergenic lncRNAs (lincRNAs), and 5,086 were natural antisense lncRNAs (lncNATs). Compared with protein-coding mRNAs, silkworm lncRNAs are shorter in terms of full length but longer in terms of exon and intron length. In addition, lncRNAs exhibit a lower level of sequence conservation, more repeat sequences overlapped and higher tissue specificity than protein-coding mRNAs in the silkworm. We found that 69 lncRNA transcripts from 33 gene loci may function as miRNA precursors, and 104 lncRNA transcripts from 72 gene loci may act as competing endogenous RNAs (ceRNAs). In total, 49.47% of all gene loci (2,749/5,556) for which lncRNAs were identified showed sex-biased expression. Co-expression network analysis resulted in 19 modules, 12 of which revealed relatively high tissue specificity. The highlighted darkgoldenrod module was specifically associated with middle and posterior silk glands, and the hub lncRNAs within this module were co-expressed with proteins involved in translation, translocation, and secretory processes, suggesting that these hub lncRNAs may function as regulators of the biosynthesis, translocation, and secretion of silk proteins. This study presents the first comprehensive genome-wide analysis of silkworm lncRNAs and provides an invaluable resource for genetic, evolutionary, and genomic studies of B. mori. PMID:26771876

  14. Five-way smoking status classification using text hot-spot identification and error-correcting output codes.

    PubMed

    Cohen, Aaron M

    2008-01-01

    We participated in the i2b2 smoking status classification challenge task. The purpose of this task was to evaluate the ability of systems to automatically identify patient smoking status from discharge summaries. Our submission included several techniques that we compared and studied, including hot-spot identification, zero-vector filtering, inverse class frequency weighting, error-correcting output codes, and post-processing rules. We evaluated our approaches using the same methods as the i2b2 task organizers, using micro- and macro-averaged F1 as the primary performance metric. Our best performing system achieved a micro-F1 of 0.9000 on the test collection, equivalent to the best performing system submitted to the i2b2 challenge. Hot-spot identification, zero-vector filtering, classifier weighting, and error correcting output coding contributed additively to increased performance, with hot-spot identification having by far the largest positive effect. High performance on automatic identification of patient smoking status from discharge summaries is achievable with the efficient and straightforward machine learning techniques studied here. PMID:17947623

  15. The identification and characterization of non-coding and coding RNAs and their modified nucleosides by mass spectrometry

    PubMed Central

    Gaston, Kirk W; Limbach, Patrick A

    2014-01-01

    The analysis of ribonucleic acids (RNA) by mass spectrometry has been a valuable analytical approach for more than 25 years. In fact, mass spectrometry has become a method of choice for the analysis of modified nucleosides from RNA isolated out of biological samples. This review summarizes recent progress that has been made in both nucleoside and oligonucleotide mass spectral analysis. Applications of mass spectrometry in the identification, characterization and quantification of modified nucleosides are discussed. At the oligonucleotide level, advances in modern mass spectrometry approaches combined with the standard RNA modification mapping protocol enable the characterization of RNAs of varying lengths ranging from low molecular weight short interfering RNAs (siRNAs) to the extremely large 23 S rRNAs. New variations and improvements to this protocol are reviewed, including top-down strategies, as these developments now enable qualitative and quantitative measurements of RNA modification patterns in a variety of biological systems. PMID:25616408

  16. Two ortho­rhom­bic polymorphs of hydro­morphone

    PubMed Central

    Mazurek, Jaroslaw; Hoffmann, Marcel; Fernandez Casares, Ana; Cox, D. Phillip; Minardi, Mathew D.; Sasine, Josh

    2016-01-01

    Conditions to obtain two polymorphic forms by crystallization from solution were determined for the analgesic drug hydro­morphone [C17H19NO3; systematic name: (4R,4aR,7aR,12bS)-9-hy­droxy-3-methyl-1,2,4,4a,5,6,7a,13-octa­hydro-4,12-methano­benzofuro[3,2-e]iso­quinolin-7-one]. These two crystalline forms, designated as I and II, belong to the P212121 ortho­rhom­bic space group. In both polymorphs, the hydro­morphone mol­ecules adopt very similar conformations with some small differences observed only in the N-methyl amine part of the mol­ecule. The crystal structures of both polymorphs feature chains of mol­ecules connected by hydrogen bonds; however, in form I this inter­action occurs between the hydroxyl group and the tertiary amine N atom whereas in form II the hydroxyl group acts as a donor of a hydrogen bond to the O atom from the cyclic ether part. PMID:27308029

  17. Coupling scanning electronc microscopy with DNA bar coding: A novel approach for thrips identification

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The small size and cryptic nature of thrips pests help them acquire microhabitats of a plant and in the field, often making their monitoring and the identification process difficult. Accurate identification of such pests is a fundamental requirement in development of any effective quarantine and man...

  18. SiBIC: A Web Server for Generating Gene Set Networks Based on Biclusters Obtained by Maximal Frequent Itemset Mining

    PubMed Central

    Takahashi, Kei-ichiro; Takigawa, Ichigaku; Mamitsuka, Hiroshi

    2013-01-01

    Detecting biclusters from expression data is useful, since biclusters are coexpressed genes under only part of all given experimental conditions. We present a software called SiBIC, which from a given expression dataset, first exhaustively enumerates biclusters, which are then merged into rather independent biclusters, which finally are used to generate gene set networks, in which a gene set assigned to one node has coexpressed genes. We evaluated each step of this procedure: 1) significance of the generated biclusters biologically and statistically, 2) biological quality of merged biclusters, and 3) biological significance of gene set networks. We emphasize that gene set networks, in which nodes are not genes but gene sets, can be more compact than usual gene networks, meaning that gene set networks are more comprehensible. SiBIC is available at http://utrecht.kuicr.kyoto-u.ac.jp:8080/miami/faces/index.jsp. PMID:24386124

  19. SiBIC: a web server for generating gene set networks based on biclusters obtained by maximal frequent itemset mining.

    PubMed

    Takahashi, Kei-ichiro; Takigawa, Ichigaku; Mamitsuka, Hiroshi

    2013-01-01

    Detecting biclusters from expression data is useful, since biclusters are coexpressed genes under only part of all given experimental conditions. We present a software called SiBIC, which from a given expression dataset, first exhaustively enumerates biclusters, which are then merged into rather independent biclusters, which finally are used to generate gene set networks, in which a gene set assigned to one node has coexpressed genes. We evaluated each step of this procedure: 1) significance of the generated biclusters biologically and statistically, 2) biological quality of merged biclusters, and 3) biological significance of gene set networks. We emphasize that gene set networks, in which nodes are not genes but gene sets, can be more compact than usual gene networks, meaning that gene set networks are more comprehensible. SiBIC is available at http://utrecht.kuicr.kyoto-u.ac.jp:8080/miami/faces/index.jsp. PMID:24386124

  20. Identification and analysis of mouse non-coding RNA using transcriptome data.

    PubMed

    Zhao, Yuhui; Liu, Wanfei; Zeng, Jingyao; Liu, Shoucheng; Tan, Xinyu; Aljohi, Hasanawad; Hu, Songnian

    2016-06-01

    Transcripts are expressed spatially and temporally and they are very complicated, precise and specific; however, most studies are focused on protein-coding related genes. Recently, massively parallel cDNA sequencing (RNA-seq) has emerged to be a new and promising tool for transcriptome research, and numbers of non-coding RNAs, especially lincRNAs, have been widely identified and well characterized as important regulators of diverse biological processes. In this study, we used ultra-deep RNA-seq data from 15 mouse tissues to study the diversity and dynamic of non-coding RNAs in mouse. Using our own criteria, we identified totally 16,249 non-coding genes (21,569 non-coding RNAs) in mouse. We annotated these non-coding RNAs by diverse properties and found non-coding RNAs are generally shorter, have fewer exons, express in lower level and are more strikingly tissue-specific compared with protein-coding genes. Moreover, these non-coding RNAs show significant enrichment with transcriptional initiation and elongation signals including histone modifications (H3K4me3, H3K27me3 and H3K36me3), RNAPII binding sites and CAGE tags. The gene set enrichment analysis (GSEA) result revealed several sets of lincRNAs associated with diverse biological processes such as immune effector process, muscle development and sexual reproduction. Taken together, this study provides a more comprehensive annotation of mouse non-coding RNAs and gives an opportunity for future functional and evolutionary study of mouse non-coding RNAs. PMID:26944582

  1. Identification and Analysis of Critical Gaps in Nuclear Fuel Cycle Codes Required by the SINEMA Program

    SciTech Connect

    Adrian Miron; Joshua Valentine; John Christenson; Majd Hawwari; Santosh Bhatt; Mary Lou Dunzik-Gougar: Michael Lineberry

    2009-10-01

    The current state of the art in nuclear fuel cycle (NFC) modeling is an eclectic mixture of codes with various levels of applicability, flexibility, and availability. In support of the advanced fuel cycle systems analyses, especially those by the Advanced Fuel Cycle Initiative (AFCI), Unviery of Cincinnati in collaboration with Idaho State University carried out a detailed review of the existing codes describing various aspects of the nuclear fuel cycle and identified the research and development needs required for a comprehensive model of the global nuclear energy infrastructure and the associated nuclear fuel cycles. Relevant information obtained on the NFC codes was compiled into a relational database that allows easy access to various codes' properties. Additionally, the research analyzed the gaps in the NFC computer codes with respect to their potential integration into programs that perform comprehensive NFC analysis.

  2. TPASS: a gamma-ray spectrum analysis and isotope identification computer code

    SciTech Connect

    Dickens, J.K.

    1981-03-01

    The gamma-ray spectral data-reduction and analysis computer code TPASS is described. This computer code is used to analyze complex Ge(Li) gamma-ray spectra to obtain peak areas corrected for detector efficiencies, from which are determined gamma-ray yields. These yields are compared with an isotope gamma-ray data file to determine the contributions to the observed spectrum from decay of specific radionuclides. A complete FORTRAN listing of the code and a complex test case are given.

  3. Identification and Characterization of Long Non-Coding RNAs Related to Mouse Embryonic Brain Development from Available Transcriptomic Data

    PubMed Central

    He, Hongjuan; Xiu, Youcheng; Guo, Jing; Liu, Hui; Liu, Qi; Zeng, Tiebo; Chen, Yan; Zhang, Yan; Wu, Qiong

    2013-01-01

    Long non-coding RNAs (lncRNAs) as a key group of non-coding RNAs have gained widely attention. Though lncRNAs have been functionally annotated and systematic explored in higher mammals, few are under systematical identification and annotation. Owing to the expression specificity, known lncRNAs expressed in embryonic brain tissues remain still limited. Considering a large number of lncRNAs are only transcribed in brain tissues, studies of lncRNAs in developmental brain are therefore of special interest. Here, publicly available RNA-sequencing (RNA-seq) data in embryonic brain are integrated to identify thousands of embryonic brain lncRNAs by a customized pipeline. A significant proportion of novel transcripts have not been annotated by available genomic resources. The putative embryonic brain lncRNAs are shorter in length, less spliced and show less conservation than known genes. The expression of putative lncRNAs is in one tenth on average of known coding genes, while comparable with known lncRNAs. From chromatin data, putative embryonic brain lncRNAs are associated with active chromatin marks, comparable with known lncRNAs. Embryonic brain expressed lncRNAs are also indicated to have expression though not evident in adult brain. Gene Ontology analysis of putative embryonic brain lncRNAs suggests that they are associated with brain development. The putative lncRNAs are shown to be related to possible cis-regulatory roles in imprinting even themselves are deemed to be imprinted lncRNAs. Re-analysis of one knockdown data suggests that four regulators are associated with lncRNAs. Taken together, the identification and systematic analysis of putative lncRNAs would provide novel insights into uncharacterized mouse non-coding regions and the relationships with mammalian embryonic brain development. PMID:23967161

  4. Model selection and psychological theory: A discussion of the differences between the Akaike Information Criterion (AIC) and the Bayesian Information Criterion (BIC)

    PubMed Central

    Vrieze, Scott I.

    2012-01-01

    This article reviews the Akaike Information Criterion (AIC) and the Bayesian Information Criterion (BIC) in model selection and the appraisal of psychological theory. The focus is on latent variable models given their growing use in theory testing and construction. We discuss theoretical statistical results in regression and illustrate more important issues with novel simulations involving latent variable models including factor analysis, latent profile analysis, and factor mixture models. Asymptotically, the BIC is consistent, in that it will select the true model if, among other assumptions, the true model is among the candidate models considered. The AIC is not consistent under these circumstances. When the true model is not in the candidate model set the AIC is effcient, in that it will asymptotically choose whichever model minimizes the mean squared error of prediction/estimation. The BIC is not effcient under these circumstances. Unlike the BIC, the AIC also has a minimax property, in that it can minimize the maximum possible risk in finite sample sizes. In sum, the AIC and BIC have quite different properties that require different assumptions, and applied researchers and methodologists alike will benefit from improved understanding of the asymptotic and finite-sample behavior of these criteria. The ultimate decision to use AIC or BIC depends on many factors, including: the loss function employed, the study's methodological design, the substantive research question, and the notion of a true model and its applicability to the study at hand. PMID:22309957

  5. Self-identification of protein-coding regions in microbial genomes.

    PubMed

    Audic, S; Claverie, J M

    1998-08-18

    A new method for predicting protein-coding regions in microbial genomic DNA sequences is presented. It uses an ab initio iterative Markov modeling procedure to automatically perform the partition of genomic sequences into three subsets shown to correspond to coding, coding on the opposite strand, and noncoding segments. In contrast to current methods, such as GENEMARK [Borodovsky, M. & McIninch, J. D. (1993) Comput. Chem. 17, 123-133], no training set or prior knowledge of the statistical properties of the studied genome are required. This new method tolerates error rates of 1-2% and can process unassembled sequences. It is thus ideal for the analysis of genome survey and/or fragmented sequence data from uncharacterized microorganisms. The method was validated on 10 complete bacterial genomes (from four major phylogenetic lineages). The results show that protein-coding regions can be identified with an accuracy of up to 90% with a totally automated and objective procedure. PMID:9707594

  6. Validation of coding algorithms for the identification of patients with primary biliary cirrhosis using administrative data

    PubMed Central

    Myers, Robert P; Shaheen, Abdel Aziz M; Fong, Andrew; Wan, Alex F; Swain, Mark G; Hilsden, Robert J; Sutherland, Lloyd; Quan, Hude

    2010-01-01

    BACKGROUND: Large-scale epidemiological studies of primary biliary cirrhosis (PBC) have been hindered by difficulties in case ascertainment. OBJECTIVE: To develop coding algorithms for identifying PBC patients using administrative data – a widely available data source. METHODS: Population-based administrative databases were used to identify patients with a diagnosis code for PBC from 1994 to 2002. Coding algorithms for confirmed PBC (two or more of antimitochondrial antibody positivity, cholestatic liver biochemistry and/or compatible liver histology) were derived using chart abstraction data as the reference. Patients with a recorded PBC diagnosis but insufficient confirmatory data were classified as ‘suspected PBC’. RESULTS: Of 189 potential PBC cases, 119 (60%) had confirmed PBC and 28 (14%) had suspected PBC. The optimal algorithm including two or more uses of a PBC code had a sensitivity of 94% (95% CI 71% to 100%) and positive predictive values of 73% (95% CI 61% to 75%) for confirmed PBC, and 89% (95% CI 82% to 94%) for confirmed or suspected PBC. Sensitivity analyses revealed greater accuracy among women, and with the use of multiple data sources and one or more years of data. Inclusion of diagnosis codes for conditions frequently misclassified as PBC did not improve algorithm performance. CONCLUSIONS: Administrative databases can reliably identify patients with PBC and may facilitate epidemiological investigations of this condition. PMID:20352146

  7. Identification of internal transcribed spacer sequence motifs in truffles: a first step toward their DNA bar coding.

    PubMed

    El Karkouri, Khalid; Murat, Claude; Zampieri, Elisa; Bonfante, Paola

    2007-08-01

    This work presents DNA sequence motifs from the internal transcribed spacer (ITS) of the nuclear rRNA repeat unit which are useful for the identification of five European and Asiatic truffles (Tuber magnatum, T. melanosporum, T. indicum, T. aestivum, and T. mesentericum). Truffles are edible mycorrhizal ascomycetes that show similar morphological characteristics but that have distinct organoleptic and economic values. A total of 36 out of 46 ITS1 or ITS2 sequence motifs have allowed an accurate in silico distinction of the five truffles to be made (i.e., by pattern matching and/or BLAST analysis on downloaded GenBank sequences and directly against GenBank databases). The motifs considered the intraspecific genetic variability of each species, including rare haplotypes, and assigned their respective species from either the ascocarps or ectomycorrhizas. The data indicate that short ITS1 or ITS2 motifs (< or = 50 bp in size) can be considered promising tools for truffle species identification. A dot blot hybridization analysis of T. magnatum and T. melanosporum compared with other close relatives or distant lineages allowed at least one highly specific motif to be identified for each species. These results were confirmed in a blind test which included new field isolates. The current work has provided a reliable new tool for a truffle oligonucleotide bar code and identification in ecological and evolutionary studies. PMID:17601808

  8. Inter-STOP symbol distances for the identification of coding regions.

    PubMed

    Bastos, Carlos A C; Afreixo, Vera; Garcia, Sara P; Pinho, Armando J

    2013-01-01

    In this study we explore the potential of inter-STOP symbol distances for finding coding regions in DNA sequences. We use the distance between STOP symbols in the DNA sequence and a chi-square statistic to evaluate the nonhomogeneity of the three possible reading frames and the occurrence of one long distance in one of the frames. The results of this exploratory study suggest that inter-STOP symbol distances have strong ability to discriminate coding regions in prokaryotes and simple eukaryotes. PMID:24231144

  9. Genome-Wide Identification and Characterization of Long Non-Coding RNAs from Mulberry (Morus notabilis) RNA-seq Data.

    PubMed

    Song, Xiaobo; Sun, Liang; Luo, Haitao; Ma, Qingguo; Zhao, Yi; Pei, Dong

    2016-01-01

    Numerous sources of evidence suggest that most of the eukaryotic genome is transcribed into protein-coding mRNAs and also into a large number of non-coding RNAs (ncRNAs). Long ncRNAs (lncRNAs), a group consisting of ncRNAs longer than 200 nucleotides, have been found to play critical roles in transcriptional, post-transcriptional, and epigenetic gene regulation across all kingdoms of life. However, lncRNAs and their regulatory roles remain poorly characterized in plants, especially in woody plants. In this paper, we used a computational approach to identify novel lncRNAs from a published RNA-seq data set and analyzed their sequences and expression patterns. In total, 1133 novel lncRNAs were identified in mulberry, and 106 of these lncRNAs displayed a predominant tissue-specific expression in the five major tissues investigated. Additionally, functional predictions revealed that tissue-specific lncRNAs adjacent to protein-coding genes might play important regulatory roles in the development of floral organ and root in mulberry. The pipeline used in this study would be useful for the identification of lncRNAs obtained from other deep sequencing data. Furthermore, the predicted lncRNAs would be beneficial towards an understanding of the variations in gene expression in plants. PMID:26938562

  10. Genome-Wide Identification and Characterization of Long Non-Coding RNAs from Mulberry (Morus notabilis) RNA-seq Data

    PubMed Central

    Song, Xiaobo; Sun, Liang; Luo, Haitao; Ma, Qingguo; Zhao, Yi; Pei, Dong

    2016-01-01

    Numerous sources of evidence suggest that most of the eukaryotic genome is transcribed into protein-coding mRNAs and also into a large number of non-coding RNAs (ncRNAs). Long ncRNAs (lncRNAs), a group consisting of ncRNAs longer than 200 nucleotides, have been found to play critical roles in transcriptional, post-transcriptional, and epigenetic gene regulation across all kingdoms of life. However, lncRNAs and their regulatory roles remain poorly characterized in plants, especially in woody plants. In this paper, we used a computational approach to identify novel lncRNAs from a published RNA-seq data set and analyzed their sequences and expression patterns. In total, 1133 novel lncRNAs were identified in mulberry, and 106 of these lncRNAs displayed a predominant tissue-specific expression in the five major tissues investigated. Additionally, functional predictions revealed that tissue-specific lncRNAs adjacent to protein-coding genes might play important regulatory roles in the development of floral organ and root in mulberry. The pipeline used in this study would be useful for the identification of lncRNAs obtained from other deep sequencing data. Furthermore, the predicted lncRNAs would be beneficial towards an understanding of the variations in gene expression in plants. PMID:26938562

  11. Identification and characterization of long non-coding RNAs in rainbow trout eggs

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Long non-coding RNAs (lncRNAs) are in general considered as a diverse class of transcripts longer than 200 nucleotides that structurally resemble mRNAs but do not encode proteins. Recent advances in RNA sequencing (RNA-Seq) and bioinformatics methods have provided an opportunity to indentify and ana...

  12. Identification of a Rare Coding Variant in Complement 3 Associated with Age-related Macular Degeneration

    PubMed Central

    Zhan, Xiaowei; Larson, David E.; Wang, Chaolong; Koboldt, Daniel C.; Sergeev, Yuri V.; Fulton, Robert S.; Fulton, Lucinda L.; Fronick, Catrina C.; Branham, Kari E.; Bragg-Gresham, Jennifer; Jun, Goo; Hu, Youna; Kang, Hyun Min; Liu, Dajiang; Othman, Mohammad; Brooks, Matthew; Ratnapriya, Rinki; Boleda, Alexis; Grassmann, Felix; von Strachwitz, Claudia; Olson, Lana M.; Buitendijk, Gabriëlle H.S.; Hofman, Albert; van Duijn, Cornelia M.; Cipriani, Valentina; Moore, Anthony T.; Shahid, Humma; Jiang, Yingda; Conley, Yvette P.; Morgan, Denise J.; Kim, Ivana K.; Johnson, Matthew P.; Cantsilieris, Stuart; Richardson, Andrea J.; Guymer, Robyn H.; Luo, Hongrong; Ouyang, Hong; Licht, Christoph; Pluthero, Fred G.; Zhang, Mindy M.; Zhang, Kang; Baird, Paul N.; Blangero, John; Klein, Michael L.; Farrer, Lindsay A.; DeAngelis, Margaret M.; Weeks, Daniel E.; Gorin, Michael B.; Yates, John R.W.; Klaver, Caroline C.W.; Pericak-Vance, Margaret A.; Haines, Jonathan L.; Weber, Bernhard H.F.; Wilson, Richard K.; Heckenlively, John R.; Chew, Emily Y.; Stambolian, Dwight; Mardis, Elaine R.; Swaroop, Anand; Abecasis, Goncalo R.

    2013-01-01

    Macular degeneration is a common cause of blindness in the elderly. To identify rare coding variants associated with a large increase in risk of age-related macular degeneration (AMD), we sequenced 2,335 cases and 789 controls in 10 candidate loci (57 genes). To increase power, we augmented our control set with ancestry-matched exome sequenced controls. An analysis of coding variation in 2,268 AMD cases and 2,268 ancestry matched controls revealed two large-effect rare variants; previously described R1210C in the CFH gene (fcase = 0.51%, fcontrol = 0.02%, OR = 23.11), and newly identified K155Q in the C3 gene (fcase = 1.06%, fcontrol = 0.39%, OR = 2.68). The variants suggest decreased inhibition of C3 by Factor H, resulting in increased activation of the alternative complement pathway, as a key component of disease biology. PMID:24036949

  13. Key for protein coding sequences identification: computer analysis of codon strategy.

    PubMed Central

    Rodier, F; Gabarro-Arpa, J; Ehrlich, R; Reiss, C

    1982-01-01

    The signal qualifying an AUG or GUG as an initiator in mRNAs processed by E. coli ribosomes is not found to be a systematic, literal homology sequence. In contrast, stability analysis reveals that initiators always occur within nucleic acid domains of low stability, for which a high A/U content is observed. Since no aminoacid selection pressure can be detected at N-termini of the proteins, the A/U enrichment results from a biased usage of the code degeneracy. A computer analysis is presented which allows easy detection of the codon strategy. N-terminal codons carry rather systematically A or U in third position, which suggests a mechanism for translation initiation and helps to detect protein coding sequences in sequenced DNA. PMID:7038623

  14. Identification of Genes Coding Aminoglycoside Modifying Enzymes in E. coli of UTI Patients in India

    PubMed Central

    Bashir, Yasir; Dar, Firdous Ahmad; Sekhar, M.

    2016-01-01

    This study is to probe the pattern of antibiotic resistance against aminoglycosides and its mechanism in E. coli obtained from patients from Chennai, India. Isolation and identification of pathogens were done on MacConkey agar. Antimicrobial sensitivity testing was done by disc diffusion test. The identification of genes encoding aminoglycoside modifying enzymes was done by Polymerase Chain Reaction (PCR). Out of 98 isolates, 71 (72.45%) isolates were identified as E. coli and the remaining 27 (27.55%) as other bacteria. Disc diffusion method results showed a resistance level of 72.15% for streptomycin, 73.4% for gentamicin, 63.26% for neomycin, 57.14% for tobramycin, 47.9% for netilmicin, and 8.16% for amikacin in E. coli. PCR screening showed the presence of four genes, namely, rrs, aacC2, aacA-aphD, and aphA3, in their plasmid DNA. The results point towards the novel mechanism of drug resistance in E. coli from UTI patients in India as they confirm the presence of genes encoding enzymes that cause resistance to aminoglycoside drugs. This could be an alarm for drug prescription to UTI patients. PMID:27403451

  15. Development of software tools at BioInformatics Centre (BIC) at the National University of Singapore (NUS).

    PubMed

    Kolatkar, P R; Sakharkar, M K; Tse, C R; Kiong, B K; Wong, L; Tan, T W; Subbiah, S

    1998-01-01

    There is burgeoning volume of information and data arising from the rapid research and unprecedented progress in molecular biology. This has been particularly affected by the Human Genome Project which is trying to completely sequence three billion nucleotides of the human genome (1),(1a). Other genome sequencing projects are also contributing substantially to this exponential growth in the number of DNA nucleotides and proteins sequenced. The number of journals, reports and research papers and tools required for the analysis of these sequences has also increased. For this the life sciences today needs tools in information technology and computation to prevent degeneration of this data into an inchoate accretion of unconnected facts and figures. The recently formed BioInformatics Centre (BIC) at the National University of Singapore (NUS) provides access to various commonly used computational tools available over the World Wide Web (WWW)--using a uniform interface and easy access. We have also come up with a new database tool. BioKleisli, which allows you to interact with various geographically scattered, heterogeneous, structurally complex and constantly evolving data sources. This paper summarises the importance of network access and database integration to biomedical research and gives a glimpse of current research conducted at BIC. PMID:9697226

  16. Identification of a Novel Small Non-Coding RNA Modulating the Intracellular Survival of Brucella melitensis.

    PubMed

    Wang, Yufei; Ke, Yuehua; Xu, Jie; Wang, Ligui; Wang, Tongkun; Liang, Hui; Zhang, Wei; Gong, Chunli; Yuan, Jiuyun; Zhuang, Yubin; An, Chang; Lei, Shuangshuang; Du, Xinying; Wang, Zhoujia; Li, Wenna; Yuan, Xitong; Huang, Liuyu; Yang, Xiaoli; Chen, Zeliang

    2015-01-01

    Bacterial small non-coding RNAs (sRNAs) are gene expression modulators respond to environmental changes, stressful conditions, and pathogenesis. In this study, by using a combined bioinformatic and experimental approach, eight novel sRNA genes were identified in intracellular pathogen Brucella melitensis. BSR0602, one sRNA that was highly induced in stationary phase, was further examined and found to modulate the intracellular survival of B. melitensis. BSR0602 was present at very high levels in vitro under stresses similar to those encountered during infection in host macrophages. Furthermore, BSR0602 was found to be highly expressed in the spleens of infected mice, suggesting its potential role in the control of pathogenesis. BSR0602 targets the mRNAs coding for gntR, a global transcriptional regulator, which is required for B. melitensis virulence. Overexpression of BSR0602 results in distinct reduction in the gntR mRNA level. B. melitensis with high level of BSR0602 is defective in bacteria intracellular survival in macrophages and defective in growth in the spleens of infected mice. Therefore, BSR0602 may directly inhibit the expression of gntR, which then impairs Brucellae intracellular survival and contributes to Brucella infection. Our findings suggest that BSR0602 is responsible for bacterial adaptation to stress conditions and thus modulate B. melitensis intracellular survival. PMID:25852653

  17. Identification of a Novel Small Non-Coding RNA Modulating the Intracellular Survival of Brucella melitensis

    PubMed Central

    Wang, Yufei; Ke, Yuehua; Xu, Jie; Wang, Ligui; Wang, Tongkun; Liang, Hui; Zhang, Wei; Gong, Chunli; Yuan, Jiuyun; Zhuang, Yubin; An, Chang; Lei, Shuangshuang; Du, Xinying; Wang, Zhoujia; Li, Wenna; Yuan, Xitong; Huang, Liuyu; Yang, Xiaoli; Chen, Zeliang

    2015-01-01

    Bacterial small non-coding RNAs (sRNAs) are gene expression modulators respond to environmental changes, stressful conditions, and pathogenesis. In this study, by using a combined bioinformatic and experimental approach, eight novel sRNA genes were identified in intracellular pathogen Brucella melitensis. BSR0602, one sRNA that was highly induced in stationary phase, was further examined and found to modulate the intracellular survival of B. melitensis. BSR0602 was present at very high levels in vitro under stresses similar to those encountered during infection in host macrophages. Furthermore, BSR0602 was found to be highly expressed in the spleens of infected mice, suggesting its potential role in the control of pathogenesis. BSR0602 targets the mRNAs coding for gntR, a global transcriptional regulator, which is required for B. melitensis virulence. Overexpression of BSR0602 results in distinct reduction in the gntR mRNA level. B. melitensis with high level of BSR0602 is defective in bacteria intracellular survival in macrophages and defective in growth in the spleens of infected mice. Therefore, BSR0602 may directly inhibit the expression of gntR, which then impairs Brucellae intracellular survival and contributes to Brucella infection. Our findings suggest that BSR0602 is responsible for bacterial adaptation to stress conditions and thus modulate B. melitensis intracellular survival. PMID:25852653

  18. [Identification of the open reading frame coding transposase of Bordetella pertussis RS-element].

    PubMed

    Vorontsov, V V; Sivov, I G; Umiarov, A M; Siniashina, L N; Bol'shakova, T N; Dobrynina, O Iu; Molchanova, M L; Amelina, I P; Rudnev, I A; Karataev, G I

    2004-01-01

    A computer-aided analysis of the repeating sequence of Bordetella pertussis chromosome (RSBP3) revealed 3 open reading frames, one of whose (ORF1) can code a protein whose structure and properties are similar to those of transposasas, i.e. enzymes in charges for the traveling of migrating genetic elements of pro- and eukaryote. Mutants of the RSBP3 insertion sequence with the affected and unaffected ORF1 sequence were constructed in order to substantiate the above assumption. Two independent experimental models (formation of inter-plasmid co-integrates and of co-integrates between plasmid and E. coli chromosome) were used to show that the RSBP3-stimulated formation of co-integrates is only true for plasmids containing RSBP3 with the unaffected ORF1 sequence. An activity of the Hpr protein (a component of the phosphoenolpyruvate-dependent phosphotransferase) was proven to influence the formation process of inter-plasmid co-integrates. PMID:15164716

  19. Enteropathogenic Escherichia coli: identification of a gene cluster coding for bundle-forming pilus morphogenesis.

    PubMed Central

    Sohel, I; Puente, J L; Ramer, S W; Bieber, D; Wu, C Y; Schoolnik, G K

    1996-01-01

    Sequence flanking the bfpA locus on the enteroadherent factor plasmid of the enteropathogenic Escherichia coli (EPEC) strain B171-8 (O111:NM) was obtained to identify genes that might be required for bundle-forming pilus (BFP) biosynthesis. Deletion experiments led to the identification of a contiguous cluster of at least 12 open reading frames, including bfpA, that could direct the synthesis of a morphologically normal BFP filament. Within the bfp gene cluster, we identified open reading frames that share homology with other type IV pilus accessory genes and with genes required for transformation competence and protein secretion. Immediately upstream of the bfp gene cluster, we identified a potential replication origin including genes that are predicted to encode proteins homologous with replicase and resolvase. Restriction fragment length polymorphism analysis of DNA from six additional EPEC serotypes showed that the organization of the bfp gene cluster and its juxtaposition with a potential plasmid origin of replication are highly conserved features of the EPEC biotype. PMID:8626330

  20. Rat hepatic glutaminase: identification of the full coding sequence and characterization of a functional promoter.

    PubMed Central

    Chung-Bok, M I; Vincent, N; Jhala, U; Watford, M

    1997-01-01

    Glutamine catabolism in mammalian liver is catalysed by a unique isoenzyme of phosphate-activated glutaminase. The full coding and 5' untranslated sequence for rat hepatic glutaminase was isolated by screening lambda ZAP cDNA libraries and a Charon 4a rat genomic library. The sequence produces a mRNA 2225 nt in length, encoding a polypeptide of 535 amino acid residues with a calculated molecular mass of 59.2 kDa. The deduced amino acid sequence of rat liver glutaminase shows 86% similarity to that of rat kidney glutaminase and 65% similarity to a putative glutaminase from Caenorhabditis elegans. A genomic clone to rat liver glutaminase was isolated that contains 3.5 kb of the gene and 7.5 kb of the 5' flanking region. The 1 kb immediately upstream of the hepatic glutaminase gene (from -1022 to +48) showed functional promoter activity in HepG2 hepatoma cells. This promoter region did not respond to treatment with cAMP, but was highly responsive (10-fold stimulation) to the synthetic glucocorticoid dexamethasone. Subsequent 5' deletion analysis indicated that the promoter region between -103 and +48 was sufficient for basal promoter activity. This region does not contain an identifiable TATA element, indicating that transcription of the glutaminase gene is driven by a TATA-less promoter. The region responsive to glucocorticoids was mapped to -252 to -103 relative to the transcription start site. PMID:9164856

  1. Identification of novel long non-coding RNAs in triple-negative breast cancer

    PubMed Central

    Yu, Wenjie; Wang, Wenmin; Xu, Dong; Yan, Xinqiang; Chen, Beibei; Yu, Longyao; Li, Jicheng; Chen, Xiaobing; Ding, Kan; Cao, Feilin

    2015-01-01

    Triple-negative breast carcinomas (TNBC) are characterized by particularly poor outcomes, and there are no established markers significantly associated with prognosis. Long non-coding RNAs (lncRNAs) are subclass of noncoding RNAs that have been recently shown to play critical roles in cancer biology. However, little is known about their mechanistic role in TNBC pathogenesis. In this report, we investigated the expression patterns of lncRNAs from TNBC tissues and matched normal tissues with Agilent Human lncRNA array. We identified 1,758 lncRNAs and 1,254 mRNAs that were differentially expressed (≥ 2-fold change), indicating that many lncRNAs are significantly upregulated or downregulated in TNBC. Among these, XR_250621.1 and NONHSAT125629 were the most upregulated and downregulated lncRNAs respectively. qRT-PCR was employed to validate the microarray analysis findings, and results were consistent with the data from the microarrays. GO and KEGG pathway analysis were applied to explore the potential lncRNAs functions, some pathways including microtubule motor activity and DNA replication were identified in TNBC pathogenesis. Our study revealed that a set of lncRNAs were differentially expressed in TNBC tissues, suggesting that they may play role in TNBC. These results shed light on lncRNAs’ biological functions and provide useful information for exploring potential therapeutic targets for breast cancer. PMID:26078338

  2. Experimental identification and analysis of macronuclear non-coding RNAs from the ciliate Tetrahymena thermophila

    PubMed Central

    Andersen, Kasper L.; Nielsen, Henrik

    2012-01-01

    The ciliate Tetrahymena thermophila is an important eukaryotic model organism that has been used in pioneering studies of general phenomena, such as ribozymes, telomeres, chromatin structure and genome reorganization. Recent work has shown that Tetrahymena has many classes of small RNA molecules expressed during vegetative growth or sexual reorganization. In order to get an overview of medium-sized (40–500 nt) RNAs expressed from the Tetrahymena genome, we created a size-fractionated cDNA library from macronuclear RNA and analyzed 80 RNAs, most of which were previously unknown. The most abundant class was small nucleolar RNAs (snoRNAs), many of which are formed by an unusual maturation pathway. The modifications guided by the snoRNAs were analyzed bioinformatically and experimentally and many Tetrahymena-specific modifications were found, including several in an essential, but not conserved domain of ribosomal RNA. Of particular interest, we detected two methylations in the 5′-end of U6 small nuclear RNA (snRNA) that has an unusual structure in Tetrahymena. Further, we found a candidate for the first U8 outside metazoans, and an unusual U14 candidate. In addition, a number of candidates for new non-coding RNAs were characterized by expression analysis at different growth conditions. PMID:21967850

  3. Identification of Differentially Expressed Long Non-coding RNAs in Polarized Macrophages

    PubMed Central

    Huang, Zikun; Luo, Qing; Yao, Fangyi; Qing, Cheng; Ye, Jianqing; Deng, Yating; Li, Junming

    2016-01-01

    Macrophages display remarkable plasticity, with the ability to undergo dynamic transition between classically and alternatively activated phenotypes. Long non-coding RNAs (lncRNAs) are more than 200 nucleotides in length and play roles in various biological pathways. However, the role of lncRNAs in regulating macrophage polarization has yet to be explored. In this study, lncRNAs expression profiles were determined in human monocyte-derived macrophages (MDMs) incubated in conditions causing activation toward M(IFN-γ + LPS) or M(IL-4) phenotypes. Compared with primary MDMs, 9343 lncRNAs and 5903 mRNAs were deregulated in M(IFN-γ + LPS) group (fold change ≥2.0, P < 0.05), 4592 lncRNAs and 3122 mRNAs were deregulated in M(IL-4) group. RT-qPCR results were generally consistent with the microarray data. Furthermore, we found that TCONS_00019715 is expressed at a higher level in M(IFN-γ + LPS) macrophages than in M(IL-4) macrophages. TCONS_00019715 expression was decreased when M(IFN-γ + LPS) converted to M(IL-4) whereas increased when M(IL-4) converted to M(IFN-γ + LPS). Knockdown of TCONS_00019715 following the activation of THP-1 cellls using IFN-γ and LPS diminished the expression of M(IFN-γ + LPS) markers, and elevated the expression of M(IL-4) markers. These data show a significantly altered lncRNA and mRNA expression profile in macrophages exposure to different activating conditions. Dysregulation of some of these lncRNAs may play important roles in regulating macrophage polarization. PMID:26796525

  4. Identification of neural firing patterns, frequency and temporal coding mechanisms in individual aortic baroreceptors

    PubMed Central

    Gu, Huaguang; Pan, Baobao

    2015-01-01

    In rabbit depressor nerve fibers, an on-off firing pattern, period-1 firing, and integer multiple firing with quiescent state were observed as the static pressure level was increased. A bursting pattern with bursts at the systolic phase of blood pressure, continuous firing, and bursting with burst at diastolic phase and quiescent state at systolic phase were observed as the mean level of the dynamic blood pressure was increased. For both static and dynamic pressures, the firing frequency of the first two firing patterns increased and of the last firing pattern decreased due to the quiescent state. If the quiescent state is disregarded, the spike frequency becomes an increasing trend. The instantaneous spike frequency of the systolic phase bursting, continuous firing, and diastolic phase bursting can reflect the temporal process of the systolic phase, whole procedure, and diastolic phase of the dynamic blood pressure signal, respectively. With increasing the static current corresponding to pressure level, the deterministic Hodgkin-Huxley (HH) model manifests a process from a resting state first to period-1 firing via a subcritical Hopf bifurcation and then to a resting state via a supercritical Hopf bifurcation, and the firing frequency increases. The on-off firing and integer multiple firing were here identified as noise-induced firing patterns near the subcritical and supercritical Hopf bifurcation points, respectively, using the stochastic HH model. The systolic phase bursting and diastolic phase bursting were identified as pressure-induced firings near the subcritical and supercritical Hopf bifurcation points, respectively, using an HH model with a dynamic signal. The firing, spike frequency, and instantaneous spike frequency observed in the experiment were simulated and explained using HH models. The results illustrate the dynamics of different firing patterns and the frequency and temporal coding mechanisms of aortic baroreceptor. PMID:26379539

  5. Identification of Differentially Expressed Long Non-coding RNAs in Polarized Macrophages.

    PubMed

    Huang, Zikun; Luo, Qing; Yao, Fangyi; Qing, Cheng; Ye, Jianqing; Deng, Yating; Li, Junming

    2016-01-01

    Macrophages display remarkable plasticity, with the ability to undergo dynamic transition between classically and alternatively activated phenotypes. Long non-coding RNAs (lncRNAs) are more than 200 nucleotides in length and play roles in various biological pathways. However, the role of lncRNAs in regulating macrophage polarization has yet to be explored. In this study, lncRNAs expression profiles were determined in human monocyte-derived macrophages (MDMs) incubated in conditions causing activation toward M(IFN-γ + LPS) or M(IL-4) phenotypes. Compared with primary MDMs, 9343 lncRNAs and 5903 mRNAs were deregulated in M(IFN-γ + LPS) group (fold change ≥ 2.0, P < 0.05), 4592 lncRNAs and 3122 mRNAs were deregulated in M(IL-4) group. RT-qPCR results were generally consistent with the microarray data. Furthermore, we found that TCONS_00019715 is expressed at a higher level in M(IFN-γ + LPS) macrophages than in M(IL-4) macrophages. TCONS_00019715 expression was decreased when M(IFN-γ + LPS) converted to M(IL-4) whereas increased when M(IL-4) converted to M(IFN-γ + LPS). Knockdown of TCONS_00019715 following the activation of THP-1 cellls using IFN-γ and LPS diminished the expression of M(IFN-γ + LPS) markers, and elevated the expression of M(IL-4) markers. These data show a significantly altered lncRNA and mRNA expression profile in macrophages exposure to different activating conditions. Dysregulation of some of these lncRNAs may play important roles in regulating macrophage polarization. PMID:26796525

  6. Genome Wide Identification and Functional Prediction of Long Non-Coding RNAs Responsive to Sclerotinia sclerotiorum Infection in Brassica napus

    PubMed Central

    Joshi, Raj Kumar; Megha, Swati; Basu, Urmila; Rahman, Muhammad H.; Kav, Nat N. V.

    2016-01-01

    Sclerotinia stem rot caused by Sclerotinia sclerotiorum affects canola production worldwide. Emerging evidence suggests that long non-coding RNAs (lncRNAs) play important roles in the regulation of gene expression in plants, in response to both abiotic and biotic stress. So far, identification of lncRNAs has been limited to a few model plant species, and their roles in mediating responses to biotic stresses are yet to be characterized in Brassica napus. The present study reports the identification of novel lncRNAs responsive to S. sclerotiorum infection in B. napus at two time points after infection (24 hpi and 48 hpi) using a stranded RNA-Sequencing technique and a detection pipeline for lncRNAs. Of the total 3,181 lncRNA candidates, 2,821 lncRNAs were intergenic, 111 were natural antisense transcripts, 76 possessed exonic overlap with the reference coding transcripts while the remaining 173 represented novel lnc- isoforms. Forty one lncRNAs were identified as the precursors for microRNAs (miRNAs) including miR156, miR169 and miR394, with significant roles in mediating plant responses to fungal phytopathogens. A total of 931 differentially expressed lncRNAs were identified in response to S. sclerotiorum infection and the expression of 12 such lncRNAs was further validated using qRT-PCR. B. napus antisense lncRNA, TCONS_00000966, having 90% overlap with a plant defensin gene, showed significant induction at both infection stages, suggesting its involvement in the transcriptional regulation of defense responsive genes under S. sclerotiorum infection. Additionally, nine lncRNAs showed overlap with cis-regulatory regions of differentially expressed genes of B. napus. Quantitative RT-PCR verification of a set of S. sclerotiorum responsive sense/antisense transcript pairs revealed contrasting expression patterns, supporting the hypothesis that steric clashes of transcriptional machinery may lead to inactivation of sense promoter. Our findings highlight the potential

  7. Genome Wide Identification and Functional Prediction of Long Non-Coding RNAs Responsive to Sclerotinia sclerotiorum Infection in Brassica napus.

    PubMed

    Joshi, Raj Kumar; Megha, Swati; Basu, Urmila; Rahman, Muhammad H; Kav, Nat N V

    2016-01-01

    Sclerotinia stem rot caused by Sclerotinia sclerotiorum affects canola production worldwide. Emerging evidence suggests that long non-coding RNAs (lncRNAs) play important roles in the regulation of gene expression in plants, in response to both abiotic and biotic stress. So far, identification of lncRNAs has been limited to a few model plant species, and their roles in mediating responses to biotic stresses are yet to be characterized in Brassica napus. The present study reports the identification of novel lncRNAs responsive to S. sclerotiorum infection in B. napus at two time points after infection (24 hpi and 48 hpi) using a stranded RNA-Sequencing technique and a detection pipeline for lncRNAs. Of the total 3,181 lncRNA candidates, 2,821 lncRNAs were intergenic, 111 were natural antisense transcripts, 76 possessed exonic overlap with the reference coding transcripts while the remaining 173 represented novel lnc- isoforms. Forty one lncRNAs were identified as the precursors for microRNAs (miRNAs) including miR156, miR169 and miR394, with significant roles in mediating plant responses to fungal phytopathogens. A total of 931 differentially expressed lncRNAs were identified in response to S. sclerotiorum infection and the expression of 12 such lncRNAs was further validated using qRT-PCR. B. napus antisense lncRNA, TCONS_00000966, having 90% overlap with a plant defensin gene, showed significant induction at both infection stages, suggesting its involvement in the transcriptional regulation of defense responsive genes under S. sclerotiorum infection. Additionally, nine lncRNAs showed overlap with cis-regulatory regions of differentially expressed genes of B. napus. Quantitative RT-PCR verification of a set of S. sclerotiorum responsive sense/antisense transcript pairs revealed contrasting expression patterns, supporting the hypothesis that steric clashes of transcriptional machinery may lead to inactivation of sense promoter. Our findings highlight the potential

  8. Model Selection and Psychological Theory: A Discussion of the Differences between the Akaike Information Criterion (AIC) and the Bayesian Information Criterion (BIC)

    ERIC Educational Resources Information Center

    Vrieze, Scott I.

    2012-01-01

    This article reviews the Akaike information criterion (AIC) and the Bayesian information criterion (BIC) in model selection and the appraisal of psychological theory. The focus is on latent variable models, given their growing use in theory testing and construction. Theoretical statistical results in regression are discussed, and more important…

  9. Phosphoprotein Isotope-coded Affinity Tags: Application to the Enrichment and Identification of Low-Abundance Phosphoproteins

    SciTech Connect

    Goshe, Michael; Veenstra, Timothy D. ); Panisko, Ellen A.; Conrads, Thomas P. ); Angell, Nicolas H.; Smith, Richard D. )

    2002-02-01

    A novel approach using different isotopic labeling and biotinylation has been developed for the enrichment and quantitation of phosphoseryl and phosphothreonyl-peptides. The phosphoprotein isotope-coded affinity tag (PhIAT) exploits the high affinity biotin-avidin interaction to isolate modified phosphopeptides from a complex mixture of peptides. The PhIAT strategy for quantifying and enriching mixtures for phosphopeptides was demonstrated using a commercially available sample of the phosphoprotein B-casein. A denatured solution of B-casein was labeled using the PhIAT method and after proteolytic digestion, the labeled peptides were isolated using immobilize avidin. The recovered peptides were separated by capillary reversed-phase liquid chromatography and identified by tandem mass spectrometry. PhIAT-labeled peptides corresponding to known O-phosphorylated peptides from B-casein were identified as were phosphorylated peptides from as1-casein and ase-casein, known low-level (< 5%) contaminants of commercially available B-casein. All of the identified phosphopeptides from these caseins have been previously documented to be phosphorylated at the sites elucidated by the PhIAT approach. The results illustrate the efficancy of the PhIAT-labeling strategy to enrich mixtures for phosphopeptides and permit the detection and identification of low abundance phosphopeptides. In addition, experiments using light and heavy isotopic version of the PhIAT reagents demonstrated that a 10% difference in phosphorylation state could be determined between phosphopeptides in comparative samples.

  10. Identification of a positive transcription regulatory element within the coding region of the nifLA operon in Azotobacter vinelandii.

    PubMed

    Mitra, Ranjana; Das, Hirendra K; Dixit, Aparna

    2005-07-01

    Nitrogen fixation in Azotobacter vinelandii is regulated by the nifLA operon. NifA activates the transcription of nif genes, while NifL antagonizes the transcriptional activator NifA in response to fixed nitrogen and molecular oxygen levels. However, transcriptional regulation of the nifLA operon of A. vinelandii itself is not fully understood. Using the S1 nuclease assay, we mapped the transcription start site of the nifLA operon, showing it to be similar to the sigma54-dependent promoters. We also identified a positive cis-acting regulatory element (+134 to +790) of the nifLA operon within the coding region of the nifL gene of A. vinelandii. Deletion of this element results in complete loss of promoter activity. Several protein factors bind to this region, and the specific binding sites have been mapped by DNase I foot printing. Two of these sites, namely dR1 (+134 to +204) and dR2 (+745 to +765), are involved in regulating the nifLA promoter activity. The absence of NtrC-like binding sites in the upstream region of the nifLA operon in A. vinelandii makes the identification of these downstream elements a highly significant finding. The interaction of the promoter with the proteins binding to the dR2 region spanning +745 to +765 appears to be dependent on the face of the helix as introduction of 4 bases just before this region completely disrupts promoter activity. Thus, the positive regulatory element present within the BglII-BglII fragment may play, in part; an important role in nifLA regulation in A. vinelandii. PMID:16000781

  11. Identification of Predictive Markers for Response to Neoadjuvant Chemoradiation in Rectal Carcinomas by Proteomic Isotope Coded Protein Label (ICPL) Analysis

    PubMed Central

    Croner, Roland S.; Sevim, Müzeyyen; Metodiev, Metodi V.; Jo, Peter; Ghadimi, Michael; Schellerer, Vera; Brunner, Maximillian; Geppert, Carol; Rau, Tilman; Stürzl, Michael; Naschberger, Elisabeth; Matzel, Klaus E.; Hohenberger, Werner; Lottspeich, Friedrich; Kellermann, Josef

    2016-01-01

    Neoadjuvant chemoradiation (nCRT) is an established procedure in stage union internationale contre le cancer (UICC) II/III rectal carcinomas. Around 53% of the tumours present with good tumor regression after nCRT, and 8%–15% are complete responders. Reliable selection markers would allow the identification of poor or non-responders prior to therapy. Tumor biopsies were harvested from 20 patients with rectal carcinomas, and stored in liquid nitrogen prior to therapy after obtaining patients’ informed consent (Erlangen-No.3784). Patients received standardized nCRT with 5-Fluoruracil (nCRT I) or 5-Fluoruracil ± Oxaliplatin (nCRT II) according to the CAO/ARO/AIO-04 protocol. After surgery, regression grading (Dworak) of the tumors was performed during histopathological examination of the specimens. Tumors were classified as poor (Dworak 1 + 2) or good (Dworak 3 + 4) responders. Laser capture microdissection (LCM) for tumor enrichment was performed on preoperative biopsies. Differences in expressed proteins between poor and good responders to nCRT I and II were identified by proteomic analysis (Isotope Coded Protein Label, ICPL™) and selected markers were validated by immunohistochemistry. Tumors of 10 patients were classified as histopathologically poor (Dworak 1 or 2) and the other 10 tumor samples as histopathologically good (Dworak 3 or 4) responders to nCRT after surgery. Sufficient material in good quality was harvested for ICPL analysis by LCM from all biopsies. We identified 140 differentially regulated proteins regarding the selection criteria and the response to nCRT. Fourteen of these proteins were synchronously up-regulated at least 1.5-fold after nCRT I or nCRT II (e.g., FLNB, TKT, PKM2, SERINB1, IGHG2). Thirty-five proteins showed a complete reciprocal regulation (up or down) after nCRT I or nCRT II and the rest was regulated either according to nCRT I or II. The protein expression of regulated proteins such as PLEC1, TKT, HADHA and TAGLN was

  12. The Fusion Protein Signal-Peptide-Coding Region of Canine Distemper Virus: A Useful Tool for Phylogenetic Reconstruction and Lineage Identification

    PubMed Central

    Sarute, Nicolás; Calderón, Marina Gallo; Pérez, Ruben; La Torre, José; Hernández, Martín; Francia, Lourdes; Panzera, Yanina

    2013-01-01

    Canine distemper virus (CDV; Paramyxoviridae, Morbillivirus) is the etiologic agent of a multisystemic infectious disease affecting all terrestrial carnivore families with high incidence and mortality in domestic dogs. Sequence analysis of the hemagglutinin (H) gene has been widely employed to characterize field strains, permitting the identification of nine CDV lineages worldwide. Recently, it has been established that the sequences of the fusion protein signal-peptide (Fsp) coding region are extremely variable, suggesting that analysis of its sequence might be useful for strain characterization studies. However, the divergence of Fsp sequences among worldwide strains and its phylogenetic resolution has not yet been evaluated. We constructed datasets containing the Fsp-coding region and H gene sequences of the same strains belonging to eight CDV lineages. Both datasets were used to evaluate their phylogenetic resolution. The phylogenetic analysis revealed that both datasets clustered the same strains into eight different branches, corresponding to CDV lineages. The inter-lineage amino acid divergence was fourfold greater for the Fsp peptide than for the H protein. The likelihood mapping revealed that both datasets display strong phylogenetic signals in the region of well-resolved topologies. These features indicate that Fsp-coding region sequence analysis is suitable for evolutionary studies as it allows for straightforward identification of CDV lineages. PMID:23675493

  13. Analyzing Large Gene Expression and Methylation Data Profiles Using StatBicRM: Statistical Biclustering-Based Rule Mining

    PubMed Central

    Maulik, Ujjwal; Mallik, Saurav; Mukhopadhyay, Anirban; Bandyopadhyay, Sanghamitra

    2015-01-01

    Microarray and beadchip are two most efficient techniques for measuring gene expression and methylation data in bioinformatics. Biclustering deals with the simultaneous clustering of genes and samples. In this article, we propose a computational rule mining framework, StatBicRM (i.e., statistical biclustering-based rule mining) to identify special type of rules and potential biomarkers using integrated approaches of statistical and binary inclusion-maximal biclustering techniques from the biological datasets. At first, a novel statistical strategy has been utilized to eliminate the insignificant/low-significant/redundant genes in such way that significance level must satisfy the data distribution property (viz., either normal distribution or non-normal distribution). The data is then discretized and post-discretized, consecutively. Thereafter, the biclustering technique is applied to identify maximal frequent closed homogeneous itemsets. Corresponding special type of rules are then extracted from the selected itemsets. Our proposed rule mining method performs better than the other rule mining algorithms as it generates maximal frequent closed homogeneous itemsets instead of frequent itemsets. Thus, it saves elapsed time, and can work on big dataset. Pathway and Gene Ontology analyses are conducted on the genes of the evolved rules using David database. Frequency analysis of the genes appearing in the evolved rules is performed to determine potential biomarkers. Furthermore, we also classify the data to know how much the evolved rules are able to describe accurately the remaining test (unknown) data. Subsequently, we also compare the average classification accuracy, and other related factors with other rule-based classifiers. Statistical significance tests are also performed for verifying the statistical relevance of the comparative results. Here, each of the other rule mining methods or rule-based classifiers is also starting with the same post-discretized data

  14. Analyzing large gene expression and methylation data profiles using StatBicRM: statistical biclustering-based rule mining.

    PubMed

    Maulik, Ujjwal; Mallik, Saurav; Mukhopadhyay, Anirban; Bandyopadhyay, Sanghamitra

    2015-01-01

    Microarray and beadchip are two most efficient techniques for measuring gene expression and methylation data in bioinformatics. Biclustering deals with the simultaneous clustering of genes and samples. In this article, we propose a computational rule mining framework, StatBicRM (i.e., statistical biclustering-based rule mining) to identify special type of rules and potential biomarkers using integrated approaches of statistical and binary inclusion-maximal biclustering techniques from the biological datasets. At first, a novel statistical strategy has been utilized to eliminate the insignificant/low-significant/redundant genes in such way that significance level must satisfy the data distribution property (viz., either normal distribution or non-normal distribution). The data is then discretized and post-discretized, consecutively. Thereafter, the biclustering technique is applied to identify maximal frequent closed homogeneous itemsets. Corresponding special type of rules are then extracted from the selected itemsets. Our proposed rule mining method performs better than the other rule mining algorithms as it generates maximal frequent closed homogeneous itemsets instead of frequent itemsets. Thus, it saves elapsed time, and can work on big dataset. Pathway and Gene Ontology analyses are conducted on the genes of the evolved rules using David database. Frequency analysis of the genes appearing in the evolved rules is performed to determine potential biomarkers. Furthermore, we also classify the data to know how much the evolved rules are able to describe accurately the remaining test (unknown) data. Subsequently, we also compare the average classification accuracy, and other related factors with other rule-based classifiers. Statistical significance tests are also performed for verifying the statistical relevance of the comparative results. Here, each of the other rule mining methods or rule-based classifiers is also starting with the same post-discretized data

  15. A Global Identification and Analysis of Small Nucleolar RNAs and Possible Intermediate-Sized Non-Coding RNAs in Oryza sativa

    PubMed Central

    Liu, Ting-Ting; Zhu, Danmeng; Chen, Wei; Deng, Xing Wang

    2013-01-01

    Accumulating evidence suggests that non-coding RNAs (ncRNAs) are both widespread and functionally important in many eukaryotic organisms. In this study, we employed a special size fractionation and cDNA library construction method followed by 454 deep sequencing to systematically profile rice intermediate-size ncRNAs. Our analysis resulted in the identification of 1349 ncRNAs in total, including 754 novel ncRNAs of an unknown functional category. Chromosome distribution of all identified ncRNAs showed no strand bias, and displayed a pattern similar to that observed in protein-coding genes with few chromosome dependencies. More than half of the ncRNAs were centered around the plus-strand of the 5’ and 3’ termini of the coding regions. The majority of the novel ncRNAs were rice specific, while 78% of the small nucleolar RNAs (snoRNAs) were conserved. Tandem duplication drove the expansion of over half of the snoRNA gene families. Furthermore, 90% of the snoRNA candidates were shown to produce small RNAs between 20–30 nt, 80% of which were associated with ARGONAUT proteins generally, and AGO1b in particular. Overall, our findings provide a comprehensive view of an intermediate-size non-coding transcriptome in a monocot species, which will serve as a useful platform for an in-depth analysis of ncRNA functions. PMID:22986792

  16. Identification of a long non-coding RNA gene, growth hormone secretagogue receptor opposite strand, which stimulates cell migration in non-small cell lung cancer cell lines.

    PubMed

    Whiteside, Eliza J; Seim, Inge; Pauli, Jana P; O'Keeffe, Angela J; Thomas, Patrick B; Carter, Shea L; Walpole, Carina M; Fung, Jenny N T; Josh, Peter; Herington, Adrian C; Chopin, Lisa K

    2013-08-01

    The molecular mechanisms involved in non‑small cell lung cancer tumourigenesis are largely unknown; however, recent studies have suggested that long non-coding RNAs (lncRNAs) are likely to play a role. In this study, we used public databases to identify an mRNA-like, candidate long non-coding RNA, GHSROS (GHSR opposite strand), transcribed from the antisense strand of the ghrelin receptor gene, growth hormone secretagogue receptor (GHSR). Quantitative real-time RT-PCR revealed higher expression of GHSROS in lung cancer tissue compared to adjacent, non-tumour lung tissue. In common with many long non-coding RNAs, GHSROS is 5' capped and 3' polyadenylated (mRNA-like), lacks an extensive open reading frame and harbours a transposable element. Engineered overexpression of GHSROS stimulated cell migration in the A549 and NCI-H1299 non-small cell lung cancer cell lines, but suppressed cell migration in the Beas-2B normal lung-derived bronchoepithelial cell line. This suggests that GHSROS function may be dependent on the oncogenic context. The identification of GHSROS, which is expressed in lung cancer and stimulates cell migration in lung cancer cell lines, contributes to the growing number of non-coding RNAs that play a role in the regulation of tumourigenesis and metastatic cancer progression. PMID:23722988

  17. PCR assay based on DNA coding for 16S rRNA for detection and identification of mycobacteria in clinical samples.

    PubMed Central

    Kox, L F; van Leeuwen, J; Knijper, S; Jansen, H M; Kolk, A H

    1995-01-01

    A PCR and a reverse cross blot hybridization assay were developed for the detection and identification of mycobacteria in clinical samples. The PCR amplifies a part of the DNA coding for 16S rRNA with a set of primers that is specific for the genus Mycobacterium and that flanks species-specific sequences within the genes coding for 16S rRNA. The PCR product is analyzed in a reverse cross blot hybridization assay with probes specific for M. tuberculosis complex (pTub1), M. avium (pAvi3), M. intracellulare (pInt5 and pInt7), M. kansasii complex-M. scrofulaceum complex (pKan1), M. xenopi (pXen1), M. fortuitum (pFor1), M. smegmatis (pSme1), and Mycobacterium spp. (pMyc5a). The PCR assay can detect 10 fg of DNA, the equivalent of two mycobacteria. The specificities of the probes were tested with 108 mycobacterial strains (33 species) and 31 nonmycobacterial strains (of 17 genera). The probes pAvi3, pInt5, pInt7, pKan1, pXen1, and pMyc5a were specific. With probes pTub1, pFor1, and pSme1, slight cross hybridization occurred. However, the mycobacterial strains from which the cross-hybridizing PCR products were derived belonged to nonpathogenic or nonopportunistic species which do not occur in clinical samples. The test was used on 31 different clinical specimens obtained from patients suspected of having mycobacterial disease, including a patient with a double mycobacterial infection. The samples included sputum, bronchoalveolar lavage, tissue biopsy samples, cerebrospinal fluid, pus, peritoneal fluid, pleural fluid, and blood. The results of the PCR assay agreed with those of conventional identification methods or with clinical data, showing that the test can be used for the direct and rapid detection and identification of mycobacteria in clinical samples. PMID:8586707

  18. Improving the identification of people with dementia in primary care: evaluation of the impact of primary care dementia coding guidance on identified prevalence

    PubMed Central

    Russell, Paul; Banerjee, Sube; Watt, Jen; Adleman, Rosalyn; Agoe, Belinda; Burnie, Nerida; Carefull, Alex; Chandan, Kiran; Constable, Dominie; Daniels, Mark; Davies, David; Deshmukh, Sid; Huddart, Martin; Jabin, Ashrafi; Jarrett, Penelope; King, Jenifer; Koch, Tamar; Kumar, Sanjoy; Lees, Stavroula; Mir, Sinan; Naidoo, Dominic; Nyame, Sylvia; Sasae, Ryuichiro; Sharma, Tushar; Thormod, Clare; Vedavanam, Krish; Wilton, Anja; Flaherty, Breda

    2013-01-01

    Objective Improving dementia care is a policy priority nationally and internationally; there is a ‘diagnosis gap’ with less than half of the cases of dementia ever diagnosed. The English Health Department's Quality and Outcomes Framework (QOF) encourages primary care recognition and recording of dementia. The codes for dementia are complex with the possibility of underidentification through miscoding. We developed guidance on coding of dementia; we report the impact of applying this to ‘clean up’ dementia coding and records at a practice level. Design The guidance had five elements: (1) identify Read Codes for dementia; (2) access QOF dementia register; (3) generate lists of patients who may have dementia; (4) compare search with QOF data and (5) review cases. In each practice, one general practitioner conducted the exercise. The number of dementia QOF registers before and after the exercise was recorded with the hours taken to complete the exercise. Setting London primary care. Participants 23 (85%) of 27 practices participated, covering 79 312 (19 562 over 65 s) participants. Outcomes The number on dementia QOF registers; time taken. Results The number of people with dementia on QOF registers increased from 1007 to 1139 (χ2=8.17, p=0.004), raising identification rates by 8.8%. It took 4.7 h per practice, on an average. Conclusions These data demonstrate the potential of a simple primary care coding exercise, requiring no specific training, to increase the dementia identification rate. An improvement of 8.8% between 2011 and 2012 is equivalent to that of the fourth most improved primary care trust in the UK. In absolute terms, if this effects were mirrored across the UK primary care, the number of cases with dementia identified would rise by over 70 000 from 364 329 to 434 488 raising the recognition rate from 46% to 54.8%. Implementing this exercise appears to be a simple and effective way to improve recognition rates in primary care. PMID

  19. Redirecting the Cyanobacterial Bicarbonate Transporters BicA and SbtA to the Chloroplast Envelope: Soluble and Membrane Cargos Need Different Chloroplast Targeting Signals in Plants

    PubMed Central

    Rolland, Vivien; Badger, Murray R.; Price, G. Dean

    2016-01-01

    Most major crops used for human consumption are C3 plants, which yields are limited by photosynthetic inefficiency. To circumvent this, it has been proposed to implement the cyanobacterial CO2-concentrating mechanism (CCM), principally consisting of bicarbonate transporters and carboxysomes, into plant chloroplasts. As it is currently not possible to recover homoplasmic transplastomic monocots, foreign genes must be introduced in these plants via nuclear transformation. Consequently, it is paramount to ensure that resulting proteins reach the appropriate sub-cellular compartment, which for cyanobacterial transporters BicA and SbtA, is the chloroplast inner-envelope membrane (IEM). At present, targeting signals to redirect large transmembrane proteins from non-chloroplastic organisms to plant chloroplast envelopes are unknown. The goal of this study was to identify such signals, using agrobacteria-mediated transient expression and confocal microscopy to determine the sub-cellular localization of ∼37 GFP-tagged chimeras. Initially, fragments of chloroplast proteins known to target soluble cargos to the stroma were tested for their ability to redirect BicA, but they proved ineffective. Next, different N-terminal regions from Arabidopsis IEM transporters were tested. We demonstrated that the N-terminus of AtHP59, AtPLGG1 or AtNTT1 (92–115 amino acids), containing a cleavable chloroplast transit peptide (cTP) and a membrane protein leader (MPL), was sufficient to redirect BicA or SbtA to the chloroplast envelope. This constitutes the first evidence that nuclear-encoded transmembrane proteins from non-chloroplastic organisms can be targeted to the envelope of plant chloroplasts; a finding which represents an important advance in chloroplast engineering by opening up the door to further manipulation of the chloroplastic envelope. PMID:26973659

  20. Redirecting the Cyanobacterial Bicarbonate Transporters BicA and SbtA to the Chloroplast Envelope: Soluble and Membrane Cargos Need Different Chloroplast Targeting Signals in Plants.

    PubMed

    Rolland, Vivien; Badger, Murray R; Price, G Dean

    2016-01-01

    Most major crops used for human consumption are C3 plants, which yields are limited by photosynthetic inefficiency. To circumvent this, it has been proposed to implement the cyanobacterial CO2-concentrating mechanism (CCM), principally consisting of bicarbonate transporters and carboxysomes, into plant chloroplasts. As it is currently not possible to recover homoplasmic transplastomic monocots, foreign genes must be introduced in these plants via nuclear transformation. Consequently, it is paramount to ensure that resulting proteins reach the appropriate sub-cellular compartment, which for cyanobacterial transporters BicA and SbtA, is the chloroplast inner-envelope membrane (IEM). At present, targeting signals to redirect large transmembrane proteins from non-chloroplastic organisms to plant chloroplast envelopes are unknown. The goal of this study was to identify such signals, using agrobacteria-mediated transient expression and confocal microscopy to determine the sub-cellular localization of ∼37 GFP-tagged chimeras. Initially, fragments of chloroplast proteins known to target soluble cargos to the stroma were tested for their ability to redirect BicA, but they proved ineffective. Next, different N-terminal regions from Arabidopsis IEM transporters were tested. We demonstrated that the N-terminus of AtHP59, AtPLGG1 or AtNTT1 (92-115 amino acids), containing a cleavable chloroplast transit peptide (cTP) and a membrane protein leader (MPL), was sufficient to redirect BicA or SbtA to the chloroplast envelope. This constitutes the first evidence that nuclear-encoded transmembrane proteins from non-chloroplastic organisms can be targeted to the envelope of plant chloroplasts; a finding which represents an important advance in chloroplast engineering by opening up the door to further manipulation of the chloroplastic envelope. PMID:26973659

  1. High resolution methylome map of rat indicates role of intragenic DNA methylation in identification of coding region.

    PubMed

    Sati, Satish; Tanwar, Vinay Singh; Kumar, K Anand; Patowary, Ashok; Jain, Vaibhav; Ghosh, Sourav; Ahmad, Shadab; Singh, Meghna; Reddy, S Umakar; Chandak, Giriraj Ratan; Raghunath, Manchala; Sivasubbu, Sridhar; Chakraborty, Kausik; Scaria, Vinod; Sengupta, Shantanu

    2012-01-01

    DNA methylation is crucial for gene regulation and maintenance of genomic stability. Rat has been a key model system in understanding mammalian systemic physiology, however detailed rat methylome remains uncharacterized till date. Here, we present the first high resolution methylome of rat liver generated using Methylated DNA immunoprecipitation and high throughput sequencing (MeDIP-Seq) approach. We observed that within the DNA/RNA repeat elements, simple repeats harbor the highest degree of methylation. Promoter hypomethylation and exon hypermethylation were common features in both RefSeq genes and expressed genes (as evaluated by proteomic approach). We also found that although CpG islands were generally hypomethylated, about 6% of them were methylated and a large proportion (37%) of methylated islands fell within the exons. Notably, we obeserved significant differences in methylation of terminal exons (UTRs); methylation being more pronounced in coding/partially coding exons compared to the non-coding exons. Further, events like alternate exon splicing (cassette exon) and intron retentions were marked by DNA methylation and these regions are retained in the final transcript. Thus, we suggest that DNA methylation could play a crucial role in marking coding regions thereby regulating alternative splicing. Apart from generating the first high resolution methylome map of rat liver tissue, the present study provides several critical insights into methylome organization and extends our understanding of interplay between epigenome, gene expression and genome stability. PMID:22355382

  2. Identification of a Conserved Non-Protein-Coding Genomic Element that Plays an Essential Role in Alphabaculovirus Pathogenesis

    PubMed Central

    Kikhno, Irina

    2014-01-01

    Highly homologous sequences 154–157 bp in length grouped under the name of “conserved non-protein-coding element” (CNE) were revealed in all of the sequenced genomes of baculoviruses belonging to the genus Alphabaculovirus. A CNE alignment led to the detection of a set of highly conserved nucleotide clusters that occupy strictly conserved positions in the CNE sequence. The significant length of the CNE and conservation of both its length and cluster architecture were identified as a combination of characteristics that make this CNE different from known viral non-coding functional sequences. The essential role of the CNE in the Alphabaculovirus life cycle was demonstrated through the use of a CNE-knockout Autographa californica multiple nucleopolyhedrovirus (AcMNPV) bacmid. It was shown that the essential function of the CNE was not mediated by the presumed expression activities of the protein- and non-protein-coding genes that overlap the AcMNPV CNE. On the basis of the presented data, the AcMNPV CNE was categorized as a complex-structured, polyfunctional genomic element involved in an essential DNA transaction that is associated with an undefined function of the baculovirus genome. PMID:24740153

  3. Identification of differentially expressed small non-coding RNAs in the legume endosymbiont Sinorhizobium meliloti by comparative genomics.

    PubMed

    del Val, Coral; Rivas, Elena; Torres-Quesada, Omar; Toro, Nicolás; Jiménez-Zurdo, José I

    2007-12-01

    Bacterial small non-coding RNAs (sRNAs) are being recognized as novel widespread regulators of gene expression in response to environmental signals. Here, we present the first search for sRNA-encoding genes in the nitrogen-fixing endosymbiont Sinorhizobium meliloti, performed by a genome-wide computational analysis of its intergenic regions. Comparative sequence data from eight related alpha-proteobacteria were obtained, and the interspecies pairwise alignments were scored with the programs eQRNA and RNAz as complementary predictive tools to identify conserved and stable secondary structures corresponding to putative non-coding RNAs. Northern experiments confirmed that eight of the predicted loci, selected among the original 32 candidates as most probable sRNA genes, expressed small transcripts. This result supports the combined use of eQRNA and RNAz as a robust strategy to identify novel sRNAs in bacteria. Furthermore, seven of the transcripts accumulated differentially in free-living and symbiotic conditions. Experimental mapping of the 5'-ends of the detected transcripts revealed that their encoding genes are organized in autonomous transcription units with recognizable promoter and, in most cases, termination signatures. These findings suggest novel regulatory functions for sRNAs related to the interactions of alpha-proteobacteria with their eukaryotic hosts. PMID:17971083

  4. Identification of differentially expressed small non-coding RNAs in the legume endosymbiont Sinorhizobium meliloti by comparative genomics

    PubMed Central

    del Val, Coral; Rivas, Elena; Torres-Quesada, Omar; Toro, Nicolás; Jiménez-Zurdo, José I

    2007-01-01

    Bacterial small non-coding RNAs (sRNAs) are being recognized as novel widespread regulators of gene expression in response to environmental signals. Here, we present the first search for sRNA-encoding genes in the nitrogen-fixing endosymbiont Sinorhizobium meliloti, performed by a genome-wide computational analysis of its intergenic regions. Comparative sequence data from eight related α-proteobacteria were obtained, and the interspecies pairwise alignments were scored with the programs eQRNA and RNAz as complementary predictive tools to identify conserved and stable secondary structures corresponding to putative non-coding RNAs. Northern experiments confirmed that eight of the predicted loci, selected among the original 32 candidates as most probable sRNA genes, expressed small transcripts. This result supports the combined use of eQRNA and RNAz as a robust strategy to identify novel sRNAs in bacteria. Furthermore, seven of the transcripts accumulated differentially in free-living and symbiotic conditions. Experimental mapping of the 5′-ends of the detected transcripts revealed that their encoding genes are organized in autonomous transcription units with recognizable promoter and, in most cases, termination signatures. These findings suggest novel regulatory functions for sRNAs related to the interactions of α-proteobacteria with their eukaryotic hosts. PMID:17971083

  5. Identification of Tissue-Specific Protein-Coding and Noncoding Transcripts across 14 Human Tissues Using RNA-seq

    PubMed Central

    Zhu, Jinhang; Chen, Geng; Zhu, Sibo; Li, Suqing; Wen, Zhuo; Bin Li; Zheng, Yuanting; Shi, Leming

    2016-01-01

    Many diseases and adverse drug reactions exhibit tissue specificity. To better understand the tissue-specific expression characteristics of transcripts in different human tissues, we deeply sequenced RNA samples from 14 different human tissues. After filtering many lowly expressed transcripts, 24,729 protein-coding transcripts and 1,653 noncoding transcripts were identified. By analyzing highly expressed tissue-specific protein-coding transcripts (TSCTs) and noncoding transcripts (TSNTs), we found that testis expressed the highest numbers of TSCTs and TSNTs. Brain, monocytes, ovary, and heart expressed more TSCTs than the rest tissues, whereas brain, placenta, heart, and monocytes expressed more TSNTs than other tissues. Co-expression network constructed based on the TSCTs and TSNTs showed that each hub TSNT was co-expressed with several TSCTs, allowing functional annotation of TSNTs. Important biological processes and KEGG pathways highly related to the specific functions or diseases of each tissue were enriched with the corresponding TSCTs. These TSCTs and TSNTs may participate in the tissue-specific physiological or pathological processes. Our study provided a unique data set and systematic analysis of expression characteristics and functions of both TSCTs and TSNTs based on 14 distinct human tissues, and could facilitate future investigation of the mechanisms behind tissue-specific diseases and adverse drug reactions. PMID:27329541

  6. Identification and analysis of the genes coding for the putative pyruvate dehydrogenase enzyme complex in Acholeplasma laidlawii.

    PubMed Central

    Wallbrandt, P; Tegman, V; Jonsson, B H; Wieslander, A

    1992-01-01

    A monospecific antibody recognizing two membrane proteins in Acholeplasma laidlawii identified a plasmid clone from a genomic library. The nucleotide sequence of the 4.6-kbp insert contained four sequential genes coding for proteins of 39 kDa (E1 alpha, N terminus not cloned), 36 kDa (E1 beta), 57 kDa (E2), and 36 kDa (E3; C terminus not cloned). The N termini of the cloned E2, E1 beta, and native A. laidlawii E2 proteins were verified by amino acid sequencing. Computer-aided searches showed that the translated DNA sequences were homologous to the four subenzymes of the pyruvate dehydrogenase complexes from gram-positive bacteria and humans. The plasmid-encoded 57-kDa (E2) protein was recognized by antibodies against the E2 subenzymes of the pyruvate and oxoglutarate dehydrogenase complexes from Bacillus subtilis. A substantial fraction of the E2 protein as well as part of the pyruvate dehydrogenase enzymatic activity was associated with the cytoplasmic membrane in A. laidlawii. In vivo complementation with three different Escherichia coli pyruvate dehydrogenase-defective mutants showed that the four plasmid-encoded proteins were able to restore pyruvate dehydrogenase enzyme activity in E. coli. Since A. laidlawii lacks oxoglutarate dehydrogenase and most likely branched-chain dehydrogenase enzyme complex activities, these results strongly suggest that the sequenced genes code for the pyruvate dehydrogenase complex. Images PMID:1735725

  7. Identification of Tissue-Specific Protein-Coding and Noncoding Transcripts across 14 Human Tissues Using RNA-seq.

    PubMed

    Zhu, Jinhang; Chen, Geng; Zhu, Sibo; Li, Suqing; Wen, Zhuo; Bin Li; Zheng, Yuanting; Shi, Leming

    2016-01-01

    Many diseases and adverse drug reactions exhibit tissue specificity. To better understand the tissue-specific expression characteristics of transcripts in different human tissues, we deeply sequenced RNA samples from 14 different human tissues. After filtering many lowly expressed transcripts, 24,729 protein-coding transcripts and 1,653 noncoding transcripts were identified. By analyzing highly expressed tissue-specific protein-coding transcripts (TSCTs) and noncoding transcripts (TSNTs), we found that testis expressed the highest numbers of TSCTs and TSNTs. Brain, monocytes, ovary, and heart expressed more TSCTs than the rest tissues, whereas brain, placenta, heart, and monocytes expressed more TSNTs than other tissues. Co-expression network constructed based on the TSCTs and TSNTs showed that each hub TSNT was co-expressed with several TSCTs, allowing functional annotation of TSNTs. Important biological processes and KEGG pathways highly related to the specific functions or diseases of each tissue were enriched with the corresponding TSCTs. These TSCTs and TSNTs may participate in the tissue-specific physiological or pathological processes. Our study provided a unique data set and systematic analysis of expression characteristics and functions of both TSCTs and TSNTs based on 14 distinct human tissues, and could facilitate future investigation of the mechanisms behind tissue-specific diseases and adverse drug reactions. PMID:27329541

  8. Mobile, hybrid Compton/coded aperture imaging for detection, identification and localization of gamma-ray sources at stand-off distances

    NASA Astrophysics Data System (ADS)

    Tornga, Shawn R.

    The Stand-off Radiation Detection System (SORDS) program is an Advanced Technology Demonstration (ATD) project through the Department of Homeland Security's Domestic Nuclear Detection Office (DNDO) with the goal of detection, identification and localization of weak radiological sources in the presence of large dynamic backgrounds. The Raytheon-SORDS Tri-Modal Imager (TMI) is a mobile truck-based, hybrid gamma-ray imaging system able to quickly detect, identify and localize, radiation sources at standoff distances through improved sensitivity while minimizing the false alarm rate. Reconstruction of gamma-ray sources is performed using a combination of two imaging modalities; coded aperture and Compton scatter imaging. The TMI consists of 35 sodium iodide (NaI) crystals 5x5x2 in3 each, arranged in a random coded aperture mask array (CA), followed by 30 position sensitive NaI bars each 24x2.5x3 in3 called the detection array (DA). The CA array acts as both a coded aperture mask and scattering detector for Compton events. The large-area DA array acts as a collection detector for both Compton scattered events and coded aperture events. In this thesis, developed coded aperture, Compton and hybrid imaging algorithms will be described along with their performance. It will be shown that multiple imaging modalities can be fused to improve detection sensitivity over a broader energy range than either alone. Since the TMI is a moving system, peripheral data, such as a Global Positioning System (GPS) and Inertial Navigation System (INS) must also be incorporated. A method of adapting static imaging algorithms to a moving platform has been developed. Also, algorithms were developed in parallel with detector hardware, through the use of extensive simulations performed with the Geometry and Tracking Toolkit v4 (GEANT4). Simulations have been well validated against measured data. Results of image reconstruction algorithms at various speeds and distances will be presented as well as

  9. Identification and expression patterns of novel long non-coding RNAs in neural progenitors of the developing mammalian cortex

    PubMed Central

    Aprea, Julieta; Lesche, Mathias; Massalini, Simone; Prenninger, Silvia; Alexopoulou, Dimitra; Dahl, Andreas; Hiller, Michael; Calegari, Federico

    2015-01-01

    Long non-coding (lnc)RNAs play key roles in many biological processes. Elucidating the function of lncRNAs in cell type specification during organ development requires knowledge about their expression in individual progenitor types rather than in whole tissues. To achieve this during cortical development, we used a dual-reporter mouse line to isolate coexisting proliferating neural stem cells, differentiating neurogenic progenitors and newborn neurons and assessed the expression of lncRNAs by paired-end, high-throughput sequencing. We identified 379 genomic loci encoding novel lncRNAs and performed a comprehensive assessment of cell-specific expression patterns for all, annotated and novel, lncRNAs described to date. Our study provides a powerful new resource for studying these elusive transcripts during stem cell commitment and neurogenesis.

  10. lncRNA-MFDL: identification of human long non-coding RNAs by fusing multiple features and using deep learning.

    PubMed

    Fan, Xiao-Nan; Zhang, Shao-Wu

    2015-03-01

    Long noncoding RNAs (lncRNAs) are emerging as a novel class of noncoding RNAs and potent gene regulators, which play an important and varied role in cellular functions. lncRNAs are closely related with the occurrence and development of some diseases. High-throughput RNA-sequencing techniques combined with de novo assembly have identified a large number of novel transcripts. The discovery of large and 'hidden' transcriptomes urgently requires the development of effective computational methods that can rapidly distinguish between coding and long noncoding RNAs. In this study, we developed a powerful predictor (named as lncRNA-MFDL) to identify lncRNAs by fusing multiple features of the open reading frame, k-mer, the secondary structure and the most-like coding domain sequence and using deep learning classification algorithms. Using the same human training dataset and a 10-fold cross validation test, lncRNA-MFDL can achieve 97.1% prediction accuracy which is 5.7, 3.7, and 3.4% higher than that of CPC, CNCI and lncRNA-FMFSVM predictors, respectively. Compared with CPC and CNCI predictors in other species (e.g., anole lizard, zebrafish, chicken, gorilla, macaque, mouse, lamprey, orangutan, xenopus and C. elegans) testing datasets, the new lncRNA-MFDL predictor is also much more effective and robust. These results show that lncRNA-MFDL is a powerful tool for identifying lncRNAs. The lncRNA-MFDL software package is freely available at for academic users. PMID:25588719

  11. Perceptions of Usefulness: Using the Holland Code Theory, Multiple Intelligences Theory, and Role Model Identification to Determine a Career Niche in the Fashion Industry for First-Quarter Fashion Students

    ERIC Educational Resources Information Center

    Green, Crystal D.

    2010-01-01

    This action research study investigated the perceptions that student participants had on the development of a career exploration model and a career exploration project. The Holland code theory was the primary assessment used for this research study, in addition to the Multiple Intelligences theory and the identification of a role model for the…

  12. Experimental RNomics in Aquifex aeolicus: identification of small non-coding RNAs and the putative 6S RNA homolog

    PubMed Central

    Willkomm, Dagmar K.; Minnerup, Jens; Hüttenhofer, Alexander; Hartmann, Roland K.

    2005-01-01

    By an experimental RNomics approach, we have generated a cDNA library from small RNAs expressed from the genome of the hyperthermophilic bacterium Aquifex aeolicus. The library included RNAs that were antisense to mRNAs and tRNAs as well as RNAs encoded in intergenic regions. Substantial steady-state levels in A.aeolicus cells were confirmed for several of the cloned RNAs by northern blot analysis. The most abundant intergenic RNA of the library was identified as the 6S RNA homolog of A.aeolicus. Although shorter in size (150 nt) than its γ-proteobacterial homologs (∼185 nt), it is predicted to have the most stable structure among known 6S RNAs. As in the γ-proteobacteria, the A.aeolicus 6S RNA gene (ssrS) is located immediately upstream of the ygfA gene encoding a widely conserved 5-formyltetrahydrofolate cyclo-ligase. We identifed novel 6S RNA candidates within the γ-proteobacteria but were unable to identify reasonable 6S RNA candidates in other bacterial branches, utilizing mfold analyses of the region immediately upstream of ygfA combined with 6S RNA blastn searches. By RACE experiments, we mapped the major transcription initiation site of A.aeolicus 6S RNA primary transcripts, located within the pheT gene preceding ygfA, as well as three processing sites. PMID:15814812

  13. Identification of a long non-coding RNA-associated RNP complex regulating metastasis at the translational step

    PubMed Central

    Gumireddy, Kiranmai; Li, Anping; Yan, Jinchun; Setoyama, Tetsuro; Johannes, Gregg J; Ørom, Ulf A; Tchou, Julia; Liu, Qin; Zhang, Lin; Speicher, David W; Calin, George A; Huang, Qihong

    2013-01-01

    Long non-coding RNAs (lncRNAs) are a novel class of regulatory genes that play critical roles in various processes ranging from normal development to human diseases such as cancer progression. Recent studies have shown that lncRNAs regulate the gene expression by chromatin remodelling, transcription, splicing and RNA decay control, enhancer function, and epigenetic regulation. However, little is known about translation regulation by lncRNAs. We identified a translational regulatory lncRNA (treRNA) through genome-wide computational analysis. We found that treRNA is upregulated in paired clinical breast cancer primary and lymph-node metastasis samples, and that its expression stimulates tumour invasion in vitro and metastasis in vivo. Interestingly, we found that treRNA downregulates the expression of the epithelial marker E-cadherin by suppressing the translation of its mRNA. We identified a novel ribonucleoprotein (RNP) complex, consisting of RNA-binding proteins (hnRNP K, FXR1, and FXR2), PUF60 and SF3B3, that is required for this treRNA functions. Translational suppression by treRNA is dependent on the 3′UTR of the E-cadherin mRNA. Taken together, our study indicates a novel mechanism of gene regulation by lncRNAs in cancer progression. PMID:23974796

  14. Identification of long non-coding RNAs as novel biomarker and potential therapeutic target for atrial fibrillation in old adults

    PubMed Central

    Xu, Yingjia; Huang, Ritai; Gu, Jianing; Jiang, Weifeng

    2016-01-01

    Atrial fibrillation (AF) is a highly prevalent cardiac arrhythmia disease, which widely leads to exacerbate heart failure and ischemic stroke in elder world. Recently, long non-coding RNAs (lncRNAs), a subclass of noncoding RNAs, have been reported to play critical roles in pathophysiology of cardiac heart. However, little is known of their role in cardiac arrhythmia. In the present study, we investigated the expression levels of lncRNAs of AF patients and healthy people with Agilent Human lncRNA array for the first time. 177 lncRNAs of 78243 and 153 mRNAs of 30215 tested were identified to be differentially expressed (≥ 2-fold change), indicating that the expression of many lncRNAs are upregulated or downregulated in AF. Among these, NONHSAT040387 and NONHSAT098586 were the most upregulated and downregulated lncRNAs. Real time quantitative PCR were employed to validate the microarray analysis findings, and the results confirmed the consistence. GO and KEGG pathway analysis were applied to explore the potential lncRNAs functions, some pathways including oxygen transporter activity and protein heterodimerization activity were speculated to be involved in AF pathogenesis. These results shed some light on lncRNAs' physiologic functions and provide useful information for exploring potential therapeutic treatments for heart rhythm disease. PMID:26908457

  15. Identification of a long non-coding RNA NR_026689 associated with lung carcinogenesis induced by NNK

    PubMed Central

    Xu, Yiqin; Yang, Ti; Yang, Qiaoyuan; Yang, Chengfeng; Jiang, Yiguo

    2016-01-01

    Long non-coding RNAs (lncRNA) are thought to be important epigenetic regulators involved in the development of a variety of cancers. Alterations in lncRNA expression are associated with exposure to chemical carcinogens. However, it is still unclear whether lncRNA expression during lung carcinogenesis is induced by chemical carcinogens. In this study, using NNK-induced rat lung cancer model established by our previous study, we determined the lncRNA expression profiles, and an alteration in lncRNA expression was observed in lung cancer tissues and blood in the NNK treatment group. Using quantitative reverse-transcription PCR (qRT-PCR), five differentially expressed lncRNAs were further detected and validated. We identified a novel lncRNA, NR_026689, which showed increased expression in lung cancer tissues induced by NNK and the alteration of lncRNA NR_026689 was specifically observed in lung tissue. The level of NR_026689 was determined and significantly increased in rat whole blood at the 10th and 20th week after NNK treatment to evaluate it as a potential early marker for lung cancer. Together, these findings suggest that lncRNA NR_026689 may be a potential early biomarker for lung cancer and is associated with lung carcinogenesis induced by NNK. PMID:26908441

  16. Identification of a non-coding KLF4 transcript generated from intron retention and downregulated in human hepatocellular carcinoma.

    PubMed

    Zhou, Junwei; Lai, Paul Bo-San; Tsui, Stephen Kwok-Wing

    2015-10-01

    The Krüppel-like factor 4 (KLF4) gene is related to various biological processes including stem cell reprogramming and tumorigenesis. In this study, we identified and characterized a non-coding transcript of KLF4, which was designated KLF4‑003, in human liver tissue samples. KLF4‑003 was identified in a number of cell lines by reverse transcription PCR and DNA sequencing. Its expression levels were determined in 54 pairs of human hepatocellular carcinoma (HCC) tissues and a number of HCC cell lines by real-time PCR (RT-PCR). Methylation status of KLF4‑003 CpG islands was determined by bisulfite sequencing. The regulatory effect of KLF4‑003 CpG islands hypermethylation in Hep3B cells was then validated by the 5-aza-dC demethylation treatment, followed by RT-PCR analysis. Receiver operating characteristic (ROC) curve was created to evaluate the diagnostic value for differentiating between HCC cancer and benign diseases. The association study between KLF4‑003 expression level and clinical traits of HCC patients was performed with SPSS. We found that KLF4‑003 was downregulated in 46 out of 54 HCC samples compared with their adjunct normal tissues. The reduced KLF4‑003 expression was significantly associated with HCC recurrence (P=0.045) in the follow-up of 31 HCC patients. Significant differences were detected between the methylation status of HCC specimens and their adjacent normal controls. Demethylation treatment significantly rescued the expression of KLF4‑003 in Hep3B cells. Such observation indicated that the CpG island hypermethylation was at least partially responsible for the downregulation of KLF4‑003 in HCC. The area under ROC curve for the prediction of HCC reached 0.803 (95% CI=0.719-0.886, P<0.001). Our results suggested that the expression of KLF4‑003 was epigenetically regulated by methylation status of a KLF4‑003 CpG island in HCC. The differential expression of KLF4‑003 might play an important role in HCC development and might

  17. BOOK REVIEW: Gravitation: Following the Prague Inspiration A Volume in Celebration of the 60th Birthday of Jiri Bicák

    NASA Astrophysics Data System (ADS)

    Semerák, O.; Podolsky, J.; Zofka, M.

    2003-10-01

    To a relativist, a time period equivalent to that of 60 orbits of the Earth around the Sun, or 5.676438379482·1019 cm of proper time, may not sound particularly significant. Yet, in our human society, it gives us the opportunity of honouring those we love and respect. Such was the occasion for the publication of this volume in honour of Professor Jiri Bicák of the Institute of Theoretical Physics at Charles University in Prague - a city in which Tycho Brahe and Kepler worked together, and where Einstein struggled to construct his general theory of relativity. An appropriate, but unusual, celebratory event which was organized on the relevant January evening involved an intersection of interesting time-shifted worldlines. A record of this is available at http://astro.troja.mff.cuni.cz/bicak/, which may help in comprehending the preface. Our purpose here, however, is to comment on the more permanent item that was produced for the occasion. It must immediately be stated that this is not a typical festschrift in which leading authorities around the world contribute articles dedicated to an academic colleague. It was a surprise present from past research students to their teacher. It maintains the character of a personal tribute but, basically, the contributions are research papers of the highest quality. The result is a very valuable academic reference. As Bicák would have wanted, this is a substantial contribution to objective science, not a piece of post-modern sentimentalism. Reflecting Bicák's own wide interests, the different contributions to this volume cover specific topics in general relativity, astrophysics, theoretical physics and cosmology. They include original articles and thorough up-to-date reviews. In all cases, detailed mathematical or computational analysis is guided by requirements of physical significance. The first paper is by Dolezel on observations from within slowly rotating voids in cosmological models and their compatibility with Mach

  18. Identification and functional characterization of cDNAs coding for hydroxybenzoate/hydroxycinnamate glucosyltransferases co-expressed with genes related to proanthocyanidin biosynthesis

    PubMed Central

    Khater, F.; Fournand, D.; Vialet, S.; Meudec, E.; Cheynier, V.; Terrier, N.

    2012-01-01

    Grape proanthocyanidins (PAs) play a major role in the organoleptic properties of wine. They are accumulated mainly in grape skin and seeds during the early stages of berry development. Despite the recent progress in the identification of genes involved in PA biosynthesis, the mechanisms involved in subunit condensation, galloylation, or fine regulation of the spatio-temporal composition of grape berries in PAs are still not elucidated. Two Myb transcription factors, VvMybPA1 and VvMybPA2, controlling the PA pathway have recently been identified and ectopically over-expressed in an homologous system. In addition to already known PA genes, three genes coding for glucosyltransferases were significantly differentially expressed between hairy roots over-expressing VvMybPA1 or VvMybPA2 and control lines. The involvement of these genes in PA biosynthesis metabolism is unclear. The three glucosyltransferases display high sequence similarities with other plant glucosyltransferases able to catalyse the formation of glucose esters, which are important intermediate actors for the synthesis of different phenolic compounds. Studies of the in vitro properties of these three enzymes (Km, Vmax, substrate specificity, pH sensitivity) were performed through production of recombinant proteins in E. coli and demonstrated that they are able to catalyse the formation of 1-O-acyl-Glc esters of phenolic acids but are not active on flavonoids and stilbenes. The transcripts are expressed in the early stages of grape berry development, mainly in the berry skins and seeds. The results presented here suggest that these enzymes could be involved in vivo in PA galloylation or in the synthesis of hydroxycinnamic esters. PMID:22090445

  19. Identification of a genetic alteration in the code for bilirubin UDP-glucuronosyltransferase in the UGT1 gene complex of a Crigler-Najjar type I patient.

    PubMed Central

    Ritter, J K; Yeatman, M T; Ferreira, P; Owens, I S

    1992-01-01

    Patients with Crigler-Najjar syndrome (CN) type I inherit an autosomal recessive trait for hyperbilirubinemia, which is characterized by the total absence of bilirubin UDP-glucuronosyltransferase (transferase) activity. The recent identification of two bilirubin transferase isoforms with identical carboxyl termini (Ritter, J. K., J. M. Crawford, and I. S. Owens. 1991. J. Biol. Chem. 266:1043-1047) led to the discovery of a unique locus, UGT1, which encodes a family of UDP-glucuronosyltransferase isozymes, including the two bilirubin forms (Ritter, J. K., F. Chen, Y. Y. Sheen, H. M. Tran, S. Kimura, M. T. Yeatman, and I. S. Owens. 1992. J. Biol. Chem. 267:3257-3261). The UGT1 locus features a complex of six overlapping transcriptional units encoding transferases, each of which shares the four most 3' exons (2, 3, 4, and 5) specifying the 3' half of the transferase coding regions (condons 289-533) and the entire 3' untranslated region of each mRNA. This gene model predicts that a single critical mutation in any of these four "common" exons may inactivate the entire family of encoded transferases. In agreement with this prediction, we show here that in the first CN type I individual analyzed (patient F.B.), a 13-bp deletion has occurred in exon 2. Analysis of product generated by the polymerase chain reaction and genomic DNA demonstrated that F.B. is homozygous for the defective allele (UGT1*FB), and that the consanguineous parents are both heterozygotic at this locus. The mutation is predicted to result in the synthesis of severely truncated bilirubin transferase isozymes that are lacking a highly conserved sequence in the carboxyl-terminus and the characteristic membrane (endoplasmic reticulum)-anchoring segment of the protein molecule. Images PMID:1634606

  20. Copy number analysis of whole-genome data using BIC-seq2 and its application to detection of cancer susceptibility variants.

    PubMed

    Xi, Ruibin; Lee, Semin; Xia, Yuchao; Kim, Tae-Min; Park, Peter J

    2016-07-27

    Whole-genome sequencing data allow detection of copy number variation (CNV) at high resolution. However, estimation based on read coverage along the genome suffers from bias due to GC content and other factors. Here, we develop an algorithm called BIC-seq2 that combines normalization of the data at the nucleotide level and Bayesian information criterion-based segmentation to detect both somatic and germline CNVs accurately. Analysis of simulation data showed that this method outperforms existing methods. We apply this algorithm to low coverage whole-genome sequencing data from peripheral blood of nearly a thousand patients across eleven cancer types in The Cancer Genome Atlas (TCGA) to identify cancer-predisposing CNV regions. We confirm known regions and discover new ones including those covering KMT2C, GOLPH3, ERBB2 and PLAG1 Analysis of colorectal cancer genomes in particular reveals novel recurrent CNVs including deletions at two chromatin-remodeling genes RERE and NPM2 This method will be useful to many researchers interested in profiling CNVs from whole-genome sequencing data. PMID:27260798

  1. Use of FEC coding to improve statistical multiplexing performance for video transport over ATM networks

    NASA Astrophysics Data System (ADS)

    Kurceren, Ragip; Modestino, James W.

    1998-12-01

    The use of forward error-control (FEC) coding, possibly in conjunction with ARQ techniques, has emerged as a promising approach for video transport over ATM networks for cell-loss recovery and/or bit error correction, such as might be required for wireless links. Although FEC provides cell-loss recovery capabilities it also introduces transmission overhead which can possibly cause additional cell losses. A methodology is described to maximize the number of video sources multiplexed at a given quality of service (QoS), measured in terms of decoded cell loss probability, using interlaced FEC codes. The transport channel is modelled as a block interference channel (BIC) and the multiplexer as single server, deterministic service, finite buffer supporting N users. Based upon an information-theoretic characterization of the BIC and large deviation bounds on the buffer overflow probability, the described methodology provides theoretically achievable upper limits on the number of sources multiplexed. Performance of specific coding techniques using interlaced nonbinary Reed-Solomon (RS) codes and binary rate-compatible punctured convolutional (RCPC) codes is illustrated.

  2. Clinical coding. Code breakers.

    PubMed

    Mathieson, Steve

    2005-02-24

    --The advent of payment by results has seen the role of the clinical coder pushed to the fore in England. --Examinations for a clinical coding qualification began in 1999. In 2004, approximately 200 people took the qualification. --Trusts are attracting people to the role by offering training from scratch or through modern apprenticeships. PMID:15768716

  3. Binary coding for hyperspectral imagery

    NASA Astrophysics Data System (ADS)

    Wang, Jing; Chang, Chein-I.; Chang, Chein-Chi; Lin, Chinsu

    2004-10-01

    Binary coding is one of simplest ways to characterize spectral features. One commonly used method is a binary coding-based image software system, called Spectral Analysis Manager (SPAM) for remotely sensed imagery developed by Mazer et al. For a given spectral signature, the SPAM calculates its spectral mean and inter-band spectral difference and uses them as thresholds to generate a binary code word for this particular spectral signature. Such coding scheme is generally effective and also very simple to implement. This paper revisits the SPAM and further develops three new SPAM-based binary coding methods, called equal probability partition (EPP) binary coding, halfway partition (HP) binary coding and median partition (MP) binary coding. These three binary coding methods along with the SPAM well be evaluated for spectral discrimination and identification. In doing so, a new criterion, called a posteriori discrimination probability (APDP) is also introduced for performance measure.

  4. Identification and functional characterization of G6PC2 coding variants influencing glycemic traits define an effector transcript at the G6PC2-ABCB11 locus.

    PubMed

    Mahajan, Anubha; Sim, Xueling; Ng, Hui Jin; Manning, Alisa; Rivas, Manuel A; Highland, Heather M; Locke, Adam E; Grarup, Niels; Im, Hae Kyung; Cingolani, Pablo; Flannick, Jason; Fontanillas, Pierre; Fuchsberger, Christian; Gaulton, Kyle J; Teslovich, Tanya M; Rayner, N William; Robertson, Neil R; Beer, Nicola L; Rundle, Jana K; Bork-Jensen, Jette; Ladenvall, Claes; Blancher, Christine; Buck, David; Buck, Gemma; Burtt, Noël P; Gabriel, Stacey; Gjesing, Anette P; Groves, Christopher J; Hollensted, Mette; Huyghe, Jeroen R; Jackson, Anne U; Jun, Goo; Justesen, Johanne Marie; Mangino, Massimo; Murphy, Jacquelyn; Neville, Matt; Onofrio, Robert; Small, Kerrin S; Stringham, Heather M; Syvänen, Ann-Christine; Trakalo, Joseph; Abecasis, Goncalo; Bell, Graeme I; Blangero, John; Cox, Nancy J; Duggirala, Ravindranath; Hanis, Craig L; Seielstad, Mark; Wilson, James G; Christensen, Cramer; Brandslund, Ivan; Rauramaa, Rainer; Surdulescu, Gabriela L; Doney, Alex S F; Lannfelt, Lars; Linneberg, Allan; Isomaa, Bo; Tuomi, Tiinamaija; Jørgensen, Marit E; Jørgensen, Torben; Kuusisto, Johanna; Uusitupa, Matti; Salomaa, Veikko; Spector, Timothy D; Morris, Andrew D; Palmer, Colin N A; Collins, Francis S; Mohlke, Karen L; Bergman, Richard N; Ingelsson, Erik; Lind, Lars; Tuomilehto, Jaakko; Hansen, Torben; Watanabe, Richard M; Prokopenko, Inga; Dupuis, Josee; Karpe, Fredrik; Groop, Leif; Laakso, Markku; Pedersen, Oluf; Florez, Jose C; Morris, Andrew P; Altshuler, David; Meigs, James B; Boehnke, Michael; McCarthy, Mark I; Lindgren, Cecilia M; Gloyn, Anna L

    2015-01-01

    Genome wide association studies (GWAS) for fasting glucose (FG) and insulin (FI) have identified common variant signals which explain 4.8% and 1.2% of trait variance, respectively. It is hypothesized that low-frequency and rare variants could contribute substantially to unexplained genetic variance. To test this, we analyzed exome-array data from up to 33,231 non-diabetic individuals of European ancestry. We found exome-wide significant (P<5×10-7) evidence for two loci not previously highlighted by common variant GWAS: GLP1R (p.Ala316Thr, minor allele frequency (MAF)=1.5%) influencing FG levels, and URB2 (p.Glu594Val, MAF = 0.1%) influencing FI levels. Coding variant associations can highlight potential effector genes at (non-coding) GWAS signals. At the G6PC2/ABCB11 locus, we identified multiple coding variants in G6PC2 (p.Val219Leu, p.His177Tyr, and p.Tyr207Ser) influencing FG levels, conditionally independent of each other and the non-coding GWAS signal. In vitro assays demonstrate that these associated coding alleles result in reduced protein abundance via proteasomal degradation, establishing G6PC2 as an effector gene at this locus. Reconciliation of single-variant associations and functional effects was only possible when haplotype phase was considered. In contrast to earlier reports suggesting that, paradoxically, glucose-raising alleles at this locus are protective against type 2 diabetes (T2D), the p.Val219Leu G6PC2 variant displayed a modest but directionally consistent association with T2D risk. Coding variant associations for glycemic traits in GWAS signals highlight PCSK1, RREB1, and ZHX3 as likely effector transcripts. These coding variant association signals do not have a major impact on the trait variance explained, but they do provide valuable biological insights. PMID:25625282

  5. Identification and Functional Characterization of G6PC2 Coding Variants Influencing Glycemic Traits Define an Effector Transcript at the G6PC2-ABCB11 Locus

    PubMed Central

    Mahajan, Anubha; Sim, Xueling; Ng, Hui Jin; Manning, Alisa; Rivas, Manuel A.; Highland, Heather M.; Locke, Adam E.; Grarup, Niels; Im, Hae Kyung; Cingolani, Pablo; Flannick, Jason; Fontanillas, Pierre; Fuchsberger, Christian; Gaulton, Kyle J.; Teslovich, Tanya M.; Rayner, N. William; Robertson, Neil R.; Beer, Nicola L.; Rundle, Jana K.; Bork-Jensen, Jette; Ladenvall, Claes; Blancher, Christine; Buck, David; Buck, Gemma; Burtt, Noël P.; Gabriel, Stacey; Gjesing, Anette P.; Groves, Christopher J.; Hollensted, Mette; Huyghe, Jeroen R.; Jackson, Anne U.; Jun, Goo; Justesen, Johanne Marie; Mangino, Massimo; Murphy, Jacquelyn; Neville, Matt; Onofrio, Robert; Small, Kerrin S.; Stringham, Heather M.; Syvänen, Ann-Christine; Trakalo, Joseph; Abecasis, Goncalo; Bell, Graeme I.; Blangero, John; Cox, Nancy J.; Duggirala, Ravindranath; Hanis, Craig L.; Seielstad, Mark; Wilson, James G.; Christensen, Cramer; Brandslund, Ivan; Rauramaa, Rainer; Surdulescu, Gabriela L.; Doney, Alex S. F.; Lannfelt, Lars; Linneberg, Allan; Isomaa, Bo; Tuomi, Tiinamaija; Jørgensen, Marit E.; Jørgensen, Torben; Kuusisto, Johanna; Uusitupa, Matti; Salomaa, Veikko; Spector, Timothy D.; Morris, Andrew D.; Palmer, Colin N. A.; Collins, Francis S.; Mohlke, Karen L.; Bergman, Richard N.; Ingelsson, Erik; Lind, Lars; Tuomilehto, Jaakko; Hansen, Torben; Watanabe, Richard M.; Prokopenko, Inga; Dupuis, Josee; Karpe, Fredrik; Groop, Leif; Laakso, Markku; Pedersen, Oluf; Florez, Jose C.; Morris, Andrew P.; Altshuler, David; Meigs, James B.; Boehnke, Michael; McCarthy, Mark I.; Lindgren, Cecilia M.; Gloyn, Anna L.

    2015-01-01

    Genome wide association studies (GWAS) for fasting glucose (FG) and insulin (FI) have identified common variant signals which explain 4.8% and 1.2% of trait variance, respectively. It is hypothesized that low-frequency and rare variants could contribute substantially to unexplained genetic variance. To test this, we analyzed exome-array data from up to 33,231 non-diabetic individuals of European ancestry. We found exome-wide significant (P<5×10-7) evidence for two loci not previously highlighted by common variant GWAS: GLP1R (p.Ala316Thr, minor allele frequency (MAF)=1.5%) influencing FG levels, and URB2 (p.Glu594Val, MAF = 0.1%) influencing FI levels. Coding variant associations can highlight potential effector genes at (non-coding) GWAS signals. At the G6PC2/ABCB11 locus, we identified multiple coding variants in G6PC2 (p.Val219Leu, p.His177Tyr, and p.Tyr207Ser) influencing FG levels, conditionally independent of each other and the non-coding GWAS signal. In vitro assays demonstrate that these associated coding alleles result in reduced protein abundance via proteasomal degradation, establishing G6PC2 as an effector gene at this locus. Reconciliation of single-variant associations and functional effects was only possible when haplotype phase was considered. In contrast to earlier reports suggesting that, paradoxically, glucose-raising alleles at this locus are protective against type 2 diabetes (T2D), the p.Val219Leu G6PC2 variant displayed a modest but directionally consistent association with T2D risk. Coding variant associations for glycemic traits in GWAS signals highlight PCSK1, RREB1, and ZHX3 as likely effector transcripts. These coding variant association signals do not have a major impact on the trait variance explained, but they do provide valuable biological insights. PMID:25625282

  6. Phonological coding during reading

    PubMed Central

    Leinenger, Mallorie

    2014-01-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early (pre-lexical) or that phonological codes come online late (post-lexical)) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eyetracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model (Van Order, 1987), dual-route model (e.g., Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001), parallel distributed processing model (Seidenberg & McClelland, 1989)) are discussed. PMID:25150679

  7. Phonological coding during reading.

    PubMed

    Leinenger, Mallorie

    2014-11-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early [prelexical] or that phonological codes come online late [postlexical]) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eye-tracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model, Van Orden, 1987; dual-route model, e.g., M. Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001; parallel distributed processing model, Seidenberg & McClelland, 1989) are discussed. PMID:25150679

  8. A second ortho­rhom­bic polymorph of (Z)-3-(9-anthr­yl)-1-(2-thien­yl)prop-2-en-1-one1

    PubMed Central

    Chantrapromma, Suchada; Suwunwong, Thitipone; Boonnak, Nawong; Fun, Hoong-Kun

    2010-01-01

    The title heteroaryl chalcone, C21H14OS, is a second ortho­rhom­bic polymorph which crystallizes in the space group P212121. The structure was previously reported [Fun et al. (2009 ▶). Acta Cryst. E65, o2168-o2169] in the space group Pna21. The bond distances and angles are similar in both structures. In contrast, the overall crystal packing is different from that in the first ortho­rhom­bic Pna21 polymorph in which mol­ecules were stacked into columns along the b axis and the thio­phene units of two adjacent columns were stacked in a head to tail fashion. In the present polymorph, mol­ecules are found to dimerize through a weak S⋯S inter­action [3.6513 (7) Å] and these dimers are arranged into sheets parallel to the bc plane. There are no classical hydrogen bonds in the packing which features short C⋯O [3.2832 (2)–3.6251 (9) Å], C⋯S [3.4879 (17)–3.6251 (19) Å] and S⋯O [2.9948 (16) Å] contacts, together with C—H⋯π inter­actions. Similar contacts were found in the other polymorph. PMID:21579743

  9. Speech coding

    NASA Astrophysics Data System (ADS)

    Gersho, Allen

    1990-05-01

    Recent advances in algorithms and techniques for speech coding now permit high quality voice reproduction at remarkably low bit rates. The advent of powerful single-ship signal processors has made it cost effective to implement these new and sophisticated speech coding algorithms for many important applications in voice communication and storage. Some of the main ideas underlying the algorithms of major interest today are reviewed. The concept of removing redundancy by linear prediction is reviewed, first in the context of predictive quantization or DPCM. Then linear predictive coding, adaptive predictive coding, and vector quantization are discussed. The concepts of excitation coding via analysis-by-synthesis, vector sum excitation codebooks, and adaptive postfiltering are explained. The main idea of vector excitation coding (VXC) or code excited linear prediction (CELP) are presented. Finally low-delay VXC coding and phonetic segmentation for VXC are described.

  10. Improvement of genome assembly completeness and identification of novel full-length protein-coding genes by RNA-seq in the giant panda genome.

    PubMed

    Chen, Meili; Hu, Yibo; Liu, Jingxing; Wu, Qi; Zhang, Chenglin; Yu, Jun; Xiao, Jingfa; Wei, Fuwen; Wu, Jiayan

    2015-01-01

    High-quality and complete gene models are the basis of whole genome analyses. The giant panda (Ailuropoda melanoleuca) genome was the first genome sequenced on the basis of solely short reads, but the genome annotation had lacked the support of transcriptomic evidence. In this study, we applied RNA-seq to globally improve the genome assembly completeness and to detect novel expressed transcripts in 12 tissues from giant pandas, by using a transcriptome reconstruction strategy that combined reference-based and de novo methods. Several aspects of genome assembly completeness in the transcribed regions were effectively improved by the de novo assembled transcripts, including genome scaffolding, the detection of small-size assembly errors, the extension of scaffold/contig boundaries, and gap closure. Through expression and homology validation, we detected three groups of novel full-length protein-coding genes. A total of 12.62% of the novel protein-coding genes were validated by proteomic data. GO annotation analysis showed that some of the novel protein-coding genes were involved in pigmentation, anatomical structure formation and reproduction, which might be related to the development and evolution of the black-white pelage, pseudo-thumb and delayed embryonic implantation of giant pandas. The updated genome annotation will help further giant panda studies from both structural and functional perspectives. PMID:26658305

  11. Improvement of genome assembly completeness and identification of novel full-length protein-coding genes by RNA-seq in the giant panda genome

    PubMed Central

    Chen, Meili; Hu, Yibo; Liu, Jingxing; Wu, Qi; Zhang, Chenglin; Yu, Jun; Xiao, Jingfa; Wei, Fuwen; Wu, Jiayan

    2015-01-01

    High-quality and complete gene models are the basis of whole genome analyses. The giant panda (Ailuropoda melanoleuca) genome was the first genome sequenced on the basis of solely short reads, but the genome annotation had lacked the support of transcriptomic evidence. In this study, we applied RNA-seq to globally improve the genome assembly completeness and to detect novel expressed transcripts in 12 tissues from giant pandas, by using a transcriptome reconstruction strategy that combined reference-based and de novo methods. Several aspects of genome assembly completeness in the transcribed regions were effectively improved by the de novo assembled transcripts, including genome scaffolding, the detection of small-size assembly errors, the extension of scaffold/contig boundaries, and gap closure. Through expression and homology validation, we detected three groups of novel full-length protein-coding genes. A total of 12.62% of the novel protein-coding genes were validated by proteomic data. GO annotation analysis showed that some of the novel protein-coding genes were involved in pigmentation, anatomical structure formation and reproduction, which might be related to the development and evolution of the black-white pelage, pseudo-thumb and delayed embryonic implantation of giant pandas. The updated genome annotation will help further giant panda studies from both structural and functional perspectives. PMID:26658305

  12. Uplink Coding

    NASA Technical Reports Server (NTRS)

    Pollara, Fabrizio; Hamkins, Jon; Dolinar, Sam; Andrews, Ken; Divsalar, Dariush

    2006-01-01

    This viewgraph presentation reviews uplink coding. The purpose and goals of the briefing are (1) Show a plan for using uplink coding and describe benefits (2) Define possible solutions and their applicability to different types of uplink, including emergency uplink (3) Concur with our conclusions so we can embark on a plan to use proposed uplink system (4) Identify the need for the development of appropriate technology and infusion in the DSN (5) Gain advocacy to implement uplink coding in flight projects Action Item EMB04-1-14 -- Show a plan for using uplink coding, including showing where it is useful or not (include discussion of emergency uplink coding).

  13. Identification of acetic acid bacteria by restriction fragment length polymorphism analysis of a PCR-amplified fragment of the gene coding for 16S rRNA.

    PubMed

    Poblet, M; Rozès, N; Guillamón, J M; Mas, A

    2000-07-01

    Acetic acid bacteria (AAB) irreversibly spoil wines and represent a serious problem. Limited studies on the ecology of AAB during winemaking have been done due to the lack of rapid and precise techniques for their identification. RFLP analysis of PCR-amplified fragment of 16S rDNA was performed on AAB reference strains. The amplified rDNAs were approximately 870-bp long for all AAB species while no amplicons were detected for lactic acid bacteria and yeasts. Out of the four restriction enzymes tested, TaqI was the most efficient one and divided the studied AAB into six groups. However, complete differentiation among collection strains of Acetobacter pasteurianus and Gluconoacetobacter hansenii was not possible. PMID:10886617

  14. Identification of genes coding for B cell antigens of Mycoplasma mycoides subsp. mycoides Small Colony (MmmSC) by using phage display

    PubMed Central

    2009-01-01

    Background Contagious bovine pleuropneumonia (CBPP) is a mycoplasmal disease caused by Mycoplasma mycoides subsp. mycoides SC (MmmSC). Since the disease is a serious problem that can affect cattle production in parts of Africa, there is a need for an effective and economical vaccine. Identifying which of the causative agent's proteins trigger potentially protective immune responses is an important step towards developing a subunit vaccine. Accordingly, the purpose of this study was to determine whether phage display combined with bioinformatics could be used to narrow the search for genes that code for potentially immunogenic proteins of MmmSC. Since the production of IgG2 and IgA are associated with a Th1 cellular immune response which is implicated in protection against CBPP, antigens which elicit these immunoglobulin subclasses may be useful in developing a subunit vaccine. Results A filamentous phage library displaying a repertoire of peptides expressed by fragments of the genome of MmmSC was constructed. It was subjected to selection using antibodies from naturally- and experimentally-infected cattle. Mycoplasmal genes were identified by matching the nucleotide sequences of DNA from immunoselected phage particles with the mycoplasmal genome. This allowed a catalogue of genes coding for the proteins that elicited an immune response to be compiled. Using this method together with computer algorithms designed to score parameters that influence surface accessibility and hence potential antigenicity, five genes (abc, gapN, glpO, lppB and ptsG) were chosen to be expressed in Escherichia coli. After appropriate site-directed mutagenesis, polypeptides representing portions of each of these proteins were tested for immunoreactivity. Of these five, polypeptides representing expression products of abc and lppB were recognised on immunoblots by sera obtained from cattle during a natural outbreak of the disease. Conclusion Since phage display physically couples phenotype

  15. Comprehensive Identification of Long Non-coding RNAs in Purified Cell Types from the Brain Reveals Functional LncRNA in OPC Fate Determination.

    PubMed

    Dong, Xiaomin; Chen, Kenian; Cuevas-Diaz Duran, Raquel; You, Yanan; Sloan, Steven A; Zhang, Ye; Zong, Shan; Cao, Qilin; Barres, Ben A; Wu, Jia Qian

    2015-12-01

    Long non-coding RNAs (lncRNAs) (> 200 bp) play crucial roles in transcriptional regulation during numerous biological processes. However, it is challenging to comprehensively identify lncRNAs, because they are often expressed at low levels and with more cell-type specificity than are protein-coding genes. In the present study, we performed ab initio transcriptome reconstruction using eight purified cell populations from mouse cortex and detected more than 5000 lncRNAs. Predicting the functions of lncRNAs using cell-type specific data revealed their potential functional roles in Central Nervous System (CNS) development. We performed motif searches in ENCODE DNase I digital footprint data and Mouse ENCODE promoters to infer transcription factor (TF) occupancy. By integrating TF binding and cell-type specific transcriptomic data, we constructed a novel framework that is useful for systematically identifying lncRNAs that are potentially essential for brain cell fate determination. Based on this integrative analysis, we identified lncRNAs that are regulated during Oligodendrocyte Precursor Cell (OPC) differentiation from Neural Stem Cells (NSCs) and that are likely to be involved in oligodendrogenesis. The top candidate, lnc-OPC, shows highly specific expression in OPCs and remarkable sequence conservation among placental mammals. Interestingly, lnc-OPC is significantly up-regulated in glial progenitors from experimental autoimmune encephalomyelitis (EAE) mouse models compared to wild-type mice. OLIG2-binding sites in the upstream regulatory region of lnc-OPC were identified by ChIP (chromatin immunoprecipitation)-Sequencing and validated by luciferase assays. Loss-of-function experiments confirmed that lnc-OPC plays a functional role in OPC genesis. Overall, our results substantiated the role of lncRNA in OPC fate determination and provided an unprecedented data source for future functional investigations in CNS cell types. We present our datasets and analysis results

  16. Comprehensive Identification of Long Non-coding RNAs in Purified Cell Types from the Brain Reveals Functional LncRNA in OPC Fate Determination

    PubMed Central

    Dong, Xiaomin; Chen, Kenian; Cuevas-Diaz Duran, Raquel; You, Yanan; Sloan, Steven A.; Zhang, Ye; Zong, Shan; Cao, Qilin; Barres, Ben A.; Wu, Jia Qian

    2015-01-01

    Long non-coding RNAs (lncRNAs) (> 200 bp) play crucial roles in transcriptional regulation during numerous biological processes. However, it is challenging to comprehensively identify lncRNAs, because they are often expressed at low levels and with more cell-type specificity than are protein-coding genes. In the present study, we performed ab initio transcriptome reconstruction using eight purified cell populations from mouse cortex and detected more than 5000 lncRNAs. Predicting the functions of lncRNAs using cell-type specific data revealed their potential functional roles in Central Nervous System (CNS) development. We performed motif searches in ENCODE DNase I digital footprint data and Mouse ENCODE promoters to infer transcription factor (TF) occupancy. By integrating TF binding and cell-type specific transcriptomic data, we constructed a novel framework that is useful for systematically identifying lncRNAs that are potentially essential for brain cell fate determination. Based on this integrative analysis, we identified lncRNAs that are regulated during Oligodendrocyte Precursor Cell (OPC) differentiation from Neural Stem Cells (NSCs) and that are likely to be involved in oligodendrogenesis. The top candidate, lnc-OPC, shows highly specific expression in OPCs and remarkable sequence conservation among placental mammals. Interestingly, lnc-OPC is significantly up-regulated in glial progenitors from experimental autoimmune encephalomyelitis (EAE) mouse models compared to wild-type mice. OLIG2-binding sites in the upstream regulatory region of lnc-OPC were identified by ChIP (chromatin immunoprecipitation)-Sequencing and validated by luciferase assays. Loss-of-function experiments confirmed that lnc-OPC plays a functional role in OPC genesis. Overall, our results substantiated the role of lncRNA in OPC fate determination and provided an unprecedented data source for future functional investigations in CNS cell types. We present our datasets and analysis results

  17. Sequence analysis and identification of new variations in the coding sequence of melatonin receptor gene (MTNR1A) of Indian Chokla sheep breed

    PubMed Central

    Saxena, Vijay Kumar; Jha, Bipul Kumar; Meena, Amar Singh; Naqvi, S.M.K.

    2014-01-01

    Melatonin receptor 1A gene is the prime receptor mediating the effect of melatonin at the neuroendocrine level for control of seasonal reproduction in sheep. The aims of this study were to examine the polymorphism pattern of coding sequence of MTNR1A gene in Chokla sheep, a breed of Indian arid tract and to identify new variations in relation to its aseasonal status. Genomic DNAs of 101 Chokla sheep were collected and an 824 bp coding sequence of Exon II was amplified. RFLP was performed with enzyme RsaI and MnlI to assess the presence of polymorphism at position C606T and G612A, respectively. Genotyping revealed significantly higher frequency of M and R alleles than m and r alleles. RR and MM were found to be dominantly present in the group of studied population. Cloning and sequencing of Exon II followed by mutation/polymorphism analysis revealed ten mutations of which three were non-synonymous mutations (G706A, C893A, G931C). G706A leads to substitution of valine by isoleucine Val125I (U14109) in the fifth transmembrane domain. C893A leads to substitution of alanine by aspartic acid in the third extracellular loop. G931C mutation brings about substitution of amino acid alanine by proline in the seventh transmembrane helix, can affect the conformational stability of the molecule. Polyphen-2 analysis revealed that the polymorphism at position 931 is potentially damaging while the mutations at positions 706 and 893 were benign. It is concluded that G931C mutation of MTNR 1A gene, may explain, in part, the importance of melatonin structure integrity in influencing seasonality in sheep. PMID:25606429

  18. Molecular Characterization of the Tumor Suppressor Candidate 5 Gene: Regulation by PPARγ and Identification of TUSC5 Coding Variants in Lean and Obese Humans

    PubMed Central

    Knotts, Trina A.; Lee, Hyun Woo; Kim, Jae Bum; Oort, Pieter J.; McPherson, Ruth; Dent, Robert; Tachibana, Keisuke; Doi, Takefumi; Yu, Songtao; Reddy, Janardan K.; Uno, Kenji; Katagiri, Hideki; Pasarica, Magdalena; Smith, Steven R.; Sears, Dorothy D.; Grino, Michel; Adams, Sean H.

    2009-01-01

    Tumor suppressor candidate 5 (TUSC5) is a gene expressed abundantly in white adipose tissue (WAT), brown adipose tissue (BAT), and peripheral afferent neurons. Strong adipocyte expression and increased expression following peroxisome proliferator activated receptor γ (PPARγ) agonist treatment of 3T3-L1 adipocytes suggested a role for Tusc5 in fat cell proliferation and/or metabolism. However, the regulation of Tusc5 in WAT and its potential association with obesity phenotypes remain unclear. We tested the hypothesis that the TUSC5 gene is a bona fide PPARγ target and evaluated whether its WAT expression or single-nucleotide polymorphisms (SNPs) in the TUSC5 coding region are associated with human obesity. Induction of Tusc5 mRNA levels in 3T3-L1 adipocytes by troglitazone and GW1929 followed a dose-response consistent with these agents' binding affinities for PPARγ. Chromatin immunoprecipitation (ChIP) experiments confirmed that PPARγ protein binds a ∼ −1.1 kb promotor sequence of murine TUSC5 transiently during 3T3-L1 adipogenesis, concurrent with histone H3 acetylation. No change in Tusc5 mRNA or protein levels was evident in type 2 diabetic patients treated with pioglitazone. Tusc5 expression was not induced appreciably in liver preparations overexpressing PPARs, suggesting that tissue-specific factors regulate PPARγ responsiveness of the TUSC5 gene. Finally, we observed no differences in Tusc5 WAT expression or prevalence of coding region SNPs in lean versus obese human subjects. These studies firmly establish the murine TUSC5 gene locus as a PPARγ target, but the significance of Tusc5 in obesity phenotypes or in the pharmacologic actions of PPARγ agonists in humans remains equivocal. PMID:20204174

  19. Analysis of human follistatin structure: identification of two discontinuous N-terminal sequences coding for activin A binding and structural consequences of activin binding to native proteins.

    PubMed

    Wang, Q; Keutmann, H T; Schneyer, A L; Sluss, P M

    2000-09-01

    A primary physiological function of follistatin is the binding and neutralization of activin, a transforming growth factor-beta family growth factor, and loss of function mutations are lethal. Despite the critical biological importance of follistatin's neutralization of activin, the structural basis of activin's binding to follistatin is poorly understood. The purposes of these studies were 1) to identify the primary sequence(s) within the N-terminal domain of the follistatin coding for activin binding, and 2) to determine whether activin binding to the native protein causes changes in other structural domains of follistatin. Synthetic peptide mimotopes identified within a 63-residue N-terminal domain two discontinuous sequences capable of binding labeled activin A. The first is located in a region (amino acids 3-26) of follistatin, a site previously identified by directed mutagenesis as important for activin binding. The second epitope, predicted to be located between amino acids 46 and 59, is newly identified. Although the sequences 3-26 and 46-59 code for activin binding, native follistatin only binds activin if disulfide bonding is intact. Furthermore, pyridylethylation of Cys residues followed by N-terminal sequencing and amino acid analysis revealed that all of the Cys residues in follistatin are involved in disulfide bonds and lack reactive free sulfhydryl groups. Specific ligands were used to probe the structural effects of activin binding on the other domains of the full-length molecule, comprised largely of the three 10-Cys follistatin module domains. No effects on ligand binding to follistatin-like module I or II were observed after the binding of activin A to native protein. In contrast, activin binding diminished recognition of domain III and enhanced that of the C domain by their respective monoclonal antibody probes, indicating an alteration of the antigenic structures of these regions. Thus, subsequent to activin binding, interactions are likely to

  20. Computer Code

    NASA Technical Reports Server (NTRS)

    1985-01-01

    COSMIC MINIVER, a computer code developed by NASA for analyzing aerodynamic heating and heat transfer on the Space Shuttle, has been used by Marquardt Company to analyze heat transfer on Navy/Air Force missile bodies. The code analyzes heat transfer by four different methods which can be compared for accuracy. MINIVER saved Marquardt three months in computer time and $15,000.

  1. Identification and functional analysis of acute myeloid leukemia susceptibility associated single nucleotide polymorphisms at non-protein coding regions of RUNX1.

    PubMed

    Xu, Xin; Ren, Xiuyu; Wang, Haiying; Zhao, Yao; Yi, Zhengjun; Wang, Kaifeng; Zhang, Shizhuang; Wang, Lin; Samuelson, David J; Hu, Zhenbo

    2016-06-01

    Little is known about the susceptibility to acute myeloid leukemia. We aim to search non-protein coding regions of key hematopoiesis transcription factors for genetic variations associated with acute myeloid leukemia susceptibility. We genotyped SNPs of RUNX1 P1 promoter, P2 promoter, +23 enhancer, intron 5.2 enhancer, PU.1 promoter, CEBPA promoter, and CEBPE promoter from acute myeloid leukemia patients and healthy controls. Rs2249650 and rs2268276 at RUNX1 intron 5.2 enhancer were found to be associated with acute myeloid leukemia susceptibility. Artificial reporters containing different rs2249650 and rs2268276 alleles showed differential activities in the K562 cell line, a human immortalized myeloid leukemia line. Rs2249650 contributes to reporter activities more than rs2268276. Gel shift assay is consistent with the luciferase assay. Supershift assay indicated that one potential binding protein was PU.1. To sum up, rs2268276 and especially rs2249650 may be qualified as new acute myeloid leukemia susceptibility-associated SNPs. PMID:26374622

  2. NMR-assisted prediction of RNA secondary structure: identification of a probable pseudoknot in the coding region of an R2 retrotransposon.

    PubMed

    Hart, James M; Kennedy, Scott D; Mathews, David H; Turner, Douglas H

    2008-08-01

    As the rate of functional RNA sequence discovery escalates, high-throughput techniques for reliable structural determination are becoming crucial for revealing the essential features of these RNAs in a timely fashion. Computational predictions of RNA secondary structure quickly generate reasonable models but suffer from several approximations, including overly simplified models and incomplete knowledge of significant interactions. Similar problems limit the accuracy of predictions for other self-folding polymers, including DNA and peptide nucleic acid (PNA). The work presented here demonstrates that incorporating unassigned data from simple nuclear magnetic resonance (NMR) experiments into a dynamic folding algorithm greatly reduces the potential folding space of a given RNA and therefore increases the confidence and accuracy of modeling. This procedure has been packaged into an NMR-assisted prediction of secondary structure (NAPSS) algorithm that can produce pseudoknotted as well as non-pseudoknotted secondary structures. The method reveals a probable pseudoknot in the part of the coding region of the R2 retrotransposon from Bombyx mori that orchestrates second-strand DNA cleavage during insertion into the genome. PMID:18613678

  3. MMA, A Computer Code for Multi-Model Analysis

    SciTech Connect

    Eileen P. Poeter and Mary C. Hill

    2007-08-20

    This report documents the Multi-Model Analysis (MMA) computer code. MMA can be used to evaluate results from alternative models of a single system using the same set of observations for all models. As long as the observations, the observation weighting, and system being represented are the same, the models can differ in nearly any way imaginable. For example, they may include different processes, different simulation software, different temporal definitions (for example, steady-state and transient models could be considered), and so on. The multiple models need to be calibrated by nonlinear regression. Calibration of the individual models needs to be completed before application of MMA. MMA can be used to rank models and calculate posterior model probabilities. These can be used to (1) determine the relative importance of the characteristics embodied in the alternative models, (2) calculate model-averaged parameter estimates and predictions, and (3) quantify the uncertainty of parameter estimates and predictions in a way that integrates the variations represented by the alternative models. There is a lack of consensus on what model analysis methods are best, so MMA provides four default methods. Two are based on Kullback-Leibler information, and use the AIC (Akaike Information Criterion) or AICc (second-order-bias-corrected AIC) model discrimination criteria. The other two default methods are the BIC (Bayesian Information Criterion) and the KIC (Kashyap Information Criterion) model discrimination criteria. Use of the KIC criterion is equivalent to using the maximum-likelihood Bayesian model averaging (MLBMA) method. AIC, AICc, and BIC can be derived from Frequentist or Bayesian arguments. The default methods based on Kullback-Leibler information have a number of theoretical advantages, including that they tend to favor more complicated models as more data become available than do the other methods, which makes sense in many situations.

  4. DNA codes

    SciTech Connect

    Torney, D. C.

    2001-01-01

    We have begun to characterize a variety of codes, motivated by potential implementation as (quaternary) DNA n-sequences, with letters denoted A, C The first codes we studied are the most reminiscent of conventional group codes. For these codes, Hamming similarity was generalized so that the score for matched letters takes more than one value, depending upon which letters are matched [2]. These codes consist of n-sequences satisfying an upper bound on the similarities, summed over the letter positions, of distinct codewords. We chose similarity 2 for matches of letters A and T and 3 for matches of the letters C and G, providing a rough approximation to double-strand bond energies in DNA. An inherent novelty of DNA codes is 'reverse complementation'. The latter may be defined, as follows, not only for alphabets of size four, but, more generally, for any even-size alphabet. All that is required is a matching of the letters of the alphabet: a partition into pairs. Then, the reverse complement of a codeword is obtained by reversing the order of its letters and replacing each letter by its match. For DNA, the matching is AT/CG because these are the Watson-Crick bonding pairs. Reversal arises because two DNA sequences form a double strand with opposite relative orientations. Thus, as will be described in detail, because in vitro decoding involves the formation of double-stranded DNA from two codewords, it is reasonable to assume - for universal applicability - that the reverse complement of any codeword is also a codeword. In particular, self-reverse complementary codewords are expressly forbidden in reverse-complement codes. Thus, an appropriate distance between all pairs of codewords must, when large, effectively prohibit binding between the respective codewords: to form a double strand. Only reverse-complement pairs of codewords should be able to bind. For most applications, a DNA code is to be bi-partitioned, such that the reverse-complementary pairs are separated

  5. Identification of bacteria in a biodegraded wall painting by denaturing gradient gel electrophoresis of PCR-amplified gene fragments coding for 16S rRNA.

    PubMed Central

    Rölleke, S; Muyzer, G; Wawer, C; Wanner, G; Lubitz, W

    1996-01-01

    Medieval wall paintings are often affected by biodecay. An inventory of the existing microorganisms associated with the damage to the paintings is not yet an integral part of the restoration process. This stems from the lack of effective means for such a stocktaking. Nevertheless, fungi and bacteria cause severe damage through mechanical processes from growth into the painting and its grounding and through their metabolism. Detailed information on the bacterial colonization of ancient wall paintings is essential for the protection of the paintings. We used a molecular approach based on the detection and identification of DNA sequences encoding rRNA (rDNA) to identify bacteria present on an ancient wall painting without prior cultivation of the organisms, since it has been shown that most of these bacteria cannot be cultivated under laboratory conditions. To trace the noncultivated fraction of bacteria, total DNA from a biodegraded wall painting sample from a 13th century fresco was extracted and 194-bp fragments of the 16S rDNA were amplified with eubacterial primers. The 16S rDNA fragments of uniform length obtained from the different bacterial species were separated according to their sequence differences by denaturing gradient gel electrophoresis (DGGE). By sequencing excised and reamplified individual DNA bands, we characterized the phylogenetic affiliation of the corresponding bacteria. Using this approach, we identified members or close relatives of the genera Halomonas, Clostridium, and Frankia. To our knowledge, these groups of bacteria have not yet been isolated and implicated by conventional microbiological techniques as contributing to the biodegradation of wall paintings. PMID:8787403

  6. Speech coding

    SciTech Connect

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  7. The Redox Code

    PubMed Central

    Jones, Dean P.

    2015-01-01

    Abstract Significance: The redox code is a set of principles that defines the positioning of the nicotinamide adenine dinucleotide (NAD, NADP) and thiol/disulfide and other redox systems as well as the thiol redox proteome in space and time in biological systems. The code is richly elaborated in an oxygen-dependent life, where activation/deactivation cycles involving O2 and H2O2 contribute to spatiotemporal organization for differentiation, development, and adaptation to the environment. Disruption of this organizational structure during oxidative stress represents a fundamental mechanism in system failure and disease. Recent Advances: Methodology in assessing components of the redox code under physiological conditions has progressed, permitting insight into spatiotemporal organization and allowing for identification of redox partners in redox proteomics and redox metabolomics. Critical Issues: Complexity of redox networks and redox regulation is being revealed step by step, yet much still needs to be learned. Future Directions: Detailed knowledge of the molecular patterns generated from the principles of the redox code under defined physiological or pathological conditions in cells and organs will contribute to understanding the redox component in health and disease. Ultimately, there will be a scientific basis to a modern redox medicine. Antioxid. Redox Signal. 23, 734–746. PMID:25891126

  8. A genetic scale of reading frame coding.

    PubMed

    Michel, Christian J

    2014-08-21

    The reading frame coding (RFC) of codes (sets) of trinucleotides is a genetic concept which has been largely ignored during the last 50 years. A first objective is the definition of a new and simple statistical parameter PrRFC for analysing the probability (efficiency) of reading frame coding (RFC) of any trinucleotide code. A second objective is to reveal different classes and subclasses of trinucleotide codes involved in reading frame coding: the circular codes of 20 trinucleotides and the bijective genetic codes of 20 trinucleotides coding the 20 amino acids. This approach allows us to propose a genetic scale of reading frame coding which ranges from 1/3 with the random codes (RFC probability identical in the three frames) to 1 with the comma-free circular codes (RFC probability maximal in the reading frame and null in the two shifted frames). This genetic scale shows, in particular, the reading frame coding probabilities of the 12,964,440 circular codes (PrRFC=83.2% in average), the 216 C(3) self-complementary circular codes (PrRFC=84.1% in average) including the code X identified in eukaryotic and prokaryotic genes (PrRFC=81.3%) and the 339,738,624 bijective genetic codes (PrRFC=61.5% in average) including the 52 codes without permuted trinucleotides (PrRFC=66.0% in average). Otherwise, the reading frame coding probabilities of each trinucleotide code coding an amino acid with the universal genetic code are also determined. The four amino acids Gly, Lys, Phe and Pro are coded by codes (not circular) with RFC probabilities equal to 2/3, 1/2, 1/2 and 2/3, respectively. The amino acid Leu is coded by a circular code (not comma-free) with a RFC probability equal to 18/19. The 15 other amino acids are coded by comma-free circular codes, i.e. with RFC probabilities equal to 1. The identification of coding properties in some classes of trinucleotide codes studied here may bring new insights in the origin and evolution of the genetic code. PMID:24698943

  9. QR Codes

    ERIC Educational Resources Information Center

    Lai, Hsin-Chih; Chang, Chun-Yen; Li, Wen-Shiane; Fan, Yu-Lin; Wu, Ying-Tien

    2013-01-01

    This study presents an m-learning method that incorporates Integrated Quick Response (QR) codes. This learning method not only achieves the objectives of outdoor education, but it also increases applications of Cognitive Theory of Multimedia Learning (CTML) (Mayer, 2001) in m-learning for practical use in a diverse range of outdoor locations. When…

  10. Event-recording devices with identification codes

    NASA Technical Reports Server (NTRS)

    Watters, David G. (Inventor); Huestis, David L. (Inventor); Bahr, Alfred J. (Inventor); Vidmar, Robert J. (Inventor)

    2003-01-01

    A recording device allows wireless interrogation to determine its identity and its state. The state indicates whether one or more physical or chemical events have taken place. In effect, the one or more physical or chemical events are recorded by the device. The identity of the device allows it to be distinguished from a number of similar devices. The recording device may be used in an array of devices that allows wireless probing by an interrogation unit. When probed, each device tells the interrogator who it is and what state it is in. The devices allow multiple use and the interrogator may use a logical reset to determine the state of each device. The interrogator can thus easily identify particular items in an array that have reached a particular condition. The device may record the status of each device in a database to maintain a history for each.

  11. Wurster's Blue-type cation radicals framed in a 5,10-dihydrobenzo[a]indolo[2,3-c]carbazole (BIC) skeleton: dual electrochromism with drastic changes in UV/Vis/NIR and fluorescence.

    PubMed

    Suzuki, Takanori; Sakano, Yuto; Tokimizu, Yusuke; Miura, Youhei; Katoono, Ryo; Fujiwara, Kenshu; Yoshioka, Naoki; Fujii, Nobutaka; Ohno, Hiroaki

    2014-07-01

    Electron-donating dihydrobenzindolocarbazoles (BICs) 1 a-c, which adopt planar disk-shaped geometries, were prepared by gold(I)-catalyzed cyclization as a key step. Due to the presence of a 1,4-phenylenediamine (PD) moiety in the framework, they undergo reversible one-electron oxidation to the corresponding Wurster's Blue (WB)-type species that exhibits NIR absorptions up to λ=1200 nm. In the case of the N,N'-dimethyl derivative, cation radical 1 c(+.) is stable enough to be isolated as a salt and X-ray analysis indicated paraquinoid-type bond alternation in the WB core unit, whereas the bond lengths in the peripheral benzene rings are identical to those in the neutral donor. Upon electrochemical interconversion, the redox pairs of 1 a-c and 1 a-c(+.) exhibited an electrochromic response in the UV/Vis/NIR region, which was accompanied by a drastic change in the fluorescence spectrum because only neutral donors 1 a-c are highly emissive (Φ(F) : 0.7-0.8). PMID:24861822

  12. Thermal neutron response of a boron-coated GEM detector via GEANT4 Monte Carlo code.

    PubMed

    Jamil, M; Rhee, J T; Kim, H G; Ahmad, Farzana; Jeon, Y J

    2014-10-22

    In this work, we report the design configuration and the performance of the hybrid Gas Electron Multiplier (GEM) detector. In order to make the detector sensitive to thermal neutrons, the forward electrode of the GEM has been coated with the enriched boron-10 material, which works as a neutron converter. A total of 5×5cm(2) configuration of GEM has been used for thermal neutron studies. The response of the detector has been estimated via using GEANT4 MC code with two different physics lists. Using the QGSP_BIC_HP physics list, the neutron detection efficiency was determined to be about 3%, while with QGSP_BERT_HP physics list the efficiency was around 2.5%, at the incident thermal neutron energies of 25meV. The higher response of the detector proves that GEM-coated with boron converter improves the efficiency for thermal neutrons detection. PMID:25464183

  13. MMA, A Computer Code for Multi-Model Analysis

    USGS Publications Warehouse

    Poeter, Eileen P.; Hill, Mary C.

    2007-01-01

    This report documents the Multi-Model Analysis (MMA) computer code. MMA can be used to evaluate results from alternative models of a single system using the same set of observations for all models. As long as the observations, the observation weighting, and system being represented are the same, the models can differ in nearly any way imaginable. For example, they may include different processes, different simulation software, different temporal definitions (for example, steady-state and transient models could be considered), and so on. The multiple models need to be calibrated by nonlinear regression. Calibration of the individual models needs to be completed before application of MMA. MMA can be used to rank models and calculate posterior model probabilities. These can be used to (1) determine the relative importance of the characteristics embodied in the alternative models, (2) calculate model-averaged parameter estimates and predictions, and (3) quantify the uncertainty of parameter estimates and predictions in a way that integrates the variations represented by the alternative models. There is a lack of consensus on what model analysis methods are best, so MMA provides four default methods. Two are based on Kullback-Leibler information, and use the AIC (Akaike Information Criterion) or AICc (second-order-bias-corrected AIC) model discrimination criteria. The other two default methods are the BIC (Bayesian Information Criterion) and the KIC (Kashyap Information Criterion) model discrimination criteria. Use of the KIC criterion is equivalent to using the maximum-likelihood Bayesian model averaging (MLBMA) method. AIC, AICc, and BIC can be derived from Frequentist or Bayesian arguments. The default methods based on Kullback-Leibler information have a number of theoretical advantages, including that they tend to favor more complicated models as more data become available than do the other methods, which makes sense in many situations. Many applications of MMA will

  14. Peripheral coding of taste

    PubMed Central

    Liman, Emily R.; Zhang, Yali V.; Montell, Craig

    2014-01-01

    Five canonical tastes, bitter, sweet, umami (amino acid), salty and sour (acid) are detected by animals as diverse as fruit flies and humans, consistent with a near universal drive to consume fundamental nutrients and to avoid toxins or other harmful compounds. Surprisingly, despite this strong conservation of basic taste qualities between vertebrates and invertebrates, the receptors and signaling mechanisms that mediate taste in each are highly divergent. The identification over the last two decades of receptors and other molecules that mediate taste has led to stunning advances in our understanding of the basic mechanisms of transduction and coding of information by the gustatory systems of vertebrates and invertebrates. In this review, we discuss recent advances in taste research, mainly from the fly and mammalian systems, and we highlight principles that are common across species, despite stark differences in receptor types. PMID:24607224

  15. Codes with special correlation.

    NASA Technical Reports Server (NTRS)

    Baumert, L. D.

    1964-01-01

    Uniform binary codes with special correlation including transorthogonality and simplex code, Hadamard matrices and difference sets uniform binary codes with special correlation including transorthogonality and simplex code, Hadamard matrices and difference sets

  16. Error-correction coding

    NASA Technical Reports Server (NTRS)

    Hinds, Erold W. (Principal Investigator)

    1996-01-01

    This report describes the progress made towards the completion of a specific task on error-correcting coding. The proposed research consisted of investigating the use of modulation block codes as the inner code of a concatenated coding system in order to improve the overall space link communications performance. The study proposed to identify and analyze candidate codes that will complement the performance of the overall coding system which uses the interleaved RS (255,223) code as the outer code.

  17. Everyday Engineering: What Makes a Bic Click?

    ERIC Educational Resources Information Center

    Moyer, Richard; Everett, Susan

    2009-01-01

    The ballpoint pen is an ideal example of simple engineering that we use everyday. But is it really so simple? The ballpoint pen is a remarkable combination of technology and science. Its operation uses several scientific principles related to chemistry and physics, such as properties of liquids and simple machines. They represent significant…

  18. Homological stabilizer codes

    SciTech Connect

    Anderson, Jonas T.

    2013-03-15

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

  19. 21 CFR 206.10 - Code imprint required.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... identification than a symbol or logo by itself. Homeopathic drug products are required only to bear an imprint... National Drug Code, or a mark, symbol, logo, or monogram, or a combination of letters, numbers, and...

  20. 21 CFR 206.10 - Code imprint required.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... identification than a symbol or logo by itself. Homeopathic drug products are required only to bear an imprint... National Drug Code, or a mark, symbol, logo, or monogram, or a combination of letters, numbers, and...

  1. Computer programs for the characterization of protein coding genes.

    PubMed

    Pierno, G; Barni, N; Candurro, M; Cipollaro, M; Franzè, A; Juliano, L; Macchiato, M F; Mastrocinque, G; Moscatelli, C; Scarlato, V

    1984-01-11

    Computer programs, implemented on an Univac II00/80 computer system, for the identification and characterization of protein coding genes and for the analysis of nucleic acid sequences, are described. PMID:6546420

  2. Computer programs for the characterization of protein coding genes.

    PubMed Central

    Pierno, G; Barni, N; Candurro, M; Cipollaro, M; Franzè, A; Juliano, L; Macchiato, M F; Mastrocinque, G; Moscatelli, C; Scarlato, V

    1984-01-01

    Computer programs, implemented on an Univac II00/80 computer system, for the identification and characterization of protein coding genes and for the analysis of nucleic acid sequences, are described. PMID:6546420

  3. Coding of Neuroinfectious Diseases.

    PubMed

    Barkley, Gregory L

    2015-12-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue. PMID:26633789

  4. Model Children's Code.

    ERIC Educational Resources Information Center

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  5. Thermoelectric pump performance analysis computer code

    NASA Technical Reports Server (NTRS)

    Johnson, J. L.

    1973-01-01

    A computer program is presented that was used to analyze and design dual-throat electromagnetic dc conduction pumps for the 5-kwe ZrH reactor thermoelectric system. In addition to a listing of the code and corresponding identification of symbols, the bases for this analytical model are provided.

  6. Fluorescent taggants with temporally coded signatures.

    PubMed

    Wang, Siyang; Vyas, Raul; Dwyer, Chris

    2016-07-11

    In this paper, resonance energy transfer (RET) networks between chromophores are used to implement fluorescent taggants with temporally coded signatures. Because the temporal signature of such a fluorescent taggant is a phase-type distribution defined by the geometry of its RET network, the taggant design is not constrained by resolvable dyes and has a significantly larger coding capacity than spectrally or lifetime coded fluorescent taggants. Meanwhile, the detection process becomes highly efficient when the signatures are coded in the time domain. The taggant identification method is based on the multinomial distribution of detected photons and Maximum Likelihood Estimation, which guarantees high accuracy even with only a few hundred photons and also applies to a mixture of taggants in multiplex detection. Therefore, these temporally coded fluorescent taggants have great potential for both in situ and Lidar applications. PMID:27410827

  7. Accumulate repeat accumulate codes

    NASA Technical Reports Server (NTRS)

    Abbasfar, Aliazam; Divsalar, Dariush; Yao, Kung

    2004-01-01

    In this paper we propose an innovative channel coding scheme called 'Accumulate Repeat Accumulate codes' (ARA). This class of codes can be viewed as serial turbo-like codes, or as a subclass of Low Density Parity Check (LDPC) codes, thus belief propagation can be used for iterative decoding of ARA codes on a graph. The structure of encoder for this class can be viewed as precoded Repeat Accumulate (RA) code or as precoded Irregular Repeat Accumulate (IRA) code, where simply an accumulator is chosen as a precoder. Thus ARA codes have simple, and very fast encoder structure when they representing LDPC codes. Based on density evolution for LDPC codes through some examples for ARA codes, we show that for maximum variable node degree 5 a minimum bit SNR as low as 0.08 dB from channel capacity for rate 1/2 can be achieved as the block size goes to infinity. Thus based on fixed low maximum variable node degree, its threshold outperforms not only the RA and IRA codes but also the best known LDPC codes with the dame maximum node degree. Furthermore by puncturing the accumulators any desired high rate codes close to code rate 1 can be obtained with thresholds that stay close to the channel capacity thresholds uniformly. Iterative decoding simulation results are provided. The ARA codes also have projected graph or protograph representation that allows for high speed decoder implementation.

  8. Comparative learning of pitch and loudness identification.

    PubMed

    Houtsma, A J; Durlach, N I; Horowitz, D M

    1987-01-01

    This study investigated possible similarities between the ability to identify pitches and the ability to identify loudnesses. Systematic training of musically naive subjects indicated that frequency identification performance improves at about the same rate as intensity identification performance. Examination of frequency and intensity identification behavior of musically trained subjects showed that their ability to code pitch information efficiently does not generalize to an ability to encode loudness information more efficiently than untrained subjects. Intensity identification training curves of musically trained and untrained subjects are similar, but final performance levels are below frequency identification performance levels exhibited by musically trained subjects, especially those with absolute pitch. PMID:3819170

  9. Concatenated Coding Using Trellis-Coded Modulation

    NASA Technical Reports Server (NTRS)

    Thompson, Michael W.

    1997-01-01

    In the late seventies and early eighties a technique known as Trellis Coded Modulation (TCM) was developed for providing spectrally efficient error correction coding. Instead of adding redundant information in the form of parity bits, redundancy is added at the modulation stage thereby increasing bandwidth efficiency. A digital communications system can be designed to use bandwidth-efficient multilevel/phase modulation such as Amplitude Shift Keying (ASK), Phase Shift Keying (PSK), Differential Phase Shift Keying (DPSK) or Quadrature Amplitude Modulation (QAM). Performance gain can be achieved by increasing the number of signals over the corresponding uncoded system to compensate for the redundancy introduced by the code. A considerable amount of research and development has been devoted toward developing good TCM codes for severely bandlimited applications. More recently, the use of TCM for satellite and deep space communications applications has received increased attention. This report describes the general approach of using a concatenated coding scheme that features TCM and RS coding. Results have indicated that substantial (6-10 dB) performance gains can be achieved with this approach with comparatively little bandwidth expansion. Since all of the bandwidth expansion is due to the RS code we see that TCM based concatenated coding results in roughly 10-50% bandwidth expansion compared to 70-150% expansion for similar concatenated scheme which use convolution code. We stress that combined coding and modulation optimization is important for achieving performance gains while maintaining spectral efficiency.

  10. Coset Codes Viewed as Terminated Convolutional Codes

    NASA Technical Reports Server (NTRS)

    Fossorier, Marc P. C.; Lin, Shu

    1996-01-01

    In this paper, coset codes are considered as terminated convolutional codes. Based on this approach, three new general results are presented. First, it is shown that the iterative squaring construction can equivalently be defined from a convolutional code whose trellis terminates. This convolutional code determines a simple encoder for the coset code considered, and the state and branch labelings of the associated trellis diagram become straightforward. Also, from the generator matrix of the code in its convolutional code form, much information about the trade-off between the state connectivity and complexity at each section, and the parallel structure of the trellis, is directly available. Based on this generator matrix, it is shown that the parallel branches in the trellis diagram of the convolutional code represent the same coset code C(sub 1), of smaller dimension and shorter length. Utilizing this fact, a two-stage optimum trellis decoding method is devised. The first stage decodes C(sub 1), while the second stage decodes the associated convolutional code, using the branch metrics delivered by stage 1. Finally, a bidirectional decoding of each received block starting at both ends is presented. If about the same number of computations is required, this approach remains very attractive from a practical point of view as it roughly doubles the decoding speed. This fact is particularly interesting whenever the second half of the trellis is the mirror image of the first half, since the same decoder can be implemented for both parts.

  11. 48 CFR 204.7005 - Assignment of order codes.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Assignment of order codes. 204.7005 Section 204.7005 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Uniform Procurement Instrument Identification Numbers 204.7005 Assignment of order codes....

  12. Discussion on LDPC Codes and Uplink Coding

    NASA Technical Reports Server (NTRS)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  13. Manually operated coded switch

    DOEpatents

    Barnette, Jon H.

    1978-01-01

    The disclosure relates to a manually operated recodable coded switch in which a code may be inserted, tried and used to actuate a lever controlling an external device. After attempting a code, the switch's code wheels must be returned to their zero positions before another try is made.

  14. Binary primitive alternant codes

    NASA Technical Reports Server (NTRS)

    Helgert, H. J.

    1975-01-01

    In this note we investigate the properties of two classes of binary primitive alternant codes that are generalizations of the primitive BCH codes. For these codes we establish certain equivalence and invariance relations and obtain values of d and d*, the minimum distances of the prime and dual codes.

  15. 47 CFR 22.313 - Station identification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... continuity of any public communication in progress, provided that station identification is transmitted at the conclusion of that public communication. (c) Station identification must be transmitted by telephony using the English language or by telegraphy using the international Morse code, and in a form...

  16. Algebraic geometric codes

    NASA Technical Reports Server (NTRS)

    Shahshahani, M.

    1991-01-01

    The performance characteristics are discussed of certain algebraic geometric codes. Algebraic geometric codes have good minimum distance properties. On many channels they outperform other comparable block codes; therefore, one would expect them eventually to replace some of the block codes used in communications systems. It is suggested that it is unlikely that they will become useful substitutes for the Reed-Solomon codes used by the Deep Space Network in the near future. However, they may be applicable to systems where the signal to noise ratio is sufficiently high so that block codes would be more suitable than convolutional or concatenated codes.

  17. Oil and gas field code master list, 1993

    SciTech Connect

    Not Available

    1993-12-16

    This document contains data collected through October 1993 and provides standardized field name spellings and codes for all identified oil and/or gas fields in the United States. Other Federal and State government agencies, as well as industry, use the EIA Oil and Gas Field Code Master List as the standard for field identification. A machine-readable version of the Oil and Gas Field Code Master List is available from the National Technical Information Service.

  18. Spectral derivative feature coding for hyperspectral signature analysis

    NASA Astrophysics Data System (ADS)

    Chang, Chein-I.; Chakravarty, Sumit

    2006-08-01

    This paper presents a new approach to hyperspectral signature analysis, called Spectral Derivative Feature Coding (SDFC). It makes use of gradient changes in adjacent bands to characterize spectral variations so as to improve spectral discrimination and identification. In order to evaluate its performance, two binary coding methods, SPectral Analysis Manager (SPAM) and Spectral Feature-based Binary Coding (SFBC) are used to conduct comparative analysis. The experimental results demonstrate the proposed SDFC performs more effectively in capturing spectral characteristics.

  19. ARA type protograph codes

    NASA Technical Reports Server (NTRS)

    Divsalar, Dariush (Inventor); Abbasfar, Aliazam (Inventor); Jones, Christopher R. (Inventor); Dolinar, Samuel J. (Inventor); Thorpe, Jeremy C. (Inventor); Andrews, Kenneth S. (Inventor); Yao, Kung (Inventor)

    2008-01-01

    An apparatus and method for encoding low-density parity check codes. Together with a repeater, an interleaver and an accumulator, the apparatus comprises a precoder, thus forming accumulate-repeat-accumulate (ARA codes). Protographs representing various types of ARA codes, including AR3A, AR4A and ARJA codes, are described. High performance is obtained when compared to the performance of current repeat-accumulate (RA) or irregular-repeat-accumulate (IRA) codes.

  20. QR Codes 101

    ERIC Educational Resources Information Center

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  1. Identification of linc-NeD125, a novel long non coding RNA that hosts miR-125b-1 and negatively controls proliferation of human neuroblastoma cells.

    PubMed

    Bevilacqua, Valeria; Gioia, Ubaldo; Di Carlo, Valerio; Tortorelli, Anna F; Colombo, Teresa; Bozzoni, Irene; Laneve, Pietro; Caffarelli, Elisa

    2015-01-01

    The human genome contains some thousands of long non coding RNAs (lncRNAs). Many of these transcripts are presently considered crucial regulators of gene expression and functionally implicated in developmental processes in Eukaryotes. Notably, despite a huge number of lncRNAs are expressed in the Central Nervous System (CNS), only a few of them have been characterized in terms of molecular structure, gene expression regulation and function. In the present study, we identify linc-NeD125 as a novel cytoplasmic, neuronal-induced long intergenic non coding RNA (lincRNA). Linc-NeD125 represents the host gene for miR-125b-1, a microRNA with an established role as negative regulator of human neuroblastoma cell proliferation. Here, we demonstrate that these two overlapping non coding RNAs are coordinately induced during in vitro neuronal differentiation, and that their expression is regulated by different mechanisms. While the production of miR-125b-1 relies on transcriptional regulation, linc-NeD125 is controlled at the post-transcriptional level, through modulation of its stability. We also demonstrate that linc-NeD125 functions independently of the hosted microRNA, by reducing cell proliferation and activating the antiapoptotic factor BCL-2. PMID:26480000

  2. Finding the key to a better code: code team restructure to improve performance and outcomes.

    PubMed

    Prince, Cynthia R; Hines, Elizabeth J; Chyou, Po-Huang; Heegeman, David J

    2014-09-01

    Code teams respond to acute life threatening changes in a patient's status 24 hours a day, 7 days a week. If any variable, whether a medical skill or non-medical quality, is lacking, the effectiveness of a code team's resuscitation could be hindered. To improve the overall performance of our hospital's code team, we implemented an evidence-based quality improvement restructuring plan. The code team restructure, which occurred over a 3-month period, included a defined number of code team participants, clear identification of team members and their primary responsibilities and position relative to the patient, and initiation of team training events and surprise mock codes (simulations). Team member assessments of the restructured code team and its performance were collected through self-administered electronic questionnaires. Time-to-defibrillation, defined as the time the code was called until the start of defibrillation, was measured for each code using actual time recordings from code summary sheets. Significant improvements in team member confidence in the skills specific to their role and clarity in their role's position were identified. Smaller improvements were seen in team leadership and reduction in the amount of extra talking and noise during a code. The average time-to-defibrillation during real codes decreased each year since the code team restructure. This type of code team restructure resulted in improvements in several areas that impact the functioning of the team, as well as decreased the average time-to-defibrillation, making it beneficial to many, including the team members, medical institution, and patients. PMID:24667218

  3. On fuzzy semantic similarity measure for DNA coding.

    PubMed

    Ahmad, Muneer; Jung, Low Tang; Bhuiyan, Md Al-Amin

    2016-02-01

    A coding measure scheme numerically translates the DNA sequence to a time domain signal for protein coding regions identification. A number of coding measure schemes based on numerology, geometry, fixed mapping, statistical characteristics and chemical attributes of nucleotides have been proposed in recent decades. Such coding measure schemes lack the biologically meaningful aspects of nucleotide data and hence do not significantly discriminate coding regions from non-coding regions. This paper presents a novel fuzzy semantic similarity measure (FSSM) coding scheme centering on FSSM codons׳ clustering and genetic code context of nucleotides. Certain natural characteristics of nucleotides i.e. appearance as a unique combination of triplets, preserving special structure and occurrence, and ability to own and share density distributions in codons have been exploited in FSSM. The nucleotides׳ fuzzy behaviors, semantic similarities and defuzzification based on the center of gravity of nucleotides revealed a strong correlation between nucleotides in codons. The proposed FSSM coding scheme attains a significant enhancement in coding regions identification i.e. 36-133% as compared to other existing coding measure schemes tested over more than 250 benchmarked and randomly taken DNA datasets of different organisms. PMID:26773936

  4. 26 CFR 31.6011(b)-1 - Employers' identification numbers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 26 Internal Revenue 15 2013-04-01 2013-04-01 false Employers' identification numbers. 31.6011(b)-1... Subtitle F, Internal Revenue Code of 1954) § 31.6011(b)-1 Employers' identification numbers. (a... Insurance Contributions Act, but who prior to such day neither has been assigned an identification...

  5. Asymmetric quantum convolutional codes

    NASA Astrophysics Data System (ADS)

    La Guardia, Giuliano G.

    2016-01-01

    In this paper, we construct the first families of asymmetric quantum convolutional codes (AQCCs). These new AQCCs are constructed by means of the CSS-type construction applied to suitable families of classical convolutional codes, which are also constructed here. The new codes have non-catastrophic generator matrices, and they have great asymmetry. Since our constructions are performed algebraically, i.e. we develop general algebraic methods and properties to perform the constructions, it is possible to derive several families of such codes and not only codes with specific parameters. Additionally, several different types of such codes are obtained.

  6. Identification of two factors which bind to the upstream sequences of a number of nuclear genes coding for mitochondrial proteins and to genetic elements important for cell division in yeast.

    PubMed Central

    Dorsman, J C; van Heeswijk, W C; Grivell, L A

    1988-01-01

    Two abundant factors, GFI and GFII which interact with the 5' flanking regions of nuclear genes coding for proteins of the mitochondrial respiratory chain have been identified. In one case (subunit VIII of QH2: cytochrome c oxidoreductase) the binding sites for both factors overlap completely and their binding is mutually exclusive. For the other 5' regions tested the GFI and GFII binding sites do not coincide. Interestingly, binding sites for GFI and GFII are also present in or at the 3' ends of the coding regions of two genes of the PHO gene family and in DNA elements important for optimal ARS and CEN function respectively. The sites recognized by GFI conform to the consensus RTCRNNNNNNACGNR, while those recognized by GFII contain the element RTCACGTG. We speculate that GFI and GFII may play a role in different cellular processes, dependent on the context of their binding sites and that one of these processes may be the coordination of the expression of genes involved in mitochondrial biogenesis with the progress of the cell cycle. Images PMID:3045755

  7. Molecular cloning and characterization of the cDNA coding for the biotin-containing subunit of 3-methylcrotonoyl-CoA carboxylase: identification of the biotin carboxylase and biotin-carrier domains.

    PubMed Central

    Song, J; Wurtele, E S; Nikolau, B J

    1994-01-01

    Soybean genomic clones were isolated based on hybridization to probes that code for the conserved biotinylation domain of biotin-containing enzymes. The corresponding cDNA was isolated and expressed in Escherichia coli through fusion to the bacterial trpE gene. The resulting chimeric protein was biotinylated in E. coli. Antibodies raised against the chimeric protein reacted specifically with an 85-kDa biotin-containing polypeptide from soybean and inhibited 3-methylcrotonoyl-CoA carboxylase (EC 6.4.1.4) activity in cell-free extracts of soybean leaves. Thus, the isolated soybean gene and corresponding cDNA code for the 85-kDa biotin-containing subunit of 3-methylcrotonoyl-CoA carboxylase. The nucleotide sequence of the cDNA and portions of the genomic clones was determined. Comparison of the deduced amino acid sequence of the biotin-containing subunit of 3-methylcrotonoyl-CoA carboxylase with sequences of other biotin enzymes suggests that this subunit contains the functional domains for the first half-reaction catalyzed by all biotin-dependent carboxylases--namely, the carboxylation of biotin. These domains are arranged serially on the polypeptide, with the biotin carboxylase domain at the amino terminus and the biotin-carboxyl carrier domain at the carboxyl terminus. Images PMID:8016064

  8. Sequence of the intron/exon junctions of the coding region of the human androgen receptor gene and identification of a point mutation in a family with complete androgen insensitivity

    SciTech Connect

    Lubahn, D.B.; Simental, J.A.; Higgs, H.N.; Wilson, E.M.; French, F.S. ); Brown, T.R.; Migeon, C.J. )

    1989-12-01

    Androgens act through a receptor protein (AR) to mediate sex differentiation and development of the male phenotype. The authors have isolated the eight exons in the amino acid coding region of the AR gene from a human X chromosome library. Nucleotide sequences of the AR gene intron/exon boundaries were determined for use in designing synthetic oligonucleotide primers to bracket coding exons for amplification by the polymerase chain reaction. Genomic DNA was amplified from 46, XY phenotypic female siblings with complete androgen insensitivity syndrome. AR binding affinity for dihydrotestosterone in the affected siblings was lower than in normal males, but the binding capacity was normal. Sequence analysis of amplified exons demonstrated within the AR steroid-binding domain (exon G) a single guanine to adenine mutation, resulting in replacement of valine with methionine at amino acid residue 866. As expected, the carrier mother had both normal and mutant AR genes. Thus, a single point mutation in the steroid-binding domain of the AR gene correlated with the expression of an AR protein ineffective in stimulating male sexual development.

  9. Identification of a novel putative non-coding RNA involved in proliferation arrest of a non-small cell lung carcinoma cell line treated with an original chemical substance, methyl-4-methoxy-3-(3-methyl-2-butanoyl) benzoate.

    PubMed

    Jacquot, Catherine; Carbonnelle, Delphine; Tomasoni, Christophe; Papaconstadinou, A; Roussis, Vassilio; Roussakis, Christos

    2004-08-01

    Non-small cell lung cancers remain particularly refractory to current treatments. Thus, characterisation of new molecular targets whose expression during chemotherapy could stop tumour growth, is required. In order to identify these new targets, we applied RT-PCR differential display (RT-PCR-DD) to a non-small cell lung cancer line (NSCLC-N6) treated by an original chemical substance, VT1, capable of arresting the proliferation of NSCLC-N6 cells in G1 phase. This study enabled us to identify a novel RNA, which has a strong homology with a DNA clone (GenBank accession no.: AY166681). This RNA resides in 6p24-p25 within intron 2 of the HEF1 gene, has no apparent open reading frame and may consists of a single large exon. Antisense oligonucleotides indicated that this RNA is involved in the proliferation arrest induced with VT1 treatment in NSCLC-N6 cells. The structure of this novel RNA resembles that of the previous identified extremely long non-coding RNAs which seem to regulate gene expression. Thus, this novel B2 transcript may belong to this new expanding non-coding RNA family. PMID:15254752

  10. Cellulases and coding sequences

    DOEpatents

    Li, Xin-Liang; Ljungdahl, Lars G.; Chen, Huizhong

    2001-01-01

    The present invention provides three fungal cellulases, their coding sequences, recombinant DNA molecules comprising the cellulase coding sequences, recombinant host cells and methods for producing same. The present cellulases are from Orpinomyces PC-2.

  11. Cellulases and coding sequences

    DOEpatents

    Li, Xin-Liang; Ljungdahl, Lars G.; Chen, Huizhong

    2001-02-20

    The present invention provides three fungal cellulases, their coding sequences, recombinant DNA molecules comprising the cellulase coding sequences, recombinant host cells and methods for producing same. The present cellulases are from Orpinomyces PC-2.

  12. Multiple Turbo Codes

    NASA Technical Reports Server (NTRS)

    Divsalar, D.; Pollara, F.

    1995-01-01

    A description is given of multiple turbo codes and a suitable decoder structure derived from an approximation to the maximum a posteriori probability (MAP) decision rule, which is substantially different from the decoder for two-code-based encoders.

  13. QR Code Mania!

    ERIC Educational Resources Information Center

    Shumack, Kellie A.; Reilly, Erin; Chamberlain, Nik

    2013-01-01

    space, has error-correction capacity, and can be read from any direction. These codes are used in manufacturing, shipping, and marketing, as well as in education. QR codes can be created to produce…

  14. On Coding Non-Contiguous Letter Combinations

    PubMed Central

    Dandurand, Frédéric; Grainger, Jonathan; Duñabeitia, Jon Andoni; Granier, Jean-Pierre

    2011-01-01

    Starting from the hypothesis that printed word identification initially involves the parallel mapping of visual features onto location-specific letter identities, we analyze the type of information that would be involved in optimally mapping this location-specific orthographic code onto a location-invariant lexical code. We assume that some intermediate level of coding exists between individual letters and whole words, and that this involves the representation of letter combinations. We then investigate the nature of this intermediate level of coding given the constraints of optimality. This intermediate level of coding is expected to compress data while retaining as much information as possible about word identity. Information conveyed by letters is a function of how much they constrain word identity and how visible they are. Optimization of this coding is a combination of minimizing resources (using the most compact representations) and maximizing information. We show that in a large proportion of cases, non-contiguous letter sequences contain more information than contiguous sequences, while at the same time requiring less precise coding. Moreover, we found that the best predictor of human performance in orthographic priming experiments was within-word ranking of conditional probabilities, rather than average conditional probabilities. We conclude that from an optimality perspective, readers learn to select certain contiguous and non-contiguous letter combinations as information that provides the best cue to word identity. PMID:21734901

  15. STEEP32 computer code

    NASA Technical Reports Server (NTRS)

    Goerke, W. S.

    1972-01-01

    A manual is presented as an aid in using the STEEP32 code. The code is the EXEC 8 version of the STEEP code (STEEP is an acronym for shock two-dimensional Eulerian elastic plastic). The major steps in a STEEP32 run are illustrated in a sample problem. There is a detailed discussion of the internal organization of the code, including a description of each subroutine.

  16. 48 CFR 204.7206 - Using CAGE codes to identify agents and brokers.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Using CAGE codes to... 204.7206 Using CAGE codes to identify agents and brokers. Authorized agents and brokers are entities and, as such, may be assigned CAGE codes for identification and processing purposes. (a) A single...

  17. 48 CFR 204.7206 - Using CAGE codes to identify agents and brokers.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Using CAGE codes to... 204.7206 Using CAGE codes to identify agents and brokers. Authorized agents and brokers are entities and, as such, may be assigned CAGE codes for identification and processing purposes. (a) A single...

  18. 48 CFR 204.7206 - Using CAGE codes to identify agents and brokers.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Using CAGE codes to... 204.7206 Using CAGE codes to identify agents and brokers. Authorized agents and brokers are entities and, as such, may be assigned CAGE codes for identification and processing purposes. (a) A single...

  19. 48 CFR 204.7206 - Using CAGE codes to identify agents and brokers.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Using CAGE codes to... 204.7206 Using CAGE codes to identify agents and brokers. Authorized agents and brokers are entities and, as such, may be assigned CAGE codes for identification and processing purposes. (a) A single...

  20. 48 CFR 204.7206 - Using CAGE codes to identify agents and brokers.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Using CAGE codes to... 204.7206 Using CAGE codes to identify agents and brokers. Authorized agents and brokers are entities and, as such, may be assigned CAGE codes for identification and processing purposes. (a) A single...

  1. Software Certification - Coding, Code, and Coders

    NASA Technical Reports Server (NTRS)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  2. Emphasis: Identification.

    ERIC Educational Resources Information Center

    Clyne, Roger

    A potential program for dealing with the identification of kindergarteners with potential learning disabilities is discussed. The subject is dealt with on the level of prediction. It is pointed out that as children learn in different ways, different methods of educating them must be devised. Early identification of disabilities lessens the chances…

  3. XSOR codes users manual

    SciTech Connect

    Jow, Hong-Nian; Murfin, W.B.; Johnson, J.D.

    1993-11-01

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ``XSOR``. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms.

  4. DLLExternalCode

    SciTech Connect

    Greg Flach, Frank Smith

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  5. DLLExternalCode

    Energy Science and Technology Software Center (ESTSC)

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read frommore » files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.« less

  6. Multifractal detrended cross-correlation analysis of coding and non-coding DNA sequences through chaos-game representation

    NASA Astrophysics Data System (ADS)

    Pal, Mayukha; Satish, B.; Srinivas, K.; Rao, P. Madhusudana; Manimaran, P.

    2015-10-01

    We propose a new approach combining the chaos game representation and the two dimensional multifractal detrended cross correlation analysis methods to examine multifractal behavior in power law cross correlation between any pair of nucleotide sequences of unequal lengths. In this work, we analyzed the characteristic behavior of coding and non-coding DNA sequences of eight prokaryotes. The results show the presence of strong multifractal nature between coding and non-coding sequences of all data sets. We found that this integrative approach helps us to consider complete DNA sequences for characterization, and further it may be useful for classification, clustering, identification of class affiliation of nucleotide sequences etc. with high precision.

  7. Application of isotope coded affinity tag (ICAT) analysis for the identification of differentially expressed proteins following infection of atlantic salmon (Salmo salar) with infectious hematopoietic necrosis virus (IHNV) or Renibacterium salmoninarum (BKD).

    PubMed

    Booy, A T; Haddow, J D; Ohlund, L B; Hardie, D B; Olafson, R W

    2005-01-01

    Aquaculture and commercial fisheries worldwide suffer from significant economic loss due to diseases of net-pen reared fish. In British Columbia, infectious hematopoietic necrosis (IHN) and bacterial kidney disease (BKD) epidemics occur because there are currently no commercially available drugs or fully licensed vaccines to treat these diseases. With a better understanding of the molecular mechanisms underlying these diseases, this circumstance might be significantly improved. In the present study, we have used a proteomics approach in an effort to identify and quantitate differentially expressed proteins in the liver and kidneys of diseased and healthy Atlantic salmon (Salmo salar). Isotope coded affinity tagging (ICAT), 2D gel electrophoresis, and multidimensional liquid chromatography coupled to tandem mass spectrometry (2D-LC MS/MS) were used to identify hundreds of differentially expressed proteins. While the direct significance of changes in expression levels of many proteins remains to be elucidated, others appear to be more clearly related to the infectious process. Examples of the latter are discussed here and include, a natural killer cell enhancement factor (NKEF), procathepsin L, superoxide-producing NADPH oxidase and interferon-induced viral resistance protein Mx (IFI-Mx). PMID:15822907

  8. Adaptive entropy coded subband coding of images.

    PubMed

    Kim, Y H; Modestino, J W

    1992-01-01

    The authors describe a design approach, called 2-D entropy-constrained subband coding (ECSBC), based upon recently developed 2-D entropy-constrained vector quantization (ECVQ) schemes. The output indexes of the embedded quantizers are further compressed by use of noiseless entropy coding schemes, such as Huffman or arithmetic codes, resulting in variable-rate outputs. Depending upon the specific configurations of the ECVQ and the ECPVQ over the subbands, many different types of SBC schemes can be derived within the generic 2-D ECSBC framework. Among these, the authors concentrate on three representative types of 2-D ECSBC schemes and provide relative performance evaluations. They also describe an adaptive buffer instrumented version of 2-D ECSBC, called 2-D ECSBC/AEC, for use with fixed-rate channels which completely eliminates buffer overflow/underflow problems. This adaptive scheme achieves performance quite close to the corresponding ideal 2-D ECSBC system. PMID:18296138

  9. Automated Hardware-Identification System

    NASA Technical Reports Server (NTRS)

    Schramm, Harry F., Jr.; Roxby, Donald L.

    1995-01-01

    "Compressed symbology" emerging technology involving one- and two-dimensional arrays of surface depressions to form optically readable dots. Patterns more durable and denser than common bar codes. Convey identification data in binary form and read by optoelectric sensors. Computers and compressed-symbology engraving machines they control constitute subsystems of "paperless" hardware-tracking and -identification systems coordinating flows of both identifying information and identified parts themselves, along with ancillary information like work orders. Modifications of software expected to accelerate marking operations, eliminate need for trial or practice marking, and reduce incidence of errors.

  10. Generating code adapted for interlinking legacy scalar code and extended vector code

    DOEpatents

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  11. Mechanical code comparator

    DOEpatents

    Peter, Frank J.; Dalton, Larry J.; Plummer, David W.

    2002-01-01

    A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

  12. Theory of epigenetic coding.

    PubMed

    Elder, D

    1984-06-01

    The logic of genetic control of development may be based on a binary epigenetic code. This paper revises the author's previous scheme dealing with the numerology of annelid metamerism in these terms. Certain features of the code had been deduced to be combinatorial, others not. This paradoxical contrast is resolved here by the interpretation that these features relate to different operations of the code; the combinatiorial to coding identity of units, the non-combinatorial to coding production of units. Consideration of a second paradox in the theory of epigenetic coding leads to a new solution which further provides a basis for epimorphic regeneration, and may in particular throw light on the "regeneration-duplication" phenomenon. A possible test of the model is also put forward. PMID:6748695

  13. Updating the Read Codes

    PubMed Central

    Robinson, David; Comp, Dip; Schulz, Erich; Brown, Philip; Price, Colin

    1997-01-01

    Abstract The Read Codes are a hierarchically-arranged controlled clinical vocabulary introduced in the early 1980s and now consisting of three maintained versions of differing complexity. The code sets are dynamic, and are updated quarterly in response to requests from users including clinicians in both primary and secondary care, software suppliers, and advice from a network of specialist healthcare professionals. The codes' continual evolution of content, both across and within versions, highlights tensions between different users and uses of coded clinical data. Internal processes, external interactions and new structural features implemented by the NHS Centre for Coding and Classification (NHSCCC) for user interactive maintenance of the Read Codes are described, and over 2000 items of user feedback episodes received over a 15-month period are analysed. PMID:9391934

  14. Doubled Color Codes

    NASA Astrophysics Data System (ADS)

    Bravyi, Sergey

    Combining protection from noise and computational universality is one of the biggest challenges in the fault-tolerant quantum computing. Topological stabilizer codes such as the 2D surface code can tolerate a high level of noise but implementing logical gates, especially non-Clifford ones, requires a prohibitively large overhead due to the need of state distillation. In this talk I will describe a new family of 2D quantum error correcting codes that enable a transversal implementation of all logical gates required for the universal quantum computing. Transversal logical gates (TLG) are encoded operations that can be realized by applying some single-qubit rotation to each physical qubit. TLG are highly desirable since they introduce no overhead and do not spread errors. It has been known before that a quantum code can have only a finite number of TLGs which rules out computational universality. Our scheme circumvents this no-go result by combining TLGs of two different quantum codes using the gauge-fixing method pioneered by Paetznick and Reichardt. The first code, closely related to the 2D color code, enables a transversal implementation of all single-qubit Clifford gates such as the Hadamard gate and the π / 2 phase shift. The second code that we call a doubled color code provides a transversal T-gate, where T is the π / 4 phase shift. The Clifford+T gate set is known to be computationally universal. The two codes can be laid out on the honeycomb lattice with two qubits per site such that the code conversion requires parity measurements for six-qubit Pauli operators supported on faces of the lattice. I will also describe numerical simulations of logical Clifford+T circuits encoded by the distance-3 doubled color code. Based on a joint work with Andrew Cross.

  15. Bar Code Labels

    NASA Technical Reports Server (NTRS)

    1988-01-01

    American Bar Codes, Inc. developed special bar code labels for inventory control of space shuttle parts and other space system components. ABC labels are made in a company-developed anodizing aluminum process and consecutively marketed with bar code symbology and human readable numbers. They offer extreme abrasion resistance and indefinite resistance to ultraviolet radiation, capable of withstanding 700 degree temperatures without deterioration and up to 1400 degrees with special designs. They offer high resistance to salt spray, cleaning fluids and mild acids. ABC is now producing these bar code labels commercially or industrial customers who also need labels to resist harsh environments.

  16. MORSE Monte Carlo code

    SciTech Connect

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described.

  17. Tokamak Systems Code

    SciTech Connect

    Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.

  18. FAA Smoke Transport Code

    SciTech Connect

    Domino, Stefan; Luketa-Hanlin, Anay; Gallegos, Carlos

    2006-10-27

    FAA Smoke Transport Code, a physics-based Computational Fluid Dynamics tool, which couples heat, mass, and momentum transfer, has been developed to provide information on smoke transport in cargo compartments with various geometries and flight conditions. The software package contains a graphical user interface for specification of geometry and boundary conditions, analysis module for solving the governing equations, and a post-processing tool. The current code was produced by making substantial improvements and additions to a code obtained from a university. The original code was able to compute steady, uniform, isothermal turbulent pressurization. In addition, a preprocessor and postprocessor were added to arrive at the current software package.

  19. Expander chunked codes

    NASA Astrophysics Data System (ADS)

    Tang, Bin; Yang, Shenghao; Ye, Baoliu; Yin, Yitong; Lu, Sanglu

    2015-12-01

    Chunked codes are efficient random linear network coding (RLNC) schemes with low computational cost, where the input packets are encoded into small chunks (i.e., subsets of the coded packets). During the network transmission, RLNC is performed within each chunk. In this paper, we first introduce a simple transfer matrix model to characterize the transmission of chunks and derive some basic properties of the model to facilitate the performance analysis. We then focus on the design of overlapped chunked codes, a class of chunked codes whose chunks are non-disjoint subsets of input packets, which are of special interest since they can be encoded with negligible computational cost and in a causal fashion. We propose expander chunked (EC) codes, the first class of overlapped chunked codes that have an analyzable performance, where the construction of the chunks makes use of regular graphs. Numerical and simulation results show that in some practical settings, EC codes can achieve rates within 91 to 97 % of the optimum and outperform the state-of-the-art overlapped chunked codes significantly.

  20. Improved fundamental frequency coding in cochlear implant signal processing.

    PubMed

    Milczynski, Matthias; Wouters, Jan; van Wieringen, Astrid

    2009-04-01

    A new signal processing algorithm for improved pitch perception in cochlear implants is proposed. The algorithm realizes fundamental frequency (F0) coding by explicitly modulating the amplitude of the electrical stimulus. The proposed processing scheme is compared with the standard advanced combination encoder strategy in psychophysical music perception related tasks. Possible filter-bank and loudness cues between the strategies under study were minimized to predominantly focus on differences in temporal processing. The results demonstrate significant benefits provided by the new coding strategy for pitch ranking, melodic contour identification, and familiar melody identification. PMID:19354401

  1. Research on Universal Combinatorial Coding

    PubMed Central

    Lu, Jun; Zhang, Zhuo; Mo, Juan

    2014-01-01

    The conception of universal combinatorial coding is proposed. Relations exist more or less in many coding methods. It means that a kind of universal coding method is objectively existent. It can be a bridge connecting many coding methods. Universal combinatorial coding is lossless and it is based on the combinatorics theory. The combinational and exhaustive property make it closely related with the existing code methods. Universal combinatorial coding does not depend on the probability statistic characteristic of information source, and it has the characteristics across three coding branches. It has analyzed the relationship between the universal combinatorial coding and the variety of coding method and has researched many applications technologies of this coding method. In addition, the efficiency of universal combinatorial coding is analyzed theoretically. The multicharacteristic and multiapplication of universal combinatorial coding are unique in the existing coding methods. Universal combinatorial coding has theoretical research and practical application value. PMID:24772019

  2. Research on universal combinatorial coding.

    PubMed

    Lu, Jun; Zhang, Zhuo; Mo, Juan

    2014-01-01

    The conception of universal combinatorial coding is proposed. Relations exist more or less in many coding methods. It means that a kind of universal coding method is objectively existent. It can be a bridge connecting many coding methods. Universal combinatorial coding is lossless and it is based on the combinatorics theory. The combinational and exhaustive property make it closely related with the existing code methods. Universal combinatorial coding does not depend on the probability statistic characteristic of information source, and it has the characteristics across three coding branches. It has analyzed the relationship between the universal combinatorial coding and the variety of coding method and has researched many applications technologies of this coding method. In addition, the efficiency of universal combinatorial coding is analyzed theoretically. The multicharacteristic and multiapplication of universal combinatorial coding are unique in the existing coding methods. Universal combinatorial coding has theoretical research and practical application value. PMID:24772019

  3. Combined identification of long non-coding RNA XIST and HIF1A-AS1 in serum as an effective screening for non-small cell lung cancer

    PubMed Central

    Tantai, Jicheng; Hu, Dingzhong; Yang, Yu; Geng, Junfeng

    2015-01-01

    Objective: Long non-coding RNAs (lncRNAs) XIST and HIF1A-AS1 have been shown to play important regulatory roles in cancer biology, and lncRNA-XIST and HIF1A-AS1 are upregulated in several cancers such as glioblastoma, breast cancer and thoracoabdominal aorta aneurysm, however, its value in the diagnosis of non-small cell lung cancer (NSCLC) is unclear. The aim of this study is to evaluate the clinical significance of serum XIST and HIF1A-AS1 as a biomarker in the screening of NSCLC. Methods: Expression levels of lncRNA-XIST and HIF1A-AS1 in tumor tissues and serum from NSCLC patients were evaluated by quantitative real-time PCR, and its association with overall survival of patients was analyzed by statistical analysis. Moreover, the XIST and lncRNA-XIST expression correlation between tumor tissues and plasma was demonstrated by linear regression analysis. Results: The levels of XIST (P < 0.05) and HIF1A-AS1 (P < 0.05) were significantly increased in tumor tissues or serum from NSCLC patients as compared to those of control group. Correlation of lncRNA-XIST or HIF1A-AS1 expression between tumor tissues and serum from the same individuals was confirmed in NSCLC patients. Moreover, serum levels of XIST and HIF1A-AS1 were significantly decreased after surgical treatment as compared to pre-operative. The ROC curves illustrated strong separation between the NSCLC patients and control group, with an AUC of 0.834 (95% CI: 0.726-0.935; P < 0.001) for XIST and 0.876 (95% CI: 0.793-0.965; P < 0.001) for HIF1A-AS1, however, the combination of XIST and HIF1A-AS1 yielded an AUC of 0.931 (95% CI: 0.869-0.990; P < 0.001), which was significantly improved as compared to XIST or HIF1A-AS1 alone. Conclusion: Our results demonstrated that increased serum XIST and HIF1A-AS1 could be used as a predictive biomarker for NSCLC screening, and that combination of XIST and HIF1A-AS1 had a higher positive diagnostic efficiency of NSCLC than XIST or HIF1A-AS1 alone. PMID:26339353

  4. Fast Coding Unit Encoding Mechanism for Low Complexity Video Coding

    PubMed Central

    Wu, Yueying; Jia, Kebin; Gao, Guandong

    2016-01-01

    In high efficiency video coding (HEVC), coding tree contributes to excellent compression performance. However, coding tree brings extremely high computational complexity. Innovative works for improving coding tree to further reduce encoding time are stated in this paper. A novel low complexity coding tree mechanism is proposed for HEVC fast coding unit (CU) encoding. Firstly, this paper makes an in-depth study of the relationship among CU distribution, quantization parameter (QP) and content change (CC). Secondly, a CU coding tree probability model is proposed for modeling and predicting CU distribution. Eventually, a CU coding tree probability update is proposed, aiming to address probabilistic model distortion problems caused by CC. Experimental results show that the proposed low complexity CU coding tree mechanism significantly reduces encoding time by 27% for lossy coding and 42% for visually lossless coding and lossless coding. The proposed low complexity CU coding tree mechanism devotes to improving coding performance under various application conditions. PMID:26999741

  5. Synthesizing Certified Code

    NASA Technical Reports Server (NTRS)

    Whalen, Michael; Schumann, Johann; Fischer, Bernd

    2002-01-01

    Code certification is a lightweight approach to demonstrate software quality on a formal level. Its basic idea is to require producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates which can be checked independently. Since code certification uses the same underlying technology as program verification, it also requires many detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding theses annotations to the code is time-consuming and error-prone. We address this problem by combining code certification with automatic program synthesis. We propose an approach to generate simultaneously, from a high-level specification, code and all annotations required to certify generated code. Here, we describe a certification extension of AUTOBAYES, a synthesis tool which automatically generates complex data analysis programs from compact specifications. AUTOBAYES contains sufficient high-level domain knowledge to generate detailed annotations. This allows us to use a general-purpose verification condition generator to produce a set of proof obligations in first-order logic. The obligations are then discharged using the automated theorem E-SETHEO. We demonstrate our approach by certifying operator safety for a generated iterative data classification program without manual annotation of the code.

  6. Lichenase and coding sequences

    DOEpatents

    Li, Xin-Liang; Ljungdahl, Lars G.; Chen, Huizhong

    2000-08-15

    The present invention provides a fungal lichenase, i.e., an endo-1,3-1,4-.beta.-D-glucanohydrolase, its coding sequence, recombinant DNA molecules comprising the lichenase coding sequences, recombinant host cells and methods for producing same. The present lichenase is from Orpinomyces PC-2.

  7. Codes of Conduct

    ERIC Educational Resources Information Center

    Million, June

    2004-01-01

    Most schools have a code of conduct, pledge, or behavioral standards, set by the district or school board with the school community. In this article, the author features some schools that created a new vision of instilling code of conducts to students based on work quality, respect, safety and courtesy. She suggests that communicating the code…

  8. Code of Ethics

    ERIC Educational Resources Information Center

    Division for Early Childhood, Council for Exceptional Children, 2009

    2009-01-01

    The Code of Ethics of the Division for Early Childhood (DEC) of the Council for Exceptional Children is a public statement of principles and practice guidelines supported by the mission of DEC. The foundation of this Code is based on sound ethical reasoning related to professional practice with young children with disabilities and their families…

  9. Legacy Code Modernization

    NASA Technical Reports Server (NTRS)

    Hribar, Michelle R.; Frumkin, Michael; Jin, Haoqiang; Waheed, Abdul; Yan, Jerry; Saini, Subhash (Technical Monitor)

    1998-01-01

    Over the past decade, high performance computing has evolved rapidly; systems based on commodity microprocessors have been introduced in quick succession from at least seven vendors/families. Porting codes to every new architecture is a difficult problem; in particular, here at NASA, there are many large CFD applications that are very costly to port to new machines by hand. The LCM ("Legacy Code Modernization") Project is the development of an integrated parallelization environment (IPE) which performs the automated mapping of legacy CFD (Fortran) applications to state-of-the-art high performance computers. While most projects to port codes focus on the parallelization of the code, we consider porting to be an iterative process consisting of several steps: 1) code cleanup, 2) serial optimization,3) parallelization, 4) performance monitoring and visualization, 5) intelligent tools for automated tuning using performance prediction and 6) machine specific optimization. The approach for building this parallelization environment is to build the components for each of the steps simultaneously and then integrate them together. The demonstration will exhibit our latest research in building this environment: 1. Parallelizing tools and compiler evaluation. 2. Code cleanup and serial optimization using automated scripts 3. Development of a code generator for performance prediction 4. Automated partitioning 5. Automated insertion of directives. These demonstrations will exhibit the effectiveness of an automated approach for all the steps involved with porting and tuning a legacy code application for a new architecture.

  10. Modified JPEG Huffman coding.

    PubMed

    Lakhani, Gopal

    2003-01-01

    It is a well observed characteristic that when a DCT block is traversed in the zigzag order, the AC coefficients generally decrease in size and the run-length of zero coefficients increase in number. This article presents a minor modification to the Huffman coding of the JPEG baseline compression algorithm to exploit this redundancy. For this purpose, DCT blocks are divided into bands so that each band can be coded using a separate code table. Three implementations are presented, which all move the end-of-block marker up in the middle of DCT block and use it to indicate the band boundaries. Experimental results are presented to compare reduction in the code size obtained by our methods with the JPEG sequential-mode Huffman coding and arithmetic coding methods. The average code reduction to the total image code size of one of our methods is 4%. Our methods can also be used for progressive image transmission and hence, experimental results are also given to compare them with two-, three-, and four-band implementations of the JPEG spectral selection method. PMID:18237897

  11. Binary concatenated coding system

    NASA Technical Reports Server (NTRS)

    Monford, L. G., Jr.

    1973-01-01

    Coding, using 3-bit binary words, is applicable to any measurement having integer scale up to 100. System using 6-bit data words can be expanded to read from 1 to 10,000, and 9-bit data words can increase range to 1,000,000. Code may be ''read'' directly by observation after memorizing simple listing of 9's and 10's.

  12. Computerized mega code recording.

    PubMed

    Burt, T W; Bock, H C

    1988-04-01

    A system has been developed to facilitate recording of advanced cardiac life support mega code testing scenarios. By scanning a paper "keyboard" using a bar code wand attached to a portable microcomputer, the person assigned to record the scenario can easily generate an accurate, complete, timed, and typewritten record of the given situations and the obtained responses. PMID:3354937

  13. Coding for optical channels

    NASA Technical Reports Server (NTRS)

    Baumert, L. D.; Mceliece, R. J.; Rumsey, H., Jr.

    1979-01-01

    In a previous paper Pierce considered the problem of optical communication from a novel viewpoint, and concluded that performance will likely be limited by issues of coding complexity rather than by thermal noise. This paper reviews the model proposed by Pierce and presents some results on the analysis and design of codes for this application.

  14. Combustion chamber analysis code

    NASA Technical Reports Server (NTRS)

    Przekwas, A. J.; Lai, Y. G.; Krishnan, A.; Avva, R. K.; Giridharan, M. G.

    1993-01-01

    A three-dimensional, time dependent, Favre averaged, finite volume Navier-Stokes code has been developed to model compressible and incompressible flows (with and without chemical reactions) in liquid rocket engines. The code has a non-staggered formulation with generalized body-fitted-coordinates (BFC) capability. Higher order differencing methodologies such as MUSCL and Osher-Chakravarthy schemes are available. Turbulent flows can be modeled using any of the five turbulent models present in the code. A two-phase, two-liquid, Lagrangian spray model has been incorporated into the code. Chemical equilibrium and finite rate reaction models are available to model chemically reacting flows. The discrete ordinate method is used to model effects of thermal radiation. The code has been validated extensively against benchmark experimental data and has been applied to model flows in several propulsion system components of the SSME and the STME.

  15. Energy Conservation Code Decoded

    SciTech Connect

    Cole, Pam C.; Taylor, Zachary T.

    2006-09-01

    Designing an energy-efficient, affordable, and comfortable home is a lot easier thanks to a slime, easier to read booklet, the 2006 International Energy Conservation Code (IECC), published in March 2006. States, counties, and cities have begun reviewing the new code as a potential upgrade to their existing codes. Maintained under the public consensus process of the International Code Council, the IECC is designed to do just what its title says: promote the design and construction of energy-efficient homes and commercial buildings. Homes in this case means traditional single-family homes, duplexes, condominiums, and apartment buildings having three or fewer stories. The U.S. Department of Energy, which played a key role in proposing the changes that resulted in the new code, is offering a free training course that covers the residential provisions of the 2006 IECC.

  16. Astrophysics Source Code Library

    NASA Astrophysics Data System (ADS)

    Allen, A.; DuPrie, K.; Berriman, B.; Hanisch, R. J.; Mink, J.; Teuben, P. J.

    2013-10-01

    The Astrophysics Source Code Library (ASCL), founded in 1999, is a free on-line registry for source codes of interest to astronomers and astrophysicists. The library is housed on the discussion forum for Astronomy Picture of the Day (APOD) and can be accessed at http://ascl.net. The ASCL has a comprehensive listing that covers a significant number of the astrophysics source codes used to generate results published in or submitted to refereed journals and continues to grow. The ASCL currently has entries for over 500 codes; its records are citable and are indexed by ADS. The editors of the ASCL and members of its Advisory Committee were on hand at a demonstration table in the ADASS poster room to present the ASCL, accept code submissions, show how the ASCL is starting to be used by the astrophysics community, and take questions on and suggestions for improving the resource.

  17. Signal trend identification with fuzzy methods.

    SciTech Connect

    Reifman, J.; Tsoukalas, L. H.; Wang, X.; Wei, T. Y. C.

    1999-08-19

    A fuzzy-logic-based methodology for on-line signal trend identification is introduced. Although signal trend identification is complicated by the presence of noise, fuzzy logic can help capture important features of on-line signals and classify incoming power plant signals into increasing, decreasing and steady-state trend categories. In order to verify the methodology, a code named PROTREN is developed and tested using plant data. The results indicate that the code is capable of detecting transients accurately, identifying trends reliably, and not misinterpreting a steady-state signal as a transient one.

  18. JUPITER PROJECT - JOINT UNIVERSAL PARAMETER IDENTIFICATION AND EVALUATION OF RELIABILITY

    EPA Science Inventory

    The JUPITER (Joint Universal Parameter IdenTification and Evaluation of Reliability) project builds on the technology of two widely used codes for sensitivity analysis, data assessment, calibration, and uncertainty analysis of environmental models: PEST and UCODE.

  19. MININEC: A mini-numerical electromagnetics code

    NASA Astrophysics Data System (ADS)

    Julian, A. J.; Logan, J. C.; Rockway, J. W.

    1982-09-01

    An investigation of the merits of techniques that may result in a reduced version of an antenna modeling code applicable to small problems and small computer resources. The result is the identification of one promising numerical approach suggested by Dr DR Wilton of the University of Mississippi. The approach has been coded in BASIC and implemented on a microcomputer. The computer code has been dubbed MININEC (Mini-Numerical Electromagnetics Code). MININEC solves an integral equation relating the electric field and the vector and scalar potentials. The solution involves a modified Galerkin procedure. This formulation results in a compact code suitable for use on a microcomputer. MININEC solves for the impedance and currents on arbitrarily oriented wires including configurations with multiple junctions. Options include lumped impedance loading and far field patterns. MININEC has been written in the BASIC language compatible with many popular microcomputers. MININEC has been implemented on the NOSC Univac 1100/82, the NOSC VAX, a CDI microcomputer, and an Apple microcomputer.

  20. Bar code usage in nuclear materials accountability

    SciTech Connect

    Mee, W.T.

    1983-07-01

    The age old method of physically taking an inventory of materials by listing each item's identification number has lived beyond its usefulness. In this age of computerization, which offers the local grocery store a quick, sure, and easy means to inventory, it is time for nuclear materials facilities to automate accountability activities. The Oak Ridge Y-12 Plant began investigating the use of automated data collection devices in 1979. At that time, bar code and optical-character-recognition (OCR) systems were reviewed with the purpose of directly entering data into DYMCAS (Dynamic Special Nuclear Materials Control and Accountability System). Both of these systems appeared applicable; however, other automated devices already employed for production control made implementing the bar code and OCR seem improbable. However, the DYMCAS was placed on line for nuclear material accountability, a decision was made to consider the bar code for physical inventory listings. For the past several months a development program has been underway to use a bar code device to collect and input data to the DYMCAS on the uranium recovery operations. Programs have been completed and tested, and are being employed to ensure that data will be compatible and useful. Bar code implementation and expansion of its use for all nuclear material inventory activity in Y-12 is presented.

  1. Optimizing ATLAS code with different profilers

    NASA Astrophysics Data System (ADS)

    Kama, S.; Seuster, R.; Stewart, G. A.; Vitillo, R. A.

    2014-06-01

    After the current maintenance period, the LHC will provide higher energy collisions with increased luminosity. In order to keep up with these higher rates, ATLAS software needs to speed up substantially. However, ATLAS code is composed of approximately 6M lines, written by many different programmers with different backgrounds, which makes code optimisation a challenge. To help with this effort different profiling tools and techniques are being used. These include well known tools, such as the Valgrind suite and Intel Amplifier; less common tools like Pin, PAPI, and GOoDA; as well as techniques such as library interposing. In this paper we will mainly focus on Pin tools and GOoDA. Pin is a dynamic binary instrumentation tool which can obtain statistics such as call counts, instruction counts and interrogate functions' arguments. It has been used to obtain CLHEP Matrix profiles, operations and vector sizes for linear algebra calculations which has provided the insight necessary to achieve significant performance improvements. Complimenting this, GOoDA, an in-house performance tool built in collaboration with Google, which is based on hardware performance monitoring unit events, is used to identify hot-spots in the code for different types of hardware limitations, such as CPU resources, caches, or memory bandwidth. GOoDA has been used in improvement of the performance of new magnetic field code and identification of potential vectorization targets in several places, such as Runge-Kutta propagation code.

  2. Quantum convolutional codes derived from constacyclic codes

    NASA Astrophysics Data System (ADS)

    Yan, Tingsu; Huang, Xinmei; Tang, Yuansheng

    2014-12-01

    In this paper, three families of quantum convolutional codes are constructed. The first one and the second one can be regarded as a generalization of Theorems 3, 4, 7 and 8 [J. Chen, J. Li, F. Yang and Y. Huang, Int. J. Theor. Phys., doi:10.1007/s10773-014-2214-6 (2014)], in the sense that we drop the constraint q ≡ 1 (mod 4). Furthermore, the second one and the third one attain the quantum generalized Singleton bound.

  3. Huffman coding in advanced audio coding standard

    NASA Astrophysics Data System (ADS)

    Brzuchalski, Grzegorz

    2012-05-01

    This article presents several hardware architectures of Advanced Audio Coding (AAC) Huffman noiseless encoder, its optimisations and working implementation. Much attention has been paid to optimise the demand of hardware resources especially memory size. The aim of design was to get as short binary stream as possible in this standard. The Huffman encoder with whole audio-video system has been implemented in FPGA devices.

  4. Coded aperture computed tomography

    NASA Astrophysics Data System (ADS)

    Choi, Kerkil; Brady, David J.

    2009-08-01

    Diverse physical measurements can be modeled by X-ray transforms. While X-ray tomography is the canonical example, reference structure tomography (RST) and coded aperture snapshot spectral imaging (CASSI) are examples of physically unrelated but mathematically equivalent sensor systems. Historically, most x-ray transform based systems sample continuous distributions and apply analytical inversion processes. On the other hand, RST and CASSI generate discrete multiplexed measurements implemented with coded apertures. This multiplexing of coded measurements allows for compression of measurements from a compressed sensing perspective. Compressed sensing (CS) is a revelation that if the object has a sparse representation in some basis, then a certain number, but typically much less than what is prescribed by Shannon's sampling rate, of random projections captures enough information for a highly accurate reconstruction of the object. This paper investigates the role of coded apertures in x-ray transform measurement systems (XTMs) in terms of data efficiency and reconstruction fidelity from a CS perspective. To conduct this, we construct a unified analysis using RST and CASSI measurement models. Also, we propose a novel compressive x-ray tomography measurement scheme which also exploits coding and multiplexing, and hence shares the analysis of the other two XTMs. Using this analysis, we perform a qualitative study on how coded apertures can be exploited to implement physical random projections by "regularizing" the measurement systems. Numerical studies and simulation results demonstrate several examples of the impact of coding.

  5. Report number codes

    SciTech Connect

    Nelson, R.N.

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  6. System identification

    NASA Astrophysics Data System (ADS)

    Juang, Jer-Nan

    Major issues in system identification are summarized and recent advances are reviewed. Modal testing and system identification used in control theory are examined, and the mathematical relationships and conversions of the models appropriate to modal testing and those appropriate to modern control design methods are discussed. The importance of obtaining input and output matrices in modal testing is emphasized, and the changes that may be needed in modal testing procedures to meet the needs of the control system designer are addressed. Directions for future research are considered.

  7. TRANSF code user manual

    SciTech Connect

    Weaver, H.J.

    1981-11-01

    The TRANSF code is a semi-interactive FORTRAN IV program which is designed to calculate the model parameters of a (structural) system by performing a least square parameter fit to measured transfer function data. The code is available at LLNL on both the 7600 and the Cray machines. The transfer function data to be fit is read into the code via a disk file. The primary mode of output is FR80 graphics, although, it is also possible to have results written to either the TTY or to a disk file.

  8. Signal Prediction With Input Identification

    NASA Technical Reports Server (NTRS)

    Juang, Jer-Nan; Chen, Ya-Chin

    1999-01-01

    A novel coding technique is presented for signal prediction with applications including speech coding, system identification, and estimation of input excitation. The approach is based on the blind equalization method for speech signal processing in conjunction with the geometric subspace projection theory to formulate the basic prediction equation. The speech-coding problem is often divided into two parts, a linear prediction model and excitation input. The parameter coefficients of the linear predictor and the input excitation are solved simultaneously and recursively by a conventional recursive least-squares algorithm. The excitation input is computed by coding all possible outcomes into a binary codebook. The coefficients of the linear predictor and excitation, and the index of the codebook can then be used to represent the signal. In addition, a variable-frame concept is proposed to block the same excitation signal in sequence in order to reduce the storage size and increase the transmission rate. The results of this work can be easily extended to the problem of disturbance identification. The basic principles are outlined in this report and differences from other existing methods are discussed. Simulations are included to demonstrate the proposed method.

  9. FORTRAN code-evaluation system

    NASA Technical Reports Server (NTRS)

    Capps, J. D.; Kleir, R.

    1977-01-01

    Automated code evaluation system can be used to detect coding errors and unsound coding practices in any ANSI FORTRAN IV source code before they can cause execution-time malfunctions. System concentrates on acceptable FORTRAN code features which are likely to produce undesirable results.

  10. FAST2 Code validation

    SciTech Connect

    Wilson, R.E.; Freeman, L.N.; Walker, S.N.

    1995-09-01

    The FAST2 Code which is capable of determining structural loads of a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data at two wind speeds for the ESI-80 are given. The FAST2 Code models a two-bladed HAWT with degrees of freedom for blade flap, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffness, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms and azimuth averaged bin plots. It is concluded that agreement between the FAST2 Code and test results is good.

  11. Compressible Astrophysics Simulation Code

    Energy Science and Technology Software Center (ESTSC)

    2007-07-18

    This is an astrophysics simulation code involving a radiation diffusion module developed at LLNL coupled to compressible hydrodynamics and adaptive mesh infrastructure developed at LBNL. One intended application is to neutrino diffusion in core collapse supernovae.

  12. Genotypic Identification

    Technology Transfer Automated Retrieval System (TEKTRAN)

    In comparison with traditional, phenotype-based procedures for detection and identification of foodborne pathogen Listeria monocytogenes, molecular techniques are superior in terms of sensitivity, specificity and speed. This chapter provides a comprehensive review on the use of molecular methods for...

  13. Seals Flow Code Development

    NASA Technical Reports Server (NTRS)

    1991-01-01

    In recognition of a deficiency in the current modeling capability for seals, an effort was established by NASA to develop verified computational fluid dynamic concepts, codes, and analyses for seals. The objectives were to develop advanced concepts for the design and analysis of seals, to effectively disseminate the information to potential users by way of annual workshops, and to provide experimental verification for the models and codes under a wide range of operating conditions.

  14. Robust Nonlinear Neural Codes

    NASA Astrophysics Data System (ADS)

    Yang, Qianli; Pitkow, Xaq

    2015-03-01

    Most interesting natural sensory stimuli are encoded in the brain in a form that can only be decoded nonlinearly. But despite being a core function of the brain, nonlinear population codes are rarely studied and poorly understood. Interestingly, the few existing models of nonlinear codes are inconsistent with known architectural features of the brain. In particular, these codes have information content that scales with the size of the cortical population, even if that violates the data processing inequality by exceeding the amount of information entering the sensory system. Here we provide a valid theory of nonlinear population codes by generalizing recent work on information-limiting correlations in linear population codes. Although these generalized, nonlinear information-limiting correlations bound the performance of any decoder, they also make decoding more robust to suboptimal computation, allowing many suboptimal decoders to achieve nearly the same efficiency as an optimal decoder. Although these correlations are extremely difficult to measure directly, particularly for nonlinear codes, we provide a simple, practical test by which one can use choice-related activity in small populations of neurons to determine whether decoding is suboptimal or optimal and limited by correlated noise. We conclude by describing an example computation in the vestibular system where this theory applies. QY and XP was supported by a grant from the McNair foundation.

  15. 48 CFR 204.7005 - Assignment of order codes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Identification Numbers 204.7005 Assignment of order codes. (a) The Defense Logistics Agency, Acquisition Policy...-1000 Air Force: SAF/AQCI, 1060 Air Force Pentagon, Washington, DC 20330-1060 Defense Logistics Agency: Defense Logistics Agency, Acquisition Policy Branch (J-3311), John J. Kingman Road, Fort Belvoir, VA...

  16. On the IPP Properties of Reed-Solomon Codes

    NASA Astrophysics Data System (ADS)

    Fernandez, Marcel; Cotrina, Josep; Soriano, Miguel; Domingo, Neus

    Codes with traceability properties are used in schemes where the identification of users that illegally redistribute content is required. For any code with traceability properties, the Identifiable Parent Property (c-IPP) seems to be less restrictive than the Traceability (c-TA) property. In this paper, we show that for Reed-Solomon codes both properties are in many cases equivalent. More precisely, we show that for an [n,k,d] Reed-Solomon code, defined over a field that contains the n - d roots of unity, both properties are equivalent. This answers a question posted by Silverberg et al. in [10,11], for a large family of Reed-Solomon codes.

  17. 40 CFR 62.3330 - Identification of plan.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 9 2012-07-01 2012-07-01 false Identification of plan. 62.3330 Section... Emissions from Existing Municipal Solid Waste Landfills § 62.3330 Identification of plan. The Illinois Plan... required to install a gas collection and control system pursuant to 35 Ill. Adm. Code 220 or 800...

  18. 40 CFR 62.3330 - Identification of plan.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 9 2014-07-01 2014-07-01 false Identification of plan. 62.3330 Section... Emissions from Existing Municipal Solid Waste Landfills § 62.3330 Identification of plan. The Illinois Plan... required to install a gas collection and control system pursuant to 35 Ill. Adm. Code 220 or 800...

  19. 20 CFR 422.112 - Employer identification numbers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Procedures § 422.112 Employer identification numbers. (a) General. Most employers are required by section 6109 of the Internal Revenue Code and by Internal Revenue Service (IRS) regulations at 26 CFR 31.6011(b... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Employer identification numbers....

  20. Identification System

    NASA Technical Reports Server (NTRS)

    1998-01-01

    Under a NASA Space Act Agreement with Marshall Space Flight Center, Symbology Research Center commercialized a new method of identifying products with invisible and virtually indestructible markings. This digital data matrix technology was developed at Marshall Space Flight Center to identify the millions of parts that comprise space shuttles. The laser-etched markings are seen as the next generation of product "bar codes."

  1. Coding and traceability for cells, tissues and organs for transplantation.

    PubMed

    Strong, D Michael; Shinozaki, Naoshi

    2010-11-01

    Modern transplantation of cells, tissues and organs has been practiced within the last century achieving both life saving and enhancing results. Associated risks have been recognized including infectious disease transmission, malignancy, immune mediated disease and graft failure. This has resulted in establishment of government regulation, professional standard setting and establishment of vigilance and surveillance systems for early detection and prevention and to improve patient safety. The increased transportation of grafts across national boundaries has made traceability difficult and sometimes impossible. Experience during the first Gulf War with mis-identification of blood units coming from multiple countries without standardized coding and labeling has led international organizations to develop standardized nomenclature and coding for blood. Following this example, cell therapy and tissue transplant practitioners have also moved to standardization of coding systems. Establishment of an international coding system has progressed rapidly and implementation for blood has demonstrated multiple advantages. WHO has held two global consultations on human cells and tissues for transplantation, which recognized the global circulation of cells and tissues and growing commercialization and the need for means of coding to identify tissues and cells used in transplantation, are essential for full traceability. There is currently a wide diversity in the identification and coding of tissue and cell products. For tissues, with a few exceptions, product terminology has not been standardized even at the national level. Progress has been made in blood and cell therapies with a slow and steady trend towards implementation of the international code ISBT 128. Across all fields, there are now 3,700 licensed facilities in 66 countries. Efforts are necessary to encourage the introduction of a standardized international coding system for donation identification numbers, such as ISBT

  2. Coding and traceability for cells, tissues and organs for transplantation

    PubMed Central

    Shinozaki, Naoshi

    2010-01-01

    Modern transplantation of cells, tissues and organs has been practiced within the last century achieving both life saving and enhancing results. Associated risks have been recognized including infectious disease transmission, malignancy, immune mediated disease and graft failure. This has resulted in establishment of government regulation, professional standard setting and establishment of vigilance and surveillance systems for early detection and prevention and to improve patient safety. The increased transportation of grafts across national boundaries has made traceability difficult and sometimes impossible. Experience during the first Gulf War with miss-identification of blood units coming from multiple countries without standardized coding and labeling has led international organizations to develop standardized nomenclature and coding for blood. Following this example, cell therapy and tissue transplant practitioners have also moved to standardization of coding systems. Establishment of an international coding system has progressed rapidly and implementation for blood has demonstrated multiple advantages. WHO has held two global consultations on human cells and tissues for transplantation, which recognized the global circulation of cells and tissues and growing commercialization and the need for means of coding to identify tissues and cells used in transplantation, are essential for full traceability. There is currently a wide diversity in the identification and coding of tissue and cell products. For tissues, with a few exceptions, product terminology has not been standardized even at the national level. Progress has been made in blood and cell therapies with a slow and steady trend towards implementation of the international code ISBT 128. Across all fields, there are now 3,700 licensed facilities in 66 countries. Efforts are necessary to encourage the introduction of a standardized international coding system for donation identification numbers, such as ISBT

  3. Investigations of new potential photo-acid generators: crystal structures of 2-[(E)-2-phenyl­ethen­yl]phenol (ortho­rhom­bic polymorph) and (2E)-3-(2-bromo­phen­yl)-2-phenyl­prop-2-enoic acid

    PubMed Central

    Harrison, William T. A.; Plater, M. John; Yin, Lee J.

    2016-01-01

    The title compounds, C14H12O, (I), and C15H11BrO2, (II), were prepared and characterized as part of our studies of potential new photo-acid generators. In (I), which crystallizes in the ortho­rhom­bic space group Pca21, compared to P21/n for the previously known monoclinic polymorph [Cornella & Martin (2013 ▸). Org. Lett. 15, 6298–6301], the dihedral angle between the aromatic rings is 4.35 (6)° and the OH group is disordered over two sites in a 0.795 (3):0.205 (3) ratio. In the crystal of (I), mol­ecules are linked by O—H⋯π inter­actions involving both the major and minor –OH disorder components, generating [001] chains as part of the herringbone packing motif. The asymmetric unit of (II) contains two mol­ecules with similar conformations (weighted r.m.s. overlay fit = 0.183 Å). In the crystal of (II), both mol­ecules form carboxyl­ate inversion dimers linked by pairs of O—H⋯O hydrogen bonds, generating R 2 2(8) loops in each case. The dimers are linked by pairs of C—H⋯O hydrogen bonds to form [010] chains. PMID:27006818

  4. Prioritized LT Codes

    NASA Technical Reports Server (NTRS)

    Woo, Simon S.; Cheng, Michael K.

    2011-01-01

    The original Luby Transform (LT) coding scheme is extended to account for data transmissions where some information symbols in a message block are more important than others. Prioritized LT codes provide unequal error protection (UEP) of data on an erasure channel by modifying the original LT encoder. The prioritized algorithm improves high-priority data protection without penalizing low-priority data recovery. Moreover, low-latency decoding is also obtained for high-priority data due to fast encoding. Prioritized LT codes only require a slight change in the original encoding algorithm, and no changes at all at the decoder. Hence, with a small complexity increase in the LT encoder, an improved UEP and low-decoding latency performance for high-priority data can be achieved. LT encoding partitions a data stream into fixed-sized message blocks each with a constant number of information symbols. To generate a code symbol from the information symbols in a message, the Robust-Soliton probability distribution is first applied in order to determine the number of information symbols to be used to compute the code symbol. Then, the specific information symbols are chosen uniform randomly from the message block. Finally, the selected information symbols are XORed to form the code symbol. The Prioritized LT code construction includes an additional restriction that code symbols formed by a relatively small number of XORed information symbols select some of these information symbols from the pool of high-priority data. Once high-priority data are fully covered, encoding continues with the conventional LT approach where code symbols are generated by selecting information symbols from the entire message block including all different priorities. Therefore, if code symbols derived from high-priority data experience an unusual high number of erasures, Prioritized LT codes can still reliably recover both high- and low-priority data. This hybrid approach decides not only "how to encode

  5. Coded source neutron imaging

    SciTech Connect

    Bingham, Philip R; Santos-Villalobos, Hector J

    2011-01-01

    Coded aperture techniques have been applied to neutron radiography to address limitations in neutron flux and resolution of neutron detectors in a system labeled coded source imaging (CSI). By coding the neutron source, a magnified imaging system is designed with small spot size aperture holes (10 and 100 m) for improved resolution beyond the detector limits and with many holes in the aperture (50% open) to account for flux losses due to the small pinhole size. An introduction to neutron radiography and coded aperture imaging is presented. A system design is developed for a CSI system with a development of equations for limitations on the system based on the coded image requirements and the neutron source characteristics of size and divergence. Simulation has been applied to the design using McStas to provide qualitative measures of performance with simulations of pinhole array objects followed by a quantitative measure through simulation of a tilted edge and calculation of the modulation transfer function (MTF) from the line spread function. MTF results for both 100um and 10um aperture hole diameters show resolutions matching the hole diameters.

  6. Error coding simulations

    NASA Technical Reports Server (NTRS)

    Noble, Viveca K.

    1993-01-01

    There are various elements such as radio frequency interference (RFI) which may induce errors in data being transmitted via a satellite communication link. When a transmission is affected by interference or other error-causing elements, the transmitted data becomes indecipherable. It becomes necessary to implement techniques to recover from these disturbances. The objective of this research is to develop software which simulates error control circuits and evaluate the performance of these modules in various bit error rate environments. The results of the evaluation provide the engineer with information which helps determine the optimal error control scheme. The Consultative Committee for Space Data Systems (CCSDS) recommends the use of Reed-Solomon (RS) and convolutional encoders and Viterbi and RS decoders for error correction. The use of forward error correction techniques greatly reduces the received signal to noise needed for a certain desired bit error rate. The use of concatenated coding, e.g. inner convolutional code and outer RS code, provides even greater coding gain. The 16-bit cyclic redundancy check (CRC) code is recommended by CCSDS for error detection.

  7. Error coding simulations

    NASA Astrophysics Data System (ADS)

    Noble, Viveca K.

    1993-11-01

    There are various elements such as radio frequency interference (RFI) which may induce errors in data being transmitted via a satellite communication link. When a transmission is affected by interference or other error-causing elements, the transmitted data becomes indecipherable. It becomes necessary to implement techniques to recover from these disturbances. The objective of this research is to develop software which simulates error control circuits and evaluate the performance of these modules in various bit error rate environments. The results of the evaluation provide the engineer with information which helps determine the optimal error control scheme. The Consultative Committee for Space Data Systems (CCSDS) recommends the use of Reed-Solomon (RS) and convolutional encoders and Viterbi and RS decoders for error correction. The use of forward error correction techniques greatly reduces the received signal to noise needed for a certain desired bit error rate. The use of concatenated coding, e.g. inner convolutional code and outer RS code, provides even greater coding gain. The 16-bit cyclic redundancy check (CRC) code is recommended by CCSDS for error detection.

  8. Malnutrition coding 101: financial impact and more.

    PubMed

    Giannopoulos, Georgia A; Merriman, Louise R; Rumsey, Alissa; Zwiebel, Douglas S

    2013-12-01

    Recent articles have addressed the characteristics associated with adult malnutrition as published by the Academy of Nutrition and Dietetics (the Academy) and the American Society for Parenteral and Enteral Nutrition (A.S.P.E.N.). This article describes a successful interdisciplinary program developed by the Department of Food and Nutrition at New York-Presbyterian Hospital to maintain and monitor clinical documentation, ensure accurate International Classification of Diseases 9th Edition (ICD-9) coding, and identify subsequent incremental revenue resulting from the early identification, documentation, and treatment of malnutrition in an adult inpatient population. The first step in the process requires registered dietitians to identify patients with malnutrition; then clear and specifically worded diagnostic statements that include the type and severity of malnutrition are documented in the medical record by the physician, nurse practitioner, or physician's assistant. This protocol allows the Heath Information Management/Coding department to accurately assign ICD-9 codes associated with protein-energy malnutrition. Once clinical coding is complete, a final diagnosis related group (DRG) is generated to ensure appropriate hospital reimbursement. Successful interdisciplinary programs such as this can drive optimal care and ensure appropriate reimbursement. PMID:24177283

  9. Non-coding genome functions in diabetes.

    PubMed

    Cebola, Inês; Pasquali, Lorenzo

    2016-01-01

    Most of the genetic variation associated with diabetes, through genome-wide association studies, does not reside in protein-coding regions, making the identification of functional variants and their eventual translation to the clinic challenging. In recent years, high-throughput sequencing-based methods have enabled genome-scale high-resolution epigenomic profiling in a variety of human tissues, allowing the exploration of the human genome outside of the well-studied coding regions. These experiments unmasked tens of thousands of regulatory elements across several cell types, including diabetes-relevant tissues, providing new insights into their mechanisms of gene regulation. Regulatory landscapes are highly dynamic and cell-type specific and, being sensitive to DNA sequence variation, can vary with individual genomes. The scientific community is now in place to exploit the regulatory maps of tissues central to diabetes etiology, such as pancreatic progenitors and adult islets. This giant leap forward in the understanding of pancreatic gene regulation is revolutionizing our capacity to discriminate between functional and non-functional non-coding variants, opening opportunities to uncover regulatory links between sequence variation and diabetes susceptibility. In this review, we focus on the non-coding regulatory landscape of the pancreatic endocrine cells and provide an overview of the recent developments in this field. PMID:26438568

  10. Phase-coded pulse aperiodic transmitter coding

    NASA Astrophysics Data System (ADS)

    Virtanen, I. I.; Vierinen, J.; Lehtinen, M. S.

    2009-07-01

    Both ionospheric and weather radar communities have already adopted the method of transmitting radar pulses in an aperiodic manner when measuring moderately overspread targets. Among the users of the ionospheric radars, this method is called Aperiodic Transmitter Coding (ATC), whereas the weather radar users have adopted the term Simultaneous Multiple Pulse-Repetition Frequency (SMPRF). When probing the ionosphere at the carrier frequencies of the EISCAT Incoherent Scatter Radar facilities, the range extent of the detectable target is typically of the order of one thousand kilometers - about seven milliseconds - whereas the characteristic correlation time of the scattered signal varies from a few milliseconds in the D-region to only tens of microseconds in the F-region. If one is interested in estimating the scattering autocorrelation function (ACF) at time lags shorter than the F-region correlation time, the D-region must be considered as a moderately overspread target, whereas the F-region is a severely overspread one. Given the technical restrictions of the radar hardware, a combination of ATC and phase-coded long pulses is advantageous for this kind of target. We evaluate such an experiment under infinitely low signal-to-noise ratio (SNR) conditions using lag profile inversion. In addition, a qualitative evaluation under high-SNR conditions is performed by analysing simulated data. The results show that an acceptable estimation accuracy and a very good lag resolution in the D-region can be achieved with a pulse length long enough for simultaneous E- and F-region measurements with a reasonable lag extent. The new experiment design is tested with the EISCAT Tromsø VHF (224 MHz) radar. An example of a full D/E/F-region ACF from the test run is shown at the end of the paper.

  11. FAA Smoke Transport Code

    Energy Science and Technology Software Center (ESTSC)

    2006-10-27

    FAA Smoke Transport Code, a physics-based Computational Fluid Dynamics tool, which couples heat, mass, and momentum transfer, has been developed to provide information on smoke transport in cargo compartments with various geometries and flight conditions. The software package contains a graphical user interface for specification of geometry and boundary conditions, analysis module for solving the governing equations, and a post-processing tool. The current code was produced by making substantial improvements and additions to a codemore » obtained from a university. The original code was able to compute steady, uniform, isothermal turbulent pressurization. In addition, a preprocessor and postprocessor were added to arrive at the current software package.« less

  12. Seals Code Development Workshop

    NASA Technical Reports Server (NTRS)

    Hendricks, Robert C. (Compiler); Liang, Anita D. (Compiler)

    1996-01-01

    Seals Workshop of 1995 industrial code (INDSEAL) release include ICYL, GCYLT, IFACE, GFACE, SPIRALG, SPIRALI, DYSEAL, and KTK. The scientific code (SCISEAL) release includes conjugate heat transfer and multidomain with rotordynamic capability. Several seals and bearings codes (e.g., HYDROFLEX, HYDROTRAN, HYDROB3D, FLOWCON1, FLOWCON2) are presented and results compared. Current computational and experimental emphasis includes multiple connected cavity flows with goals of reducing parasitic losses and gas ingestion. Labyrinth seals continue to play a significant role in sealing with face, honeycomb, and new sealing concepts under investigation for advanced engine concepts in view of strict environmental constraints. The clean sheet approach to engine design is advocated with program directions and anticipated percentage SFC reductions cited. Future activities center on engine applications with coupled seal/power/secondary flow streams.

  13. Code query by example

    NASA Astrophysics Data System (ADS)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  14. Code inspection instructional validation

    NASA Technical Reports Server (NTRS)

    Orr, Kay; Stancil, Shirley

    1992-01-01

    The Shuttle Data Systems Branch (SDSB) of the Flight Data Systems Division (FDSD) at Johnson Space Center contracted with Southwest Research Institute (SwRI) to validate the effectiveness of an interactive video course on the code inspection process. The purpose of this project was to determine if this course could be effective for teaching NASA analysts the process of code inspection. In addition, NASA was interested in the effectiveness of this unique type of instruction (Digital Video Interactive), for providing training on software processes. This study found the Carnegie Mellon course, 'A Cure for the Common Code', effective for teaching the process of code inspection. In addition, analysts prefer learning with this method of instruction, or this method in combination with other methods. As is, the course is definitely better than no course at all; however, findings indicate changes are needed. Following are conclusions of this study. (1) The course is instructionally effective. (2) The simulation has a positive effect on student's confidence in his ability to apply new knowledge. (3) Analysts like the course and prefer this method of training, or this method in combination with current methods of training in code inspection, over the way training is currently being conducted. (4) Analysts responded favorably to information presented through scenarios incorporating full motion video. (5) Some course content needs to be changed. (6) Some content needs to be added to the course. SwRI believes this study indicates interactive video instruction combined with simulation is effective for teaching software processes. Based on the conclusions of this study, SwRI has outlined seven options for NASA to consider. SwRI recommends the option which involves creation of new source code and data files, but uses much of the existing content and design from the current course. Although this option involves a significant software development effort, SwRI believes this option

  15. 29 CFR 1910.144 - Safety color code for marking physical hazards.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 5 2014-07-01 2014-07-01 false Safety color code for marking physical hazards. 1910.144... § 1910.144 Safety color code for marking physical hazards. (a) Color identification—(1) Red. Red shall be the basic color for the identification of: (i) Fire protection equipment and apparatus. (ii)...

  16. 29 CFR 1910.144 - Safety color code for marking physical hazards.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 5 2013-07-01 2013-07-01 false Safety color code for marking physical hazards. 1910.144... § 1910.144 Safety color code for marking physical hazards. (a) Color identification—(1) Red. Red shall be the basic color for the identification of: (i) Fire protection equipment and apparatus. (ii)...

  17. 29 CFR 1910.144 - Safety color code for marking physical hazards.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 5 2011-07-01 2011-07-01 false Safety color code for marking physical hazards. 1910.144... § 1910.144 Safety color code for marking physical hazards. (a) Color identification—(1) Red. Red shall be the basic color for the identification of: (i) Fire protection equipment and apparatus. (ii)...

  18. 49 CFR 178.502 - Identification codes for packagings.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... indicating the kind of packaging, as follows: (i) “1” means a drum. (ii) “2” means a wooden barrel. (iii) “3... the category of packaging within the kind to which the packaging belongs. For example, for steel drums (“1A”), “1” indicates a non-removable head drum (i.e., “1A1”) and “2” indicates a removable head...

  19. 49 CFR 178.502 - Identification codes for packagings.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... indicating the kind of packaging, as follows: (i) “1” means a drum. (ii) “2” means a wooden barrel. (iii) “3... the category of packaging within the kind to which the packaging belongs. For example, for steel drums (“1A”), “1” indicates a non-removable head drum (i.e., “1A1”) and “2” indicates a removable head...

  20. 49 CFR 178.502 - Identification codes for packagings.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... indicating the kind of packaging, as follows: (i) “1” means a drum. (ii) “2” means a wooden barrel. (iii) “3... the category of packaging within the kind to which the packaging belongs. For example, for steel drums (“1A”), “1” indicates a non-removable head drum (i.e., “1A1”) and “2” indicates a removable head...

  1. 49 CFR 178.502 - Identification codes for packagings.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... indicating the kind of packaging, as follows: (i) “1” means a drum. (ii) “2” means a wooden barrel. (iii) “3... the category of packaging within the kind to which the packaging belongs. For example, for steel drums (“1A”), “1” indicates a non-removable head drum (i.e., “1A1”) and “2” indicates a removable head...

  2. Wireless event-recording device with identification codes

    NASA Technical Reports Server (NTRS)

    Watters, David G. (Inventor); Huestis, David L. (Inventor); Bahr, Alfred J. (Inventor)

    2004-01-01

    A wireless recording device can be interrogated to determine its identity and its state. The state indicates whether a particular physical or chemical event has taken place. In effect, the physical or chemical event is recorded by the device. The identity of the device allows it to be distinguished from a number of similar devices. Thus the sensor device may be used in an array of devices that can be probed by a wireless interrogation unit. The device tells the interrogator who it is and what state it is in. The interrogator can thus easily identify particular items in an array that have reached a particular condition.

  3. Aeroacoustic Prediction Codes

    NASA Technical Reports Server (NTRS)

    Gliebe, P; Mani, R.; Shin, H.; Mitchell, B.; Ashford, G.; Salamah, S.; Connell, S.; Huff, Dennis (Technical Monitor)

    2000-01-01

    This report describes work performed on Contract NAS3-27720AoI 13 as part of the NASA Advanced Subsonic Transport (AST) Noise Reduction Technology effort. Computer codes were developed to provide quantitative prediction, design, and analysis capability for several aircraft engine noise sources. The objective was to provide improved, physics-based tools for exploration of noise-reduction concepts and understanding of experimental results. Methods and codes focused on fan broadband and 'buzz saw' noise and on low-emissions combustor noise and compliment work done by other contractors under the NASA AST program to develop methods and codes for fan harmonic tone noise and jet noise. The methods and codes developed and reported herein employ a wide range of approaches, from the strictly empirical to the completely computational, with some being semiempirical analytical, and/or analytical/computational. Emphasis was on capturing the essential physics while still considering method or code utility as a practical design and analysis tool for everyday engineering use. Codes and prediction models were developed for: (1) an improved empirical correlation model for fan rotor exit flow mean and turbulence properties, for use in predicting broadband noise generated by rotor exit flow turbulence interaction with downstream stator vanes: (2) fan broadband noise models for rotor and stator/turbulence interaction sources including 3D effects, noncompact-source effects. directivity modeling, and extensions to the rotor supersonic tip-speed regime; (3) fan multiple-pure-tone in-duct sound pressure prediction methodology based on computational fluid dynamics (CFD) analysis; and (4) low-emissions combustor prediction methodology and computer code based on CFD and actuator disk theory. In addition. the relative importance of dipole and quadrupole source mechanisms was studied using direct CFD source computation for a simple cascadeigust interaction problem, and an empirical combustor

  4. Securing mobile code.

    SciTech Connect

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements

  5. Accumulate Repeat Accumulate Coded Modulation

    NASA Technical Reports Server (NTRS)

    Abbasfar, Aliazam; Divsalar, Dariush; Yao, Kung

    2004-01-01

    In this paper we propose an innovative coded modulation scheme called 'Accumulate Repeat Accumulate Coded Modulation' (ARA coded modulation). This class of codes can be viewed as serial turbo-like codes, or as a subclass of Low Density Parity Check (LDPC) codes that are combined with high level modulation. Thus at the decoder belief propagation can be used for iterative decoding of ARA coded modulation on a graph, provided a demapper transforms the received in-phase and quadrature samples to reliability of the bits.

  6. Multiple trellis coded modulation

    NASA Technical Reports Server (NTRS)

    Simon, Marvin K. (Inventor); Divsalar, Dariush (Inventor)

    1990-01-01

    A technique for designing trellis codes to minimize bit error performance for a fading channel. The invention provides a criteria which may be used in the design of such codes which is significantly different from that used for average white Gaussian noise channels. The method of multiple trellis coded modulation of the present invention comprises the steps of: (a) coding b bits of input data into s intermediate outputs; (b) grouping said s intermediate outputs into k groups of s.sub.i intermediate outputs each where the summation of all s.sub.i,s is equal to s and k is equal to at least 2; (c) mapping each of said k groups of intermediate outputs into one of a plurality of symbols in accordance with a plurality of modulation schemes, one for each group such that the first group is mapped in accordance with a first modulation scheme and the second group is mapped in accordance with a second modulation scheme; and (d) outputting each of said symbols to provide k output symbols for each b bits of input data.

  7. Code of Ethics.

    ERIC Educational Resources Information Center

    American Sociological Association, Washington, DC.

    The American Sociological Association's code of ethics for sociologists is presented. For sociological research and practice, 10 requirements for ethical behavior are identified, including: maintaining objectivity and integrity; fully reporting findings and research methods, without omission of significant data; reporting fully all sources of…

  8. Sharing the Code.

    ERIC Educational Resources Information Center

    Olsen, Florence

    2003-01-01

    Colleges and universities are beginning to consider collaborating on open-source-code projects as a way to meet critical software and computing needs. Points out the attractive features of noncommercial open-source software and describes some examples in use now, especially for the creation of Web infrastructure. (SLD)

  9. Electrical Circuit Simulation Code

    Energy Science and Technology Software Center (ESTSC)

    2001-08-09

    Massively-Parallel Electrical Circuit Simulation Code. CHILESPICE is a massively-arallel distributed-memory electrical circuit simulation tool that contains many enhanced radiation, time-based, and thermal features and models. Large scale electronic circuit simulation. Shared memory, parallel processing, enhance convergence. Sandia specific device models.

  10. Environmental Fluid Dynamics Code

    EPA Science Inventory

    The Environmental Fluid Dynamics Code (EFDC)is a state-of-the-art hydrodynamic model that can be used to simulate aquatic systems in one, two, and three dimensions. It has evolved over the past two decades to become one of the most widely used and technically defensible hydrodyn...

  11. Heuristic dynamic complexity coding

    NASA Astrophysics Data System (ADS)

    Škorupa, Jozef; Slowack, Jürgen; Mys, Stefaan; Lambert, Peter; Van de Walle, Rik

    2008-04-01

    Distributed video coding is a new video coding paradigm that shifts the computational intensive motion estimation from encoder to decoder. This results in a lightweight encoder and a complex decoder, as opposed to the predictive video coding scheme (e.g., MPEG-X and H.26X) with a complex encoder and a lightweight decoder. Both schemas, however, do not have the ability to adapt to varying complexity constraints imposed by encoder and decoder, which is an essential ability for applications targeting a wide range of devices with different complexity constraints or applications with temporary variable complexity constraints. Moreover, the effect of complexity adaptation on the overall compression performance is of great importance and has not yet been investigated. To address this need, we have developed a video coding system with the possibility to adapt itself to complexity constraints by dynamically sharing the motion estimation computations between both components. On this system we have studied the effect of the complexity distribution on the compression performance. This paper describes how motion estimation can be shared using heuristic dynamic complexity and how distribution of complexity affects the overall compression performance of the system. The results show that the complexity can indeed be shared between encoder and decoder in an efficient way at acceptable rate-distortion performance.

  12. Code of Ethics.

    ERIC Educational Resources Information Center

    Association of College Unions-International, Bloomington, IN.

    The code of ethics for the college union and student activities professional is presented by the Association of College Unions-International. The preamble identifies the objectives of the college union as providing campus community centers and social programs that enhance the quality of life for members of the academic community. Ethics for…

  13. Dual Coding in Children.

    ERIC Educational Resources Information Center

    Burton, John K.; Wildman, Terry M.

    The purpose of this study was to test the applicability of the dual coding hypothesis to children's recall performance. The hypothesis predicts that visual interference will have a small effect on the recall of visually presented words or pictures, but that acoustic interference will cause a decline in recall of visually presented words and…

  14. The revised genetic code

    NASA Astrophysics Data System (ADS)

    Ninio, Jacques

    1990-03-01

    Recent findings on the genetic code are reviewed, including selenocysteine usage, deviations in the assignments of sense and nonsense codons, RNA editing, natural ribosomal frameshifts and non-orthodox codon-anticodon pairings. A multi-stage codon reading process is presented.

  15. Dress Codes and Uniforms.

    ERIC Educational Resources Information Center

    Lumsden, Linda; Miller, Gabriel

    2002-01-01

    Students do not always make choices that adults agree with in their choice of school dress. Dress-code issues are explored in this Research Roundup, and guidance is offered to principals seeking to maintain a positive school climate. In "Do School Uniforms Fit?" Kerry White discusses arguments for and against school uniforms and summarizes the…

  16. Code Optimization Techniques

    SciTech Connect

    MAGEE,GLEN I.

    2000-08-03

    Computers transfer data in a number of different ways. Whether through a serial port, a parallel port, over a modem, over an ethernet cable, or internally from a hard disk to memory, some data will be lost. To compensate for that loss, numerous error detection and correction algorithms have been developed. One of the most common error correction codes is the Reed-Solomon code, which is a special subset of BCH (Bose-Chaudhuri-Hocquenghem) linear cyclic block codes. In the AURA project, an unmanned aircraft sends the data it collects back to earth so it can be analyzed during flight and possible flight modifications made. To counter possible data corruption during transmission, the data is encoded using a multi-block Reed-Solomon implementation with a possibly shortened final block. In order to maximize the amount of data transmitted, it was necessary to reduce the computation time of a Reed-Solomon encoding to three percent of the processor's time. To achieve such a reduction, many code optimization techniques were employed. This paper outlines the steps taken to reduce the processing time of a Reed-Solomon encoding and the insight into modern optimization techniques gained from the experience.

  17. Whale Identification

    NASA Technical Reports Server (NTRS)

    1991-01-01

    R:BASE for DOS, a computer program developed under NASA contract, has been adapted by the National Marine Mammal Laboratory and the College of the Atlantic to provide and advanced computerized photo matching technique for identification of humpback whales. The program compares photos with stored digitized descriptions, enabling researchers to track and determine distribution and migration patterns. R:BASE is a spinoff of RIM (Relational Information Manager), which was used to store data for analyzing heat shielding tiles on the Space Shuttle Orbiter. It is now the world's second largest selling line of microcomputer database management software.

  18. Sinusoidal transform coding

    NASA Technical Reports Server (NTRS)

    Mcaulay, Robert J.; Quatieri, Thomas F.

    1988-01-01

    It has been shown that an analysis/synthesis system based on a sinusoidal representation of speech leads to synthetic speech that is essentially perceptually indistinguishable from the original. Strategies for coding the amplitudes, frequencies and phases of the sine waves have been developed that have led to a multirate coder operating at rates from 2400 to 9600 bps. The encoded speech is highly intelligible at all rates with a uniformly improving quality as the data rate is increased. A real-time fixed-point implementation has been developed using two ADSP2100 DSP chips. The methods used for coding and quantizing the sine-wave parameters for operation at the various frame rates are described.

  19. Finite Element Analysis Code

    Energy Science and Technology Software Center (ESTSC)

    2006-03-08

    MAPVAR-KD is designed to transfer solution results from one finite element mesh to another. MAPVAR-KD draws heavily from the structure and coding of MERLIN II, but it employs a new finite element data base, EXODUS II, and offers enhanced speed and new capabilities not available in MERLIN II. In keeping with the MERLIN II documentation, the computational algorithms used in MAPVAR-KD are described. User instructions are presented. Example problems are included to demonstrate the operationmore » of the code and the effects of various input options. MAPVAR-KD is a modification of MAPVAR in which the search algorithm was replaced by a kd-tree-based search for better performance on large problems.« less

  20. Confocal coded aperture imaging

    DOEpatents

    Tobin, Jr., Kenneth William; Thomas, Jr., Clarence E.

    2001-01-01

    A method for imaging a target volume comprises the steps of: radiating a small bandwidth of energy toward the target volume; focusing the small bandwidth of energy into a beam; moving the target volume through a plurality of positions within the focused beam; collecting a beam of energy scattered from the target volume with a non-diffractive confocal coded aperture; generating a shadow image of said aperture from every point source of radiation in the target volume; and, reconstructing the shadow image into a 3-dimensional image of the every point source by mathematically correlating the shadow image with a digital or analog version of the coded aperture. The method can comprise the step of collecting the beam of energy scattered from the target volume with a Fresnel zone plate.

  1. CTI Correction Code

    NASA Astrophysics Data System (ADS)

    Massey, Richard; Stoughton, Chris; Leauthaud, Alexie; Rhodes, Jason; Koekemoer, Anton; Ellis, Richard; Shaghoulian, Edgar

    2013-07-01

    Charge Transfer Inefficiency (CTI) due to radiation damage above the Earth's atmosphere creates spurious trailing in images from Charge-Coupled Device (CCD) imaging detectors. Radiation damage also creates unrelated warm pixels, which can be used to measure CTI. This code provides pixel-based correction for CTI and has proven effective in Hubble Space Telescope Advanced Camera for Surveys raw images, successfully reducing the CTI trails by a factor of ~30 everywhere in the CCD and at all flux levels. The core is written in java for speed, and a front-end user interface is provided in IDL. The code operates on raw data by returning individual electrons to pixels from which they were unintentionally dragged during readout. Correction takes about 25 minutes per ACS exposure, but is trivially parallelisable to multiple processors.

  2. Status of MARS Code

    SciTech Connect

    N.V. Mokhov

    2003-04-09

    Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

  3. VAC: Versatile Advection Code

    NASA Astrophysics Data System (ADS)

    Tóth, Gábor; Keppens, Rony

    2012-07-01

    The Versatile Advection Code (VAC) is a freely available general hydrodynamic and magnetohydrodynamic simulation software that works in 1, 2 or 3 dimensions on Cartesian and logically Cartesian grids. VAC runs on any Unix/Linux system with a Fortran 90 (or 77) compiler and Perl interpreter. VAC can run on parallel machines using either the Message Passing Interface (MPI) library or a High Performance Fortran (HPF) compiler.

  4. Reeds computer code

    NASA Technical Reports Server (NTRS)

    Bjork, C.

    1981-01-01

    The REEDS (rocket exhaust effluent diffusion single layer) computer code is used for the estimation of certain rocket exhaust effluent concentrations and dosages and their distributions near the Earth's surface following a rocket launch event. Output from REEDS is used in producing near real time air quality and environmental assessments of the effects of certain potentially harmful effluents, namely HCl, Al2O3, CO, and NO.

  5. MELCOR computer code manuals

    SciTech Connect

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L.; Hodge, S.A.; Hyman, C.R.; Sanders, R.L.

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  6. Bar coded retroreflective target

    DOEpatents

    Vann, Charles S.

    2000-01-01

    This small, inexpensive, non-contact laser sensor can detect the location of a retroreflective target in a relatively large volume and up to six degrees of position. The tracker's laser beam is formed into a plane of light which is swept across the space of interest. When the beam illuminates the retroreflector, some of the light returns to the tracker. The intensity, angle, and time of the return beam is measured to calculate the three dimensional location of the target. With three retroreflectors on the target, the locations of three points on the target are measured, enabling the calculation of all six degrees of target position. Until now, devices for three-dimensional tracking of objects in a large volume have been heavy, large, and very expensive. Because of the simplicity and unique characteristics of this tracker, it is capable of three-dimensional tracking of one to several objects in a large volume, yet it is compact, light-weight, and relatively inexpensive. Alternatively, a tracker produces a diverging laser beam which is directed towards a fixed position, and senses when a retroreflective target enters the fixed field of view. An optically bar coded target can be read by the tracker to provide information about the target. The target can be formed of a ball lens with a bar code on one end. As the target moves through the field, the ball lens causes the laser beam to scan across the bar code.

  7. Suboptimum decoding of block codes

    NASA Technical Reports Server (NTRS)

    Lin, Shu; Kasami, Tadao

    1991-01-01

    This paper investigates a class of decomposable codes, their distance and structural properties. it is shown that this class includes several classes of well known and efficient codes as subclasses. Several methods for constructing decomposable codes or decomposing codes are presented. A two-stage soft decision decoding scheme for decomposable codes, their translates or unions of translates is devised. This two-stage soft-decision decoding is suboptimum, and provides an excellent trade-off between the error performance and decoding complexity for codes of moderate and long block length.

  8. Preliminary Assessment of Turbomachinery Codes

    NASA Technical Reports Server (NTRS)

    Mazumder, Quamrul H.

    2007-01-01

    This report assesses different CFD codes developed and currently being used at Glenn Research Center to predict turbomachinery fluid flow and heat transfer behavior. This report will consider the following codes: APNASA, TURBO, GlennHT, H3D, and SWIFT. Each code will be described separately in the following section with their current modeling capabilities, level of validation, pre/post processing, and future development and validation requirements. This report addresses only previously published and validations of the codes. However, the codes have been further developed to extend the capabilities of the codes.

  9. Structural coding versus free-energy predictive coding.

    PubMed

    van der Helm, Peter A

    2016-06-01

    Focusing on visual perceptual organization, this article contrasts the free-energy (FE) version of predictive coding (a recent Bayesian approach) to structural coding (a long-standing representational approach). Both use free-energy minimization as metaphor for processing in the brain, but their formal elaborations of this metaphor are fundamentally different. FE predictive coding formalizes it by minimization of prediction errors, whereas structural coding formalizes it by minimization of the descriptive complexity of predictions. Here, both sides are evaluated. A conclusion regarding competence is that FE predictive coding uses a powerful modeling technique, but that structural coding has more explanatory power. A conclusion regarding performance is that FE predictive coding-though more detailed in its account of neurophysiological data-provides a less compelling cognitive architecture than that of structural coding, which, for instance, supplies formal support for the computationally powerful role it attributes to neuronal synchronization. PMID:26407895

  10. Real-time neural coding of memory.

    PubMed

    Tsien, Joe Z

    2007-01-01

    Recent identification of network-level functional coding units, termed neural cliques, in the hippocampus has allowed real-time patterns of memory traces to be mathematically described, intuitively visualized, and dynamically deciphered. Any given episodic event is represented and encoded by the activation of a set of neural clique assemblies that are organized in a categorical and hierarchical manner. This hierarchical feature-encoding pyramid is invariantly composed of the general feature-encoding clique at the bottom, sub-general feature-encoding cliques in the middle, and highly specific feature-encoding cliques at the top. This hierarchical and categorical organization of neural clique assemblies provides the network-level mechanism the capability of not only achieving vast storage capacity, but also generating commonalities from the individual behavioral episodes and converting them to the abstract concepts and generalized knowledge that are essential for intelligence and adaptive behaviors. Furthermore, activation patterns of the neural clique assemblies can be mathematically converted to strings of binary codes that would permit universal categorizations of the brain's internal representations across individuals and species. Such universal brain codes can also potentially facilitate the unprecedented brain-machine interface communications. PMID:17925242

  11. Convolutional coding techniques for data protection

    NASA Technical Reports Server (NTRS)

    Massey, J. L.

    1975-01-01

    Results of research on the use of convolutional codes in data communications are presented. Convolutional coding fundamentals are discussed along with modulation and coding interaction. Concatenated coding systems and data compression with convolutional codes are described.

  12. Peptide identification

    DOEpatents

    Jarman, Kristin H [Richland, WA; Cannon, William R [Richland, WA; Jarman, Kenneth D [Richland, WA; Heredia-Langner, Alejandro [Richland, WA

    2011-07-12

    Peptides are identified from a list of candidates using collision-induced dissociation tandem mass spectrometry data. A probabilistic model for the occurrence of spectral peaks corresponding to frequently observed partial peptide fragment ions is applied. As part of the identification procedure, a probability score is produced that indicates the likelihood of any given candidate being the correct match. The statistical significance of the score is known without necessarily having reference to the actual identity of the peptide. In one form of the invention, a genetic algorithm is applied to candidate peptides using an objective function that takes into account the number of shifted peaks appearing in the candidate spectrum relative to the test spectrum.

  13. Combinatorial neural codes from a mathematical coding theory perspective.

    PubMed

    Curto, Carina; Itskov, Vladimir; Morrison, Katherine; Roth, Zachary; Walker, Judy L

    2013-07-01

    Shannon's seminal 1948 work gave rise to two distinct areas of research: information theory and mathematical coding theory. While information theory has had a strong influence on theoretical neuroscience, ideas from mathematical coding theory have received considerably less attention. Here we take a new look at combinatorial neural codes from a mathematical coding theory perspective, examining the error correction capabilities of familiar receptive field codes (RF codes). We find, perhaps surprisingly, that the high levels of redundancy present in these codes do not support accurate error correction, although the error-correcting performance of receptive field codes catches up to that of random comparison codes when a small tolerance to error is introduced. However, receptive field codes are good at reflecting distances between represented stimuli, while the random comparison codes are not. We suggest that a compromise in error-correcting capability may be a necessary price to pay for a neural code whose structure serves not only error correction, but must also reflect relationships between stimuli. PMID:23724797

  14. Meteor Shower Identification and Characterization with Python

    NASA Technical Reports Server (NTRS)

    Moorhead, Althea

    2015-01-01

    The short development time associated with Python and the number of astronomical packages available have led to increased usage within NASA. The Meteoroid Environment Office in particular uses the Python language for a number of applications, including daily meteor shower activity reporting, searches for potential parent bodies of meteor showers, and short dynamical simulations. We present our development of a meteor shower identification code that identifies statistically significant groups of meteors on similar orbits. This code overcomes several challenging characteristics of meteor showers such as drastic differences in uncertainties between meteors and between the orbital elements of a single meteor, and the variation of shower characteristics such as duration with age or planetary perturbations. This code has been proven to successfully and quickly identify unusual meteor activity such as the 2014 kappa Cygnid outburst. We present our algorithm along with these successes and discuss our plans for further code development.

  15. Denture bar-coding: An innovative technique in forensic dentistry

    PubMed Central

    Dineshshankar, Janardhanam; Venkateshwaran, Rajendran; Vidhya, J.; Anuradha, R.; Mary, Gold Pealin; Pradeep, R.; Senthileagappan, A. R.

    2015-01-01

    Denture markers play an important role in forensic odontology and also in identifying a person. A number of methods are there for identifying dentures from a less expensive technique to a more expensive technique. Out of different denture markers, the bar-coding system is a way of collecting data from the mobile. Even a huge amount of data can be stored in that. It can be easily incorporated during acrylization of the denture and thus could be helpful in identification. This article reviews the strengths of bar-coding and how easily it can be used in the routine procedure. PMID:26538876

  16. On lossless coding for HEVC

    NASA Astrophysics Data System (ADS)

    Gao, Wen; Jiang, Minqiang; Yu, Haoping

    2013-02-01

    In this paper, we first review the lossless coding mode in the version 1 of the HEVC standard that has recently finalized. We then provide a performance comparison between the lossless coding mode in the HEVC and MPEG-AVC/H.264 standards and show that the HEVC lossless coding has limited coding efficiency. To improve the performance of the lossless coding mode, several new coding tools that were contributed to JCT-VC but not adopted in version 1 of HEVC standard are introduced. In particular, we discuss sample based intra prediction and coding of residual coefficients in more detail. At the end, we briefly address a new class of coding tools, i.e., a dictionary-based coder, that is efficient in encoding screen content including graphics and text.

  17. Vision-based reading system for color-coded bar codes

    NASA Astrophysics Data System (ADS)

    Schubert, Erhard; Schroeder, Axel

    1996-02-01

    Barcode systems are used to mark commodities, articles and products with price and article numbers. The advantage of the barcode systems is the safe and rapid availability of the information about the product. The size of the barcode depends on the used barcode system and the resolution of the barcode scanner. Nevertheless, there is a strong correlation between the information content and the length of the barcode. To increase the information content, new 2D-barcode systems like CodaBlock or PDF-417 are introduced. In this paper we present a different way to increase the information content of a barcode and we would like to introduce the color coded barcode. The new color coded barcode is created by offset printing of the three colored barcodes, each barcode with different information. Therefore, three times more information content can be accommodated in the area of a black printed barcode. This kind of color coding is usable in case of the standard 1D- and 2D-barcodes. We developed two reading devices for the color coded barcodes. First, there is a vision based system, consisting of a standard color camera and a PC-based color frame grabber. Omnidirectional barcode decoding is possible with this reading device. Second, a bi-directional handscanner was developed. Both systems use a color separation process to separate the color image of the barcodes into three independent grayscale images. In the case of the handscanner the image consists of one line only. After the color separation the three grayscale barcodes can be decoded with standard image processing methods. In principle, the color coded barcode can be used everywhere instead of the standard barcode. Typical applications with the color coded barcodes are found in the medicine technique, stock running and identification of electronic modules.

  18. An integrative approach to predicting the functional effects of non-coding and coding sequence variation

    PubMed Central

    Shihab, Hashem A.; Rogers, Mark F.; Gough, Julian; Mort, Matthew; Cooper, David N.; Day, Ian N. M.; Gaunt, Tom R.; Campbell, Colin

    2015-01-01

    Motivation: Technological advances have enabled the identification of an increasingly large spectrum of single nucleotide variants within the human genome, many of which may be associated with monogenic disease or complex traits. Here, we propose an integrative approach, named FATHMM-MKL, to predict the functional consequences of both coding and non-coding sequence variants. Our method utilizes various genomic annotations, which have recently become available, and learns to weight the significance of each component annotation source. Results: We show that our method outperforms current state-of-the-art algorithms, CADD and GWAVA, when predicting the functional consequences of non-coding variants. In addition, FATHMM-MKL is comparable to the best of these algorithms when predicting the impact of coding variants. The method includes a confidence measure to rank order predictions. Availability and implementation: The FATHMM-MKL webserver is available at: http://fathmm.biocompute.org.uk Contact: H.Shihab@bristol.ac.uk or Mark.Rogers@bristol.ac.uk or C.Campbell@bristol.ac.uk Supplementary information: Supplementary data are available at Bioinformatics online. PMID:25583119

  19. Noiseless Coding Of Magnetometer Signals

    NASA Technical Reports Server (NTRS)

    Rice, Robert F.; Lee, Jun-Ji

    1989-01-01

    Report discusses application of noiseless data-compression coding to digitized readings of spaceborne magnetometers for transmission back to Earth. Objective of such coding to increase efficiency by decreasing rate of transmission without sacrificing integrity of data. Adaptive coding compresses data by factors ranging from 2 to 6.

  20. Energy Codes and Standards: Facilities

    SciTech Connect

    Bartlett, Rosemarie; Halverson, Mark A.; Shankle, Diana L.

    2007-01-01

    Energy codes and standards play a vital role in the marketplace by setting minimum requirements for energy-efficient design and construction. They outline uniform requirements for new buildings as well as additions and renovations. This article covers basic knowledge of codes and standards; development processes of each; adoption, implementation, and enforcement of energy codes and standards; and voluntary energy efficiency programs.

  1. Coding Issues in Grounded Theory

    ERIC Educational Resources Information Center

    Moghaddam, Alireza

    2006-01-01

    This paper discusses grounded theory as one of the qualitative research designs. It describes how grounded theory generates from data. Three phases of grounded theory--open coding, axial coding, and selective coding--are discussed, along with some of the issues which are the source of debate among grounded theorists, especially between its…

  2. Authorship Attribution of Source Code

    ERIC Educational Resources Information Center

    Tennyson, Matthew F.

    2013-01-01

    Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…

  3. Ethical Codes in the Professions.

    ERIC Educational Resources Information Center

    Schmeiser, Cynthia B.

    1992-01-01

    Whether the measurement profession should consider developing and adopting a code of professional conduct is explored after a brief review of existing references to standards of conduct and a review of other professional codes. Issues include the need for a code of ethics, its usefulness, and its enforcement. (SLD)

  4. Finite Element Analysis Code

    Energy Science and Technology Software Center (ESTSC)

    2005-05-07

    CONEX is a code for joining sequentially in time multiple exodusll database files which all represent the same base mesh topology and geometry. It is used to create a single results or restart file from multiple results or restart files which typically arise as the result of multiple restarted analyses. CONEX is used to postprocess the results from a series of finite element analyses. It can join sequentially the data from multiple results databases intomore » a single database which makes it easier to postprocess the results data.« less

  5. Finite Element Analysis Code

    Energy Science and Technology Software Center (ESTSC)

    2005-06-26

    Exotxt is an analysis code that reads finite element results data stored in an exodusII file and generates a file in a structured text format. The text file can be edited or modified via a number of text formatting tools. Exotxt is used by analysis to translate data from the binary exodusII format into a structured text format which can then be edited or modified and then either translated back to exodusII format or tomore » another format.« less

  6. Low Density Parity Check Codes: Bandwidth Efficient Channel Coding

    NASA Technical Reports Server (NTRS)

    Fong, Wai; Lin, Shu; Maki, Gary; Yeh, Pen-Shu

    2003-01-01

    Low Density Parity Check (LDPC) Codes provide near-Shannon Capacity performance for NASA Missions. These codes have high coding rates R=0.82 and 0.875 with moderate code lengths, n=4096 and 8176. Their decoders have inherently parallel structures which allows for high-speed implementation. Two codes based on Euclidean Geometry (EG) were selected for flight ASIC implementation. These codes are cyclic and quasi-cyclic in nature and therefore have a simple encoder structure. This results in power and size benefits. These codes also have a large minimum distance as much as d,,, = 65 giving them powerful error correcting capabilities and error floors less than lo- BER. This paper will present development of the LDPC flight encoder and decoder, its applications and status.

  7. New quantum codes constructed from quaternary BCH codes

    NASA Astrophysics Data System (ADS)

    Xu, Gen; Li, Ruihu; Guo, Luobin; Ma, Yuena

    2016-07-01

    In this paper, we firstly study construction of new quantum error-correcting codes (QECCs) from three classes of quaternary imprimitive BCH codes. As a result, the improved maximal designed distance of these narrow-sense imprimitive Hermitian dual-containing quaternary BCH codes are determined to be much larger than the result given according to Aly et al. (IEEE Trans Inf Theory 53:1183-1188, 2007) for each different code length. Thus, families of new QECCs are newly obtained, and the constructed QECCs have larger distance than those in the previous literature. Secondly, we apply a combinatorial construction to the imprimitive BCH codes with their corresponding primitive counterpart and construct many new linear quantum codes with good parameters, some of which have parameters exceeding the finite Gilbert-Varshamov bound for linear quantum codes.

  8. Structured error recovery for code-word-stabilized quantum codes

    SciTech Connect

    Li Yunfan; Dumer, Ilya; Grassl, Markus; Pryadko, Leonid P.

    2010-05-15

    Code-word-stabilized (CWS) codes are, in general, nonadditive quantum codes that can correct errors by an exhaustive search of different error patterns, similar to the way that we decode classical nonlinear codes. For an n-qubit quantum code correcting errors on up to t qubits, this brute-force approach consecutively tests different errors of weight t or less and employs a separate n-qubit measurement in each test. In this article, we suggest an error grouping technique that allows one to simultaneously test large groups of errors in a single measurement. This structured error recovery technique exponentially reduces the number of measurements by about 3{sup t} times. While it still leaves exponentially many measurements for a generic CWS code, the technique is equivalent to syndrome-based recovery for the special case of additive CWS codes.

  9. Speech coding, reconstruction and recognition using acoustics and electromagnetic waves

    DOEpatents

    Holzrichter, J.F.; Ng, L.C.

    1998-03-17

    The use of EM radiation in conjunction with simultaneously recorded acoustic speech information enables a complete mathematical coding of acoustic speech. The methods include the forming of a feature vector for each pitch period of voiced speech and the forming of feature vectors for each time frame of unvoiced, as well as for combined voiced and unvoiced speech. The methods include how to deconvolve the speech excitation function from the acoustic speech output to describe the transfer function each time frame. The formation of feature vectors defining all acoustic speech units over well defined time frames can be used for purposes of speech coding, speech compression, speaker identification, language-of-speech identification, speech recognition, speech synthesis, speech translation, speech telephony, and speech teaching. 35 figs.

  10. Speech coding, reconstruction and recognition using acoustics and electromagnetic waves

    DOEpatents

    Holzrichter, John F.; Ng, Lawrence C.

    1998-01-01

    The use of EM radiation in conjunction with simultaneously recorded acoustic speech information enables a complete mathematical coding of acoustic speech. The methods include the forming of a feature vector for each pitch period of voiced speech and the forming of feature vectors for each time frame of unvoiced, as well as for combined voiced and unvoiced speech. The methods include how to deconvolve the speech excitation function from the acoustic speech output to describe the transfer function each time frame. The formation of feature vectors defining all acoustic speech units over well defined time frames can be used for purposes of speech coding, speech compression, speaker identification, language-of-speech identification, speech recognition, speech synthesis, speech translation, speech telephony, and speech teaching.

  11. Measuring Diagnoses: ICD Code Accuracy

    PubMed Central

    O'Malley, Kimberly J; Cook, Karon F; Price, Matt D; Wildes, Kimberly Raiford; Hurdle, John F; Ashton, Carol M

    2005-01-01

    Objective To examine potential sources of errors at each step of the described inpatient International Classification of Diseases (ICD) coding process. Data Sources/Study Setting The use of disease codes from the ICD has expanded from classifying morbidity and mortality information for statistical purposes to diverse sets of applications in research, health care policy, and health care finance. By describing a brief history of ICD coding, detailing the process for assigning codes, identifying where errors can be introduced into the process, and reviewing methods for examining code accuracy, we help code users more systematically evaluate code accuracy for their particular applications. Study Design/Methods We summarize the inpatient ICD diagnostic coding process from patient admission to diagnostic code assignment. We examine potential sources of errors at each step and offer code users a tool for systematically evaluating code accuracy. Principle Findings Main error sources along the “patient trajectory” include amount and quality of information at admission, communication among patients and providers, the clinician's knowledge and experience with the illness, and the clinician's attention to detail. Main error sources along the “paper trail” include variance in the electronic and written records, coder training and experience, facility quality-control efforts, and unintentional and intentional coder errors, such as misspecification, unbundling, and upcoding. Conclusions By clearly specifying the code assignment process and heightening their awareness of potential error sources, code users can better evaluate the applicability and limitations of codes for their particular situations. ICD codes can then be used in the most appropriate ways. PMID:16178999

  12. Nonparametric identification experiment

    NASA Technical Reports Server (NTRS)

    Yam, Yeung

    1988-01-01

    The following constitutes a summary of this paper: on-orbit identification methodology starts with nonparametric techniques for a priori system identification; development of the nonparametric identification and model determination experiment software has been completed; the validation experiments to be performed on the JPL Control and Identification Technology Validation Laboratory have been designed.

  13. Genetic code for sine

    NASA Astrophysics Data System (ADS)

    Abdullah, Alyasa Gan; Wah, Yap Bee

    2015-02-01

    The computation of the approximate values of the trigonometric sines was discovered by Bhaskara I (c. 600-c.680), a seventh century Indian mathematician and is known as the Bjaskara's I's sine approximation formula. The formula is given in his treatise titled Mahabhaskariya. In the 14th century, Madhava of Sangamagrama, a Kerala mathematician astronomer constructed the table of trigonometric sines of various angles. Madhava's table gives the measure of angles in arcminutes, arcseconds and sixtieths of an arcsecond. The search for more accurate formulas led to the discovery of the power series expansion by Madhava of Sangamagrama (c.1350-c. 1425), the founder of the Kerala school of astronomy and mathematics. In 1715, the Taylor series was introduced by Brook Taylor an English mathematician. If the Taylor series is centered at zero, it is called a Maclaurin series, named after the Scottish mathematician Colin Maclaurin. Some of the important Maclaurin series expansions include trigonometric functions. This paper introduces the genetic code of the sine of an angle without using power series expansion. The genetic code using square root approach reveals the pattern in the signs (plus, minus) and sequence of numbers in the sine of an angle. The square root approach complements the Pythagoras method, provides a better understanding of calculating an angle and will be useful for teaching the concepts of angles in trigonometry.

  14. Determinate-state convolutional codes

    NASA Technical Reports Server (NTRS)

    Collins, O.; Hizlan, M.

    1991-01-01

    A determinate state convolutional code is formed from a conventional convolutional code by pruning away some of the possible state transitions in the decoding trellis. The type of staged power transfer used in determinate state convolutional codes proves to be an extremely efficient way of enhancing the performance of a concatenated coding system. The decoder complexity is analyzed along with free distances of these new codes and extensive simulation results is provided of their performance at the low signal to noise ratios where a real communication system would operate. Concise, practical examples are provided.

  15. Coding for reliable satellite communications

    NASA Technical Reports Server (NTRS)

    Gaarder, N. T.; Lin, S.

    1986-01-01

    This research project was set up to study various kinds of coding techniques for error control in satellite and space communications for NASA Goddard Space Flight Center. During the project period, researchers investigated the following areas: (1) decoding of Reed-Solomon codes in terms of dual basis; (2) concatenated and cascaded error control coding schemes for satellite and space communications; (3) use of hybrid coding schemes (error correction and detection incorporated with retransmission) to improve system reliability and throughput in satellite communications; (4) good codes for simultaneous error correction and error detection, and (5) error control techniques for ring and star networks.

  16. Circular codes, symmetries and transformations.

    PubMed

    Fimmel, Elena; Giannerini, Simone; Gonzalez, Diego Luis; Strüngmann, Lutz

    2015-06-01

    Circular codes, putative remnants of primeval comma-free codes, have gained considerable attention in the last years. In fact they represent a second kind of genetic code potentially involved in detecting and maintaining the normal reading frame in protein coding sequences. The discovering of an universal code across species suggested many theoretical and experimental questions. However, there is a key aspect that relates circular codes to symmetries and transformations that remains to a large extent unexplored. In this article we aim at addressing the issue by studying the symmetries and transformations that connect different circular codes. The main result is that the class of 216 C3 maximal self-complementary codes can be partitioned into 27 equivalence classes defined by a particular set of transformations. We show that such transformations can be put in a group theoretic framework with an intuitive geometric interpretation. More general mathematical results about symmetry transformations which are valid for any kind of circular codes are also presented. Our results pave the way to the study of the biological consequences of the mathematical structure behind circular codes and contribute to shed light on the evolutionary steps that led to the observed symmetries of present codes. PMID:25008961

  17. dc-free coset codes

    NASA Technical Reports Server (NTRS)

    Deng, Robert H.; Herro, Mark A.

    1988-01-01

    A class of block coset codes with disparity and run-length constraints are studied. They are particularly well suited for high-speed optical fiber links and similar channels, where dc-free pulse formats, channel error control, and low-complexity encoder-decoder implementations are required. The codes are derived by partitioning linear block codes. The encoder and decoder structures are the same as those of linear block codes with only slight modifications. A special class of dc-free coset block codes are derived from BCH codes with specified bounds on minimum distance, disparity, and run length. The codes have low disparity levels (a small running digital sum) and good error-correcting capabilities.

  18. Permutation-invariant quantum codes

    NASA Astrophysics Data System (ADS)

    Ouyang, Yingkai

    2014-12-01

    A quantum code is a subspace of a Hilbert space of a physical system chosen to be correctable against a given class of errors, where information can be encoded. Ideally, the quantum code lies within the ground space of the physical system. When the physical model is the Heisenberg ferromagnet in the absence of an external magnetic field, the corresponding ground space contains all permutation-invariant states. We use techniques from combinatorics and operator theory to construct families of permutation-invariant quantum codes. These codes have length proportional to t2; one family of codes perfectly corrects arbitrary weight t errors, while the other family of codes approximately correct t spontaneous decay errors. The analysis of our codes' performance with respect to spontaneous decay errors utilizes elementary matrix analysis, where we revisit and extend the quantum error correction criterion of Knill and Laflamme, and Leung, Chuang, Nielsen and Yamamoto.

  19. Making your code citable with the Astrophysics Source Code Library

    NASA Astrophysics Data System (ADS)

    Allen, Alice; DuPrie, Kimberly; Schmidt, Judy; Berriman, G. Bruce; Hanisch, Robert J.; Mink, Jessica D.; Nemiroff, Robert J.; Shamir, Lior; Shortridge, Keith; Taylor, Mark B.; Teuben, Peter J.; Wallin, John F.

    2016-01-01

    The Astrophysics Source Code Library (ASCL, ascl.net) is a free online registry of codes used in astronomy research. With nearly 1,200 codes, it is the largest indexed resource for astronomy codes in existence. Established in 1999, it offers software authors a path to citation of their research codes even without publication of a paper describing the software, and offers scientists a way to find codes used in refereed publications, thus improving the transparency of the research. It also provides a method to quantify the impact of source codes in a fashion similar to the science metrics of journal articles. Citations using ASCL IDs are accepted by major astronomy journals and if formatted properly are tracked by ADS and other indexing services. The number of citations to ASCL entries increased sharply from 110 citations in January 2014 to 456 citations in September 2015. The percentage of code entries in ASCL that were cited at least once rose from 7.5% in January 2014 to 17.4% in September 2015. The ASCL's mid-2014 infrastructure upgrade added an easy entry submission form, more flexible browsing, search capabilities, and an RSS feeder for updates. A Changes/Additions form added this past fall lets authors submit links for papers that use their codes for addition to the ASCL entry even if those papers don't formally cite the codes, thus increasing the transparency of that research and capturing the value of their software to the community.

  20. Practices in Code Discoverability: Astrophysics Source Code Library

    NASA Astrophysics Data System (ADS)

    Allen, A.; Teuben, P.; Nemiroff, R. J.; Shamir, L.

    2012-09-01

    Here we describe the Astrophysics Source Code Library (ASCL), which takes an active approach to sharing astrophysics source code. ASCL's editor seeks out both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and adds entries for the found codes to the library. This approach ensures that source codes are added without requiring authors to actively submit them, resulting in a comprehensive listing that covers a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL now has over 340 codes in it and continues to grow. In 2011, the ASCL has on average added 19 codes per month. An advisory committee has been established to provide input and guide the development and expansion of the new site, and a marketing plan has been developed and is being executed. All ASCL source codes have been used to generate results published in or submitted to a refereed journal and are freely available either via a download site or from an identified source. This paper provides the history and description of the ASCL. It lists the requirements for including codes, examines the advantages of the ASCL, and outlines some of its future plans.

  1. Reliability of ICD-10 external cause of death codes in the National Coroners Information System.

    PubMed

    Bugeja, Lyndal; Clapperton, Angela J; Killian, Jessica J; Stephan, Karen L; Ozanne-Smith, Joan

    2010-01-01

    Availability of ICD-10 cause of death codes in the National Coroners Information System (NCIS) strengthens its value as a public health surveillance tool. This study quantified the completeness of external cause ICD-10 codes in the NCIS for Victorian deaths (as assigned by the Australian Bureau of Statistics (ABS) in the yearly Cause of Death data). It also examined the concordance between external cause ICD-10 codes contained in the NCIS and a re-code of the same deaths conducted by an independent coder. Of 7,400 NCIS external cause deaths included in this study, 961 (13.0%) did not contain an ABS assigned ICD-10 code and 225 (3.0%) contained only a natural cause code. Where an ABS assigned external cause ICD-10 code was present (n=6,214), 4,397 (70.8%) matched exactly with the independently assigned ICD-10 code. Coding disparity primarily related to differences in assignment of intent and specificity. However, in a small number of deaths (n=49, 0.8%) there was coding disparity for both intent and external cause category. NCIS users should be aware of the limitations of relying only on ICD-10 codes contained within the NCIS for deaths prior to 2007 and consider using these in combination with the other NCIS data fields and code sets to ensure optimum case identification. PMID:21041843

  2. CODING IN THE MAMMALIAN GUSTATORY SYSTEM

    PubMed Central

    Carleton, Alan; Accolla, Riccardo; Simon, Sidney A.

    2010-01-01

    To understand gustatory physiology and associated dysfunctions it is important to know how stimuli placed in the mouth are encoded both in the periphery and in taste-related brain centres. The identification of distinct taste receptors, together with electrophysiological recordings and behavioural assessments in response to taste stimuli, suggest that information about distinct taste modalities (e.g., sweet versus bitter) are transmitted from the periphery to the brain via segregated pathways. In contrast, gustatory neurons throughout the brain are more broadly tuned, indicating that ensembles of neurons encode taste qualities. Recent evidence reviewed here suggests that the coding of gustatory stimuli is not immutable, but is dependant on a variety of factors including appetite regulating molecules and associative learning. PMID:20493563

  3. A Code for Probabilistic Safety Assessment

    SciTech Connect

    1997-10-10

    An integrated fault-event tree software package PSAPACK was developed for level-1 PSA using personal computers. It is a menu driven interactive modular system which permits different choices, depending on the user's purposes and needs. The event tree development module is capable of developing the logic accident sequences based on the user's specified relations between event tree headings. Identification of success sequences and core damage sequences is done automatically by the code based on the success function input by the user. It links minimum cut sets (MCS) from system fault trees and performs the Boolean reduction. It can also retrieve data from the reliability data base to perform the quantification of accident sequences.

  4. A Code for Probabilistic Safety Assessment

    Energy Science and Technology Software Center (ESTSC)

    1997-10-10

    An integrated fault-event tree software package PSAPACK was developed for level-1 PSA using personal computers. It is a menu driven interactive modular system which permits different choices, depending on the user's purposes and needs. The event tree development module is capable of developing the logic accident sequences based on the user's specified relations between event tree headings. Identification of success sequences and core damage sequences is done automatically by the code based on the successmore » function input by the user. It links minimum cut sets (MCS) from system fault trees and performs the Boolean reduction. It can also retrieve data from the reliability data base to perform the quantification of accident sequences.« less

  5. Surface acoustic wave coding for orthogonal frequency coded devices

    NASA Technical Reports Server (NTRS)

    Malocha, Donald (Inventor); Kozlovski, Nikolai (Inventor)

    2011-01-01

    Methods and systems for coding SAW OFC devices to mitigate code collisions in a wireless multi-tag system. Each device producing plural stepped frequencies as an OFC signal with a chip offset delay to increase code diversity. A method for assigning a different OCF to each device includes using a matrix based on the number of OFCs needed and the number chips per code, populating each matrix cell with OFC chip, and assigning the codes from the matrix to the devices. The asynchronous passive multi-tag system includes plural surface acoustic wave devices each producing a different OFC signal having the same number of chips and including a chip offset time delay, an algorithm for assigning OFCs to each device, and a transceiver to transmit an interrogation signal and receive OFC signals in response with minimal code collisions during transmission.

  6. IMP: A performance code

    NASA Astrophysics Data System (ADS)

    Dauro, Vincent A., Sr.

    IMP (Integrated Mission Program) is a simulation language and code used to model present and future Earth, Moon, or Mars missions. The profile is user controlled through selection from a large menu of events and maneuvers. A Fehlberg 7/13 Runge-Kutta integrator with error and step size control is used to numerically integrate the differential equations of motion (DEQ) of three spacecraft, a main, a target, and an observer. Through selection, the DEQ's include guided thrust, oblate gravity, atmosphere drag, solar pressure, and Moon gravity effects. Guide parameters for thrust events and performance parameters of velocity changes (Delta-V) and propellant usage (maximum of five systems) are developed as needed. Print, plot, summary, and debug files are output.

  7. Electromagnetic particle simulation codes

    NASA Technical Reports Server (NTRS)

    Pritchett, P. L.

    1985-01-01

    Electromagnetic particle simulations solve the full set of Maxwell's equations. They thus include the effects of self-consistent electric and magnetic fields, magnetic induction, and electromagnetic radiation. The algorithms for an electromagnetic code which works directly with the electric and magnetic fields are described. The fields and current are separated into transverse and longitudinal components. The transverse E and B fields are integrated in time using a leapfrog scheme applied to the Fourier components. The particle pushing is performed via the relativistic Lorentz force equation for the particle momentum. As an example, simulation results are presented for the electron cyclotron maser instability which illustrate the importance of relativistic effects on the wave-particle resonance condition and on wave dispersion.

  8. Telescope Adaptive Optics Code

    SciTech Connect

    Phillion, D.

    2005-07-28

    The Telescope AO Code has general adaptive optics capabilities plus specialized models for three telescopes with either adaptive optics or active optics systems. It has the capability to generate either single-layer or distributed Kolmogorov turbulence phase screens using the FFT. Missing low order spatial frequencies are added using the Karhunen-Loeve expansion. The phase structure curve is extremely dose to the theoreUcal. Secondly, it has the capability to simulate an adaptive optics control systems. The default parameters are those of the Keck II adaptive optics system. Thirdly, it has a general wave optics capability to model the science camera halo due to scintillation from atmospheric turbulence and the telescope optics. Although this capability was implemented for the Gemini telescopes, the only default parameter specific to the Gemini telescopes is the primary mirror diameter. Finally, it has a model for the LSST active optics alignment strategy. This last model is highly specific to the LSST

  9. Transionospheric Propagation Code (TIPC)

    SciTech Connect

    Roussel-Dupre, R.; Kelley, T.A.

    1990-10-01

    The Transionospheric Propagation Code is a computer program developed at Los Alamos National Lab to perform certain tasks related to the detection of vhf signals following propagation through the ionosphere. The code is written in Fortran 77, runs interactively and was designed to be as machine independent as possible. A menu format in which the user is prompted to supply appropriate parameters for a given task has been adopted for the input while the output is primarily in the form of graphics. The user has the option of selecting from five basic tasks, namely transionospheric propagation, signal filtering, signal processing, DTOA study, and DTOA uncertainty study. For the first task a specified signal is convolved against the impulse response function of the ionosphere to obtain the transionospheric signal. The user is given a choice of four analytic forms for the input pulse or of supplying a tabular form. The option of adding Gaussian-distributed white noise of spectral noise to the input signal is also provided. The deterministic ionosphere is characterized to first order in terms of a total electron content (TEC) along the propagation path. In addition, a scattering model parameterized in terms of a frequency coherence bandwidth is also available. In the second task, detection is simulated by convolving a given filter response against the transionospheric signal. The user is given a choice of a wideband filter or a narrowband Gaussian filter. It is also possible to input a filter response. The third task provides for quadrature detection, envelope detection, and three different techniques for time-tagging the arrival of the transionospheric signal at specified receivers. The latter algorithms can be used to determine a TEC and thus take out the effects of the ionosphere to first order. Task four allows the user to construct a table of delta-times-of-arrival (DTOAs) vs TECs for a specified pair of receivers.

  10. Transionospheric Propagation Code (TIPC)

    NASA Astrophysics Data System (ADS)

    Roussel-Dupre, Robert; Kelley, Thomas A.

    1990-10-01

    The Transionospheric Propagation Code is a computer program developed at Los Alamos National Lab to perform certain tasks related to the detection of VHF signals following propagation through the ionosphere. The code is written in FORTRAN 77, runs interactively and was designed to be as machine independent as possible. A menu format in which the user is prompted to supply appropriate parameters for a given task has been adopted for the input while the output is primarily in the form of graphics. The user has the option of selecting from five basic tasks, namely transionospheric propagation, signal filtering, signal processing, delta times of arrival (DTOA) study, and DTOA uncertainty study. For the first task a specified signal is convolved against the impulse response function of the ionosphere to obtain the transionospheric signal. The user is given a choice of four analytic forms for the input pulse or of supplying a tabular form. The option of adding Gaussian-distributed white noise of spectral noise to the input signal is also provided. The deterministic ionosphere is characterized to first order in terms of a total electron content (TEC) along the propagation path. In addition, a scattering model parameterized in terms of a frequency coherence bandwidth is also available. In the second task, detection is simulated by convolving a given filter response against the transionospheric signal. The user is given a choice of a wideband filter or a narrowband Gaussian filter. It is also possible to input a filter response. The third task provides for quadrature detection, envelope detection, and three different techniques for time-tagging the arrival of the transionospheric signal at specified receivers. The latter algorithms can be used to determine a TEC and thus take out the effects of the ionosphere to first order. Task four allows the user to construct a table of DTOAs vs TECs for a specified pair of receivers.

  11. Diagonal Eigenvalue Unity (DEU) code for spectral amplitude coding-optical code division multiple access

    NASA Astrophysics Data System (ADS)

    Ahmed, Hassan Yousif; Nisar, K. S.

    2013-08-01

    Code with ideal in-phase cross correlation (CC) and practical code length to support high number of users are required in spectral amplitude coding-optical code division multiple access (SAC-OCDMA) systems. SAC systems are getting more attractive in the field of OCDMA because of its ability to eliminate the influence of multiple access interference (MAI) and also suppress the effect of phase induced intensity noise (PIIN). In this paper, we have proposed new Diagonal Eigenvalue Unity (DEU) code families with ideal in-phase CC based on Jordan block matrix with simple algebraic ways. Four sets of DEU code families based on the code weight W and number of users N for the combination (even, even), (even, odd), (odd, odd) and (odd, even) are constructed. This combination gives DEU code more flexibility in selection of code weight and number of users. These features made this code a compelling candidate for future optical communication systems. Numerical results show that the proposed DEU system outperforms reported codes. In addition, simulation results taken from a commercial optical systems simulator, Virtual Photonic Instrument (VPI™) shown that, using point to multipoint transmission in passive optical network (PON), DEU has better performance and could support long span with high data rate.

  12. Some easily analyzable convolutional codes

    NASA Technical Reports Server (NTRS)

    Mceliece, R.; Dolinar, S.; Pollara, F.; Vantilborg, H.

    1989-01-01

    Convolutional codes have played and will play a key role in the downlink telemetry systems on many NASA deep-space probes, including Voyager, Magellan, and Galileo. One of the chief difficulties associated with the use of convolutional codes, however, is the notorious difficulty of analyzing them. Given a convolutional code as specified, say, by its generator polynomials, it is no easy matter to say how well that code will perform on a given noisy channel. The usual first step in such an analysis is to computer the code's free distance; this can be done with an algorithm whose complexity is exponential in the code's constraint length. The second step is often to calculate the transfer function in one, two, or three variables, or at least a few terms in its power series expansion. This step is quite hard, and for many codes of relatively short constraint lengths, it can be intractable. However, a large class of convolutional codes were discovered for which the free distance can be computed by inspection, and for which there is a closed-form expression for the three-variable transfer function. Although for large constraint lengths, these codes have relatively low rates, they are nevertheless interesting and potentially useful. Furthermore, the ideas developed here to analyze these specialized codes may well extend to a much larger class.

  13. Oil and gas field code master list 1997

    SciTech Connect

    1998-02-01

    The Oil and Gas Field Code Master List 1997 is the sixteenth annual listing of all identified oil and gas fields in the US. It is updated with field information collected through October 1997. The purpose of this publication is to provide unique, standardized codes for identification of domestic fields. Use of these field codes fosters consistency of field identification by government and industry. As a result of their widespread adoption they have in effect become a national standard. The use of field names and codes listed in this publication is required on survey forms and other reports regarding field-specific data collected by EIA. There are 58,366 field records in this year`s FCML, 437 more than last year. The FCML includes: field records for each State and county in which a field resides; field records for each offshore area block in the Gulf of Mexico in which a field resides; field records for each alias field name (definition of alias is listed); fields crossing State boundaries that may be assigned different names by the respective State naming authorities. This report also contains an Invalid Field Record List of 4 records that have been removed from the FCML since last year`s report. These records were found to be either technically incorrect or to represent field names which were never recognized by State naming authorities.

  14. n-Nucleotide circular codes in graph theory.

    PubMed

    Fimmel, Elena; Michel, Christian J; Strüngmann, Lutz

    2016-03-13

    The circular code theory proposes that genes are constituted of two trinucleotide codes: the classical genetic code with 61 trinucleotides for coding the 20 amino acids (except the three stop codons {TAA,TAG,TGA}) and a circular code based on 20 trinucleotides for retrieving, maintaining and synchronizing the reading frame. It relies on two main results: the identification of a maximal C(3) self-complementary trinucleotide circular code X in genes of bacteria, eukaryotes, plasmids and viruses (Michel 2015 J. Theor. Biol. 380, 156-177. (doi:10.1016/j.jtbi.2015.04.009); Arquès & Michel 1996 J. Theor. Biol. 182, 45-58. (doi:10.1006/jtbi.1996.0142)) and the finding of X circular code motifs in tRNAs and rRNAs, in particular in the ribosome decoding centre (Michel 2012 Comput. Biol. Chem. 37, 24-37. (doi:10.1016/j.compbiolchem.2011.10.002); El Soufi & Michel 2014 Comput. Biol. Chem. 52, 9-17. (doi:10.1016/j.compbiolchem.2014.08.001)). The univerally conserved nucleotides A1492 and A1493 and the conserved nucleotide G530 are included in X circular code motifs. Recently, dinucleotide circular codes were also investigated (Michel & Pirillo 2013 ISRN Biomath. 2013, 538631. (doi:10.1155/2013/538631); Fimmel et al. 2015 J. Theor. Biol. 386, 159-165. (doi:10.1016/j.jtbi.2015.08.034)). As the genetic motifs of different lengths are ubiquitous in genes and genomes, we introduce a new approach based on graph theory to study in full generality n-nucleotide circular codes X, i.e. of length 2 (dinucleotide), 3 (trinucleotide), 4 (tetranucleotide), etc. Indeed, we prove that an n-nucleotide code X is circular if and only if the corresponding graph [Formula: see text] is acyclic. Moreover, the maximal length of a path in [Formula: see text] corresponds to the window of nucleotides in a sequence for detecting the correct reading frame. Finally, the graph theory of tournaments is applied to the study of dinucleotide circular codes. It has full equivalence between the combinatorics

  15. Colour coding scrubs as a means of improving perioperative communication.

    PubMed

    Litak, Dominika

    2011-05-01

    Effective communication within the operating department is essential for achieving patient safety. A large part of the perioperative communication is non-verbal. One type of non-verbal communication is 'object communication', the most common form of which is clothing. The colour coding of clothing such as scrubs has the potential to optimise perioperative communication with the patients and between the staff. A colour contains a coded message, and is a visual cue for an immediate identification of personnel. This is of key importance in the perioperative environment. The idea of colour coded scrubs in the perioperative setting has not been much explored to date and, given the potential contributiontowards improvement of patient outcomes, deserves consideration. PMID:21834289

  16. Toward the Automated Generation of Components from Existing Source Code

    SciTech Connect

    Quinlan, D; Yi, Q; Kumfert, G; Epperly, T; Dahlgren, T; Schordan, M; White, B

    2004-12-02

    A major challenge to achieving widespread use of software component technology in scientific computing is an effective migration strategy for existing, or legacy, source code. This paper describes initial work and challenges in automating the identification and generation of components using the ROSE compiler infrastructure and the Babel language interoperability tool. Babel enables calling interfaces expressed in the Scientific Interface Definition Language (SIDL) to be implemented in, and called from, an arbitrary combination of supported languages. ROSE is used to build specialized source-to-source translators that (1) extract a SIDL interface specification from information implicit in existing C++ source code and (2) transform Babel's output to include dispatches to the legacy code.

  17. Two-dimensional QR-coded metamaterial absorber

    NASA Astrophysics Data System (ADS)

    Sui, Sai; Ma, Hua; Wang, Jiafu; Pang, Yongqiang; Zhang, Jieqiu; Qu, Shaobo

    2016-01-01

    In this paper, the design of metamaterial absorbers is proposed based on QR coding and topology optimization. Such absorbers look like QR codes and can be recognized by decoding softwares as well as mobile phones. To verify the design, two lightweight wideband absorbers are designed, which can achieve wideband absorption above 90 % in 6.68-19.30 and 7.00-19.70 GHz, respectively. More importantly, polarization-independent absorption over 90 % can be maintained under incident angle within 55°. The QR code absorber not only can achieve wideband absorption, but also can carry information such as texts and Web sites. They are of important values in applications such identification and electromagnetic protection.

  18. Survey of computer codes applicable to waste facility performance evaluations

    SciTech Connect

    Alsharif, M.; Pung, D.L.; Rivera, A.L.; Dole, L.R.

    1988-01-01

    This study is an effort to review existing information that is useful to develop an integrated model for predicting the performance of a radioactive waste facility. A summary description of 162 computer codes is given. The identified computer programs address the performance of waste packages, waste transport and equilibrium geochemistry, hydrological processes in unsaturated and saturated zones, and general waste facility performance assessment. Some programs also deal with thermal analysis, structural analysis, and special purposes. A number of these computer programs are being used by the US Department of Energy, the US Nuclear Regulatory Commission, and their contractors to analyze various aspects of waste package performance. Fifty-five of these codes were identified as being potentially useful on the analysis of low-level radioactive waste facilities located above the water table. The code summaries include authors, identification data, model types, and pertinent references. 14 refs., 5 tabs.

  19. Intellectual system of identification of Arabic graphics

    NASA Astrophysics Data System (ADS)

    Abdoullayeva, Gulchin G.; Aliyev, Telman A.; Gurbanova, Nazakat G.

    2001-08-01

    The studies made by using the domain of graphic images allowed creating facilities of the artificial intelligence for letters, letter combinations etc. for various graphics and prints. The work proposes a system of recognition and identification of symbols of the Arabic graphics, which has its own specificity as compared to Latin and Cyrillic ones. The starting stage of the recognition and the identification is coding with further entry of information into a computer. Here the problem of entry is one of the essentials. For entry of a large volume of information in the unit of time a scanner is usually employed. Along with the scanner the authors suggest their elaboration of technical facilities for effective input and coding of the information. For refinement of symbols not identified from the scanner mostly for a small bulk of information the developed coding devices are used directly in the process of writing. The functional design of the software is elaborated on the basis of the heuristic model of the creative activity of a researcher and experts in the description and estimation of states of the weakly formalizable systems on the strength of the methods of identification and of selection of geometric features.

  20. Nonlinear, nonbinary cyclic group codes

    NASA Technical Reports Server (NTRS)

    Solomon, G.

    1992-01-01

    New cyclic group codes of length 2(exp m) - 1 over (m - j)-bit symbols are introduced. These codes can be systematically encoded and decoded algebraically. The code rates are very close to Reed-Solomon (RS) codes and are much better than Bose-Chaudhuri-Hocquenghem (BCH) codes (a former alternative). The binary (m - j)-tuples are identified with a subgroup of the binary m-tuples which represents the field GF(2 exp m). Encoding is systematic and involves a two-stage procedure consisting of the usual linear feedback register (using the division or check polynomial) and a small table lookup. For low rates, a second shift-register encoding operation may be invoked. Decoding uses the RS error-correcting procedures for the m-tuple codes for m = 4, 5, and 6.

  1. QR code for medical information uses.

    PubMed

    Fontelo, Paul; Liu, Fang; Ducut, Erick G

    2008-01-01

    We developed QR code online tools, simulated and tested QR code applications for medical information uses including scanning QR code labels, URLs and authentication. Our results show possible applications for QR code in medicine. PMID:18998785

  2. Explosive Formulation Code Naming SOP

    SciTech Connect

    Martz, H. E.

    2014-09-19

    The purpose of this SOP is to provide a procedure for giving individual HME formulations code names. A code name for an individual HME formulation consists of an explosive family code, given by the classified guide, followed by a dash, -, and a number. If the formulation requires preparation such as packing or aging, these add additional groups of symbols to the X-ray specimen name.

  3. Bar-Code-Scribing Tool

    NASA Technical Reports Server (NTRS)

    Badinger, Michael A.; Drouant, George J.

    1991-01-01

    Proposed hand-held tool applies indelible bar code to small parts. Possible to identify parts for management of inventory without tags or labels. Microprocessor supplies bar-code data to impact-printer-like device. Device drives replaceable scribe, which cuts bar code on surface of part. Used to mark serially controlled parts for military and aerospace equipment. Also adapts for discrete marking of bulk items used in food and pharmaceutical processing.

  4. Turbo Codes for PCS Applications

    NASA Technical Reports Server (NTRS)

    Divsalar, D.; Pollara, F.

    1995-01-01

    A number of the claims for turbo codes as a great advance in coding theory are confirmed, and a complete description is presented of an encoder/decoder pair that could be suitable for PCS applications. A new simple method for trellis termination is described, the effect of interleaver choice on the weight distribution of the code is analyzed, and unequal rate components (which yield better performance) are introduced.

  5. Mean-based neural coding of voices.

    PubMed

    Andics, Attila; McQueen, James M; Petersson, Karl Magnus

    2013-10-01

    The social significance of recognizing the person who talks to us is obvious, but the neural mechanisms that mediate talker identification are unclear. Regions along the bilateral superior temporal sulcus (STS) and the inferior frontal cortex (IFC) of the human brain are selective for voices, and they are sensitive to rapid voice changes. Although it has been proposed that voice recognition is supported by prototype-centered voice representations, the involvement of these category-selective cortical regions in the neural coding of such "mean voices" has not previously been demonstrated. Using fMRI in combination with a voice identity learning paradigm, we show that voice-selective regions are involved in the mean-based coding of voice identities. Voice typicality is encoded on a supra-individual level in the right STS along a stimulus-dependent, identity-independent (i.e., voice-acoustic) dimension, and on an intra-individual level in the right IFC along a stimulus-independent, identity-dependent (i.e., voice identity) dimension. Voice recognition therefore entails at least two anatomically separable stages, each characterized by neural mechanisms that reference the central tendencies of voice categories. PMID:23664949

  6. The FLUKA Code: an Overview

    SciTech Connect

    Ballarini, F.; Battistoni, G.; Campanella, M.; Carboni, M.; Cerutti, F.; Empl, A.; Fasso, A.; Ferrari, A.; Gadioli, E.; Garzelli, M.V.; Lantz, M.; Liotta, M.; Mairani, A.; Mostacci, A.; Muraro, S.; Ottolenghi, A.; Pelliccioni, M.; Pinsky, L.; Ranft, J.; Roesler, S.; Sala, P.R.; /Milan U. /INFN, Milan /Pavia U. /INFN, Pavia /CERN /Siegen U. /Houston U. /SLAC /Frascati /NASA, Houston /ENEA, Frascati

    2005-11-09

    FLUKA is a multipurpose Monte Carlo code which can transport a variety of particles over a wide energy range in complex geometries. The code is a joint project of INFN and CERN: part of its development is also supported by the University of Houston and NASA. FLUKA is successfully applied in several fields, including but not only, particle physics, cosmic ray physics, dosimetry, radioprotection, hadron therapy, space radiation, accelerator design and neutronics. The code is the standard tool used at CERN for dosimetry, radioprotection and beam-machine interaction studies. Here we give a glimpse into the code physics models with a particular emphasis to the hadronic and nuclear sector.

  7. Implementation issues in source coding

    NASA Technical Reports Server (NTRS)

    Sayood, Khalid; Chen, Yun-Chung; Hadenfeldt, A. C.

    1989-01-01

    An edge preserving image coding scheme which can be operated in both a lossy and a lossless manner was developed. The technique is an extension of the lossless encoding algorithm developed for the Mars observer spectral data. It can also be viewed as a modification of the DPCM algorithm. A packet video simulator was also developed from an existing modified packet network simulator. The coding scheme for this system is a modification of the mixture block coding (MBC) scheme described in the last report. Coding algorithms for packet video were also investigated.

  8. The FLUKA Code: An Overview

    NASA Technical Reports Server (NTRS)

    Ballarini, F.; Battistoni, G.; Campanella, M.; Carboni, M.; Cerutti, F.; Empl, A.; Fasso, A.; Ferrari, A.; Gadioli, E.; Garzelli, M. V.; Lantz, M.; Liotta, M.; Mairani, A.; Mostacci, A.; Muraro, S.; Ottolenghi, A.; Pelliccioni, M.; Pinsky, L.; Ranft, J.; Roesler, S.; Sala, P. R.; Scannicchio, D.; Trovati, S.; Villari, R.; Wilson, T.

    2006-01-01

    FLUKA is a multipurpose Monte Carlo code which can transport a variety of particles over a wide energy range in complex geometries. The code is a joint project of INFN and CERN: part of its development is also supported by the University of Houston and NASA. FLUKA is successfully applied in several fields, including but not only, particle physics, cosmic ray physics, dosimetry, radioprotection, hadron therapy, space radiation, accelerator design and neutronics. The code is the standard tool used at CERN for dosimetry, radioprotection and beam-machine interaction studies. Here we give a glimpse into the code physics models with a particular emphasis to the hadronic and nuclear sector.

  9. Multilevel codes and multistage decoding

    NASA Astrophysics Data System (ADS)

    Calderbank, A. R.

    1989-03-01

    Imai and Hirakawa have proposed (1977) a multilevel coding method based on binary block codes that admits a staged decoding procedure. Here the coding method is extended to coset codes and it is shown how to calculate minimum squared distance and path multiplicity in terms of the norms and multiplicities of the different cosets. The multilevel structure allows the redundancy in the coset selection procedure to be allocated efficiently among the different levels. It also allows the use of suboptimal multistage decoding procedures that have performance/complexity advantages over maximum-likelihood decoding.

  10. Astrophysics Source Code Library Enhancements

    NASA Astrophysics Data System (ADS)

    Hanisch, R. J.; Allen, A.; Berriman, G. B.; DuPrie, K.; Mink, J.; Nemiroff, R. J.; Schmidt, J.; Shamir, L.; Shortridge, K.; Taylor, M.; Teuben, P. J.; Wallin, J.

    2015-09-01

    The Astrophysics Source Code Library (ASCL)1 is a free online registry of codes used in astronomy research; it currently contains over 900 codes and is indexed by ADS. The ASCL has recently moved a new infrastructure into production. The new site provides a true database for the code entries and integrates the WordPress news and information pages and the discussion forum into one site. Previous capabilities are retained and permalinks to ascl.net continue to work. This improvement offers more functionality and flexibility than the previous site, is easier to maintain, and offers new possibilities for collaboration. This paper covers these recent changes to the ASCL.

  11. Golay and other box codes

    NASA Technical Reports Server (NTRS)

    Solomon, G.

    1992-01-01

    The (24,12;8) extended Golay Code can be generated as a 6x4 binary matrix from the (15,11;3) BCH-Hamming Code, represented as a 5 x 3 matrix, by adding a row and a column, both of odd or even parity. The odd-parity case provides the additional 12th dimension. Furthermore, any three columns and five rows of the 6 x 4 Golay form a BCH-Hamming (15,11;3) Code. Similarly a (80,58;8) code can be generated as a 10 x 8 binary matrix from the (63,57;3) BCH-Hamming Code represented as a 9 x 7 matrix by adding a row and a column both of odd and even parity. Furthermore, any seven columns along with the top nine rows is a BCH-Hamming (63,57;3) Code. A (80,40;16) 10 x 8 matrix binary code with weight structure identical to the extended (80,40;16) Quadratic Residue Code is generated from a (63,39;7) binary cyclic code represented as a 9 x 7 matrix, by adding a row and a column, both of odd or even parity.

  12. Golay and other box codes

    NASA Technical Reports Server (NTRS)

    Solomon, G.

    1992-01-01

    The (24,12;8) extended Golay Code can be generated as a 6 x 4 binary matrix from the (15,11;3) BCH-Hamming Code, represented as a 5 x 3 matrix, by adding a row and a column, both of odd or even parity. The odd-parity case provides the additional 12th dimension. Furthermore, any three columns and five rows of the 6 x 4 Golay form a BCH-Hamming (15,11;3) Code. Similarly a (80,58;8) code can be generated as a 10 x 8 binary matrix from the (63,57;3) BCH-Hamming Code represented as a 9 x 7 matrix by adding a row and a column both of odd and even parity. Furthermore, any seven columns along with the top nine rows is a BCH-Hamming (53,57;3) Code. A (80,40;16) 10 x 8 matrix binary code with weight structure identical to the extended (80,40;16) Quadratic Residue Code is generated from a (63,39;7) binary cyclic code represented as a 9 x 7 matrix, by adding a row and a column, both of odd or even parity.

  13. High Order Modulation Protograph Codes

    NASA Technical Reports Server (NTRS)

    Nguyen, Thuy V. (Inventor); Nosratinia, Aria (Inventor); Divsalar, Dariush (Inventor)

    2014-01-01

    Digital communication coding methods for designing protograph-based bit-interleaved code modulation that is general and applies to any modulation. The general coding framework can support not only multiple rates but also adaptive modulation. The method is a two stage lifting approach. In the first stage, an original protograph is lifted to a slightly larger intermediate protograph. The intermediate protograph is then lifted via a circulant matrix to the expected codeword length to form a protograph-based low-density parity-check code.

  14. Parallelization of the SIR code

    NASA Astrophysics Data System (ADS)

    Thonhofer, S.; Bellot Rubio, L. R.; Utz, D.; Jurčak, J.; Hanslmeier, A.; Piantschitsch, I.; Pauritsch, J.; Lemmerer, B.; Guttenbrunner, S.

    A high-resolution 3-dimensional model of the photospheric magnetic field is essential for the investigation of small-scale solar magnetic phenomena. The SIR code is an advanced Stokes-inversion code that deduces physical quantities, e.g. magnetic field vector, temperature, and LOS velocity, from spectropolarimetric data. We extended this code by the capability of directly using large data sets and inverting the pixels in parallel. Due to this parallelization it is now feasible to apply the code directly on extensive data sets. Besides, we included the possibility to use different initial model atmospheres for the inversion, which enhances the quality of the results.

  15. FORTRAN Automated Code Evaluation System (faces) system documentation, version 2, mod 0. [error detection codes/user manuals (computer programs)

    NASA Technical Reports Server (NTRS)

    1975-01-01

    A system is presented which processes FORTRAN based software systems to surface potential problems before they become execution malfunctions. The system complements the diagnostic capabilities of compilers, loaders, and execution monitors rather than duplicating these functions. Also, it emphasizes frequent sources of FORTRAN problems which require inordinate manual effort to identify. The principle value of the system is extracting small sections of unusual code from the bulk of normal sequences. Code structures likely to cause immediate or future problems are brought to the user's attention. These messages stimulate timely corrective action of solid errors and promote identification of 'tricky' code. Corrective action may require recoding or simply extending software documentation to explain the unusual technique.

  16. Patched Conic Trajectory Code

    NASA Technical Reports Server (NTRS)

    Park, Brooke Anderson; Wright, Henry

    2012-01-01

    PatCon code was developed to help mission designers run trade studies on launch and arrival times for any given planet. Initially developed in Fortran, the required inputs included launch date, arrival date, and other orbital parameters of the launch planet and arrival planets at the given dates. These parameters include the position of the planets, the eccentricity, semi-major axes, argument of periapsis, ascending node, and inclination of the planets. With these inputs, a patched conic approximation is used to determine the trajectory. The patched conic approximation divides the planetary mission into three parts: (1) the departure phase, in which the two relevant bodies are Earth and the spacecraft, and where the trajectory is a departure hyperbola with Earth at the focus; (2) the cruise phase, in which the two bodies are the Sun and the spacecraft, and where the trajectory is a transfer ellipse with the Sun at the focus; and (3) the arrival phase, in which the two bodies are the target planet and the spacecraft, where the trajectory is an arrival hyperbola with the planet as the focus.

  17. Telescope Adaptive Optics Code

    Energy Science and Technology Software Center (ESTSC)

    2005-07-28

    The Telescope AO Code has general adaptive optics capabilities plus specialized models for three telescopes with either adaptive optics or active optics systems. It has the capability to generate either single-layer or distributed Kolmogorov turbulence phase screens using the FFT. Missing low order spatial frequencies are added using the Karhunen-Loeve expansion. The phase structure curve is extremely dose to the theoreUcal. Secondly, it has the capability to simulate an adaptive optics control systems. The defaultmore » parameters are those of the Keck II adaptive optics system. Thirdly, it has a general wave optics capability to model the science camera halo due to scintillation from atmospheric turbulence and the telescope optics. Although this capability was implemented for the Gemini telescopes, the only default parameter specific to the Gemini telescopes is the primary mirror diameter. Finally, it has a model for the LSST active optics alignment strategy. This last model is highly specific to the LSST« less

  18. EMPLACEMENT GANTRY ITS STANDARDS IDENTIFICATION STUDY

    SciTech Connect

    M. Voegele

    2005-04-06

    To date, the project has established ITS performance requirements for SSCs based on identification and categorization of event sequences that may result in a radiological release. These performance requirements are defined within the NSDB. Further, SSCs credited with performing safe functions are classified as ITS. In turn, perform confirmation for these SSCs is sought through the use of consensus code and standards. The purpose of this study is to identify applicable codes and standards for the WP Emplacement Gantry ITS SSCs. Further, this study will form the basis for selection and the extent of applicability of each code and standard. This study is based on the design development completed for LA only. Accordingly, identification of ITS SSCs beyond those defined within the NSDB are based on designs that may be subject to further development during detail design. Furthermore, several design alternatives may still be under consideration to satisfy certain safety functions, and that final selection will not be determined until further design development has occurred. Therefore, for completeness, throughout this study alternative designs currently under considered will be discussed. Further, the results of this study will be subject to evaluation as part of a follow-on GAP analysis study. Based on the results of this study the GAP analysis will evaluate each code and standard to ensure each ITS performance requirement is fully satisfied. When a performance requirement is not fully satisfied a ''gap'' is highlighted. Thereafter, the study will identify supplemental requirements to augment the code or standard to meet performance requirements. Further, the GAP analysis will identify non-standard areas of the design that will be subject to a Development Plan. Non-standard components and non-standard design configurations are defined as areas of the design that do not follow standard industry practices or codes and standards. Whereby, performance confirmation cannot be

  19. Weighted SAW reflector gratings for orthogonal frequency coded SAW tags and sensors

    NASA Technical Reports Server (NTRS)

    Puccio, Derek (Inventor); Malocha, Donald (Inventor)

    2011-01-01

    Weighted surface acoustic wave reflector gratings for coding identification tags and sensors to enable unique sensor operation and identification for a multi-sensor environment. In an embodiment, the weighted reflectors are variable while in another embodiment the reflector gratings are apodized. The weighting technique allows the designer to decrease reflectively and allows for more chips to be implemented in a device and, consequently, more coding diversity. As a result, more tags and sensors can be implemented using a given bandwidth when compared with uniform reflectors. Use of weighted reflector gratings with OFC makes various phase shifting schemes possible, such as in-phase and quadrature implementations of coded waveforms resulting in reduced device size and increased coding.

  20. Error coding simulations in C

    NASA Technical Reports Server (NTRS)

    Noble, Viveca K.

    1994-01-01

    When data is transmitted through a noisy channel, errors are produced within the data rendering it indecipherable. Through the use of error control coding techniques, the bit error rate can be reduced to any desired level without sacrificing the transmission data rate. The Astrionics Laboratory at Marshall Space Flight Center has decided to use a modular, end-to-end telemetry data simulator to simulate the transmission of data from flight to ground and various methods of error control. The simulator includes modules for random data generation, data compression, Consultative Committee for Space Data Systems (CCSDS) transfer frame formation, error correction/detection, error generation and error statistics. The simulator utilizes a concatenated coding scheme which includes CCSDS standard (255,223) Reed-Solomon (RS) code over GF(2(exp 8)) with interleave depth of 5 as the outermost code, (7, 1/2) convolutional code as an inner code and CCSDS recommended (n, n-16) cyclic redundancy check (CRC) code as the innermost code, where n is the number of information bits plus 16 parity bits. The received signal-to-noise for a desired bit error rate is greatly reduced through the use of forward error correction techniques. Even greater coding gain is provided through the use of a concatenated coding scheme. Interleaving/deinterleaving is necessary to randomize burst errors which may appear at the input of the RS decoder. The burst correction capability length is increased in proportion to the interleave depth. The modular nature of the simulator allows for inclusion or exclusion of modules as needed. This paper describes the development and operation of the simulator, the verification of a C-language Reed-Solomon code, and the possibility of using Comdisco SPW(tm) as a tool for determining optimal error control schemes.

  1. Error coding simulations in C

    NASA Astrophysics Data System (ADS)

    Noble, Viveca K.

    1994-10-01

    When data is transmitted through a noisy channel, errors are produced within the data rendering it indecipherable. Through the use of error control coding techniques, the bit error rate can be reduced to any desired level without sacrificing the transmission data rate. The Astrionics Laboratory at Marshall Space Flight Center has decided to use a modular, end-to-end telemetry data simulator to simulate the transmission of data from flight to ground and various methods of error control. The simulator includes modules for random data generation, data compression, Consultative Committee for Space Data Systems (CCSDS) transfer frame formation, error correction/detection, error generation and error statistics. The simulator utilizes a concatenated coding scheme which includes CCSDS standard (255,223) Reed-Solomon (RS) code over GF(2(exp 8)) with interleave depth of 5 as the outermost code, (7, 1/2) convolutional code as an inner code and CCSDS recommended (n, n-16) cyclic redundancy check (CRC) code as the innermost code, where n is the number of information bits plus 16 parity bits. The received signal-to-noise for a desired bit error rate is greatly reduced through the use of forward error correction techniques. Even greater coding gain is provided through the use of a concatenated coding scheme. Interleaving/deinterleaving is necessary to randomize burst errors which may appear at the input of the RS decoder. The burst correction capability length is increased in proportion to the interleave depth. The modular nature of the simulator allows for inclusion or exclusion of modules as needed. This paper describes the development and operation of the simulator, the verification of a C-language Reed-Solomon code, and the possibility of using Comdisco SPW(tm) as a tool for determining optimal error control schemes.

  2. Coding in pigeons: Multiple-coding versus single-code/default strategies.

    PubMed

    Pinto, Carlos; Machado, Armando

    2015-05-01

    To investigate the coding strategies that pigeons may use in a temporal discrimination tasks, pigeons were trained on a matching-to-sample procedure with three sample durations (2s, 6s and 18s) and two comparisons (red and green hues). One comparison was correct following 2-s samples and the other was correct following both 6-s and 18-s samples. Tests were then run to contrast the predictions of two hypotheses concerning the pigeons' coding strategies, the multiple-coding and the single-code/default. According to the multiple-coding hypothesis, three response rules are acquired, one for each sample. According to the single-code/default hypothesis, only two response rules are acquired, one for the 2-s sample and a "default" rule for any other duration. In retention interval tests, pigeons preferred the "default" key, a result predicted by the single-code/default hypothesis. In no-sample tests, pigeons preferred the key associated with the 2-s sample, a result predicted by multiple-coding. Finally, in generalization tests, when the sample duration equaled 3.5s, the geometric mean of 2s and 6s, pigeons preferred the key associated with the 6-s and 18-s samples, a result predicted by the single-code/default hypothesis. The pattern of results suggests the need for models that take into account multiple sources of stimulus control. PMID:25894105

  3. Atypical Forensic Dental Identifications.

    PubMed

    Cardoza, Anthony R; Wood, James D

    2015-06-01

    Forensic dental identification specialists are typically the last conventional option for postmortem identification. Forensic dental identification is most often accomplished by comparing radiographs of the decedent's teeth with the dental radiographs obtained from the dentist of the suspected victim. Unfortunately, antemortem dental radiographs are not always available. When presented with this challenge, the authors of this article have been successful in completing identifications using means other than dental radiographic comparison. PMID:26126345

  4. Code to generate random identifiers and select QA/QC samples

    USGS Publications Warehouse

    Mehnert, Edward

    1992-01-01

    SAMPLID is a PC-based, FORTRAN-77 code which generates unique numbers for identification of samples, selection of QA/QC samples, and generation of labels. These procedures are tedious, but using a computer code such as SAMPLID can increase efficiency and reduce or eliminate errors and bias. The algorithm, used in SAMPLID, for generation of pseudorandom numbers is free of statistical flaws present in commonly available algorithms.

  5. Indices for Testing Neural Codes

    PubMed Central

    Victor, Jonathan D.; Nirenberg, Sheila

    2009-01-01

    One of the most critical challenges in systems neuroscience is determining the neural code. A principled framework for addressing this can be found in information theory. With this approach, one can determine whether a proposed code can account for the stimulus-response relationship. Specifically, one can compare the transmitted information between the stimulus and the hypothesized neural code with the transmitted information between the stimulus and the behavioral response. If the former is smaller than the latter (i.e., if the code cannot account for the behavior), the code can be ruled out. The information-theoretic index most widely used in this context is Shannon’s mutual information. The Shannon test, however, is not ideal for this purpose: while the codes it will rule out are truly nonviable, there will be some nonviable codes that it will fail to rule out. Here we describe a wide range of alternative indices that can be used for ruling codes out. The range includes a continuum from Shannon information to measures of the performance of a Bayesian decoder. We analyze the relationship of these indices to each other and their complementary strengths and weaknesses for addressing this problem. PMID:18533812

  6. Accelerator Physics Code Web Repository

    SciTech Connect

    Zimmermann, F.; Basset, R.; Bellodi, G.; Benedetto, E.; Dorda, U.; Giovannozzi, M.; Papaphilippou, Y.; Pieloni, T.; Ruggiero, F.; Rumolo, G.; Schmidt, F.; Todesco, E.; Zotter, B.W.; Payet, J.; Bartolini, R.; Farvacque, L.; Sen, T.; Chin, Y.H.; Ohmi, K.; Oide, K.; Furman, M.; /LBL, Berkeley /Oak Ridge /Pohang Accelerator Lab. /SLAC /TRIUMF /Tech-X, Boulder /UC, San Diego /Darmstadt, GSI /Rutherford /Brookhaven

    2006-10-24

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic accelerator-physics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  7. ACCELERATION PHYSICS CODE WEB REPOSITORY.

    SciTech Connect

    WEI, J.

    2006-06-26

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic accelerator-physics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  8. Video coding with dynamic background

    NASA Astrophysics Data System (ADS)

    Paul, Manoranjan; Lin, Weisi; Lau, Chiew Tong; Lee, Bu-Sung

    2013-12-01

    Motion estimation (ME) and motion compensation (MC) using variable block size, sub-pixel search, and multiple reference frames (MRFs) are the major reasons for improved coding performance of the H.264 video coding standard over other contemporary coding standards. The concept of MRFs is suitable for repetitive motion, uncovered background, non-integer pixel displacement, lighting change, etc. The requirement of index codes of the reference frames, computational time in ME & MC, and memory buffer for coded frames limits the number of reference frames used in practical applications. In typical video sequences, the previous frame is used as a reference frame with 68-92% of cases. In this article, we propose a new video coding method using a reference frame [i.e., the most common frame in scene (McFIS)] generated by dynamic background modeling. McFIS is more effective in terms of rate-distortion and computational time performance compared to the MRFs techniques. It has also inherent capability of scene change detection (SCD) for adaptive group of picture (GOP) size determination. As a result, we integrate SCD (for GOP determination) with reference frame generation. The experimental results show that the proposed coding scheme outperforms the H.264 video coding with five reference frames and the two relevant state-of-the-art algorithms by 0.5-2.0 dB with less computational time.

  9. LFSC - Linac Feedback Simulation Code

    SciTech Connect

    Ivanov, Valentin; /Fermilab

    2008-05-01

    The computer program LFSC (Code>) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output.

  10. Computer algorithm for coding gain

    NASA Technical Reports Server (NTRS)

    Dodd, E. E.

    1974-01-01

    Development of a computer algorithm for coding gain for use in an automated communications link design system. Using an empirical formula which defines coding gain as used in space communications engineering, an algorithm is constructed on the basis of available performance data for nonsystematic convolutional encoding with soft-decision (eight-level) Viterbi decoding.

  11. Strongly Secure Linear Network Coding

    NASA Astrophysics Data System (ADS)

    Harada, Kunihiko; Yamamoto, Hirosuke

    In a network with capacity h for multicast, information Xh=(X1, X2, …, Xh) can be transmitted from a source node to sink nodes without error by a linear network code. Furthermore, secret information Sr=(S1, S2, …, Sr) can be transmitted securely against wiretappers by k-secure network coding for k≤h-r. In this case, no information of the secret leaks out even if an adversary wiretaps k edges, i. e. channels. However, if an adversary wiretaps k+1 edges, some Si may leak out explicitly. In this paper, we propose strongly k-secure network coding based on strongly secure ramp secret sharing schemes. In this coding, no information leaks out for every (Si1, Si2, …,Sir-j) even if an adversary wiretaps k+j channels. We also give an algorithm to construct a strongly k-secure network code directly and a transform to convert a nonsecure network code to a strongly k-secure network code. Furthermore, some sufficient conditions of alphabet size to realize the strongly k-secure network coding are derived for the case of k

  12. QPhiX Code Generator

    Energy Science and Technology Software Center (ESTSC)

    2014-09-16

    A simple code-generator to generate the low level code kernels used by the QPhiX Library for Lattice QCD. Generates Kernels for Wilson-Dslash, and Wilson-Clover kernels. Can be reused to write other optimized kernels for Intel Xeon Phi(tm), Intel Xeon(tm) and potentially other architectures.

  13. Using NAEYC's Code of Ethics.

    ERIC Educational Resources Information Center

    Young Children, 1995

    1995-01-01

    Considers how to deal with an ethical dilemma concerning a caregiver's dislike for a child. Recognizes that no statement in NAEYC's Code of Ethical Conduct requires that a professional must like each child, and presents some ideals and principles from the code that may guide professionals through similar situations. (BAC)

  14. DNA barcode goes two-dimensions: DNA QR code web server.

    PubMed

    Liu, Chang; Shi, Linchun; Xu, Xiaolan; Li, Huan; Xing, Hang; Liang, Dong; Jiang, Kun; Pang, Xiaohui; Song, Jingyuan; Chen, Shilin

    2012-01-01

    The DNA barcoding technology uses a standard region of DNA sequence for species identification and discovery. At present, "DNA barcode" actually refers to DNA sequences, which are not amenable to information storage, recognition, and retrieval. Our aim is to identify the best symbology that can represent DNA barcode sequences in practical applications. A comprehensive set of sequences for five DNA barcode markers ITS2, rbcL, matK, psbA-trnH, and CO1 was used as the test data. Fifty-three different types of one-dimensional and ten two-dimensional barcode symbologies were compared based on different criteria, such as coding capacity, compression efficiency, and error detection ability. The quick response (QR) code was found to have the largest coding capacity and relatively high compression ratio. To facilitate the further usage of QR code-based DNA barcodes, a web server was developed and is accessible at http://qrfordna.dnsalias.org. The web server allows users to retrieve the QR code for a species of interests, convert a DNA sequence to and from a QR code, and perform species identification based on local and global sequence similarities. In summary, the first comprehensive evaluation of various barcode symbologies has been carried out. The QR code has been found to be the most appropriate symbology for DNA barcode sequences. A web server has also been constructed to allow biologists to utilize QR codes in practical DNA barcoding applications. PMID:22574113

  15. Cracking the bioelectric code

    PubMed Central

    Tseng, AiSun; Levin, Michael

    2013-01-01

    Patterns of resting potential in non-excitable cells of living tissue are now known to be instructive signals for pattern formation during embryogenesis, regeneration and cancer suppression. The development of molecular-level techniques for tracking ion flows and functionally manipulating the activity of ion channels and pumps has begun to reveal the mechanisms by which voltage gradients regulate cell behaviors and the assembly of complex large-scale structures. A recent paper demonstrated that a specific voltage range is necessary for demarcation of eye fields in the frog embryo. Remarkably, artificially setting other somatic cells to the eye-specific voltage range resulted in formation of eyes in aberrant locations, including tissues that are not in the normal anterior ectoderm lineage: eyes could be formed in the gut, on the tail, or in the lateral plate mesoderm. These data challenge the existing models of eye fate restriction and tissue competence maps, and suggest the presence of a bioelectric code—a mapping of physiological properties to anatomical outcomes. This Addendum summarizes the current state of knowledge in developmental bioelectricity, proposes three possible interpretations of the bioelectric code that functionally maps physiological states to anatomical outcomes, and highlights the biggest open questions in this field. We also suggest a speculative hypothesis at the intersection of cognitive science and developmental biology: that bioelectrical signaling among non-excitable cells coupled by gap junctions simulates neural network-like dynamics, and underlies the information processing functions required by complex pattern formation in vivo. Understanding and learning to control the information stored in physiological networks will have transformative implications for developmental biology, regenerative medicine and synthetic bioengineering. PMID:23802040

  16. Coding polymorphism for phylogeny reconstruction.

    PubMed

    Kornet, D J; Turner, H

    1999-06-01

    The methodology of coding polymorphic taxa has received limited attention to date. A search of the taxonomic literature revealed seven types of coding methods. Apart from ignoring polymorphic characters (sometimes called the fixed-only method), two main categories can be distinguished: methods that identify the start of a new character state with the origin of an evolutionary novelty, and methods that identify the new state with the fixation of a novelty. The methods of the first category introduce soft reversals, yielding signals that support cladograms incompatible with true phylogenies. We conclude that coding the plesiomorphy is the method to be preferred, unless the ancestral state is unknown, in which case coding as ambiguous is recommended. This holds for coding polymorphism in species as well as in supraspecific taxa. In this light we remark on methods proposed by previous authors. PMID:12066713

  17. Portable code development in C

    SciTech Connect

    Brown, S.A.

    1990-11-06

    With a new generation of high performance computers appearing around us on a time scale of months, a new challenge for developers of simulation codes is to write and maintain production codes that are both highly portable and maximally efficient. My contention is that C is the language that is both best suited to that goal and is widely available today. GLF is a new code written mainly in C which is intended to have all of the XRASER physics and run on any platform of interest. It demonstrates the power of the C paradigm for code developers and flexibility and ease of use for the users. Three fundamental problems are discussed: the C/UNIX development environment; the supporting tools and libraries which handle data and graphics portability issues; and the advantages of C in numerical simulation code development.

  18. Best practices for code release

    NASA Astrophysics Data System (ADS)

    Berriman, G. Bruce

    2016-01-01

    In this talk, I want to describe what I think are the best practices for releasing code and having it adopted by end users. Make sure your code is licensed, so users will know how the software can be used and modified, and place your code in a public repository that (and make sure that you follow institutional policies in doing this). Yet licensing and releasing code are not enough: the code must be organized and documented so users can understand what it does, what its limitations are, and how to build and use it. I will describe what I think are best practices in developing the content to support release, including tutorials, design documents, specifications of interfaces and so on. Much of what I have learned on based on ten years of experience in supporting releases of the Montage Image Mosaic Engine.

  19. 21 CFR 880.6300 - Implantable radiofrequency transponder system for patient identification and health information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Implantable radiofrequency transponder system for patient identification and health information. 880.6300 Section 880.6300 Food and Drugs FOOD AND DRUG... identification code is used to access patient identity and corresponding health information stored in a...

  20. Long non-coding RNA PVT1 and cancer.

    PubMed

    Cui, Ming; You, Lei; Ren, Xiaoxia; Zhao, Wenjing; Liao, Quan; Zhao, Yupei

    2016-02-26

    Genome-wide sequencing technologies have led to the identification of many non-coding RNAs and revealed an important role for these molecules in cancer. Although there have been many studies on the role of short non-coding RNAs in cancer, much work remains to characterize the functions of long non-coding RNAs. PVT1, a long non-coding RNA encoded by the human PVT1 gene, is located in the well-known cancer-related region 8q24, also known as the 8q24 'gene desert.' PVT1 has three main molecular mechanisms of action: participating in DNA rearrangements, encoding microRNAs, and interacting with MYC. Studies on the association between PVT1 and cancer have shown that PVT1 is a potential oncogene in a variety of cancer types. However, the underlying molecular mechanisms of PVT1 in cancer remain unknown. Further studies of PVT1 will be required to test the utility of this molecule as a target for cancer diagnosis and therapy, and they should also increase our understanding of the role of long non-coding RNAs in tumorigenesis. PMID:26850852

  1. BASS Code Development

    NASA Technical Reports Server (NTRS)

    Sawyer, Scott

    2004-01-01

    The BASS computational aeroacoustic code solves the fully nonlinear Euler equations in the time domain in two-dimensions. The acoustic response of the stator is determined simultaneously for the first three harmonics of the convected vortical gust of the rotor. The spatial mode generation, propagation and decay characteristics are predicted by assuming the acoustic field away from the stator can be represented as a uniform flow with small harmonic perturbations superimposed. The computed field is then decomposed using a joint temporal-spatial transform to determine the wave amplitudes as a function of rotor harmonic and spatial mode order. This report details the following technical aspects of the computations and analysis. 1) the BASS computational technique; 2) the application of periodic time shifted boundary conditions; 3) the linear theory aspects unique to rotor-stator interactions; and 4) the joint spatial-temporal transform. The computational results presented herein are twofold. In each case, the acoustic response of the stator is determined simultaneously for the first three harmonics of the convected vortical gust of the rotor. The fan under consideration here like modern fans is cut-off at +, and propagating acoustic waves are only expected at 2BPF and 3BPF. In the first case, the computations showed excellent agreement with linear theory predictions. The frequency and spatial mode order of acoustic field was computed and found consistent with linear theory. Further, the propagation of the generated modes was also correctly predicted. The upstream going waves propagated from the domain without reflection from the in ow boundary. However, reflections from the out ow boundary were noticed. The amplitude of the reflected wave was approximately 5% of the incident wave. The second set of computations were used to determine the influence of steady loading on the generated noise. Toward this end, the acoustic response was determined with three steady loading

  2. Identification of propulsion systems

    NASA Technical Reports Server (NTRS)

    Merrill, Walter; Guo, Ten-Huei; Duyar, Ahmet

    1991-01-01

    This paper presents a tutorial on the use of model identification techniques for the identification of propulsion system models. These models are important for control design, simulation, parameter estimation, and fault detection. Propulsion system identification is defined in the context of the classical description of identification as a four step process that is unique because of special considerations of data and error sources. Propulsion system models are described along with the dependence of system operation on the environment. Propulsion system simulation approaches are discussed as well as approaches to propulsion system identification with examples for both air breathing and rocket systems.

  3. Coded communications with nonideal interleaving

    NASA Astrophysics Data System (ADS)

    Laufer, Shaul

    1991-02-01

    Burst error channels - a type of block interference channels - feature increasing capacity but decreasing cutoff rate as the memory rate increases. Despite the large capacity, there is degradation in the performance of practical coding schemes when the memory length is excessive. A short-coding error parameter (SCEP) was introduced, which expresses a bound on the average decoding-error probability for codes shorter than the block interference length. The performance of a coded slow frequency-hopping communication channel is analyzed for worst-case partial band jamming and nonideal interleaving, by deriving expressions for the capacity and cutoff rate. The capacity and cutoff rate, respectively, are shown to approach and depart from those of a memoryless channel corresponding to the transmission of a single code letter per hop. For multiaccess communications over a slot-synchronized collision channel without feedback, the channel was considered as a block interference channel with memory length equal to the number of letters transmitted in each slot. The effects of an asymmetrical background noise and a reduced collision error rate were studied, as aspects of real communications. The performance of specific convolutional and Reed-Solomon codes was examined for slow frequency-hopping systems with nonideal interleaving. An upper bound is presented for the performance of a Viterbi decoder for a convolutional code with nonideal interleaving, and a soft decision diversity combining technique is introduced.

  4. ETR/ITER systems code

    SciTech Connect

    Barr, W.L.; Bathke, C.G.; Brooks, J.N.; Bulmer, R.H.; Busigin, A.; DuBois, P.F.; Fenstermacher, M.E.; Fink, J.; Finn, P.A.; Galambos, J.D.; Gohar, Y.; Gorker, G.E.; Haines, J.R.; Hassanein, A.M.; Hicks, D.R.; Ho, S.K.; Kalsi, S.S.; Kalyanam, K.M.; Kerns, J.A.; Lee, J.D.; Miller, J.R.; Miller, R.L.; Myall, J.O.; Peng, Y-K.M.; Perkins, L.J.; Spampinato, P.T.; Strickler, D.J.; Thomson, S.L.; Wagner, C.E.; Willms, R.S.; Reid, R.L.

    1988-04-01

    A tokamak systems code capable of modeling experimental test reactors has been developed and is described in this document. The code, named TETRA (for Tokamak Engineering Test Reactor Analysis), consists of a series of modules, each describing a tokamak system or component, controlled by an optimizer/driver. This code development was a national effort in that the modules were contributed by members of the fusion community and integrated into a code by the Fusion Engineering Design Center. The code has been checked out on the Cray computers at the National Magnetic Fusion Energy Computing Center and has satisfactorily simulated the Tokamak Ignition/Burn Experimental Reactor II (TIBER) design. A feature of this code is the ability to perform optimization studies through the use of a numerical software package, which iterates prescribed variables to satisfy a set of prescribed equations or constraints. This code will be used to perform sensitivity studies for the proposed International Thermonuclear Experimental Reactor (ITER). 22 figs., 29 tabs.

  5. Coding design for error correcting output codes based on perceptron

    NASA Astrophysics Data System (ADS)

    Zhou, Jin-Deng; Wang, Xiao-Dan; Zhou, Hong-Jian; Cui, Yong-Hua; Jing, Sun

    2012-05-01

    It is known that error-correcting output codes (ECOC) is a common way to model multiclass classification problems, in which the research of encoding based on data is attracting more and more attention. We propose a method for learning ECOC with the help of a single-layered perception neural network. To achieve this goal, the code elements of ECOC are mapped to the weights of network for the given decoding strategy, and an object function with the constrained weights is used as a cost function of network. After the training, we can obtain a coding matrix including lots of subgroups of class. Experimental results on artificial data and University of California Irvine with logistic linear classifier and support vector machine as the binary learner show that our scheme provides better performance of classification with shorter length of coding matrix than other state-of-the-art encoding strategies.

  6. PANEL CODE FOR PLANAR CASCADES

    NASA Technical Reports Server (NTRS)

    Mcfarland, E. R.

    1994-01-01

    The Panel Code for Planar Cascades was developed as an aid for the designer of turbomachinery blade rows. The effective design of turbomachinery blade rows relies on the use of computer codes to model the flow on blade-to-blade surfaces. Most of the currently used codes model the flow as inviscid, irrotational, and compressible with solutions being obtained by finite difference or finite element numerical techniques. While these codes can yield very accurate solutions, they usually require an experienced user to manipulate input data and control parameters. Also, they often limit a designer in the types of blade geometries, cascade configurations, and flow conditions that can be considered. The Panel Code for Planar Cascades accelerates the design process and gives the designer more freedom in developing blade shapes by offering a simple blade-to-blade flow code. Panel, or integral equation, solution techniques have been used for several years by external aerodynamicists who have developed and refined them into a primary design tool of the aircraft industry. The Panel Code for Planar Cascades adapts these same techniques to provide a versatile, stable, and efficient calculation scheme for internal flow. The code calculates the compressible, inviscid, irrotational flow through a planar cascade of arbitrary blade shapes. Since the panel solution technique is for incompressible flow, a compressibility correction is introduced to account for compressible flow effects. The analysis is limited to flow conditions in the subsonic and shock-free transonic range. Input to the code consists of inlet flow conditions, blade geometry data, and simple control parameters. Output includes flow parameters at selected control points. This program is written in FORTRAN IV for batch execution and has been implemented on an IBM 370 series computer with a central memory requirement of approximately 590K of 8 bit bytes. This program was developed in 1982.

  7. Oil and gas field code master list 1994

    SciTech Connect

    Not Available

    1995-01-01

    This is the thirteenth annual edition of the Energy Information Administration`s (EIA) Oil and Gas Field Code Master List. It reflects data collected through October 1994 and provides standardized field name spellings and codes for all identified oil and/or gas fields in the United States. The master field name spellings and codes are to be used by respondents when filing the following Department of Energy (DOE) forms: Form EIA-23, {open_quotes}Annual Survey of Domestic Oil and Gas Reserves,{close_quotes} filed by oil and gas well operators (field codes are required from larger operators only); Forms FERC 8 and EIA-191, {open_quotes}Underground Gas Storage Report,{close_quotes} filed by natural gas producers and distributors who operate underground natural gas storage facilities. Other Federal and State government agencies, as well as industry, use the EIA Oil and Gas Field Code Master List as the standard for field identification. A machine-readable version of the Oil and Gas Field Code Master List is available from the National Technical Information Service, 5285 Port Royal Road, Springfield, Virginia 22161, (703) 487-4650. In order for the Master List to be useful, it must be accurate and remain current. To accomplish this, EIA constantly reviews and revises this list. The EIA welcomes all comments, corrections, and additions to the Master List. All such information should be given to the EIA Field Code Coordinator at (214) 953-1858. EIA gratefully acknowledges the assistance provides by numerous State organizations and trade associations in verifying the existence of fields and their official nomenclature.

  8. State building energy codes status

    SciTech Connect

    1996-09-01

    This document contains the State Building Energy Codes Status prepared by Pacific Northwest National Laboratory for the U.S. Department of Energy under Contract DE-AC06-76RL01830 and dated September 1996. The U.S. Department of Energy`s Office of Codes and Standards has developed this document to provide an information resource for individuals interested in energy efficiency of buildings and the relevant building energy codes in each state and U.S. territory. This is considered to be an evolving document and will be updated twice a year. In addition, special state updates will be issued as warranted.

  9. Understanding the Code: upholding dignity.

    PubMed

    Griffith, Richard

    2015-04-01

    The Nursing and Midwifery Council, the statutory professional regulator for registered district nurses, has introduced a revised code of standards that came into effect on 31 March 2015. The Code makes clear that while district nurses can interpret the values and principles for use in community settings, the standards are not negotiable or discretionary. They must be applied, otherwise the district nurse's fitness to practice will be called into question. In the second of a series of articles analysing the legal implications of the Code on district nurse practice, the author considers the first standard, which requires district nurses to treat people as individuals and to uphold their dignity. PMID:25839879

  10. 20 CFR 422.112 - Employer identification numbers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 6109 of the Internal Revenue Code and by Internal Revenue Service (IRS) regulations at 26 CFR 31.6011(b... SS-4, “Application for Employer Identification Number,” with the IRS. For the convenience of employers, Form SS-4 is available at all SSA and IRS offices. Household employers, agricultural...

  11. 20 CFR 422.112 - Employer identification numbers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 6109 of the Internal Revenue Code and by Internal Revenue Service (IRS) regulations at 26 CFR 31.6011(b... SS-4, “Application for Employer Identification Number,” with the IRS. For the convenience of employers, Form SS-4 is available at all SSA and IRS offices. Household employers, agricultural...

  12. 20 CFR 422.112 - Employer identification numbers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 6109 of the Internal Revenue Code and by Internal Revenue Service (IRS) regulations at 26 CFR 31.6011(b... SS-4, “Application for Employer Identification Number,” with the IRS. For the convenience of employers, Form SS-4 is available at all SSA and IRS offices. Household employers, agricultural...

  13. 20 CFR 422.112 - Employer identification numbers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 6109 of the Internal Revenue Code and by Internal Revenue Service (IRS) regulations at 26 CFR 31.6011(b... SS-4, “Application for Employer Identification Number,” with the IRS. For the convenience of employers, Form SS-4 is available at all SSA and IRS offices. Household employers, agricultural...

  14. 40 CFR 62.3330 - Identification of plan.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) APPROVAL AND PROMULGATION OF STATE PLANS FOR DESIGNATED FACILITIES AND POLLUTANTS Illinois Landfill Gas Emissions from Existing Municipal Solid Waste Landfills § 62.3330 Identification of plan. The Illinois Plan... required to install a gas collection and control system pursuant to 35 Ill. Adm. Code 220 or 800...

  15. 40 CFR 62.3330 - Identification of plan.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...) APPROVAL AND PROMULGATION OF STATE PLANS FOR DESIGNATED FACILITIES AND POLLUTANTS Illinois Landfill Gas Emissions from Existing Municipal Solid Waste Landfills § 62.3330 Identification of plan. The Illinois Plan... required to install a gas collection and control system pursuant to 35 Ill. Adm. Code 220 or 800...

  16. Seeing Stems Everywhere: Position-Independent Identification of Stem Morphemes

    ERIC Educational Resources Information Center

    Crepaldi, Davide; Rastle, Kathleen; Davis, Colin J.; Lupker, Stephen J.

    2013-01-01

    There is broad consensus that printed complex words are identified on the basis of their constituent morphemes. This fact raises the issue of how the word identification system codes for morpheme position, hence allowing it to distinguish between words like "overhang" and "hangover", and to recognize that "preheat" is a word, whereas "heatpre" is…

  17. Fatigue analysis codes for WECS components

    SciTech Connect

    Sutherland, H.J.; Ashwill, T.D.; Naassan, K.A.

    1987-10-01

    This Manuscript discusses two numerical techniques, the LIFE and the LIFE2 codes, that analyze the fatigue life of WECS components. The LIFE code is a PC-compatible Basic code that analyzes the fatigue life of a VAWT component. The LIFE2 code is a PC-compatible Fortran code that relaxes the rather restrictive assumptions of the LIFE code and permits the analysis of the fatigue life of all WECS components. Also, the modular format of the LIFE2 code permits the code to be revised, with minimal effort, to include additional analysis while maintaining its integrity. To illustrate the use of the codes, an example problem is presented. 10 refs.

  18. Applying graphics user interface ot group technology classification and coding at the Boeing aerospace company

    NASA Astrophysics Data System (ADS)

    Ness, P. H.; Jacobson, H.

    1984-10-01

    The thrust of 'group technology' is toward the exploitation of similarities in component design and manufacturing process plans to achieve assembly line flow cost efficiencies for small batch production. The systematic method devised for the identification of similarities in component geometry and processing steps is a coding and classification scheme implemented by interactive CAD/CAM systems. This coding and classification scheme has led to significant increases in computer processing power, allowing rapid searches and retrievals on the basis of a 30-digit code together with user-friendly computer graphics.

  19. Snapshot 2D tomography via coded aperture x-ray scatter imaging

    PubMed Central

    MacCabe, Kenneth P.; Holmgren, Andrew D.; Tornai, Martin P.; Brady, David J.

    2015-01-01

    This paper describes a fan beam coded aperture x-ray scatter imaging system which acquires a tomographic image from each snapshot. This technique exploits cylindrical symmetry of the scattering cross section to avoid the scanning motion typically required by projection tomography. We use a coded aperture with a harmonic dependence to determine range, and a shift code to determine cross-range. Here we use a forward-scatter configuration to image 2D objects and use serial exposures to acquire tomographic video of motion within a plane. Our reconstruction algorithm also estimates the angular dependence of the scattered radiance, a step toward materials imaging and identification. PMID:23842254

  20. A computerized record hash coding and linkage procedure to warrant epidemiological follow-up data security.

    PubMed

    Quantin, C; Bouzelat, H; Dusserre, L

    1997-01-01

    A computerized record hash coding and linkage procedure is proposed to allow the chaining of medical information within the framework of epidemiological follow-up. Before their extraction, files are rendered anonymous using a one-way hash coding based on the SHA function, in order to respect the legislation on data privacy and security. To avoid dictionary attacks, two keys have been added to SHA coding. Once rendered anonymous, the linkage of patient information can be accomplished by the means of a statistical model, taking into account several identification variables. PMID:10179568

  1. Bandwidth efficient coding for satellite communications

    NASA Astrophysics Data System (ADS)

    Lin, Shu; Costello, Daniel J., Jr.; Miller, Warner H.; Morakis, James C.; Poland, William B., Jr.

    1992-02-01

    An error control coding scheme was devised to achieve large coding gain and high reliability by using coded modulation with reduced decoding complexity. To achieve a 3 to 5 dB coding gain and moderate reliability, the decoding complexity is quite modest. In fact, to achieve a 3 dB coding gain, the decoding complexity is quite simple, no matter whether trellis coded modulation or block coded modulation is used. However, to achieve coding gains exceeding 5 dB, the decoding complexity increases drastically, and the implementation of the decoder becomes very expensive and unpractical. The use is proposed of coded modulation in conjunction with concatenated (or cascaded) coding. A good short bandwidth efficient modulation code is used as the inner code and relatively powerful Reed-Solomon code is used as the outer code. With properly chosen inner and outer codes, a concatenated coded modulation scheme not only can achieve large coding gains and high reliability with good bandwidth efficiency but also can be practically implemented. This combination of coded modulation and concatenated coding really offers a way of achieving the best of three worlds, reliability and coding gain, bandwidth efficiency, and decoding complexity.

  2. Facilitating Internet-Scale Code Retrieval

    ERIC Educational Resources Information Center

    Bajracharya, Sushil Krishna

    2010-01-01

    Internet-Scale code retrieval deals with the representation, storage, and access of relevant source code from a large amount of source code available on the Internet. Internet-Scale code retrieval systems support common emerging practices among software developers related to finding and reusing source code. In this dissertation we focus on some…

  3. Bandwidth efficient coding for satellite communications

    NASA Technical Reports Server (NTRS)

    Lin, Shu; Costello, Daniel J., Jr.; Miller, Warner H.; Morakis, James C.; Poland, William B., Jr.

    1992-01-01

    An error control coding scheme was devised to achieve large coding gain and high reliability by using coded modulation with reduced decoding complexity. To achieve a 3 to 5 dB coding gain and moderate reliability, the decoding complexity is quite modest. In fact, to achieve a 3 dB coding gain, the decoding complexity is quite simple, no matter whether trellis coded modulation or block coded modulation is used. However, to achieve coding gains exceeding 5 dB, the decoding complexity increases drastically, and the implementation of the decoder becomes very expensive and unpractical. The use is proposed of coded modulation in conjunction with concatenated (or cascaded) coding. A good short bandwidth efficient modulation code is used as the inner code and relatively powerful Reed-Solomon code is used as the outer code. With properly chosen inner and outer codes, a concatenated coded modulation scheme not only can achieve large coding gains and high reliability with good bandwidth efficiency but also can be practically implemented. This combination of coded modulation and concatenated coding really offers a way of achieving the best of three worlds, reliability and coding gain, bandwidth efficiency, and decoding complexity.

  4. PARAVT: Parallel Voronoi Tessellation code

    NASA Astrophysics Data System (ADS)

    Gonzalez, Roberto E.

    2016-01-01

    We present a new open source code for massive parallel computation of Voronoi tessellations(VT hereafter) in large data sets. The code is focused for astrophysical purposes where VT densities and neighbors are widely used. There are several serial Voronoi tessellation codes, however no open source and parallel implementations are available to handle the large number of particles/galaxies in current N-body simulations and sky surveys. Parallelization is implemented under MPI and VT using Qhull library. Domain decomposition take into account consistent boundary computation between tasks, and support periodic conditions. In addition, the code compute neighbors lists, Voronoi density and Voronoi cell volumes for each particle, and can compute density on a regular grid.

  5. Adaptive decoding of convolutional codes

    NASA Astrophysics Data System (ADS)

    Hueske, K.; Geldmacher, J.; Götze, J.

    2007-06-01

    Convolutional codes, which are frequently used as error correction codes in digital transmission systems, are generally decoded using the Viterbi Decoder. On the one hand the Viterbi Decoder is an optimum maximum likelihood decoder, i.e. the most probable transmitted code sequence is obtained. On the other hand the mathematical complexity of the algorithm only depends on the used code, not on the number of transmission errors. To reduce the complexity of the decoding process for good transmission conditions, an alternative syndrome based decoder is presented. The reduction of complexity is realized by two different approaches, the syndrome zero sequence deactivation and the path metric equalization. The two approaches enable an easy adaptation of the decoding complexity for different transmission conditions, which results in a trade-off between decoding complexity and error correction performance.

  6. Seals Flow Code Development 1993

    NASA Technical Reports Server (NTRS)

    Liang, Anita D. (Compiler); Hendricks, Robert C. (Compiler)

    1994-01-01

    Seals Workshop of 1993 code releases include SPIRALI for spiral grooved cylindrical and face seal configurations; IFACE for face seals with pockets, steps, tapers, turbulence, and cavitation; GFACE for gas face seals with 'lift pad' configurations; and SCISEAL, a CFD code for research and design of seals of cylindrical configuration. GUI (graphical user interface) and code usage was discussed with hands on usage of the codes, discussions, comparisons, and industry feedback. Other highlights for the Seals Workshop-93 include environmental and customer driven seal requirements; 'what's coming'; and brush seal developments including flow visualization, numerical analysis, bench testing, T-700 engine testing, tribological pairing and ceramic configurations, and cryogenic and hot gas facility brush seal results. Also discussed are seals for hypersonic engines and dynamic results for spiral groove and smooth annular seals.

  7. The moving mesh code SHADOWFAX

    NASA Astrophysics Data System (ADS)

    Vandenbroucke, B.; De Rijcke, S.

    2016-07-01

    We introduce the moving mesh code SHADOWFAX, which can be used to evolve a mixture of gas, subject to the laws of hydrodynamics and gravity, and any collisionless fluid only subject to gravity, such as cold dark matter or stars. The code is written in C++ and its source code is made available to the scientific community under the GNU Affero General Public Licence. We outline the algorithm and the design of our implementation, and demonstrate its validity through the results of a set of basic test problems, which are also part of the public version. We also compare SHADOWFAX with a number of other publicly available codes using different hydrodynamical integration schemes, illustrating the advantages and disadvantages of the moving mesh technique.

  8. Property Control through Bar Coding.

    ERIC Educational Resources Information Center

    Kingma, Gerben J.

    1984-01-01

    A public utility company uses laser wands to read bar-coded labels on furniture and equipment. The system allows an 80 percent savings of the time required to create reports for inventory control. (MLF)

  9. Improvements to the NASAP code

    NASA Technical Reports Server (NTRS)

    Perel, D.

    1980-01-01

    The FORTRAN code, NASAP was modified and improved for the capability of transforming the CAD-generated NASTRAN input data for DESAP II and/or DESAP I. The latter programs were developed for structural optimization.

  10. Tracking Code for Microwave Instability

    SciTech Connect

    Heifets, S.; /SLAC

    2006-09-21

    To study microwave instability the tracking code is developed. For bench marking, results are compared with Oide-Yokoya results [1] for broad-band Q = 1 impedance. Results hint to two possible mechanisms determining the threshold of instability.

  11. FLYCHK Collisional-Radiative Code

    National Institute of Standards and Technology Data Gateway

    SRD 160 FLYCHK Collisional-Radiative Code (Web, free access)   FLYCHK provides a capability to generate atomic level populations and charge state distributions for low-Z to mid-Z elements under NLTE conditions.

  12. Automatic Ammunition Identification Technology Project

    SciTech Connect

    Weil, B.

    1993-01-01

    The Automatic Ammunition Identification Technology (AAIT) Project is an activity of the Robotics Process Systems Division at the Oak Ridge National Laboratory (ORNL) for the US Army's Project Manager-Ammunition Logistics (PM-AMMOLOG) at the Picatinny Arsenal in Picatinny, New Jersey. The project objective is to evaluate new two-dimensional bar code symbologies for potential use in ammunition logistics systems and automated reloading equipment. These new symbologies are a significant improvement over typical linear bar codes since machine-readable alphanumeric messages up to 2000 characters long are achievable. These compressed data symbologies are expected to significantly improve logistics and inventory management tasks and permit automated feeding and handling of ammunition to weapon systems. The results will be increased throughout capability, better inventory control, reduction of human error, lower operation and support costs, and a more timely re-supply of various weapon systems. This paper will describe the capabilities of existing compressed data symbologies and the symbol testing activities being conducted at ORNL for the AAIT Project.

  13. The Integrated TIGER Series Codes

    Energy Science and Technology Software Center (ESTSC)

    2006-01-15

    ITS is a powerful and user-friendly software package permitting state-of-the-art Monte Carlo solution of linear time-independent coupled electron/photon radiation transport problems, with or without the presence of macroscopic electric and magnetic fields of arbitrary spatial dependence. Our goal has been to simultaneously maximize operational simplicity and physical accuracy. Through a set of preprocessor directives, the user selects one of the many ITS codes. The ease with which the makefile system is applied combines with anmore » input scheme based on order-independent descriptive keywords that makes maximum use of defaults and intemal error checking to provide experimentalists and theorists alike with a method for the routine but rigorous solution of sophisticated radiation transport problems. Physical rigor is provided by employing accurate cross sections, sampling distributions, and physical models for describing the production and transport of the electron/photon cascade from 1.0 GeV down to 1.0 keV. The availability of source code permits the more sophisticated user to tailor the codes to specific applications and to extend the capabilities of the codes to more complex applications. Version 5.0, the latest version of ITS, contains (1) improvements to the ITS 3.0 continuous-energy codes, (2) multigroup codes with adjoint transport capabilities, (3) parallel implementations of all ITS codes, (4) a general purpose geometry engine for linking with CAD or other geometry formats, and (5) the Cholla facet geometry library. Moreover, the general user friendliness of the software has been enhanced through increased internal error checking and improved code portability.« less

  14. Multiple-Trellis-Coded Modulation

    NASA Technical Reports Server (NTRS)

    Divsalar, D.; Simon, M. K.

    1990-01-01

    Theoretical gain over simple multiple-phase-shift keying at least 2 to 3 decibels. Multiple-trellis-coded modulation scheme combined with M-ary modulation shows theoretically to yield asymptotic gains in performance over uncoded multiple-phase-shift keying, while employing symmetric multiple-phase-shift signal constellations and avoiding code catastrophe. Suitable for satellite and terrestrial-mobile/satellite communications or other communications requiring burst-error correction. Extended to such higher dimensional modulations as quadrature amplitude modulation.

  15. Training course on code implementation.

    PubMed

    Allain, A; De Arango, R

    1992-01-01

    The International Baby Food Action Network (IBFAN) is a coalition of over 40 citizen groups in 70 countries. IBFAN monitors the progress worldwide of the implementation of the International Code of Marketing of Breastmilk Substitutes. The Code is intended to regulate the advertising and promotional techniques used to sell infant formula. The 1991 IBFAN report shows that 75 countries have taken some action to implement the International Code. During 1992, the IBFAN Code Documentation Center in Malaysia conducted 2 training courses to help countries draft legislation to implement and monitor compliance with the International Code. In April, government officials from 19 Asian and African countries attended the first course in Malaysia; the second course was conducted in Spanish in Guatemala and attended by officials from 15 Latin American and Caribbean countries. The resource people included representatives from NGOs in Africa, Asia, Latin America, Europe and North America with experience in Code implementation and monitoring at the national level. The main purpose of each course was to train government officials to use the International Code as a starting point for national legislation to protect breastfeeding. Participants reviewed recent information on lactation management, the advantages of breastfeeding, current trends in breastfeeding and the marketing practices of infant formula manufacturers. The participants studied the terminology contained in the International Code and terminology used by infant formula manufacturers to include breastmilk supplements such as follow-on formulas and cereal-based baby foods. Relevant World Health Assembly resolutions such as the one adopted in 1986 on the need to ban free and low-cost supplies to hospitals were examined. The legal aspects of the current Baby Friendly Hospital Initiative (BFHI) and the progress in the 12 BFHI test countries concerning the elimination of supplies were also examined. International Labor

  16. UNIX code management and distribution

    SciTech Connect

    Hung, T.; Kunz, P.F.

    1992-09-01

    We describe a code management and distribution system based on tools freely available for the UNIX systems. At the master site, version control is managed with CVS, which is a layer on top of RCS, and distribution is done via NFS mounted file systems. At remote sites, small modifications to CVS provide for interactive transactions with the CVS system at the master site such that remote developers are true peers in the code development process.

  17. Summary of Code of Ethics.

    PubMed

    Eklund, Kerri

    2016-01-01

    The Guide to the Code of Ethics for Nurses is an excellent guideline for all nurses regardless of their area of practice. I greatly enjoyed reading the revisions in place within the 2015 edition and refreshing my nursing conscience. I plan to always keep my Guide to the Code of Ethics for Nurses near in order to keep my moral compass from veering off the path of quality care. PMID:27183735

  18. Edge equilibrium code for tokamaks

    SciTech Connect

    Li, Xujing; Drozdov, Vladimir V.

    2014-01-15

    The edge equilibrium code (EEC) described in this paper is developed for simulations of the near edge plasma using the finite element method. It solves the Grad-Shafranov equation in toroidal coordinate and uses adaptive grids aligned with magnetic field lines. Hermite finite elements are chosen for the numerical scheme. A fast Newton scheme which is the same as implemented in the equilibrium and stability code (ESC) is applied here to adjust the grids.

  19. Computer-Access-Code Matrices

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr.

    1990-01-01

    Authorized users respond to changing challenges with changing passwords. Scheme for controlling access to computers defeats eavesdroppers and "hackers". Based on password system of challenge and password or sign, challenge, and countersign correlated with random alphanumeric codes in matrices of two or more dimensions. Codes stored on floppy disk or plug-in card and changed frequently. For even higher security, matrices of four or more dimensions used, just as cubes compounded into hypercubes in concurrent processing.

  20. electromagnetics, eddy current, computer codes

    Energy Science and Technology Software Center (ESTSC)

    2002-03-12

    TORO Version 4 is designed for finite element analysis of steady, transient and time-harmonic, multi-dimensional, quasi-static problems in electromagnetics. The code allows simulation of electrostatic fields, steady current flows, magnetostatics and eddy current problems in plane or axisymmetric, two-dimensional geometries. TORO is easily coupled to heat conduction and solid mechanics codes to allow multi-physics simulations to be performed.

  1. The Integrated TIGER Series Codes

    SciTech Connect

    Kensek, Ronald P.; Franke, Brian C.; Laub, Thomas W.

    2006-01-15

    ITS is a powerful and user-friendly software package permitting state-of-the-art Monte Carlo solution of linear time-independent coupled electron/photon radiation transport problems, with or without the presence of macroscopic electric and magnetic fields of arbitrary spatial dependence. Our goal has been to simultaneously maximize operational simplicity and physical accuracy. Through a set of preprocessor directives, the user selects one of the many ITS codes. The ease with which the makefile system is applied combines with an input scheme based on order-independent descriptive keywords that makes maximum use of defaults and intemal error checking to provide experimentalists and theorists alike with a method for the routine but rigorous solution of sophisticated radiation transport problems. Physical rigor is provided by employing accurate cross sections, sampling distributions, and physical models for describing the production and transport of the electron/photon cascade from 1.0 GeV down to 1.0 keV. The availability of source code permits the more sophisticated user to tailor the codes to specific applications and to extend the capabilities of the codes to more complex applications. Version 5.0, the latest version of ITS, contains (1) improvements to the ITS 3.0 continuous-energy codes, (2) multigroup codes with adjoint transport capabilities, (3) parallel implementations of all ITS codes, (4) a general purpose geometry engine for linking with CAD or other geometry formats, and (5) the Cholla facet geometry library. Moreover, the general user friendliness of the software has been enhanced through increased internal error checking and improved code portability.

  2. Rotating-Pump Design Code

    NASA Technical Reports Server (NTRS)

    Walker, James F.; Chen, Shu-Cheng; Scheer, Dean D.

    2006-01-01

    Pump Design (PUMPDES) is a computer program for designing a rotating pump for liquid hydrogen, liquid oxygen, liquid nitrogen, water, methane, or ethane. Using realistic properties of these fluids provided by another program called GASPAK, this code performs a station-by-station, mean-line analysis along the pump flow path, obtaining thermodynamic properties of the pumped fluid at each station and evaluating hydraulic losses along the flow path. The variables at each station are obtained under constraints that are consistent with the underlying physical principles. The code evaluates the performance of each stage and the overall pump. In addition, by judiciously choosing the givens and the unknowns, the code can perform a geometric inverse design function: that is, it can compute a pump geometry that yields a closest approximation of given design point. The code contains two major parts: one for an axial-rotor/inducer and one for a multistage centrifugal pump. The inducer and the centrifugal pump are functionally integrated. The code can be used in designing and/or evaluating the inducer/centrifugal-pump combination or the centrifugal pump alone. The code is written in standard Fortran 77.

  3. Spaceflight Validation of Hzetrn Code

    NASA Technical Reports Server (NTRS)

    Wilson, J. W.; Shinn, J. L.; Singleterry, R. C.; Badavi, F. F.; Badhwar, G. D.; Reitz, G.; Beaujean, R.; Cucinotta, F. A.

    1999-01-01

    HZETRN is being developed as a fast deterministic radiation transport code applicable to neutrons, protons, and multiply charged ions in the space environment. It was recently applied to 50 hours of IMP8 data measured during the August 4, 1972 solar event to map the hourly exposures within the human body under several shield configurations. This calculation required only 18 hours on a VAX 4000 machine. A similar calculation using the Monte Carlo method would have required two years of dedicated computer time. The code has been benchmarked against well documented and tested Monte Carlo proton transport codes with good success. The code will allow important trade studies to be made with relative ease due to the computational speed and will be useful in assessing design alternatives in an integrated system software environment. Since there are no well tested Monte Carlo codes for HZE particles, we have been engaged in flight validation of the HZETRN results. To date we have made comparison with TEPC, CR-39, charge particle telescopes, and Bonner spheres. This broad range of detectors allows us to test a number of functions related to differing physical processes which add to the complicated radiation fields within a spacecraft or the human body, which functions can be calculated by the HZETRN code system. In the present report we will review these results.

  4. The identification of unfolding facial expressions.

    PubMed

    Fiorentini, Chiara; Schmidt, Susanna; Viviani, Paolo

    2012-01-01

    We asked whether the identification of emotional facial expressions (FEs) involves the simultaneous perception of the facial configuration or the detection of emotion-specific diagnostic cues. We recorded at high speed (500 frames s-1) the unfolding of the FE in five actors, each expressing six emotions (anger, surprise, happiness, disgust, fear, sadness). Recordings were coded every 10 frames (20 ms of real time) with the Facial Action Coding System (FACS, Ekman et al 2002, Salt Lake City, UT: Research Nexus eBook) to identify the facial actions contributing to each expression, and their intensity changes over time. Recordings were shown in slow motion (1/20 of recording speed) to one hundred observers in a forced-choice identification task. Participants were asked to identify the emotion during the presentation as soon as they felt confident to do so. Responses were recorded along with the associated response times (RTs). The RT probability density functions for both correct and incorrect responses were correlated with the facial activity during the presentation. There were systematic correlations between facial activities, response probabilities, and RT peaks, and significant differences in RT distributions for correct and incorrect answers. The results show that a reliable response is possible long before the full FE configuration is reached. This suggests that identification is reached by integrating in time individual diagnostic facial actions, and does not require perceiving the full apex configuration. PMID:23025158

  5. Taste coding after selective inhibition by chlorhexidine.

    PubMed

    Wang, Miao-Fen; Marks, Lawrence E; Frank, Marion E

    2009-10-01

    Coding of the complex tastes of ionic stimuli in humans was studied by combining taste confusion matrix (TCM) methodology and treatment with chlorhexidine gluconate. The TCM evaluates discrimination of multiple stimuli simultaneously. Chlorhexidine, a bis-biguanide antiseptic, reversibly inhibits salty taste and tastes of a subset of bitter stimuli, including quinine hydrochloride. Identifications of salty (NaCl, "salt"), bitter (quinine.HCl, "quinine"), sweet (sucrose, "sugar"), and sour (citric acid, "acid") prototypes, alone and as components of binary mixtures, were measured under 4 conditions. One was a water-rinse control and the others had the salt and quinine tastes progressively reduced by treatment with 1 mM chlorhexidine, 3 mM chlorhexidine, and ultimately to zero by elimination of NaCl and quinine.HCl. Treatment with chlorhexidine perturbed identification of salt more than quinine; both were thereafter more often confused with "water" and unidentified when mixed with sucrose or citric acid. All pairwise discriminations that depended on the tastes of NaCl and quinine.HCl deteriorated, and although H(2)O was mistakenly identified as quinine after chlorhexidine, this may have been a decisional bias. Other confusions reflected "unprompted mixture analysis" and an obscuring of salt taste by a less-inhibited stronger quinine or sugar or acid tastes in mixtures. Partial inhibition of the tastes of NaCl and quinine.HCl by chlorhexidine was considered in the context of multiple receptors for the 2 compounds. Discrimination among prototypic stimuli with varying strengths was consistent with a gustatory system that evaluates a small number of independent tastes. PMID:19703921

  6. 40 CFR 261.35 - Deletion of certain hazardous waste codes following equipment cleaning and replacement.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... required to be cleaned or replaced under 40 CFR 261.35 was cleaned or replaced as represented in the... codes following equipment cleaning and replacement. 261.35 Section 261.35 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) IDENTIFICATION AND LISTING OF...

  7. 40 CFR 261.35 - Deletion of certain hazardous waste codes following equipment cleaning and replacement.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... required to be cleaned or replaced under 40 CFR 261.35 was cleaned or replaced as represented in the... codes following equipment cleaning and replacement. 261.35 Section 261.35 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) IDENTIFICATION AND LISTING OF...

  8. Metallophore mapping in complex matrices by metal isotope coded profiling of organic ligands.

    PubMed

    Deicke, Michael; Mohr, Jan Frieder; Bellenger, Jean-Philippe; Wichard, Thomas

    2014-12-01

    Metal isotope coded profiling (MICP) introduces a universal discovery platform for metal chelating natural products that act as metallophores, ion buffers or sequestering agents. The detection of cation and oxoanion complexing ligands is facilitated by the identification of unique isotopic signatures created by the application of isotopically pure metals. PMID:25298978

  9. Number of minimum-weight code words in a product code

    NASA Technical Reports Server (NTRS)

    Miller, R. L.

    1978-01-01

    Consideration is given to the number of minimum-weight code words in a product code. The code is considered as a tensor product of linear codes over a finite field. Complete theorems and proofs are presented.

  10. Cleanup MAC and MBA code ATP

    SciTech Connect

    Russell, V.K.

    1994-10-17

    The K Basins Materials Accounting (MAC) and Material Balance (MBA) database system had some minor code cleanup performed to its code. This ATP describes how the code was to be tested to verify its correctness.

  11. Entanglement-assisted codeword stabilized quantum codes

    SciTech Connect

    Shin, Jeonghwan; Heo, Jun; Brun, Todd A.

    2011-12-15

    Entangled qubits can increase the capacity of quantum error-correcting codes based on stabilizer codes. In addition, by using entanglement quantum stabilizer codes can be construct from classical linear codes that do not satisfy the dual-containing constraint. We show that it is possible to construct both additive and nonadditive quantum codes using the codeword stabilized quantum code framework. Nonadditive codes may offer improved performance over the more common stabilizer codes. Like other entanglement-assisted codes, the encoding procedure acts only on the qubits on Alice's side, and only these qubits are assumed to pass through the channel. However, errors in the codeword stabilized quantum code framework give rise to effective Z errors on Bob's side. We use this scheme to construct entanglement-assisted nonadditive quantum codes, in particular, ((5,16,2;1)) and ((7,4,5;4)) codes.

  12. Discrete Cosine Transform Image Coding With Sliding Block Codes

    NASA Astrophysics Data System (ADS)

    Divakaran, Ajay; Pearlman, William A.

    1989-11-01

    A transform trellis coding scheme for images is presented. A two dimensional discrete cosine transform is applied to the image followed by a search on a trellis structured code. This code is a sliding block code that utilizes a constrained size reproduction alphabet. The image is divided into blocks by the transform coding. The non-stationarity of the image is counteracted by grouping these blocks in clusters through a clustering algorithm, and then encoding the clusters separately. Mandela ordered sequences are formed from each cluster i.e identically indexed coefficients from each block are grouped together to form one dimensional sequences. A separate search ensues on each of these Mandela ordered sequences. Padding sequences are used to improve the trellis search fidelity. The padding sequences absorb the error caused by the building up of the trellis to full size. The simulations were carried out on a 256x256 image ('LENA'). The results are comparable to any existing scheme. The visual quality of the image is enhanced considerably by the padding and clustering.

  13. The Proteomic Code: a molecular recognition code for proteins

    PubMed Central

    Biro, Jan C

    2007-01-01

    Background The Proteomic Code is a set of rules by which information in genetic material is transferred into the physico-chemical properties of amino acids. It determines how individual amino acids interact with each other during folding and in specific protein-protein interactions. The Proteomic Code is part of the redundant Genetic Code. Review The 25-year-old history of this concept is reviewed from the first independent suggestions by Biro and Mekler, through the works of Blalock, Root-Bernstein, Siemion, Miller and others, followed by the discovery of a Common Periodic Table of Codons and Nucleic Acids in 2003 and culminating in the recent conceptualization of partial complementary coding of interacting amino acids as well as the theory of the nucleic acid-assisted protein folding. Methods and conclusions A novel cloning method for the design and production of specific, high-affinity-reacting proteins (SHARP) is presented. This method is based on the concept of proteomic codes and is suitable for large-scale, industrial production of specifically interacting peptides. PMID:17999762

  14. Analysis of quantum error-correcting codes: Symplectic lattice codes and toric codes

    NASA Astrophysics Data System (ADS)

    Harrington, James William

    Quantum information theory is concerned with identifying how quantum mechanical resources (such as entangled quantum states) can be utilized for a number of information processing tasks, including data storage, computation, communication, and cryptography. Efficient quantum algorithms and protocols have been developed for performing some tasks (e.g. , factoring large numbers, securely communicating over a public channel, and simulating quantum mechanical systems) that appear to be very difficult with just classical resources. In addition to identifying the separation between classical and quantum computational power, much of the theoretical focus in this field over the last decade has been concerned with finding novel ways of encoding quantum information that are robust against errors, which is an important step toward building practical quantum information processing devices. In this thesis I present some results on the quantum error-correcting properties of oscillator codes (also described as symplectic lattice codes) and toric codes. Any harmonic oscillator system (such as a mode of light) can be encoded with quantum information via symplectic lattice codes that are robust against shifts in the system's continuous quantum variables. I show the existence of lattice codes whose achievable rates match the one-shot coherent information over the Gaussian quantum channel. Also, I construct a family of symplectic self-dual lattices and search for optimal encodings of quantum information distributed between several oscillators. Toric codes provide encodings of quantum information into two-dimensional spin lattices that are robust against local clusters of errors and which require only local quantum operations for error correction. Numerical simulations of this system under various error models provide a calculation of the accuracy threshold for quantum memory using toric codes, which can be related to phase transitions in certain condensed matter models. I also present

  15. Source identification with GLAST

    SciTech Connect

    Lonjou, Vincent; Knoedlseder, Juergen

    2007-07-12

    With more than 50% of unidentified sources, the third EGRET catalogue reflects the complexity of source identification in the GeV domain. In that context, we developed a dedicated GLAST ScienceTool dubbed gtsrcid for the general purpose of source identification. gtsrcid has been designed in a very flexible way and allows cross correlation with any counterpart catalogue using user-definable figures-of-merit. Our source identification strategy, the results for DC2 as well as possible improvements of our identification procedures are presented.

  16. NASA Rotor 37 CFD Code Validation: Glenn-HT Code

    NASA Technical Reports Server (NTRS)

    Ameri, Ali A.

    2010-01-01

    In order to advance the goals of NASA aeronautics programs, it is necessary to continuously evaluate and improve the computational tools used for research and design at NASA. One such code is the Glenn-HT code which is used at NASA Glenn Research Center (GRC) for turbomachinery computations. Although the code has been thoroughly validated for turbine heat transfer computations, it has not been utilized for compressors. In this work, Glenn-HT was used to compute the flow in a transonic compressor and comparisons were made to experimental data. The results presented here are in good agreement with this data. Most of the measures of performance are well within the measurement uncertainties and the exit profiles of interest agree with the experimental measurements.

  17. Licensee Event Report sequence coding and search procedure workshop

    SciTech Connect

    Cottrell, W.B.; Gallaher, R.B.

    1981-03-01

    Since mid-1980, the Office for Analysis and Evaluation of Operational Data (AEOD) of the Nuclear Regulatory Commission (NRC) has been developing procedures for the systematic review and analysis of Licensee Event Reports (LERs). These procedures generally address several areas of concern, including identification of significant trends and patterns, event sequence of occurrences, component failures, and system and plant effects. The AEOD and NSIC conducted a workshop on the new coding procedure at the American Museum of Science and Energy in Oak Ridge, TN, on November 24, 1980.

  18. New multilevel codes over GF(q)

    NASA Technical Reports Server (NTRS)

    Wu, Jiantian; Costello, Daniel J., Jr.

    1992-01-01

    Set partitioning to multi-dimensional signal spaces over GF(q), particularly GF sup q-1(q) and GF sup q (q), and show how to construct both multi-level block codes and multi-level trellis codes over GF(q). Two classes of multi-level (n, k, d) block codes over GF(q) with block length n, number of information symbols k, and minimum distance d sub min greater than or = d, are presented. These two classes of codes use Reed-Solomon codes as component codes. They can be easily decoded as block length q-1 Reed-Solomon codes or block length q or q + 1 extended Reed-Solomon codes using multi-stage decoding. Many of these codes have larger distances than comparable q-ary block codes, as component codes. Low rate q-ary convolutional codes, work error correcting convolutional codes, and binary-to-q-ary convolutional codes can also be used to construct multi-level trellis codes over GF(q) or binary-to-q-ary trellis codes, some of which have better performance than the above block codes. All of the new codes have simple decoding algorithms based on hard decision multi-stage decoding.

  19. A comprehensive catalogue of the coding and non-coding transcripts of the human inner ear.

    PubMed

    Schrauwen, Isabelle; Hasin-Brumshtein, Yehudit; Corneveaux, Jason J; Ohmen, Jeffrey; White, Cory; Allen, April N; Lusis, Aldons J; Van Camp, Guy; Huentelman, Matthew J; Friedman, Rick A

    2016-03-01

    The mammalian inner ear consists of the cochlea and the vestibular labyrinth (utricle, saccule, and semicircular canals), which participate in both hearing and balance. Proper development and life-long function of these structures involves a highly complex coordinated system of spatial and temporal gene expression. The characterization of the inner ear transcriptome is likely important for the functional study of auditory and vestibular components, yet, primarily due to tissue unavailability, detailed expression catalogues of the human inner ear remain largely incomplete. We report here, for the first time, comprehensive transcriptome characterization of the adult human cochlea, ampulla, saccule and utricle of the vestibule obtained from patients without hearing abnormalities. Using RNA-Seq, we measured the expression of >50,000 predicted genes corresponding to approximately 200,000 transcripts, in the adult inner ear and compared it to 32 other human tissues. First, we identified genes preferentially expressed in the inner ear, and unique either to the vestibule or cochlea. Next, we examined expression levels of specific groups of potentially interesting RNAs, such as genes implicated in hearing loss, long non-coding RNAs, pseudogenes and transcripts subject to nonsense mediated decay (NMD). We uncover the spatial specificity of expression of these RNAs in the hearing/balance system, and reveal evidence of tissue specific NMD. Lastly, we investigated the non-syndromic deafness loci to which no gene has been mapped, and narrow the list of potential candidates for each locus. These data represent the first high-resolution transcriptome catalogue of the adult human inner ear. A comprehensive identification of coding and non-coding RNAs in the inner ear will enable pathways of auditory and vestibular function to be further defined in the study of hearing and balance. Expression data are freely accessible at https://www.tgen.org/home/research

  20. Performance of commercially available Passive Integrated Transponder (PIT) tag systems used for fish identification and interjurisdictional fisheries management

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Passive integrated transponder (PIT) tag systems are commonly used for identification and monitoring programs with fisheries applications. Transponders of different frequencies, sizes, and code formats are available from numerous manufacturers, and there is an increasing concern regarding the need ...

  1. Blurring in bar code signals

    NASA Astrophysics Data System (ADS)

    Tang, Hong

    1997-10-01

    When a bar code symbol is passed over a scanner, it is struck across by a fast moving laser beam. The laser light is scattered by the bar code. The total scattered power is modulated by the reflectivity of the bars and spaces in the symbol. A fraction of the scattered light is collected and focused onto a photodetector that converts the light variation into an electronic signal. The electronic signal is then digitized for analysis by a computer. The scanning and detection process can be modeled by a convolution of the laser beam profile and the bar code reflectivity function. The switching between states in the digitized bar code signal, which represents transitions from a space to a bar or vice versa, is determined by a zero-crossing point in the second derivative of the analog signal. The laser profile acts like a smoothing function. It blurs the analog electronic signal. If the width of the laser profile is less than the minimum width of bars and spaces in the bar code reflectivity function, the transition point is not affected by the location of its neighboring edges. If the laser profile is wider than the minimum width in the bar code, the transition point can be shifted due to the locations of its neighboring edges. The behavior of the shift of transition is analyzed here for all cases in a UPC symbol. It is found that the amount of shift in the transition point is almost the same for several different cases within the depth of field of the scanner. The knowledge of the behavior of transition point shift can be used to accurately compensate printing errors in an over-printed bar code. The modulation transfer function (MTF) of bar code scanning is the Fourier transform of the marginal function of the scanning laser beam. The MTF through focus for a scanning system is presented. By using an aperture with central obscuration in the laser focusing system, the high frequency resolution of bar code scanning can be enhanced and the depth of field of the scanner can

  2. Improving radiopharmaceutical supply chain safety by implementing bar code technology.

    PubMed

    Matanza, David; Hallouard, François; Rioufol, Catherine; Fessi, Hatem; Fraysse, Marc

    2014-11-01

    The aim of this study was to describe and evaluate an approach for improving radiopharmaceutical supply chain safety by implementing bar code technology. We first evaluated the current situation of our radiopharmaceutical supply chain and, by means of the ALARM protocol, analysed two dispensing errors that occurred in our department. Thereafter, we implemented a bar code system to secure selected key stages of the radiopharmaceutical supply chain. Finally, we evaluated the cost of this implementation, from overtime, to overheads, to additional radiation exposure to workers. An analysis of the events that occurred revealed a lack of identification of prepared or dispensed drugs. Moreover, the evaluation of the current radiopharmaceutical supply chain showed that the dispensation and injection steps needed to be further secured. The bar code system was used to reinforce product identification at three selected key stages: at usable stock entry; at preparation-dispensation; and during administration, allowing to check conformity between the labelling of the delivered product (identity and activity) and the prescription. The extra time needed for all these steps had no impact on the number and successful conduct of examinations. The investment cost was reduced (2600 euros for new material and 30 euros a year for additional supplies) because of pre-existing computing equipment. With regard to the radiation exposure to workers there was an insignificant overexposure for hands with this new organization because of the labelling and scanning processes of radiolabelled preparation vials. Implementation of bar code technology is now an essential part of a global securing approach towards optimum patient management. PMID:25144560

  3. International assessment of PCA codes

    SciTech Connect

    Neymotin, L.; Lui, C.; Glynn, J.; Archarya, S.

    1993-11-01

    Over the past three years (1991-1993), an extensive international exercise for intercomparison of a group of six Probabilistic Consequence Assessment (PCA) codes was undertaken. The exercise was jointly sponsored by the Commission of European Communities (CEC) and OECD Nuclear Energy Agency. This exercise was a logical continuation of a similar effort undertaken by OECD/NEA/CSNI in 1979-1981. The PCA codes are currently used by different countries for predicting radiological health and economic consequences of severe accidents at nuclear power plants (and certain types of non-reactor nuclear facilities) resulting in releases of radioactive materials into the atmosphere. The codes participating in the exercise were: ARANO (Finland), CONDOR (UK), COSYMA (CEC), LENA (Sweden), MACCS (USA), and OSCAAR (Japan). In parallel with this inter-code comparison effort, two separate groups performed a similar set of calculations using two of the participating codes, MACCS and COSYMA. Results of the intercode and inter-MACCS comparisons are presented in this paper. The MACCS group included four participants: GREECE: Institute of Nuclear Technology and Radiation Protection, NCSR Demokritos; ITALY: ENEL, ENEA/DISP, and ENEA/NUC-RIN; SPAIN: Universidad Politecnica de Madrid (UPM) and Consejo de Seguridad Nuclear; USA: Brookhaven National Laboratory, US NRC and DOE.

  4. Driver Code for Adaptive Optics

    NASA Technical Reports Server (NTRS)

    Rao, Shanti

    2007-01-01

    A special-purpose computer code for a deformable-mirror adaptive-optics control system transmits pixel-registered control from (1) a personal computer running software that generates the control data to (2) a circuit board with 128 digital-to-analog converters (DACs) that generate voltages to drive the deformable-mirror actuators. This program reads control-voltage codes from a text file, then sends them, via the computer s parallel port, to a circuit board with four AD5535 (or equivalent) chips. Whereas a similar prior computer program was capable of transmitting data to only one chip at a time, this program can send data to four chips simultaneously. This program is in the form of C-language code that can be compiled and linked into an adaptive-optics software system. The program as supplied includes source code for integration into the adaptive-optics software, documentation, and a component that provides a demonstration of loading DAC codes from a text file. On a standard Windows desktop computer, the software can update 128 channels in 10 ms. On Real-Time Linux with a digital I/O card, the software can update 1024 channels (8 boards in parallel) every 8 ms.

  5. AEST: Adaptive Eigenvalue Stability Code

    NASA Astrophysics Data System (ADS)

    Zheng, L.-J.; Kotschenreuther, M.; Waelbroeck, F.; van Dam, J. W.; Berk, H.

    2002-11-01

    An adaptive eigenvalue linear stability code is developed. The aim is on one hand to include the non-ideal MHD effects into the global MHD stability calculation for both low and high n modes and on the other hand to resolve the numerical difficulty involving MHD singularity on the rational surfaces at the marginal stability. Our code follows some parts of philosophy of DCON by abandoning relaxation methods based on radial finite element expansion in favor of an efficient shooting procedure with adaptive gridding. The δ W criterion is replaced by the shooting procedure and subsequent matrix eigenvalue problem. Since the technique of expanding a general solution into a summation of the independent solutions employed, the rank of the matrices involved is just a few hundreds. This makes easier to solve the eigenvalue problem with non-ideal MHD effects, such as FLR or even full kinetic effects, as well as plasma rotation effect, taken into account. To include kinetic effects, the approach of solving for the distribution function as a local eigenvalue ω problem as in the GS2 code will be employed in the future. Comparison of the ideal MHD version of the code with DCON, PEST, and GATO will be discussed. The non-ideal MHD version of the code will be employed to study as an application the transport barrier physics in tokamak discharges.

  6. European coding system for tissues and cells: a challenge unmet?

    PubMed

    Reynolds, Melvin; Warwick, Ruth M; Poniatowski, Stefan; Trias, Esteve

    2010-11-01

    The Comité Européen de Normalisation (European Committee for Standardization, CEN) Workshop on Coding of Information and Traceability of Human Tissues and Cells was established by the Expert Working Group of the Directorate General for Health and Consumer Affairs of the European Commission (DG SANCO) to identify requirements concerning the coding of information and the traceability of human tissues and cells, and propose guidelines and recommendations to permit the implementation of the European Coding system required by the European Tissues and Cells Directive 2004/23/EC (ED). The Workshop included over 70 voluntary participants from tissue, blood and eye banks, national ministries for healthcare, transplant organisations, universities and coding organisations; mainly from Europe with a small number of representatives from professionals in Canada, Australia, USA and Japan. The Workshop commenced in April 2007 and held its final meeting in February 2008. The draft Workshop Agreement went through a public comment phase from 15 December 2007 until 15 January 2008 and the endorsement period ran from 9 April 2008 until 2 May 2008. The endorsed CEN Workshop Agreement (CWA) set out the issues regarding a common coding system, qualitatively assessed what the industry felt was required of a coding system, reviewed coding systems that were put forward as potential European coding systems and established a basic specification for a proposed European coding system for human tissues and cells, based on ISBT 128, and which is compatible with existing systems of donation identification, traceability and nomenclatures, indicating how implementation of that system could be approached. The CWA, and the associated Workshop proposals with recommendations, were finally submitted to the European Commission and to the Committee of Member States that assists its management process under article 29 of the Directive 2004/23/EC on May 25 2008. In 2009 the European Commission initiated an

  7. Identification of sorption processes and parameters for radionuclide transport in fractured rock

    NASA Astrophysics Data System (ADS)

    Dai, Zhenxue; Wolfsberg, Andrew; Reimus, Paul; Deng, Hailin; Kwicklis, Edward; Ding, Mei; Ware, Doug; Ye, Ming

    2012-01-01

    SummaryIdentification of chemical reaction processes in subsurface environments is a key issue for reactive transport modeling because simulating different processes requires developing different chemical-mathematical models. In this paper, two sorption processes (equilibrium and kinetics) are considered for modeling neptunium and uranium sorption in fractured rock. Based on different conceptualizations of the two processes occurring in fracture and/or matrix media, seven dual-porosity, multi-component reactive transport models are developed. The process models are identified with a stepwise strategy by using multi-tracer concentration data obtained from a series of transport experiments. In the first step, breakthrough data of a conservative tracer (tritium) obtained from four experiments are used to estimate the flow and non-reactive transport parameters (i.e., mean fluid residence time in fracture, fracture aperture, and matrix tortuosity) common to all the reactive transport models. In the second and third steps, by fixing the common non-reactive flow and transport parameters, the sorption parameters (retardation factor, sorption coefficient, and kinetic rate constant) of each model are estimated using the breakthrough data of reactive tracers, neptunium and uranium, respectively. Based on the inverse modeling results, the seven sorption-process models are discriminated using four model discrimination (or selection) criteria, Akaike information criterion ( AIC), modified Akaike information criterion ( AICc), Bayesian information criterion ( BIC) and Kashyap information criterion ( KIC). These criteria suggest the kinetic sorption process for modeling reactive transport of neptunium and uranium transport in both fracture and matrix. This conclusion is confirmed by two chemical criteria, the half reaction time and Damköhler number criterion.

  8. Some partial-unit-memory convolutional codes

    NASA Technical Reports Server (NTRS)

    Abdel-Ghaffar, K.; Mceliece, R. J.; Solomon, G.

    1991-01-01

    The results of a study on a class of error correcting codes called partial unit memory (PUM) codes are presented. This class of codes, though not entirely new, has until now remained relatively unexplored. The possibility of using the well developed theory of block codes to construct a large family of promising PUM codes is shown. The performance of several specific PUM codes are compared with that of the Voyager standard (2, 1, 6) convolutional code. It was found that these codes can outperform the Voyager code with little or no increase in decoder complexity. This suggests that there may very well be PUM codes that can be used for deep space telemetry that offer both increased performance and decreased implementational complexity over current coding systems.

  9. Structural system identification: Structural dynamics model validation

    SciTech Connect

    Red-Horse, J.R.

    1997-04-01

    Structural system identification is concerned with the development of systematic procedures and tools for developing predictive analytical models based on a physical structure`s dynamic response characteristics. It is a multidisciplinary process that involves the ability (1) to define high fidelity physics-based analysis models, (2) to acquire accurate test-derived information for physical specimens using diagnostic experiments, (3) to validate the numerical simulation model by reconciling differences that inevitably exist between the analysis model and the experimental data, and (4) to quantify uncertainties in the final system models and subsequent numerical simulations. The goal of this project was to develop structural system identification techniques and software suitable for both research and production applications in code and model validation.

  10. Power system identification toolbox: Phase two progress

    SciTech Connect

    Trudnowski, D.J.

    1994-08-01

    This report describes current progress on a project funded by the Bonneville Power Administration (BPA) to develop a set of state-of-the-art analysis software (termed the Power System Identification [PSI] Toolbox) for fitting dynamic models to measured data. The project is being conducted as a three-phase effort. The first phase, completed in late 1992, involved investigating the characteristics of the analysis techniques by evaluating existing software and developing guidelines for best use. Phase Two includes extending current software, developing new analysis algorithms and software, and demonstrating and developing applications. The final phase will focus on reorganizing the software into a modular collection of documented computer programs and developing user manuals with instruction and application guidelines. Phase Two is approximately 50% complete; progress to date and a vision for the final product of the PSI Toolbox are described. The needs of the power industry for specialized system identification methods are particularly acute. The industry is currently pushing to operate transmission systems much closer to theoretical limits by using real-time, large-scale control systems to dictate power flows and maintain dynamic stability. Reliably maintaining stability requires extensive system-dynamic modeling and analysis capability, including measurement-based methods. To serve this need, the BPA has developed specialized system-identification computer codes through in-house efforts and university contract research over the last several years. To make full integrated use of the codes, as well as other techniques, the BPA has commissioned Pacific Northwest Laboratory (PNL) to further develop the codes and techniques into the PSI Toolbox.

  11. FLOWTRAN-TF code description

    SciTech Connect

    Flach, G.P.

    1991-09-01

    FLOWTRAN-TF is a two-component (air-water), two-phase thermal-hydraulics code designed for performing accident analyses of SRS reactor fuel assemblies during the Emergency Cooling System (ECS) phase of a Double Ended Guillotine Break (DEGB) Loss of Coolant Accident (LOCA). This report provides a brief description of the physical models in the version of FLOWTRAN-TF used to compute the Recommended K-Reactor Restart ECS Power Limit. This document is viewed as an interim report and should ultimately be superseded by a comprehensive user/programmer manual. In general, only high level discussions of governing equations and constitutive laws are presented. Numerical implementation of these models, code architecture and user information are not generally covered. A companion document describing code benchmarking is available.

  12. FLOWTRAN-TF code benchmarking

    SciTech Connect

    Flach, G.P.

    1990-12-01

    FLOWTRAN-TF is a two-component (air-water), two-phase thermal-hydraulics code designed for performing accident analyses of SRS reactor fuel assemblies during the Emergency Cooling System (ECS) phase of a Double Ended Guillotine Break (DEGB) Loss Of Coolant Accident (LOCA). A description of the code is given by Flach et al. (1990). This report provides benchmarking results for the version of FLOWTRAN-TF used to compute the Recommended K-Reactor Restart ECS Power Limit (Smith et al., 1990a; 1990b). Individual constitutive relations are benchmarked in Sections 2 through 5 while in Sections 6 and 7 integral code benchmarking results are presented. An overall assessment of FLOWTRAN-TF for its intended use in computing the ECS power limit completes the document.

  13. Code-multiplexed optical scanner

    NASA Astrophysics Data System (ADS)

    Riza, Nabeel A.; Arain, Muzammil A.

    2003-03-01

    A three-dimensional (3-D) optical-scanning technique is proposed based on spatial optical phase code activation on an input beam. This code-multiplexed optical scanner (C-MOS) relies on holographically stored 3-D beam-forming information. Proof-of-concept C-MOS experimental results by use of a photorefractive crystal as a holographic medium generates eight beams representing a basic 3-D voxel element generated via a binary-code matrix of the Hadamard type. The experiment demonstrates the C-MOS features of no moving parts, beam-forming flexibility, and large centimeter-size apertures. A novel application of the C-MOS as an optical security lock is highlighted.

  14. Verification of FANTASTIC integrated code

    NASA Technical Reports Server (NTRS)

    Chauhan, Rajinder Singh

    1987-01-01

    FANTASTIC is an acronym for Failure Analysis Nonlinear Thermal and Structural Integrated Code. This program was developed by Failure Analysis Associates, Palo Alto, Calif., for MSFC to improve the accuracy of solid rocket motor nozzle analysis. FANTASTIC has three modules: FACT - thermochemical analysis; FAHT - heat transfer analysis; and FAST - structural analysis. All modules have keywords for data input. Work is in progress for the verification of the FAHT module, which is done by using data for various problems with known solutions as inputs to the FAHT module. The information obtained is used to identify problem areas of the code and passed on to the developer for debugging purposes. Failure Analysis Associates have revised the first version of the FANTASTIC code and a new improved version has been released to the Thermal Systems Branch.

  15. Pulse code modulated signal synchronizer

    NASA Technical Reports Server (NTRS)

    Kobayashi, H. S. (Inventor)

    1974-01-01

    A bit synchronizer for a split phase PCM transmission is reported that includes three loop circuits which receive incoming phase coded PCM signals. In the first loop, called a Q-loop, a generated, phase coded, PCM signal is multiplied with the incoming signals, and the frequency and phase of the generated signal are nulled to that of the incoming subcarrier signal. In the second loop, called a B-loop, a circuit multiplies a generated signal with incoming signals to null the phase of the generated signal in a bit phase locked relationship to the incoming signal. In a third loop, called the I-loop, a phase coded PCM signal is multiplied with the incoming signals for decoding the bit information from the PCM signal. A counter means is used for timing of the generated signals and timing of sample intervals for each bit period.

  16. A coded tracking telemetry system

    USGS Publications Warehouse

    Howey, P.W.; Seegar, W.S.; Fuller, M.R.; Titus, K.

    1989-01-01

    We describe the general characteristics of an automated radio telemetry system designed to operate for prolonged periods on a single frequency. Each transmitter sends a unique coded signal to a receiving system that encodes and records only the appropriater, pre-programmed codes. A record of the time of each reception is stored on diskettes in a micro-computer. This system enables continuous monitoring of infrequent signals (e.g. one per minute or one per hour), thus extending operation life or allowing size reduction of the transmitter, compared to conventional wildlife telemetry. Furthermore, when using unique codes transmitted on a single frequency, biologists can monitor many individuals without exceeding the radio frequency allocations for wildlife.

  17. FLOWTRAN-TF code description

    SciTech Connect

    Flach, G.P.

    1990-12-01

    FLOWTRAN-TF is a two-component (air-water), two-phase thermal-hydraulics code designed for performing accident analyses of SRS reactor fuel assemblies during the Emergency Cooling System (ECS) phase of a Double Ended Guillotine Break (DEGB) Loss of Coolant Accident (LOCA). This report provides a brief description of the physical models in the version of FLOWTRAN-TF used to compute the Recommended K-Reactor Restart ECS Power Limit. This document is viewed as an interim report and should ultimately be superseded by a comprehensive user/programmer manual. In general, only high level discussions of governing equations and constitutive laws are presented. Numerical implementation of these models, code architecture and user information are not generally covered. A companion document describing code benchmarking is available.

  18. ASME Code Efforts Supporting HTGRs

    SciTech Connect

    D.K. Morton

    2010-09-01

    In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

  19. ASME Code Efforts Supporting HTGRs

    SciTech Connect

    D.K. Morton

    2011-09-01

    In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

  20. ASME Code Efforts Supporting HTGRs

    SciTech Connect

    D.K. Morton

    2012-09-01

    In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.