Science.gov

Sample records for code execution detection

  1. Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution

    NASA Astrophysics Data System (ADS)

    Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon

    The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on

  2. Executable Code Recognition in Network Flows Using Instruction Transition Probabilities

    NASA Astrophysics Data System (ADS)

    Kim, Ikkyun; Kang, Koohong; Choi, Yangseo; Kim, Daewon; Oh, Jintae; Jang, Jongsoo; Han, Kijun

    The ability to recognize quickly inside network flows to be executable is prerequisite for malware detection. For this purpose, we introduce an instruction transition probability matrix (ITPX) which is comprised of the IA-32 instruction sets and reveals the characteristics of executable code's instruction transition patterns. And then, we propose a simple algorithm to detect executable code inside network flows using a reference ITPX which is learned from the known Windows Portable Executable files. We have tested the algorithm with more than thousands of executable and non-executable codes. The results show that it is very promising enough to use in real world.

  3. Detection of malicious computer executables

    DOEpatents

    Cai, Dongming M.; Gokhale, Maya

    2009-04-14

    A method of detecting malicious binary executable files is accomplished by inputting a binary executable file; converting the binary executable file to byte hexadecimal text strings; calculating the frequency of each byte pattern in the byte hexadecimal text strings; selecting characteristic byte pattern frequencies as discriminating features; classifying the discriminating features as malicious or benign; labeling the binary executable file as malicious or benign; and outputting the labeled malicious or benign binary executable file.

  4. Static Analysis of Executables to Detect Malicious Patterns

    DTIC Science & Technology

    2006-01-01

    attention on viruses . A computer virus replicates itself by inserting a copy of its code (the viral code) into a host program. When a user executes the...easier when viruses originate from the same source code, with only minor modifications and updates. Thus, a virus signature can be common to sev- eral...software cannot detect these “morphed” viruses . Therefore, to detect an obfus- cated virus , the virus scanners first must undo the ob- fuscation

  5. 17 CFR 232.106 - Prohibition against electronic submissions containing executable code.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... executable code will be suspended, unless the executable code is contained only in one or more PDF documents, in which case the submission will be accepted but the PDF document(s) containing executable code will...

  6. Model-Driven Engineering of Machine Executable Code

    NASA Astrophysics Data System (ADS)

    Eichberg, Michael; Monperrus, Martin; Kloppenburg, Sven; Mezini, Mira

    Implementing static analyses of machine-level executable code is labor intensive and complex. We show how to leverage model-driven engineering to facilitate the design and implementation of programs doing static analyses. Further, we report on important lessons learned on the benefits and drawbacks while using the following technologies: using the Scala programming language as target of code generation, using XML-Schema to express a metamodel, and using XSLT to implement (a) transformations and (b) a lint like tool. Finally, we report on the use of Prolog for writing model transformations.

  7. System for loading executable code into volatile memory in a downhole tool

    DOEpatents

    Hall, David R.; Bartholomew, David B.; Johnson, Monte L.

    2007-09-25

    A system for loading an executable code into volatile memory in a downhole tool string component comprises a surface control unit comprising executable code. An integrated downhole network comprises data transmission elements in communication with the surface control unit and the volatile memory. The executable code, stored in the surface control unit, is not permanently stored in the downhole tool string component. In a preferred embodiment of the present invention, the downhole tool string component comprises boot memory. In another embodiment, the executable code is an operating system executable code. Preferably, the volatile memory comprises random access memory (RAM). A method for loading executable code to volatile memory in a downhole tool string component comprises sending the code from the surface control unit to a processor in the downhole tool string component over the network. A central processing unit writes the executable code in the volatile memory.

  8. DROP: Detecting Return-Oriented Programming Malicious Code

    NASA Astrophysics Data System (ADS)

    Chen, Ping; Xiao, Hai; Shen, Xiaobin; Yin, Xinchun; Mao, Bing; Xie, Li

    Return-Oriented Programming (ROP) is a new technique that helps the attacker construct malicious code mounted on x86/SPARC executables without any function call at all. Such technique makes the ROP malicious code contain no instruction, which is different from existing attacks. Moreover, it hides the malicious code in benign code. Thus, it circumvents the approaches that prevent control flow diversion outside legitimate regions (such as W ⊕ X ) and most malicious code scanning techniques (such as anti-virus scanners). However, ROP has its own intrinsic feature which is different from normal program design: (1) uses short instruction sequence ending in "ret", which is called gadget, and (2) executes the gadgets contiguously in specific memory space, such as standard GNU libc. Based on the features of the ROP malicious code, in this paper, we present a tool DROP, which is focused on dynamically detecting ROP malicious code. Preliminary experimental results show that DROP can efficiently detect ROP malicious code, and have no false positives and negatives.

  9. Execution Time Optimization Analysis on Multiple Algorithms Performance of Moving Object Edge Detection

    NASA Astrophysics Data System (ADS)

    Islam, Syed Zahurul; Islam, Syed Zahidul; Jidin, Razali; Ali, Mohd. Alauddin Mohd.

    2010-06-01

    Computer vision and digital image processing comprises varieties of applications, where some of these used in image processing include convolution, edge detection as well as contrast enhancement. This paper analyzes execution time optimization analysis between Sobel and Canny image processing algorithms in terms of moving objects edge detection. Sobel and Canny edge detection algorithms have been described with pseudo code and detailed flow chart and implemented in C and MATLAB respectively on different platforms to evaluate performance and execution time for moving cars. It is shown that Sobel algorithm is very effective in case of moving multiple cars and blurs images with efficient execution time. Moreover, convolution operation of Canny takes 94-95% time of total execution time with thin and smooth but redundant edges. This also makes more robust of Sobel to detect moving cars edges.

  10. 17 CFR 232.106 - Prohibition against electronic submissions containing executable code.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., in which case the submission will be accepted but the PDF document(s) containing executable code will... Filer Manual section also may be a violation of the Computer Fraud and Abuse Act of 1986, as...

  11. The role of the PIRT process in identifying code improvements and executing code development

    SciTech Connect

    Wilson, G.E.; Boyack, B.E.

    1997-07-01

    In September 1988, the USNRC issued a revised ECCS rule for light water reactors that allows, as an option, the use of best estimate (BE) plus uncertainty methods in safety analysis. The key feature of this licensing option relates to quantification of the uncertainty in the determination that an NPP has a {open_quotes}low{close_quotes} probability of violating the safety criteria specified in 10 CFR 50. To support the 1988 licensing revision, the USNRC and its contractors developed the CSAU evaluation methodology to demonstrate the feasibility of the BE plus uncertainty approach. The PIRT process, Step 3 in the CSAU methodology, was originally formulated to support the BE plus uncertainty licensing option as executed in the CSAU approach to safety analysis. Subsequent work has shown the PIRT process to be a much more powerful tool than conceived in its original form. Through further development and application, the PIRT process has shown itself to be a robust means to establish safety analysis computer code phenomenological requirements in their order of importance to such analyses. Used early in research directed toward these objectives, PIRT results also provide the technical basis and cost effective organization for new experimental programs needed to improve the safety analysis codes for new applications. The primary purpose of this paper is to describe the generic PIRT process, including typical and common illustrations from prior applications. The secondary objective is to provide guidance to future applications of the process to help them focus, in a graded approach, on systems, components, processes and phenomena that have been common in several prior applications.

  12. Towards a testbed for malicious code detection

    SciTech Connect

    Lo, R.; Kerchen, P.; Crawford, R.; Ho, W.; Crossley, J.; Fink, G.; Levitt, K.; Olsson, R.; Archer, M. . Div. of Computer Science)

    1991-01-01

    This paper proposes an environment for detecting many types of malicious code, including computer viruses, Trojan horses, and time/logic bombs. This malicious code testbed (MCT) is based upon both static and dynamic analysis tools developed at the University of California, Davis, which have been shown to be effective against certain types of malicious code. The testbed extends the usefulness of these tools by using them in a complementary fashion to detect more general cases of malicious code. Perhaps more importantly, the MCT allows administrators and security analysts to check a program before installation, thereby avoiding any damage a malicious program might inflict. 5 refs., 2 figs., 2 tabs.

  13. Accelerating execution of the integrated TIGER series Monte Carlo radiation transport codes

    SciTech Connect

    Smith, L.M.; Hochstedler, R.D.

    1997-02-01

    Execution of the integrated TIGER series (ITS) of coupled electron/photon Monte Carlo radiation transport codes has been accelerated by modifying the FORTRAN source code for more efficient computation. Each member code of ITS was benchmarked and profiled with a specific test case that directed the acceleration effort toward the most computationally intensive subroutines. Techniques for accelerating these subroutines included replacing linear search algorithms with binary versions, replacing the pseudo-random number generator, reducing program memory allocation, and proofing the input files for geometrical redundancies. All techniques produced identical or statistically similar results to the original code. Final benchmark timing of the accelerated code resulted in speed-up factors of 2.00 for TIGER (the one-dimensional slab geometry code), 1.74 for CYLTRAN (the two-dimensional cylindrical geometry code), and 1.90 for ACCEPT (the arbitrary three-dimensional geometry code).

  14. Are You Overpaying Your Academic Executive Team? A Method for Detecting Unmerited Academic Executive Compensation

    ERIC Educational Resources Information Center

    Pearce, Joshua

    2016-01-01

    University tuition fees and student debt have risen in part due to rapid expansion of university administration compensation. This study provides a novel methodology for detecting inappropriate executive compensation within universities. The usefulness of academic ideas is openly ranked using the h-index. By comparing the ratio of academic…

  15. Are You Overpaying Your Academic Executive Team? A Method for Detecting Unmerited Academic Executive Compensation

    ERIC Educational Resources Information Center

    Pearce, Joshua

    2016-01-01

    University tuition fees and student debt have risen in part due to rapid expansion of university administration compensation. This study provides a novel methodology for detecting inappropriate executive compensation within universities. The usefulness of academic ideas is openly ranked using the h-index. By comparing the ratio of academic…

  16. Runtime Detection of C-Style Errors in UPC Code

    SciTech Connect

    Pirkelbauer, P; Liao, C; Panas, T; Quinlan, D

    2011-09-29

    Unified Parallel C (UPC) extends the C programming language (ISO C 99) with explicit parallel programming support for the partitioned global address space (PGAS), which provides a global memory space with localized partitions to each thread. Like its ancestor C, UPC is a low-level language that emphasizes code efficiency over safety. The absence of dynamic (and static) safety checks allows programmer oversights and software flaws that can be hard to spot. In this paper, we present an extension of a dynamic analysis tool, ROSE-Code Instrumentation and Runtime Monitor (ROSECIRM), for UPC to help programmers find C-style errors involving the global address space. Built on top of the ROSE source-to-source compiler infrastructure, the tool instruments source files with code that monitors operations and keeps track of changes to the system state. The resulting code is linked to a runtime monitor that observes the program execution and finds software defects. We describe the extensions to ROSE-CIRM that were necessary to support UPC. We discuss complications that arise from parallel code and our solutions. We test ROSE-CIRM against a runtime error detection test suite, and present performance results obtained from running error-free codes. ROSE-CIRM is released as part of the ROSE compiler under a BSD-style open source license.

  17. Automated assistance for detecting malicious code

    SciTech Connect

    Crawford, R.; Kerchen, P.; Levitt, K.; Olsson, R.; Archer, M.; Casillas, M.

    1993-06-18

    This paper gives an update on the continuing work on the Malicious Code Testbed (MCT). The MCT is a semi-automated tool, operating in a simulated, cleanroom environment, that is capable of detecting many types of malicious code, such as viruses, Trojan horses, and time/logic bombs. The MCT allows security analysts to check a program before installation, thereby avoiding any damage a malicious program might inflict.

  18. 76 FR 66235 - Bar Code Technologies for Drugs and Biological Products; Retrospective Review Under Executive...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-26

    ... HUMAN SERVICES Food and Drug Administration 21 CFR Parts 201 and 610 Bar Code Technologies for Drugs and Biological Products; Retrospective Review Under Executive Order 13563; Request for Comments AGENCY: Food and Drug Administration, HHS. ACTION: Notice; request for comments. SUMMARY: The Food and Drug...

  19. Error-Detecting Identification Codes for Algebra Students.

    ERIC Educational Resources Information Center

    Sutherland, David C.

    1990-01-01

    Discusses common error-detecting identification codes using linear algebra terminology to provide an interesting application of algebra. Presents examples from the International Standard Book Number, the Universal Product Code, bank identification numbers, and the ZIP code bar code. (YP)

  20. Concurrent error detecting codes for arithmetic processors

    NASA Technical Reports Server (NTRS)

    Lim, R. S.

    1979-01-01

    A method of concurrent error detection for arithmetic processors is described. Low-cost residue codes with check-length l and checkbase m = 2 to the l power - 1 are described for checking arithmetic operations of addition, subtraction, multiplication, division complement, shift, and rotate. Of the three number representations, the signed-magnitude representation is preferred for residue checking. Two methods of residue generation are described: the standard method of using modulo m adders and the method of using a self-testing residue tree. A simple single-bit parity-check code is described for checking the logical operations of XOR, OR, and AND, and also the arithmetic operations of complement, shift, and rotate. For checking complement, shift, and rotate, the single-bit parity-check code is simpler to implement than the residue codes.

  1. Transformation of Graphical ECA Policies into Executable PonderTalk Code

    NASA Astrophysics Data System (ADS)

    Romeikat, Raphael; Sinsel, Markus; Bauer, Bernhard

    Rules are becoming more and more important in business modeling and systems engineering and are recognized as a high-level programming paradigma. For the effective development of rules it is desired to start at a high level, e.g. with graphical rules, and to refine them into code of a particular rule language for implementation purposes later. An model-driven approach is presented in this paper to transform graphical rules into executable code in a fully automated way. The focus is on event-condition-action policies as a special rule type. These are modeled graphically and translated into the PonderTalk language. The approach may be extended to integrate other rule types and languages as well.

  2. The relationship between the WAIS-III digit symbol Coding and executive functioning.

    PubMed

    Davis, Andrew S; Pierson, Eric E

    2012-01-01

    The current study examined the performance of college students (N = 63) on the Coding subtest of the Wechsler Adult Intelligence Scale-Third Edition and examined whether differences in performance could in part be explained by performance on the Delis-Kaplan Executive Functions System Trail-Making Test. The results of a multiple regression analysis indicated that performance on Coding was correlated most with Letter-Number Sequencing and to a lesser extent with Visual Scanning and with Number Sequencing approaching significance. There was no significant relationship with Letter Sequencing or Motor Speed. The three significant predictor variables were then entered into a stepwise hierarchical regression analysis. Subsequent models using Visual Scanning and Number Sequencing did not improve the predictive value of the model. These results are consistent with other recent reports suggesting that performance on Coding taps cognitive skills and abilities beyond that of simple motor speed or paired-associative learning. The findings also suggest a limited improvement in understanding test performance using a process analysis approach.

  3. Intelligent Rover Execution for Detecting Life in the Atacama Desert

    NASA Technical Reports Server (NTRS)

    Baskaran, Vijayakumar; Muscettola, Nicola; Rijsman, David; Plaunt, Chris; Fry, Chuck

    2006-01-01

    On-board supervisory execution is crucial for the deployment of more capable and autonomous remote explorers. Planetary science is considering robotic explorers operating for long periods of time without ground supervision while interacting with a changing and often hostile environment. Effective and robust operations require on-board supervisory control with a high level of awareness of the principles of functioning of the environment and of the numerous internal subsystems that need to be coordinated. We describe an on-board rover executive that was deployed on a rover as past of the "Limits of Life in the Atacama Desert (LITA)" field campaign sponsored by the NASA ASTEP program. The executive was built using the Intelligent Distributed Execution Architecture (IDEA), an execution framework that uses model-based and plan-based supervisory control of its fundamental computational paradigm. We present the results of the third field experiment conducted in the Atacama desert (Chile) in August - October 2005.

  4. The algorithm of malicious code detection based on data mining

    NASA Astrophysics Data System (ADS)

    Yang, Yubo; Zhao, Yang; Liu, Xiabi

    2017-08-01

    Traditional technology of malicious code detection has low accuracy and it has insufficient detection capability for new variants. In terms of malicious code detection technology which is based on the data mining, its indicators are not accurate enough, and its classification detection efficiency is relatively low. This paper proposed the information gain ratio indicator based on the N-gram to choose signature, this indicator can accurately reflect the detection weight of the signature, and helped by C4.5 decision tree to elevate the algorithm of classification detection.

  5. Error-Detection Codes: Algorithms and Fast Implementation

    DTIC Science & Technology

    2005-01-01

    information on this or any other computing topic, please visit our Digital Library at www.computer.org/publications/ dlib . NGUYEN: ERROR-DETECTION CODES: ALGORITHMS AND FAST IMPLEMENTATION 11 ...in Appendix C (which can be found on the Computer Society Digital Library at http:// computer.org/tc/archives.htm). In this paper, we focus on code...the Computer Society Digital Library at http://computer.org/ tc/archives.htm) that include theoremproofs, code segments implemented in C programming

  6. Coded excitation plane wave imaging for shear wave motion detection.

    PubMed

    Song, Pengfei; Urban, Matthew W; Manduca, Armando; Greenleaf, James F; Chen, Shigao

    2015-07-01

    Plane wave imaging has greatly advanced the field of shear wave elastography thanks to its ultrafast imaging frame rate and the large field-of-view (FOV). However, plane wave imaging also has decreased penetration due to lack of transmit focusing, which makes it challenging to use plane waves for shear wave detection in deep tissues and in obese patients. This study investigated the feasibility of implementing coded excitation in plane wave imaging for shear wave detection, with the hypothesis that coded ultrasound signals can provide superior detection penetration and shear wave SNR compared with conventional ultrasound signals. Both phase encoding (Barker code) and frequency encoding (chirp code) methods were studied. A first phantom experiment showed an approximate penetration gain of 2 to 4 cm for the coded pulses. Two subsequent phantom studies showed that all coded pulses outperformed the conventional short imaging pulse by providing superior sensitivity to small motion and robustness to weak ultrasound signals. Finally, an in vivo liver case study on an obese subject (body mass index = 40) demonstrated the feasibility of using the proposed method for in vivo applications, and showed that all coded pulses could provide higher SNR shear wave signals than the conventional short pulse. These findings indicate that by using coded excitation shear wave detection, one can benefit from the ultrafast imaging frame rate and large FOV provided by plane wave imaging while preserving good penetration and shear wave signal quality, which is essential for obtaining robust shear elasticity measurements of tissue.

  7. Using recurrence plot analysis for software execution interpretation and fault detection

    NASA Astrophysics Data System (ADS)

    Mosdorf, M.

    2015-09-01

    This paper shows a method targeted at software execution interpretation and fault detection using recurrence plot analysis. In in the proposed approach recurrence plot analysis is applied to software execution trace that contains executed assembly instructions. Results of this analysis are subject to further processing with PCA (Principal Component Analysis) method that simplifies number coefficients used for software execution classification. This method was used for the analysis of five algorithms: Bubble Sort, Quick Sort, Median Filter, FIR, SHA-1. Results show that some of the collected traces could be easily assigned to particular algorithms (logs from Bubble Sort and FIR algorithms) while others are more difficult to distinguish.

  8. A Software Safety Certification Plug-in for Automated Code Generators (Executive Briefing)

    NASA Technical Reports Server (NTRS)

    Denney, Ewen; Schumann, Johann; Greaves, Doug

    2006-01-01

    A viewgraph presentation describing a certification tool to check the safety of auto-generated codes is shown. The topics include: 1) Auto-generated Code at NASA; 2) Safety of Auto-generated Code; 3) Technical Approach; and 4) Project Plan.

  9. Coded Excitation Plane Wave Imaging for Shear Wave Motion Detection

    PubMed Central

    Song, Pengfei; Urban, Matthew W.; Manduca, Armando; Greenleaf, James F.; Chen, Shigao

    2015-01-01

    Plane wave imaging has greatly advanced the field of shear wave elastography thanks to its ultrafast imaging frame rate and the large field-of-view (FOV). However, plane wave imaging also has decreased penetration due to lack of transmit focusing, which makes it challenging to use plane waves for shear wave detection in deep tissues and in obese patients. This study investigated the feasibility of implementing coded excitation in plane wave imaging for shear wave detection, with the hypothesis that coded ultrasound signals can provide superior detection penetration and shear wave signal-to-noise-ratio (SNR) compared to conventional ultrasound signals. Both phase encoding (Barker code) and frequency encoding (chirp code) methods were studied. A first phantom experiment showed an approximate penetration gain of 2-4 cm for the coded pulses. Two subsequent phantom studies showed that all coded pulses outperformed the conventional short imaging pulse by providing superior sensitivity to small motion and robustness to weak ultrasound signals. Finally, an in vivo liver case study on an obese subject (Body Mass Index = 40) demonstrated the feasibility of using the proposed method for in vivo applications, and showed that all coded pulses could provide higher SNR shear wave signals than the conventional short pulse. These findings indicate that by using coded excitation shear wave detection, one can benefit from the ultrafast imaging frame rate and large FOV provided by plane wave imaging while preserving good penetration and shear wave signal quality, which is essential for obtaining robust shear elasticity measurements of tissue. PMID:26168181

  10. The detection and extraction of interleaved code segments

    NASA Technical Reports Server (NTRS)

    Rugaber, Spencer; Stirewalt, Kurt; Wills, Linda M.

    1995-01-01

    This project is concerned with a specific difficulty that arises when trying to understand and modify computer programs. In particular, it is concerned with the phenomenon of 'interleaving' in which one section of a program accomplishes several purposes, and disentangling the code responsible for each purposes is difficult. Unraveling interleaved code involves discovering the purpose of each strand of computation, as well as understanding why the programmer decided to interleave the strands. Increased understanding improve the productivity and quality of software maintenance, enhancement, and documentation activities. It is the goal of the project to characterize the phenomenon of interleaving as a prerequisite for building tools to detect and extract interleaved code fragments.

  11. Study on detection techniques for laser fuze using pseudorandom code

    NASA Astrophysics Data System (ADS)

    Yan, Xiaopeng; Li, Ping; Jia, Ruili; Chen, Huimin

    2008-03-01

    With the development of semiconductor laser technology, laser proximity fuzes have been widely used in various kinds of guided missiles and routine ammunitions. An approach to pulsed laser fuze based on pseudorandom code is presented in this paper. Based on the principle of laser fuze using pseudorandom code, the system has been divided into emitting module, receiving module, optical system and information processing module. The different modules have been analyzed in details and principles for selecting the parameters of the modules are given. The testing shows that laser fuze based on pseudorandom code has a better ability of detection and a higher resistance to interference. The theoretic foundation is provided for scientifically designing pulsed laser fuze of pseudorandom code.

  12. Detecting and Characterizing Semantic Inconsistencies in Ported Code

    NASA Technical Reports Server (NTRS)

    Ray, Baishakhi; Kim, Miryung; Person,Suzette; Rungta, Neha

    2013-01-01

    Adding similar features and bug fixes often requires porting program patches from reference implementations and adapting them to target implementations. Porting errors may result from faulty adaptations or inconsistent updates. This paper investigates (1) the types of porting errors found in practice, and (2) how to detect and characterize potential porting errors. Analyzing version histories, we define five categories of porting errors, including incorrect control- and data-flow, code redundancy, inconsistent identifier renamings, etc. Leveraging this categorization, we design a static control- and data-dependence analysis technique, SPA, to detect and characterize porting inconsistencies. Our evaluation on code from four open-source projects shows that SPA can detect porting inconsistencies with 65% to 73% precision and 90% recall, and identify inconsistency types with 58% to 63% precision and 92% to 100% recall. In a comparison with two existing error detection tools, SPA improves precision by 14 to 17 percentage points.

  13. Plagiarism Detection Algorithm for Source Code in Computer Science Education

    ERIC Educational Resources Information Center

    Liu, Xin; Xu, Chan; Ouyang, Boyu

    2015-01-01

    Nowadays, computer programming is getting more necessary in the course of program design in college education. However, the trick of plagiarizing plus a little modification exists among some students' home works. It's not easy for teachers to judge if there's plagiarizing in source code or not. Traditional detection algorithms cannot fit this…

  14. Plagiarism Detection Algorithm for Source Code in Computer Science Education

    ERIC Educational Resources Information Center

    Liu, Xin; Xu, Chan; Ouyang, Boyu

    2015-01-01

    Nowadays, computer programming is getting more necessary in the course of program design in college education. However, the trick of plagiarizing plus a little modification exists among some students' home works. It's not easy for teachers to judge if there's plagiarizing in source code or not. Traditional detection algorithms cannot fit this…

  15. A Comparison of Source Code Plagiarism Detection Engines

    ERIC Educational Resources Information Center

    Lancaster, Thomas; Culwin, Fintan

    2004-01-01

    Automated techniques for finding plagiarism in student source code submissions have been in use for over 20 years and there are many available engines and services. This paper reviews the literature on the major modern detection engines, providing a comparison of them based upon the metrics and techniques they deploy. Generally the most common and…

  16. Detecting and Characterizing Semantic Inconsistencies in Ported Code

    NASA Technical Reports Server (NTRS)

    Ray, Baishakhi; Kim, Miryung; Person, Suzette J.; Rungta, Neha

    2013-01-01

    Adding similar features and bug fixes often requires porting program patches from reference implementations and adapting them to target implementations. Porting errors may result from faulty adaptations or inconsistent updates. This paper investigates (I) the types of porting errors found in practice, and (2) how to detect and characterize potential porting errors. Analyzing version histories, we define five categories of porting errors, including incorrect control- and data-flow, code redundancy, inconsistent identifier renamings, etc. Leveraging this categorization, we design a static control- and data-dependence analysis technique, SPA, to detect and characterize porting inconsistencies. Our evaluation on code from four open-source projects shows thai SPA can dell-oct porting inconsistencies with 65% to 73% precision and 90% recall, and identify inconsistency types with 58% to 63% precision and 92% to 100% recall. In a comparison with two existing error detection tools, SPA improves precision by 14 to 17 percentage points

  17. Multiple symbol differential detection of uncoded and trellis coded MPSK

    NASA Technical Reports Server (NTRS)

    Divsalar, Dariush; Simon, Marvin K.; Shahshahani, Mehrdad

    1989-01-01

    A differential detection for MPSK, which uses a multiple symbol observation interval, is presented and its performance analyzed and simulated. The technique makes use of maximum-likelihood sequence estimation of the transmitted phases rather than symbol-by-symbol detection as in conventional differential detection. As such the performance of this multiple symbol detection scheme fills the gap between conventional (two-symbol observation) differentially coherent detection of MPSK and ideal coherent of MPSK with differential encoding. The amount of improvement gained over conventional differential detection depends on the number of phases, M, and the number of additional symbol intervals added to the observation. What is particularly interesting is that substantial performance improvement can be obtained for only one or two additional symbol intervals of observation. The analysis and simulation results presented are for uncoded and trellis coded MPSK.

  18. FORTRAN Automated Code Evaluation System (faces) system documentation, version 2, mod 0. [error detection codes/user manuals (computer programs)

    NASA Technical Reports Server (NTRS)

    1975-01-01

    A system is presented which processes FORTRAN based software systems to surface potential problems before they become execution malfunctions. The system complements the diagnostic capabilities of compilers, loaders, and execution monitors rather than duplicating these functions. Also, it emphasizes frequent sources of FORTRAN problems which require inordinate manual effort to identify. The principle value of the system is extracting small sections of unusual code from the bulk of normal sequences. Code structures likely to cause immediate or future problems are brought to the user's attention. These messages stimulate timely corrective action of solid errors and promote identification of 'tricky' code. Corrective action may require recoding or simply extending software documentation to explain the unusual technique.

  19. Detection and Characterization of Phase-Coded Radar Signals

    DTIC Science & Technology

    2007-11-02

    Detection and Characterization of Phase-Coded Radar Signals 5c. PROGRAM ELEMENT NUMBER 5d. PROJECT NUMBER 5d. TASK NUMBER 6. AUTHOR( S ) Dr...Ernest R. Adams 5e. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) Cranfield University (RMCS) Shrivenham SN6 8LA United...Kingdom 8. PERFORMING ORGANIZATION REPORT NUMBER N/A 10. SPONSOR/MONITOR’S ACRONYM( S ) 9. SPONSORING/MONITORING AGENCY NAME( S ) AND

  20. Directed Incremental Symbolic Execution

    NASA Technical Reports Server (NTRS)

    Person, Suzette; Yang, Guowei; Rungta, Neha; Khurshid, Sarfraz

    2011-01-01

    The last few years have seen a resurgence of interest in the use of symbolic execution -- a program analysis technique developed more than three decades ago to analyze program execution paths. Scaling symbolic execution and other path-sensitive analysis techniques to large systems remains challenging despite recent algorithmic and technological advances. An alternative to solving the problem of scalability is to reduce the scope of the analysis. One approach that is widely studied in the context of regression analysis is to analyze the differences between two related program versions. While such an approach is intuitive in theory, finding efficient and precise ways to identify program differences, and characterize their effects on how the program executes has proved challenging in practice. In this paper, we present Directed Incremental Symbolic Execution (DiSE), a novel technique for detecting and characterizing the effects of program changes. The novelty of DiSE is to combine the efficiencies of static analysis techniques to compute program difference information with the precision of symbolic execution to explore program execution paths and generate path conditions affected by the differences. DiSE is a complementary technique to other reduction or bounding techniques developed to improve symbolic execution. Furthermore, DiSE does not require analysis results to be carried forward as the software evolves -- only the source code for two related program versions is required. A case-study of our implementation of DiSE illustrates its effectiveness at detecting and characterizing the effects of program changes.

  1. Roles for Coincidence Detection in Coding Amplitude-Modulated Sounds.

    PubMed

    Ashida, Go; Kretzberg, Jutta; Tollin, Daniel J

    2016-06-01

    Many sensory neurons encode temporal information by detecting coincident arrivals of synaptic inputs. In the mammalian auditory brainstem, binaural neurons of the medial superior olive (MSO) are known to act as coincidence detectors, whereas in the lateral superior olive (LSO) roles of coincidence detection have remained unclear. LSO neurons receive excitatory and inhibitory inputs driven by ipsilateral and contralateral acoustic stimuli, respectively, and vary their output spike rates according to interaural level differences. In addition, LSO neurons are also sensitive to binaural phase differences of low-frequency tones and envelopes of amplitude-modulated (AM) sounds. Previous physiological recordings in vivo found considerable variations in monaural AM-tuning across neurons. To investigate the underlying mechanisms of the observed temporal tuning properties of LSO and their sources of variability, we used a simple coincidence counting model and examined how specific parameters of coincidence detection affect monaural and binaural AM coding. Spike rates and phase-locking of evoked excitatory and spontaneous inhibitory inputs had only minor effects on LSO output to monaural AM inputs. In contrast, the coincidence threshold of the model neuron affected both the overall spike rates and the half-peak positions of the AM-tuning curve, whereas the width of the coincidence window merely influenced the output spike rates. The duration of the refractory period affected only the low-frequency portion of the monaural AM-tuning curve. Unlike monaural AM coding, temporal factors, such as the coincidence window and the effective duration of inhibition, played a major role in determining the trough positions of simulated binaural phase-response curves. In addition, empirically-observed level-dependence of binaural phase-coding was reproduced in the framework of our minimalistic coincidence counting model. These modeling results suggest that coincidence detection of excitatory

  2. Roles for Coincidence Detection in Coding Amplitude-Modulated Sounds

    PubMed Central

    Ashida, Go; Kretzberg, Jutta; Tollin, Daniel J.

    2016-01-01

    Many sensory neurons encode temporal information by detecting coincident arrivals of synaptic inputs. In the mammalian auditory brainstem, binaural neurons of the medial superior olive (MSO) are known to act as coincidence detectors, whereas in the lateral superior olive (LSO) roles of coincidence detection have remained unclear. LSO neurons receive excitatory and inhibitory inputs driven by ipsilateral and contralateral acoustic stimuli, respectively, and vary their output spike rates according to interaural level differences. In addition, LSO neurons are also sensitive to binaural phase differences of low-frequency tones and envelopes of amplitude-modulated (AM) sounds. Previous physiological recordings in vivo found considerable variations in monaural AM-tuning across neurons. To investigate the underlying mechanisms of the observed temporal tuning properties of LSO and their sources of variability, we used a simple coincidence counting model and examined how specific parameters of coincidence detection affect monaural and binaural AM coding. Spike rates and phase-locking of evoked excitatory and spontaneous inhibitory inputs had only minor effects on LSO output to monaural AM inputs. In contrast, the coincidence threshold of the model neuron affected both the overall spike rates and the half-peak positions of the AM-tuning curve, whereas the width of the coincidence window merely influenced the output spike rates. The duration of the refractory period affected only the low-frequency portion of the monaural AM-tuning curve. Unlike monaural AM coding, temporal factors, such as the coincidence window and the effective duration of inhibition, played a major role in determining the trough positions of simulated binaural phase-response curves. In addition, empirically-observed level-dependence of binaural phase-coding was reproduced in the framework of our minimalistic coincidence counting model. These modeling results suggest that coincidence detection of excitatory

  3. A Comparison of Source Code Plagiarism Detection Engines

    NASA Astrophysics Data System (ADS)

    Lancaster, Thomas; Culwin, Fintan

    2004-06-01

    Automated techniques for finding plagiarism in student source code submissions have been in use for over 20 years and there are many available engines and services. This paper reviews the literature on the major modern detection engines, providing a comparison of them based upon the metrics and techniques they deploy. Generally the most common and effective techniques are seen to involve tokenising student submissions then searching pairs of submissions for long common substrings, an example of what is defined to be a paired structural metric. Computing academics are recommended to use one of the two Web-based detection engines, MOSS and JPlag. It is shown that whilst detection is well established there are still places where further research would be useful, particularly where visual support of the investigation process is possible.

  4. Ethical guidance in the era of managed care: an analysis of the American College of Healthcare Executives' Code of Ethics.

    PubMed

    Higgins, W

    2000-01-01

    Market competition and the rise of managed care are transforming the healthcare system from a physician-dominated cottage industry into a manager-dominated corporate enterprise. The managed care revolution is also undermining the safe-guards offered by medical ethics and raising serious public concerns. These trends highlight the growing importance of ethical standards for managers. The most comprehensive ethical guidance for health service managers is contained in the American College of Healthcare Executives' (ACHE) Code of Ethics. An analysis of the ACHE Code suggests that it does not adequately address several ethical concerns associated with managed care. The ACHE may wish to develop a supplemental statement regarding ethical issues in managed care. A supplemental statement that provides more specific guidance in the areas of financial incentives to reduce utilization, social mission, consumer/patient information, and the health service manager's responsibility to patients could be extremely valuable in today's complex and rapidly changing environment. More specific ethical guidelines would not ensure individual or organizational compliance. However, they would provide professional standards that could guide decision making and help managers evaluate performance in managed care settings.

  5. Local graph regularized coding for salient object detection

    NASA Astrophysics Data System (ADS)

    Huo, Lina; Yang, Shuyuan; Jiao, Licheng; Wang, Shuang; Shi, Jiao

    2016-07-01

    Subspace segmentation based salient object detection has received increasing interests in recent years. To preserve the locality and similarity of regions, a grouping effect of representation is introduced to segment the salient object and background in subspace. Then a new saliency map is calculated by incorporating this local graph regularizer into coding, which explicitly explores the data self-representation model and thus locate more accurate salient regions. Moreover, a heuristic object-based dictionary from background superpixels is obtained in border set removing the image regions within the potential object regions. Experimental results on four large benchmark databases demonstrate that the proposed method performs favorably against eight recent state-of-the-art methods in terms of three evaluation criterions, with a reduction of MAE by 19.8% than GR and 29.3% than CB in the two SED datasets, respectively. Meanwhile, our method also runs faster than the comparative detection approaches.

  6. Mal-Xtract: Hidden Code Extraction using Memory Analysis

    NASA Astrophysics Data System (ADS)

    Lim, Charles; Syailendra Kotualubun, Yohanes; Suryadi; Ramli, Kalamullah

    2017-01-01

    Software packer has been used effectively to hide the original code inside a binary executable, making it more difficult for existing signature based anti malware software to detect malicious code inside the executable. A new method of written and rewritten memory section is introduced to to detect the exact end time of unpacking routine and extract original code from packed binary executable using Memory Analysis running in an software emulated environment. Our experiment results show that at least 97% of the original code from the various binary executable packed with different software packers could be extracted. The proposed method has also been successfully extracted hidden code from recent malware family samples.

  7. Coding for parallel execution of hardware-in-the-loop millimeter-wave scene generation models on multicore SIMD processor architectures

    NASA Astrophysics Data System (ADS)

    Olson, Richard F.

    2013-05-01

    Rendering of point scatterer based radar scenes for millimeter wave (mmW) seeker tests in real-time hardware-in-the-loop (HWIL) scene generation requires efficient algorithms and vector-friendly computer architectures for complex signal synthesis. New processor technology from Intel implements an extended 256-bit vector SIMD instruction set (AVX, AVX2) in a multi-core CPU design providing peak execution rates of hundreds of GigaFLOPS (GFLOPS) on one chip. Real world mmW scene generation code can approach peak SIMD execution rates only after careful algorithm and source code design. An effective software design will maintain high computing intensity emphasizing register-to-register SIMD arithmetic operations over data movement between CPU caches or off-chip memories. Engineers at the U.S. Army Aviation and Missile Research, Development and Engineering Center (AMRDEC) applied two basic parallel coding methods to assess new 256-bit SIMD multi-core architectures for mmW scene generation in HWIL. These include use of POSIX threads built on vector library functions and more portable, highlevel parallel code based on compiler technology (e.g. OpenMP pragmas and SIMD autovectorization). Since CPU technology is rapidly advancing toward high processor core counts and TeraFLOPS peak SIMD execution rates, it is imperative that coding methods be identified which produce efficient and maintainable parallel code. This paper describes the algorithms used in point scatterer target model rendering, the parallelization of those algorithms, and the execution performance achieved on an AVX multi-core machine using the two basic parallel coding methods. The paper concludes with estimates for scale-up performance on upcoming multi-core technology.

  8. Contrasting the American College of Healthcare Executives' code of ethics with undergraduate health administration students' values and ethical decision choices.

    PubMed

    Rubens, Arthur J; Wimberley, Edward T

    2004-01-01

    Although administrative ethics are imbedded into the code of ethics of the American College of Healthcare Executives (ACHE), understanding the values and ethical decision-making practices of health administration students can help shape content and curriculum for health administration programs in the future. The study surveyed a sample of undergraduate health administration students to examine their sense of honesty and ethical decision-making practices. The sampled students completed the Comparative Emphasis Scale, which measured the student's sense of honesty, fairness, and integrity, and 10 short cases of administrative ethical issues derived from the ACHE Code of Ethics. The findings from the study indicated that the health administrative students had moderate to high mean scores on the ethical scales measuring achievement (15.86), concern for others (17.82), fairness (17.67), and honesty (18.21). The students' overall mean score for the 10 ethical cases was 3.51 on a 5-point scale, with 1 indicating a low likelihood and 5 a high likelihood. Pearson's product-moment correlation coefficient showed a minimum relationship between results of the Comparative Emphasis Scale and responses to ethical decision-making cases, and it showed no significant relationship between race, gender, and class (freshman, sophomore, junior, or senior) of the students. The results of the study have indicated that the sampled undergraduate health administration students respond at a moderate to high ethical level to this standardized scale and cases involving ACHE administrative ethical issues. Future research should explore the relationship between select variables concerning employment history, industry, position, and demographics characteristics in people's ethical choices.

  9. Coded-aperture Raman imaging for standoff explosive detection

    NASA Astrophysics Data System (ADS)

    McCain, Scott T.; Guenther, B. D.; Brady, David J.; Krishnamurthy, Kalyani; Willett, Rebecca

    2012-06-01

    This paper describes the design of a deep-UV Raman imaging spectrometer operating with an excitation wavelength of 228 nm. The designed system will provide the ability to detect explosives (both traditional military explosives and home-made explosives) from standoff distances of 1-10 meters with an interrogation area of 1 mm x 1 mm to 200 mm x 200 mm. This excitation wavelength provides resonant enhancement of many common explosives, no background fluorescence, and an enhanced cross-section due to the inverse wavelength scaling of Raman scattering. A coded-aperture spectrograph combined with compressive imaging algorithms will allow for wide-area interrogation with fast acquisition rates. Coded-aperture spectral imaging exploits the compressibility of hyperspectral data-cubes to greatly reduce the amount of acquired data needed to interrogate an area. The resultant systems are able to cover wider areas much faster than traditional push-broom and tunable filter systems. The full system design will be presented along with initial data from the instrument. Estimates for area scanning rates and chemical sensitivity will be presented. The system components include a solid-state deep-UV laser operating at 228 nm, a spectrograph consisting of well-corrected refractive imaging optics and a reflective grating, an intensified solar-blind CCD camera, and a high-efficiency collection optic.

  10. Error detecting capabilities of the shortened Hamming codes adopted for error detection in IEEE Standard 802.3

    NASA Technical Reports Server (NTRS)

    Fujiwara, Toru; Kasami, Tadao; Lin, Shu

    1989-01-01

    The error-detecting capabilities of the shortened Hamming codes adopted for error detection in IEEE Standard 802.3 are investigated. These codes are also used for error detection in the data link layer of the Ethernet, a local area network. The weight distributions for various code lengths are calculated to obtain the probability of undetectable error and that of detectable error for a binary symmetric channel with bit-error rate between 0.00001 and 1/2.

  11. Error detecting capabilities of the shortened Hamming codes adopted for error detection in IEEE Standard 802.3

    NASA Technical Reports Server (NTRS)

    Fujiwara, Toru; Kasami, Tadao; Lin, Shu

    1989-01-01

    The error-detecting capabilities of the shortened Hamming codes adopted for error detection in IEEE Standard 802.3 are investigated. These codes are also used for error detection in the data link layer of the Ethernet, a local area network. The weight distributions for various code lengths are calculated to obtain the probability of undetectable error and that of detectable error for a binary symmetric channel with bit-error rate between 0.00001 and 1/2.

  12. Methodology for fast detection of false sharing in threaded scientific codes

    DOEpatents

    Chung, I-Hsin; Cong, Guojing; Murata, Hiroki; Negishi, Yasushi; Wen, Hui-Fang

    2014-11-25

    A profiling tool identifies a code region with a false sharing potential. A static analysis tool classifies variables and arrays in the identified code region. A mapping detection library correlates memory access instructions in the identified code region with variables and arrays in the identified code region while a processor is running the identified code region. The mapping detection library identifies one or more instructions at risk, in the identified code region, which are subject to an analysis by a false sharing detection library. A false sharing detection library performs a run-time analysis of the one or more instructions at risk while the processor is re-running the identified code region. The false sharing detection library determines, based on the performed run-time analysis, whether two different portions of the cache memory line are accessed by the generated binary code.

  13. Error Detecting and Error Correcting Codes: The New Mathematics of Shopping.

    ERIC Educational Resources Information Center

    Stacey, Kaye

    1998-01-01

    Outlines the embedded mathematics in which important but hidden calculations are being done for communications in commerce. Explains two key concepts, error detecting codes and error correcting codes. Illustrates these ideas using two familiar examples, barcodes and ISBN numbers. (ASK)

  14. mGrid: A load-balanced distributed computing environment for the remote execution of the user-defined Matlab code

    PubMed Central

    Karpievitch, Yuliya V; Almeida, Jonas S

    2006-01-01

    Background Matlab, a powerful and productive language that allows for rapid prototyping, modeling and simulation, is widely used in computational biology. Modeling and simulation of large biological systems often require more computational resources then are available on a single computer. Existing distributed computing environments like the Distributed Computing Toolbox, MatlabMPI, Matlab*G and others allow for the remote (and possibly parallel) execution of Matlab commands with varying support for features like an easy-to-use application programming interface, load-balanced utilization of resources, extensibility over the wide area network, and minimal system administration skill requirements. However, all of these environments require some level of access to participating machines to manually distribute the user-defined libraries that the remote call may invoke. Results mGrid augments the usual process distribution seen in other similar distributed systems by adding facilities for user code distribution. mGrid's client-side interface is an easy-to-use native Matlab toolbox that transparently executes user-defined code on remote machines (i.e. the user is unaware that the code is executing somewhere else). Run-time variables are automatically packed and distributed with the user-defined code and automated load-balancing of remote resources enables smooth concurrent execution. mGrid is an open source environment. Apart from the programming language itself, all other components are also open source, freely available tools: light-weight PHP scripts and the Apache web server. Conclusion Transparent, load-balanced distribution of user-defined Matlab toolboxes and rapid prototyping of many simple parallel applications can now be done with a single easy-to-use Matlab command. Because mGrid utilizes only Matlab, light-weight PHP scripts and the Apache web server, installation and configuration are very simple. Moreover, the web-based infrastructure of mGrid allows for it

  15. mGrid: a load-balanced distributed computing environment for the remote execution of the user-defined Matlab code.

    PubMed

    Karpievitch, Yuliya V; Almeida, Jonas S

    2006-03-15

    Matlab, a powerful and productive language that allows for rapid prototyping, modeling and simulation, is widely used in computational biology. Modeling and simulation of large biological systems often require more computational resources then are available on a single computer. Existing distributed computing environments like the Distributed Computing Toolbox, MatlabMPI, Matlab*G and others allow for the remote (and possibly parallel) execution of Matlab commands with varying support for features like an easy-to-use application programming interface, load-balanced utilization of resources, extensibility over the wide area network, and minimal system administration skill requirements. However, all of these environments require some level of access to participating machines to manually distribute the user-defined libraries that the remote call may invoke. mGrid augments the usual process distribution seen in other similar distributed systems by adding facilities for user code distribution. mGrid's client-side interface is an easy-to-use native Matlab toolbox that transparently executes user-defined code on remote machines (i.e. the user is unaware that the code is executing somewhere else). Run-time variables are automatically packed and distributed with the user-defined code and automated load-balancing of remote resources enables smooth concurrent execution. mGrid is an open source environment. Apart from the programming language itself, all other components are also open source, freely available tools: light-weight PHP scripts and the Apache web server. Transparent, load-balanced distribution of user-defined Matlab toolboxes and rapid prototyping of many simple parallel applications can now be done with a single easy-to-use Matlab command. Because mGrid utilizes only Matlab, light-weight PHP scripts and the Apache web server, installation and configuration are very simple. Moreover, the web-based infrastructure of mGrid allows for it to be easily extensible over

  16. Executive Functioning and Processing Speed in Age-Related Differences in Memory: Contribution of a Coding Task

    ERIC Educational Resources Information Center

    Baudouin, Alexia; Clarys, David; Vanneste, Sandrine; Isingrini, Michel

    2009-01-01

    The aim of the present study was to examine executive dysfunctioning and decreased processing speed as potential mediators of age-related differences in episodic memory. We compared the performances of young and elderly adults in a free-recall task. Participants were also given tests to measure executive functions and perceptual processing speed…

  17. Executive Functioning and Processing Speed in Age-Related Differences in Memory: Contribution of a Coding Task

    ERIC Educational Resources Information Center

    Baudouin, Alexia; Clarys, David; Vanneste, Sandrine; Isingrini, Michel

    2009-01-01

    The aim of the present study was to examine executive dysfunctioning and decreased processing speed as potential mediators of age-related differences in episodic memory. We compared the performances of young and elderly adults in a free-recall task. Participants were also given tests to measure executive functions and perceptual processing speed…

  18. Evaluation and Testing of the ADVANTG Code on SNM Detection

    SciTech Connect

    Shaver, Mark W.; Casella, Andrew M.; Wittman, Richard S.; Hayes, John W.

    2013-09-24

    Pacific Northwest National Laboratory (PNNL) has been tasked with evaluating the effectiveness of ORNL’s new hybrid transport code, ADVANTG, on scenarios of interest to our NA-22 sponsor, specifically of detection of diversion of special nuclear material (SNM). PNNL staff have determined that acquisition and installation of ADVANTG was relatively straightforward for a code in its phase of development, but probably not yet sufficient for mass distribution to the general user. PNNL staff also determined that with little effort, ADVANTG generated weight windows that typically worked for the problems and generated results consistent with MCNP. With slightly greater effort of choosing a finer mesh around detectors or sample reaction tally regions, the figure of merit (FOM) could be further improved in most cases. This does take some limited knowledge of deterministic transport methods. The FOM could also be increased by limiting the energy range for a tally to the energy region of greatest interest. It was then found that an MCNP run with the full energy range for the tally showed improved statistics in the region used for the ADVANTG run. The specific case of interest chosen by the sponsor is the CIPN project from Las Alamos National Laboratory (LANL), which is an active interrogation, non-destructive assay (NDA) technique to quantify the fissile content in a spent fuel assembly and is also sensitive to cases of material diversion. Unfortunately, weight windows for the CIPN problem cannot currently be properly generated with ADVANTG due to inadequate accommodations for source definition. ADVANTG requires that a fixed neutron source be defined within the problem and cannot account for neutron multiplication. As such, it is rendered useless in active interrogation scenarios. It is also interesting to note that this is a difficult problem to solve and that the automated weight windows generator in MCNP actually slowed down the problem. Therefore, PNNL had determined

  19. A dual-sided coded-aperture radiation detection system

    NASA Astrophysics Data System (ADS)

    Penny, R. D.; Hood, W. E.; Polichar, R. M.; Cardone, F. H.; Chavez, L. G.; Grubbs, S. G.; Huntley, B. P.; Kuharski, R. A.; Shyffer, R. T.; Fabris, L.; Ziock, K. P.; Labov, S. E.; Nelson, K.

    2011-10-01

    We report the development of a large-area, mobile, coded-aperture radiation imaging system for localizing compact radioactive sources in three dimensions while rejecting distributed background. The 3D Stand-Off Radiation Detection System (SORDS-3D) has been tested at speeds up to 95 km/h and has detected and located sources in the millicurie range at distances of over 100 m. Radiation data are imaged to a geospatially mapped world grid with a nominal 1.25- to 2.5-m pixel pitch at distances out to 120 m on either side of the platform. Source elevation is also extracted. Imaged radiation alarms are superimposed on a side-facing video log that can be played back for direct localization of sources in buildings in urban environments. The system utilizes a 37-element array of 5×5×50 cm 3 cesium-iodide (sodium) detectors. Scintillation light is collected by a pair of photomultiplier tubes placed at either end of each detector, with the detectors achieving an energy resolution of 6.15% FWHM (662 keV) and a position resolution along their length of 5 cm FWHM. The imaging system generates a dual-sided two-dimensional image allowing users to efficiently survey a large area. Imaged radiation data and raw spectra are forwarded to the RadioNuclide Analysis Kit (RNAK), developed by our collaborators, for isotope ID. An intuitive real-time display aids users in performing searches. Detector calibration is dynamically maintained by monitoring the potassium-40 peak and digitally adjusting individual detector gains. We have recently realized improvements, both in isotope identification and in distinguishing compact sources from background, through the installation of optimal-filter reconstruction kernels.

  20. Codon Distribution in Error-Detecting Circular Codes

    PubMed Central

    Fimmel, Elena; Strüngmann, Lutz

    2016-01-01

    In 1957, Francis Crick et al. suggested an ingenious explanation for the process of frame maintenance. The idea was based on the notion of comma-free codes. Although Crick’s hypothesis proved to be wrong, in 1996, Arquès and Michel discovered the existence of a weaker version of such codes in eukaryote and prokaryote genomes, namely the so-called circular codes. Since then, circular code theory has invariably evoked great interest and made significant progress. In this article, the codon distributions in maximal comma-free, maximal self-complementary C3 and maximal self-complementary circular codes are discussed, i.e., we investigate in how many of such codes a given codon participates. As the main (and surprising) result, it is shown that the codons can be separated into very few classes (three, or five, or six) with respect to their frequency. Moreover, the distribution classes can be hierarchically ordered as refinements from maximal comma-free codes via maximal self-complementary C3 codes to maximal self-complementary circular codes. PMID:26999215

  1. Codon Distribution in Error-Detecting Circular Codes.

    PubMed

    Fimmel, Elena; Strüngmann, Lutz

    2016-03-15

    In 1957, Francis Crick et al. suggested an ingenious explanation for the process of frame maintenance. The idea was based on the notion of comma-free codes. Although Crick's hypothesis proved to be wrong, in 1996, Arquès and Michel discovered the existence of a weaker version of such codes in eukaryote and prokaryote genomes, namely the so-called circular codes. Since then, circular code theory has invariably evoked great interest and made significant progress. In this article, the codon distributions in maximal comma-free, maximal self-complementary C³ and maximal self-complementary circular codes are discussed, i.e., we investigate in how many of such codes a given codon participates. As the main (and surprising) result, it is shown that the codons can be separated into very few classes (three, or five, or six) with respect to their frequency. Moreover, the distribution classes can be hierarchically ordered as refinements from maximal comma-free codes via maximal self-complementary C(3) codes to maximal self-complementary circular codes.

  2. Principles of error detection and error correction codes

    NASA Technical Reports Server (NTRS)

    Perlman, M.

    1971-01-01

    Report is reviewed which considers theoretical basis of groups, rings, fields, and vector spaces, and their relationship to algebraic coding theory. Report serves as summary for engineers and scientists involved in data handling and processing systems.

  3. The Effects of GPS M-Code on Radar Detection

    DTIC Science & Technology

    2003-03-25

    abbreviated as BOC (10,5)). BOC modulation details are sufficiently covered in [5]. Mathematically the transmitted M-code signal can be written as...2 −1 0 1 2 Time (sec) S W (t ) P N 5( t) Figure 2.1 Example of the M-code PN Sequence 2-2 The main result of the BOC (10,5) modulation is that the...MHz) P ow er S pe ct ra l D en si ty ( dB W /H z) f c Figure 2.2 PSD of BOC (10,5) M-Code Modulation Figure 2.3 illustrates a comparison of the M-code

  4. Bar Coding Platforms for Nucleic Acid and Protein Detection

    NASA Astrophysics Data System (ADS)

    Müller, Uwe R.

    A variety of novel bar coding systems has been developed as multiplex testing platforms for applications in biological, chemical, and biomedical diagnostics. Instead of identifying a target through capture at a specific locus on an array, target analytes are captured by a bar coded tag, which then uniquely identifies the target, akin to putting a UPC bar code on a product. This requires an appropriate surface functionalization to ensure that the correct target is captured with high efficiency. Moreover the tag, or bar code, has to be readable with minimal error and at high speed, typically by flow analysis. For quantitative assays the target may be labeled separately, or the tag may also serve as the label. A great variety of materials and physicochemical principles has been exploited to generate this plethora of novel bar coding platforms. Their advantages compared to microarray-based assay platforms include in-solution binding kinetics, flexibility in assay design, compatibility with microplate-based assay automation, high sample throughput, and with some assay formats, increased sensitivity.

  5. Parallel execution of a three-dimensional, chemically reacting, Navier-Stokes code on distributed-memory machines

    NASA Technical Reports Server (NTRS)

    Otto, John C.

    1993-01-01

    This paper describes the parallel version of the three-dimensional, chemically reacting, computational fluid dynamics (CFD) code, SPARK. This work was performed on the Intel iPSC/860-based parallel computers. The SPARK code utilizes relatively simple explicit numerical algorithms, but models complex chemical reactions. The code solves the equations over a regular structured mesh so a simple dam decomposition is used to assign work to the individual processors. The explicit nature of the algorithm, combined with the computational intensity of the chemistry calculations, results in a very low communication-to-computation ratio when compared to typical CFD codes. The efficiency of the parallel code is examined and shown to be about 65 percent when the problem size is scaled with the number of processors. Two low-angle wall-jet injection cases are solved to demonstrate the capability of the parallel code for solving large problems efficiently.

  6. Methods and computer executable instructions for marking a downhole elongate line and detecting same

    DOEpatents

    Watkins, Arthur D.

    2003-05-13

    Methods and computer executable instructions are provided for making an elongate line (22) with a plurality of marks (30) and detecting those marks (30) to determine a distance of the elongate line (22) in a downhole or a physical integrity thereof. In a preferred embodiment, each mark comprises a plurality of particles (44) having a substantially permanent magnetizing capability adhered to an exterior surface of the elongate line (22) at preselected intervals with an epoxy paint. The particles (44) are arranged at each interval as a plurality of bands (40). Thereafter, the particles are oriented into a magnetic signature for that interval by magnetizing the particles to create a magnetic field substantially normal to the exterior surface. This facilitates detection by a Hall effect probe. The magnetic signatures are stored in a computing configuration and, once a mark is detected, a correlation is made to a unique position on the elongate line by comparison with the stored magnetic signatures. Preferred particles include samarium-cobalt and neodymium-iron-boride.

  7. Guidelines for selecting codes for ground-water transport modeling of low-level waste burial sites. Executive summary

    SciTech Connect

    Simmons, C.S.; Cole, C.R.

    1985-05-01

    This document was written to provide guidance to managers and site operators on how ground-water transport codes should be selected for assessing burial site performance. There is a need for a formal approach to selecting appropriate codes from the multitude of potentially useful ground-water transport codes that are currently available. Code selection is a problem that requires more than merely considering mathematical equation-solving methods. These guidelines are very general and flexible and are also meant for developing systems simulation models to be used to assess the environmental safety of low-level waste burial facilities. Code selection is only a single aspect of the overall objective of developing a systems simulation model for a burial site. The guidance given here is mainly directed toward applications-oriented users, but managers and site operators need to be familiar with this information to direct the development of scientifically credible and defensible transport assessment models. Some specific advice for managers and site operators on how to direct a modeling exercise is based on the following five steps: identify specific questions and study objectives; establish costs and schedules for achieving answers; enlist the aid of professional model applications group; decide on approach with applications group and guide code selection; and facilitate the availability of site-specific data. These five steps for managers/site operators are discussed in detail following an explanation of the nine systems model development steps, which are presented first to clarify what code selection entails.

  8. An Approach for Detecting Inconsistencies between Behavioral Models of the Software Architecture and the Code

    SciTech Connect

    Ciraci, Selim; Sozer, Hasan; Tekinerdogan, Bedir

    2012-07-16

    In practice, inconsistencies between architectural documentation and the code might arise due to improper implementation of the architecture or the separate, uncontrolled evolution of the code. Several approaches have been proposed to detect the inconsistencies between the architecture and the code but these tend to be limited for capturing inconsistencies that might occur at runtime. We present a runtime verification approach for detecting inconsistencies between the dynamic behavior of the architecture and the actual code. The approach is supported by a set of tools that implement the architecture and the code patterns in Prolog, and support the automatic generation of runtime monitors for detecting inconsistencies. We illustrate the approach and the toolset for a Crisis Management System case study.

  9. Alamouti-Type Space-Time Coding for Free-Space Optical Communication with Direct Detection

    NASA Astrophysics Data System (ADS)

    Simon, M. K.; Vilnrotter, V.

    2003-11-01

    In optical communication systems employing direct detection at the receiver, intensity modulations such as on-off keying (OOK) or pulse-position modulation (PPM) are commonly used to convey the information. Consider the possibility of applying space-time coding in such a scenario, using, for example, an Alamouti-type coding scheme [1]. Implicit in the Alamouti code is the fact that the modulation that defines the signal set is such that it is meaningful to transmit and detect both the signal and its negative. While modulations such as phase-shift keying (PSK) and quadrature amplitude modulation (QAM) naturally fall into this class, OOK and PPM do not since the signal polarity (phase) would not be detected at the receiver. We investigate a modification of the Alamouti code to be used with such modulations that has the same desirable properties as the conventional Alamouti code but does not rely on the necessity of transmitting the negative of a signal.

  10. An accurate and reliable circular coded target detection algorithm for vision measurement

    NASA Astrophysics Data System (ADS)

    Chen, Ran; Zhong, Kai; Li, Zhongwei; Liu, Meng; Zhan, Guomin

    2016-11-01

    Distributing coded targets on the measured object is a reliable and common method for achieving optimum target location and accurate matching of corresponding targets among multi-view images. The circular coded targets which based on a central circular target surrounded by a coded band is widely used in vision measurement. However, it is difficult to decode the coded target while the number of pixels in the coded band is small or the projection angle is large. Aiming at solve this problem, a detection algorithm using the gray gradient to get the central angles of each coded section was proposed. In this algorithm, an accurate ellipse detection which can get sub-pixel locations was adopted to extract ellipse centers, and some false ellipses whose error in the fit of best fit is large will be rejected. Then, gray gradients in the coded band are calculated to get the central angle of each coded section, and the coded target will be decoded accurately. The experiment results show that the algorithm can locate and identify coded targets accurately under complex measurement conditions.

  11. Detecting Aspects of Critical Thinking by Cleaning Online Message Transcript through Code-Recode

    ERIC Educational Resources Information Center

    Oriogun, Peter K.

    2009-01-01

    In this article, the community of inquiry cognitive presence model was mapped to a recently developed semistructured approach to online discourse called SQUAD to detect aspects of critical or higher-order thinking online by cleaning online message transcript through the use of code-recode. It is argued that using code-recode in the way suggested…

  12. Process Model Improvement for Source Code Plagiarism Detection in Student Programming Assignments

    ERIC Educational Resources Information Center

    Kermek, Dragutin; Novak, Matija

    2016-01-01

    In programming courses there are various ways in which students attempt to cheat. The most commonly used method is copying source code from other students and making minimal changes in it, like renaming variable names. Several tools like Sherlock, JPlag and Moss have been devised to detect source code plagiarism. However, for larger student…

  13. Flow-Based Detection of Bar Coded Particles

    SciTech Connect

    Rose, K A; Dougherty, G M; Santiago, J G

    2005-06-24

    We have developed methods for flow control, electric field alignment, and readout of colloidal Nanobarcodes{copyright}. Our flow-based detection scheme leverages microfluidics and alternate current (AC) electric fields to align and image particles in a well-defined image plane. Using analytical models of the particle rotation in electric fields we can optimize the field strength and frequency necessary to align the particles. This detection platform alleviates loss of information in solution-based assays due to particle clumping during detection.

  14. A New Parallel Approach for Accelerating the GPU-Based Execution of Edge Detection Algorithms

    PubMed Central

    Emrani, Zahra; Bateni, Soroosh; Rabbani, Hossein

    2017-01-01

    Real-time image processing is used in a wide variety of applications like those in medical care and industrial processes. This technique in medical care has the ability to display important patient information graphi graphically, which can supplement and help the treatment process. Medical decisions made based on real-time images are more accurate and reliable. According to the recent researches, graphic processing unit (GPU) programming is a useful method for improving the speed and quality of medical image processing and is one of the ways of real-time image processing. Edge detection is an early stage in most of the image processing methods for the extraction of features and object segments from a raw image. The Canny method, Sobel and Prewitt filters, and the Roberts’ Cross technique are some examples of edge detection algorithms that are widely used in image processing and machine vision. In this work, these algorithms are implemented using the Compute Unified Device Architecture (CUDA), Open Source Computer Vision (OpenCV), and Matrix Laboratory (MATLAB) platforms. An existing parallel method for Canny approach has been modified further to run in a fully parallel manner. This has been achieved by replacing the breadth- first search procedure with a parallel method. These algorithms have been compared by testing them on a database of optical coherence tomography images. The comparison of results shows that the proposed implementation of the Canny method on GPU using the CUDA platform improves the speed of execution by 2–100× compared to the central processing unit-based implementation using the OpenCV and MATLAB platforms. PMID:28487831

  15. A New Parallel Approach for Accelerating the GPU-Based Execution of Edge Detection Algorithms.

    PubMed

    Emrani, Zahra; Bateni, Soroosh; Rabbani, Hossein

    2017-01-01

    Real-time image processing is used in a wide variety of applications like those in medical care and industrial processes. This technique in medical care has the ability to display important patient information graphi graphically, which can supplement and help the treatment process. Medical decisions made based on real-time images are more accurate and reliable. According to the recent researches, graphic processing unit (GPU) programming is a useful method for improving the speed and quality of medical image processing and is one of the ways of real-time image processing. Edge detection is an early stage in most of the image processing methods for the extraction of features and object segments from a raw image. The Canny method, Sobel and Prewitt filters, and the Roberts' Cross technique are some examples of edge detection algorithms that are widely used in image processing and machine vision. In this work, these algorithms are implemented using the Compute Unified Device Architecture (CUDA), Open Source Computer Vision (OpenCV), and Matrix Laboratory (MATLAB) platforms. An existing parallel method for Canny approach has been modified further to run in a fully parallel manner. This has been achieved by replacing the breadth- first search procedure with a parallel method. These algorithms have been compared by testing them on a database of optical coherence tomography images. The comparison of results shows that the proposed implementation of the Canny method on GPU using the CUDA platform improves the speed of execution by 2-100× compared to the central processing unit-based implementation using the OpenCV and MATLAB platforms.

  16. Different hue coding underlying figure segregation and region detection tasks.

    PubMed

    Nagai, Takehiro; Uchikawa, Keiji

    2009-08-28

    Figure segregation from its background is one of the important functions of color vision for our visual system because it is a preliminary to shape recognition. However, little is known about the chromatic mechanisms underlying figure segregation as opposed to those underlying mere color discrimination and detection. We investigated whether there are differences in color difference thresholds between a shape discrimination task (involving figure segregation) and a simple region detection task. In the shape discrimination task the observer discriminated the shapes of two figures, which could be segregated from their background on the basis of a color direction (hue) difference. In the region detection task the observer simply detected a square region against its background. Thresholds of color direction differences from a range of background color directions were measured for each task. In addition, we added saturation variation in one condition to investigate the involvement of the cone-opponent channels in those tasks. First, the results showed that the saturation variation increased the thresholds evenly for all background color directions. This suggests that higher-order color mechanisms rather than the early cone-opponent mechanisms are involved in both of the two tasks. Second, the shapes of the background color direction-threshold functions were different between the two tasks and these shape differences were consistent across all observers. This finding suggests that hue information may be encoded differently for shape discrimination and region detection. Furthermore, differences in spatial frequency components and in the requirement for orientation extraction rarely affected the shapes of the threshold functions in additional experiments, suggesting the possibility that hue encoding for shape discrimination differs from encoding for region detection at a late stage of form processing where local orientation signals are globally integrated.

  17. Multiplexed fluorescence readout using time responses of color coded signals for biomolecular detection

    PubMed Central

    Nishimura, Takahiro; Ogura, Yusuke; Tanida, Jun

    2016-01-01

    Fluorescence readout is an important technique for detecting biomolecules. In this paper, we present a multiplexed fluorescence readout method using time varied fluorescence signals. To generate the fluorescence signals, coded strands and a set of universal molecular beacons are introduced. Each coded strand represents the existence of an assigned target molecule. The coded strands have coded sequences to generate temporary fluorescence signals through binding to the molecular beacons. The signal generating processes are modeled based on the reaction kinetics between the coded strands and molecular beacons. The model is used to decode the detected fluorescence signals using maximum likelihood estimation. Multiplexed fluorescence readout was experimentally demonstrated with three molecular beacons. Numerical analysis showed that the readout accuracy was enhanced by the use of time-varied fluorescence signals. PMID:28018742

  18. Multiplexed fluorescence readout using time responses of color coded signals for biomolecular detection.

    PubMed

    Nishimura, Takahiro; Ogura, Yusuke; Tanida, Jun

    2016-12-01

    Fluorescence readout is an important technique for detecting biomolecules. In this paper, we present a multiplexed fluorescence readout method using time varied fluorescence signals. To generate the fluorescence signals, coded strands and a set of universal molecular beacons are introduced. Each coded strand represents the existence of an assigned target molecule. The coded strands have coded sequences to generate temporary fluorescence signals through binding to the molecular beacons. The signal generating processes are modeled based on the reaction kinetics between the coded strands and molecular beacons. The model is used to decode the detected fluorescence signals using maximum likelihood estimation. Multiplexed fluorescence readout was experimentally demonstrated with three molecular beacons. Numerical analysis showed that the readout accuracy was enhanced by the use of time-varied fluorescence signals.

  19. A Feasibility Study on the Impact of Agencies and Codes on University and College Energy Use. Volume I: Executive Summary.

    ERIC Educational Resources Information Center

    Association of Physical Plant Administrators of Universities and Colleges, Washington, DC.

    This feasibility study was made to determine the impact of agencies and organizations that review and apply codes and standards to new construction and major renovation projects affecting the ability of colleges and universities to use and conserve energy. The program involved a survey of four representative states--California for a moderate…

  20. Neural coding and perceptual detection in the primate somatosensory thalamus

    PubMed Central

    Vázquez, Yuriria; Zainos, Antonio; Alvarez, Manuel; Salinas, Emilio; Romo, Ranulfo

    2012-01-01

    The contribution of the sensory thalamus to perception and decision making is not well understood. We addressed this problem by recording single neurons in the ventral posterior lateral (VPL) nucleus of the somatosensory thalamus while trained monkeys judged the presence or absence of a vibrotactile stimulus of variable amplitude applied to the skin of a fingertip. We found that neurons in the VPL nucleus modulated their firing rate as a function of stimulus amplitude, and that such modulations accounted for the monkeys’ overall psychophysical performance. These neural responses did not predict the animals' decision reports in individual trials, however. Moreover, the sensitivity to changes in stimulus amplitude was similar when the monkeys’ performed the detection task and when they were not required to report stimulus detection. These results suggest that the primate somatosensory thalamus likely provides a reliable neural representation of the sensory input to the cerebral cortex, where sensory information is transformed and combined with other cognitive components associated with behavioral performance. PMID:22927423

  1. Accuracy comparison among different machine learning techniques for detecting malicious codes

    NASA Astrophysics Data System (ADS)

    Narang, Komal

    2016-03-01

    In this paper, a machine learning based model for malware detection is proposed. It can detect newly released malware i.e. zero day attack by analyzing operation codes on Android operating system. The accuracy of Naïve Bayes, Support Vector Machine (SVM) and Neural Network for detecting malicious code has been compared for the proposed model. In the experiment 400 benign files, 100 system files and 500 malicious files have been used to construct the model. The model yields the best accuracy 88.9% when neural network is used as classifier and achieved 95% and 82.8% accuracy for sensitivity and specificity respectively.

  2. Value of ICD-9 coded chief complaints for detection of epidemics.

    PubMed Central

    Tsui, F. C.; Wagner, M. M.; Dato, V.; Chang, C. C.

    2001-01-01

    To assess the value of ICD-9 coded chief complaints for early detection of epidemics, we measured sensitivity, positive predictive value, and timeliness of Influenza detection using a respiratory set (RS) of ICD-9 codes and an Influenza set (IS). We also measured inherent timeliness of these data using the cross-correlation function. We found that, for a one-year period, the detectors had sensitivity of 100% (1/1 epidemic) and positive predictive values of 50% (1/2) for RS and 25% (1/4) for IS. The timeliness of detection using ICD-9 coded chief complaints was one week earlier than the detection using Pneumonia and Influenza deaths (the gold standard). The inherent timeliness of ICD-9 data measured by the cross-correlation function was two weeks earlier than the gold standard. PMID:11825278

  3. Value of ICD-9-Coded Chief Complaints for Detection of Epidemics

    PubMed Central

    Tsui, Fu-Chiang; Wagner, Michael M.; Dato, Virginia; Chang, Chung-Chou Ho

    2002-01-01

    To assess the value of ICD-9-coded chief complaints for early detection of epidemics, we measured sensitivity, positive predictive value, and timeliness of Influenza detection using a respiratory set (RS) of ICD-9 codes and an Influenza set (IS). We also measured inherent timeliness of these data using the cross-correlation function. We found that, for a one-year period, the detectors had sensitivity of 100% (1/1 epidemic) and positive predictive values of 50% (1/2) for RS and 25% (1/4) for IS. The timeliness of detection using ICD-9-coded chief complaints was one week earlier than the detection using Pneumonia and Influenza deaths (the gold standard). The inherent timeliness of ICD-9 data measured by the cross-correlation function was two weeks earlier than the gold standard.

  4. Demonstration of a quantum error detection code using a square lattice of four superconducting qubits

    PubMed Central

    Córcoles, A.D.; Magesan, Easwar; Srinivasan, Srikanth J.; Cross, Andrew W.; Steffen, M.; Gambetta, Jay M.; Chow, Jerry M.

    2015-01-01

    The ability to detect and deal with errors when manipulating quantum systems is a fundamental requirement for fault-tolerant quantum computing. Unlike classical bits that are subject to only digital bit-flip errors, quantum bits are susceptible to a much larger spectrum of errors, for which any complete quantum error-correcting code must account. Whilst classical bit-flip detection can be realized via a linear array of qubits, a general fault-tolerant quantum error-correcting code requires extending into a higher-dimensional lattice. Here we present a quantum error detection protocol on a two-by-two planar lattice of superconducting qubits. The protocol detects an arbitrary quantum error on an encoded two-qubit entangled state via quantum non-demolition parity measurements on another pair of error syndrome qubits. This result represents a building block towards larger lattices amenable to fault-tolerant quantum error correction architectures such as the surface code. PMID:25923200

  5. Multiplexed Detection of Cytokines Based on Dual Bar-Code Strategy and Single-Molecule Counting.

    PubMed

    Li, Wei; Jiang, Wei; Dai, Shuang; Wang, Lei

    2016-02-02

    Cytokines play important roles in the immune system and have been regarded as biomarkers. While single cytokine is not specific and accurate enough to meet the strict diagnosis in practice, in this work, we constructed a multiplexed detection method for cytokines based on dual bar-code strategy and single-molecule counting. Taking interferon-γ (IFN-γ) and tumor necrosis factor-α (TNF-α) as model analytes, first, the magnetic nanobead was functionalized with the second antibody and primary bar-code strands, forming a magnetic nanoprobe. Then, through the specific reaction of the second antibody and the antigen that fixed by the primary antibody, sandwich-type immunocomplex was formed on the substrate. Next, the primary bar-code strands as amplification units triggered multibranched hybridization chain reaction (mHCR), producing nicked double-stranded polymers with multiple branched arms, which were served as secondary bar-code strands. Finally, the secondary bar-code strands hybridized with the multimolecule labeled fluorescence probes, generating enhanced fluorescence signals. The numbers of fluorescence dots were counted one by one for quantification with epi-fluorescence microscope. By integrating the primary and secondary bar-code-based amplification strategy and the multimolecule labeled fluorescence probes, this method displayed an excellent sensitivity with the detection limits were both 5 fM. Unlike the typical bar-code assay that the bar-code strands should be released and identified on a microarray, this method is more direct. Moreover, because of the selective immune reaction and the dual bar-code mechanism, the resulting method could detect the two targets simultaneously. Multiple analysis in human serum was also performed, suggesting that our strategy was reliable and had a great potential application in early clinical diagnosis.

  6. Code System to Detect Recurring Loss of Special Nuclear Materials.

    SciTech Connect

    PICARD, R. R.

    2001-08-23

    Version 00 NRCPAGE is used in safeguards applications to detect a recurring loss of special nuclear material by frequent evaluation (sequential analysis) of accountability data. Standard sequential testing procedures are traditionally based on sequences of independent and normally distributed measurements. This same approach can be applied to materials balance (MB) data. Here, the term materials balance has a meaning similar to inventory difference and represents a materials loss indicator localized in time and space. However, distinct Mbs cannot be reasonably treated as statistically independent and may not always be reasonably treated as normally distributed. Furthermore, the covariance structure associated with a given MB sequence is not known and must be estimated. Nonindependence is treated by converting the MB sequence to the innovation sequence, sometimes called the ITMUF sequence or the sequence of MUF residuals, which are statistically independent and amenable to sequential test procedures. A one-sided page's test, effective for a wide range of recurring loss scenarios, is applied to the standardized innovation sequence. The program can be easily modified to suit particular needs; the models for the assumption of multivariate normality for MBs when computing the innovation sequence or the test procedure can be changed as can the input/output format, dimensioning, local error checking, and simulation work. Input files can be sequentially constructed using local text editors to update existing files. Output files can be read by graphics, report writer, or other stand-alone utility routines.

  7. An application of soft-decision to error-detecting codes

    NASA Astrophysics Data System (ADS)

    Kobayashi, H.; Yanagidaira, H.; Kawai, K.

    This paper presents a decoding algorithm based upon soft decision, which gives the capability of error correction in the conventional-error-detecting system. The algorithm may be applied to the multi-PSK, multi-QAM, and any other digital modulation, including even the case where the differential coding is employed. In this paper, an investigation is performed for the application of the proposed algorithm to the 4-DPSK system which introduces a scheme of single parity check code, and the Automatic Repeat-Request (ARQ) system using a cyclic-redundancy check code (CRC). In addition, the experimental results from the trial equipment of the 4-DPSK system is briefly described.

  8. Detection and Location of Gamma-Ray Sources with a Modulating Coded Mask

    SciTech Connect

    Anderson, Dale N.; Stromswold, David C.; Wunschel, Sharon C.; Peurrung, Anthony J.; Hansen, Randy R.

    2006-01-31

    This paper presents methods of detecting and locating a concelaed nuclear gamma-ray source with a coded aperture mask. Energetic gamma rays readily penetrate moderate amounts of shielding material and can be detected at distances of many meters. The detection of high energy gamma-ray sources is vitally important to national security for several reasons, including nuclear materials smuggling interdiction, monitoring weapon components under treaties, and locating nuclear weapons and materials in the possession terrorist organizations.

  9. Detection of motor execution using a hybrid fNIRS-biosignal BCI: a feasibility study

    PubMed Central

    2013-01-01

    Background Brain-computer interfaces (BCIs) were recently recognized as a method to promote neuroplastic effects in motor rehabilitation. The core of a BCI is a decoding stage by which signals from the brain are classified into different brain-states. The goal of this paper was to test the feasibility of a single trial classifier to detect motor execution based on signals from cortical motor regions, measured by functional near-infrared spectroscopy (fNIRS), and the response of the autonomic nervous system. An approach that allowed for individually tuned classifier topologies was opted for. This promises to be a first step towards a novel form of active movement therapy that could be operated and controlled by paretic patients. Methods Seven healthy subjects performed repetitions of an isometric finger pinching task, while changes in oxy- and deoxyhemoglobin concentrations were measured in the contralateral primary motor cortex and ventral premotor cortex using fNIRS. Simultaneously, heart rate, breathing rate, blood pressure and skin conductance response were measured. Hidden Markov models (HMM) were used to classify between active isometric pinching phases and rest. The classification performance (accuracy, sensitivity and specificity) was assessed for two types of input data: (i) fNIRS-signals only and (ii) fNIRS- and biosignals combined. Results fNIRS data were classified with an average accuracy of 79.4%, which increased significantly to 88.5% when biosignals were also included (p=0.02). Comparable increases were observed for the sensitivity (from 78.3% to 87.2%, p=0.008) and specificity (from 80.5% to 89.9%, p=0.062). Conclusions This study showed, for the first time, promising classification results with hemodynamic fNIRS data obtained from motor regions and simultaneously acquired biosignals. Combining fNIRS data with biosignals has a beneficial effect, opening new avenues for the development of brain-body-computer interfaces for rehabilitation applications

  10. Improved shear wave motion detection using coded excitation for transient elastography

    PubMed Central

    He, Xiao-Nian; Diao, Xian-Fen; Lin, Hao-Ming; Zhang, Xin-Yu; Shen, Yuan-Yuan; Chen, Si-Ping; Qin, Zheng-Di; Chen, Xin

    2017-01-01

    Transient elastography (TE) is well adapted for use in studying liver elasticity. However, because the shear wave motion signal is extracted from the ultrasound signal, the weak ultrasound signal can significantly deteriorate the shear wave motion tracking process and make it challenging to detect the shear wave motion in a severe noise environment, such as within deep tissues and within obese patients. This paper, therefore, investigated the feasibility of implementing coded excitation in TE for shear wave detection, with the hypothesis that coded ultrasound signals can provide robustness to weak ultrasound signals compared with traditional short pulse. The Barker 7, Barker 13, and short pulse were used for detecting the shear wave in the TE application. Two phantom experiments and one in vitro liver experiment were done to explore the performances of the coded excitation in TE measurement. The results show that both coded pulses outperform the short pulse by providing superior shear wave signal-to-noise ratios (SNR), robust shear wave speed measurement, and higher penetration intensity. In conclusion, this study proved the feasibility of applying coded excitation in shear wave detection for TE application. The proposed method has the potential to facilitate robust shear elasticity measurements of tissue. PMID:28295027

  11. Improved shear wave motion detection using coded excitation for transient elastography.

    PubMed

    He, Xiao-Nian; Diao, Xian-Fen; Lin, Hao-Ming; Zhang, Xin-Yu; Shen, Yuan-Yuan; Chen, Si-Ping; Qin, Zheng-Di; Chen, Xin

    2017-03-15

    Transient elastography (TE) is well adapted for use in studying liver elasticity. However, because the shear wave motion signal is extracted from the ultrasound signal, the weak ultrasound signal can significantly deteriorate the shear wave motion tracking process and make it challenging to detect the shear wave motion in a severe noise environment, such as within deep tissues and within obese patients. This paper, therefore, investigated the feasibility of implementing coded excitation in TE for shear wave detection, with the hypothesis that coded ultrasound signals can provide robustness to weak ultrasound signals compared with traditional short pulse. The Barker 7, Barker 13, and short pulse were used for detecting the shear wave in the TE application. Two phantom experiments and one in vitro liver experiment were done to explore the performances of the coded excitation in TE measurement. The results show that both coded pulses outperform the short pulse by providing superior shear wave signal-to-noise ratios (SNR), robust shear wave speed measurement, and higher penetration intensity. In conclusion, this study proved the feasibility of applying coded excitation in shear wave detection for TE application. The proposed method has the potential to facilitate robust shear elasticity measurements of tissue.

  12. Low-Complexity Saliency Detection Algorithm for Fast Perceptual Video Coding

    PubMed Central

    Liu, Pengyu; Jia, Kebin

    2013-01-01

    A low-complexity saliency detection algorithm for perceptual video coding is proposed; low-level encoding information is adopted as the characteristics of visual perception analysis. Firstly, this algorithm employs motion vector (MV) to extract temporal saliency region through fast MV noise filtering and translational MV checking procedure. Secondly, spatial saliency region is detected based on optimal prediction mode distributions in I-frame and P-frame. Then, it combines the spatiotemporal saliency detection results to define the video region of interest (VROI). The simulation results validate that the proposed algorithm can avoid a large amount of computation work in the visual perception characteristics analysis processing compared with other existing algorithms; it also has better performance in saliency detection for videos and can realize fast saliency detection. It can be used as a part of the video standard codec at medium-to-low bit-rates or combined with other algorithms in fast video coding. PMID:24489495

  13. Microfluidic CODES: a scalable multiplexed electronic sensor for orthogonal detection of particles in microfluidic channels.

    PubMed

    Liu, Ruxiu; Wang, Ningquan; Kamili, Farhan; Sarioglu, A Fatih

    2016-04-21

    Numerous biophysical and biochemical assays rely on spatial manipulation of particles/cells as they are processed on lab-on-a-chip devices. Analysis of spatially distributed particles on these devices typically requires microscopy negating the cost and size advantages of microfluidic assays. In this paper, we introduce a scalable electronic sensor technology, called microfluidic CODES, that utilizes resistive pulse sensing to orthogonally detect particles in multiple microfluidic channels from a single electrical output. Combining the techniques from telecommunications and microfluidics, we route three coplanar electrodes on a glass substrate to create multiple Coulter counters producing distinct orthogonal digital codes when they detect particles. We specifically design a digital code set using the mathematical principles of Code Division Multiple Access (CDMA) telecommunication networks and can decode signals from different microfluidic channels with >90% accuracy through computation even if these signals overlap. As a proof of principle, we use this technology to detect human ovarian cancer cells in four different microfluidic channels fabricated using soft lithography. Microfluidic CODES offers a simple, all-electronic interface that is well suited to create integrated, low-cost lab-on-a-chip devices for cell- or particle-based assays in resource-limited settings.

  14. Dedicated memory structure holding data for detecting available worker thread(s) and informing available worker thread(s) of task(s) to execute

    DOEpatents

    Chiu, George L.; Eichenberger, Alexandre E.; O'Brien, John K. P.

    2016-12-13

    The present disclosure relates generally to a dedicated memory structure (that is, hardware device) holding data for detecting available worker thread(s) and informing available worker thread(s) of task(s) to execute.

  15. The effects of pulse rate, power, width and coding on signal detectability

    NASA Technical Reports Server (NTRS)

    Carter, D. A.

    1983-01-01

    The effects on the signal detectability of varying the pulse repetition rate (PRF), peak pulse power (p(pk)) and pulse width (tau(p)) (tp) are examined. Both coded and uncoded pulses are considered. The following quantities are assumed to be constant; (1) antenna area, (z)echo reflectivity, (3) Doppler shift, (4) spectral width, (5) spectral resolution, (6) effective sampling rate, and (7) total incoherent spectral averagaing time. The detectability is computed for two types of targets.

  16. Quantum-capacity-approaching codes for the detected-jump channel

    SciTech Connect

    Grassl, Markus; Wei Zhaohui; Ji Zhengfeng; Zeng Bei

    2010-12-15

    The quantum-channel capacity gives the ultimate limit for the rate at which quantum data can be reliably transmitted through a noisy quantum channel. Degradable quantum channels are among the few channels whose quantum capacities are known. Given the quantum capacity of a degradable channel, it remains challenging to find a practical coding scheme which approaches capacity. Here we discuss code designs for the detected-jump channel, a degradable channel with practical relevance describing the physics of spontaneous decay of atoms with detected photon emission. We show that this channel can be used to simulate a binary classical channel with both erasures and bit flips. The capacity of the simulated classical channel gives a lower bound on the quantum capacity of the detected-jump channel. When the jump probability is small, it almost equals the quantum capacity. Hence using a classical capacity-approaching code for the simulated classical channel yields a quantum code which approaches the quantum capacity of the detected-jump channel.

  17. Threshold-Based OSIC Detection Algorithm for Per-Antenna-Coded TIMO-OFDM Systems

    NASA Astrophysics Data System (ADS)

    Wang, Xinzheng; Chen, Ming; Zhu, Pengcheng

    Threshold-based ordered successive interference cancellation (OSIC) detection algorithm is proposed for per-antenna-coded (PAC) two-input multiple-output (TIMO) orthogonal frequency division multiplexing (OFDM) systems. Successive interference cancellation (SIC) is performed selectively according to channel conditions. Compared with the conventional OSIC algorithm, the proposed algorithm reduces the complexity significantly with only a slight performance degradation.

  18. Optimal Multicarrier Phase-Coded Waveform Design for Detection of Extended Targets

    SciTech Connect

    Sen, Satyabrata; Glover, Charles Wayne

    2013-01-01

    We design a parametric multicarrier phase-coded (MCPC) waveform that achieves the optimal performance in detecting an extended target in the presence of signal-dependent interference. Traditional waveform design techniques provide only the optimal energy spectral density of the transmit waveform and suffer a performance loss in the synthesis process of the time-domain signal. Therefore, we opt for directly designing an MCPC waveform in terms of its time-frequency codes to obtain the optimal detection performance. First, we describe the modeling assumptions considering an extended target buried within the signal-dependent clutter with known power spectral density, and deduce the performance characteristics of the optimal detector. Then, considering an MCPC signal transmission, we express the detection characteristics in terms of the phase-codes of the MCPC waveform and propose to optimally design the MCPC signal by maximizing the detection probability. Our numerical results demonstrate that the designed MCPC signal attains the optimal detection performance and requires a lesser computational time than the other parametric waveform design approach.

  19. A general-purpose contact detection algorithm for nonlinear structural analysis codes

    SciTech Connect

    Heinstein, M.W.; Attaway, S.W.; Swegle, J.W.; Mello, F.J.

    1993-05-01

    A new contact detection algorithm has been developed to address difficulties associated with the numerical simulation of contact in nonlinear finite element structural analysis codes. Problems including accurate and efficient detection of contact for self-contacting surfaces, tearing and eroding surfaces, and multi-body impact are addressed. The proposed algorithm is portable between dynamic and quasi-static codes and can efficiently model contact between a variety of finite element types including shells, bricks, beams and particles. The algorithm is composed of (1) a location strategy that uses a global search to decide which slave nodes are in proximity to a master surface and (2) an accurate detailed contact check that uses the projected motions of both master surface and slave node. In this report, currently used contact detection algorithms and their associated difficulties are discussed. Then the proposed algorithm and how it addresses these problems is described. Finally, the capability of the new algorithm is illustrated with several example problems.

  20. Geosoft eXecutables (GX's) Developed by the U.S. Geological Survey, Version 2.0, with Notes on GX Development from Fortran Code

    USGS Publications Warehouse

    Phillips, Jeffrey D.

    2007-01-01

    Introduction Geosoft executables (GX's) are custom software modules for use with the Geosoft Oasis montaj geophysical data processing system, which currently runs under the Microsoft Windows 2000 or XP operating systems. The U.S. Geological Survey (USGS) uses Oasis montaj primarily for the processing and display of airborne geophysical data. The ability to add custom software modules to the Oasis montaj system is a feature employed by the USGS in order to take advantage of the large number of geophysical algorithms developed by the USGS during the past half century. This main part of this report, along with Appendix 1, describes Version 2.0 GX's developed by the USGS or specifically for the USGS by contractors. These GX's perform both basic and advanced operations. Version 1.0 GX's developed by the USGS were described by Phillips and others (2003), and are included in Version 2.0. Appendix 1 contains the help files for the individual GX's. Appendix 2 describes the new method that was used to create the compiled GX files, starting from legacy Fortran source code. Although the new method shares many steps with the approach presented in the Geosoft GX Developer manual, it differs from that approach in that it uses free, open-source Fortran and C compilers and avoids all Fortran-to-C conversion.

  1. Improvement of the predicted aural detection code ICHIN (I Can Hear It Now)

    NASA Technical Reports Server (NTRS)

    Mueller, Arnold W.; Smith, Charles D.; Lemasurier, Phillip

    1993-01-01

    Acoustic tests were conducted to study the far-field sound pressure levels and aural detection ranges associated with a Sikorsky S-76A helicopter in straight and level flight at various advancing blade tip Mach numbers. The flight altitude was nominally 150 meters above ground level. This paper compares the normalized predicted aural detection distances, based on the measured far-field sound pressure levels, to the normalized measured aural detection distances obtained from sound jury response measurements obtained during the same test. Both unmodified and modified versions of the prediction code ICHIN-6 (I Can Hear It Now) were used to produce the results for this study.

  2. Bio-bar-code functionalized magnetic nanoparticle label for ultrasensitive flow injection chemiluminescence detection of DNA hybridization.

    PubMed

    Bi, Sai; Zhou, Hong; Zhang, Shusheng

    2009-10-07

    A signal amplification strategy based on bio-bar-code functionalized magnetic nanoparticles as labels holds promise to improve the sensitivity and detection limit of the detection of DNA hybridization and single-nucleotide polymorphisms by flow injection chemiluminescence assays.

  3. Automatic detection of inconsistencies between free text and coded data in Sarcoma discharge letters.

    PubMed

    Rinott, Ruty; Torresani, Michele; Bertulli, Rossella; Goldsteen, Abigail; Casali, Paolo; Carmeli, Boaz; Slonim, Noam

    2012-01-01

    Discordance between data stored in Electronic Health Records (EHR) may have a harmful effect on patient care. Automatic identification of such situations is an important yet challenging task, especially when the discordance involves information stored in free text fields. Here we present a method to automatically detect inconsistencies between data stored in free text and related coded fields. Using EHR data we train an ensemble of classifiers to predict the value of coded fields from the free text fields. Cases in which the classifiers predict with high confidence a code different from the clinicians' choice are marked as potential inconsistencies. Experimental results over discharge letters of sarcoma patients, verified by a domain expert, demonstrate the validity of our method.

  4. The Limits of Coding with Joint Constraints on Detected and Undetected Error Rates

    NASA Technical Reports Server (NTRS)

    Dolinar, Sam; Andrews, Kenneth; Pollara, Fabrizio; Divsalar, Dariush

    2008-01-01

    We develop a remarkably tight upper bound on the performance of a parameterized family of bounded angle maximum-likelihood (BA-ML) incomplete decoders. The new bound for this class of incomplete decoders is calculated from the code's weight enumerator, and is an extension of Poltyrev-type bounds developed for complete ML decoders. This bound can also be applied to bound the average performance of random code ensembles in terms of an ensemble average weight enumerator. We also formulate conditions defining a parameterized family of optimal incomplete decoders, defined to minimize both the total codeword error probability and the undetected error probability for any fixed capability of the decoder to detect errors. We illustrate the gap between optimal and BA-ML incomplete decoding via simulation of a small code.

  5. Quantum error correction and detection: Quantitative analysis of a coherent-state amplitude-damping code

    NASA Astrophysics Data System (ADS)

    Wickert, Ricardo; van Loock, Peter

    2014-05-01

    We reexamine a non-Gaussian quantum error-correction code designed to protect optical coherent-state qubits against errors due to an amplitude-damping channel. We improve on a previous result [R. Wickert, N. K. Bernardes, and P. van Loock, Phys. Rev. A 81, 062344 (2010), 10.1103/PhysRevA.81.062344] by providing a tighter upper bound on the performance attained when considering realistic assumptions, which constrain the operation of the gates employed in the scheme. The quantitative characterization is performed through measures of fidelity and concurrence, the latter obtained by employing the code as an entanglement distillation protocol. We find that, when running the code in fully deterministic error-correction mode, direct transmission can only be beaten for certain combinations of channel and input state parameters. In contrast, in error-detection mode, the usage of higher repetition encodings remains beneficial throughout, however, at the expense of diminishing success probabilities.

  6. A coded aperture compressive imaging array and its visual detection and tracking algorithms for surveillance systems.

    PubMed

    Chen, Jing; Wang, Yongtian; Wu, Hanxiao

    2012-10-29

    In this paper, we propose an application of a compressive imaging system to the problem of wide-area video surveillance systems. A parallel coded aperture compressive imaging system is proposed to reduce the needed high resolution coded mask requirements and facilitate the storage of the projection matrix. Random Gaussian, Toeplitz and binary phase coded masks are utilized to obtain the compressive sensing images. The corresponding motion targets detection and tracking algorithms directly using the compressive sampling images are developed. A mixture of Gaussian distribution is applied in the compressive image space to model the background image and for foreground detection. For each motion target in the compressive sampling domain, a compressive feature dictionary spanned by target templates and noises templates is sparsely represented. An l(1) optimization algorithm is used to solve the sparse coefficient of templates. Experimental results demonstrate that low dimensional compressed imaging representation is sufficient to determine spatial motion targets. Compared with the random Gaussian and Toeplitz phase mask, motion detection algorithms using a random binary phase mask can yield better detection results. However using random Gaussian and Toeplitz phase mask can achieve high resolution reconstructed image. Our tracking algorithm can achieve a real time speed that is up to 10 times faster than that of the l(1) tracker without any optimization.

  7. Design and control of a ferromagnetic coded micro-carrier biochip sensor for multiplex detection of antibodies.

    PubMed

    Chang, Rong-Seng; Tsai, Jang-Zern; Li, Tung-Yen

    2011-01-01

    This paper describes a method for producing a novel type of ferromagnetic coded micro-carrier. The ferromagnetic coded micro-carriers are about 200 μm in length, 200 μm in width and 50 μm in thickness, and contain eight code elements with two distinguishable codes (hollow and solid), allowing for 2(8) unique codes. The code shapes include rectangle, circle, etc. Differently shaped coded micro-carriers could carry different antigens for detection of its complementary antibody. These many shapes of coded micro-carriers would be used simultaneously allowing us to make multiple detections for different antibodies at the same time. A molding process is applied for fabrication of the ferromagnetically coded micro-carriers where Fe material (Fe powder mixed with binder) is shaped in many tiny molds to produce the coded shapes used for identification of the bio-molecules. Magnetic force is used to control the movement and location of the ferromagnetic coded micro-carriers to prevent the loss during the hybridization process. The results of image process and analysis system testing are satisfactory. The results of our micro-carrier detection system for two sets of R and B color analysis are proportional to those obtained from ELISA antibody detection.

  8. Blind Detection of Region Duplication Forgery Using Fractal Coding and Feature Matching.

    PubMed

    Jenadeleh, Mohsen; Ebrahimi Moghaddam, Mohsen

    2016-05-01

    Digital image forgery detection is important because of its wide use in applications such as medical diagnosis, legal investigations, and entertainment. Copy-move forgery is one of the famous techniques, which is used in region duplication. Many of the existing copy-move detection algorithms cannot effectively blind detect duplicated regions that are made by powerful image manipulation software like Photoshop. In this study, a new method is proposed for blind detecting manipulations in digital images based on modified fractal coding and feature vector matching. The proposed method not only detects typical copy-move forgery, but also finds multiple copied forgery regions for images that are subjected to rotation, scaling, reflection, and a mixture of these postprocessing operations. The proposed method is robust against tampered images undergoing attacks such as Gaussian blurring, contrast scaling, and brightness adjustment. The experimental results demonstrated the validity and efficiency of the method.

  9. Detection of multiple, novel reverse transcriptase coding sequences in human nucleic acids: relation to primate retroviruses

    SciTech Connect

    Shih, A.; Misra, R.; Rush, M.G.

    1989-01-01

    A variety of chemically synthesized oligonucleotides designed on the basis of amino acid and/or nucleotide sequence data were used to detect a large number of novel reverse transcriptase coding sequences in human and mouse DNAs. Procedures involving Southern blotting, library screening, and the polymerase chain reaction were all used to detect such sequences; the polymerase chain reaction was the most rapid and productive approach. In the polymerase chain reaction, oligonucleotide mixtures based on consensus sequence homologies to reverse transcriptase coding sequences and unique oligonucleotides containing perfect homology to the coding sequences of human T-cell leukemia virus types I and II were both effective in amplifying reverse transcriptase-related DNA. It is shown that human DNA contains a wide spectrum of retrovirus-related reverse transcriptase coding sequences, including some that are clearly related to human T-cell leukemia virus types I and II, some that are related to the L-1 family of long interspersed nucleotide sequences, and others that are related to previously described human endogenous proviral DNAs. In addition, human T-cell leukemia virus type I-related sequences appear to be transcribed in both normal human T cells and in a cell line derived from a human teratocarcinoma.

  10. Sensitivity of the Wisconsin Card Sorting Test (64-Card Version) versus the Tower of London (Drexel Version) for detecting executive dysfunction in children with epilepsy.

    PubMed

    MacAllister, William S; Maiman, Moshe; Marsh, Megan; Whitman, Lindsay; Vasserman, Marsha; Cohen, Robyn J; Salinas, Christine M

    2017-01-03

    Executive function deficits are common in children and adolescents with epilepsy. Though the Wisconsin Card Sorting Task (WCST) is often considered the "gold standard" for executive function assessment, its sensitivity-particularly in the case of the 64-card version (WCST-64)-is insufficiently established in pediatric samples, including children and adolescents with epilepsy. The present investigation assesses the sensitivity of the WCST-64 in children and adolescents with epilepsy in comparison to another measure: the Tower of London - Drexel Version (TOL-DX). A total of 88 consecutively referred children and adolescents with epilepsy were administered both the WCST-64 and TOL-DX as part of a comprehensive neuropsychological evaluation. The sensitivity of WCST-64 and TOL-DX variables were established and relations with epilepsy severity measures and other executive function measures were assessed. Of the WCST-64 variables, Perseverative Responses is the most sensitive, but detected executive function impairment in only 19% of this clinically referred sample; in contrast, the TOL-DX Rule Violations detected executive function impairment in half of the sample. Further, TOL-DX performances are more strongly related to epilepsy severity variables and other executive function measures in comparison to the WCST-64. Despite its popularity amongst clinicians, the WCST-64 is not as sensitive to executive dysfunction in comparison to other measures of comparable administration time, such as the TOL-DX.

  11. Contour coding based rotating adaptive model for human detection and tracking in thermal catadioptric omnidirectional vision.

    PubMed

    Tang, Yazhe; Li, Youfu

    2012-09-20

    In this paper, we introduce a novel surveillance system based on thermal catadioptric omnidirectional (TCO) vision. The conventional contour-based methods are difficult to be applied to the TCO sensor for detection or tracking purposes due to the distortion of TCO vision. To solve this problem, we propose a contour coding based rotating adaptive model (RAM) that can extract the contour feature from the TCO vision directly as it takes advantage of the relative angle based on the characteristics of TCO vision to change the sequence of sampling automatically. A series of experiments and quantitative analyses verify that the performance of the proposed RAM-based contour coding feature for human detection and tracking are satisfactory in TCO vision.

  12. Improved coded exposure for enhancing imaging quality and detection accuracy of moving targets

    NASA Astrophysics Data System (ADS)

    Mao, Baoqi; Chen, Li; Han, Lin; Shen, Weimin

    2016-09-01

    The blur due to the rapidly relative motion between scene and camera during exposure has the well-known influence on the quality of acquired image and then target detection. An improved coded exposure is introduced in this paper to remove the image blur and obtain high quality image, so that the test accuracy of the surface defect and edge contour of motion objects can be enhanced. The improved exposure method takes advantage of code look-up table to control exposure process and image restoration. The restored images have higher Peak Signal-to-Noise Ratio (PSNR) and Structure SIMilarity (SSIM) than traditional deblur algorithm such as Wiener and regularization filter methods. The edge contour and defect of part samples, which move at constant speed relative to the industry camera used in our experiment, are detected with Sobel operator from the restored images. Experimental results verify that the improved coded exposure is better suitable for imaging moving object and detecting moving target than the traditional.

  13. Improved SISO MMSE Detection for Joint Coded-Precoded OFDM under Imperfect Channel Estimation

    NASA Astrophysics Data System (ADS)

    Zhang, Guomei; Zhu, Shihua; Li, Feng; Ren, Pinyi

    An improved soft-input soft-output (SISO) minimum mean-squared error (MMSE) detection method is proposed for joint coding and precoding OFDM systems under imperfect channel estimation. Compared with the traditional mismatched detection which uses the channel estimate as its exact value, the signal model of the proposed detector is more accurate and the influence of channel estimation error (CEE) can be effectively mitigated. Simulations indicate that the proposed scheme can improve the bit error rate (BER) performance with fewer pilot symbols.

  14. Improving the detection task performance of a LWIR imaging system through the use of wavefront coding

    NASA Astrophysics Data System (ADS)

    Gross, Kevin A.; Kubala, Kenny

    2007-04-01

    In a traditional optical system the imaging performance is maximized at a single point in the operational space. This characteristic leads to maximizing the probability of detection if the object is on axis, at the designed conjugate, with the designed operational temperature and if the system components are manufactured without error in form and alignment. Due to the many factors that influence the system's image quality the probability of detection will decrease away from this peak value. An infrared imaging system is presented that statistically creates a higher probability of detection over the complete operational space for the Hotelling observer. The system is enabled through the use of wavefront coding, a computational imaging technology in which optics, mechanics, detection and signal processing are combined to enable LWIR imaging systems to be realized with detection task performance that is difficult or impossible to obtain in the optical domain alone. The basic principles of statistical decision theory will be presented along with a specific example of how wavefront coding technology can enable improved performance and reduced sensitivity to some of the fundamental constraints inherent in LWIR systems.

  15. Automatic Detection of Frontal Face Midline by Chain-coded Merlin-Farber Hough Trasform

    NASA Astrophysics Data System (ADS)

    Okamoto, Daichi; Ohyama, Wataru; Wakabayashi, Tetsushi; Kimura, Fumitaka

    We propose a novel approach for detection of the facial midline (facial symmetry axis) from a frontal face image. The facial midline has several applications, for instance reducing computational cost required for facial feature extraction (FFE) and postoperative assessment for cosmetic or dental surgery. The proposed method detects the facial midline of a frontal face from an edge image as the symmetry axis using the Merlin-Faber Hough transformation. And a new performance improvement scheme for midline detection by MFHT is present. The main concept of the proposed scheme is suppression of redundant vote on the Hough parameter space by introducing chain code representation for the binary edge image. Experimental results on the image dataset containing 2409 images from FERET database indicate that the proposed algorithm can improve the accuracy of midline detection from 89.9% to 95.1 % for face images with different scales and rotation.

  16. Analysis of a Coded, M-ary Orthogonal Input Optical Channel with Random-gain Photomultiplier Detection

    NASA Technical Reports Server (NTRS)

    Lee, P. J.

    1984-01-01

    Performance of two coding systems is analyzed for a noisy optical channel with M(=2(L)-ary orthogonal signaling and random gain photomultiplier detection. The considered coding systems are the Reed Solomon (RS) coding with error only correction decoding and the interleaved binary convolutional system with soft decision Viterbi decoding. The required average number of received signal photons per information bit, N sub b, for a desired bit error of 0.000001 is found for a set of commonly used parameters and with a high background noise level. We find that the interleaved binary convolutional coding system is preferable to the RS coding system in performance complexity tradeoffs.

  17. Coded aperture coherent scatter imaging for breast cancer detection: a Monte Carlo evaluation

    NASA Astrophysics Data System (ADS)

    Lakshmanan, Manu N.; Morris, Robert E.; Greenberg, Joel A.; Samei, Ehsan; Kapadia, Anuj J.

    2016-03-01

    It is known that conventional x-ray imaging provides a maximum contrast between cancerous and healthy fibroglandular breast tissues of 3% based on their linear x-ray attenuation coefficients at 17.5 keV, whereas coherent scatter signal provides a maximum contrast of 19% based on their differential coherent scatter cross sections. Therefore in order to exploit this potential contrast, we seek to evaluate the performance of a coded- aperture coherent scatter imaging system for breast cancer detection and investigate its accuracy using Monte Carlo simulations. In the simulations we modeled our experimental system, which consists of a raster-scanned pencil beam of x-rays, a bismuth-tin coded aperture mask comprised of a repeating slit pattern with 2-mm periodicity, and a linear-array of 128 detector pixels with 6.5-keV energy resolution. The breast tissue that was scanned comprised a 3-cm sample taken from a patient-based XCAT breast phantom containing a tomosynthesis- based realistic simulated lesion. The differential coherent scatter cross section was reconstructed at each pixel in the image using an iterative reconstruction algorithm. Each pixel in the reconstructed image was then classified as being either air or the type of breast tissue with which its normalized reconstructed differential coherent scatter cross section had the highest correlation coefficient. Comparison of the final tissue classification results with the ground truth image showed that the coded aperture imaging technique has a cancerous pixel detection sensitivity (correct identification of cancerous pixels), specificity (correctly ruling out healthy pixels as not being cancer) and accuracy of 92.4%, 91.9% and 92.0%, respectively. Our Monte Carlo evaluation of our experimental coded aperture coherent scatter imaging system shows that it is able to exploit the greater contrast available from coherently scattered x-rays to increase the accuracy of detecting cancerous regions within the breast.

  18. Capacity, cutoff rate, and coding for a direct-detection optical channel

    NASA Technical Reports Server (NTRS)

    Massey, J. L.

    1980-01-01

    It is shown that Pierce's pulse position modulation scheme with 2 to the L pulse positions used on a self-noise-limited direct detection optical communication channel results in a 2 to the L-ary erasure channel that is equivalent to the parallel combination of L completely correlated binary erasure channels. The capacity of the full channel is the sum of the capacities of the component channels, but the cutoff rate of the full channel is shown to be much smaller than the sum of the cutoff rates. An interpretation of the cutoff rate is given that suggests a complexity advantage in coding separately on the component channels. It is shown that if short-constraint-length convolutional codes with Viterbi decoders are used on the component channels, then the performance and complexity compare favorably with the Reed-Solomon coding system proposed by McEliece for the full channel. The reasons for this unexpectedly fine performance by the convolutional code system are explored in detail, as are various facets of the channel structure.

  19. Memory and Executive Screening (MES): a brief cognitive test for detecting mild cognitive impairment.

    PubMed

    Guo, Qi-hao; Zhou, Bin; Zhao, Qian-hua; Wang, Bei; Hong, Zhen

    2012-10-11

    Mild cognitive impairment (MCI), defined as a transitional zone between normal cognition and dementia, requires a battery of formal neuropsychological tests administered by a trained rater for its diagnosis. The objective of this study was to develop a screening tool for MCI. One hundred ninety seven cognitively normal controls (NC), one hundred sixteen patients with amnestic MCI -single domain (aMCI-sd), one hundred ninety five patients with amnestic MCI-multiple domain (aMCI-md), and two hundred twenty eight patients with mild Alzheimer's disease (AD) were evaluated by comprehensive neuropsychological tests and by the Memory and Executive Screening (MES). Correlation analysis showed that the three indicators of the MES were significantly negatively related with age (P<0.05), yet not related with education (P>0.05). There was no ceiling or floor effect. Test completion averaged seven minutes (421.14±168.31 seconds). The receiver operating characteristics (ROC) analyses performed on the aMCI-sd group yielded 0.89 for the area under the curve (AUC) (95% CI, 0.85-0.92) for the MES-total score, with sensitivity of 0.795 and specificity of 0.828. There was 81% correct classification rate when the cut-off was set at less than 75. Meanwhile, the aMCI-md group yielded 0.95 for the AUC (95% CI, 0.93-0.97) for the MES-total score, with sensitivity of 0.87 and specificity of 0.91, and 90% correct classification rate when the cut-off was set at less than 72. The MES, minimally time-consuming, may be a valid and easily administered cognitive screening tool with high sensitivity and specificity for aMCI, with single or multiple domain impairment.

  20. Using Subspace Detection to Study Deep Long-period Seismicity Beneath the Executive Committee Range, Marie Byrd Land, Antarctica

    NASA Astrophysics Data System (ADS)

    McMahon, N. D.; Aster, R. C.; Myers, E. K.; Lough, A. C.

    2016-12-01

    We utilize subspace detection methodology to extend the detection and analysis of deep, long-period seismic activity associated with the subglacial and lower crust magmatic complex beneath the Executive Committee Range volcanoes of Marie Byrd Land, Antarctica first noted by Lough et al. (2014). Subspace detection is a powerful tool for the identification of earthquakes within clustered sequences (e.g., volcanic or earthquake swarms) characterized by event groups having similar moment tensors and Green's functions. Subspace detectors are particularly effective for identifying seismic events in low signal-to-noise conditions. Marie Byrd Land (MBL) is a remote continental region that is almost completely covered by the West Antarctic Ice Sheet (WAIS). The southern extent of Marie Byrd Land lies within the West Antarctic Rift System (WARS), which includes the volcanic Executive Committee Range (ECR). The ECR shows north-to-south progression of volcanism across the WARS during the Holocene. In 2013, the POLENET/ANET seismic network identified two swarms of seismic activity during 2010 and 2011. These events have been interpreted as deep, long-period (DLP) earthquakes based on depth (25-40 km), tectonic context, and low frequency spectra. The DLP events in MBL lie beneath an inferred sub-WAIS volcanic edifice that is visible in ice penetrating radar, and have been interpreted as a present location of Moho-proximal magmatic activity. The magmatic swarm activity in MBL provides a promising target for advanced subspace detection, and for the temporal, spatial, and event size analysis of an extensive deep long period earthquake swarm using a remote and sparse seismographic network. We utilized a catalog of 1,370 traditionally identified DLP events to construct subspace detectors for the nearest stations and analyzed two years of data spanning 2010-2011. Via subspace detection we were able to increase the number of events in the two-year catalog while decreasing the minimum

  1. Simultaneous Detection of Different MicroRNA Types Using the ZIP-Code Array System

    PubMed Central

    Weishaupt, Sonja U.; Rupp, Steffen

    2013-01-01

    MicroRNAs (miRNAs) are important negative regulators of gene expression. Their implication in tumorigenesis is based on their dysregulation in many human cancer diseases. Interestingly, in tumor cells, an altered ratio of precursor and mature miRNA levels has been described. Consequently, differences in miRNA type levels have a high potential as biomarkers and comparative high-throughput-based detection might permit a more accurate characterization of subtypes, especially in the case of very heterogeneous tumor entities. Several molecular methods exist for the detection of mature and precursor miRNAs. DNA microarrays are predestinated as a high-throughput method for comprehensive miRNA detection in tumors. However, the simultaneous array-based detection of both these miRNA types is limited because the mature miRNA sequence is identically present in both forms. Here we present a ZIP-code DNA microarray-based system in combination with a novel labeling approach, which enables the simultaneous detection of precursor and mature miRNAs in one single experiment. Using synthetic miRNA templates, we demonstrate the specificity of the method for the different miRNA types, as well as the detection range up to four orders of magnitude. Moreover, mature and precursor miRNAs were detected and validated in human tumor cells. PMID:24078866

  2. Direct-detection optical communication with color coded pulse position modulation signaling

    NASA Technical Reports Server (NTRS)

    Davidson, F.

    1985-01-01

    The performance characteristics of a direct-detection optical communication system which is based on a laser transmitter which produces single light pulses at selected nonoverlapping optical center frequencies are discussed. The signal format, called color coded pulse position modulation (CCPPM), uses more of the total available response bandwidth characteristics of the photodetector than does ordinary PPM signaling. The advantages of CCPPM signaling are obtained at the expense of an increased optical bandwidth of the transmitted signal and a more complicated transmitter and receiver structure. When the signal format is used in conjunction with block length Reed-Solomon codes, high data rates and reliable high-speed optical communications under conditions of optimal energy efficiency are obtained.

  3. Direct-detection optical communication with color coded pulse position modulation signaling

    NASA Technical Reports Server (NTRS)

    Davidson, F.

    1985-01-01

    The performance characteristics of a direct-detection optical communication system which is based on a laser transmitter which produces single light pulses at selected nonoverlapping optical center frequencies are discussed. The signal format, called color coded pulse position modulation (CCPPM), uses more of the total available response bandwidth characteristics of the photodetector than does ordinary PPM signaling. The advantages of CCPPM signaling are obtained at the expense of an increased optical bandwidth of the transmitted signal and a more complicated transmitter and receiver structure. When the signal format is used in conjunction with block length Reed-Solomon codes, high data rates and reliable high-speed optical communications under conditions of optimal energy efficiency are obtained.

  4. Detection of code spread OFDM based on 0-1 integer quadratic programming

    NASA Astrophysics Data System (ADS)

    Elghariani, Ali; Zoltowski, Michael D.

    2012-05-01

    In this paper we introduce Integer Quadratic Programming (MIQP) approach to optimally detect QPSK Code Spread OFDM (CS-OFDM) by formulating the problem as a combinatorial optimization problem. The Branch and Bound (BB) algorithm is utilized to solve this integer quadratic programming problem. Furthermore, we propose combined preprocessing steps that can be applied prior to BB so that the computational complexity of the optimum receiver is reduced. The first step in this combination is to detect as much as possible symbols using procedures presented in [9], which is basically based on the gradient of quadratic function. The second step detects the undetected symbols from the first step using MMSE estimator. The result of the latter step will be used to predict the initial upper bound of the BB algorithm. Simulation results show that the proposed preprocessing combination when applied prior to BB provides optimal performance with a significantly reduced computational complexity.

  5. Deep Long-period Seismicity Beneath the Executive Committee Range, Marie Byrd Land, Antarctica, Studied Using Subspace Detection

    NASA Astrophysics Data System (ADS)

    Aster, R. C.; McMahon, N. D.; Myers, E. K.; Lough, A. C.

    2015-12-01

    Lough et al. (2014) first detected deep sub-icecap magmatic events beneath the Executive Committee Range volcanoes of Marie Byrd Land. Here, we extend the identification and analysis of these events in space and time utilizing subspace detection. Subspace detectors provide a highly effective methodology for studying events within seismic swarms that have similar moment tensor and Green's function characteristics and are particularly effective for identifying low signal-to-noise events. Marie Byrd Land (MBL) is an extremely remote continental region that is nearly completely covered by the West Antarctic Ice Sheet (WAIS). The southern extent of Marie Byrd Land lies within the West Antarctic Rift System (WARS), which includes the volcanic Executive Committee Range (ECR). The ECR shows north-to-south progression of volcanism across the WARS during the Holocene. In 2013, the POLENET/ANET seismic data identified two swarms of seismic activity in 2010 and 2011. These events have been interpreted as deep, long-period (DLP) earthquakes based on depth (25-40 km) and low frequency content. The DLP events in MBL lie beneath an inferred sub-WAIS volcanic edifice imaged with ice penetrating radar and have been interpreted as a present location of magmatic intrusion. The magmatic swarm activity in MBL provides a promising target for advanced subspace detection and temporal, spatial, and event size analysis of an extensive deep long period earthquake swarm using a remote seismographic network. We utilized a catalog of 1,370 traditionally identified DLP events to construct subspace detectors for the six nearest stations and analyzed two years of data spanning 2010-2011. Association of these detections into events resulted in an approximate ten-fold increase in number of locatable earthquakes. In addition to the two previously identified swarms during early 2010 and early 2011, we find sustained activity throughout the two years of study that includes several previously

  6. Supersensitive detection and discrimination of enantiomers by dorsal olfactory receptors: evidence for hierarchical odour coding.

    PubMed

    Sato, Takaaki; Kobayakawa, Reiko; Kobayakawa, Ko; Emura, Makoto; Itohara, Shigeyoshi; Kizumi, Miwako; Hamana, Hiroshi; Tsuboi, Akio; Hirono, Junzo

    2015-09-11

    Enantiomeric pairs of mirror-image molecular structures are difficult to resolve by instrumental analyses. The human olfactory system, however, discriminates (-)-wine lactone from its (+)-form rapidly within seconds. To gain insight into receptor coding of enantiomers, we compared behavioural detection and discrimination thresholds of wild-type mice with those of ΔD mice in which all dorsal olfactory receptors are genetically ablated. Surprisingly, wild-type mice displayed an exquisite "supersensitivity" to enantiomeric pairs of wine lactones and carvones. They were capable of supersensitive discrimination of enantiomers, consistent with their high detection sensitivity. In contrast, ΔD mice showed selective major loss of sensitivity to the (+)-enantiomers. The resulting 10(8)-fold differential sensitivity of ΔD mice to (-)- vs. (+)-wine lactone matched that observed in humans. This suggests that humans lack highly sensitive orthologous dorsal receptors for the (+)-enantiomer, similarly to ΔD mice. Moreover, ΔD mice showed >10(10)-fold reductions in enantiomer discrimination sensitivity compared to wild-type mice. ΔD mice detected one or both of the (-)- and (+)-enantiomers over a wide concentration range, but were unable to discriminate them. This "enantiomer odour discrimination paradox" indicates that the most sensitive dorsal receptors play a critical role in hierarchical odour coding for enantiomer identification.

  7. Supersensitive detection and discrimination of enantiomers by dorsal olfactory receptors: evidence for hierarchical odour coding

    PubMed Central

    Sato, Takaaki; Kobayakawa, Reiko; Kobayakawa, Ko; Emura, Makoto; Itohara, Shigeyoshi; Kizumi, Miwako; Hamana, Hiroshi; Tsuboi, Akio; Hirono, Junzo

    2015-01-01

    Enantiomeric pairs of mirror-image molecular structures are difficult to resolve by instrumental analyses. The human olfactory system, however, discriminates (−)-wine lactone from its (+)-form rapidly within seconds. To gain insight into receptor coding of enantiomers, we compared behavioural detection and discrimination thresholds of wild-type mice with those of ΔD mice in which all dorsal olfactory receptors are genetically ablated. Surprisingly, wild-type mice displayed an exquisite “supersensitivity” to enantiomeric pairs of wine lactones and carvones. They were capable of supersensitive discrimination of enantiomers, consistent with their high detection sensitivity. In contrast, ΔD mice showed selective major loss of sensitivity to the (+)-enantiomers. The resulting 108-fold differential sensitivity of ΔD mice to (−)- vs. (+)-wine lactone matched that observed in humans. This suggests that humans lack highly sensitive orthologous dorsal receptors for the (+)-enantiomer, similarly to ΔD mice. Moreover, ΔD mice showed >1010-fold reductions in enantiomer discrimination sensitivity compared to wild-type mice. ΔD mice detected one or both of the (−)- and (+)-enantiomers over a wide concentration range, but were unable to discriminate them. This “enantiomer odour discrimination paradox” indicates that the most sensitive dorsal receptors play a critical role in hierarchical odour coding for enantiomer identification. PMID:26361056

  8. Ultrasonic array for obstacle detection based on CDMA with Kasami codes.

    PubMed

    Diego, Cristina; Hernández, Alvaro; Jiménez, Ana; Alvarez, Fernando J; Sanz, Rebeca; Aparicio, Joaquín

    2011-01-01

    This paper raises the design of an ultrasonic array for obstacle detection based on Phased Array (PA) techniques, which steers the acoustic beam through the environment by electronics rather than mechanical means. The transmission of every element in the array has been encoded, according to Code Division for Multiple Access (CDMA), which allows multiple beams to be transmitted simultaneously. All these features together enable a parallel scanning system which does not only improve the image rate but also achieves longer inspection distances in comparison with conventional PA techniques.

  9. Some implications of TCM for optical direct-detection channels. [trellis coded modulation

    NASA Technical Reports Server (NTRS)

    Georghiades, Costas N.

    1989-01-01

    Consideration is given to the optical direct-detection channel, and it is shown how simple trellis-coded modulation (TCM) can be used to improve performance or increase throughput (in bits per second) without bandwidth expansion or performance loss. In fact, a modest performance gain can be achieved. Although the approach can be used with other signal constellations, the authors concentrate on signals derived from the pulse-position modulation (PPM) format by allowing overlap. Theoretical motivation for using this signal set, known as overlapping PPM (OPPM), was recently given by David and Kaplan (1984), who showed a capacity gain when overlap is introduced.

  10. Ultrasonic Array for Obstacle Detection Based on CDMA with Kasami Codes

    PubMed Central

    Diego, Cristina; Hernández, Álvaro; Jiménez, Ana; Álvarez, Fernando J.; Sanz, Rebeca; Aparicio, Joaquín

    2011-01-01

    This paper raises the design of an ultrasonic array for obstacle detection based on Phased Array (PA) techniques, which steers the acoustic beam through the environment by electronics rather than mechanical means. The transmission of every element in the array has been encoded, according to Code Division for Multiple Access (CDMA), which allows multiple beams to be transmitted simultaneously. All these features together enable a parallel scanning system which does not only improve the image rate but also achieves longer inspection distances in comparison with conventional PA techniques. PMID:22247675

  11. A local multiple alignment method for detection of non-coding RNA sequences.

    PubMed

    Tabei, Yasuo; Asai, Kiyoshi

    2009-06-15

    Non-coding RNAs (ncRNAs) show a unique evolutionary process in which the substitutions of distant bases are correlated in order to conserve the secondary structure of the ncRNA molecule. Therefore, the multiple alignment method for the detection of ncRNAs should take into account both the primary sequence and the secondary structure. Recently, there has been intense focus on multiple alignment investigations for the detection of ncRNAs; however, most of the proposed methods are designed for global multiple alignments. For this reason, these methods are not appropriate to identify locally conserved ncRNAs among genomic sequences. A more efficient local multiple alignment method for the detection of ncRNAs is required. We propose a new local multiple alignment method for the detection of ncRNAs. This method uses a local multiple alignment construction procedure inspired by ProDA, which is a local multiple aligner program for protein sequences with repeated and shuffled elements. To align sequences based on secondary structure information, we propose a new alignment model which incorporates secondary structure features. We define the conditional probability of an alignment via a conditional random field and use a gamma-centroid estimator to align sequences. The locally aligned subsequences are clustered into blocks of approximately globally alignable subsequences between pairwise alignments. Finally, these blocks are multiply aligned via MXSCARNA. In benchmark experiments, we demonstrate the high ability of the implemented software, SCARNA_LM, for local multiple alignment for the detection of ncRNAs. The C++ source code for SCARNA_LM and its experimental datasets are available at http://www.ncrna.org/software/scarna_lm/download. Supplementary data are available at Bioinformatics online.

  12. Non-coding RNA detection methods combined to improve usability, reproducibility and precision.

    PubMed

    Raasch, Peter; Schmitz, Ulf; Patenge, Nadja; Vera, Julio; Kreikemeyer, Bernd; Wolkenhauer, Olaf

    2010-09-29

    Non-coding RNAs gain more attention as their diverse roles in many cellular processes are discovered. At the same time, the need for efficient computational prediction of ncRNAs increases with the pace of sequencing technology. Existing tools are based on various approaches and techniques, but none of them provides a reliable ncRNA detector yet. Consequently, a natural approach is to combine existing tools. Due to a lack of standard input and output formats combination and comparison of existing tools is difficult. Also, for genomic scans they often need to be incorporated in detection workflows using custom scripts, which decreases transparency and reproducibility. We developed a Java-based framework to integrate existing tools and methods for ncRNA detection. This framework enables users to construct transparent detection workflows and to combine and compare different methods efficiently. We demonstrate the effectiveness of combining detection methods in case studies with the small genomes of Escherichia coli, Listeria monocytogenes and Streptococcus pyogenes. With the combined method, we gained 10% to 20% precision for sensitivities from 30% to 80%. Further, we investigated Streptococcus pyogenes for novel ncRNAs. Using multiple methods--integrated by our framework--we determined four highly probable candidates. We verified all four candidates experimentally using RT-PCR. We have created an extensible framework for practical, transparent and reproducible combination and comparison of ncRNA detection methods. We have proven the effectiveness of this approach in tests and by guiding experiments to find new ncRNAs. The software is freely available under the GNU General Public License (GPL), version 3 at http://www.sbi.uni-rostock.de/moses along with source code, screen shots, examples and tutorial material.

  13. Two-stage sparse coding of region covariance via Log-Euclidean kernels to detect saliency.

    PubMed

    Zhang, Ying-Ying; Yang, Cai; Zhang, Ping

    2017-05-01

    In this paper, we present a novel bottom-up saliency detection algorithm from the perspective of covariance matrices on a Riemannian manifold. Each superpixel is described by a region covariance matrix on Riemannian Manifolds. We carry out a two-stage sparse coding scheme via Log-Euclidean kernels to extract salient objects efficiently. In the first stage, given background dictionary on image borders, sparse coding of each region covariance via Log-Euclidean kernels is performed. The reconstruction error on the background dictionary is regarded as the initial saliency of each superpixel. In the second stage, an improvement of the initial result is achieved by calculating reconstruction errors of the superpixels on foreground dictionary, which is extracted from the first stage saliency map. The sparse coding in the second stage is similar to the first stage, but is able to effectively highlight the salient objects uniformly from the background. Finally, three post-processing methods-highlight-inhibition function, context-based saliency weighting, and the graph cut-are adopted to further refine the saliency map. Experiments on four public benchmark datasets show that the proposed algorithm outperforms the state-of-the-art methods in terms of precision, recall and mean absolute error, and demonstrate the robustness and efficiency of the proposed method.

  14. Auditory detection of ultrasonic coded transmitters by seals and sea lions.

    PubMed

    Cunningham, Kane A; Hayes, Sean A; Michelle Wargo Rub, A; Reichmuth, Colleen

    2014-04-01

    Ultrasonic coded transmitters (UCTs) are high-frequency acoustic tags that are often used to conduct survivorship studies of vulnerable fish species. Recent observations of differential mortality in tag control studies suggest that fish instrumented with UCTs may be selectively targeted by marine mammal predators, thereby skewing valuable survivorship data. In order to better understand the ability of pinnipeds to detect UCT outputs, behavioral high-frequency hearing thresholds were obtained from a trained harbor seal (Phoca vitulina) and a trained California sea lion (Zalophus californianus). Thresholds were measured for extended (500 ms) and brief (10 ms) 69 kHz narrowband stimuli, as well as for a stimulus recorded directly from a Vemco V16-3H UCT, which consisted of eight 10 ms, 69 kHz pure-tone pulses. Detection thresholds for the harbor seal were as expected based on existing audiometric data for this species, while the California sea lion was much more sensitive than predicted. Given measured detection thresholds of 113 dB re 1 μPa and 124 dB re 1 μPa, respectively, both species are likely able to detect acoustic outputs of the Vemco V16-3H under water from distances exceeding 200 m in typical natural conditions, suggesting that these species are capable of using UCTs to detect free-ranging fish.

  15. Transformation of the neural code for tactile detection from thalamus to cortex

    PubMed Central

    Vázquez, Yuriria; Salinas, Emilio; Romo, Ranulfo

    2013-01-01

    To understand how sensory-driven neural activity gives rise to perception, it is essential to characterize how various relay stations in the brain encode stimulus presence. Neurons in the ventral posterior lateral (VPL) nucleus of the somatosensory thalamus and in primary somatosensory cortex (S1) respond to vibrotactile stimulation with relatively slow modulations (∼100 ms) of their firing rate. In addition, faster modulations (∼10 ms) time-locked to the stimulus waveform are observed in both areas, but their contribution to stimulus detection is unknown. Furthermore, it is unclear whether VPL and S1 neurons encode stimulus presence with similar accuracy and via the same response features. To address these questions, we recorded single neurons while trained monkeys judged the presence or absence of a vibrotactile stimulus of variable amplitude, and their activity was analyzed with a unique decoding method that is sensitive to the time scale of the firing rate fluctuations. We found that the maximum detection accuracy of single neurons is similar in VPL and S1. However, VPL relies more heavily on fast rate modulations than S1, and as a consequence, the neural code in S1 is more tolerant: its performance degrades less when the readout method or the time scale of integration is suboptimal. Therefore, S1 neurons implement a more robust code, one less sensitive to the temporal integration window used to infer stimulus presence downstream. The differences between VPL and S1 responses signaling the appearance of a stimulus suggest a transformation of the neural code from thalamus to cortex. PMID:23798408

  16. Performance improvement of hybrid subcarrier multiplexing optical spectrum code division multiplexing system using spectral direct decoding detection technique

    NASA Astrophysics Data System (ADS)

    Sahbudin, R. K. Z.; Abdullah, M. K.; Mokhtar, M.

    2009-06-01

    This paper proposes a hybrid subcarrier multiplexing/optical spectrum code division multiplexing (SCM/OSCDM) system for the purpose of combining the advantages of both techniques. Optical spectrum code division multiple-access (OSCDMA) is one of the multiplexing techniques that is becoming popular because of the flexibility in the allocation of channels, ability to operate asynchronously, enhanced privacy and increased capacity in bursty nature networks. On the other hand, subcarrier multiplexing (SCM) technique is able to enhance the channel data rate of OSCDMA systems. In this paper, a newly developed detection technique for the OSCDM called spectral direct decoding (SDD) detection technique is compared mathematically with the AND subtraction detection technique. The system utilizes a new unified code construction named KS (Khazani-Syed) code. The results characterizing the bit-error-rate (BER) show that SDD offers a significant improved performance at BER of 10 -9.

  17. Passive Copy-Move Forgery Detection Using Halftoning-based Block Truncation Coding Feature

    NASA Astrophysics Data System (ADS)

    Harjito, Bambang; Prasetyo, Heri

    2017-06-01

    This paper presents a new method on passive copy-move forgery detection by exploiting the effectiveness and usability of Halftoning-based Block Truncation Coding (HBTC) image feature. Copy-move forgery detection precisely locates the large size or flat tampered regions of an image. On our method, the tampered input image is firstly divided into several overlapping image blocks to construct the image feature descriptors. Each image block is further divided into several non-overlapping image blocks for processing HBTC. Two image feature descriptors, namely Color Feature (CF) and Bit Pattern Feature (BF) are computed from the HBTC compressed data-stream of each image block. Lexicography sorting rearranges the image feature descriptors in ascending manner for whole image. The similarity between some tampered image regions is measured based on their CF and BF under specific shift frequency threshold. As documented in the experimental results, the proposed method yields a promising result for detecting the tampered or copy-move forgery regions. It has proved that the HBTC is not only suitable for image compression, but it can also be used in the copy-move forgery detection.

  18. Real Time PCR to detect hazelnut allergen coding sequences in processed foods.

    PubMed

    Iniesto, Elisa; Jiménez, Ana; Prieto, Nuria; Cabanillas, Beatriz; Burbano, Carmen; Pedrosa, Mercedes M; Rodríguez, Julia; Muzquiz, Mercedes; Crespo, Jesús F; Cuadrado, Carmen; Linacero, Rosario

    2013-06-01

    A quantitative RT-PCR method, employing novel primer sets designed on Cor a 9, Cor a 11 and Cor a 13 allergen-coding sequences has been setup and validated. Its specificity, sensitivity and applicability have been compared. The effect of processing on detectability of these hazelnut targets in complex food matrices was also studied. The DNA extraction method based on CTAB-phenol-chloroform was the best for hazelnut. RT-PCR using primers for Cor a 9, 11 and 13 allowed a specific and accurate amplification of these sequences. The limit of detection was 1 ppm of raw hazelnut. The method sensitivity and robustness were confirmed with spiked samples. Thermal treatments (roasting and autoclaving) reduced yield and amplificability of hazelnut DNA, however, high-hydrostatic pressure did not affect. Compared with an ELISA assay, this RT-PCR showed higher sensitivity to detected hazelnut traces in commercial foodstuffs. The RT-PCR method described is the most sensitive of those reported for the detection of hazelnut traces in processed foods.

  19. Detection and reconstruction of error control codes for engineered and biological regulatory systems.

    SciTech Connect

    May, Elebeoba Eni; Rintoul, Mark Daniel; Johnston, Anna Marie; Pryor, Richard J.; Hart, William Eugene; Watson, Jean-Paul

    2003-10-01

    A fundamental challenge for all communication systems, engineered or living, is the problem of achieving efficient, secure, and error-free communication over noisy channels. Information theoretic principals have been used to develop effective coding theory algorithms to successfully transmit information in engineering systems. Living systems also successfully transmit biological information through genetic processes such as replication, transcription, and translation, where the genome of an organism is the contents of the transmission. Decoding of received bit streams is fairly straightforward when the channel encoding algorithms are efficient and known. If the encoding scheme is unknown or part of the data is missing or intercepted, how would one design a viable decoder for the received transmission? For such systems blind reconstruction of the encoding/decoding system would be a vital step in recovering the original message. Communication engineers may not frequently encounter this situation, but for computational biologists and biotechnologist this is an immediate challenge. The goal of this work is to develop methods for detecting and reconstructing the encoder/decoder system for engineered and biological data. Building on Sandia's strengths in discrete mathematics, algorithms, and communication theory, we use linear programming and will use evolutionary computing techniques to construct efficient algorithms for modeling the coding system for minimally errored engineered data stream and genomic regulatory DNA and RNA sequences. The objective for the initial phase of this project is to construct solid parallels between biological literature and fundamental elements of communication theory. In this light, the milestones for FY2003 were focused on defining genetic channel characteristics and providing an initial approximation for key parameters, including coding rate, memory length, and minimum distance values. A secondary objective addressed the question of

  20. Speedup properties of phases in the execution profile of distributed parallel programs

    SciTech Connect

    Carlson, B.M. . Computer Systems Research Institute); Wagner, T.D.; Dowdy, L.W. . Dept. of Computer Science); Worley, P.H. )

    1992-08-01

    The execution profile of a distributed-memory parallel program specifies the number of busy processors as a function of time. Periods of homogeneous processor utilization are manifested in many execution profiles. These periods can usually be correlated with the algorithms implemented in the underlying parallel code. Three families of methods for smoothing execution profile data are presented. These approaches simplify the problem of detecting end points of periods of homogeneous utilization. These periods, called phases, are then examined in isolation, and their speedup characteristics are explored. A specific workload executed on an Intel iPSC/860 is used for validation of the techniques described.

  1. Execution and executability

    NASA Astrophysics Data System (ADS)

    Bradford, Robert W.; Harrison, Denise

    2015-09-01

    "We have a new strategy to grow our organization." Developing the plan is just the start. Implementing it in the organization is the real challenge. Many organizations don't fail due to lack of strategy; they struggle because it isn't effectively implemented. After working with hundreds of companies on strategy development, Denise and Robert have distilled the critical areas where organizations need to focus in order to enhance profitability through superior execution. If these questions are important to your organization, you'll find useful answers in the following articles: Do you find yourself overwhelmed by too many competing priorities? How do you limit how many strategic initiatives/projects your organization is working on at one time? How do you balance your resource requirements (time and money) with the availability of these resources? How do you balance your strategic initiative requirements with the day-to-day requirements of your organization?

  2. Coded excitation speeds up the detection of the fundamental flexural guided wave in coated tubes

    NASA Astrophysics Data System (ADS)

    Song, Xiaojun; Moilanen, Petro; Zhao, Zuomin; Ta, Dean; Pirhonen, Jalmari; Salmi, Ari; Hæeggström, Edward; Myllylä, Risto; Timonen, Jussi; Wang, Weiqi

    2016-09-01

    The fundamental flexural guided wave (FFGW) permits ultrasonic assessment of the wall thickness of solid waveguides, such as tubes or, e.g., long cortical bones. Recently, an optical non-contact method was proposed for ultrasound excitation and detection with the aim of facilitating the FFGW reception by suppressing the interfering modes from the soft coating. This technique suffers from low SNR and requires iterative physical scanning across the source-receiver distance for 2D-FFT analysis. This means that SNR improvement achieved by temporal averaging becomes time-consuming (several minutes) which reduces the applicability of the technique, especially in time-critical applications such as clinical quantitative ultrasound. To achieve sufficient SNR faster, an ultrasonic excitation by a base-sequence-modulated Golay code (BSGC, 64-bit code pair) on coated tube samples (1-5 mm wall thickness and 5 mm soft coating layer) was used. This approach improved SNR by 21 dB and speeded up the measurement by a factor of 100 compared to using a classical pulse excitation with temporal averaging. The measurement now took seconds instead of minutes, while the ability to determine the wall thickness of the phantoms was maintained. The technique thus allows rapid noncontacting assessment of the wall thickness in coated solid tubes, such as the human bone.

  3. Selective Capture and Quick Detection of Targeting Cells with SERS-Coding Microsphere Suspension Chip.

    PubMed

    Li, Dian; Zhang, Yuting; Li, Ruimin; Guo, Jia; Wang, Changchun; Tang, Chuanbing

    2015-05-13

    Circulating tumor cells (CTCs) captured from blood fluid represent recurrent cancers and metastatic lesions to monitor the situation of cancers. We develop surface-enhanced Raman scattering (SERS)-coding microsphere suspension chip as a new strategy for fast and efficient capture, recovery, and detection of targeting cancer cells. Using HeLa cells as model CTCs, we first utilize folate as a recognition molecule to be immobilized in magnetic composite microspheres for capturing HeLa cells and attaining high capturing efficacy (up to 95%). After capturing cells, the composite microsphere, which utilizes a disulfide bond as crosslinker in the polymer shell and as a spacer for linking folate, can recycle 90% cells within 20 min eluted by glutathion solution. Taking advantage of the SERS with fingerprint features, we characterize captured/recovered cells with the unique signal of report-molecule 4-aminothiophenol through introducing the SERS-coding microsphere suspension chip to CTCs. Finally, the exploratory experiment of sieving cells shows that the magnetic composite microspheres can selectively capture the HeLa cells from samples of mixed cells, indicating that these magnetic composite microspheres have potential in real blood samples for capturing CTCs.

  4. Sub-Nyquist sampling and detection in Costas coded pulse compression radars

    NASA Astrophysics Data System (ADS)

    Hanif, Adnan; Mansoor, Atif Bin; Imran, Ali Shariq

    2016-12-01

    Modern pulse compression radar involves digital signal processing of high bandwidth pulses modulated with different coding schemes. One of the limiting factors in the radar's design to achieve desired target range and resolution is the need of high rate analog-to-digital (A/D) conversion fulfilling the Nyquist sampling criteria. The high sampling rates necessitate huge storage capacity, more power consumption, and extra processing requirement. We introduce a new approach to sample wideband radar waveform modulated with Costas sequence at a sub-Nyquist rate based upon the concept of compressive sensing (CS). Sub-Nyquist measurements of Costas sequence waveform are performed in an analog-to-information (A/I) converter based upon random demodulation replacing traditional A/D converter. The novel work presents an 8-order Costas coded waveform with sub-Nyquist sampling and its reconstruction. The reconstructed waveform is compared with the conventionally sampled signal and depicts high-quality signal recovery from sub-Nyquist sampled signal. Furthermore, performance of CS-based detections after reconstruction are evaluated in terms of receiver operating characteristic (ROC) curves and compared with conventional Nyquist-rate matched filtering scheme.

  5. Detection by real time PCR of walnut allergen coding sequences in processed foods.

    PubMed

    Linacero, Rosario; Ballesteros, Isabel; Sanchiz, Africa; Prieto, Nuria; Iniesto, Elisa; Martinez, Yolanda; Pedrosa, Mercedes M; Muzquiz, Mercedes; Cabanillas, Beatriz; Rovira, Mercè; Burbano, Carmen; Cuadrado, Carmen

    2016-07-01

    A quantitative real-time PCR (RT-PCR) method, employing novel primer sets designed on Jug r 1, Jug r 3, and Jug r 4 allergen-coding sequences, was set up and validated. Its specificity, sensitivity, and applicability were evaluated. The DNA extraction method based on CTAB-phenol-chloroform was best for walnut. RT-PCR allowed a specific and accurate amplification of allergen sequence, and the limit of detection was 2.5pg of walnut DNA. The method sensitivity and robustness were confirmed with spiked samples, and Jug r 3 primers detected up to 100mg/kg of raw walnut (LOD 0.01%, LOQ 0.05%). Thermal treatment combined with pressure (autoclaving) reduced yield and amplification (integrity and quality) of walnut DNA. High hydrostatic pressure (HHP) did not produce any effect on the walnut DNA amplification. This RT-PCR method showed greater sensitivity and reliability in the detection of walnut traces in commercial foodstuffs compared with ELISA assays.

  6. Efficient postprocessing scheme for block-coded images based on multiscale edge detection

    NASA Astrophysics Data System (ADS)

    Wu, Shuanhu; Yan, Hong; Tan, Zheng

    2001-09-01

    The block discrete cosine transform (BDCT) is the most widely used technique for the compression of both still and moving images, a major problem related with the BDCT techniques is that the decoded images, especially at low bit rate, exhibit visually annoying blocking effects. In this paper, based on Mallets multiscale edge detection, we proposed an efficient deblocking algorithm to further improved the coding performance. The advantage of our algorithm is that it can efficiently preserve texture structure in the original decompressed images. Our method is similar to that of Z. Xiong's, where the Z.Xiong's method is not suitable for images with a large portion of texture; for instance, the Barbara Image. The difference of our method and the Z.Xiong's is that our method adopted a new thresholding scheme for multi-scale edge detection instead of exploiting cross-scale correlation for edge detection. Numerical experiment results show that our scheme not only outperforms Z.Xiong's for various images in the case of the same computational complexity, but also preserve texture structure in the decompressed images at the same time. Compared with the best iterative-based method (POCS) reported in the literature, our algorithm can achieve the same peak signal-to-noise ratio (PSNR) improvement and give visually very pleasing images as well.

  7. Nanoparticle-Based Bio-Bar Codes for the Ultrasensitive Detection of Proteins

    NASA Astrophysics Data System (ADS)

    Nam, Jwa-Min; Shad Thaxton, C.; Mirkin, Chad A.

    2003-09-01

    An ultrasensitive method for detecting protein analytes has been developed. The system relies on magnetic microparticle probes with antibodies that specifically bind a target of interest [prostate-specific antigen (PSA) in this case] and nanoparticle probes that are encoded with DNA that is unique to the protein target of interest and antibodies that can sandwich the target captured by the microparticle probes. Magnetic separation of the complexed probes and target followed by dehybridization of the oligonucleotides on the nanoparticle probe surface allows the determination of the presence of the target protein by identifying the oligonucleotide sequence released from the nanoparticle probe. Because the nanoparticle probe carries with it a large number of oligonucleotides per protein binding event, there is substantial amplification and PSA can be detected at 30 attomolar concentration. Alternatively, a polymerase chain reaction on the oligonucleotide bar codes can boost the sensitivity to 3 attomolar. Comparable clinically accepted conventional assays for detecting the same target have sensitivity limits of ~3 picomdar, six orders of magnitude less sensitive than what is observed with this method.

  8. Assessment of absolute added correlative coding in optical intensity modulation and direct detection channels

    NASA Astrophysics Data System (ADS)

    Dong-Nhat, Nguyen; Elsherif, Mohamed A.; Malekmohammadi, Amin

    2016-06-01

    The performance of absolute added correlative coding (AACC) modulation format with direct detection has been numerically and analytically reported, targeting metro data center interconnects. Hereby, the focus lies on the performance of the bit error rate, noise contributions, spectral efficiency, and chromatic dispersion tolerance. The signal space model of AACC, where the average electrical and optical power expressions are derived for the first time, is also delineated. The proposed modulation format was also compared to other well-known signaling, such as on-off-keying (OOK) and four-level pulse-amplitude modulation, at the same bit rate in a directly modulated vertical-cavity surface-emitting laser-based transmission system. The comparison results show a clear advantage of AACC in achieving longer fiber delivery distance due to the higher dispersion tolerance.

  9. Cooperative multi-user detection and ranging based on pseudo-random codes

    NASA Astrophysics Data System (ADS)

    Morhart, C.; Biebl, E. M.

    2009-05-01

    We present an improved approach for a Round Trip Time of Flight distance measurement system. The system is intended for the usage in a cooperative localisation system for automotive applications. Therefore, it is designed to address a large number of communication partners per measurement cycle. By using coded signals in a time divison multiple access order, we can detect a large number of pedestrian sensors with just one car sensor. We achieve this by using very short transmit bursts in combination with a real time correlation algorithm. Futhermore, the correlation approach offers real time data, concerning the time of arrival, that can serve as a trigger impulse for other comunication systems. The distance accuracy of the correlation result was further increased by adding a fourier interpolation filter. The system performance was checked with a prototype at 2.4 GHz. We reached a distance measurement accuracy of 12 cm at a range up to 450 m.

  10. Modulated pulse laser with pseudorandom coding capabilities for underwater ranging, detection, and imaging.

    PubMed

    Cochenour, Brandon; Mullen, Linda; Muth, John

    2011-11-20

    Optical detection, ranging, and imaging of targets in turbid water is complicated by absorption and scattering. It has been shown that using a pulsed laser source with a range-gated receiver or an intensity modulated source with a coherent RF receiver can improve target contrast in turbid water. A blended approach using a modulated-pulse waveform has been previously suggested as a way to further improve target contrast. However only recently has a rugged and reliable laser source been developed that is capable of synthesizing such a waveform so that the effect of the underwater environment on the propagation of a modulated pulse can be studied. In this paper, we outline the motivation for the modulated-pulse (MP) concept, and experimentally evaluate different MP waveforms: single-tone MP and pseudorandom coded MP sequences.

  11. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.

    PubMed

    Al-Dmour, Hayat; Al-Ani, Ahmed

    2016-04-01

    The present work has the goal of developing a secure medical imaging information system based on a combined steganography and cryptography technique. It attempts to securely embed patient's confidential information into his/her medical images. The proposed information security scheme conceals coded Electronic Patient Records (EPRs) into medical images in order to protect the EPRs' confidentiality without affecting the image quality and particularly the Region of Interest (ROI), which is essential for diagnosis. The secret EPR data is converted into ciphertext using private symmetric encryption method. Since the Human Visual System (HVS) is less sensitive to alterations in sharp regions compared to uniform regions, a simple edge detection method has been introduced to identify and embed in edge pixels, which will lead to an improved stego image quality. In order to increase the embedding capacity, the algorithm embeds variable number of bits (up to 3) in edge pixels based on the strength of edges. Moreover, to increase the efficiency, two message coding mechanisms have been utilized to enhance the ±1 steganography. The first one, which is based on Hamming code, is simple and fast, while the other which is known as the Syndrome Trellis Code (STC), is more sophisticated as it attempts to find a stego image that is close to the cover image through minimizing the embedding impact. The proposed steganography algorithm embeds the secret data bits into the Region of Non Interest (RONI), where due to its importance; the ROI is preserved from modifications. The experimental results demonstrate that the proposed method can embed large amount of secret data without leaving a noticeable distortion in the output image. The effectiveness of the proposed algorithm is also proven using one of the efficient steganalysis techniques. The proposed medical imaging information system proved to be capable of concealing EPR data and producing imperceptible stego images with minimal

  12. Decoding of DBEC-TBED Reed-Solomon codes. [Double-Byte-Error-Correcting, Triple-Byte-Error-Detecting

    NASA Technical Reports Server (NTRS)

    Deng, Robert H.; Costello, Daniel J., Jr.

    1987-01-01

    A problem in designing semiconductor memories is to provide some measure of error control without requiring excessive coding overhead or decoding time. In LSI and VLSI technology, memories are often organized on a multiple bit (or byte) per chip basis. For example, some 256 K bit DRAM's are organized in 32 K x 8 bit-bytes. Byte-oriented codes such as Reed-Solomon (RS) codes can provide efficient low overhead error control for such memories. However, the standard iterative algorithm for decoding RS codes is too slow for these applications. The paper presents a special decoding technique for double-byte-error-correcting, triple-byte-error-detecting RS codes which is capable of high-speed operation. This technique is designed to find the error locations and the error values directly from the syndrome without having to use the iterative algorithm to find the error locator polynomial.

  13. Decoding of DBEC-TBED Reed-Solomon codes. [Double-Byte-Error-Correcting, Triple-Byte-Error-Detecting

    NASA Technical Reports Server (NTRS)

    Deng, Robert H.; Costello, Daniel J., Jr.

    1987-01-01

    A problem in designing semiconductor memories is to provide some measure of error control without requiring excessive coding overhead or decoding time. In LSI and VLSI technology, memories are often organized on a multiple bit (or byte) per chip basis. For example, some 256 K bit DRAM's are organized in 32 K x 8 bit-bytes. Byte-oriented codes such as Reed-Solomon (RS) codes can provide efficient low overhead error control for such memories. However, the standard iterative algorithm for decoding RS codes is too slow for these applications. The paper presents a special decoding technique for double-byte-error-correcting, triple-byte-error-detecting RS codes which is capable of high-speed operation. This technique is designed to find the error locations and the error values directly from the syndrome without having to use the iterative algorithm to find the error locator polynomial.

  14. PCR-free quantitative detection of genetically modified organism from raw materials. An electrochemiluminescence-based bio bar code method.

    PubMed

    Zhu, Debin; Tang, Yabing; Xing, Da; Chen, Wei R

    2008-05-15

    A bio bar code assay based on oligonucleotide-modified gold nanoparticles (Au-NPs) provides a PCR-free method for quantitative detection of nucleic acid targets. However, the current bio bar code assay requires lengthy experimental procedures including the preparation and release of bar code DNA probes from the target-nanoparticle complex and immobilization and hybridization of the probes for quantification. Herein, we report a novel PCR-free electrochemiluminescence (ECL)-based bio bar code assay for the quantitative detection of genetically modified organism (GMO) from raw materials. It consists of tris-(2,2'-bipyridyl) ruthenium (TBR)-labeled bar code DNA, nucleic acid hybridization using Au-NPs and biotin-labeled probes, and selective capture of the hybridization complex by streptavidin-coated paramagnetic beads. The detection of target DNA is realized by direct measurement of ECL emission of TBR. It can quantitatively detect target nucleic acids with high speed and sensitivity. This method can be used to quantitatively detect GMO fragments from real GMO products.

  15. Assessing executive function in preschoolers.

    PubMed

    Anderson, Peter J; Reidy, Natalie

    2012-12-01

    Executive function develops at an unprecedented rate during the preschool period, yet few clinicians attempt to assess executive processes in young children. The primary objective of this article is to demonstrate that executive function can be assessed in preschoolers, and to highlight the importance of detecting executive dysfunction as early as possible. Following a description of executive function and the underlying neural systems, this article outlines some of the challenges in assessing executive function in young children. The various assessment paradigms used for assessing executive function in preschoolers are presented, and based on studies that have applied these measurement tools normal development of executive domains is described. Finally, the benefits and opportunities for executive function intervention in the preschool period are considered.

  16. Self-assembled software and method of overriding software execution

    DOEpatents

    Bouchard, Ann M.; Osbourn, Gordon C.

    2013-01-08

    A computer-implemented software self-assembled system and method for providing an external override and monitoring capability to dynamically self-assembling software containing machines that self-assemble execution sequences and data structures. The method provides an external override machine that can be introduced into a system of self-assembling machines while the machines are executing such that the functionality of the executing software can be changed or paused without stopping the code execution and modifying the existing code. Additionally, a monitoring machine can be introduced without stopping code execution that can monitor specified code execution functions by designated machines and communicate the status to an output device.

  17. Real-time detection of natural objects using AM-coded spectral matching imager

    NASA Astrophysics Data System (ADS)

    Kimachi, Akira

    2004-12-01

    This paper describes application of the amplitude-modulation (AM)-coded spectral matching imager (SMI) to real-time detection of natural objects such as human beings, animals, vegetables, or geological objects or phenomena, which are much more liable to change with time than artificial products while often exhibiting characteristic spectral functions associated with some specific activity states. The AM-SMI produces correlation between spectral functions of the object and a reference at each pixel of the correlation image sensor (CIS) in every frame, based on orthogonal amplitude modulation (AM) of each spectral channel and simultaneous demodulation of all channels on the CIS. This principle makes the SMI suitable to monitoring dynamic behavior of natural objects in real-time by looking at a particular spectral reflectance or transmittance function. A twelve-channel multispectral light source was developed with improved spatial uniformity of spectral irradiance compared to a previous one. Experimental results of spectral matching imaging of human skin and vegetable leaves are demonstrated, as well as a preliminary feasibility test of imaging a reflective object using a test color chart.

  18. Real-time detection of natural objects using AM-coded spectral matching imager

    NASA Astrophysics Data System (ADS)

    Kimachi, Akira

    2005-01-01

    This paper describes application of the amplitude-modulation (AM)-coded spectral matching imager (SMI) to real-time detection of natural objects such as human beings, animals, vegetables, or geological objects or phenomena, which are much more liable to change with time than artificial products while often exhibiting characteristic spectral functions associated with some specific activity states. The AM-SMI produces correlation between spectral functions of the object and a reference at each pixel of the correlation image sensor (CIS) in every frame, based on orthogonal amplitude modulation (AM) of each spectral channel and simultaneous demodulation of all channels on the CIS. This principle makes the SMI suitable to monitoring dynamic behavior of natural objects in real-time by looking at a particular spectral reflectance or transmittance function. A twelve-channel multispectral light source was developed with improved spatial uniformity of spectral irradiance compared to a previous one. Experimental results of spectral matching imaging of human skin and vegetable leaves are demonstrated, as well as a preliminary feasibility test of imaging a reflective object using a test color chart.

  19. Writing executable assertions to test flight software

    NASA Technical Reports Server (NTRS)

    Mahmood, A.; Andrews, D. M.; Mccluskey, E. J.

    1984-01-01

    An executable assertion is a logical statement about the variables or a block of code. If there is no error during execution, the assertion statement results in a true value. Executable assertions can be used for dynamic testing of software. They can be employed for validation during the design phase, and exception and error detection during the operation phase. The present investigation is concerned with the problem of writing executable assertions, taking into account the use of assertions for testing flight software. They can be employed for validation during the design phase, and for exception handling and error detection during the operation phase The digital flight control system and the flight control software are discussed. The considered system provides autopilot and flight director modes of operation for automatic and manual control of the aircraft during all phases of flight. Attention is given to techniques for writing and using assertions to test flight software, an experimental setup to test flight software, and language features to support efficient use of assertions.

  20. An Implementation of Privacy Protection for a Surveillance Camera Using ROI Coding of JPEG2000 with Face Detection

    NASA Astrophysics Data System (ADS)

    Muneyasu, Mitsuji; Odani, Shuhei; Kitaura, Yoshihiro; Namba, Hitoshi

    On the use of a surveillance camera, there is a case where privacy protection should be considered. This paper proposes a new privacy protection method by automatically degrading the face region in surveillance images. The proposed method consists of ROI coding of JPEG2000 and a face detection method based on template matching. The experimental result shows that the face region can be detected and hidden correctly.

  1. Impact of Error Detecting or Correcting Codes on the Sensitivity to DPA of an AES S-Box

    NASA Astrophysics Data System (ADS)

    Hussain, Iqtadar; Gondal, Muhammad Asif

    2014-09-01

    The robustness of a chip intended for security related requisitions relies upon its capacity to universally oppose to different sorts of ambushes. This paper manages securities against non intrusive or semi obtrusive assaults. The two fundamental classes are strike focused around force utilization (either by checking the current, e.g. DPA, or by observing the electromagnetic emanations, i.e. EMA) and strike focused around the infusion of issues throughout the provision execution (DFA). Data repetition is regularly proposed as a premise for countermeasures against DFA. This paper examines the impact of the decision of the code on the worldwide vigor of the circuit. The study is centered around the assessment of the affectability to DPA of a few ensured renditions of an AES circuit.

  2. Leveraging Parallel Hardware to Detect, Quarantine, and Repair Malicious Code Injection (#36)

    DTIC Science & Technology

    2010-01-01

    collection of information is estimated to average 1 hour per response, including the time for reviewing instructions , searching data sources, gathering and...RELEASE; DISTRIBUTION UNLIMITED. 13. SUPPLEMENTARY NOTES 14. ABSTRACT In a Multi-Variant Execution Environment (MVEE), several slightly different...complicated allocation me- chanics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 9 Mechanics of PUSH instruction in reverse stack

  3. Detection of Inpatient Health Care Associated Injuries: Comparing Two ICD-9-CM Code Classifications

    DTIC Science & Technology

    2005-05-01

    example, currently the UTIDs database has nine fields for ICD-9-CM diagnosis codes plus a single additional field for an E-code. Some patients...information for physicians on sub-acute thromboses (SAT) and hypersensitivity reactions with use of the Cordis CYPHERTM Sirolimus-eluting coronary stent

  4. Presenting an Alternative Source Code Plagiarism Detection Framework for Improving the Teaching and Learning of Programming

    ERIC Educational Resources Information Center

    Hattingh, Frederik; Buitendag, Albertus A. K.; van der Walt, Jacobus S.

    2013-01-01

    The transfer and teaching of programming and programming related skills has become, increasingly difficult on an undergraduate level over the past years. This is partially due to the number of programming languages available as well as access to readily available source code over the Web. Source code plagiarism is common practice amongst many…

  5. Presenting an Alternative Source Code Plagiarism Detection Framework for Improving the Teaching and Learning of Programming

    ERIC Educational Resources Information Center

    Hattingh, Frederik; Buitendag, Albertus A. K.; van der Walt, Jacobus S.

    2013-01-01

    The transfer and teaching of programming and programming related skills has become, increasingly difficult on an undergraduate level over the past years. This is partially due to the number of programming languages available as well as access to readily available source code over the Web. Source code plagiarism is common practice amongst many…

  6. Executive Dysfunction

    PubMed Central

    Rabinovici, Gil D.; Stephens, Melanie L.; Possin, Katherine L.

    2015-01-01

    Purpose of Review: Executive functions represent a constellation of cognitive abilities that drive goal-oriented behavior and are critical to the ability to adapt to an ever-changing world. This article provides a clinically oriented approach to classifying, localizing, diagnosing, and treating disorders of executive function, which are pervasive in clinical practice. Recent Findings: Executive functions can be split into four distinct components: working memory, inhibition, set shifting, and fluency. These components may be differentially affected in individual patients and act together to guide higher-order cognitive constructs such as planning and organization. Specific bedside and neuropsychological tests can be applied to evaluate components of executive function. While dysexecutive syndromes were first described in patients with frontal lesions, intact executive functioning relies on distributed neural networks that include not only the prefrontal cortex, but also the parietal cortex, basal ganglia, thalamus, and cerebellum. Executive dysfunction arises from injury to any of these regions, their white matter connections, or neurotransmitter systems. Dysexecutive symptoms therefore occur in most neurodegenerative diseases and in many other neurologic, psychiatric, and systemic illnesses. Management approaches are patient specific and should focus on treatment of the underlying cause in parallel with maximizing patient function and safety via occupational therapy and rehabilitation. Summary: Executive dysfunction is extremely common in patients with neurologic disorders. Diagnosis and treatment hinge on familiarity with the clinical components and neuroanatomic correlates of these complex, high-order cognitive processes. PMID:26039846

  7. Quartz crystal microbalance detection of DNA single-base mutation based on monobase-coded cadmium tellurium nanoprobe.

    PubMed

    Zhang, Yuqin; Lin, Fanbo; Zhang, Youyu; Li, Haitao; Zeng, Yue; Tang, Hao; Yao, Shouzhuo

    2011-01-01

    A new method for the detection of point mutation in DNA based on the monobase-coded cadmium tellurium nanoprobes and the quartz crystal microbalance (QCM) technique was reported. A point mutation (single-base, adenine, thymine, cytosine, and guanine, namely, A, T, C and G, mutation in DNA strand, respectively) DNA QCM sensor was fabricated by immobilizing single-base mutation DNA modified magnetic beads onto the electrode surface with an external magnetic field near the electrode. The DNA-modified magnetic beads were obtained from the biotin-avidin affinity reaction of biotinylated DNA and streptavidin-functionalized core/shell Fe(3)O(4)/Au magnetic nanoparticles, followed by a DNA hybridization reaction. Single-base coded CdTe nanoprobes (A-CdTe, T-CdTe, C-CdTe and G-CdTe, respectively) were used as the detection probes. The mutation site in DNA was distinguished by detecting the decreases of the resonance frequency of the piezoelectric quartz crystal when the coded nanoprobe was added to the test system. This proposed detection strategy for point mutation in DNA is proved to be sensitive, simple, repeatable and low-cost, consequently, it has a great potential for single nucleotide polymorphism (SNP) detection.

  8. External validation of Medicare claims codes for digital mammography and computer-aided detection.

    PubMed

    Fenton, Joshua J; Zhu, Weiwei; Balch, Steven; Smith-Bindman, Rebecca; Lindfors, Karen K; Hubbard, Rebecca A

    2012-08-01

    While Medicare claims are a potential resource for clinical mammography research or quality monitoring, the validity of key data elements remains uncertain. Claims codes for digital mammography and computer-aided detection (CAD), for example, have not been validated against a credible external reference standard. We matched Medicare mammography claims for women who received bilateral mammograms from 2003 to 2006 to corresponding mammography data from the Breast Cancer Surveillance Consortium (BCSC) registries in four U.S. states (N = 253,727 mammograms received by 120,709 women). We assessed the accuracy of the claims-based classifications of bilateral mammograms as either digital versus film and CAD versus non-CAD relative to a reference standard derived from BCSC data. Claims data correctly classified the large majority of film and digital mammograms (97.2% and 97.3%, respectively), yielding excellent agreement beyond chance (κ = 0.90). Claims data correctly classified the large majority of CAD mammograms (96.6%) but a lower percentage of non-CAD mammograms (86.7%). Agreement beyond chance remained high for CAD classification (κ = 0.83). From 2003 to 2006, the predictive values of claims-based digital and CAD classifications increased as the sample prevalences of each technology increased. Medicare claims data can accurately distinguish film and digital bilateral mammograms and mammograms conducted with and without CAD. The validity of Medicare claims data regarding film versus digital mammography and CAD suggests that these data elements can be useful in research and quality improvement. ©2012 AACR.

  9. Detection of coding microsatellite frameshift mutations in DNA mismatch repair-deficient mouse intestinal tumors.

    PubMed

    Woerner, Stefan M; Tosti, Elena; Yuan, Yan P; Kloor, Matthias; Bork, Peer; Edelmann, Winfried; Gebert, Johannes

    2015-11-01

    Different DNA mismatch repair (MMR)-deficient mouse strains have been developed as models for the inherited cancer predisposing Lynch syndrome. It is completely unresolved, whether coding mononucleotide repeat (cMNR) gene mutations in these mice can contribute to intestinal tumorigenesis and whether MMR-deficient mice are a suitable molecular model of human microsatellite instability (MSI)-associated intestinal tumorigenesis. A proof-of-principle study was performed to identify mouse cMNR-harboring genes affected by insertion/deletion mutations in MSI murine intestinal tumors. Bioinformatic algorithms were developed to establish a database of mouse cMNR-harboring genes. A panel of five mouse noncoding mononucleotide markers was used for MSI classification of intestinal matched normal/tumor tissues from MMR-deficient (Mlh1(-/-) , Msh2(-/-) , Msh2(LoxP/LoxP) ) mice. cMNR frameshift mutations of candidate genes were determined by DNA fragment analysis. Murine MSI intestinal tumors but not normal tissues from MMR-deficient mice showed cMNR frameshift mutations in six candidate genes (Elavl3, Tmem107, Glis2, Sdccag1, Senp6, Rfc3). cMNRs of mouse Rfc3 and Elavl3 are conserved in type and length in their human orthologs that are known to be mutated in human MSI colorectal, endometrial and gastric cancer. We provide evidence for the utility of a mononucleotide marker panel for detection of MSI in murine tumors, the existence of cMNR instability in MSI murine tumors, the utility of mouse subspecies DNA for identification of polymorphic repeats, and repeat conservation among some orthologous human/mouse genes, two of them showing instability in human and mouse MSI intestinal tumors. MMR-deficient mice hence are a useful molecular model system for analyzing MSI intestinal carcinogenesis.

  10. New mapping rules for combination of M-ary modulation and error-detecting codes in ARQ systems

    NASA Astrophysics Data System (ADS)

    Benelli, G.

    1990-08-01

    In some ARQ schemes, the combination of modulation and channel coding improves the performance of a communication system. The paper describes a new method for the integration of an error-detecting code with M-ary modulation. Euclidean distances are obtained among modulated signals using successive transmissions of the same codeword larger than those obtained by other similar schemes. The results of the theoretical analysis show that the described method allows improvement of both the error probability and the throughput of an ARQ protocol with respect to other schemes.

  11. Slow and fast ultrasonic wave detection improvement in human trabecular bones using Golay code modulation.

    PubMed

    Lashkari, Bahman; Manbachi, Amir; Mandelis, Andreas; Cobbold, Richard S C

    2012-09-01

    The identification of fast and slow waves propagating through trabecular bone is a challenging task due to temporal wave overlap combined with the high attenuation of the fast wave in the presence of noise. However, it can provide valuable information about bone integrity and become a means for monitoring osteoporosis. The objective of this work is to apply different coded excitation methods for this purpose. The results for single-sine cycle pulse, Golay code, and chirp excitations are compared. It is shown that Golay code is superior to the other techniques due to its signal enhancement while exhibiting excellent resolution without the ambiguity of sidelobes.

  12. A New Model for the Error Detection Delay of Finite Precision Binary Arithmetic Codes with a Forbidden Symbol

    NASA Astrophysics Data System (ADS)

    Pang, Yuye; Sun, Jun; Wang, Jia; Wang, Peng

    In this paper, the statistical characteristic of the Error Detection Delay (EDD) of Finite Precision Binary Arithmetic Codes (FPBAC) is discussed. It is observed that, apart from the probability of the Forbidden Symbol (FS) inserted into the list of the source symbols, the probability of the source sequence and the operation precision as well as the position of the FS in the coding interval can affect the statistical characteristic of the EDD. Experiments demonstrate that the actual distribution of the EDD of FPBAC is quite different from the geometric distribution of infinite precision arithmetic codes. This phenomenon is researched deeply, and a new statistical model (gamma distribution) of the actual distribution of the EDD is proposed, which can make a more precise prediction of the EDD. Finally, the relation expressions between the parameters of gamma distribution and the related factors affecting the distribution are given.

  13. Executive functions.

    PubMed

    Miller, Karen J

    2005-04-01

    Executive functions are higher-order cognitive processes that continue to develop well into adulthood. They are critically important to behavioral self-control and task performance, and deficits can have serious effects on a student's functioning in many areas. Primary care pediatricians can play an important role by being aware of this evolving field of research, current assessment strategies, and by encouraging families, schools, and students to adopt a positive and problem-solving approach to improve executive functions.

  14. EXECUTIVE RESOURCES

    PubMed Central

    Gross, Rachel G.; Grossman, Murray

    2013-01-01

    Executive resources allow for flexible, adaptive, goal-directed responses to environmental circumstances in essentially all facets of daily living. Executive function is composed of related, but separable, components. This article will highlight three essential aspects of executive function: (1) working memory, (2) planning and organizing, and (3) inhibitory control. Working memory is the system by which information is maintained in an active mental state so that it can be used for other purposes. Planning and organizing of behavior involves the way in which individuals optimize the execution of multistep tasks to achieve a goal. Inhibitory control allows an individual to inhibit inappropriate responses and to shift responses when necessary. These aspects of executive function appear to depend in part on large-scale neural networks that are centered in distinct areas of prefrontal cortex, working in concert with other brain regions, such as parietal cortex and the basal ganglia. Executive function is a fundamental aspect of human cognition that is compromised in patients with a wide range of medical conditions. PMID:22810519

  15. Virtual multiple errands test (VMET): a virtual reality-based tool to detect early executive functions deficit in Parkinson’s disease

    PubMed Central

    Cipresso, Pietro; Albani, Giovanni; Serino, Silvia; Pedroli, Elisa; Pallavicini, Federica; Mauro, Alessandro; Riva, Giuseppe

    2014-01-01

    Introduction: Several recent studies have pointed out that early impairment of executive functions (EFs) in Parkinson’s Disease (PD) may be a crucial marker to detect patients at risk for developing dementia. The main objective of this study was to compare the performances of PD patients with mild cognitive impairment (PD-MCI) with PD patients with normal cognition (PD-NC) and a control group (CG) using a traditional assessment of EFs and the Virtual Multiple Errands Test (VMET), a virtual reality (VR)-based tool. In order to understand which subcomponents of EFs are early impaired, this experimental study aimed to investigate specifically which instrument best discriminates among these three groups. Materials and methods: The study included three groups of 15 individuals each (for a total of 45 participants): 15 PD-NC; 15 PD-MCI, and 15 cognitively healthy individuals (CG). To assess the global neuropsychological functioning and the EFs, several tests (including the Mini Mental State Examination (MMSE), Clock Drawing Test, and Tower of London test) were administered to the participants. The VMET was used for a more ecologically valid neuropsychological evaluation of EFs. Results: Findings revealed significant differences in the VMET scores between the PD-NC patients vs. the controls. In particular, patients made more errors in the tasks of the VMET, and showed a poorer ability to use effective strategies to complete the tasks. This VMET result seems to be more sensitive in the early detection of executive deficits because these two groups did not differ in the traditional assessment of EFs (neuropsychological battery). Conclusion: This study offers initial evidence that a more ecologically valid evaluation of EFs is more likely to lead to detection of subtle executive deficits. PMID:25538578

  16. 3 CFR 13490 - Executive Order 13490 of January 21, 2009. Ethics Commitments by Executive Branch Personnel

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false Executive Order 13490 of January 21, 2009. Ethics... Order 13490 of January 21, 2009 EO 13490 Ethics Commitments by Executive Branch Personnel By the... Code, it is hereby ordered as follows: Section 1. Ethics Pledge. Every appointee in every executive...

  17. Proteomic Detection of Non-Annotated Protein-Coding Genes in Pseudomonas fluorescens Pf0-1

    SciTech Connect

    Kim, Wook; Silby, Mark W.; Purvine, Samuel O.; Nicoll, Julie S.; Hixson, Kim K.; Monroe, Matthew E.; Nicora, Carrie D.; Lipton, Mary S.; Levy, Stuart B.

    2009-12-24

    Genome sequences are annotated by computational prediction of coding sequences, followed by similarity searches such as BLAST, which provide a layer of (possible) functional information. While the existence of processes such as alternative splicing complicates matters for eukaryote genomes, the view of bacterial genomes as a linear series of closely spaced genes leads to the assumption that computational annotations which predict such arrangements completely describe the coding capacity of bacterial genomes. We undertook a proteomic study to identify proteins expressed by Pseudomonas fluorescens Pf0-1 from genes which were not predicted during the genome annotation. Mapping peptides to the Pf0-1 genome sequence identified sixteen non-annotated protein-coding regions, of which nine were antisense to predicted genes, six were intergenic, and one read in the same direction as an annotated gene but in a different frame. The expression of all but one of the newly discovered genes was verified by RT-PCR. Few clues as to the function of the new genes were gleaned from informatic analyses, but potential orthologues in other Pseudomonas genomes were identified for eight of the new genes. The 16 newly identified genes improve the quality of the Pf0-1 genome annotation, and the detection of antisense protein-coding genes indicates the under-appreciated complexity of bacterial genome organization.

  18. Intensity modulation and direct detection Alamouti polarization-time coding for optical fiber transmission systems with polarization mode dispersion

    NASA Astrophysics Data System (ADS)

    Reza, Ahmed Galib; Rhee, June-Koo Kevin

    2016-07-01

    Alamouti space-time coding is modified in the form of polarization-time coding to combat against polarization mode dispersion (PMD) impairments in exploiting a polarization diversity multiplex (PDM) gain with simple intensity modulation and direct detection (IM/DD) in optical transmission systems. A theoretical model for the proposed IM/DD Alamouti polarization-time coding (APTC-IM/DD) using nonreturn-to-zero on-off keying signal can surprisingly eliminate the requirement of channel estimation for decoding in the low PMD regime, when a two-transmitter and two-receiver channel is adopted. Even in the high PMD regime, the proposed APTC-IM/DD still reveals coding gain demonstrating the robustness of APTC-IM/DD. In addition, this scheme can eliminate the requirements for a polarization state controller, a coherent receiver, and a high-speed analog-to-digital converter at a receiver. Simulation results reveal that the proposed APTC scheme is able to reduce the optical signal-to-noise ratio requirement by ˜3 dB and significantly enhance the PMD tolerance of a PDM-based IM/DD system.

  19. Ability of primary auditory cortical neurons to detect amplitude modulation with rate and temporal codes: neurometric analysis

    PubMed Central

    Johnson, Jeffrey S.; Yin, Pingbo; O'Connor, Kevin N.

    2012-01-01

    Amplitude modulation (AM) is a common feature of natural sounds, and its detection is biologically important. Even though most sounds are not fully modulated, the majority of physiological studies have focused on fully modulated (100% modulation depth) sounds. We presented AM noise at a range of modulation depths to awake macaque monkeys while recording from neurons in primary auditory cortex (A1). The ability of neurons to detect partial AM with rate and temporal codes was assessed with signal detection methods. On average, single-cell synchrony was as or more sensitive than spike count in modulation detection. Cells are less sensitive to modulation depth if tested away from their best modulation frequency, particularly for temporal measures. Mean neural modulation detection thresholds in A1 are not as sensitive as behavioral thresholds, but with phase locking the most sensitive neurons are more sensitive, suggesting that for temporal measures the lower-envelope principle cannot account for thresholds. Three methods of preanalysis pooling of spike trains (multiunit, similar to convergence from a cortical column; within cell, similar to convergence of cells with matched response properties; across cell, similar to indiscriminate convergence of cells) all result in an increase in neural sensitivity to modulation depth for both temporal and rate codes. For the across-cell method, pooling of a few dozen cells can result in detection thresholds that approximate those of the behaving animal. With synchrony measures, indiscriminate pooling results in sensitive detection of modulation frequencies between 20 and 60 Hz, suggesting that differences in AM response phase are minor in A1. PMID:22422997

  20. Biobar-coded gold nanoparticles and DNAzyme-based dual signal amplification strategy for ultrasensitive detection of protein by electrochemiluminescence.

    PubMed

    Xia, Hui; Li, Lingling; Yin, Zhouyang; Hou, Xiandeng; Zhu, Jun-Jie

    2015-01-14

    A dual signal amplification strategy for electrochemiluminescence (ECL) aptasensor was designed based on biobar-coded gold nanoparticles (Au NPs) and DNAzyme. CdSeTe@ZnS quantum dots (QDs) were chosen as the ECL signal probes. To verify the proposed ultrasensitive ECL aptasensor for biomolecules, we detected thrombin (Tb) as a proof-of-principle analyte. The hairpin DNA designed for the recognition of protein consists of two parts: the sequences of catalytical 8-17 DNAzyme and thrombin aptamer. Only in the presence of thrombin could the hairpin DNA be opened, followed by a recycling cleavage of excess substrates by catalytic core of the DNAzyme to induce the first-step amplification. One part of the fragments was captured to open the capture DNA modified on the Au electrode, which further connected with the prepared biobar-coded Au NPs-CdSeTe@ZnS QDs to get the final dual-amplified ECL signal. The limit of detection for Tb was 0.28 fM with excellent selectivity, and this proposed method possessed good performance in real sample analysis. This design introduces the new concept of dual-signal amplification by a biobar-coded system and DNAzyme recycling into ECL determination, and it is promising to be extended to provide a highly sensitive platform for various target biomolecules.

  1. Improving transfusion safety: implementation of a comprehensive computerized bar code-based tracking system for detecting and preventing errors.

    PubMed

    Askeland, R W; McGrane, S; Levitt, J S; Dane, S K; Greene, D L; Vandeberg, J A; Walker, K; Porcella, A; Herwaldt, L A; Carmen, L T; Kemp, J D

    2008-07-01

    To transfuse blood products safely, health care workers must accurately identify patients, blood samples, and the blood components. A comprehensive bar code-based computerized tracking system was developed and implemented to identify and prevent transfusion errors. A data network, wireless devices, and bar-coded labels were pilot tested before the system was introduced hospitalwide. The system provided a complete audit trail for all transactions. Data from before and after implementation were analyzed. Incident reports decreased from a mean of 41.5 reports per month in the 6 months before the system was implemented to a mean of 7.2 reports per month after implementation. The blood sample rejection rate decreased from 1.82 percent to a mean of 0.17 percent after implementation. Errors detected by the new system were sorted into misscans, skipped steps, wrong steps, and prevented identification errors (PIEs). Misscans and skipped steps were the most common errors in the first 10 months after implementation. During the final transfusion step, PIEs occurred at the rate of about one per month and scans were omitted approximately 1 percent of the time. Therefore, it is estimated that mistransfusions could occur about once every 100 months on average with the new system. The bar code-based computerized tracking system detected and prevented identification and matching errors, thereby reducing the proportion of blood samples rejected and increasing patient safety.

  2. Detection of Long Non-coding RNA Expression by Non-radioactive Northern Blots

    PubMed Central

    Hu, Xiaowen; Feng, Yi; Hu, Zhongyi; Zhang, Youyou; Yuan, Chao-Xing; Xu, Xiaowei; Zhang, Lin

    2016-01-01

    With the advances in sequencing technology and transcriptome analysis, it is estimated that up to 75% of the human genome is transcribed into RNAs. This finding prompted intensive investigations on the biological functions of non-coding RNAs and led to very exciting discoveries of microRNAs as important players in disease pathogenesis and therapeutic applications. Research on long non-coding RNAs (lncRNAs) is in its infancy, yet a broad spectrum of biological regulations has been attributed to lncRNAs. As a novel class of RNA transcripts, the expression level and splicing variants of lncRNAs are various. Northern blot analysis can help us learn about the identity, size, and abundance of lncRNAs. Here we describe how to use northern blot to determine lncRNA abundance and identify different splicing variants of a given lncRNA. PMID:26721491

  3. Molecular Detection of Methicillin-Resistant Staphylococcus aureus by Non-Protein Coding RNA-Mediated Monoplex Polymerase Chain Reaction

    PubMed Central

    Soo Yean, Cheryl Yeap; Selva Raju, Kishanraj; Xavier, Rathinam; Subramaniam, Sreeramanan; Gopinath, Subash C. B.; Chinni, Suresh V.

    2016-01-01

    Non-protein coding RNA (npcRNA) is a functional RNA molecule that is not translated into a protein. Bacterial npcRNAs are structurally diversified molecules, typically 50–200 nucleotides in length. They play a crucial physiological role in cellular networking, including stress responses, replication and bacterial virulence. In this study, by using an identified npcRNA gene (Sau-02) in Methicillin-resistant Staphylococcus aureus (MRSA), we identified the Gram-positive bacteria S. aureus. A Sau-02-mediated monoplex Polymerase Chain Reaction (PCR) assay was designed that displayed high sensitivity and specificity. Fourteen different bacteria and 18 S. aureus strains were tested, and the results showed that the Sau-02 gene is specific to S. aureus. The detection limit was tested against genomic DNA from MRSA and was found to be ~10 genome copies. Further, the detection was extended to whole-cell MRSA detection, and we reached the detection limit with two bacteria. The monoplex PCR assay demonstrated in this study is a novel detection method that can replicate other npcRNA-mediated detection assays. PMID:27367909

  4. Non-protein coding RNA-based genosensor with quantum dots as electrochemical labels for attomolar detection of multiple pathogens.

    PubMed

    Vijian, Dinesh; Chinni, Suresh V; Yin, Lee Su; Lertanantawong, Benchaporn; Surareungchai, Werasak

    2016-03-15

    The ability of a diagnostic test to detect multiple pathogens simultaneously is useful to obtain meaningful information for clinical treatment and preventive measures. We report a highly sensitive and specific electrochemical biosensor assay for simultaneous detection of three gene targets using quantum dots (QDs). The targets are novel non-protein coding RNA (npcRNA) sequences of Vibrio cholerae, Salmonella sp. and Shigella sp., which cause diarrheal diseases. QDs (PbS, CdS, ZnS) were synthesized and functionalized with DNA probes that were specific to each pathogen. Electrochemical detection of QDs was performed using square wave anodic stripping voltammetry (SWASV). The QDs gave distinct peaks at 0.5 V (PbS), 0.75 V (CdS) and 1.1 V (ZnS). There was no interference in signal response when all three QDs were mixed and detected simultaneously. The detection limits of single and multiplex assays with linear targets and PCR products were in the attomolar ranges. The high assay sensitivity, in combination with specific npcRNA sequences as novel diagnostic targets, makes it a viable tool for detecting pathogens from food, environment and clinical samples. Copyright © 2015 Elsevier B.V. All rights reserved.

  5. Detection of reduced interhemispheric cortical communication during task execution in multiple sclerosis patients using functional near-infrared spectroscopy

    NASA Astrophysics Data System (ADS)

    Jimenez, Jon J.; Yang, Runze; Nathoo, Nabeela; Varshney, Vishal P.; Golestani, Ali-Mohammad; Goodyear, Bradley G.; Metz, Luanne M.; Dunn, Jeff F.

    2014-07-01

    Multiple sclerosis (MS) impairs brain activity through demyelination and loss of axons. Increased brain activity is accompanied by increases in microvascular hemoglobin oxygen saturation (oxygenation) and total hemoglobin, which can be measured using functional near-infrared spectroscopy (fNIRS). Due to the potentially reduced size and integrity of the white matter tracts within the corpus callosum, it may be expected that MS patients have reduced functional communication between the left and right sides of the brain; this could potentially be an indicator of disease progression. To assess interhemispheric communication in MS, we used fNIRS during a unilateral motor task and the resting state. The magnitude of the change in hemoglobin parameters in the motor cortex was significantly reduced in MS patients during the motor task relative to healthy control subjects. There was also a significant decrease in interhemispheric communication between the motor cortices (expressed as coherence) in MS patients compared to controls during the motor task, but not during the resting state. fNIRS assessment of interhemispheric coherence during task execution may be a useful marker in disorders with white matter damage or axonal loss, including MS.

  6. Executive Functions

    PubMed Central

    Diamond, Adele

    2014-01-01

    Executive functions (EFs) make possible mentally playing with ideas; taking the time to think before acting; meeting novel, unanticipated challenges; resisting temptations; and staying focused. Core EFs are inhibition [response inhibition (self-control—resisting temptations and resisting acting impulsively) and interference control (selective attention and cognitive inhibition)], working memory, and cognitive flexibility (including creatively thinking “outside the box,” seeing anything from different perspectives, and quickly and flexibly adapting to changed circumstances). The developmental progression and representative measures of each are discussed. Controversies are addressed (e.g., the relation between EFs and fluid intelligence, self-regulation, executive attention, and effortful control, and the relation between working memory and inhibition and attention). The importance of social, emotional, and physical health for cognitive health is discussed because stress, lack of sleep, loneliness, or lack of exercise each impair EFs. That EFs are trainable and can be improved with practice is addressed, including diverse methods tried thus far. PMID:23020641

  7. Noncoder: a web interface for exon array-based detection of long non-coding RNAs

    PubMed Central

    Gellert, Pascal; Ponomareva, Yuliya; Braun, Thomas; Uchida, Shizuka

    2013-01-01

    Due to recent technical developments, a high number of long non-coding RNAs (lncRNAs) have been discovered in mammals. Although it has been shown that lncRNAs are regulated differently among tissues and disease statuses, functions of these transcripts are still unknown in most cases. GeneChip Exon 1.0 ST Arrays (exon arrays) from Affymetrix, Inc. have been used widely to profile genome-wide expression changes and alternative splicing of protein-coding genes. Here, we demonstrate that re-annotation of exon array probes can be used to profile expressions of tens of thousands of lncRNAs. With this annotation, a detailed inspection of lncRNAs and their isoforms is possible. To allow for a general usage to the research community, we developed a user-friendly web interface called ‘noncoder’. By uploading CEL files from exon arrays and with a few mouse clicks and parameter settings, exon array data will be normalized and analysed to identify differentially expressed lncRNAs. Noncoder provides the detailed annotation information of lncRNAs and is equipped with unique features to allow for an efficient search for interesting lncRNAs to be studied further. The web interface is available at http://noncoder.mpi-bn.mpg.de. PMID:23012263

  8. Exploring the expression bar code of SAA variants for gastric cancer detection.

    PubMed

    Wu, Deng-Chyang; Wang, Kai-Yi; Wang, Sophie S W; Huang, Ching-Min; Lee, Yi-Wei; Chen, Michael Isaac; Chuang, Szu-An; Chen, Shu-Hua; Lu, Ying-Wei; Lin, Chun-Cheng; Lee, Ka-Wo; Hsu, Wen-Hung; Wu, Kun-Pin; Chen, Yu-Ju

    2017-06-01

    We reported an integrated platform to explore serum protein variant pattern in cancer and its utility as a new class of biomarker panel for diagnosis. On the model study of serum amyloid A (SAA), we employed nanoprobe-based affinity mass spectrometry for enrichment, identification and quantitation of SAA variants from serum of 105 gastric cancer patients in comparison with 54 gastritis patients, 54 controls, and 120 patients from other cancer. The result revealed surprisingly heterogeneous and most comprehensive SAA bar code to date, which comprises 24 SAA variants including SAA1- and SAA2-encoded products, polymorphic isoforms, N-terminal-truncated forms, and three novel SAA oxidized isotypes, in which the variant-specific peptide sequence were also confirmed by LC-MS/MS. A diagnostic model was developed for dimension reduction and computational classification of the 24 SAA-variant bar code, providing good discrimination (AUC = 0.85 ± 3.2E-3) for differentiating gastric cancer group from gastritis and normal groups (sensitivity, 0.76; specificity, 0.81) and was validated with external validation cohort (sensitivity, 0.71; specificity, 0.74). Our platform not only shed light on the occurrence and modification extent of under-represented serum protein variants in cancer, but also suggested a new concept of diagnostic platform by serum protein variant profile. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  9. Reprint of "Two-stage sparse coding of region covariance via Log-Euclidean kernels to detect saliency".

    PubMed

    Zhang, Ying-Ying; Yang, Cai; Zhang, Ping

    2017-08-01

    In this paper, we present a novel bottom-up saliency detection algorithm from the perspective of covariance matrices on a Riemannian manifold. Each superpixel is described by a region covariance matrix on Riemannian Manifolds. We carry out a two-stage sparse coding scheme via Log-Euclidean kernels to extract salient objects efficiently. In the first stage, given background dictionary on image borders, sparse coding of each region covariance via Log-Euclidean kernels is performed. The reconstruction error on the background dictionary is regarded as the initial saliency of each superpixel. In the second stage, an improvement of the initial result is achieved by calculating reconstruction errors of the superpixels on foreground dictionary, which is extracted from the first stage saliency map. The sparse coding in the second stage is similar to the first stage, but is able to effectively highlight the salient objects uniformly from the background. Finally, three post-processing methods-highlight-inhibition function, context-based saliency weighting, and the graph cut-are adopted to further refine the saliency map. Experiments on four public benchmark datasets show that the proposed algorithm outperforms the state-of-the-art methods in terms of precision, recall and mean absolute error, and demonstrate the robustness and efficiency of the proposed method. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. Detection of non-coding RNA in bacteria and archaea using the DETR'PROK Galaxy pipeline.

    PubMed

    Toffano-Nioche, Claire; Luo, Yufei; Kuchly, Claire; Wallon, Claire; Steinbach, Delphine; Zytnicki, Matthias; Jacq, Annick; Gautheret, Daniel

    2013-09-01

    RNA-seq experiments are now routinely used for the large scale sequencing of transcripts. In bacteria or archaea, such deep sequencing experiments typically produce 10-50 million fragments that cover most of the genome, including intergenic regions. In this context, the precise delineation of the non-coding elements is challenging. Non-coding elements include untranslated regions (UTRs) of mRNAs, independent small RNA genes (sRNAs) and transcripts produced from the antisense strand of genes (asRNA). Here we present a computational pipeline (DETR'PROK: detection of ncRNAs in prokaryotes) based on the Galaxy framework that takes as input a mapping of deep sequencing reads and performs successive steps of clustering, comparison with existing annotation and identification of transcribed non-coding fragments classified into putative 5' UTRs, sRNAs and asRNAs. We provide a step-by-step description of the protocol using real-life example data sets from Vibrio splendidus and Escherichia coli. Copyright © 2013 The Authors. Published by Elsevier Inc. All rights reserved.

  11. Short non-coding RNAs as bacteria species identifiers detected by surface plasmon resonance enhanced common path interferometry

    NASA Astrophysics Data System (ADS)

    Greef, Charles; Petropavlovskikh, Viatcheslav; Nilsen, Oyvind; Khattatov, Boris; Plam, Mikhail; Gardner, Patrick; Hall, John

    2008-04-01

    Small non-coding RNA sequences have recently been discovered as unique identifiers of certain bacterial species, raising the possibility that they can be used as highly specific Biowarfare Agent detection markers in automated field deployable integrated detection systems. Because they are present in high abundance they could allow genomic based bacterial species identification without the need for pre-assay amplification. Further, a direct detection method would obviate the need for chemical labeling, enabling a rapid, efficient, high sensitivity mechanism for bacterial detection. Surface Plasmon Resonance enhanced Common Path Interferometry (SPR-CPI) is a potentially market disruptive, high sensitivity dual technology that allows real-time direct multiplex measurement of biomolecule interactions, including small molecules, nucleic acids, proteins, and microbes. SPR-CPI measures differences in phase shift of reflected S and P polarized light under Total Internal Reflection (TIR) conditions at a surface, caused by changes in refractive index induced by biomolecular interactions within the evanescent field at the TIR interface. The measurement is performed on a microarray of discrete 2-dimensional areas functionalized with biomolecule capture reagents, allowing simultaneous measurement of up to 100 separate analytes. The optical beam encompasses the entire microarray, allowing a solid state detector system with no scanning requirement. Output consists of simultaneous voltage measurements proportional to the phase differences resulting from the refractive index changes from each microarray feature, and is automatically processed and displayed graphically or delivered to a decision making algorithm, enabling a fully automatic detection system capable of rapid detection and quantification of small nucleic acids at extremely sensitive levels. Proof-of-concept experiments on model systems and cell culture samples have demonstrated utility of the system, and efforts are in

  12. RGB colour coding of Y-shaped DNA for simultaneous tri-analyte solid phase hybridization detection.

    PubMed

    Krissanaprasit, Abhichart; Somasundrum, Mithran; Surareungchai, Werasak

    2011-01-15

    We present a new concept for tri-analyte DNA detection based on the idea of a Y-shaped capture probe which, after tri-target and fluorescently labeled reporter probe binding, becomes colour-coded to generate images in an RGB colour scheme. Hence, the RGB value of the resulting secondary pseudo-colour presented by the hybridized Y-DNA can be related to the ratio of the primary pseudo-colours present in its make-up, and thus to the ratio of the three target concentrations. As a proof of concept we detect sequences from the genes of the pathogenic bacterial strains Escherichia coli O157:H7, Vibrio cholera and Salmonella enteric in a semi-quantitative manner across the range 20-167 nM. The assay was relatively quick, with a time from hybridization to completed data interpretation of approximately 4 h. Copyright © 2010 Elsevier B.V. All rights reserved.

  13. Understanding Mobile Code and Secure Execution Environments

    DTIC Science & Technology

    2006-02-21

    continuations; since our dialect do not support multithreaded agents, this is actually useful!) Rahul Lahoti designed and implemented a compiler that...Group membership and wide-area master-worker compu- tations. In ICDCS 2003, pages 570-581, Providence, RI, 2003. "* Rahul S. Lahoti. Continuations in...Institute of Technology, September 1980. [12] Rahul S. Lahoti. Continuations in Java. Master’s thesis, University of California, San Diego, July 2003

  14. Development of a Magnetic Electrochemical Bar Code Array for Point Mutation Detection in the H5N1 Neuraminidase Gene

    PubMed Central

    Krejcova, Ludmila; Hynek, David; Kopel, Pavel; Merlos Rodrigo, Miguel Angel; Adam, Vojtech; Hubalek, Jaromir; Babula, Petr; Trnkova, Libuse; Kizek, Rene

    2013-01-01

    Since its first official detection in the Guangdong province of China in 1996, the highly pathogenic avian influenza virus of H5N1 subtype (HPAI H5N1) has reportedly been the cause of outbreaks in birds in more than 60 countries, 24 of which were European. The main issue is still to develop effective antiviral drugs. In this case, single point mutation in the neuraminidase gene, which causes resistance to antiviral drug and is, therefore, subjected to many studies including ours, was observed. In this study, we developed magnetic electrochemical bar code array for detection of single point mutations (mismatches in up to four nucleotides) in H5N1 neuraminidase gene. Paramagnetic particles Dynabeads® with covalently bound oligo (dT)25 were used as a tool for isolation of complementary H5N1 chains (H5N1 Zhejin, China and Aichi). For detection of H5N1 chains, oligonucleotide chains of lengths of 12 (+5 adenine) or 28 (+5 adenine) bp labeled with quantum dots (CdS, ZnS and/or PbS) were used. Individual probes hybridized to target molecules specifically with efficiency higher than 60%. The obtained signals identified mutations present in the sequence. Suggested experimental procedure allows obtaining further information from the redox signals of nucleic acids. Moreover, the used biosensor exhibits sequence specificity and low limits of detection of subnanogram quantities of target nucleic acids. PMID:23860384

  15. Enhancement of reporter gene detection sensitivity by insertion of specific mini-peptide-coding sequences.

    PubMed

    Cutrera, J; Dibra, D; Xia, X; Li, S

    2010-02-01

    Two important aspects of gene therapy are to increase the level of gene expression and track the gene delivery site and expression, and a sensitive reporter gene may be one of the options for preclinical studies and possibly for human clinical trials. We report the novel concept of increasing the activity of the gene products. With the insertion of the mini-peptide-coding sequence CWDDWLC into the plasmid DNA of a SEAP reporter gene, we observed vast increases in the enzyme activity in vitro in all murine and human cell lines used. In addition, in vivo injection of this CWDDWLC-SEAP-encoding gene resulted in the same increases in reporter gene activity, but these increases did not correspond to alterations in the level of the gene products in the serum. Minor sequence changes in this mini-peptide negate the activity increase of the reporter gene. We report the novel concept of increasing the activity of gene products as another method to improve the reporting sensitivity of reporter genes. This improved reporter gene could complement any improved vector for maximizing the reporter sensitivity. Moreover, this strategy has the potential to be used to discover peptides that improve the activity of therapeutic genes.

  16. Complementary code and digital filtering for detection of weak VHF radar signals from the mesoscale

    NASA Astrophysics Data System (ADS)

    Schmidt, G.; Ruster, R.; Czechowsky, P.

    1983-12-01

    The SOUSY-VHF-Radar operates at a frequency of 53.5 MHz in a valley in the Harz mountains, Germany, 90 km from Hanover. The radar controller, which is programmed by a 16-bit computer holds 1024 program steps in core and controls, via 8 channels, the whole radar system: in particular the master oscillator, the transmitter, the transmit-receive-switch, the receiver, the analog to digital converter, and the hardware adder. The high-sensitivity receiver has a dynamic range of 70 dB and a video bandwidth of 1 MHz. Phase coding schemes are applied, in particular for investigations at mesospheric heights, in order to carry out measurements with the maximum duty cycle and the maximum height resolution. The computer takes the data from the adder to store it in magnetic tape or disc. The radar controller is programmed by the computer using simple FORTRAN IV statements. After the program has been loaded and the computer has started the radar controller, it runs automatically, stopping at the program end. In case of errors or failures occurring during the radar operation, the radar controller is shut off caused either by a safety circuit or by a power failure circuit or by a parity check system.

  17. Selective error detection for error-resilient wavelet-based image coding.

    PubMed

    Karam, Lina J; Lam, Tuyet-Trang

    2007-12-01

    This paper introduces the concept of a similarity check function for error-resilient multimedia data transmission. The proposed similarity check function provides information about the effects of corrupted data on the quality of the reconstructed image. The degree of data corruption is measured by the similarity check function at the receiver, without explicit knowledge of the original source data. The design of a perceptual similarity check function is presented for wavelet-based coders such as the JPEG2000 standard, and used with a proposed "progressive similarity-based ARQ" (ProS-ARQ) scheme to significantly decrease the retransmission rate of corrupted data while maintaining very good visual quality of images transmitted over noisy channels. Simulation results with JPEG2000-coded images transmitted over the Binary Symmetric Channel, show that the proposed ProS-ARQ scheme significantly reduces the number of retransmissions as compared to conventional ARQ-based schemes. The presented results also show that, for the same number of retransmitted data packets, the proposed ProS-ARQ scheme can achieve significantly higher PSNR and better visual quality as compared to the selective-repeat ARQ scheme.

  18. Enhancement of Reporter Gene Detection Sensitivity by Insertion of Specific Mini-Peptide-Coding Sequences

    PubMed Central

    Cutrera, Jeffry; Dibra, Denada; Xia, Xueqing; Li, Shulin

    2009-01-01

    Two important aspects for gene therapy are to increase the level of gene expression and track the gene delivery site and expression, and a sensitive reporter gene may be one of the options for preclinical studies and possibly for human clinical trials. We report the novel concept of increasing the activity of the gene products. With the insertion of the mini-peptide-coding sequence CWDDWLC into the plasmid DNA of a SEAP reporter gene, we observed vast increases in the enzyme activity in vitro in all murine and human cell lines used. Also, in vivo injection of this CWDDWLC-SEAP encoding gene resulted in the same increases in reporter gene activity, but these increases did not correspond to alterations in the level of the gene products in the serum. Minor sequence changes in this mini-peptide negate the activity increase of the reporter gene. We report the novel concept of increasing the activity of gene products as another method to improve the reporting sensitivity of reporter genes. This improved reporter gene could complement any improved vector for maximizing the reporter sensitivity. Also, this strategy has the potential to be used to discover peptides that improve the activity of therapeutic genes. PMID:19713998

  19. Executive summary

    NASA Technical Reports Server (NTRS)

    Ayon, Juan A.

    1992-01-01

    The Astrotech 21 Optical Systems Technology Workshop was held in Pasadena, California on March 6-8, 1991. The purpose of the workshop was to examine the state of Optical Systems Technology at the National Aeronautics Space Administration (NASA), and in industry and academia, in view of the potential Astrophysics mission set currently being considered for the late 1990's through the first quarter of the 21st century. The principal result of the workshop is this publication, which contains an assessment of the current state of the technology, and specific technology advances in six critical areas of optics, all necessary for the mission set. The workshop was divided into six panels, each of about a dozen experts in specific fields, representing NASA, industry, and academia. In addition, each panel contained expertise that spanned the spectrum from x-ray to submillimeter wavelengths. This executive summary contains the principal recommendations of each panel. The six technology panels and their chairs were: (1) Wavefront Sensing, Control, and Pointing, Thomas Pitts, Itek Optical Systems, A Division of Litton; (2) Fabrication, Roger Angel, Steward Observatory, University of Arizona; (3) Materials and Structures, Theodore Saito, Lawrence Livermore National Laboratory; (4) Optical Testing, James Wyant, WYKO Corporation; (5) Optical Systems Integrated Modeling, Robert R. Shannon, Optical Sciences Center, University of Arizona; and (6) Advanced Optical Instruments Technology, Michael Shao, Jet Propulsion Laboratory, California Institute of Technology. This Executive Summary contains the principal recommendations of each panel.

  20. The Brief Memory and Executive Test (BMET): A cognitive screening tool to detect and differentiate vascular cognitive impairment and Alzheimer's disease.

    PubMed

    Hollocks, Matthew J; Brookes, Rebecca L; Morris, Robin G; Markus, Hugh S

    2017-09-07

    While there are several cognitive screening tests available for the detection of cortical dementias such as Alzheimer's disease (AD), these are rarely designed to be sensitive to vascular cognitive impairment (VCI). The Brief Memory and Executive Test (BMET) is a screening measure designed to be sensitive to the cognitive profile of both VCI and AD. This study investigated the ability of the BMET to detect AD, and to differentiate between VCI and AD. This study included 150 patients, with either SVD, both with (n = 48) and without VCI (n = 51), or AD (N = 51) and 51 healthy controls. Participants were aged between 40 and 90 years of age and completed both the BMET and the MMSE. Receiver operator characteristic (ROC) curve analysis showed as before the BMET is a good predictor SVD. Additionally, the BMET was a good predictor of AD (AUC = 0.96) and performed at least as well as the MMSE (AUC = 0.92) when differentiating AD patients from healthy controls. The BMET had a sensitivity of 86% and specificity of 100% for detecting AD patients from control subjects. Using the difference in cognitive profile between the AD and VCI group, we developed an index score which correctly classified 76% of patients as either having VCI or AD. The BMET is a brief and sensitive tool for the detection of cognitive impairment due to both SVD and AD and can be used to aid in the differentiation of the 2 diseases. Copyright © 2017 John Wiley & Sons, Ltd.

  1. A study of redundancy management strategy for tetrad strap-down inertial systems. [error detection codes

    NASA Technical Reports Server (NTRS)

    Hruby, R. J.; Bjorkman, W. S.; Schmidt, S. F.; Carestia, R. A.

    1979-01-01

    Algorithms were developed that attempt to identify which sensor in a tetrad configuration has experienced a step failure. An algorithm is also described that provides a measure of the confidence with which the correct identification was made. Experimental results are presented from real-time tests conducted on a three-axis motion facility utilizing an ortho-skew tetrad strapdown inertial sensor package. The effects of prediction errors and of quantization on correct failure identification are discussed as well as an algorithm for detecting second failures through prediction.

  2. A positive detecting code and its decoding algorithm for DNA library screening.

    PubMed

    Uehara, Hiroaki; Jimbo, Masakazu

    2009-01-01

    The study of gene functions requires high-quality DNA libraries. However, a large number of tests and screenings are necessary for compiling such libraries. We describe an algorithm for extracting as much information as possible from pooling experiments for library screening. Collections of clones are called pools, and a pooling experiment is a group test for detecting all positive clones. The probability of positiveness for each clone is estimated according to the outcomes of the pooling experiments. Clones with high chance of positiveness are subjected to confirmatory testing. In this paper, we introduce a new positive clone detecting algorithm, called the Bayesian network pool result decoder (BNPD). The performance of BNPD is compared, by simulation, with that of the Markov chain pool result decoder (MCPD) proposed by Knill et al. in 1996. Moreover, the combinatorial properties of pooling designs suitable for the proposed algorithm are discussed in conjunction with combinatorial designs and d-disjunct matrices. We also show the advantage of utilizing packing designs or BIB designs for the BNPD algorithm.

  3. Fully automated macular pathology detection in retina optical coherence tomography images using sparse coding and dictionary learning.

    PubMed

    Sun, Yankui; Li, Shan; Sun, Zhongyang

    2017-01-01

    We propose a framework for automated detection of dry age-related macular degeneration (AMD) and diabetic macular edema (DME) from retina optical coherence tomography (OCT) images, based on sparse coding and dictionary learning. The study aims to improve the classification performance of state-of-the-art methods. First, our method presents a general approach to automatically align and crop retina regions; then it obtains global representations of images by using sparse coding and a spatial pyramid; finally, a multiclass linear support vector machine classifier is employed for classification. We apply two datasets for validating our algorithm: Duke spectral domain OCT (SD-OCT) dataset, consisting of volumetric scans acquired from 45 subjects—15 normal subjects, 15 AMD patients, and 15 DME patients; and clinical SD-OCT dataset, consisting of 678 OCT retina scans acquired from clinics in Beijing—168, 297, and 213 OCT images for AMD, DME, and normal retinas, respectively. For the former dataset, our classifier correctly identifies 100%, 100%, and 93.33% of the volumes with DME, AMD, and normal subjects, respectively, and thus performs much better than the conventional method; for the latter dataset, our classifier leads to a correct classification rate of 99.67%, 99.67%, and 100.00% for DME, AMD, and normal images, respectively.

  4. Fully automated macular pathology detection in retina optical coherence tomography images using sparse coding and dictionary learning

    NASA Astrophysics Data System (ADS)

    Sun, Yankui; Li, Shan; Sun, Zhongyang

    2017-01-01

    We propose a framework for automated detection of dry age-related macular degeneration (AMD) and diabetic macular edema (DME) from retina optical coherence tomography (OCT) images, based on sparse coding and dictionary learning. The study aims to improve the classification performance of state-of-the-art methods. First, our method presents a general approach to automatically align and crop retina regions; then it obtains global representations of images by using sparse coding and a spatial pyramid; finally, a multiclass linear support vector machine classifier is employed for classification. We apply two datasets for validating our algorithm: Duke spectral domain OCT (SD-OCT) dataset, consisting of volumetric scans acquired from 45 subjects-15 normal subjects, 15 AMD patients, and 15 DME patients; and clinical SD-OCT dataset, consisting of 678 OCT retina scans acquired from clinics in Beijing-168, 297, and 213 OCT images for AMD, DME, and normal retinas, respectively. For the former dataset, our classifier correctly identifies 100%, 100%, and 93.33% of the volumes with DME, AMD, and normal subjects, respectively, and thus performs much better than the conventional method; for the latter dataset, our classifier leads to a correct classification rate of 99.67%, 99.67%, and 100.00% for DME, AMD, and normal images, respectively.

  5. Accuracy and Power of Statistical Methods for Detecting Adaptive Evolution in Protein Coding Sequences and for Identifying Positively Selected Sites

    PubMed Central

    Wong, Wendy S. W.; Yang, Ziheng; Goldman, Nick; Nielsen, Rasmus

    2004-01-01

    The parsimony method of Suzuki and Gojobori (1999) and the maximum likelihood method developed from the work of Nielsen and Yang (1998) are two widely used methods for detecting positive selection in homologous protein coding sequences. Both methods consider an excess of nonsynonymous (replacement) substitutions as evidence for positive selection. Previously published simulation studies comparing the performance of the two methods show contradictory results. Here we conduct a more thorough simulation study to cover and extend the parameter space used in previous studies. We also reanalyzed an HLA data set that was previously proposed to cause problems when analyzed using the maximum likelihood method. Our new simulations and a reanalysis of the HLA data demonstrate that the maximum likelihood method has good power and accuracy in detecting positive selection over a wide range of parameter values. Previous studies reporting poor performance of the method appear to be due to numerical problems in the optimization algorithms and did not reflect the true performance of the method. The parsimony method has a very low rate of false positives but very little power for detecting positive selection or identifying positively selected sites. PMID:15514074

  6. Replica Analysis of Multiuser Detection for Code Division Multiple Access with M-Ary Phase-Shift Keying

    NASA Astrophysics Data System (ADS)

    Kato, Hiroyuki; Okada, Masato; Miyoshi, Seiji

    2013-07-01

    We analyze the performance of the maximizer of the posterior marginals (MPM) detector for code division multiple access (CDMA) multiuser detection with M-ary phase shift keying (M-ary PSK) in the large system limit by the replica method. The obtained theory agrees with computer simulation reasonably well. We also derive the theory in the case of the large M limit and discuss the dependence of the properties of M-ary PSK CDMA communication on M. We show that the waterfall phenomenon occurs for both the finite and infinite values of M. We also show that a value of M for which the decoded phase information on the original user symbol becomes minimum exists. Furthermore, we discuss the relationship between the theory based on the replica method and that based on self-consistent signal-to-noise analysis (SCSNA).

  7. Disease outbreak detection through clique covering on a weighted ICPC-coded graph.

    PubMed

    van Vuurden, Klaske; Hartvigsen, Gunnar; Bellika, Johan Gustav

    2008-01-01

    Even after a decade of increased research into the problem of detecting disease outbreaks, we lack a system that can limit the number of patients affected by a potential epidemic by recognising its existence at an early stage. In this paper we suggest the use of a weighted graph representing symptoms with an exceptionally high prevalence. Cliques with high weighted edges in such a graph will represent groups of symptoms that occur together more often than usual. As a result each clique will represent the main symptoms of a disease with a high incidence rate. This will make it easier to diagnose the nature of an outbreak, to reach the affected patients at an early stage and to distinguish between outbreaks occurring simultaneously.

  8. Symbolic Execution Enhanced System Testing

    NASA Technical Reports Server (NTRS)

    Davies, Misty D.; Pasareanu, Corina S.; Raman, Vishwanath

    2012-01-01

    We describe a testing technique that uses information computed by symbolic execution of a program unit to guide the generation of inputs to the system containing the unit, in such a way that the unit's, and hence the system's, coverage is increased. The symbolic execution computes unit constraints at run-time, along program paths obtained by system simulations. We use machine learning techniques treatment learning and function fitting to approximate the system input constraints that will lead to the satisfaction of the unit constraints. Execution of system input predictions either uncovers new code regions in the unit under analysis or provides information that can be used to improve the approximation. We have implemented the technique and we have demonstrated its effectiveness on several examples, including one from the aerospace domain.

  9. Task-Specific Codes for Face Recognition: How they Shape the Neural Representation of Features for Detection and Individuation

    PubMed Central

    2008-01-01

    Background The variety of ways in which faces are categorized makes face recognition challenging for both synthetic and biological vision systems. Here we focus on two face processing tasks, detection and individuation, and explore whether differences in task demands lead to differences both in the features most effective for automatic recognition and in the featural codes recruited by neural processing. Methodology/Principal Findings Our study appeals to a computational framework characterizing the features representing object categories as sets of overlapping image fragments. Within this framework, we assess the extent to which task-relevant information differs across image fragments. Based on objective differences we find among task-specific representations, we test the sensitivity of the human visual system to these different face descriptions independently of one another. Both behavior and functional magnetic resonance imaging reveal effects elicited by objective task-specific levels of information. Behaviorally, recognition performance with image fragments improves with increasing task-specific information carried by different face fragments. Neurally, this sensitivity to the two tasks manifests as differential localization of neural responses across the ventral visual pathway. Fragments diagnostic for detection evoke larger neural responses than non-diagnostic ones in the right posterior fusiform gyrus and bilaterally in the inferior occipital gyrus. In contrast, fragments diagnostic for individuation evoke larger responses than non-diagnostic ones in the anterior inferior temporal gyrus. Finally, for individuation only, pattern analysis reveals sensitivity to task-specific information within the right “fusiform face area”. Conclusions/Significance Our results demonstrate: 1) information diagnostic for face detection and individuation is roughly separable; 2) the human visual system is independently sensitive to both types of information; 3) neural

  10. An Execution Service for Grid Computing

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Hu, Chaumin

    2004-01-01

    This paper describes the design and implementation of the IPG Execution Service that reliably executes complex jobs on a computational grid. Our Execution Service is part of the IPG service architecture whose goal is to support location-independent computing. In such an environment, once n user ports an npplicntion to one or more hardware/software platfrms, the user can describe this environment to the grid the grid can locate instances of this platfrm, configure the platfrm as required for the application, and then execute the application. Our Execution Service runs jobs that set up such environments for applications and executes them. These jobs consist of a set of tasks for executing applications and managing data. The tasks have user-defined starting conditions that allow users to specih complex dependencies including task to execute when tasks fail, afiequent occurrence in a large distributed system, or are cancelled. The execution task provided by our service also configures the application environment exactly as specified by the user and captures the exit code of the application, features that many grid execution services do not support due to dflculties interfacing to local scheduling systems.

  11. Coding Gene Single Nucleotide Polymorphism Mapping and Quantitative Trait Loci Detection for Physiological Reproductive Traits in Brook Charr, Salvelinus fontinalis

    PubMed Central

    Sauvage, Christopher; Vagner, Marie; Derôme, Nicolas; Audet, Céline; Bernatchez, Louis

    2012-01-01

    A linkage map of 40 linkage groups (LGs) was developed for brook charr, Salvelinus fontinalis, using an F2 interstrain hybrid progeny (n = 171) and 256 coding gene SNP developed specifically for brook charr and validated from a large (>1000) subset of putative SNP, as well as 81 microsatellite markers. To identify quantitative trait loci (QTL) related to reproduction functions, these fish were also phenotyped at six physiological traits, including spermatozoid head diameter, sperm concentration, plasma testosterone, plasma 11-keto-testosterone, egg diameter, and plasma 17β-estradiol. Five significant QTL were detected over four LGs for egg diameter and plasma 17β-estradiol concentration in females, and sperm concentration as well as spermatozoid head diameter in males. In females, two different QTLs located on LG 11 and LG 34 were associated with the egg number, whereas one QTL was associated with plasma 17β-estradiol concentration (LG 8). Their total percent variance explained (PVE) was 26.7% and 27.6%, respectively. In males, two QTL were also detected for the sperm concentration, and their PVE were estimated at 18.58% and 14.95%, respectively. The low QTL number, associated with the high PVE, suggests that the variance in these reproductive physiological traits was either under the control of one major gene or a small number of genes. The QTL associated with sperm concentration, plasma 17β-estradiol, and egg diameter appeared to be under a dominance effect, whereas the two others were under a negative additive effect. These results show that genes underlying the phenotypic variance of these traits are under different modes of action (additive vs. dominance) and may be used to predict an increase or a decrease in their phenotypic values in subsequent generations of selective breeding. Moreover, this newly developed panel of mapped SNP located in coding gene regions will be useful for screening wild populations, especially in the context of investigating the

  12. Executive Functioning in Schizophrenia

    PubMed Central

    Orellana, Gricel; Slachevsky, Andrea

    2013-01-01

    The executive function (EF) is a set of abilities, which allows us to invoke voluntary control of our behavioral responses. These functions enable human beings to develop and carry out plans, make up analogies, obey social rules, solve problems, adapt to unexpected circumstances, do many tasks simultaneously, and locate episodes in time and place. EF includes divided attention and sustained attention, working memory (WM), set-shifting, flexibility, planning, and the regulation of goal directed behavior and can be defined as a brain function underlying the human faculty to act or think not only in reaction to external events but also in relation with internal goals and states. EF is mostly associated with dorsolateral prefrontal cortex (PFC). Besides EF, PFC is involved in self-regulation of behavior, i.e., the ability to regulate behavior according to internal goals and constraints, particularly in less structured situations. Self-regulation of behavior is subtended by ventral medial/orbital PFC. Impairment of EF is one of the most commonly observed deficits in schizophrenia through the various disease stages. Impairment in tasks measuring conceptualization, planning, cognitive flexibility, verbal fluency, ability to solve complex problems, and WM occur in schizophrenia. Disorders detected by executive tests are consistent with evidence from functional neuroimaging, which have shown PFC dysfunction in patients while performing these kinds of tasks. Schizophrenics also exhibit deficit in odor identifying, decision-making, and self-regulation of behavior suggesting dysfunction of the orbital PFC. However, impairment in executive tests is explained by dysfunction of prefronto-striato-thalamic, prefronto-parietal, and prefronto-temporal neural networks mainly. Disorders in EFs may be considered central facts with respect to schizophrenia and it has been suggested that negative symptoms may be explained by that executive dysfunction. PMID:23805107

  13. Executive functioning in schizophrenia.

    PubMed

    Orellana, Gricel; Slachevsky, Andrea

    2013-01-01

    The executive function (EF) is a set of abilities, which allows us to invoke voluntary control of our behavioral responses. These functions enable human beings to develop and carry out plans, make up analogies, obey social rules, solve problems, adapt to unexpected circumstances, do many tasks simultaneously, and locate episodes in time and place. EF includes divided attention and sustained attention, working memory (WM), set-shifting, flexibility, planning, and the regulation of goal directed behavior and can be defined as a brain function underlying the human faculty to act or think not only in reaction to external events but also in relation with internal goals and states. EF is mostly associated with dorsolateral prefrontal cortex (PFC). Besides EF, PFC is involved in self-regulation of behavior, i.e., the ability to regulate behavior according to internal goals and constraints, particularly in less structured situations. Self-regulation of behavior is subtended by ventral medial/orbital PFC. Impairment of EF is one of the most commonly observed deficits in schizophrenia through the various disease stages. Impairment in tasks measuring conceptualization, planning, cognitive flexibility, verbal fluency, ability to solve complex problems, and WM occur in schizophrenia. Disorders detected by executive tests are consistent with evidence from functional neuroimaging, which have shown PFC dysfunction in patients while performing these kinds of tasks. Schizophrenics also exhibit deficit in odor identifying, decision-making, and self-regulation of behavior suggesting dysfunction of the orbital PFC. However, impairment in executive tests is explained by dysfunction of prefronto-striato-thalamic, prefronto-parietal, and prefronto-temporal neural networks mainly. Disorders in EFs may be considered central facts with respect to schizophrenia and it has been suggested that negative symptoms may be explained by that executive dysfunction.

  14. Use of diagnosis codes for detection of clinically significant opioid poisoning in the emergency department: A retrospective analysis of a surveillance case definition.

    PubMed

    Reardon, Joseph M; Harmon, Katherine J; Schult, Genevieve C; Staton, Catherine A; Waller, Anna E

    2016-02-08

    Although fatal opioid poisonings tripled from 1999 to 2008, data describing nonfatal poisonings are rare. Public health authorities are in need of tools to track opioid poisonings in near real time. We determined the utility of ICD-9-CM diagnosis codes for identifying clinically significant opioid poisonings in a state-wide emergency department (ED) surveillance system. We sampled visits from four hospitals from July 2009 to June 2012 with diagnosis codes of 965.00, 965.01, 965.02 and 965.09 (poisoning by opiates and related narcotics) and/or an external cause of injury code of E850.0-E850.2 (accidental poisoning by opiates and related narcotics), and developed a novel case definition to determine in which cases opioid poisoning prompted the ED visit. We calculated the percentage of visits coded for opioid poisoning that were clinically significant and compared it to the percentage of visits coded for poisoning by non-opioid agents in which there was actually poisoning by an opioid agent. We created a multivariate regression model to determine if other collected triage data can improve the positive predictive value of diagnosis codes alone for detecting clinically significant opioid poisoning. 70.1 % of visits (Standard Error 2.4 %) coded for opioid poisoning were primarily prompted by opioid poisoning. The remainder of visits represented opioid exposure in the setting of other primary diseases. Among non-opioid poisoning codes reviewed, up to 36 % were reclassified as an opioid poisoning. In multivariate analysis, only naloxone use improved the positive predictive value of ICD-9-CM codes for identifying clinically significant opioid poisoning, but was associated with a high false negative rate. This surveillance mechanism identifies many clinically significant opioid overdoses with a high positive predictive value. With further validation, it may help target control measures such as prescriber education and pharmacy monitoring.

  15. Symbolic Execution Over Native x86

    DTIC Science & Technology

    2012-06-01

    Vine IL. It has been used academically and in industry to find bugs in binaries. KLEE . Klee [24] is a symbolic execution platform that was redesigned...from another tool origi- nally named EXE [33]. Klee was designed to perform deep checking of applications and max- imize code coverage across diverse...classes of programs written in C. Klee is built upon LLVM to help with the symbolic execution of the intermediate representation (IR) of programs

  16. Detecting selection in the blue crab, Callinectes sapidus, using DNA sequence data from multiple nuclear protein-coding genes.

    PubMed

    Yednock, Bree K; Neigel, Joseph E

    2014-01-01

    The identification of genes involved in the adaptive evolution of non-model organisms with uncharacterized genomes constitutes a major challenge. This study employed a rigorous and targeted candidate gene approach to test for positive selection on protein-coding genes of the blue crab, Callinectes sapidus. Four genes with putative roles in physiological adaptation to environmental stress were chosen as candidates. A fifth gene not expected to play a role in environmental adaptation was used as a control. Large samples (n>800) of DNA sequences from C. sapidus were used in tests of selective neutrality based on sequence polymorphisms. In combination with these, sequences from the congener C. similis were used in neutrality tests based on interspecific divergence. In multiple tests, significant departures from neutral expectations and indicative of positive selection were found for the candidate gene trehalose 6-phosphate synthase (tps). These departures could not be explained by any of the historical population expansion or bottleneck scenarios that were evaluated in coalescent simulations. Evidence was also found for balancing selection at ATP-synthase subunit 9 (atps) using a maximum likelihood version of the Hudson, Kreitmen, and Aguadé test, and positive selection favoring amino acid replacements within ATP/ADP translocase (ant) was detected using the McDonald-Kreitman test. In contrast, test statistics for the control gene, ribosomal protein L12 (rpl), which presumably has experienced the same demographic effects as the candidate loci, were not significantly different from neutral expectations and could readily be explained by demographic effects. Together, these findings demonstrate the utility of the candidate gene approach for investigating adaptation at the molecular level in a marine invertebrate for which extensive genomic resources are not available.

  17. Detecting Selection in the Blue Crab, Callinectes sapidus, Using DNA Sequence Data from Multiple Nuclear Protein-Coding Genes

    PubMed Central

    Yednock, Bree K.; Neigel, Joseph E.

    2014-01-01

    The identification of genes involved in the adaptive evolution of non-model organisms with uncharacterized genomes constitutes a major challenge. This study employed a rigorous and targeted candidate gene approach to test for positive selection on protein-coding genes of the blue crab, Callinectes sapidus. Four genes with putative roles in physiological adaptation to environmental stress were chosen as candidates. A fifth gene not expected to play a role in environmental adaptation was used as a control. Large samples (n>800) of DNA sequences from C. sapidus were used in tests of selective neutrality based on sequence polymorphisms. In combination with these, sequences from the congener C. similis were used in neutrality tests based on interspecific divergence. In multiple tests, significant departures from neutral expectations and indicative of positive selection were found for the candidate gene trehalose 6-phosphate synthase (tps). These departures could not be explained by any of the historical population expansion or bottleneck scenarios that were evaluated in coalescent simulations. Evidence was also found for balancing selection at ATP-synthase subunit 9 (atps) using a maximum likelihood version of the Hudson, Kreitmen, and Aguadé test, and positive selection favoring amino acid replacements within ATP/ADP translocase (ant) was detected using the McDonald-Kreitman test. In contrast, test statistics for the control gene, ribosomal protein L12 (rpl), which presumably has experienced the same demographic effects as the candidate loci, were not significantly different from neutral expectations and could readily be explained by demographic effects. Together, these findings demonstrate the utility of the candidate gene approach for investigating adaptation at the molecular level in a marine invertebrate for which extensive genomic resources are not available. PMID:24896825

  18. SMARTS: Exploiting Temporal Locality and Parallelism through Vertical Execution

    SciTech Connect

    Beckman, P.; Crotinger, J.; Karmesin, S.; Malony, A.; Oldehoeft, R.; Shende, S.; Smith, S.; Vajracharya, S.

    1999-01-04

    In the solution of large-scale numerical prob- lems, parallel computing is becoming simultaneously more important and more difficult. The complex organization of today's multiprocessors with several memory hierarchies has forced the scientific programmer to make a choice between simple but unscalable code and scalable but extremely com- plex code that does not port to other architectures. This paper describes how the SMARTS runtime system and the POOMA C++ class library for high-performance scientific computing work together to exploit data parallelism in scientific applications while hiding the details of manag- ing parallelism and data locality from the user. We present innovative algorithms, based on the macro -dataflow model, for detecting data parallelism and efficiently executing data- parallel statements on shared-memory multiprocessors. We also desclibe how these algorithms can be implemented on clusters of SMPS.

  19. Directed Hidden-Code Extractor for Environment-Sensitive Malwares

    NASA Astrophysics Data System (ADS)

    Jia, Chunfu; Wang, Zhi; Lu, Kai; Liu, Xinhai; Liu, Xin

    Malware writers often use packing technique to hide malicious payload. A number of dynamic unpacking tools are.designed in order to identify and extract the hidden code in the packed malware. However, such unpacking methods.are all based on a highly controlled environment that is vulnerable to various anti-unpacking techniques. If execution.environment is suspicious, malwares may stay inactive for a long time or stop execution immediately to evade.detection. In this paper, we proposed a novel approach that automatically reasons about the environment requirements.imposed by malware, then directs a unpacking tool to change the controlled environment to extract the hide code at.the new environment. The experimental results show that our approach significantly increases the resilience of the.traditional unpacking tools to environment-sensitive malware.

  20. Labelled Execution Systems

    DTIC Science & Technology

    2012-05-07

    executions are all the executions of the first except the single infinite execution stuttering around s0. And because of this exception, s0 is not bisimilar...maximal paths in the diagram, and that whose executions are all the executions of the first system except the infinite execution stuttering around s0. s...advance to s1, from where on it behaves just like the first one. What sets the behaviour of the two processes apart is, of course, the infinite stuttering

  1. A controlled evaluation of case clinical effect coding by poison center specialists for detection of WMD scenarios.

    PubMed

    Beuhler, Michael C; Wittler, Mary A; Ford, Marsha; Dulaney, Anna R

    2011-08-01

    Many public health entities employ computer-based syndromic surveillance to monitor for aberrations including possible exposures to weapons of mass destruction (WMD). Often, this is done by screening signs and symptoms reported for cases against syndromic definitions. Poison centers (PCs) may offer significant contributions to public health surveillance because of their detailed clinical effect data field coding and real-time data entry. Because improper clinical effect coding may impede syndromic surveillance, it is important to assess this accuracy for PCs. An AAPCC-certified regional PC assessed the accuracy of clinical effect coding by specialists in poison information (SPIs) listening to audio recordings of standard cases. Eighteen different standardized cases were used, consisting of six cyanide, six botulism, and six control cases. Cases were scripted to simulate clinically relevant telephone conversations and converted to audio recordings. Ten SPIs were randomly selected from the center's staff to listen to and code case information from the recorded cases. Kappa scores and the percentage of correctly coding a present clinical effect were calculated for individual clinical effects summed over all test cases along with corresponding 95% confidence intervals. The rate of the case coding by the SPIs triggering the PC's automated botulism and cyanide alerts was also determined. The kappa scores and the percentage of correctly coding a present clinical effect varied depending on the specific clinical effect, with greater accuracy observed for the clinical effects of vomiting and agitation/irritability, and poor accuracy observed for the clinical effects of visual defect and anion gap increase. Lack of correct coding resulted in only 60 and 86% of the cases that met the botulism and cyanide surveillance definitions, respectively, triggering the corresponding alert. There was no difference observed in the percentage of coding a present clinical effect between

  2. Biases in detection of apparent "weekend effect" on outcome with administrative coding data: population based study of stroke.

    PubMed

    Li, Linxin; Rothwell, Peter M

    2016-05-16

     To determine the accuracy of coding of admissions for stroke on weekdays versus weekends and any impact on apparent outcome.  Prospective population based stroke incidence study and a scoping review of previous studies of weekend effects in stroke.  Primary and secondary care of all individuals registered with nine general practices in Oxfordshire, United Kingdom (OXVASC, the Oxford Vascular Study).  All patients with clinically confirmed acute stroke in OXVASC identified with multiple overlapping methods of ascertainment in 2002-14 versus all acute stroke admissions identified by hospital diagnostic and mortality coding alone during the same period.  Accuracy of administrative coding data for all patients with confirmed stroke admitted to hospital in OXVASC. Difference between rates of "false positive" or "false negative" coding for weekday and weekend admissions. Impact of inaccurate coding on apparent case fatality at 30 days in weekday versus weekend admissions. Weekend effects on outcomes in patients with confirmed stroke admitted to hospital in OXVASC and impacts of other potential biases compared with those in the scoping review.  Among 92 728 study population, 2373 episodes of acute stroke were ascertained in OXVASC, of which 826 (34.8%) mainly minor events were managed without hospital admission, 60 (2.5%) occurred out of the area or abroad, and 195 (8.2%) occurred in hospital during an admission for a different reason. Of 1292 local hospital admissions for acute stroke, 973 (75.3%) were correctly identified by administrative coding. There was no bias in distribution of weekend versus weekday admission of the 319 strokes missed by coding. Of 1693 admissions for stroke identified by coding, 1055 (62.3%) were confirmed to be acute strokes after case adjudication. Among the 638 false positive coded cases, patients were more likely to be admitted on weekdays than at weekends (536 (41.0%) v 102 (26.5%); P<0.001), partly because of weekday elective

  3. Multi-point hydrogen detection system using hetero-core structured optical fiber hydrogen tip sensor based on surface plasmon resonance and pseudorandom noise code correlation reflectometry

    NASA Astrophysics Data System (ADS)

    Hosoki, Ai; Nishiyama, Michiko; Igawa, Hirotaka; Seki, Atsushi; Watanabe, Kazuhiro

    2015-07-01

    In this paper, the multi-point hydrogen detection system using the hetero-core optical fiber hydrogen tip sensor based on surface plasmon resonance (SPR) and Pseudorandom Noise code correlation reflectometry (PNCR) has been proposed. This method makes use of the correlation between a launched pseudorandom noise code signal and its reflection, can obtain a high signal to noise ration. We demonstrated the 4 sensors characteristics to 4% hydrogen. It was observed from experimental results that all sensors induced a response time of 15 s for 4% hydrogen for the 25-nm Au / 60-nm Ta2O5 / 5-nm Pd multi-layers film. In addition, all sensors were detected the hydrogen concentration with sufficient sensitivities.

  4. C.U.R.R.F. (Codon Usage regarding Restriction Finder): a free Java(®)-based tool to detect potential restriction sites in both coding and non-coding DNA sequences.

    PubMed

    Gatter, Michael; Gatter, Thomas; Matthäus, Falk

    2012-10-01

    The synthesis of complete genes is becoming a more and more popular approach in heterologous gene expression. Reasons for this are the decreasing prices and the numerous advantages in comparison to classic molecular cloning methods. Two of these advantages are the possibility to adapt the codon usage to the host organism and the option to introduce restriction enzyme target sites of choice. C.U.R.R.F. (Codon Usage regarding Restriction Finder) is a free Java(®)-based software program which is able to detect possible restriction sites in both coding and non-coding DNA sequences by introducing multiple silent or non-silent mutations, respectively. The deviation of an alternative sequence containing a desired restriction motive from the sequence with the optimal codon usage is considered during the search of potential restriction sites in coding DNA and mRNA sequences as well as protein sequences. C.U.R.R.F is available at http://www.zvm.tu-dresden.de/die_tu_dresden/fakultaeten/fakultaet_mathematik_und_naturwissenschaften/fachrichtung_biologie/mikrobiologie/allgemeine_mikrobiologie/currf.

  5. Multiprocessor execution of functional programs

    SciTech Connect

    Goldberg, B. )

    1988-10-01

    Functional languages have recently gained attention as vehicles for programming in a concise and element manner. In addition, it has been suggested that functional programming provides a natural methodology for programming multiprocessor computers. This paper describes research that was performed to demonstrate that multiprocessor execution of functional programs on current multiprocessors is feasible, and results in a significant reduction in their execution times. Two implementations of the functional language ALFL were built on commercially available multiprocessors. Alfalfa is an implementation on the Intel iPSC hypercube multiprocessor, and Buckwheat is an implementation on the Encore Multimax shared-memory multiprocessor. Each implementation includes a compiler that performs automatic decomposition of ALFL programs and a run-time system that supports their execution. The compiler is responsible for detecting the inherent parallelism in a program, and decomposing the program into a collection of tasks, called serial combinators, that can be executed in parallel. The abstract machine model supported by Alfalfa and Buckwheat is called heterogeneous graph reduction, which is a hybrid of graph reduction and conventional stack-oriented execution. This model supports parallelism, lazy evaluation, and higher order functions while at the same time making efficient use of the processors in the system. The Alfalfa and Buckwheat runtime systems support dynamic load balancing, interprocessor communication (if required), and storage management. A large number of experiments were performed on Alfalfa and Buckwheat for a variety of programs. The results of these experiments, as well as the conclusions drawn from them, are presented.

  6. Field Testing of Second Generation of Colour-Coded Rings for Detecting Slow Progress of Labour at Rural Health Centres.

    PubMed

    Pratinidhi, Asha K; Doke, P P; Shrotri, A N; Patange, R P; Vhaval, Vaishali; Patil, Supriya S; Patil, Sujata V; Kakade, S V

    2016-10-01

    An innovative appropriate technological tool of colour-coded rings based on cervicographic principles was developed to monitor deliveries. To study efficacy, feasibility and acceptability of colour-coded rings for monitoring active phase of labour. All consecutive deliveries occurring at selected primary health centres from Pune, Satara and Kolhapur Districts of Maharashtra, during 15 months period were included in the study and matched control groups. Training of medical officers and nurses from both study and control area was undertaken in routine natal and post-natal care. In addition, training of use of colour-coded rings was given to health workers from the study area. There were 6705 live births from study area and 6341 from control area. Perinatal mortality rate for study area was 15.9/1000 LB while that was 23.9/1000 LB for control area (p < 0.01). The cause-specific perinatal mortality due to birth asphyxia for the study area was 4.2/1000 LB while that was 8.5/1000 LB for control area (p = 0.0019). Higher use rate of colour-coded rings associated with reduction in cause-specific mortality rate due to birth asphyxia in study area indicated that use of colour-coded rings is effective, feasible and acceptable option to cervicography under field conditions.

  7. The Future College Executive.

    ERIC Educational Resources Information Center

    Boston Coll., Chestnut Hill, MA.

    This conference report examines various problems facing university administrators and discusses the future role of the executive in American colleges and universities. Conference papers concern the future college executive; efficiency, accountability and the college executive; administrative concerns; and the rights of college administrators. (MJM)

  8. Chief executives. Staying afloat.

    PubMed

    Spurgeon, P; Clark, J; Smith, C

    2001-09-27

    A study of chief executives identified the ability to prioritize, clear vision, resilence, and willingness to take decisions as key factors in success. Some wanted more active involvement from the regional director. Chief executives could be subject to 360-degree assessment. More work is needed to establish the compatibility of chief executives and chairs.

  9. Mobile, hybrid Compton/coded aperture imaging for detection, identification and localization of gamma-ray sources at stand-off distances

    NASA Astrophysics Data System (ADS)

    Tornga, Shawn R.

    The Stand-off Radiation Detection System (SORDS) program is an Advanced Technology Demonstration (ATD) project through the Department of Homeland Security's Domestic Nuclear Detection Office (DNDO) with the goal of detection, identification and localization of weak radiological sources in the presence of large dynamic backgrounds. The Raytheon-SORDS Tri-Modal Imager (TMI) is a mobile truck-based, hybrid gamma-ray imaging system able to quickly detect, identify and localize, radiation sources at standoff distances through improved sensitivity while minimizing the false alarm rate. Reconstruction of gamma-ray sources is performed using a combination of two imaging modalities; coded aperture and Compton scatter imaging. The TMI consists of 35 sodium iodide (NaI) crystals 5x5x2 in3 each, arranged in a random coded aperture mask array (CA), followed by 30 position sensitive NaI bars each 24x2.5x3 in3 called the detection array (DA). The CA array acts as both a coded aperture mask and scattering detector for Compton events. The large-area DA array acts as a collection detector for both Compton scattered events and coded aperture events. In this thesis, developed coded aperture, Compton and hybrid imaging algorithms will be described along with their performance. It will be shown that multiple imaging modalities can be fused to improve detection sensitivity over a broader energy range than either alone. Since the TMI is a moving system, peripheral data, such as a Global Positioning System (GPS) and Inertial Navigation System (INS) must also be incorporated. A method of adapting static imaging algorithms to a moving platform has been developed. Also, algorithms were developed in parallel with detector hardware, through the use of extensive simulations performed with the Geometry and Tracking Toolkit v4 (GEANT4). Simulations have been well validated against measured data. Results of image reconstruction algorithms at various speeds and distances will be presented as well as

  10. A dual-amplified electrochemical detection of mRNA based on duplex-specific nuclease and bio-bar-code conjugates.

    PubMed

    Li, Xue-Mei; Wang, Lin-Lin; Luo, Jie; Wei, Qing-Li

    2015-03-15

    On the basis of strong preference for cleaving double-stranded DNA or DNA in DNA:RNA heteroduplexes of duplex-specific nuclease (DSN), a dual-amplified electrochemical detection of mRNA was developed in this article, by coupling the enhancement of DSN and bio-bar-code conjugates. Capture probe was linked with magnetic nanoparticles (MNPs) at its 5' end and bio-bar-code at its 3' end. In the presence of target surviving mRNA, all hybridized S1 strands were cleaved off the biosensor by the DSN, and the bio-bar-code probe with CdS nanoparticles (CdS NPs) was released into the solution. The metal sulfide nanoparticles were measured by anodic stripping voltammetry (ASV) subsequently. This assay exhibited high sensitivity and selectivity with a detection limit of 0.48fM. In addition, we proved that this simple and cost-effective strategy is capable of detecting the target in complicated biological samples and holds great potential application in biomedical research and clinical diagnostics.

  11. Clinical coding. Code breakers.

    PubMed

    Mathieson, Steve

    2005-02-24

    --The advent of payment by results has seen the role of the clinical coder pushed to the fore in England. --Examinations for a clinical coding qualification began in 1999. In 2004, approximately 200 people took the qualification. --Trusts are attracting people to the role by offering training from scratch or through modern apprenticeships.

  12. Reliability techniques for computer executive programs

    NASA Technical Reports Server (NTRS)

    1972-01-01

    Computer techniques for increasing the stability and reliability of executive and supervisory systems were studied. Program segmentation characteristics are discussed along with a validation system which is designed to retain the natural top down outlook in coding. An analysis of redundancy techniques and roll back procedures is included.

  13. Architectures for Secure Portable Executable Content.

    ERIC Educational Resources Information Center

    Gritzalis, Stefanos; Aggelis, George; Spinellis, Diomidis

    1999-01-01

    Discusses downloadable executable content, or mobile code, on the World Wide Web; evaluates the security features offered by the Java and Safe-Tcl programming languages; and describes the basic mechanisms of each of the proposed security models. Presents current implementations, as well as upcoming extensions, and evaluates their efficiency and…

  14. 78 FR 75447 - Senior Executive Service; Departmental Performance Review Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-11

    ... States Anita K. Blair, Deputy Assistant Secretary for Human Resources and Chief Human Capital Officer...'s criteria for significant regulations. Barbara Pabotoy, Associate Chief Human Capital Officer, Executive and Human Capital Services. BILLING CODE 4810-25-P...

  15. [A simple procedure for quantitative and time coded detection of snoring sounds in apnea and snoring patients].

    PubMed

    Schäfer, J

    1988-09-01

    A simple technique for time-encoded recording of snoring sounds is presented. An electronic circuit connected to a stereo cassette recorder via cord remote control will start the recorder when the sound pressure of the snoring sound surpasses a preset level. The snoring sound is recorded on one track of the cassette recorder. The other track is used for the time code. Every 120 seconds the tape recorder is switched on by the electronic circuit and a short high level signal is recorded. The time interval between two time coding signals equals the snoring time. Analysis of the time coding signals is performed by an A/D converter installed in a Personal Computer. The converter amd accompanying software are used to calculate the duration of the intervals between the coding signals. The results are displayed graphically where sleeping time is plotted against snoring time (Fig.2). The length of each bar equals the snoring time in seconds for each 120 second interval. Snoring periods can be recognised at a glance and the snoring pattern can be evaluated. Three cases studies are presented demonstrating the performance of the technique. A 39-year-old female with nonpathological snoring (Fig.2), a 45-year-old male with heavy and regular snoring (Fig. 3) and a 36-year-old male with a full-blown Pickwickian Syndrome (Fig. 4). This patient's response to nasal cPAP is demonstrated in Fig. 5.

  16. Tabled Execution in Scheme

    SciTech Connect

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  17. [EXPERIENCE OF STUDY AND POSSIBLE WAYS OF ELIMINATION OF FALSE POSITIVE AND FALSE NEGATIVE RESULTS DURING EXECUTION OF POLYMERASE CHAIN REACTION ON AN EXAMPLE OF JUNIN VIRUS RNA DETECTION].

    PubMed

    Sizikova, T E; Lebedev, V N; Pantyukhov, V B; Borisevich, S V; Merkulov, V A

    2015-01-01

    Experience of study and possible ways of elimination of false positive and false negative results during execution of polymerase chain reaction on an example of Junin virus RNA detection. MATERIALSS AND METHODS: Junin virus--causative agent of Argentine hemorrhagic fever (AHF) strain XJpR37/5787 was obtained from the State collection of pathogenicity group I causative agents of the 48th Central Research Institute. Reagent kit for detection of Junin virus RNA by RT-PCR was developed in the Institute and consists of 4 sets: for isolation of RNA, execution of reverse-transcription reaction, execution of PCR and electrophoretic detection of PCR products. RT-PCR was carried out by a standard technique. Continuous cell cultures of African green monkey Vero B, GMK-AH-1(D) were obtained from the museum of cell culture department of the Centre. An experimental study of the effect of various factors of impact on the sample under investigation ("thawing-freezing", presence of formaldehyde, heparin) on the obtaining of false negative results during Junin virus RNA detection by using RT-PCR was studied. Addition of 0.01% heparin to the samples was shown to completely inhibit PCR. Addition of 0.05% formaldehyde significantly reduces sensitivity of the method. A possibility of reduction of analysis timeframe from 15 to 5 days was shown during detection of the causative agent in samples with low concentration of the latter by growing the samples and subsequent analysis of the material obtained by using RT-PCR. During detection of causative agent by using RT-PCR false negative results could appear in the presence of formaldehyde and heparin in the sample. A possibility of elimination of false negative PCR results due to concentration of the causative agent in the sample under investigation at a level below sensitivity threshold was shown on the example of Junin virus RNA detection by using growing of the pathogen in appropriate accumulation system with subsequent analysis of the

  18. The Senior Executive Service

    NASA Technical Reports Server (NTRS)

    1992-01-01

    A major innovation of the Civil Service Reform Act of 1978 was the creation of a Senior Executive Service (SES). The purpose of the SES is both simple and bold: to attract executives of the highest quality into Federal service and to retain them by providing outstanding opportunities for career growth and reward. The SES is intended to: provide greater authority in managing executive resources; attract and retain highly competent executives, and assign them where they will effectively accomplish their missions and best use their talents; provide for systematic development of executives; hold executives accountable for individual and organizational performance; reward outstanding performers and remove poor performers; and provide for an executive merit system free of inappropriate personnel practices and arbitrary actions. This Handbook summarizes the key features of the SES at NASA. It is intended as a special welcome to new appointees and also as a general reference document. It contains an overview of SES management at NASA, including the Executive Resources Board and the Performance Review Board, which are mandated by law to carry out key SES functions. In addition, assistance is provided by a Senior Executive Committee in certain reviews and decisions and by Executive Position Managers in day-to-day administration and oversight.

  19. Experience with Remote Job Execution

    SciTech Connect

    Lynch, Vickie E; Cobb, John W; Green, Mark L; Kohl, James Arthur; Miller, Stephen D; Ren, Shelly; Smith, Bradford C; Vazhkudai, Sudharshan S

    2008-01-01

    The Neutron Science Portal at Oak Ridge National Laboratory submits jobs to the TeraGrid for remote job execution. The TeraGrid is a network of high performance computers supported by the US National Science Foundation. There are eleven partner facilities with over a petaflop of peak computing performance and sixty petabytes of long-term storage. Globus is installed on a local machine and used for job submission. The graphical user interface is produced by java coding that reads an XML file. After submission, the status of the job is displayed in a Job Information Service window which queries globus for the status. The output folder produced in the scratch directory of the TeraGrid machine is returned to the portal with globus-url-copy command that uses the gridftp servers on the TeraGrid machines. This folder is copied from the stage-in directory of the community account to the user's results directory where the output can be plotted using the portal's visualization services. The primary problem with remote job execution is diagnosing execution problems. We have daily tests of submitting multiple remote jobs from the portal. When these jobs fail on a computer, it is difficult to diagnose the problem from the globus output. Successes and problems will be presented.

  20. Stealth transmission of temporal phase en/decoded polarization-modulated-code-shift-keying optical-code-division multiple-access signal over synchronous digital hierarchy network with asynchronous detection

    NASA Astrophysics Data System (ADS)

    Chen, Yinfang; Wang, Rong; Fang, Tao; Pu, Tao; Xiang, Peng; Zhu, Huatao; Zheng, Jilin

    2014-06-01

    An innovative approach for security-enhanced optical stealth transmission in a synchronous digital hierarchy network is proposed and experimentally investigated. The security enhancement is achieved through a signal modulation format, so-called polarization-modulated-code-shift-keying, which is implemented with two superstructured fiber Bragg gratings-based optical-code-division multiple-access encoders and a polarization modulator. The proposed modulation format can provide a constant energy level for both bits 0's and 1's, which avoids secure vulnerability of single-stealth-user with on-off-keying modulation before coupling into the host channel and after the cascade of filters. Moreover, a self-made cost-effective gain-switched distributed feedback laser with relatively narrow spectrum is first employed as a stealth optical source, which greatly reduces the system cost and complexity. The stealth signal is recovered and detected asynchronously. The experimental results show high secure performance and robustness against eavesdropping, while keeping a bit error rate below forward error correction limit.

  1. Single-step, quantitative x-ray differential phase contrast imaging using spectral detection in a coded aperture setup

    NASA Astrophysics Data System (ADS)

    Das, Mini; Liang, Zhihua

    2015-03-01

    In this abstract we describe the first non-interferometric x-ray phase contrast imaging (PCI) method that uses only a single-measurement step to retrieve with quantitative accuracy absorption, phase and differential phase. Our approach is based on utilizing spectral information from photon counting spectral detectors in conjunction with a coded aperture PCI setting to simplify the x-ray "phase problem" to a one-step method. The method by virtue of being single-step with no motion of any component for a given projection image has significantly high potential to overcome the barriers currently faced by PCI.

  2. Utility of rapid database searching for quality assurance: 'detective work' in uncovering radiology coding and billing errors

    NASA Astrophysics Data System (ADS)

    Horii, Steven C.; Kim, Woojin; Boonn, William; Iyoob, Christopher; Maston, Keith; Coleman, Beverly G.

    2011-03-01

    When the first quarter of 2010 Department of Radiology statistics were provided to the Section Chiefs, the authors (SH, BC) were alarmed to discover that Ultrasound showed a decrease of 2.5 percent in billed examinations. This seemed to be in direct contradistinction to the experience of the ultrasound faculty members and sonographers. Their experience was that they were far busier than during the same quarter of 2009. The one exception that all acknowledged was the month of February, 2010 when several major winter storms resulted in a much decreased Hospital admission and Emergency Department visit rate. Since these statistics in part help establish priorities for capital budget items, professional and technical staffing levels, and levels of incentive salary, they are taken very seriously. The availability of a desktop, Web-based RIS database search tool developed by two of the authors (WK, WB) and built-in database functions of the ultrasound miniPACS, made it possible for us very rapidly to develop and test hypotheses for why the number of billable examinations was declining in the face of what experience told the authors was an increasing number of examinations being performed. Within a short time, we identified the major cause as errors on the part of the company retained to verify billable Current Procedural Terminology (CPT) codes against ultrasound reports. This information is being used going forward to recover unbilled examinations and take measures to reduce or eliminate the types of coding errors that resulted in the problem.

  3. Multi-Sensor Detection with Particle Swarm Optimization for Time-Frequency Coded Cooperative WSNs Based on MC-CDMA for Underground Coal Mines.

    PubMed

    Xu, Jingjing; Yang, Wei; Zhang, Linyuan; Han, Ruisong; Shao, Xiaotao

    2015-08-27

    In this paper, a wireless sensor network (WSN) technology adapted to underground channel conditions is developed, which has important theoretical and practical value for safety monitoring in underground coal mines. According to the characteristics that the space, time and frequency resources of underground tunnel are open, it is proposed to constitute wireless sensor nodes based on multicarrier code division multiple access (MC-CDMA) to make full use of these resources. To improve the wireless transmission performance of source sensor nodes, it is also proposed to utilize cooperative sensors with good channel conditions from the sink node to assist source sensors with poor channel conditions. Moreover, the total power of the source sensor and its cooperative sensors is allocated on the basis of their channel conditions to increase the energy efficiency of the WSN. To solve the problem that multiple access interference (MAI) arises when multiple source sensors transmit monitoring information simultaneously, a kind of multi-sensor detection (MSD) algorithm with particle swarm optimization (PSO), namely D-PSO, is proposed for the time-frequency coded cooperative MC-CDMA WSN. Simulation results show that the average bit error rate (BER) performance of the proposed WSN in an underground coal mine is improved significantly by using wireless sensor nodes based on MC-CDMA, adopting time-frequency coded cooperative transmission and D-PSO algorithm with particle swarm optimization.

  4. Multi-Sensor Detection with Particle Swarm Optimization for Time-Frequency Coded Cooperative WSNs Based on MC-CDMA for Underground Coal Mines

    PubMed Central

    Xu, Jingjing; Yang, Wei; Zhang, Linyuan; Han, Ruisong; Shao, Xiaotao

    2015-01-01

    In this paper, a wireless sensor network (WSN) technology adapted to underground channel conditions is developed, which has important theoretical and practical value for safety monitoring in underground coal mines. According to the characteristics that the space, time and frequency resources of underground tunnel are open, it is proposed to constitute wireless sensor nodes based on multicarrier code division multiple access (MC-CDMA) to make full use of these resources. To improve the wireless transmission performance of source sensor nodes, it is also proposed to utilize cooperative sensors with good channel conditions from the sink node to assist source sensors with poor channel conditions. Moreover, the total power of the source sensor and its cooperative sensors is allocated on the basis of their channel conditions to increase the energy efficiency of the WSN. To solve the problem that multiple access interference (MAI) arises when multiple source sensors transmit monitoring information simultaneously, a kind of multi-sensor detection (MSD) algorithm with particle swarm optimization (PSO), namely D-PSO, is proposed for the time-frequency coded cooperative MC-CDMA WSN. Simulation results show that the average bit error rate (BER) performance of the proposed WSN in an underground coal mine is improved significantly by using wireless sensor nodes based on MC-CDMA, adopting time-frequency coded cooperative transmission and D-PSO algorithm with particle swarm optimization. PMID:26343660

  5. Executive compensation in health care: a systematic review.

    PubMed

    Shay, Patrick D; White, Kenneth R

    2014-01-01

    Despite continued scrutiny over executive earnings in the health care industry, the evidence for executive pay determinants is uncertain and inconclusive. Theoretical motivations for executive compensation practices have been debated, and questions remain about the explanatory power of previously applied theoretical models. Our systematic review considered evidence of executive compensation determinants among health care organizations and sought to identify factors affecting executive pay that are commonly supported by previous studies. We also aimed to survey the theoretical perspectives employed in health care executive compensation studies to address how organization theory may explain executive remuneration practices at health care organizations. Twenty-one eligible studies were identified after a search of the MEDLINE/PubMed and CINAHL electronic reference databases and the reference lists of relevant studies. Eligible studies included those examining health care organizations and providing empirical, regression-based outcomes regarding the determinants of executive compensation. Each eligible study was coded to identify pertinent information, including study settings, executive compensation measures, executive compensation determinants and their measures (e.g., financial performance measured as profit margin), outcomes (direction and level of statistical significance of regression model coefficients), and theoretical applications. Studies are mixed in their findings regarding the statistical significance of various determinants of executive compensation. Many studies indicate that, in addition to firm financial performance, other factors may influence health care executive compensation, including organizational size and human capital attributes. Agency theory was the predominant framework applied, yet the findings suggest a complementary theoretical perspective may better explain health care executive compensation. To address critics who assert health care

  6. Data processing with microcode designed with source coding

    DOEpatents

    McCoy, James A; Morrison, Steven E

    2013-05-07

    Programming for a data processor to execute a data processing application is provided using microcode source code. The microcode source code is assembled to produce microcode that includes digital microcode instructions with which to signal the data processor to execute the data processing application.

  7. Executive Mind, Timely Action.

    ERIC Educational Resources Information Center

    Torbert, William R.

    1983-01-01

    The idea of "Executive Mind" carries with it the notion of purposeful and effective action. Part I of this paper characterizes three complements to "Executive Mind"--"Observing Mind,""Theorizing Mind," and "Passionate Mind"--and offers historical figures exemplifying all four types. The concluding…

  8. Identifying Executable Plans

    NASA Technical Reports Server (NTRS)

    Bedrax-Weiss, Tania; Jonsson, Ari K.; Frank, Jeremy D.; McGann, Conor

    2003-01-01

    Generating plans for execution imposes a different set of requirements on the planning process than those imposed by planning alone. In highly unpredictable execution environments, a fully-grounded plan may become inconsistent frequently when the world fails to behave as expected. Intelligent execution permits making decisions when the most up-to-date information is available, ensuring fewer failures. Planning should acknowledge the capabilities of the execution system, both to ensure robust execution in the face of uncertainty, which also relieves the planner of the burden of making premature commitments. We present Plan Identification Functions (PIFs), which formalize what it means for a plan to be executable, md are used in conjunction with a complete model of system behavior to halt the planning process when an executable plan is found. We describe the implementation of plan identification functions for a temporal, constraint-based planner. This particular implementation allows the description of many different plan identification functions. characteristics crf the xectieonfvii rnm-enft,h e best plan to hand to the execution system will contain more or less commitment and information.

  9. Field and Pretreatment-free Detection of Heavy Metal Ions in Organic Polluted Water through Alkyne-coded SERS Test Kit.

    PubMed

    Zeng, Yi; Ren, Jia-Qiang; Shen, Ai-Guo; Hu, Ji-Ming

    2016-10-03

    Field and pretreatment-free detection of heavy metal ions in organic polluted water is important but still challenging in current water pollution emergency response system. Here we report a Poly adenine-DNA-mediated approach for rationally designed alkyne-coded surface-enhanced Raman scattering (SERS) test kit, enabling rapid and simultaneous detection of Hg2+ and Ag+ by portable spectrometer, impervious to organic interferences. Due to the formation of thymine (T)-Hg2+-T and cytosine (C)-Ag+-C, highly recognizable SERS signals are rapidly detected when two different alkynes labeled gold nanoparticles (AuNPs) are induced to undergo controllable bridging upon the additive of low volume targets. For multiplex detection through portable spectrometer, the limits of detection reach 0.77 nM and 0.86 nM for Hg2+ and Ag+, respectively. Of particular significance, the proposed C≡C contained Raman reporters provide an extremely effective solution for multiplex sensing in spectral silent region when the hyperspectral and fair intense optical noises originating from lower wave number region (<1800 cm-1) are inevitable under complex ambient conditions.

  10. A vectorized Monte Carlo code for modeling photon transport in SPECT

    SciTech Connect

    Smith, M.F. ); Floyd, C.E. Jr.; Jaszczak, R.J. Department of Radiology, Duke University Medical Center, Durham, North Carolina 27710 )

    1993-07-01

    A vectorized Monte Carlo computer code has been developed for modeling photon transport in single photon emission computed tomography (SPECT). The code models photon transport in a uniform attenuating region and photon detection by a gamma camera. It is adapted from a history-based Monte Carlo code in which photon history data are stored in scalar variables and photon histories are computed sequentially. The vectorized code is written in FORTRAN77 and uses an event-based algorithm in which photon history data are stored in arrays and photon history computations are performed within DO loops. The indices of the DO loops range over the number of photon histories, and these loops may take advantage of the vector processing unit of our Stellar GS1000 computer for pipelined computations. Without the use of the vector processor the event-based code is faster than the history-based code because of numerical optimization performed during conversion to the event-based algorithm. When only the detection of unscattered photons is modeled, the event-based code executes 5.1 times faster with the use of the vector processor than without; when the detection of scattered and unscattered photons is modeled the speed increase is a factor of 2.9. Vectorization is a valuable way to increase the performance of Monte Carlo code for modeling photon transport in SPECT.

  11. Tandem Mirror Reactor Systems Code (Version I)

    SciTech Connect

    Reid, R.L.; Finn, P.A.; Gohar, M.Y.; Barrett, R.J.; Gorker, G.E.; Spampinaton, P.T.; Bulmer, R.H.; Dorn, D.W.; Perkins, L.J.; Ghose, S.

    1985-09-01

    A computer code was developed to model a Tandem Mirror Reactor. Ths is the first Tandem Mirror Reactor model to couple, in detail, the highly linked physics, magnetics, and neutronic analysis into a single code. This report describes the code architecture, provides a summary description of the modules comprising the code, and includes an example execution of the Tandem Mirror Reactor Systems Code. Results from this code for two sensitivity studies are also included. These studies are: (1) to determine the impact of center cell plasma radius, length, and ion temperature on reactor cost and performance at constant fusion power; and (2) to determine the impact of reactor power level on cost.

  12. Memoized Symbolic Execution

    NASA Technical Reports Server (NTRS)

    Yang, Guowei; Pasareanu, Corina S.; Khurshid, Sarfraz

    2012-01-01

    This paper introduces memoized symbolic execution (Memoise), a novel approach for more efficient application of forward symbolic execution, which is a well-studied technique for systematic exploration of program behaviors based on bounded execution paths. Our key insight is that application of symbolic execution often requires several successive runs of the technique on largely similar underlying problems, e.g., running it once to check a program to find a bug, fixing the bug, and running it again to check the modified program. Memoise introduces a trie-based data structure that stores the key elements of a run of symbolic execution. Maintenance of the trie during successive runs allows re-use of previously computed results of symbolic execution without the need for re-computing them as is traditionally done. Experiments using our prototype embodiment of Memoise show the benefits it holds in various standard scenarios of using symbolic execution, e.g., with iterative deepening of exploration depth, to perform regression analysis, or to enhance coverage.

  13. Sequential Two-Dimensional Partial Response Maximum Likelihood Detection Scheme with Constant-Weight Constraint Code for Holographic Data Storage Systems

    NASA Astrophysics Data System (ADS)

    Kong, Gyuyeol; Choi, Sooyong

    2012-08-01

    A sequential two-dimensional (2D) partial response maximum likelihood (PRML) detection scheme for holographic data storage (HDS) systems is proposed. We use two complexity reduction schemes, a reduced-state trellis and a constant-weight (CW) constraint. In the reduced-state trellis, the limited candidate bits surrounding the target bit are considered for the 2D PRML detector. In the CW constraint, the trellis transitions that violate the CW condition that each code-word block has only one white bit are eliminated. However, the 2D PRML detector using the complexity reduction schemes, which operates on 47 states and 169 branches, has performance degradation. To overcome performance degradation, a sequential detection algorithm uses the estimated a priori probability. By the sequential procedure, we mitigate 2D intersymbol interference with an enhanced reliability of the branch metric. Simulation results show that the proposed 2D PRML detection scheme yields about 3 dB gains over the one-dimensional PRML detection scheme.

  14. Sharing a task or sharing space? On the effect of the confederate in action coding in a detection task.

    PubMed

    Guagnano, Delia; Rusconi, Elena; Umiltà, Carlo Arrigo

    2010-03-01

    Several studies showed a Simon effect when two participants sit close to each other and perform one of the two halves of a two-choice RT task. That is, each participant perform a go-nogo task. A Simon effect emerges, which instead is absent when the same go-nogo tasks are performed individually. Hence the terms were introduced of "social Simon task" and 'social Simon effect". As of now, the social Simon effect was observed with social Simon tasks that overtly gave the participants the impression of being performing in collaboration with another person. In the present study we show that the social Simon effect was present also when, in the social Simon task, the two participants did not actually collaborate. It is, however, absent when participants perform the social task outside of each other's peripersonal space (i.e., outside arm-reach). We argue that the social Simon effect does not necessarily imply a representation of the other's action, as previously suggested. The presence of an active confederate in peripersonal space might simply provide a reference for coding one's own action in space.

  15. Executive Meeting of the International Committee on Taxonomy of Viruses

    DTIC Science & Technology

    1991-12-01

    DISTRIBUTION CODE Approved for public release; distribution unlimitedI 13. ABSTRACT (Maxirmum 200 words) 14. SUBJECT TEAMS 1S. NUMBER OF PAGES 16. PRICE CODE ...document from the Executive Committee, and of coordinating the activities of their Study Groups in this task. The chairmen of the Study ..’ty codes ...Directo of the Division of Viral and Rickettsial Diseases welcomed participants to CDC, and as Chairman of the Virology Division of IUMS expressed his

  16. Ethical coding.

    PubMed

    Resnik, Barry I

    2009-01-01

    It is ethical, legal, and proper for a dermatologist to maximize income through proper coding of patient encounters and procedures. The overzealous physician can misinterpret reimbursement requirements or receive bad advice from other physicians and cross the line from aggressive coding to coding fraud. Several of the more common problem areas are discussed.

  17. A Hybrid Procedural/Deductive Executive for Autonomous Spacecraft

    NASA Technical Reports Server (NTRS)

    Pell, Barney; Gamble, Edward B.; Gat, Erann; Kessing, Ron; Kurien, James; Millar, William; Nayak, P. Pandurang; Plaunt, Christian; Williams, Brian C.; Lau, Sonie (Technical Monitor)

    1998-01-01

    The New Millennium Remote Agent (NMRA) will be the first AI system to control an actual spacecraft. The spacecraft domain places a strong premium on autonomy and requires dynamic recoveries and robust concurrent execution, all in the presence of tight real-time deadlines, changing goals, scarce resource constraints, and a wide variety of possible failures. To achieve this level of execution robustness, we have integrated a procedural executive based on generic procedures with a deductive model-based executive. A procedural executive provides sophisticated control constructs such as loops, parallel activity, locks, and synchronization which are used for robust schedule execution, hierarchical task decomposition, and routine configuration management. A deductive executive provides algorithms for sophisticated state inference and optimal failure recover), planning. The integrated executive enables designers to code knowledge via a combination of procedures and declarative models, yielding a rich modeling capability suitable to the challenges of real spacecraft control. The interface between the two executives ensures both that recovery sequences are smoothly merged into high-level schedule execution and that a high degree of reactivity is retained to effectively handle additional failures during recovery.

  18. Comparison of the Eragen Multi-Code Respiratory Virus Panel with Conventional Viral Testing and Real-Time Multiplex PCR Assays for Detection of Respiratory Viruses▿ †

    PubMed Central

    Arens, Max Q.; Buller, Richard S.; Rankin, Anne; Mason, Sheila; Whetsell, Amy; Agapov, Eugene; Lee, Wai-Ming; Storch, Gregory A.

    2010-01-01

    High-throughput multiplex assays for respiratory viruses are an important step forward in diagnostic virology. We compared one such assay, the PLx Multi-Code Respiratory Virus Panel (PLx-RVP), manufactured by Eragen Biosciences, Inc. (Madison, WI), with conventional virologic testing, consisting of fluorescent-antibody staining plus testing with the R-mix system and fibroblast tube cultures. The test set consisted of 410 archived respiratory specimens, mostly nasopharyngeal swabs, including 210 that had been positive by conventional testing for a balanced selection of common respiratory viruses. Specimens yielding discrepant results were evaluated using a panel of respiratory virus PCR assays developed, characterized, and validated with clinical specimens. PLx-RVP increased the total rate of detection of viruses by 35.8%, and there was a 25.7% increase in the rate of detection of positive specimens. Reference PCR assay results corroborated the PLx-RVP result for 54 (82%) of 66 discrepancies with conventional testing. Of the 12 specimens with discrepancies between PLx-RVp and the reference PCRs, 6 were positive for rhinovirus by PLx-RVP and the presence of rhinovirus was confirmed by nucleotide sequencing. The remaining six specimens included five in which the PLx-RVP failed to detect parainfluenza virus and one in which the detection of influenza A virus by PLx-RVP could not be confirmed by the reference PCR. Taking the results of the reference PCR assay results into account, the sensitivities of the PLx-RVP for individual viruses ranged from 94 to 100% and the specificities ranged from 99 to 100%. We conclude that PLx-RVP is a highly accurate system for the detection of respiratory viruses and significantly improves the rate of detection of these viruses compared to that by conventional virologic testing. PMID:20484608

  19. Practices in Code Discoverability: Astrophysics Source Code Library

    NASA Astrophysics Data System (ADS)

    Allen, A.; Teuben, P.; Nemiroff, R. J.; Shamir, L.

    2012-09-01

    Here we describe the Astrophysics Source Code Library (ASCL), which takes an active approach to sharing astrophysics source code. ASCL's editor seeks out both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and adds entries for the found codes to the library. This approach ensures that source codes are added without requiring authors to actively submit them, resulting in a comprehensive listing that covers a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL now has over 340 codes in it and continues to grow. In 2011, the ASCL has on average added 19 codes per month. An advisory committee has been established to provide input and guide the development and expansion of the new site, and a marketing plan has been developed and is being executed. All ASCL source codes have been used to generate results published in or submitted to a refereed journal and are freely available either via a download site or from an identified source. This paper provides the history and description of the ASCL. It lists the requirements for including codes, examines the advantages of the ASCL, and outlines some of its future plans.

  20. Uplink Coding

    NASA Technical Reports Server (NTRS)

    Pollara, Fabrizio; Hamkins, Jon; Dolinar, Sam; Andrews, Ken; Divsalar, Dariush

    2006-01-01

    This viewgraph presentation reviews uplink coding. The purpose and goals of the briefing are (1) Show a plan for using uplink coding and describe benefits (2) Define possible solutions and their applicability to different types of uplink, including emergency uplink (3) Concur with our conclusions so we can embark on a plan to use proposed uplink system (4) Identify the need for the development of appropriate technology and infusion in the DSN (5) Gain advocacy to implement uplink coding in flight projects Action Item EMB04-1-14 -- Show a plan for using uplink coding, including showing where it is useful or not (include discussion of emergency uplink coding).

  1. Executive functions in synesthesia.

    PubMed

    Rouw, Romke; van Driel, Joram; Knip, Koen; Richard Ridderinkhof, K

    2013-03-01

    In grapheme-color synesthesia, a number or letter can evoke two different and possibly conflicting (real and synesthetic) color sensations at the same time. In this study, we investigate the relationship between synesthesia and executive control functions. First, no general skill differences were obtained between synesthetes and non-synesthetes in classic executive control paradigms. Furthermore, classic executive control effects did not interact with synesthetic behavioral effects. Third, we found support for our hypothesis that inhibition of a synesthetic color takes effort and time. Finally, individual differences analyses showed no relationship between the two skills; performance on a 'normal' Stroop task does not predict performance on a synesthetic Stroop task. Across four studies, the current results consistently show no clear relationship between executive control functions and synesthetic behavioral effects. This raises the question of which mechanisms are at play in synesthetic 'management' during the presence of two conflicting (real and synesthetic) sensations. Copyright © 2012 Elsevier Inc. All rights reserved.

  2. Laws and Executive Orders

    EPA Pesticide Factsheets

    Lists and links to descriptions of the major laws and executive orders that EPA administers and/or that guide EPA rulemakings, including the Clean Air Act, the Toxic Substance Control Act, CERCLA or Superfund, and the Clean Water Act.

  3. The Environment for Application Software Integration and Execution (EASIE), version 1.0. Volume 3: Program execution guide

    NASA Technical Reports Server (NTRS)

    Schwing, James L.; Criste, Russell E.; Schwing, James L.; Criste, Russell E.

    1988-01-01

    The Environment for Application Software Integration and Execution, EASIE, provides a methodology and a set of software utility programs to ease the task of coordinating engineering design and analysis codes. EASIE was designed to meet the needs of conceptual design engineers that face the task of integrating the results of many stand-alone engineering analysis programs. EASIE provides access to these programs via a quick, uniform, user-friendly interface. In addition, EASIE provides utilities which aid in the execution of the following tasks: selection of application programs, modification and review of program data, automatic definition and coordination of data files during program execution and a logging of steps executed throughout a design study. Volume 3, the Program Execution Guide, describes the executive capabilities provided by EASIE and defines the command language and menus available under Version 1.0. EASIE provides users with two basic modes of operation. One is the Application-Derived Executive (ADE) which provides users with sufficient guidance to quickly review data, select menu action items, and execute application programs. The second is the Complete Control Executive (CCE), which provides a full executive interface allowing users in-depth control of the design process.

  4. Securing mobile code.

    SciTech Connect

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements

  5. Multiprocessor execution of functional programs

    SciTech Connect

    Goldberg, B.F.

    1988-01-01

    Functional languages have recently gained attention as vehicles for programming in a concise and elegant manner. In addition, it has been suggested that functional programming provides a natural methodology for programming multiprocessor computers. This dissertation demonstrates that multiprocessor execution of functional programs is feasible, and results in a significant reduction in their execution times. Two implementations of the functional language ALFL were built on commercially available multiprocessors. ALFL is an implementation on the Intel iPSC hypercube multiprocessor, and Buckwheat is an implementation on the Encore Multimax shared-memory multiprocessor. Each implementation includes a compiler that performs automatic decomposition of ALFL programs. The compiler is responsible for detecting the inherent parallelism in a program, and decomposing the program into a collection of tasks, called serial combinators, that can be executed in parallel. One of the primary goals of the compiler is to generate serial combinators exhibiting the coarsest granularity possibly without sacrificing useful parallelism. This dissertation describes the algorithms used by the compiler to analyze, decompose, and optimize functional programs. The abstract machine model supported by Alfalfa and Buckwheat is called heterogeneous graph reduction, which is a hybrid of graph reduction and conventional stack-oriented execution. This model supports parallelism, lazy evaluation, and higher order functions while at the same time making efficient use of the processors in the system. The Alfalfa and Buckwheat run-time systems support dynamic load balancing, interprocessor communication (if required) and storage management. A large number of experiments were performed on Alfalfa and Buckwheat for a variety of programs. The results of these experiments, as well as the conclusions drawn from them, are presented.

  6. Shared prefetching to reduce execution skew in multi-threaded systems

    DOEpatents

    Eichenberger, Alexandre E; Gunnels, John A

    2013-07-16

    Mechanisms are provided for optimizing code to perform prefetching of data into a shared memory of a computing device that is shared by a plurality of threads that execute on the computing device. A memory stream of a portion of code that is shared by the plurality of threads is identified. A set of prefetch instructions is distributed across the plurality of threads. Prefetch instructions are inserted into the instruction sequences of the plurality of threads such that each instruction sequence has a separate sub-portion of the set of prefetch instructions, thereby generating optimized code. Executable code is generated based on the optimized code and stored in a storage device. The executable code, when executed, performs the prefetches associated with the distributed set of prefetch instructions in a shared manner across the plurality of threads.

  7. Authorship Attribution of Source Code

    ERIC Educational Resources Information Center

    Tennyson, Matthew F.

    2013-01-01

    Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…

  8. Authorship Attribution of Source Code

    ERIC Educational Resources Information Center

    Tennyson, Matthew F.

    2013-01-01

    Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…

  9. Coding for reliable satellite communications

    NASA Technical Reports Server (NTRS)

    Gaarder, N. T.; Lin, S.

    1986-01-01

    This research project was set up to study various kinds of coding techniques for error control in satellite and space communications for NASA Goddard Space Flight Center. During the project period, researchers investigated the following areas: (1) decoding of Reed-Solomon codes in terms of dual basis; (2) concatenated and cascaded error control coding schemes for satellite and space communications; (3) use of hybrid coding schemes (error correction and detection incorporated with retransmission) to improve system reliability and throughput in satellite communications; (4) good codes for simultaneous error correction and error detection, and (5) error control techniques for ring and star networks.

  10. Sharing code.

    PubMed

    Kubilius, Jonas

    2014-01-01

    Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  11. Educating executive function.

    PubMed

    Blair, Clancy

    2017-01-01

    Executive functions are thinking skills that assist with reasoning, planning, problem solving, and managing one's life. The brain areas that underlie these skills are interconnected with and influenced by activity in many different brain areas, some of which are associated with emotion and stress. One consequence of the stress-specific connections is that executive functions, which help us to organize our thinking, tend to be disrupted when stimulation is too high and we are stressed out, or too low when we are bored and lethargic. Given their central role in reasoning and also in managing stress and emotion, scientists have conducted studies, primarily with adults, to determine whether executive functions can be improved by training. By and large, results have shown that they can be, in part through computer-based videogame-like activities. Evidence of wider, more general benefits from such computer-based training, however, is mixed. Accordingly, scientists have reasoned that training will have wider benefits if it is implemented early, with very young children as the neural circuitry of executive functions is developing, and that it will be most effective if embedded in children's everyday activities. Evidence produced by this research, however, is also mixed. In sum, much remains to be learned about executive function training. Without question, however, continued research on this important topic will yield valuable information about cognitive development. WIREs Cogn Sci 2017, 8:e1403. doi: 10.1002/wcs.1403 For further resources related to this article, please visit the WIREs website.

  12. Event driven executive

    NASA Technical Reports Server (NTRS)

    Tulpule, Bhalchandra R. (Inventor); Collins, Robert E. (Inventor); Cheetham, John (Inventor); Cornwell, Smith (Inventor)

    1990-01-01

    Tasks may be planned for execution on a single processor or are split up by the designer for execution among a plurality of signal processors. The tasks are modeled using a design aid called a precedence graph, from which a dependency table and a prerequisite table are established for reference within each processor. During execution, at the completion of a given task, an end of task interrupt is provided from any processor which has completed a task to any and all other processors including itself in which completion of that task is a prerequisite for commencement of any dependent tasks. The relevant updated data may be transferred by the processor either before or after signalling task completion to the processors needing the updated data prior to commencing execution of the dependent tasks. Coherency may be ensured, however, by sending the data before the interrupt. When the end of task interrupt is received in a processor, its dependency table is consulted to determine those tasks dependent upon completion of the task which has just been signalled as completed, and task dependency signals indicative thereof are provided and stored in a current status list of a prerequisite table. The current status of all current prerequisites are compared to the complete prerequisites listed for all affected tasks and those tasks for which the comparison indicates that all prerequisites have been met are queued for execution in a selected order.

  13. Executive function following child stroke: the impact of lesion location.

    PubMed

    Long, Brian; Spencer-Smith, Megan M; Jacobs, Rani; Mackay, Mark; Leventer, Richard; Barnes, Chris; Anderson, Vicki

    2011-03-01

    Child stroke is a major cause of death in children, although limited information exists on neurobehavioral functioning of stroke survivors. Executive function (important for goal-directed behavior) is thought to be vulnerable to early insults such as stroke because of its widespread representation in the immature brain. This study investigated the impact of lesion location on executive skills. Twenty-eight children diagnosed with stroke at least 18 months before assessment were recruited. Lesion characteristics were coded from magnetic resonance imaging (MRI) scans. Neurobehavioral assessment focused on cognitive and everyday executive skills. Deficits were found in the context of overall normal intellectual functioning (M = 91.60; SD = 19.40). Generally, insults involving frontal and extra-frontal regions impacted equally on cognitive performance. Everyday deficits were marginally more prominent following frontal insult. Subcortical frontal lesions were associated with impairments in everyday executive skills. Results provide further support for the diffuse representation of executive function in the immature brain.

  14. New hybrid peak-to-average power ratio reduction technique based on carrier interferometry codes and companding technique for optical direct-detection orthogonal frequency division multiplexing system

    NASA Astrophysics Data System (ADS)

    Maivan, Lap; He, Jing; Chen, Ming; Mangone, Fall; Chen, Lin

    2014-08-01

    In direct-detection optical orthogonal frequency division multiplexing (OFDM) systems, the high peak-to-average power ratio (PAPR) will cause nonlinear effects in both electrical and optical devices and optical fiber transmission when the nonlinear amplifiers are employed. A new hybrid technique based on carrier interferometry codes and companding transform has been proposed and experimentally demonstrated to reduce the high PAPR in an optical direct-detection optical OFDM system. The proposed technique is then experimentally demonstrated and the results show the effectiveness of the new method. The PAPR of the hybrid signal has been reduced by about 5.7 dB when compared to the regular system at a complementary cumulative distribution function of 10-4. At a bit error rate of 10-4, after transmission over 100-km single-mode fiber with a μ of 2, the receiver sensitivity is improved by 3.7, 4.2, and 5 dB with launch powers of 3, 6, and 9 dBm, respectively.

  15. Magnetic glyco-nanoparticles: a tool to detect, differentiate, and unlock the glyco-codes of cancer via magnetic resonance imaging.

    PubMed

    El-Boubbou, Kheireddine; Zhu, David C; Vasileiou, Chrysoula; Borhan, Babak; Prosperi, Davide; Li, Wei; Huang, Xuefei

    2010-03-31

    Within cancer, there is a large wealth of diversity, complexity, and information that nature has engineered rendering it challenging to identify reliable detection methods. Therefore, the development of simple and effective techniques to delineate the fine characteristics of cancer cells can have great potential impacts on cancer diagnosis and treatment. Herein, we report a magnetic glyco-nanoparticle (MGNP) based nanosensor system bearing carbohydrates as the ligands, not only to detect and differentiate cancer cells but also to quantitatively profile their carbohydrate binding abilities by magnetic resonance imaging (MRI). Using an array of MGNPs, a range of cells including closely related isogenic tumor cells, cells with different metastatic potential and malignant vs normal cells can be readily distinguished based on their respective "MRI signatures". Furthermore, the information obtained from such studies helped guide the establishment of strongly binding MGNPs as antiadhesive agents against tumors. As the interactions between glyco-conjugates and endogenous lectins present on cancer cell surface are crucial for cancer development and metastasis, the ability to characterize and unlock the glyco-code of individual cell lines can facilitate both the understanding of the roles of carbohydrates as well as the expansion of diagnostic and therapeutic tools for cancer.

  16. Investigation on iterative multiuser detection physical layer network coding in two-way relay free-space optical links with turbulences and pointing errors.

    PubMed

    Abu-Almaalie, Zina; Ghassemlooy, Zabih; Bhatnagar, Manav R; Le-Minh, Hoa; Aslam, Nauman; Liaw, Shien-Kuei; Lee, It Ee

    2016-11-20

    Physical layer network coding (PNC) improves the throughput in wireless networks by enabling two nodes to exchange information using a minimum number of time slots. The PNC technique is proposed for two-way relay channel free space optical (TWR-FSO) communications with the aim of maximizing the utilization of network resources. The multipair TWR-FSO is considered in this paper, where a single antenna on each pair seeks to communicate via a common receiver aperture at the relay. Therefore, chip interleaving is adopted as a technique to separate the different transmitted signals at the relay node to perform PNC mapping. Accordingly, this scheme relies on the iterative multiuser technique for detection of users at the receiver. The bit error rate (BER) performance of the proposed system is examined under the combined influences of atmospheric loss, turbulence-induced channel fading, and pointing errors (PEs). By adopting the joint PNC mapping with interleaving and multiuser detection techniques, the BER results show that the proposed scheme can achieve a significant performance improvement against the degrading effects of turbulences and PEs. It is also demonstrated that a larger number of simultaneous users can be supported with this new scheme in establishing a communication link between multiple pairs of nodes in two time slots, thereby improving the channel capacity.

  17. cgpCaVEManWrapper: Simple Execution of CaVEMan in Order to Detect Somatic Single Nucleotide Variants in NGS Data.

    PubMed

    Jones, David; Raine, Keiran M; Davies, Helen; Tarpey, Patrick S; Butler, Adam P; Teague, Jon W; Nik-Zainal, Serena; Campbell, Peter J

    2016-12-08

    CaVEMan is an expectation maximization-based somatic substitution-detection algorithm that is written in C. The algorithm analyzes sequence data from a test sample, such as a tumor relative to a reference normal sample from the same patient and the reference genome. It performs a comparative analysis of the tumor and normal sample to derive a probabilistic estimate for putative somatic substitutions. When combined with a set of validated post-hoc filters, CaVEMan generates a set of somatic substitution calls with high recall and positive predictive value. Here we provide instructions for using a wrapper script called cgpCaVEManWrapper, which runs the CaVEMan algorithm and additional downstream post-hoc filters. We describe both a simple one-shot run of cgpCaVEManWrapper and a more in-depth implementation suited to large-scale compute farms. © 2016 by John Wiley & Sons, Inc.

  18. 12 CFR 1710.14 - Code of conduct and ethics.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 9 2013-01-01 2013-01-01 false Code of conduct and ethics. 1710.14 Section... Code of conduct and ethics. (a) General. An Enterprise shall establish and administer a written code of conduct and ethics that is reasonably designed to assure the ability of board members, executive officers...

  19. 12 CFR 1710.14 - Code of conduct and ethics.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 10 2014-01-01 2014-01-01 false Code of conduct and ethics. 1710.14 Section... Code of conduct and ethics. (a) General. An Enterprise shall establish and administer a written code of conduct and ethics that is reasonably designed to assure the ability of board members, executive officers...

  20. 12 CFR 1710.14 - Code of conduct and ethics.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 7 2011-01-01 2011-01-01 false Code of conduct and ethics. 1710.14 Section... Code of conduct and ethics. (a) General. An Enterprise shall establish and administer a written code of conduct and ethics that is reasonably designed to assure the ability of board members, executive officers...

  1. 12 CFR 1710.14 - Code of conduct and ethics.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 9 2012-01-01 2012-01-01 false Code of conduct and ethics. 1710.14 Section... Code of conduct and ethics. (a) General. An Enterprise shall establish and administer a written code of conduct and ethics that is reasonably designed to assure the ability of board members, executive officers...

  2. DNA codes

    SciTech Connect

    Torney, D. C.

    2001-01-01

    We have begun to characterize a variety of codes, motivated by potential implementation as (quaternary) DNA n-sequences, with letters denoted A, C The first codes we studied are the most reminiscent of conventional group codes. For these codes, Hamming similarity was generalized so that the score for matched letters takes more than one value, depending upon which letters are matched [2]. These codes consist of n-sequences satisfying an upper bound on the similarities, summed over the letter positions, of distinct codewords. We chose similarity 2 for matches of letters A and T and 3 for matches of the letters C and G, providing a rough approximation to double-strand bond energies in DNA. An inherent novelty of DNA codes is 'reverse complementation'. The latter may be defined, as follows, not only for alphabets of size four, but, more generally, for any even-size alphabet. All that is required is a matching of the letters of the alphabet: a partition into pairs. Then, the reverse complement of a codeword is obtained by reversing the order of its letters and replacing each letter by its match. For DNA, the matching is AT/CG because these are the Watson-Crick bonding pairs. Reversal arises because two DNA sequences form a double strand with opposite relative orientations. Thus, as will be described in detail, because in vitro decoding involves the formation of double-stranded DNA from two codewords, it is reasonable to assume - for universal applicability - that the reverse complement of any codeword is also a codeword. In particular, self-reverse complementary codewords are expressly forbidden in reverse-complement codes. Thus, an appropriate distance between all pairs of codewords must, when large, effectively prohibit binding between the respective codewords: to form a double strand. Only reverse-complement pairs of codewords should be able to bind. For most applications, a DNA code is to be bi-partitioned, such that the reverse-complementary pairs are separated

  3. Code Seal v. 2.0

    SciTech Connect

    Chavez, Adrian; Solis, John Hector

    2015-04-19

    CodeSeal is a Sandia National Laboratories developed technology that provides a means of securely obfuscating finite state machines, ARM & x86 instruction sets in a mathematically provable way. The technology was developed in order to provide a solution for antireverse engineering, assured execution, and integrity of execution. CodeSeal accomplishes these goals with the addition of the concept of a trust anchor, a small piece of trust integrated into the system, to the model of code obfuscation. Code Obfuscation is an active area of academic research, but most findings have merely demonstrated that general obfuscation is impossible. By modifying the security model such that we may rely on the presence of a small, temper-protected device, however, Sandia has developed an effective method for obfuscating code.

  4. Embedding Temporal Constraints For Coordinated Execution in Habitat Automation

    NASA Technical Reports Server (NTRS)

    Morris, Paul; Schwabacher, Mark; Dalal, Michael; Fry, Charles

    2013-01-01

    Future NASA plans call for long-duration deep space missions with human crews. Because of light-time delay and other considerations, increased autonomy will be needed. This will necessitate integration of tools in such areas as anomaly detection, diagnosis, planning, and execution. In this paper we investigate an approach that integrates planning and execution by embedding planner-derived temporal constraints in an execution procedure. To avoid the need for propagation, we convert the temporal constraints to dispatchable form. We handle some uncertainty in the durations without it affecting the execution; larger variations may cause activities to be skipped.

  5. Executive Secrecy: Two Perspectives.

    ERIC Educational Resources Information Center

    Florence, William G.; Matthews, Ruth

    Part one of this report describes a serious political restraint on communication regarding government affairs: Executive Order 11652, which provides for the classification and declassification of national security information. Although this order was originally intended to guard against "unauthorized disclosure (which) could reasonably be…

  6. Healthcare. Executive Summary

    ERIC Educational Resources Information Center

    Carnevale, Anthony P.; Smith, Nicole; Gulish, Artem; Beach, Bennett H.

    2012-01-01

    This executive summary highlights several findings about healthcare. These are: (1) Healthcare is 18 percent of the U.S. economy, twice as high as in other countries; (2) There are two labor markets in healthcare: high-skill, high-wage professional and technical jobs and low-skill, low-wage support jobs; (3) Demand for postsecondary education in…

  7. School Executive Website Study

    ERIC Educational Resources Information Center

    Thiede, Robert

    2009-01-01

    The School Executive Website will be a one-stop, online site for officials who are looking for educational data, best practices, product reviews, school documents, professional opinions, and/or job-related networking. The format of the website is designed in certain sections similar to other current and popular websites, such as Angie's List.com,…

  8. Leadership and Executive Development.

    ERIC Educational Resources Information Center

    1997

    This document contains three papers from a symposium on leadership and executive development. "Leading and Managing in a Service Organization: An Examination of Line vs. Staff Effectiveness" (Allan H. Church, Janine Waclawski) presents an analysis of differences in managerial strengths and weaknesses between 45 line managers and 52 human resources…

  9. An Executive Training Program.

    ERIC Educational Resources Information Center

    DeAnda, Natividad

    This manual describes the implementation of the Far West Laboratory's educational research and development management training program for women and minorities and offers guidelines to institutions and industries creating their own internship programs. A chapter on holistic learning for executives analyses a model incorporating a coordinating…

  10. Leadership and Executive Development.

    ERIC Educational Resources Information Center

    1997

    This document contains three papers from a symposium on leadership and executive development. "Leading and Managing in a Service Organization: An Examination of Line vs. Staff Effectiveness" (Allan H. Church, Janine Waclawski) presents an analysis of differences in managerial strengths and weaknesses between 45 line managers and 52 human resources…

  11. Sharing code

    PubMed Central

    Kubilius, Jonas

    2014-01-01

    Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing. PMID:25165519

  12. The cooking task: making a meal of executive functions.

    PubMed

    Doherty, T A; Barker, L A; Denniss, R; Jalil, A; Beer, M D

    2015-01-01

    Current standardized neuropsychological tests may fail to accurately capture real-world executive deficits. We developed a computer-based Cooking Task (CT) assessment of executive functions and trialed the measure with a normative group before use with a head-injured population. Forty-six participants completed the computerized CT and subtests from standardized neuropsychological tasks, including the Tower and Sorting Tests of executive function from the Delis-Kaplan Executive Function System (D-KEFS) and the Cambridge prospective memory test (CAMPROMPT), in order to examine whether standardized executive function tasks, predicted performance on measurement indices from the CT. Findings showed that verbal comprehension, rule detection and prospective memory contributed to measures of prospective planning accuracy and strategy implementation of the CT. Results also showed that functions necessary for cooking efficacy differ as an effect of task demands (difficulty levels). Performance on rule detection, strategy implementation and flexible thinking executive function measures contributed to accuracy on the CT. These findings raise questions about the functions captured by present standardized tasks particularly at varying levels of difficulty and during dual-task performance. Our preliminary findings also indicate that CT measures can effectively distinguish between executive function and Full Scale IQ abilities. Results of the present study indicate that the CT shows promise as an ecologically valid measure of executive function for future use with a head-injured population and indexes selective executive function's captured by standardized tests.

  13. Genome-Wide Detection of Predicted Non-coding RNAs Related to the Adhesion Process in Vibrio alginolyticus Using High-Throughput Sequencing

    PubMed Central

    Huang, Lixing; Hu, Jiao; Su, Yongquan; Qin, Yingxue; Kong, Wendi; Zhao, Lingmin; Ma, Ying; Xu, Xiaojin; Lin, Mao; Zheng, Jiang; Yan, Qingpi

    2016-01-01

    The ability of bacteria to adhere to fish mucus can be affected by environmental conditions and is considered to be a key virulence factor of Vibrio alginolyticus. However, the molecular mechanism underlying this ability remains unclear. Our previous study showed that stress conditions such as exposure to Cu, Pb, Hg, and low pH are capable of reducing the adhesion ability of V. alginolyticus. Non-coding RNAs (ncRNAs) play a crucial role in the intricate regulation of bacterial gene expression, thereby affecting bacterial pathogenicity. Thus, we hypothesized that ncRNAs play a key role in the V. alginolyticus adhesion process. To validate this, we combined high-throughput sequencing with computational techniques to detect ncRNA dynamics in samples after stress treatments. The expression of randomly selected novel ncRNAs was confirmed by QPCR. Among the significantly altered ncRNAs, 30 were up-regulated and 2 down-regulated by all stress treatments. The QPCR results reinforced the reliability of the sequencing data. Target prediction and KEGG pathway analysis indicated that these ncRNAs are closely related to pathways associated with in vitro adhesion, and our results indicated that chemical stress-induced reductions in the adhesion ability of V. alginolyticus might be due to the perturbation of ncRNA expression. Our findings provide important information for further functional characterization of ncRNAs during the adhesion process of V. alginolyticus. PMID:27199948

  14. Detection of genetic diversity and selection at the coding region of the melanocortin receptor 1 (MC1R) gene in Tibetan pigs and Landrace pigs.

    PubMed

    Liu, Rui; Jin, Long; Long, Keren; Chai, Jie; Ma, Jideng; Tang, Qianzi; Tian, Shilin; Hu, Yaodong; Lin, Ling; Wang, Xun; Jiang, Anan; Li, Xuewei; Li, Mingzhou

    2016-01-10

    Domestication and subsequent selective pressures have produced a large variety of pig coat colors in different regions and breeds. The melanocortin 1 receptor (MC1R) gene plays a crucial role in determining coat color of mammals. Here, we investigated genetic diversity and selection at the coding region of the porcine melanocortin receptor 1 (MC1R) in Tibetan pigs and Landrace pigs. By contrast, genetic variability was much lower in Landrace pigs than in Tibetan pigs. Meanwhile, haplotype analysis showed that Tibetan pigs possessed shared haplotypes, suggesting a possibility of recent introgression event by way of crossbreeding with neighboring domestic pigs or shared ancestral polymorphism. Additionally, we detected positive selection at the MC1R in both Tibetan pigs and Landrace pigs through the dN/dS analysis. These findings suggested that novel phenotypic change (dark coat color) caused by novel mutations may help Tibetan pigs against intensive solar ultraviolet (UV) radiation and camouflage in wild environment, whereas white coat color in Landrace were intentionally selected by human after domestication. Furthermore, both the phylogenetic analysis and the network analysis provided clues that MC1R in Asian and European wild boars may have initially experienced different selective pressures, and MC1R alleles diversified in modern domesticated pigs.

  15. Fine-Mapping the HOXB Region Detects Common Variants Tagging a Rare Coding Allele: Evidence for Synthetic Association in Prostate Cancer

    PubMed Central

    Saunders, Edward J.; Dadaev, Tokhir; Leongamornlert, Daniel A.; Jugurnauth-Little, Sarah; Tymrakiewicz, Malgorzata; Wiklund, Fredrik; Al Olama, Ali Amin; Benlloch, Sara; Xu, Jianfeng; Mikropoulos, Christos; Goh, Chee; Govindasami, Koveela; Guy, Michelle; Wilkinson, Rosemary A.; Sawyer, Emma J.; Morgan, Angela; Easton, Douglas F.; Muir, Ken; Eeles, Rosalind A.; Kote-Jarai, Zsofia

    2014-01-01

    The HOXB13 gene has been implicated in prostate cancer (PrCa) susceptibility. We performed a high resolution fine-mapping analysis to comprehensively evaluate the association between common genetic variation across the HOXB genetic locus at 17q21 and PrCa risk. This involved genotyping 700 SNPs using a custom Illumina iSelect array (iCOGS) followed by imputation of 3195 SNPs in 20,440 PrCa cases and 21,469 controls in The PRACTICAL consortium. We identified a cluster of highly correlated common variants situated within or closely upstream of HOXB13 that were significantly associated with PrCa risk, described by rs117576373 (OR 1.30, P = 2.62×10−14). Additional genotyping, conditional regression and haplotype analyses indicated that the newly identified common variants tag a rare, partially correlated coding variant in the HOXB13 gene (G84E, rs138213197), which has been identified recently as a moderate penetrance PrCa susceptibility allele. The potential for GWAS associations detected through common SNPs to be driven by rare causal variants with higher relative risks has long been proposed; however, to our knowledge this is the first experimental evidence for this phenomenon of synthetic association contributing to cancer susceptibility. PMID:24550738

  16. Remote procedure execution software for distributed systems

    SciTech Connect

    Petravick, D.L.; Berman, E.F.; Sergey, G.P.

    1989-05-01

    Remote Procedure Execution facilitates the construction of distributed software systems, spanning computers of various types. Programmers who use the RPX package specify subroutine calls which are to be executed on a remote computer. RPX is used to generate code for dummy routines which transmit input parameters and receive output parameters, as well as a main program which receives procedure call requests, calls the requested procedure, and returns the result. The package automatically performs datatype conversions and uses an appropriate connection oriented protocol. Supported operating systems/processors are VMS(VAX), UNIX(MIPS R2000, R3000) and Software Components Group's pSOS (680x0). Connection oriented protocols are supported over Ethernet (TCP/IP) and RS232 (a package of our own design). 2 refs., 2 figs.

  17. Primer and Analysis to EM-TRANAIR Code Execution

    DTIC Science & Technology

    1990-05-31

    operations of the input processor are: o Process User Input Data o Assemble Configuration and Test for Validity o Define Coupling with Cartesian Grid o...Equations in Three Dimensions: Volume I, Theory Manual " Technical Report AFWAL-TR-87-3082, (1987). [2] CRAY Research Inc., CRAY X-MP and CRAY 1 Computer...Systems, "UPDATE Reference Manual (SR-0013)," 1986. [3] CRAY Research Inc., CRAY X-MP and CRAY 1 Computer Systems, "Segment Leader (SEGLDR) Reference

  18. Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution

    DTIC Science & Technology

    2010-10-01

    concurrently. The users exe- cuted, in a round - robin fashion, a set of five queries over 100 trials. The average length of the queries was 639 bytes...interpreted languages that could benefit from ISR include VBS , Python, and others. 6 SQL Randomization SQL-injection attacks have serious security and

  19. A concatenated coding scheme for error control

    NASA Technical Reports Server (NTRS)

    Lin, S.

    1985-01-01

    A concatenated coding scheme for error contol in data communications was analyzed. The inner code is used for both error correction and detection, however the outer code is used only for error detection. A retransmission is requested if either the inner code decoder fails to make a successful decoding or the outer code decoder detects the presence of errors after the inner code decoding. Probability of undetected error of the proposed scheme is derived. An efficient method for computing this probability is presented. Throughout efficiency of the proposed error control scheme incorporated with a selective repeat ARQ retransmission strategy is analyzed.

  20. What executives should remember.

    PubMed

    Drucker, Peter F

    2006-02-01

    In more than 30 essays for Harvard Business Review, Peter Drucker (1909-2005) urged readers to take on the hard work of thinking--always combined, he insisted, with decisive action. He closely analyzed the phenomenon of knowledge work--the growing call for employees who use their minds rather than their hands--and explained how it challenged the conventional wisdom about the way organizations should be run. He was intrigued by employees who knew more about certain subjects than their bosses or colleagues but who still had to cooperate with others in a large organization. As the business world matured in the second half of the twentieth century, executives came to think that they knew how to run companies--and Drucker took it upon himself to poke holes in their assumptions, lest organizations become stale. But he did so sympathetically, operating from the premise that his readers were intelligent, hardworking people of goodwill. Well suited to HBR's format of practical, idea-based essays for executives, his clear-eyed, humanistic writing enriched the magazine time and again. This article is a compilation of the savviest management advice Drucker offered HBR readers over the years--in short, his greatest hits. It revisits the following insightful, influential contributions: "The Theory of the Business" (September-October 1994), "Managing for Business Effectiveness" (May-June 1963), "What Business Can Learn from Nonprofits" (July-August 1989), "The New Society of Organizations" (September-October 1992), "The Information Executives Truly Need" (January-February 1995), "Managing Oneself" (March-April 1999 republished January 2005), "They're Not Employees, They're People" (February 2002), "What Makes an Effective Executive" (June 2004).

  1. From Verified Models to Verifiable Code

    NASA Technical Reports Server (NTRS)

    Lensink, Leonard; Munoz, Cesar A.; Goodloe, Alwyn E.

    2009-01-01

    Declarative specifications of digital systems often contain parts that can be automatically translated into executable code. Automated code generation may reduce or eliminate the kinds of errors typically introduced through manual code writing. For this approach to be effective, the generated code should be reasonably efficient and, more importantly, verifiable. This paper presents a prototype code generator for the Prototype Verification System (PVS) that translates a subset of PVS functional specifications into an intermediate language and subsequently to multiple target programming languages. Several case studies are presented to illustrate the tool's functionality. The generated code can be analyzed by software verification tools such as verification condition generators, static analyzers, and software model-checkers to increase the confidence that the generated code is correct.

  2. Speech coding

    SciTech Connect

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  3. Arithmetic algorithms for error-coded operands.

    NASA Technical Reports Server (NTRS)

    Avizienis, A.

    1973-01-01

    Arithmetic algorithms for separate and nonseparate codes are considered. The nonseparate AN code is formed when an uncoded operand X is multiplied by the check modulus A to give the coded operand AX. The separate codes are the residue code, and the inverse-residue code, which has significant advantages in fault detection of repeated-use faults. A set of algorithms for low-cost AN-coded operands is discussed together with questions of their implementation in a byte-organized arithmetic processor. Algorithms for inverse-residue coded operands of the STAR computer are also examined.

  4. The Unknown Computer Viruses Detection Based on Similarity

    NASA Astrophysics Data System (ADS)

    Liu, Zhongda; Nakaya, Naoshi; Koui, Yuuji

    New computer viruses are continually being generated and they cause damage all over the world. In general, current anti-virus software detects viruses by matching a pattern based on the signature; thus, unknown viruses without any signature cannot be detected. Although there are some static analysis technologies that do not depend on signatures, virus writers often use code obfuscation techniques, which make it difficult to execute a code analysis. As is generally known, unknown viruses and known viruses share a common feature. In this paper we propose a new static analysis technology that can circumvent code obfuscation to extract the common feature and detect unknown viruses based on similarity. The results of evaluation experiments demonstrated that this technique is able to detect unknown viruses without false positives.

  5. Nature's Code

    NASA Astrophysics Data System (ADS)

    Hill, Vanessa J.; Rowlands, Peter

    2008-10-01

    We propose that the mathematical structures related to the `universal rewrite system' define a universal process applicable to Nature, which we may describe as `Nature's code'. We draw attention here to such concepts as 4 basic units, 64- and 20-unit structures, symmetry-breaking and 5-fold symmetry, chirality, double 3-dimensionality, the double helix, the Van der Waals force and the harmonic oscillator mechanism, and our explanation of how they necessarily lead to self-aggregation, complexity and emergence in higher-order systems. Biological concepts, such as translation, transcription, replication, the genetic code and the grouping of amino acids appear to be driven by fundamental processes of this kind, and it would seem that the Platonic solids, pentagonal symmetry and Fibonacci numbers have significant roles in organizing `Nature's code'.

  6. Show Code.

    PubMed

    Shalev, Daniel

    2017-01-01

    "Let's get one thing straight: there is no such thing as a show code," my attending asserted, pausing for effect. "You either try to resuscitate, or you don't. None of this halfway junk." He spoke so loudly that the two off-service consultants huddled at computers at the end of the unit looked up… We did four rounds of compressions and pushed epinephrine twice. It was not a long code. We did good, strong compressions and coded this man in earnest until the end. Toward the final round, though, as I stepped up to do compressions, my attending looked at me in a deep way. It was a look in between willing me as some object under his command and revealing to me everything that lay within his brash, confident surface but could not be spoken. © 2017 The Hastings Center.

  7. Multispin Coding Technique for Nonequilibrium Reweighting

    NASA Astrophysics Data System (ADS)

    Lee, Hwee Kuan; Okabe, Yutaka

    We present the multispin coding for the nonequilibrium reweighting method of the Monte Carlo simulation, that was developed by the present authors. As an illustration, we treat the driven diffusive lattice gas model. We use the multispin coding technique both for the spin update and for the calculation of the histogram of incremental weights, which is needed in the calculation of nonequilibrium reweighting. All the operations are executed by the bitwise logical commands.

  8. Design of Cyber Attack Precursor Symptom Detection Algorithm through System Base Behavior Analysis and Memory Monitoring

    NASA Astrophysics Data System (ADS)

    Jung, Sungmo; Kim, Jong Hyun; Cagalaban, Giovanni; Lim, Ji-Hoon; Kim, Seoksoo

    More recently, botnet-based cyber attacks, including a spam mail or a DDos attack, have sharply increased, which poses a fatal threat to Internet services. At present, antivirus businesses make it top priority to detect malicious code in the shortest time possible (Lv.2), based on the graph showing a relation between spread of malicious code and time, which allows them to detect after malicious code occurs. Despite early detection, however, it is not possible to prevent malicious code from occurring. Thus, we have developed an algorithm that can detect precursor symptoms at Lv.1 to prevent a cyber attack using an evasion method of 'an executing environment aware attack' by analyzing system behaviors and monitoring memory.

  9. Income, neural executive processes, and preschool children's executive control.

    PubMed

    Ruberry, Erika J; Lengua, Liliana J; Crocker, Leanna Harris; Bruce, Jacqueline; Upshaw, Michaela B; Sommerville, Jessica A

    2017-02-01

    This study aimed to specify the neural mechanisms underlying the link between low household income and diminished executive control in the preschool period. Specifically, we examined whether individual differences in the neural processes associated with executive attention and inhibitory control accounted for income differences observed in performance on a neuropsychological battery of executive control tasks. The study utilized a sample of preschool-aged children (N = 118) whose families represented the full range of income, with 32% of families at/near poverty, 32% lower income, and 36% middle to upper income. Children completed a neuropsychological battery of executive control tasks and then completed two computerized executive control tasks while EEG data were collected. We predicted that differences in the event-related potential (ERP) correlates of executive attention and inhibitory control would account for income differences observed on the executive control battery. Income and ERP measures were related to performance on the executive control battery. However, income was unrelated to ERP measures. The findings suggest that income differences observed in executive control during the preschool period might relate to processes other than executive attention and inhibitory control.

  10. QR Codes

    ERIC Educational Resources Information Center

    Lai, Hsin-Chih; Chang, Chun-Yen; Li, Wen-Shiane; Fan, Yu-Lin; Wu, Ying-Tien

    2013-01-01

    This study presents an m-learning method that incorporates Integrated Quick Response (QR) codes. This learning method not only achieves the objectives of outdoor education, but it also increases applications of Cognitive Theory of Multimedia Learning (CTML) (Mayer, 2001) in m-learning for practical use in a diverse range of outdoor locations. When…

  11. QR Codes

    ERIC Educational Resources Information Center

    Lai, Hsin-Chih; Chang, Chun-Yen; Li, Wen-Shiane; Fan, Yu-Lin; Wu, Ying-Tien

    2013-01-01

    This study presents an m-learning method that incorporates Integrated Quick Response (QR) codes. This learning method not only achieves the objectives of outdoor education, but it also increases applications of Cognitive Theory of Multimedia Learning (CTML) (Mayer, 2001) in m-learning for practical use in a diverse range of outdoor locations. When…

  12. Uplink Coding

    NASA Technical Reports Server (NTRS)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the objectives, meeting goals and overall NASA goals for the NASA Data Standards Working Group. The presentation includes information on the technical progress surrounding the objective, short LDPC codes, and the general results on the Pu-Pw tradeoff.

  13. Benchmarking Query Execution Robustness

    NASA Astrophysics Data System (ADS)

    Wiener, Janet L.; Kuno, Harumi; Graefe, Goetz

    Benchmarks that focus on running queries on a well-tuned database system ignore a long-standing problem: adverse runtime conditions can cause database system performance to vary widely and unexpectedly. When the query execution engine does not exhibit resilience to these adverse conditions, addressing the resultant performance problems can contribute significantly to the total cost of ownership for a database system in over-provisioning, lost efficiency, and increased human administrative costs. For example, focused human effort may be needed to manually invoke workload management actions or fine-tune the optimization of specific queries.

  14. 2009 Munitions Executive Summit

    DTIC Science & Technology

    2009-02-05

    Munitions Executive Summit “Re- Shaping the Munitions Enterprise” New Orleans, LA February 3 - 5, 2009 Conference Agenda MONDAY, FEBRUARY 4, 2009 PEO...155mm Infrared Illuminating Projectile • USMC Urgent Need Spring’08 • In Theater by June’08 3 Industry Support • Industry Partnering – Mortar Primer...Conference 2009 1300 Wilson Boulevard, Suite 320 Arlington, VA 22209 (703) 504‐9300 pchao@rsadvisors.net FEBRUARY 5, 2009 RE‐ SHAPING  THE MUNITIONS

  15. Directly Executed Languages.

    DTIC Science & Technology

    2014-09-26

    Architecture 2 1.1 An Evaluation of Adept-A Pascal Based Architecture 2 1.2 A Microprocessor Implementation of a DCA 2 1.3 The Instruction Bandwidth of...Direct Correspondence Architectures 3 1.4 Memory Hierarchies for Directly Executed Language Microprocessors 3 2 Architectural Analysis 4 3 Concurrent...reduction: 3.46 I data read reduction (in bytes): 5.42 "-data write reduction (in bytes): 14.72 A microprocessor based implementation of a Pascal-based DCA

  16. Discovering of execution patterns of subprograms in execution traces

    NASA Astrophysics Data System (ADS)

    Komorowski, Michał

    2015-09-01

    This article describes an approach to the analysis of historical debuggers logs (execution traces). Historical debuggers are tools that provide insight into the history of programs execution. The author focuses on finding execution patterns of subprograms in these logs in an efficient way and proposes a method of visualising them. Execution patterns are a form of automatically generated specification/documentation of software which show usage of subprograms. In order to discover them in execution traces an existing algorithm was adapted. This algorithm is based on suffix arrays and it finds patterns in text application logs in the linear time with the respect to the length of logs. Additionally, Extended Call Graphs were introduced to visualise the execution patterns. They contain more information in comparison with standard call graphs.

  17. Production code control system for hydrodynamics simulations

    SciTech Connect

    Slone, D.M.

    1997-08-18

    We describe how the Production Code Control System (pCCS), written in Perl, has been used to control and monitor the execution of a large hydrodynamics simulation code in a production environment. We have been able to integrate new, disparate, and often independent, applications into the PCCS framework without the need to modify any of our existing application codes. Both users and code developers see a consistent interface to the simulation code and associated applications regardless of the physical platform, whether an MPP, SMP, server, or desktop workstation. We will also describe our use of Perl to develop a configuration management system for the simulation code, as well as a code usage database and report generator. We used Perl to write a backplane that allows us plug in preprocessors, the hydrocode, postprocessors, visualization tools, persistent storage requests, and other codes. We need only teach PCCS a minimal amount about any new tool or code to essentially plug it in and make it usable to the hydrocode. PCCS has made it easier to link together disparate codes, since using Perl has removed the need to learn the idiosyncrasies of system or RPC programming. The text handling in Perl makes it easy to teach PCCS about new codes, or changes to existing codes.

  18. Relations between Short-term Memory Deficits, Semantic Processing, and Executive Function

    PubMed Central

    Allen, Corinne M.; Martin, Randi C.; Martin, Nadine

    2012-01-01

    Background Previous research has suggested separable short-term memory (STM) buffers for the maintenance of phonological and lexical-semantic information, as some patients with aphasia show better ability to retain semantic than phonological information and others show the reverse. Recently, researchers have proposed that deficits to the maintenance of semantic information in STM are related to executive control abilities. Aims The present study investigated the relationship of executive function abilities with semantic and phonological short-term memory (STM) and semantic processing in such patients, as some previous research has suggested that semantic STM deficits and semantic processing abilities are critically related to specific or general executive function deficits. Method and Procedures 20 patients with aphasia and STM deficits were tested on measures of short-term retention, semantic processing, and both complex and simple executive function tasks. Outcome and Results In correlational analyses, we found no relation between semantic STM and performance on simple or complex executive function tasks. In contrast, phonological STM was related to executive function performance in tasks that had a verbal component, suggesting that performance in some executive function tasks depends on maintaining or rehearsing phonological codes. Although semantic STM was not related to executive function ability, performance on semantic processing tasks was related to executive function, perhaps due to similar executive task requirements in both semantic processing and executive function tasks. Conclusions Implications for treatment and interpretations of executive deficits are discussed. PMID:22736889

  19. Upgrades to NRLMOL code

    NASA Astrophysics Data System (ADS)

    Basurto, Luis

    This project consists of performing upgrades to the massively parallel NRLMOL electronic structure code in order to enhance its performance by increasing its flexibility by: a) Utilizing dynamically allocated arrays, b) Executing in a parallel environment sections of the program that were previously executed in a serial mode, c) Exploring simultaneous concurrent executions of the program through the use of an already existing MPI environment; thus enabling the simulation of larger systems than it is currently capable of performing. Also developed was a graphical user interface that will allow less experienced users to start performing electronic structure calculations by aiding them in performing the necessary configuration of input files as well as providing graphical tools for the displaying and analysis of results. Additionally, a computational toolkit that can avail of large supercomputers and make use of various levels of approximation for atomic interactions was developed to search for stable atomic clusters and predict novel stable endohedral fullerenes. As an application of the developed computational toolkit, a search was conducted for stable isomers of Sc3N C80 fullerene. In this search, about 1.2 million isomers of C80 were optimized in various charged states at the PM6 level. Subsequently, using the selected optimized isomers of C80 in various charged state, about 10,000 isomers of Sc3N C80 were constructed which were optimized using semi-empirical PM6 quantum chemical method. A few selected lowest isomers of Sc3N C80 were optimized at the DFT level. The calculation confirms the lowest 3 isomers previously reported in literature but 4 new isomers are found within the lowest 10 isomers. Using the upgraded NRLMOL code, a study was done of the electronic structure of a multichromoric molecular complex containing two of each borondipyrromethane dye, Zn-tetraphenyl-porphyrin, bisphenyl anthracene and a fullerene. A systematic examination of the effect of

  20. Parallelized direct execution simulation of message-passing parallel programs

    NASA Technical Reports Server (NTRS)

    Dickens, Phillip M.; Heidelberger, Philip; Nicol, David M.

    1994-01-01

    As massively parallel computers proliferate, there is growing interest in findings ways by which performance of massively parallel codes can be efficiently predicted. This problem arises in diverse contexts such as parallelizing computers, parallel performance monitoring, and parallel algorithm development. In this paper we describe one solution where one directly executes the application code, but uses a discrete-event simulator to model details of the presumed parallel machine such as operating system and communication network behavior. Because this approach is computationally expensive, we are interested in its own parallelization specifically the parallelization of the discrete-event simulator. We describe methods suitable for parallelized direct execution simulation of message-passing parallel programs, and report on the performance of such a system, Large Application Parallel Simulation Environment (LAPSE), we have built on the Intel Paragon. On all codes measured to date, LAPSE predicts performance well typically within 10 percent relative error. Depending on the nature of the application code, we have observed low slowdowns (relative to natively executing code) and high relative speedups using up to 64 processors.

  1. Translating expert system rules into Ada code with validation and verification

    NASA Technical Reports Server (NTRS)

    Becker, Lee; Duckworth, R. James; Green, Peter; Michalson, Bill; Gosselin, Dave; Nainani, Krishan; Pease, Adam

    1991-01-01

    The purpose of this ongoing research and development program is to develop software tools which enable the rapid development, upgrading, and maintenance of embedded real-time artificial intelligence systems. The goals of this phase of the research were to investigate the feasibility of developing software tools which automatically translate expert system rules into Ada code and develop methods for performing validation and verification testing of the resultant expert system. A prototype system was demonstrated which automatically translated rules from an Air Force expert system was demonstrated which detected errors in the execution of the resultant system. The method and prototype tools for converting AI representations into Ada code by converting the rules into Ada code modules and then linking them with an Activation Framework based run-time environment to form an executable load module are discussed. This method is based upon the use of Evidence Flow Graphs which are a data flow representation for intelligent systems. The development of prototype test generation and evaluation software which was used to test the resultant code is discussed. This testing was performed automatically using Monte-Carlo techniques based upon a constraint based description of the required performance for the system.

  2. PANEL CODE FOR PLANAR CASCADES

    NASA Technical Reports Server (NTRS)

    Mcfarland, E. R.

    1994-01-01

    The Panel Code for Planar Cascades was developed as an aid for the designer of turbomachinery blade rows. The effective design of turbomachinery blade rows relies on the use of computer codes to model the flow on blade-to-blade surfaces. Most of the currently used codes model the flow as inviscid, irrotational, and compressible with solutions being obtained by finite difference or finite element numerical techniques. While these codes can yield very accurate solutions, they usually require an experienced user to manipulate input data and control parameters. Also, they often limit a designer in the types of blade geometries, cascade configurations, and flow conditions that can be considered. The Panel Code for Planar Cascades accelerates the design process and gives the designer more freedom in developing blade shapes by offering a simple blade-to-blade flow code. Panel, or integral equation, solution techniques have been used for several years by external aerodynamicists who have developed and refined them into a primary design tool of the aircraft industry. The Panel Code for Planar Cascades adapts these same techniques to provide a versatile, stable, and efficient calculation scheme for internal flow. The code calculates the compressible, inviscid, irrotational flow through a planar cascade of arbitrary blade shapes. Since the panel solution technique is for incompressible flow, a compressibility correction is introduced to account for compressible flow effects. The analysis is limited to flow conditions in the subsonic and shock-free transonic range. Input to the code consists of inlet flow conditions, blade geometry data, and simple control parameters. Output includes flow parameters at selected control points. This program is written in FORTRAN IV for batch execution and has been implemented on an IBM 370 series computer with a central memory requirement of approximately 590K of 8 bit bytes. This program was developed in 1982.

  3. Circular codes, symmetries and transformations.

    PubMed

    Fimmel, Elena; Giannerini, Simone; Gonzalez, Diego Luis; Strüngmann, Lutz

    2015-06-01

    Circular codes, putative remnants of primeval comma-free codes, have gained considerable attention in the last years. In fact they represent a second kind of genetic code potentially involved in detecting and maintaining the normal reading frame in protein coding sequences. The discovering of an universal code across species suggested many theoretical and experimental questions. However, there is a key aspect that relates circular codes to symmetries and transformations that remains to a large extent unexplored. In this article we aim at addressing the issue by studying the symmetries and transformations that connect different circular codes. The main result is that the class of 216 C3 maximal self-complementary codes can be partitioned into 27 equivalence classes defined by a particular set of transformations. We show that such transformations can be put in a group theoretic framework with an intuitive geometric interpretation. More general mathematical results about symmetry transformations which are valid for any kind of circular codes are also presented. Our results pave the way to the study of the biological consequences of the mathematical structure behind circular codes and contribute to shed light on the evolutionary steps that led to the observed symmetries of present codes.

  4. On Nondeterministic Workflow Executions

    NASA Astrophysics Data System (ADS)

    Potapova, Alexandra; Su, Jianwen

    The ability to compose existing services to form new functionality is one of the most promising ideas enabled by SOA and the framework of (web) services. A composition or a workflow often involves services distributed over a network and possibly many organizations and administrative domains. Nondeterminism could occur in a composition in at least two ways. The first form is the result of modeling abstraction that hides the detail information and thus makes the "computation" appear non-deterministic. The second form is closely related to "operational optimization", e.g., one may try to invoke more than multiple services for a task, whichever completes first will produce the result and preempts all other services. In this paper, we focus on the latter and measure the complexity of service execution as the amount of needed resources and controlling mechanism for executing nondeterministic service compositions. We formalize the model and complexity problem and develop technical results for this problem in the general setting as well as special cases.

  5. The Cheerleaders' Mock Execution

    ERIC Educational Resources Information Center

    Trujillo-Jenks, Laura

    2011-01-01

    The fervor of student speech is demonstrated through different mediums and venues in public schools. In this case, a new principal encounters the mores of a community that believes in free speech, specifically student free speech. When a pep rally becomes a venue for hate speech, terroristic threats, and profanity, the student code of conduct…

  6. The Cheerleaders' Mock Execution

    ERIC Educational Resources Information Center

    Trujillo-Jenks, Laura

    2011-01-01

    The fervor of student speech is demonstrated through different mediums and venues in public schools. In this case, a new principal encounters the mores of a community that believes in free speech, specifically student free speech. When a pep rally becomes a venue for hate speech, terroristic threats, and profanity, the student code of conduct…

  7. Code query by example

    NASA Astrophysics Data System (ADS)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  8. Executive control in language processing.

    PubMed

    Ye, Zheng; Zhou, Xiaolin

    2009-09-01

    During communication, speakers and listeners need the mechanisms of executive control to organize thoughts and actions along internal goals. Speakers may use executive functions to select the right word over competing alternatives to refer to the concept in mind. Listeners may use executive functions to coordinate the outputs of multiple linguistic processes to reach a coherent interpretation of what others say. Bilinguals may use executive functions to control which language is to use or to switch from one language to another. The control mechanisms recruited in language processing may be similar to those recruited in perception and attention, supported by a network of frontal, parietal and sub-cortical brain structures. Here we review existing evidences regarding the involvement of domain-general executive control in language processing. We will explain how executive functions are employed to control interference in comprehension and production, within and across languages.

  9. TRAPEDS: Producing traces for multicomputers via execution-driven simulation

    NASA Technical Reports Server (NTRS)

    Stunkel, Craig B.; Fuchs, W. Kent

    1988-01-01

    Trace-driven simulation is an important aid in performance analysis of computer systems. Capturing address traces for these simulations is a difficult problem for single processors and particularly for multicomputers. Even when existing trace methods can be used on multicomputers, the amount of collected data typically grows with the number of processors, so I/O and trace storage costs increase. A new technique is presented which modifies the executable code to dynamically collect the address trace from the user code and analyzes this trace during the execution of the program. This method helps resolve the I/O and storage problems and facilitates parallel analysis of the address trace. If a trace stored on disk is desired, the generated trace information can also be written to files during execution, with a resultant drop in program execution speed. An initial implementation on the Intel iPSC/2 hypercube multicomputer is detailed, and sample simulation results are presented. The effect of this trace collection method on execution time is illustrated.

  10. Error coding simulations

    NASA Technical Reports Server (NTRS)

    Noble, Viveca K.

    1993-01-01

    There are various elements such as radio frequency interference (RFI) which may induce errors in data being transmitted via a satellite communication link. When a transmission is affected by interference or other error-causing elements, the transmitted data becomes indecipherable. It becomes necessary to implement techniques to recover from these disturbances. The objective of this research is to develop software which simulates error control circuits and evaluate the performance of these modules in various bit error rate environments. The results of the evaluation provide the engineer with information which helps determine the optimal error control scheme. The Consultative Committee for Space Data Systems (CCSDS) recommends the use of Reed-Solomon (RS) and convolutional encoders and Viterbi and RS decoders for error correction. The use of forward error correction techniques greatly reduces the received signal to noise needed for a certain desired bit error rate. The use of concatenated coding, e.g. inner convolutional code and outer RS code, provides even greater coding gain. The 16-bit cyclic redundancy check (CRC) code is recommended by CCSDS for error detection.

  11. Plan Execution Interchange Language (PLEXIL)

    NASA Technical Reports Server (NTRS)

    Estlin, Tara; Jonsson, Ari; Pasareanu, Corina; Simmons, Reid; Tso, Kam; Verma, Vandi

    2006-01-01

    Plan execution is a cornerstone of spacecraft operations, irrespective of whether the plans to be executed are generated on board the spacecraft or on the ground. Plan execution frameworks vary greatly, due to both different capabilities of the execution systems, and relations to associated decision-making frameworks. The latter dependency has made the reuse of execution and planning frameworks more difficult, and has all but precluded information sharing between different execution and decision-making systems. As a step in the direction of addressing some of these issues, a general plan execution language, called the Plan Execution Interchange Language (PLEXIL), is being developed. PLEXIL is capable of expressing concepts used by many high-level automated planners and hence provides an interface to multiple planners. PLEXIL includes a domain description that specifies command types, expansions, constraints, etc., as well as feedback to the higher-level decision-making capabilities. This document describes the grammar and semantics of PLEXIL. It includes a graphical depiction of this grammar and illustrative rover scenarios. It also outlines ongoing work on implementing a universal execution system, based on PLEXIL, using state-of-the-art rover functional interfaces and planners as test cases.

  12. Executing Temporal Networks With Uncertainty

    NASA Technical Reports Server (NTRS)

    Morris, Paul; Muscettola, Nicola

    2000-01-01

    Simple Temporal Networks (STNs) have proved useful in applications that involve metric time. However, many applications involve events whose timing is uncertain in the sense that it is not controlled by the execution agent. In this paper we consider execution algorithms for temporal networks with events of uncertain duration. We present two such algorithms. The first retains maximum flexibility, but requires potentially costly updates during execution. The second surrenders some flexibility in order to obtain a fast execution comparable to that available for ordinary STNs.

  13. The Astrophysics Source Code Library: An Update

    NASA Astrophysics Data System (ADS)

    Allen, Alice; Nemiroff, R. J.; Shamir, L.; Teuben, P. J.

    2012-01-01

    The Astrophysics Source Code Library (ASCL), founded in 1999, takes an active approach to sharing astrophysical source code. ASCL's editor seeks out both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and adds entries for the found codes to the library. This approach ensures that source codes are added without requiring authors to actively submit them, resulting in a comprehensive listing that covers a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL moved to a new location in 2010, and has over 300 codes in it and continues to grow. In 2011, the ASCL (http://asterisk.apod.com/viewforum.php?f=35) has on average added 19 new codes per month; we encourage scientists to submit their codes for inclusion. An advisory committee has been established to provide input and guide the development and expansion of its new site, and a marketing plan has been developed and is being executed. All ASCL source codes have been used to generate results published in or submitted to a refereed journal and are freely available either via a download site or from an identified source. This presentation covers the history of the ASCL and examines the current state and benefits of the ASCL, the means of and requirements for including codes, and outlines its future plans.

  14. Two executives, one career.

    PubMed

    Cunningham, Cynthia R; Murray, Shelley S

    2005-02-01

    For six years, Cynthia Cunningham and Shelley Murray shared an executive job at Fleet Bank. One desk, one chair, one computer, one telephone, and one voice-mail account. To their clients and colleagues, they were effectively one person, though one person with the strengths and ideas of two, seamlessly handing projects back and forth. Although their department was dissolved after the bank merged with Bank of America, the two continue to consider themselves a package-they have one resume, and they are seeking their next opportunity together. Their choice to share a job was not only a quality-of-life decision but one intended to keep their careers on course: "Taking two separate part-time jobs would have thrown us completely off track" they write in this first-person account."We're both ambitious people, and neither of us wanted just a job. We wanted careers" In this article, the two highly motivated women reveal their determination to manage the demands of both family and career. Flextime,telecommuting, and compressed workweeks are just some of the options open to executives seeking greater work/ life balance, and the job share, as described by Cunningham and Murray, could well be the next solution for those wishing to avoid major trade-offs between their personal and professional lives. Cunningham and Murray describe in vivid detail how they structured their unusual arrangement, how they sold themselves to management, and the hurdles they faced along the way. Theirs is a win-win story, for the company and for them.

  15. Executive Education: Predicting Student Success in Executive MBA Programs

    ERIC Educational Resources Information Center

    Siegert, Kara O.

    2008-01-01

    Applicants to executive education programs have increased over recent years. Previous researchers had not thoroughly examined admission procedures related to the selection of applicants. In this study, the author examined common admission requirements that researchers and educators have used to predict success in 22 unique executive education…

  16. Higher-Performance Executives: Bringing Executive Development Programs Into Balance

    ERIC Educational Resources Information Center

    Gilad, Benjamin; Chussil, Mark

    2013-01-01

    Executive development programs teach various skills deemed important in future leaders and help shape future leadership and its performance. However, they are often excessively focused on competencies required for dealing with internal issues and relationships. They do a much less admirable job preparing future executives for the unique skills…

  17. Executive Education: Predicting Student Success in Executive MBA Programs

    ERIC Educational Resources Information Center

    Siegert, Kara O.

    2008-01-01

    Applicants to executive education programs have increased over recent years. Previous researchers had not thoroughly examined admission procedures related to the selection of applicants. In this study, the author examined common admission requirements that researchers and educators have used to predict success in 22 unique executive education…

  18. Higher-Performance Executives: Bringing Executive Development Programs Into Balance

    ERIC Educational Resources Information Center

    Gilad, Benjamin; Chussil, Mark

    2013-01-01

    Executive development programs teach various skills deemed important in future leaders and help shape future leadership and its performance. However, they are often excessively focused on competencies required for dealing with internal issues and relationships. They do a much less admirable job preparing future executives for the unique skills…

  19. Model-free execution monitoring in behavior-based robotics.

    PubMed

    Pettersson, Ola; Karlsson, Lars; Saffiotti, Alessandro

    2007-08-01

    In the near future, autonomous mobile robots are expected to help humans by performing service tasks in many different areas, including personal assistance, transportation, cleaning, mining, or agriculture. In order to manage these tasks in a changing and partially unpredictable environment without the aid of humans, the robot must have the ability to plan its actions and to execute them robustly and safely. The robot must also have the ability to detect when the execution does not proceed as planned and to correctly identify the causes of the failure. An execution monitoring system allows the robot to detect and classify these failures. Most current approaches to execution monitoring in robotics are based on the idea of predicting the outcomes of the robot's actions by using some sort of predictive model and comparing the predicted outcomes with the observed ones. In contrary, this paper explores the use of model-free approaches to execution monitoring, that is, approaches that do not use predictive models. In this paper, we show that pattern recognition techniques can be applied to realize model-free execution monitoring by classifying observed behavioral patterns into normal or faulty execution. We investigate the use of several such techniques and verify their utility in a number of experiments involving the navigation of a mobile robot in indoor environments.

  20. Execution time support for scientific programs on distributed memory machines

    NASA Technical Reports Server (NTRS)

    Berryman, Harry; Saltz, Joel; Scroggs, Jeffrey

    1990-01-01

    Optimizations are considered that are required for efficient execution of code segments that consists of loops over distributed data structures. The PARTI (Parallel Automated Runtime Toolkit at ICASE) execution time primitives are designed to carry out these optimizations and can be used to implement a wide range of scientific algorithms on distributed memory machines. These primitives allow the user to control array mappings in a way that gives an appearance of shared memory. Computations can be based on a global index set. Primitives are used to carry out gather and scatter operations on distributed arrays. Communications patterns are derived at runtime, and the appropriate send and receive messages are automatically generated.

  1. An improved algorithm for evaluating trellis phase codes

    NASA Technical Reports Server (NTRS)

    Mulligan, M. G.; Wilson, S. G.

    1984-01-01

    A method is described for evaluating the minimum distance parameters of trellis phase codes, including CPFSK, partial response FM, and more importantly, coded CPM (continuous phase modulation) schemes. The algorithm provides dramatically faster execution times and lesser memory requirements than previous algorithms. Results of sample calculations and timing comparisons are included.

  2. An improved algorithm for evaluating trellis phase codes

    NASA Technical Reports Server (NTRS)

    Mulligan, M. G.; Wilson, S. G.

    1982-01-01

    A method is described for evaluating the minimum distance parameters of trellis phase codes, including CPFSK, partial response FM, and more importantly, coded CPM (continuous phase modulation) schemes. The algorithm provides dramatically faster execution times and lesser memory requirements than previous algorithms. Results of sample calculations and timing comparisons are included.

  3. Effects of Acute Laboratory Stress on Executive Functions

    PubMed Central

    Starcke, Katrin; Wiesen, Carina; Trotzke, Patrick; Brand, Matthias

    2016-01-01

    Recent research indicates that stress can affect executive functioning. However, previous results are mixed with respect to the direction and size of effects, especially when considering different subcomponents of executive functions. The current study systematically investigates the effects of stress on the five components of executive functions proposed by Smith and Jonides (1999): attention and inhibition; task management; planning; monitoring; and coding. Healthy participants (N = 40) were either exposed to the computerized version of the Paced Auditory Serial Addition Test as a stressor (N = 20), or to a rest condition (N = 20). Stress reactions were assessed with heart rate and subjective measures. After the experimental manipulation, all participants performed tasks that measure the different executive functions. The manipulation check indicates that stress induction was successful (i.e., the stress group showed a higher heart rate and higher subjective responses than the control group). The main results demonstrate that stressed participants show a poorer performance compared with unstressed participants in all executive subcomponents, with the exception of monitoring. Effect sizes for the tasks that reveal differences between stressed and unstressed participants are high. We conclude that the laboratory stressor used here overall reduced executive functioning. PMID:27065926

  4. Effects of Acute Laboratory Stress on Executive Functions.

    PubMed

    Starcke, Katrin; Wiesen, Carina; Trotzke, Patrick; Brand, Matthias

    2016-01-01

    Recent research indicates that stress can affect executive functioning. However, previous results are mixed with respect to the direction and size of effects, especially when considering different subcomponents of executive functions. The current study systematically investigates the effects of stress on the five components of executive functions proposed by Smith and Jonides (1999): attention and inhibition; task management; planning; monitoring; and coding. Healthy participants (N = 40) were either exposed to the computerized version of the Paced Auditory Serial Addition Test as a stressor (N = 20), or to a rest condition (N = 20). Stress reactions were assessed with heart rate and subjective measures. After the experimental manipulation, all participants performed tasks that measure the different executive functions. The manipulation check indicates that stress induction was successful (i.e., the stress group showed a higher heart rate and higher subjective responses than the control group). The main results demonstrate that stressed participants show a poorer performance compared with unstressed participants in all executive subcomponents, with the exception of monitoring. Effect sizes for the tasks that reveal differences between stressed and unstressed participants are high. We conclude that the laboratory stressor used here overall reduced executive functioning.

  5. MACSE: Multiple Alignment of Coding SEquences accounting for frameshifts and stop codons.

    PubMed

    Ranwez, Vincent; Harispe, Sébastien; Delsuc, Frédéric; Douzery, Emmanuel J P

    2011-01-01

    Until now the most efficient solution to align nucleotide sequences containing open reading frames was to use indirect procedures that align amino acid translation before reporting the inferred gap positions at the codon level. There are two important pitfalls with this approach. Firstly, any premature stop codon impedes using such a strategy. Secondly, each sequence is translated with the same reading frame from beginning to end, so that the presence of a single additional nucleotide leads to both aberrant translation and alignment.We present an algorithm that has the same space and time complexity as the classical Needleman-Wunsch algorithm while accommodating sequencing errors and other biological deviations from the coding frame. The resulting pairwise coding sequence alignment method was extended to a multiple sequence alignment (MSA) algorithm implemented in a program called MACSE (Multiple Alignment of Coding SEquences accounting for frameshifts and stop codons). MACSE is the first automatic solution to align protein-coding gene datasets containing non-functional sequences (pseudogenes) without disrupting the underlying codon structure. It has also proved useful in detecting undocumented frameshifts in public database sequences and in aligning next-generation sequencing reads/contigs against a reference coding sequence.MACSE is distributed as an open-source java file executable with freely available source code and can be used via a web interface at: http://mbb.univ-montp2.fr/macse.

  6. Transversal Clifford gates on folded surface codes

    NASA Astrophysics Data System (ADS)

    Moussa, Jonathan E.

    2016-10-01

    Surface and color codes are two forms of topological quantum error correction in two spatial dimensions with complementary properties. Surface codes have lower-depth error detection circuits and well-developed decoders to interpret and correct errors, while color codes have transversal Clifford gates and better code efficiency in the number of physical qubits needed to achieve a given code distance. A formal equivalence exists between color codes and folded surface codes, but it does not guarantee the transferability of any of these favorable properties. However, the equivalence does imply the existence of constant-depth circuit implementations of logical Clifford gates on folded surface codes. We achieve and improve this result by constructing two families of folded surface codes with transversal Clifford gates. This construction is presented generally for qudits of any dimension. The specific application of these codes to universal quantum computation based on qubit fusion is also discussed.

  7. Transversal Clifford gates on folded surface codes

    SciTech Connect

    Moussa, Jonathan E.

    2016-10-12

    Surface and color codes are two forms of topological quantum error correction in two spatial dimensions with complementary properties. Surface codes have lower-depth error detection circuits and well-developed decoders to interpret and correct errors, while color codes have transversal Clifford gates and better code efficiency in the number of physical qubits needed to achieve a given code distance. A formal equivalence exists between color codes and folded surface codes, but it does not guarantee the transferability of any of these favorable properties. However, the equivalence does imply the existence of constant-depth circuit implementations of logical Clifford gates on folded surface codes. We achieve and improve this result by constructing two families of folded surface codes with transversal Clifford gates. This construction is presented generally for qudits of any dimension. Lastly, the specific application of these codes to universal quantum computation based on qubit fusion is also discussed.

  8. Transversal Clifford gates on folded surface codes

    DOE PAGES

    Moussa, Jonathan E.

    2016-10-12

    Surface and color codes are two forms of topological quantum error correction in two spatial dimensions with complementary properties. Surface codes have lower-depth error detection circuits and well-developed decoders to interpret and correct errors, while color codes have transversal Clifford gates and better code efficiency in the number of physical qubits needed to achieve a given code distance. A formal equivalence exists between color codes and folded surface codes, but it does not guarantee the transferability of any of these favorable properties. However, the equivalence does imply the existence of constant-depth circuit implementations of logical Clifford gates on folded surfacemore » codes. We achieve and improve this result by constructing two families of folded surface codes with transversal Clifford gates. This construction is presented generally for qudits of any dimension. Lastly, the specific application of these codes to universal quantum computation based on qubit fusion is also discussed.« less

  9. The Environment for Application Software Integration and Execution (EASIE) version 1.0. Volume 1: Executive overview

    NASA Technical Reports Server (NTRS)

    Rowell, Lawrence F.; Davis, John S.

    1989-01-01

    The Environment for Application Software Integration and Execution (EASIE) provides a methodology and a set of software utility programs to ease the task of coordinating engineering design and analysis codes. EASIE was designed to meet the needs of conceptual design engineers that face the task of integrating many stand-alone engineering analysis programs. Using EASIE, programs are integrated through a relational database management system. Volume 1, Executive Overview, gives an overview of the functions provided by EASIE and describes their use. Three operational design systems based upon the EASIE software are briefly described.

  10. Motor Execution Affects Action Prediction

    ERIC Educational Resources Information Center

    Springer, Anne; Brandstadter, Simone; Liepelt, Roman; Birngruber, Teresa; Giese, Martin; Mechsner, Franz; Prinz, Wolfgang

    2011-01-01

    Previous studies provided evidence of the claim that the prediction of occluded action involves real-time simulation. We report two experiments that aimed to study how real-time simulation is affected by simultaneous action execution under conditions of full, partial or no overlap between observed and executed actions. This overlap was analysed by…

  11. Smart Executives for Autonomous Spacecraft

    NASA Technical Reports Server (NTRS)

    Gat, E.; Pell, B.

    1998-01-01

    In this article we explore the design of an executive for an autonomous spacecraft. The executive is responsible for translating high-level commands, whether they come from the ground or from an on-board planner, into the low-level commands understood directly by the spacecraft hardware.

  12. Motor Execution Affects Action Prediction

    ERIC Educational Resources Information Center

    Springer, Anne; Brandstadter, Simone; Liepelt, Roman; Birngruber, Teresa; Giese, Martin; Mechsner, Franz; Prinz, Wolfgang

    2011-01-01

    Previous studies provided evidence of the claim that the prediction of occluded action involves real-time simulation. We report two experiments that aimed to study how real-time simulation is affected by simultaneous action execution under conditions of full, partial or no overlap between observed and executed actions. This overlap was analysed by…

  13. Characteristics of the Federal Executive.

    ERIC Educational Resources Information Center

    Civil Service Commission, Washington, DC.

    The personal characteristics, educational background, occupations, and attitudes of 54 Federal Executives who attended Session IX of the Federal Executive Institute, U. S. Civil Service Commission, are given. The average age of the group was 47.6 years (range 36 to 61). The federal grades were 18% in GS-5, 66% in GS-16 and equivalent, and 16% in…

  14. Bio-bar-code dendrimer-like DNA as signal amplifier for cancerous cells assay using ruthenium nanoparticle-based ultrasensitive chemiluminescence detection.

    PubMed

    Bi, Sai; Hao, Shuangyuan; Li, Li; Zhang, Shusheng

    2010-09-07

    Bio-bar-code dendrimer-like DNA (bbc-DL-DNA) is employed as a label for the amplification assay of cancer cells in combination with the newly explored chemiluminescence (CL) system of luminol-H(2)O(2)-Ru(3+) and specificity of structure-switching aptamers selected by cell-based SELEX.

  15. Executive control influences linguistic representations.

    PubMed

    Lev-Ari, Shiri; Keysar, Boaz

    2014-02-01

    Although it is known that words acquire their meanings partly from the contexts in which they are used, we proposed that the way in which words are processed can also influence their representation. We further propose that individual differences in the way that words are processed can consequently lead to individual differences in the way that they are represented. Specifically, we showed that executive control influences linguistic representations by influencing the coactivation of competing and reinforcing terms. Consequently, people with poorer executive control perceive the meanings of homonymous terms as being more similar to one another, and those of polysemous terms as being less similar to one another, than do people with better executive control. We also showed that bilinguals with poorer executive control experience greater cross-linguistic interference than do bilinguals with better executive control. These results have implications for theories of linguistic representation and language organization.

  16. Symbolically Modeling Concurrent MCAPI Executions

    NASA Technical Reports Server (NTRS)

    Fischer, Topher; Mercer, Eric; Rungta, Neha

    2011-01-01

    Improper use of Inter-Process Communication (IPC) within concurrent systems often creates data races which can lead to bugs that are challenging to discover. Techniques that use Satisfiability Modulo Theories (SMT) problems to symbolically model possible executions of concurrent software have recently been proposed for use in the formal verification of software. In this work we describe a new technique for modeling executions of concurrent software that use a message passing API called MCAPI. Our technique uses an execution trace to create an SMT problem that symbolically models all possible concurrent executions and follows the same sequence of conditional branch outcomes as the provided execution trace. We check if there exists a satisfying assignment to the SMT problem with respect to specific safety properties. If such an assignment exists, it provides the conditions that lead to the violation of the property. We show how our method models behaviors of MCAPI applications that are ignored in previously published techniques.

  17. Malware detection and analysis

    DOEpatents

    Chiang, Ken; Lloyd, Levi; Crussell, Jonathan; Sanders, Benjamin; Erickson, Jeremy Lee; Fritz, David Jakob

    2016-03-22

    Embodiments of the invention describe systems and methods for malicious software detection and analysis. A binary executable comprising obfuscated malware on a host device may be received, and incident data indicating a time when the binary executable was received and identifying processes operating on the host device may be recorded. The binary executable is analyzed via a scalable plurality of execution environments, including one or more non-virtual execution environments and one or more virtual execution environments, to generate runtime data and deobfuscation data attributable to the binary executable. At least some of the runtime data and deobfuscation data attributable to the binary executable is stored in a shared database, while at least some of the incident data is stored in a private, non-shared database.

  18. On the undetected error probability for shortened Hamming codes

    NASA Technical Reports Server (NTRS)

    Fujiwara, T.; Kasami, T.; Kitai, A.; Lin, S.

    1985-01-01

    Shortened Hamming codes are widely used for error detection in data communications. In this paper, a method for computing the probability of an undetected error for these codes is presented. This method is then used to evaluate the error-detection performance of the shortened codes obtained from the two distance-four Hamming codes adopted by CCITT X.25 for error control for packet-switched networks. It is shown that shortening a code does affect its error-detection performance.

  19. Permanence analysis of a concatenated coding scheme for error control

    NASA Technical Reports Server (NTRS)

    Costello, D. J., Jr.; Lin, S.; Kasami, T.

    1983-01-01

    A concatenated coding scheme for error control in data communications is analyzed. In this scheme, the inner code is used for both error correction and detection, however, the outer code is used only for error detection. A retransmission is requested if the outer code detects the presence of errors after the inner code decoding. Probability of undetected error is derived and bounded. A particular example, proposed for the planetary program, is analyzed.

  20. Acceleration of a Monte Carlo radiation transport code

    SciTech Connect

    Hochstedler, R.D.; Smith, L.M.

    1996-03-01

    Execution time for the Integrated TIGER Series (ITS) Monte Carlo radiation transport code has been reduced by careful re-coding of computationally intensive subroutines. Three test cases for the TIGER (1-D slab geometry), CYLTRAN (2-D cylindrical geometry), and ACCEPT (3-D arbitrary geometry) codes were identified and used to benchmark and profile program execution. Based upon these results, sixteen top time-consuming subroutines were examined and nine of them modified to accelerate computations with equivalent numerical output to the original. The results obtained via this study indicate that speedup factors of 1.90 for the TIGER code, 1.67 for the CYLTRAN code, and 1.11 for the ACCEPT code are achievable. {copyright} {ital 1996 American Institute of Physics.}

  1. Memory, executive, and multidomain subtle cognitive impairment

    PubMed Central

    Toledo, Jon B.; Bjerke, Maria; Chen, Kewei; Rozycki, Martin; Jack, Clifford R.; Weiner, Michael W.; Arnold, Steven E.; Reiman, Eric M.; Davatzikos, Christos; Shaw, Leslie M.

    2015-01-01

    Objective: We studied the biomarker signatures and prognoses of 3 different subtle cognitive impairment (SCI) groups (executive, memory, and multidomain) as well as the subjective memory complaints (SMC) group. Methods: We studied 522 healthy controls in the Alzheimer's Disease Neuroimaging Initiative (ADNI). Cutoffs for executive, memory, and multidomain SCI were defined using participants who remained cognitively normal (CN) for 7 years. CSF Alzheimer disease (AD) biomarkers, composite and region-of-interest (ROI) MRI, and fluorodeoxyglucose-PET measures were compared in these participants. Results: Using a stringent cutoff (fifth percentile), 27.6% of the ADNI participants were classified as SCI. Most single ROI or global-based measures were not sensitive to detect differences between groups. Only MRI-SPARE-AD (Spatial Pattern of Abnormalities for Recognition of Early AD), a quantitative MRI pattern-based global index, showed differences between all groups, excluding the executive SCI group. Atrophy patterns differed in memory SCI and SMC. The CN and the SMC groups presented a similar distribution of preclinical dementia stages. Fifty percent of the participants with executive, memory, and multidomain SCI progressed to mild cognitive impairment or dementia at 7, 5, and 2 years, respectively. Conclusions: Our results indicate that (1) the different SCI categories have different clinical prognoses and biomarker signatures, (2) longitudinally followed CN subjects are needed to establish clinical cutoffs, (3) subjects with SMC show a frontal pattern of brain atrophy, and (4) pattern-based analyses outperform commonly used single ROI-based neuroimaging biomarkers and are needed to detect initial stages of cognitive impairment. PMID:26085606

  2. Limits of Executive Control

    PubMed Central

    Verbruggen, Frederick; McAndrew, Amy; Weidemann, Gabrielle; Stevens, Tobias; McLaren, Ian P. L.

    2016-01-01

    Cognitive-control theories attribute action control to executive processes that modulate behavior on the basis of expectancy or task rules. In the current study, we examined corticospinal excitability and behavioral performance in a go/no-go task. Go and no-go trials were presented in runs of five, and go and no-go runs alternated predictably. At the beginning of each trial, subjects indicated whether they expected a go trial or a no-go trial. Analyses revealed that subjects immediately adjusted their expectancy ratings when a new run started. However, motor excitability was primarily associated with the properties of the previous trial, rather than the predicted properties of the current trial. We also observed a large latency cost at the beginning of a go run (i.e., reaction times were longer for the first trial in a go run than for the second trial). These findings indicate that actions in predictable environments are substantially influenced by previous events, even if this influence conflicts with conscious expectancies about upcoming events. PMID:27000177

  3. Maneuver Performance Assessment of the Cassini Spacecraft Through Execution-Error Modeling and Analysis

    NASA Technical Reports Server (NTRS)

    Wagner, Sean

    2014-01-01

    The Cassini spacecraft has executed nearly 300 maneuvers since 1997, providing ample data for execution-error model updates. With maneuvers through 2017, opportunities remain to improve on the models and remove biases identified in maneuver executions. This manuscript focuses on how execution-error models can be used to judge maneuver performance, while providing a means for detecting performance degradation. Additionally, this paper describes Cassini's execution-error model updates in August 2012. An assessment of Cassini's maneuver performance through OTM-368 on January 5, 2014 is also presented.

  4. Maneuver Performance Assessment of the Cassini Spacecraft Through Execution-Error Modeling and Analysis

    NASA Technical Reports Server (NTRS)

    Wagner, Sean

    2014-01-01

    The Cassini spacecraft has executed nearly 300 maneuvers since 1997, providing ample data for execution-error model updates. With maneuvers through 2017, opportunities remain to improve on the models and remove biases identified in maneuver executions. This manuscript focuses on how execution-error models can be used to judge maneuver performance, while providing a means for detecting performance degradation. Additionally, this paper describes Cassini's execution-error model updates in August 2012. An assessment of Cassini's maneuver performance through OTM-368 on January 5, 2014 is also presented.

  5. Code Optimization Techniques

    SciTech Connect

    MAGEE,GLEN I.

    2000-08-03

    Computers transfer data in a number of different ways. Whether through a serial port, a parallel port, over a modem, over an ethernet cable, or internally from a hard disk to memory, some data will be lost. To compensate for that loss, numerous error detection and correction algorithms have been developed. One of the most common error correction codes is the Reed-Solomon code, which is a special subset of BCH (Bose-Chaudhuri-Hocquenghem) linear cyclic block codes. In the AURA project, an unmanned aircraft sends the data it collects back to earth so it can be analyzed during flight and possible flight modifications made. To counter possible data corruption during transmission, the data is encoded using a multi-block Reed-Solomon implementation with a possibly shortened final block. In order to maximize the amount of data transmitted, it was necessary to reduce the computation time of a Reed-Solomon encoding to three percent of the processor's time. To achieve such a reduction, many code optimization techniques were employed. This paper outlines the steps taken to reduce the processing time of a Reed-Solomon encoding and the insight into modern optimization techniques gained from the experience.

  6. A dip-stick type biosensor using bioluminescent bacteria encapsulated in color-coded alginate microbeads for detection of water toxicity.

    PubMed

    Jung, Insup; Seo, Ho Bin; Lee, Ji-eun; Kim, Byoung Chan; Gu, Man Bock

    2014-09-21

    The use of genetically engineered bioluminescent bacteria, in which bioluminescence is induced by different modes of toxic action, represents an alternative to acute toxicity tests using living aquatic organisms (plants, vertebrates, or invertebrates) in an aqueous environment. A number of these bacterial strains have been developed, but there have been no attempts to develop a hand-held type of biosensor for monitoring or identification of toxicity. We report a facile dip-stick type biosensor using genetically engineered bioluminescent bacteria as a new platform for classification and identification of toxicity in water environments. This dip-stick type biosensor is composed of eight different optically color-coded functional alginate beads that each encapsulates a different bioluminescent bacterial strain and its corresponding fluorescent microbead. These color-coded microbeads exhibit easy identification of encapsulated microbeads, since each microbead has a different color code depending on the bioluminescent bacterial strain contained and improved cell-stability compared to liquid culture. This dip-stick type biosensor can discriminate different modes of toxic actions (i.e. DNA damage, oxidative damage, cell-membrane damage, or protein damage) of sample water tested by simply dipping the stick into the water samples. It was found that each color-coded microbead emitted distinct bioluminescence, and each dip-stick type biosensor showed different bioluminescence patterns within 2 hours, depending on the toxic chemicals contained in LB medium, tap water, or river water samples. This dip-stick type biosensor can, therefore, be widely and practically used in checking toxicity of water in the environment primarily in situ, possibly indicating the status of biodiversity.

  7. Executing clinical guidelines: temporal issues.

    PubMed Central

    Terenziani, P.; Mastromonaco, F.; Molino, G.; Torchio, M.

    2000-01-01

    In our previous work, we proposed a domain-independent language to describe clinical guidelines and a graphical tool to acquire them. In this paper, we describe an approach to execute clinical guidelines. We propose a flexible execution engine that can be used in clinical decision support applications, and also for medical education, or for integrating guidelines into the clinical workflow. We also focus our attention on temporal issues in the execution of guidelines, including the treatment of composite, concurrent and/or cyclic actions. PMID:11080004

  8. Trichomoniasis: evaluation to execution

    PubMed Central

    Harp, Djana F.; Chowdhury, Indrajit

    2011-01-01

    Trichomoniasis is the most common sexually transmitted disease, caused by a motile flagellate non-invasive parasitic protozoan, Trichomonas vaginalis (T. vaginalis). More than 160 million people worldwide are annually infected by this protozoan. T. vaginalis occupies an extracellular niche in the complex human genito-urinary environment (vagina, cervix, penis, prostate gland, and urethra) to survive, multiply and evade host defenses. T. vaginalis (strain G3) has a ~160 megabase genome with 60,000 genes, the largest number of genes ever identified in protozoans. The T. vaginalis genome is a highly conserved gene family that encodes a massive proteome with one of the largest coding (expressing ~4000 genes) capacities in the trophozoite stage, and helps T. vaginalis to adapt and survive in diverse environment. Based on recent developments in the field, we review T. vaginalis structure, patho-mechanisms, parasitic virulence, and advances in diagnosis and therapeutics. PMID:21440359

  9. Caltech campus executive LDRD.

    SciTech Connect

    Shepodd, Timothy J.; Knudsen, Tamara

    2013-01-01

    merely help execute the chosen action.

  10. 5 CFR 842.211 - Senior Executive Service, Defense Intelligence Senior Executive Service, and Senior Cryptologic...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. 842.211 Section 842.211... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. (a) A member of the Senior Executive Service, the Defense Intelligence Senior Executive Service, or the Senior Cryptologic...

  11. 5 CFR 842.211 - Senior Executive Service, Defense Intelligence Senior Executive Service, and Senior Cryptologic...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. 842.211 Section 842.211... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. (a) A member of the Senior Executive Service, the Defense Intelligence Senior Executive Service, or the Senior Cryptologic...

  12. 5 CFR 842.211 - Senior Executive Service, Defense Intelligence Senior Executive Service, and Senior Cryptologic...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. 842.211 Section 842.211... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. (a) A member of the Senior Executive Service, the Defense Intelligence Senior Executive Service, or the Senior Cryptologic...

  13. 5 CFR 842.211 - Senior Executive Service, Defense Intelligence Senior Executive Service, and Senior Cryptologic...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. 842.211 Section 842.211... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. (a) A member of the Senior Executive Service, the Defense Intelligence Senior Executive Service, or the Senior Cryptologic...

  14. 5 CFR 842.211 - Senior Executive Service, Defense Intelligence Senior Executive Service, and Senior Cryptologic...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. 842.211 Section 842.211... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. (a) A member of the Senior Executive Service, the Defense Intelligence Senior Executive Service, or the Senior Cryptologic Senior...

  15. Transferring ecosystem simulation codes to supercomputers

    NASA Technical Reports Server (NTRS)

    Skiles, J. W.; Schulbach, C. H.

    1995-01-01

    Many ecosystem simulation computer codes have been developed in the last twenty-five years. This development took place initially on main-frame computers, then mini-computers, and more recently, on micro-computers and workstations. Supercomputing platforms (both parallel and distributed systems) have been largely unused, however, because of the perceived difficulty in accessing and using the machines. Also, significant differences in the system architectures of sequential, scalar computers and parallel and/or vector supercomputers must be considered. We have transferred a grassland simulation model (developed on a VAX) to a Cray Y-MP/C90. We describe porting the model to the Cray and the changes we made to exploit the parallelism in the application and improve code execution. The Cray executed the model 30 times faster than the VAX and 10 times faster than a Unix workstation. We achieved an additional speedup of 30 percent by using the compiler's vectoring and 'in-line' capabilities. The code runs at only about 5 percent of the Cray's peak speed because it ineffectively uses the vector and parallel processing capabilities of the Cray. We expect that by restructuring the code, it could execute an additional six to ten times faster.

  16. Direct-execution parallel architecture for the Advanced Continuous Simulation Language (ACSL)

    SciTech Connect

    Carroll, C.C.; Owen, J.E.

    1988-05-01

    A direct-execution parallel architecture for the Advanced Continuous Simulation Language (ACSL) is presented which overcomes the traditional disadvantages of simulations executed on a digital computer. The incorporation of parallel processing allows the mapping of simulations into a digital computer to be done in the same inherently parallel manner as they are currently mapped onto an analog computer. The direct-execution format maximizes the efficiency of the executed code since the need for a high level language compiler is eliminated. Resolution is greatly increased over that which is available with an analog computer without the sacrifice in execution speed normally expected with digitial computer simulations. Although this report covers all aspects of the new architecture, key emphasis is placed on the processing element configuration and the microprogramming of the ACLS constructs. The execution times for all ACLS constructs are computed using a model of a processing element based on the AMD 29000 CPU and the AMD 29027 FPU. The increase in execution speed provided by parallel processing is exemplified by comparing the derived execution times of two ACSL programs with the execution times for the same programs executed on a similar sequential architecture.

  17. A direct-execution parallel architecture for the Advanced Continuous Simulation Language (ACSL)

    NASA Technical Reports Server (NTRS)

    Carroll, Chester C.; Owen, Jeffrey E.

    1988-01-01

    A direct-execution parallel architecture for the Advanced Continuous Simulation Language (ACSL) is presented which overcomes the traditional disadvantages of simulations executed on a digital computer. The incorporation of parallel processing allows the mapping of simulations into a digital computer to be done in the same inherently parallel manner as they are currently mapped onto an analog computer. The direct-execution format maximizes the efficiency of the executed code since the need for a high level language compiler is eliminated. Resolution is greatly increased over that which is available with an analog computer without the sacrifice in execution speed normally expected with digitial computer simulations. Although this report covers all aspects of the new architecture, key emphasis is placed on the processing element configuration and the microprogramming of the ACLS constructs. The execution times for all ACLS constructs are computed using a model of a processing element based on the AMD 29000 CPU and the AMD 29027 FPU. The increase in execution speed provided by parallel processing is exemplified by comparing the derived execution times of two ACSL programs with the execution times for the same programs executed on a similar sequential architecture.

  18. Error-correction coding

    NASA Technical Reports Server (NTRS)

    Hinds, Erold W. (Principal Investigator)

    1996-01-01

    This report describes the progress made towards the completion of a specific task on error-correcting coding. The proposed research consisted of investigating the use of modulation block codes as the inner code of a concatenated coding system in order to improve the overall space link communications performance. The study proposed to identify and analyze candidate codes that will complement the performance of the overall coding system which uses the interleaved RS (255,223) code as the outer code.

  19. Generalized optical code construction for enhanced and Modified Double Weight like codes without mapping for SAC-OCDMA systems

    NASA Astrophysics Data System (ADS)

    Kumawat, Soma; Ravi Kumar, M.

    2016-07-01

    Double Weight (DW) code family is one of the coding schemes proposed for Spectral Amplitude Coding-Optical Code Division Multiple Access (SAC-OCDMA) systems. Modified Double Weight (MDW) code for even weights and Enhanced Double Weight (EDW) code for odd weights are two algorithms extending the use of DW code for SAC-OCDMA systems. The above mentioned codes use mapping technique to provide codes for higher number of users. A new generalized algorithm to construct EDW and MDW like codes without mapping for any weight greater than 2 is proposed. A single code construction algorithm gives same length increment, Bit Error Rate (BER) calculation and other properties for all weights greater than 2. Algorithm first constructs a generalized basic matrix which is repeated in a different way to produce the codes for all users (different from mapping). The generalized code is analysed for BER using balanced detection and direct detection techniques.

  20. Among three different executive functions, general executive control ability is a key predictor of decision making under objective risk

    PubMed Central

    Schiebener, Johannes; Wegmann, Elisa; Gathmann, Bettina; Laier, Christian; Pawlikowski, Mirko; Brand, Matthias

    2014-01-01

    Executive functioning is supposed to have an important role in decision making under risk. Several studies reported that more advantageous decision-making behavior was accompanied by better performance in tests of executive functioning and that the decision-making process was accompanied by activations in prefrontal and subcortical brain regions associated with executive functioning. However, to what extent different components of executive functions contribute to decision making is still unclear. We tested direct and indirect effects of three executive functions on decision-making performance in a laboratory gambling task, the Game of Dice Task (GDT). Using Brand's model of decisions under risk (2006) we tested seven structural equation models with three latent variables that represent executive functions supposed to be involved in decision making. The latent variables were general control (represented by the general ability to exert attentional and behavioral self-control that is in accordance with task goals despite interfering information), concept formation (represented by categorization, rule detection, and set maintenance), and monitoring (represented by supervision of cognition and behavior). The seven models indicated that only the latent dimension general control had a direct effect on decision making under risk. Concept formation and monitoring only contributed in terms of indirect effects, when mediated by general control. Thus, several components of executive functioning seem to be involved in decision making under risk. However, general control functions seem to have a key role. They may be important for implementing the calculative and cognitively controlled processes involved in advantageous decision making under risk. PMID:25520690

  1. Among three different executive functions, general executive control ability is a key predictor of decision making under objective risk.

    PubMed

    Schiebener, Johannes; Wegmann, Elisa; Gathmann, Bettina; Laier, Christian; Pawlikowski, Mirko; Brand, Matthias

    2014-01-01

    Executive functioning is supposed to have an important role in decision making under risk. Several studies reported that more advantageous decision-making behavior was accompanied by better performance in tests of executive functioning and that the decision-making process was accompanied by activations in prefrontal and subcortical brain regions associated with executive functioning. However, to what extent different components of executive functions contribute to decision making is still unclear. We tested direct and indirect effects of three executive functions on decision-making performance in a laboratory gambling task, the Game of Dice Task (GDT). Using Brand's model of decisions under risk (2006) we tested seven structural equation models with three latent variables that represent executive functions supposed to be involved in decision making. The latent variables were general control (represented by the general ability to exert attentional and behavioral self-control that is in accordance with task goals despite interfering information), concept formation (represented by categorization, rule detection, and set maintenance), and monitoring (represented by supervision of cognition and behavior). The seven models indicated that only the latent dimension general control had a direct effect on decision making under risk. Concept formation and monitoring only contributed in terms of indirect effects, when mediated by general control. Thus, several components of executive functioning seem to be involved in decision making under risk. However, general control functions seem to have a key role. They may be important for implementing the calculative and cognitively controlled processes involved in advantageous decision making under risk.

  2. Methods, media, and systems for detecting attack on a digital processing device

    SciTech Connect

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  3. Methods, media, and systems for detecting attack on a digital processing device

    DOEpatents

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromytis, Angelos D.; Androulaki, Elli

    2017-02-21

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  4. Flexible Generation of Kalman Filter Code

    NASA Technical Reports Server (NTRS)

    Richardson, Julian; Wilson, Edward

    2006-01-01

    Domain-specific program synthesis can automatically generate high quality code in complex domains from succinct specifications, but the range of programs which can be generated by a given synthesis system is typically narrow. Obtaining code which falls outside this narrow scope necessitates either 1) extension of the code generator, which is usually very expensive, or 2) manual modification of the generated code, which is often difficult and which must be redone whenever changes are made to the program specification. In this paper, we describe adaptations and extensions of the AUTOFILTER Kalman filter synthesis system which greatly extend the range of programs which can be generated. Users augment the input specification with a specification of code fragments and how those fragments should interleave with or replace parts of the synthesized filter. This allows users to generate a much wider range of programs without their needing to modify the synthesis system or edit generated code. We demonstrate the usefulness of the approach by applying it to the synthesis of a complex state estimator which combines code from several Kalman filters with user-specified code. The work described in this paper allows the complex design decisions necessary for real-world applications to be reflected in the synthesized code. When executed on simulated input data, the generated state estimator was found to produce comparable estimates to those produced by a handcoded estimator

  5. Lean and Efficient Software: Whole-Program Optimization of Executables

    DTIC Science & Technology

    2015-09-30

    executables by using static and dynamic binary program analysis techniques to perform whole-program optimization directly on compiled programs...Lean and Efficient Software: Whole-Program Optimization of Executables” Project Summary Report #5 (Report Period: 7/1/2015 to 9/30/2015...Effective Date of Contract: 06/30/2014 Technical Monitor: Sukarno Mertoguno (Code: 311) Contracting Officer: Casey Ross Submitted by

  6. Lean and Efficient Software: Whole-Program Optimization of Executables

    DTIC Science & Technology

    2013-09-24

    some procedures from the executable reduces the number of return statements, and thus the number of potential ROP gadgets available to attackers. We...security by reducing the number of ROP gadgets. No direct effect on runtime performance is expected; some speedup may result because there is less...reducing the number of ROP gadgets. Limit study. The limit study results for dead code above also contain information about inlining possibilities. In the

  7. 45 CFR 1700.5 - Executive Director.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... INFORMATION SCIENCE ORGANIZATION AND FUNCTIONS § 1700.5 Executive Director. (a) The Executive Director serves... the Chairperson and Commissioners, participating with the Commissioners in the development...

  8. A concatenated coding scheme for error control

    NASA Technical Reports Server (NTRS)

    Lin, S.

    1985-01-01

    A concatenated coding scheme for error control in data communications is analyzed. The inner code is used for both error correction and detection, however the outer code is used only for error detection. A retransmission is requested if the outer code detects the presence of errors after the inner code decoding. The probability of undetected error of the above error control scheme is derived and upper bounded. Two specific exmaples are analyzed. In the first example, the inner code is a distance-4 shortened Hamming code with generator polynomial (X+1)(X(6)+X+1) = X(7)+X(6)+X(2)+1 and the outer code is a distance-4 shortened Hamming code with generator polynomial (X+1)X(15+X(14)+X(13)+X(12)+X(4)+X(3)+X(2)+X+1) = X(16)+X(12)+X(5)+1 which is the X.25 standard for packet-switched data network. This example is proposed for error control on NASA telecommand links. In the second example, the inner code is the same as that in the first example but the outer code is a shortened Reed-Solomon code with symbols from GF(2(8)) and generator polynomial (X+1)(X+alpha) where alpha is a primitive element in GF(z(8)).

  9. Reusable State Machine Code Generator

    NASA Astrophysics Data System (ADS)

    Hoffstadt, A. A.; Reyes, C.; Sommer, H.; Andolfato, L.

    2010-12-01

    The State Machine model is frequently used to represent the behaviour of a system, allowing one to express and execute this behaviour in a deterministic way. A graphical representation such as a UML State Chart diagram tames the complexity of the system, thus facilitating changes to the model and communication between developers and domain experts. We present a reusable state machine code generator, developed by the Universidad Técnica Federico Santa María and the European Southern Observatory. The generator itself is based on the open source project architecture, and uses UML State Chart models as input. This allows for a modular design and a clean separation between generator and generated code. The generated state machine code has well-defined interfaces that are independent of the implementation artefacts such as the middle-ware. This allows using the generator in the substantially different observatory software of the Atacama Large Millimeter Array and the ESO Very Large Telescope. A project-specific mapping layer for event and transition notification connects the state machine code to its environment, which can be the Common Software of these projects, or any other project. This approach even allows to automatically create tests for a generated state machine, using techniques from software testing, such as path-coverage.

  10. Spatiotemporal tuning of the facilitation of biological motion perception by concurrent motor execution.

    PubMed

    Christensen, Andrea; Ilg, Winfried; Giese, Martin A

    2011-03-02

    The execution of motor behavior influences concurrent visual action observation and especially the perception of biological motion. The neural mechanisms underlying this interaction between perception and motor execution are not exactly known. In addition, the available experimental evidence is partially inconsistent because previous studies have reported facilitation as well as impairments of action perception by concurrent execution. Exploiting a novel virtual reality paradigm, we investigated the spatiotemporal tuning of the influence of motor execution on the perception of biological motion within a signal-detection task. Human observers were presented with point-light stimuli that were controlled by their own movements. Participants had to detect a point-light arm in a scrambled mask, either while executing waving movements or without concurrent motor execution (baseline). The temporal and spatial coherence between the observed and executed movements was parametrically varied. We found a systematic tuning of the facilitatory versus inhibitory influences of motor execution on biological motion detection with respect to the temporal and the spatial congruency between observed and executed movements. Specifically, we found a gradual transition between facilitatory and inhibitory interactions for decreasing temporal synchrony and spatial congruency. This result provides evidence for a spatiotemporally highly selective coupling between dynamic motor representations and neural structures involved in the visual processing of biological motion. In addition, our study offers a unifying explanation that reconciles contradicting results about modulatory effects of motor execution on biological motion perception in previous studies.

  11. Television and children's executive function.

    PubMed

    Lillard, Angeline S; Li, Hui; Boguszewski, Katie

    2015-01-01

    Children spend a lot of time watching television on its many platforms: directly, online, and via videos and DVDs. Many researchers are concerned that some types of television content appear to negatively influence children's executive function. Because (1) executive function predicts key developmental outcomes, (2) executive function appears to be influenced by some television content, and (3) American children watch large quantities of television (including the content of concern), the issues discussed here comprise a crucial public health issue. Further research is needed to reveal exactly what television content is implicated, what underlies television's effect on executive function, how long the effect lasts, and who is affected. © 2015 Elsevier Inc. All rights reserved.

  12. Report of the Executive Director

    ERIC Educational Resources Information Center

    Rodowskas, Chistopher A., Jr.

    1977-01-01

    The AACP executive director reports on developments in pharmacy colleges in the areas of membership, communications, meetings, finances, government affairs, new projects and services, staff and facilities, student affairs, and educational research and development. (LBH)

  13. Executive presence for strategic influence.

    PubMed

    Shirey, Maria R

    2013-01-01

    This department highlights change management strategies that may be successful in strategically planning and executing organizational change initiatives. With the goal of presenting practical approaches helpful to nurse leaders advancing organizational change, content includes evidence-based projects, tools, and resources that mobilize and sustain organizational change initiatives. In this article, the author discusses cultivating executive presence, a crucial component of great leadership, needed for strategic influence and to drive change.

  14. Error coding simulations in C

    NASA Technical Reports Server (NTRS)

    Noble, Viveca K.

    1994-01-01

    When data is transmitted through a noisy channel, errors are produced within the data rendering it indecipherable. Through the use of error control coding techniques, the bit error rate can be reduced to any desired level without sacrificing the transmission data rate. The Astrionics Laboratory at Marshall Space Flight Center has decided to use a modular, end-to-end telemetry data simulator to simulate the transmission of data from flight to ground and various methods of error control. The simulator includes modules for random data generation, data compression, Consultative Committee for Space Data Systems (CCSDS) transfer frame formation, error correction/detection, error generation and error statistics. The simulator utilizes a concatenated coding scheme which includes CCSDS standard (255,223) Reed-Solomon (RS) code over GF(2(exp 8)) with interleave depth of 5 as the outermost code, (7, 1/2) convolutional code as an inner code and CCSDS recommended (n, n-16) cyclic redundancy check (CRC) code as the innermost code, where n is the number of information bits plus 16 parity bits. The received signal-to-noise for a desired bit error rate is greatly reduced through the use of forward error correction techniques. Even greater coding gain is provided through the use of a concatenated coding scheme. Interleaving/deinterleaving is necessary to randomize burst errors which may appear at the input of the RS decoder. The burst correction capability length is increased in proportion to the interleave depth. The modular nature of the simulator allows for inclusion or exclusion of modules as needed. This paper describes the development and operation of the simulator, the verification of a C-language Reed-Solomon code, and the possibility of using Comdisco SPW(tm) as a tool for determining optimal error control schemes.

  15. Complete coding regions of two novel HLA-B alleles detected by phototyping (PCR-SSP) in the British caucasoid population: B*5108 and B*5002.

    PubMed

    Vilches, C; Bunce, M; de Pablo, R; Murray, A K; McIntyre, C A; Kreisler, M

    1997-07-01

    Two previously reported PCR-SSP variants of the HLA-B locus, B51GAC and B45v, were investigated by RT-PCR cloning and nucleotide sequence analysis of their complete coding regions. They have been shown to correspond to the new alleles B*5108 and B*5002, both of which differ from the common B*5101 and B*5001 subtypes, respectively, by amino acid replacements at their alpha-2 domain alpha-helices. The primary structure of B*5002, intermediate between those of B*4501 and B*5001, raises further concern about the current classification of B*45 as a B12 rather than as a B*50 subtype.

  16. Video coding with dynamic background

    NASA Astrophysics Data System (ADS)

    Paul, Manoranjan; Lin, Weisi; Lau, Chiew Tong; Lee, Bu-Sung

    2013-12-01

    Motion estimation (ME) and motion compensation (MC) using variable block size, sub-pixel search, and multiple reference frames (MRFs) are the major reasons for improved coding performance of the H.264 video coding standard over other contemporary coding standards. The concept of MRFs is suitable for repetitive motion, uncovered background, non-integer pixel displacement, lighting change, etc. The requirement of index codes of the reference frames, computational time in ME & MC, and memory buffer for coded frames limits the number of reference frames used in practical applications. In typical video sequences, the previous frame is used as a reference frame with 68-92% of cases. In this article, we propose a new video coding method using a reference frame [i.e., the most common frame in scene (McFIS)] generated by dynamic background modeling. McFIS is more effective in terms of rate-distortion and computational time performance compared to the MRFs techniques. It has also inherent capability of scene change detection (SCD) for adaptive group of picture (GOP) size determination. As a result, we integrate SCD (for GOP determination) with reference frame generation. The experimental results show that the proposed coding scheme outperforms the H.264 video coding with five reference frames and the two relevant state-of-the-art algorithms by 0.5-2.0 dB with less computational time.

  17. Planning and Execution for an Autonomous Aerobot

    NASA Technical Reports Server (NTRS)

    Gaines, Daniel M.; Estlin, Tara A.; Schaffer, Steven R.; Chouinard, Caroline M.

    2010-01-01

    The Aerial Onboard Autonomous Science Investigation System (AerOASIS) system provides autonomous planning and execution capabilities for aerial vehicles (see figure). The system is capable of generating high-quality operations plans that integrate observation requests from ground planning teams, as well as opportunistic science events detected onboard the vehicle while respecting mission and resource constraints. AerOASIS allows an airborne planetary exploration vehicle to summarize and prioritize the most scientifically relevant data; identify and select high-value science sites for additional investigation; and dynamically plan, schedule, and monitor the various science activities being performed, even during extended communications blackout periods with Earth.

  18. A draft model aggregated code of ethics for bioethicists.

    PubMed

    Baker, Robert

    2005-01-01

    Bioethicists function in an environment in which their peers--healthcare executives, lawyers, nurses, physicians--assert the integrity of their fields through codes of professional ethics. Is it time for bioethics to assert its integrity by developing a code of ethics? Answering in the affirmative, this paper lays out a case by reviewing the historical nature and function of professional codes of ethics. Arguing that professional codes are aggregative enterprises growing in response to a field's historical experiences, it asserts that bioethics now needs to assert its integrity and independence and has already developed a body of formal statements that could be aggregated to create a comprehensive code of ethics for bioethics. A Draft Model Aggregated Code of Ethics for Bioethicists is offered in the hope that analysis and criticism of this draft code will promote further discussion of the nature and content of a code of ethics for bioethicists.

  19. Comparative genomics approach to detecting split-coding regions in a low-coverage genome: lessons from the chimaera Callorhinchus milii (Holocephali, Chondrichthyes).

    PubMed

    Dessimoz, Christophe; Zoller, Stefan; Manousaki, Tereza; Qiu, Huan; Meyer, Axel; Kuraku, Shigehiro

    2011-09-01

    Recent development of deep sequencing technologies has facilitated de novo genome sequencing projects, now conducted even by individual laboratories. However, this will yield more and more genome sequences that are not well assembled, and will hinder thorough annotation when no closely related reference genome is available. One of the challenging issues is the identification of protein-coding sequences split into multiple unassembled genomic segments, which can confound orthology assignment and various laboratory experiments requiring the identification of individual genes. In this study, using the genome of a cartilaginous fish, Callorhinchus milii, as test case, we performed gene prediction using a model specifically trained for this genome. We implemented an algorithm, designated ESPRIT, to identify possible linkages between multiple protein-coding portions derived from a single genomic locus split into multiple unassembled genomic segments. We developed a validation framework based on an artificially fragmented human genome, improvements between early and recent mouse genome assemblies, comparison with experimentally validated sequences from GenBank, and phylogenetic analyses. Our strategy provided insights into practical solutions for efficient annotation of only partially sequenced (low-coverage) genomes. To our knowledge, our study is the first formulation of a method to link unassembled genomic segments based on proteomes of relatively distantly related species as references.

  20. Box codes of lengths 48 and 72

    NASA Technical Reports Server (NTRS)

    Solomon, G.; Jin, Y.

    1993-01-01

    A self-dual code length 48, dimension 24, with Hamming distance essentially equal to 12 is constructed here. There are only six code words of weight eight. All the other code words have weights that are multiples of four and have a minimum weight equal to 12. This code may be encoded systematically and arises from a strict binary representation of the (8,4;5) Reed-Solomon (RS) code over GF (64). The code may be considered as six interrelated (8,7;2) codes. The Mattson-Solomon representation of the cyclic decomposition of these codes and their parity sums are used to detect an odd number of errors in any of the six codes. These may then be used in a correction algorithm for hard or soft decision decoding. A (72,36;15) box code was constructed from a (63,35;8) cyclic code. The theoretical justification is presented herein. A second (72,36;15) code is constructed from an inner (63,27;16) Bose Chaudhuri Hocquenghem (BCH) code and expanded to length 72 using box code algorithms for extension. This code was simulated and verified to have a minimum distance of 15 with even weight words congruent to zero modulo four. The decoding for hard and soft decision is still more complex than the first code constructed above. Finally, an (8,4;5) RS code over GF (512) in the binary representation of the (72,36;15) box code gives rise to a (72,36;16*) code with nine words of weight eight, and all the rest have weights greater than or equal to 16.

  1. The Interactive Roles of Parenting, Emotion Regulation and Executive Functioning in Moral Reasoning during Middle Childhood

    PubMed Central

    Hinnant, J. Benjamin; Nelson, Jackie A.; O’Brien, Marion; Keane, Susan P.; Calkins, Susan D.

    2013-01-01

    We examined mother-child cooperative behavior, children’s emotion regulation and executive function, as well as combinations of these factors, as predictors of moral reasoning in 89 10-year-old children. Dyadic cooperation was coded from videotaped observations of laboratory puzzle and speech tasks. Emotion regulation was derived from maternal report, and executive functioning was assessed with the Tower of London task. Moral reasoning was coded during mother-child conversations about morally ambiguous, peer-conflict situations. Two significant interactions indicated that children from more cooperative dyads who also had higher executive function skills had higher moral reasoning scores than other children, and children lower in both emotion regulation and executive function had lower moral reasoning scores than other children. The results contribute to the literature on the multiple and interactive levels of influence on moral reasoning in childhood. PMID:23650955

  2. Homological stabilizer codes

    SciTech Connect

    Anderson, Jonas T.

    2013-03-15

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

  3. 2011 Munitions Executive Summit

    DTIC Science & Technology

    2011-02-04

    Medium Caliber IED Defeat & Counter Mine Non‐Lethal Individual  Non‐ Lethal  System  (INS) Dual  Mode (Lethal/N‐L) Grenade Non‐Lethal Capability Set...Husky Mounted Detection System (HMDS) 299 IED Events to date (OEF) 116 IED Events to date (OND) IED Interrogation Arms (IA) Vehicle Optics Sensor ...current 10-30 m)  Next Gen Hand Grenade • Dual Mode; N-L -or- Lethal A-P effects • Component Miniaturization (MEMS) • MilStd-1911-compliant fuzing

  4. Bar coded retroreflective target

    DOEpatents

    Vann, Charles S.

    2000-01-01

    This small, inexpensive, non-contact laser sensor can detect the location of a retroreflective target in a relatively large volume and up to six degrees of position. The tracker's laser beam is formed into a plane of light which is swept across the space of interest. When the beam illuminates the retroreflector, some of the light returns to the tracker. The intensity, angle, and time of the return beam is measured to calculate the three dimensional location of the target. With three retroreflectors on the target, the locations of three points on the target are measured, enabling the calculation of all six degrees of target position. Until now, devices for three-dimensional tracking of objects in a large volume have been heavy, large, and very expensive. Because of the simplicity and unique characteristics of this tracker, it is capable of three-dimensional tracking of one to several objects in a large volume, yet it is compact, light-weight, and relatively inexpensive. Alternatively, a tracker produces a diverging laser beam which is directed towards a fixed position, and senses when a retroreflective target enters the fixed field of view. An optically bar coded target can be read by the tracker to provide information about the target. The target can be formed of a ball lens with a bar code on one end. As the target moves through the field, the ball lens causes the laser beam to scan across the bar code.

  5. A concatenated coding scheme for error control

    NASA Technical Reports Server (NTRS)

    Kasami, T.; Fujiwara, T.; Lin, S.

    1986-01-01

    In this paper, a concatenated coding scheme for error control in data communications is presented and analyzed. In this scheme, the inner code is used for both error correction and detection; however, the outer code is used only for error detection. A retransmission is requested if either the inner code decoder fails to make a successful decoding or the outer code decoder detects the presence of errors after the inner code decoding. Probability of undetected error (or decoding error) of the proposed scheme is derived. An efficient method for computing this probability is presented. Throughput efficiency of the proposed error control scheme incorporated with a selective-repeat ARQ retransmission strategy is also analyzed. Three specific examples are presented. One of the examples is proposed for error control in the NASA Telecommand System.

  6. A concatenated coding scheme for error control

    NASA Technical Reports Server (NTRS)

    Kasami, T.; Fujiwara, T.; Lin, S.

    1986-01-01

    In this paper, a concatenated coding scheme for error control in data communications is presented and analyzed. In this scheme, the inner code is used for both error correction and detection; however, the outer code is used only for error detection. A retransmission is requested if either the inner code decoder fails to make a successful decoding or the outer code decoder detects the presence of errors after the inner code decoding. Probability of undetected error (or decoding error) of the proposed scheme is derived. An efficient method for computing this probability is presented. Throughput efficiency of the proposed error control scheme incorporated with a selective-repeat ARQ retransmission strategy is also analyzed. Three specific examples are presented. One of the examples is proposed for error control in the NASA Telecommand System.

  7. Code Seal v 1.0

    SciTech Connect

    Chavez, Adrian; & Anderson, William

    2009-12-11

    CodeSeal is a Sandia National Laboratories developed technology that provides a means of securely obfuscating finite state machines in a mathematically provable way. The technology was developed in order to provide a solution for anti-reverse engineering, assured execution, and integrity of execution. CodeSeal accomplishes these goals with the addition of the concept of a trust anchor, a small piece of trust integrated into the system, to the model of code obfuscation. Code obfuscation is an active area of academic research, but most findings have merely demonstrated that general obfuscation is impossible. By modifying the security model such that we may rely on the presence of a small, tamper-protected device, however, Sandia has developed an effective method for obfuscating code. An open publication describing the technology in more detail can be found at http://eprint.iacr.org/2008/184.pdf.Independent Software/Hardware monitors, Use control, Supervisory Control And Data Acquisition (SCADA), Algorithm obfuscation

  8. Personality Profiles of Recently Terminated Executives.

    ERIC Educational Resources Information Center

    McLoughlin, Caven S.; And Others

    1983-01-01

    Administered the Sixteen Personality Factor Questionnaire to a group of executives (N=49) within seven days of their severance and compared the derived personality profiles with a normative group of employed business executives. Results showed that terminated executives were statistically different from employed executives on eight of 16…

  9. 45 CFR 1700.5 - Executive Director.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... INFORMATION SCIENCE ORGANIZATION AND FUNCTIONS § 1700.5 Executive Director. (a) The Executive Director serves... 45 Public Welfare 4 2011-10-01 2011-10-01 false Executive Director. 1700.5 Section 1700.5 Public... laws. (b) The Executive Director is directly responsible to the Commission, works under the...

  10. Flexible Policy-Directed Code Safety

    DTIC Science & Technology

    2006-01-01

    archive of all other files. Policy R esource O perations W rapped M ethods S ize (K B ) T im e (m in:sec) Null 0 17 20 1:08 LimitWrite...developed Security Automata SFI Implementation ( SASI ) [6], a system that enforces policies defined using automata by inserting code in program...executables similarly to what is done by Naccio. Although no performance analysis is available, SASI should be able to enforce many policies more

  11. Generation of Java code from Alvis model

    NASA Astrophysics Data System (ADS)

    Matyasik, Piotr; Szpyrka, Marcin; Wypych, Michał

    2015-12-01

    Alvis is a formal language that combines graphical modelling of interconnections between system entities (called agents) and a high level programming language to describe behaviour of any individual agent. An Alvis model can be verified formally with model checking techniques applied to the model LTS graph that represents the model state space. This paper presents transformation of an Alvis model into executable Java code. Thus, the approach provides a method of automatic generation of a Java application from formally verified Alvis model.

  12. Evidence of Dopaminergic Processing of Executive Inhibition

    PubMed Central

    Badgaiyan, Rajendra D.; Wack, David

    2011-01-01

    Inhibition of unwanted response is an important function of the executive system. Since the inhibitory system is impaired in patients with dysregulated dopamine system, we examined dopamine neurotransmission in the human brain during processing of a task of executive inhibition. The experiment used a recently developed dynamic molecular imaging technique to detect and map dopamine released during performance of a modified Eriksen's flanker task. In this study, young healthy volunteers received an intravenous injection of a dopamine receptor ligand (11C-raclopride) after they were positioned in the PET camera. After the injection, volunteers performed the flanker task under Congruent and Incongruent conditions in a single scan session. They were required to inhibit competing options to select an appropriate response in the Incongruent but not in the Congruent condition. The PET data were dynamically acquired during the experiment and analyzed using two variants of the simplified reference region model. The analysis included estimation of a number of receptor kinetic parameters before and after initiation of the Incongruent condition. We found increase in the rate of ligand displacement (from receptor sites) and decrease in the ligand binding potential in the Incongruent condition, suggesting dopamine release during task performance. These changes were observed in small areas of the putamen and caudate bilaterally but were most significant on the dorsal aspect of the body of left caudate. The results provide evidence of dopaminergic processing of executive inhibition and demonstrate that neurochemical changes associated with cognitive processing can be detected and mapped in a single scan session using dynamic molecular imaging. PMID:22162756

  13. Ultrasensitive and selective detection of copper (II) and mercury (II) ions by dye-coded silver nanoparticle-based SERS probes.

    PubMed

    Li, Feng; Wang, Jing; Lai, Yuming; Wu, Chong; Sun, Shuqing; He, Yonghong; Ma, Hui

    2013-01-15

    A simple and distinctive method for the ultrasensitive detection of Cu(2+) and Hg(2+) based on surface-enhanced Raman scattering (SERS) using cysteine-functionalized silver nanoparticles (AgNPs) attached with Raman-labeling molecules was developed. The glycine residue in a silver nanoparticle-bound cysteine can selectively bind with Cu(2+) and Hg(2+) and form a stable inner complex. Silver nanoparticles co-functionalized with cysteine and 3,5-Dimethoxy-4-(6'-azobenzotriazolyl)phenol (AgNP conjugates) can be used to detect Cu(2+) and Hg(2+) based on aggregation-induced SERS of the Raman tags. The addition of SCN(-) to the analyte can successfully mask Hg(2+) and allow for the selective detection of Cu(2+). This SERS-based assay showed an unprecedented limit of detection (LOD) of 10pM for Cu(2+) and 1pM for Hg(2+); these LODs are a few orders of magnitude more sensitive than the typical colorimetric approach based on the aggregation of noble nanoparticles. The analysis of real water samples diluted with pure water was performed and verified this conclusion. We envisage that this SERS-based assay may provide a general and simple approach for the detection of other metal ions of interest, which can be adopted from their corresponding colorimetric assays that have already been developed with significantly improved sensitivity and thus have wide-range applications in many areas.

  14. Dinucleotide circular codes and bijective transformations.

    PubMed

    Fimmel, Elena; Giannerini, Simone; Gonzalez, Diego Luis; Strüngmann, Lutz

    2015-12-07

    The presence of circular codes in mRNA coding sequences is postulated to be involved in informational mechanisms aimed at detecting and maintaining the normal reading frame during protein synthesis. Most of the recent research is focused on trinucleotide circular codes. However, also dinucleotide circular codes are important since dinucleotides are ubiquitous in genomes and associated to important biological functions. In this work we adopt the group theoretic approach used for trinucleotide codes in Fimmel et al. (2015) to study dinucleotide circular codes and highlight their symmetry properties. Moreover, we characterize such codes in terms of n-circularity and provide a graph representation that allows to visualize them geometrically. The results establish a theoretical framework for the study of the biological implications of dinucleotide circular codes in genomic sequences.

  15. Atomicity violation detection using access interleaving invariants

    DOEpatents

    Zhou, Yuanyuan; Lu, Shan; Tucek, Joseph Andrew

    2013-09-10

    During execution of a program, the situation where the atomicity of a pair of instructions that are to be executed atomically is violated is identified, and a bug is detected as occurring in the program at the pair of instructions. The pairs of instructions that are to be executed atomically can be identified in different manners, such as by executing a program multiple times and using the results of those executions to automatically identify the pairs of instructions.

  16. Model Children's Code.

    ERIC Educational Resources Information Center

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  17. Coding of Neuroinfectious Diseases.

    PubMed

    Barkley, Gregory L

    2015-12-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  18. Diagnostic Coding for Epilepsy.

    PubMed

    Williams, Korwyn; Nuwer, Marc R; Buchhalter, Jeffrey R

    2016-02-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  19. Phylogeny of genetic codes and punctuation codes within genetic codes.

    PubMed

    Seligmann, Hervé

    2015-03-01

    Punctuation codons (starts, stops) delimit genes, reflect translation apparatus properties. Most codon reassignments involve punctuation. Here two complementary approaches classify natural genetic codes: (A) properties of amino acids assigned to codons (classical phylogeny), coding stops as X (A1, antitermination/suppressor tRNAs insert unknown residues), or as gaps (A2, no translation, classical stop); and (B) considering only punctuation status (start, stop and other codons coded as -1, 0 and 1 (B1); 0, -1 and 1 (B2, reflects ribosomal translational dynamics); and 1, -1, and 0 (B3, starts/stops as opposites)). All methods separate most mitochondrial codes from most nuclear codes; Gracilibacteria consistently cluster with metazoan mitochondria; mitochondria co-hosted with chloroplasts cluster with nuclear codes. Method A1 clusters the euplotid nuclear code with metazoan mitochondria; A2 separates euplotids from mitochondria. Firmicute bacteria Mycoplasma/Spiroplasma and Protozoan (and lower metazoan) mitochondria share codon-amino acid assignments. A1 clusters them with mitochondria, they cluster with the standard genetic code under A2: constraints on amino acid ambiguity versus punctuation-signaling produced the mitochondrial versus bacterial versions of this genetic code. Punctuation analysis B2 converges best with classical phylogenetic analyses, stressing the need for a unified theory of genetic code punctuation accounting for ribosomal constraints.

  20. To Code or Not To Code?

    ERIC Educational Resources Information Center

    Parkinson, Brian; Sandhu, Parveen; Lacorte, Manel; Gourlay, Lesley

    1998-01-01

    This article considers arguments for and against the use of coding systems in classroom-based language research and touches on some relevant considerations from ethnographic and conversational analysis approaches. The four authors each explain and elaborate on their practical decision to code or not to code events or utterances at a specific point…

  1. A (72, 36; 15) box code

    NASA Technical Reports Server (NTRS)

    Solomon, G.

    1993-01-01

    A (72,36;15) box code is constructed as a 9 x 8 matrix whose columns add to form an extended BCH-Hamming (8,4;4) code and whose rows sum to odd or even parity. The newly constructed code, due to its matrix form, is easily decodable for all seven-error and many eight-error patterns. The code comes from a slight modification in the parity (eighth) dimension of the Reed-Solomon (8,4;5) code over GF(512). Error correction uses the row sum parity information to detect errors, which then become erasures in a Reed-Solomon correction algorithm.

  2. Transionospheric Propagation Code (TIPC)

    SciTech Connect

    Roussel-Dupre, R.; Kelley, T.A.

    1990-10-01

    The Transionospheric Propagation Code is a computer program developed at Los Alamos National Lab to perform certain tasks related to the detection of vhf signals following propagation through the ionosphere. The code is written in Fortran 77, runs interactively and was designed to be as machine independent as possible. A menu format in which the user is prompted to supply appropriate parameters for a given task has been adopted for the input while the output is primarily in the form of graphics. The user has the option of selecting from five basic tasks, namely transionospheric propagation, signal filtering, signal processing, DTOA study, and DTOA uncertainty study. For the first task a specified signal is convolved against the impulse response function of the ionosphere to obtain the transionospheric signal. The user is given a choice of four analytic forms for the input pulse or of supplying a tabular form. The option of adding Gaussian-distributed white noise of spectral noise to the input signal is also provided. The deterministic ionosphere is characterized to first order in terms of a total electron content (TEC) along the propagation path. In addition, a scattering model parameterized in terms of a frequency coherence bandwidth is also available. In the second task, detection is simulated by convolving a given filter response against the transionospheric signal. The user is given a choice of a wideband filter or a narrowband Gaussian filter. It is also possible to input a filter response. The third task provides for quadrature detection, envelope detection, and three different techniques for time-tagging the arrival of the transionospheric signal at specified receivers. The latter algorithms can be used to determine a TEC and thus take out the effects of the ionosphere to first order. Task four allows the user to construct a table of delta-times-of-arrival (DTOAs) vs TECs for a specified pair of receivers.

  3. 3 CFR 13499 - Executive Order 13499 of February 5, 2009. Further Amendments to Executive Order 12835...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false Executive Order 13499 of February 5, 2009. Further Amendments to Executive Order 12835, Establishment of the National Economic Council 13499 Order 13499 Presidential Documents Executive Orders Executive Order 13499 of February 5, 2009 EO 13499 Further Amendments to Executive Order 12835, Establishmen...

  4. 3 CFR 13500 - Executive Order 13500 of February 5, 2009. Further Amendments to Executive Order 12859...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false Executive Order 13500 of February 5, 2009. Further Amendments to Executive Order 12859, Establishment of the Domestic Policy Council 13500 Order 13500 Presidential Documents Executive Orders Executive Order 13500 of February 5, 2009 EO 13500 Further Amendments to Executive Order 12859, Establishment...

  5. 3 CFR 13644 - Executive Order 13644 of May 21, 2013. Amendment to Executive Order 13639

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 3 The President 1 2014-01-01 2014-01-01 false Executive Order 13644 of May 21, 2013. Amendment to Executive Order 13639 13644 Order 13644 Presidential Documents Executive Orders Executive Order 13644 of May 21, 2013 EO 13644 Amendment to Executive Order 13639 By the authority vested in me as President...

  6. 3 CFR 13516 - Executive Order 13516 of October 28, 2009. Amending Executive Order 13462

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... functions under this order.” (f) by substituting “section 1.6(c) of Executive Order 12333, as amended” for... 3 The President 1 2010-01-01 2010-01-01 false Executive Order 13516 of October 28, 2009. Amending Executive Order 13462 13516 Order 13516 Presidential Documents Executive Orders Executive Order 13516...

  7. NRC Job Code V6060: Extended in-situ and real time monitoring. Task 4: Detection and monitoring of leaks at nuclear power plants external to structures

    SciTech Connect

    Sheen, S. H.

    2012-08-01

    In support of Task 4 of the NRC study on compliance with 10 CFR part 20.1406, minimization of contamination, Argonne National Laboratory (ANL) conducted a one-year scoping study, in concert with a parallel study performed by NRC/NRR staff, on monitoring for leaks at nuclear power plants (NPPs) external to structures. The objective of this task-4 study is to identify and assess those sensors and monitoring techniques for early detection of abnormal radioactive releases from the engineered facility structures, systems and components (SSCs) to the surrounding underground environment in existing NPPs and planned new reactors. As such, methods of interest include: (1) detection of anomalous water content of soils surrounding SSCs, (2) radionuclides contained in the leaking water, and (3) secondary signals such as temperature. ANL work scope includes mainly to (1) identify, in concert with the nuclear industry, the sensors and techniques that have most promise to detect radionuclides and/or associated chemical releases from SSCs of existing NPPs and (2) review and provide comments on the results of the NRC/NRR staff scoping study to identify candidate technologies. This report constitutes the ANL deliverable of the task-4 study. It covers a survey of sensor technologies and leak detection methods currently applied to leak monitoring at NPPs. The survey also provides a technology evaluation that identifies their strength and deficiency based on their detection speed, sensitivity, range and reliability. Emerging advanced technologies that are potentially capable of locating releases, identifying the radionuclides, and estimating their concentrations and distributions are also included in the report along with suggestions of required further research and development.

  8. GridRun: A lightweight packaging and execution environment forcompact, multi-architecture binaries

    SciTech Connect

    Shalf, John; Goodale, Tom

    2004-02-01

    GridRun offers a very simple set of tools for creating and executing multi-platform binary executables. These ''fat-binaries'' archive native machine code into compact packages that are typically a fraction the size of the original binary images they store, enabling efficient staging of executables for heterogeneous parallel jobs. GridRun interoperates with existing distributed job launchers/managers like Condor and the Globus GRAM to greatly simplify the logic required launching native binary applications in distributed heterogeneous environments.

  9. ATLAS, an integrated structural analysis and design system. Volume 3: User's manual, input and execution data

    NASA Technical Reports Server (NTRS)

    Dreisbach, R. L. (Editor)

    1979-01-01

    The input data and execution control statements for the ATLAS integrated structural analysis and design system are described. It is operational on the Control Data Corporation (CDC) 6600/CYBER computers in a batch mode or in a time-shared mode via interactive graphic or text terminals. ATLAS is a modular system of computer codes with common executive and data base management components. The system provides an extensive set of general-purpose technical programs with analytical capabilities including stiffness, stress, loads, mass, substructuring, strength design, unsteady aerodynamics, vibration, and flutter analyses. The sequence and mode of execution of selected program modules are controlled via a common user-oriented language.

  10. Bare Code Reader

    NASA Astrophysics Data System (ADS)

    Clair, Jean J.

    1980-05-01

    The Bare code system will be used, in every market and supermarket. The code, which is normalised in US and Europe (code EAN) gives informations on price, storage, nature and allows in real time the gestion of theshop.

  11. Executive Headteachers: What's in a Name? Executive Summary

    ERIC Educational Resources Information Center

    Theobald, Katy; Lord, Pippa

    2016-01-01

    Executive headteachers (EHTs) are becoming increasingly prevalent as the self-improving school system matures; there are over 620 EHTs in the school workforce today; and the number recorded in the School Workforce Census (SWC) has increased by 240 per cent between 2010 and 2014. The role is still evolving locally and nationally and, as EHTs take…

  12. ADAMS executive and operating system

    NASA Technical Reports Server (NTRS)

    Pittman, W. D.

    1981-01-01

    The ADAMS Executive and Operating System, a multitasking environment under which a variety of data reduction, display and utility programs are executed, a system which provides a high level of isolation between programs allowing them to be developed and modified independently, is described. The Airborne Data Analysis/Monitor System (ADAMS) was developed to provide a real time data monitoring and analysis capability onboard Boeing commercial airplanes during flight testing. It inputs sensor data from an airplane performance data by applying transforms to the collected sensor data, and presents this data to test personnel via various display media. Current utilization and future development are addressed.

  13. Business Development Executive (BDE) Program

    SciTech Connect

    Rice, E.J. "Woody"; Frederick, W. James

    2005-12-05

    The IPST BDE (Institute of Paper Science and Technology Business Development Executive) program was initiated in 1997 to make the paper industry better aware of the new manufacturing technologies being developed at IPST for the U.S. pulp and paper industry's use. In April 2000, the BDE program management and the 20 BDEs, all retired senior level industry manufacturing and research executives, were asked by Ms. Denise Swink of OIT at DOE to take the added responsibility of bringing DOE developed energy conservation technology to the paper industry. This project was funded by a DOE grant of $950,000.

  14. Qualitative Change in Executive Control during Childhood and Adulthood

    ERIC Educational Resources Information Center

    Chevalier, Nicolas; Huber, Kristina L.; Wiebe, Sandra A.; Espy, Kimberly Andrews

    2013-01-01

    Executive control development typically has been conceptualized to result from quantitative changes in the efficiency of the underlying processes. In contrast, the present study addressed the possibility of qualitative change with age by examining how children and adults detect task switches. Participants in three age groups (5- and 10-year-old…

  15. Qualitative Change in Executive Control during Childhood and Adulthood

    ERIC Educational Resources Information Center

    Chevalier, Nicolas; Huber, Kristina L.; Wiebe, Sandra A.; Espy, Kimberly Andrews

    2013-01-01

    Executive control development typically has been conceptualized to result from quantitative changes in the efficiency of the underlying processes. In contrast, the present study addressed the possibility of qualitative change with age by examining how children and adults detect task switches. Participants in three age groups (5- and 10-year-old…

  16. Generalized concatenated quantum codes

    SciTech Connect

    Grassl, Markus; Shor, Peter; Smith, Graeme; Smolin, John; Zeng Bei

    2009-05-15

    We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length but also asymptotically meet the quantum Hamming bound for large block length.

  17. Getting the right grasp on executive function

    PubMed Central

    Gonzalez, Claudia L. R.; Mills, Kelly J.; Genee, Inge; Li, Fangfang; Piquette, Noella; Rosen, Nicole; Gibb, Robbin

    2014-01-01

    Executive Function (EF) refers to important socio-emotional and cognitive skills that are known to be highly correlated with both academic and life success. EF is a blanket term that is considered to include self-regulation, working memory, and planning. Recent studies have shown a relationship between EF and motor control. The emergence of motor control coincides with that of EF, hence understanding the relationship between these two domains could have significant implications for early detection and remediation of later EF deficits. The purpose of the current study was to investigate this relationship in young children. This study incorporated the Behavioral Rating Inventory of Executive Function (BRIEF) and two motor assessments with a focus on precision grasping to test this hypothesis. The BRIEF is comprised of two indices of EF: (1) the Behavioral Regulation Index (BRI) containing three subscales: Inhibit, Shift, and Emotional Control; (2) the Metacognition Index (MI) containing five subscales: Initiate, Working Memory, Plan/Organize, Organization of Materials, and Monitor. A global executive composite (GEC) is derived from the two indices. In this study, right-handed children aged 5–6 and 9–10 were asked to: grasp-to-construct (Lego® models); and grasp-to-place (wooden blocks), while their parents completed the BRIEF questionnaire. Analysis of results indicated significant correlations between the strength of right hand preference for grasping and numerous elements of the BRIEF including the BRI, MI, and GEC. Specifically, the more the right hand was used for grasping the better the EF ratings. In addition, patterns of space-use correlated with the GEC in several subscales of the BRIEF. Finally and remarkably, the results also showed a reciprocal relationship between hand and space use for grasping and EF. These findings are discussed with respect to: (1) the developmental overlap of motor and executive functions; (2) detection of EF deficits through

  18. Detection of the oomycete Pythium insidiosum by real-time PCR targeting the gene coding for exo-1,3-β-glucanase.

    PubMed

    Keeratijarut, Angsana; Lohnoo, Tassanee; Yingyong, Wanta; Rujirawat, Thidarat; Srichunrusami, Chutatip; Onpeaw, Pornpit; Chongtrakool, Piriyaporn; Brandhorst, T Tristan; Krajaejun, Theerapong

    2015-09-01

    Pythiosis is a life-threatening infectious disease caused by Pythium insidiosum. Early and accurate diagnosis is the key to prompt treatment and an improved prognosis for patients with pythiosis. An alternative to microbiological and immunological approaches for facilitating diagnosis of pythiosis is the PCR-based assay. Until recently, the ribosomal DNA (rDNA) region was the only target available for PCR-based detection of P. insidiosum. Failure to detect P. insidiosum by PCR amplification using the rDNA-specific primers has been reported. PinsEXO1, encoding an exo-1,3-β-glucanase, is an alternative, novel and efficient target for identification of P. insidiosum by conventional PCR. In this study, we aimed to develop a real-time (RT)-PCR approach targeting PinsEXO1 and compare its performance with conventional PCR for the detection of P. insidiosum. Both conventional and RT-PCR assays were positive for all 35 P. insidiosum strains tested, whilst all 58 control fungi were negative. The turnaround time for conventional PCR was 10 h, whilst that for RT-PCR was 7.5 h. The lowest amounts of genomic DNA template required for successful amplification by conventional and RT-PCR were 1 and 1 × 10(-4) ng, respectively. In conclusion, the RT-PCR assay retained 100% sensitivity and 100% specificity for detection of P. insidiosum. It showed a substantially improved analytical sensitivity and turnaround time that could improve diagnosis of pythiosis. The assay could also facilitate quantitative DNA analysis and epidemiological studies of P. insidiosum.

  19. Maximal dinucleotide comma-free codes.

    PubMed

    Fimmel, Elena; Strüngmann, Lutz

    2016-01-21

    The problem of retrieval and maintenance of the correct reading frame plays a significant role in RNA transcription. Circular codes, and especially comma-free codes, can help to understand the underlying mechanisms of error-detection in this process. In recent years much attention has been paid to the investigation of trinucleotide circular codes (see, for instance, Fimmel et al., 2014; Fimmel and Strüngmann, 2015a; Michel and Pirillo, 2012; Michel et al., 2012, 2008), while dinucleotide codes had been touched on only marginally, even though dinucleotides are associated to important biological functions. Recently, all maximal dinucleotide circular codes were classified (Fimmel et al., 2015; Michel and Pirillo, 2013). The present paper studies maximal dinucleotide comma-free codes and their close connection to maximal dinucleotide circular codes. We give a construction principle for such codes and provide a graphical representation that allows them to be visualized geometrically. Moreover, we compare the results for dinucleotide codes with the corresponding situation for trinucleotide maximal self-complementary C(3)-codes. Finally, the results obtained are discussed with respect to Crick׳s hypothesis about frame-shift-detecting codes without commas.

  20. RNomic identification and evaluation of npcTB_6715, a non-protein-coding RNA gene as a potential biomarker for the detection of Mycobacterium tuberculosis.

    PubMed

    Kanniappan, Priyatharisni; Ahmed, Siti Aminah; Rajasekaram, Ganeswrie; Marimuthu, Citartan; Ch'ng, Ewe Seng; Lee, Li Pin; Raabe, Carsten A; Rozhdestvensky, Timofey S; Tang, Thean Hock

    2017-10-01

    Technological advances in RNA biology greatly improved transcriptome profiling during the last two decades. Besides the discovery of many small RNAs (sRNA) that are involved in the physiological and pathophysiological regulation of various cellular circuits, it becomes evident that the corresponding RNA genes might also serve as potential biomarkers to monitor the progression of disease and treatment. sRNA gene candidate npcTB_6715 was previously identified via experimental RNomic (unpublished data), and we report its application as potential biomarker for the detection of Mycobacterium tuberculosis (MTB) in patient samples. For proof of principle, we developed a multiplex PCR assay and report its validation with 500 clinical cultures, positive for Mycobacteria. The analysis revealed 98.9% sensitivity, 96.1% specificity, positive and negative predictive values of 98.6% and 96.8%, respectively. These results underscore the diagnostic value of the sRNA gene as diagnostic marker for the specific detection of MTB in clinical samples. Its successful application and the general ease of PCR-based detection compared to standard bacterial culture techniques might be the first step towards 'point-of-care' diagnostics of Mycobacteria. To the best of our knowledge, this is the first time for the design of diagnostic applications based on sRNA genes, in Mycobacteria. © 2017 The Authors. Journal of Cellular and Molecular Medicine published by John Wiley & Sons Ltd and Foundation for Cellular and Molecular Medicine.

  1. Performing aggressive code optimization with an ability to rollback changes made by the aggressive optimizations

    DOEpatents

    Gschwind, Michael K

    2013-07-23

    Mechanisms for aggressively optimizing computer code are provided. With these mechanisms, a compiler determines an optimization to apply to a portion of source code and determines if the optimization as applied to the portion of source code will result in unsafe optimized code that introduces a new source of exceptions being generated by the optimized code. In response to a determination that the optimization is an unsafe optimization, the compiler generates an aggressively compiled code version, in which the unsafe optimization is applied, and a conservatively compiled code version in which the unsafe optimization is not applied. The compiler stores both versions and provides them for execution. Mechanisms are provided for switching between these versions during execution in the event of a failure of the aggressively compiled code version. Moreover, predictive mechanisms are provided for predicting whether such a failure is likely.

  2. The Effect of Repetitive Saccade Execution on the Attention Network Test: Enhancing Executive Function with a Flick of the Eyes

    ERIC Educational Resources Information Center

    Edlin, James M.; Lyle, Keith B.

    2013-01-01

    The simple act of repeatedly looking left and right can enhance subsequent cognition, including divergent thinking, detection of matching letters from visual arrays, and memory retrieval. One hypothesis is that saccade execution enhances subsequent cognition by altering attentional control. To test this hypothesis, we compared performance…

  3. The Effect of Repetitive Saccade Execution on the Attention Network Test: Enhancing Executive Function with a Flick of the Eyes

    ERIC Educational Resources Information Center

    Edlin, James M.; Lyle, Keith B.

    2013-01-01

    The simple act of repeatedly looking left and right can enhance subsequent cognition, including divergent thinking, detection of matching letters from visual arrays, and memory retrieval. One hypothesis is that saccade execution enhances subsequent cognition by altering attentional control. To test this hypothesis, we compared performance…

  4. 78 FR 73586 - Senior Executive Service Performance Review Board (PRB) and Executive Resources Board (ERB...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-06

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Surface Transportation Board Senior Executive Service Performance Review Board (PRB) and Executive Resources Board (ERB) Membership AGENCY: Surface Transportation Board, DOT. ACTION: Senior Executive...

  5. Executive Center Makes Rapid Progress.

    ERIC Educational Resources Information Center

    Dumarsq, Carolyn C.; Scott, Charles A.

    1987-01-01

    In a pilot test, superintendents participated in self-assessment activities in the American Association of School Administrator's Executive Development Center program. Activity stages centered on professional attitudes and skills, personal health, and fitness. Data provided a profile for professional development. Participants felt activities were…

  6. 78 FR 28441 - Executive Compensation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-14

    ... percentage cap relative to comparator institution compensation that would apply to the Enterprises' executive... regulations relating to the Banks, considers the differences between the Banks and the Enterprises with... Director also considers any other differences that are deemed appropriate. In preparing the proposed...

  7. Integrating planning, execution, and learning

    NASA Technical Reports Server (NTRS)

    Kuokka, Daniel R.

    1989-01-01

    To achieve the goal of building an autonomous agent, the usually disjoint capabilities of planning, execution, and learning must be used together. An architecture, called MAX, within which cognitive capabilities can be purposefully and intelligently integrated is described. The architecture supports the codification of capabilities as explicit knowledge that can be reasoned about. In addition, specific problem solving, learning, and integration knowledge is developed.

  8. Formation of Professionalism of Executives

    ERIC Educational Resources Information Center

    Gerasimov, Kirill; Gerasimov, Boris

    2017-01-01

    Purpose: The purpose of this paper is to present the results of the research in the sphere of education and preparation of Russian executives in view of mentality and elements of national model of management. Design/methodology/approach: The research consisted in analysis of modern developments in the sphere of HR management in socio-economic…

  9. Executive Committee Report, October 2003

    ERIC Educational Resources Information Center

    Sarquis, Jerry L.; Nakhleh, Mary; Holme, Thomas A.

    2004-01-01

    New appointments to the Board of Publication of JCE, and to the Examination Institute Board of Trustees are reported by the Secretary at the Executive Committee Meeting. Further reports from members of the ACS Council, the presentation of the Outstanding Service Award, and the recognition of Outreach Ambassadors for distributing JCE education…

  10. Executive Committee Report, April 2004

    ERIC Educational Resources Information Center

    Sarquis, Jerry L.; Holme, Thomas; Cooper, Melanie; White, Carol

    2004-01-01

    Anaheim executive committee report, April 2004 of American Chemical Society (ACS) is presented. It salutes the recipients of ACS awards at the CHED session and also covers the Spring 2004 ACS meeting abstracts, nominations for the division office and councilor's report.

  11. Formation of Professionalism of Executives

    ERIC Educational Resources Information Center

    Gerasimov, Kirill; Gerasimov, Boris

    2017-01-01

    Purpose: The purpose of this paper is to present the results of the research in the sphere of education and preparation of Russian executives in view of mentality and elements of national model of management. Design/methodology/approach: The research consisted in analysis of modern developments in the sphere of HR management in socio-economic…

  12. Accumulate repeat accumulate codes

    NASA Technical Reports Server (NTRS)

    Abbasfar, Aliazam; Divsalar, Dariush; Yao, Kung

    2004-01-01

    In this paper we propose an innovative channel coding scheme called 'Accumulate Repeat Accumulate codes' (ARA). This class of codes can be viewed as serial turbo-like codes, or as a subclass of Low Density Parity Check (LDPC) codes, thus belief propagation can be used for iterative decoding of ARA codes on a graph. The structure of encoder for this class can be viewed as precoded Repeat Accumulate (RA) code or as precoded Irregular Repeat Accumulate (IRA) code, where simply an accumulator is chosen as a precoder. Thus ARA codes have simple, and very fast encoder structure when they representing LDPC codes. Based on density evolution for LDPC codes through some examples for ARA codes, we show that for maximum variable node degree 5 a minimum bit SNR as low as 0.08 dB from channel capacity for rate 1/2 can be achieved as the block size goes to infinity. Thus based on fixed low maximum variable node degree, its threshold outperforms not only the RA and IRA codes but also the best known LDPC codes with the dame maximum node degree. Furthermore by puncturing the accumulators any desired high rate codes close to code rate 1 can be obtained with thresholds that stay close to the channel capacity thresholds uniformly. Iterative decoding simulation results are provided. The ARA codes also have projected graph or protograph representation that allows for high speed decoder implementation.

  13. Coset Codes Viewed as Terminated Convolutional Codes

    NASA Technical Reports Server (NTRS)

    Fossorier, Marc P. C.; Lin, Shu

    1996-01-01

    In this paper, coset codes are considered as terminated convolutional codes. Based on this approach, three new general results are presented. First, it is shown that the iterative squaring construction can equivalently be defined from a convolutional code whose trellis terminates. This convolutional code determines a simple encoder for the coset code considered, and the state and branch labelings of the associated trellis diagram become straightforward. Also, from the generator matrix of the code in its convolutional code form, much information about the trade-off between the state connectivity and complexity at each section, and the parallel structure of the trellis, is directly available. Based on this generator matrix, it is shown that the parallel branches in the trellis diagram of the convolutional code represent the same coset code C(sub 1), of smaller dimension and shorter length. Utilizing this fact, a two-stage optimum trellis decoding method is devised. The first stage decodes C(sub 1), while the second stage decodes the associated convolutional code, using the branch metrics delivered by stage 1. Finally, a bidirectional decoding of each received block starting at both ends is presented. If about the same number of computations is required, this approach remains very attractive from a practical point of view as it roughly doubles the decoding speed. This fact is particularly interesting whenever the second half of the trellis is the mirror image of the first half, since the same decoder can be implemented for both parts.

  14. Concatenated Coding Using Trellis-Coded Modulation

    NASA Technical Reports Server (NTRS)

    Thompson, Michael W.

    1997-01-01

    In the late seventies and early eighties a technique known as Trellis Coded Modulation (TCM) was developed for providing spectrally efficient error correction coding. Instead of adding redundant information in the form of parity bits, redundancy is added at the modulation stage thereby increasing bandwidth efficiency. A digital communications system can be designed to use bandwidth-efficient multilevel/phase modulation such as Amplitude Shift Keying (ASK), Phase Shift Keying (PSK), Differential Phase Shift Keying (DPSK) or Quadrature Amplitude Modulation (QAM). Performance gain can be achieved by increasing the number of signals over the corresponding uncoded system to compensate for the redundancy introduced by the code. A considerable amount of research and development has been devoted toward developing good TCM codes for severely bandlimited applications. More recently, the use of TCM for satellite and deep space communications applications has received increased attention. This report describes the general approach of using a concatenated coding scheme that features TCM and RS coding. Results have indicated that substantial (6-10 dB) performance gains can be achieved with this approach with comparatively little bandwidth expansion. Since all of the bandwidth expansion is due to the RS code we see that TCM based concatenated coding results in roughly 10-50% bandwidth expansion compared to 70-150% expansion for similar concatenated scheme which use convolution code. We stress that combined coding and modulation optimization is important for achieving performance gains while maintaining spectral efficiency.

  15. An Assessment of the Detection of Highly Enriched Uranium and its Use in an Improvised Nuclear Device using the Monte Carlo Computer Code MCNP-5

    NASA Astrophysics Data System (ADS)

    Cochran, Thomas

    2007-04-01

    In 2002 and again in 2003, an investigative journalist unit at ABC News transported a 6.8 kilogram metallic slug of depleted uranium (DU) via shipping container from Istanbul, Turkey to Brooklyn, NY and from Jakarta, Indonesia to Long Beach, CA. Targeted inspection of these shipping containers by Department of Homeland Security (DHS) personnel, included the use of gamma-ray imaging, portal monitors and hand-held radiation detectors, did not uncover the hidden DU. Monte Carlo analysis of the gamma-ray intensity and spectrum of a DU slug and one consisting of highly-enriched uranium (HEU) showed that DU was a proper surrogate for testing the ability of DHS to detect the illicit transport of HEU. Our analysis using MCNP-5 illustrated the ease of fully shielding an HEU sample to avoid detection. The assembly of an Improvised Nuclear Device (IND) -- a crude atomic bomb -- from sub-critical pieces of HEU metal was then examined via Monte Carlo criticality calculations. Nuclear explosive yields of such an IND as a function of the speed of assembly of the sub-critical HEU components were derived. A comparison was made between the more rapid assembly of sub-critical pieces of HEU in the ``Little Boy'' (Hiroshima) weapon's gun barrel and gravity assembly (i.e., dropping one sub-critical piece of HEU on another from a specified height). Based on the difficulty of detection of HEU and the straightforward construction of an IND utilizing HEU, current U.S. government policy must be modified to more urgently prioritize elimination of and securing the global inventories of HEU.

  16. An Extended Proof-Carrying Code Framework for Security Enforcement

    NASA Astrophysics Data System (ADS)

    Pirzadeh, Heidar; Dubé, Danny; Hamou-Lhadj, Abdelwahab

    The rapid growth of the Internet has resulted in increased attention to security to protect users from being victims of security threats. In this paper, we focus on security mechanisms that are based on Proof-Carrying Code (PCC) techniques. In a PCC system, a code producer sends a code along with its safety proof to the consumer. The consumer executes the code only if the proof is valid. Although PCC has been shown to be a useful security framework, it suffers from the sheer size of typical proofs -proofs of even small programs can be considerably large. In this paper, we propose an extended PCC framework (EPCC) in which, instead of the proof, a proof generator for the program in question is transmitted. This framework enables the execution of the proof generator and the recovery of the proof on the consumer's side in a secure manner using a newly created virtual machine called the VEP (Virtual Machine for Extended PCC).

  17. Automatic code generation from the OMT-based dynamic model

    SciTech Connect

    Ali, J.; Tanaka, J.

    1996-12-31

    The OMT object-oriented software development methodology suggests creating three models of the system, i.e., object model, dynamic model and functional model. We have developed a system that automatically generates implementation code from the dynamic model. The system first represents the dynamic model as a table and then generates executable Java language code from it. We used inheritance for super-substate relationships. We considered that transitions relate to states in a state diagram exactly as operations relate to classes in an object diagram. In the generated code, each state in the state diagram becomes a class and each event on a state becomes an operation on the corresponding class. The system is implemented and can generate executable code for any state diagram. This makes the role of the dynamic model more significant and the job of designers even simpler.

  18. Mining dynamic noteworthy functions in software execution sequences.

    PubMed

    Zhang, Bing; Huang, Guoyan; Wang, Yuqian; He, Haitao; Ren, Jiadong

    2017-01-01

    As the quality of crucial entities can directly affect that of software, their identification and protection become an important premise for effective software development, management, maintenance and testing, which thus contribute to improving the software quality and its attack-defending ability. Most analysis and evaluation on important entities like codes-based static structure analysis are on the destruction of the actual software running. In this paper, from the perspective of software execution process, we proposed an approach to mine dynamic noteworthy functions (DNFM)in software execution sequences. First, according to software decompiling and tracking stack changes, the execution traces composed of a series of function addresses were acquired. Then these traces were modeled as execution sequences and then simplified so as to get simplified sequences (SFS), followed by the extraction of patterns through pattern extraction (PE) algorithm from SFS. After that, evaluating indicators inner-importance and inter-importance were designed to measure the noteworthiness of functions in DNFM algorithm. Finally, these functions were sorted by their noteworthiness. Comparison and contrast were conducted on the experiment results from two traditional complex network-based node mining methods, namely PageRank and DegreeRank. The results show that the DNFM method can mine noteworthy functions in software effectively and precisely.

  19. Executive and language control in the multilingual brain.

    PubMed

    Kong, Anthony Pak-Hin; Abutalebi, Jubin; Lam, Karen Sze-Yan; Weekes, Brendan

    2014-01-01

    Neuroimaging studies suggest that the neural network involved in language control may not be specific to bi-/multilingualism but is part of a domain-general executive control system. We report a trilingual case of a Cantonese (L1), English (L2), and Mandarin (L3) speaker, Dr. T, who sustained a brain injury at the age of 77 causing lesions in the left frontal lobe and in the left temporo-parietal areas resulting in fluent aphasia. Dr. T's executive functions were impaired according to a modified version of the Stroop color-word test and the Wisconsin Card Sorting Test performance was characterized by frequent perseveration errors. Dr. T demonstrated pathological language switching and mixing across her three languages. Code switching in Cantonese was more prominent in discourse production than confrontation naming. Our case suggests that voluntary control of spoken word production in trilingual speakers shares neural substrata in the frontobasal ganglia system with domain-general executive control mechanisms. One prediction is that lesions to such a system would give rise to both pathological switching and impairments of executive functions in trilingual speakers.

  20. Mining dynamic noteworthy functions in software execution sequences

    PubMed Central

    Huang, Guoyan; Wang, Yuqian; He, Haitao; Ren, Jiadong

    2017-01-01

    As the quality of crucial entities can directly affect that of software, their identification and protection become an important premise for effective software development, management, maintenance and testing, which thus contribute to improving the software quality and its attack-defending ability. Most analysis and evaluation on important entities like codes-based static structure analysis are on the destruction of the actual software running. In this paper, from the perspective of software execution process, we proposed an approach to mine dynamic noteworthy functions (DNFM)in software execution sequences. First, according to software decompiling and tracking stack changes, the execution traces composed of a series of function addresses were acquired. Then these traces were modeled as execution sequences and then simplified so as to get simplified sequences (SFS), followed by the extraction of patterns through pattern extraction (PE) algorithm from SFS. After that, evaluating indicators inner-importance and inter-importance were designed to measure the noteworthiness of functions in DNFM algorithm. Finally, these functions were sorted by their noteworthiness. Comparison and contrast were conducted on the experiment results from two traditional complex network-based node mining methods, namely PageRank and DegreeRank. The results show that the DNFM method can mine noteworthy functions in software effectively and precisely. PMID:28278276

  1. Executive and Language Control in the Multilingual Brain

    PubMed Central

    Kong, Anthony Pak-Hin; Abutalebi, Jubin; Lam, Karen Sze-Yan; Weekes, Brendan

    2014-01-01

    Neuroimaging studies suggest that the neural network involved in language control may not be specific to bi-/multilingualism but is part of a domain-general executive control system. We report a trilingual case of a Cantonese (L1), English (L2), and Mandarin (L3) speaker, Dr. T, who sustained a brain injury at the age of 77 causing lesions in the left frontal lobe and in the left temporo-parietal areas resulting in fluent aphasia. Dr. T's executive functions were impaired according to a modified version of the Stroop color-word test and the Wisconsin Card Sorting Test performance was characterized by frequent perseveration errors. Dr. T demonstrated pathological language switching and mixing across her three languages. Code switching in Cantonese was more prominent in discourse production than confrontation naming. Our case suggests that voluntary control of spoken word production in trilingual speakers shares neural substrata in the frontobasal ganglia system with domain-general executive control mechanisms. One prediction is that lesions to such a system would give rise to both pathological switching and impairments of executive functions in trilingual speakers. PMID:24868121

  2. Symbolic PathFinder: Symbolic Execution of Java Bytecode

    NASA Technical Reports Server (NTRS)

    Pasareanu, Corina S.; Rungta, Neha

    2010-01-01

    Symbolic Pathfinder (SPF) combines symbolic execution with model checking and constraint solving for automated test case generation and error detection in Java programs with unspecified inputs. In this tool, programs are executed on symbolic inputs representing multiple concrete inputs. Values of variables are represented as constraints generated from the analysis of Java bytecode. The constraints are solved using off-the shelf solvers to generate test inputs guaranteed to achieve complex coverage criteria. SPF has been used successfully at NASA, in academia, and in industry.

  3. 3 CFR 13484 - Executive Order 13484 of January 9, 2009. Amending the Order of Succession Within the Department...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... laws of the United States of America, including the Federal Vacancies Reform Act of 1998, 5 U.S.C. 3345... 3345(a)(3) of title 5, United States Code); and “(n) State Executive Directors of the Farm Service... pay requirements of section 3345(a)(3) of title 5, United States Code).”. Sec. 2. Section 3(a)...

  4. Efficiency of a model human image code

    NASA Technical Reports Server (NTRS)

    Watson, Andrew B.

    1987-01-01

    Hypothetical schemes for neural representation of visual information can be expressed as explicit image codes. Here, a code modeled on the simple cells of the primate striate cortex is explored. The Cortex transform maps a digital image into a set of subimages (layers) that are bandpass in spatial frequency and orientation. The layers are sampled so as to minimize the number of samples and still avoid aliasing. Samples are quantized in a manner that exploits the bandpass contrast-masking properties of human vision. The entropy of the samples is computed to provide a lower bound on the code size. Finally, the image is reconstructed from the code. Psychophysical methods are derived for comparing the original and reconstructed images to evaluate the sufficiency of the code. When each resolution is coded at the threshold for detection artifacts, the image-code size is about 1 bit/pixel.

  5. Discussion on LDPC Codes and Uplink Coding

    NASA Technical Reports Server (NTRS)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  6. Discussion on LDPC Codes and Uplink Coding

    NASA Technical Reports Server (NTRS)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  7. Optical CDMA with Embedded Spectral-Polarization Coding over Double Balanced Differential-Detector

    NASA Astrophysics Data System (ADS)

    Huang, Jen-Fa; Yen, Chih-Ta; Chen, Bo-Hau

    A spectral-polarization coding (SPC) optical code-division multiple-access (OCDMA) configuration structured over arrayed-waveguide grating (AWG) router is proposed. The polarization-division double balanced detector is adopted to execute difference detection and enhances system performance. The signal-to-noise ratio (SNR) is derived by taking the effect of PIIN into account. The result indicates that there would be up to 9-dB SNR improvement than the conventional spectral-amplitude coding (SAC) structures with Walsh-Hadamard codes. Mathematical deriving results of the SNR demonstrate the system embedded with the orthogonal state of polarization (SOP) will suppress effectively phase-induced intensity noise (PIIN). In addition, we will analyze the relations about bit error rate (BER) vs. the number of active users under the different encoding schemes and compare them with our proposed scheme. The BER vs. the effective power under the different encoding scheme with the same number of simultaneous active user conditions are also revealed. Finally, the polarization-matched factor and the difference between simulated and experimental values are discussed.

  8. A Survey of New Trends in Symbolic Execution for Software Testing and Analysis

    NASA Technical Reports Server (NTRS)

    Pasareanu, Corina S.; Visser, Willem

    2009-01-01

    Symbolic execution is a well-known program analysis technique which represents values of program inputs with symbolic values instead of concrete (initialized) data and executes the program by manipulating program expressions involving the symbolic values. Symbolic execution has been proposed over three decades ago but recently it has found renewed interest in the research community, due in part to the progress in decision procedures, availability of powerful computers and new algorithmic developments. We provide a survey of some of the new research trends in symbolic execution, with particular emphasis on applications to test generation and program analysis. We first describe an approach that handles complex programming constructs such as input data structures, arrays, as well as multi-threading. We follow with a discussion of abstraction techniques that can be used to limit the (possibly infinite) number of symbolic configurations that need to be analyzed for the symbolic execution of looping programs. Furthermore, we describe recent hybrid techniques that combine concrete and symbolic execution to overcome some of the inherent limitations of symbolic execution, such as handling native code or availability of decision procedures for the application domain. Finally, we give a short survey of interesting new applications, such as predictive testing, invariant inference, program repair, analysis of parallel numerical programs and differential symbolic execution.

  9. Bar Codes for Libraries.

    ERIC Educational Resources Information Center

    Rahn, Erwin

    1984-01-01

    Discusses the evolution of standards for bar codes (series of printed lines and spaces that represent numbers, symbols, and/or letters of alphabet) and describes the two types most frequently adopted by libraries--Code-A-Bar and CODE 39. Format of the codes is illustrated. Six references and definitions of terminology are appended. (EJS)

  10. Manually operated coded switch

    DOEpatents

    Barnette, Jon H.

    1978-01-01

    The disclosure relates to a manually operated recodable coded switch in which a code may be inserted, tried and used to actuate a lever controlling an external device. After attempting a code, the switch's code wheels must be returned to their zero positions before another try is made.

  11. FORTRAN Automated Code Evaluation System (FACES) user's manual, version 2

    NASA Technical Reports Server (NTRS)

    1975-01-01

    A system which provides analysis services for FORTRAN based software systems not normally available from system software is presented. The system is not a compiler, and compiler syntax diagnostics are not duplicated. For maximum adaptation to FORTRAN dialects, the code presented to the system is assumed to be compiler acceptable. The system concentrates on acceptable FORTRAN code features which are likely to produce undesirable results and identifies potential trouble areas before they become execution time malfunctions.

  12. Evaluation of the efficiency and fault density of software generated by code generators

    NASA Technical Reports Server (NTRS)

    Schreur, Barbara

    1993-01-01

    Flight computers and flight software are used for GN&C (guidance, navigation, and control), engine controllers, and avionics during missions. The software development requires the generation of a considerable amount of code. The engineers who generate the code make mistakes and the generation of a large body of code with high reliability requires considerable time. Computer-aided software engineering (CASE) tools are available which generates code automatically with inputs through graphical interfaces. These tools are referred to as code generators. In theory, code generators could write highly reliable code quickly and inexpensively. The various code generators offer different levels of reliability checking. Some check only the finished product while some allow checking of individual modules and combined sets of modules as well. Considering NASA's requirement for reliability, an in house manually generated code is needed. Furthermore, automatically generated code is reputed to be as efficient as the best manually generated code when executed. In house verification is warranted.

  13. Archimedes: A system that plans and executes mechanical assemblies

    SciTech Connect

    Strip, D.

    1990-01-01

    Archimedes is a prototype mechanical assembly system which generates and executes robot assembly programs from a CAD model input. The system addresses the unrealized potential for flexibility in robotic mechanical assembly applications by automating the programming task. Input is a solid model of the finished assembly. Parts relationships and geometric constraints are deduced from the solid model. A rule-based planner generates a generic'' assembly plan that satisfies the geometric constraints, as well as other constraints embodied in the rules. A retargetable plan compiler converts the generic plan into code specific to an application environment. Execution of the compiled plan in a workcell containing an Adept Two robot, a vision system, and other parts handling equipment will be shown on videotape.

  14. Kepler Scientific Workflow Design and Execution with Contexts

    SciTech Connect

    Ngu, Anne Hee Hiong; Jamnagarwala, Arwa; Chin, George; Sivaramakrishnan, Chandrika; Critchlow, Terence J.

    2011-09-01

    A context-aware scientific workflow is a typical scientific workflow that is enhanced with context binding and awareness mechanisms. Context facilitates further configuration of the scientific workflow at runtime such that it is tuned to its environment during execution and responds intelligently based on such awareness without customized coding of the workflow. In this paper, we present a context annotation framework, which supports rapid development of context-aware scientific workflows. Context annotation enables a diverse type of actor in Kepler that may bind with different sensed environmental information as part of the actor’s regular data. Context-aware actors simplify the construction of scientific workflows that require intricate knowledge in initializing and configuring a large number of parameters to cover all different execution conditions. This paper presents the motivation, system design, implementation, and usage of context annotation in relation to the Kepler scientific workflow system.

  15. Automatic Code Generation for Instrument Flight Software

    NASA Technical Reports Server (NTRS)

    Wagstaff, Kiri L.; Benowitz, Edward; Byrne, D. J.; Peters, Ken; Watney, Garth

    2008-01-01

    Automatic code generation can be used to convert software state diagrams into executable code, enabling a model- based approach to software design and development. The primary benefits of this process are reduced development time and continuous consistency between the system design (statechart) and its implementation. We used model-based design and code generation to produce software for the Electra UHF radios that is functionally equivalent to software that will be used by the Mars Reconnaissance Orbiter (MRO) and the Mars Science Laboratory to communicate with each other. The resulting software passed all of the relevant MRO flight software tests, and the project provides a useful case study for future work in model-based software development for flight software systems.

  16. Automatic Code Generation for Instrument Flight Software

    NASA Technical Reports Server (NTRS)

    Wagstaff, Kiri L.; Benowitz, Edward; Byrne, D. J.; Peters, Ken; Watney, Garth

    2008-01-01

    Automatic code generation can be used to convert software state diagrams into executable code, enabling a model- based approach to software design and development. The primary benefits of this process are reduced development time and continuous consistency between the system design (statechart) and its implementation. We used model-based design and code generation to produce software for the Electra UHF radios that is functionally equivalent to software that will be used by the Mars Reconnaissance Orbiter (MRO) and the Mars Science Laboratory to communicate with each other. The resulting software passed all of the relevant MRO flight software tests, and the project provides a useful case study for future work in model-based software development for flight software systems.

  17. QR Codes 101

    ERIC Educational Resources Information Center

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  18. ARA type protograph codes

    NASA Technical Reports Server (NTRS)

    Divsalar, Dariush (Inventor); Abbasfar, Aliazam (Inventor); Jones, Christopher R. (Inventor); Dolinar, Samuel J. (Inventor); Thorpe, Jeremy C. (Inventor); Andrews, Kenneth S. (Inventor); Yao, Kung (Inventor)

    2008-01-01

    An apparatus and method for encoding low-density parity check codes. Together with a repeater, an interleaver and an accumulator, the apparatus comprises a precoder, thus forming accumulate-repeat-accumulate (ARA codes). Protographs representing various types of ARA codes, including AR3A, AR4A and ARJA codes, are described. High performance is obtained when compared to the performance of current repeat-accumulate (RA) or irregular-repeat-accumulate (IRA) codes.

  19. Antiplagiarism Software Takes on the Honor Code

    ERIC Educational Resources Information Center

    Wasley, Paula

    2008-01-01

    Among the 100-odd colleges with academic honor codes, plagiarism-detection services raise a knotty problem: Is software compatible with a system based on trust? The answer frequently devolves to the size and culture of the university. Colleges with traditional student-run honor codes tend to "forefront" trust, emphasizing it above all else. This…

  20. Optimizing Tensor Contraction Expressions for Hybrid CPU-GPU Execution

    SciTech Connect

    Ma, Wenjing; Krishnamoorthy, Sriram; Villa, Oreste; Kowalski, Karol; Agrawal, Gagan

    2013-03-01

    Tensor contractions are generalized multidimensional matrix multiplication operations that widely occur in quantum chemistry. Efficient execution of tensor contractions on Graphics Processing Units (GPUs) requires several challenges to be addressed, including index permutation and small dimension-sizes reducing thread block utilization. Moreover, to apply the same optimizations to various expressions, we need a code generation tool. In this paper, we present our approach to automatically generate CUDA code to execute tensor contractions on GPUs, including management of data movement between CPU and GPU. To evaluate our tool, GPU-enabled code is generated for the most expensive contractions in CCSD(T), a key coupled cluster method, and incorporated into NWChem, a popular computational chemistry suite. For this method, we demonstrate speedup over a factor of 8.4 using one GPU (instead of one core per node) and over 2.6 when utilizing the entire system using hybrid CPU+GPU solution with 2 GPUs and 5 cores (instead of 7 cores per node). Finally, we analyze the implementation behavior on future GPU systems.

  1. Executive Function in Adolescents with ADHD

    ERIC Educational Resources Information Center

    Martel, Michelle; Nikolas, Molly; Nigg, Joel T.

    2007-01-01

    A study is conducted to determine the specificity of executive function weakness in attention-deficit/hyperactivity disorder (ADHD) during adolescence. Results suggest that executive function weakness in ADHD is specifically associated with symptoms of inattention-disorganization.

  2. Executive Function in Adolescents with ADHD

    ERIC Educational Resources Information Center

    Martel, Michelle; Nikolas, Molly; Nigg, Joel T.

    2007-01-01

    A study is conducted to determine the specificity of executive function weakness in attention-deficit/hyperactivity disorder (ADHD) during adolescence. Results suggest that executive function weakness in ADHD is specifically associated with symptoms of inattention-disorganization.

  3. Peripheral coding of taste

    PubMed Central

    Liman, Emily R.; Zhang, Yali V.; Montell, Craig

    2014-01-01

    Five canonical tastes, bitter, sweet, umami (amino acid), salty and sour (acid) are detected by animals as diverse as fruit flies and humans, consistent with a near universal drive to consume fundamental nutrients and to avoid toxins or other harmful compounds. Surprisingly, despite this strong conservation of basic taste qualities between vertebrates and invertebrates, the receptors and signaling mechanisms that mediate taste in each are highly divergent. The identification over the last two decades of receptors and other molecules that mediate taste has led to stunning advances in our understanding of the basic mechanisms of transduction and coding of information by the gustatory systems of vertebrates and invertebrates. In this review, we discuss recent advances in taste research, mainly from the fly and mammalian systems, and we highlight principles that are common across species, despite stark differences in receptor types. PMID:24607224

  4. Outplacement service for the nurse executive.

    PubMed

    Kangery, R; Freund, C M

    1984-01-01

    Outplacement service (OPS) is a human resource service provided by organizations to terminated executives. In addition to assisting organizations with the mechanics of the termination process, OPS helps terminated executives cope with the trauma of job loss and find new employment. Given the frequent involvement of nurse executives in termination decisions and the risk of termination inherent in their own positions, nurse executives have a vested interest in OPS policies and programs.

  5. Executive Support Systems: An Innovation Decision Perspective

    DTIC Science & Technology

    1990-01-01

    account . The exception and annotation ability of MIDS alerted the executives to what was happening and prevented a ripple effect of overreactions...information directly to these executives, an executive support system (ESS) allows more effective analysis, control, planning, and decision making...Automated improve- ments to the management process have the potential to highly leverage the executive’s effectiveness . An ESS is a concept, a clustered IT

  6. Shift register generators and applications to coding

    NASA Technical Reports Server (NTRS)

    Morakis, J. C.

    1968-01-01

    The most important properties of shift register generated sequences are exposed. The application of shift registers as multiplication and division circuits leads to the generation of some error correcting and detecting codes.

  7. Robust entanglement distribution via quantum network coding

    NASA Astrophysics Data System (ADS)

    Epping, Michael; Kampermann, Hermann; Bruß, Dagmar

    2016-10-01

    Many protocols of quantum information processing, like quantum key distribution or measurement-based quantum computation, ‘consume’ entangled quantum states during their execution. When participants are located at distant sites, these resource states need to be distributed. Due to transmission losses quantum repeater become necessary for large distances (e.g. ≳ 300 {{km}}). Here we generalize the concept of the graph state repeater to D-dimensional graph states and to repeaters that can perform basic measurement-based quantum computations, which we call quantum routers. This processing of data at intermediate network nodes is called quantum network coding. We describe how a scheme to distribute general two-colourable graph states via quantum routers with network coding can be constructed from classical linear network codes. The robustness of the distribution of graph states against outages of network nodes is analysed by establishing a link to stabilizer error correction codes. Furthermore we show, that for any stabilizer error correction code there exists a corresponding quantum network code with similar error correcting capabilities.

  8. Joint Operation Planning and Execution

    DTIC Science & Technology

    1992-03-01

    chapter are: a crisis may occur with little or no warning, it is fast breaking, and accelerated decisions are required, sometimes a crisis in one area will...step and could be crucial to the CINC’s influencing future decisions in a fast -breaking crisis. During this phase, the JCS Joint Staff will monitor the...compressing the second through fifth phases. It may be that in a fast -developing crisis situation, the JCS Execute Order may be the first record

  9. Financial accounting for radiology executives.

    PubMed

    Seidmann, Abraham; Mehta, Tushar

    2005-03-01

    The authors review the role of financial accounting information from the perspective of a radiology executive. They begin by introducing the role of pro forma statements. They discuss the fundamental concepts of accounting, including the matching principle and accrual accounting. The authors then explore the use of financial accounting information in making investment decisions in diagnostic medical imaging. The paper focuses on critically evaluating the benefits and limitations of financial accounting for decision making in a radiology practice.

  10. Hydrology Section Executive Committee Minutes

    NASA Astrophysics Data System (ADS)

    Mercer, James W.

    The AGU Hydrology Section Executive Committee Meeting was called to order at approximately 4 P.M. on Monday, May 18, 1987, by Hydrology Section President Marshall Moss. In attendance were President-Elect George Pinder, Secretary Jim Mercer, Ron Cummings, Helen Joyce Peters, Peter Eagleson, Stephen Burges, Jim Wallis, Jurate Landwehr, Don Nielson, Ken Bencala, Pete Loucks, Jery Stedinger, Dennis Lettenmaier, Lenny Konikow, Ken Potter, John Wilson, Ivan Johnson, and Judy Holoviak.

  11. 36th ATLANTA EXECUTIVE SEMINAR

    DTIC Science & Technology

    2011-04-04

    G-8 SOURCE OF COMMISSIONED SERVICE USMA EDUCATIONAL DEGREES United States Military Academy – BA – No Major Webster University – MA...MBA from Auburn University. Other education includes the National War College and the Harvard Program for Executives in National Security. THE RITZ...CFLCC in Camp Arifjan, Kuwait. He is currently assigned as the Director of Army Budget, Pentagon, Arlington, VA. His military education includes

  12. What makes an effective executive.

    PubMed

    Drucker, Peter F

    2004-06-01

    An effective executive does not need to be a leader in the typical sense of the word. Peter Drucker, the author of more than two dozen HBR articles, says some of the best business and nonprofit CEOs he has worked with over his 65-year consulting career were not stereotypical leaders. They ranged from extroverted to nearly reclusive, from easygoing to controlling, from generous to parsimonious. What made them all effective is that they followed the same eight practices: They asked, "What needs to be done?" They also asked, "What is right for the enterprise?" They developed action plans. They took responsibility for decisions. They took responsibility for communicating. They were focused on opportunities rather than problems. They ran productive meetings. And they thought and said "we" rather than "I." The first two practices provided them with the knowledge they needed. The next four helped them convert this knowledge into effective action, for knowledge is useless to executives until it has been translated into deeds. The last two ensured that the whole organization felt responsible and accountable. Effective executives know that they have authority only because they have the trust of the organization. This means they must think of the needs and opportunities of the organization before they think of their own needs and opportunities. The author also suggests a ninth practice that's so important, he elevates it to the level of a rule: Listen first, speak last. The demand for effective executives is much too great to be satisfied by those few people who are simply born to lead. Effectiveness is a discipline. And, like every discipline, it can be learned and must be earned.

  13. Hydrology Section Executive Committee minutes

    NASA Astrophysics Data System (ADS)

    Mercer, James W.

    The AGU Hydrology Section Executive Committee Meeting was called to order at approximately 4 P.M. on Monday, December 8, 1986 by Marshall Moss. In attendance were George Pinder, Allan Freeze, Jim Mercer, Ron Cummings, Ken Bencala, Jim Wallis, Simon Ince, Jack Stone, Jeff Dozier, Don Nielson, Ivan Johnson, John Wilson, Helen Peters, Jurate Landwehr, Karen Prestegaard, Soroosh Sorooshian, Jery Stedinger, Peter Kitanidis, Rafael Bras, and Waldo Smith.

  14. Multiplexed coding in the human basal ganglia

    NASA Astrophysics Data System (ADS)

    Andres, D. S.; Cerquetti, D.; Merello, M.

    2016-04-01

    A classic controversy in neuroscience is whether information carried by spike trains is encoded by a time averaged measure (e.g. a rate code), or by complex time patterns (i.e. a time code). Here we apply a tool to quantitatively analyze the neural code. We make use of an algorithm based on the calculation of the temporal structure function, which permits to distinguish what scales of a signal are dominated by a complex temporal organization or a randomly generated process. In terms of the neural code, this kind of analysis makes it possible to detect temporal scales at which a time patterns coding scheme or alternatively a rate code are present. Additionally, finding the temporal scale at which the correlation between interspike intervals fades, the length of the basic information unit of the code can be established, and hence the word length of the code can be found. We apply this algorithm to neuronal recordings obtained from the Globus Pallidus pars interna from a human patient with Parkinson’s disease, and show that a time pattern coding and a rate coding scheme co-exist at different temporal scales, offering a new example of multiplexed neuronal coding.

  15. Assessing Executive Functioning: A Pragmatic Review

    ERIC Educational Resources Information Center

    Hass, Michael R.; Patterson, Ashlea; Sukraw, Jocelyn; Sullivan, Brianna M.

    2014-01-01

    Despite the common usage of the term "executive functioning" in neuropsychology, several aspects of this concept remain unsettled. In this paper, we will address some of the issues surrounding the notion of executive functioning and how an understanding of executive functioning and its components might assist school-based practitioners…

  16. Assessing Executive Functioning: A Pragmatic Review

    ERIC Educational Resources Information Center

    Hass, Michael R.; Patterson, Ashlea; Sukraw, Jocelyn; Sullivan, Brianna M.

    2014-01-01

    Despite the common usage of the term "executive functioning" in neuropsychology, several aspects of this concept remain unsettled. In this paper, we will address some of the issues surrounding the notion of executive functioning and how an understanding of executive functioning and its components might assist school-based practitioners…

  17. Varieties of Executive Dysfunction in Autism.

    ERIC Educational Resources Information Center

    Hughes, Claire; Russell, Jim

    This paper presents four studies which illustrate the variety of deficits in executive function displayed by individuals with autism. The concept of executive function is used to encompass all the mental operations which are involved in self-reflective and goal-directed behavior. Four forms of executive control are addressed: mental disengagement,…

  18. Executive Functions in Savant Artists with Autism

    ERIC Educational Resources Information Center

    Crane, Laura; Pring, Linda; Ryder, Nicola; Hermelin, Beate

    2011-01-01

    Although executive functions have been widely studied in individuals with autism spectrum disorders (ASD), there have been no direct empirical studies of executive abilities in savants with ASD. This study assessed three facets of executive ability (fluency, perseveration and monitoring) in savant artists with ASD, compared to non-talented adults…

  19. On the Evolutionary Origins of Executive Functions

    ERIC Educational Resources Information Center

    Ardila, Alfredo

    2008-01-01

    In this paper it is proposed that the prefrontal lobe participates in two closely related but different executive function abilities: (1) "metacognitive executive functions": problem solving, planning, concept formation, strategy development and implementation, controlling attention, working memory, and the like; that is, executive functions as…

  20. Primer for the Transportable Applications Executive

    NASA Technical Reports Server (NTRS)

    Carlson, P. A.; Emmanuelli, C. A.; Harris, E. L.; Perkins, D. C.

    1984-01-01

    The Transportable Applications Executive (TAE), an interactive multipurpose executive that provides commonly required functions for scientific analysis systems, is discussed. The concept of an executive is discussed and the various components of TAE are presented. These include on-line help information, the use of menus or commands to access analysis programs, and TAE command procedures.