Science.gov

Sample records for code execution detection

  1. Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution

    NASA Astrophysics Data System (ADS)

    Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon

    The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on

  2. Executable Code Recognition in Network Flows Using Instruction Transition Probabilities

    NASA Astrophysics Data System (ADS)

    Kim, Ikkyun; Kang, Koohong; Choi, Yangseo; Kim, Daewon; Oh, Jintae; Jang, Jongsoo; Han, Kijun

    The ability to recognize quickly inside network flows to be executable is prerequisite for malware detection. For this purpose, we introduce an instruction transition probability matrix (ITPX) which is comprised of the IA-32 instruction sets and reveals the characteristics of executable code's instruction transition patterns. And then, we propose a simple algorithm to detect executable code inside network flows using a reference ITPX which is learned from the known Windows Portable Executable files. We have tested the algorithm with more than thousands of executable and non-executable codes. The results show that it is very promising enough to use in real world.

  3. Detection of malicious computer executables

    DOEpatents

    Cai, Dongming M.; Gokhale, Maya

    2009-04-14

    A method of detecting malicious binary executable files is accomplished by inputting a binary executable file; converting the binary executable file to byte hexadecimal text strings; calculating the frequency of each byte pattern in the byte hexadecimal text strings; selecting characteristic byte pattern frequencies as discriminating features; classifying the discriminating features as malicious or benign; labeling the binary executable file as malicious or benign; and outputting the labeled malicious or benign binary executable file.

  4. Model-Driven Engineering of Machine Executable Code

    NASA Astrophysics Data System (ADS)

    Eichberg, Michael; Monperrus, Martin; Kloppenburg, Sven; Mezini, Mira

    Implementing static analyses of machine-level executable code is labor intensive and complex. We show how to leverage model-driven engineering to facilitate the design and implementation of programs doing static analyses. Further, we report on important lessons learned on the benefits and drawbacks while using the following technologies: using the Scala programming language as target of code generation, using XML-Schema to express a metamodel, and using XSLT to implement (a) transformations and (b) a lint like tool. Finally, we report on the use of Prolog for writing model transformations.

  5. System for loading executable code into volatile memory in a downhole tool

    DOEpatents

    Hall, David R.; Bartholomew, David B.; Johnson, Monte L.

    2007-09-25

    A system for loading an executable code into volatile memory in a downhole tool string component comprises a surface control unit comprising executable code. An integrated downhole network comprises data transmission elements in communication with the surface control unit and the volatile memory. The executable code, stored in the surface control unit, is not permanently stored in the downhole tool string component. In a preferred embodiment of the present invention, the downhole tool string component comprises boot memory. In another embodiment, the executable code is an operating system executable code. Preferably, the volatile memory comprises random access memory (RAM). A method for loading executable code to volatile memory in a downhole tool string component comprises sending the code from the surface control unit to a processor in the downhole tool string component over the network. A central processing unit writes the executable code in the volatile memory.

  6. The role of the PIRT process in identifying code improvements and executing code development

    SciTech Connect

    Wilson, G.E.; Boyack, B.E.

    1997-07-01

    In September 1988, the USNRC issued a revised ECCS rule for light water reactors that allows, as an option, the use of best estimate (BE) plus uncertainty methods in safety analysis. The key feature of this licensing option relates to quantification of the uncertainty in the determination that an NPP has a {open_quotes}low{close_quotes} probability of violating the safety criteria specified in 10 CFR 50. To support the 1988 licensing revision, the USNRC and its contractors developed the CSAU evaluation methodology to demonstrate the feasibility of the BE plus uncertainty approach. The PIRT process, Step 3 in the CSAU methodology, was originally formulated to support the BE plus uncertainty licensing option as executed in the CSAU approach to safety analysis. Subsequent work has shown the PIRT process to be a much more powerful tool than conceived in its original form. Through further development and application, the PIRT process has shown itself to be a robust means to establish safety analysis computer code phenomenological requirements in their order of importance to such analyses. Used early in research directed toward these objectives, PIRT results also provide the technical basis and cost effective organization for new experimental programs needed to improve the safety analysis codes for new applications. The primary purpose of this paper is to describe the generic PIRT process, including typical and common illustrations from prior applications. The secondary objective is to provide guidance to future applications of the process to help them focus, in a graded approach, on systems, components, processes and phenomena that have been common in several prior applications.

  7. Accelerating execution of the integrated TIGER series Monte Carlo radiation transport codes

    SciTech Connect

    Smith, L.M.; Hochstedler, R.D.

    1997-02-01

    Execution of the integrated TIGER series (ITS) of coupled electron/photon Monte Carlo radiation transport codes has been accelerated by modifying the FORTRAN source code for more efficient computation. Each member code of ITS was benchmarked and profiled with a specific test case that directed the acceleration effort toward the most computationally intensive subroutines. Techniques for accelerating these subroutines included replacing linear search algorithms with binary versions, replacing the pseudo-random number generator, reducing program memory allocation, and proofing the input files for geometrical redundancies. All techniques produced identical or statistically similar results to the original code. Final benchmark timing of the accelerated code resulted in speed-up factors of 2.00 for TIGER (the one-dimensional slab geometry code), 1.74 for CYLTRAN (the two-dimensional cylindrical geometry code), and 1.90 for ACCEPT (the arbitrary three-dimensional geometry code).

  8. Automated assistance for detecting malicious code

    SciTech Connect

    Crawford, R.; Kerchen, P.; Levitt, K.; Olsson, R.; Archer, M.; Casillas, M.

    1993-06-18

    This paper gives an update on the continuing work on the Malicious Code Testbed (MCT). The MCT is a semi-automated tool, operating in a simulated, cleanroom environment, that is capable of detecting many types of malicious code, such as viruses, Trojan horses, and time/logic bombs. The MCT allows security analysts to check a program before installation, thereby avoiding any damage a malicious program might inflict.

  9. Runtime Detection of C-Style Errors in UPC Code

    SciTech Connect

    Pirkelbauer, P; Liao, C; Panas, T; Quinlan, D

    2011-09-29

    Unified Parallel C (UPC) extends the C programming language (ISO C 99) with explicit parallel programming support for the partitioned global address space (PGAS), which provides a global memory space with localized partitions to each thread. Like its ancestor C, UPC is a low-level language that emphasizes code efficiency over safety. The absence of dynamic (and static) safety checks allows programmer oversights and software flaws that can be hard to spot. In this paper, we present an extension of a dynamic analysis tool, ROSE-Code Instrumentation and Runtime Monitor (ROSECIRM), for UPC to help programmers find C-style errors involving the global address space. Built on top of the ROSE source-to-source compiler infrastructure, the tool instruments source files with code that monitors operations and keeps track of changes to the system state. The resulting code is linked to a runtime monitor that observes the program execution and finds software defects. We describe the extensions to ROSE-CIRM that were necessary to support UPC. We discuss complications that arise from parallel code and our solutions. We test ROSE-CIRM against a runtime error detection test suite, and present performance results obtained from running error-free codes. ROSE-CIRM is released as part of the ROSE compiler under a BSD-style open source license.

  10. 17 CFR 232.106 - Prohibition against electronic submissions containing executable code.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Prohibition against electronic submissions containing executable code. 232.106 Section 232.106 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T-GENERAL RULES AND REGULATIONS FOR ELECTRONIC FILINGS Electronic Filing Requirements §...

  11. 17 CFR 232.106 - Prohibition against electronic submissions containing executable code.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Prohibition against electronic submissions containing executable code. 232.106 Section 232.106 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T-GENERAL RULES AND REGULATIONS FOR ELECTRONIC FILINGS Electronic Filing Requirements §...

  12. 76 FR 66235 - Bar Code Technologies for Drugs and Biological Products; Retrospective Review Under Executive...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-26

    ...'' (76 FR 3821). One of the provisions in the new Executive order is the affirmation of retrospective... published a notice in the Federal Register on April 27, 2011 (76 FR 23520), entitled ``Periodic Review of... the Federal Register of March 14, 2003 (68 FR 12500), FDA published a proposed rule (Bar Code...

  13. 17 CFR 232.106 - Prohibition against electronic submissions containing executable code.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Prohibition against electronic submissions containing executable code. 232.106 Section 232.106 Commodity and Securities Exchanges SECURITIES... Filer Manual section also may be a violation of the Computer Fraud and Abuse Act of 1986, as...

  14. Flaw detection by spatially coded backscatter radiography.

    PubMed

    Thangavelu, Sivakumar; Hussein, Esam M A

    2007-02-01

    Backscatter imaging is useful for inspecting structures that are accessible only from one side. However, indications provided by scattered radiation are typically weak, convoluted and difficult to interpret. This paper explores the use of the coded aperture technique to detect flaws using gamma-ray backscatter imaging. The viability of this approach is demonstrated with indications obtained from Monte Carlo simulations of radiation scattering measurements. The results show that, with a 2 mm wide beam of 137Cs photons, flaws as small as 1.5 mm in width can be detected using this technique. Indications of changes in flaw size, location, multiplicity and density were also observable. In addition, it is possible to quantify, from the decoded indications, the flaw location and its size.

  15. Detection of small non-coding RNAs.

    PubMed

    Dalmay, Tamas

    2010-01-01

    Gene expression is regulated at several levels in plants, and one of the most recently discovered regulatory layers involve short RNAs. Short RNAs are produced through several pathways and target either mRNAs or genomic DNA. Different classes of short RNAs have slightly different sizes and detection of their accumulation is an important step in validating and studying non-coding short RNAs. Northern blotting is routinely used to detect short RNAs because it gives information about both the amount and size of the analysed short RNAs. Choice of the right RNA extraction protocol is crucial when short RNAs are being studied, because several routinely used commercial RNA extraction kits do not yield any short RNAs. This chapter describes optimised RNA extraction methods, which give good yields of short RNAs, and separation, transfer and hybridisation protocols to study the accumulation of short RNAs.

  16. Motor execution detection based on autonomic nervous system responses.

    PubMed

    Marchal-Crespo, Laura; Zimmermann, Raphael; Lambercy, Olivier; Edelmann, Janis; Fluet, Marie-Christine; Wolf, Martin; Gassert, Roger; Riener, Robert

    2013-01-01

    Triggered assistance has been shown to be a successful robotic strategy for provoking motor plasticity, probably because it requires neurologic patients' active participation to initiate a movement involving their impaired limb. Triggered assistance, however, requires sufficient residual motor control to activate the trigger and, thus, is not applicable to individuals with severe neurologic injuries. In these situations, brain and body-computer interfaces have emerged as promising solutions to control robotic devices. In this paper, we investigate the feasibility of a body-machine interface to detect motion execution only monitoring the autonomic nervous system (ANS) response. Four physiological signals were measured (blood pressure, breathing rate, skin conductance response and heart rate) during an isometric pinching task and used to train a classifier based on hidden Markov models. We performed an experiment with six healthy subjects to test the effectiveness of the classifier to detect rest and active pinching periods. The results showed that the movement execution can be accurately classified based only on peripheral autonomic signals, with an accuracy level of 84.5%, sensitivity of 83.8% and specificity of 85.2%. These results are encouraging to perform further research on the use of the ANS response in body-machine interfaces. PMID:23248174

  17. Transformation of Graphical ECA Policies into Executable PonderTalk Code

    NASA Astrophysics Data System (ADS)

    Romeikat, Raphael; Sinsel, Markus; Bauer, Bernhard

    Rules are becoming more and more important in business modeling and systems engineering and are recognized as a high-level programming paradigma. For the effective development of rules it is desired to start at a high level, e.g. with graphical rules, and to refine them into code of a particular rule language for implementation purposes later. An model-driven approach is presented in this paper to transform graphical rules into executable code in a fully automated way. The focus is on event-condition-action policies as a special rule type. These are modeled graphically and translated into the PonderTalk language. The approach may be extended to integrate other rule types and languages as well.

  18. [SUPPORT, CO-OPERATIVE EDUCATION PROGRAMMES, PRAGMATIC CODE OF ETHICS: A CLINICAL APPROACH OF EXECUTIVE TRAINING].

    PubMed

    Cabaret, Véronique

    2016-01-01

    This article aims at introducing an educational sequence completed at l'Institut de Formation des Cadres de Santé (IFCS) at the CHRU in Lille in France, entitled "training project and educational project" present in the "training duties" module whose goal is to generate students'knowledge through co-operative education programmes. By creating this innovative sequence, the educational aim is to use the Institut ground as a ground of learning, associated with the various internship grounds, in order to get the most of co-operative education programmes. Besides, in a pragmatic code of ethics in training, the teaching staff draw their inspiration from a clinical approach of executive training: they regard students as true protagonists in a co-operative plan created for them, wishing to design it with them using their words. Thus, students are brought to criticize the IFCS educational project and debate it with the trainers who have built it. Each partner tries to understand the Other, being aware of their being different. By contributing every year to rewriting the educational project which directly concerns them, students build their professional positions as health executives. They play an active role in co-operative education programmes just like IFCS outside partners. PMID:27305794

  19. [SUPPORT, CO-OPERATIVE EDUCATION PROGRAMMES, PRAGMATIC CODE OF ETHICS: A CLINICAL APPROACH OF EXECUTIVE TRAINING].

    PubMed

    Cabaret, Véronique

    2016-01-01

    This article aims at introducing an educational sequence completed at l'Institut de Formation des Cadres de Santé (IFCS) at the CHRU in Lille in France, entitled "training project and educational project" present in the "training duties" module whose goal is to generate students'knowledge through co-operative education programmes. By creating this innovative sequence, the educational aim is to use the Institut ground as a ground of learning, associated with the various internship grounds, in order to get the most of co-operative education programmes. Besides, in a pragmatic code of ethics in training, the teaching staff draw their inspiration from a clinical approach of executive training: they regard students as true protagonists in a co-operative plan created for them, wishing to design it with them using their words. Thus, students are brought to criticize the IFCS educational project and debate it with the trainers who have built it. Each partner tries to understand the Other, being aware of their being different. By contributing every year to rewriting the educational project which directly concerns them, students build their professional positions as health executives. They play an active role in co-operative education programmes just like IFCS outside partners.

  20. Coded excitation plane wave imaging for shear wave motion detection.

    PubMed

    Song, Pengfei; Urban, Matthew W; Manduca, Armando; Greenleaf, James F; Chen, Shigao

    2015-07-01

    Plane wave imaging has greatly advanced the field of shear wave elastography thanks to its ultrafast imaging frame rate and the large field-of-view (FOV). However, plane wave imaging also has decreased penetration due to lack of transmit focusing, which makes it challenging to use plane waves for shear wave detection in deep tissues and in obese patients. This study investigated the feasibility of implementing coded excitation in plane wave imaging for shear wave detection, with the hypothesis that coded ultrasound signals can provide superior detection penetration and shear wave SNR compared with conventional ultrasound signals. Both phase encoding (Barker code) and frequency encoding (chirp code) methods were studied. A first phantom experiment showed an approximate penetration gain of 2 to 4 cm for the coded pulses. Two subsequent phantom studies showed that all coded pulses outperformed the conventional short imaging pulse by providing superior sensitivity to small motion and robustness to weak ultrasound signals. Finally, an in vivo liver case study on an obese subject (body mass index = 40) demonstrated the feasibility of using the proposed method for in vivo applications, and showed that all coded pulses could provide higher SNR shear wave signals than the conventional short pulse. These findings indicate that by using coded excitation shear wave detection, one can benefit from the ultrafast imaging frame rate and large FOV provided by plane wave imaging while preserving good penetration and shear wave signal quality, which is essential for obtaining robust shear elasticity measurements of tissue.

  1. The detection and extraction of interleaved code segments

    NASA Technical Reports Server (NTRS)

    Rugaber, Spencer; Stirewalt, Kurt; Wills, Linda M.

    1995-01-01

    This project is concerned with a specific difficulty that arises when trying to understand and modify computer programs. In particular, it is concerned with the phenomenon of 'interleaving' in which one section of a program accomplishes several purposes, and disentangling the code responsible for each purposes is difficult. Unraveling interleaved code involves discovering the purpose of each strand of computation, as well as understanding why the programmer decided to interleave the strands. Increased understanding improve the productivity and quality of software maintenance, enhancement, and documentation activities. It is the goal of the project to characterize the phenomenon of interleaving as a prerequisite for building tools to detect and extract interleaved code fragments.

  2. Detecting and Characterizing Semantic Inconsistencies in Ported Code

    NASA Technical Reports Server (NTRS)

    Ray, Baishakhi; Kim, Miryung; Person,Suzette; Rungta, Neha

    2013-01-01

    Adding similar features and bug fixes often requires porting program patches from reference implementations and adapting them to target implementations. Porting errors may result from faulty adaptations or inconsistent updates. This paper investigates (1) the types of porting errors found in practice, and (2) how to detect and characterize potential porting errors. Analyzing version histories, we define five categories of porting errors, including incorrect control- and data-flow, code redundancy, inconsistent identifier renamings, etc. Leveraging this categorization, we design a static control- and data-dependence analysis technique, SPA, to detect and characterize porting inconsistencies. Our evaluation on code from four open-source projects shows that SPA can detect porting inconsistencies with 65% to 73% precision and 90% recall, and identify inconsistency types with 58% to 63% precision and 92% to 100% recall. In a comparison with two existing error detection tools, SPA improves precision by 14 to 17 percentage points.

  3. Plagiarism Detection Algorithm for Source Code in Computer Science Education

    ERIC Educational Resources Information Center

    Liu, Xin; Xu, Chan; Ouyang, Boyu

    2015-01-01

    Nowadays, computer programming is getting more necessary in the course of program design in college education. However, the trick of plagiarizing plus a little modification exists among some students' home works. It's not easy for teachers to judge if there's plagiarizing in source code or not. Traditional detection algorithms cannot fit this…

  4. Detecting and Characterizing Semantic Inconsistencies in Ported Code

    NASA Technical Reports Server (NTRS)

    Ray, Baishakhi; Kim, Miryung; Person, Suzette J.; Rungta, Neha

    2013-01-01

    Adding similar features and bug fixes often requires porting program patches from reference implementations and adapting them to target implementations. Porting errors may result from faulty adaptations or inconsistent updates. This paper investigates (I) the types of porting errors found in practice, and (2) how to detect and characterize potential porting errors. Analyzing version histories, we define five categories of porting errors, including incorrect control- and data-flow, code redundancy, inconsistent identifier renamings, etc. Leveraging this categorization, we design a static control- and data-dependence analysis technique, SPA, to detect and characterize porting inconsistencies. Our evaluation on code from four open-source projects shows thai SPA can dell-oct porting inconsistencies with 65% to 73% precision and 90% recall, and identify inconsistency types with 58% to 63% precision and 92% to 100% recall. In a comparison with two existing error detection tools, SPA improves precision by 14 to 17 percentage points

  5. Performance of coded coherent FSK lightwave system with noncoherent detection

    NASA Astrophysics Data System (ADS)

    Neely, Thomas E.

    1993-03-01

    The original coherent lightwave systems were expected to offer significant performance gains relative to standard direct detection systems. This expectation has not been realized due to the effects of laser phase noise. The laser phase noise process results in the integration of a random variable that transitions over the integration period from a Gaussian distribution to a uniform distribution. The use of convolutional coding effectively replaces a single bit time, with its mostly noncoherently integrating latter portion, by several more coherently integrating bits. This primary bit-time effect comes in addition to the normal coding effect of efficiently trading bandwidth for error performance. The improvement in performance brought about from coding may enable coherent systems to live up to previous expectations. The contributions of this thesis include the visualization of the phase noise process, the efficient computation of the laser phase noise power factor probability density function, and the computation of performance curves for uncoded and coded systems. Additional sections on coherent lightwave systems and coding provide tutorial information. A potential military application is discussed, along with practical implementation issues.

  6. FORTRAN Automated Code Evaluation System (faces) system documentation, version 2, mod 0. [error detection codes/user manuals (computer programs)

    NASA Technical Reports Server (NTRS)

    1975-01-01

    A system is presented which processes FORTRAN based software systems to surface potential problems before they become execution malfunctions. The system complements the diagnostic capabilities of compilers, loaders, and execution monitors rather than duplicating these functions. Also, it emphasizes frequent sources of FORTRAN problems which require inordinate manual effort to identify. The principle value of the system is extracting small sections of unusual code from the bulk of normal sequences. Code structures likely to cause immediate or future problems are brought to the user's attention. These messages stimulate timely corrective action of solid errors and promote identification of 'tricky' code. Corrective action may require recoding or simply extending software documentation to explain the unusual technique.

  7. Directed Incremental Symbolic Execution

    NASA Technical Reports Server (NTRS)

    Person, Suzette; Yang, Guowei; Rungta, Neha; Khurshid, Sarfraz

    2011-01-01

    The last few years have seen a resurgence of interest in the use of symbolic execution -- a program analysis technique developed more than three decades ago to analyze program execution paths. Scaling symbolic execution and other path-sensitive analysis techniques to large systems remains challenging despite recent algorithmic and technological advances. An alternative to solving the problem of scalability is to reduce the scope of the analysis. One approach that is widely studied in the context of regression analysis is to analyze the differences between two related program versions. While such an approach is intuitive in theory, finding efficient and precise ways to identify program differences, and characterize their effects on how the program executes has proved challenging in practice. In this paper, we present Directed Incremental Symbolic Execution (DiSE), a novel technique for detecting and characterizing the effects of program changes. The novelty of DiSE is to combine the efficiencies of static analysis techniques to compute program difference information with the precision of symbolic execution to explore program execution paths and generate path conditions affected by the differences. DiSE is a complementary technique to other reduction or bounding techniques developed to improve symbolic execution. Furthermore, DiSE does not require analysis results to be carried forward as the software evolves -- only the source code for two related program versions is required. A case-study of our implementation of DiSE illustrates its effectiveness at detecting and characterizing the effects of program changes.

  8. Roles for Coincidence Detection in Coding Amplitude-Modulated Sounds

    PubMed Central

    Ashida, Go; Kretzberg, Jutta; Tollin, Daniel J.

    2016-01-01

    Many sensory neurons encode temporal information by detecting coincident arrivals of synaptic inputs. In the mammalian auditory brainstem, binaural neurons of the medial superior olive (MSO) are known to act as coincidence detectors, whereas in the lateral superior olive (LSO) roles of coincidence detection have remained unclear. LSO neurons receive excitatory and inhibitory inputs driven by ipsilateral and contralateral acoustic stimuli, respectively, and vary their output spike rates according to interaural level differences. In addition, LSO neurons are also sensitive to binaural phase differences of low-frequency tones and envelopes of amplitude-modulated (AM) sounds. Previous physiological recordings in vivo found considerable variations in monaural AM-tuning across neurons. To investigate the underlying mechanisms of the observed temporal tuning properties of LSO and their sources of variability, we used a simple coincidence counting model and examined how specific parameters of coincidence detection affect monaural and binaural AM coding. Spike rates and phase-locking of evoked excitatory and spontaneous inhibitory inputs had only minor effects on LSO output to monaural AM inputs. In contrast, the coincidence threshold of the model neuron affected both the overall spike rates and the half-peak positions of the AM-tuning curve, whereas the width of the coincidence window merely influenced the output spike rates. The duration of the refractory period affected only the low-frequency portion of the monaural AM-tuning curve. Unlike monaural AM coding, temporal factors, such as the coincidence window and the effective duration of inhibition, played a major role in determining the trough positions of simulated binaural phase-response curves. In addition, empirically-observed level-dependence of binaural phase-coding was reproduced in the framework of our minimalistic coincidence counting model. These modeling results suggest that coincidence detection of excitatory

  9. When Interference Helps: Increasing Executive Load to Facilitate Deception Detection in the Concealed Information Test

    PubMed Central

    Visu-Petra, George; Varga, Mihai; Miclea, Mircea; Visu-Petra, Laura

    2013-01-01

    The possibility to enhance the detection efficiency of the Concealed Information Test (CIT) by increasing executive load was investigated, using an interference design. After learning and executing a mock crime scenario, subjects underwent three deception detection tests: an RT-based CIT, an RT-based CIT plus a concurrent memory task (CITMem), and an RT-based CIT plus a concurrent set-shifting task (CITShift). The concealed information effect, consisting in increased RT and lower response accuracy for probe items compared to irrelevant items, was evidenced across all three conditions. The group analyses indicated a larger difference between RTs to probe and irrelevant items in the dual-task conditions, but this difference was not translated in a significantly increased detection efficiency at an individual level. Signal detection parameters based on the comparison with a simulated innocent group showed accurate discrimination for all conditions. Overall response accuracy on the CITMem was highest and the difference between response accuracy to probes and irrelevants was smallest in this condition. Accuracy on the concurrent tasks (Mem and Shift) was high, and responses on these tasks were significantly influenced by CIT stimulus type (probes vs. irrelevants). The findings are interpreted in relation to the cognitive load/dual-task interference literature, generating important insights for research on the involvement of executive functions in deceptive behavior. PMID:23543918

  10. On the Performance of Online Learning Methods for Detecting Malicious Executables

    NASA Astrophysics Data System (ADS)

    Maloof, Marcus A.

    We present results from an empirical study of seven online-learning methods on the task of detecting previously unseen malicious executables. Malicious software has disrupted computer and network operation and has compromised or destroyed sensitive information. Methods of machine learning, which build predictive models that generalize training data, have proven useful for detecting previously unseen malware. In previous studies, batch methods detected malicious and benign executables with high true-positive and true-negative rates, but doing so required significant time and space, which may limit applicability. Online methods of learning can update models quickly with only a single example, but potential trade-offs in performance are not well-understood for this task. Accuracy of the best performing online methods was 93#x0025;, which was 3-4% lower than that of batch methods. For applications that require immediate updates of models, this may be an acceptable trade-off. Our study characterizes these tradeoffs, thereby giving researchers and practitioners insights into the performance of online methods of machine learning on the task of detecting malicious executables.

  11. Ethical guidance in the era of managed care: an analysis of the American College of Healthcare Executives' Code of Ethics.

    PubMed

    Higgins, W

    2000-01-01

    Market competition and the rise of managed care are transforming the healthcare system from a physician-dominated cottage industry into a manager-dominated corporate enterprise. The managed care revolution is also undermining the safe-guards offered by medical ethics and raising serious public concerns. These trends highlight the growing importance of ethical standards for managers. The most comprehensive ethical guidance for health service managers is contained in the American College of Healthcare Executives' (ACHE) Code of Ethics. An analysis of the ACHE Code suggests that it does not adequately address several ethical concerns associated with managed care. The ACHE may wish to develop a supplemental statement regarding ethical issues in managed care. A supplemental statement that provides more specific guidance in the areas of financial incentives to reduce utilization, social mission, consumer/patient information, and the health service manager's responsibility to patients could be extremely valuable in today's complex and rapidly changing environment. More specific ethical guidelines would not ensure individual or organizational compliance. However, they would provide professional standards that could guide decision making and help managers evaluate performance in managed care settings. PMID:11066951

  12. Local graph regularized coding for salient object detection

    NASA Astrophysics Data System (ADS)

    Huo, Lina; Yang, Shuyuan; Jiao, Licheng; Wang, Shuang; Shi, Jiao

    2016-07-01

    Subspace segmentation based salient object detection has received increasing interests in recent years. To preserve the locality and similarity of regions, a grouping effect of representation is introduced to segment the salient object and background in subspace. Then a new saliency map is calculated by incorporating this local graph regularizer into coding, which explicitly explores the data self-representation model and thus locate more accurate salient regions. Moreover, a heuristic object-based dictionary from background superpixels is obtained in border set removing the image regions within the potential object regions. Experimental results on four large benchmark databases demonstrate that the proposed method performs favorably against eight recent state-of-the-art methods in terms of three evaluation criterions, with a reduction of MAE by 19.8% than GR and 29.3% than CB in the two SED datasets, respectively. Meanwhile, our method also runs faster than the comparative detection approaches.

  13. The utility of IFS (INECO Frontal Screening) for the detection of executive dysfunction in adults with bipolar disorder and ADHD.

    PubMed

    Baez, Sandra; Ibanez, Agustin; Gleichgerrcht, Ezequiel; Perez, Ana; Roca, María; Manes, Facundo; Torralva, Teresa

    2014-05-15

    Bipolar disorder (BD) and attention deficit hyperactivity disorder (ADHD) in adults share clinical symptoms. Both disorders present with executive functioning impairment. The detection of executive dysfunction usually requires the administration of an extensive neuropsychological battery. The Institute of Cognitive Neurology (INECO) Frontal Screening (IFS) is an efficient tool, which has been demonstrated to be useful for the detection of executive deficits in other diseases involving the prefrontal cortex. This study assessed the usefulness of the IFS in detecting the executive dysfunction of BD and ADHD adults, by means of a receiver-operating characteristic curve analysis and a multigroup discriminant function analysis. Twenty-four BD, 25 ADHD patients and 25 controls were assessed with a battery that included the IFS and other measures of executive functioning. Our results showed that both patient groups performed significantly lower than controls on the IFS total score. Using a 27.5 point cut-off score, the IFS showed good sensitivity and acceptable specificity to detect executive impairments in BD and ADHD patients. The IFS discriminated between controls and each patient group more reliably than other executive functions measures. Our results suggest that this tool could be a useful instrument to assess executive functions in BD and ADHD patients.

  14. Coding for parallel execution of hardware-in-the-loop millimeter-wave scene generation models on multicore SIMD processor architectures

    NASA Astrophysics Data System (ADS)

    Olson, Richard F.

    2013-05-01

    Rendering of point scatterer based radar scenes for millimeter wave (mmW) seeker tests in real-time hardware-in-the-loop (HWIL) scene generation requires efficient algorithms and vector-friendly computer architectures for complex signal synthesis. New processor technology from Intel implements an extended 256-bit vector SIMD instruction set (AVX, AVX2) in a multi-core CPU design providing peak execution rates of hundreds of GigaFLOPS (GFLOPS) on one chip. Real world mmW scene generation code can approach peak SIMD execution rates only after careful algorithm and source code design. An effective software design will maintain high computing intensity emphasizing register-to-register SIMD arithmetic operations over data movement between CPU caches or off-chip memories. Engineers at the U.S. Army Aviation and Missile Research, Development and Engineering Center (AMRDEC) applied two basic parallel coding methods to assess new 256-bit SIMD multi-core architectures for mmW scene generation in HWIL. These include use of POSIX threads built on vector library functions and more portable, highlevel parallel code based on compiler technology (e.g. OpenMP pragmas and SIMD autovectorization). Since CPU technology is rapidly advancing toward high processor core counts and TeraFLOPS peak SIMD execution rates, it is imperative that coding methods be identified which produce efficient and maintainable parallel code. This paper describes the algorithms used in point scatterer target model rendering, the parallelization of those algorithms, and the execution performance achieved on an AVX multi-core machine using the two basic parallel coding methods. The paper concludes with estimates for scale-up performance on upcoming multi-core technology.

  15. Integrated photonic decoder with complementary code processing and balanced detection for two-dimensional optical code division multiple access.

    PubMed

    Takiguchi, K; Okuno, M; Takahashi, H; Moriwaki, O

    2007-04-01

    We propose a novel integrated photonic decoder for two-dimensional (time spreading, wavelength hopping) optical code division multiple access. The decoder is composed of multiplexers-demultiplexers, variable delay lines, and a coupler, which processes complementary codes and utilizes balanced detection to reduce unwanted cross-correlation interference. We successfully carried out a 10 Gbit/s transmission that demonstrated its effectiveness.

  16. Dual enzyme electrochemical coding for detecting DNA hybridization.

    PubMed

    Wang, Joseph; Kawde, Abdel-Nasser; Musameh, Mustafa; Rivas, Gustavo

    2002-10-01

    Enzyme-based hybridization assays for the simultaneous electrochemical measurements of two DNA targets are described. Two encoding enzymes, alkaline phosphatase and beta-galactosidase, are used to differentiate the signals of two DNA targets in connection to chronopotentiometric measurements of their electroactive phenol and alpha-naphthol products. These products yield well-defined and resolved peaks at +0.31 V (alpha-naphthol) and +0.63 V (phenol) at the graphite working electrode (vs. Ag/AgCl reference). The position and size of these peaks reflect the identity and level of the corresponding target. The dual target detection capability is coupled to the amplification feature of enzyme tags (to yield fmol detection limits) and with an efficient magnetic removal of non-hybridized nucleic acids. Proper attention is given to the choice of the substrates (for attaining well resolved peaks), to the activity of the enzymes (for obtaining similar sensitivities), and to the selection of the enzymes (for minimizing cross interferences). The new bioassay is illustrated for the simultaneous detection of two DNA sequences related to the BCRA1 breast-cancer gene in a single sample in connection to magnetic beads bearing the corresponding oligonucleotide probes. Prospects for electrochemical coding of multiple DNA targets are discussed.

  17. Methodology for fast detection of false sharing in threaded scientific codes

    SciTech Connect

    Chung, I-Hsin; Cong, Guojing; Murata, Hiroki; Negishi, Yasushi; Wen, Hui-Fang

    2014-11-25

    A profiling tool identifies a code region with a false sharing potential. A static analysis tool classifies variables and arrays in the identified code region. A mapping detection library correlates memory access instructions in the identified code region with variables and arrays in the identified code region while a processor is running the identified code region. The mapping detection library identifies one or more instructions at risk, in the identified code region, which are subject to an analysis by a false sharing detection library. A false sharing detection library performs a run-time analysis of the one or more instructions at risk while the processor is re-running the identified code region. The false sharing detection library determines, based on the performed run-time analysis, whether two different portions of the cache memory line are accessed by the generated binary code.

  18. Evaluation and Testing of the ADVANTG Code on SNM Detection

    SciTech Connect

    Shaver, Mark W.; Casella, Andrew M.; Wittman, Richard S.; Hayes, John W.

    2013-09-24

    Pacific Northwest National Laboratory (PNNL) has been tasked with evaluating the effectiveness of ORNL’s new hybrid transport code, ADVANTG, on scenarios of interest to our NA-22 sponsor, specifically of detection of diversion of special nuclear material (SNM). PNNL staff have determined that acquisition and installation of ADVANTG was relatively straightforward for a code in its phase of development, but probably not yet sufficient for mass distribution to the general user. PNNL staff also determined that with little effort, ADVANTG generated weight windows that typically worked for the problems and generated results consistent with MCNP. With slightly greater effort of choosing a finer mesh around detectors or sample reaction tally regions, the figure of merit (FOM) could be further improved in most cases. This does take some limited knowledge of deterministic transport methods. The FOM could also be increased by limiting the energy range for a tally to the energy region of greatest interest. It was then found that an MCNP run with the full energy range for the tally showed improved statistics in the region used for the ADVANTG run. The specific case of interest chosen by the sponsor is the CIPN project from Las Alamos National Laboratory (LANL), which is an active interrogation, non-destructive assay (NDA) technique to quantify the fissile content in a spent fuel assembly and is also sensitive to cases of material diversion. Unfortunately, weight windows for the CIPN problem cannot currently be properly generated with ADVANTG due to inadequate accommodations for source definition. ADVANTG requires that a fixed neutron source be defined within the problem and cannot account for neutron multiplication. As such, it is rendered useless in active interrogation scenarios. It is also interesting to note that this is a difficult problem to solve and that the automated weight windows generator in MCNP actually slowed down the problem. Therefore, PNNL had determined

  19. A dual-sided coded-aperture radiation detection system

    NASA Astrophysics Data System (ADS)

    Penny, R. D.; Hood, W. E.; Polichar, R. M.; Cardone, F. H.; Chavez, L. G.; Grubbs, S. G.; Huntley, B. P.; Kuharski, R. A.; Shyffer, R. T.; Fabris, L.; Ziock, K. P.; Labov, S. E.; Nelson, K.

    2011-10-01

    We report the development of a large-area, mobile, coded-aperture radiation imaging system for localizing compact radioactive sources in three dimensions while rejecting distributed background. The 3D Stand-Off Radiation Detection System (SORDS-3D) has been tested at speeds up to 95 km/h and has detected and located sources in the millicurie range at distances of over 100 m. Radiation data are imaged to a geospatially mapped world grid with a nominal 1.25- to 2.5-m pixel pitch at distances out to 120 m on either side of the platform. Source elevation is also extracted. Imaged radiation alarms are superimposed on a side-facing video log that can be played back for direct localization of sources in buildings in urban environments. The system utilizes a 37-element array of 5×5×50 cm 3 cesium-iodide (sodium) detectors. Scintillation light is collected by a pair of photomultiplier tubes placed at either end of each detector, with the detectors achieving an energy resolution of 6.15% FWHM (662 keV) and a position resolution along their length of 5 cm FWHM. The imaging system generates a dual-sided two-dimensional image allowing users to efficiently survey a large area. Imaged radiation data and raw spectra are forwarded to the RadioNuclide Analysis Kit (RNAK), developed by our collaborators, for isotope ID. An intuitive real-time display aids users in performing searches. Detector calibration is dynamically maintained by monitoring the potassium-40 peak and digitally adjusting individual detector gains. We have recently realized improvements, both in isotope identification and in distinguishing compact sources from background, through the installation of optimal-filter reconstruction kernels.

  20. Codon Distribution in Error-Detecting Circular Codes.

    PubMed

    Fimmel, Elena; Strüngmann, Lutz

    2016-03-15

    In 1957, Francis Crick et al. suggested an ingenious explanation for the process of frame maintenance. The idea was based on the notion of comma-free codes. Although Crick's hypothesis proved to be wrong, in 1996, Arquès and Michel discovered the existence of a weaker version of such codes in eukaryote and prokaryote genomes, namely the so-called circular codes. Since then, circular code theory has invariably evoked great interest and made significant progress. In this article, the codon distributions in maximal comma-free, maximal self-complementary C³ and maximal self-complementary circular codes are discussed, i.e., we investigate in how many of such codes a given codon participates. As the main (and surprising) result, it is shown that the codons can be separated into very few classes (three, or five, or six) with respect to their frequency. Moreover, the distribution classes can be hierarchically ordered as refinements from maximal comma-free codes via maximal self-complementary C(3) codes to maximal self-complementary circular codes.

  1. Codon Distribution in Error-Detecting Circular Codes.

    PubMed

    Fimmel, Elena; Strüngmann, Lutz

    2016-01-01

    In 1957, Francis Crick et al. suggested an ingenious explanation for the process of frame maintenance. The idea was based on the notion of comma-free codes. Although Crick's hypothesis proved to be wrong, in 1996, Arquès and Michel discovered the existence of a weaker version of such codes in eukaryote and prokaryote genomes, namely the so-called circular codes. Since then, circular code theory has invariably evoked great interest and made significant progress. In this article, the codon distributions in maximal comma-free, maximal self-complementary C³ and maximal self-complementary circular codes are discussed, i.e., we investigate in how many of such codes a given codon participates. As the main (and surprising) result, it is shown that the codons can be separated into very few classes (three, or five, or six) with respect to their frequency. Moreover, the distribution classes can be hierarchically ordered as refinements from maximal comma-free codes via maximal self-complementary C(3) codes to maximal self-complementary circular codes. PMID:26999215

  2. Codon Distribution in Error-Detecting Circular Codes

    PubMed Central

    Fimmel, Elena; Strüngmann, Lutz

    2016-01-01

    In 1957, Francis Crick et al. suggested an ingenious explanation for the process of frame maintenance. The idea was based on the notion of comma-free codes. Although Crick’s hypothesis proved to be wrong, in 1996, Arquès and Michel discovered the existence of a weaker version of such codes in eukaryote and prokaryote genomes, namely the so-called circular codes. Since then, circular code theory has invariably evoked great interest and made significant progress. In this article, the codon distributions in maximal comma-free, maximal self-complementary C3 and maximal self-complementary circular codes are discussed, i.e., we investigate in how many of such codes a given codon participates. As the main (and surprising) result, it is shown that the codons can be separated into very few classes (three, or five, or six) with respect to their frequency. Moreover, the distribution classes can be hierarchically ordered as refinements from maximal comma-free codes via maximal self-complementary C3 codes to maximal self-complementary circular codes. PMID:26999215

  3. Executive Functioning and Processing Speed in Age-Related Differences in Memory: Contribution of a Coding Task

    ERIC Educational Resources Information Center

    Baudouin, Alexia; Clarys, David; Vanneste, Sandrine; Isingrini, Michel

    2009-01-01

    The aim of the present study was to examine executive dysfunctioning and decreased processing speed as potential mediators of age-related differences in episodic memory. We compared the performances of young and elderly adults in a free-recall task. Participants were also given tests to measure executive functions and perceptual processing speed…

  4. Comparison of the pseudorandom noise code and pulsed direct-detection lidars for atmospheric probing.

    PubMed

    Machol, J L

    1997-08-20

    The advantages and limitations of using the pseudorandom-noise (PN)-code technique in comparison with pulsed direct detection are discussed. Because the signal-to-noise ratio (SNR) of the PN codes is dependent on the average atmospheric return, strong returns from short ranges and clouds determine the SNR for all ranges. The SNR of a profile obtained by pulsed direct detection exceeds that of the PN-code technique for laser beams with the same average power.

  5. Methods and computer executable instructions for marking a downhole elongate line and detecting same

    DOEpatents

    Watkins, Arthur D.

    2003-05-13

    Methods and computer executable instructions are provided for making an elongate line (22) with a plurality of marks (30) and detecting those marks (30) to determine a distance of the elongate line (22) in a downhole or a physical integrity thereof. In a preferred embodiment, each mark comprises a plurality of particles (44) having a substantially permanent magnetizing capability adhered to an exterior surface of the elongate line (22) at preselected intervals with an epoxy paint. The particles (44) are arranged at each interval as a plurality of bands (40). Thereafter, the particles are oriented into a magnetic signature for that interval by magnetizing the particles to create a magnetic field substantially normal to the exterior surface. This facilitates detection by a Hall effect probe. The magnetic signatures are stored in a computing configuration and, once a mark is detected, a correlation is made to a unique position on the elongate line by comparison with the stored magnetic signatures. Preferred particles include samarium-cobalt and neodymium-iron-boride.

  6. Bar Coding Platforms for Nucleic Acid and Protein Detection

    NASA Astrophysics Data System (ADS)

    Müller, Uwe R.

    A variety of novel bar coding systems has been developed as multiplex testing platforms for applications in biological, chemical, and biomedical diagnostics. Instead of identifying a target through capture at a specific locus on an array, target analytes are captured by a bar coded tag, which then uniquely identifies the target, akin to putting a UPC bar code on a product. This requires an appropriate surface functionalization to ensure that the correct target is captured with high efficiency. Moreover the tag, or bar code, has to be readable with minimal error and at high speed, typically by flow analysis. For quantitative assays the target may be labeled separately, or the tag may also serve as the label. A great variety of materials and physicochemical principles has been exploited to generate this plethora of novel bar coding platforms. Their advantages compared to microarray-based assay platforms include in-solution binding kinetics, flexibility in assay design, compatibility with microplate-based assay automation, high sample throughput, and with some assay formats, increased sensitivity.

  7. An Approach for Detecting Inconsistencies between Behavioral Models of the Software Architecture and the Code

    SciTech Connect

    Ciraci, Selim; Sozer, Hasan; Tekinerdogan, Bedir

    2012-07-16

    In practice, inconsistencies between architectural documentation and the code might arise due to improper implementation of the architecture or the separate, uncontrolled evolution of the code. Several approaches have been proposed to detect the inconsistencies between the architecture and the code but these tend to be limited for capturing inconsistencies that might occur at runtime. We present a runtime verification approach for detecting inconsistencies between the dynamic behavior of the architecture and the actual code. The approach is supported by a set of tools that implement the architecture and the code patterns in Prolog, and support the automatic generation of runtime monitors for detecting inconsistencies. We illustrate the approach and the toolset for a Crisis Management System case study.

  8. Guidelines for selecting codes for ground-water transport modeling of low-level waste burial sites. Executive summary

    SciTech Connect

    Simmons, C.S.; Cole, C.R.

    1985-05-01

    This document was written to provide guidance to managers and site operators on how ground-water transport codes should be selected for assessing burial site performance. There is a need for a formal approach to selecting appropriate codes from the multitude of potentially useful ground-water transport codes that are currently available. Code selection is a problem that requires more than merely considering mathematical equation-solving methods. These guidelines are very general and flexible and are also meant for developing systems simulation models to be used to assess the environmental safety of low-level waste burial facilities. Code selection is only a single aspect of the overall objective of developing a systems simulation model for a burial site. The guidance given here is mainly directed toward applications-oriented users, but managers and site operators need to be familiar with this information to direct the development of scientifically credible and defensible transport assessment models. Some specific advice for managers and site operators on how to direct a modeling exercise is based on the following five steps: identify specific questions and study objectives; establish costs and schedules for achieving answers; enlist the aid of professional model applications group; decide on approach with applications group and guide code selection; and facilitate the availability of site-specific data. These five steps for managers/site operators are discussed in detail following an explanation of the nine systems model development steps, which are presented first to clarify what code selection entails.

  9. Process Model Improvement for Source Code Plagiarism Detection in Student Programming Assignments

    ERIC Educational Resources Information Center

    Kermek, Dragutin; Novak, Matija

    2016-01-01

    In programming courses there are various ways in which students attempt to cheat. The most commonly used method is copying source code from other students and making minimal changes in it, like renaming variable names. Several tools like Sherlock, JPlag and Moss have been devised to detect source code plagiarism. However, for larger student…

  10. Multi-frequency phase-coded microwave signal generation based on polarization modulation and balanced detection.

    PubMed

    Zhu, Dan; Xu, Weiyuan; Wei, Zhengwu; Pan, Shilong

    2016-01-01

    Photonic multi-frequency phase-coded microwave signal generation is proposed and demonstrated based on polarization modulation and balanced detection. Consisting of only a polarization modulator (PolM) driven by an electrical coding data, a polarization beam splitter (PBS) and a balanced photodetector (BPD), the proposed microwave phase coder has no requirement on the wavelength, intensity modulation format, or modulation index of the input optical microwave signal, and allows phase coding of arbitrary-format RF signals, which enables multi-frequency phase coding with compact structure, simple operation, and high flexibility. A proof-of-concept experiment is performed, achieving simultaneous phase coding of 15 and 30 GHz, or 10 and 20 GHz RF signals with a coding rate of 5  Gb/s.

  11. Neural coding and perceptual detection in the primate somatosensory thalamus.

    PubMed

    Vázquez, Yuriria; Zainos, Antonio; Alvarez, Manuel; Salinas, Emilio; Romo, Ranulfo

    2012-09-11

    The contribution of the sensory thalamus to perception and decision making is not well understood. We addressed this problem by recording single neurons in the ventral posterior lateral (VPL) nucleus of the somatosensory thalamus while trained monkeys judged the presence or absence of a vibrotactile stimulus of variable amplitude applied to the skin of a fingertip. We found that neurons in the VPL nucleus modulated their firing rate as a function of stimulus amplitude, and that such modulations accounted for the monkeys' overall psychophysical performance. These neural responses did not predict the animals' decision reports in individual trials, however. Moreover, the sensitivity to changes in stimulus amplitude was similar when the monkeys' performed the detection task and when they were not required to report stimulus detection. These results suggest that the primate somatosensory thalamus likely provides a reliable neural representation of the sensory input to the cerebral cortex, where sensory information is transformed and combined with other cognitive components associated with behavioral performance.

  12. Accuracy comparison among different machine learning techniques for detecting malicious codes

    NASA Astrophysics Data System (ADS)

    Narang, Komal

    2016-03-01

    In this paper, a machine learning based model for malware detection is proposed. It can detect newly released malware i.e. zero day attack by analyzing operation codes on Android operating system. The accuracy of Naïve Bayes, Support Vector Machine (SVM) and Neural Network for detecting malicious code has been compared for the proposed model. In the experiment 400 benign files, 100 system files and 500 malicious files have been used to construct the model. The model yields the best accuracy 88.9% when neural network is used as classifier and achieved 95% and 82.8% accuracy for sensitivity and specificity respectively.

  13. Demonstration of a quantum error detection code using a square lattice of four superconducting qubits

    PubMed Central

    Córcoles, A.D.; Magesan, Easwar; Srinivasan, Srikanth J.; Cross, Andrew W.; Steffen, M.; Gambetta, Jay M.; Chow, Jerry M.

    2015-01-01

    The ability to detect and deal with errors when manipulating quantum systems is a fundamental requirement for fault-tolerant quantum computing. Unlike classical bits that are subject to only digital bit-flip errors, quantum bits are susceptible to a much larger spectrum of errors, for which any complete quantum error-correcting code must account. Whilst classical bit-flip detection can be realized via a linear array of qubits, a general fault-tolerant quantum error-correcting code requires extending into a higher-dimensional lattice. Here we present a quantum error detection protocol on a two-by-two planar lattice of superconducting qubits. The protocol detects an arbitrary quantum error on an encoded two-qubit entangled state via quantum non-demolition parity measurements on another pair of error syndrome qubits. This result represents a building block towards larger lattices amenable to fault-tolerant quantum error correction architectures such as the surface code. PMID:25923200

  14. Multiplexed Detection of Cytokines Based on Dual Bar-Code Strategy and Single-Molecule Counting.

    PubMed

    Li, Wei; Jiang, Wei; Dai, Shuang; Wang, Lei

    2016-02-01

    Cytokines play important roles in the immune system and have been regarded as biomarkers. While single cytokine is not specific and accurate enough to meet the strict diagnosis in practice, in this work, we constructed a multiplexed detection method for cytokines based on dual bar-code strategy and single-molecule counting. Taking interferon-γ (IFN-γ) and tumor necrosis factor-α (TNF-α) as model analytes, first, the magnetic nanobead was functionalized with the second antibody and primary bar-code strands, forming a magnetic nanoprobe. Then, through the specific reaction of the second antibody and the antigen that fixed by the primary antibody, sandwich-type immunocomplex was formed on the substrate. Next, the primary bar-code strands as amplification units triggered multibranched hybridization chain reaction (mHCR), producing nicked double-stranded polymers with multiple branched arms, which were served as secondary bar-code strands. Finally, the secondary bar-code strands hybridized with the multimolecule labeled fluorescence probes, generating enhanced fluorescence signals. The numbers of fluorescence dots were counted one by one for quantification with epi-fluorescence microscope. By integrating the primary and secondary bar-code-based amplification strategy and the multimolecule labeled fluorescence probes, this method displayed an excellent sensitivity with the detection limits were both 5 fM. Unlike the typical bar-code assay that the bar-code strands should be released and identified on a microarray, this method is more direct. Moreover, because of the selective immune reaction and the dual bar-code mechanism, the resulting method could detect the two targets simultaneously. Multiple analysis in human serum was also performed, suggesting that our strategy was reliable and had a great potential application in early clinical diagnosis. PMID:26721199

  15. Detection and Location of Gamma-Ray Sources with a Modulating Coded Mask

    SciTech Connect

    Anderson, Dale N.; Stromswold, David C.; Wunschel, Sharon C.; Peurrung, Anthony J.; Hansen, Randy R.

    2006-01-31

    This paper presents methods of detecting and locating a concelaed nuclear gamma-ray source with a coded aperture mask. Energetic gamma rays readily penetrate moderate amounts of shielding material and can be detected at distances of many meters. The detection of high energy gamma-ray sources is vitally important to national security for several reasons, including nuclear materials smuggling interdiction, monitoring weapon components under treaties, and locating nuclear weapons and materials in the possession terrorist organizations.

  16. Code System to Detect Recurring Loss of Special Nuclear Materials.

    2001-08-23

    Version 00 NRCPAGE is used in safeguards applications to detect a recurring loss of special nuclear material by frequent evaluation (sequential analysis) of accountability data. Standard sequential testing procedures are traditionally based on sequences of independent and normally distributed measurements. This same approach can be applied to materials balance (MB) data. Here, the term materials balance has a meaning similar to inventory difference and represents a materials loss indicator localized in time and space. However,more » distinct Mbs cannot be reasonably treated as statistically independent and may not always be reasonably treated as normally distributed. Furthermore, the covariance structure associated with a given MB sequence is not known and must be estimated. Nonindependence is treated by converting the MB sequence to the innovation sequence, sometimes called the ITMUF sequence or the sequence of MUF residuals, which are statistically independent and amenable to sequential test procedures. A one-sided page's test, effective for a wide range of recurring loss scenarios, is applied to the standardized innovation sequence. The program can be easily modified to suit particular needs; the models for the assumption of multivariate normality for MBs when computing the innovation sequence or the test procedure can be changed as can the input/output format, dimensioning, local error checking, and simulation work. Input files can be sequentially constructed using local text editors to update existing files. Output files can be read by graphics, report writer, or other stand-alone utility routines.« less

  17. Limiter-discriminator detection performance of Manchester and NRZ coded FSK

    NASA Technical Reports Server (NTRS)

    Cartier, D. E.

    1977-01-01

    The theory of limiter-discriminator detection of a frequency shift keyed (FSK) carrier is reviewed and this theory is used to predict the bit error probability performance of Manchester coded and nonreturn-to-zero (NRZ) coded data. A major result of the study is that the predetection time bandwidth product BT and the deviation ratio h needed to give optimum performance for Manchester coding are seen to be larger than optimum NRZ FSK. Specifically, BT of about 2 and h of about 1 will result in Manchester performance about 2 dB worse than optimum NRZ.

  18. Developing a coding scheme for detecting usability and fun problems in computer games for young children.

    PubMed

    Barendregt, W; Bekker, M M

    2006-08-01

    This article describes the development and assessment of a coding scheme for finding both usability and fun problems through observations of young children playing computer games during user tests. The proposed coding scheme is based on an existing list of breakdown indication types of the detailed video analysis method (DEVAN). This method was developed to detect usability problems in task-based products for adults. However, the new coding scheme for children's computer games takes into account that in games, fun, in addition to usability, is an important factor and that children behave differently from adults. Therefore, the proposed coding scheme uses 8 of the 14 original breakdown indications and has 7 new indications. The article first discusses the development of the new coding scheme. Subsequently, the article describes the reliability assessment of the coding scheme. The any-two agreement measure of 38.5% shows that thresholds for when certain user behavior is worth coding will be different for different evaluators. However, the any-two agreement of .92 for a fixed list of observation points shows that the distinction between the available codes is clear to most evaluators. Finally, a pilot study shows that training can increase any-two agreement considerably by decreasing the number of unique observations, in comparison with the number of agreed upon observations.

  19. Low-Complexity Saliency Detection Algorithm for Fast Perceptual Video Coding

    PubMed Central

    Liu, Pengyu; Jia, Kebin

    2013-01-01

    A low-complexity saliency detection algorithm for perceptual video coding is proposed; low-level encoding information is adopted as the characteristics of visual perception analysis. Firstly, this algorithm employs motion vector (MV) to extract temporal saliency region through fast MV noise filtering and translational MV checking procedure. Secondly, spatial saliency region is detected based on optimal prediction mode distributions in I-frame and P-frame. Then, it combines the spatiotemporal saliency detection results to define the video region of interest (VROI). The simulation results validate that the proposed algorithm can avoid a large amount of computation work in the visual perception characteristics analysis processing compared with other existing algorithms; it also has better performance in saliency detection for videos and can realize fast saliency detection. It can be used as a part of the video standard codec at medium-to-low bit-rates or combined with other algorithms in fast video coding. PMID:24489495

  20. Microfluidic CODES: a scalable multiplexed electronic sensor for orthogonal detection of particles in microfluidic channels.

    PubMed

    Liu, Ruxiu; Wang, Ningquan; Kamili, Farhan; Sarioglu, A Fatih

    2016-04-21

    Numerous biophysical and biochemical assays rely on spatial manipulation of particles/cells as they are processed on lab-on-a-chip devices. Analysis of spatially distributed particles on these devices typically requires microscopy negating the cost and size advantages of microfluidic assays. In this paper, we introduce a scalable electronic sensor technology, called microfluidic CODES, that utilizes resistive pulse sensing to orthogonally detect particles in multiple microfluidic channels from a single electrical output. Combining the techniques from telecommunications and microfluidics, we route three coplanar electrodes on a glass substrate to create multiple Coulter counters producing distinct orthogonal digital codes when they detect particles. We specifically design a digital code set using the mathematical principles of Code Division Multiple Access (CDMA) telecommunication networks and can decode signals from different microfluidic channels with >90% accuracy through computation even if these signals overlap. As a proof of principle, we use this technology to detect human ovarian cancer cells in four different microfluidic channels fabricated using soft lithography. Microfluidic CODES offers a simple, all-electronic interface that is well suited to create integrated, low-cost lab-on-a-chip devices for cell- or particle-based assays in resource-limited settings.

  1. Quantum-capacity-approaching codes for the detected-jump channel

    SciTech Connect

    Grassl, Markus; Wei Zhaohui; Ji Zhengfeng; Zeng Bei

    2010-12-15

    The quantum-channel capacity gives the ultimate limit for the rate at which quantum data can be reliably transmitted through a noisy quantum channel. Degradable quantum channels are among the few channels whose quantum capacities are known. Given the quantum capacity of a degradable channel, it remains challenging to find a practical coding scheme which approaches capacity. Here we discuss code designs for the detected-jump channel, a degradable channel with practical relevance describing the physics of spontaneous decay of atoms with detected photon emission. We show that this channel can be used to simulate a binary classical channel with both erasures and bit flips. The capacity of the simulated classical channel gives a lower bound on the quantum capacity of the detected-jump channel. When the jump probability is small, it almost equals the quantum capacity. Hence using a classical capacity-approaching code for the simulated classical channel yields a quantum code which approaches the quantum capacity of the detected-jump channel.

  2. Optimal Multicarrier Phase-Coded Waveform Design for Detection of Extended Targets

    SciTech Connect

    Sen, Satyabrata; Glover, Charles Wayne

    2013-01-01

    We design a parametric multicarrier phase-coded (MCPC) waveform that achieves the optimal performance in detecting an extended target in the presence of signal-dependent interference. Traditional waveform design techniques provide only the optimal energy spectral density of the transmit waveform and suffer a performance loss in the synthesis process of the time-domain signal. Therefore, we opt for directly designing an MCPC waveform in terms of its time-frequency codes to obtain the optimal detection performance. First, we describe the modeling assumptions considering an extended target buried within the signal-dependent clutter with known power spectral density, and deduce the performance characteristics of the optimal detector. Then, considering an MCPC signal transmission, we express the detection characteristics in terms of the phase-codes of the MCPC waveform and propose to optimally design the MCPC signal by maximizing the detection probability. Our numerical results demonstrate that the designed MCPC signal attains the optimal detection performance and requires a lesser computational time than the other parametric waveform design approach.

  3. A general-purpose contact detection algorithm for nonlinear structural analysis codes

    SciTech Connect

    Heinstein, M.W.; Attaway, S.W.; Swegle, J.W.; Mello, F.J.

    1993-05-01

    A new contact detection algorithm has been developed to address difficulties associated with the numerical simulation of contact in nonlinear finite element structural analysis codes. Problems including accurate and efficient detection of contact for self-contacting surfaces, tearing and eroding surfaces, and multi-body impact are addressed. The proposed algorithm is portable between dynamic and quasi-static codes and can efficiently model contact between a variety of finite element types including shells, bricks, beams and particles. The algorithm is composed of (1) a location strategy that uses a global search to decide which slave nodes are in proximity to a master surface and (2) an accurate detailed contact check that uses the projected motions of both master surface and slave node. In this report, currently used contact detection algorithms and their associated difficulties are discussed. Then the proposed algorithm and how it addresses these problems is described. Finally, the capability of the new algorithm is illustrated with several example problems.

  4. Multi-hop optical label switching with coherent detected spectral amplitude code labels

    NASA Astrophysics Data System (ADS)

    Cao, Yongsheng

    Based on label stacking principles and coherent detection, we present a two-hop, coherent detected spectral amplitude code (SAC) labeled system to accomplish ultrafast packet forwarding for packet-switched metropolitan area networks. An optical switching network with two forwarding nodes, two 156 Mb/s SAC labels, and 40 Gb/s differential quadrature phase shift keying (DQPSK) payloads is demonstrated by computer simulation. The bit error rate (BER) performances of coherent detected SAC labels and high speed payload over 160 km fiber after two hops transmission are accessed, respectively.

  5. The Limits of Coding with Joint Constraints on Detected and Undetected Error Rates

    NASA Technical Reports Server (NTRS)

    Dolinar, Sam; Andrews, Kenneth; Pollara, Fabrizio; Divsalar, Dariush

    2008-01-01

    We develop a remarkably tight upper bound on the performance of a parameterized family of bounded angle maximum-likelihood (BA-ML) incomplete decoders. The new bound for this class of incomplete decoders is calculated from the code's weight enumerator, and is an extension of Poltyrev-type bounds developed for complete ML decoders. This bound can also be applied to bound the average performance of random code ensembles in terms of an ensemble average weight enumerator. We also formulate conditions defining a parameterized family of optimal incomplete decoders, defined to minimize both the total codeword error probability and the undetected error probability for any fixed capability of the decoder to detect errors. We illustrate the gap between optimal and BA-ML incomplete decoding via simulation of a small code.

  6. Geosoft eXecutables (GX's) Developed by the U.S. Geological Survey, Version 2.0, with Notes on GX Development from Fortran Code

    USGS Publications Warehouse

    Phillips, Jeffrey D.

    2007-01-01

    Introduction Geosoft executables (GX's) are custom software modules for use with the Geosoft Oasis montaj geophysical data processing system, which currently runs under the Microsoft Windows 2000 or XP operating systems. The U.S. Geological Survey (USGS) uses Oasis montaj primarily for the processing and display of airborne geophysical data. The ability to add custom software modules to the Oasis montaj system is a feature employed by the USGS in order to take advantage of the large number of geophysical algorithms developed by the USGS during the past half century. This main part of this report, along with Appendix 1, describes Version 2.0 GX's developed by the USGS or specifically for the USGS by contractors. These GX's perform both basic and advanced operations. Version 1.0 GX's developed by the USGS were described by Phillips and others (2003), and are included in Version 2.0. Appendix 1 contains the help files for the individual GX's. Appendix 2 describes the new method that was used to create the compiled GX files, starting from legacy Fortran source code. Although the new method shares many steps with the approach presented in the Geosoft GX Developer manual, it differs from that approach in that it uses free, open-source Fortran and C compilers and avoids all Fortran-to-C conversion.

  7. Blind Detection of Region Duplication Forgery Using Fractal Coding and Feature Matching.

    PubMed

    Jenadeleh, Mohsen; Ebrahimi Moghaddam, Mohsen

    2016-05-01

    Digital image forgery detection is important because of its wide use in applications such as medical diagnosis, legal investigations, and entertainment. Copy-move forgery is one of the famous techniques, which is used in region duplication. Many of the existing copy-move detection algorithms cannot effectively blind detect duplicated regions that are made by powerful image manipulation software like Photoshop. In this study, a new method is proposed for blind detecting manipulations in digital images based on modified fractal coding and feature vector matching. The proposed method not only detects typical copy-move forgery, but also finds multiple copied forgery regions for images that are subjected to rotation, scaling, reflection, and a mixture of these postprocessing operations. The proposed method is robust against tampered images undergoing attacks such as Gaussian blurring, contrast scaling, and brightness adjustment. The experimental results demonstrated the validity and efficiency of the method.

  8. Blind Detection of Region Duplication Forgery Using Fractal Coding and Feature Matching.

    PubMed

    Jenadeleh, Mohsen; Ebrahimi Moghaddam, Mohsen

    2016-05-01

    Digital image forgery detection is important because of its wide use in applications such as medical diagnosis, legal investigations, and entertainment. Copy-move forgery is one of the famous techniques, which is used in region duplication. Many of the existing copy-move detection algorithms cannot effectively blind detect duplicated regions that are made by powerful image manipulation software like Photoshop. In this study, a new method is proposed for blind detecting manipulations in digital images based on modified fractal coding and feature vector matching. The proposed method not only detects typical copy-move forgery, but also finds multiple copied forgery regions for images that are subjected to rotation, scaling, reflection, and a mixture of these postprocessing operations. The proposed method is robust against tampered images undergoing attacks such as Gaussian blurring, contrast scaling, and brightness adjustment. The experimental results demonstrated the validity and efficiency of the method. PMID:27122398

  9. Arbitrary error detection in a planar lattice of the surface code

    NASA Astrophysics Data System (ADS)

    Corcoles, Antonio; Magesan, Easwar; Srinivasan, Srikanth; Bronn, Nicholas; Hertzberg, Jared; Cross, Andrew; Steffen, Matthias; Gambetta, Jay; Chow, Jerry

    2015-03-01

    We detect arbitrary single-qubit errors on a system of four superconducting qubits arranged in a planar lattice, amenable to the surface code. The error detection protocol is based on the stabilizer formalism and protects a codeword encoded on an entangled two-qubit state by quantum non-demolition parity measurements, ZZ and XX. These parity measurements are performed using the other two qubits acting as syndromes. We introduce a bit- or phase-flip single-qubit error applied to the codeword and show that this error can be revealed uniquely in the syndromes. The -non-trivial- geometric arrangement of the qubits is essential to the surface code algorithm and is therefore extendable throughout the two-dimensional plane, encoding progressively larger logical Hilbert spaces towards a fully scaled fault-tolerant quantum computer. We acknowledge support from IARPA under contract W911NF-10-1-0324

  10. Using locality-constrained linear coding in automatic target detection of HRS images

    NASA Astrophysics Data System (ADS)

    Rezaee, M.; Mirikharaji, Z.; Zhang, Y.

    2016-04-01

    Automatic target detection with complicated shapes in high spatial resolution images is an ongoing challenge in remote sensing image processing. This is because most methods use spectral or texture information, which are not sufficient for detecting complex shapes. In this paper, a new detection framework, based on Spatial Pyramid Matching (SPM) and Locality- constraint Linear Coding (LLC), is proposed to solve this problem, and exemplified using airplane shapes. The process starts with partitioning the image into sub-regions and generating a unique histogram for local features of each sub-region. Then, linear Support Vector Machines (SVMs) are used to detect objects based on a pyramid-matching kernel, which analyses the descriptors inside patches in different resolution. In order to generate the histogram, first a point feature detector (e.g. SIFT) is applied on the patches, and then a quantization process is used to select local features. In this step, the k-mean method is used in conjunction with the locality-constrained linear coding method. The LLC forces the coefficient matrix in the quantization process to be local and sparse as well. As a result, the speed of the method improves around 24 times in comparison to using sparse coding for quantization. Quantitative analysis also shows improvement in comparison to just using k-mean, but the accuracy in comparison to using sparse coding is similar. Rotation and shift of the desired object has no effect on the obtained results. The speed and accuracy of this algorithm for high spatial resolution images make it capable for use in real-world applications.

  11. Automatic Detection of Frontal Face Midline by Chain-coded Merlin-Farber Hough Trasform

    NASA Astrophysics Data System (ADS)

    Okamoto, Daichi; Ohyama, Wataru; Wakabayashi, Tetsushi; Kimura, Fumitaka

    We propose a novel approach for detection of the facial midline (facial symmetry axis) from a frontal face image. The facial midline has several applications, for instance reducing computational cost required for facial feature extraction (FFE) and postoperative assessment for cosmetic or dental surgery. The proposed method detects the facial midline of a frontal face from an edge image as the symmetry axis using the Merlin-Faber Hough transformation. And a new performance improvement scheme for midline detection by MFHT is present. The main concept of the proposed scheme is suppression of redundant vote on the Hough parameter space by introducing chain code representation for the binary edge image. Experimental results on the image dataset containing 2409 images from FERET database indicate that the proposed algorithm can improve the accuracy of midline detection from 89.9% to 95.1 % for face images with different scales and rotation.

  12. Coded aperture coherent scatter imaging for breast cancer detection: a Monte Carlo evaluation

    NASA Astrophysics Data System (ADS)

    Lakshmanan, Manu N.; Morris, Robert E.; Greenberg, Joel A.; Samei, Ehsan; Kapadia, Anuj J.

    2016-03-01

    It is known that conventional x-ray imaging provides a maximum contrast between cancerous and healthy fibroglandular breast tissues of 3% based on their linear x-ray attenuation coefficients at 17.5 keV, whereas coherent scatter signal provides a maximum contrast of 19% based on their differential coherent scatter cross sections. Therefore in order to exploit this potential contrast, we seek to evaluate the performance of a coded- aperture coherent scatter imaging system for breast cancer detection and investigate its accuracy using Monte Carlo simulations. In the simulations we modeled our experimental system, which consists of a raster-scanned pencil beam of x-rays, a bismuth-tin coded aperture mask comprised of a repeating slit pattern with 2-mm periodicity, and a linear-array of 128 detector pixels with 6.5-keV energy resolution. The breast tissue that was scanned comprised a 3-cm sample taken from a patient-based XCAT breast phantom containing a tomosynthesis- based realistic simulated lesion. The differential coherent scatter cross section was reconstructed at each pixel in the image using an iterative reconstruction algorithm. Each pixel in the reconstructed image was then classified as being either air or the type of breast tissue with which its normalized reconstructed differential coherent scatter cross section had the highest correlation coefficient. Comparison of the final tissue classification results with the ground truth image showed that the coded aperture imaging technique has a cancerous pixel detection sensitivity (correct identification of cancerous pixels), specificity (correctly ruling out healthy pixels as not being cancer) and accuracy of 92.4%, 91.9% and 92.0%, respectively. Our Monte Carlo evaluation of our experimental coded aperture coherent scatter imaging system shows that it is able to exploit the greater contrast available from coherently scattered x-rays to increase the accuracy of detecting cancerous regions within the breast.

  13. Analysis of a Coded, M-ary Orthogonal Input Optical Channel with Random-gain Photomultiplier Detection

    NASA Technical Reports Server (NTRS)

    Lee, P. J.

    1984-01-01

    Performance of two coding systems is analyzed for a noisy optical channel with M(=2(L)-ary orthogonal signaling and random gain photomultiplier detection. The considered coding systems are the Reed Solomon (RS) coding with error only correction decoding and the interleaved binary convolutional system with soft decision Viterbi decoding. The required average number of received signal photons per information bit, N sub b, for a desired bit error of 0.000001 is found for a set of commonly used parameters and with a high background noise level. We find that the interleaved binary convolutional coding system is preferable to the RS coding system in performance complexity tradeoffs.

  14. Detecting and Comparing Non-Coding RNAs in the High-Throughput Era

    PubMed Central

    Bussotti, Giovanni; Notredame, Cedric; Enright, Anton J.

    2013-01-01

    In recent years there has been a growing interest in the field of non-coding RNA. This surge is a direct consequence of the discovery of a huge number of new non-coding genes and of the finding that many of these transcripts are involved in key cellular functions. In this context, accurately detecting and comparing RNA sequences has become important. Aligning nucleotide sequences is a key requisite when searching for homologous genes. Accurate alignments reveal evolutionary relationships, conserved regions and more generally any biologically relevant pattern. Comparing RNA molecules is, however, a challenging task. The nucleotide alphabet is simpler and therefore less informative than that of amino-acids. Moreover for many non-coding RNAs, evolution is likely to be mostly constrained at the structural level and not at the sequence level. This results in very poor sequence conservation impeding comparison of these molecules. These difficulties define a context where new methods are urgently needed in order to exploit experimental results to their full potential. This review focuses on the comparative genomics of non-coding RNAs in the context of new sequencing technologies and especially dealing with two extremely important and timely research aspects: the development of new methods to align RNAs and the analysis of high-throughput data. PMID:23887659

  15. Detection of code spread OFDM based on 0-1 integer quadratic programming

    NASA Astrophysics Data System (ADS)

    Elghariani, Ali; Zoltowski, Michael D.

    2012-05-01

    In this paper we introduce Integer Quadratic Programming (MIQP) approach to optimally detect QPSK Code Spread OFDM (CS-OFDM) by formulating the problem as a combinatorial optimization problem. The Branch and Bound (BB) algorithm is utilized to solve this integer quadratic programming problem. Furthermore, we propose combined preprocessing steps that can be applied prior to BB so that the computational complexity of the optimum receiver is reduced. The first step in this combination is to detect as much as possible symbols using procedures presented in [9], which is basically based on the gradient of quadratic function. The second step detects the undetected symbols from the first step using MMSE estimator. The result of the latter step will be used to predict the initial upper bound of the BB algorithm. Simulation results show that the proposed preprocessing combination when applied prior to BB provides optimal performance with a significantly reduced computational complexity.

  16. Detection of almond allergen coding sequences in processed foods by real time PCR.

    PubMed

    Prieto, Nuria; Iniesto, Elisa; Burbano, Carmen; Cabanillas, Beatriz; Pedrosa, Mercedes M; Rovira, Mercè; Rodríguez, Julia; Muzquiz, Mercedes; Crespo, Jesus F; Cuadrado, Carmen; Linacero, Rosario

    2014-06-18

    The aim of this work was to develop and analytically validate a quantitative RT-PCR method, using novel primer sets designed on Pru du 1, Pru du 3, Pru du 4, and Pru du 6 allergen-coding sequences, and contrast the sensitivity and specificity of these probes. The temperature and/or pressure processing influence on the ability to detect these almond allergen targets was also analyzed. All primers allowed a specific and accurate amplification of these sequences. The specificity was assessed by amplifying DNA from almond, different Prunus species and other common plant food ingredients. The detection limit was 1 ppm in unprocessed almond kernels. The method's robustness and sensitivity were confirmed using spiked samples. Thermal treatment under pressure (autoclave) reduced yield and amplificability of almond DNA; however, high-hydrostatic pressure treatments did not produced such effects. Compared with ELISA assay outcomes, this RT-PCR showed higher sensitivity to detect almond traces in commercial foodstuffs. PMID:24857239

  17. Supersensitive detection and discrimination of enantiomers by dorsal olfactory receptors: evidence for hierarchical odour coding.

    PubMed

    Sato, Takaaki; Kobayakawa, Reiko; Kobayakawa, Ko; Emura, Makoto; Itohara, Shigeyoshi; Kizumi, Miwako; Hamana, Hiroshi; Tsuboi, Akio; Hirono, Junzo

    2015-09-11

    Enantiomeric pairs of mirror-image molecular structures are difficult to resolve by instrumental analyses. The human olfactory system, however, discriminates (-)-wine lactone from its (+)-form rapidly within seconds. To gain insight into receptor coding of enantiomers, we compared behavioural detection and discrimination thresholds of wild-type mice with those of ΔD mice in which all dorsal olfactory receptors are genetically ablated. Surprisingly, wild-type mice displayed an exquisite "supersensitivity" to enantiomeric pairs of wine lactones and carvones. They were capable of supersensitive discrimination of enantiomers, consistent with their high detection sensitivity. In contrast, ΔD mice showed selective major loss of sensitivity to the (+)-enantiomers. The resulting 10(8)-fold differential sensitivity of ΔD mice to (-)- vs. (+)-wine lactone matched that observed in humans. This suggests that humans lack highly sensitive orthologous dorsal receptors for the (+)-enantiomer, similarly to ΔD mice. Moreover, ΔD mice showed >10(10)-fold reductions in enantiomer discrimination sensitivity compared to wild-type mice. ΔD mice detected one or both of the (-)- and (+)-enantiomers over a wide concentration range, but were unable to discriminate them. This "enantiomer odour discrimination paradox" indicates that the most sensitive dorsal receptors play a critical role in hierarchical odour coding for enantiomer identification.

  18. Detection optimization using linear systems analysis of a coded aperture laser sensor system

    SciTech Connect

    Gentry, S.M.

    1994-09-01

    Minimum detectable irradiance levels for a diffraction grating based laser sensor were calculated to be governed by clutter noise resulting from reflected earth albedo. Features on the earth surface caused pseudo-imaging effects on the sensor`s detector arras that resulted in the limiting noise in the detection domain. It was theorized that a custom aperture transmission function existed that would optimize the detection of laser sources against this clutter background. Amplitude and phase aperture functions were investigated. Compared to the diffraction grating technique, a classical Young`s double-slit aperture technique was investigated as a possible optimized solution but was not shown to produce a system that had better clutter-noise limited minimum detectable irradiance. Even though the double-slit concept was not found to have a detection advantage over the slit-grating concept, one interesting concept grew out of the double-slit design that deserved mention in this report, namely the Barker-coded double-slit. This diffractive aperture design possessed properties that significantly improved the wavelength accuracy of the double-slit design. While a concept was not found to beat the slit-grating concept, the methodology used for the analysis and optimization is an example of the application of optoelectronic system-level linear analysis. The techniques outlined here can be used as a template for analysis of a wide range of optoelectronic systems where the entire system, both optical and electronic, contribute to the detection of complex spatial and temporal signals.

  19. Ultrasonic Array for Obstacle Detection Based on CDMA with Kasami Codes

    PubMed Central

    Diego, Cristina; Hernández, Álvaro; Jiménez, Ana; Álvarez, Fernando J.; Sanz, Rebeca; Aparicio, Joaquín

    2011-01-01

    This paper raises the design of an ultrasonic array for obstacle detection based on Phased Array (PA) techniques, which steers the acoustic beam through the environment by electronics rather than mechanical means. The transmission of every element in the array has been encoded, according to Code Division for Multiple Access (CDMA), which allows multiple beams to be transmitted simultaneously. All these features together enable a parallel scanning system which does not only improve the image rate but also achieves longer inspection distances in comparison with conventional PA techniques. PMID:22247675

  20. Auditory detection of ultrasonic coded transmitters by seals and sea lions.

    PubMed

    Cunningham, Kane A; Hayes, Sean A; Michelle Wargo Rub, A; Reichmuth, Colleen

    2014-04-01

    Ultrasonic coded transmitters (UCTs) are high-frequency acoustic tags that are often used to conduct survivorship studies of vulnerable fish species. Recent observations of differential mortality in tag control studies suggest that fish instrumented with UCTs may be selectively targeted by marine mammal predators, thereby skewing valuable survivorship data. In order to better understand the ability of pinnipeds to detect UCT outputs, behavioral high-frequency hearing thresholds were obtained from a trained harbor seal (Phoca vitulina) and a trained California sea lion (Zalophus californianus). Thresholds were measured for extended (500 ms) and brief (10 ms) 69 kHz narrowband stimuli, as well as for a stimulus recorded directly from a Vemco V16-3H UCT, which consisted of eight 10 ms, 69 kHz pure-tone pulses. Detection thresholds for the harbor seal were as expected based on existing audiometric data for this species, while the California sea lion was much more sensitive than predicted. Given measured detection thresholds of 113 dB re 1 μPa and 124 dB re 1 μPa, respectively, both species are likely able to detect acoustic outputs of the Vemco V16-3H under water from distances exceeding 200 m in typical natural conditions, suggesting that these species are capable of using UCTs to detect free-ranging fish. PMID:25234996

  1. Auditory detection of ultrasonic coded transmitters by seals and sea lions.

    PubMed

    Cunningham, Kane A; Hayes, Sean A; Michelle Wargo Rub, A; Reichmuth, Colleen

    2014-04-01

    Ultrasonic coded transmitters (UCTs) are high-frequency acoustic tags that are often used to conduct survivorship studies of vulnerable fish species. Recent observations of differential mortality in tag control studies suggest that fish instrumented with UCTs may be selectively targeted by marine mammal predators, thereby skewing valuable survivorship data. In order to better understand the ability of pinnipeds to detect UCT outputs, behavioral high-frequency hearing thresholds were obtained from a trained harbor seal (Phoca vitulina) and a trained California sea lion (Zalophus californianus). Thresholds were measured for extended (500 ms) and brief (10 ms) 69 kHz narrowband stimuli, as well as for a stimulus recorded directly from a Vemco V16-3H UCT, which consisted of eight 10 ms, 69 kHz pure-tone pulses. Detection thresholds for the harbor seal were as expected based on existing audiometric data for this species, while the California sea lion was much more sensitive than predicted. Given measured detection thresholds of 113 dB re 1 μPa and 124 dB re 1 μPa, respectively, both species are likely able to detect acoustic outputs of the Vemco V16-3H under water from distances exceeding 200 m in typical natural conditions, suggesting that these species are capable of using UCTs to detect free-ranging fish.

  2. Coded moderator approach for fast neutron source detection and localization at standoff

    NASA Astrophysics Data System (ADS)

    Littell, Jennifer; Lukosi, Eric; Hayward, Jason; Milburn, Robert; Rowan, Allen

    2015-06-01

    Considering the need for directional sensing at standoff for some security applications and scenarios where a neutron source may be shielded by high Z material that nearly eliminates the source gamma flux, this work focuses on investigating the feasibility of using thermal neutron sensitive boron straw detectors for fast neutron source detection and localization. We utilized MCNPX simulations to demonstrate that, through surrounding the boron straw detectors by a HDPE coded moderator, a source-detector orientation-specific response enables potential 1D source localization in a high neutron detection efficiency design. An initial test algorithm has been developed in order to confirm the viability of this detector system's localization capabilities which resulted in identification of a 1 MeV neutron source with a strength equivalent to 8 kg WGPu at 50 m standoff within ±11°.

  3. Accumulating pyramid spatial-spectral collaborative coding divergence for hyperspectral anomaly detection

    NASA Astrophysics Data System (ADS)

    Sun, Hao; Zou, Huanxin; Zhou, Shilin

    2016-03-01

    Detection of anomalous targets of various sizes in hyperspectral data has received a lot of attention in reconnaissance and surveillance applications. Many anomaly detectors have been proposed in literature. However, current methods are susceptible to anomalies in the processing window range and often make critical assumptions about the distribution of the background data. Motivated by the fact that anomaly pixels are often distinctive from their local background, in this letter, we proposed a novel hyperspectral anomaly detection framework for real-time remote sensing applications. The proposed framework consists of four major components, sparse feature learning, pyramid grid window selection, joint spatial-spectral collaborative coding and multi-level divergence fusion. It exploits the collaborative representation difference in the feature space to locate potential anomalies and is totally unsupervised without any prior assumptions. Experimental results on airborne recorded hyperspectral data demonstrate that the proposed methods adaptive to anomalies in a large range of sizes and is well suited for parallel processing.

  4. Detection and reconstruction of error control codes for engineered and biological regulatory systems.

    SciTech Connect

    May, Elebeoba Eni; Rintoul, Mark Daniel; Johnston, Anna Marie; Pryor, Richard J.; Hart, William Eugene; Watson, Jean-Paul

    2003-10-01

    A fundamental challenge for all communication systems, engineered or living, is the problem of achieving efficient, secure, and error-free communication over noisy channels. Information theoretic principals have been used to develop effective coding theory algorithms to successfully transmit information in engineering systems. Living systems also successfully transmit biological information through genetic processes such as replication, transcription, and translation, where the genome of an organism is the contents of the transmission. Decoding of received bit streams is fairly straightforward when the channel encoding algorithms are efficient and known. If the encoding scheme is unknown or part of the data is missing or intercepted, how would one design a viable decoder for the received transmission? For such systems blind reconstruction of the encoding/decoding system would be a vital step in recovering the original message. Communication engineers may not frequently encounter this situation, but for computational biologists and biotechnologist this is an immediate challenge. The goal of this work is to develop methods for detecting and reconstructing the encoder/decoder system for engineered and biological data. Building on Sandia's strengths in discrete mathematics, algorithms, and communication theory, we use linear programming and will use evolutionary computing techniques to construct efficient algorithms for modeling the coding system for minimally errored engineered data stream and genomic regulatory DNA and RNA sequences. The objective for the initial phase of this project is to construct solid parallels between biological literature and fundamental elements of communication theory. In this light, the milestones for FY2003 were focused on defining genetic channel characteristics and providing an initial approximation for key parameters, including coding rate, memory length, and minimum distance values. A secondary objective addressed the question of

  5. Speedup properties of phases in the execution profile of distributed parallel programs

    SciTech Connect

    Carlson, B.M.; Wagner, T.D.; Dowdy, L.W.; Worley, P.H.

    1992-08-01

    The execution profile of a distributed-memory parallel program specifies the number of busy processors as a function of time. Periods of homogeneous processor utilization are manifested in many execution profiles. These periods can usually be correlated with the algorithms implemented in the underlying parallel code. Three families of methods for smoothing execution profile data are presented. These approaches simplify the problem of detecting end points of periods of homogeneous utilization. These periods, called phases, are then examined in isolation, and their speedup characteristics are explored. A specific workload executed on an Intel iPSC/860 is used for validation of the techniques described.

  6. Execution and executability

    NASA Astrophysics Data System (ADS)

    Bradford, Robert W.; Harrison, Denise

    2015-09-01

    "We have a new strategy to grow our organization." Developing the plan is just the start. Implementing it in the organization is the real challenge. Many organizations don't fail due to lack of strategy; they struggle because it isn't effectively implemented. After working with hundreds of companies on strategy development, Denise and Robert have distilled the critical areas where organizations need to focus in order to enhance profitability through superior execution. If these questions are important to your organization, you'll find useful answers in the following articles: Do you find yourself overwhelmed by too many competing priorities? How do you limit how many strategic initiatives/projects your organization is working on at one time? How do you balance your resource requirements (time and money) with the availability of these resources? How do you balance your strategic initiative requirements with the day-to-day requirements of your organization?

  7. Executive seduction.

    PubMed

    Wolf, G A

    1990-01-01

    The growth of corporate orientation for healthcare structures, with a focus on bottom-line management, has radically altered the role of nurse executives. With the organization's emphasis on performance, productivity, and results, successful nurse executives are now integrating the management of the delivery of nursing care with the management of complex corporate structures and relationships. The editor of Executive Development discusses the rapidly changing expectations and demands of the contemporary nurse executive's work.

  8. Detection by real time PCR of walnut allergen coding sequences in processed foods.

    PubMed

    Linacero, Rosario; Ballesteros, Isabel; Sanchiz, Africa; Prieto, Nuria; Iniesto, Elisa; Martinez, Yolanda; Pedrosa, Mercedes M; Muzquiz, Mercedes; Cabanillas, Beatriz; Rovira, Mercè; Burbano, Carmen; Cuadrado, Carmen

    2016-07-01

    A quantitative real-time PCR (RT-PCR) method, employing novel primer sets designed on Jug r 1, Jug r 3, and Jug r 4 allergen-coding sequences, was set up and validated. Its specificity, sensitivity, and applicability were evaluated. The DNA extraction method based on CTAB-phenol-chloroform was best for walnut. RT-PCR allowed a specific and accurate amplification of allergen sequence, and the limit of detection was 2.5pg of walnut DNA. The method sensitivity and robustness were confirmed with spiked samples, and Jug r 3 primers detected up to 100mg/kg of raw walnut (LOD 0.01%, LOQ 0.05%). Thermal treatment combined with pressure (autoclaving) reduced yield and amplification (integrity and quality) of walnut DNA. High hydrostatic pressure (HHP) did not produce any effect on the walnut DNA amplification. This RT-PCR method showed greater sensitivity and reliability in the detection of walnut traces in commercial foodstuffs compared with ELISA assays.

  9. Detection by real time PCR of walnut allergen coding sequences in processed foods.

    PubMed

    Linacero, Rosario; Ballesteros, Isabel; Sanchiz, Africa; Prieto, Nuria; Iniesto, Elisa; Martinez, Yolanda; Pedrosa, Mercedes M; Muzquiz, Mercedes; Cabanillas, Beatriz; Rovira, Mercè; Burbano, Carmen; Cuadrado, Carmen

    2016-07-01

    A quantitative real-time PCR (RT-PCR) method, employing novel primer sets designed on Jug r 1, Jug r 3, and Jug r 4 allergen-coding sequences, was set up and validated. Its specificity, sensitivity, and applicability were evaluated. The DNA extraction method based on CTAB-phenol-chloroform was best for walnut. RT-PCR allowed a specific and accurate amplification of allergen sequence, and the limit of detection was 2.5pg of walnut DNA. The method sensitivity and robustness were confirmed with spiked samples, and Jug r 3 primers detected up to 100mg/kg of raw walnut (LOD 0.01%, LOQ 0.05%). Thermal treatment combined with pressure (autoclaving) reduced yield and amplification (integrity and quality) of walnut DNA. High hydrostatic pressure (HHP) did not produce any effect on the walnut DNA amplification. This RT-PCR method showed greater sensitivity and reliability in the detection of walnut traces in commercial foodstuffs compared with ELISA assays. PMID:26920302

  10. Coded excitation speeds up the detection of the fundamental flexural guided wave in coated tubes

    NASA Astrophysics Data System (ADS)

    Song, Xiaojun; Moilanen, Petro; Zhao, Zuomin; Ta, Dean; Pirhonen, Jalmari; Salmi, Ari; Hæeggström, Edward; Myllylä, Risto; Timonen, Jussi; Wang, Weiqi

    2016-09-01

    The fundamental flexural guided wave (FFGW) permits ultrasonic assessment of the wall thickness of solid waveguides, such as tubes or, e.g., long cortical bones. Recently, an optical non-contact method was proposed for ultrasound excitation and detection with the aim of facilitating the FFGW reception by suppressing the interfering modes from the soft coating. This technique suffers from low SNR and requires iterative physical scanning across the source-receiver distance for 2D-FFT analysis. This means that SNR improvement achieved by temporal averaging becomes time-consuming (several minutes) which reduces the applicability of the technique, especially in time-critical applications such as clinical quantitative ultrasound. To achieve sufficient SNR faster, an ultrasonic excitation by a base-sequence-modulated Golay code (BSGC, 64-bit code pair) on coated tube samples (1-5 mm wall thickness and 5 mm soft coating layer) was used. This approach improved SNR by 21 dB and speeded up the measurement by a factor of 100 compared to using a classical pulse excitation with temporal averaging. The measurement now took seconds instead of minutes, while the ability to determine the wall thickness of the phantoms was maintained. The technique thus allows rapid noncontacting assessment of the wall thickness in coated solid tubes, such as the human bone.

  11. Assessment of absolute added correlative coding in optical intensity modulation and direct detection channels

    NASA Astrophysics Data System (ADS)

    Dong-Nhat, Nguyen; Elsherif, Mohamed A.; Malekmohammadi, Amin

    2016-06-01

    The performance of absolute added correlative coding (AACC) modulation format with direct detection has been numerically and analytically reported, targeting metro data center interconnects. Hereby, the focus lies on the performance of the bit error rate, noise contributions, spectral efficiency, and chromatic dispersion tolerance. The signal space model of AACC, where the average electrical and optical power expressions are derived for the first time, is also delineated. The proposed modulation format was also compared to other well-known signaling, such as on-off-keying (OOK) and four-level pulse-amplitude modulation, at the same bit rate in a directly modulated vertical-cavity surface-emitting laser-based transmission system. The comparison results show a clear advantage of AACC in achieving longer fiber delivery distance due to the higher dispersion tolerance.

  12. Cooperative multi-user detection and ranging based on pseudo-random codes

    NASA Astrophysics Data System (ADS)

    Morhart, C.; Biebl, E. M.

    2009-05-01

    We present an improved approach for a Round Trip Time of Flight distance measurement system. The system is intended for the usage in a cooperative localisation system for automotive applications. Therefore, it is designed to address a large number of communication partners per measurement cycle. By using coded signals in a time divison multiple access order, we can detect a large number of pedestrian sensors with just one car sensor. We achieve this by using very short transmit bursts in combination with a real time correlation algorithm. Futhermore, the correlation approach offers real time data, concerning the time of arrival, that can serve as a trigger impulse for other comunication systems. The distance accuracy of the correlation result was further increased by adding a fourier interpolation filter. The system performance was checked with a prototype at 2.4 GHz. We reached a distance measurement accuracy of 12 cm at a range up to 450 m.

  13. PCR-free quantitative detection of genetically modified organism from raw materials. An electrochemiluminescence-based bio bar code method.

    PubMed

    Zhu, Debin; Tang, Yabing; Xing, Da; Chen, Wei R

    2008-05-15

    A bio bar code assay based on oligonucleotide-modified gold nanoparticles (Au-NPs) provides a PCR-free method for quantitative detection of nucleic acid targets. However, the current bio bar code assay requires lengthy experimental procedures including the preparation and release of bar code DNA probes from the target-nanoparticle complex and immobilization and hybridization of the probes for quantification. Herein, we report a novel PCR-free electrochemiluminescence (ECL)-based bio bar code assay for the quantitative detection of genetically modified organism (GMO) from raw materials. It consists of tris-(2,2'-bipyridyl) ruthenium (TBR)-labeled bar code DNA, nucleic acid hybridization using Au-NPs and biotin-labeled probes, and selective capture of the hybridization complex by streptavidin-coated paramagnetic beads. The detection of target DNA is realized by direct measurement of ECL emission of TBR. It can quantitatively detect target nucleic acids with high speed and sensitivity. This method can be used to quantitatively detect GMO fragments from real GMO products.

  14. Ultrasensitive aptamer-based bio bar code immunomagnetic separation and electrochemiluminescence method for the detection of protein.

    PubMed

    Zhu, Debin; Zhou, Xiaoming; Xing, Da

    2012-05-01

    An ultrasensitive aptamer-based bio bar code immunomagnetic separation and electrochemiluminescence (IM-ECL) method for the detection of protein is developed. The target protein is captured by biotin-labeled aptamer (biotin probe) and [Ru(bpy)(3)](2+) (TBR)-Au bio bar code-labeled aptamer (ECL nanoprobe), to form a double aptamer-protein sandwich complex. The complex is then immobilized on the streptavidin microbeads through biotin-streptavidin linkage and detected by ECL assay. The ECL signal of the target protein is amplified by the TBR-bio bar code DNAs. As an example, platelet-derived growth factor B-chain homodimer (PDGF-BB) was detected by the method. Experimental results show that the detection limit of the assay is 1 pM of PDGF-BB. A calibration curve with a linearity range from 1 pM to 10 nM is established, thus, make quantitative analysis possible. The method has been used to detect PDGF-BB in fetal calf serum with minimum background interference. Due to the wide availability of aptamer for numerous proteins, this aptamer-based bio bar code IM-ECL method holds great promise in protein detection.

  15. Self-assembled software and method of overriding software execution

    SciTech Connect

    Bouchard, Ann M.; Osbourn, Gordon C.

    2013-01-08

    A computer-implemented software self-assembled system and method for providing an external override and monitoring capability to dynamically self-assembling software containing machines that self-assemble execution sequences and data structures. The method provides an external override machine that can be introduced into a system of self-assembling machines while the machines are executing such that the functionality of the executing software can be changed or paused without stopping the code execution and modifying the existing code. Additionally, a monitoring machine can be introduced without stopping code execution that can monitor specified code execution functions by designated machines and communicate the status to an output device.

  16. Writing executable assertions to test flight software

    NASA Technical Reports Server (NTRS)

    Mahmood, A.; Andrews, D. M.; Mccluskey, E. J.

    1984-01-01

    An executable assertion is a logical statement about the variables or a block of code. If there is no error during execution, the assertion statement results in a true value. Executable assertions can be used for dynamic testing of software. They can be employed for validation during the design phase, and exception and error detection during the operation phase. The present investigation is concerned with the problem of writing executable assertions, taking into account the use of assertions for testing flight software. They can be employed for validation during the design phase, and for exception handling and error detection during the operation phase The digital flight control system and the flight control software are discussed. The considered system provides autopilot and flight director modes of operation for automatic and manual control of the aircraft during all phases of flight. Attention is given to techniques for writing and using assertions to test flight software, an experimental setup to test flight software, and language features to support efficient use of assertions.

  17. Stabilizing distinguishable qubits against spontaneous decay by detected-jump correcting quantum codes.

    PubMed

    Alber, G; Beth, T; Charnes, C; Delgado, A; Grassl, M; Mussinger, M

    2001-05-01

    A new class of error-correcting quantum codes is introduced capable of stabilizing qubits against spontaneous decay arising from couplings to statistically independent reservoirs. These quantum codes are based on the idea of using an embedded quantum code and exploiting the classical information available about which qubit has been affected by the environment. They are immediately relevant for quantum computation and information processing using arrays of trapped ions or nuclear spins. Interesting relations between these quantum codes and basic notions of design theory are established. PMID:11328185

  18. Presenting an Alternative Source Code Plagiarism Detection Framework for Improving the Teaching and Learning of Programming

    ERIC Educational Resources Information Center

    Hattingh, Frederik; Buitendag, Albertus A. K.; van der Walt, Jacobus S.

    2013-01-01

    The transfer and teaching of programming and programming related skills has become, increasingly difficult on an undergraduate level over the past years. This is partially due to the number of programming languages available as well as access to readily available source code over the Web. Source code plagiarism is common practice amongst many…

  19. Executive Dysfunction

    PubMed Central

    Rabinovici, Gil D.; Stephens, Melanie L.; Possin, Katherine L.

    2015-01-01

    Purpose of Review: Executive functions represent a constellation of cognitive abilities that drive goal-oriented behavior and are critical to the ability to adapt to an ever-changing world. This article provides a clinically oriented approach to classifying, localizing, diagnosing, and treating disorders of executive function, which are pervasive in clinical practice. Recent Findings: Executive functions can be split into four distinct components: working memory, inhibition, set shifting, and fluency. These components may be differentially affected in individual patients and act together to guide higher-order cognitive constructs such as planning and organization. Specific bedside and neuropsychological tests can be applied to evaluate components of executive function. While dysexecutive syndromes were first described in patients with frontal lesions, intact executive functioning relies on distributed neural networks that include not only the prefrontal cortex, but also the parietal cortex, basal ganglia, thalamus, and cerebellum. Executive dysfunction arises from injury to any of these regions, their white matter connections, or neurotransmitter systems. Dysexecutive symptoms therefore occur in most neurodegenerative diseases and in many other neurologic, psychiatric, and systemic illnesses. Management approaches are patient specific and should focus on treatment of the underlying cause in parallel with maximizing patient function and safety via occupational therapy and rehabilitation. Summary: Executive dysfunction is extremely common in patients with neurologic disorders. Diagnosis and treatment hinge on familiarity with the clinical components and neuroanatomic correlates of these complex, high-order cognitive processes. PMID:26039846

  20. Detection of coding microsatellite frameshift mutations in DNA mismatch repair-deficient mouse intestinal tumors.

    PubMed

    Woerner, Stefan M; Tosti, Elena; Yuan, Yan P; Kloor, Matthias; Bork, Peer; Edelmann, Winfried; Gebert, Johannes

    2015-11-01

    Different DNA mismatch repair (MMR)-deficient mouse strains have been developed as models for the inherited cancer predisposing Lynch syndrome. It is completely unresolved, whether coding mononucleotide repeat (cMNR) gene mutations in these mice can contribute to intestinal tumorigenesis and whether MMR-deficient mice are a suitable molecular model of human microsatellite instability (MSI)-associated intestinal tumorigenesis. A proof-of-principle study was performed to identify mouse cMNR-harboring genes affected by insertion/deletion mutations in MSI murine intestinal tumors. Bioinformatic algorithms were developed to establish a database of mouse cMNR-harboring genes. A panel of five mouse noncoding mononucleotide markers was used for MSI classification of intestinal matched normal/tumor tissues from MMR-deficient (Mlh1(-/-) , Msh2(-/-) , Msh2(LoxP/LoxP) ) mice. cMNR frameshift mutations of candidate genes were determined by DNA fragment analysis. Murine MSI intestinal tumors but not normal tissues from MMR-deficient mice showed cMNR frameshift mutations in six candidate genes (Elavl3, Tmem107, Glis2, Sdccag1, Senp6, Rfc3). cMNRs of mouse Rfc3 and Elavl3 are conserved in type and length in their human orthologs that are known to be mutated in human MSI colorectal, endometrial and gastric cancer. We provide evidence for the utility of a mononucleotide marker panel for detection of MSI in murine tumors, the existence of cMNR instability in MSI murine tumors, the utility of mouse subspecies DNA for identification of polymorphic repeats, and repeat conservation among some orthologous human/mouse genes, two of them showing instability in human and mouse MSI intestinal tumors. MMR-deficient mice hence are a useful molecular model system for analyzing MSI intestinal carcinogenesis.

  1. Virtual multiple errands test (VMET): a virtual reality-based tool to detect early executive functions deficit in Parkinson’s disease

    PubMed Central

    Cipresso, Pietro; Albani, Giovanni; Serino, Silvia; Pedroli, Elisa; Pallavicini, Federica; Mauro, Alessandro; Riva, Giuseppe

    2014-01-01

    Introduction: Several recent studies have pointed out that early impairment of executive functions (EFs) in Parkinson’s Disease (PD) may be a crucial marker to detect patients at risk for developing dementia. The main objective of this study was to compare the performances of PD patients with mild cognitive impairment (PD-MCI) with PD patients with normal cognition (PD-NC) and a control group (CG) using a traditional assessment of EFs and the Virtual Multiple Errands Test (VMET), a virtual reality (VR)-based tool. In order to understand which subcomponents of EFs are early impaired, this experimental study aimed to investigate specifically which instrument best discriminates among these three groups. Materials and methods: The study included three groups of 15 individuals each (for a total of 45 participants): 15 PD-NC; 15 PD-MCI, and 15 cognitively healthy individuals (CG). To assess the global neuropsychological functioning and the EFs, several tests (including the Mini Mental State Examination (MMSE), Clock Drawing Test, and Tower of London test) were administered to the participants. The VMET was used for a more ecologically valid neuropsychological evaluation of EFs. Results: Findings revealed significant differences in the VMET scores between the PD-NC patients vs. the controls. In particular, patients made more errors in the tasks of the VMET, and showed a poorer ability to use effective strategies to complete the tasks. This VMET result seems to be more sensitive in the early detection of executive deficits because these two groups did not differ in the traditional assessment of EFs (neuropsychological battery). Conclusion: This study offers initial evidence that a more ecologically valid evaluation of EFs is more likely to lead to detection of subtle executive deficits. PMID:25538578

  2. Asynchronous detection of optical code division multiple access signals using a bandwidth-efficient and wavelength-aware receiver.

    PubMed

    Fok, Mable P; Deng, Yanhua; Prucnal, Paul R

    2010-04-01

    We experimentally demonstrate what we believe to be a novel detection scheme for interfacing asynchronous optical code division multiple access (CDMA) signals with an electronic clock and data recovery system that operates only at the baseband bandwidth. This allows using a large optical bandwidth expansion factor in which the optical chip rate is much larger than the bandwidth of the optoelectronic receiver. The received optical CDMA signal is launched into a four-wave-mixing-based wavelength-aware all-optical front end that rejects multiaccess interference, followed by an amplitude-noise suppression stage comprised of a semiconductor optical amplifier. The clean signal is then converted into a non-return-to-zero-like signal by a baseband receiver. Using the proposed detection scheme, asynchronous transmission and detection of optical CDMA signals is implemented. With the novel detection scheme, the classic CDMA near-far problem is mitigated, and error-free detection is easily obtained.

  3. Partial correlation properties of pseudonoise /PN/ codes in noncoherent synchronization/detection schemes

    NASA Technical Reports Server (NTRS)

    Cartier, D. E.

    1976-01-01

    This concise paper considers the effect on the autocorrelation function of a pseudonoise (PN) code when the acquisition scheme only integrates coherently over part of the code and then noncoherently combines these results. The peak-to-null ratio of the effective PN autocorrelation function is shown to degrade to the square root of n, where n is the number of PN symbols over which coherent integration takes place.

  4. The impact of mismatch on the performance of coded narrow-band FM with limiter/discriminator detection

    NASA Technical Reports Server (NTRS)

    Simon, M. K.

    1983-01-01

    An examination of the impact of mismatch on the performance of convolutionally encoded/Viterbi decoded narrow-band FM with limiter/discriminator detection is presented. Attention was given to the potential gain available by the combination of this type of system in terms of hard and soft decision decoding. Soft decision decoding was demonstrated to offer only approximately 0.3 dB better performance than hard decision coding. It was also shown, through a technique involving the number of clicks occurring in each detection interval, that both soft and hard decision decoding bit error probability performance could be improved. It is concluded that the mismatch between the coding channel and the decoding metric of the Viterbi algorithm is responsible for reducing the difference between hard and soft decoding metrics.

  5. Long range detection of line-array multi-pulsed coding lidar by combining the Accumulation coherence and Subpixel-energy detection method.

    PubMed

    Su, Jinshan; Wang, Yuanqing; Liang, Dongdong

    2015-06-15

    This paper presents a multi-pulsed line-array push broom lidar, the pixel array scale reaches Geiger mode detectors in time-of-flight (TOF) depth imaging: by using time and space correlation between array elements of array avalanche photo detector (APD), light coding technology and a diode pumped solid-state laser with 10kHz repetition rate and 5µJ per pulses. Two signal enhancement methods, accumulation-coherence and high accuracy energy detection were combined improves the decode effect and realizes further long detection range. Experimental results and theory analysis indicating that the retrieval and denoising results of both simulated and real signals demonstrate that our method is practical and effective; what's more, the increasing scale of array sensor and the code bits can further improve system performance. PMID:26193500

  6. Detection of STRs from body fluid collected on IsoCode paper-based devices.

    PubMed

    Barbaro, A; Cormaci, P; Barbaro, A

    2004-12-01

    Isocode card and IsoCode ID Sample Registration Matrix (Schleicher and Schuell BioScience Inc.) are different paper devices chemically treated that keep sample DNA safe from degradation, allowing for the indefinite storage of DNA at ambient temperatures. In this study, blood was collected on Isocode card while saliva, sperm were collected on IsoCode ID. We also tried to verify the effect of collecting urine on Isocode ID. All samples (belonging to the same male donor) were analyzed after 1 day, 1-5 months since their application on the paper.

  7. Detection of the heat-stable toxin coding gene (ST-gene) in enterotoxigenic Escherichia coli: development of a colour amplified PCR detection system.

    PubMed

    Fanning, S; O'Mullane, J; O'Meara, D; Ward, A; Joyce, C; Delaney, M; Cryan, B

    1995-12-01

    Screening biological samples using the polymerase chain reaction (PCR) has obvious advantages compared with current molecular analytical methods based on gel electrophoresis and/or hybridisation, both of which are expensive and time-consuming, therefore the development of a PCR assay format that is applicable to large sample numbers and that can readily use equipment commonly found in diagnostic laboratories would be advantageous. This report describes the development of a colour amplified PCR detection system which is simple in design and could be universally applied to the detection of any DNA template. As an example, the system has been applied in the detection of the heat-stable toxin coding gene (ST-gene) from enterotoxigenic Escherichia coli (ETEC). The assay is sensitive, detecting 10 fg of a purified DNA template and 270 cfu of an ST-gene-positive ETEC strain. PMID:8555786

  8. Using Code-Recode to Detect Critical Thinking Aspects of Asynchronous Small Group CMC Collaborative Learning

    ERIC Educational Resources Information Center

    Oriogun, Peter K.; Cave, Diana

    2008-01-01

    This article empirically validates an existing content analysis scheme and addresses a main concern of researchers about text-based, online transcripts in the form of code-recoding by mapping our scheme to the practical inquiry, cognitive presence model's five phases directly to realise higher-order thinking or critical thinking aspects for our…

  9. Proteomic Detection of Non-Annotated Protein-Coding Genes in Pseudomonas fluorescens Pf0-1

    SciTech Connect

    Kim, Wook; Silby, Mark W.; Purvine, Samuel O.; Nicoll, Julie S.; Hixson, Kim K.; Monroe, Matthew E.; Nicora, Carrie D.; Lipton, Mary S.; Levy, Stuart B.

    2009-12-24

    Genome sequences are annotated by computational prediction of coding sequences, followed by similarity searches such as BLAST, which provide a layer of (possible) functional information. While the existence of processes such as alternative splicing complicates matters for eukaryote genomes, the view of bacterial genomes as a linear series of closely spaced genes leads to the assumption that computational annotations which predict such arrangements completely describe the coding capacity of bacterial genomes. We undertook a proteomic study to identify proteins expressed by Pseudomonas fluorescens Pf0-1 from genes which were not predicted during the genome annotation. Mapping peptides to the Pf0-1 genome sequence identified sixteen non-annotated protein-coding regions, of which nine were antisense to predicted genes, six were intergenic, and one read in the same direction as an annotated gene but in a different frame. The expression of all but one of the newly discovered genes was verified by RT-PCR. Few clues as to the function of the new genes were gleaned from informatic analyses, but potential orthologues in other Pseudomonas genomes were identified for eight of the new genes. The 16 newly identified genes improve the quality of the Pf0-1 genome annotation, and the detection of antisense protein-coding genes indicates the under-appreciated complexity of bacterial genome organization.

  10. Intensity modulation and direct detection Alamouti polarization-time coding for optical fiber transmission systems with polarization mode dispersion

    NASA Astrophysics Data System (ADS)

    Reza, Ahmed Galib; Rhee, June-Koo Kevin

    2016-07-01

    Alamouti space-time coding is modified in the form of polarization-time coding to combat against polarization mode dispersion (PMD) impairments in exploiting a polarization diversity multiplex (PDM) gain with simple intensity modulation and direct detection (IM/DD) in optical transmission systems. A theoretical model for the proposed IM/DD Alamouti polarization-time coding (APTC-IM/DD) using nonreturn-to-zero on-off keying signal can surprisingly eliminate the requirement of channel estimation for decoding in the low PMD regime, when a two-transmitter and two-receiver channel is adopted. Even in the high PMD regime, the proposed APTC-IM/DD still reveals coding gain demonstrating the robustness of APTC-IM/DD. In addition, this scheme can eliminate the requirements for a polarization state controller, a coherent receiver, and a high-speed analog-to-digital converter at a receiver. Simulation results reveal that the proposed APTC scheme is able to reduce the optical signal-to-noise ratio requirement by ˜3 dB and significantly enhance the PMD tolerance of a PDM-based IM/DD system.

  11. Proteomic Detection of Non-Annotated Protein-Coding Genes in Pseudomonas fluorescens Pf0-1

    PubMed Central

    Kim, Wook; Silby, Mark W.; Purvine, Sam O.; Nicoll, Julie S.; Hixson, Kim K.; Monroe, Matt; Nicora, Carrie D.; Lipton, Mary S.; Levy, Stuart B.

    2009-01-01

    Genome sequences are annotated by computational prediction of coding sequences, followed by similarity searches such as BLAST, which provide a layer of possible functional information. While the existence of processes such as alternative splicing complicates matters for eukaryote genomes, the view of bacterial genomes as a linear series of closely spaced genes leads to the assumption that computational annotations that predict such arrangements completely describe the coding capacity of bacterial genomes. We undertook a proteomic study to identify proteins expressed by Pseudomonas fluorescens Pf0-1 from genes that were not predicted during the genome annotation. Mapping peptides to the Pf0-1 genome sequence identified sixteen non-annotated protein-coding regions, of which nine were antisense to predicted genes, six were intergenic, and one read in the same direction as an annotated gene but in a different frame. The expression of all but one of the newly discovered genes was verified by RT-PCR. Few clues as to the function of the new genes were gleaned from informatic analyses, but potential orthologs in other Pseudomonas genomes were identified for eight of the new genes. The 16 newly identified genes improve the quality of the Pf0-1 genome annotation, and the detection of antisense protein-coding genes indicates the under-appreciated complexity of bacterial genome organization. PMID:20041161

  12. Proteomic detection of non-annotated protein-coding genes in Pseudomonas fluorescens Pf0-1.

    PubMed

    Kim, Wook; Silby, Mark W; Purvine, Sam O; Nicoll, Julie S; Hixson, Kim K; Monroe, Matt; Nicora, Carrie D; Lipton, Mary S; Levy, Stuart B

    2009-12-24

    Genome sequences are annotated by computational prediction of coding sequences, followed by similarity searches such as BLAST, which provide a layer of possible functional information. While the existence of processes such as alternative splicing complicates matters for eukaryote genomes, the view of bacterial genomes as a linear series of closely spaced genes leads to the assumption that computational annotations that predict such arrangements completely describe the coding capacity of bacterial genomes. We undertook a proteomic study to identify proteins expressed by Pseudomonas fluorescens Pf0-1 from genes that were not predicted during the genome annotation. Mapping peptides to the Pf0-1 genome sequence identified sixteen non-annotated protein-coding regions, of which nine were antisense to predicted genes, six were intergenic, and one read in the same direction as an annotated gene but in a different frame. The expression of all but one of the newly discovered genes was verified by RT-PCR. Few clues as to the function of the new genes were gleaned from informatic analyses, but potential orthologs in other Pseudomonas genomes were identified for eight of the new genes. The 16 newly identified genes improve the quality of the Pf0-1 genome annotation, and the detection of antisense protein-coding genes indicates the under-appreciated complexity of bacterial genome organization.

  13. Color bar coding the BRCA1 gene on combed DNA: a useful strategy for detecting large gene rearrangements.

    PubMed

    Gad, S; Aurias, A; Puget, N; Mairal, A; Schurra, C; Montagna, M; Pages, S; Caux, V; Mazoyer, S; Bensimon, A; Stoppa-Lyonnet, D

    2001-05-01

    Genetic linkage data have shown that alterations of the BRCA1 gene are responsible for the majority of hereditary breast and ovarian cancers. BRCA1 germline mutations, however, are found less frequently than expected. Mutation detection strategies, which are generally based on the polymerase chain reaction, therefore focus on point and small gene alterations. These approaches do not allow for the detection of large gene rearrangements, which also can be involved in BRCA1 alterations. Indeed, a few of them, spread over the entire BRCA1 gene, have been detected recently by Southern blotting or transcript analysis. We have developed an alternative strategy allowing a panoramic view of the BRCA1 gene, based on dynamic molecular combing and the design of a full four-color bar code of the BRCA1 region. The strategy was tested with the study of four large BRCA1 rearrangements previously reported. In addition, when screening a series of 10 breast and ovarian cancer families negatively tested for point mutation in BRCA1/2, we found an unreported 17-kb BRCA1 duplication encompassing exons 3 to 8. The detection of rearrangements as small as 2 to 6 kb with respect to the normal size of the studied fragment is achieved when the BRCA1 region is divided into 10 fragments. In addition, as the BRCA1 bar code is a morphologic approach, the direct observation of complex and likely underreported rearrangements, such as inversions and insertions, becomes possible. PMID:11284038

  14. Pathway detection from protein interaction networks and gene expression data using color-coding methods and A∗ search algorithms.

    PubMed

    Yeh, Cheng-Yu; Yeh, Hsiang-Yuan; Arias, Carlos Roberto; Soo, Von-Wun

    2012-01-01

    With the large availability of protein interaction networks and microarray data supported, to identify the linear paths that have biological significance in search of a potential pathway is a challenge issue. We proposed a color-coding method based on the characteristics of biological network topology and applied heuristic search to speed up color-coding method. In the experiments, we tested our methods by applying to two datasets: yeast and human prostate cancer networks and gene expression data set. The comparisons of our method with other existing methods on known yeast MAPK pathways in terms of precision and recall show that we can find maximum number of the proteins and perform comparably well. On the other hand, our method is more efficient than previous ones and detects the paths of length 10 within 40 seconds using CPU Intel 1.73 GHz and 1 GB main memory running under windows operating system. PMID:22577352

  15. Detection of reduced interhemispheric cortical communication during task execution in multiple sclerosis patients using functional near-infrared spectroscopy

    NASA Astrophysics Data System (ADS)

    Jimenez, Jon J.; Yang, Runze; Nathoo, Nabeela; Varshney, Vishal P.; Golestani, Ali-Mohammad; Goodyear, Bradley G.; Metz, Luanne M.; Dunn, Jeff F.

    2014-07-01

    Multiple sclerosis (MS) impairs brain activity through demyelination and loss of axons. Increased brain activity is accompanied by increases in microvascular hemoglobin oxygen saturation (oxygenation) and total hemoglobin, which can be measured using functional near-infrared spectroscopy (fNIRS). Due to the potentially reduced size and integrity of the white matter tracts within the corpus callosum, it may be expected that MS patients have reduced functional communication between the left and right sides of the brain; this could potentially be an indicator of disease progression. To assess interhemispheric communication in MS, we used fNIRS during a unilateral motor task and the resting state. The magnitude of the change in hemoglobin parameters in the motor cortex was significantly reduced in MS patients during the motor task relative to healthy control subjects. There was also a significant decrease in interhemispheric communication between the motor cortices (expressed as coherence) in MS patients compared to controls during the motor task, but not during the resting state. fNIRS assessment of interhemispheric coherence during task execution may be a useful marker in disorders with white matter damage or axonal loss, including MS.

  16. Blind and semi-blind ML detection for space-time block-coded OFDM wireless systems

    NASA Astrophysics Data System (ADS)

    Zaib, Alam; Al-Naffouri, Tareq Y.

    2014-12-01

    This paper investigates the joint maximum likelihood (ML) data detection and channel estimation problem for Alamouti space-time block-coded (STBC) orthogonal frequency-division multiplexing (OFDM) wireless systems. The joint ML estimation and data detection is generally considered a hard combinatorial optimization problem. We propose an efficient low-complexity algorithm based on branch-estimate-bound strategy that renders exact joint ML solution. However, the computational complexity of blind algorithm becomes critical at low signal-to-noise ratio (SNR) as the number of OFDM carriers and constellation size are increased especially in multiple-antenna systems. To overcome this problem, a semi-blind algorithm based on a new framework for reducing the complexity is proposed by relying on subcarrier reordering and decoding the carriers with different levels of confidence using a suitable reliability criterion. In addition, it is shown that by utilizing the inherent structure of Alamouti coding, the estimation performance improvement or the complexity reduction can be achieved. The proposed algorithms can reliably track the wireless Rayleigh fading channel without requiring any channel statistics. Simulation results presented against the perfect coherent detection demonstrate the effectiveness of blind and semi-blind algorithms over frequency-selective channels with different fading characteristics.

  17. Non-protein coding RNA-based genosensor with quantum dots as electrochemical labels for attomolar detection of multiple pathogens.

    PubMed

    Vijian, Dinesh; Chinni, Suresh V; Yin, Lee Su; Lertanantawong, Benchaporn; Surareungchai, Werasak

    2016-03-15

    The ability of a diagnostic test to detect multiple pathogens simultaneously is useful to obtain meaningful information for clinical treatment and preventive measures. We report a highly sensitive and specific electrochemical biosensor assay for simultaneous detection of three gene targets using quantum dots (QDs). The targets are novel non-protein coding RNA (npcRNA) sequences of Vibrio cholerae, Salmonella sp. and Shigella sp., which cause diarrheal diseases. QDs (PbS, CdS, ZnS) were synthesized and functionalized with DNA probes that were specific to each pathogen. Electrochemical detection of QDs was performed using square wave anodic stripping voltammetry (SWASV). The QDs gave distinct peaks at 0.5 V (PbS), 0.75 V (CdS) and 1.1 V (ZnS). There was no interference in signal response when all three QDs were mixed and detected simultaneously. The detection limits of single and multiplex assays with linear targets and PCR products were in the attomolar ranges. The high assay sensitivity, in combination with specific npcRNA sequences as novel diagnostic targets, makes it a viable tool for detecting pathogens from food, environment and clinical samples. PMID:26513287

  18. Molecular Detection of Methicillin-Resistant Staphylococcus aureus by Non-Protein Coding RNA-Mediated Monoplex Polymerase Chain Reaction

    PubMed Central

    Soo Yean, Cheryl Yeap; Selva Raju, Kishanraj; Xavier, Rathinam; Subramaniam, Sreeramanan; Gopinath, Subash C. B.; Chinni, Suresh V.

    2016-01-01

    Non-protein coding RNA (npcRNA) is a functional RNA molecule that is not translated into a protein. Bacterial npcRNAs are structurally diversified molecules, typically 50–200 nucleotides in length. They play a crucial physiological role in cellular networking, including stress responses, replication and bacterial virulence. In this study, by using an identified npcRNA gene (Sau-02) in Methicillin-resistant Staphylococcus aureus (MRSA), we identified the Gram-positive bacteria S. aureus. A Sau-02-mediated monoplex Polymerase Chain Reaction (PCR) assay was designed that displayed high sensitivity and specificity. Fourteen different bacteria and 18 S. aureus strains were tested, and the results showed that the Sau-02 gene is specific to S. aureus. The detection limit was tested against genomic DNA from MRSA and was found to be ~10 genome copies. Further, the detection was extended to whole-cell MRSA detection, and we reached the detection limit with two bacteria. The monoplex PCR assay demonstrated in this study is a novel detection method that can replicate other npcRNA-mediated detection assays. PMID:27367909

  19. Executive Functions

    PubMed Central

    Diamond, Adele

    2014-01-01

    Executive functions (EFs) make possible mentally playing with ideas; taking the time to think before acting; meeting novel, unanticipated challenges; resisting temptations; and staying focused. Core EFs are inhibition [response inhibition (self-control—resisting temptations and resisting acting impulsively) and interference control (selective attention and cognitive inhibition)], working memory, and cognitive flexibility (including creatively thinking “outside the box,” seeing anything from different perspectives, and quickly and flexibly adapting to changed circumstances). The developmental progression and representative measures of each are discussed. Controversies are addressed (e.g., the relation between EFs and fluid intelligence, self-regulation, executive attention, and effortful control, and the relation between working memory and inhibition and attention). The importance of social, emotional, and physical health for cognitive health is discussed because stress, lack of sleep, loneliness, or lack of exercise each impair EFs. That EFs are trainable and can be improved with practice is addressed, including diverse methods tried thus far. PMID:23020641

  20. Heterodyne detection using spectral line pairing for spectral phase encoding optical code division multiple access and dynamic dispersion compensation.

    PubMed

    Yang, Yi; Foster, Mark; Khurgin, Jacob B; Cooper, A Brinton

    2012-07-30

    A novel coherent optical code-division multiple access (OCDMA) scheme is proposed that uses spectral line pairing to generate signals suitable for heterodyne decoding. Both signal and local reference are transmitted via a single optical fiber and a simple balanced receiver performs sourceless heterodyne detection, canceling speckle noise and multiple-access interference (MAI). To validate the idea, a 16 user fully loaded phase encoded system is simulated. Effects of fiber dispersion on system performance are studied as well. Both second and third order dispersion management is achieved by using a spectral phase encoder to adjust phase shifts of spectral components at the optical network unit (ONU).

  1. Short non-coding RNAs as bacteria species identifiers detected by surface plasmon resonance enhanced common path interferometry

    NASA Astrophysics Data System (ADS)

    Greef, Charles; Petropavlovskikh, Viatcheslav; Nilsen, Oyvind; Khattatov, Boris; Plam, Mikhail; Gardner, Patrick; Hall, John

    2008-04-01

    Small non-coding RNA sequences have recently been discovered as unique identifiers of certain bacterial species, raising the possibility that they can be used as highly specific Biowarfare Agent detection markers in automated field deployable integrated detection systems. Because they are present in high abundance they could allow genomic based bacterial species identification without the need for pre-assay amplification. Further, a direct detection method would obviate the need for chemical labeling, enabling a rapid, efficient, high sensitivity mechanism for bacterial detection. Surface Plasmon Resonance enhanced Common Path Interferometry (SPR-CPI) is a potentially market disruptive, high sensitivity dual technology that allows real-time direct multiplex measurement of biomolecule interactions, including small molecules, nucleic acids, proteins, and microbes. SPR-CPI measures differences in phase shift of reflected S and P polarized light under Total Internal Reflection (TIR) conditions at a surface, caused by changes in refractive index induced by biomolecular interactions within the evanescent field at the TIR interface. The measurement is performed on a microarray of discrete 2-dimensional areas functionalized with biomolecule capture reagents, allowing simultaneous measurement of up to 100 separate analytes. The optical beam encompasses the entire microarray, allowing a solid state detector system with no scanning requirement. Output consists of simultaneous voltage measurements proportional to the phase differences resulting from the refractive index changes from each microarray feature, and is automatically processed and displayed graphically or delivered to a decision making algorithm, enabling a fully automatic detection system capable of rapid detection and quantification of small nucleic acids at extremely sensitive levels. Proof-of-concept experiments on model systems and cell culture samples have demonstrated utility of the system, and efforts are in

  2. Generic detection of poleroviruses using an RT-PCR assay targeting the RdRp coding sequence.

    PubMed

    Lotos, Leonidas; Efthimiou, Konstantinos; Maliogka, Varvara I; Katis, Nikolaos I

    2014-03-01

    In this study a two-step RT-PCR assay was developed for the generic detection of poleroviruses. The RdRp coding region was selected as the primers' target, since it differs significantly from that of other members in the family Luteoviridae and its sequence can be more informative than other regions in the viral genome. Species specific RT-PCR assays targeting the same region were also developed for the detection of the six most widespread poleroviral species (Beet mild yellowing virus, Beet western yellows virus, Cucurbit aphid-borne virus, Carrot red leaf virus, Potato leafroll virus and Turnip yellows virus) in Greece and the collection of isolates. These isolates along with other characterized ones were used for the evaluation of the generic PCR's detection range. The developed assay efficiently amplified a 593bp RdRp fragment from 46 isolates of 10 different Polerovirus species. Phylogenetic analysis using the generic PCR's amplicon sequence showed that although it cannot accurately infer evolutionary relationships within the genus it can differentiate poleroviruses at the species level. Overall, the described generic assay could be applied for the reliable detection of Polerovirus infections and, in combination with the specific PCRs, for the identification of new and uncharacterized species in the genus. PMID:24374125

  3. Executive summary

    NASA Astrophysics Data System (ADS)

    Ayon, Juan A.

    1992-08-01

    The Astrotech 21 Optical Systems Technology Workshop was held in Pasadena, California on March 6-8, 1991. The purpose of the workshop was to examine the state of Optical Systems Technology at the National Aeronautics Space Administration (NASA), and in industry and academia, in view of the potential Astrophysics mission set currently being considered for the late 1990's through the first quarter of the 21st century. The principal result of the workshop is this publication, which contains an assessment of the current state of the technology, and specific technology advances in six critical areas of optics, all necessary for the mission set. The workshop was divided into six panels, each of about a dozen experts in specific fields, representing NASA, industry, and academia. In addition, each panel contained expertise that spanned the spectrum from x-ray to submillimeter wavelengths. This executive summary contains the principal recommendations of each panel. The six technology panels and their chairs were: (1) Wavefront Sensing, Control, and Pointing, Thomas Pitts, Itek Optical Systems, A Division of Litton; (2) Fabrication, Roger Angel, Steward Observatory, University of Arizona; (3) Materials and Structures, Theodore Saito, Lawrence Livermore National Laboratory; (4) Optical Testing, James Wyant, WYKO Corporation; (5) Optical Systems Integrated Modeling, Robert R. Shannon, Optical Sciences Center, University of Arizona; and (6) Advanced Optical Instruments Technology, Michael Shao, Jet Propulsion Laboratory, California Institute of Technology. This Executive Summary contains the principal recommendations of each panel.

  4. Selective error detection for error-resilient wavelet-based image coding.

    PubMed

    Karam, Lina J; Lam, Tuyet-Trang

    2007-12-01

    This paper introduces the concept of a similarity check function for error-resilient multimedia data transmission. The proposed similarity check function provides information about the effects of corrupted data on the quality of the reconstructed image. The degree of data corruption is measured by the similarity check function at the receiver, without explicit knowledge of the original source data. The design of a perceptual similarity check function is presented for wavelet-based coders such as the JPEG2000 standard, and used with a proposed "progressive similarity-based ARQ" (ProS-ARQ) scheme to significantly decrease the retransmission rate of corrupted data while maintaining very good visual quality of images transmitted over noisy channels. Simulation results with JPEG2000-coded images transmitted over the Binary Symmetric Channel, show that the proposed ProS-ARQ scheme significantly reduces the number of retransmissions as compared to conventional ARQ-based schemes. The presented results also show that, for the same number of retransmitted data packets, the proposed ProS-ARQ scheme can achieve significantly higher PSNR and better visual quality as compared to the selective-repeat ARQ scheme.

  5. A study of redundancy management strategy for tetrad strap-down inertial systems. [error detection codes

    NASA Technical Reports Server (NTRS)

    Hruby, R. J.; Bjorkman, W. S.; Schmidt, S. F.; Carestia, R. A.

    1979-01-01

    Algorithms were developed that attempt to identify which sensor in a tetrad configuration has experienced a step failure. An algorithm is also described that provides a measure of the confidence with which the correct identification was made. Experimental results are presented from real-time tests conducted on a three-axis motion facility utilizing an ortho-skew tetrad strapdown inertial sensor package. The effects of prediction errors and of quantization on correct failure identification are discussed as well as an algorithm for detecting second failures through prediction.

  6. Non-coding RNAs in hepatitis C-induced hepatocellular carcinoma: dysregulation and implications for early detection, diagnosis and therapy.

    PubMed

    Hou, Weihong; Bonkovsky, Herbert L

    2013-11-28

    Hepatitis C virus (HCV) infection is one of main causes of hepatocellular carcinoma (HCC) and the prevalence of HCV-associated HCC is on the rise worldwide. It is particularly important and helpful to identify potential markers for screening and early diagnosis of HCC among high-risk individuals with chronic hepatitis C, and to identify target molecules for the prevention and treatment of HCV-associated-HCC. Small non-coding RNAs, mainly microRNAs (miRNAs), and long non-coding RNAs (lncRNAs) with size greater than 200 nucleotides, are likely to play important roles in a variety of biological processes, including development and progression of HCC. For the most part their underlying mechanisms of action remain largely unknown. In recent years, with the advance of high-resolution of microarray and application of next generation sequencing techniques, a significant number of non-coding RNAs (ncRNAs) associated with HCC, particularly caused by HCV infection, have been found to be differentially expressed and to be involved in pathogenesis of HCV-associated HCC. In this review, we focus on recent studies of ncRNAs, especially miRNAs and lncRNAs related to HCV-induced HCC. We summarize those ncRNAs aberrantly expressed in HCV-associated HCC and highlight the potential uses of ncRNAs in early detection, diagnosis and therapy of HCV-associated HCC. We also discuss the limitations of recent studies, and suggest future directions for research in the field. miRNAs, lncRNAs and their target genes may represent new candidate molecules for the prevention, diagnosis and treatment of HCC in patients with HCV infection. Studies of the potential uses of miRNAs and lncRNAs as diagnostic tools or therapies are still in their infancy.

  7. Replica Analysis of Multiuser Detection for Code Division Multiple Access with M-Ary Phase-Shift Keying

    NASA Astrophysics Data System (ADS)

    Kato, Hiroyuki; Okada, Masato; Miyoshi, Seiji

    2013-07-01

    We analyze the performance of the maximizer of the posterior marginals (MPM) detector for code division multiple access (CDMA) multiuser detection with M-ary phase shift keying (M-ary PSK) in the large system limit by the replica method. The obtained theory agrees with computer simulation reasonably well. We also derive the theory in the case of the large M limit and discuss the dependence of the properties of M-ary PSK CDMA communication on M. We show that the waterfall phenomenon occurs for both the finite and infinite values of M. We also show that a value of M for which the decoded phase information on the original user symbol becomes minimum exists. Furthermore, we discuss the relationship between the theory based on the replica method and that based on self-consistent signal-to-noise analysis (SCSNA).

  8. Trace level detection of compounds related to the chemical weapons convention by 1H-detected 13C NMR spectroscopy executed with a sensitivity-enhanced, cryogenic probehead.

    PubMed

    Cullinan, David B; Hondrogiannis, George; Henderson, Terry J

    2008-04-15

    Two-dimensional 1H-13C HSQC (heteronuclear single quantum correlation) and fast-HMQC (heteronuclear multiple quantum correlation) pulse sequences were implemented using a sensitivity-enhanced, cryogenic probehead for detecting compounds relevant to the Chemical Weapons Convention present in complex mixtures. The resulting methods demonstrated exceptional sensitivity for detecting the analytes at trace level concentrations. 1H-13C correlations of target analytes at < or = 25 microg/mL were easily detected in a sample where the 1H solvent signal was approximately 58,000-fold more intense than the analyte 1H signals. The problem of overlapping signals typically observed in conventional 1H spectroscopy was essentially eliminated, while 1H and 13C chemical shift information could be derived quickly and simultaneously from the resulting spectra. The fast-HMQC pulse sequences generated magnitude mode spectra suitable for detailed analysis in approximately 4.5 h and can be used in experiments to efficiently screen a large number of samples. The HSQC pulse sequences, on the other hand, required roughly twice the data acquisition time to produce suitable spectra. These spectra, however, were phase-sensitive, contained considerably more resolution in both dimensions, and proved to be superior for detecting analyte 1H-13C correlations. Furthermore, a HSQC spectrum collected with a multiplicity-edited pulse sequence provided additional structural information valuable for identifying target analytes. The HSQC pulse sequences are ideal for collecting high-quality data sets with overnight acquisitions and logically follow the use of fast-HMQC pulse sequences to rapidly screen samples for potential target analytes. Use of the pulse sequences considerably improves the performance of NMR spectroscopy as a complimentary technique for the screening, identification, and validation of chemical warfare agents and other small-molecule analytes present in complex mixtures and environmental

  9. 78 FR 17587 - Amendments to Executive Order 12777

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-21

    ..., 2013. [FR Doc. 2013-06712 Filed 3-20-13; 11:15 am] Billing code 3295-F3 ... March 21, 2013 Part III The President Executive Order 13638--Admendments to Executive Order 12777 #0; #0... 15, 2013 Amendments to Executive Order 12777 By the authority vested in me as President by...

  10. 3 CFR 13490 - Executive Order 13490 of January 21, 2009. Ethics Commitments by Executive Branch Personnel

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false Executive Order 13490 of January 21, 2009. Ethics... Order 13490 of January 21, 2009 EO 13490 Ethics Commitments by Executive Branch Personnel By the... Code, it is hereby ordered as follows: Section 1. Ethics Pledge. Every appointee in every...

  11. Task-Specific Codes for Face Recognition: How they Shape the Neural Representation of Features for Detection and Individuation

    PubMed Central

    2008-01-01

    Background The variety of ways in which faces are categorized makes face recognition challenging for both synthetic and biological vision systems. Here we focus on two face processing tasks, detection and individuation, and explore whether differences in task demands lead to differences both in the features most effective for automatic recognition and in the featural codes recruited by neural processing. Methodology/Principal Findings Our study appeals to a computational framework characterizing the features representing object categories as sets of overlapping image fragments. Within this framework, we assess the extent to which task-relevant information differs across image fragments. Based on objective differences we find among task-specific representations, we test the sensitivity of the human visual system to these different face descriptions independently of one another. Both behavior and functional magnetic resonance imaging reveal effects elicited by objective task-specific levels of information. Behaviorally, recognition performance with image fragments improves with increasing task-specific information carried by different face fragments. Neurally, this sensitivity to the two tasks manifests as differential localization of neural responses across the ventral visual pathway. Fragments diagnostic for detection evoke larger neural responses than non-diagnostic ones in the right posterior fusiform gyrus and bilaterally in the inferior occipital gyrus. In contrast, fragments diagnostic for individuation evoke larger responses than non-diagnostic ones in the anterior inferior temporal gyrus. Finally, for individuation only, pattern analysis reveals sensitivity to task-specific information within the right “fusiform face area”. Conclusions/Significance Our results demonstrate: 1) information diagnostic for face detection and individuation is roughly separable; 2) the human visual system is independently sensitive to both types of information; 3) neural

  12. Symbolic Execution Enhanced System Testing

    NASA Technical Reports Server (NTRS)

    Davies, Misty D.; Pasareanu, Corina S.; Raman, Vishwanath

    2012-01-01

    We describe a testing technique that uses information computed by symbolic execution of a program unit to guide the generation of inputs to the system containing the unit, in such a way that the unit's, and hence the system's, coverage is increased. The symbolic execution computes unit constraints at run-time, along program paths obtained by system simulations. We use machine learning techniques treatment learning and function fitting to approximate the system input constraints that will lead to the satisfaction of the unit constraints. Execution of system input predictions either uncovers new code regions in the unit under analysis or provides information that can be used to improve the approximation. We have implemented the technique and we have demonstrated its effectiveness on several examples, including one from the aerospace domain.

  13. Executive Values, Executive Functions, and the Humanities.

    ERIC Educational Resources Information Center

    Pichler, Joseph A.

    The benefits of studying the humanities to the business executive are considered. The humanities can help develop both the values and functional skills that are necessary for executive success. Competence in value analysis helps future executives to understand the full implications of the economic system, especially when it is followed by the…

  14. Coding Gene Single Nucleotide Polymorphism Mapping and Quantitative Trait Loci Detection for Physiological Reproductive Traits in Brook Charr, Salvelinus fontinalis

    PubMed Central

    Sauvage, Christopher; Vagner, Marie; Derôme, Nicolas; Audet, Céline; Bernatchez, Louis

    2012-01-01

    A linkage map of 40 linkage groups (LGs) was developed for brook charr, Salvelinus fontinalis, using an F2 interstrain hybrid progeny (n = 171) and 256 coding gene SNP developed specifically for brook charr and validated from a large (>1000) subset of putative SNP, as well as 81 microsatellite markers. To identify quantitative trait loci (QTL) related to reproduction functions, these fish were also phenotyped at six physiological traits, including spermatozoid head diameter, sperm concentration, plasma testosterone, plasma 11-keto-testosterone, egg diameter, and plasma 17β-estradiol. Five significant QTL were detected over four LGs for egg diameter and plasma 17β-estradiol concentration in females, and sperm concentration as well as spermatozoid head diameter in males. In females, two different QTLs located on LG 11 and LG 34 were associated with the egg number, whereas one QTL was associated with plasma 17β-estradiol concentration (LG 8). Their total percent variance explained (PVE) was 26.7% and 27.6%, respectively. In males, two QTL were also detected for the sperm concentration, and their PVE were estimated at 18.58% and 14.95%, respectively. The low QTL number, associated with the high PVE, suggests that the variance in these reproductive physiological traits was either under the control of one major gene or a small number of genes. The QTL associated with sperm concentration, plasma 17β-estradiol, and egg diameter appeared to be under a dominance effect, whereas the two others were under a negative additive effect. These results show that genes underlying the phenotypic variance of these traits are under different modes of action (additive vs. dominance) and may be used to predict an increase or a decrease in their phenotypic values in subsequent generations of selective breeding. Moreover, this newly developed panel of mapped SNP located in coding gene regions will be useful for screening wild populations, especially in the context of investigating the

  15. The Conservation and Application of Three Hypothetical Protein Coding Gene for Direct Detection of Mycobacterium tuberculosis in Sputum Specimens

    PubMed Central

    Qin, Lianhua; Gao, Shihui; Wang, Jie; Zheng, Ruijuan; Lu, Junmei; Hu, Zhongyi

    2013-01-01

    Background Accurate and early diagnosis of tuberculosis (TB) is of major importance in the control of TB. One of the most important technical advances in diagnosis of tuberculosis is the development of nucleic acid amplification (NAA) tests. However, the choice of the target sequence remains controversial in NAA tests. Recently, interesting alternatives have been found in hypothetical protein coding sequences from mycobacterial genome. Methodology/Principal Findings To obtain rational biomarker for TB diagnosis, the conservation of three hypothetical genes was firstly evaluated in 714 mycobacterial strains. The results showed that SCAR1 (Sequenced Characterized Amplified Region) based on Rv0264c coding gene showed the highest conservation (99.8%) and SCAR2 based on Rv1508c gene showed the secondary high conservation (99.7%) in M. tuberculosis (MTB) strains. SCAR3 based on Rv2135c gene (3.2%) and IS6110 (8%) showed relatively high deletion rate in MTB strains. Secondly, three SCAR markers were evaluated in 307 clinical sputum from patients in whom TB was suspected or patients with diseases other than TB. The amplification of IS6110 and 16SrRNA sequences together with both clinical and bacteriological identification was as a protocol to evaluate the efficacy of SCAR markers. The sensitivities and specificities, positive predictive value (PPV) and negative predictive value (NPV) of all NAA tests were higher than those of bacteriological detection. In four NAA tests, IS6110 and SCAR3 showed the highest PPV (100%) and low NPV (70% and 68.8%, respectively), and SCAR1 and SCAR2 showed the relatively high PPV and NPV (97% and 82.6%, 95.6% and 88.8%, respectively). Conclusions/Significance Our result indicated that SCAR1 and SCAR2 with a high degree of sequence conservation represent efficient and promising alternatives as NAA test targets in identification of MTB. Moreover, the targets developed from this study may provide more alternative targets for the development of a

  16. An Execution Service for Grid Computing

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Hu, Chaumin

    2004-01-01

    This paper describes the design and implementation of the IPG Execution Service that reliably executes complex jobs on a computational grid. Our Execution Service is part of the IPG service architecture whose goal is to support location-independent computing. In such an environment, once n user ports an npplicntion to one or more hardware/software platfrms, the user can describe this environment to the grid the grid can locate instances of this platfrm, configure the platfrm as required for the application, and then execute the application. Our Execution Service runs jobs that set up such environments for applications and executes them. These jobs consist of a set of tasks for executing applications and managing data. The tasks have user-defined starting conditions that allow users to specih complex dependencies including task to execute when tasks fail, afiequent occurrence in a large distributed system, or are cancelled. The execution task provided by our service also configures the application environment exactly as specified by the user and captures the exit code of the application, features that many grid execution services do not support due to dflculties interfacing to local scheduling systems.

  17. Executive Functioning in Schizophrenia

    PubMed Central

    Orellana, Gricel; Slachevsky, Andrea

    2013-01-01

    The executive function (EF) is a set of abilities, which allows us to invoke voluntary control of our behavioral responses. These functions enable human beings to develop and carry out plans, make up analogies, obey social rules, solve problems, adapt to unexpected circumstances, do many tasks simultaneously, and locate episodes in time and place. EF includes divided attention and sustained attention, working memory (WM), set-shifting, flexibility, planning, and the regulation of goal directed behavior and can be defined as a brain function underlying the human faculty to act or think not only in reaction to external events but also in relation with internal goals and states. EF is mostly associated with dorsolateral prefrontal cortex (PFC). Besides EF, PFC is involved in self-regulation of behavior, i.e., the ability to regulate behavior according to internal goals and constraints, particularly in less structured situations. Self-regulation of behavior is subtended by ventral medial/orbital PFC. Impairment of EF is one of the most commonly observed deficits in schizophrenia through the various disease stages. Impairment in tasks measuring conceptualization, planning, cognitive flexibility, verbal fluency, ability to solve complex problems, and WM occur in schizophrenia. Disorders detected by executive tests are consistent with evidence from functional neuroimaging, which have shown PFC dysfunction in patients while performing these kinds of tasks. Schizophrenics also exhibit deficit in odor identifying, decision-making, and self-regulation of behavior suggesting dysfunction of the orbital PFC. However, impairment in executive tests is explained by dysfunction of prefronto-striato-thalamic, prefronto-parietal, and prefronto-temporal neural networks mainly. Disorders in EFs may be considered central facts with respect to schizophrenia and it has been suggested that negative symptoms may be explained by that executive dysfunction. PMID:23805107

  18. Detecting pop-out targets in contexts of varying homogeneity: investigating homogeneity coding with event-related brain potentials (ERPs).

    PubMed

    Schubö, Anna; Wykowska, Agnieszka; Müller, Hermann J

    2007-03-23

    Searching for a target among many distracting context elements might be an easy or a demanding task. Duncan and Humphreys (Duncan, J., Humphreys, G.W., 1989. Visual search and stimulus similarity. Psychol. Rev. 96, 433-458) showed that not only the target itself plays a role in the difficulty of target detection. Similarity among context elements and dissimilarity of target and context are two main factors also affecting search efficiency. Moreover, many studies have shown that search becomes particularly efficient with large set sizes and perfectly homogeneous context elements, presumably due to grouping processes involved in target-context segmentation. Especially N2p amplitude has been found to be modulated by the number of context elements and their homogeneity. The aim of the present study was to investigate the influence of context elements of different heterogeneities on search performance using event-related brain potentials (ERPs). Results showed that contexts with perfectly homogeneous elements were indeed special: they were most efficient in visual search and elicited a large N2p differential amplitude effect. Increasing context heterogeneity led to a decrease in search performance and a reduction in N2p differential amplitude. Reducing the number of context elements led to a marked performance decrease for random heterogeneous contexts but not for grouped heterogeneous contexts. Behavioral and N2p results delivered evidence (a) in favor of specific processing modes operating on different spatial scales (b) for the existence of homogeneity coding postulated by Duncan and Humphreys.

  19. Detecting selection in the blue crab, Callinectes sapidus, using DNA sequence data from multiple nuclear protein-coding genes.

    PubMed

    Yednock, Bree K; Neigel, Joseph E

    2014-01-01

    The identification of genes involved in the adaptive evolution of non-model organisms with uncharacterized genomes constitutes a major challenge. This study employed a rigorous and targeted candidate gene approach to test for positive selection on protein-coding genes of the blue crab, Callinectes sapidus. Four genes with putative roles in physiological adaptation to environmental stress were chosen as candidates. A fifth gene not expected to play a role in environmental adaptation was used as a control. Large samples (n>800) of DNA sequences from C. sapidus were used in tests of selective neutrality based on sequence polymorphisms. In combination with these, sequences from the congener C. similis were used in neutrality tests based on interspecific divergence. In multiple tests, significant departures from neutral expectations and indicative of positive selection were found for the candidate gene trehalose 6-phosphate synthase (tps). These departures could not be explained by any of the historical population expansion or bottleneck scenarios that were evaluated in coalescent simulations. Evidence was also found for balancing selection at ATP-synthase subunit 9 (atps) using a maximum likelihood version of the Hudson, Kreitmen, and Aguadé test, and positive selection favoring amino acid replacements within ATP/ADP translocase (ant) was detected using the McDonald-Kreitman test. In contrast, test statistics for the control gene, ribosomal protein L12 (rpl), which presumably has experienced the same demographic effects as the candidate loci, were not significantly different from neutral expectations and could readily be explained by demographic effects. Together, these findings demonstrate the utility of the candidate gene approach for investigating adaptation at the molecular level in a marine invertebrate for which extensive genomic resources are not available.

  20. SMARTS: Exploiting Temporal Locality and Parallelism through Vertical Execution

    SciTech Connect

    Beckman, P.; Crotinger, J.; Karmesin, S.; Malony, A.; Oldehoeft, R.; Shende, S.; Smith, S.; Vajracharya, S.

    1999-01-04

    In the solution of large-scale numerical prob- lems, parallel computing is becoming simultaneously more important and more difficult. The complex organization of today's multiprocessors with several memory hierarchies has forced the scientific programmer to make a choice between simple but unscalable code and scalable but extremely com- plex code that does not port to other architectures. This paper describes how the SMARTS runtime system and the POOMA C++ class library for high-performance scientific computing work together to exploit data parallelism in scientific applications while hiding the details of manag- ing parallelism and data locality from the user. We present innovative algorithms, based on the macro -dataflow model, for detecting data parallelism and efficiently executing data- parallel statements on shared-memory multiprocessors. We also desclibe how these algorithms can be implemented on clusters of SMPS.

  1. 76 FR 58559 - Notice of Senior Executive Service Performance Review Board Membership

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-21

    ... Performance Review Board which oversees the evaluation of performance appraisals of Senior Executive Service.... Wells, Deputy Commissioner for Human Resources. BILLING CODE 4191-02-P ... ADMINISTRATION Notice of Senior Executive Service Performance Review Board Membership AGENCY: Social...

  2. A novel error detection due to joint CRC aided denoise-and-forward network coding for two-way relay channels.

    PubMed

    Cheng, Yulun; Yang, Longxiang

    2014-01-01

    In wireless two-way (TW) relay channels, denoise-and-forward (DNF) network coding (NC) is a promising technique to achieve spectral efficiency. However, unsuccessful detection at relay severely deteriorates the diversity gain, as well as end-to-end pairwise error probability (PEP). To handle this issue, a novel joint cyclic redundancy code (CRC) check method (JCRC) is proposed in this paper by exploiting the property of two NC combined CRC codewords. Firstly, the detection probability bounds of the proposed method are derived to prove its efficiency in evaluating the reliability of NC signals. On the basis of that, three JCRC aided TW DNF NC schemes are proposed, and the corresponding PEP performances are also derived. Numerical results reveal that JCRC aided TW DNF NC has similar PEP comparing with the separate CRC one, while the complexity is reduced to half. Besides, it demonstrates that the proposed schemes outperform the conventional one with log-likelihood ratio threshold.

  3. Directed Hidden-Code Extractor for Environment-Sensitive Malwares

    NASA Astrophysics Data System (ADS)

    Jia, Chunfu; Wang, Zhi; Lu, Kai; Liu, Xinhai; Liu, Xin

    Malware writers often use packing technique to hide malicious payload. A number of dynamic unpacking tools are.designed in order to identify and extract the hidden code in the packed malware. However, such unpacking methods.are all based on a highly controlled environment that is vulnerable to various anti-unpacking techniques. If execution.environment is suspicious, malwares may stay inactive for a long time or stop execution immediately to evade.detection. In this paper, we proposed a novel approach that automatically reasons about the environment requirements.imposed by malware, then directs a unpacking tool to change the controlled environment to extract the hide code at.the new environment. The experimental results show that our approach significantly increases the resilience of the.traditional unpacking tools to environment-sensitive malware.

  4. Biases in detection of apparent “weekend effect” on outcome with administrative coding data: population based study of stroke

    PubMed Central

    Li, Linxin

    2016-01-01

    Objectives To determine the accuracy of coding of admissions for stroke on weekdays versus weekends and any impact on apparent outcome. Design Prospective population based stroke incidence study and a scoping review of previous studies of weekend effects in stroke. Setting Primary and secondary care of all individuals registered with nine general practices in Oxfordshire, United Kingdom (OXVASC, the Oxford Vascular Study). Participants All patients with clinically confirmed acute stroke in OXVASC identified with multiple overlapping methods of ascertainment in 2002-14 versus all acute stroke admissions identified by hospital diagnostic and mortality coding alone during the same period. Main outcomes measures Accuracy of administrative coding data for all patients with confirmed stroke admitted to hospital in OXVASC. Difference between rates of “false positive” or “false negative” coding for weekday and weekend admissions. Impact of inaccurate coding on apparent case fatality at 30 days in weekday versus weekend admissions. Weekend effects on outcomes in patients with confirmed stroke admitted to hospital in OXVASC and impacts of other potential biases compared with those in the scoping review. Results Among 92 728 study population, 2373 episodes of acute stroke were ascertained in OXVASC, of which 826 (34.8%) mainly minor events were managed without hospital admission, 60 (2.5%) occurred out of the area or abroad, and 195 (8.2%) occurred in hospital during an admission for a different reason. Of 1292 local hospital admissions for acute stroke, 973 (75.3%) were correctly identified by administrative coding. There was no bias in distribution of weekend versus weekday admission of the 319 strokes missed by coding. Of 1693 admissions for stroke identified by coding, 1055 (62.3%) were confirmed to be acute strokes after case adjudication. Among the 638 false positive coded cases, patients were more likely to be admitted on weekdays than at weekends (536

  5. Multiprocessor execution of functional programs

    SciTech Connect

    Goldberg, B. )

    1988-10-01

    Functional languages have recently gained attention as vehicles for programming in a concise and element manner. In addition, it has been suggested that functional programming provides a natural methodology for programming multiprocessor computers. This paper describes research that was performed to demonstrate that multiprocessor execution of functional programs on current multiprocessors is feasible, and results in a significant reduction in their execution times. Two implementations of the functional language ALFL were built on commercially available multiprocessors. Alfalfa is an implementation on the Intel iPSC hypercube multiprocessor, and Buckwheat is an implementation on the Encore Multimax shared-memory multiprocessor. Each implementation includes a compiler that performs automatic decomposition of ALFL programs and a run-time system that supports their execution. The compiler is responsible for detecting the inherent parallelism in a program, and decomposing the program into a collection of tasks, called serial combinators, that can be executed in parallel. The abstract machine model supported by Alfalfa and Buckwheat is called heterogeneous graph reduction, which is a hybrid of graph reduction and conventional stack-oriented execution. This model supports parallelism, lazy evaluation, and higher order functions while at the same time making efficient use of the processors in the system. The Alfalfa and Buckwheat runtime systems support dynamic load balancing, interprocessor communication (if required), and storage management. A large number of experiments were performed on Alfalfa and Buckwheat for a variety of programs. The results of these experiments, as well as the conclusions drawn from them, are presented.

  6. Improving test interpretation for detecting executive dysfunction in adults and older adults: prevalence of low scores on the test of verbal conceptualization and fluency.

    PubMed

    Brooks, Brian L; Iverson, Grant L; Lanting, Shawnda C; Horton, Arthur M; Reynolds, Cecil R

    2012-01-01

    Knowing the prevalence of low scores on a battery of executive-functioning tests supplements clinical interpretation and can reduce the likelihood of misdiagnosing deficits in executive functioning. The purpose of this study is to examine the base rates of low scores on the Test of Verbal Conceptualization and Fluency (TVCF; Reynolds & Horton, 2006 ) in healthy adults (n = 332; M (age) = 33.0 years, SD = 10.5, range = 20-59) and older adults (n = 138; M (age) = 74.9 years, SD = 7.8, range = 60-89) from the TVCF standardization sample. The TVCF consists of four tests of executive functioning (i.e., Category Fluency, Letter Naming, Classification, and Trails C) that provide five age-adjusted T-scores. The prevalence of low scores was examined in the total sample and was stratified by educational level. When the five T-scores were considered simultaneously, having one or more scores that were 1 standard deviation (SD) below the mean was found in 28% of healthy adults and 38% of older adults. Education-based differences were also present with more lenient cutoff scores (e.g., 1 SD) but not with more conservative cutoffs. Consistent with the existing literature on other test batteries, at least one low subtest score on the TVCF is common in healthy adults and older adults.

  7. Mobile, hybrid Compton/coded aperture imaging for detection, identification and localization of gamma-ray sources at stand-off distances

    NASA Astrophysics Data System (ADS)

    Tornga, Shawn R.

    The Stand-off Radiation Detection System (SORDS) program is an Advanced Technology Demonstration (ATD) project through the Department of Homeland Security's Domestic Nuclear Detection Office (DNDO) with the goal of detection, identification and localization of weak radiological sources in the presence of large dynamic backgrounds. The Raytheon-SORDS Tri-Modal Imager (TMI) is a mobile truck-based, hybrid gamma-ray imaging system able to quickly detect, identify and localize, radiation sources at standoff distances through improved sensitivity while minimizing the false alarm rate. Reconstruction of gamma-ray sources is performed using a combination of two imaging modalities; coded aperture and Compton scatter imaging. The TMI consists of 35 sodium iodide (NaI) crystals 5x5x2 in3 each, arranged in a random coded aperture mask array (CA), followed by 30 position sensitive NaI bars each 24x2.5x3 in3 called the detection array (DA). The CA array acts as both a coded aperture mask and scattering detector for Compton events. The large-area DA array acts as a collection detector for both Compton scattered events and coded aperture events. In this thesis, developed coded aperture, Compton and hybrid imaging algorithms will be described along with their performance. It will be shown that multiple imaging modalities can be fused to improve detection sensitivity over a broader energy range than either alone. Since the TMI is a moving system, peripheral data, such as a Global Positioning System (GPS) and Inertial Navigation System (INS) must also be incorporated. A method of adapting static imaging algorithms to a moving platform has been developed. Also, algorithms were developed in parallel with detector hardware, through the use of extensive simulations performed with the Geometry and Tracking Toolkit v4 (GEANT4). Simulations have been well validated against measured data. Results of image reconstruction algorithms at various speeds and distances will be presented as well as

  8. The Future College Executive.

    ERIC Educational Resources Information Center

    Boston Coll., Chestnut Hill, MA.

    This conference report examines various problems facing university administrators and discusses the future role of the executive in American colleges and universities. Conference papers concern the future college executive; efficiency, accountability and the college executive; administrative concerns; and the rights of college administrators. (MJM)

  9. Source coherence impairments in a direct detection direct sequence optical code-division multiple-access system.

    PubMed

    Fsaifes, Ihsan; Lepers, Catherine; Lourdiane, Mounia; Gallion, Philippe; Beugin, Vincent; Guignard, Philippe

    2007-02-01

    We demonstrate that direct sequence optical code- division multiple-access (DS-OCDMA) encoders and decoders using sampled fiber Bragg gratings (S-FBGs) behave as multipath interferometers. In that case, chip pulses of the prime sequence codes generated by spreading in time-coherent data pulses can result from multiple reflections in the interferometers that can superimpose within a chip time duration. We show that the autocorrelation function has to be considered as the sum of complex amplitudes of the combined chip as the laser source coherence time is much greater than the integration time of the photodetector. To reduce the sensitivity of the DS-OCDMA system to the coherence time of the laser source, we analyze the use of sparse and nonperiodic quadratic congruence and extended quadratic congruence codes.

  10. Architectures for Secure Portable Executable Content.

    ERIC Educational Resources Information Center

    Gritzalis, Stefanos; Aggelis, George; Spinellis, Diomidis

    1999-01-01

    Discusses downloadable executable content, or mobile code, on the World Wide Web; evaluates the security features offered by the Java and Safe-Tcl programming languages; and describes the basic mechanisms of each of the proposed security models. Presents current implementations, as well as upcoming extensions, and evaluates their efficiency and…

  11. Grid Task Execution

    NASA Technical Reports Server (NTRS)

    Hu, Chaumin

    2007-01-01

    IPG Execution Service is a framework that reliably executes complex jobs on a computational grid, and is part of the IPG service architecture designed to support location-independent computing. The new grid service enables users to describe the platform on which they need a job to run, which allows the service to locate the desired platform, configure it for the required application, and execute the job. After a job is submitted, users can monitor it through periodic notifications, or through queries. Each job consists of a set of tasks that performs actions such as executing applications and managing data. Each task is executed based on a starting condition that is an expression of the states of other tasks. This formulation allows tasks to be executed in parallel, and also allows a user to specify tasks to execute when other tasks succeed, fail, or are canceled. The two core components of the Execution Service are the Task Database, which stores tasks that have been submitted for execution, and the Task Manager, which executes tasks in the proper order, based on the user-specified starting conditions, and avoids overloading local and remote resources while executing tasks.

  12. Tabled Execution in Scheme

    SciTech Connect

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  13. 45 CFR 2101.1 - Statutory and Executive Order Authority.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... statutes of the United States and Executive Orders of Presidents, as follows: (a) Public buildings, other.... Code 5-801).) (d) United States medals, insignia, and coins. On medals, insignia, and coins to be produced by an executive department of the United States including the Mint, the Commission advises as...

  14. Ultrasensitive strategy based on PtPd nanodendrite/nano-flower-like@GO signal amplification for the detection of long non-coding RNA.

    PubMed

    Liu, Fei; Xiang, Guiming; Jiang, Dongneng; Zhang, Liqun; Chen, Xuemei; Liu, Linlin; Luo, Fukang; Li, Yi; Liu, Chang; Pu, Xiaoyun

    2015-12-15

    Highly up-regulated in liver cancer (HULC) is a novel promising noninvasive biomarker for hepatocellular carcinoma (HCC), which is a kind of long non-coding RNAs (lncRNAs). But traditional methods limited HULC clinical detection for ownself drawbacks. Development a new HULC detection approach is urgent and necessary. Electrochemical nucleic acid sensor based on different signal amplification strategies with high sensitivity, fast, simple, and convenient, may solve this problem. Herein, we propose a novel strategy based on Pt-Pd bimetallic nanodendrites/nanoflower-like clusters on graphene oxide/Au/horseradish peroxidase (PtPd BND/BNF@GO/Au/HRP) to enhance the catalytic efficiency and sensitivity. And Au particles were simultaneously and separately capped with thionine or detection probe, which increase the binding amount of detection probe and decrease the electronic background. The results indicated that the catalytic effect was noticeably elevated and that the biosensor provides ultrasensitive detection for the lncRNA HULC. The linear calibration of the biosensor ranged from 1.00×10(-3) to 1.00×10(3) pM/mL, and the limit of detection was 0.247 fM/mL. The lncRNA biosensor based on the PtPd BND/BNF@GO/Au/HRP/Au/thionine exhibited acceptable reproducibility and clear selectivity. This strategy may provide a new alternative for clinical HCC diagnosis through the detection of HULC.

  15. The Senior Executive Service

    NASA Technical Reports Server (NTRS)

    1992-01-01

    A major innovation of the Civil Service Reform Act of 1978 was the creation of a Senior Executive Service (SES). The purpose of the SES is both simple and bold: to attract executives of the highest quality into Federal service and to retain them by providing outstanding opportunities for career growth and reward. The SES is intended to: provide greater authority in managing executive resources; attract and retain highly competent executives, and assign them where they will effectively accomplish their missions and best use their talents; provide for systematic development of executives; hold executives accountable for individual and organizational performance; reward outstanding performers and remove poor performers; and provide for an executive merit system free of inappropriate personnel practices and arbitrary actions. This Handbook summarizes the key features of the SES at NASA. It is intended as a special welcome to new appointees and also as a general reference document. It contains an overview of SES management at NASA, including the Executive Resources Board and the Performance Review Board, which are mandated by law to carry out key SES functions. In addition, assistance is provided by a Senior Executive Committee in certain reviews and decisions and by Executive Position Managers in day-to-day administration and oversight.

  16. Experience with Remote Job Execution

    SciTech Connect

    Lynch, Vickie E; Cobb, John W; Green, Mark L; Kohl, James Arthur; Miller, Stephen D; Ren, Shelly; Smith, Bradford C; Vazhkudai, Sudharshan S

    2008-01-01

    The Neutron Science Portal at Oak Ridge National Laboratory submits jobs to the TeraGrid for remote job execution. The TeraGrid is a network of high performance computers supported by the US National Science Foundation. There are eleven partner facilities with over a petaflop of peak computing performance and sixty petabytes of long-term storage. Globus is installed on a local machine and used for job submission. The graphical user interface is produced by java coding that reads an XML file. After submission, the status of the job is displayed in a Job Information Service window which queries globus for the status. The output folder produced in the scratch directory of the TeraGrid machine is returned to the portal with globus-url-copy command that uses the gridftp servers on the TeraGrid machines. This folder is copied from the stage-in directory of the community account to the user's results directory where the output can be plotted using the portal's visualization services. The primary problem with remote job execution is diagnosing execution problems. We have daily tests of submitting multiple remote jobs from the portal. When these jobs fail on a computer, it is difficult to diagnose the problem from the globus output. Successes and problems will be presented.

  17. A new RNA-seq method to detect the transcription and non-coding RNA in prostate cancer.

    PubMed

    Zhang, Xiao-Ming; Ma, Zhong-Wei; Wang, Qiang; Wang, Jian-Ning; Yang, Ji-Wei; Li, Xian-Duo; Li, Hao; Men, Tong-Yi

    2014-01-01

    Prostate cancer is a big killer in many regions especially American men, and this year, the diagnosed rate rises rapidly. We aimed to find the biomarker or any changing in prostate cancer patients. With the development of next generation sequencing, much genomic alteration has been found. Here, basing on the RNA-seq result of human prostate cancer tissue, we tried to find the transcription or non-coding RNA expressed differentially between normal tissue and prostate cancer tissue. 10 T sample data is the RNA-seq data for prostate cancer tissue in this study, we found the differential gene is TFF3-Trefoil factor 3, which was more than seven fold change from prostate cancer tissue to normal tissue, and the most outstanding transcript is C15orf21. Additionally, 9 lncRNAs were found according our method. Finally, we found the many important non-coding RNA related to prostate cancer, some of them were long non-coding RNA (lncRNA).

  18. Utility of rapid database searching for quality assurance: 'detective work' in uncovering radiology coding and billing errors

    NASA Astrophysics Data System (ADS)

    Horii, Steven C.; Kim, Woojin; Boonn, William; Iyoob, Christopher; Maston, Keith; Coleman, Beverly G.

    2011-03-01

    When the first quarter of 2010 Department of Radiology statistics were provided to the Section Chiefs, the authors (SH, BC) were alarmed to discover that Ultrasound showed a decrease of 2.5 percent in billed examinations. This seemed to be in direct contradistinction to the experience of the ultrasound faculty members and sonographers. Their experience was that they were far busier than during the same quarter of 2009. The one exception that all acknowledged was the month of February, 2010 when several major winter storms resulted in a much decreased Hospital admission and Emergency Department visit rate. Since these statistics in part help establish priorities for capital budget items, professional and technical staffing levels, and levels of incentive salary, they are taken very seriously. The availability of a desktop, Web-based RIS database search tool developed by two of the authors (WK, WB) and built-in database functions of the ultrasound miniPACS, made it possible for us very rapidly to develop and test hypotheses for why the number of billable examinations was declining in the face of what experience told the authors was an increasing number of examinations being performed. Within a short time, we identified the major cause as errors on the part of the company retained to verify billable Current Procedural Terminology (CPT) codes against ultrasound reports. This information is being used going forward to recover unbilled examinations and take measures to reduce or eliminate the types of coding errors that resulted in the problem.

  19. Multi-Sensor Detection with Particle Swarm Optimization for Time-Frequency Coded Cooperative WSNs Based on MC-CDMA for Underground Coal Mines.

    PubMed

    Xu, Jingjing; Yang, Wei; Zhang, Linyuan; Han, Ruisong; Shao, Xiaotao

    2015-08-27

    In this paper, a wireless sensor network (WSN) technology adapted to underground channel conditions is developed, which has important theoretical and practical value for safety monitoring in underground coal mines. According to the characteristics that the space, time and frequency resources of underground tunnel are open, it is proposed to constitute wireless sensor nodes based on multicarrier code division multiple access (MC-CDMA) to make full use of these resources. To improve the wireless transmission performance of source sensor nodes, it is also proposed to utilize cooperative sensors with good channel conditions from the sink node to assist source sensors with poor channel conditions. Moreover, the total power of the source sensor and its cooperative sensors is allocated on the basis of their channel conditions to increase the energy efficiency of the WSN. To solve the problem that multiple access interference (MAI) arises when multiple source sensors transmit monitoring information simultaneously, a kind of multi-sensor detection (MSD) algorithm with particle swarm optimization (PSO), namely D-PSO, is proposed for the time-frequency coded cooperative MC-CDMA WSN. Simulation results show that the average bit error rate (BER) performance of the proposed WSN in an underground coal mine is improved significantly by using wireless sensor nodes based on MC-CDMA, adopting time-frequency coded cooperative transmission and D-PSO algorithm with particle swarm optimization.

  20. Multi-Sensor Detection with Particle Swarm Optimization for Time-Frequency Coded Cooperative WSNs Based on MC-CDMA for Underground Coal Mines

    PubMed Central

    Xu, Jingjing; Yang, Wei; Zhang, Linyuan; Han, Ruisong; Shao, Xiaotao

    2015-01-01

    In this paper, a wireless sensor network (WSN) technology adapted to underground channel conditions is developed, which has important theoretical and practical value for safety monitoring in underground coal mines. According to the characteristics that the space, time and frequency resources of underground tunnel are open, it is proposed to constitute wireless sensor nodes based on multicarrier code division multiple access (MC-CDMA) to make full use of these resources. To improve the wireless transmission performance of source sensor nodes, it is also proposed to utilize cooperative sensors with good channel conditions from the sink node to assist source sensors with poor channel conditions. Moreover, the total power of the source sensor and its cooperative sensors is allocated on the basis of their channel conditions to increase the energy efficiency of the WSN. To solve the problem that multiple access interference (MAI) arises when multiple source sensors transmit monitoring information simultaneously, a kind of multi-sensor detection (MSD) algorithm with particle swarm optimization (PSO), namely D-PSO, is proposed for the time-frequency coded cooperative MC-CDMA WSN. Simulation results show that the average bit error rate (BER) performance of the proposed WSN in an underground coal mine is improved significantly by using wireless sensor nodes based on MC-CDMA, adopting time-frequency coded cooperative transmission and D-PSO algorithm with particle swarm optimization. PMID:26343660

  1. Multi-Sensor Detection with Particle Swarm Optimization for Time-Frequency Coded Cooperative WSNs Based on MC-CDMA for Underground Coal Mines.

    PubMed

    Xu, Jingjing; Yang, Wei; Zhang, Linyuan; Han, Ruisong; Shao, Xiaotao

    2015-01-01

    In this paper, a wireless sensor network (WSN) technology adapted to underground channel conditions is developed, which has important theoretical and practical value for safety monitoring in underground coal mines. According to the characteristics that the space, time and frequency resources of underground tunnel are open, it is proposed to constitute wireless sensor nodes based on multicarrier code division multiple access (MC-CDMA) to make full use of these resources. To improve the wireless transmission performance of source sensor nodes, it is also proposed to utilize cooperative sensors with good channel conditions from the sink node to assist source sensors with poor channel conditions. Moreover, the total power of the source sensor and its cooperative sensors is allocated on the basis of their channel conditions to increase the energy efficiency of the WSN. To solve the problem that multiple access interference (MAI) arises when multiple source sensors transmit monitoring information simultaneously, a kind of multi-sensor detection (MSD) algorithm with particle swarm optimization (PSO), namely D-PSO, is proposed for the time-frequency coded cooperative MC-CDMA WSN. Simulation results show that the average bit error rate (BER) performance of the proposed WSN in an underground coal mine is improved significantly by using wireless sensor nodes based on MC-CDMA, adopting time-frequency coded cooperative transmission and D-PSO algorithm with particle swarm optimization. PMID:26343660

  2. Executive High School Internships

    ERIC Educational Resources Information Center

    Hirsch, Sharlene Pearlman

    1974-01-01

    The Executive High School Internships Program enables juniors and seniors to take a one-semester sabbatical from their studies to serve as special assistants to executives in government, business, non-profit organizations, and civic organizations. They perform a variety of duties, earning full academic credit for their participation. (AG)

  3. Retiring the central executive.

    PubMed

    Logie, Robert H

    2016-10-01

    Reasoning, problem solving, comprehension, learning and retrieval, inhibition, switching, updating, or multitasking are often referred to as higher cognition, thought to require control processes or the use of a central executive. However, the concept of an executive controller begs the question of what is controlling the controller and so on, leading to an infinite hierarchy of executives or "homunculi". In what is now a QJEP citation classic, Baddeley [Baddeley, A. D. (1996). Exploring the central executive. Quarterly Journal of Experimental Psychology, 49A, 5-28] referred to the concept of a central executive in cognition as a "conceptual ragbag" that acted as a placeholder umbrella term for aspects of cognition that are complex, were poorly understood at the time, and most likely involve several different cognitive functions working in concert. He suggested that with systematic empirical research, advances in understanding might progress sufficiently to allow the executive concept to be "sacked". This article offers an overview of the 1996 article and of some subsequent systematic research and argues that after two decades of research, there is sufficient advance in understanding to suggest that executive control might arise from the interaction among multiple different functions in cognition that use different, but overlapping, brain networks. The article concludes that the central executive concept might now be offered a dignified retirement.

  4. Retiring the central executive.

    PubMed

    Logie, Robert H

    2016-10-01

    Reasoning, problem solving, comprehension, learning and retrieval, inhibition, switching, updating, or multitasking are often referred to as higher cognition, thought to require control processes or the use of a central executive. However, the concept of an executive controller begs the question of what is controlling the controller and so on, leading to an infinite hierarchy of executives or "homunculi". In what is now a QJEP citation classic, Baddeley [Baddeley, A. D. (1996). Exploring the central executive. Quarterly Journal of Experimental Psychology, 49A, 5-28] referred to the concept of a central executive in cognition as a "conceptual ragbag" that acted as a placeholder umbrella term for aspects of cognition that are complex, were poorly understood at the time, and most likely involve several different cognitive functions working in concert. He suggested that with systematic empirical research, advances in understanding might progress sufficiently to allow the executive concept to be "sacked". This article offers an overview of the 1996 article and of some subsequent systematic research and argues that after two decades of research, there is sufficient advance in understanding to suggest that executive control might arise from the interaction among multiple different functions in cognition that use different, but overlapping, brain networks. The article concludes that the central executive concept might now be offered a dignified retirement. PMID:26821744

  5. Aptamer-conjugated bio-bar-code Au-Fe3O4 nanoparticles as amplification station for electrochemiluminescence detection of tumor cells.

    PubMed

    Chen, Min; Bi, Sai; Jia, Xiaoqiang; He, Peng

    2014-07-21

    An electrochemiluminescence (ECL) assay has been developed for highly sensitive and selective detection of tumor cells based on cell-SELEX aptamer-target cell interactions through a cascaded amplification process by using bio-bar-code Au-Fe3O4 as amplification station. Firstly, bio-bar-code toehold-aptamer/DNA primer/Au-Fe3O4 (TA/DP/Au-Fe3O4) nanoconjugates are fabricated with a ratio of 1:10 to efficiently avoid cross-linking reaction and recognize target cells, which are immobilized on the substrate by hybridizing aptamer to capture probe with 18-mer. Through strand displacement reaction (SDR), the TA/DP/Au-Fe3O4 composites further act as the amplification station to initiate rolling circle amplification (RCA). As a result, on the surface of TA/DP/Au-Fe3O4, a large number of Ru(bpy)2(dcbpy)NHS-labeled probes hybridize to RCA products, which are easily trapped by magnetic electrode to perform the magnetic particle-based ECL platform. Under isothermal conditions, this powerful amplification strategy permits detection of Ramos cells as low as 16 cells with an excellent selectivity. Moreover, analysis of Ramos cells in complex samples and whole blood samples further show the great potential of this ultrasensitive approach in clinical application involving cancer cells-related biological processes.

  6. Memoized Symbolic Execution

    NASA Technical Reports Server (NTRS)

    Yang, Guowei; Pasareanu, Corina S.; Khurshid, Sarfraz

    2012-01-01

    This paper introduces memoized symbolic execution (Memoise), a novel approach for more efficient application of forward symbolic execution, which is a well-studied technique for systematic exploration of program behaviors based on bounded execution paths. Our key insight is that application of symbolic execution often requires several successive runs of the technique on largely similar underlying problems, e.g., running it once to check a program to find a bug, fixing the bug, and running it again to check the modified program. Memoise introduces a trie-based data structure that stores the key elements of a run of symbolic execution. Maintenance of the trie during successive runs allows re-use of previously computed results of symbolic execution without the need for re-computing them as is traditionally done. Experiments using our prototype embodiment of Memoise show the benefits it holds in various standard scenarios of using symbolic execution, e.g., with iterative deepening of exploration depth, to perform regression analysis, or to enhance coverage.

  7. Data processing with microcode designed with source coding

    DOEpatents

    McCoy, James A; Morrison, Steven E

    2013-05-07

    Programming for a data processor to execute a data processing application is provided using microcode source code. The microcode source code is assembled to produce microcode that includes digital microcode instructions with which to signal the data processor to execute the data processing application.

  8. PCR assay based on DNA coding for 16S rRNA for detection and identification of mycobacteria in clinical samples.

    PubMed Central

    Kox, L F; van Leeuwen, J; Knijper, S; Jansen, H M; Kolk, A H

    1995-01-01

    A PCR and a reverse cross blot hybridization assay were developed for the detection and identification of mycobacteria in clinical samples. The PCR amplifies a part of the DNA coding for 16S rRNA with a set of primers that is specific for the genus Mycobacterium and that flanks species-specific sequences within the genes coding for 16S rRNA. The PCR product is analyzed in a reverse cross blot hybridization assay with probes specific for M. tuberculosis complex (pTub1), M. avium (pAvi3), M. intracellulare (pInt5 and pInt7), M. kansasii complex-M. scrofulaceum complex (pKan1), M. xenopi (pXen1), M. fortuitum (pFor1), M. smegmatis (pSme1), and Mycobacterium spp. (pMyc5a). The PCR assay can detect 10 fg of DNA, the equivalent of two mycobacteria. The specificities of the probes were tested with 108 mycobacterial strains (33 species) and 31 nonmycobacterial strains (of 17 genera). The probes pAvi3, pInt5, pInt7, pKan1, pXen1, and pMyc5a were specific. With probes pTub1, pFor1, and pSme1, slight cross hybridization occurred. However, the mycobacterial strains from which the cross-hybridizing PCR products were derived belonged to nonpathogenic or nonopportunistic species which do not occur in clinical samples. The test was used on 31 different clinical specimens obtained from patients suspected of having mycobacterial disease, including a patient with a double mycobacterial infection. The samples included sputum, bronchoalveolar lavage, tissue biopsy samples, cerebrospinal fluid, pus, peritoneal fluid, pleural fluid, and blood. The results of the PCR assay agreed with those of conventional identification methods or with clinical data, showing that the test can be used for the direct and rapid detection and identification of mycobacteria in clinical samples. PMID:8586707

  9. [The detection of occurrence rate of genes coding capability to form pili binding in auto-strains of Escherichia coli].

    PubMed

    Ivanova, E I; Popkova, S M; Dzhioev, Iu P; Rakova, E B; Dolgikh, V V; Savel'kaeva, M V; Nemchenko, U M; Bukharova, E V; Serdiuk, L V

    2015-01-01

    E. coli is a commensal of intestine of the vertebrata. The exchange of genetic material of different types of bacteria between themselves and with other representatives of family of Enterobacteriaceae in intestinal ecosystem results in development of types of normal colibacillus with genetic characteristics of pathogenicity that can serve as a theoretical substantiation to attribute such strains to pathobionts. The entero-pathogenic colibacillus continues be an important cause of diarrhea in children in developing countries. The gene responsible for formation of pili binding is a necessary condition for virulence of entero-pathogenic colibacillus. The polymerase chain reaction was applied to examine 316 strains of different types of E. coli (normal, with weak enzyme activity and hemolytic activity) isolated from healthy children and children with functional disorders of gastro-intestinal tract for presence of genes coding capability to form pill binding. The presence of this gene in different biochemical types of E. coli permits to establish the fact of formation of reservoir of pathogenicity in indigent microbiota of intestinal biocenosis. PMID:25874306

  10. [The detection of occurrence rate of genes coding capability to form pili binding in auto-strains of Escherichia coli].

    PubMed

    Ivanova, E I; Popkova, S M; Dzhioev, Iu P; Rakova, E B; Dolgikh, V V; Savel'kaeva, M V; Nemchenko, U M; Bukharova, E V; Serdiuk, L V

    2015-01-01

    E. coli is a commensal of intestine of the vertebrata. The exchange of genetic material of different types of bacteria between themselves and with other representatives of family of Enterobacteriaceae in intestinal ecosystem results in development of types of normal colibacillus with genetic characteristics of pathogenicity that can serve as a theoretical substantiation to attribute such strains to pathobionts. The entero-pathogenic colibacillus continues be an important cause of diarrhea in children in developing countries. The gene responsible for formation of pili binding is a necessary condition for virulence of entero-pathogenic colibacillus. The polymerase chain reaction was applied to examine 316 strains of different types of E. coli (normal, with weak enzyme activity and hemolytic activity) isolated from healthy children and children with functional disorders of gastro-intestinal tract for presence of genes coding capability to form pill binding. The presence of this gene in different biochemical types of E. coli permits to establish the fact of formation of reservoir of pathogenicity in indigent microbiota of intestinal biocenosis.

  11. KENO-V code

    SciTech Connect

    Cramer, S.N.

    1984-01-01

    The KENO-V code is the current release of the Oak Ridge multigroup Monte Carlo criticality code development. The original KENO, with 16 group Hansen-Roach cross sections and P/sub 1/ scattering, was one ot the first multigroup Monte Carlo codes and it and its successors have always been a much-used research tool for criticality studies. KENO-V is able to accept large neutron cross section libraries (a 218 group set is distributed with the code) and has a general P/sub N/ scattering capability. A supergroup feature allows execution of large problems on small computers, but at the expense of increased calculation time and system input/output operations. This supergroup feature is activated automatically by the code in a manner which utilizes as much computer memory as is available. The primary purpose of KENO-V is to calculate the system k/sub eff/, from small bare critical assemblies to large reflected arrays of differing fissile and moderator elements. In this respect KENO-V neither has nor requires the many options and sophisticated biasing techniques of general Monte Carlo codes.

  12. New Executive Director selected

    NASA Astrophysics Data System (ADS)

    Grove, Timothy L.

    2010-04-01

    Christine W. McEntee will join AGU on 30 August as the Union's third executive director. She has been executive vice president and chief executive officer of the American Institute of Architects (AIA) since February 2006. We are very fortunate to have McEntee join us at this stage in AGU's transformation to an inclusive, participative organization. We are also excited about her outreach expertise and ability to help AGU become an authoritative voice of Earth and space science. She is definitely up to the challenge after having successfully accomplished a similar result at AIA.

  13. Tandem Mirror Reactor Systems Code (Version I)

    SciTech Connect

    Reid, R.L.; Finn, P.A.; Gohar, M.Y.; Barrett, R.J.; Gorker, G.E.; Spampinaton, P.T.; Bulmer, R.H.; Dorn, D.W.; Perkins, L.J.; Ghose, S.

    1985-09-01

    A computer code was developed to model a Tandem Mirror Reactor. Ths is the first Tandem Mirror Reactor model to couple, in detail, the highly linked physics, magnetics, and neutronic analysis into a single code. This report describes the code architecture, provides a summary description of the modules comprising the code, and includes an example execution of the Tandem Mirror Reactor Systems Code. Results from this code for two sensitivity studies are also included. These studies are: (1) to determine the impact of center cell plasma radius, length, and ion temperature on reactor cost and performance at constant fusion power; and (2) to determine the impact of reactor power level on cost.

  14. A Hybrid Procedural/Deductive Executive for Autonomous Spacecraft

    NASA Technical Reports Server (NTRS)

    Pell, Barney; Gamble, Edward B.; Gat, Erann; Kessing, Ron; Kurien, James; Millar, William; Nayak, P. Pandurang; Plaunt, Christian; Williams, Brian C.; Lau, Sonie (Technical Monitor)

    1998-01-01

    The New Millennium Remote Agent (NMRA) will be the first AI system to control an actual spacecraft. The spacecraft domain places a strong premium on autonomy and requires dynamic recoveries and robust concurrent execution, all in the presence of tight real-time deadlines, changing goals, scarce resource constraints, and a wide variety of possible failures. To achieve this level of execution robustness, we have integrated a procedural executive based on generic procedures with a deductive model-based executive. A procedural executive provides sophisticated control constructs such as loops, parallel activity, locks, and synchronization which are used for robust schedule execution, hierarchical task decomposition, and routine configuration management. A deductive executive provides algorithms for sophisticated state inference and optimal failure recover), planning. The integrated executive enables designers to code knowledge via a combination of procedures and declarative models, yielding a rich modeling capability suitable to the challenges of real spacecraft control. The interface between the two executives ensures both that recovery sequences are smoothly merged into high-level schedule execution and that a high degree of reactivity is retained to effectively handle additional failures during recovery.

  15. Calibrating executive compensation.

    PubMed

    Wyatt-Johnson, Claudia; Bennett, Christopher J

    2004-03-01

    Under increasing public scrutiny, not-for-profit boards are pressured, in turn, to take a harder look at how they compensate executives. Now is the time to establish a process and protocols for approving appropriate pay. PMID:15045903

  16. Executive functions in synesthesia.

    PubMed

    Rouw, Romke; van Driel, Joram; Knip, Koen; Richard Ridderinkhof, K

    2013-03-01

    In grapheme-color synesthesia, a number or letter can evoke two different and possibly conflicting (real and synesthetic) color sensations at the same time. In this study, we investigate the relationship between synesthesia and executive control functions. First, no general skill differences were obtained between synesthetes and non-synesthetes in classic executive control paradigms. Furthermore, classic executive control effects did not interact with synesthetic behavioral effects. Third, we found support for our hypothesis that inhibition of a synesthetic color takes effort and time. Finally, individual differences analyses showed no relationship between the two skills; performance on a 'normal' Stroop task does not predict performance on a synesthetic Stroop task. Across four studies, the current results consistently show no clear relationship between executive control functions and synesthetic behavioral effects. This raises the question of which mechanisms are at play in synesthetic 'management' during the presence of two conflicting (real and synesthetic) sensations.

  17. High Hydrogen Concentrations Detected In The Underground Vaults For RH-TRU Waste At INEEL Compared With Calculated Values Using The INEEL-Developed Computer Code

    SciTech Connect

    Rajiv Bhatt; Soli Khericha

    2005-02-01

    About 700 remote-handled transuranic (RH-TRU) waste drums are stored in about 144 underground vaults at the Intermediate-Level Transuranic Storage Facility at the Idaho National Environmental and Engineering Laboratory’s (INEEL’s) Radioactive Waste Management Complex (RWMC). These drums were shipped to the INEEL from 1976 through 1996. During recent monitoring, concentrations of hydrogen were found to be in excess of lower explosive limits. The hydrogen concentration in one vault was detected to be as high as 18% (by volume). This condition required evaluation of the safety basis for the facility. The INEEL has developed a computer program to estimate the hydrogen gas generation as a function of time and diffusion through a series of layers (volumes), with a maximum five layers plus a sink/environment. The program solves the first-order diffusion equations as a function of time. The current version of the code is more flexible in terms of user input. The program allows the user to estimate hydrogen concentrations in the different layers of a configuration and then change the configuration after a given time; e.g.; installation of a filter on an unvented drum or placed in a vault or in a shipping cask. The code has been used to predict vault concentrations and to identify potential problems during retrieval and aboveground storage. The code has generally predicted higher hydrogen concentrations than the measured values, particularly for the drums older than 20 year, which could be due to uncertainty and conservative assumptions in drum age, heat generation rate, hydrogen generation rate, Geff, and diffusion rates through the layers.

  18. Multiprocessor execution of functional programs

    SciTech Connect

    Goldberg, B.F.

    1988-01-01

    Functional languages have recently gained attention as vehicles for programming in a concise and elegant manner. In addition, it has been suggested that functional programming provides a natural methodology for programming multiprocessor computers. This dissertation demonstrates that multiprocessor execution of functional programs is feasible, and results in a significant reduction in their execution times. Two implementations of the functional language ALFL were built on commercially available multiprocessors. ALFL is an implementation on the Intel iPSC hypercube multiprocessor, and Buckwheat is an implementation on the Encore Multimax shared-memory multiprocessor. Each implementation includes a compiler that performs automatic decomposition of ALFL programs. The compiler is responsible for detecting the inherent parallelism in a program, and decomposing the program into a collection of tasks, called serial combinators, that can be executed in parallel. One of the primary goals of the compiler is to generate serial combinators exhibiting the coarsest granularity possibly without sacrificing useful parallelism. This dissertation describes the algorithms used by the compiler to analyze, decompose, and optimize functional programs. The abstract machine model supported by Alfalfa and Buckwheat is called heterogeneous graph reduction, which is a hybrid of graph reduction and conventional stack-oriented execution. This model supports parallelism, lazy evaluation, and higher order functions while at the same time making efficient use of the processors in the system. The Alfalfa and Buckwheat run-time systems support dynamic load balancing, interprocessor communication (if required) and storage management. A large number of experiments were performed on Alfalfa and Buckwheat for a variety of programs. The results of these experiments, as well as the conclusions drawn from them, are presented.

  19. Highly sensitive and selective microRNA detection based on DNA-bio-bar-code and enzyme-assisted strand cycle exponential signal amplification.

    PubMed

    Dong, Haifeng; Meng, Xiangdan; Dai, Wenhao; Cao, Yu; Lu, Huiting; Zhou, Shufeng; Zhang, Xueji

    2015-04-21

    Herein, a highly sensitive and selective microRNA (miRNA) detection strategy using DNA-bio-bar-code amplification (BCA) and Nb·BbvCI nicking enzyme-assisted strand cycle for exponential signal amplification was designed. The DNA-BCA system contains a locked nucleic acid (LNA) modified DNA probe for improving hybridization efficiency, while a signal reported molecular beacon (MB) with an endonuclease recognition site was designed for strand cycle amplification. In the presence of target miRNA, the oligonucleotides functionalized magnetic nanoprobe (MNP-DNA) and gold nanoprobe (AuNP-DNA) with numerous reported probes (RP) can hybridize with target miRNA, respectively, to form a sandwich structure. After sandwich structures were separated from the solution by the magnetic field, the RP were released under high temperature to recognize the MB and cleaved the hairpin DNA to induce the dissociation of RP. The dissociated RP then triggered the next strand cycle to produce exponential fluorescent signal amplification for miRNA detection. Under optimized conditions, the exponential signal amplification system shows a good linear range of 6 orders of magnitude (from 0.3 pM to 3 aM) with limit of detection (LOD) down to 52.5 zM, while the sandwich structure renders the system with high selectivity. Meanwhile, the feasibility of the proposed strategy for cell miRNA detection was confirmed by analyzing miRNA-21 in HeLa lysates. Given the high-performance for miRNA analysis, the strategy has a promising application in biological detection and in clinical diagnosis.

  20. An optimum PN code search technique for a given apriori signal location density. [PseudoNoise in radar detection

    NASA Technical Reports Server (NTRS)

    Holmes, J. K.; Woo, K. T.

    1978-01-01

    A method is presented for optimizing (minimizing) the acquisition time for a PN-type spread spectrum system when the a priori probability density function is not uniform. For an assumed a priori Gaussian density function, calculations show that the acquisition time, when the 0.5 probability acquisition time is used as a measure of acquisition time, is reduced by 40% for a cell detection probability of 0.25 and when three sweeps are used. For the same parameters and with four sweeps the acquisition time is reduced by 41%. When the acquisition time probability is set to 0.9 instead of 0.5, the reduction is 25% of the uniform sweep time.

  1. Rapid, high-throughput detection of rifampin resistance and heteroresistance in Mycobacterium tuberculosis by use of sloppy molecular beacon melting temperature coding.

    PubMed

    Chakravorty, Soumitesh; Kothari, Harsheel; Aladegbami, Bola; Cho, Eun Jin; Lee, Jong Seok; Roh, Sandy S; Kim, Hyunchul; Kwak, Hyungkyung; Lee, Eun Gae; Hwang, Soo Hee; Banada, Padmapriya P; Safi, Hassan; Via, Laura E; Cho, Sang-Nae; Barry, Clifton E; Alland, David

    2012-07-01

    Rifampin resistance in Mycobacterium tuberculosis is largely determined by mutations in an 80-bp rifampin resistance determining region (RRDR) of the rpoB gene. We developed a rapid single-well PCR assay to identify RRDR mutations. The assay uses sloppy molecular beacons to probe an asymmetric PCR of the M. tuberculosis RRDR by melting temperature (T(m)) analysis. A three-point T(m) code is generated which distinguishes wild-type from mutant RRDR DNA sequences in approximately 2 h. The assay was validated on synthetic oligonucleotide targets containing the 44 most common RRDR mutations. It was then tested on a panel of DNA extracted from 589 geographically diverse clinical M. tuberculosis cultures, including isolates with wild-type RRDR sequences and 25 different RRDR mutations. The assay detected 236/236 RRDR mutant sequences as mutant (sensitivity, 100%; 95% confidence interval [CI], 98 to 100%) and 353/353 RRDR wild-type sequences as wild type (specificity, 100%; 95% CI, 98.7 to 100%). The assay identified 222/225 rifampin-resistant isolates as rifampin resistant (sensitivity, 98.7%; 95% CI, 95.8 to 99.6%) and 335/336 rifampin-susceptible isolates as rifampin susceptible (specificity, 99.7%; 95% CI, 95.8 to 99.6%). All mutations were either individually identified or clustered into small mutation groups using the triple T(m) code. The assay accurately identified mixed (heteroresistant) samples and was shown analytically to detect RRDR mutations when present in at least 40% of the total M. tuberculosis DNA. This was at least as accurate as Sanger DNA sequencing. The assay was easy to use and well suited for high-throughput applications. This new sloppy molecular beacon assay should greatly simplify rifampin resistance testing in clinical laboratories.

  2. Shared prefetching to reduce execution skew in multi-threaded systems

    DOEpatents

    Eichenberger, Alexandre E; Gunnels, John A

    2013-07-16

    Mechanisms are provided for optimizing code to perform prefetching of data into a shared memory of a computing device that is shared by a plurality of threads that execute on the computing device. A memory stream of a portion of code that is shared by the plurality of threads is identified. A set of prefetch instructions is distributed across the plurality of threads. Prefetch instructions are inserted into the instruction sequences of the plurality of threads such that each instruction sequence has a separate sub-portion of the set of prefetch instructions, thereby generating optimized code. Executable code is generated based on the optimized code and stored in a storage device. The executable code, when executed, performs the prefetches associated with the distributed set of prefetch instructions in a shared manner across the plurality of threads.

  3. Practices in Code Discoverability: Astrophysics Source Code Library

    NASA Astrophysics Data System (ADS)

    Allen, A.; Teuben, P.; Nemiroff, R. J.; Shamir, L.

    2012-09-01

    Here we describe the Astrophysics Source Code Library (ASCL), which takes an active approach to sharing astrophysics source code. ASCL's editor seeks out both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and adds entries for the found codes to the library. This approach ensures that source codes are added without requiring authors to actively submit them, resulting in a comprehensive listing that covers a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL now has over 340 codes in it and continues to grow. In 2011, the ASCL has on average added 19 codes per month. An advisory committee has been established to provide input and guide the development and expansion of the new site, and a marketing plan has been developed and is being executed. All ASCL source codes have been used to generate results published in or submitted to a refereed journal and are freely available either via a download site or from an identified source. This paper provides the history and description of the ASCL. It lists the requirements for including codes, examines the advantages of the ASCL, and outlines some of its future plans.

  4. Adding blood to agitated saline significantly improves detection of right-to-left shunt by contrast-transcranial color-coded duplex sonography.

    PubMed

    Gentile, Mauro; De Vito, Alessandro; Azzini, Cristiano; Tamborino, Carmine; Casetta, Ilaria

    2014-11-01

    Contrast-transcranial Doppler and contrast-transcranial color-coded duplex sonography (c-TCCD) have been reported to have high sensitivity in detecting patent foramen ovale as compared with transesophageal echocardiography. An international consensus meeting (Jauss and Zanette 2000) recommended that the contrast agent for right-to left-shunt (RLS) detection using contrast-transcranial Doppler be prepared by mixing 9 mL of isotonic saline solution and 1 mL of air. The aim of our study was to determine whether adding blood to the contrast agent results in improved detection of RLS. We enrolled all consecutive patients admitted to our neurosonology laboratory for RLS diagnosis. For each patient, we performed c-TCCD both at rest and during the Valsalva maneuver using two different contrast agents: ANSs (1 mL of air mixed with 9 mL of normal saline) and ANSHBs (1 mL of air mixed with 8 mL of normal saline and 1 mL of the patient's blood). To classify RLS, we used a four-level visual categorization: (i) no occurrence of micro-embolic signals; (ii) grade I, 1-10 signals; (iii) grade II, >10 signals but no curtain; grade III, curtain pattern. We included 80 patients, 33 men and 47 women. RLS was detected in 18.8% at rest and in 35% during the Valsalva maneuver using ANSs, and in 31.3% and in 46.3% using ANSHBs, respectively (p < 0.0001). There was a statistically significant increase in the number of micro-embolic signals with the use of ANSHBs. The use of blood mixed with saline solution and air as a c-TCCD contrast agent produced an increase in positive tests and a higher grade of RLS compared with normal saline and air alone, either with or without the Valsalva maneuver.

  5. Authorship Attribution of Source Code

    ERIC Educational Resources Information Center

    Tennyson, Matthew F.

    2013-01-01

    Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…

  6. Uplink Coding

    NASA Technical Reports Server (NTRS)

    Pollara, Fabrizio; Hamkins, Jon; Dolinar, Sam; Andrews, Ken; Divsalar, Dariush

    2006-01-01

    This viewgraph presentation reviews uplink coding. The purpose and goals of the briefing are (1) Show a plan for using uplink coding and describe benefits (2) Define possible solutions and their applicability to different types of uplink, including emergency uplink (3) Concur with our conclusions so we can embark on a plan to use proposed uplink system (4) Identify the need for the development of appropriate technology and infusion in the DSN (5) Gain advocacy to implement uplink coding in flight projects Action Item EMB04-1-14 -- Show a plan for using uplink coding, including showing where it is useful or not (include discussion of emergency uplink coding).

  7. Securing mobile code.

    SciTech Connect

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements

  8. Executions and scientific anatomy.

    PubMed

    Dolezal, Antonín; Jelen, Karel; Stajnrtova, Olga

    2015-12-01

    The very word "anatomy" tells us about this branch's connection with dissection. Studies of anatomy have taken place for approximately 2.300 years already. Anatomy's birthplace lies in Greece and Egypt. Knowledge in this specific field of science was necessary during surgical procedures in ophthalmology and obstetrics. Embalming took place without public disapproval just like autopsies and manipulation with relics. Thus, anatomical dissection became part of later forensic sciences. Anatomical studies on humans themselves, which needed to be compared with the knowledge gained through studying procedures performed on animals, elicited public disapprobation and prohibition. When faced with a shortage of cadavers, anatomists resorted to obtaining bodies of the executed and suicide victims - since torture, public display of the mutilated body, (including anatomical autopsy), were perceived as an intensification of the death penalty. Decapitation and hanging were the main execution methods meted out for death sentences. Anatomists preferred intact bodies for dissection; hence, convicts could thus avoid torture. This paper lists examples of how this process was resolved. It concerns the manners of killing, vivisection on people in the antiquity and middle-ages, experiments before the execution and after, vivifying from seeming death, experiments with galvanizing electricity on fresh cadavers, evaluating of sensibility after guillotine execution, and making perfect anatomical preparations and publications during Nazism from fresh bodies of the executed.

  9. Executions and scientific anatomy.

    PubMed

    Dolezal, Antonín; Jelen, Karel; Stajnrtova, Olga

    2015-12-01

    The very word "anatomy" tells us about this branch's connection with dissection. Studies of anatomy have taken place for approximately 2.300 years already. Anatomy's birthplace lies in Greece and Egypt. Knowledge in this specific field of science was necessary during surgical procedures in ophthalmology and obstetrics. Embalming took place without public disapproval just like autopsies and manipulation with relics. Thus, anatomical dissection became part of later forensic sciences. Anatomical studies on humans themselves, which needed to be compared with the knowledge gained through studying procedures performed on animals, elicited public disapprobation and prohibition. When faced with a shortage of cadavers, anatomists resorted to obtaining bodies of the executed and suicide victims - since torture, public display of the mutilated body, (including anatomical autopsy), were perceived as an intensification of the death penalty. Decapitation and hanging were the main execution methods meted out for death sentences. Anatomists preferred intact bodies for dissection; hence, convicts could thus avoid torture. This paper lists examples of how this process was resolved. It concerns the manners of killing, vivisection on people in the antiquity and middle-ages, experiments before the execution and after, vivifying from seeming death, experiments with galvanizing electricity on fresh cadavers, evaluating of sensibility after guillotine execution, and making perfect anatomical preparations and publications during Nazism from fresh bodies of the executed. PMID:26859596

  10. Revitalizing executive information systems.

    PubMed

    Crockett, F

    1992-01-01

    As the saying goes, "garbage in, garbage out"--and this is as true for executive information systems as for any other computer system. Crockett presents a methodology he has used with clients to help them develop more useful systems that produce higher quality information. The key is to develop performance measures based on critical success factors and stakeholder expectations and then to link them cross functionally to show how progress is being made on strategic goals. Feedback from the executive information system then informs strategy formulation, business plan development, and operational activities.

  11. Sharing code.

    PubMed

    Kubilius, Jonas

    2014-01-01

    Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  12. Leadership and Executive Development.

    ERIC Educational Resources Information Center

    1997

    This document contains three papers from a symposium on leadership and executive development. "Leading and Managing in a Service Organization: An Examination of Line vs. Staff Effectiveness" (Allan H. Church, Janine Waclawski) presents an analysis of differences in managerial strengths and weaknesses between 45 line managers and 52 human resources…

  13. Space station executive summary

    NASA Technical Reports Server (NTRS)

    1972-01-01

    An executive summary of the modular space station study is presented. The subjects discussed are: (1) design characteristics, (2) experiment program, (3) operations, (4) program description, and (5) research implications. The modular space station is considered a candidate payload for the low cost shuttle transportation system.

  14. School Executive Website Study

    ERIC Educational Resources Information Center

    Thiede, Robert

    2009-01-01

    The School Executive Website will be a one-stop, online site for officials who are looking for educational data, best practices, product reviews, school documents, professional opinions, and/or job-related networking. The format of the website is designed in certain sections similar to other current and popular websites, such as Angie's List.com,…

  15. Healthcare. Executive Summary

    ERIC Educational Resources Information Center

    Carnevale, Anthony P.; Smith, Nicole; Gulish, Artem; Beach, Bennett H.

    2012-01-01

    This executive summary highlights several findings about healthcare. These are: (1) Healthcare is 18 percent of the U.S. economy, twice as high as in other countries; (2) There are two labor markets in healthcare: high-skill, high-wage professional and technical jobs and low-skill, low-wage support jobs; (3) Demand for postsecondary education in…

  16. Multisensory Executive Functioning

    ERIC Educational Resources Information Center

    Hunt, Amelia R.; Kingstone, Alan

    2004-01-01

    To better understand the prefrontal circuitry that putatively supports executive functions, such as those involved in switching tasks, we asked whether a current task set is open equally to receiving information from any sensory modality or if it is to some degree modality-specific. Subjects were presented with a sequence of digits to be…

  17. Embedding Temporal Constraints For Coordinated Execution in Habitat Automation

    NASA Technical Reports Server (NTRS)

    Morris, Paul; Schwabacher, Mark; Dalal, Michael; Fry, Charles

    2013-01-01

    Future NASA plans call for long-duration deep space missions with human crews. Because of light-time delay and other considerations, increased autonomy will be needed. This will necessitate integration of tools in such areas as anomaly detection, diagnosis, planning, and execution. In this paper we investigate an approach that integrates planning and execution by embedding planner-derived temporal constraints in an execution procedure. To avoid the need for propagation, we convert the temporal constraints to dispatchable form. We handle some uncertainty in the durations without it affecting the execution; larger variations may cause activities to be skipped.

  18. The cooking task: making a meal of executive functions

    PubMed Central

    Doherty, T. A.; Barker, L. A.; Denniss, R.; Jalil, A.; Beer, M. D.

    2015-01-01

    Current standardized neuropsychological tests may fail to accurately capture real-world executive deficits. We developed a computer-based Cooking Task (CT) assessment of executive functions and trialed the measure with a normative group before use with a head-injured population. Forty-six participants completed the computerized CT and subtests from standardized neuropsychological tasks, including the Tower and Sorting Tests of executive function from the Delis-Kaplan Executive Function System (D-KEFS) and the Cambridge prospective memory test (CAMPROMPT), in order to examine whether standardized executive function tasks, predicted performance on measurement indices from the CT. Findings showed that verbal comprehension, rule detection and prospective memory contributed to measures of prospective planning accuracy and strategy implementation of the CT. Results also showed that functions necessary for cooking efficacy differ as an effect of task demands (difficulty levels). Performance on rule detection, strategy implementation and flexible thinking executive function measures contributed to accuracy on the CT. These findings raise questions about the functions captured by present standardized tasks particularly at varying levels of difficulty and during dual-task performance. Our preliminary findings also indicate that CT measures can effectively distinguish between executive function and Full Scale IQ abilities. Results of the present study indicate that the CT shows promise as an ecologically valid measure of executive function for future use with a head-injured population and indexes selective executive function’s captured by standardized tests. PMID:25717294

  19. 12 CFR 1710.14 - Code of conduct and ethics.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 10 2014-01-01 2014-01-01 false Code of conduct and ethics. 1710.14 Section... Code of conduct and ethics. (a) General. An Enterprise shall establish and administer a written code of conduct and ethics that is reasonably designed to assure the ability of board members, executive...

  20. 12 CFR 1710.14 - Code of conduct and ethics.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 7 2011-01-01 2011-01-01 false Code of conduct and ethics. 1710.14 Section... Code of conduct and ethics. (a) General. An Enterprise shall establish and administer a written code of conduct and ethics that is reasonably designed to assure the ability of board members, executive...

  1. 12 CFR 1710.14 - Code of conduct and ethics.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 9 2013-01-01 2013-01-01 false Code of conduct and ethics. 1710.14 Section... Code of conduct and ethics. (a) General. An Enterprise shall establish and administer a written code of conduct and ethics that is reasonably designed to assure the ability of board members, executive...

  2. 12 CFR 1710.14 - Code of conduct and ethics.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 9 2012-01-01 2012-01-01 false Code of conduct and ethics. 1710.14 Section... Code of conduct and ethics. (a) General. An Enterprise shall establish and administer a written code of conduct and ethics that is reasonably designed to assure the ability of board members, executive...

  3. Detection of a long non-coding RNA (CCAT1) in living cells and human adenocarcinoma of colon tissues using FIT-PNA molecular beacons.

    PubMed

    Kam, Yossi; Rubinstein, Abraham; Naik, Shankar; Djavsarov, Irena; Halle, David; Ariel, Ilana; Gure, Ali O; Stojadinovic, Alexander; Pan, HongGuang; Tsivin, Victoria; Nissan, Aviram; Yavin, Eylon

    2014-09-28

    Although the function and mechanism of action of long non-coding RNAs (lncRNA) is still not completely known, studies have shown their potential role in the control of gene expression and regulation, in cellular proliferation and invasiveness at the transcriptional level via multiple mechanisms. Recently, colon cancer associated transcript 1 (CCAT1) lncRNA was found to be expressed in colorectal cancer (CRC) tumors but not in normal tissue. This study aimed to study the ability of a CCAT1-specific peptide nucleic acid (PNA) based molecular beacons (TO-PNA-MB) to serve as a diagnostic probe for in vitro, ex vivo, and in situ (human colon biopsies) detection of CRC. The data showed enhanced fluorescence upon in vitro hybridization to RNA extracted from CCAT1 expressing cells (HT-29, SW-480) compared to control cells (SK-Mel-2). Uptake of TO-PNA-MBs into cells was achieved by covalently attaching cell penetrating peptides (CPPs) to the TO-PNA-MB probes. In situ hybridization of selected TO-PNA-MB in human CRC specimens was shown to detect CCAT1 expression in all (4/4) subjects with pre-cancerous adenomas, and in all (8/8) patients with invasive adenocarcinoma (penetrating the bowel wall) tumors. The results showed that CCAT1 TO-PNA-MB is a powerful diagnostic tool for the specific identification of CRC, suggesting that with the aid of an appropriate pharmaceutical vehicle, real time in vivo imaging is feasible. TO-PNA-MB may enable identifying occult metastatic disease during surgery, or differentiating in real time in vivo imaging, between benign and malignant lesions. PMID:23416875

  4. A Dual-Sided Coded-Aperture Radiation Detection System , Nuclear Instruments & Methods in Physics Research Section A-Accelerators Spectrometers Detectors and Associated Equipment

    SciTech Connect

    Ziock, Klaus-Peter; Fabris, Lorenzo

    2010-01-01

    We report the development of a large-area, mobile, coded-aperture radiation imaging system for localizing compact radioactive sources in three dimensions while rejecting distributed background. The 3D Stand-Off Radiation Detection System (SORDS-3D) has been tested at speeds up to 95 km/h and has detected and located sources in the millicurie range at distances of over 100 m. Radiation data are imaged to a geospatially mapped world grid with a nominal 1.25- to 2.5-m pixel pitch at distances out to 120 m on either side of the platform. Source elevation is also extracted. Imaged radiation alarms are superimposed on a side-facing video log that can be played back for direct localization of sources in buildings in urban environments. The system utilizes a 37-element array of 5 x 5 x 50 cm{sup 3} cesium-iodide (sodium) detectors. Scintillation light is collected by a pair of photomultiplier tubes placed at either end of each detector, with the detectors achieving an energy resolution of 6.15% FWHM (662 keV) and a position resolution along their length of 5 cm FWHM. The imaging system generates a dual-sided two-dimensional image allowing users to efficiently survey a large area. Imaged radiation data and raw spectra are forwarded to the RadioNuclide Analysis Kit (RNAK), developed by our collaborators, for isotope ID. An intuitive real-time display aids users in performing searches. Detector calibration is dynamically maintained by monitoring the potassium-40 peak and digitally adjusting individual detector gains. We have recently realized improvements, both in isotope identification and in distinguishing compact sources from background, through the installation of optimal-filter reconstruction kernels.

  5. Detection of a long non-coding RNA (CCAT1) in living cells and human adenocarcinoma of colon tissues using FIT-PNA molecular beacons.

    PubMed

    Kam, Yossi; Rubinstein, Abraham; Naik, Shankar; Djavsarov, Irena; Halle, David; Ariel, Ilana; Gure, Ali O; Stojadinovic, Alexander; Pan, HongGuang; Tsivin, Victoria; Nissan, Aviram; Yavin, Eylon

    2014-09-28

    Although the function and mechanism of action of long non-coding RNAs (lncRNA) is still not completely known, studies have shown their potential role in the control of gene expression and regulation, in cellular proliferation and invasiveness at the transcriptional level via multiple mechanisms. Recently, colon cancer associated transcript 1 (CCAT1) lncRNA was found to be expressed in colorectal cancer (CRC) tumors but not in normal tissue. This study aimed to study the ability of a CCAT1-specific peptide nucleic acid (PNA) based molecular beacons (TO-PNA-MB) to serve as a diagnostic probe for in vitro, ex vivo, and in situ (human colon biopsies) detection of CRC. The data showed enhanced fluorescence upon in vitro hybridization to RNA extracted from CCAT1 expressing cells (HT-29, SW-480) compared to control cells (SK-Mel-2). Uptake of TO-PNA-MBs into cells was achieved by covalently attaching cell penetrating peptides (CPPs) to the TO-PNA-MB probes. In situ hybridization of selected TO-PNA-MB in human CRC specimens was shown to detect CCAT1 expression in all (4/4) subjects with pre-cancerous adenomas, and in all (8/8) patients with invasive adenocarcinoma (penetrating the bowel wall) tumors. The results showed that CCAT1 TO-PNA-MB is a powerful diagnostic tool for the specific identification of CRC, suggesting that with the aid of an appropriate pharmaceutical vehicle, real time in vivo imaging is feasible. TO-PNA-MB may enable identifying occult metastatic disease during surgery, or differentiating in real time in vivo imaging, between benign and malignant lesions.

  6. Genome-Wide Detection of Predicted Non-coding RNAs Related to the Adhesion Process in Vibrio alginolyticus Using High-Throughput Sequencing

    PubMed Central

    Huang, Lixing; Hu, Jiao; Su, Yongquan; Qin, Yingxue; Kong, Wendi; Zhao, Lingmin; Ma, Ying; Xu, Xiaojin; Lin, Mao; Zheng, Jiang; Yan, Qingpi

    2016-01-01

    The ability of bacteria to adhere to fish mucus can be affected by environmental conditions and is considered to be a key virulence factor of Vibrio alginolyticus. However, the molecular mechanism underlying this ability remains unclear. Our previous study showed that stress conditions such as exposure to Cu, Pb, Hg, and low pH are capable of reducing the adhesion ability of V. alginolyticus. Non-coding RNAs (ncRNAs) play a crucial role in the intricate regulation of bacterial gene expression, thereby affecting bacterial pathogenicity. Thus, we hypothesized that ncRNAs play a key role in the V. alginolyticus adhesion process. To validate this, we combined high-throughput sequencing with computational techniques to detect ncRNA dynamics in samples after stress treatments. The expression of randomly selected novel ncRNAs was confirmed by QPCR. Among the significantly altered ncRNAs, 30 were up-regulated and 2 down-regulated by all stress treatments. The QPCR results reinforced the reliability of the sequencing data. Target prediction and KEGG pathway analysis indicated that these ncRNAs are closely related to pathways associated with in vitro adhesion, and our results indicated that chemical stress-induced reductions in the adhesion ability of V. alginolyticus might be due to the perturbation of ncRNA expression. Our findings provide important information for further functional characterization of ncRNAs during the adhesion process of V. alginolyticus. PMID:27199948

  7. Detection of genetic diversity and selection at the coding region of the melanocortin receptor 1 (MC1R) gene in Tibetan pigs and Landrace pigs.

    PubMed

    Liu, Rui; Jin, Long; Long, Keren; Chai, Jie; Ma, Jideng; Tang, Qianzi; Tian, Shilin; Hu, Yaodong; Lin, Ling; Wang, Xun; Jiang, Anan; Li, Xuewei; Li, Mingzhou

    2016-01-10

    Domestication and subsequent selective pressures have produced a large variety of pig coat colors in different regions and breeds. The melanocortin 1 receptor (MC1R) gene plays a crucial role in determining coat color of mammals. Here, we investigated genetic diversity and selection at the coding region of the porcine melanocortin receptor 1 (MC1R) in Tibetan pigs and Landrace pigs. By contrast, genetic variability was much lower in Landrace pigs than in Tibetan pigs. Meanwhile, haplotype analysis showed that Tibetan pigs possessed shared haplotypes, suggesting a possibility of recent introgression event by way of crossbreeding with neighboring domestic pigs or shared ancestral polymorphism. Additionally, we detected positive selection at the MC1R in both Tibetan pigs and Landrace pigs through the dN/dS analysis. These findings suggested that novel phenotypic change (dark coat color) caused by novel mutations may help Tibetan pigs against intensive solar ultraviolet (UV) radiation and camouflage in wild environment, whereas white coat color in Landrace were intentionally selected by human after domestication. Furthermore, both the phylogenetic analysis and the network analysis provided clues that MC1R in Asian and European wild boars may have initially experienced different selective pressures, and MC1R alleles diversified in modern domesticated pigs. PMID:26431999

  8. Fine-Mapping the HOXB Region Detects Common Variants Tagging a Rare Coding Allele: Evidence for Synthetic Association in Prostate Cancer

    PubMed Central

    Saunders, Edward J.; Dadaev, Tokhir; Leongamornlert, Daniel A.; Jugurnauth-Little, Sarah; Tymrakiewicz, Malgorzata; Wiklund, Fredrik; Al Olama, Ali Amin; Benlloch, Sara; Xu, Jianfeng; Mikropoulos, Christos; Goh, Chee; Govindasami, Koveela; Guy, Michelle; Wilkinson, Rosemary A.; Sawyer, Emma J.; Morgan, Angela; Easton, Douglas F.; Muir, Ken; Eeles, Rosalind A.; Kote-Jarai, Zsofia

    2014-01-01

    The HOXB13 gene has been implicated in prostate cancer (PrCa) susceptibility. We performed a high resolution fine-mapping analysis to comprehensively evaluate the association between common genetic variation across the HOXB genetic locus at 17q21 and PrCa risk. This involved genotyping 700 SNPs using a custom Illumina iSelect array (iCOGS) followed by imputation of 3195 SNPs in 20,440 PrCa cases and 21,469 controls in The PRACTICAL consortium. We identified a cluster of highly correlated common variants situated within or closely upstream of HOXB13 that were significantly associated with PrCa risk, described by rs117576373 (OR 1.30, P = 2.62×10−14). Additional genotyping, conditional regression and haplotype analyses indicated that the newly identified common variants tag a rare, partially correlated coding variant in the HOXB13 gene (G84E, rs138213197), which has been identified recently as a moderate penetrance PrCa susceptibility allele. The potential for GWAS associations detected through common SNPs to be driven by rare causal variants with higher relative risks has long been proposed; however, to our knowledge this is the first experimental evidence for this phenomenon of synthetic association contributing to cancer susceptibility. PMID:24550738

  9. Fine-mapping the HOXB region detects common variants tagging a rare coding allele: evidence for synthetic association in prostate cancer.

    PubMed

    Saunders, Edward J; Dadaev, Tokhir; Leongamornlert, Daniel A; Jugurnauth-Little, Sarah; Tymrakiewicz, Malgorzata; Wiklund, Fredrik; Al Olama, Ali Amin; Benlloch, Sara; Neal, David E; Hamdy, Freddie C; Donovan, Jenny L; Giles, Graham G; Severi, Gianluca; Gronberg, Henrik; Aly, Markus; Haiman, Christopher A; Schumacher, Fredrick; Henderson, Brian E; Lindstrom, Sara; Kraft, Peter; Hunter, David J; Gapstur, Susan; Chanock, Stephen; Berndt, Sonja I; Albanes, Demetrius; Andriole, Gerald; Schleutker, Johanna; Weischer, Maren; Nordestgaard, Børge G; Canzian, Federico; Campa, Daniele; Riboli, Elio; Key, Tim J; Travis, Ruth C; Ingles, Sue A; John, Esther M; Hayes, Richard B; Pharoah, Paul; Khaw, Kay-Tee; Stanford, Janet L; Ostrander, Elaine A; Signorello, Lisa B; Thibodeau, Stephen N; Schaid, Daniel; Maier, Christiane; Kibel, Adam S; Cybulski, Cezary; Cannon-Albright, Lisa; Brenner, Hermann; Park, Jong Y; Kaneva, Radka; Batra, Jyotsna; Clements, Judith A; Teixeira, Manuel R; Xu, Jianfeng; Mikropoulos, Christos; Goh, Chee; Govindasami, Koveela; Guy, Michelle; Wilkinson, Rosemary A; Sawyer, Emma J; Morgan, Angela; Easton, Douglas F; Muir, Ken; Eeles, Rosalind A; Kote-Jarai, Zsofia

    2014-02-01

    The HOXB13 gene has been implicated in prostate cancer (PrCa) susceptibility. We performed a high resolution fine-mapping analysis to comprehensively evaluate the association between common genetic variation across the HOXB genetic locus at 17q21 and PrCa risk. This involved genotyping 700 SNPs using a custom Illumina iSelect array (iCOGS) followed by imputation of 3195 SNPs in 20,440 PrCa cases and 21,469 controls in The PRACTICAL consortium. We identified a cluster of highly correlated common variants situated within or closely upstream of HOXB13 that were significantly associated with PrCa risk, described by rs117576373 (OR 1.30, P = 2.62×10(-14)). Additional genotyping, conditional regression and haplotype analyses indicated that the newly identified common variants tag a rare, partially correlated coding variant in the HOXB13 gene (G84E, rs138213197), which has been identified recently as a moderate penetrance PrCa susceptibility allele. The potential for GWAS associations detected through common SNPs to be driven by rare causal variants with higher relative risks has long been proposed; however, to our knowledge this is the first experimental evidence for this phenomenon of synthetic association contributing to cancer susceptibility. PMID:24550738

  10. Learning Vector Quantization Neural Networks Improve Accuracy of Transcranial Color-coded Duplex Sonography in Detection of Middle Cerebral Artery Spasm—Preliminary Report

    PubMed Central

    Swiercz, Miroslaw; Kochanowicz, Jan; Weigele, John; Hurst, Robert; Liebeskind, David S.; Mariak, Zenon; Melhem, Elias R.

    2009-01-01

    To determine the performance of an artificial neural network in transcranial color-coded duplex sonography (TCCS) diagnosis of middle cerebral artery (MCA) spasm. TCCS was prospectively acquired within 2 h prior to routine cerebral angiography in 100 consecutive patients (54M:46F, median age 50 years). Angiographic MCA vasospasm was classified as mild (<25% of vessel caliber reduction), moderate (25–50%), or severe (>50%). A Learning Vector Quantization neural network classified MCA spasm based on TCCS peak-systolic, mean, and end-diastolic velocity data. During a four-class discrimination task, accurate classification by the network ranged from 64.9% to 72.3%, depending on the number of neurons in the Kohonen layer. Accurate classification of vasospasm ranged from 79.6% to 87.6%, with an accuracy of 84.7% to 92.1% for the detection of moderate-to-severe vasospasm. An artificial neural network may increase the accuracy of TCCS in diagnosis of MCA spasm. PMID:18704768

  11. The Unknown Computer Viruses Detection Based on Similarity

    NASA Astrophysics Data System (ADS)

    Liu, Zhongda; Nakaya, Naoshi; Koui, Yuuji

    New computer viruses are continually being generated and they cause damage all over the world. In general, current anti-virus software detects viruses by matching a pattern based on the signature; thus, unknown viruses without any signature cannot be detected. Although there are some static analysis technologies that do not depend on signatures, virus writers often use code obfuscation techniques, which make it difficult to execute a code analysis. As is generally known, unknown viruses and known viruses share a common feature. In this paper we propose a new static analysis technology that can circumvent code obfuscation to extract the common feature and detect unknown viruses based on similarity. The results of evaluation experiments demonstrated that this technique is able to detect unknown viruses without false positives.

  12. Remote procedure execution software for distributed systems

    SciTech Connect

    Petravick, D.L.; Berman, E.F.; Sergey, G.P.

    1989-05-01

    Remote Procedure Execution facilitates the construction of distributed software systems, spanning computers of various types. Programmers who use the RPX package specify subroutine calls which are to be executed on a remote computer. RPX is used to generate code for dummy routines which transmit input parameters and receive output parameters, as well as a main program which receives procedure call requests, calls the requested procedure, and returns the result. The package automatically performs datatype conversions and uses an appropriate connection oriented protocol. Supported operating systems/processors are VMS(VAX), UNIX(MIPS R2000, R3000) and Software Components Group's pSOS (680x0). Connection oriented protocols are supported over Ethernet (TCP/IP) and RS232 (a package of our own design). 2 refs., 2 figs.

  13. What executives should remember.

    PubMed

    Drucker, Peter F

    2006-02-01

    In more than 30 essays for Harvard Business Review, Peter Drucker (1909-2005) urged readers to take on the hard work of thinking--always combined, he insisted, with decisive action. He closely analyzed the phenomenon of knowledge work--the growing call for employees who use their minds rather than their hands--and explained how it challenged the conventional wisdom about the way organizations should be run. He was intrigued by employees who knew more about certain subjects than their bosses or colleagues but who still had to cooperate with others in a large organization. As the business world matured in the second half of the twentieth century, executives came to think that they knew how to run companies--and Drucker took it upon himself to poke holes in their assumptions, lest organizations become stale. But he did so sympathetically, operating from the premise that his readers were intelligent, hardworking people of goodwill. Well suited to HBR's format of practical, idea-based essays for executives, his clear-eyed, humanistic writing enriched the magazine time and again. This article is a compilation of the savviest management advice Drucker offered HBR readers over the years--in short, his greatest hits. It revisits the following insightful, influential contributions: "The Theory of the Business" (September-October 1994), "Managing for Business Effectiveness" (May-June 1963), "What Business Can Learn from Nonprofits" (July-August 1989), "The New Society of Organizations" (September-October 1992), "The Information Executives Truly Need" (January-February 1995), "Managing Oneself" (March-April 1999 republished January 2005), "They're Not Employees, They're People" (February 2002), "What Makes an Effective Executive" (June 2004).

  14. Nurses executive characteristics. Gender differences.

    PubMed

    Rozier, C K

    1996-12-01

    Do male nurse executives working in a female-dominated profession adopt more of the female leadership characteristics? A study investigates gender differences of nurse executives on a variety of managerial attributes: sex role, supervision, power, career commitment and work/family conflict. Results also were compared to executives of other professions.

  15. Design of Cyber Attack Precursor Symptom Detection Algorithm through System Base Behavior Analysis and Memory Monitoring

    NASA Astrophysics Data System (ADS)

    Jung, Sungmo; Kim, Jong Hyun; Cagalaban, Giovanni; Lim, Ji-Hoon; Kim, Seoksoo

    More recently, botnet-based cyber attacks, including a spam mail or a DDos attack, have sharply increased, which poses a fatal threat to Internet services. At present, antivirus businesses make it top priority to detect malicious code in the shortest time possible (Lv.2), based on the graph showing a relation between spread of malicious code and time, which allows them to detect after malicious code occurs. Despite early detection, however, it is not possible to prevent malicious code from occurring. Thus, we have developed an algorithm that can detect precursor symptoms at Lv.1 to prevent a cyber attack using an evasion method of 'an executing environment aware attack' by analyzing system behaviors and monitoring memory.

  16. Bitplane Image Coding With Parallel Coefficient Processing.

    PubMed

    Auli-Llinas, Francesc; Enfedaque, Pablo; Moure, Juan C; Sanchez, Victor

    2016-01-01

    Image coding systems have been traditionally tailored for multiple instruction, multiple data (MIMD) computing. In general, they partition the (transformed) image in codeblocks that can be coded in the cores of MIMD-based processors. Each core executes a sequential flow of instructions to process the coefficients in the codeblock, independently and asynchronously from the others cores. Bitplane coding is a common strategy to code such data. Most of its mechanisms require sequential processing of the coefficients. The last years have seen the upraising of processing accelerators with enhanced computational performance and power efficiency whose architecture is mainly based on the single instruction, multiple data (SIMD) principle. SIMD computing refers to the execution of the same instruction to multiple data in a lockstep synchronous way. Unfortunately, current bitplane coding strategies cannot fully profit from such processors due to inherently sequential coding task. This paper presents bitplane image coding with parallel coefficient (BPC-PaCo) processing, a coding method that can process many coefficients within a codeblock in parallel and synchronously. To this end, the scanning order, the context formation, the probability model, and the arithmetic coder of the coding engine have been re-formulated. The experimental results suggest that the penalization in coding performance of BPC-PaCo with respect to the traditional strategies is almost negligible.

  17. 75 FR 68385 - Senior Executive Service-Performance Review Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-05

    .... FOR FURTHER INFORMATION CONTACT: Tammy Van Keuren, OPM Human Resources, Recruitment and Staffing... Management, one or more SES performance review boards. The board reviews and evaluates the initial appraisal... Associate Director for Human Resources--Executive Secretariat. BILLING CODE 6325-39-P...

  18. From Verified Models to Verifiable Code

    NASA Technical Reports Server (NTRS)

    Lensink, Leonard; Munoz, Cesar A.; Goodloe, Alwyn E.

    2009-01-01

    Declarative specifications of digital systems often contain parts that can be automatically translated into executable code. Automated code generation may reduce or eliminate the kinds of errors typically introduced through manual code writing. For this approach to be effective, the generated code should be reasonably efficient and, more importantly, verifiable. This paper presents a prototype code generator for the Prototype Verification System (PVS) that translates a subset of PVS functional specifications into an intermediate language and subsequently to multiple target programming languages. Several case studies are presented to illustrate the tool's functionality. The generated code can be analyzed by software verification tools such as verification condition generators, static analyzers, and software model-checkers to increase the confidence that the generated code is correct.

  19. 3 CFR 13541 - Executive Order 13541 of May 7, 2010. Temporary Organization To Facilitate a Strategic...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Documents Executive Orders Executive Order 13541 of May 7, 2010 EO 13541 Temporary Organization To... 3161 of title 5, United States Code, a temporary organization to be known as the Iraq Strategic Partnership Office (ISPO). Sec. 2. Purpose of the Temporary Organization. The purpose of the ISPO shall be...

  20. 77 FR 47489 - Notice of Senior Executive Service Performance Review Board Membership

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-08

    ... Review Board which oversees the evaluation of performance appraisals of Senior Executive Service members..., 2012. Reginald F. Wells, Deputy Commissioner for Human Resources. BILLING CODE 4191-02-P ... ADMINISTRATION Notice of Senior Executive Service Performance Review Board Membership AGENCY: Social...

  1. 78 FR 36011 - Notice of Senior Executive Service Performance Review Board Membership

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-14

    ... Performance Review Board which oversees the evaluation of performance appraisals of Senior Executive Service...* *New Member Reginald F. Wells, Deputy Commissioner for Human Resources. BILLING CODE 4191-02-P ... ADMINISTRATION Notice of Senior Executive Service Performance Review Board Membership AGENCY: Social...

  2. 75 FR 48407 - Notice of Senior Executive Service Performance Review Board Membership

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-10

    ... Review Board which oversees the evaluation of performance appraisals of Senior Executive Service members... member. Dated: August 4, 2010. Reginald F. Wells, Deputy Commissioner for Human Resources. BILLING CODE... ADMINISTRATION Notice of Senior Executive Service Performance Review Board Membership AGENCY: Social...

  3. Speech coding

    SciTech Connect

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  4. The Cheerleaders' Mock Execution

    ERIC Educational Resources Information Center

    Trujillo-Jenks, Laura

    2011-01-01

    The fervor of student speech is demonstrated through different mediums and venues in public schools. In this case, a new principal encounters the mores of a community that believes in free speech, specifically student free speech. When a pep rally becomes a venue for hate speech, terroristic threats, and profanity, the student code of conduct…

  5. On Nondeterministic Workflow Executions

    NASA Astrophysics Data System (ADS)

    Potapova, Alexandra; Su, Jianwen

    The ability to compose existing services to form new functionality is one of the most promising ideas enabled by SOA and the framework of (web) services. A composition or a workflow often involves services distributed over a network and possibly many organizations and administrative domains. Nondeterminism could occur in a composition in at least two ways. The first form is the result of modeling abstraction that hides the detail information and thus makes the "computation" appear non-deterministic. The second form is closely related to "operational optimization", e.g., one may try to invoke more than multiple services for a task, whichever completes first will produce the result and preempts all other services. In this paper, we focus on the latter and measure the complexity of service execution as the amount of needed resources and controlling mechanism for executing nondeterministic service compositions. We formalize the model and complexity problem and develop technical results for this problem in the general setting as well as special cases.

  6. Parallelized direct execution simulation of message-passing parallel programs

    NASA Technical Reports Server (NTRS)

    Dickens, Phillip M.; Heidelberger, Philip; Nicol, David M.

    1994-01-01

    As massively parallel computers proliferate, there is growing interest in findings ways by which performance of massively parallel codes can be efficiently predicted. This problem arises in diverse contexts such as parallelizing computers, parallel performance monitoring, and parallel algorithm development. In this paper we describe one solution where one directly executes the application code, but uses a discrete-event simulator to model details of the presumed parallel machine such as operating system and communication network behavior. Because this approach is computationally expensive, we are interested in its own parallelization specifically the parallelization of the discrete-event simulator. We describe methods suitable for parallelized direct execution simulation of message-passing parallel programs, and report on the performance of such a system, Large Application Parallel Simulation Environment (LAPSE), we have built on the Intel Paragon. On all codes measured to date, LAPSE predicts performance well typically within 10 percent relative error. Depending on the nature of the application code, we have observed low slowdowns (relative to natively executing code) and high relative speedups using up to 64 processors.

  7. Relations between Short-term Memory Deficits, Semantic Processing, and Executive Function

    PubMed Central

    Allen, Corinne M.; Martin, Randi C.; Martin, Nadine

    2012-01-01

    Background Previous research has suggested separable short-term memory (STM) buffers for the maintenance of phonological and lexical-semantic information, as some patients with aphasia show better ability to retain semantic than phonological information and others show the reverse. Recently, researchers have proposed that deficits to the maintenance of semantic information in STM are related to executive control abilities. Aims The present study investigated the relationship of executive function abilities with semantic and phonological short-term memory (STM) and semantic processing in such patients, as some previous research has suggested that semantic STM deficits and semantic processing abilities are critically related to specific or general executive function deficits. Method and Procedures 20 patients with aphasia and STM deficits were tested on measures of short-term retention, semantic processing, and both complex and simple executive function tasks. Outcome and Results In correlational analyses, we found no relation between semantic STM and performance on simple or complex executive function tasks. In contrast, phonological STM was related to executive function performance in tasks that had a verbal component, suggesting that performance in some executive function tasks depends on maintaining or rehearsing phonological codes. Although semantic STM was not related to executive function ability, performance on semantic processing tasks was related to executive function, perhaps due to similar executive task requirements in both semantic processing and executive function tasks. Conclusions Implications for treatment and interpretations of executive deficits are discussed. PMID:22736889

  8. MCNP code

    SciTech Connect

    Cramer, S.N.

    1984-01-01

    The MCNP code is the major Monte Carlo coupled neutron-photon transport research tool at the Los Alamos National Laboratory, and it represents the most extensive Monte Carlo development program in the United States which is available in the public domain. The present code is the direct descendent of the original Monte Carlo work of Fermi, von Neumaum, and Ulam at Los Alamos in the 1940s. Development has continued uninterrupted since that time, and the current version of MCNP (or its predecessors) has always included state-of-the-art methods in the Monte Carlo simulation of radiation transport, basic cross section data, geometry capability, variance reduction, and estimation procedures. The authors of the present code have oriented its development toward general user application. The documentation, though extensive, is presented in a clear and simple manner with many examples, illustrations, and sample problems. In addition to providing the desired results, the output listings give a a wealth of detailed information (some optional) concerning each state of the calculation. The code system is continually updated to take advantage of advances in computer hardware and software, including interactive modes of operation, diagnostic interrupts and restarts, and a variety of graphical and video aids.

  9. QR Codes

    ERIC Educational Resources Information Center

    Lai, Hsin-Chih; Chang, Chun-Yen; Li, Wen-Shiane; Fan, Yu-Lin; Wu, Ying-Tien

    2013-01-01

    This study presents an m-learning method that incorporates Integrated Quick Response (QR) codes. This learning method not only achieves the objectives of outdoor education, but it also increases applications of Cognitive Theory of Multimedia Learning (CTML) (Mayer, 2001) in m-learning for practical use in a diverse range of outdoor locations. When…

  10. Translating expert system rules into Ada code with validation and verification

    NASA Technical Reports Server (NTRS)

    Becker, Lee; Duckworth, R. James; Green, Peter; Michalson, Bill; Gosselin, Dave; Nainani, Krishan; Pease, Adam

    1991-01-01

    The purpose of this ongoing research and development program is to develop software tools which enable the rapid development, upgrading, and maintenance of embedded real-time artificial intelligence systems. The goals of this phase of the research were to investigate the feasibility of developing software tools which automatically translate expert system rules into Ada code and develop methods for performing validation and verification testing of the resultant expert system. A prototype system was demonstrated which automatically translated rules from an Air Force expert system was demonstrated which detected errors in the execution of the resultant system. The method and prototype tools for converting AI representations into Ada code by converting the rules into Ada code modules and then linking them with an Activation Framework based run-time environment to form an executable load module are discussed. This method is based upon the use of Evidence Flow Graphs which are a data flow representation for intelligent systems. The development of prototype test generation and evaluation software which was used to test the resultant code is discussed. This testing was performed automatically using Monte-Carlo techniques based upon a constraint based description of the required performance for the system.

  11. Perspectives on executive relationships: influence.

    PubMed

    Keys, Yolanda

    2011-09-01

    This department, sponsored by AONE, presents information to assist nurse leaders in shaping the future of healthcare through creative and innovative leadership. The strategic priorities of AONE anchor the editorial content. They reflect contemporary healthcare and nursing practice issues that challenge nurse executives as they strive to meet the needs of patients. In this article, the author presents the views of 6 Magnet hospital chief nursing executives regarding their relationships with executive-level colleagues.

  12. Television and children's executive function.

    PubMed

    Lillard, Angeline S; Li, Hui; Boguszewski, Katie

    2015-01-01

    Children spend a lot of time watching television on its many platforms: directly, online, and via videos and DVDs. Many researchers are concerned that some types of television content appear to negatively influence children's executive function. Because (1) executive function predicts key developmental outcomes, (2) executive function appears to be influenced by some television content, and (3) American children watch large quantities of television (including the content of concern), the issues discussed here comprise a crucial public health issue. Further research is needed to reveal exactly what television content is implicated, what underlies television's effect on executive function, how long the effect lasts, and who is affected.

  13. Plan Execution Interchange Language (PLEXIL)

    NASA Technical Reports Server (NTRS)

    Estlin, Tara; Jonsson, Ari; Pasareanu, Corina; Simmons, Reid; Tso, Kam; Verma, Vandi

    2006-01-01

    Plan execution is a cornerstone of spacecraft operations, irrespective of whether the plans to be executed are generated on board the spacecraft or on the ground. Plan execution frameworks vary greatly, due to both different capabilities of the execution systems, and relations to associated decision-making frameworks. The latter dependency has made the reuse of execution and planning frameworks more difficult, and has all but precluded information sharing between different execution and decision-making systems. As a step in the direction of addressing some of these issues, a general plan execution language, called the Plan Execution Interchange Language (PLEXIL), is being developed. PLEXIL is capable of expressing concepts used by many high-level automated planners and hence provides an interface to multiple planners. PLEXIL includes a domain description that specifies command types, expansions, constraints, etc., as well as feedback to the higher-level decision-making capabilities. This document describes the grammar and semantics of PLEXIL. It includes a graphical depiction of this grammar and illustrative rover scenarios. It also outlines ongoing work on implementing a universal execution system, based on PLEXIL, using state-of-the-art rover functional interfaces and planners as test cases.

  14. Circular codes, symmetries and transformations.

    PubMed

    Fimmel, Elena; Giannerini, Simone; Gonzalez, Diego Luis; Strüngmann, Lutz

    2015-06-01

    Circular codes, putative remnants of primeval comma-free codes, have gained considerable attention in the last years. In fact they represent a second kind of genetic code potentially involved in detecting and maintaining the normal reading frame in protein coding sequences. The discovering of an universal code across species suggested many theoretical and experimental questions. However, there is a key aspect that relates circular codes to symmetries and transformations that remains to a large extent unexplored. In this article we aim at addressing the issue by studying the symmetries and transformations that connect different circular codes. The main result is that the class of 216 C3 maximal self-complementary codes can be partitioned into 27 equivalence classes defined by a particular set of transformations. We show that such transformations can be put in a group theoretic framework with an intuitive geometric interpretation. More general mathematical results about symmetry transformations which are valid for any kind of circular codes are also presented. Our results pave the way to the study of the biological consequences of the mathematical structure behind circular codes and contribute to shed light on the evolutionary steps that led to the observed symmetries of present codes. PMID:25008961

  15. TRAPEDS: Producing traces for multicomputers via execution-driven simulation

    NASA Technical Reports Server (NTRS)

    Stunkel, Craig B.; Fuchs, W. Kent

    1988-01-01

    Trace-driven simulation is an important aid in performance analysis of computer systems. Capturing address traces for these simulations is a difficult problem for single processors and particularly for multicomputers. Even when existing trace methods can be used on multicomputers, the amount of collected data typically grows with the number of processors, so I/O and trace storage costs increase. A new technique is presented which modifies the executable code to dynamically collect the address trace from the user code and analyzes this trace during the execution of the program. This method helps resolve the I/O and storage problems and facilitates parallel analysis of the address trace. If a trace stored on disk is desired, the generated trace information can also be written to files during execution, with a resultant drop in program execution speed. An initial implementation on the Intel iPSC/2 hypercube multicomputer is detailed, and sample simulation results are presented. The effect of this trace collection method on execution time is illustrated.

  16. TRAPEDS - Producing traces for multicomputers via execution driven simulation

    NASA Technical Reports Server (NTRS)

    Stunkel, Craig B.; Fuchs, W. Kent

    1989-01-01

    Trace-driven simulation is an important aid in performance analysis of computer systems. Capturing address traces for these simulations is a difficult problem for single processors and particularly for multicomputers. Even when existing trace methods can be used on multicomputers, the amount of collected data typically grows with the number of processors, so I/O and trace storage costs increase. A new technique is presented which modifies the executable code to dynamically collect the address trace from the user code and analyzes this trace during the execution of the program. This method helps resolve the I/O and storage problems and facilitates parallel analysis of the address trace. If a trace stored on disk is desired, the generated trace information can also be written to files during execution, with a resultant drop in program execution speed. An initial implementation on the Intel iPSC/2 hypercube multicomputer is detailed, and sample simulation results are presented. The effect of this trace collection method on execution time is illustrated.

  17. Code query by example

    NASA Astrophysics Data System (ADS)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  18. Model-free execution monitoring in behavior-based robotics.

    PubMed

    Pettersson, Ola; Karlsson, Lars; Saffiotti, Alessandro

    2007-08-01

    In the near future, autonomous mobile robots are expected to help humans by performing service tasks in many different areas, including personal assistance, transportation, cleaning, mining, or agriculture. In order to manage these tasks in a changing and partially unpredictable environment without the aid of humans, the robot must have the ability to plan its actions and to execute them robustly and safely. The robot must also have the ability to detect when the execution does not proceed as planned and to correctly identify the causes of the failure. An execution monitoring system allows the robot to detect and classify these failures. Most current approaches to execution monitoring in robotics are based on the idea of predicting the outcomes of the robot's actions by using some sort of predictive model and comparing the predicted outcomes with the observed ones. In contrary, this paper explores the use of model-free approaches to execution monitoring, that is, approaches that do not use predictive models. In this paper, we show that pattern recognition techniques can be applied to realize model-free execution monitoring by classifying observed behavioral patterns into normal or faulty execution. We investigate the use of several such techniques and verify their utility in a number of experiments involving the navigation of a mobile robot in indoor environments.

  19. Higher-Performance Executives: Bringing Executive Development Programs Into Balance

    ERIC Educational Resources Information Center

    Gilad, Benjamin; Chussil, Mark

    2013-01-01

    Executive development programs teach various skills deemed important in future leaders and help shape future leadership and its performance. However, they are often excessively focused on competencies required for dealing with internal issues and relationships. They do a much less admirable job preparing future executives for the unique skills…

  20. Malware detection and analysis

    DOEpatents

    Chiang, Ken; Lloyd, Levi; Crussell, Jonathan; Sanders, Benjamin; Erickson, Jeremy Lee; Fritz, David Jakob

    2016-03-22

    Embodiments of the invention describe systems and methods for malicious software detection and analysis. A binary executable comprising obfuscated malware on a host device may be received, and incident data indicating a time when the binary executable was received and identifying processes operating on the host device may be recorded. The binary executable is analyzed via a scalable plurality of execution environments, including one or more non-virtual execution environments and one or more virtual execution environments, to generate runtime data and deobfuscation data attributable to the binary executable. At least some of the runtime data and deobfuscation data attributable to the binary executable is stored in a shared database, while at least some of the incident data is stored in a private, non-shared database.

  1. Execution time support for scientific programs on distributed memory machines

    NASA Technical Reports Server (NTRS)

    Berryman, Harry; Saltz, Joel; Scroggs, Jeffrey

    1990-01-01

    Optimizations are considered that are required for efficient execution of code segments that consists of loops over distributed data structures. The PARTI (Parallel Automated Runtime Toolkit at ICASE) execution time primitives are designed to carry out these optimizations and can be used to implement a wide range of scientific algorithms on distributed memory machines. These primitives allow the user to control array mappings in a way that gives an appearance of shared memory. Computations can be based on a global index set. Primitives are used to carry out gather and scatter operations on distributed arrays. Communications patterns are derived at runtime, and the appropriate send and receive messages are automatically generated.

  2. Effects of Acute Laboratory Stress on Executive Functions

    PubMed Central

    Starcke, Katrin; Wiesen, Carina; Trotzke, Patrick; Brand, Matthias

    2016-01-01

    Recent research indicates that stress can affect executive functioning. However, previous results are mixed with respect to the direction and size of effects, especially when considering different subcomponents of executive functions. The current study systematically investigates the effects of stress on the five components of executive functions proposed by Smith and Jonides (1999): attention and inhibition; task management; planning; monitoring; and coding. Healthy participants (N = 40) were either exposed to the computerized version of the Paced Auditory Serial Addition Test as a stressor (N = 20), or to a rest condition (N = 20). Stress reactions were assessed with heart rate and subjective measures. After the experimental manipulation, all participants performed tasks that measure the different executive functions. The manipulation check indicates that stress induction was successful (i.e., the stress group showed a higher heart rate and higher subjective responses than the control group). The main results demonstrate that stressed participants show a poorer performance compared with unstressed participants in all executive subcomponents, with the exception of monitoring. Effect sizes for the tasks that reveal differences between stressed and unstressed participants are high. We conclude that the laboratory stressor used here overall reduced executive functioning. PMID:27065926

  3. Characteristics of the Federal Executive.

    ERIC Educational Resources Information Center

    Civil Service Commission, Washington, DC.

    The personal characteristics, educational background, occupations, and attitudes of 54 Federal Executives who attended Session IX of the Federal Executive Institute, U. S. Civil Service Commission, are given. The average age of the group was 47.6 years (range 36 to 61). The federal grades were 18% in GS-5, 66% in GS-16 and equivalent, and 16% in…

  4. Motor Execution Affects Action Prediction

    ERIC Educational Resources Information Center

    Springer, Anne; Brandstadter, Simone; Liepelt, Roman; Birngruber, Teresa; Giese, Martin; Mechsner, Franz; Prinz, Wolfgang

    2011-01-01

    Previous studies provided evidence of the claim that the prediction of occluded action involves real-time simulation. We report two experiments that aimed to study how real-time simulation is affected by simultaneous action execution under conditions of full, partial or no overlap between observed and executed actions. This overlap was analysed by…

  5. Developmental Changes in Executive Functioning

    ERIC Educational Resources Information Center

    Lee, Kerry; Bull, Rebecca; Ho, Ringo M. H.

    2013-01-01

    Although early studies of executive functioning in children supported Miyake et al.'s (2000) three-factor model, more recent findings supported a variety of undifferentiated or two-factor structures. Using a cohort-sequential design, this study examined whether there were age-related differences in the structure of executive functioning among…

  6. The Astrophysics Source Code Library: An Update

    NASA Astrophysics Data System (ADS)

    Allen, Alice; Nemiroff, R. J.; Shamir, L.; Teuben, P. J.

    2012-01-01

    The Astrophysics Source Code Library (ASCL), founded in 1999, takes an active approach to sharing astrophysical source code. ASCL's editor seeks out both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and adds entries for the found codes to the library. This approach ensures that source codes are added without requiring authors to actively submit them, resulting in a comprehensive listing that covers a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL moved to a new location in 2010, and has over 300 codes in it and continues to grow. In 2011, the ASCL (http://asterisk.apod.com/viewforum.php?f=35) has on average added 19 new codes per month; we encourage scientists to submit their codes for inclusion. An advisory committee has been established to provide input and guide the development and expansion of its new site, and a marketing plan has been developed and is being executed. All ASCL source codes have been used to generate results published in or submitted to a refereed journal and are freely available either via a download site or from an identified source. This presentation covers the history of the ASCL and examines the current state and benefits of the ASCL, the means of and requirements for including codes, and outlines its future plans.

  7. The Environment for Application Software Integration and Execution (EASIE) version 1.0. Volume 1: Executive overview

    NASA Technical Reports Server (NTRS)

    Rowell, Lawrence F.; Davis, John S.

    1989-01-01

    The Environment for Application Software Integration and Execution (EASIE) provides a methodology and a set of software utility programs to ease the task of coordinating engineering design and analysis codes. EASIE was designed to meet the needs of conceptual design engineers that face the task of integrating many stand-alone engineering analysis programs. Using EASIE, programs are integrated through a relational database management system. Volume 1, Executive Overview, gives an overview of the functions provided by EASIE and describes their use. Three operational design systems based upon the EASIE software are briefly described.

  8. Clinical neurology and executive dysfunction.

    PubMed

    Filley, C M

    2000-01-01

    Executive function is a uniquely human ability that permits an individual to plan, carry out, and monitor a sequence of actions that is intended to accomplish a goal. This crucial neurobehavioral capacity depends on the integrity of the frontal lobes, most importantly the dorsolateral prefrontal cortices and their connections. Executive dysfunction is associated with a wide range of neurologic disorders that affect these regions. In this paper, executive dysfunction is considered from the perspective of behavioral neurology, and the lesion method is employed to illustrate this impairment in a diverse group of disorders. Frontal system damage leading to disturbed executive function is common and clinically significant. Recognition of this syndrome is critical for ensuring the correct diagnosis, accurate prognosis, and appropriate treatment of affected patients. Executive dysfunction also represents an intriguing aspect of brain-behavior relationships and offers important insights into one of the highest cerebral functions. PMID:10879543

  9. Symbolically Modeling Concurrent MCAPI Executions

    NASA Technical Reports Server (NTRS)

    Fischer, Topher; Mercer, Eric; Rungta, Neha

    2011-01-01

    Improper use of Inter-Process Communication (IPC) within concurrent systems often creates data races which can lead to bugs that are challenging to discover. Techniques that use Satisfiability Modulo Theories (SMT) problems to symbolically model possible executions of concurrent software have recently been proposed for use in the formal verification of software. In this work we describe a new technique for modeling executions of concurrent software that use a message passing API called MCAPI. Our technique uses an execution trace to create an SMT problem that symbolically models all possible concurrent executions and follows the same sequence of conditional branch outcomes as the provided execution trace. We check if there exists a satisfying assignment to the SMT problem with respect to specific safety properties. If such an assignment exists, it provides the conditions that lead to the violation of the property. We show how our method models behaviors of MCAPI applications that are ignored in previously published techniques.

  10. MACSE: Multiple Alignment of Coding SEquences Accounting for Frameshifts and Stop Codons

    PubMed Central

    Ranwez, Vincent; Harispe, Sébastien; Delsuc, Frédéric; Douzery, Emmanuel J. P.

    2011-01-01

    Until now the most efficient solution to align nucleotide sequences containing open reading frames was to use indirect procedures that align amino acid translation before reporting the inferred gap positions at the codon level. There are two important pitfalls with this approach. Firstly, any premature stop codon impedes using such a strategy. Secondly, each sequence is translated with the same reading frame from beginning to end, so that the presence of a single additional nucleotide leads to both aberrant translation and alignment. We present an algorithm that has the same space and time complexity as the classical Needleman-Wunsch algorithm while accommodating sequencing errors and other biological deviations from the coding frame. The resulting pairwise coding sequence alignment method was extended to a multiple sequence alignment (MSA) algorithm implemented in a program called MACSE (Multiple Alignment of Coding SEquences accounting for frameshifts and stop codons). MACSE is the first automatic solution to align protein-coding gene datasets containing non-functional sequences (pseudogenes) without disrupting the underlying codon structure. It has also proved useful in detecting undocumented frameshifts in public database sequences and in aligning next-generation sequencing reads/contigs against a reference coding sequence. MACSE is distributed as an open-source java file executable with freely available source code and can be used via a web interface at: http://mbb.univ-montp2.fr/macse. PMID:21949676

  11. Memory, executive, and multidomain subtle cognitive impairment

    PubMed Central

    Toledo, Jon B.; Bjerke, Maria; Chen, Kewei; Rozycki, Martin; Jack, Clifford R.; Weiner, Michael W.; Arnold, Steven E.; Reiman, Eric M.; Davatzikos, Christos; Shaw, Leslie M.

    2015-01-01

    Objective: We studied the biomarker signatures and prognoses of 3 different subtle cognitive impairment (SCI) groups (executive, memory, and multidomain) as well as the subjective memory complaints (SMC) group. Methods: We studied 522 healthy controls in the Alzheimer's Disease Neuroimaging Initiative (ADNI). Cutoffs for executive, memory, and multidomain SCI were defined using participants who remained cognitively normal (CN) for 7 years. CSF Alzheimer disease (AD) biomarkers, composite and region-of-interest (ROI) MRI, and fluorodeoxyglucose-PET measures were compared in these participants. Results: Using a stringent cutoff (fifth percentile), 27.6% of the ADNI participants were classified as SCI. Most single ROI or global-based measures were not sensitive to detect differences between groups. Only MRI-SPARE-AD (Spatial Pattern of Abnormalities for Recognition of Early AD), a quantitative MRI pattern-based global index, showed differences between all groups, excluding the executive SCI group. Atrophy patterns differed in memory SCI and SMC. The CN and the SMC groups presented a similar distribution of preclinical dementia stages. Fifty percent of the participants with executive, memory, and multidomain SCI progressed to mild cognitive impairment or dementia at 7, 5, and 2 years, respectively. Conclusions: Our results indicate that (1) the different SCI categories have different clinical prognoses and biomarker signatures, (2) longitudinally followed CN subjects are needed to establish clinical cutoffs, (3) subjects with SMC show a frontal pattern of brain atrophy, and (4) pattern-based analyses outperform commonly used single ROI-based neuroimaging biomarkers and are needed to detect initial stages of cognitive impairment. PMID:26085606

  12. Limits of Executive Control

    PubMed Central

    Verbruggen, Frederick; McAndrew, Amy; Weidemann, Gabrielle; Stevens, Tobias; McLaren, Ian P. L.

    2016-01-01

    Cognitive-control theories attribute action control to executive processes that modulate behavior on the basis of expectancy or task rules. In the current study, we examined corticospinal excitability and behavioral performance in a go/no-go task. Go and no-go trials were presented in runs of five, and go and no-go runs alternated predictably. At the beginning of each trial, subjects indicated whether they expected a go trial or a no-go trial. Analyses revealed that subjects immediately adjusted their expectancy ratings when a new run started. However, motor excitability was primarily associated with the properties of the previous trial, rather than the predicted properties of the current trial. We also observed a large latency cost at the beginning of a go run (i.e., reaction times were longer for the first trial in a go run than for the second trial). These findings indicate that actions in predictable environments are substantially influenced by previous events, even if this influence conflicts with conscious expectancies about upcoming events. PMID:27000177

  13. Disentangling motor execution from motor imagery with the phantom limb.

    PubMed

    Raffin, Estelle; Mattout, Jérémie; Reilly, Karen T; Giraux, Pascal

    2012-02-01

    Amputees can move their phantom limb at will. These 'movements without movements' have generally been considered as motor imagery rather than motor execution, but amputees can in fact perform both executed and imagined movements with their phantom and they report distinct perceptions during each task. Behavioural evidence for this dual ability comes from the fact that executed movements are associated with stump muscle contractions whereas imagined movements are not, and that phantom executed movements are slower than intact hand executed movements whereas the speed of imagined movements is identical for both hands. Since neither execution nor imagination produces any visible movement, we hypothesized that the perceptual difference between these two motor tasks relies on the activation of distinct cerebral networks. Using functional magnetic resonance imaging and changes in functional connectivity (dynamic causal modelling), we examined the activity associated with imagined and executed movements of the intact and phantom hands of 14 upper-limb amputees. Distinct but partially overlapping cerebral networks were active during both executed and imagined phantom limb movements (both performed at the same speed). A region of interest analysis revealed a 'switch' between execution and imagination; during execution there was more activity in the primary somatosensory cortex, the primary motor cortex and the anterior lobe of the cerebellum, while during imagination there was more activity in the parietal and occipital lobes, and the posterior lobe of the cerebellum. In overlapping areas, task-related differences were detected in the location of activation peaks. The dynamic causal modelling analysis further confirmed the presence of a clear neurophysiological distinction between imagination and execution, as motor imagery and motor execution had opposite effects on the supplementary motor area-primary motor cortex network. This is the first imaging evidence that the

  14. 1 CFR 12.2 - Code of Federal Regulations.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... REGISTER PUBLICATIONS OFFICIAL DISTRIBUTION WITHIN FEDERAL GOVERNMENT § 12.2 Code of Federal Regulations.... (b) Legislative, judicial, and executive agencies of the Federal Government may obtain additional... 1 General Provisions 1 2014-01-01 2012-01-01 true Code of Federal Regulations. 12.2 Section...

  15. 1 CFR 12.2 - Code of Federal Regulations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... REGISTER PUBLICATIONS OFFICIAL DISTRIBUTION WITHIN FEDERAL GOVERNMENT § 12.2 Code of Federal Regulations.... (b) Legislative, judicial, and executive agencies of the Federal Government may obtain additional... 1 General Provisions 1 2011-01-01 2011-01-01 false Code of Federal Regulations. 12.2 Section...

  16. 1 CFR 12.2 - Code of Federal Regulations.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... REGISTER PUBLICATIONS OFFICIAL DISTRIBUTION WITHIN FEDERAL GOVERNMENT § 12.2 Code of Federal Regulations.... (b) Legislative, judicial, and executive agencies of the Federal Government may obtain additional... 1 General Provisions 1 2012-01-01 2012-01-01 false Code of Federal Regulations. 12.2 Section...

  17. 1 CFR 12.2 - Code of Federal Regulations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... REGISTER PUBLICATIONS OFFICIAL DISTRIBUTION WITHIN FEDERAL GOVERNMENT § 12.2 Code of Federal Regulations.... (b) Legislative, judicial, and executive agencies of the Federal Government may obtain additional... 1 General Provisions 1 2010-01-01 2010-01-01 false Code of Federal Regulations. 12.2 Section...

  18. An improved algorithm for evaluating trellis phase codes

    NASA Technical Reports Server (NTRS)

    Mulligan, M. G.; Wilson, S. G.

    1984-01-01

    A method is described for evaluating the minimum distance parameters of trellis phase codes, including CPFSK, partial response FM, and more importantly, coded CPM (continuous phase modulation) schemes. The algorithm provides dramatically faster execution times and lesser memory requirements than previous algorithms. Results of sample calculations and timing comparisons are included.

  19. An improved algorithm for evaluating trellis phase codes

    NASA Technical Reports Server (NTRS)

    Mulligan, M. G.; Wilson, S. G.

    1982-01-01

    A method is described for evaluating the minimum distance parameters of trellis phase codes, including CPFSK, partial response FM, and more importantly, coded CPM (continuous phase modulation) schemes. The algorithm provides dramatically faster execution times and lesser memory requirements than previous algorithms. Results of sample calculations and timing comparisons are included.

  20. Transversal Clifford gates on folded surface codes

    NASA Astrophysics Data System (ADS)

    Moussa, Jonathan E.

    2016-10-01

    Surface and color codes are two forms of topological quantum error correction in two spatial dimensions with complementary properties. Surface codes have lower-depth error detection circuits and well-developed decoders to interpret and correct errors, while color codes have transversal Clifford gates and better code efficiency in the number of physical qubits needed to achieve a given code distance. A formal equivalence exists between color codes and folded surface codes, but it does not guarantee the transferability of any of these favorable properties. However, the equivalence does imply the existence of constant-depth circuit implementations of logical Clifford gates on folded surface codes. We achieve and improve this result by constructing two families of folded surface codes with transversal Clifford gates. This construction is presented generally for qudits of any dimension. The specific application of these codes to universal quantum computation based on qubit fusion is also discussed.

  1. Trichomoniasis: evaluation to execution

    PubMed Central

    Harp, Djana F.; Chowdhury, Indrajit

    2011-01-01

    Trichomoniasis is the most common sexually transmitted disease, caused by a motile flagellate non-invasive parasitic protozoan, Trichomonas vaginalis (T. vaginalis). More than 160 million people worldwide are annually infected by this protozoan. T. vaginalis occupies an extracellular niche in the complex human genito-urinary environment (vagina, cervix, penis, prostate gland, and urethra) to survive, multiply and evade host defenses. T. vaginalis (strain G3) has a ~160 megabase genome with 60,000 genes, the largest number of genes ever identified in protozoans. The T. vaginalis genome is a highly conserved gene family that encodes a massive proteome with one of the largest coding (expressing ~4000 genes) capacities in the trophozoite stage, and helps T. vaginalis to adapt and survive in diverse environment. Based on recent developments in the field, we review T. vaginalis structure, patho-mechanisms, parasitic virulence, and advances in diagnosis and therapeutics. PMID:21440359

  2. Methods, media, and systems for detecting attack on a digital processing device

    DOEpatents

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  3. A dip-stick type biosensor using bioluminescent bacteria encapsulated in color-coded alginate microbeads for detection of water toxicity.

    PubMed

    Jung, Insup; Seo, Ho Bin; Lee, Ji-eun; Kim, Byoung Chan; Gu, Man Bock

    2014-09-21

    The use of genetically engineered bioluminescent bacteria, in which bioluminescence is induced by different modes of toxic action, represents an alternative to acute toxicity tests using living aquatic organisms (plants, vertebrates, or invertebrates) in an aqueous environment. A number of these bacterial strains have been developed, but there have been no attempts to develop a hand-held type of biosensor for monitoring or identification of toxicity. We report a facile dip-stick type biosensor using genetically engineered bioluminescent bacteria as a new platform for classification and identification of toxicity in water environments. This dip-stick type biosensor is composed of eight different optically color-coded functional alginate beads that each encapsulates a different bioluminescent bacterial strain and its corresponding fluorescent microbead. These color-coded microbeads exhibit easy identification of encapsulated microbeads, since each microbead has a different color code depending on the bioluminescent bacterial strain contained and improved cell-stability compared to liquid culture. This dip-stick type biosensor can discriminate different modes of toxic actions (i.e. DNA damage, oxidative damage, cell-membrane damage, or protein damage) of sample water tested by simply dipping the stick into the water samples. It was found that each color-coded microbead emitted distinct bioluminescence, and each dip-stick type biosensor showed different bioluminescence patterns within 2 hours, depending on the toxic chemicals contained in LB medium, tap water, or river water samples. This dip-stick type biosensor can, therefore, be widely and practically used in checking toxicity of water in the environment primarily in situ, possibly indicating the status of biodiversity. PMID:25057512

  4. A dip-stick type biosensor using bioluminescent bacteria encapsulated in color-coded alginate microbeads for detection of water toxicity.

    PubMed

    Jung, Insup; Seo, Ho Bin; Lee, Ji-eun; Kim, Byoung Chan; Gu, Man Bock

    2014-09-21

    The use of genetically engineered bioluminescent bacteria, in which bioluminescence is induced by different modes of toxic action, represents an alternative to acute toxicity tests using living aquatic organisms (plants, vertebrates, or invertebrates) in an aqueous environment. A number of these bacterial strains have been developed, but there have been no attempts to develop a hand-held type of biosensor for monitoring or identification of toxicity. We report a facile dip-stick type biosensor using genetically engineered bioluminescent bacteria as a new platform for classification and identification of toxicity in water environments. This dip-stick type biosensor is composed of eight different optically color-coded functional alginate beads that each encapsulates a different bioluminescent bacterial strain and its corresponding fluorescent microbead. These color-coded microbeads exhibit easy identification of encapsulated microbeads, since each microbead has a different color code depending on the bioluminescent bacterial strain contained and improved cell-stability compared to liquid culture. This dip-stick type biosensor can discriminate different modes of toxic actions (i.e. DNA damage, oxidative damage, cell-membrane damage, or protein damage) of sample water tested by simply dipping the stick into the water samples. It was found that each color-coded microbead emitted distinct bioluminescence, and each dip-stick type biosensor showed different bioluminescence patterns within 2 hours, depending on the toxic chemicals contained in LB medium, tap water, or river water samples. This dip-stick type biosensor can, therefore, be widely and practically used in checking toxicity of water in the environment primarily in situ, possibly indicating the status of biodiversity.

  5. Restructuring symbolic programs for concurrent execution on multiprocessors

    SciTech Connect

    Larus, J.R.

    1989-01-01

    CURARE, the program restructurer described in this dissertation, automatically transforms a sequential Lisp program into an equivalent concurrent program that executes on a multiprocessor. CURARE first analyzes a program to find its control and data dependences. This analysis is most difficult for references to structures connected by pointers. CURARE uses a new data-dependence algorithm, which finds and classifies these dependences. The analysis is conservative and may detect conflicts that do not arise in practice. A programmer can temper and refine its results with declarations. Dependences constrain the program's concurrent execution because, in general, two conflicting statements cannot execute in a different order without affecting the program's result. A restructurer must know all dependences in order to preserve them. However, not all dependences are essential to produce the program's result. CURARE attempts to transform the program so it computes its result with fewer conflicts. An optimized program will execute with less synchronization and more concurrency. CURARE then examines loops in a program to find those that are unconstrained or lightly constrained by dependences. By necessity, CURARE treats recursive functions as loops and does not limit itself to explicit program loops. Recursive functions offer several advantages over explicit loops since they provide a convenient framework for inserting locks and handling the dynamic behavior of symbolic programs. Loops that are suitable for concurrent execution are changed to execute on a set of concurrent server processes. These servers execute single loop iterations and therefore need to be extremely inexpensive to invoke.

  6. Caltech campus executive LDRD.

    SciTech Connect

    Shepodd, Timothy J.; Knudsen, Tamara

    2013-01-01

    merely help execute the chosen action.

  7. Competency to be executed and forced medication: Singleton v. Norris.

    PubMed

    Zonana, Howard V

    2003-01-01

    Singleton v. Norris is a decision by the Eighth Circuit Court of Appeals stating that forced psychotropic medication can be continued after the date of execution is set if the medication had been given previously to prevent the inmate from being dangerous in the prison setting under a Harper-type review. The defendant had argued that after the date of execution was set, it was no longer in his medical interests to continue the medication. In the decision, the majority held that the fact that an execution is in the offing does not alter the medical interests for which the medication had been prescribed, and physicians should just continue to treat the medical condition. This decision may raise ethics problems for physicians in such settings, because they may be in violation of the American Medical Association (AMA) Code of Ethics if the original override is dubious.

  8. Acceleration of a Monte Carlo radiation transport code

    SciTech Connect

    Hochstedler, R.D.; Smith, L.M.

    1996-03-01

    Execution time for the Integrated TIGER Series (ITS) Monte Carlo radiation transport code has been reduced by careful re-coding of computationally intensive subroutines. Three test cases for the TIGER (1-D slab geometry), CYLTRAN (2-D cylindrical geometry), and ACCEPT (3-D arbitrary geometry) codes were identified and used to benchmark and profile program execution. Based upon these results, sixteen top time-consuming subroutines were examined and nine of them modified to accelerate computations with equivalent numerical output to the original. The results obtained via this study indicate that speedup factors of 1.90 for the TIGER code, 1.67 for the CYLTRAN code, and 1.11 for the ACCEPT code are achievable. {copyright} {ital 1996 American Institute of Physics.}

  9. 5 CFR 842.211 - Senior Executive Service, Defense Intelligence Senior Executive Service, and Senior Cryptologic...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. 842.211 Section 842.211... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. (a) A member of the Senior Executive Service, the Defense Intelligence Senior Executive Service, or the Senior Cryptologic...

  10. 5 CFR 842.211 - Senior Executive Service, Defense Intelligence Senior Executive Service, and Senior Cryptologic...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. 842.211 Section 842.211... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. (a) A member of the Senior Executive Service, the Defense Intelligence Senior Executive Service, or the Senior Cryptologic...

  11. 5 CFR 842.211 - Senior Executive Service, Defense Intelligence Senior Executive Service, and Senior Cryptologic...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. 842.211 Section 842.211... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. (a) A member of the Senior Executive Service, the Defense Intelligence Senior Executive Service, or the Senior Cryptologic...

  12. 5 CFR 842.211 - Senior Executive Service, Defense Intelligence Senior Executive Service, and Senior Cryptologic...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. 842.211 Section 842.211... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. (a) A member of the Senior Executive Service, the Defense Intelligence Senior Executive Service, or the Senior Cryptologic...

  13. 5 CFR 842.211 - Senior Executive Service, Defense Intelligence Senior Executive Service, and Senior Cryptologic...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. 842.211 Section 842.211... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. (a) A member of the Senior Executive Service, the Defense Intelligence Senior Executive Service, or the Senior Cryptologic...

  14. Among three different executive functions, general executive control ability is a key predictor of decision making under objective risk

    PubMed Central

    Schiebener, Johannes; Wegmann, Elisa; Gathmann, Bettina; Laier, Christian; Pawlikowski, Mirko; Brand, Matthias

    2014-01-01

    Executive functioning is supposed to have an important role in decision making under risk. Several studies reported that more advantageous decision-making behavior was accompanied by better performance in tests of executive functioning and that the decision-making process was accompanied by activations in prefrontal and subcortical brain regions associated with executive functioning. However, to what extent different components of executive functions contribute to decision making is still unclear. We tested direct and indirect effects of three executive functions on decision-making performance in a laboratory gambling task, the Game of Dice Task (GDT). Using Brand's model of decisions under risk (2006) we tested seven structural equation models with three latent variables that represent executive functions supposed to be involved in decision making. The latent variables were general control (represented by the general ability to exert attentional and behavioral self-control that is in accordance with task goals despite interfering information), concept formation (represented by categorization, rule detection, and set maintenance), and monitoring (represented by supervision of cognition and behavior). The seven models indicated that only the latent dimension general control had a direct effect on decision making under risk. Concept formation and monitoring only contributed in terms of indirect effects, when mediated by general control. Thus, several components of executive functioning seem to be involved in decision making under risk. However, general control functions seem to have a key role. They may be important for implementing the calculative and cognitively controlled processes involved in advantageous decision making under risk. PMID:25520690

  15. Code Optimization Techniques

    SciTech Connect

    MAGEE,GLEN I.

    2000-08-03

    Computers transfer data in a number of different ways. Whether through a serial port, a parallel port, over a modem, over an ethernet cable, or internally from a hard disk to memory, some data will be lost. To compensate for that loss, numerous error detection and correction algorithms have been developed. One of the most common error correction codes is the Reed-Solomon code, which is a special subset of BCH (Bose-Chaudhuri-Hocquenghem) linear cyclic block codes. In the AURA project, an unmanned aircraft sends the data it collects back to earth so it can be analyzed during flight and possible flight modifications made. To counter possible data corruption during transmission, the data is encoded using a multi-block Reed-Solomon implementation with a possibly shortened final block. In order to maximize the amount of data transmitted, it was necessary to reduce the computation time of a Reed-Solomon encoding to three percent of the processor's time. To achieve such a reduction, many code optimization techniques were employed. This paper outlines the steps taken to reduce the processing time of a Reed-Solomon encoding and the insight into modern optimization techniques gained from the experience.

  16. A direct-execution parallel architecture for the Advanced Continuous Simulation Language (ACSL)

    NASA Technical Reports Server (NTRS)

    Carroll, Chester C.; Owen, Jeffrey E.

    1988-01-01

    A direct-execution parallel architecture for the Advanced Continuous Simulation Language (ACSL) is presented which overcomes the traditional disadvantages of simulations executed on a digital computer. The incorporation of parallel processing allows the mapping of simulations into a digital computer to be done in the same inherently parallel manner as they are currently mapped onto an analog computer. The direct-execution format maximizes the efficiency of the executed code since the need for a high level language compiler is eliminated. Resolution is greatly increased over that which is available with an analog computer without the sacrifice in execution speed normally expected with digitial computer simulations. Although this report covers all aspects of the new architecture, key emphasis is placed on the processing element configuration and the microprogramming of the ACLS constructs. The execution times for all ACLS constructs are computed using a model of a processing element based on the AMD 29000 CPU and the AMD 29027 FPU. The increase in execution speed provided by parallel processing is exemplified by comparing the derived execution times of two ACSL programs with the execution times for the same programs executed on a similar sequential architecture.

  17. Chief nurse executive incentive compensation.

    PubMed

    Korth, N L; Reichelt, P A

    1990-12-01

    More and more chief nurse executives (CNEs) are receiving incentive compensation plans. The authors report trends in incentive compensation and discuss what 184 CNEs in multihospital systems said about their incentive compensation plan. PMID:2243273

  18. Retrenchment. How nurse executives cope.

    PubMed

    Feldman, J; Daly-Gawenda, D

    1985-06-01

    Changing economic, technicologic, and political conditions have created the need for readjustments in the number of nursing personnel employed by hospitals. The authors examined how nurse executives conducted themselves and managed their personnel during layoffs.

  19. Report of the Executive Director

    ERIC Educational Resources Information Center

    Rodowskas, Chistopher A., Jr.

    1977-01-01

    The AACP executive director reports on developments in pharmacy colleges in the areas of membership, communications, meetings, finances, government affairs, new projects and services, staff and facilities, student affairs, and educational research and development. (LBH)

  20. Executive presence for strategic influence.

    PubMed

    Shirey, Maria R

    2013-01-01

    This department highlights change management strategies that may be successful in strategically planning and executing organizational change initiatives. With the goal of presenting practical approaches helpful to nurse leaders advancing organizational change, content includes evidence-based projects, tools, and resources that mobilize and sustain organizational change initiatives. In this article, the author discusses cultivating executive presence, a crucial component of great leadership, needed for strategic influence and to drive change.

  1. Generalized optical code construction for enhanced and Modified Double Weight like codes without mapping for SAC-OCDMA systems

    NASA Astrophysics Data System (ADS)

    Kumawat, Soma; Ravi Kumar, M.

    2016-07-01

    Double Weight (DW) code family is one of the coding schemes proposed for Spectral Amplitude Coding-Optical Code Division Multiple Access (SAC-OCDMA) systems. Modified Double Weight (MDW) code for even weights and Enhanced Double Weight (EDW) code for odd weights are two algorithms extending the use of DW code for SAC-OCDMA systems. The above mentioned codes use mapping technique to provide codes for higher number of users. A new generalized algorithm to construct EDW and MDW like codes without mapping for any weight greater than 2 is proposed. A single code construction algorithm gives same length increment, Bit Error Rate (BER) calculation and other properties for all weights greater than 2. Algorithm first constructs a generalized basic matrix which is repeated in a different way to produce the codes for all users (different from mapping). The generalized code is analysed for BER using balanced detection and direct detection techniques.

  2. Executive Function in Nephropathic Cystinosis

    PubMed Central

    Ballantyne, Angela O.; Spilkin, Amy M.; Trauner, Doris A.

    2013-01-01

    Objective We studied executive function in children and adolescents with cystinosis. Background Cystinosis is a genetic metabolic disorder in which the amino acid cystine accumulates in all organs of the body, including the brain. Previous research has shown that individuals with cystinosis have visuospatial deficits, but normal intelligence and intact verbal abilities. Better understanding of the behavioral phenotype associated with cystinosis could have important implications for treatment. Methods Twenty-eight children with cystinosis and 24 control participants (age range 8-17 years) underwent selected Delis-Kaplan Executive Function System (D-KEFS) tests for neuropsychological assessment of executive function, and the participants’ parents completed the Behavior Rating Inventory of Executive Function (BRIEF). Results Participants with cystinosis performed significantly more poorly than controls on all D-KEFS indices examined and on the BRIEF Metacognition Index and Global Executive Composite. Conclusions Executive function is an area of potential risk in cystinosis. Our data have implications not only for the function of affected children and adolescents in school and daily life, but also for disease management and treatment adherence. Our findings can aid in the design and implementation of interventions and lead to a greater understanding of brain-behavior relationships in cystinosis. PMID:23538568

  3. Transferring ecosystem simulation codes to supercomputers

    NASA Technical Reports Server (NTRS)

    Skiles, J. W.; Schulbach, C. H.

    1995-01-01

    Many ecosystem simulation computer codes have been developed in the last twenty-five years. This development took place initially on main-frame computers, then mini-computers, and more recently, on micro-computers and workstations. Supercomputing platforms (both parallel and distributed systems) have been largely unused, however, because of the perceived difficulty in accessing and using the machines. Also, significant differences in the system architectures of sequential, scalar computers and parallel and/or vector supercomputers must be considered. We have transferred a grassland simulation model (developed on a VAX) to a Cray Y-MP/C90. We describe porting the model to the Cray and the changes we made to exploit the parallelism in the application and improve code execution. The Cray executed the model 30 times faster than the VAX and 10 times faster than a Unix workstation. We achieved an additional speedup of 30 percent by using the compiler's vectoring and 'in-line' capabilities. The code runs at only about 5 percent of the Cray's peak speed because it ineffectively uses the vector and parallel processing capabilities of the Cray. We expect that by restructuring the code, it could execute an additional six to ten times faster.

  4. Comparative genomics approach to detecting split-coding regions in a low-coverage genome: lessons from the chimaera Callorhinchus milii (Holocephali, Chondrichthyes).

    PubMed

    Dessimoz, Christophe; Zoller, Stefan; Manousaki, Tereza; Qiu, Huan; Meyer, Axel; Kuraku, Shigehiro

    2011-09-01

    Recent development of deep sequencing technologies has facilitated de novo genome sequencing projects, now conducted even by individual laboratories. However, this will yield more and more genome sequences that are not well assembled, and will hinder thorough annotation when no closely related reference genome is available. One of the challenging issues is the identification of protein-coding sequences split into multiple unassembled genomic segments, which can confound orthology assignment and various laboratory experiments requiring the identification of individual genes. In this study, using the genome of a cartilaginous fish, Callorhinchus milii, as test case, we performed gene prediction using a model specifically trained for this genome. We implemented an algorithm, designated ESPRIT, to identify possible linkages between multiple protein-coding portions derived from a single genomic locus split into multiple unassembled genomic segments. We developed a validation framework based on an artificially fragmented human genome, improvements between early and recent mouse genome assemblies, comparison with experimentally validated sequences from GenBank, and phylogenetic analyses. Our strategy provided insights into practical solutions for efficient annotation of only partially sequenced (low-coverage) genomes. To our knowledge, our study is the first formulation of a method to link unassembled genomic segments based on proteomes of relatively distantly related species as references.

  5. Flexible Generation of Kalman Filter Code

    NASA Technical Reports Server (NTRS)

    Richardson, Julian; Wilson, Edward

    2006-01-01

    Domain-specific program synthesis can automatically generate high quality code in complex domains from succinct specifications, but the range of programs which can be generated by a given synthesis system is typically narrow. Obtaining code which falls outside this narrow scope necessitates either 1) extension of the code generator, which is usually very expensive, or 2) manual modification of the generated code, which is often difficult and which must be redone whenever changes are made to the program specification. In this paper, we describe adaptations and extensions of the AUTOFILTER Kalman filter synthesis system which greatly extend the range of programs which can be generated. Users augment the input specification with a specification of code fragments and how those fragments should interleave with or replace parts of the synthesized filter. This allows users to generate a much wider range of programs without their needing to modify the synthesis system or edit generated code. We demonstrate the usefulness of the approach by applying it to the synthesis of a complex state estimator which combines code from several Kalman filters with user-specified code. The work described in this paper allows the complex design decisions necessary for real-world applications to be reflected in the synthesized code. When executed on simulated input data, the generated state estimator was found to produce comparable estimates to those produced by a handcoded estimator

  6. Advanced turboprop noise prediction: Development of a code at NASA Langley based on recent theoretical results

    NASA Technical Reports Server (NTRS)

    Farassat, F.; Dunn, M. H.; Padula, S. L.

    1986-01-01

    The development of a high speed propeller noise prediction code at Langley Research Center is described. The code utilizes two recent acoustic formulations in the time domain for subsonic and supersonic sources. The structure and capabilities of the code are discussed. Grid size study for accuracy and speed of execution on a computer is also presented. The code is tested against an earlier Langley code. Considerable increase in accuracy and speed of execution are observed. Some examples of noise prediction of a high speed propeller for which acoustic test data are available are given. A brisk derivation of formulations used is given in an appendix.

  7. Atomicity violation detection using access interleaving invariants

    DOEpatents

    Zhou, Yuanyuan; Lu, Shan; Tucek, Joseph Andrew

    2013-09-10

    During execution of a program, the situation where the atomicity of a pair of instructions that are to be executed atomically is violated is identified, and a bug is detected as occurring in the program at the pair of instructions. The pairs of instructions that are to be executed atomically can be identified in different manners, such as by executing a program multiple times and using the results of those executions to automatically identify the pairs of instructions.

  8. Error coding simulations in C

    NASA Technical Reports Server (NTRS)

    Noble, Viveca K.

    1994-01-01

    When data is transmitted through a noisy channel, errors are produced within the data rendering it indecipherable. Through the use of error control coding techniques, the bit error rate can be reduced to any desired level without sacrificing the transmission data rate. The Astrionics Laboratory at Marshall Space Flight Center has decided to use a modular, end-to-end telemetry data simulator to simulate the transmission of data from flight to ground and various methods of error control. The simulator includes modules for random data generation, data compression, Consultative Committee for Space Data Systems (CCSDS) transfer frame formation, error correction/detection, error generation and error statistics. The simulator utilizes a concatenated coding scheme which includes CCSDS standard (255,223) Reed-Solomon (RS) code over GF(2(exp 8)) with interleave depth of 5 as the outermost code, (7, 1/2) convolutional code as an inner code and CCSDS recommended (n, n-16) cyclic redundancy check (CRC) code as the innermost code, where n is the number of information bits plus 16 parity bits. The received signal-to-noise for a desired bit error rate is greatly reduced through the use of forward error correction techniques. Even greater coding gain is provided through the use of a concatenated coding scheme. Interleaving/deinterleaving is necessary to randomize burst errors which may appear at the input of the RS decoder. The burst correction capability length is increased in proportion to the interleave depth. The modular nature of the simulator allows for inclusion or exclusion of modules as needed. This paper describes the development and operation of the simulator, the verification of a C-language Reed-Solomon code, and the possibility of using Comdisco SPW(tm) as a tool for determining optimal error control schemes.

  9. Error coding simulations in C

    NASA Astrophysics Data System (ADS)

    Noble, Viveca K.

    1994-10-01

    When data is transmitted through a noisy channel, errors are produced within the data rendering it indecipherable. Through the use of error control coding techniques, the bit error rate can be reduced to any desired level without sacrificing the transmission data rate. The Astrionics Laboratory at Marshall Space Flight Center has decided to use a modular, end-to-end telemetry data simulator to simulate the transmission of data from flight to ground and various methods of error control. The simulator includes modules for random data generation, data compression, Consultative Committee for Space Data Systems (CCSDS) transfer frame formation, error correction/detection, error generation and error statistics. The simulator utilizes a concatenated coding scheme which includes CCSDS standard (255,223) Reed-Solomon (RS) code over GF(2(exp 8)) with interleave depth of 5 as the outermost code, (7, 1/2) convolutional code as an inner code and CCSDS recommended (n, n-16) cyclic redundancy check (CRC) code as the innermost code, where n is the number of information bits plus 16 parity bits. The received signal-to-noise for a desired bit error rate is greatly reduced through the use of forward error correction techniques. Even greater coding gain is provided through the use of a concatenated coding scheme. Interleaving/deinterleaving is necessary to randomize burst errors which may appear at the input of the RS decoder. The burst correction capability length is increased in proportion to the interleave depth. The modular nature of the simulator allows for inclusion or exclusion of modules as needed. This paper describes the development and operation of the simulator, the verification of a C-language Reed-Solomon code, and the possibility of using Comdisco SPW(tm) as a tool for determining optimal error control schemes.

  10. Video coding with dynamic background

    NASA Astrophysics Data System (ADS)

    Paul, Manoranjan; Lin, Weisi; Lau, Chiew Tong; Lee, Bu-Sung

    2013-12-01

    Motion estimation (ME) and motion compensation (MC) using variable block size, sub-pixel search, and multiple reference frames (MRFs) are the major reasons for improved coding performance of the H.264 video coding standard over other contemporary coding standards. The concept of MRFs is suitable for repetitive motion, uncovered background, non-integer pixel displacement, lighting change, etc. The requirement of index codes of the reference frames, computational time in ME & MC, and memory buffer for coded frames limits the number of reference frames used in practical applications. In typical video sequences, the previous frame is used as a reference frame with 68-92% of cases. In this article, we propose a new video coding method using a reference frame [i.e., the most common frame in scene (McFIS)] generated by dynamic background modeling. McFIS is more effective in terms of rate-distortion and computational time performance compared to the MRFs techniques. It has also inherent capability of scene change detection (SCD) for adaptive group of picture (GOP) size determination. As a result, we integrate SCD (for GOP determination) with reference frame generation. The experimental results show that the proposed coding scheme outperforms the H.264 video coding with five reference frames and the two relevant state-of-the-art algorithms by 0.5-2.0 dB with less computational time.

  11. The Interactive Roles of Parenting, Emotion Regulation and Executive Functioning in Moral Reasoning during Middle Childhood

    PubMed Central

    Hinnant, J. Benjamin; Nelson, Jackie A.; O’Brien, Marion; Keane, Susan P.; Calkins, Susan D.

    2013-01-01

    We examined mother-child cooperative behavior, children’s emotion regulation and executive function, as well as combinations of these factors, as predictors of moral reasoning in 89 10-year-old children. Dyadic cooperation was coded from videotaped observations of laboratory puzzle and speech tasks. Emotion regulation was derived from maternal report, and executive functioning was assessed with the Tower of London task. Moral reasoning was coded during mother-child conversations about morally ambiguous, peer-conflict situations. Two significant interactions indicated that children from more cooperative dyads who also had higher executive function skills had higher moral reasoning scores than other children, and children lower in both emotion regulation and executive function had lower moral reasoning scores than other children. The results contribute to the literature on the multiple and interactive levels of influence on moral reasoning in childhood. PMID:23650955

  12. The interactive roles of parenting, emotion regulation and executive functioning in moral reasoning during middle childhood.

    PubMed

    Hinnant, J Benjamin; Nelson, Jackie A; O'Brien, Marion; Keane, Susan P; Calkins, Susan D

    2013-01-01

    We examined mother-child co-operative behaviour, children's emotion regulation and executive function, as well as combinations of these factors, as predictors of moral reasoning in 89 10-year-old children. Dyadic co-operation was coded from videotaped observations of laboratory puzzle and speech tasks. Emotion regulation was derived from maternal report, and executive functioning was assessed with the Tower of London task. Moral reasoning was coded during mother-child conversations about morally ambiguous, peer-conflict situations. Two significant interactions indicated that children from more co-operative dyads who also had higher executive function skills had higher moral reasoning scores than other children, and children lower in both emotion regulation and executive function had lower moral reasoning scores than other children. The results contribute to the literature on the multiple and interactive levels of influence on moral reasoning in childhood. PMID:23650955

  13. 22 CFR 1421.6 - Executive Director.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 2 2012-04-01 2009-04-01 true Executive Director. 1421.6 Section 1421.6... TERMS AS USED IN THIS SUBCHAPTER § 1421.6 Executive Director. Executive Director means the Executive Director of the Authority....

  14. 5 CFR 2421.7 - Executive Director.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false Executive Director. 2421.7 Section 2421.7... FEDERAL LABOR RELATIONS AUTHORITY MEANING OF TERMS AS USED IN THIS SUBCHAPTER § 2421.7 Executive Director. Executive Director means the Executive Director of the Authority....

  15. 5 CFR 2421.7 - Executive Director.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Executive Director. 2421.7 Section 2421.7... FEDERAL LABOR RELATIONS AUTHORITY MEANING OF TERMS AS USED IN THIS SUBCHAPTER § 2421.7 Executive Director. Executive Director means the Executive Director of the Authority....

  16. 22 CFR 1421.6 - Executive Director.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 2 2011-04-01 2009-04-01 true Executive Director. 1421.6 Section 1421.6... TERMS AS USED IN THIS SUBCHAPTER § 1421.6 Executive Director. Executive Director means the Executive Director of the Authority....

  17. 22 CFR 1421.6 - Executive Director.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 2 2014-04-01 2014-04-01 false Executive Director. 1421.6 Section 1421.6... TERMS AS USED IN THIS SUBCHAPTER § 1421.6 Executive Director. Executive Director means the Executive Director of the Authority....

  18. 45 CFR 1700.5 - Executive Director.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 4 2014-10-01 2014-10-01 false Executive Director. 1700.5 Section 1700.5 Public... INFORMATION SCIENCE ORGANIZATION AND FUNCTIONS § 1700.5 Executive Director. (a) The Executive Director serves... laws. (b) The Executive Director is directly responsible to the Commission, works under the...

  19. 5 CFR 2421.7 - Executive Director.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 5 Administrative Personnel 3 2012-01-01 2012-01-01 false Executive Director. 2421.7 Section 2421.7... FEDERAL LABOR RELATIONS AUTHORITY MEANING OF TERMS AS USED IN THIS SUBCHAPTER § 2421.7 Executive Director. Executive Director means the Executive Director of the Authority....

  20. 22 CFR 1421.6 - Executive Director.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Executive Director. 1421.6 Section 1421.6... TERMS AS USED IN THIS SUBCHAPTER § 1421.6 Executive Director. Executive Director means the Executive Director of the Authority....

  1. 45 CFR 1700.5 - Executive Director.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 4 2013-10-01 2013-10-01 false Executive Director. 1700.5 Section 1700.5 Public... INFORMATION SCIENCE ORGANIZATION AND FUNCTIONS § 1700.5 Executive Director. (a) The Executive Director serves... laws. (b) The Executive Director is directly responsible to the Commission, works under the...

  2. 5 CFR 2421.7 - Executive Director.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 5 Administrative Personnel 3 2014-01-01 2014-01-01 false Executive Director. 2421.7 Section 2421.7... FEDERAL LABOR RELATIONS AUTHORITY MEANING OF TERMS AS USED IN THIS SUBCHAPTER § 2421.7 Executive Director. Executive Director means the Executive Director of the Authority....

  3. 22 CFR 1421.6 - Executive Director.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 2 2013-04-01 2009-04-01 true Executive Director. 1421.6 Section 1421.6... TERMS AS USED IN THIS SUBCHAPTER § 1421.6 Executive Director. Executive Director means the Executive Director of the Authority....

  4. 5 CFR 2421.7 - Executive Director.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Executive Director. 2421.7 Section 2421.7... FEDERAL LABOR RELATIONS AUTHORITY MEANING OF TERMS AS USED IN THIS SUBCHAPTER § 2421.7 Executive Director. Executive Director means the Executive Director of the Authority....

  5. 45 CFR 1700.5 - Executive Director.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 4 2012-10-01 2012-10-01 false Executive Director. 1700.5 Section 1700.5 Public... INFORMATION SCIENCE ORGANIZATION AND FUNCTIONS § 1700.5 Executive Director. (a) The Executive Director serves... laws. (b) The Executive Director is directly responsible to the Commission, works under the...

  6. Detection of long non-coding RNA in archival tissue: correlation with polycomb protein expression in primary and metastatic breast carcinoma.

    PubMed

    Chisholm, Karen M; Wan, Yue; Li, Rui; Montgomery, Kelli D; Chang, Howard Y; West, Robert B

    2012-01-01

    A major function of long non-coding RNAs (lncRNAs) is regulating gene expression through changes in chromatin state. Experimental evidence suggests that in cancer, they can influence Polycomb Repressive Complexes (PRC) to retarget to an occupancy pattern resembling that of the embryonic state. We have previously demonstrated that the expression level of lncRNA in the HOX locus, including HOTAIR, is a predictor of breast cancer metastasis. In this current project, RNA in situ hybridization of probes to three different lncRNAs (HOTAIR, ncHoxA1, and ncHoxD4), as well a immunohistochemical staining of EZH2, is undertaken in formalin-fixed paraffin-embedded breast cancer tissues in a high throughput tissue microarray format to correlate expression with clinicopathologic features. Though overall EZH2 and HOTAIR expression levels were highly correlated, the subset of cases with strong HOTAIR expression correlated with ER and PR positivity, while the subset of cases with strong EZH2 expression correlated with an increased proliferation rate, ER and PR negativity, HER2 underexpression, and triple negativity. Co-expression of HOTAIR and EZH2 trended with a worse outcome. In matched primary and metastatic cancers, both HOTAIR and EZH2 had increased expression in the metastatic carcinomas. This is the first study to show that RNA in situ hybridization of formalin fixed paraffin-embedded clinical material can be used to measure levels of long non-coding RNAs. This approach offers a method to make observations on lncRNAs that may influence the cancer epigenome in a tissue-based technique.

  7. [Treatment Options for Executive Dysfunction].

    PubMed

    Müller, S V

    2016-09-01

    The concept of executive function is a so-called umbrella concept, so that it includes many different and in some cases mutually contradictory higher-level organizational abilities such as planning, monitoring, inhibition and control of action. Typically, the cause of an executive dysfunction is an underlying lesion in the prefrontal cortex or subcortical regions. Deficits in executive functions appear in the fields of cognition as well as behavior. Diagnosis requires the use of a wide-ranging repertoire of tests and questionnaires making it a time-consuming process. Different therapeutic approaches addressing the diverse symptoms of executive dysfunction, both positive and negative, are available. These include modification and manipulation of the environment and practice of cognitive repetitive procedures. The former are implemented particularly in cases of severely impaired persons. The latter are used in persons in whom cognitive dysfunctions are the dominating symptoms of the disorder.The operational area of therapeutic approaches using paper and pencil as well as computer programs limits them to treatment of cognitive dysfunction. If behavioral disturbances dominate the clinical picture, other procedures should be used.The effectiveness of cognitive therapy of executive dysfunction is well demonstrated according to the criteria of evidence-based medicine (EBM). PMID:27607068

  8. Box codes of lengths 48 and 72

    NASA Technical Reports Server (NTRS)

    Solomon, G.; Jin, Y.

    1993-01-01

    A self-dual code length 48, dimension 24, with Hamming distance essentially equal to 12 is constructed here. There are only six code words of weight eight. All the other code words have weights that are multiples of four and have a minimum weight equal to 12. This code may be encoded systematically and arises from a strict binary representation of the (8,4;5) Reed-Solomon (RS) code over GF (64). The code may be considered as six interrelated (8,7;2) codes. The Mattson-Solomon representation of the cyclic decomposition of these codes and their parity sums are used to detect an odd number of errors in any of the six codes. These may then be used in a correction algorithm for hard or soft decision decoding. A (72,36;15) box code was constructed from a (63,35;8) cyclic code. The theoretical justification is presented herein. A second (72,36;15) code is constructed from an inner (63,27;16) Bose Chaudhuri Hocquenghem (BCH) code and expanded to length 72 using box code algorithms for extension. This code was simulated and verified to have a minimum distance of 15 with even weight words congruent to zero modulo four. The decoding for hard and soft decision is still more complex than the first code constructed above. Finally, an (8,4;5) RS code over GF (512) in the binary representation of the (72,36;15) box code gives rise to a (72,36;16*) code with nine words of weight eight, and all the rest have weights greater than or equal to 16.

  9. Box codes of lengths 48 and 72

    NASA Astrophysics Data System (ADS)

    Solomon, G.; Jin, Y.

    1993-11-01

    A self-dual code length 48, dimension 24, with Hamming distance essentially equal to 12 is constructed here. There are only six code words of weight eight. All the other code words have weights that are multiples of four and have a minimum weight equal to 12. This code may be encoded systematically and arises from a strict binary representation of the (8,4;5) Reed-Solomon (RS) code over GF (64). The code may be considered as six interrelated (8,7;2) codes. The Mattson-Solomon representation of the cyclic decomposition of these codes and their parity sums are used to detect an odd number of errors in any of the six codes. These may then be used in a correction algorithm for hard or soft decision decoding. A (72,36;15) box code was constructed from a (63,35;8) cyclic code. The theoretical justification is presented herein. A second (72,36;15) code is constructed from an inner (63,27;16) Bose Chaudhuri Hocquenghem (BCH) code and expanded to length 72 using box code algorithms for extension. This code was simulated and verified to have a minimum distance of 15 with even weight words congruent to zero modulo four. The decoding for hard and soft decision is still more complex than the first code constructed above. Finally, an (8,4;5) RS code over GF (512) in the binary representation of the (72,36;15) box code gives rise to a (72,36;16*) code with nine words of weight eight, and all the rest have weights greater than or equal to 16.

  10. NRC Job Code V6060: Extended in-situ and real time monitoring. Task 4: Detection and monitoring of leaks at nuclear power plants external to structures

    SciTech Connect

    Sheen, S. H.

    2012-08-01

    In support of Task 4 of the NRC study on compliance with 10 CFR part 20.1406, minimization of contamination, Argonne National Laboratory (ANL) conducted a one-year scoping study, in concert with a parallel study performed by NRC/NRR staff, on monitoring for leaks at nuclear power plants (NPPs) external to structures. The objective of this task-4 study is to identify and assess those sensors and monitoring techniques for early detection of abnormal radioactive releases from the engineered facility structures, systems and components (SSCs) to the surrounding underground environment in existing NPPs and planned new reactors. As such, methods of interest include: (1) detection of anomalous water content of soils surrounding SSCs, (2) radionuclides contained in the leaking water, and (3) secondary signals such as temperature. ANL work scope includes mainly to (1) identify, in concert with the nuclear industry, the sensors and techniques that have most promise to detect radionuclides and/or associated chemical releases from SSCs of existing NPPs and (2) review and provide comments on the results of the NRC/NRR staff scoping study to identify candidate technologies. This report constitutes the ANL deliverable of the task-4 study. It covers a survey of sensor technologies and leak detection methods currently applied to leak monitoring at NPPs. The survey also provides a technology evaluation that identifies their strength and deficiency based on their detection speed, sensitivity, range and reliability. Emerging advanced technologies that are potentially capable of locating releases, identifying the radionuclides, and estimating their concentrations and distributions are also included in the report along with suggestions of required further research and development.

  11. Executive function in CHARGE syndrome.

    PubMed

    Hartshorne, Timothy S; Nicholas, Jude; Grialou, Tina L; Russ, Joanna M

    2007-07-01

    This study addressed the presence of executive dysfunction in children with CHARGE syndrome, a genetic disorder with multiple physical anomalies and severe challenging behaviors. Ninety-eight children were included in the study. More than half received clinically significant scores on the Behavior Rating Inventory of Executive Function (BRIEF; Gioia et al., 2000) scales of Shift, Monitor, and the Behavioral Regulation Index, with additional high scores on Inhibit and the Global Executive Composite. Associations were found with the age the child first walked, scores on the Autism Behavior Checklist (ABC; Krug et al., 1993), and being classified as deafblind. Difficulties with making transitions and flexible problem solving, monitoring their work and their effect on others, and acting on impulse, may be related to the behavioral difficulties exhibited by children with CHARGE. Interventions targeting improved self-regulation may help to manage this challenging behavior. PMID:17564850

  12. Bar coded retroreflective target

    SciTech Connect

    Vann, C.S.

    2000-01-25

    This small, inexpensive, non-contact laser sensor can detect the location of a retroreflective target in a relatively large volume and up to six degrees of position. The tracker's laser beam is formed into a plane of light which is swept across the space of interest. When the beam illuminates the retroreflector, some of the light returns to the tracker. The intensity, angle, and time of the return beam is measured to calculate the three dimensional location of the target. With three retroreflectors on the target, the locations of three points on the target are measured, enabling the calculation of all six degrees of target position. Until now, devices for three-dimensional tracking of objects in a large volume have been heavy, large, and very expensive. Because of the simplicity and unique characteristics of this tracker, it is capable of three-dimensional tracking of one to several objects in a large volume, yet it is compact, light-weight, and relatively inexpensive. Alternatively, a tracker produces a diverging laser beam which is directed towards a fixed position, and senses when a retroreflective target enters the fixed field of view. An optically bar coded target can be read by the tracker to provide information about the target. The target can be formed of a ball lens with a bar code on one end. As the target moves through the field, the ball lens causes the laser beam to scan across the bar code.

  13. Bar coded retroreflective target

    DOEpatents

    Vann, Charles S.

    2000-01-01

    This small, inexpensive, non-contact laser sensor can detect the location of a retroreflective target in a relatively large volume and up to six degrees of position. The tracker's laser beam is formed into a plane of light which is swept across the space of interest. When the beam illuminates the retroreflector, some of the light returns to the tracker. The intensity, angle, and time of the return beam is measured to calculate the three dimensional location of the target. With three retroreflectors on the target, the locations of three points on the target are measured, enabling the calculation of all six degrees of target position. Until now, devices for three-dimensional tracking of objects in a large volume have been heavy, large, and very expensive. Because of the simplicity and unique characteristics of this tracker, it is capable of three-dimensional tracking of one to several objects in a large volume, yet it is compact, light-weight, and relatively inexpensive. Alternatively, a tracker produces a diverging laser beam which is directed towards a fixed position, and senses when a retroreflective target enters the fixed field of view. An optically bar coded target can be read by the tracker to provide information about the target. The target can be formed of a ball lens with a bar code on one end. As the target moves through the field, the ball lens causes the laser beam to scan across the bar code.

  14. Qualitative Change in Executive Control during Childhood and Adulthood

    ERIC Educational Resources Information Center

    Chevalier, Nicolas; Huber, Kristina L.; Wiebe, Sandra A.; Espy, Kimberly Andrews

    2013-01-01

    Executive control development typically has been conceptualized to result from quantitative changes in the efficiency of the underlying processes. In contrast, the present study addressed the possibility of qualitative change with age by examining how children and adults detect task switches. Participants in three age groups (5- and 10-year-old…

  15. Authentication codes that permit arbitration

    SciTech Connect

    Simmons, G.J.

    1987-01-01

    Objective of authentication is to detect attempted deceptions in a communications channel. Traditionally this has been restricted to providing the authorized receiver with a capability of detecting unauthentic messages. The known codes have all left open the possibility for either the transmitter to disavow a message that he actually sent to the receiver, i.e., an authentic message, or else for the receiver to falsely attribute a message of his own devising to the transmitter. Of course the party being deceived would know that he was the victim of a deception by the other, but would be unable to ''prove'' this to a third party. Ideally, authentication should provide a means to detect attempted deceptions by insiders (the transmitter or receiver) as well as outsiders (the opponent). It has been an open question of whether it was possible to devise authentication codes that would permit a third party, an arbiter, to decide (in probability) whether the transmitter or the receiver was cheating in the event of a dispute. We answer this question in that both permits the receiver to detect outsider deceptions, as well affirmative by first constructing an example of an authentication code as permitting a designated arbiter to detect insider deceptions and then by generalizing this construction to an infinite class of such codes.

  16. A PVM Executive Program for Use with RELAP5-3D

    SciTech Connect

    Weaver, Walter Leslie; Tomlinson, E. T.; Aumiller, D. L.

    2002-04-01

    A PVM executive program has been developed for use with the RELAP5-3D computer program. The PVM executive allows RELAP5-3D to be coupled with any number of other computer programs to perform integrated analyses of nuclear power reactor systems and related experimental facilities. The executive program manages all phases of a coupled computation. It starts up and configures a virtual machine, spawns all of the coupled processes, coordinates the time step size between the coupled codes, manages the production of printed and plotable output, and shuts the virtual machine down at the end of the computation. The executive program also monitors that status of the coupled computation, repeating time steps as needed and terminating a coupled computation gracefully if one of the coupled processes is terminated by the computational node on which it is executing.

  17. Roadblocks to Change: Executive Behaviors Versus Executive Perceptions.

    ERIC Educational Resources Information Center

    Harris, Thomas E.

    A study analyzed the responses of chief executive officers (CEOs) and company presidents to a leadership test and an organizational environment test, to determine whether these individuals' managerial approaches coincided with their characterizations of their organizations' environments. Subjects, CEOs or presidents of 65 randomly selected…

  18. Business Development Executive (BDE) Program

    SciTech Connect

    Rice, E.J. "Woody"; Frederick, W. James

    2005-12-05

    The IPST BDE (Institute of Paper Science and Technology Business Development Executive) program was initiated in 1997 to make the paper industry better aware of the new manufacturing technologies being developed at IPST for the U.S. pulp and paper industry's use. In April 2000, the BDE program management and the 20 BDEs, all retired senior level industry manufacturing and research executives, were asked by Ms. Denise Swink of OIT at DOE to take the added responsibility of bringing DOE developed energy conservation technology to the paper industry. This project was funded by a DOE grant of $950,000.

  19. ADAMS executive and operating system

    NASA Technical Reports Server (NTRS)

    Pittman, W. D.

    1981-01-01

    The ADAMS Executive and Operating System, a multitasking environment under which a variety of data reduction, display and utility programs are executed, a system which provides a high level of isolation between programs allowing them to be developed and modified independently, is described. The Airborne Data Analysis/Monitor System (ADAMS) was developed to provide a real time data monitoring and analysis capability onboard Boeing commercial airplanes during flight testing. It inputs sensor data from an airplane performance data by applying transforms to the collected sensor data, and presents this data to test personnel via various display media. Current utilization and future development are addressed.

  20. Homological stabilizer codes

    SciTech Connect

    Anderson, Jonas T.

    2013-03-15

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

  1. Getting the right grasp on executive function.

    PubMed

    Gonzalez, Claudia L R; Mills, Kelly J; Genee, Inge; Li, Fangfang; Piquette, Noella; Rosen, Nicole; Gibb, Robbin

    2014-01-01

    Executive Function (EF) refers to important socio-emotional and cognitive skills that are known to be highly correlated with both academic and life success. EF is a blanket term that is considered to include self-regulation, working memory, and planning. Recent studies have shown a relationship between EF and motor control. The emergence of motor control coincides with that of EF, hence understanding the relationship between these two domains could have significant implications for early detection and remediation of later EF deficits. The purpose of the current study was to investigate this relationship in young children. This study incorporated the Behavioral Rating Inventory of Executive Function (BRIEF) and two motor assessments with a focus on precision grasping to test this hypothesis. The BRIEF is comprised of two indices of EF: (1) the Behavioral Regulation Index (BRI) containing three subscales: Inhibit, Shift, and Emotional Control; (2) the Metacognition Index (MI) containing five subscales: Initiate, Working Memory, Plan/Organize, Organization of Materials, and Monitor. A global executive composite (GEC) is derived from the two indices. In this study, right-handed children aged 5-6 and 9-10 were asked to: grasp-to-construct (Lego® models); and grasp-to-place (wooden blocks), while their parents completed the BRIEF questionnaire. Analysis of results indicated significant correlations between the strength of right hand preference for grasping and numerous elements of the BRIEF including the BRI, MI, and GEC. Specifically, the more the right hand was used for grasping the better the EF ratings. In addition, patterns of space-use correlated with the GEC in several subscales of the BRIEF. Finally and remarkably, the results also showed a reciprocal relationship between hand and space use for grasping and EF. These findings are discussed with respect to: (1) the developmental overlap of motor and executive functions; (2) detection of EF deficits through tasks

  2. Getting the right grasp on executive function.

    PubMed

    Gonzalez, Claudia L R; Mills, Kelly J; Genee, Inge; Li, Fangfang; Piquette, Noella; Rosen, Nicole; Gibb, Robbin

    2014-01-01

    Executive Function (EF) refers to important socio-emotional and cognitive skills that are known to be highly correlated with both academic and life success. EF is a blanket term that is considered to include self-regulation, working memory, and planning. Recent studies have shown a relationship between EF and motor control. The emergence of motor control coincides with that of EF, hence understanding the relationship between these two domains could have significant implications for early detection and remediation of later EF deficits. The purpose of the current study was to investigate this relationship in young children. This study incorporated the Behavioral Rating Inventory of Executive Function (BRIEF) and two motor assessments with a focus on precision grasping to test this hypothesis. The BRIEF is comprised of two indices of EF: (1) the Behavioral Regulation Index (BRI) containing three subscales: Inhibit, Shift, and Emotional Control; (2) the Metacognition Index (MI) containing five subscales: Initiate, Working Memory, Plan/Organize, Organization of Materials, and Monitor. A global executive composite (GEC) is derived from the two indices. In this study, right-handed children aged 5-6 and 9-10 were asked to: grasp-to-construct (Lego® models); and grasp-to-place (wooden blocks), while their parents completed the BRIEF questionnaire. Analysis of results indicated significant correlations between the strength of right hand preference for grasping and numerous elements of the BRIEF including the BRI, MI, and GEC. Specifically, the more the right hand was used for grasping the better the EF ratings. In addition, patterns of space-use correlated with the GEC in several subscales of the BRIEF. Finally and remarkably, the results also showed a reciprocal relationship between hand and space use for grasping and EF. These findings are discussed with respect to: (1) the developmental overlap of motor and executive functions; (2) detection of EF deficits through tasks

  3. Getting the right grasp on executive function

    PubMed Central

    Gonzalez, Claudia L. R.; Mills, Kelly J.; Genee, Inge; Li, Fangfang; Piquette, Noella; Rosen, Nicole; Gibb, Robbin

    2014-01-01

    Executive Function (EF) refers to important socio-emotional and cognitive skills that are known to be highly correlated with both academic and life success. EF is a blanket term that is considered to include self-regulation, working memory, and planning. Recent studies have shown a relationship between EF and motor control. The emergence of motor control coincides with that of EF, hence understanding the relationship between these two domains could have significant implications for early detection and remediation of later EF deficits. The purpose of the current study was to investigate this relationship in young children. This study incorporated the Behavioral Rating Inventory of Executive Function (BRIEF) and two motor assessments with a focus on precision grasping to test this hypothesis. The BRIEF is comprised of two indices of EF: (1) the Behavioral Regulation Index (BRI) containing three subscales: Inhibit, Shift, and Emotional Control; (2) the Metacognition Index (MI) containing five subscales: Initiate, Working Memory, Plan/Organize, Organization of Materials, and Monitor. A global executive composite (GEC) is derived from the two indices. In this study, right-handed children aged 5–6 and 9–10 were asked to: grasp-to-construct (Lego® models); and grasp-to-place (wooden blocks), while their parents completed the BRIEF questionnaire. Analysis of results indicated significant correlations between the strength of right hand preference for grasping and numerous elements of the BRIEF including the BRI, MI, and GEC. Specifically, the more the right hand was used for grasping the better the EF ratings. In addition, patterns of space-use correlated with the GEC in several subscales of the BRIEF. Finally and remarkably, the results also showed a reciprocal relationship between hand and space use for grasping and EF. These findings are discussed with respect to: (1) the developmental overlap of motor and executive functions; (2) detection of EF deficits through

  4. Code Seal v 1.0

    2009-12-11

    CodeSeal is a Sandia National Laboratories developed technology that provides a means of securely obfuscating finite state machines in a mathematically provable way. The technology was developed in order to provide a solution for anti-reverse engineering, assured execution, and integrity of execution. CodeSeal accomplishes these goals with the addition of the concept of a trust anchor, a small piece of trust integrated into the system, to the model of code obfuscation. Code obfuscation is anmore » active area of academic research, but most findings have merely demonstrated that general obfuscation is impossible. By modifying the security model such that we may rely on the presence of a small, tamper-protected device, however, Sandia has developed an effective method for obfuscating code. An open publication describing the technology in more detail can be found at http://eprint.iacr.org/2008/184.pdf.Independent Software/Hardware monitors, Use control, Supervisory Control And Data Acquisition (SCADA), Algorithm obfuscation« less

  5. GridRun: A lightweight packaging and execution environment forcompact, multi-architecture binaries

    SciTech Connect

    Shalf, John; Goodale, Tom

    2004-02-01

    GridRun offers a very simple set of tools for creating and executing multi-platform binary executables. These ''fat-binaries'' archive native machine code into compact packages that are typically a fraction the size of the original binary images they store, enabling efficient staging of executables for heterogeneous parallel jobs. GridRun interoperates with existing distributed job launchers/managers like Condor and the Globus GRAM to greatly simplify the logic required launching native binary applications in distributed heterogeneous environments.

  6. ATLAS, an integrated structural analysis and design system. Volume 3: User's manual, input and execution data

    NASA Technical Reports Server (NTRS)

    Dreisbach, R. L. (Editor)

    1979-01-01

    The input data and execution control statements for the ATLAS integrated structural analysis and design system are described. It is operational on the Control Data Corporation (CDC) 6600/CYBER computers in a batch mode or in a time-shared mode via interactive graphic or text terminals. ATLAS is a modular system of computer codes with common executive and data base management components. The system provides an extensive set of general-purpose technical programs with analytical capabilities including stiffness, stress, loads, mass, substructuring, strength design, unsteady aerodynamics, vibration, and flutter analyses. The sequence and mode of execution of selected program modules are controlled via a common user-oriented language.

  7. Detection of the oomycete Pythium insidiosum by real-time PCR targeting the gene coding for exo-1,3-β-glucanase.

    PubMed

    Keeratijarut, Angsana; Lohnoo, Tassanee; Yingyong, Wanta; Rujirawat, Thidarat; Srichunrusami, Chutatip; Onpeaw, Pornpit; Chongtrakool, Piriyaporn; Brandhorst, T Tristan; Krajaejun, Theerapong

    2015-09-01

    Pythiosis is a life-threatening infectious disease caused by Pythium insidiosum. Early and accurate diagnosis is the key to prompt treatment and an improved prognosis for patients with pythiosis. An alternative to microbiological and immunological approaches for facilitating diagnosis of pythiosis is the PCR-based assay. Until recently, the ribosomal DNA (rDNA) region was the only target available for PCR-based detection of P. insidiosum. Failure to detect P. insidiosum by PCR amplification using the rDNA-specific primers has been reported. PinsEXO1, encoding an exo-1,3-β-glucanase, is an alternative, novel and efficient target for identification of P. insidiosum by conventional PCR. In this study, we aimed to develop a real-time (RT)-PCR approach targeting PinsEXO1 and compare its performance with conventional PCR for the detection of P. insidiosum. Both conventional and RT-PCR assays were positive for all 35 P. insidiosum strains tested, whilst all 58 control fungi were negative. The turnaround time for conventional PCR was 10 h, whilst that for RT-PCR was 7.5 h. The lowest amounts of genomic DNA template required for successful amplification by conventional and RT-PCR were 1 and 1 × 10(-4) ng, respectively. In conclusion, the RT-PCR assay retained 100% sensitivity and 100% specificity for detection of P. insidiosum. It showed a substantially improved analytical sensitivity and turnaround time that could improve diagnosis of pythiosis. The assay could also facilitate quantitative DNA analysis and epidemiological studies of P. insidiosum. PMID:26296566

  8. Complementary code and digital filtering for detection of weak VHF radar signals from the mesoscale. [SOUSY-VHF radar, Harz Mountains, Germany

    NASA Technical Reports Server (NTRS)

    Schmidt, G.; Ruster, R.; Czechowsky, P.

    1983-01-01

    The SOUSY-VHF-Radar operates at a frequency of 53.5 MHz in a valley in the Harz mountains, Germany, 90 km from Hanover. The radar controller, which is programmed by a 16-bit computer holds 1024 program steps in core and controls, via 8 channels, the whole radar system: in particular the master oscillator, the transmitter, the transmit-receive-switch, the receiver, the analog to digital converter, and the hardware adder. The high-sensitivity receiver has a dynamic range of 70 dB and a video bandwidth of 1 MHz. Phase coding schemes are applied, in particular for investigations at mesospheric heights, in order to carry out measurements with the maximum duty cycle and the maximum height resolution. The computer takes the data from the adder to store it in magnetic tape or disc. The radar controller is programmed by the computer using simple FORTRAN IV statements. After the program has been loaded and the computer has started the radar controller, it runs automatically, stopping at the program end. In case of errors or failures occurring during the radar operation, the radar controller is shut off caused either by a safety circuit or by a power failure circuit or by a parity check system.

  9. Generation of Java code from Alvis model

    NASA Astrophysics Data System (ADS)

    Matyasik, Piotr; Szpyrka, Marcin; Wypych, Michał

    2015-12-01

    Alvis is a formal language that combines graphical modelling of interconnections between system entities (called agents) and a high level programming language to describe behaviour of any individual agent. An Alvis model can be verified formally with model checking techniques applied to the model LTS graph that represents the model state space. This paper presents transformation of an Alvis model into executable Java code. Thus, the approach provides a method of automatic generation of a Java application from formally verified Alvis model.

  10. The Effect of Repetitive Saccade Execution on the Attention Network Test: Enhancing Executive Function with a Flick of the Eyes

    ERIC Educational Resources Information Center

    Edlin, James M.; Lyle, Keith B.

    2013-01-01

    The simple act of repeatedly looking left and right can enhance subsequent cognition, including divergent thinking, detection of matching letters from visual arrays, and memory retrieval. One hypothesis is that saccade execution enhances subsequent cognition by altering attentional control. To test this hypothesis, we compared performance…

  11. Transionospheric Propagation Code (TIPC)

    SciTech Connect

    Roussel-Dupre, R.; Kelley, T.A.

    1990-10-01

    The Transionospheric Propagation Code is a computer program developed at Los Alamos National Lab to perform certain tasks related to the detection of vhf signals following propagation through the ionosphere. The code is written in Fortran 77, runs interactively and was designed to be as machine independent as possible. A menu format in which the user is prompted to supply appropriate parameters for a given task has been adopted for the input while the output is primarily in the form of graphics. The user has the option of selecting from five basic tasks, namely transionospheric propagation, signal filtering, signal processing, DTOA study, and DTOA uncertainty study. For the first task a specified signal is convolved against the impulse response function of the ionosphere to obtain the transionospheric signal. The user is given a choice of four analytic forms for the input pulse or of supplying a tabular form. The option of adding Gaussian-distributed white noise of spectral noise to the input signal is also provided. The deterministic ionosphere is characterized to first order in terms of a total electron content (TEC) along the propagation path. In addition, a scattering model parameterized in terms of a frequency coherence bandwidth is also available. In the second task, detection is simulated by convolving a given filter response against the transionospheric signal. The user is given a choice of a wideband filter or a narrowband Gaussian filter. It is also possible to input a filter response. The third task provides for quadrature detection, envelope detection, and three different techniques for time-tagging the arrival of the transionospheric signal at specified receivers. The latter algorithms can be used to determine a TEC and thus take out the effects of the ionosphere to first order. Task four allows the user to construct a table of delta-times-of-arrival (DTOAs) vs TECs for a specified pair of receivers.

  12. Coding of Neuroinfectious Diseases.

    PubMed

    Barkley, Gregory L

    2015-12-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue. PMID:26633789

  13. Model Children's Code.

    ERIC Educational Resources Information Center

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  14. Medical aspects of capital punishment executions.

    PubMed

    Khan, Arif; Leventhal, Robyn M

    2002-07-01

    Between 1976 and the middle of 2001, approximately 718 human executions occurred in the U.S. (a small segment of worldwide executions). Data regarding the medical aspects of these executions are not readily available. We searched all public domain data in the U.S. to obtain specific data for all persons executed in the U.S. since 1976. Of the five methods of execution used (lethal injection, lethal gas, electrocution, hanging, and firing squad), significant differences emerged as measured by rate of complications, duration of time spent by the condemned in the "death chamber," as well as duration of time from the onset of execution procedures to pronouncement of death. These data suggest that human executions are difficult to carry out. Human executions are associated with significant physical complications. These data may help inform future discussions on human executions.

  15. Executive High School Internship Program.

    ERIC Educational Resources Information Center

    Duperrault, JoAnn Hunter

    1992-01-01

    The Executive High School Internship Program in Tampa, Florida, involves gifted and talented high school seniors working for a semester as nonpaid administrative assistants in public or private sector organizations. The program's history, recruitment policies, placement practices, and monitoring are reviewed. (DB)

  16. Integrating planning, execution, and learning

    NASA Technical Reports Server (NTRS)

    Kuokka, Daniel R.

    1989-01-01

    To achieve the goal of building an autonomous agent, the usually disjoint capabilities of planning, execution, and learning must be used together. An architecture, called MAX, within which cognitive capabilities can be purposefully and intelligently integrated is described. The architecture supports the codification of capabilities as explicit knowledge that can be reasoned about. In addition, specific problem solving, learning, and integration knowledge is developed.

  17. Executive Committee Report, April 2004

    ERIC Educational Resources Information Center

    Sarquis, Jerry L.; Holme, Thomas; Cooper, Melanie; White, Carol

    2004-01-01

    Anaheim executive committee report, April 2004 of American Chemical Society (ACS) is presented. It salutes the recipients of ACS awards at the CHED session and also covers the Spring 2004 ACS meeting abstracts, nominations for the division office and councilor's report.

  18. To Code or Not To Code?

    ERIC Educational Resources Information Center

    Parkinson, Brian; Sandhu, Parveen; Lacorte, Manel; Gourlay, Lesley

    1998-01-01

    This article considers arguments for and against the use of coding systems in classroom-based language research and touches on some relevant considerations from ethnographic and conversational analysis approaches. The four authors each explain and elaborate on their practical decision to code or not to code events or utterances at a specific point…

  19. An Assessment of the Detection of Highly Enriched Uranium and its Use in an Improvised Nuclear Device using the Monte Carlo Computer Code MCNP-5

    NASA Astrophysics Data System (ADS)

    Cochran, Thomas

    2007-04-01

    In 2002 and again in 2003, an investigative journalist unit at ABC News transported a 6.8 kilogram metallic slug of depleted uranium (DU) via shipping container from Istanbul, Turkey to Brooklyn, NY and from Jakarta, Indonesia to Long Beach, CA. Targeted inspection of these shipping containers by Department of Homeland Security (DHS) personnel, included the use of gamma-ray imaging, portal monitors and hand-held radiation detectors, did not uncover the hidden DU. Monte Carlo analysis of the gamma-ray intensity and spectrum of a DU slug and one consisting of highly-enriched uranium (HEU) showed that DU was a proper surrogate for testing the ability of DHS to detect the illicit transport of HEU. Our analysis using MCNP-5 illustrated the ease of fully shielding an HEU sample to avoid detection. The assembly of an Improvised Nuclear Device (IND) -- a crude atomic bomb -- from sub-critical pieces of HEU metal was then examined via Monte Carlo criticality calculations. Nuclear explosive yields of such an IND as a function of the speed of assembly of the sub-critical HEU components were derived. A comparison was made between the more rapid assembly of sub-critical pieces of HEU in the ``Little Boy'' (Hiroshima) weapon's gun barrel and gravity assembly (i.e., dropping one sub-critical piece of HEU on another from a specified height). Based on the difficulty of detection of HEU and the straightforward construction of an IND utilizing HEU, current U.S. government policy must be modified to more urgently prioritize elimination of and securing the global inventories of HEU.

  20. Attack diagnosis on binary executables using dynamic program slicing

    NASA Astrophysics Data System (ADS)

    Huang, Shan; Zheng, Yudi; Zhang, Ruoyu

    2011-12-01

    Nowadays, the level of the practically used programs is often complex and of such a large scale so that it is not as easy to analyze and debug them as one might expect. And it is quite difficult to diagnose attacks and find vulnerabilities in such large-scale programs. Thus, dynamic program slicing becomes a popular and effective method for program comprehension and debugging since it can reduce the analysis scope greatly and drop useless data that do not influence the final result. Besides, most of existing dynamic slicing tools perform dynamic slicing in the source code level, but the source code is not easy to obtain in practice. We believe that we do need some kinds of systems to help the users understand binary programs. In this paper, we present an approach of diagnosing attacks using dynamic backward program slicing based on binary executables, and provide a dynamic binary slicing tool named DBS to analyze binary executables precisely and efficiently. It computes the set of instructions that may have affected or been affected by slicing criterion set in certain location of the binary execution stream. This tool also can organize the slicing results by function call graphs and control flow graphs clearly and hierarchically.

  1. Symbolic PathFinder: Symbolic Execution of Java Bytecode

    NASA Technical Reports Server (NTRS)

    Pasareanu, Corina S.; Rungta, Neha

    2010-01-01

    Symbolic Pathfinder (SPF) combines symbolic execution with model checking and constraint solving for automated test case generation and error detection in Java programs with unspecified inputs. In this tool, programs are executed on symbolic inputs representing multiple concrete inputs. Values of variables are represented as constraints generated from the analysis of Java bytecode. The constraints are solved using off-the shelf solvers to generate test inputs guaranteed to achieve complex coverage criteria. SPF has been used successfully at NASA, in academia, and in industry.

  2. Bare Code Reader

    NASA Astrophysics Data System (ADS)

    Clair, Jean J.

    1980-05-01

    The Bare code system will be used, in every market and supermarket. The code, which is normalised in US and Europe (code EAN) gives informations on price, storage, nature and allows in real time the gestion of theshop.

  3. What's Cooking? - Cognitive Training of Executive Function in the Elderly.

    PubMed

    Wang, Man-Ying; Chang, Chien-Yu; Su, Shou-Yi

    2011-01-01

    Executive function involves the efficient and adaptive engagement of the control processes of updating, shifting, and inhibition (Miyake, 2000) to guide behavior toward a goal. It is associated with decrements in many other cognitive functions due to aging (West, 1996; Raz, 2000) with itself particularly vulnerable to the effect of aging (Treitz et al., 2007). Cognitive training in the form of structural experience with executive coordination demands exhibited effective enhancement in the elderly (Hertzog et al., 2008). The current study was thus aimed at the development and evaluation of a training regime for executive function in the elderly. The breakfast cooking task of Craik and Bialystok (2006) was adapted into a multitasking training task in a session (pre-test vs. post-test) by group (control vs. training). In the training condition, participants constantly switched, updated, and planned in order to control the cooking of several foods and concurrently performed a table setting secondary task. Training gains were exhibited on task related measures. Transfer effect was selectively observed on the letter-number sequencing and digit symbol coding test. The cooking training produced short term increase in the efficiency of executive control processing. These effects were interpreted in terms of the process overlap between the training and the transfer tasks.

  4. Executive and Language Control in the Multilingual Brain

    PubMed Central

    Kong, Anthony Pak-Hin; Abutalebi, Jubin; Lam, Karen Sze-Yan; Weekes, Brendan

    2014-01-01

    Neuroimaging studies suggest that the neural network involved in language control may not be specific to bi-/multilingualism but is part of a domain-general executive control system. We report a trilingual case of a Cantonese (L1), English (L2), and Mandarin (L3) speaker, Dr. T, who sustained a brain injury at the age of 77 causing lesions in the left frontal lobe and in the left temporo-parietal areas resulting in fluent aphasia. Dr. T's executive functions were impaired according to a modified version of the Stroop color-word test and the Wisconsin Card Sorting Test performance was characterized by frequent perseveration errors. Dr. T demonstrated pathological language switching and mixing across her three languages. Code switching in Cantonese was more prominent in discourse production than confrontation naming. Our case suggests that voluntary control of spoken word production in trilingual speakers shares neural substrata in the frontobasal ganglia system with domain-general executive control mechanisms. One prediction is that lesions to such a system would give rise to both pathological switching and impairments of executive functions in trilingual speakers. PMID:24868121

  5. Executive and language control in the multilingual brain.

    PubMed

    Kong, Anthony Pak-Hin; Abutalebi, Jubin; Lam, Karen Sze-Yan; Weekes, Brendan

    2014-01-01

    Neuroimaging studies suggest that the neural network involved in language control may not be specific to bi-/multilingualism but is part of a domain-general executive control system. We report a trilingual case of a Cantonese (L1), English (L2), and Mandarin (L3) speaker, Dr. T, who sustained a brain injury at the age of 77 causing lesions in the left frontal lobe and in the left temporo-parietal areas resulting in fluent aphasia. Dr. T's executive functions were impaired according to a modified version of the Stroop color-word test and the Wisconsin Card Sorting Test performance was characterized by frequent perseveration errors. Dr. T demonstrated pathological language switching and mixing across her three languages. Code switching in Cantonese was more prominent in discourse production than confrontation naming. Our case suggests that voluntary control of spoken word production in trilingual speakers shares neural substrata in the frontobasal ganglia system with domain-general executive control mechanisms. One prediction is that lesions to such a system would give rise to both pathological switching and impairments of executive functions in trilingual speakers.

  6. Performing aggressive code optimization with an ability to rollback changes made by the aggressive optimizations

    DOEpatents

    Gschwind, Michael K

    2013-07-23

    Mechanisms for aggressively optimizing computer code are provided. With these mechanisms, a compiler determines an optimization to apply to a portion of source code and determines if the optimization as applied to the portion of source code will result in unsafe optimized code that introduces a new source of exceptions being generated by the optimized code. In response to a determination that the optimization is an unsafe optimization, the compiler generates an aggressively compiled code version, in which the unsafe optimization is applied, and a conservatively compiled code version in which the unsafe optimization is not applied. The compiler stores both versions and provides them for execution. Mechanisms are provided for switching between these versions during execution in the event of a failure of the aggressively compiled code version. Moreover, predictive mechanisms are provided for predicting whether such a failure is likely.

  7. A Survey of New Trends in Symbolic Execution for Software Testing and Analysis

    NASA Technical Reports Server (NTRS)

    Pasareanu, Corina S.; Visser, Willem

    2009-01-01

    Symbolic execution is a well-known program analysis technique which represents values of program inputs with symbolic values instead of concrete (initialized) data and executes the program by manipulating program expressions involving the symbolic values. Symbolic execution has been proposed over three decades ago but recently it has found renewed interest in the research community, due in part to the progress in decision procedures, availability of powerful computers and new algorithmic developments. We provide a survey of some of the new research trends in symbolic execution, with particular emphasis on applications to test generation and program analysis. We first describe an approach that handles complex programming constructs such as input data structures, arrays, as well as multi-threading. We follow with a discussion of abstraction techniques that can be used to limit the (possibly infinite) number of symbolic configurations that need to be analyzed for the symbolic execution of looping programs. Furthermore, we describe recent hybrid techniques that combine concrete and symbolic execution to overcome some of the inherent limitations of symbolic execution, such as handling native code or availability of decision procedures for the application domain. Finally, we give a short survey of interesting new applications, such as predictive testing, invariant inference, program repair, analysis of parallel numerical programs and differential symbolic execution.

  8. Archimedes: A system that plans and executes mechanical assemblies

    SciTech Connect

    Strip, D.

    1990-01-01

    Archimedes is a prototype mechanical assembly system which generates and executes robot assembly programs from a CAD model input. The system addresses the unrealized potential for flexibility in robotic mechanical assembly applications by automating the programming task. Input is a solid model of the finished assembly. Parts relationships and geometric constraints are deduced from the solid model. A rule-based planner generates a generic'' assembly plan that satisfies the geometric constraints, as well as other constraints embodied in the rules. A retargetable plan compiler converts the generic plan into code specific to an application environment. Execution of the compiled plan in a workcell containing an Adept Two robot, a vision system, and other parts handling equipment will be shown on videotape.

  9. Kepler Scientific Workflow Design and Execution with Contexts

    SciTech Connect

    Ngu, Anne Hee Hiong; Jamnagarwala, Arwa; Chin, George; Sivaramakrishnan, Chandrika; Critchlow, Terence J.

    2011-09-01

    A context-aware scientific workflow is a typical scientific workflow that is enhanced with context binding and awareness mechanisms. Context facilitates further configuration of the scientific workflow at runtime such that it is tuned to its environment during execution and responds intelligently based on such awareness without customized coding of the workflow. In this paper, we present a context annotation framework, which supports rapid development of context-aware scientific workflows. Context annotation enables a diverse type of actor in Kepler that may bind with different sensed environmental information as part of the actor’s regular data. Context-aware actors simplify the construction of scientific workflows that require intricate knowledge in initializing and configuring a large number of parameters to cover all different execution conditions. This paper presents the motivation, system design, implementation, and usage of context annotation in relation to the Kepler scientific workflow system.

  10. Fluorescent taggants with temporally coded signatures.

    PubMed

    Wang, Siyang; Vyas, Raul; Dwyer, Chris

    2016-07-11

    In this paper, resonance energy transfer (RET) networks between chromophores are used to implement fluorescent taggants with temporally coded signatures. Because the temporal signature of such a fluorescent taggant is a phase-type distribution defined by the geometry of its RET network, the taggant design is not constrained by resolvable dyes and has a significantly larger coding capacity than spectrally or lifetime coded fluorescent taggants. Meanwhile, the detection process becomes highly efficient when the signatures are coded in the time domain. The taggant identification method is based on the multinomial distribution of detected photons and Maximum Likelihood Estimation, which guarantees high accuracy even with only a few hundred photons and also applies to a mixture of taggants in multiplex detection. Therefore, these temporally coded fluorescent taggants have great potential for both in situ and Lidar applications. PMID:27410827

  11. Qualitative change in executive control during childhood and adulthood

    PubMed Central

    Chevalier, Nicolas; Wiebe, Sandra A.; Huber, Kristina L.; Espy, Kimberly Andrews

    2013-01-01

    Executive control development typically has been conceptualized to result from quantitative changes in the efficiency of the underlying processes. In contrast, the present study addressed the possibility of qualitative change with age by examining how children and adults detect task switches. Participants in three age groups (5- and 10-year-old children, young adults) completed two conditions of a cued task-switching paradigm where task cues were presented either in isolation or in conjunction with transition cues. Five-year-olds performed better with transition cues, whereas the reverse effect was observed at age 10 and with adults. Unlike 5-year-olds who detect switches after semantically processing cues, older participants strategically detect switches based on perceptual processing only. Age-related qualitative changes promote increasingly optimal adjustment of executive resources with age. PMID:23562979

  12. Automatic code generation from the OMT-based dynamic model

    SciTech Connect

    Ali, J.; Tanaka, J.

    1996-12-31

    The OMT object-oriented software development methodology suggests creating three models of the system, i.e., object model, dynamic model and functional model. We have developed a system that automatically generates implementation code from the dynamic model. The system first represents the dynamic model as a table and then generates executable Java language code from it. We used inheritance for super-substate relationships. We considered that transitions relate to states in a state diagram exactly as operations relate to classes in an object diagram. In the generated code, each state in the state diagram becomes a class and each event on a state becomes an operation on the corresponding class. The system is implemented and can generate executable code for any state diagram. This makes the role of the dynamic model more significant and the job of designers even simpler.

  13. Optimizing Tensor Contraction Expressions for Hybrid CPU-GPU Execution

    SciTech Connect

    Ma, Wenjing; Krishnamoorthy, Sriram; Villa, Oreste; Kowalski, Karol; Agrawal, Gagan

    2013-03-01

    Tensor contractions are generalized multidimensional matrix multiplication operations that widely occur in quantum chemistry. Efficient execution of tensor contractions on Graphics Processing Units (GPUs) requires several challenges to be addressed, including index permutation and small dimension-sizes reducing thread block utilization. Moreover, to apply the same optimizations to various expressions, we need a code generation tool. In this paper, we present our approach to automatically generate CUDA code to execute tensor contractions on GPUs, including management of data movement between CPU and GPU. To evaluate our tool, GPU-enabled code is generated for the most expensive contractions in CCSD(T), a key coupled cluster method, and incorporated into NWChem, a popular computational chemistry suite. For this method, we demonstrate speedup over a factor of 8.4 using one GPU (instead of one core per node) and over 2.6 when utilizing the entire system using hybrid CPU+GPU solution with 2 GPUs and 5 cores (instead of 7 cores per node). Finally, we analyze the implementation behavior on future GPU systems.

  14. Restructuring symbolic programs for concurrent execution on microprocessors

    SciTech Connect

    Larus, J.R. . Computer Science Div.)

    1989-01-01

    Curare, the program restructurer described in this dissertation, automatically transforms a sequential Lisp program into an equivalent concurrent program that executes on a multiprocessor. Curare first analyzes a program to find its control and data dependences. This analysis is most difficult for references to structures connected by pointers. Curare uses a new data-dependence algorithm, which finds and classifies these dependences. The analysis is conservative and may detect conflicts that do not arise in practice. A programmer can temper and refine its results with declarations. Dependences constrain the program's concurrent execution because, in general, two conflicting statements cannot execute in a different order without affecting the program's result. A restructurer must know all dependences in order to preserve them. However, no all dependences are essential to produce the program's result. Curare attempts to transform the program so it computes its result with fewer conflicts. An optimized program will execute with less synchronization and more accuracy. Curare then examines loops in a program to find those that are unconstrained or lightly constrained by dependences. By necessity, Curare treats recursive functions as loops and does not limit itself to explicit program loops. Recursive functions offer several advantages over explicit loops since they provide a convenient framework for inserting locks and handling the dynamic behavior of symbolic programs. Restructured programs execute significantly faster than the original sequential programs. This improvement is large enough to attract programmers to a multiprocessor.

  15. Accumulate repeat accumulate codes

    NASA Technical Reports Server (NTRS)

    Abbasfar, Aliazam; Divsalar, Dariush; Yao, Kung

    2004-01-01

    In this paper we propose an innovative channel coding scheme called 'Accumulate Repeat Accumulate codes' (ARA). This class of codes can be viewed as serial turbo-like codes, or as a subclass of Low Density Parity Check (LDPC) codes, thus belief propagation can be used for iterative decoding of ARA codes on a graph. The structure of encoder for this class can be viewed as precoded Repeat Accumulate (RA) code or as precoded Irregular Repeat Accumulate (IRA) code, where simply an accumulator is chosen as a precoder. Thus ARA codes have simple, and very fast encoder structure when they representing LDPC codes. Based on density evolution for LDPC codes through some examples for ARA codes, we show that for maximum variable node degree 5 a minimum bit SNR as low as 0.08 dB from channel capacity for rate 1/2 can be achieved as the block size goes to infinity. Thus based on fixed low maximum variable node degree, its threshold outperforms not only the RA and IRA codes but also the best known LDPC codes with the dame maximum node degree. Furthermore by puncturing the accumulators any desired high rate codes close to code rate 1 can be obtained with thresholds that stay close to the channel capacity thresholds uniformly. Iterative decoding simulation results are provided. The ARA codes also have projected graph or protograph representation that allows for high speed decoder implementation.

  16. Executions as a deterrent to homicide.

    PubMed

    Lester, D

    2000-10-01

    For the period 1977-1992, the number of homicides in a state tended to decrease more often after a year of no executions than after a year with one or more executions, the opposite of a deterrent effect.

  17. Executive Function in Adolescents with ADHD

    ERIC Educational Resources Information Center

    Martel, Michelle; Nikolas, Molly; Nigg, Joel T.

    2007-01-01

    A study is conducted to determine the specificity of executive function weakness in attention-deficit/hyperactivity disorder (ADHD) during adolescence. Results suggest that executive function weakness in ADHD is specifically associated with symptoms of inattention-disorganization.

  18. Cooperative mission execution and planning

    NASA Astrophysics Data System (ADS)

    Flann, Nicholas S.; Saunders, Kevin S.; Pells, Larry

    1998-08-01

    Utilizing multiple cooperating autonomous vehicles to perform tasks enhances robustness and efficiency over the use of a single vehicle. Furthermore, because autonomous vehicles can be controlled precisely and their status known accurately in real time, new types of cooperative behaviors are possible. This paper presents a working system called MEPS that plans and executes missions for multiple autonomous vehicles in large structured environments. Two generic spatial tasks are supported, to sweep an area and to visit a location while activating on-board equipment. Tasks can be entered both initially by the user and dynamically during mission execution by both users and vehicles. Sensor data and task achievement data is shared among the vehicles enabling them to cooperatively adapt to changing environmental, vehicle and tasks conditions. The system has been successfully applied to control ATV and micro-robotic vehicles in precision agriculture and waste-site characterization environments.

  19. Parallelizing the XSTAR Photoionization Code

    NASA Astrophysics Data System (ADS)

    Noble, M. S.; Ji, L.; Young, A.; Lee, J. C.

    2009-09-01

    We describe two means by which XSTAR, a code which computes physical conditions and emission spectra of photoionized gases, has been parallelized. The first is pvmxstar, a wrapper which can be used in place of the serial xstar2xspec script to foster concurrent execution of the XSTAR command line application on independent sets of parameters. The second is pmodel, a plugin for the Interactive Spectral Interpretation System (ISIS) which allows arbitrary components of a broad range of astrophysical models to be distributed across processors during fitting and confidence limits calculations, by scientists with little training in parallel programming. Plugging the XSTAR family of analytic models into pmodel enables multiple ionization states (e.g., of a complex absorber/emitter) to be computed simultaneously, alleviating the often prohibitive expense of the traditional serial approach. Initial performance results indicate that these methods substantially enlarge the problem space to which XSTAR may be applied within practical timeframes.

  20. Hydrology Section Executive Committee minutes

    NASA Astrophysics Data System (ADS)

    Mercer, James W.

    The AGU Hydrology Section Executive Committee Meeting was called to order at approximately 4 P.M. on Monday, December 8, 1986 by Marshall Moss. In attendance were George Pinder, Allan Freeze, Jim Mercer, Ron Cummings, Ken Bencala, Jim Wallis, Simon Ince, Jack Stone, Jeff Dozier, Don Nielson, Ivan Johnson, John Wilson, Helen Peters, Jurate Landwehr, Karen Prestegaard, Soroosh Sorooshian, Jery Stedinger, Peter Kitanidis, Rafael Bras, and Waldo Smith.

  1. Hydrology Section Executive Committee Minutes

    NASA Astrophysics Data System (ADS)

    Mercer, James W.

    The AGU Hydrology Section Executive Committee Meeting was called to order at approximately 4 P.M. on Monday, May 18, 1987, by Hydrology Section President Marshall Moss. In attendance were President-Elect George Pinder, Secretary Jim Mercer, Ron Cummings, Helen Joyce Peters, Peter Eagleson, Stephen Burges, Jim Wallis, Jurate Landwehr, Don Nielson, Ken Bencala, Pete Loucks, Jery Stedinger, Dennis Lettenmaier, Lenny Konikow, Ken Potter, John Wilson, Ivan Johnson, and Judy Holoviak.

  2. Financial accounting for radiology executives.

    PubMed

    Seidmann, Abraham; Mehta, Tushar

    2005-03-01

    The authors review the role of financial accounting information from the perspective of a radiology executive. They begin by introducing the role of pro forma statements. They discuss the fundamental concepts of accounting, including the matching principle and accrual accounting. The authors then explore the use of financial accounting information in making investment decisions in diagnostic medical imaging. The paper focuses on critically evaluating the benefits and limitations of financial accounting for decision making in a radiology practice.

  3. Antiplagiarism Software Takes on the Honor Code

    ERIC Educational Resources Information Center

    Wasley, Paula

    2008-01-01

    Among the 100-odd colleges with academic honor codes, plagiarism-detection services raise a knotty problem: Is software compatible with a system based on trust? The answer frequently devolves to the size and culture of the university. Colleges with traditional student-run honor codes tend to "forefront" trust, emphasizing it above all else. This…

  4. Concurrent Image Processing Executive (CIPE)

    NASA Technical Reports Server (NTRS)

    Lee, Meemong; Cooper, Gregory T.; Groom, Steven L.; Mazer, Alan S.; Williams, Winifred I.

    1988-01-01

    The design and implementation of a Concurrent Image Processing Executive (CIPE), which is intended to become the support system software for a prototype high performance science analysis workstation are discussed. The target machine for this software is a JPL/Caltech Mark IIIfp Hypercube hosted by either a MASSCOMP 5600 or a Sun-3, Sun-4 workstation; however, the design will accommodate other concurrent machines of similar architecture, i.e., local memory, multiple-instruction-multiple-data (MIMD) machines. The CIPE system provides both a multimode user interface and an applications programmer interface, and has been designed around four loosely coupled modules; (1) user interface, (2) host-resident executive, (3) hypercube-resident executive, and (4) application functions. The loose coupling between modules allows modification of a particular module without significantly affecting the other modules in the system. In order to enhance hypercube memory utilization and to allow expansion of image processing capabilities, a specialized program management method, incremental loading, was devised. To minimize data transfer between host and hypercube a data management method which distributes, redistributes, and tracks data set information was implemented.

  5. The Planning Execution Monitoring Architecture

    NASA Technical Reports Server (NTRS)

    Wang, Lui; Ly, Bebe; Crocker, Alan; Schreckenghost, Debra; Mueller, Stephen; Phillips, Robert; Wadsworth, David; Sorensen, Charles

    2011-01-01

    The Planning Execution Monitoring (PEM) architecture is a design concept for developing autonomous cockpit command and control software. The PEM architecture is designed to reduce the operations costs in the space transportation system through the use of automation while improving safety and operability of the system. Specifically, the PEM autonomous framework enables automatic performance of many vehicle operations that would typically be performed by a human. Also, this framework supports varying levels of autonomous control, ranging from fully automatic to fully manual control. The PEM autonomous framework interfaces with the core flight software to perform flight procedures. It can either assist human operators in performing procedures or autonomously execute routine cockpit procedures based on the operational context. Most importantly, the PEM autonomous framework promotes and simplifies the capture, verification, and validation of the flight operations knowledge. Through a hierarchical decomposition of the domain knowledge, the vehicle command and control capabilities are divided into manageable functional "chunks" that can be captured and verified separately. These functional units, each of which has the responsibility to manage part of the vehicle command and control, are modular, re-usable, and extensible. Also, the functional units are self-contained and have the ability to plan and execute the necessary steps for accomplishing a task based upon the current mission state and available resources. The PEM architecture has potential for application outside the realm of spaceflight, including management of complex industrial processes, nuclear control, and control of complex vehicles such as submarines or unmanned air vehicles.

  6. Varying execution discipline to increase performance

    SciTech Connect

    Campbell, P.L.; Maccabe, A.B.

    1993-12-22

    This research investigates the relationship between execution discipline and performance. The hypothesis has two parts: 1. Different execution disciplines exhibit different performance for different computations, and 2. These differences can be effectively predicted by heuristics. A machine model is developed that can vary its execution discipline. That is, the model can execute a given program using either the control-driven, data-driven or demand-driven execution discipline. This model is referred to as a ``variable-execution-discipline`` machine. The instruction set for the model is the Program Dependence Web (PDW). The first part of the hypothesis will be tested by simulating the execution of the machine model on a suite of computations, based on the Livermore Fortran Kernel (LFK) Test (a.k.a. the Livermore Loops), using all three execution disciplines. Heuristics are developed to predict relative performance. These heuristics predict (a) the execution time under each discipline for one iteration of each loop and (b) the number of iterations taken by that loop; then the heuristics use those predictions to develop a prediction for the execution of the entire loop. Similar calculations are performed for branch statements. The second part of the hypothesis will be tested by comparing the results of the simulated execution with the predictions produced by the heuristics. If the hypothesis is supported, then the door is open for the development of machines that can vary execution discipline to increase performance.

  7. On the Evolutionary Origins of Executive Functions

    ERIC Educational Resources Information Center

    Ardila, Alfredo

    2008-01-01

    In this paper it is proposed that the prefrontal lobe participates in two closely related but different executive function abilities: (1) "metacognitive executive functions": problem solving, planning, concept formation, strategy development and implementation, controlling attention, working memory, and the like; that is, executive functions as…

  8. Physician executives boost clout, earning power.

    PubMed

    Dister, Lois

    2002-01-01

    Results of the 2001 Physician Executive Compensation Survey are in and they show that physician executives working in practice/hospital management companies or single specialty groups earn the highest pay. Physician executives with advanced degrees appear to earn more, as well.

  9. Assessing Executive Functioning: A Pragmatic Review

    ERIC Educational Resources Information Center

    Hass, Michael R.; Patterson, Ashlea; Sukraw, Jocelyn; Sullivan, Brianna M.

    2014-01-01

    Despite the common usage of the term "executive functioning" in neuropsychology, several aspects of this concept remain unsettled. In this paper, we will address some of the issues surrounding the notion of executive functioning and how an understanding of executive functioning and its components might assist school-based practitioners…

  10. Executive Functions in Savant Artists with Autism

    ERIC Educational Resources Information Center

    Crane, Laura; Pring, Linda; Ryder, Nicola; Hermelin, Beate

    2011-01-01

    Although executive functions have been widely studied in individuals with autism spectrum disorders (ASD), there have been no direct empirical studies of executive abilities in savants with ASD. This study assessed three facets of executive ability (fluency, perseveration and monitoring) in savant artists with ASD, compared to non-talented adults…

  11. 45 CFR 1700.5 - Executive Director.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Executive Director. 1700.5 Section 1700.5 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL COMMISSION ON LIBRARIES AND INFORMATION SCIENCE ORGANIZATION AND FUNCTIONS § 1700.5 Executive Director. (a) The Executive Director...

  12. Varieties of Executive Dysfunction in Autism.

    ERIC Educational Resources Information Center

    Hughes, Claire; Russell, Jim

    This paper presents four studies which illustrate the variety of deficits in executive function displayed by individuals with autism. The concept of executive function is used to encompass all the mental operations which are involved in self-reflective and goal-directed behavior. Four forms of executive control are addressed: mental disengagement,…

  13. 45 CFR 1700.5 - Executive Director.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 4 2011-10-01 2011-10-01 false Executive Director. 1700.5 Section 1700.5 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL COMMISSION ON LIBRARIES AND INFORMATION SCIENCE ORGANIZATION AND FUNCTIONS § 1700.5 Executive Director. (a) The Executive Director...

  14. Primer for the Transportable Applications Executive

    NASA Technical Reports Server (NTRS)

    Carlson, P. A.; Emmanuelli, C. A.; Harris, E. L.; Perkins, D. C.

    1984-01-01

    The Transportable Applications Executive (TAE), an interactive multipurpose executive that provides commonly required functions for scientific analysis systems, is discussed. The concept of an executive is discussed and the various components of TAE are presented. These include on-line help information, the use of menus or commands to access analysis programs, and TAE command procedures.

  15. Transformational leadership and the nurse executive.

    PubMed

    Dunham, J; Klafehn, K A

    1990-04-01

    Effective nurse executive leadership is paramount in today's health care environment. Such leadership includes the qualities of a transformational leader and, to a lesser extent, a transactional leader. A study conducted among excellent nurse executives and members of their immediate staff showed that all executives were predominantly transformational leaders but also possessed transactional leadership skills.

  16. Discussion on LDPC Codes and Uplink Coding

    NASA Technical Reports Server (NTRS)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  17. Manually operated coded switch

    DOEpatents

    Barnette, Jon H.

    1978-01-01

    The disclosure relates to a manually operated recodable coded switch in which a code may be inserted, tried and used to actuate a lever controlling an external device. After attempting a code, the switch's code wheels must be returned to their zero positions before another try is made.

  18. Parafermion stabilizer codes

    NASA Astrophysics Data System (ADS)

    Güngördü, Utkan; Nepal, Rabindra; Kovalev, Alexey A.

    2014-10-01

    We define and study parafermion stabilizer codes, which can be viewed as generalizations of Kitaev's one-dimensional (1D) model of unpaired Majorana fermions. Parafermion stabilizer codes can protect against low-weight errors acting on a small subset of parafermion modes in analogy to qudit stabilizer codes. Examples of several smallest parafermion stabilizer codes are given. A locality-preserving embedding of qudit operators into parafermion operators is established that allows one to map known qudit stabilizer codes to parafermion codes. We also present a local 2D parafermion construction that combines topological protection of Kitaev's toric code with additional protection relying on parity conservation.

  19. Rapid detection of HCV genotyping 1a, 1b, 2a, 3a, 3b and 6a in a single reaction using two-melting temperature codes by a real-time PCR-based assay.

    PubMed

    Athar, Muhammad Ammar; Xu, Ye; Xie, Xiaoting; Xu, Zhenxing; Ahmad, Vakil; Hayder, Zulfiqar; Hussain, Syed Sajid; Liao, Yiqun; Li, Qingge

    2015-09-15

    The genotype of the hepatitis C virus (HCV) is an important indicator for antiviral therapeutic response. We hereby described development of a rapid HCV genotyping approach that enabled the identification of the six most common HCV subtypes of Asia, i.e., 1a, 1b, 2a, 3a, 3b, and 6a, in a single reaction. Using two dual-labeled, self-quenched probes that target the core region of the HCV genome, the exact subtype could be accurately identified by two-melting temperature codes determined from the two respective probes in a real-time PCR assay. Analytical sensitivity studies using armored RNA samples representing each of the six HCV subtypes showed that 5 copies/reaction of HCV RNA could be detected. The assay was evaluated using 244 HCV-positive serum samples and the results were compared with sequencing analysis. Of the 224 samples, subtype 3a (127, 52.3%) was the dominant, followed by 1b (51, 20.9%), 3b (47, 19.3%), 2a (8, 3.3%), 6a (4, 1.6%) and the least was subtype 1a (1, 0.4%). Moreover, 6 (2.5%) mixed infection samples were also detected. These results were fully concordant with sequencing analysis. We concluded that this real-time PCR-based assay could provide a rapid and reliable tool for routine HCV genotyping in most Asian countries.

  20. Automatic Code Generation for Instrument Flight Software

    NASA Technical Reports Server (NTRS)

    Wagstaff, Kiri L.; Benowitz, Edward; Byrne, D. J.; Peters, Ken; Watney, Garth

    2008-01-01

    Automatic code generation can be used to convert software state diagrams into executable code, enabling a model- based approach to software design and development. The primary benefits of this process are reduced development time and continuous consistency between the system design (statechart) and its implementation. We used model-based design and code generation to produce software for the Electra UHF radios that is functionally equivalent to software that will be used by the Mars Reconnaissance Orbiter (MRO) and the Mars Science Laboratory to communicate with each other. The resulting software passed all of the relevant MRO flight software tests, and the project provides a useful case study for future work in model-based software development for flight software systems.

  1. The Best Practices of Executive Coaches with C-Level Executives

    ERIC Educational Resources Information Center

    Francis, Thomas E.

    2011-01-01

    This dissertation explored the Best Practices of Executive Coaches who coach C-Level Executives. The set of best practices developed was differentiated from best practices as applied with middle-manager executive clients. C-level executives were deemed to have a role within the organization with unusual influence and complexity and thus worthy of…

  2. How Executive Coaches Assess and Develop Emotional Intelligence in the Executive Suite

    ERIC Educational Resources Information Center

    McNevin, Mary

    2010-01-01

    This qualitative research study explores the connections between executive coaching and emotional intelligence (EI) when working with senior level executives. The focus is on coaching the senior executives (chief executive officer, chief financial officer, senior vice-presidents) of companies of over $1 billion dollars in revenue. Since research…

  3. Peripheral coding of taste

    PubMed Central

    Liman, Emily R.; Zhang, Yali V.; Montell, Craig

    2014-01-01

    Five canonical tastes, bitter, sweet, umami (amino acid), salty and sour (acid) are detected by animals as diverse as fruit flies and humans, consistent with a near universal drive to consume fundamental nutrients and to avoid toxins or other harmful compounds. Surprisingly, despite this strong conservation of basic taste qualities between vertebrates and invertebrates, the receptors and signaling mechanisms that mediate taste in each are highly divergent. The identification over the last two decades of receptors and other molecules that mediate taste has led to stunning advances in our understanding of the basic mechanisms of transduction and coding of information by the gustatory systems of vertebrates and invertebrates. In this review, we discuss recent advances in taste research, mainly from the fly and mammalian systems, and we highlight principles that are common across species, despite stark differences in receptor types. PMID:24607224

  4. ARA type protograph codes

    NASA Technical Reports Server (NTRS)

    Divsalar, Dariush (Inventor); Abbasfar, Aliazam (Inventor); Jones, Christopher R. (Inventor); Dolinar, Samuel J. (Inventor); Thorpe, Jeremy C. (Inventor); Andrews, Kenneth S. (Inventor); Yao, Kung (Inventor)

    2008-01-01

    An apparatus and method for encoding low-density parity check codes. Together with a repeater, an interleaver and an accumulator, the apparatus comprises a precoder, thus forming accumulate-repeat-accumulate (ARA codes). Protographs representing various types of ARA codes, including AR3A, AR4A and ARJA codes, are described. High performance is obtained when compared to the performance of current repeat-accumulate (RA) or irregular-repeat-accumulate (IRA) codes.

  5. QR Codes 101

    ERIC Educational Resources Information Center

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  6. Multiplexed coding in the human basal ganglia

    NASA Astrophysics Data System (ADS)

    Andres, D. S.; Cerquetti, D.; Merello, M.

    2016-04-01

    A classic controversy in neuroscience is whether information carried by spike trains is encoded by a time averaged measure (e.g. a rate code), or by complex time patterns (i.e. a time code). Here we apply a tool to quantitatively analyze the neural code. We make use of an algorithm based on the calculation of the temporal structure function, which permits to distinguish what scales of a signal are dominated by a complex temporal organization or a randomly generated process. In terms of the neural code, this kind of analysis makes it possible to detect temporal scales at which a time patterns coding scheme or alternatively a rate code are present. Additionally, finding the temporal scale at which the correlation between interspike intervals fades, the length of the basic information unit of the code can be established, and hence the word length of the code can be found. We apply this algorithm to neuronal recordings obtained from the Globus Pallidus pars interna from a human patient with Parkinson’s disease, and show that a time pattern coding and a rate coding scheme co-exist at different temporal scales, offering a new example of multiplexed neuronal coding.

  7. Advanced Avionics Breadboard Executive Design and Implementation

    NASA Technical Reports Server (NTRS)

    Adams, L. R.

    1972-01-01

    The advanced avionics breadboard (AAB) executive evolved from an effort to design and develop an avionics system. This executive is unique in that it supervises a triple redundant avionics computer system. Three IBM System 4 Pi/CP computers, operating synchronously and executing identical software, comprise the central processors which route data to and from a data bus via an input/output controller. The executive's basic function is to provide application programs with an efficient software structure within which to perform specific avionics application tasks. Although implemented in a triplex data management system, the AAB executive contains the flexibility to be adapted to other systems with minimal change.

  8. 28 CFR 2.46 - Execution of warrant and service of summons.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Execution of warrant and service of summons. 2.46 Section 2.46 Judicial Administration DEPARTMENT OF JUSTICE PAROLE, RELEASE, SUPERVISION AND RECOMMITMENT OF PRISONERS, YOUTH OFFENDERS, AND JUVENILE DELINQUENTS United States Code Prisoners and...

  9. 28 CFR 2.46 - Execution of warrant and service of summons.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Execution of warrant and service of summons. 2.46 Section 2.46 Judicial Administration DEPARTMENT OF JUSTICE PAROLE, RELEASE, SUPERVISION AND RECOMMITMENT OF PRISONERS, YOUTH OFFENDERS, AND JUVENILE DELINQUENTS United States Code Prisoners and...

  10. Automated code compilation via the Release Manager

    NASA Astrophysics Data System (ADS)

    Golpayegani, N.

    2006-07-01

    GLAST performs automated builds of its C++ code base. These builds reflect a three-tiered approach to code development, allowing us to test and create releases, as well as get a view of new code submissions that will eventually make it into releases. The program responsible for these automated builds is called the Release Manager. It is based on code originally written by Alex Schlessinger. Its main purpose is to provide rapid feedback for developers when code changes occur. It consists of three loosely connected pieces: The batch submission interface, the Workflow manager, and the Release Manager scripts. The batch submission interface is responsible for keeping track of submitted batch jobs and notifying users/programs using various methods when jobs change status. The Release Manager relies heavily on this interface to allow code builds to happen on demand and in parallel. The workflow manager is a generic program responsible for moving from one state to another based on criteria defined. These states are executed using the batch submission program. Finally the Release Manager consists of scripts that are registered as different states in the Workflow Manager. The Release Manager is currently able to run on Linux and Windows. It uses a MySQL database to record its information. It is currently tightly tied to GLAST's build tool, CMT. Other purposes of the Release Manager are to create source packages for developers and binary packages for end users.

  11. 48 CFR 204.7005 - Assignment of order codes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Identification Numbers 204.7005 Assignment of order codes. (a) The Defense Logistics Agency, Acquisition Policy... use in the first two positions of an order number when an activity places an order against another activity's contract or agreement (see 204.7004(d)(2)). The executive agent distributes blocks of...

  12. Nonbinary Quantum Convolutional Codes Derived from Negacyclic Codes

    NASA Astrophysics Data System (ADS)

    Chen, Jianzhang; Li, Jianping; Yang, Fan; Huang, Yuanyuan

    2015-01-01

    In this paper, some families of nonbinary quantum convolutional codes are constructed by using negacyclic codes. These nonbinary quantum convolutional codes are different from quantum convolutional codes in the literature. Moreover, we construct a family of optimal quantum convolutional codes.

  13. Compiling global name-space programs for distributed execution

    NASA Technical Reports Server (NTRS)

    Koelbel, Charles; Mehrotra, Piyush

    1990-01-01

    Distributed memory machines do not provide hardware support for a global address space. Thus programmers are forced to partition the data across the memories of the architecture and use explicit message passing to communicate data between processors. The compiler support required to allow programmers to express their algorithms using a global name-space is examined. A general method is presented for analysis of a high level source program and along with its translation to a set of independently executing tasks communicating via messages. If the compiler has enough information, this translation can be carried out at compile-time. Otherwise run-time code is generated to implement the required data movement. The analysis required in both situations is described and the performance of the generated code on the Intel iPSC/2 is presented.

  14. Detecting Planets Outside The Solar System

    NASA Technical Reports Server (NTRS)

    Pravdo, Steven H.; Terrile, Richard J.; Ftaclas, Christ; Gatewood, George

    1993-01-01

    Report describes proposed Astrometric Imaging Telescope, used to detect planets in orbit around distant stars. Includes executive summary and statement of scientific objectives of Astrometric Imaging Telescope program.

  15. Hydrology Section Executive Committee Minutes

    NASA Astrophysics Data System (ADS)

    Johnson, A. Ivan

    The Hydrology Section Executive Committee (EC) convened at 8:20 A.M. on May 28, 1985, in Room 311 of the Convention Center in Baltimore, Md. The meeting was chaired by Hydrology Section President R. Allan Freeze. Section President-Elect Marshall Moss kept the minutes in the absence of the Section Secretary Thomas Maddock III. Also in attendance were William Back, Rafael Bras, Stephen Burges, Jerry Cohon, Ron Cummings, David Dawdy, Jacques Delleur, Leonard Konikow, Jurate Landwehr, Fred Molz, Don Nielsen, Joyce Peters, Karen Prestegaard, Tom Schmugge, Waldo Smith, Jery Stedinger, and Eric Wood.

  16. Asymmetric quantum convolutional codes

    NASA Astrophysics Data System (ADS)

    La Guardia, Giuliano G.

    2016-01-01

    In this paper, we construct the first families of asymmetric quantum convolutional codes (AQCCs). These new AQCCs are constructed by means of the CSS-type construction applied to suitable families of classical convolutional codes, which are also constructed here. The new codes have non-catastrophic generator matrices, and they have great asymmetry. Since our constructions are performed algebraically, i.e. we develop general algebraic methods and properties to perform the constructions, it is possible to derive several families of such codes and not only codes with specific parameters. Additionally, several different types of such codes are obtained.

  17. Coded continuous wave meteor radar

    NASA Astrophysics Data System (ADS)

    Vierinen, Juha; Chau, Jorge L.; Pfeffer, Nico; Clahsen, Matthias; Stober, Gunter

    2016-03-01

    The concept of a coded continuous wave specular meteor radar (SMR) is described. The radar uses a continuously transmitted pseudorandom phase-modulated waveform, which has several advantages compared to conventional pulsed SMRs. The coding avoids range and Doppler aliasing, which are in some cases problematic with pulsed radars. Continuous transmissions maximize pulse compression gain, allowing operation at lower peak power than a pulsed system. With continuous coding, the temporal and spectral resolution are not dependent on the transmit waveform and they can be fairly flexibly changed after performing a measurement. The low signal-to-noise ratio before pulse compression, combined with independent pseudorandom transmit waveforms, allows multiple geographically separated transmitters to be used in the same frequency band simultaneously without significantly interfering with each other. Because the same frequency band can be used by multiple transmitters, the same interferometric receiver antennas can be used to receive multiple transmitters at the same time. The principles of the signal processing are discussed, in addition to discussion of several practical ways to increase computation speed, and how to optimally detect meteor echoes. Measurements from a campaign performed with a coded continuous wave SMR are shown and compared with two standard pulsed SMR measurements. The type of meteor radar described in this paper would be suited for use in a large-scale multi-static network of meteor radar transmitters and receivers. Such a system would be useful for increasing the number of meteor detections to obtain improved meteor radar data products.

  18. Automatic generation of executable communication specifications from parallel applications

    SciTech Connect

    Pakin, Scott; Wu, Xing; Mueller, Frank

    2011-01-19

    Portable parallel benchmarks are widely used and highly effective for (a) the evaluation, analysis and procurement of high-performance computing (HPC) systems and (b) quantifying the potential benefits of porting applications for new hardware platforms. Yet, past techniques to synthetically parameterized hand-coded HPC benchmarks prove insufficient for today's rapidly-evolving scientific codes particularly when subject to multi-scale science modeling or when utilizing domain-specific libraries. To address these problems, this work contributes novel methods to automatically generate highly portable and customizable communication benchmarks from HPC applications. We utilize ScalaTrace, a lossless, yet scalable, parallel application tracing framework to collect selected aspects of the run-time behavior of HPC applications, including communication operations and execution time, while abstracting away the details of the computation proper. We subsequently generate benchmarks with identical run-time behavior from the collected traces. A unique feature of our approach is that we generate benchmarks in CONCEPTUAL, a domain-specific language that enables the expression of sophisticated communication patterns using a rich and easily understandable grammar yet compiles to ordinary C + MPI. Experimental results demonstrate that the generated benchmarks are able to preserve the run-time behavior - including both the communication pattern and the execution time - of the original applications. Such automated benchmark generation is particularly valuable for proprietary, export-controlled, or classified application codes: when supplied to a third party. Our auto-generated benchmarks ensure performance fidelity but without the risks associated with releasing the original code. This ability to automatically generate performance-accurate benchmarks from parallel applications is novel and without any precedence, to our knowledge.

  19. Myeloperoxidase levels predict executive function.

    PubMed

    Haslacher, H; Perkmann, T; Lukas, I; Barth, A; Ponocny-Seliger, E; Michlmayr, M; Scheichenberger, V; Wagner, O; Winker, R

    2012-12-01

    The main purpose of the study was to investigate whether baseline myeloperoxidase (MPO) levels are associated with executive cognitive function in individuals with high physical activity. Baseline serum MPO levels of 56 elderly marathon runners and 58 controls were assessed by ELISA. Standardized tests were applied to survey domain-specific cognitive functions. Changes in brain morphology were visualized by magnetic resonance imaging (MRI). High baseline serum MPO levels correlated with worse outcome in tests assessing executive cognitive function in athletes but not in the control group (NAI maze test p<0.05, Trail Making Test ratio p<0.01). In control participants, subcortical white matter hyperintensities were associated with higher scores on the Geriatric Depression Scale (p<0.05), whereas athletes seem to be protected from this effect. During strenuous exercising, MPO as well as its educts may be elevated due to increased oxygen intake and excretion of pro-inflammatory mediators inducing host tissue damage via oxidative stress. This outweighs the potential benefits of physical activity on cognitive function.

  20. Myeloperoxidase levels predict executive function.

    PubMed

    Haslacher, H; Perkmann, T; Lukas, I; Barth, A; Ponocny-Seliger, E; Michlmayr, M; Scheichenberger, V; Wagner, O; Winker, R

    2012-12-01

    The main purpose of the study was to investigate whether baseline myeloperoxidase (MPO) levels are associated with executive cognitive function in individuals with high physical activity. Baseline serum MPO levels of 56 elderly marathon runners and 58 controls were assessed by ELISA. Standardized tests were applied to survey domain-specific cognitive functions. Changes in brain morphology were visualized by magnetic resonance imaging (MRI). High baseline serum MPO levels correlated with worse outcome in tests assessing executive cognitive function in athletes but not in the control group (NAI maze test p<0.05, Trail Making Test ratio p<0.01). In control participants, subcortical white matter hyperintensities were associated with higher scores on the Geriatric Depression Scale (p<0.05), whereas athletes seem to be protected from this effect. During strenuous exercising, MPO as well as its educts may be elevated due to increased oxygen intake and excretion of pro-inflammatory mediators inducing host tissue damage via oxidative stress. This outweighs the potential benefits of physical activity on cognitive function. PMID:22855218

  1. Executive functions in developmental dyslexia

    PubMed Central

    Varvara, Pamela; Varuzza, Cristiana; Sorrentino, Anna C. P.; Vicari, Stefano; Menghini, Deny

    2014-01-01

    The present study was aimed at investigating different aspects of Executive Functions (EF) in children with Developmental Dyslexia (DD). A neuropsychological battery tapping verbal fluency, spoonerism, attention, verbal shifting, short-term and working memory was used to assess 60 children with DD and 65 with typical reading (TR) abilities. Compared to their controls, children with DD showed deficits in several EF domains such as verbal categorical and phonological fluency, visual-spatial and auditory attention, spoonerism, verbal and visual short-term memory, and verbal working memory. Moreover, exploring predictive relationships between EF measures and reading, we found that spoonerism abilities better explained word and non-word reading deficits. Although to a lesser extent, auditory and visual-spatial attention also explained the increased percentage of variance related to reading deficit. EF deficits found in DD are interpreted as an expression of a deficient functioning of the Central Executive System and are discussed in the context of the recent temporal sampling theory. PMID:24639640

  2. The psychiatrist's dilemma: a conflict of roles in legal executions.

    PubMed

    Freedman, A M; Halpern, A L

    1999-10-01

    In the United States, a critical controversy is taking place in regard to psychiatrists' and other physicians' participation in legal executions. Under pressure from the criminal justice system and legislatures to expedite executions, some forensic psychiatrists have succeeded in loosening traditional prohibitions against such participation. Further, there has been a weakening of the prohibition against treatment designed to facilitate immediate execution of those condemned to death. The rationale offered for these departures from current psychiatric ethical codes is the novel notion that when a psychiatrist acts in the court or criminal justice situation, that individual is no longer a psychiatrist and is not bound by psychiatric ethics. Rather, the forensic psychiatrist, termed a 'forensicist', serves as an assistant in the 'administration of justice' or 'an agent of the State' and thus works in a different ethical framework from the ordinary psychiatrist. This justification has similarities to the rationale offered by physicians involved in human experiments and other criminal acts in Nazi Germany, as well as psychiatrists in the former Soviet Union who explained their involvement in psychiatric abuse as a result of being agents of the State and thus not responsible for carrying out orders. Clearly, this controversy could be eliminated by a campaign for the abolition of capital punishment, characterised by the American Psychiatric Association as 'anachronistic, brutalizing [and] ineffective'. Such a campaign should serve as a call for psychiatrists and other physicians to join in the struggle to uphold ethical and moral principles.

  3. Cellulases and coding sequences

    DOEpatents

    Li, Xin-Liang; Ljungdahl, Lars G.; Chen, Huizhong

    2001-02-20

    The present invention provides three fungal cellulases, their coding sequences, recombinant DNA molecules comprising the cellulase coding sequences, recombinant host cells and methods for producing same. The present cellulases are from Orpinomyces PC-2.

  4. Cellulases and coding sequences

    DOEpatents

    Li, Xin-Liang; Ljungdahl, Lars G.; Chen, Huizhong

    2001-01-01

    The present invention provides three fungal cellulases, their coding sequences, recombinant DNA molecules comprising the cellulase coding sequences, recombinant host cells and methods for producing same. The present cellulases are from Orpinomyces PC-2.

  5. QR Code Mania!

    ERIC Educational Resources Information Center

    Shumack, Kellie A.; Reilly, Erin; Chamberlain, Nik

    2013-01-01

    space, has error-correction capacity, and can be read from any direction. These codes are used in manufacturing, shipping, and marketing, as well as in education. QR codes can be created to produce…

  6. Method and apparatus for executing a shift in a hybrid transmission

    SciTech Connect

    Gupta, Pinaki; Kaminsky, Lawrence A; Demirovic, Besim

    2013-09-03

    A method for executing a transmission shift in a hybrid transmission including first and second electric machines includes executing a shift-through-neutral sequence from an initial transmission state to a target transmission state including executing an intermediate shift to neutral. Upon detecting a change in an output torque request while executing the shift-through-neutral sequence, possible recovery shift paths are identified. Available ones of the possible recovery shift paths are identified and a shift cost for each said available recovery shift path is evaluated. The available recovery shift path having a minimum shift cost is selected as a preferred recovery shift path and is executed to achieve a non-neutral transmission state.

  7. Comprehensive Small RNA-Seq of Adeno-Associated Virus (AAV)-Infected Human Cells Detects Patterns of Novel, Non-Coding AAV RNAs in the Absence of Cellular miRNA Regulation.

    PubMed

    Stutika, Catrin; Mietzsch, Mario; Gogol-Döring, Andreas; Weger, Stefan; Sohn, Madlen; Chen, Wei; Heilbronn, Regine

    2016-01-01

    Most DNA viruses express small regulatory RNAs, which interfere with viral or cellular gene expression. For adeno-associated virus (AAV), a small ssDNA virus with a complex biphasic life cycle miRNAs or other small regulatory RNAs have not yet been described. This is the first comprehensive Illumina-based RNA-Seq analysis of small RNAs expressed by AAV alone or upon co-infection with helper adenovirus or HSV. Several hotspots of AAV-specific small RNAs were detected mostly close to or within the AAV-ITR and apparently transcribed from the newly identified anti-p5 promoter. An additional small RNA hotspot was located downstream of the p40 promoter, from where transcription of non-coding RNAs associated with the inhibition of adenovirus replication were recently described. Parallel detection of known Ad and HSV miRNAs indirectly validated the newly identified small AAV RNA species. The predominant small RNAs were analyzed on Northern blots and by human argonaute protein-mediated co-immunoprecipitation. None of the small AAV RNAs showed characteristics of bona fide miRNAs, but characteristics of alternative RNA processing indicative of differentially regulated AAV promoter-associated small RNAs. Furthermore, the AAV-induced regulation of cellular miRNA levels was analyzed at different time points post infection. In contrast to other virus groups AAV infection had virtually no effect on the expression of cellular miRNA, which underscores the long-established concept that wild-type AAV infection is apathogenic. PMID:27611072

  8. Comprehensive Small RNA-Seq of Adeno-Associated Virus (AAV)-Infected Human Cells Detects Patterns of Novel, Non-Coding AAV RNAs in the Absence of Cellular miRNA Regulation

    PubMed Central

    Stutika, Catrin; Mietzsch, Mario; Gogol-Döring, Andreas; Weger, Stefan; Sohn, Madlen; Chen, Wei; Heilbronn, Regine

    2016-01-01

    Most DNA viruses express small regulatory RNAs, which interfere with viral or cellular gene expression. For adeno-associated virus (AAV), a small ssDNA virus with a complex biphasic life cycle miRNAs or other small regulatory RNAs have not yet been described. This is the first comprehensive Illumina-based RNA-Seq analysis of small RNAs expressed by AAV alone or upon co-infection with helper adenovirus or HSV. Several hotspots of AAV-specific small RNAs were detected mostly close to or within the AAV-ITR and apparently transcribed from the newly identified anti-p5 promoter. An additional small RNA hotspot was located downstream of the p40 promoter, from where transcription of non-coding RNAs associated with the inhibition of adenovirus replication were recently described. Parallel detection of known Ad and HSV miRNAs indirectly validated the newly identified small AAV RNA species. The predominant small RNAs were analyzed on Northern blots and by human argonaute protein-mediated co-immunoprecipitation. None of the small AAV RNAs showed characteristics of bona fide miRNAs, but characteristics of alternative RNA processing indicative of differentially regulated AAV promoter-associated small RNAs. Furthermore, the AAV-induced regulation of cellular miRNA levels was analyzed at different time points post infection. In contrast to other virus groups AAV infection had virtually no effect on the expression of cellular miRNA, which underscores the long-established concept that wild-type AAV infection is apathogenic. PMID:27611072

  9. Operations analysis (study 2.1). Program listing for the LOVES computer code

    NASA Technical Reports Server (NTRS)

    Wray, S. T., Jr.

    1974-01-01

    A listing of the LOVES computer program is presented. The program is coded partially in SIMSCRIPT and FORTRAN. This version of LOVES is compatible with both the CDC 7600 and the UNIVAC 1108 computers. The code has been compiled, loaded, and executed successfully on the EXEC 8 system for the UNIVAC 1108.

  10. Detection of 98. 5% of the mutations in 200 Belgian cystic fibrosis alleles by reverse dot-blot and sequencing of the complete coding region and exon/intron junctions of the CFTR gene

    SciTech Connect

    Cuppens, H.; Marynen, P.; Cassiman, J.J. ); De Boeck, C. )

    1993-12-01

    The authors have previously shown that about 85% of the mutations in 194 Belgian cystic fibrosis alleles could be detected by a reverse dot-blot assay. In the present study, 50 Belgian chromosomes were analyzed for mutations in the cystic fibrosis transmembrane conductance regulator gene by means of direct solid phase automatic sequencing of PCR products of individual exons. Twenty-six disease mutations and 14 polymorphisms were found. Twelve of these mutations and 3 polymorphisms were not described before. With the exception of one mutant allele carrying two mutations, these mutations were the only mutations found in the complete coding region and their exon/intron boundaries. The total sensitivity of mutant CF alleles that could be identified was 98.5%. Given the heterogeneity of these mutations, most of them very rare, CFTR mutation screening still remains rather complex in the population, and population screening, whether desirable or not, does not appear to be technically feasible with the methods currently available. 24 refs., 1 fig., 2 tabs.

  11. Detection of Multiple Budding Yeast Cells and a Partial Sequence of 43-kDa Glycoprotein Coding Gene of Paracoccidioides brasiliensis from a Case of Lacaziosis in a Female Pacific White-Sided Dolphin (Lagenorhynchus obliquidens).

    PubMed

    Minakawa, Tomoko; Ueda, Keiichi; Tanaka, Miyuu; Tanaka, Natsuki; Kuwamura, Mitsuru; Izawa, Takeshi; Konno, Toshihiro; Yamate, Jyoji; Itano, Eiko Nakagawa; Sano, Ayako; Wada, Shinpei

    2016-08-01

    Lacaziosis, formerly called as lobomycosis, is a zoonotic mycosis, caused by Lacazia loboi, found in humans and dolphins, and is endemic in the countries on the Atlantic Ocean, Indian Ocean and Pacific Ocean of Japanese coast. Susceptible Cetacean species include the bottlenose dolphin (Tursiops truncatus), the Indian Ocean bottlenose dolphin (T. aduncus), and the estuarine dolphin (Sotalia guianensis); however, no cases have been recorded in other Cetacean species. We diagnosed a case of Lacaziosis in a Pacific white-sided dolphin (Lagenorhynchus obliquidens) nursing in an aquarium in Japan. The dolphin was a female estimated to be more than 14 years old at the end of June 2015 and was captured in a coast of Japan Sea in 2001. Multiple, lobose, and solid granulomatous lesions with or without ulcers appeared on her jaw, back, flipper and fluke skin, in July 2014. The granulomatous skin lesions from the present case were similar to those of our previous cases. Multiple budding and chains of round yeast cells were detected in the biopsied samples. The partial sequence of 43-kDa glycoprotein coding gene confirmed by a nested PCR and sequencing, which revealed a different genotype from both Amazonian and Japanese lacaziosis in bottlenose dolphins, and was 99 % identical to those derived from Paracoccidioides brasiliensis; a sister fungal species to L. loboi. This is the first case of lacaziosis in Pacific white-sided dolphin.

  12. Detection of Multiple Budding Yeast Cells and a Partial Sequence of 43-kDa Glycoprotein Coding Gene of Paracoccidioides brasiliensis from a Case of Lacaziosis in a Female Pacific White-Sided Dolphin (Lagenorhynchus obliquidens).

    PubMed

    Minakawa, Tomoko; Ueda, Keiichi; Tanaka, Miyuu; Tanaka, Natsuki; Kuwamura, Mitsuru; Izawa, Takeshi; Konno, Toshihiro; Yamate, Jyoji; Itano, Eiko Nakagawa; Sano, Ayako; Wada, Shinpei

    2016-08-01

    Lacaziosis, formerly called as lobomycosis, is a zoonotic mycosis, caused by Lacazia loboi, found in humans and dolphins, and is endemic in the countries on the Atlantic Ocean, Indian Ocean and Pacific Ocean of Japanese coast. Susceptible Cetacean species include the bottlenose dolphin (Tursiops truncatus), the Indian Ocean bottlenose dolphin (T. aduncus), and the estuarine dolphin (Sotalia guianensis); however, no cases have been recorded in other Cetacean species. We diagnosed a case of Lacaziosis in a Pacific white-sided dolphin (Lagenorhynchus obliquidens) nursing in an aquarium in Japan. The dolphin was a female estimated to be more than 14 years old at the end of June 2015 and was captured in a coast of Japan Sea in 2001. Multiple, lobose, and solid granulomatous lesions with or without ulcers appeared on her jaw, back, flipper and fluke skin, in July 2014. The granulomatous skin lesions from the present case were similar to those of our previous cases. Multiple budding and chains of round yeast cells were detected in the biopsied samples. The partial sequence of 43-kDa glycoprotein coding gene confirmed by a nested PCR and sequencing, which revealed a different genotype from both Amazonian and Japanese lacaziosis in bottlenose dolphins, and was 99 % identical to those derived from Paracoccidioides brasiliensis; a sister fungal species to L. loboi. This is the first case of lacaziosis in Pacific white-sided dolphin. PMID:26883513

  13. Detection of mRNA molecules coding for neuropeptide hormones of the pond snail Lymnaea stagnalis by radioactive and non-radioactive in situ hybridization: a model study for mRNA detection

    SciTech Connect

    Dirks, R.W.; Raap, A.K.; Van Minnen, J.; Vreugdenhil, E.; Smit, A.B.; Van der Ploeg, M.

    1989-01-01

    To develop and optimize non-radioactive in situ hybridization techniques for mRNA detection, we used the neuropeptidergic system of the pond snail Lymnaea stagnalis as a biological model system. First, we investigated the in situ hybridization procedure using radioactive-labeled cDNA and synthetic oligonucleotide probes specific for egg-laying hormone (ELH) mRNA and molluscan insulin-like peptide (MIP) mRNA. The results show an intense grain deposit above the caudodorsal cells and light-green cells expressing, respectively, ELH mRNA and MIP mRNA. Good results with relation to signal strength and tissue morphology were obtained with freeze-dry paraformaldehyde vapor fixation. The necessity to perform tissue pre-treatment appeared to be dependent on the cell type of interest. The optimized in situ hybridization protocol proved to be applicable using probes that are either sulfonated/transaminated or labeled with acetylaminofluorene (AAF). In situ hybridization of such haptenized probes led to intense and specific staining of the cytoplasm of the caudodorsal cells. Egg-laying hormone mRNA appeared not to be homogeneously distributed in the cytoplasm but showed a patch-like pattern. Nuclear and axoplasmic staining for mRNA was also observed.

  14. Probability of undetected error after decoding for a concatenated coding scheme

    NASA Technical Reports Server (NTRS)

    Costello, D. J., Jr.; Lin, S.

    1984-01-01

    A concatenated coding scheme for error control in data communications is analyzed. In this scheme, the inner code is used for both error correction and detection, however the outer code is used only for error detection. A retransmission is requested if the outer code detects the presence of errors after the inner code decoding. Probability of undetected error is derived and bounded. A particular example, proposed for NASA telecommand system is analyzed.

  15. EMF wire code research

    SciTech Connect

    Jones, T.

    1993-11-01

    This paper examines the results of previous wire code research to determines the relationship with childhood cancer, wire codes and electromagnetic fields. The paper suggests that, in the original Savitz study, biases toward producing a false positive association between high wire codes and childhood cancer were created by the selection procedure.

  16. Executable Architecture Research at Old Dominion University

    NASA Technical Reports Server (NTRS)

    Tolk, Andreas; Shuman, Edwin A.; Garcia, Johnny J.

    2011-01-01

    Executable Architectures allow the evaluation of system architectures not only regarding their static, but also their dynamic behavior. However, the systems engineering community do not agree on a common formal specification of executable architectures. To close this gap and identify necessary elements of an executable architecture, a modeling language, and a modeling formalism is topic of ongoing PhD research. In addition, systems are generally defined and applied in an operational context to provide capabilities and enable missions. To maximize the benefits of executable architectures, a second PhD effort introduces the idea of creating an executable context in addition to the executable architecture. The results move the validation of architectures from the current information domain into the knowledge domain and improve the reliability of such validation efforts. The paper presents research and results of both doctoral research efforts and puts them into a common context of state-of-the-art of systems engineering methods supporting more agility.

  17. Culture, executive function, and social understanding.

    PubMed

    Lewis, Charlie; Koyasu, Masuo; Oh, Seungmi; Ogawa, Ayako; Short, Benjamin; Huang, Zhao

    2009-01-01

    Much of the evidence from the West has shown links between children's developing self-control (executive function), their social experiences, and their social understanding (Carpendale & Lewis, 2006, chapters 5 and 6), across a range of cultures including China. This chapter describes four studies conducted in three Oriental cultures, suggesting that the relationships among social interaction, executive function, and social understanding are different in these cultures, implying that social and executive skills are underpinned by key cultural processes. PMID:19306275

  18. PREREM: an interactive data preprocessing code for INREM II. Part I: user's manual. Part II: code structure

    SciTech Connect

    Ryan, M.T.; Fields, D.E.

    1981-05-01

    PREREM is an interactive computer code developed as a data preprocessor for the INREM-II (Killough, Dunning, and Pleasant, 1978a) internal dose program. PREREM is intended to provide easy access to current and self-consistent nuclear decay and radionuclide-specific metabolic data sets. Provision is made for revision of metabolic data, and the code is intended for both production and research applications. Documentation for the code is in two parts. Part I is a user's manual which emphasizes interpretation of program prompts and choice of user input. Part II stresses internal structure and flow of program control and is intended to assist the researcher who wishes to revise or modify the code or add to its capabilities. PREREM is written for execution on a Digital Equipment Corporation PDP-10 System and much of the code will require revision before it can be run on other machines. The source program length is 950 lines (116 blocks) and computer core required for execution is 212 K bytes. The user must also have sufficient file space for metabolic and S-factor data sets. Further, 64 100 K byte blocks of computer storage space are required for the nuclear decay data file. Computer storage space must also be available for any output files produced during the PREREM execution. 9 refs., 8 tabs.

  19. Software Certification - Coding, Code, and Coders

    NASA Technical Reports Server (NTRS)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  20. Annual survey: executive compensation under fire.

    PubMed

    Lampert, J; Bjork, D

    1992-09-01

    Compensation of health care executives has continued to grow, largely pushed along by such factors as continuing turnover in top management positions in hospitals, according to the 1992 Hay hospital management/professional survey of compensation and benefits data from over 1,200 U.S. hospitals. And although pay increases are moving up faster among top hospital executives than in industry, overall hospital executive pay still lags. In addition, survey results look at such issues as linking executive pay to various measures of performance. PMID:1511964

  1. A simple hypothesis of executive function

    PubMed Central

    Kopp, Bruno

    2012-01-01

    Executive function is traditionally conceptualized as a set of abilities required to guide behavior toward goals. Here, an integrated theoretical framework for executive function is developed which has its roots in the notion of hierarchical mental models. Further following Duncan (2010a,b), executive function is construed as a hierarchical recursive system of test-operation-test-exit units (Miller et al., 1960). Importantly, it is shown that this framework can be used to model the main regional prefrontal syndromes, which are characterized by apathetic, disinhibited and dysexecutive cognition, and behavior, respectively. Implications of these considerations for the neuropsychological assessment of executive function are discussed. PMID:22679423

  2. Curare: Restructuring lisp programs for concurrent execution

    SciTech Connect

    Larus, J.R.

    1987-01-01

    This paper describes the techniques used by CURARE, a program transformer, to restructure Lisp programs for concurrent execution in multiprocessor Lisp systems. CURARE tries to eliminate control and data-dependencies that prevent concurrent execution of the invocations of recursive functions. CURARE also inserts a variety of synchronization devices to ensure that unremovable dependencies do not impair execution of a program. The product of this process is semantically equivalent to the original Lisp program, but executes faster on a multiprocessor than would the original program.

  3. Coding for Electronic Mail

    NASA Technical Reports Server (NTRS)

    Rice, R. F.; Lee, J. J.

    1986-01-01

    Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.

  4. Sequentially Executed Model Evaluation Framework

    SciTech Connect

    2015-10-20

    Provides a message passing framework between generic input, model and output drivers, and specifies an API for developing such drivers. Also provides batch and real-time controllers which step the model and I/O through the time domain (or other discrete domain), and sample I/O drivers. This is a library framework, and does not, itself, solve any problems or execute any modeling. The SeMe framework aids in development of models which operate on sequential information, such as time-series, where evaluation is based on prior results combined with new data for this iteration. Has applications in quality monitoring, and was developed as part of the CANARY-EDS software, where real-time water quality data is being analyzed for anomalies.

  5. NASA Capability Roadmaps Executive Summary

    NASA Technical Reports Server (NTRS)

    Willcoxon, Rita; Thronson, Harley; Varsi, Guilio; Mueller, Robert; Regenie, Victoria; Inman, Tom; Crooke, Julie; Coulter, Dan

    2005-01-01

    This document is the result of eight months of hard work and dedication from NASA, industry, other government agencies, and academic experts from across the nation. It provides a summary of the capabilities necessary to execute the Vision for Space Exploration and the key architecture decisions that drive the direction for those capabilities. This report is being provided to the Exploration Systems Architecture Study (ESAS) team for consideration in development of an architecture approach and investment strategy to support NASA future mission, programs and budget requests. In addition, it will be an excellent reference for NASA's strategic planning. A more detailed set of roadmaps at the technology and sub-capability levels are available on CD. These detailed products include key driving assumptions, capability maturation assessments, and technology and capability development roadmaps.

  6. Sequentially Executed Model Evaluation Framework

    SciTech Connect

    2014-02-14

    Provides a message passing framework between generic input, model and output drivers, and specifies an API for developing such drivers. Also provides batch and real-time controllers which step the model and 1/0 through the time domain (or other discrete domain), and sample 1/0 drivers. This is a Framework library framework, and does not, itself, solve any problems or execute any modelling. The SeMe framework aids in development of models which operate on sequential information, such as time-series, where evaluation is based on prior results combined with new data for this iteration. Ha) applications in quality monitoring, and was developed as part of the CANARY-EDS software, where real-time water quality data is being analyzed

  7. Advanced Fuels Campaign Execution Plan

    SciTech Connect

    Kemal Pasamehmetoglu

    2011-09-01

    The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the 'Grand Challenge' for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

  8. Advanced Fuels Campaign Execution Plan

    SciTech Connect

    Kemal Pasamehmetoglu

    2010-10-01

    The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the “Grand Challenge” for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

  9. Sequentially Executed Model Evaluation Framework

    2014-02-14

    Provides a message passing framework between generic input, model and output drivers, and specifies an API for developing such drivers. Also provides batch and real-time controllers which step the model and 1/0 through the time domain (or other discrete domain), and sample 1/0 drivers. This is a Framework library framework, and does not, itself, solve any problems or execute any modelling. The SeMe framework aids in development of models which operate on sequential information, suchmore » as time-series, where evaluation is based on prior results combined with new data for this iteration. Ha) applications in quality monitoring, and was developed as part of the CANARY-EDS software, where real-time water quality data is being analyzed« less

  10. Sequentially Executed Model Evaluation Framework

    2015-10-20

    Provides a message passing framework between generic input, model and output drivers, and specifies an API for developing such drivers. Also provides batch and real-time controllers which step the model and I/O through the time domain (or other discrete domain), and sample I/O drivers. This is a library framework, and does not, itself, solve any problems or execute any modeling. The SeMe framework aids in development of models which operate on sequential information, such asmore » time-series, where evaluation is based on prior results combined with new data for this iteration. Has applications in quality monitoring, and was developed as part of the CANARY-EDS software, where real-time water quality data is being analyzed for anomalies.« less

  11. Spirituality and the physician executive.

    PubMed

    Kaiser, L R

    2000-01-01

    The "s" word can now be spoken without flinching in health care organizations. Spirituality is becoming a common topic in management conferences around the world. Many U.S. corporations are recognizing the role of spirituality in creating a new humanistic capitalism that manages beyond the bottom line. Spirituality refers to a broad set of principles that transcend all religions. It is the relationship between yourself and something larger, such as the good of your patient or the welfare of the community. Spirituality means being in right relationship to all that is and understanding the mutual interdependence of all living beings. Physician executives should be primary proponents of spirituality in their organizations by: Modeling the power of spirituality in their own lives; integrating spiritual methodologies into clinical practice; fostering an integrative approach to patient care; encouraging the organization to tithe its profits for unmet community health needs; supporting collaborative efforts to improve the health of the community; and creating healing environments.

  12. Path planning and execution monitoring for a planetary rover

    NASA Technical Reports Server (NTRS)

    Gat, Erann; Slack, Marc G.; Miller, David P.; Firby, R. James

    1990-01-01

    A path planner and an execution monitoring planner that will enable the rover to navigate to its various destinations safely and correctly while detecting and avoiding hazards are described. An overview of the complete architecture is given. Implementation and testbeds are described. The robot can detect unforseen obstacles and take appropriate action. This includes having the rover back away from the hazard and mark the area as untraversable in the in the rover's internal map. The experiments have consisted of paths roughly 20 m in length. The architecture works with a large variety of rover configurations with different kinematic constraints.

  13. XSOR codes users manual

    SciTech Connect

    Jow, Hong-Nian; Murfin, W.B.; Johnson, J.D.

    1993-11-01

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ``XSOR``. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms.

  14. DLLExternalCode

    SciTech Connect

    Greg Flach, Frank Smith

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  15. DLLExternalCode

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read frommore » files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.« less

  16. Parafermion stabilizer codes

    NASA Astrophysics Data System (ADS)

    Gungordu, Utkan; Nepal, Rabindra; Kovalev, Alexey

    2015-03-01

    We define and study parafermion stabilizer codes [Phys. Rev. A 90, 042326 (2014)] which can be viewed as generalizations of Kitaev's one dimensional model of unpaired Majorana fermions. Parafermion stabilizer codes can protect against low-weight errors acting on a small subset of parafermion modes in analogy to qudit stabilizer codes. Examples of several smallest parafermion stabilizer codes are given. Our results show that parafermions can achieve a better encoding rate than Majorana fermions. A locality preserving embedding of qudit operators into parafermion operators is established which allows one to map known qudit stabilizer codes to parafermion codes. We also present a local 2D parafermion construction that combines topological protection of Kitaev's toric code with additional protection relying on parity conservation. This work was supported in part by the NSF under Grants No. Phy-1415600 and No. NSF-EPSCoR 1004094.

  17. Insertion of operation-and-indicate instructions for optimized SIMD code

    DOEpatents

    Eichenberger, Alexander E; Gara, Alan; Gschwind, Michael K

    2013-06-04

    Mechanisms are provided for inserting indicated instructions for tracking and indicating exceptions in the execution of vectorized code. A portion of first code is received for compilation. The portion of first code is analyzed to identify non-speculative instructions performing designated non-speculative operations in the first code that are candidates for replacement by replacement operation-and-indicate instructions that perform the designated non-speculative operations and further perform an indication operation for indicating any exception conditions corresponding to special exception values present in vector register inputs to the replacement operation-and-indicate instructions. The replacement is performed and second code is generated based on the replacement of the at least one non-speculative instruction. The data processing system executing the compiled code is configured to store special exception values in vector output registers, in response to a speculative instruction generating an exception condition, without initiating exception handling.

  18. A general multiblock Euler code for propulsion integration. Volume 3: User guide for the Euler code

    NASA Technical Reports Server (NTRS)

    Chen, H. C.; Su, T. Y.; Kao, T. J.

    1991-01-01

    This manual explains the procedures for using the general multiblock Euler (GMBE) code developed under NASA contract NAS1-18703. The code was developed for the aerodynamic analysis of geometrically complex configurations in either free air or wind tunnel environments (vol. 1). The complete flow field is divided into a number of topologically simple blocks within each of which surface fitted grids and efficient flow solution algorithms can easily be constructed. The multiblock field grid is generated with the BCON procedure described in volume 2. The GMBE utilizes a finite volume formulation with an explicit time stepping scheme to solve the Euler equations. A multiblock version of the multigrid method was developed to accelerate the convergence of the calculations. This user guide provides information on the GMBE code, including input data preparations with sample input files and a sample Unix script for program execution in the UNICOS environment.

  19. On the linear programming bound for linear Lee codes.

    PubMed

    Astola, Helena; Tabus, Ioan

    2016-01-01

    Based on an invariance-type property of the Lee-compositions of a linear Lee code, additional equality constraints can be introduced to the linear programming problem of linear Lee codes. In this paper, we formulate this property in terms of an action of the multiplicative group of the field [Formula: see text] on the set of Lee-compositions. We show some useful properties of certain sums of Lee-numbers, which are the eigenvalues of the Lee association scheme, appearing in the linear programming problem of linear Lee codes. Using the additional equality constraints, we formulate the linear programming problem of linear Lee codes in a very compact form, leading to a fast execution, which allows to efficiently compute the bounds for large parameter values of the linear codes.

  20. Modular optimization code package: MOZAIK

    NASA Astrophysics Data System (ADS)

    Bekar, Kursat B.

    This dissertation addresses the development of a modular optimization code package, MOZAIK, for geometric shape optimization problems in nuclear engineering applications. MOZAIK's first mission, determining the optimal shape of the D2O moderator tank for the current and new beam tube configurations for the Penn State Breazeale Reactor's (PSBR) beam port facility, is used to demonstrate its capabilities and test its performance. MOZAIK was designed as a modular optimization sequence including three primary independent modules: the initializer, the physics and the optimizer, each having a specific task. By using fixed interface blocks among the modules, the code attains its two most important characteristics: generic form and modularity. The benefit of this modular structure is that the contents of the modules can be switched depending on the requirements of accuracy, computational efficiency, or compatibility with the other modules. Oak Ridge National Laboratory's discrete ordinates transport code TORT was selected as the transport solver in the physics module of MOZAIK, and two different optimizers, Min-max and Genetic Algorithms (GA), were implemented in the optimizer module of the code package. A distributed memory parallelism was also applied to MOZAIK via MPI (Message Passing Interface) to execute the physics module concurrently on a number of processors for various states in the same search. Moreover, dynamic scheduling was enabled to enhance load balance among the processors while running MOZAIK's physics module thus improving the parallel speedup and efficiency. In this way, the total computation time consumed by the physics module is reduced by a factor close to M, where M is the number of processors. This capability also encourages the use of MOZAIK for shape optimization problems in nuclear applications because many traditional codes related to radiation transport do not have parallel execution capability. A set of computational models based on the

  1. Execution time supports for adaptive scientific algorithms on distributed memory machines

    NASA Technical Reports Server (NTRS)

    Berryman, Harry; Saltz, Joel; Scroggs, Jeffrey

    1990-01-01

    Optimizations are considered that are required for efficient execution of code segments that consists of loops over distributed data structures. The PARTI (Parallel Automated Runtime Toolkit at ICASE) execution time primitives are designed to carry out these optimizations and can be used to implement a wide range of scientific algorithms on distributed memory machines. These primitives allow the user to control array mappings in a way that gives an appearance of shared memory. Computations can be based on a global index set. Primitives are used to carry out gather and scatter operations on distributed arrays. Communications patterns are derived at runtime, and the appropriate send and receive messages are automatically generated.

  2. From an Executive Network to Executive Control: A Computational Model of the "n"-Back Task

    ERIC Educational Resources Information Center

    Chatham, Christopher H.; Herd, Seth A.; Brant, Angela M.; Hazy, Thomas E.; Miyake, Akira; O'Reilly, Randy; Friedman, Naomi P.

    2011-01-01

    A paradigmatic test of executive control, the n-back task, is known to recruit a widely distributed parietal, frontal, and striatal "executive network," and is thought to require an equally wide array of executive functions. The mapping of functions onto substrates in such a complex task presents a significant challenge to any theoretical…

  3. 78 FR 73586 - Senior Executive Service Performance Review Board (PRB) and Executive Resources Board (ERB...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-06

    ... Surface Transportation Board Senior Executive Service Performance Review Board (PRB) and Executive... Performance Review Board (PRB) and Executive Resources Board (ERB) Membership. SUMMARY: Effective immediately, the membership of the PRB and ERB is as follows: Performance Review Board Leland L. Gardner,...

  4. Executive Function and Early Reading Skills

    ERIC Educational Resources Information Center

    Foy, Judith G.; Mann, Virginia A.

    2013-01-01

    The purpose of this study was to examine how executive function skills in verbal and nonverbal auditory tasks are related to early reading skills in beginning readers. Kindergarteners (N = 41, aged 5 years) completed verbal (phonemes) and nonverbal (environmental sounds) Continuous Performance tasks yielding measures of executive function (misses,…

  5. Senior Executive Views on Education in Alberta.

    ERIC Educational Resources Information Center

    Meanwell, Richard J.; Barrington, Gail V.

    Interviews were conducted with 60 senior executives in the private sector to determine the strengths and weaknesses of the education system in Alberta, Canada from their perspective. The executives' views were solicited on the following topics: (1) current strengths of the education system; (2) necessary improvements in educational programs and…

  6. 40 CFR 68.155 - Executive summary.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 16 2014-07-01 2014-07-01 false Executive summary. 68.155 Section 68.155 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CHEMICAL ACCIDENT PREVENTION PROVISIONS Risk Management Plan § 68.155 Executive summary. The owner...

  7. 40 CFR 68.155 - Executive summary.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 15 2010-07-01 2010-07-01 false Executive summary. 68.155 Section 68.155 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CHEMICAL ACCIDENT PREVENTION PROVISIONS Risk Management Plan § 68.155 Executive summary. The owner...

  8. 40 CFR 68.155 - Executive summary.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 15 2011-07-01 2011-07-01 false Executive summary. 68.155 Section 68.155 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CHEMICAL ACCIDENT PREVENTION PROVISIONS Risk Management Plan § 68.155 Executive summary. The owner...

  9. Executive Functions Development and Playing Games

    ERIC Educational Resources Information Center

    Petty, Ana Lucia; de Souza, Maria Thereza C. Coelho

    2012-01-01

    The aim of this paper is to discuss executive functions and playing games, considering Piaget's work (1967) and the neuropsychological framework (Barkley, 1997, 2000; Cypel, 2007). Two questions guide the discussion: What are the intersections between playing games and the development of executive functions? Can we stimulate children with learning…

  10. The Executive Committee. Effective Committees. Board Basics.

    ERIC Educational Resources Information Center

    Ingram, Richard T.

    1996-01-01

    The executive board of the college or university governing board has the central purpose of strengthening the board's performance by helping it function efficiently and effectively. Because the executive committee can undermine trustee morale by abusing its authority, the entire governing board must decide the extent of the powers delegated to the…

  11. 32 CFR 724.702 - Executive management.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Executive management. 724.702 Section 724.702 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Organization of the Naval Discharge Review Board § 724.702 Executive management....

  12. 32 CFR 724.702 - Executive management.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 5 2013-07-01 2013-07-01 false Executive management. 724.702 Section 724.702 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Organization of the Naval Discharge Review Board § 724.702 Executive management....

  13. 32 CFR 724.702 - Executive management.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Executive management. 724.702 Section 724.702 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Organization of the Naval Discharge Review Board § 724.702 Executive management....

  14. 32 CFR 724.702 - Executive management.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 5 2011-07-01 2011-07-01 false Executive management. 724.702 Section 724.702 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Organization of the Naval Discharge Review Board § 724.702 Executive management....

  15. Understanding the Executive Functioning Heterogeneity in Schizophrenia

    ERIC Educational Resources Information Center

    Raffard, Stephane; Bayard, Sophie

    2012-01-01

    Schizophrenia is characterized by heterogeneous brain abnormalities involving cerebral regions implied in the executive functioning. The dysexecutive syndrome is one of the most prominent and functionally cognitive features of schizophrenia. Nevertheless, it is not clear to what extend executive deficits are heterogeneous in schizophrenia…

  16. Predictors for the Effects of Televised Executions.

    ERIC Educational Resources Information Center

    McEnteer, James B.

    This paper discusses the controversy that has traditionally surrounded the issue of capital punishment. When a Texas television reporter sought permission to televise the execution of a convicted murderer by lethal injection in 1983, arguments were advanced both for and against televising executions. A recent poll shows that 84% of Americans…

  17. 17 CFR 200.13 - Executive Director.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Printing (1977). (4) Occupational Safety and Health Programs for Federal Employees under Executive Order 12196 of February 26, 1980 (29 CFR 1960.1-1960.90). (5) Federal Managers' Financial Integrity Act of... Office of Information Technology. In addition, the Executive Director implements the following...

  18. 17 CFR 200.13 - Executive Director.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Printing (1977). (4) Occupational Safety and Health Programs for Federal Employees under Executive Order 12196 of February 26, 1980 (29 CFR 1960.1-1960.90). (5) Federal Managers' Financial Integrity Act of... Office of Information Technology. In addition, the Executive Director implements the following...

  19. Conceptualization and Operationalization of Executive Function

    ERIC Educational Resources Information Center

    Baggetta, Peter; Alexander, Patricia A.

    2016-01-01

    Executive function is comprised of different behavioral and cognitive elements and is considered to play a significant role in learning and academic achievement. Educational researchers frequently study the construct. However, because of its complexity functionally, the research on executive function can at times be both confusing and…

  20. 40 CFR 68.155 - Executive summary.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 16 2013-07-01 2013-07-01 false Executive summary. 68.155 Section 68.155 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CHEMICAL ACCIDENT PREVENTION PROVISIONS Risk Management Plan § 68.155 Executive summary. The owner...

  1. 40 CFR 68.155 - Executive summary.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 16 2012-07-01 2012-07-01 false Executive summary. 68.155 Section 68.155 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CHEMICAL ACCIDENT PREVENTION PROVISIONS Risk Management Plan § 68.155 Executive summary. The owner...

  2. Ten Years of Change in Executive Education.

    ERIC Educational Resources Information Center

    Bolt, James F.

    1993-01-01

    As recently as the 1980s, most companies did not pay much attention to executive education. In the 1990s, many see executive education as a must for revamping competitive strategies, increasing productivity, improving quality, reducing cycle time, and revitalizing corporate culture. (Author/JOW)

  3. 48 CFR 9901.311 - Executive sessions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Executive sessions. During the course of a Board meeting, any Board Member may request that for any portion of the meeting, the Board meet in executive session. The Chairman shall thereupon order such a....311 Section 9901.311 Federal Acquisition Regulations System COST ACCOUNTING STANDARDS BOARD, OFFICE...

  4. 32 CFR 724.702 - Executive management.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Executive management. 724.702 Section 724.702 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Organization of the Naval Discharge Review Board § 724.702 Executive management....

  5. The Relationship between Alertness and Executive Control

    ERIC Educational Resources Information Center

    Weinbach, Noam; Henik, Avishai

    2012-01-01

    The current study focuses on the relationship between alerting and executive attention. Previous studies reported an increased flanker congruency effect following alerting cues. In the first two experiments, we found that the alertness-congruency interaction did not exist for all executive tasks (it appeared for a flanker task but not for a Stroop…

  6. 10 CFR 603.1015 - Execution.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Execution. 603.1015 Section 603.1015 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Executing the Award The Award... address consortium members' future liabilities related to the RD&D project (e.g., whether they will...

  7. 10 CFR 603.1015 - Execution.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Execution. 603.1015 Section 603.1015 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Executing the Award The Award... address consortium members' future liabilities related to the RD&D project (e.g., whether they will...

  8. 10 CFR 603.1015 - Execution.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Execution. 603.1015 Section 603.1015 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Executing the Award The Award... address consortium members' future liabilities related to the RD&D project (e.g., whether they will...

  9. 10 CFR 603.1015 - Execution.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Execution. 603.1015 Section 603.1015 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Executing the Award The Award... address consortium members' future liabilities related to the RD&D project (e.g., whether they will...

  10. Financial Management for Childcare Executive Officers.

    ERIC Educational Resources Information Center

    Foster-Jorgensen, Karen; Harrington, Angela

    This handbook is designed to assist childcare executive officers (CEOs) in managing the finances of their programs. The guide is divided into five sections. Section 1, "Financial Entrepreneurship," advocates the adoption of an entrepreneurial spirit in directors and recommends: (1) becoming the Chief Executive Officer of the program; (2) actively…

  11. Stakeholder strategies for the physician executive.

    PubMed

    Whitehead, C J; Stanton, S Y; Buesseler, J A; Blair, J D

    1989-01-01

    If physician executives are to be effective in confronting the environmental turbulence and uncertainty facing their organizations, they must effectively manage their stakeholders. This article extends the stakeholder approach described in the May-June 1989 issue of Physician Executive as a tool for the physician executive in the development of practical strategies to cope with turbulence and uncertainty. We suggest four generic strategies physician executives can use: involve supportive stakeholders, monitor marginal stakeholders, defend against nonsupportive stakeholders, and collaborate with mixed-blessing stakeholders. As an overarching strategy, a physician executive should try to change the organization's relationships with a stakeholder from a less favorable category to a more favorable one. The stakeholder can then be managed using the generic strategy most appropriate for the category.

  12. Expected Utility Distributions for Flexible, Contingent Execution

    NASA Technical Reports Server (NTRS)

    Bresina, John L.; Washington, Richard

    2000-01-01

    This paper presents a method for using expected utility distributions in the execution of flexible, contingent plans. A utility distribution maps the possible start times of an action to the expected utility of the plan suffix starting with that action. The contingent plan encodes a tree of possible courses of action and includes flexible temporal constraints and resource constraints. When execution reaches a branch point, the eligible option with the highest expected utility at that point in time is selected. The utility distributions make this selection sensitive to the runtime context, yet still efficient. Our approach uses predictions of action duration uncertainty as well as expectations of resource usage and availability to determine when an action can execute and with what probability. Execution windows and probabilities inevitably change as execution proceeds, but such changes do not invalidate the cached utility distributions, thus, dynamic updating of utility information is minimized.

  13. Industrial Code Development

    NASA Technical Reports Server (NTRS)

    Shapiro, Wilbur

    1991-01-01

    The industrial codes will consist of modules of 2-D and simplified 2-D or 1-D codes, intended for expeditious parametric studies, analysis, and design of a wide variety of seals. Integration into a unified system is accomplished by the industrial Knowledge Based System (KBS), which will also provide user friendly interaction, contact sensitive and hypertext help, design guidance, and an expandable database. The types of analysis to be included with the industrial codes are interfacial performance (leakage, load, stiffness, friction losses, etc.), thermoelastic distortions, and dynamic response to rotor excursions. The first three codes to be completed and which are presently being incorporated into the KBS are the incompressible cylindrical code, ICYL, and the compressible cylindrical code, GCYL.

  14. Updating the Read Codes

    PubMed Central

    Robinson, David; Comp, Dip; Schulz, Erich; Brown, Philip; Price, Colin

    1997-01-01

    Abstract The Read Codes are a hierarchically-arranged controlled clinical vocabulary introduced in the early 1980s and now consisting of three maintained versions of differing complexity. The code sets are dynamic, and are updated quarterly in response to requests from users including clinicians in both primary and secondary care, software suppliers, and advice from a network of specialist healthcare professionals. The codes' continual evolution of content, both across and within versions, highlights tensions between different users and uses of coded clinical data. Internal processes, external interactions and new structural features implemented by the NHS Centre for Coding and Classification (NHSCCC) for user interactive maintenance of the Read Codes are described, and over 2000 items of user feedback episodes received over a 15-month period are analysed. PMID:9391934

  15. Mechanical code comparator

    DOEpatents

    Peter, Frank J.; Dalton, Larry J.; Plummer, David W.

    2002-01-01

    A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

  16. Generating code adapted for interlinking legacy scalar code and extended vector code

    DOEpatents

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  17. Phonological coding during reading

    PubMed Central

    Leinenger, Mallorie

    2014-01-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early (pre-lexical) or that phonological codes come online late (post-lexical)) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eyetracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model (Van Order, 1987), dual-route model (e.g., Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001), parallel distributed processing model (Seidenberg & McClelland, 1989)) are discussed. PMID:25150679

  18. Industrial Computer Codes

    NASA Technical Reports Server (NTRS)

    Shapiro, Wilbur

    1996-01-01

    This is an overview of new and updated industrial codes for seal design and testing. GCYLT (gas cylindrical seals -- turbulent), SPIRALI (spiral-groove seals -- incompressible), KTK (knife to knife) Labyrinth Seal Code, and DYSEAL (dynamic seal analysis) are covered. CGYLT uses G-factors for Poiseuille and Couette turbulence coefficients. SPIRALI is updated to include turbulence and inertia, but maintains the narrow groove theory. KTK labyrinth seal code handles straight or stepped seals. And DYSEAL provides dynamics for the seal geometry.

  19. Doubled Color Codes

    NASA Astrophysics Data System (ADS)

    Bravyi, Sergey

    Combining protection from noise and computational universality is one of the biggest challenges in the fault-tolerant quantum computing. Topological stabilizer codes such as the 2D surface code can tolerate a high level of noise but implementing logical gates, especially non-Clifford ones, requires a prohibitively large overhead due to the need of state distillation. In this talk I will describe a new family of 2D quantum error correcting codes that enable a transversal implementation of all logical gates required for the universal quantum computing. Transversal logical gates (TLG) are encoded operations that can be realized by applying some single-qubit rotation to each physical qubit. TLG are highly desirable since they introduce no overhead and do not spread errors. It has been known before that a quantum code can have only a finite number of TLGs which rules out computational universality. Our scheme circumvents this no-go result by combining TLGs of two different quantum codes using the gauge-fixing method pioneered by Paetznick and Reichardt. The first code, closely related to the 2D color code, enables a transversal implementation of all single-qubit Clifford gates such as the Hadamard gate and the π / 2 phase shift. The second code that we call a doubled color code provides a transversal T-gate, where T is the π / 4 phase shift. The Clifford+T gate set is known to be computationally universal. The two codes can be laid out on the honeycomb lattice with two qubits per site such that the code conversion requires parity measurements for six-qubit Pauli operators supported on faces of the lattice. I will also describe numerical simulations of logical Clifford+T circuits encoded by the distance-3 doubled color code. Based on a joint work with Andrew Cross.

  20. Real-Time Projection to Verify Plan Success During Execution

    NASA Technical Reports Server (NTRS)

    Wagner, David A.; Dvorak, Daniel L.; Rasmussen, Robert D.; Knight, Russell L.; Morris, John R.; Bennett, Matthew B.; Ingham, Michel D.

    2012-01-01

    The Mission Data System provides a framework for modeling complex systems in terms of system behaviors and goals that express intent. Complex activity plans can be represented as goal networks that express the coordination of goals on different state variables of the system. Real-time projection extends the ability of this system to verify plan achievability (all goals can be satisfied over the entire plan) into the execution domain so that the system is able to continuously re-verify a plan as it is executed, and as the states of the system change in response to goals and the environment. Previous versions were able to detect and respond to goal violations when they actually occur during execution. This new capability enables the prediction of future goal failures; specifically, goals that were previously found to be achievable but are no longer achievable due to unanticipated faults or environmental conditions. Early detection of such situations enables operators or an autonomous fault response capability to deal with the problem at a point that maximizes the available options. For example, this system has been applied to the problem of managing battery energy on a lunar rover as it is used to explore the Moon. Astronauts drive the rover to waypoints and conduct science observations according to a plan that is scheduled and verified to be achievable with the energy resources available. As the astronauts execute this plan, the system uses this new capability to continuously re-verify the plan as energy is consumed to ensure that the battery will never be depleted below safe levels across the entire plan.

  1. Visual analysis of code security

    SciTech Connect

    Goodall, John R; Radwan, Hassan; Halseth, Lenny

    2010-01-01

    To help increase the confidence that software is secure, researchers and vendors have developed different kinds of automated software security analysis tools. These tools analyze software for weaknesses and vulnerabilities, but the individual tools catch different vulnerabilities and produce voluminous data with many false positives. This paper describes a system that brings together the results of disparate software analysis tools into a visual environment to support the triage and exploration of code vulnerabilities. Our system allows software developers to explore vulnerability results to uncover hidden trends, triage the most important code weaknesses, and show who is responsible for introducing software vulnerabilities. By correlating and normalizing multiple software analysis tools' data, the overall vulnerability detection coverage of software is increased. A visual overview and powerful interaction allows the user to focus attention on the most pressing vulnerabilities within huge volumes of data, and streamlines the secure software development workflow through integration with development tools.

  2. Project Execution Plan, Rev. 3

    SciTech Connect

    IT Corporation, Las Vegas

    2002-08-01

    This plan addresses project activities encompassed by the U.S. Department of Energy's (DOE's), National Nuclear Security Administration Nevada Operations Office, Environmental Restoration Division and conforms to the requirements contained in the Life-Cycle Asset Management, DOE Order 430.1A; The Joint Program Office Policy on Project Management in Support of DOE Order 430.1; Program and Project Management for the Acquisition of Capital Assets, DOE Order 413.3; the Project Execution and Engineering Management Planning Guide, GPG-FM-010; and other applicable Good Practice Guides; and the FY 2001 Integrated Planning, Accountability, and Budgeting System Policy Guidance. The plan also reflects the milestone philosophies of the Federal Facility Agreement and Consent Order, as agreed to by the State of Nevada, the DOE, and the U.S. Department of Defense; and traditional project management philosophies such as the development of life-cycle costs, schedules, and work scope; identification o f roles and responsibilities; and baseline management and controls.

  3. FAA Smoke Transport Code

    SciTech Connect

    Domino, Stefan; Luketa-Hanlin, Anay; Gallegos, Carlos

    2006-10-27

    FAA Smoke Transport Code, a physics-based Computational Fluid Dynamics tool, which couples heat, mass, and momentum transfer, has been developed to provide information on smoke transport in cargo compartments with various geometries and flight conditions. The software package contains a graphical user interface for specification of geometry and boundary conditions, analysis module for solving the governing equations, and a post-processing tool. The current code was produced by making substantial improvements and additions to a code obtained from a university. The original code was able to compute steady, uniform, isothermal turbulent pressurization. In addition, a preprocessor and postprocessor were added to arrive at the current software package.

  4. Bar Code Labels

    NASA Technical Reports Server (NTRS)

    1988-01-01

    American Bar Codes, Inc. developed special bar code labels for inventory control of space shuttle parts and other space system components. ABC labels are made in a company-developed anodizing aluminum process and consecutively marketed with bar code symbology and human readable numbers. They offer extreme abrasion resistance and indefinite resistance to ultraviolet radiation, capable of withstanding 700 degree temperatures without deterioration and up to 1400 degrees with special designs. They offer high resistance to salt spray, cleaning fluids and mild acids. ABC is now producing these bar code labels commercially or industrial customers who also need labels to resist harsh environments.

  5. Tokamak Systems Code

    SciTech Connect

    Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.

  6. MORSE Monte Carlo code

    SciTech Connect

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described.

  7. 4 CFR 9.1 - GAO Senior Executive Service.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... executives; (2) Ensure that compensation, retention, and tenure are contingent on executive success which is... 4 Accounts 1 2013-01-01 2013-01-01 false GAO Senior Executive Service. 9.1 Section 9.1 Accounts GOVERNMENT ACCOUNTABILITY OFFICE PERSONNEL SYSTEM SENIOR EXECUTIVE SERVICE § 9.1 GAO Senior Executive...

  8. 4 CFR 9.1 - GAO Senior Executive Service.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... executives; (2) Ensure that compensation, retention, and tenure are contingent on executive success which is... 4 Accounts 1 2012-01-01 2012-01-01 false GAO Senior Executive Service. 9.1 Section 9.1 Accounts GOVERNMENT ACCOUNTABILITY OFFICE PERSONNEL SYSTEM SENIOR EXECUTIVE SERVICE § 9.1 GAO Senior Executive...

  9. 4 CFR 9.1 - GAO Senior Executive Service.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... executives; (2) Ensure that compensation, retention, and tenure are contingent on executive success which is... 4 Accounts 1 2014-01-01 2013-01-01 true GAO Senior Executive Service. 9.1 Section 9.1 Accounts GOVERNMENT ACCOUNTABILITY OFFICE PERSONNEL SYSTEM SENIOR EXECUTIVE SERVICE § 9.1 GAO Senior Executive...

  10. Color coding information: assessing alternative coding systems using independent brightness and hue dimensions.

    PubMed

    Jameson, K A; Kaiwi, J L; Bamber, D

    2001-06-01

    Can independent dimensions of brightness and hue be used in a combined digital information code? This issue was addressed by developing 2 color-coding systems and testing them on informed and naive participants in signal beam detection and classification experiments for simulated sonar displays. Each coding system's results showed both groups efficiently used encoded information that varied simultaneously along the 2 dimensions of brightness and hue. Findings support the proposed procedures for developing color information codes and the validity of such information codes across different populations. Applied significance of these results is provided by the test of principled methods of color-code construction and the demonstration that extending the information content of user interfaces beyond 1 dimension is feasible in practice.

  11. The Relationship Between Working Memory Capacity and Executive Functioning: Evidence for a Common Executive Attention Construct

    PubMed Central

    McCabe, David P.; Roediger, Henry L.; McDaniel, Mark A.; Balota, David A.; Hambrick, David Z.

    2010-01-01

    Attentional control has been conceptualized as executive functioning by neuropsychologists and as working memory capacity by experimental psychologists. We examined the relationship between these constructs using a factor analytic approach in an adult lifespan sample. Several tests of working memory capacity and executive function were administered to over 200 subjects between the ages of 18-90 years old, along with tests of processing speed and episodic memory. The correlation between working memory capacity and executive functioning constructs was very strong (r = .97), but correlations between these constructs and processing speed were considerably weaker (r's ≈ .79). Controlling for working memory capacity or executive function eliminated age effects on episodic memory, and working memory capacity or executive function accounted for variance in episodic memory beyond that accounted for by processing speed. We conclude that tests of working memory capacity and executive function share a common underlying executive attention component that is strongly predictive of higher-level cognition. PMID:20230116

  12. CHEETAH: A next generation thermochemical code

    SciTech Connect

    Fried, L.; Souers, P.

    1994-11-01

    CHEETAH is an effort to bring the TIGER thermochemical code into the 1990s. A wide variety of improvements have been made in Version 1.0. We have improved the robustness and ease of use of TIGER. All of TIGER`s solvers have been replaced by new algorithms. We find that CHEETAH solves a wider variety of problems with no user intervention (e.g. no guesses for the C-J state) than TIGER did. CHEETAH has been made simpler to use than TIGER; typical use of the code occurs with the new standard run command. CHEETAH will make the use of thermochemical codes more attractive to practical explosive formulators. We have also made an extensive effort to improve over the results of TIGER. CHEETAH`s version of the BKW equation of state (BKWC) is able to accurately reproduce energies from cylinder tests; something that other BKW parameter sets have been unable to do. Calculations performed with BKWC execute very quickly; typical run times are under 10 seconds on a workstation. In the future we plan to improve the underlying science in CHEETAH. More accurate equations of state will be used in the gas and the condensed phase. A kinetics capability will be added to the code that will predict reaction zone thickness. Further ease of use features will eventually be added; an automatic formulator that adjusts concentrations to match desired properties is planned.

  13. External-Compression Supersonic Inlet Design Code

    NASA Technical Reports Server (NTRS)

    Slater, John W.

    2011-01-01

    A computer code named SUPIN has been developed to perform aerodynamic design and analysis of external-compression, supersonic inlets. The baseline set of inlets include axisymmetric pitot, two-dimensional single-duct, axisymmetric outward-turning, and two-dimensional bifurcated-duct inlets. The aerodynamic methods are based on low-fidelity analytical and numerical procedures. The geometric methods are based on planar geometry elements. SUPIN has three modes of operation: 1) generate the inlet geometry from a explicit set of geometry information, 2) size and design the inlet geometry and analyze the aerodynamic performance, and 3) compute the aerodynamic performance of a specified inlet geometry. The aerodynamic performance quantities includes inlet flow rates, total pressure recovery, and drag. The geometry output from SUPIN includes inlet dimensions, cross-sectional areas, coordinates of planar profiles, and surface grids suitable for input to grid generators for analysis by computational fluid dynamics (CFD) methods. The input data file for SUPIN and the output file from SUPIN are text (ASCII) files. The surface grid files are output as formatted Plot3D or stereolithography (STL) files. SUPIN executes in batch mode and is available as a Microsoft Windows executable and Fortran95 source code with a makefile for Linux.

  14. Research on universal combinatorial coding.

    PubMed

    Lu, Jun; Zhang, Zhuo; Mo, Juan

    2014-01-01

    The conception of universal combinatorial coding is proposed. Relations exist more or less in many coding methods. It means that a kind of universal coding method is objectively existent. It can be a bridge connecting many coding methods. Universal combinatorial coding is lossless and it is based on the combinatorics theory. The combinational and exhaustive property make it closely related with the existing code methods. Universal combinatorial coding does not depend on the probability statistic characteristic of information source, and it has the characteristics across three coding branches. It has analyzed the relationship between the universal combinatorial coding and the variety of coding method and has researched many applications technologies of this coding method. In addition, the efficiency of universal combinatorial coding is analyzed theoretically. The multicharacteristic and multiapplication of universal combinatorial coding are unique in the existing coding methods. Universal combinatorial coding has theoretical research and practical application value.

  15. Research on universal combinatorial coding.

    PubMed

    Lu, Jun; Zhang, Zhuo; Mo, Juan

    2014-01-01

    The conception of universal combinatorial coding is proposed. Relations exist more or less in many coding methods. It means that a kind of universal coding method is objectively existent. It can be a bridge connecting many coding methods. Universal combinatorial coding is lossless and it is based on the combinatorics theory. The combinational and exhaustive property make it closely related with the existing code methods. Universal combinatorial coding does not depend on the probability statistic characteristic of information source, and it has the characteristics across three coding branches. It has analyzed the relationship between the universal combinatorial coding and the variety of coding method and has researched many applications technologies of this coding method. In addition, the efficiency of universal combinatorial coding is analyzed theoretically. The multicharacteristic and multiapplication of universal combinatorial coding are unique in the existing coding methods. Universal combinatorial coding has theoretical research and practical application value. PMID:24772019

  16. Intergenerational Transmission of Neuropsychological Executive Functioning

    PubMed Central

    Jester, Jennifer M.; Nigg, Joel T.; Puttler, Leon I.; Long, Jeffrey C.; Fitzgerald, Hiram E.; Zucker, Robert A.

    2009-01-01

    Relationships between parent and child executive functioning were examined, controlling for the critical potential confound of IQ, in a family study involving 434 children (130 girls, 304 boys) and 376 parents from 204 community recruited families at high risk for the development of substance use disorder. Structural equation modeling found evidence of separate executive functioning and intelligence (IQ) latent variables. Mother’s and father’s executive functioning were associated with child’s executive functioning (beta = 0.34 for father-child, 0.51 for mother-child), independently of parental IQ, which as expected was associated with child’s IQ (beta = 0.52 for father-child, 0.54 for mother-child). Familial correlations also showed a significant relationship of executive functioning between parents and offspring. These findings clarify that key elements of the executive functioning construct are reliably differentiable from IQ, and are transmitted in families. This work supports the utility of the construct of executive function in further study of the mechanisms and etiology of externalizing psychopathologies. PMID:19243871

  17. Fast Coding Unit Encoding Mechanism for Low Complexity Video Coding

    PubMed Central

    Wu, Yueying; Jia, Kebin; Gao, Guandong

    2016-01-01

    In high efficiency video coding (HEVC), coding tree contributes to excellent compression performance. However, coding tree brings extremely high computational complexity. Innovative works for improving coding tree to further reduce encoding time are stated in this paper. A novel low complexity coding tree mechanism is proposed for HEVC fast coding unit (CU) encoding. Firstly, this paper makes an in-depth study of the relationship among CU distribution, quantization parameter (QP) and content change (CC). Secondly, a CU coding tree probability model is proposed for modeling and predicting CU distribution. Eventually, a CU coding tree probability update is proposed, aiming to address probabilistic model distortion problems caused by CC. Experimental results show that the proposed low complexity CU coding tree mechanism significantly reduces encoding time by 27% for lossy coding and 42% for visually lossless coding and lossless coding. The proposed low complexity CU coding tree mechanism devotes to improving coding performance under various application conditions. PMID:26999741

  18. 36 CFR 1231.12 - How do executive agencies request to transfer records to another executive agency?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... request to transfer records to another executive agency? 1231.12 Section 1231.12 Parks, Forests, and... THE CUSTODY OF ONE EXECUTIVE AGENCY TO ANOTHER § 1231.12 How do executive agencies request to transfer records to another executive agency? An executive agency that proposes to transfer records to...

  19. 36 CFR 1231.12 - How do executive agencies request to transfer records to another executive agency?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... request to transfer records to another executive agency? 1231.12 Section 1231.12 Parks, Forests, and... THE CUSTODY OF ONE EXECUTIVE AGENCY TO ANOTHER § 1231.12 How do executive agencies request to transfer records to another executive agency? An executive agency that proposes to transfer records to...

  20. Code of Ethics

    ERIC Educational Resources Information Center

    Division for Early Childhood, Council for Exceptional Children, 2009

    2009-01-01

    The Code of Ethics of the Division for Early Childhood (DEC) of the Council for Exceptional Children is a public statement of principles and practice guidelines supported by the mission of DEC. The foundation of this Code is based on sound ethical reasoning related to professional practice with young children with disabilities and their families…