Science.gov

Sample records for code execution detection

  1. Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution

    NASA Astrophysics Data System (ADS)

    Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon

    The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on

  2. Detection of malicious computer executables

    DOEpatents

    Cai, Dongming M.; Gokhale, Maya

    2009-04-14

    A method of detecting malicious binary executable files is accomplished by inputting a binary executable file; converting the binary executable file to byte hexadecimal text strings; calculating the frequency of each byte pattern in the byte hexadecimal text strings; selecting characteristic byte pattern frequencies as discriminating features; classifying the discriminating features as malicious or benign; labeling the binary executable file as malicious or benign; and outputting the labeled malicious or benign binary executable file.

  3. Model-Driven Engineering of Machine Executable Code

    NASA Astrophysics Data System (ADS)

    Eichberg, Michael; Monperrus, Martin; Kloppenburg, Sven; Mezini, Mira

    Implementing static analyses of machine-level executable code is labor intensive and complex. We show how to leverage model-driven engineering to facilitate the design and implementation of programs doing static analyses. Further, we report on important lessons learned on the benefits and drawbacks while using the following technologies: using the Scala programming language as target of code generation, using XML-Schema to express a metamodel, and using XSLT to implement (a) transformations and (b) a lint like tool. Finally, we report on the use of Prolog for writing model transformations.

  4. System for loading executable code into volatile memory in a downhole tool

    DOEpatents

    Hall, David R.; Bartholomew, David B.; Johnson, Monte L.

    2007-09-25

    A system for loading an executable code into volatile memory in a downhole tool string component comprises a surface control unit comprising executable code. An integrated downhole network comprises data transmission elements in communication with the surface control unit and the volatile memory. The executable code, stored in the surface control unit, is not permanently stored in the downhole tool string component. In a preferred embodiment of the present invention, the downhole tool string component comprises boot memory. In another embodiment, the executable code is an operating system executable code. Preferably, the volatile memory comprises random access memory (RAM). A method for loading executable code to volatile memory in a downhole tool string component comprises sending the code from the surface control unit to a processor in the downhole tool string component over the network. A central processing unit writes the executable code in the volatile memory.

  5. DROP: Detecting Return-Oriented Programming Malicious Code

    NASA Astrophysics Data System (ADS)

    Chen, Ping; Xiao, Hai; Shen, Xiaobin; Yin, Xinchun; Mao, Bing; Xie, Li

    Return-Oriented Programming (ROP) is a new technique that helps the attacker construct malicious code mounted on x86/SPARC executables without any function call at all. Such technique makes the ROP malicious code contain no instruction, which is different from existing attacks. Moreover, it hides the malicious code in benign code. Thus, it circumvents the approaches that prevent control flow diversion outside legitimate regions (such as W ⊕ X ) and most malicious code scanning techniques (such as anti-virus scanners). However, ROP has its own intrinsic feature which is different from normal program design: (1) uses short instruction sequence ending in "ret", which is called gadget, and (2) executes the gadgets contiguously in specific memory space, such as standard GNU libc. Based on the features of the ROP malicious code, in this paper, we present a tool DROP, which is focused on dynamically detecting ROP malicious code. Preliminary experimental results show that DROP can efficiently detect ROP malicious code, and have no false positives and negatives.

  6. Execution Time Optimization Analysis on Multiple Algorithms Performance of Moving Object Edge Detection

    NASA Astrophysics Data System (ADS)

    Islam, Syed Zahurul; Islam, Syed Zahidul; Jidin, Razali; Ali, Mohd. Alauddin Mohd.

    2010-06-01

    Computer vision and digital image processing comprises varieties of applications, where some of these used in image processing include convolution, edge detection as well as contrast enhancement. This paper analyzes execution time optimization analysis between Sobel and Canny image processing algorithms in terms of moving objects edge detection. Sobel and Canny edge detection algorithms have been described with pseudo code and detailed flow chart and implemented in C and MATLAB respectively on different platforms to evaluate performance and execution time for moving cars. It is shown that Sobel algorithm is very effective in case of moving multiple cars and blurs images with efficient execution time. Moreover, convolution operation of Canny takes 94-95% time of total execution time with thin and smooth but redundant edges. This also makes more robust of Sobel to detect moving cars edges.

  7. 17 CFR 232.106 - Prohibition against electronic submissions containing executable code.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., in which case the submission will be accepted but the PDF document(s) containing executable code will... Filer Manual section also may be a violation of the Computer Fraud and Abuse Act of 1986, as...

  8. Detecting non-coding selective pressure in coding regions

    PubMed Central

    Chen, Hui; Blanchette, Mathieu

    2007-01-01

    Background Comparative genomics approaches, where orthologous DNA regions are compared and inter-species conserved regions are identified, have proven extremely powerful for identifying non-coding regulatory regions located in intergenic or intronic regions. However, non-coding functional elements can also be located within coding region, as is common for exonic splicing enhancers, some transcription factor binding sites, and RNA secondary structure elements affecting mRNA stability, localization, or translation. Since these functional elements are located in regions that are themselves highly conserved because they are coding for a protein, they generally escaped detection by comparative genomics approaches. Results We introduce a comparative genomics approach for detecting non-coding functional elements located within coding regions. Codon evolution is modeled as a mixture of codon substitution models, where each component of the mixture describes the evolution of codons under a specific type of coding selective pressure. We show how to compute the posterior distribution of the entropy and parsimony scores under this null model of codon evolution. The method is applied to a set of growth hormone 1 orthologous mRNA sequences and a known exonic splicing elements is detected. The analysis of a set of CORTBP2 orthologous genes reveals a region of several hundred base pairs under strong non-coding selective pressure whose function remains unknown. Conclusion Non-coding functional elements, in particular those involved in post-transcriptional regulation, are likely to be much more prevalent than is currently known. With the numerous genome sequencing projects underway, comparative genomics approaches like that proposed here are likely to become increasingly powerful at detecting such elements. PMID:17288582

  9. The role of the PIRT process in identifying code improvements and executing code development

    SciTech Connect

    Wilson, G.E.; Boyack, B.E.

    1997-07-01

    In September 1988, the USNRC issued a revised ECCS rule for light water reactors that allows, as an option, the use of best estimate (BE) plus uncertainty methods in safety analysis. The key feature of this licensing option relates to quantification of the uncertainty in the determination that an NPP has a {open_quotes}low{close_quotes} probability of violating the safety criteria specified in 10 CFR 50. To support the 1988 licensing revision, the USNRC and its contractors developed the CSAU evaluation methodology to demonstrate the feasibility of the BE plus uncertainty approach. The PIRT process, Step 3 in the CSAU methodology, was originally formulated to support the BE plus uncertainty licensing option as executed in the CSAU approach to safety analysis. Subsequent work has shown the PIRT process to be a much more powerful tool than conceived in its original form. Through further development and application, the PIRT process has shown itself to be a robust means to establish safety analysis computer code phenomenological requirements in their order of importance to such analyses. Used early in research directed toward these objectives, PIRT results also provide the technical basis and cost effective organization for new experimental programs needed to improve the safety analysis codes for new applications. The primary purpose of this paper is to describe the generic PIRT process, including typical and common illustrations from prior applications. The secondary objective is to provide guidance to future applications of the process to help them focus, in a graded approach, on systems, components, processes and phenomena that have been common in several prior applications.

  10. Towards a testbed for malicious code detection

    SciTech Connect

    Lo, R.; Kerchen, P.; Crawford, R.; Ho, W.; Crossley, J.; Fink, G.; Levitt, K.; Olsson, R.; Archer, M. . Div. of Computer Science)

    1991-01-01

    This paper proposes an environment for detecting many types of malicious code, including computer viruses, Trojan horses, and time/logic bombs. This malicious code testbed (MCT) is based upon both static and dynamic analysis tools developed at the University of California, Davis, which have been shown to be effective against certain types of malicious code. The testbed extends the usefulness of these tools by using them in a complementary fashion to detect more general cases of malicious code. Perhaps more importantly, the MCT allows administrators and security analysts to check a program before installation, thereby avoiding any damage a malicious program might inflict. 5 refs., 2 figs., 2 tabs.

  11. Accelerating execution of the integrated TIGER series Monte Carlo radiation transport codes

    SciTech Connect

    Smith, L.M.; Hochstedler, R.D.

    1997-02-01

    Execution of the integrated TIGER series (ITS) of coupled electron/photon Monte Carlo radiation transport codes has been accelerated by modifying the FORTRAN source code for more efficient computation. Each member code of ITS was benchmarked and profiled with a specific test case that directed the acceleration effort toward the most computationally intensive subroutines. Techniques for accelerating these subroutines included replacing linear search algorithms with binary versions, replacing the pseudo-random number generator, reducing program memory allocation, and proofing the input files for geometrical redundancies. All techniques produced identical or statistically similar results to the original code. Final benchmark timing of the accelerated code resulted in speed-up factors of 2.00 for TIGER (the one-dimensional slab geometry code), 1.74 for CYLTRAN (the two-dimensional cylindrical geometry code), and 1.90 for ACCEPT (the arbitrary three-dimensional geometry code).

  12. Are You Overpaying Your Academic Executive Team? A Method for Detecting Unmerited Academic Executive Compensation

    ERIC Educational Resources Information Center

    Pearce, Joshua

    2016-01-01

    University tuition fees and student debt have risen in part due to rapid expansion of university administration compensation. This study provides a novel methodology for detecting inappropriate executive compensation within universities. The usefulness of academic ideas is openly ranked using the h-index. By comparing the ratio of academic…

  13. 76 FR 66235 - Bar Code Technologies for Drugs and Biological Products; Retrospective Review Under Executive...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-26

    ... HUMAN SERVICES Food and Drug Administration 21 CFR Parts 201 and 610 Bar Code Technologies for Drugs and Biological Products; Retrospective Review Under Executive Order 13563; Request for Comments AGENCY: Food and Drug Administration, HHS. ACTION: Notice; request for comments. SUMMARY: The Food and...

  14. Runtime Detection of C-Style Errors in UPC Code

    SciTech Connect

    Pirkelbauer, P; Liao, C; Panas, T; Quinlan, D

    2011-09-29

    Unified Parallel C (UPC) extends the C programming language (ISO C 99) with explicit parallel programming support for the partitioned global address space (PGAS), which provides a global memory space with localized partitions to each thread. Like its ancestor C, UPC is a low-level language that emphasizes code efficiency over safety. The absence of dynamic (and static) safety checks allows programmer oversights and software flaws that can be hard to spot. In this paper, we present an extension of a dynamic analysis tool, ROSE-Code Instrumentation and Runtime Monitor (ROSECIRM), for UPC to help programmers find C-style errors involving the global address space. Built on top of the ROSE source-to-source compiler infrastructure, the tool instruments source files with code that monitors operations and keeps track of changes to the system state. The resulting code is linked to a runtime monitor that observes the program execution and finds software defects. We describe the extensions to ROSE-CIRM that were necessary to support UPC. We discuss complications that arise from parallel code and our solutions. We test ROSE-CIRM against a runtime error detection test suite, and present performance results obtained from running error-free codes. ROSE-CIRM is released as part of the ROSE compiler under a BSD-style open source license.

  15. Automated assistance for detecting malicious code

    SciTech Connect

    Crawford, R.; Kerchen, P.; Levitt, K.; Olsson, R.; Archer, M.; Casillas, M.

    1993-06-18

    This paper gives an update on the continuing work on the Malicious Code Testbed (MCT). The MCT is a semi-automated tool, operating in a simulated, cleanroom environment, that is capable of detecting many types of malicious code, such as viruses, Trojan horses, and time/logic bombs. The MCT allows security analysts to check a program before installation, thereby avoiding any damage a malicious program might inflict.

  16. The relationship between the WAIS-III digit symbol Coding and executive functioning.

    PubMed

    Davis, Andrew S; Pierson, Eric E

    2012-01-01

    The current study examined the performance of college students (N = 63) on the Coding subtest of the Wechsler Adult Intelligence Scale-Third Edition and examined whether differences in performance could in part be explained by performance on the Delis-Kaplan Executive Functions System Trail-Making Test. The results of a multiple regression analysis indicated that performance on Coding was correlated most with Letter-Number Sequencing and to a lesser extent with Visual Scanning and with Number Sequencing approaching significance. There was no significant relationship with Letter Sequencing or Motor Speed. The three significant predictor variables were then entered into a stepwise hierarchical regression analysis. Subsequent models using Visual Scanning and Number Sequencing did not improve the predictive value of the model. These results are consistent with other recent reports suggesting that performance on Coding taps cognitive skills and abilities beyond that of simple motor speed or paired-associative learning. The findings also suggest a limited improvement in understanding test performance using a process analysis approach.

  17. Coded excitation plane wave imaging for shear wave motion detection.

    PubMed

    Song, Pengfei; Urban, Matthew W; Manduca, Armando; Greenleaf, James F; Chen, Shigao

    2015-07-01

    Plane wave imaging has greatly advanced the field of shear wave elastography thanks to its ultrafast imaging frame rate and the large field-of-view (FOV). However, plane wave imaging also has decreased penetration due to lack of transmit focusing, which makes it challenging to use plane waves for shear wave detection in deep tissues and in obese patients. This study investigated the feasibility of implementing coded excitation in plane wave imaging for shear wave detection, with the hypothesis that coded ultrasound signals can provide superior detection penetration and shear wave SNR compared with conventional ultrasound signals. Both phase encoding (Barker code) and frequency encoding (chirp code) methods were studied. A first phantom experiment showed an approximate penetration gain of 2 to 4 cm for the coded pulses. Two subsequent phantom studies showed that all coded pulses outperformed the conventional short imaging pulse by providing superior sensitivity to small motion and robustness to weak ultrasound signals. Finally, an in vivo liver case study on an obese subject (body mass index = 40) demonstrated the feasibility of using the proposed method for in vivo applications, and showed that all coded pulses could provide higher SNR shear wave signals than the conventional short pulse. These findings indicate that by using coded excitation shear wave detection, one can benefit from the ultrafast imaging frame rate and large FOV provided by plane wave imaging while preserving good penetration and shear wave signal quality, which is essential for obtaining robust shear elasticity measurements of tissue.

  18. A Software Safety Certification Plug-in for Automated Code Generators (Executive Briefing)

    NASA Technical Reports Server (NTRS)

    Denney, Ewen; Schumann, Johann; Greaves, Doug

    2006-01-01

    A viewgraph presentation describing a certification tool to check the safety of auto-generated codes is shown. The topics include: 1) Auto-generated Code at NASA; 2) Safety of Auto-generated Code; 3) Technical Approach; and 4) Project Plan.

  19. Coded Excitation Plane Wave Imaging for Shear Wave Motion Detection

    PubMed Central

    Song, Pengfei; Urban, Matthew W.; Manduca, Armando; Greenleaf, James F.; Chen, Shigao

    2015-01-01

    Plane wave imaging has greatly advanced the field of shear wave elastography thanks to its ultrafast imaging frame rate and the large field-of-view (FOV). However, plane wave imaging also has decreased penetration due to lack of transmit focusing, which makes it challenging to use plane waves for shear wave detection in deep tissues and in obese patients. This study investigated the feasibility of implementing coded excitation in plane wave imaging for shear wave detection, with the hypothesis that coded ultrasound signals can provide superior detection penetration and shear wave signal-to-noise-ratio (SNR) compared to conventional ultrasound signals. Both phase encoding (Barker code) and frequency encoding (chirp code) methods were studied. A first phantom experiment showed an approximate penetration gain of 2-4 cm for the coded pulses. Two subsequent phantom studies showed that all coded pulses outperformed the conventional short imaging pulse by providing superior sensitivity to small motion and robustness to weak ultrasound signals. Finally, an in vivo liver case study on an obese subject (Body Mass Index = 40) demonstrated the feasibility of using the proposed method for in vivo applications, and showed that all coded pulses could provide higher SNR shear wave signals than the conventional short pulse. These findings indicate that by using coded excitation shear wave detection, one can benefit from the ultrafast imaging frame rate and large FOV provided by plane wave imaging while preserving good penetration and shear wave signal quality, which is essential for obtaining robust shear elasticity measurements of tissue. PMID:26168181

  20. Study on detection techniques for laser fuze using pseudorandom code

    NASA Astrophysics Data System (ADS)

    Yan, Xiaopeng; Li, Ping; Jia, Ruili; Chen, Huimin

    2008-03-01

    With the development of semiconductor laser technology, laser proximity fuzes have been widely used in various kinds of guided missiles and routine ammunitions. An approach to pulsed laser fuze based on pseudorandom code is presented in this paper. Based on the principle of laser fuze using pseudorandom code, the system has been divided into emitting module, receiving module, optical system and information processing module. The different modules have been analyzed in details and principles for selecting the parameters of the modules are given. The testing shows that laser fuze based on pseudorandom code has a better ability of detection and a higher resistance to interference. The theoretic foundation is provided for scientifically designing pulsed laser fuze of pseudorandom code.

  1. Detecting and Characterizing Semantic Inconsistencies in Ported Code

    NASA Technical Reports Server (NTRS)

    Ray, Baishakhi; Kim, Miryung; Person,Suzette; Rungta, Neha

    2013-01-01

    Adding similar features and bug fixes often requires porting program patches from reference implementations and adapting them to target implementations. Porting errors may result from faulty adaptations or inconsistent updates. This paper investigates (1) the types of porting errors found in practice, and (2) how to detect and characterize potential porting errors. Analyzing version histories, we define five categories of porting errors, including incorrect control- and data-flow, code redundancy, inconsistent identifier renamings, etc. Leveraging this categorization, we design a static control- and data-dependence analysis technique, SPA, to detect and characterize porting inconsistencies. Our evaluation on code from four open-source projects shows that SPA can detect porting inconsistencies with 65% to 73% precision and 90% recall, and identify inconsistency types with 58% to 63% precision and 92% to 100% recall. In a comparison with two existing error detection tools, SPA improves precision by 14 to 17 percentage points.

  2. Plagiarism Detection Algorithm for Source Code in Computer Science Education

    ERIC Educational Resources Information Center

    Liu, Xin; Xu, Chan; Ouyang, Boyu

    2015-01-01

    Nowadays, computer programming is getting more necessary in the course of program design in college education. However, the trick of plagiarizing plus a little modification exists among some students' home works. It's not easy for teachers to judge if there's plagiarizing in source code or not. Traditional detection algorithms cannot fit this…

  3. A Comparison of Source Code Plagiarism Detection Engines

    ERIC Educational Resources Information Center

    Lancaster, Thomas; Culwin, Fintan

    2004-01-01

    Automated techniques for finding plagiarism in student source code submissions have been in use for over 20 years and there are many available engines and services. This paper reviews the literature on the major modern detection engines, providing a comparison of them based upon the metrics and techniques they deploy. Generally the most common and…

  4. Detecting and Characterizing Semantic Inconsistencies in Ported Code

    NASA Technical Reports Server (NTRS)

    Ray, Baishakhi; Kim, Miryung; Person, Suzette J.; Rungta, Neha

    2013-01-01

    Adding similar features and bug fixes often requires porting program patches from reference implementations and adapting them to target implementations. Porting errors may result from faulty adaptations or inconsistent updates. This paper investigates (I) the types of porting errors found in practice, and (2) how to detect and characterize potential porting errors. Analyzing version histories, we define five categories of porting errors, including incorrect control- and data-flow, code redundancy, inconsistent identifier renamings, etc. Leveraging this categorization, we design a static control- and data-dependence analysis technique, SPA, to detect and characterize porting inconsistencies. Our evaluation on code from four open-source projects shows thai SPA can dell-oct porting inconsistencies with 65% to 73% precision and 90% recall, and identify inconsistency types with 58% to 63% precision and 92% to 100% recall. In a comparison with two existing error detection tools, SPA improves precision by 14 to 17 percentage points

  5. FORTRAN Automated Code Evaluation System (faces) system documentation, version 2, mod 0. [error detection codes/user manuals (computer programs)

    NASA Technical Reports Server (NTRS)

    1975-01-01

    A system is presented which processes FORTRAN based software systems to surface potential problems before they become execution malfunctions. The system complements the diagnostic capabilities of compilers, loaders, and execution monitors rather than duplicating these functions. Also, it emphasizes frequent sources of FORTRAN problems which require inordinate manual effort to identify. The principle value of the system is extracting small sections of unusual code from the bulk of normal sequences. Code structures likely to cause immediate or future problems are brought to the user's attention. These messages stimulate timely corrective action of solid errors and promote identification of 'tricky' code. Corrective action may require recoding or simply extending software documentation to explain the unusual technique.

  6. Directed Incremental Symbolic Execution

    NASA Technical Reports Server (NTRS)

    Person, Suzette; Yang, Guowei; Rungta, Neha; Khurshid, Sarfraz

    2011-01-01

    The last few years have seen a resurgence of interest in the use of symbolic execution -- a program analysis technique developed more than three decades ago to analyze program execution paths. Scaling symbolic execution and other path-sensitive analysis techniques to large systems remains challenging despite recent algorithmic and technological advances. An alternative to solving the problem of scalability is to reduce the scope of the analysis. One approach that is widely studied in the context of regression analysis is to analyze the differences between two related program versions. While such an approach is intuitive in theory, finding efficient and precise ways to identify program differences, and characterize their effects on how the program executes has proved challenging in practice. In this paper, we present Directed Incremental Symbolic Execution (DiSE), a novel technique for detecting and characterizing the effects of program changes. The novelty of DiSE is to combine the efficiencies of static analysis techniques to compute program difference information with the precision of symbolic execution to explore program execution paths and generate path conditions affected by the differences. DiSE is a complementary technique to other reduction or bounding techniques developed to improve symbolic execution. Furthermore, DiSE does not require analysis results to be carried forward as the software evolves -- only the source code for two related program versions is required. A case-study of our implementation of DiSE illustrates its effectiveness at detecting and characterizing the effects of program changes.

  7. Detection and Characterization of Phase-Coded Radar Signals

    DTIC Science & Technology

    2007-11-02

    Detection and Characterization of Phase-Coded Radar Signals 5c. PROGRAM ELEMENT NUMBER 5d. PROJECT NUMBER 5d. TASK NUMBER 6. AUTHOR( S ) Dr...Ernest R. Adams 5e. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) Cranfield University (RMCS) Shrivenham SN6 8LA United...Kingdom 8. PERFORMING ORGANIZATION REPORT NUMBER N/A 10. SPONSOR/MONITOR’S ACRONYM( S ) 9. SPONSORING/MONITORING AGENCY NAME( S ) AND

  8. Ethical guidance in the era of managed care: an analysis of the American College of Healthcare Executives' Code of Ethics.

    PubMed

    Higgins, W

    2000-01-01

    Market competition and the rise of managed care are transforming the healthcare system from a physician-dominated cottage industry into a manager-dominated corporate enterprise. The managed care revolution is also undermining the safe-guards offered by medical ethics and raising serious public concerns. These trends highlight the growing importance of ethical standards for managers. The most comprehensive ethical guidance for health service managers is contained in the American College of Healthcare Executives' (ACHE) Code of Ethics. An analysis of the ACHE Code suggests that it does not adequately address several ethical concerns associated with managed care. The ACHE may wish to develop a supplemental statement regarding ethical issues in managed care. A supplemental statement that provides more specific guidance in the areas of financial incentives to reduce utilization, social mission, consumer/patient information, and the health service manager's responsibility to patients could be extremely valuable in today's complex and rapidly changing environment. More specific ethical guidelines would not ensure individual or organizational compliance. However, they would provide professional standards that could guide decision making and help managers evaluate performance in managed care settings.

  9. Roles for Coincidence Detection in Coding Amplitude-Modulated Sounds

    PubMed Central

    Ashida, Go; Kretzberg, Jutta; Tollin, Daniel J.

    2016-01-01

    Many sensory neurons encode temporal information by detecting coincident arrivals of synaptic inputs. In the mammalian auditory brainstem, binaural neurons of the medial superior olive (MSO) are known to act as coincidence detectors, whereas in the lateral superior olive (LSO) roles of coincidence detection have remained unclear. LSO neurons receive excitatory and inhibitory inputs driven by ipsilateral and contralateral acoustic stimuli, respectively, and vary their output spike rates according to interaural level differences. In addition, LSO neurons are also sensitive to binaural phase differences of low-frequency tones and envelopes of amplitude-modulated (AM) sounds. Previous physiological recordings in vivo found considerable variations in monaural AM-tuning across neurons. To investigate the underlying mechanisms of the observed temporal tuning properties of LSO and their sources of variability, we used a simple coincidence counting model and examined how specific parameters of coincidence detection affect monaural and binaural AM coding. Spike rates and phase-locking of evoked excitatory and spontaneous inhibitory inputs had only minor effects on LSO output to monaural AM inputs. In contrast, the coincidence threshold of the model neuron affected both the overall spike rates and the half-peak positions of the AM-tuning curve, whereas the width of the coincidence window merely influenced the output spike rates. The duration of the refractory period affected only the low-frequency portion of the monaural AM-tuning curve. Unlike monaural AM coding, temporal factors, such as the coincidence window and the effective duration of inhibition, played a major role in determining the trough positions of simulated binaural phase-response curves. In addition, empirically-observed level-dependence of binaural phase-coding was reproduced in the framework of our minimalistic coincidence counting model. These modeling results suggest that coincidence detection of excitatory

  10. Coding for parallel execution of hardware-in-the-loop millimeter-wave scene generation models on multicore SIMD processor architectures

    NASA Astrophysics Data System (ADS)

    Olson, Richard F.

    2013-05-01

    Rendering of point scatterer based radar scenes for millimeter wave (mmW) seeker tests in real-time hardware-in-the-loop (HWIL) scene generation requires efficient algorithms and vector-friendly computer architectures for complex signal synthesis. New processor technology from Intel implements an extended 256-bit vector SIMD instruction set (AVX, AVX2) in a multi-core CPU design providing peak execution rates of hundreds of GigaFLOPS (GFLOPS) on one chip. Real world mmW scene generation code can approach peak SIMD execution rates only after careful algorithm and source code design. An effective software design will maintain high computing intensity emphasizing register-to-register SIMD arithmetic operations over data movement between CPU caches or off-chip memories. Engineers at the U.S. Army Aviation and Missile Research, Development and Engineering Center (AMRDEC) applied two basic parallel coding methods to assess new 256-bit SIMD multi-core architectures for mmW scene generation in HWIL. These include use of POSIX threads built on vector library functions and more portable, highlevel parallel code based on compiler technology (e.g. OpenMP pragmas and SIMD autovectorization). Since CPU technology is rapidly advancing toward high processor core counts and TeraFLOPS peak SIMD execution rates, it is imperative that coding methods be identified which produce efficient and maintainable parallel code. This paper describes the algorithms used in point scatterer target model rendering, the parallelization of those algorithms, and the execution performance achieved on an AVX multi-core machine using the two basic parallel coding methods. The paper concludes with estimates for scale-up performance on upcoming multi-core technology.

  11. Local graph regularized coding for salient object detection

    NASA Astrophysics Data System (ADS)

    Huo, Lina; Yang, Shuyuan; Jiao, Licheng; Wang, Shuang; Shi, Jiao

    2016-07-01

    Subspace segmentation based salient object detection has received increasing interests in recent years. To preserve the locality and similarity of regions, a grouping effect of representation is introduced to segment the salient object and background in subspace. Then a new saliency map is calculated by incorporating this local graph regularizer into coding, which explicitly explores the data self-representation model and thus locate more accurate salient regions. Moreover, a heuristic object-based dictionary from background superpixels is obtained in border set removing the image regions within the potential object regions. Experimental results on four large benchmark databases demonstrate that the proposed method performs favorably against eight recent state-of-the-art methods in terms of three evaluation criterions, with a reduction of MAE by 19.8% than GR and 29.3% than CB in the two SED datasets, respectively. Meanwhile, our method also runs faster than the comparative detection approaches.

  12. Coded-aperture Raman imaging for standoff explosive detection

    NASA Astrophysics Data System (ADS)

    McCain, Scott T.; Guenther, B. D.; Brady, David J.; Krishnamurthy, Kalyani; Willett, Rebecca

    2012-06-01

    This paper describes the design of a deep-UV Raman imaging spectrometer operating with an excitation wavelength of 228 nm. The designed system will provide the ability to detect explosives (both traditional military explosives and home-made explosives) from standoff distances of 1-10 meters with an interrogation area of 1 mm x 1 mm to 200 mm x 200 mm. This excitation wavelength provides resonant enhancement of many common explosives, no background fluorescence, and an enhanced cross-section due to the inverse wavelength scaling of Raman scattering. A coded-aperture spectrograph combined with compressive imaging algorithms will allow for wide-area interrogation with fast acquisition rates. Coded-aperture spectral imaging exploits the compressibility of hyperspectral data-cubes to greatly reduce the amount of acquired data needed to interrogate an area. The resultant systems are able to cover wider areas much faster than traditional push-broom and tunable filter systems. The full system design will be presented along with initial data from the instrument. Estimates for area scanning rates and chemical sensitivity will be presented. The system components include a solid-state deep-UV laser operating at 228 nm, a spectrograph consisting of well-corrected refractive imaging optics and a reflective grating, an intensified solar-blind CCD camera, and a high-efficiency collection optic.

  13. Error detecting capabilities of the shortened Hamming codes adopted for error detection in IEEE Standard 802.3

    NASA Technical Reports Server (NTRS)

    Fujiwara, Toru; Kasami, Tadao; Lin, Shu

    1989-01-01

    The error-detecting capabilities of the shortened Hamming codes adopted for error detection in IEEE Standard 802.3 are investigated. These codes are also used for error detection in the data link layer of the Ethernet, a local area network. The weight distributions for various code lengths are calculated to obtain the probability of undetectable error and that of detectable error for a binary symmetric channel with bit-error rate between 0.00001 and 1/2.

  14. Methodology for fast detection of false sharing in threaded scientific codes

    DOEpatents

    Chung, I-Hsin; Cong, Guojing; Murata, Hiroki; Negishi, Yasushi; Wen, Hui-Fang

    2014-11-25

    A profiling tool identifies a code region with a false sharing potential. A static analysis tool classifies variables and arrays in the identified code region. A mapping detection library correlates memory access instructions in the identified code region with variables and arrays in the identified code region while a processor is running the identified code region. The mapping detection library identifies one or more instructions at risk, in the identified code region, which are subject to an analysis by a false sharing detection library. A false sharing detection library performs a run-time analysis of the one or more instructions at risk while the processor is re-running the identified code region. The false sharing detection library determines, based on the performed run-time analysis, whether two different portions of the cache memory line are accessed by the generated binary code.

  15. Error Detecting and Error Correcting Codes: The New Mathematics of Shopping.

    ERIC Educational Resources Information Center

    Stacey, Kaye

    1998-01-01

    Outlines the embedded mathematics in which important but hidden calculations are being done for communications in commerce. Explains two key concepts, error detecting codes and error correcting codes. Illustrates these ideas using two familiar examples, barcodes and ISBN numbers. (ASK)

  16. Executive Functioning and Processing Speed in Age-Related Differences in Memory: Contribution of a Coding Task

    ERIC Educational Resources Information Center

    Baudouin, Alexia; Clarys, David; Vanneste, Sandrine; Isingrini, Michel

    2009-01-01

    The aim of the present study was to examine executive dysfunctioning and decreased processing speed as potential mediators of age-related differences in episodic memory. We compared the performances of young and elderly adults in a free-recall task. Participants were also given tests to measure executive functions and perceptual processing speed…

  17. Evaluation and Testing of the ADVANTG Code on SNM Detection

    SciTech Connect

    Shaver, Mark W.; Casella, Andrew M.; Wittman, Richard S.; Hayes, John W.

    2013-09-24

    Pacific Northwest National Laboratory (PNNL) has been tasked with evaluating the effectiveness of ORNL’s new hybrid transport code, ADVANTG, on scenarios of interest to our NA-22 sponsor, specifically of detection of diversion of special nuclear material (SNM). PNNL staff have determined that acquisition and installation of ADVANTG was relatively straightforward for a code in its phase of development, but probably not yet sufficient for mass distribution to the general user. PNNL staff also determined that with little effort, ADVANTG generated weight windows that typically worked for the problems and generated results consistent with MCNP. With slightly greater effort of choosing a finer mesh around detectors or sample reaction tally regions, the figure of merit (FOM) could be further improved in most cases. This does take some limited knowledge of deterministic transport methods. The FOM could also be increased by limiting the energy range for a tally to the energy region of greatest interest. It was then found that an MCNP run with the full energy range for the tally showed improved statistics in the region used for the ADVANTG run. The specific case of interest chosen by the sponsor is the CIPN project from Las Alamos National Laboratory (LANL), which is an active interrogation, non-destructive assay (NDA) technique to quantify the fissile content in a spent fuel assembly and is also sensitive to cases of material diversion. Unfortunately, weight windows for the CIPN problem cannot currently be properly generated with ADVANTG due to inadequate accommodations for source definition. ADVANTG requires that a fixed neutron source be defined within the problem and cannot account for neutron multiplication. As such, it is rendered useless in active interrogation scenarios. It is also interesting to note that this is a difficult problem to solve and that the automated weight windows generator in MCNP actually slowed down the problem. Therefore, PNNL had determined

  18. A dual-sided coded-aperture radiation detection system

    NASA Astrophysics Data System (ADS)

    Penny, R. D.; Hood, W. E.; Polichar, R. M.; Cardone, F. H.; Chavez, L. G.; Grubbs, S. G.; Huntley, B. P.; Kuharski, R. A.; Shyffer, R. T.; Fabris, L.; Ziock, K. P.; Labov, S. E.; Nelson, K.

    2011-10-01

    We report the development of a large-area, mobile, coded-aperture radiation imaging system for localizing compact radioactive sources in three dimensions while rejecting distributed background. The 3D Stand-Off Radiation Detection System (SORDS-3D) has been tested at speeds up to 95 km/h and has detected and located sources in the millicurie range at distances of over 100 m. Radiation data are imaged to a geospatially mapped world grid with a nominal 1.25- to 2.5-m pixel pitch at distances out to 120 m on either side of the platform. Source elevation is also extracted. Imaged radiation alarms are superimposed on a side-facing video log that can be played back for direct localization of sources in buildings in urban environments. The system utilizes a 37-element array of 5×5×50 cm 3 cesium-iodide (sodium) detectors. Scintillation light is collected by a pair of photomultiplier tubes placed at either end of each detector, with the detectors achieving an energy resolution of 6.15% FWHM (662 keV) and a position resolution along their length of 5 cm FWHM. The imaging system generates a dual-sided two-dimensional image allowing users to efficiently survey a large area. Imaged radiation data and raw spectra are forwarded to the RadioNuclide Analysis Kit (RNAK), developed by our collaborators, for isotope ID. An intuitive real-time display aids users in performing searches. Detector calibration is dynamically maintained by monitoring the potassium-40 peak and digitally adjusting individual detector gains. We have recently realized improvements, both in isotope identification and in distinguishing compact sources from background, through the installation of optimal-filter reconstruction kernels.

  19. Codon Distribution in Error-Detecting Circular Codes.

    PubMed

    Fimmel, Elena; Strüngmann, Lutz

    2016-03-15

    In 1957, Francis Crick et al. suggested an ingenious explanation for the process of frame maintenance. The idea was based on the notion of comma-free codes. Although Crick's hypothesis proved to be wrong, in 1996, Arquès and Michel discovered the existence of a weaker version of such codes in eukaryote and prokaryote genomes, namely the so-called circular codes. Since then, circular code theory has invariably evoked great interest and made significant progress. In this article, the codon distributions in maximal comma-free, maximal self-complementary C³ and maximal self-complementary circular codes are discussed, i.e., we investigate in how many of such codes a given codon participates. As the main (and surprising) result, it is shown that the codons can be separated into very few classes (three, or five, or six) with respect to their frequency. Moreover, the distribution classes can be hierarchically ordered as refinements from maximal comma-free codes via maximal self-complementary C(3) codes to maximal self-complementary circular codes.

  20. Codon Distribution in Error-Detecting Circular Codes

    PubMed Central

    Fimmel, Elena; Strüngmann, Lutz

    2016-01-01

    In 1957, Francis Crick et al. suggested an ingenious explanation for the process of frame maintenance. The idea was based on the notion of comma-free codes. Although Crick’s hypothesis proved to be wrong, in 1996, Arquès and Michel discovered the existence of a weaker version of such codes in eukaryote and prokaryote genomes, namely the so-called circular codes. Since then, circular code theory has invariably evoked great interest and made significant progress. In this article, the codon distributions in maximal comma-free, maximal self-complementary C3 and maximal self-complementary circular codes are discussed, i.e., we investigate in how many of such codes a given codon participates. As the main (and surprising) result, it is shown that the codons can be separated into very few classes (three, or five, or six) with respect to their frequency. Moreover, the distribution classes can be hierarchically ordered as refinements from maximal comma-free codes via maximal self-complementary C3 codes to maximal self-complementary circular codes. PMID:26999215

  1. Polar Codes

    DTIC Science & Technology

    2014-12-01

    density parity check (LDPC) code, a Reed–Solomon code, and three convolutional codes. iii CONTENTS EXECUTIVE SUMMARY...the most common. Many civilian systems use low density parity check (LDPC) FEC codes, and the Navy is planning to use LDPC for some future systems...other forward error correction methods: a turbo code, a low density parity check (LDPC) code, a Reed–Solomon code, and three convolutional codes

  2. Principles of error detection and error correction codes

    NASA Technical Reports Server (NTRS)

    Perlman, M.

    1971-01-01

    Report is reviewed which considers theoretical basis of groups, rings, fields, and vector spaces, and their relationship to algebraic coding theory. Report serves as summary for engineers and scientists involved in data handling and processing systems.

  3. Methods and computer executable instructions for marking a downhole elongate line and detecting same

    DOEpatents

    Watkins, Arthur D.

    2003-05-13

    Methods and computer executable instructions are provided for making an elongate line (22) with a plurality of marks (30) and detecting those marks (30) to determine a distance of the elongate line (22) in a downhole or a physical integrity thereof. In a preferred embodiment, each mark comprises a plurality of particles (44) having a substantially permanent magnetizing capability adhered to an exterior surface of the elongate line (22) at preselected intervals with an epoxy paint. The particles (44) are arranged at each interval as a plurality of bands (40). Thereafter, the particles are oriented into a magnetic signature for that interval by magnetizing the particles to create a magnetic field substantially normal to the exterior surface. This facilitates detection by a Hall effect probe. The magnetic signatures are stored in a computing configuration and, once a mark is detected, a correlation is made to a unique position on the elongate line by comparison with the stored magnetic signatures. Preferred particles include samarium-cobalt and neodymium-iron-boride.

  4. Bar Coding Platforms for Nucleic Acid and Protein Detection

    NASA Astrophysics Data System (ADS)

    Müller, Uwe R.

    A variety of novel bar coding systems has been developed as multiplex testing platforms for applications in biological, chemical, and biomedical diagnostics. Instead of identifying a target through capture at a specific locus on an array, target analytes are captured by a bar coded tag, which then uniquely identifies the target, akin to putting a UPC bar code on a product. This requires an appropriate surface functionalization to ensure that the correct target is captured with high efficiency. Moreover the tag, or bar code, has to be readable with minimal error and at high speed, typically by flow analysis. For quantitative assays the target may be labeled separately, or the tag may also serve as the label. A great variety of materials and physicochemical principles has been exploited to generate this plethora of novel bar coding platforms. Their advantages compared to microarray-based assay platforms include in-solution binding kinetics, flexibility in assay design, compatibility with microplate-based assay automation, high sample throughput, and with some assay formats, increased sensitivity.

  5. Guidelines for selecting codes for ground-water transport modeling of low-level waste burial sites. Executive summary

    SciTech Connect

    Simmons, C.S.; Cole, C.R.

    1985-05-01

    This document was written to provide guidance to managers and site operators on how ground-water transport codes should be selected for assessing burial site performance. There is a need for a formal approach to selecting appropriate codes from the multitude of potentially useful ground-water transport codes that are currently available. Code selection is a problem that requires more than merely considering mathematical equation-solving methods. These guidelines are very general and flexible and are also meant for developing systems simulation models to be used to assess the environmental safety of low-level waste burial facilities. Code selection is only a single aspect of the overall objective of developing a systems simulation model for a burial site. The guidance given here is mainly directed toward applications-oriented users, but managers and site operators need to be familiar with this information to direct the development of scientifically credible and defensible transport assessment models. Some specific advice for managers and site operators on how to direct a modeling exercise is based on the following five steps: identify specific questions and study objectives; establish costs and schedules for achieving answers; enlist the aid of professional model applications group; decide on approach with applications group and guide code selection; and facilitate the availability of site-specific data. These five steps for managers/site operators are discussed in detail following an explanation of the nine systems model development steps, which are presented first to clarify what code selection entails.

  6. An Approach for Detecting Inconsistencies between Behavioral Models of the Software Architecture and the Code

    SciTech Connect

    Ciraci, Selim; Sozer, Hasan; Tekinerdogan, Bedir

    2012-07-16

    In practice, inconsistencies between architectural documentation and the code might arise due to improper implementation of the architecture or the separate, uncontrolled evolution of the code. Several approaches have been proposed to detect the inconsistencies between the architecture and the code but these tend to be limited for capturing inconsistencies that might occur at runtime. We present a runtime verification approach for detecting inconsistencies between the dynamic behavior of the architecture and the actual code. The approach is supported by a set of tools that implement the architecture and the code patterns in Prolog, and support the automatic generation of runtime monitors for detecting inconsistencies. We illustrate the approach and the toolset for a Crisis Management System case study.

  7. Alamouti-Type Space-Time Coding for Free-Space Optical Communication with Direct Detection

    NASA Astrophysics Data System (ADS)

    Simon, M. K.; Vilnrotter, V.

    2003-11-01

    In optical communication systems employing direct detection at the receiver, intensity modulations such as on-off keying (OOK) or pulse-position modulation (PPM) are commonly used to convey the information. Consider the possibility of applying space-time coding in such a scenario, using, for example, an Alamouti-type coding scheme [1]. Implicit in the Alamouti code is the fact that the modulation that defines the signal set is such that it is meaningful to transmit and detect both the signal and its negative. While modulations such as phase-shift keying (PSK) and quadrature amplitude modulation (QAM) naturally fall into this class, OOK and PPM do not since the signal polarity (phase) would not be detected at the receiver. We investigate a modification of the Alamouti code to be used with such modulations that has the same desirable properties as the conventional Alamouti code but does not rely on the necessity of transmitting the negative of a signal.

  8. Process Model Improvement for Source Code Plagiarism Detection in Student Programming Assignments

    ERIC Educational Resources Information Center

    Kermek, Dragutin; Novak, Matija

    2016-01-01

    In programming courses there are various ways in which students attempt to cheat. The most commonly used method is copying source code from other students and making minimal changes in it, like renaming variable names. Several tools like Sherlock, JPlag and Moss have been devised to detect source code plagiarism. However, for larger student…

  9. Detecting Aspects of Critical Thinking by Cleaning Online Message Transcript through Code-Recode

    ERIC Educational Resources Information Center

    Oriogun, Peter K.

    2009-01-01

    In this article, the community of inquiry cognitive presence model was mapped to a recently developed semistructured approach to online discourse called SQUAD to detect aspects of critical or higher-order thinking online by cleaning online message transcript through the use of code-recode. It is argued that using code-recode in the way suggested…

  10. Flow-Based Detection of Bar Coded Particles

    SciTech Connect

    Rose, K A; Dougherty, G M; Santiago, J G

    2005-06-24

    We have developed methods for flow control, electric field alignment, and readout of colloidal Nanobarcodes{copyright}. Our flow-based detection scheme leverages microfluidics and alternate current (AC) electric fields to align and image particles in a well-defined image plane. Using analytical models of the particle rotation in electric fields we can optimize the field strength and frequency necessary to align the particles. This detection platform alleviates loss of information in solution-based assays due to particle clumping during detection.

  11. Multiplexed fluorescence readout using time responses of color coded signals for biomolecular detection.

    PubMed

    Nishimura, Takahiro; Ogura, Yusuke; Tanida, Jun

    2016-12-01

    Fluorescence readout is an important technique for detecting biomolecules. In this paper, we present a multiplexed fluorescence readout method using time varied fluorescence signals. To generate the fluorescence signals, coded strands and a set of universal molecular beacons are introduced. Each coded strand represents the existence of an assigned target molecule. The coded strands have coded sequences to generate temporary fluorescence signals through binding to the molecular beacons. The signal generating processes are modeled based on the reaction kinetics between the coded strands and molecular beacons. The model is used to decode the detected fluorescence signals using maximum likelihood estimation. Multiplexed fluorescence readout was experimentally demonstrated with three molecular beacons. Numerical analysis showed that the readout accuracy was enhanced by the use of time-varied fluorescence signals.

  12. Multiplexed fluorescence readout using time responses of color coded signals for biomolecular detection

    PubMed Central

    Nishimura, Takahiro; Ogura, Yusuke; Tanida, Jun

    2016-01-01

    Fluorescence readout is an important technique for detecting biomolecules. In this paper, we present a multiplexed fluorescence readout method using time varied fluorescence signals. To generate the fluorescence signals, coded strands and a set of universal molecular beacons are introduced. Each coded strand represents the existence of an assigned target molecule. The coded strands have coded sequences to generate temporary fluorescence signals through binding to the molecular beacons. The signal generating processes are modeled based on the reaction kinetics between the coded strands and molecular beacons. The model is used to decode the detected fluorescence signals using maximum likelihood estimation. Multiplexed fluorescence readout was experimentally demonstrated with three molecular beacons. Numerical analysis showed that the readout accuracy was enhanced by the use of time-varied fluorescence signals. PMID:28018742

  13. Different hue coding underlying figure segregation and region detection tasks.

    PubMed

    Nagai, Takehiro; Uchikawa, Keiji

    2009-08-28

    Figure segregation from its background is one of the important functions of color vision for our visual system because it is a preliminary to shape recognition. However, little is known about the chromatic mechanisms underlying figure segregation as opposed to those underlying mere color discrimination and detection. We investigated whether there are differences in color difference thresholds between a shape discrimination task (involving figure segregation) and a simple region detection task. In the shape discrimination task the observer discriminated the shapes of two figures, which could be segregated from their background on the basis of a color direction (hue) difference. In the region detection task the observer simply detected a square region against its background. Thresholds of color direction differences from a range of background color directions were measured for each task. In addition, we added saturation variation in one condition to investigate the involvement of the cone-opponent channels in those tasks. First, the results showed that the saturation variation increased the thresholds evenly for all background color directions. This suggests that higher-order color mechanisms rather than the early cone-opponent mechanisms are involved in both of the two tasks. Second, the shapes of the background color direction-threshold functions were different between the two tasks and these shape differences were consistent across all observers. This finding suggests that hue information may be encoded differently for shape discrimination and region detection. Furthermore, differences in spatial frequency components and in the requirement for orientation extraction rarely affected the shapes of the threshold functions in additional experiments, suggesting the possibility that hue encoding for shape discrimination differs from encoding for region detection at a late stage of form processing where local orientation signals are globally integrated.

  14. Accuracy comparison among different machine learning techniques for detecting malicious codes

    NASA Astrophysics Data System (ADS)

    Narang, Komal

    2016-03-01

    In this paper, a machine learning based model for malware detection is proposed. It can detect newly released malware i.e. zero day attack by analyzing operation codes on Android operating system. The accuracy of Naïve Bayes, Support Vector Machine (SVM) and Neural Network for detecting malicious code has been compared for the proposed model. In the experiment 400 benign files, 100 system files and 500 malicious files have been used to construct the model. The model yields the best accuracy 88.9% when neural network is used as classifier and achieved 95% and 82.8% accuracy for sensitivity and specificity respectively.

  15. Neural coding and perceptual detection in the primate somatosensory thalamus

    PubMed Central

    Vázquez, Yuriria; Zainos, Antonio; Alvarez, Manuel; Salinas, Emilio; Romo, Ranulfo

    2012-01-01

    The contribution of the sensory thalamus to perception and decision making is not well understood. We addressed this problem by recording single neurons in the ventral posterior lateral (VPL) nucleus of the somatosensory thalamus while trained monkeys judged the presence or absence of a vibrotactile stimulus of variable amplitude applied to the skin of a fingertip. We found that neurons in the VPL nucleus modulated their firing rate as a function of stimulus amplitude, and that such modulations accounted for the monkeys’ overall psychophysical performance. These neural responses did not predict the animals' decision reports in individual trials, however. Moreover, the sensitivity to changes in stimulus amplitude was similar when the monkeys’ performed the detection task and when they were not required to report stimulus detection. These results suggest that the primate somatosensory thalamus likely provides a reliable neural representation of the sensory input to the cerebral cortex, where sensory information is transformed and combined with other cognitive components associated with behavioral performance. PMID:22927423

  16. Multiplexed Detection of Cytokines Based on Dual Bar-Code Strategy and Single-Molecule Counting.

    PubMed

    Li, Wei; Jiang, Wei; Dai, Shuang; Wang, Lei

    2016-02-02

    Cytokines play important roles in the immune system and have been regarded as biomarkers. While single cytokine is not specific and accurate enough to meet the strict diagnosis in practice, in this work, we constructed a multiplexed detection method for cytokines based on dual bar-code strategy and single-molecule counting. Taking interferon-γ (IFN-γ) and tumor necrosis factor-α (TNF-α) as model analytes, first, the magnetic nanobead was functionalized with the second antibody and primary bar-code strands, forming a magnetic nanoprobe. Then, through the specific reaction of the second antibody and the antigen that fixed by the primary antibody, sandwich-type immunocomplex was formed on the substrate. Next, the primary bar-code strands as amplification units triggered multibranched hybridization chain reaction (mHCR), producing nicked double-stranded polymers with multiple branched arms, which were served as secondary bar-code strands. Finally, the secondary bar-code strands hybridized with the multimolecule labeled fluorescence probes, generating enhanced fluorescence signals. The numbers of fluorescence dots were counted one by one for quantification with epi-fluorescence microscope. By integrating the primary and secondary bar-code-based amplification strategy and the multimolecule labeled fluorescence probes, this method displayed an excellent sensitivity with the detection limits were both 5 fM. Unlike the typical bar-code assay that the bar-code strands should be released and identified on a microarray, this method is more direct. Moreover, because of the selective immune reaction and the dual bar-code mechanism, the resulting method could detect the two targets simultaneously. Multiple analysis in human serum was also performed, suggesting that our strategy was reliable and had a great potential application in early clinical diagnosis.

  17. Code System to Detect Recurring Loss of Special Nuclear Materials.

    SciTech Connect

    PICARD, R. R.

    2001-08-23

    Version 00 NRCPAGE is used in safeguards applications to detect a recurring loss of special nuclear material by frequent evaluation (sequential analysis) of accountability data. Standard sequential testing procedures are traditionally based on sequences of independent and normally distributed measurements. This same approach can be applied to materials balance (MB) data. Here, the term materials balance has a meaning similar to inventory difference and represents a materials loss indicator localized in time and space. However, distinct Mbs cannot be reasonably treated as statistically independent and may not always be reasonably treated as normally distributed. Furthermore, the covariance structure associated with a given MB sequence is not known and must be estimated. Nonindependence is treated by converting the MB sequence to the innovation sequence, sometimes called the ITMUF sequence or the sequence of MUF residuals, which are statistically independent and amenable to sequential test procedures. A one-sided page's test, effective for a wide range of recurring loss scenarios, is applied to the standardized innovation sequence. The program can be easily modified to suit particular needs; the models for the assumption of multivariate normality for MBs when computing the innovation sequence or the test procedure can be changed as can the input/output format, dimensioning, local error checking, and simulation work. Input files can be sequentially constructed using local text editors to update existing files. Output files can be read by graphics, report writer, or other stand-alone utility routines.

  18. An application of soft-decision to error-detecting codes

    NASA Astrophysics Data System (ADS)

    Kobayashi, H.; Yanagidaira, H.; Kawai, K.

    This paper presents a decoding algorithm based upon soft decision, which gives the capability of error correction in the conventional-error-detecting system. The algorithm may be applied to the multi-PSK, multi-QAM, and any other digital modulation, including even the case where the differential coding is employed. In this paper, an investigation is performed for the application of the proposed algorithm to the 4-DPSK system which introduces a scheme of single parity check code, and the Automatic Repeat-Request (ARQ) system using a cyclic-redundancy check code (CRC). In addition, the experimental results from the trial equipment of the 4-DPSK system is briefly described.

  19. Detection and Location of Gamma-Ray Sources with a Modulating Coded Mask

    SciTech Connect

    Anderson, Dale N.; Stromswold, David C.; Wunschel, Sharon C.; Peurrung, Anthony J.; Hansen, Randy R.

    2006-01-31

    This paper presents methods of detecting and locating a concelaed nuclear gamma-ray source with a coded aperture mask. Energetic gamma rays readily penetrate moderate amounts of shielding material and can be detected at distances of many meters. The detection of high energy gamma-ray sources is vitally important to national security for several reasons, including nuclear materials smuggling interdiction, monitoring weapon components under treaties, and locating nuclear weapons and materials in the possession terrorist organizations.

  20. Improved shear wave motion detection using coded excitation for transient elastography.

    PubMed

    He, Xiao-Nian; Diao, Xian-Fen; Lin, Hao-Ming; Zhang, Xin-Yu; Shen, Yuan-Yuan; Chen, Si-Ping; Qin, Zheng-Di; Chen, Xin

    2017-03-15

    Transient elastography (TE) is well adapted for use in studying liver elasticity. However, because the shear wave motion signal is extracted from the ultrasound signal, the weak ultrasound signal can significantly deteriorate the shear wave motion tracking process and make it challenging to detect the shear wave motion in a severe noise environment, such as within deep tissues and within obese patients. This paper, therefore, investigated the feasibility of implementing coded excitation in TE for shear wave detection, with the hypothesis that coded ultrasound signals can provide robustness to weak ultrasound signals compared with traditional short pulse. The Barker 7, Barker 13, and short pulse were used for detecting the shear wave in the TE application. Two phantom experiments and one in vitro liver experiment were done to explore the performances of the coded excitation in TE measurement. The results show that both coded pulses outperform the short pulse by providing superior shear wave signal-to-noise ratios (SNR), robust shear wave speed measurement, and higher penetration intensity. In conclusion, this study proved the feasibility of applying coded excitation in shear wave detection for TE application. The proposed method has the potential to facilitate robust shear elasticity measurements of tissue.

  1. Improved shear wave motion detection using coded excitation for transient elastography

    PubMed Central

    He, Xiao-Nian; Diao, Xian-Fen; Lin, Hao-Ming; Zhang, Xin-Yu; Shen, Yuan-Yuan; Chen, Si-Ping; Qin, Zheng-Di; Chen, Xin

    2017-01-01

    Transient elastography (TE) is well adapted for use in studying liver elasticity. However, because the shear wave motion signal is extracted from the ultrasound signal, the weak ultrasound signal can significantly deteriorate the shear wave motion tracking process and make it challenging to detect the shear wave motion in a severe noise environment, such as within deep tissues and within obese patients. This paper, therefore, investigated the feasibility of implementing coded excitation in TE for shear wave detection, with the hypothesis that coded ultrasound signals can provide robustness to weak ultrasound signals compared with traditional short pulse. The Barker 7, Barker 13, and short pulse were used for detecting the shear wave in the TE application. Two phantom experiments and one in vitro liver experiment were done to explore the performances of the coded excitation in TE measurement. The results show that both coded pulses outperform the short pulse by providing superior shear wave signal-to-noise ratios (SNR), robust shear wave speed measurement, and higher penetration intensity. In conclusion, this study proved the feasibility of applying coded excitation in shear wave detection for TE application. The proposed method has the potential to facilitate robust shear elasticity measurements of tissue. PMID:28295027

  2. Low-Complexity Saliency Detection Algorithm for Fast Perceptual Video Coding

    PubMed Central

    Liu, Pengyu; Jia, Kebin

    2013-01-01

    A low-complexity saliency detection algorithm for perceptual video coding is proposed; low-level encoding information is adopted as the characteristics of visual perception analysis. Firstly, this algorithm employs motion vector (MV) to extract temporal saliency region through fast MV noise filtering and translational MV checking procedure. Secondly, spatial saliency region is detected based on optimal prediction mode distributions in I-frame and P-frame. Then, it combines the spatiotemporal saliency detection results to define the video region of interest (VROI). The simulation results validate that the proposed algorithm can avoid a large amount of computation work in the visual perception characteristics analysis processing compared with other existing algorithms; it also has better performance in saliency detection for videos and can realize fast saliency detection. It can be used as a part of the video standard codec at medium-to-low bit-rates or combined with other algorithms in fast video coding. PMID:24489495

  3. Dedicated memory structure holding data for detecting available worker thread(s) and informing available worker thread(s) of task(s) to execute

    SciTech Connect

    Chiu, George L.; Eichenberger, Alexandre E.; O'Brien, John K. P.

    2016-12-13

    The present disclosure relates generally to a dedicated memory structure (that is, hardware device) holding data for detecting available worker thread(s) and informing available worker thread(s) of task(s) to execute.

  4. Microfluidic CODES: a scalable multiplexed electronic sensor for orthogonal detection of particles in microfluidic channels.

    PubMed

    Liu, Ruxiu; Wang, Ningquan; Kamili, Farhan; Sarioglu, A Fatih

    2016-04-21

    Numerous biophysical and biochemical assays rely on spatial manipulation of particles/cells as they are processed on lab-on-a-chip devices. Analysis of spatially distributed particles on these devices typically requires microscopy negating the cost and size advantages of microfluidic assays. In this paper, we introduce a scalable electronic sensor technology, called microfluidic CODES, that utilizes resistive pulse sensing to orthogonally detect particles in multiple microfluidic channels from a single electrical output. Combining the techniques from telecommunications and microfluidics, we route three coplanar electrodes on a glass substrate to create multiple Coulter counters producing distinct orthogonal digital codes when they detect particles. We specifically design a digital code set using the mathematical principles of Code Division Multiple Access (CDMA) telecommunication networks and can decode signals from different microfluidic channels with >90% accuracy through computation even if these signals overlap. As a proof of principle, we use this technology to detect human ovarian cancer cells in four different microfluidic channels fabricated using soft lithography. Microfluidic CODES offers a simple, all-electronic interface that is well suited to create integrated, low-cost lab-on-a-chip devices for cell- or particle-based assays in resource-limited settings.

  5. Fixed-point Design of the Lattice-reduction-aided Iterative Detection and Decoding Receiver for Coded MIMO Systems

    DTIC Science & Technology

    2011-01-01

    REPORT Fixed-point Design of theLattice-reduction-aided Iterative Detection andDecoding Receiver for Coded MIMO Systems 14. ABSTRACT 16. SECURITY...298 (Rev 8/98) Prescribed by ANSI Std. Z39.18 - Fixed-point Design of theLattice-reduction-aided Iterative Detection andDecoding Receiver for Coded ...important, this report illustrates the performance of coded LR aided detectors. 1 Fixed-point Design of the Lattice-reduction-aided Iterative Detection and

  6. Threshold-Based OSIC Detection Algorithm for Per-Antenna-Coded TIMO-OFDM Systems

    NASA Astrophysics Data System (ADS)

    Wang, Xinzheng; Chen, Ming; Zhu, Pengcheng

    Threshold-based ordered successive interference cancellation (OSIC) detection algorithm is proposed for per-antenna-coded (PAC) two-input multiple-output (TIMO) orthogonal frequency division multiplexing (OFDM) systems. Successive interference cancellation (SIC) is performed selectively according to channel conditions. Compared with the conventional OSIC algorithm, the proposed algorithm reduces the complexity significantly with only a slight performance degradation.

  7. Geosoft eXecutables (GX's) Developed by the U.S. Geological Survey, Version 2.0, with Notes on GX Development from Fortran Code

    USGS Publications Warehouse

    Phillips, Jeffrey D.

    2007-01-01

    Introduction Geosoft executables (GX's) are custom software modules for use with the Geosoft Oasis montaj geophysical data processing system, which currently runs under the Microsoft Windows 2000 or XP operating systems. The U.S. Geological Survey (USGS) uses Oasis montaj primarily for the processing and display of airborne geophysical data. The ability to add custom software modules to the Oasis montaj system is a feature employed by the USGS in order to take advantage of the large number of geophysical algorithms developed by the USGS during the past half century. This main part of this report, along with Appendix 1, describes Version 2.0 GX's developed by the USGS or specifically for the USGS by contractors. These GX's perform both basic and advanced operations. Version 1.0 GX's developed by the USGS were described by Phillips and others (2003), and are included in Version 2.0. Appendix 1 contains the help files for the individual GX's. Appendix 2 describes the new method that was used to create the compiled GX files, starting from legacy Fortran source code. Although the new method shares many steps with the approach presented in the Geosoft GX Developer manual, it differs from that approach in that it uses free, open-source Fortran and C compilers and avoids all Fortran-to-C conversion.

  8. Optimal Multicarrier Phase-Coded Waveform Design for Detection of Extended Targets

    SciTech Connect

    Sen, Satyabrata; Glover, Charles Wayne

    2013-01-01

    We design a parametric multicarrier phase-coded (MCPC) waveform that achieves the optimal performance in detecting an extended target in the presence of signal-dependent interference. Traditional waveform design techniques provide only the optimal energy spectral density of the transmit waveform and suffer a performance loss in the synthesis process of the time-domain signal. Therefore, we opt for directly designing an MCPC waveform in terms of its time-frequency codes to obtain the optimal detection performance. First, we describe the modeling assumptions considering an extended target buried within the signal-dependent clutter with known power spectral density, and deduce the performance characteristics of the optimal detector. Then, considering an MCPC signal transmission, we express the detection characteristics in terms of the phase-codes of the MCPC waveform and propose to optimally design the MCPC signal by maximizing the detection probability. Our numerical results demonstrate that the designed MCPC signal attains the optimal detection performance and requires a lesser computational time than the other parametric waveform design approach.

  9. A general-purpose contact detection algorithm for nonlinear structural analysis codes

    SciTech Connect

    Heinstein, M.W.; Attaway, S.W.; Swegle, J.W.; Mello, F.J.

    1993-05-01

    A new contact detection algorithm has been developed to address difficulties associated with the numerical simulation of contact in nonlinear finite element structural analysis codes. Problems including accurate and efficient detection of contact for self-contacting surfaces, tearing and eroding surfaces, and multi-body impact are addressed. The proposed algorithm is portable between dynamic and quasi-static codes and can efficiently model contact between a variety of finite element types including shells, bricks, beams and particles. The algorithm is composed of (1) a location strategy that uses a global search to decide which slave nodes are in proximity to a master surface and (2) an accurate detailed contact check that uses the projected motions of both master surface and slave node. In this report, currently used contact detection algorithms and their associated difficulties are discussed. Then the proposed algorithm and how it addresses these problems is described. Finally, the capability of the new algorithm is illustrated with several example problems.

  10. Sensitivity of the Wisconsin Card Sorting Test (64-Card Version) versus the Tower of London (Drexel Version) for detecting executive dysfunction in children with epilepsy.

    PubMed

    MacAllister, William S; Maiman, Moshe; Marsh, Megan; Whitman, Lindsay; Vasserman, Marsha; Cohen, Robyn J; Salinas, Christine M

    2017-01-03

    Executive function deficits are common in children and adolescents with epilepsy. Though the Wisconsin Card Sorting Task (WCST) is often considered the "gold standard" for executive function assessment, its sensitivity-particularly in the case of the 64-card version (WCST-64)-is insufficiently established in pediatric samples, including children and adolescents with epilepsy. The present investigation assesses the sensitivity of the WCST-64 in children and adolescents with epilepsy in comparison to another measure: the Tower of London - Drexel Version (TOL-DX). A total of 88 consecutively referred children and adolescents with epilepsy were administered both the WCST-64 and TOL-DX as part of a comprehensive neuropsychological evaluation. The sensitivity of WCST-64 and TOL-DX variables were established and relations with epilepsy severity measures and other executive function measures were assessed. Of the WCST-64 variables, Perseverative Responses is the most sensitive, but detected executive function impairment in only 19% of this clinically referred sample; in contrast, the TOL-DX Rule Violations detected executive function impairment in half of the sample. Further, TOL-DX performances are more strongly related to epilepsy severity variables and other executive function measures in comparison to the WCST-64. Despite its popularity amongst clinicians, the WCST-64 is not as sensitive to executive dysfunction in comparison to other measures of comparable administration time, such as the TOL-DX.

  11. Design and control of a ferromagnetic coded micro-carrier biochip sensor for multiplex detection of antibodies.

    PubMed

    Chang, Rong-Seng; Tsai, Jang-Zern; Li, Tung-Yen

    2011-01-01

    This paper describes a method for producing a novel type of ferromagnetic coded micro-carrier. The ferromagnetic coded micro-carriers are about 200 μm in length, 200 μm in width and 50 μm in thickness, and contain eight code elements with two distinguishable codes (hollow and solid), allowing for 2(8) unique codes. The code shapes include rectangle, circle, etc. Differently shaped coded micro-carriers could carry different antigens for detection of its complementary antibody. These many shapes of coded micro-carriers would be used simultaneously allowing us to make multiple detections for different antibodies at the same time. A molding process is applied for fabrication of the ferromagnetically coded micro-carriers where Fe material (Fe powder mixed with binder) is shaped in many tiny molds to produce the coded shapes used for identification of the bio-molecules. Magnetic force is used to control the movement and location of the ferromagnetic coded micro-carriers to prevent the loss during the hybridization process. The results of image process and analysis system testing are satisfactory. The results of our micro-carrier detection system for two sets of R and B color analysis are proportional to those obtained from ELISA antibody detection.

  12. A coded aperture compressive imaging array and its visual detection and tracking algorithms for surveillance systems.

    PubMed

    Chen, Jing; Wang, Yongtian; Wu, Hanxiao

    2012-10-29

    In this paper, we propose an application of a compressive imaging system to the problem of wide-area video surveillance systems. A parallel coded aperture compressive imaging system is proposed to reduce the needed high resolution coded mask requirements and facilitate the storage of the projection matrix. Random Gaussian, Toeplitz and binary phase coded masks are utilized to obtain the compressive sensing images. The corresponding motion targets detection and tracking algorithms directly using the compressive sampling images are developed. A mixture of Gaussian distribution is applied in the compressive image space to model the background image and for foreground detection. For each motion target in the compressive sampling domain, a compressive feature dictionary spanned by target templates and noises templates is sparsely represented. An l(1) optimization algorithm is used to solve the sparse coefficient of templates. Experimental results demonstrate that low dimensional compressed imaging representation is sufficient to determine spatial motion targets. Compared with the random Gaussian and Toeplitz phase mask, motion detection algorithms using a random binary phase mask can yield better detection results. However using random Gaussian and Toeplitz phase mask can achieve high resolution reconstructed image. Our tracking algorithm can achieve a real time speed that is up to 10 times faster than that of the l(1) tracker without any optimization.

  13. Blind Detection of Region Duplication Forgery Using Fractal Coding and Feature Matching.

    PubMed

    Jenadeleh, Mohsen; Ebrahimi Moghaddam, Mohsen

    2016-05-01

    Digital image forgery detection is important because of its wide use in applications such as medical diagnosis, legal investigations, and entertainment. Copy-move forgery is one of the famous techniques, which is used in region duplication. Many of the existing copy-move detection algorithms cannot effectively blind detect duplicated regions that are made by powerful image manipulation software like Photoshop. In this study, a new method is proposed for blind detecting manipulations in digital images based on modified fractal coding and feature vector matching. The proposed method not only detects typical copy-move forgery, but also finds multiple copied forgery regions for images that are subjected to rotation, scaling, reflection, and a mixture of these postprocessing operations. The proposed method is robust against tampered images undergoing attacks such as Gaussian blurring, contrast scaling, and brightness adjustment. The experimental results demonstrated the validity and efficiency of the method.

  14. Contour coding based rotating adaptive model for human detection and tracking in thermal catadioptric omnidirectional vision.

    PubMed

    Tang, Yazhe; Li, Youfu

    2012-09-20

    In this paper, we introduce a novel surveillance system based on thermal catadioptric omnidirectional (TCO) vision. The conventional contour-based methods are difficult to be applied to the TCO sensor for detection or tracking purposes due to the distortion of TCO vision. To solve this problem, we propose a contour coding based rotating adaptive model (RAM) that can extract the contour feature from the TCO vision directly as it takes advantage of the relative angle based on the characteristics of TCO vision to change the sequence of sampling automatically. A series of experiments and quantitative analyses verify that the performance of the proposed RAM-based contour coding feature for human detection and tracking are satisfactory in TCO vision.

  15. Improved coded exposure for enhancing imaging quality and detection accuracy of moving targets

    NASA Astrophysics Data System (ADS)

    Mao, Baoqi; Chen, Li; Han, Lin; Shen, Weimin

    2016-09-01

    The blur due to the rapidly relative motion between scene and camera during exposure has the well-known influence on the quality of acquired image and then target detection. An improved coded exposure is introduced in this paper to remove the image blur and obtain high quality image, so that the test accuracy of the surface defect and edge contour of motion objects can be enhanced. The improved exposure method takes advantage of code look-up table to control exposure process and image restoration. The restored images have higher Peak Signal-to-Noise Ratio (PSNR) and Structure SIMilarity (SSIM) than traditional deblur algorithm such as Wiener and regularization filter methods. The edge contour and defect of part samples, which move at constant speed relative to the industry camera used in our experiment, are detected with Sobel operator from the restored images. Experimental results verify that the improved coded exposure is better suitable for imaging moving object and detecting moving target than the traditional.

  16. Automatic Detection of Frontal Face Midline by Chain-coded Merlin-Farber Hough Trasform

    NASA Astrophysics Data System (ADS)

    Okamoto, Daichi; Ohyama, Wataru; Wakabayashi, Tetsushi; Kimura, Fumitaka

    We propose a novel approach for detection of the facial midline (facial symmetry axis) from a frontal face image. The facial midline has several applications, for instance reducing computational cost required for facial feature extraction (FFE) and postoperative assessment for cosmetic or dental surgery. The proposed method detects the facial midline of a frontal face from an edge image as the symmetry axis using the Merlin-Faber Hough transformation. And a new performance improvement scheme for midline detection by MFHT is present. The main concept of the proposed scheme is suppression of redundant vote on the Hough parameter space by introducing chain code representation for the binary edge image. Experimental results on the image dataset containing 2409 images from FERET database indicate that the proposed algorithm can improve the accuracy of midline detection from 89.9% to 95.1 % for face images with different scales and rotation.

  17. Capacity, cutoff rate, and coding for a direct-detection optical channel

    NASA Technical Reports Server (NTRS)

    Massey, J. L.

    1980-01-01

    It is shown that Pierce's pulse position modulation scheme with 2 to the L pulse positions used on a self-noise-limited direct detection optical communication channel results in a 2 to the L-ary erasure channel that is equivalent to the parallel combination of L completely correlated binary erasure channels. The capacity of the full channel is the sum of the capacities of the component channels, but the cutoff rate of the full channel is shown to be much smaller than the sum of the cutoff rates. An interpretation of the cutoff rate is given that suggests a complexity advantage in coding separately on the component channels. It is shown that if short-constraint-length convolutional codes with Viterbi decoders are used on the component channels, then the performance and complexity compare favorably with the Reed-Solomon coding system proposed by McEliece for the full channel. The reasons for this unexpectedly fine performance by the convolutional code system are explored in detail, as are various facets of the channel structure.

  18. Deep Long-period Seismicity Beneath the Executive Committee Range, Marie Byrd Land, Antarctica, Studied Using Subspace Detection

    NASA Astrophysics Data System (ADS)

    Aster, R. C.; McMahon, N. D.; Myers, E. K.; Lough, A. C.

    2015-12-01

    Lough et al. (2014) first detected deep sub-icecap magmatic events beneath the Executive Committee Range volcanoes of Marie Byrd Land. Here, we extend the identification and analysis of these events in space and time utilizing subspace detection. Subspace detectors provide a highly effective methodology for studying events within seismic swarms that have similar moment tensor and Green's function characteristics and are particularly effective for identifying low signal-to-noise events. Marie Byrd Land (MBL) is an extremely remote continental region that is nearly completely covered by the West Antarctic Ice Sheet (WAIS). The southern extent of Marie Byrd Land lies within the West Antarctic Rift System (WARS), which includes the volcanic Executive Committee Range (ECR). The ECR shows north-to-south progression of volcanism across the WARS during the Holocene. In 2013, the POLENET/ANET seismic data identified two swarms of seismic activity in 2010 and 2011. These events have been interpreted as deep, long-period (DLP) earthquakes based on depth (25-40 km) and low frequency content. The DLP events in MBL lie beneath an inferred sub-WAIS volcanic edifice imaged with ice penetrating radar and have been interpreted as a present location of magmatic intrusion. The magmatic swarm activity in MBL provides a promising target for advanced subspace detection and temporal, spatial, and event size analysis of an extensive deep long period earthquake swarm using a remote seismographic network. We utilized a catalog of 1,370 traditionally identified DLP events to construct subspace detectors for the six nearest stations and analyzed two years of data spanning 2010-2011. Association of these detections into events resulted in an approximate ten-fold increase in number of locatable earthquakes. In addition to the two previously identified swarms during early 2010 and early 2011, we find sustained activity throughout the two years of study that includes several previously

  19. Direct-detection optical communication with color coded pulse position modulation signaling

    NASA Technical Reports Server (NTRS)

    Davidson, F.

    1985-01-01

    The performance characteristics of a direct-detection optical communication system which is based on a laser transmitter which produces single light pulses at selected nonoverlapping optical center frequencies are discussed. The signal format, called color coded pulse position modulation (CCPPM), uses more of the total available response bandwidth characteristics of the photodetector than does ordinary PPM signaling. The advantages of CCPPM signaling are obtained at the expense of an increased optical bandwidth of the transmitted signal and a more complicated transmitter and receiver structure. When the signal format is used in conjunction with block length Reed-Solomon codes, high data rates and reliable high-speed optical communications under conditions of optimal energy efficiency are obtained.

  20. Detection of code spread OFDM based on 0-1 integer quadratic programming

    NASA Astrophysics Data System (ADS)

    Elghariani, Ali; Zoltowski, Michael D.

    2012-05-01

    In this paper we introduce Integer Quadratic Programming (MIQP) approach to optimally detect QPSK Code Spread OFDM (CS-OFDM) by formulating the problem as a combinatorial optimization problem. The Branch and Bound (BB) algorithm is utilized to solve this integer quadratic programming problem. Furthermore, we propose combined preprocessing steps that can be applied prior to BB so that the computational complexity of the optimum receiver is reduced. The first step in this combination is to detect as much as possible symbols using procedures presented in [9], which is basically based on the gradient of quadratic function. The second step detects the undetected symbols from the first step using MMSE estimator. The result of the latter step will be used to predict the initial upper bound of the BB algorithm. Simulation results show that the proposed preprocessing combination when applied prior to BB provides optimal performance with a significantly reduced computational complexity.

  1. Supersensitive detection and discrimination of enantiomers by dorsal olfactory receptors: evidence for hierarchical odour coding.

    PubMed

    Sato, Takaaki; Kobayakawa, Reiko; Kobayakawa, Ko; Emura, Makoto; Itohara, Shigeyoshi; Kizumi, Miwako; Hamana, Hiroshi; Tsuboi, Akio; Hirono, Junzo

    2015-09-11

    Enantiomeric pairs of mirror-image molecular structures are difficult to resolve by instrumental analyses. The human olfactory system, however, discriminates (-)-wine lactone from its (+)-form rapidly within seconds. To gain insight into receptor coding of enantiomers, we compared behavioural detection and discrimination thresholds of wild-type mice with those of ΔD mice in which all dorsal olfactory receptors are genetically ablated. Surprisingly, wild-type mice displayed an exquisite "supersensitivity" to enantiomeric pairs of wine lactones and carvones. They were capable of supersensitive discrimination of enantiomers, consistent with their high detection sensitivity. In contrast, ΔD mice showed selective major loss of sensitivity to the (+)-enantiomers. The resulting 10(8)-fold differential sensitivity of ΔD mice to (-)- vs. (+)-wine lactone matched that observed in humans. This suggests that humans lack highly sensitive orthologous dorsal receptors for the (+)-enantiomer, similarly to ΔD mice. Moreover, ΔD mice showed >10(10)-fold reductions in enantiomer discrimination sensitivity compared to wild-type mice. ΔD mice detected one or both of the (-)- and (+)-enantiomers over a wide concentration range, but were unable to discriminate them. This "enantiomer odour discrimination paradox" indicates that the most sensitive dorsal receptors play a critical role in hierarchical odour coding for enantiomer identification.

  2. Supersensitive detection and discrimination of enantiomers by dorsal olfactory receptors: evidence for hierarchical odour coding

    PubMed Central

    Sato, Takaaki; Kobayakawa, Reiko; Kobayakawa, Ko; Emura, Makoto; Itohara, Shigeyoshi; Kizumi, Miwako; Hamana, Hiroshi; Tsuboi, Akio; Hirono, Junzo

    2015-01-01

    Enantiomeric pairs of mirror-image molecular structures are difficult to resolve by instrumental analyses. The human olfactory system, however, discriminates (−)-wine lactone from its (+)-form rapidly within seconds. To gain insight into receptor coding of enantiomers, we compared behavioural detection and discrimination thresholds of wild-type mice with those of ΔD mice in which all dorsal olfactory receptors are genetically ablated. Surprisingly, wild-type mice displayed an exquisite “supersensitivity” to enantiomeric pairs of wine lactones and carvones. They were capable of supersensitive discrimination of enantiomers, consistent with their high detection sensitivity. In contrast, ΔD mice showed selective major loss of sensitivity to the (+)-enantiomers. The resulting 108-fold differential sensitivity of ΔD mice to (−)- vs. (+)-wine lactone matched that observed in humans. This suggests that humans lack highly sensitive orthologous dorsal receptors for the (+)-enantiomer, similarly to ΔD mice. Moreover, ΔD mice showed >1010-fold reductions in enantiomer discrimination sensitivity compared to wild-type mice. ΔD mice detected one or both of the (−)- and (+)-enantiomers over a wide concentration range, but were unable to discriminate them. This “enantiomer odour discrimination paradox” indicates that the most sensitive dorsal receptors play a critical role in hierarchical odour coding for enantiomer identification. PMID:26361056

  3. Ultrasonic array for obstacle detection based on CDMA with Kasami codes.

    PubMed

    Diego, Cristina; Hernández, Alvaro; Jiménez, Ana; Alvarez, Fernando J; Sanz, Rebeca; Aparicio, Joaquín

    2011-01-01

    This paper raises the design of an ultrasonic array for obstacle detection based on Phased Array (PA) techniques, which steers the acoustic beam through the environment by electronics rather than mechanical means. The transmission of every element in the array has been encoded, according to Code Division for Multiple Access (CDMA), which allows multiple beams to be transmitted simultaneously. All these features together enable a parallel scanning system which does not only improve the image rate but also achieves longer inspection distances in comparison with conventional PA techniques.

  4. Two-stage sparse coding of region covariance via Log-Euclidean kernels to detect saliency.

    PubMed

    Zhang, Ying-Ying; Yang, Cai; Zhang, Ping

    2017-05-01

    In this paper, we present a novel bottom-up saliency detection algorithm from the perspective of covariance matrices on a Riemannian manifold. Each superpixel is described by a region covariance matrix on Riemannian Manifolds. We carry out a two-stage sparse coding scheme via Log-Euclidean kernels to extract salient objects efficiently. In the first stage, given background dictionary on image borders, sparse coding of each region covariance via Log-Euclidean kernels is performed. The reconstruction error on the background dictionary is regarded as the initial saliency of each superpixel. In the second stage, an improvement of the initial result is achieved by calculating reconstruction errors of the superpixels on foreground dictionary, which is extracted from the first stage saliency map. The sparse coding in the second stage is similar to the first stage, but is able to effectively highlight the salient objects uniformly from the background. Finally, three post-processing methods-highlight-inhibition function, context-based saliency weighting, and the graph cut-are adopted to further refine the saliency map. Experiments on four public benchmark datasets show that the proposed algorithm outperforms the state-of-the-art methods in terms of precision, recall and mean absolute error, and demonstrate the robustness and efficiency of the proposed method.

  5. Auditory detection of ultrasonic coded transmitters by seals and sea lions.

    PubMed

    Cunningham, Kane A; Hayes, Sean A; Michelle Wargo Rub, A; Reichmuth, Colleen

    2014-04-01

    Ultrasonic coded transmitters (UCTs) are high-frequency acoustic tags that are often used to conduct survivorship studies of vulnerable fish species. Recent observations of differential mortality in tag control studies suggest that fish instrumented with UCTs may be selectively targeted by marine mammal predators, thereby skewing valuable survivorship data. In order to better understand the ability of pinnipeds to detect UCT outputs, behavioral high-frequency hearing thresholds were obtained from a trained harbor seal (Phoca vitulina) and a trained California sea lion (Zalophus californianus). Thresholds were measured for extended (500 ms) and brief (10 ms) 69 kHz narrowband stimuli, as well as for a stimulus recorded directly from a Vemco V16-3H UCT, which consisted of eight 10 ms, 69 kHz pure-tone pulses. Detection thresholds for the harbor seal were as expected based on existing audiometric data for this species, while the California sea lion was much more sensitive than predicted. Given measured detection thresholds of 113 dB re 1 μPa and 124 dB re 1 μPa, respectively, both species are likely able to detect acoustic outputs of the Vemco V16-3H under water from distances exceeding 200 m in typical natural conditions, suggesting that these species are capable of using UCTs to detect free-ranging fish.

  6. Transformation of the neural code for tactile detection from thalamus to cortex

    PubMed Central

    Vázquez, Yuriria; Salinas, Emilio; Romo, Ranulfo

    2013-01-01

    To understand how sensory-driven neural activity gives rise to perception, it is essential to characterize how various relay stations in the brain encode stimulus presence. Neurons in the ventral posterior lateral (VPL) nucleus of the somatosensory thalamus and in primary somatosensory cortex (S1) respond to vibrotactile stimulation with relatively slow modulations (∼100 ms) of their firing rate. In addition, faster modulations (∼10 ms) time-locked to the stimulus waveform are observed in both areas, but their contribution to stimulus detection is unknown. Furthermore, it is unclear whether VPL and S1 neurons encode stimulus presence with similar accuracy and via the same response features. To address these questions, we recorded single neurons while trained monkeys judged the presence or absence of a vibrotactile stimulus of variable amplitude, and their activity was analyzed with a unique decoding method that is sensitive to the time scale of the firing rate fluctuations. We found that the maximum detection accuracy of single neurons is similar in VPL and S1. However, VPL relies more heavily on fast rate modulations than S1, and as a consequence, the neural code in S1 is more tolerant: its performance degrades less when the readout method or the time scale of integration is suboptimal. Therefore, S1 neurons implement a more robust code, one less sensitive to the temporal integration window used to infer stimulus presence downstream. The differences between VPL and S1 responses signaling the appearance of a stimulus suggest a transformation of the neural code from thalamus to cortex. PMID:23798408

  7. Speedup properties of phases in the execution profile of distributed parallel programs

    SciTech Connect

    Carlson, B.M.; Wagner, T.D.; Dowdy, L.W.; Worley, P.H.

    1992-08-01

    The execution profile of a distributed-memory parallel program specifies the number of busy processors as a function of time. Periods of homogeneous processor utilization are manifested in many execution profiles. These periods can usually be correlated with the algorithms implemented in the underlying parallel code. Three families of methods for smoothing execution profile data are presented. These approaches simplify the problem of detecting end points of periods of homogeneous utilization. These periods, called phases, are then examined in isolation, and their speedup characteristics are explored. A specific workload executed on an Intel iPSC/860 is used for validation of the techniques described.

  8. Performance improvement of hybrid subcarrier multiplexing optical spectrum code division multiplexing system using spectral direct decoding detection technique

    NASA Astrophysics Data System (ADS)

    Sahbudin, R. K. Z.; Abdullah, M. K.; Mokhtar, M.

    2009-06-01

    This paper proposes a hybrid subcarrier multiplexing/optical spectrum code division multiplexing (SCM/OSCDM) system for the purpose of combining the advantages of both techniques. Optical spectrum code division multiple-access (OSCDMA) is one of the multiplexing techniques that is becoming popular because of the flexibility in the allocation of channels, ability to operate asynchronously, enhanced privacy and increased capacity in bursty nature networks. On the other hand, subcarrier multiplexing (SCM) technique is able to enhance the channel data rate of OSCDMA systems. In this paper, a newly developed detection technique for the OSCDM called spectral direct decoding (SDD) detection technique is compared mathematically with the AND subtraction detection technique. The system utilizes a new unified code construction named KS (Khazani-Syed) code. The results characterizing the bit-error-rate (BER) show that SDD offers a significant improved performance at BER of 10 -9.

  9. Real Time PCR to detect hazelnut allergen coding sequences in processed foods.

    PubMed

    Iniesto, Elisa; Jiménez, Ana; Prieto, Nuria; Cabanillas, Beatriz; Burbano, Carmen; Pedrosa, Mercedes M; Rodríguez, Julia; Muzquiz, Mercedes; Crespo, Jesús F; Cuadrado, Carmen; Linacero, Rosario

    2013-06-01

    A quantitative RT-PCR method, employing novel primer sets designed on Cor a 9, Cor a 11 and Cor a 13 allergen-coding sequences has been setup and validated. Its specificity, sensitivity and applicability have been compared. The effect of processing on detectability of these hazelnut targets in complex food matrices was also studied. The DNA extraction method based on CTAB-phenol-chloroform was the best for hazelnut. RT-PCR using primers for Cor a 9, 11 and 13 allowed a specific and accurate amplification of these sequences. The limit of detection was 1 ppm of raw hazelnut. The method sensitivity and robustness were confirmed with spiked samples. Thermal treatments (roasting and autoclaving) reduced yield and amplificability of hazelnut DNA, however, high-hydrostatic pressure did not affect. Compared with an ELISA assay, this RT-PCR showed higher sensitivity to detected hazelnut traces in commercial foodstuffs. The RT-PCR method described is the most sensitive of those reported for the detection of hazelnut traces in processed foods.

  10. Detection and reconstruction of error control codes for engineered and biological regulatory systems.

    SciTech Connect

    May, Elebeoba Eni; Rintoul, Mark Daniel; Johnston, Anna Marie; Pryor, Richard J.; Hart, William Eugene; Watson, Jean-Paul

    2003-10-01

    A fundamental challenge for all communication systems, engineered or living, is the problem of achieving efficient, secure, and error-free communication over noisy channels. Information theoretic principals have been used to develop effective coding theory algorithms to successfully transmit information in engineering systems. Living systems also successfully transmit biological information through genetic processes such as replication, transcription, and translation, where the genome of an organism is the contents of the transmission. Decoding of received bit streams is fairly straightforward when the channel encoding algorithms are efficient and known. If the encoding scheme is unknown or part of the data is missing or intercepted, how would one design a viable decoder for the received transmission? For such systems blind reconstruction of the encoding/decoding system would be a vital step in recovering the original message. Communication engineers may not frequently encounter this situation, but for computational biologists and biotechnologist this is an immediate challenge. The goal of this work is to develop methods for detecting and reconstructing the encoder/decoder system for engineered and biological data. Building on Sandia's strengths in discrete mathematics, algorithms, and communication theory, we use linear programming and will use evolutionary computing techniques to construct efficient algorithms for modeling the coding system for minimally errored engineered data stream and genomic regulatory DNA and RNA sequences. The objective for the initial phase of this project is to construct solid parallels between biological literature and fundamental elements of communication theory. In this light, the milestones for FY2003 were focused on defining genetic channel characteristics and providing an initial approximation for key parameters, including coding rate, memory length, and minimum distance values. A secondary objective addressed the question of

  11. Coded excitation speeds up the detection of the fundamental flexural guided wave in coated tubes

    NASA Astrophysics Data System (ADS)

    Song, Xiaojun; Moilanen, Petro; Zhao, Zuomin; Ta, Dean; Pirhonen, Jalmari; Salmi, Ari; Hæeggström, Edward; Myllylä, Risto; Timonen, Jussi; Wang, Weiqi

    2016-09-01

    The fundamental flexural guided wave (FFGW) permits ultrasonic assessment of the wall thickness of solid waveguides, such as tubes or, e.g., long cortical bones. Recently, an optical non-contact method was proposed for ultrasound excitation and detection with the aim of facilitating the FFGW reception by suppressing the interfering modes from the soft coating. This technique suffers from low SNR and requires iterative physical scanning across the source-receiver distance for 2D-FFT analysis. This means that SNR improvement achieved by temporal averaging becomes time-consuming (several minutes) which reduces the applicability of the technique, especially in time-critical applications such as clinical quantitative ultrasound. To achieve sufficient SNR faster, an ultrasonic excitation by a base-sequence-modulated Golay code (BSGC, 64-bit code pair) on coated tube samples (1-5 mm wall thickness and 5 mm soft coating layer) was used. This approach improved SNR by 21 dB and speeded up the measurement by a factor of 100 compared to using a classical pulse excitation with temporal averaging. The measurement now took seconds instead of minutes, while the ability to determine the wall thickness of the phantoms was maintained. The technique thus allows rapid noncontacting assessment of the wall thickness in coated solid tubes, such as the human bone.

  12. Selective Capture and Quick Detection of Targeting Cells with SERS-Coding Microsphere Suspension Chip.

    PubMed

    Li, Dian; Zhang, Yuting; Li, Ruimin; Guo, Jia; Wang, Changchun; Tang, Chuanbing

    2015-05-13

    Circulating tumor cells (CTCs) captured from blood fluid represent recurrent cancers and metastatic lesions to monitor the situation of cancers. We develop surface-enhanced Raman scattering (SERS)-coding microsphere suspension chip as a new strategy for fast and efficient capture, recovery, and detection of targeting cancer cells. Using HeLa cells as model CTCs, we first utilize folate as a recognition molecule to be immobilized in magnetic composite microspheres for capturing HeLa cells and attaining high capturing efficacy (up to 95%). After capturing cells, the composite microsphere, which utilizes a disulfide bond as crosslinker in the polymer shell and as a spacer for linking folate, can recycle 90% cells within 20 min eluted by glutathion solution. Taking advantage of the SERS with fingerprint features, we characterize captured/recovered cells with the unique signal of report-molecule 4-aminothiophenol through introducing the SERS-coding microsphere suspension chip to CTCs. Finally, the exploratory experiment of sieving cells shows that the magnetic composite microspheres can selectively capture the HeLa cells from samples of mixed cells, indicating that these magnetic composite microspheres have potential in real blood samples for capturing CTCs.

  13. Sub-Nyquist sampling and detection in Costas coded pulse compression radars

    NASA Astrophysics Data System (ADS)

    Hanif, Adnan; Mansoor, Atif Bin; Imran, Ali Shariq

    2016-12-01

    Modern pulse compression radar involves digital signal processing of high bandwidth pulses modulated with different coding schemes. One of the limiting factors in the radar's design to achieve desired target range and resolution is the need of high rate analog-to-digital (A/D) conversion fulfilling the Nyquist sampling criteria. The high sampling rates necessitate huge storage capacity, more power consumption, and extra processing requirement. We introduce a new approach to sample wideband radar waveform modulated with Costas sequence at a sub-Nyquist rate based upon the concept of compressive sensing (CS). Sub-Nyquist measurements of Costas sequence waveform are performed in an analog-to-information (A/I) converter based upon random demodulation replacing traditional A/D converter. The novel work presents an 8-order Costas coded waveform with sub-Nyquist sampling and its reconstruction. The reconstructed waveform is compared with the conventionally sampled signal and depicts high-quality signal recovery from sub-Nyquist sampled signal. Furthermore, performance of CS-based detections after reconstruction are evaluated in terms of receiver operating characteristic (ROC) curves and compared with conventional Nyquist-rate matched filtering scheme.

  14. Efficient postprocessing scheme for block-coded images based on multiscale edge detection

    NASA Astrophysics Data System (ADS)

    Wu, Shuanhu; Yan, Hong; Tan, Zheng

    2001-09-01

    The block discrete cosine transform (BDCT) is the most widely used technique for the compression of both still and moving images, a major problem related with the BDCT techniques is that the decoded images, especially at low bit rate, exhibit visually annoying blocking effects. In this paper, based on Mallets multiscale edge detection, we proposed an efficient deblocking algorithm to further improved the coding performance. The advantage of our algorithm is that it can efficiently preserve texture structure in the original decompressed images. Our method is similar to that of Z. Xiong's, where the Z.Xiong's method is not suitable for images with a large portion of texture; for instance, the Barbara Image. The difference of our method and the Z.Xiong's is that our method adopted a new thresholding scheme for multi-scale edge detection instead of exploiting cross-scale correlation for edge detection. Numerical experiment results show that our scheme not only outperforms Z.Xiong's for various images in the case of the same computational complexity, but also preserve texture structure in the decompressed images at the same time. Compared with the best iterative-based method (POCS) reported in the literature, our algorithm can achieve the same peak signal-to-noise ratio (PSNR) improvement and give visually very pleasing images as well.

  15. Nanoparticle-Based Bio-Bar Codes for the Ultrasensitive Detection of Proteins

    NASA Astrophysics Data System (ADS)

    Nam, Jwa-Min; Shad Thaxton, C.; Mirkin, Chad A.

    2003-09-01

    An ultrasensitive method for detecting protein analytes has been developed. The system relies on magnetic microparticle probes with antibodies that specifically bind a target of interest [prostate-specific antigen (PSA) in this case] and nanoparticle probes that are encoded with DNA that is unique to the protein target of interest and antibodies that can sandwich the target captured by the microparticle probes. Magnetic separation of the complexed probes and target followed by dehybridization of the oligonucleotides on the nanoparticle probe surface allows the determination of the presence of the target protein by identifying the oligonucleotide sequence released from the nanoparticle probe. Because the nanoparticle probe carries with it a large number of oligonucleotides per protein binding event, there is substantial amplification and PSA can be detected at 30 attomolar concentration. Alternatively, a polymerase chain reaction on the oligonucleotide bar codes can boost the sensitivity to 3 attomolar. Comparable clinically accepted conventional assays for detecting the same target have sensitivity limits of ~3 picomdar, six orders of magnitude less sensitive than what is observed with this method.

  16. Detection by real time PCR of walnut allergen coding sequences in processed foods.

    PubMed

    Linacero, Rosario; Ballesteros, Isabel; Sanchiz, Africa; Prieto, Nuria; Iniesto, Elisa; Martinez, Yolanda; Pedrosa, Mercedes M; Muzquiz, Mercedes; Cabanillas, Beatriz; Rovira, Mercè; Burbano, Carmen; Cuadrado, Carmen

    2016-07-01

    A quantitative real-time PCR (RT-PCR) method, employing novel primer sets designed on Jug r 1, Jug r 3, and Jug r 4 allergen-coding sequences, was set up and validated. Its specificity, sensitivity, and applicability were evaluated. The DNA extraction method based on CTAB-phenol-chloroform was best for walnut. RT-PCR allowed a specific and accurate amplification of allergen sequence, and the limit of detection was 2.5pg of walnut DNA. The method sensitivity and robustness were confirmed with spiked samples, and Jug r 3 primers detected up to 100mg/kg of raw walnut (LOD 0.01%, LOQ 0.05%). Thermal treatment combined with pressure (autoclaving) reduced yield and amplification (integrity and quality) of walnut DNA. High hydrostatic pressure (HHP) did not produce any effect on the walnut DNA amplification. This RT-PCR method showed greater sensitivity and reliability in the detection of walnut traces in commercial foodstuffs compared with ELISA assays.

  17. Assessment of absolute added correlative coding in optical intensity modulation and direct detection channels

    NASA Astrophysics Data System (ADS)

    Dong-Nhat, Nguyen; Elsherif, Mohamed A.; Malekmohammadi, Amin

    2016-06-01

    The performance of absolute added correlative coding (AACC) modulation format with direct detection has been numerically and analytically reported, targeting metro data center interconnects. Hereby, the focus lies on the performance of the bit error rate, noise contributions, spectral efficiency, and chromatic dispersion tolerance. The signal space model of AACC, where the average electrical and optical power expressions are derived for the first time, is also delineated. The proposed modulation format was also compared to other well-known signaling, such as on-off-keying (OOK) and four-level pulse-amplitude modulation, at the same bit rate in a directly modulated vertical-cavity surface-emitting laser-based transmission system. The comparison results show a clear advantage of AACC in achieving longer fiber delivery distance due to the higher dispersion tolerance.

  18. Modulated pulse laser with pseudorandom coding capabilities for underwater ranging, detection, and imaging.

    PubMed

    Cochenour, Brandon; Mullen, Linda; Muth, John

    2011-11-20

    Optical detection, ranging, and imaging of targets in turbid water is complicated by absorption and scattering. It has been shown that using a pulsed laser source with a range-gated receiver or an intensity modulated source with a coherent RF receiver can improve target contrast in turbid water. A blended approach using a modulated-pulse waveform has been previously suggested as a way to further improve target contrast. However only recently has a rugged and reliable laser source been developed that is capable of synthesizing such a waveform so that the effect of the underwater environment on the propagation of a modulated pulse can be studied. In this paper, we outline the motivation for the modulated-pulse (MP) concept, and experimentally evaluate different MP waveforms: single-tone MP and pseudorandom coded MP sequences.

  19. Decoding of DBEC-TBED Reed-Solomon codes. [Double-Byte-Error-Correcting, Triple-Byte-Error-Detecting

    NASA Technical Reports Server (NTRS)

    Deng, Robert H.; Costello, Daniel J., Jr.

    1987-01-01

    A problem in designing semiconductor memories is to provide some measure of error control without requiring excessive coding overhead or decoding time. In LSI and VLSI technology, memories are often organized on a multiple bit (or byte) per chip basis. For example, some 256 K bit DRAM's are organized in 32 K x 8 bit-bytes. Byte-oriented codes such as Reed-Solomon (RS) codes can provide efficient low overhead error control for such memories. However, the standard iterative algorithm for decoding RS codes is too slow for these applications. The paper presents a special decoding technique for double-byte-error-correcting, triple-byte-error-detecting RS codes which is capable of high-speed operation. This technique is designed to find the error locations and the error values directly from the syndrome without having to use the iterative algorithm to find the error locator polynomial.

  20. PCR-free quantitative detection of genetically modified organism from raw materials. An electrochemiluminescence-based bio bar code method.

    PubMed

    Zhu, Debin; Tang, Yabing; Xing, Da; Chen, Wei R

    2008-05-15

    A bio bar code assay based on oligonucleotide-modified gold nanoparticles (Au-NPs) provides a PCR-free method for quantitative detection of nucleic acid targets. However, the current bio bar code assay requires lengthy experimental procedures including the preparation and release of bar code DNA probes from the target-nanoparticle complex and immobilization and hybridization of the probes for quantification. Herein, we report a novel PCR-free electrochemiluminescence (ECL)-based bio bar code assay for the quantitative detection of genetically modified organism (GMO) from raw materials. It consists of tris-(2,2'-bipyridyl) ruthenium (TBR)-labeled bar code DNA, nucleic acid hybridization using Au-NPs and biotin-labeled probes, and selective capture of the hybridization complex by streptavidin-coated paramagnetic beads. The detection of target DNA is realized by direct measurement of ECL emission of TBR. It can quantitatively detect target nucleic acids with high speed and sensitivity. This method can be used to quantitatively detect GMO fragments from real GMO products.

  1. Self-assembled software and method of overriding software execution

    DOEpatents

    Bouchard, Ann M.; Osbourn, Gordon C.

    2013-01-08

    A computer-implemented software self-assembled system and method for providing an external override and monitoring capability to dynamically self-assembling software containing machines that self-assemble execution sequences and data structures. The method provides an external override machine that can be introduced into a system of self-assembling machines while the machines are executing such that the functionality of the executing software can be changed or paused without stopping the code execution and modifying the existing code. Additionally, a monitoring machine can be introduced without stopping code execution that can monitor specified code execution functions by designated machines and communicate the status to an output device.

  2. Writing executable assertions to test flight software

    NASA Technical Reports Server (NTRS)

    Mahmood, A.; Andrews, D. M.; Mccluskey, E. J.

    1984-01-01

    An executable assertion is a logical statement about the variables or a block of code. If there is no error during execution, the assertion statement results in a true value. Executable assertions can be used for dynamic testing of software. They can be employed for validation during the design phase, and exception and error detection during the operation phase. The present investigation is concerned with the problem of writing executable assertions, taking into account the use of assertions for testing flight software. They can be employed for validation during the design phase, and for exception handling and error detection during the operation phase The digital flight control system and the flight control software are discussed. The considered system provides autopilot and flight director modes of operation for automatic and manual control of the aircraft during all phases of flight. Attention is given to techniques for writing and using assertions to test flight software, an experimental setup to test flight software, and language features to support efficient use of assertions.

  3. Executive Dysfunction

    PubMed Central

    Rabinovici, Gil D.; Stephens, Melanie L.; Possin, Katherine L.

    2015-01-01

    Purpose of Review: Executive functions represent a constellation of cognitive abilities that drive goal-oriented behavior and are critical to the ability to adapt to an ever-changing world. This article provides a clinically oriented approach to classifying, localizing, diagnosing, and treating disorders of executive function, which are pervasive in clinical practice. Recent Findings: Executive functions can be split into four distinct components: working memory, inhibition, set shifting, and fluency. These components may be differentially affected in individual patients and act together to guide higher-order cognitive constructs such as planning and organization. Specific bedside and neuropsychological tests can be applied to evaluate components of executive function. While dysexecutive syndromes were first described in patients with frontal lesions, intact executive functioning relies on distributed neural networks that include not only the prefrontal cortex, but also the parietal cortex, basal ganglia, thalamus, and cerebellum. Executive dysfunction arises from injury to any of these regions, their white matter connections, or neurotransmitter systems. Dysexecutive symptoms therefore occur in most neurodegenerative diseases and in many other neurologic, psychiatric, and systemic illnesses. Management approaches are patient specific and should focus on treatment of the underlying cause in parallel with maximizing patient function and safety via occupational therapy and rehabilitation. Summary: Executive dysfunction is extremely common in patients with neurologic disorders. Diagnosis and treatment hinge on familiarity with the clinical components and neuroanatomic correlates of these complex, high-order cognitive processes. PMID:26039846

  4. Impact of Error Detecting or Correcting Codes on the Sensitivity to DPA of an AES S-Box

    NASA Astrophysics Data System (ADS)

    Hussain, Iqtadar; Gondal, Muhammad Asif

    2014-09-01

    The robustness of a chip intended for security related requisitions relies upon its capacity to universally oppose to different sorts of ambushes. This paper manages securities against non intrusive or semi obtrusive assaults. The two fundamental classes are strike focused around force utilization (either by checking the current, e.g. DPA, or by observing the electromagnetic emanations, i.e. EMA) and strike focused around the infusion of issues throughout the provision execution (DFA). Data repetition is regularly proposed as a premise for countermeasures against DFA. This paper examines the impact of the decision of the code on the worldwide vigor of the circuit. The study is centered around the assessment of the affectability to DPA of a few ensured renditions of an AES circuit.

  5. Executive functions.

    PubMed

    Miller, Karen J

    2005-04-01

    Executive functions are higher-order cognitive processes that continue to develop well into adulthood. They are critically important to behavioral self-control and task performance, and deficits can have serious effects on a student's functioning in many areas. Primary care pediatricians can play an important role by being aware of this evolving field of research, current assessment strategies, and by encouraging families, schools, and students to adopt a positive and problem-solving approach to improve executive functions.

  6. Leveraging Parallel Hardware to Detect, Quarantine, and Repair Malicious Code Injection (#36)

    DTIC Science & Technology

    2010-01-01

    collection of information is estimated to average 1 hour per response, including the time for reviewing instructions , searching data sources, gathering and...RELEASE; DISTRIBUTION UNLIMITED. 13. SUPPLEMENTARY NOTES 14. ABSTRACT In a Multi-Variant Execution Environment (MVEE), several slightly different...complicated allocation me- chanics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 9 Mechanics of PUSH instruction in reverse stack

  7. Presenting an Alternative Source Code Plagiarism Detection Framework for Improving the Teaching and Learning of Programming

    ERIC Educational Resources Information Center

    Hattingh, Frederik; Buitendag, Albertus A. K.; van der Walt, Jacobus S.

    2013-01-01

    The transfer and teaching of programming and programming related skills has become, increasingly difficult on an undergraduate level over the past years. This is partially due to the number of programming languages available as well as access to readily available source code over the Web. Source code plagiarism is common practice amongst many…

  8. Detection of Inpatient Health Care Associated Injuries: Comparing Two ICD-9-CM Code Classifications

    DTIC Science & Technology

    2005-05-01

    example, currently the UTIDs database has nine fields for ICD-9-CM diagnosis codes plus a single additional field for an E-code. Some patients...information for physicians on sub-acute thromboses (SAT) and hypersensitivity reactions with use of the Cordis CYPHERTM Sirolimus-eluting coronary stent

  9. Quartz crystal microbalance detection of DNA single-base mutation based on monobase-coded cadmium tellurium nanoprobe.

    PubMed

    Zhang, Yuqin; Lin, Fanbo; Zhang, Youyu; Li, Haitao; Zeng, Yue; Tang, Hao; Yao, Shouzhuo

    2011-01-01

    A new method for the detection of point mutation in DNA based on the monobase-coded cadmium tellurium nanoprobes and the quartz crystal microbalance (QCM) technique was reported. A point mutation (single-base, adenine, thymine, cytosine, and guanine, namely, A, T, C and G, mutation in DNA strand, respectively) DNA QCM sensor was fabricated by immobilizing single-base mutation DNA modified magnetic beads onto the electrode surface with an external magnetic field near the electrode. The DNA-modified magnetic beads were obtained from the biotin-avidin affinity reaction of biotinylated DNA and streptavidin-functionalized core/shell Fe(3)O(4)/Au magnetic nanoparticles, followed by a DNA hybridization reaction. Single-base coded CdTe nanoprobes (A-CdTe, T-CdTe, C-CdTe and G-CdTe, respectively) were used as the detection probes. The mutation site in DNA was distinguished by detecting the decreases of the resonance frequency of the piezoelectric quartz crystal when the coded nanoprobe was added to the test system. This proposed detection strategy for point mutation in DNA is proved to be sensitive, simple, repeatable and low-cost, consequently, it has a great potential for single nucleotide polymorphism (SNP) detection.

  10. Detection of coding microsatellite frameshift mutations in DNA mismatch repair-deficient mouse intestinal tumors.

    PubMed

    Woerner, Stefan M; Tosti, Elena; Yuan, Yan P; Kloor, Matthias; Bork, Peer; Edelmann, Winfried; Gebert, Johannes

    2015-11-01

    Different DNA mismatch repair (MMR)-deficient mouse strains have been developed as models for the inherited cancer predisposing Lynch syndrome. It is completely unresolved, whether coding mononucleotide repeat (cMNR) gene mutations in these mice can contribute to intestinal tumorigenesis and whether MMR-deficient mice are a suitable molecular model of human microsatellite instability (MSI)-associated intestinal tumorigenesis. A proof-of-principle study was performed to identify mouse cMNR-harboring genes affected by insertion/deletion mutations in MSI murine intestinal tumors. Bioinformatic algorithms were developed to establish a database of mouse cMNR-harboring genes. A panel of five mouse noncoding mononucleotide markers was used for MSI classification of intestinal matched normal/tumor tissues from MMR-deficient (Mlh1(-/-) , Msh2(-/-) , Msh2(LoxP/LoxP) ) mice. cMNR frameshift mutations of candidate genes were determined by DNA fragment analysis. Murine MSI intestinal tumors but not normal tissues from MMR-deficient mice showed cMNR frameshift mutations in six candidate genes (Elavl3, Tmem107, Glis2, Sdccag1, Senp6, Rfc3). cMNRs of mouse Rfc3 and Elavl3 are conserved in type and length in their human orthologs that are known to be mutated in human MSI colorectal, endometrial and gastric cancer. We provide evidence for the utility of a mononucleotide marker panel for detection of MSI in murine tumors, the existence of cMNR instability in MSI murine tumors, the utility of mouse subspecies DNA for identification of polymorphic repeats, and repeat conservation among some orthologous human/mouse genes, two of them showing instability in human and mouse MSI intestinal tumors. MMR-deficient mice hence are a useful molecular model system for analyzing MSI intestinal carcinogenesis.

  11. Virtual multiple errands test (VMET): a virtual reality-based tool to detect early executive functions deficit in Parkinson’s disease

    PubMed Central

    Cipresso, Pietro; Albani, Giovanni; Serino, Silvia; Pedroli, Elisa; Pallavicini, Federica; Mauro, Alessandro; Riva, Giuseppe

    2014-01-01

    Introduction: Several recent studies have pointed out that early impairment of executive functions (EFs) in Parkinson’s Disease (PD) may be a crucial marker to detect patients at risk for developing dementia. The main objective of this study was to compare the performances of PD patients with mild cognitive impairment (PD-MCI) with PD patients with normal cognition (PD-NC) and a control group (CG) using a traditional assessment of EFs and the Virtual Multiple Errands Test (VMET), a virtual reality (VR)-based tool. In order to understand which subcomponents of EFs are early impaired, this experimental study aimed to investigate specifically which instrument best discriminates among these three groups. Materials and methods: The study included three groups of 15 individuals each (for a total of 45 participants): 15 PD-NC; 15 PD-MCI, and 15 cognitively healthy individuals (CG). To assess the global neuropsychological functioning and the EFs, several tests (including the Mini Mental State Examination (MMSE), Clock Drawing Test, and Tower of London test) were administered to the participants. The VMET was used for a more ecologically valid neuropsychological evaluation of EFs. Results: Findings revealed significant differences in the VMET scores between the PD-NC patients vs. the controls. In particular, patients made more errors in the tasks of the VMET, and showed a poorer ability to use effective strategies to complete the tasks. This VMET result seems to be more sensitive in the early detection of executive deficits because these two groups did not differ in the traditional assessment of EFs (neuropsychological battery). Conclusion: This study offers initial evidence that a more ecologically valid evaluation of EFs is more likely to lead to detection of subtle executive deficits. PMID:25538578

  12. Slow and fast ultrasonic wave detection improvement in human trabecular bones using Golay code modulation.

    PubMed

    Lashkari, Bahman; Manbachi, Amir; Mandelis, Andreas; Cobbold, Richard S C

    2012-09-01

    The identification of fast and slow waves propagating through trabecular bone is a challenging task due to temporal wave overlap combined with the high attenuation of the fast wave in the presence of noise. However, it can provide valuable information about bone integrity and become a means for monitoring osteoporosis. The objective of this work is to apply different coded excitation methods for this purpose. The results for single-sine cycle pulse, Golay code, and chirp excitations are compared. It is shown that Golay code is superior to the other techniques due to its signal enhancement while exhibiting excellent resolution without the ambiguity of sidelobes.

  13. A New Model for the Error Detection Delay of Finite Precision Binary Arithmetic Codes with a Forbidden Symbol

    NASA Astrophysics Data System (ADS)

    Pang, Yuye; Sun, Jun; Wang, Jia; Wang, Peng

    In this paper, the statistical characteristic of the Error Detection Delay (EDD) of Finite Precision Binary Arithmetic Codes (FPBAC) is discussed. It is observed that, apart from the probability of the Forbidden Symbol (FS) inserted into the list of the source symbols, the probability of the source sequence and the operation precision as well as the position of the FS in the coding interval can affect the statistical characteristic of the EDD. Experiments demonstrate that the actual distribution of the EDD of FPBAC is quite different from the geometric distribution of infinite precision arithmetic codes. This phenomenon is researched deeply, and a new statistical model (gamma distribution) of the actual distribution of the EDD is proposed, which can make a more precise prediction of the EDD. Finally, the relation expressions between the parameters of gamma distribution and the related factors affecting the distribution are given.

  14. Intensity modulation and direct detection Alamouti polarization-time coding for optical fiber transmission systems with polarization mode dispersion

    NASA Astrophysics Data System (ADS)

    Reza, Ahmed Galib; Rhee, June-Koo Kevin

    2016-07-01

    Alamouti space-time coding is modified in the form of polarization-time coding to combat against polarization mode dispersion (PMD) impairments in exploiting a polarization diversity multiplex (PDM) gain with simple intensity modulation and direct detection (IM/DD) in optical transmission systems. A theoretical model for the proposed IM/DD Alamouti polarization-time coding (APTC-IM/DD) using nonreturn-to-zero on-off keying signal can surprisingly eliminate the requirement of channel estimation for decoding in the low PMD regime, when a two-transmitter and two-receiver channel is adopted. Even in the high PMD regime, the proposed APTC-IM/DD still reveals coding gain demonstrating the robustness of APTC-IM/DD. In addition, this scheme can eliminate the requirements for a polarization state controller, a coherent receiver, and a high-speed analog-to-digital converter at a receiver. Simulation results reveal that the proposed APTC scheme is able to reduce the optical signal-to-noise ratio requirement by ˜3 dB and significantly enhance the PMD tolerance of a PDM-based IM/DD system.

  15. Executive Functions

    PubMed Central

    Diamond, Adele

    2014-01-01

    Executive functions (EFs) make possible mentally playing with ideas; taking the time to think before acting; meeting novel, unanticipated challenges; resisting temptations; and staying focused. Core EFs are inhibition [response inhibition (self-control—resisting temptations and resisting acting impulsively) and interference control (selective attention and cognitive inhibition)], working memory, and cognitive flexibility (including creatively thinking “outside the box,” seeing anything from different perspectives, and quickly and flexibly adapting to changed circumstances). The developmental progression and representative measures of each are discussed. Controversies are addressed (e.g., the relation between EFs and fluid intelligence, self-regulation, executive attention, and effortful control, and the relation between working memory and inhibition and attention). The importance of social, emotional, and physical health for cognitive health is discussed because stress, lack of sleep, loneliness, or lack of exercise each impair EFs. That EFs are trainable and can be improved with practice is addressed, including diverse methods tried thus far. PMID:23020641

  16. Biobar-coded gold nanoparticles and DNAzyme-based dual signal amplification strategy for ultrasensitive detection of protein by electrochemiluminescence.

    PubMed

    Xia, Hui; Li, Lingling; Yin, Zhouyang; Hou, Xiandeng; Zhu, Jun-Jie

    2015-01-14

    A dual signal amplification strategy for electrochemiluminescence (ECL) aptasensor was designed based on biobar-coded gold nanoparticles (Au NPs) and DNAzyme. CdSeTe@ZnS quantum dots (QDs) were chosen as the ECL signal probes. To verify the proposed ultrasensitive ECL aptasensor for biomolecules, we detected thrombin (Tb) as a proof-of-principle analyte. The hairpin DNA designed for the recognition of protein consists of two parts: the sequences of catalytical 8-17 DNAzyme and thrombin aptamer. Only in the presence of thrombin could the hairpin DNA be opened, followed by a recycling cleavage of excess substrates by catalytic core of the DNAzyme to induce the first-step amplification. One part of the fragments was captured to open the capture DNA modified on the Au electrode, which further connected with the prepared biobar-coded Au NPs-CdSeTe@ZnS QDs to get the final dual-amplified ECL signal. The limit of detection for Tb was 0.28 fM with excellent selectivity, and this proposed method possessed good performance in real sample analysis. This design introduces the new concept of dual-signal amplification by a biobar-coded system and DNAzyme recycling into ECL determination, and it is promising to be extended to provide a highly sensitive platform for various target biomolecules.

  17. Detection of reduced interhemispheric cortical communication during task execution in multiple sclerosis patients using functional near-infrared spectroscopy

    NASA Astrophysics Data System (ADS)

    Jimenez, Jon J.; Yang, Runze; Nathoo, Nabeela; Varshney, Vishal P.; Golestani, Ali-Mohammad; Goodyear, Bradley G.; Metz, Luanne M.; Dunn, Jeff F.

    2014-07-01

    Multiple sclerosis (MS) impairs brain activity through demyelination and loss of axons. Increased brain activity is accompanied by increases in microvascular hemoglobin oxygen saturation (oxygenation) and total hemoglobin, which can be measured using functional near-infrared spectroscopy (fNIRS). Due to the potentially reduced size and integrity of the white matter tracts within the corpus callosum, it may be expected that MS patients have reduced functional communication between the left and right sides of the brain; this could potentially be an indicator of disease progression. To assess interhemispheric communication in MS, we used fNIRS during a unilateral motor task and the resting state. The magnitude of the change in hemoglobin parameters in the motor cortex was significantly reduced in MS patients during the motor task relative to healthy control subjects. There was also a significant decrease in interhemispheric communication between the motor cortices (expressed as coherence) in MS patients compared to controls during the motor task, but not during the resting state. fNIRS assessment of interhemispheric coherence during task execution may be a useful marker in disorders with white matter damage or axonal loss, including MS.

  18. Detection of Long Non-coding RNA Expression by Non-radioactive Northern Blots

    PubMed Central

    Hu, Xiaowen; Feng, Yi; Hu, Zhongyi; Zhang, Youyou; Yuan, Chao-Xing; Xu, Xiaowei; Zhang, Lin

    2016-01-01

    With the advances in sequencing technology and transcriptome analysis, it is estimated that up to 75% of the human genome is transcribed into RNAs. This finding prompted intensive investigations on the biological functions of non-coding RNAs and led to very exciting discoveries of microRNAs as important players in disease pathogenesis and therapeutic applications. Research on long non-coding RNAs (lncRNAs) is in its infancy, yet a broad spectrum of biological regulations has been attributed to lncRNAs. As a novel class of RNA transcripts, the expression level and splicing variants of lncRNAs are various. Northern blot analysis can help us learn about the identity, size, and abundance of lncRNAs. Here we describe how to use northern blot to determine lncRNA abundance and identify different splicing variants of a given lncRNA. PMID:26721491

  19. Molecular Detection of Methicillin-Resistant Staphylococcus aureus by Non-Protein Coding RNA-Mediated Monoplex Polymerase Chain Reaction

    PubMed Central

    Soo Yean, Cheryl Yeap; Selva Raju, Kishanraj; Xavier, Rathinam; Subramaniam, Sreeramanan; Gopinath, Subash C. B.; Chinni, Suresh V.

    2016-01-01

    Non-protein coding RNA (npcRNA) is a functional RNA molecule that is not translated into a protein. Bacterial npcRNAs are structurally diversified molecules, typically 50–200 nucleotides in length. They play a crucial physiological role in cellular networking, including stress responses, replication and bacterial virulence. In this study, by using an identified npcRNA gene (Sau-02) in Methicillin-resistant Staphylococcus aureus (MRSA), we identified the Gram-positive bacteria S. aureus. A Sau-02-mediated monoplex Polymerase Chain Reaction (PCR) assay was designed that displayed high sensitivity and specificity. Fourteen different bacteria and 18 S. aureus strains were tested, and the results showed that the Sau-02 gene is specific to S. aureus. The detection limit was tested against genomic DNA from MRSA and was found to be ~10 genome copies. Further, the detection was extended to whole-cell MRSA detection, and we reached the detection limit with two bacteria. The monoplex PCR assay demonstrated in this study is a novel detection method that can replicate other npcRNA-mediated detection assays. PMID:27367909

  20. Noncoder: a web interface for exon array-based detection of long non-coding RNAs

    PubMed Central

    Gellert, Pascal; Ponomareva, Yuliya; Braun, Thomas; Uchida, Shizuka

    2013-01-01

    Due to recent technical developments, a high number of long non-coding RNAs (lncRNAs) have been discovered in mammals. Although it has been shown that lncRNAs are regulated differently among tissues and disease statuses, functions of these transcripts are still unknown in most cases. GeneChip Exon 1.0 ST Arrays (exon arrays) from Affymetrix, Inc. have been used widely to profile genome-wide expression changes and alternative splicing of protein-coding genes. Here, we demonstrate that re-annotation of exon array probes can be used to profile expressions of tens of thousands of lncRNAs. With this annotation, a detailed inspection of lncRNAs and their isoforms is possible. To allow for a general usage to the research community, we developed a user-friendly web interface called ‘noncoder’. By uploading CEL files from exon arrays and with a few mouse clicks and parameter settings, exon array data will be normalized and analysed to identify differentially expressed lncRNAs. Noncoder provides the detailed annotation information of lncRNAs and is equipped with unique features to allow for an efficient search for interesting lncRNAs to be studied further. The web interface is available at http://noncoder.mpi-bn.mpg.de. PMID:23012263

  1. Executive summary

    NASA Technical Reports Server (NTRS)

    Ayon, Juan A.

    1992-01-01

    The Astrotech 21 Optical Systems Technology Workshop was held in Pasadena, California on March 6-8, 1991. The purpose of the workshop was to examine the state of Optical Systems Technology at the National Aeronautics Space Administration (NASA), and in industry and academia, in view of the potential Astrophysics mission set currently being considered for the late 1990's through the first quarter of the 21st century. The principal result of the workshop is this publication, which contains an assessment of the current state of the technology, and specific technology advances in six critical areas of optics, all necessary for the mission set. The workshop was divided into six panels, each of about a dozen experts in specific fields, representing NASA, industry, and academia. In addition, each panel contained expertise that spanned the spectrum from x-ray to submillimeter wavelengths. This executive summary contains the principal recommendations of each panel. The six technology panels and their chairs were: (1) Wavefront Sensing, Control, and Pointing, Thomas Pitts, Itek Optical Systems, A Division of Litton; (2) Fabrication, Roger Angel, Steward Observatory, University of Arizona; (3) Materials and Structures, Theodore Saito, Lawrence Livermore National Laboratory; (4) Optical Testing, James Wyant, WYKO Corporation; (5) Optical Systems Integrated Modeling, Robert R. Shannon, Optical Sciences Center, University of Arizona; and (6) Advanced Optical Instruments Technology, Michael Shao, Jet Propulsion Laboratory, California Institute of Technology. This Executive Summary contains the principal recommendations of each panel.

  2. Development of a Magnetic Electrochemical Bar Code Array for Point Mutation Detection in the H5N1 Neuraminidase Gene

    PubMed Central

    Krejcova, Ludmila; Hynek, David; Kopel, Pavel; Merlos Rodrigo, Miguel Angel; Adam, Vojtech; Hubalek, Jaromir; Babula, Petr; Trnkova, Libuse; Kizek, Rene

    2013-01-01

    Since its first official detection in the Guangdong province of China in 1996, the highly pathogenic avian influenza virus of H5N1 subtype (HPAI H5N1) has reportedly been the cause of outbreaks in birds in more than 60 countries, 24 of which were European. The main issue is still to develop effective antiviral drugs. In this case, single point mutation in the neuraminidase gene, which causes resistance to antiviral drug and is, therefore, subjected to many studies including ours, was observed. In this study, we developed magnetic electrochemical bar code array for detection of single point mutations (mismatches in up to four nucleotides) in H5N1 neuraminidase gene. Paramagnetic particles Dynabeads® with covalently bound oligo (dT)25 were used as a tool for isolation of complementary H5N1 chains (H5N1 Zhejin, China and Aichi). For detection of H5N1 chains, oligonucleotide chains of lengths of 12 (+5 adenine) or 28 (+5 adenine) bp labeled with quantum dots (CdS, ZnS and/or PbS) were used. Individual probes hybridized to target molecules specifically with efficiency higher than 60%. The obtained signals identified mutations present in the sequence. Suggested experimental procedure allows obtaining further information from the redox signals of nucleic acids. Moreover, the used biosensor exhibits sequence specificity and low limits of detection of subnanogram quantities of target nucleic acids. PMID:23860384

  3. Complementary code and digital filtering for detection of weak VHF radar signals from the mesoscale

    NASA Astrophysics Data System (ADS)

    Schmidt, G.; Ruster, R.; Czechowsky, P.

    1983-12-01

    The SOUSY-VHF-Radar operates at a frequency of 53.5 MHz in a valley in the Harz mountains, Germany, 90 km from Hanover. The radar controller, which is programmed by a 16-bit computer holds 1024 program steps in core and controls, via 8 channels, the whole radar system: in particular the master oscillator, the transmitter, the transmit-receive-switch, the receiver, the analog to digital converter, and the hardware adder. The high-sensitivity receiver has a dynamic range of 70 dB and a video bandwidth of 1 MHz. Phase coding schemes are applied, in particular for investigations at mesospheric heights, in order to carry out measurements with the maximum duty cycle and the maximum height resolution. The computer takes the data from the adder to store it in magnetic tape or disc. The radar controller is programmed by the computer using simple FORTRAN IV statements. After the program has been loaded and the computer has started the radar controller, it runs automatically, stopping at the program end. In case of errors or failures occurring during the radar operation, the radar controller is shut off caused either by a safety circuit or by a power failure circuit or by a parity check system.

  4. A study of redundancy management strategy for tetrad strap-down inertial systems. [error detection codes

    NASA Technical Reports Server (NTRS)

    Hruby, R. J.; Bjorkman, W. S.; Schmidt, S. F.; Carestia, R. A.

    1979-01-01

    Algorithms were developed that attempt to identify which sensor in a tetrad configuration has experienced a step failure. An algorithm is also described that provides a measure of the confidence with which the correct identification was made. Experimental results are presented from real-time tests conducted on a three-axis motion facility utilizing an ortho-skew tetrad strapdown inertial sensor package. The effects of prediction errors and of quantization on correct failure identification are discussed as well as an algorithm for detecting second failures through prediction.

  5. A positive detecting code and its decoding algorithm for DNA library screening.

    PubMed

    Uehara, Hiroaki; Jimbo, Masakazu

    2009-01-01

    The study of gene functions requires high-quality DNA libraries. However, a large number of tests and screenings are necessary for compiling such libraries. We describe an algorithm for extracting as much information as possible from pooling experiments for library screening. Collections of clones are called pools, and a pooling experiment is a group test for detecting all positive clones. The probability of positiveness for each clone is estimated according to the outcomes of the pooling experiments. Clones with high chance of positiveness are subjected to confirmatory testing. In this paper, we introduce a new positive clone detecting algorithm, called the Bayesian network pool result decoder (BNPD). The performance of BNPD is compared, by simulation, with that of the Markov chain pool result decoder (MCPD) proposed by Knill et al. in 1996. Moreover, the combinatorial properties of pooling designs suitable for the proposed algorithm are discussed in conjunction with combinatorial designs and d-disjunct matrices. We also show the advantage of utilizing packing designs or BIB designs for the BNPD algorithm.

  6. Fully automated macular pathology detection in retina optical coherence tomography images using sparse coding and dictionary learning

    NASA Astrophysics Data System (ADS)

    Sun, Yankui; Li, Shan; Sun, Zhongyang

    2017-01-01

    We propose a framework for automated detection of dry age-related macular degeneration (AMD) and diabetic macular edema (DME) from retina optical coherence tomography (OCT) images, based on sparse coding and dictionary learning. The study aims to improve the classification performance of state-of-the-art methods. First, our method presents a general approach to automatically align and crop retina regions; then it obtains global representations of images by using sparse coding and a spatial pyramid; finally, a multiclass linear support vector machine classifier is employed for classification. We apply two datasets for validating our algorithm: Duke spectral domain OCT (SD-OCT) dataset, consisting of volumetric scans acquired from 45 subjects-15 normal subjects, 15 AMD patients, and 15 DME patients; and clinical SD-OCT dataset, consisting of 678 OCT retina scans acquired from clinics in Beijing-168, 297, and 213 OCT images for AMD, DME, and normal retinas, respectively. For the former dataset, our classifier correctly identifies 100%, 100%, and 93.33% of the volumes with DME, AMD, and normal subjects, respectively, and thus performs much better than the conventional method; for the latter dataset, our classifier leads to a correct classification rate of 99.67%, 99.67%, and 100.00% for DME, AMD, and normal images, respectively.

  7. Replica Analysis of Multiuser Detection for Code Division Multiple Access with M-Ary Phase-Shift Keying

    NASA Astrophysics Data System (ADS)

    Kato, Hiroyuki; Okada, Masato; Miyoshi, Seiji

    2013-07-01

    We analyze the performance of the maximizer of the posterior marginals (MPM) detector for code division multiple access (CDMA) multiuser detection with M-ary phase shift keying (M-ary PSK) in the large system limit by the replica method. The obtained theory agrees with computer simulation reasonably well. We also derive the theory in the case of the large M limit and discuss the dependence of the properties of M-ary PSK CDMA communication on M. We show that the waterfall phenomenon occurs for both the finite and infinite values of M. We also show that a value of M for which the decoded phase information on the original user symbol becomes minimum exists. Furthermore, we discuss the relationship between the theory based on the replica method and that based on self-consistent signal-to-noise analysis (SCSNA).

  8. Disease outbreak detection through clique covering on a weighted ICPC-coded graph.

    PubMed

    van Vuurden, Klaske; Hartvigsen, Gunnar; Bellika, Johan Gustav

    2008-01-01

    Even after a decade of increased research into the problem of detecting disease outbreaks, we lack a system that can limit the number of patients affected by a potential epidemic by recognising its existence at an early stage. In this paper we suggest the use of a weighted graph representing symptoms with an exceptionally high prevalence. Cliques with high weighted edges in such a graph will represent groups of symptoms that occur together more often than usual. As a result each clique will represent the main symptoms of a disease with a high incidence rate. This will make it easier to diagnose the nature of an outbreak, to reach the affected patients at an early stage and to distinguish between outbreaks occurring simultaneously.

  9. Symbolic Execution Enhanced System Testing

    NASA Technical Reports Server (NTRS)

    Davies, Misty D.; Pasareanu, Corina S.; Raman, Vishwanath

    2012-01-01

    We describe a testing technique that uses information computed by symbolic execution of a program unit to guide the generation of inputs to the system containing the unit, in such a way that the unit's, and hence the system's, coverage is increased. The symbolic execution computes unit constraints at run-time, along program paths obtained by system simulations. We use machine learning techniques treatment learning and function fitting to approximate the system input constraints that will lead to the satisfaction of the unit constraints. Execution of system input predictions either uncovers new code regions in the unit under analysis or provides information that can be used to improve the approximation. We have implemented the technique and we have demonstrated its effectiveness on several examples, including one from the aerospace domain.

  10. An Execution Service for Grid Computing

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Hu, Chaumin

    2004-01-01

    This paper describes the design and implementation of the IPG Execution Service that reliably executes complex jobs on a computational grid. Our Execution Service is part of the IPG service architecture whose goal is to support location-independent computing. In such an environment, once n user ports an npplicntion to one or more hardware/software platfrms, the user can describe this environment to the grid the grid can locate instances of this platfrm, configure the platfrm as required for the application, and then execute the application. Our Execution Service runs jobs that set up such environments for applications and executes them. These jobs consist of a set of tasks for executing applications and managing data. The tasks have user-defined starting conditions that allow users to specih complex dependencies including task to execute when tasks fail, afiequent occurrence in a large distributed system, or are cancelled. The execution task provided by our service also configures the application environment exactly as specified by the user and captures the exit code of the application, features that many grid execution services do not support due to dflculties interfacing to local scheduling systems.

  11. Executive Functioning in Schizophrenia

    PubMed Central

    Orellana, Gricel; Slachevsky, Andrea

    2013-01-01

    The executive function (EF) is a set of abilities, which allows us to invoke voluntary control of our behavioral responses. These functions enable human beings to develop and carry out plans, make up analogies, obey social rules, solve problems, adapt to unexpected circumstances, do many tasks simultaneously, and locate episodes in time and place. EF includes divided attention and sustained attention, working memory (WM), set-shifting, flexibility, planning, and the regulation of goal directed behavior and can be defined as a brain function underlying the human faculty to act or think not only in reaction to external events but also in relation with internal goals and states. EF is mostly associated with dorsolateral prefrontal cortex (PFC). Besides EF, PFC is involved in self-regulation of behavior, i.e., the ability to regulate behavior according to internal goals and constraints, particularly in less structured situations. Self-regulation of behavior is subtended by ventral medial/orbital PFC. Impairment of EF is one of the most commonly observed deficits in schizophrenia through the various disease stages. Impairment in tasks measuring conceptualization, planning, cognitive flexibility, verbal fluency, ability to solve complex problems, and WM occur in schizophrenia. Disorders detected by executive tests are consistent with evidence from functional neuroimaging, which have shown PFC dysfunction in patients while performing these kinds of tasks. Schizophrenics also exhibit deficit in odor identifying, decision-making, and self-regulation of behavior suggesting dysfunction of the orbital PFC. However, impairment in executive tests is explained by dysfunction of prefronto-striato-thalamic, prefronto-parietal, and prefronto-temporal neural networks mainly. Disorders in EFs may be considered central facts with respect to schizophrenia and it has been suggested that negative symptoms may be explained by that executive dysfunction. PMID:23805107

  12. Task-Specific Codes for Face Recognition: How they Shape the Neural Representation of Features for Detection and Individuation

    PubMed Central

    2008-01-01

    Background The variety of ways in which faces are categorized makes face recognition challenging for both synthetic and biological vision systems. Here we focus on two face processing tasks, detection and individuation, and explore whether differences in task demands lead to differences both in the features most effective for automatic recognition and in the featural codes recruited by neural processing. Methodology/Principal Findings Our study appeals to a computational framework characterizing the features representing object categories as sets of overlapping image fragments. Within this framework, we assess the extent to which task-relevant information differs across image fragments. Based on objective differences we find among task-specific representations, we test the sensitivity of the human visual system to these different face descriptions independently of one another. Both behavior and functional magnetic resonance imaging reveal effects elicited by objective task-specific levels of information. Behaviorally, recognition performance with image fragments improves with increasing task-specific information carried by different face fragments. Neurally, this sensitivity to the two tasks manifests as differential localization of neural responses across the ventral visual pathway. Fragments diagnostic for detection evoke larger neural responses than non-diagnostic ones in the right posterior fusiform gyrus and bilaterally in the inferior occipital gyrus. In contrast, fragments diagnostic for individuation evoke larger responses than non-diagnostic ones in the anterior inferior temporal gyrus. Finally, for individuation only, pattern analysis reveals sensitivity to task-specific information within the right “fusiform face area”. Conclusions/Significance Our results demonstrate: 1) information diagnostic for face detection and individuation is roughly separable; 2) the human visual system is independently sensitive to both types of information; 3) neural

  13. Coding Gene Single Nucleotide Polymorphism Mapping and Quantitative Trait Loci Detection for Physiological Reproductive Traits in Brook Charr, Salvelinus fontinalis

    PubMed Central

    Sauvage, Christopher; Vagner, Marie; Derôme, Nicolas; Audet, Céline; Bernatchez, Louis

    2012-01-01

    A linkage map of 40 linkage groups (LGs) was developed for brook charr, Salvelinus fontinalis, using an F2 interstrain hybrid progeny (n = 171) and 256 coding gene SNP developed specifically for brook charr and validated from a large (>1000) subset of putative SNP, as well as 81 microsatellite markers. To identify quantitative trait loci (QTL) related to reproduction functions, these fish were also phenotyped at six physiological traits, including spermatozoid head diameter, sperm concentration, plasma testosterone, plasma 11-keto-testosterone, egg diameter, and plasma 17β-estradiol. Five significant QTL were detected over four LGs for egg diameter and plasma 17β-estradiol concentration in females, and sperm concentration as well as spermatozoid head diameter in males. In females, two different QTLs located on LG 11 and LG 34 were associated with the egg number, whereas one QTL was associated with plasma 17β-estradiol concentration (LG 8). Their total percent variance explained (PVE) was 26.7% and 27.6%, respectively. In males, two QTL were also detected for the sperm concentration, and their PVE were estimated at 18.58% and 14.95%, respectively. The low QTL number, associated with the high PVE, suggests that the variance in these reproductive physiological traits was either under the control of one major gene or a small number of genes. The QTL associated with sperm concentration, plasma 17β-estradiol, and egg diameter appeared to be under a dominance effect, whereas the two others were under a negative additive effect. These results show that genes underlying the phenotypic variance of these traits are under different modes of action (additive vs. dominance) and may be used to predict an increase or a decrease in their phenotypic values in subsequent generations of selective breeding. Moreover, this newly developed panel of mapped SNP located in coding gene regions will be useful for screening wild populations, especially in the context of investigating the

  14. Research in Mathematics and Computer Science: Calculation of the Probability of Undetected Error for Certain Error Detection Codes. Phase 1

    DTIC Science & Technology

    1989-03-31

    pectively. Figure 3. Code Weight Viewor for Dual of Code C2. -9- IQUALCOMM. Inc. Final Technical Repo for the Research in Mafthmatics and Cmputer Sience ...efforts. ANDREW J. VITERBI VICE CHAIRMAN AND CHIEF TECHNICAL OFFICER Education : Andrew J. Viterbi received the S.B. and S.M. degrees in Electrical...Coding, (with J.K. Omura), McGraw-Hill, 1979. JACK K. WOLF ENGINEERING ASSOCIATE Education : Jack Keil Wolf is a chaired professor in the Center for

  15. SMARTS: Exploiting Temporal Locality and Parallelism through Vertical Execution

    SciTech Connect

    Beckman, P.; Crotinger, J.; Karmesin, S.; Malony, A.; Oldehoeft, R.; Shende, S.; Smith, S.; Vajracharya, S.

    1999-01-04

    In the solution of large-scale numerical prob- lems, parallel computing is becoming simultaneously more important and more difficult. The complex organization of today's multiprocessors with several memory hierarchies has forced the scientific programmer to make a choice between simple but unscalable code and scalable but extremely com- plex code that does not port to other architectures. This paper describes how the SMARTS runtime system and the POOMA C++ class library for high-performance scientific computing work together to exploit data parallelism in scientific applications while hiding the details of manag- ing parallelism and data locality from the user. We present innovative algorithms, based on the macro -dataflow model, for detecting data parallelism and efficiently executing data- parallel statements on shared-memory multiprocessors. We also desclibe how these algorithms can be implemented on clusters of SMPS.

  16. Detecting Selection in the Blue Crab, Callinectes sapidus, Using DNA Sequence Data from Multiple Nuclear Protein-Coding Genes

    PubMed Central

    Yednock, Bree K.; Neigel, Joseph E.

    2014-01-01

    The identification of genes involved in the adaptive evolution of non-model organisms with uncharacterized genomes constitutes a major challenge. This study employed a rigorous and targeted candidate gene approach to test for positive selection on protein-coding genes of the blue crab, Callinectes sapidus. Four genes with putative roles in physiological adaptation to environmental stress were chosen as candidates. A fifth gene not expected to play a role in environmental adaptation was used as a control. Large samples (n>800) of DNA sequences from C. sapidus were used in tests of selective neutrality based on sequence polymorphisms. In combination with these, sequences from the congener C. similis were used in neutrality tests based on interspecific divergence. In multiple tests, significant departures from neutral expectations and indicative of positive selection were found for the candidate gene trehalose 6-phosphate synthase (tps). These departures could not be explained by any of the historical population expansion or bottleneck scenarios that were evaluated in coalescent simulations. Evidence was also found for balancing selection at ATP-synthase subunit 9 (atps) using a maximum likelihood version of the Hudson, Kreitmen, and Aguadé test, and positive selection favoring amino acid replacements within ATP/ADP translocase (ant) was detected using the McDonald-Kreitman test. In contrast, test statistics for the control gene, ribosomal protein L12 (rpl), which presumably has experienced the same demographic effects as the candidate loci, were not significantly different from neutral expectations and could readily be explained by demographic effects. Together, these findings demonstrate the utility of the candidate gene approach for investigating adaptation at the molecular level in a marine invertebrate for which extensive genomic resources are not available. PMID:24896825

  17. Detecting selection in the blue crab, Callinectes sapidus, using DNA sequence data from multiple nuclear protein-coding genes.

    PubMed

    Yednock, Bree K; Neigel, Joseph E

    2014-01-01

    The identification of genes involved in the adaptive evolution of non-model organisms with uncharacterized genomes constitutes a major challenge. This study employed a rigorous and targeted candidate gene approach to test for positive selection on protein-coding genes of the blue crab, Callinectes sapidus. Four genes with putative roles in physiological adaptation to environmental stress were chosen as candidates. A fifth gene not expected to play a role in environmental adaptation was used as a control. Large samples (n>800) of DNA sequences from C. sapidus were used in tests of selective neutrality based on sequence polymorphisms. In combination with these, sequences from the congener C. similis were used in neutrality tests based on interspecific divergence. In multiple tests, significant departures from neutral expectations and indicative of positive selection were found for the candidate gene trehalose 6-phosphate synthase (tps). These departures could not be explained by any of the historical population expansion or bottleneck scenarios that were evaluated in coalescent simulations. Evidence was also found for balancing selection at ATP-synthase subunit 9 (atps) using a maximum likelihood version of the Hudson, Kreitmen, and Aguadé test, and positive selection favoring amino acid replacements within ATP/ADP translocase (ant) was detected using the McDonald-Kreitman test. In contrast, test statistics for the control gene, ribosomal protein L12 (rpl), which presumably has experienced the same demographic effects as the candidate loci, were not significantly different from neutral expectations and could readily be explained by demographic effects. Together, these findings demonstrate the utility of the candidate gene approach for investigating adaptation at the molecular level in a marine invertebrate for which extensive genomic resources are not available.

  18. Code Speed Measuring for VC++

    DTIC Science & Technology

    2015-10-01

    UNCLASSIFIED AD-E403 688 Technical Report ARWSE-TR-14025 CODE SPEED MEASURING FOR VC++ Tom Nealis...TYPE Final 3. DATES COVERED (From – To) 4. TITLE AND SUBTITLE CODE SPEED MEASURING FOR VC++ 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...ABSTRACT It’s often important to know how fast a snippet of code executes. This information allows the coder to make important decisions

  19. Multiprocessor execution of functional programs

    SciTech Connect

    Goldberg, B. )

    1988-10-01

    Functional languages have recently gained attention as vehicles for programming in a concise and element manner. In addition, it has been suggested that functional programming provides a natural methodology for programming multiprocessor computers. This paper describes research that was performed to demonstrate that multiprocessor execution of functional programs on current multiprocessors is feasible, and results in a significant reduction in their execution times. Two implementations of the functional language ALFL were built on commercially available multiprocessors. Alfalfa is an implementation on the Intel iPSC hypercube multiprocessor, and Buckwheat is an implementation on the Encore Multimax shared-memory multiprocessor. Each implementation includes a compiler that performs automatic decomposition of ALFL programs and a run-time system that supports their execution. The compiler is responsible for detecting the inherent parallelism in a program, and decomposing the program into a collection of tasks, called serial combinators, that can be executed in parallel. The abstract machine model supported by Alfalfa and Buckwheat is called heterogeneous graph reduction, which is a hybrid of graph reduction and conventional stack-oriented execution. This model supports parallelism, lazy evaluation, and higher order functions while at the same time making efficient use of the processors in the system. The Alfalfa and Buckwheat runtime systems support dynamic load balancing, interprocessor communication (if required), and storage management. A large number of experiments were performed on Alfalfa and Buckwheat for a variety of programs. The results of these experiments, as well as the conclusions drawn from them, are presented.

  20. The Future College Executive.

    ERIC Educational Resources Information Center

    Boston Coll., Chestnut Hill, MA.

    This conference report examines various problems facing university administrators and discusses the future role of the executive in American colleges and universities. Conference papers concern the future college executive; efficiency, accountability and the college executive; administrative concerns; and the rights of college administrators. (MJM)

  1. Chief executives. Staying afloat.

    PubMed

    Spurgeon, P; Clark, J; Smith, C

    2001-09-27

    A study of chief executives identified the ability to prioritize, clear vision, resilence, and willingness to take decisions as key factors in success. Some wanted more active involvement from the regional director. Chief executives could be subject to 360-degree assessment. More work is needed to establish the compatibility of chief executives and chairs.

  2. Architectures for Secure Portable Executable Content.

    ERIC Educational Resources Information Center

    Gritzalis, Stefanos; Aggelis, George; Spinellis, Diomidis

    1999-01-01

    Discusses downloadable executable content, or mobile code, on the World Wide Web; evaluates the security features offered by the Java and Safe-Tcl programming languages; and describes the basic mechanisms of each of the proposed security models. Presents current implementations, as well as upcoming extensions, and evaluates their efficiency and…

  3. C.U.R.R.F. (Codon Usage regarding Restriction Finder): a free Java(®)-based tool to detect potential restriction sites in both coding and non-coding DNA sequences.

    PubMed

    Gatter, Michael; Gatter, Thomas; Matthäus, Falk

    2012-10-01

    The synthesis of complete genes is becoming a more and more popular approach in heterologous gene expression. Reasons for this are the decreasing prices and the numerous advantages in comparison to classic molecular cloning methods. Two of these advantages are the possibility to adapt the codon usage to the host organism and the option to introduce restriction enzyme target sites of choice. C.U.R.R.F. (Codon Usage regarding Restriction Finder) is a free Java(®)-based software program which is able to detect possible restriction sites in both coding and non-coding DNA sequences by introducing multiple silent or non-silent mutations, respectively. The deviation of an alternative sequence containing a desired restriction motive from the sequence with the optimal codon usage is considered during the search of potential restriction sites in coding DNA and mRNA sequences as well as protein sequences. C.U.R.R.F is available at http://www.zvm.tu-dresden.de/die_tu_dresden/fakultaeten/fakultaet_mathematik_und_naturwissenschaften/fachrichtung_biologie/mikrobiologie/allgemeine_mikrobiologie/currf.

  4. Tabled Execution in Scheme

    SciTech Connect

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  5. Mobile, hybrid Compton/coded aperture imaging for detection, identification and localization of gamma-ray sources at stand-off distances

    NASA Astrophysics Data System (ADS)

    Tornga, Shawn R.

    The Stand-off Radiation Detection System (SORDS) program is an Advanced Technology Demonstration (ATD) project through the Department of Homeland Security's Domestic Nuclear Detection Office (DNDO) with the goal of detection, identification and localization of weak radiological sources in the presence of large dynamic backgrounds. The Raytheon-SORDS Tri-Modal Imager (TMI) is a mobile truck-based, hybrid gamma-ray imaging system able to quickly detect, identify and localize, radiation sources at standoff distances through improved sensitivity while minimizing the false alarm rate. Reconstruction of gamma-ray sources is performed using a combination of two imaging modalities; coded aperture and Compton scatter imaging. The TMI consists of 35 sodium iodide (NaI) crystals 5x5x2 in3 each, arranged in a random coded aperture mask array (CA), followed by 30 position sensitive NaI bars each 24x2.5x3 in3 called the detection array (DA). The CA array acts as both a coded aperture mask and scattering detector for Compton events. The large-area DA array acts as a collection detector for both Compton scattered events and coded aperture events. In this thesis, developed coded aperture, Compton and hybrid imaging algorithms will be described along with their performance. It will be shown that multiple imaging modalities can be fused to improve detection sensitivity over a broader energy range than either alone. Since the TMI is a moving system, peripheral data, such as a Global Positioning System (GPS) and Inertial Navigation System (INS) must also be incorporated. A method of adapting static imaging algorithms to a moving platform has been developed. Also, algorithms were developed in parallel with detector hardware, through the use of extensive simulations performed with the Geometry and Tracking Toolkit v4 (GEANT4). Simulations have been well validated against measured data. Results of image reconstruction algorithms at various speeds and distances will be presented as well as

  6. A dual-amplified electrochemical detection of mRNA based on duplex-specific nuclease and bio-bar-code conjugates.

    PubMed

    Li, Xue-Mei; Wang, Lin-Lin; Luo, Jie; Wei, Qing-Li

    2015-03-15

    On the basis of strong preference for cleaving double-stranded DNA or DNA in DNA:RNA heteroduplexes of duplex-specific nuclease (DSN), a dual-amplified electrochemical detection of mRNA was developed in this article, by coupling the enhancement of DSN and bio-bar-code conjugates. Capture probe was linked with magnetic nanoparticles (MNPs) at its 5' end and bio-bar-code at its 3' end. In the presence of target surviving mRNA, all hybridized S1 strands were cleaved off the biosensor by the DSN, and the bio-bar-code probe with CdS nanoparticles (CdS NPs) was released into the solution. The metal sulfide nanoparticles were measured by anodic stripping voltammetry (ASV) subsequently. This assay exhibited high sensitivity and selectivity with a detection limit of 0.48fM. In addition, we proved that this simple and cost-effective strategy is capable of detecting the target in complicated biological samples and holds great potential application in biomedical research and clinical diagnostics.

  7. The Senior Executive Service

    NASA Technical Reports Server (NTRS)

    1992-01-01

    A major innovation of the Civil Service Reform Act of 1978 was the creation of a Senior Executive Service (SES). The purpose of the SES is both simple and bold: to attract executives of the highest quality into Federal service and to retain them by providing outstanding opportunities for career growth and reward. The SES is intended to: provide greater authority in managing executive resources; attract and retain highly competent executives, and assign them where they will effectively accomplish their missions and best use their talents; provide for systematic development of executives; hold executives accountable for individual and organizational performance; reward outstanding performers and remove poor performers; and provide for an executive merit system free of inappropriate personnel practices and arbitrary actions. This Handbook summarizes the key features of the SES at NASA. It is intended as a special welcome to new appointees and also as a general reference document. It contains an overview of SES management at NASA, including the Executive Resources Board and the Performance Review Board, which are mandated by law to carry out key SES functions. In addition, assistance is provided by a Senior Executive Committee in certain reviews and decisions and by Executive Position Managers in day-to-day administration and oversight.

  8. Clinical coding. Code breakers.

    PubMed

    Mathieson, Steve

    2005-02-24

    --The advent of payment by results has seen the role of the clinical coder pushed to the fore in England. --Examinations for a clinical coding qualification began in 1999. In 2004, approximately 200 people took the qualification. --Trusts are attracting people to the role by offering training from scratch or through modern apprenticeships.

  9. Experience with Remote Job Execution

    SciTech Connect

    Lynch, Vickie E; Cobb, John W; Green, Mark L; Kohl, James Arthur; Miller, Stephen D; Ren, Shelly; Smith, Bradford C; Vazhkudai, Sudharshan S

    2008-01-01

    The Neutron Science Portal at Oak Ridge National Laboratory submits jobs to the TeraGrid for remote job execution. The TeraGrid is a network of high performance computers supported by the US National Science Foundation. There are eleven partner facilities with over a petaflop of peak computing performance and sixty petabytes of long-term storage. Globus is installed on a local machine and used for job submission. The graphical user interface is produced by java coding that reads an XML file. After submission, the status of the job is displayed in a Job Information Service window which queries globus for the status. The output folder produced in the scratch directory of the TeraGrid machine is returned to the portal with globus-url-copy command that uses the gridftp servers on the TeraGrid machines. This folder is copied from the stage-in directory of the community account to the user's results directory where the output can be plotted using the portal's visualization services. The primary problem with remote job execution is diagnosing execution problems. We have daily tests of submitting multiple remote jobs from the portal. When these jobs fail on a computer, it is difficult to diagnose the problem from the globus output. Successes and problems will be presented.

  10. Stealth transmission of temporal phase en/decoded polarization-modulated-code-shift-keying optical-code-division multiple-access signal over synchronous digital hierarchy network with asynchronous detection

    NASA Astrophysics Data System (ADS)

    Chen, Yinfang; Wang, Rong; Fang, Tao; Pu, Tao; Xiang, Peng; Zhu, Huatao; Zheng, Jilin

    2014-06-01

    An innovative approach for security-enhanced optical stealth transmission in a synchronous digital hierarchy network is proposed and experimentally investigated. The security enhancement is achieved through a signal modulation format, so-called polarization-modulated-code-shift-keying, which is implemented with two superstructured fiber Bragg gratings-based optical-code-division multiple-access encoders and a polarization modulator. The proposed modulation format can provide a constant energy level for both bits 0's and 1's, which avoids secure vulnerability of single-stealth-user with on-off-keying modulation before coupling into the host channel and after the cascade of filters. Moreover, a self-made cost-effective gain-switched distributed feedback laser with relatively narrow spectrum is first employed as a stealth optical source, which greatly reduces the system cost and complexity. The stealth signal is recovered and detected asynchronously. The experimental results show high secure performance and robustness against eavesdropping, while keeping a bit error rate below forward error correction limit.

  11. Executive Mind, Timely Action.

    ERIC Educational Resources Information Center

    Torbert, William R.

    1983-01-01

    The idea of "Executive Mind" carries with it the notion of purposeful and effective action. Part I of this paper characterizes three complements to "Executive Mind"--"Observing Mind,""Theorizing Mind," and "Passionate Mind"--and offers historical figures exemplifying all four types. The concluding…

  12. Identifying Executable Plans

    NASA Technical Reports Server (NTRS)

    Bedrax-Weiss, Tania; Jonsson, Ari K.; Frank, Jeremy D.; McGann, Conor

    2003-01-01

    Generating plans for execution imposes a different set of requirements on the planning process than those imposed by planning alone. In highly unpredictable execution environments, a fully-grounded plan may become inconsistent frequently when the world fails to behave as expected. Intelligent execution permits making decisions when the most up-to-date information is available, ensuring fewer failures. Planning should acknowledge the capabilities of the execution system, both to ensure robust execution in the face of uncertainty, which also relieves the planner of the burden of making premature commitments. We present Plan Identification Functions (PIFs), which formalize what it means for a plan to be executable, md are used in conjunction with a complete model of system behavior to halt the planning process when an executable plan is found. We describe the implementation of plan identification functions for a temporal, constraint-based planner. This particular implementation allows the description of many different plan identification functions. characteristics crf the xectieonfvii rnm-enft,h e best plan to hand to the execution system will contain more or less commitment and information.

  13. Utility of rapid database searching for quality assurance: 'detective work' in uncovering radiology coding and billing errors

    NASA Astrophysics Data System (ADS)

    Horii, Steven C.; Kim, Woojin; Boonn, William; Iyoob, Christopher; Maston, Keith; Coleman, Beverly G.

    2011-03-01

    When the first quarter of 2010 Department of Radiology statistics were provided to the Section Chiefs, the authors (SH, BC) were alarmed to discover that Ultrasound showed a decrease of 2.5 percent in billed examinations. This seemed to be in direct contradistinction to the experience of the ultrasound faculty members and sonographers. Their experience was that they were far busier than during the same quarter of 2009. The one exception that all acknowledged was the month of February, 2010 when several major winter storms resulted in a much decreased Hospital admission and Emergency Department visit rate. Since these statistics in part help establish priorities for capital budget items, professional and technical staffing levels, and levels of incentive salary, they are taken very seriously. The availability of a desktop, Web-based RIS database search tool developed by two of the authors (WK, WB) and built-in database functions of the ultrasound miniPACS, made it possible for us very rapidly to develop and test hypotheses for why the number of billable examinations was declining in the face of what experience told the authors was an increasing number of examinations being performed. Within a short time, we identified the major cause as errors on the part of the company retained to verify billable Current Procedural Terminology (CPT) codes against ultrasound reports. This information is being used going forward to recover unbilled examinations and take measures to reduce or eliminate the types of coding errors that resulted in the problem.

  14. Multi-Sensor Detection with Particle Swarm Optimization for Time-Frequency Coded Cooperative WSNs Based on MC-CDMA for Underground Coal Mines

    PubMed Central

    Xu, Jingjing; Yang, Wei; Zhang, Linyuan; Han, Ruisong; Shao, Xiaotao

    2015-01-01

    In this paper, a wireless sensor network (WSN) technology adapted to underground channel conditions is developed, which has important theoretical and practical value for safety monitoring in underground coal mines. According to the characteristics that the space, time and frequency resources of underground tunnel are open, it is proposed to constitute wireless sensor nodes based on multicarrier code division multiple access (MC-CDMA) to make full use of these resources. To improve the wireless transmission performance of source sensor nodes, it is also proposed to utilize cooperative sensors with good channel conditions from the sink node to assist source sensors with poor channel conditions. Moreover, the total power of the source sensor and its cooperative sensors is allocated on the basis of their channel conditions to increase the energy efficiency of the WSN. To solve the problem that multiple access interference (MAI) arises when multiple source sensors transmit monitoring information simultaneously, a kind of multi-sensor detection (MSD) algorithm with particle swarm optimization (PSO), namely D-PSO, is proposed for the time-frequency coded cooperative MC-CDMA WSN. Simulation results show that the average bit error rate (BER) performance of the proposed WSN in an underground coal mine is improved significantly by using wireless sensor nodes based on MC-CDMA, adopting time-frequency coded cooperative transmission and D-PSO algorithm with particle swarm optimization. PMID:26343660

  15. Multi-Sensor Detection with Particle Swarm Optimization for Time-Frequency Coded Cooperative WSNs Based on MC-CDMA for Underground Coal Mines.

    PubMed

    Xu, Jingjing; Yang, Wei; Zhang, Linyuan; Han, Ruisong; Shao, Xiaotao

    2015-08-27

    In this paper, a wireless sensor network (WSN) technology adapted to underground channel conditions is developed, which has important theoretical and practical value for safety monitoring in underground coal mines. According to the characteristics that the space, time and frequency resources of underground tunnel are open, it is proposed to constitute wireless sensor nodes based on multicarrier code division multiple access (MC-CDMA) to make full use of these resources. To improve the wireless transmission performance of source sensor nodes, it is also proposed to utilize cooperative sensors with good channel conditions from the sink node to assist source sensors with poor channel conditions. Moreover, the total power of the source sensor and its cooperative sensors is allocated on the basis of their channel conditions to increase the energy efficiency of the WSN. To solve the problem that multiple access interference (MAI) arises when multiple source sensors transmit monitoring information simultaneously, a kind of multi-sensor detection (MSD) algorithm with particle swarm optimization (PSO), namely D-PSO, is proposed for the time-frequency coded cooperative MC-CDMA WSN. Simulation results show that the average bit error rate (BER) performance of the proposed WSN in an underground coal mine is improved significantly by using wireless sensor nodes based on MC-CDMA, adopting time-frequency coded cooperative transmission and D-PSO algorithm with particle swarm optimization.

  16. Data processing with microcode designed with source coding

    DOEpatents

    McCoy, James A; Morrison, Steven E

    2013-05-07

    Programming for a data processor to execute a data processing application is provided using microcode source code. The microcode source code is assembled to produce microcode that includes digital microcode instructions with which to signal the data processor to execute the data processing application.

  17. Memoized Symbolic Execution

    NASA Technical Reports Server (NTRS)

    Yang, Guowei; Pasareanu, Corina S.; Khurshid, Sarfraz

    2012-01-01

    This paper introduces memoized symbolic execution (Memoise), a novel approach for more efficient application of forward symbolic execution, which is a well-studied technique for systematic exploration of program behaviors based on bounded execution paths. Our key insight is that application of symbolic execution often requires several successive runs of the technique on largely similar underlying problems, e.g., running it once to check a program to find a bug, fixing the bug, and running it again to check the modified program. Memoise introduces a trie-based data structure that stores the key elements of a run of symbolic execution. Maintenance of the trie during successive runs allows re-use of previously computed results of symbolic execution without the need for re-computing them as is traditionally done. Experiments using our prototype embodiment of Memoise show the benefits it holds in various standard scenarios of using symbolic execution, e.g., with iterative deepening of exploration depth, to perform regression analysis, or to enhance coverage.

  18. Field and Pretreatment-free Detection of Heavy Metal Ions in Organic Polluted Water through Alkyne-coded SERS Test Kit.

    PubMed

    Zeng, Yi; Ren, Jia-Qiang; Shen, Ai-Guo; Hu, Ji-Ming

    2016-10-03

    Field and pretreatment-free detection of heavy metal ions in organic polluted water is important but still challenging in current water pollution emergency response system. Here we report a Poly adenine-DNA-mediated approach for rationally designed alkyne-coded surface-enhanced Raman scattering (SERS) test kit, enabling rapid and simultaneous detection of Hg2+ and Ag+ by portable spectrometer, impervious to organic interferences. Due to the formation of thymine (T)-Hg2+-T and cytosine (C)-Ag+-C, highly recognizable SERS signals are rapidly detected when two different alkynes labeled gold nanoparticles (AuNPs) are induced to undergo controllable bridging upon the additive of low volume targets. For multiplex detection through portable spectrometer, the limits of detection reach 0.77 nM and 0.86 nM for Hg2+ and Ag+, respectively. Of particular significance, the proposed C≡C contained Raman reporters provide an extremely effective solution for multiplex sensing in spectral silent region when the hyperspectral and fair intense optical noises originating from lower wave number region (<1800 cm-1) are inevitable under complex ambient conditions.

  19. Tandem Mirror Reactor Systems Code (Version I)

    SciTech Connect

    Reid, R.L.; Finn, P.A.; Gohar, M.Y.; Barrett, R.J.; Gorker, G.E.; Spampinaton, P.T.; Bulmer, R.H.; Dorn, D.W.; Perkins, L.J.; Ghose, S.

    1985-09-01

    A computer code was developed to model a Tandem Mirror Reactor. Ths is the first Tandem Mirror Reactor model to couple, in detail, the highly linked physics, magnetics, and neutronic analysis into a single code. This report describes the code architecture, provides a summary description of the modules comprising the code, and includes an example execution of the Tandem Mirror Reactor Systems Code. Results from this code for two sensitivity studies are also included. These studies are: (1) to determine the impact of center cell plasma radius, length, and ion temperature on reactor cost and performance at constant fusion power; and (2) to determine the impact of reactor power level on cost.

  20. A Hybrid Procedural/Deductive Executive for Autonomous Spacecraft

    NASA Technical Reports Server (NTRS)

    Pell, Barney; Gamble, Edward B.; Gat, Erann; Kessing, Ron; Kurien, James; Millar, William; Nayak, P. Pandurang; Plaunt, Christian; Williams, Brian C.; Lau, Sonie (Technical Monitor)

    1998-01-01

    The New Millennium Remote Agent (NMRA) will be the first AI system to control an actual spacecraft. The spacecraft domain places a strong premium on autonomy and requires dynamic recoveries and robust concurrent execution, all in the presence of tight real-time deadlines, changing goals, scarce resource constraints, and a wide variety of possible failures. To achieve this level of execution robustness, we have integrated a procedural executive based on generic procedures with a deductive model-based executive. A procedural executive provides sophisticated control constructs such as loops, parallel activity, locks, and synchronization which are used for robust schedule execution, hierarchical task decomposition, and routine configuration management. A deductive executive provides algorithms for sophisticated state inference and optimal failure recover), planning. The integrated executive enables designers to code knowledge via a combination of procedures and declarative models, yielding a rich modeling capability suitable to the challenges of real spacecraft control. The interface between the two executives ensures both that recovery sequences are smoothly merged into high-level schedule execution and that a high degree of reactivity is retained to effectively handle additional failures during recovery.

  1. Executive functions in synesthesia.

    PubMed

    Rouw, Romke; van Driel, Joram; Knip, Koen; Richard Ridderinkhof, K

    2013-03-01

    In grapheme-color synesthesia, a number or letter can evoke two different and possibly conflicting (real and synesthetic) color sensations at the same time. In this study, we investigate the relationship between synesthesia and executive control functions. First, no general skill differences were obtained between synesthetes and non-synesthetes in classic executive control paradigms. Furthermore, classic executive control effects did not interact with synesthetic behavioral effects. Third, we found support for our hypothesis that inhibition of a synesthetic color takes effort and time. Finally, individual differences analyses showed no relationship between the two skills; performance on a 'normal' Stroop task does not predict performance on a synesthetic Stroop task. Across four studies, the current results consistently show no clear relationship between executive control functions and synesthetic behavioral effects. This raises the question of which mechanisms are at play in synesthetic 'management' during the presence of two conflicting (real and synesthetic) sensations.

  2. Multiprocessor execution of functional programs

    SciTech Connect

    Goldberg, B.F.

    1988-01-01

    Functional languages have recently gained attention as vehicles for programming in a concise and elegant manner. In addition, it has been suggested that functional programming provides a natural methodology for programming multiprocessor computers. This dissertation demonstrates that multiprocessor execution of functional programs is feasible, and results in a significant reduction in their execution times. Two implementations of the functional language ALFL were built on commercially available multiprocessors. ALFL is an implementation on the Intel iPSC hypercube multiprocessor, and Buckwheat is an implementation on the Encore Multimax shared-memory multiprocessor. Each implementation includes a compiler that performs automatic decomposition of ALFL programs. The compiler is responsible for detecting the inherent parallelism in a program, and decomposing the program into a collection of tasks, called serial combinators, that can be executed in parallel. One of the primary goals of the compiler is to generate serial combinators exhibiting the coarsest granularity possibly without sacrificing useful parallelism. This dissertation describes the algorithms used by the compiler to analyze, decompose, and optimize functional programs. The abstract machine model supported by Alfalfa and Buckwheat is called heterogeneous graph reduction, which is a hybrid of graph reduction and conventional stack-oriented execution. This model supports parallelism, lazy evaluation, and higher order functions while at the same time making efficient use of the processors in the system. The Alfalfa and Buckwheat run-time systems support dynamic load balancing, interprocessor communication (if required) and storage management. A large number of experiments were performed on Alfalfa and Buckwheat for a variety of programs. The results of these experiments, as well as the conclusions drawn from them, are presented.

  3. Sequential Two-Dimensional Partial Response Maximum Likelihood Detection Scheme with Constant-Weight Constraint Code for Holographic Data Storage Systems

    NASA Astrophysics Data System (ADS)

    Kong, Gyuyeol; Choi, Sooyong

    2012-08-01

    A sequential two-dimensional (2D) partial response maximum likelihood (PRML) detection scheme for holographic data storage (HDS) systems is proposed. We use two complexity reduction schemes, a reduced-state trellis and a constant-weight (CW) constraint. In the reduced-state trellis, the limited candidate bits surrounding the target bit are considered for the 2D PRML detector. In the CW constraint, the trellis transitions that violate the CW condition that each code-word block has only one white bit are eliminated. However, the 2D PRML detector using the complexity reduction schemes, which operates on 47 states and 169 branches, has performance degradation. To overcome performance degradation, a sequential detection algorithm uses the estimated a priori probability. By the sequential procedure, we mitigate 2D intersymbol interference with an enhanced reliability of the branch metric. Simulation results show that the proposed 2D PRML detection scheme yields about 3 dB gains over the one-dimensional PRML detection scheme.

  4. Sharing a task or sharing space? On the effect of the confederate in action coding in a detection task.

    PubMed

    Guagnano, Delia; Rusconi, Elena; Umiltà, Carlo Arrigo

    2010-03-01

    Several studies showed a Simon effect when two participants sit close to each other and perform one of the two halves of a two-choice RT task. That is, each participant perform a go-nogo task. A Simon effect emerges, which instead is absent when the same go-nogo tasks are performed individually. Hence the terms were introduced of "social Simon task" and 'social Simon effect". As of now, the social Simon effect was observed with social Simon tasks that overtly gave the participants the impression of being performing in collaboration with another person. In the present study we show that the social Simon effect was present also when, in the social Simon task, the two participants did not actually collaborate. It is, however, absent when participants perform the social task outside of each other's peripersonal space (i.e., outside arm-reach). We argue that the social Simon effect does not necessarily imply a representation of the other's action, as previously suggested. The presence of an active confederate in peripersonal space might simply provide a reference for coding one's own action in space.

  5. Shared prefetching to reduce execution skew in multi-threaded systems

    DOEpatents

    Eichenberger, Alexandre E; Gunnels, John A

    2013-07-16

    Mechanisms are provided for optimizing code to perform prefetching of data into a shared memory of a computing device that is shared by a plurality of threads that execute on the computing device. A memory stream of a portion of code that is shared by the plurality of threads is identified. A set of prefetch instructions is distributed across the plurality of threads. Prefetch instructions are inserted into the instruction sequences of the plurality of threads such that each instruction sequence has a separate sub-portion of the set of prefetch instructions, thereby generating optimized code. Executable code is generated based on the optimized code and stored in a storage device. The executable code, when executed, performs the prefetches associated with the distributed set of prefetch instructions in a shared manner across the plurality of threads.

  6. Comparison of the Eragen Multi-Code Respiratory Virus Panel with Conventional Viral Testing and Real-Time Multiplex PCR Assays for Detection of Respiratory Viruses▿ †

    PubMed Central

    Arens, Max Q.; Buller, Richard S.; Rankin, Anne; Mason, Sheila; Whetsell, Amy; Agapov, Eugene; Lee, Wai-Ming; Storch, Gregory A.

    2010-01-01

    High-throughput multiplex assays for respiratory viruses are an important step forward in diagnostic virology. We compared one such assay, the PLx Multi-Code Respiratory Virus Panel (PLx-RVP), manufactured by Eragen Biosciences, Inc. (Madison, WI), with conventional virologic testing, consisting of fluorescent-antibody staining plus testing with the R-mix system and fibroblast tube cultures. The test set consisted of 410 archived respiratory specimens, mostly nasopharyngeal swabs, including 210 that had been positive by conventional testing for a balanced selection of common respiratory viruses. Specimens yielding discrepant results were evaluated using a panel of respiratory virus PCR assays developed, characterized, and validated with clinical specimens. PLx-RVP increased the total rate of detection of viruses by 35.8%, and there was a 25.7% increase in the rate of detection of positive specimens. Reference PCR assay results corroborated the PLx-RVP result for 54 (82%) of 66 discrepancies with conventional testing. Of the 12 specimens with discrepancies between PLx-RVp and the reference PCRs, 6 were positive for rhinovirus by PLx-RVP and the presence of rhinovirus was confirmed by nucleotide sequencing. The remaining six specimens included five in which the PLx-RVP failed to detect parainfluenza virus and one in which the detection of influenza A virus by PLx-RVP could not be confirmed by the reference PCR. Taking the results of the reference PCR assay results into account, the sensitivities of the PLx-RVP for individual viruses ranged from 94 to 100% and the specificities ranged from 99 to 100%. We conclude that PLx-RVP is a highly accurate system for the detection of respiratory viruses and significantly improves the rate of detection of these viruses compared to that by conventional virologic testing. PMID:20484608

  7. Ethical coding.

    PubMed

    Resnik, Barry I

    2009-01-01

    It is ethical, legal, and proper for a dermatologist to maximize income through proper coding of patient encounters and procedures. The overzealous physician can misinterpret reimbursement requirements or receive bad advice from other physicians and cross the line from aggressive coding to coding fraud. Several of the more common problem areas are discussed.

  8. Practices in Code Discoverability: Astrophysics Source Code Library

    NASA Astrophysics Data System (ADS)

    Allen, A.; Teuben, P.; Nemiroff, R. J.; Shamir, L.

    2012-09-01

    Here we describe the Astrophysics Source Code Library (ASCL), which takes an active approach to sharing astrophysics source code. ASCL's editor seeks out both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and adds entries for the found codes to the library. This approach ensures that source codes are added without requiring authors to actively submit them, resulting in a comprehensive listing that covers a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL now has over 340 codes in it and continues to grow. In 2011, the ASCL has on average added 19 codes per month. An advisory committee has been established to provide input and guide the development and expansion of the new site, and a marketing plan has been developed and is being executed. All ASCL source codes have been used to generate results published in or submitted to a refereed journal and are freely available either via a download site or from an identified source. This paper provides the history and description of the ASCL. It lists the requirements for including codes, examines the advantages of the ASCL, and outlines some of its future plans.

  9. Securing mobile code.

    SciTech Connect

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements

  10. Educating executive function.

    PubMed

    Blair, Clancy

    2017-01-01

    Executive functions are thinking skills that assist with reasoning, planning, problem solving, and managing one's life. The brain areas that underlie these skills are interconnected with and influenced by activity in many different brain areas, some of which are associated with emotion and stress. One consequence of the stress-specific connections is that executive functions, which help us to organize our thinking, tend to be disrupted when stimulation is too high and we are stressed out, or too low when we are bored and lethargic. Given their central role in reasoning and also in managing stress and emotion, scientists have conducted studies, primarily with adults, to determine whether executive functions can be improved by training. By and large, results have shown that they can be, in part through computer-based videogame-like activities. Evidence of wider, more general benefits from such computer-based training, however, is mixed. Accordingly, scientists have reasoned that training will have wider benefits if it is implemented early, with very young children as the neural circuitry of executive functions is developing, and that it will be most effective if embedded in children's everyday activities. Evidence produced by this research, however, is also mixed. In sum, much remains to be learned about executive function training. Without question, however, continued research on this important topic will yield valuable information about cognitive development. WIREs Cogn Sci 2017, 8:e1403. doi: 10.1002/wcs.1403 For further resources related to this article, please visit the WIREs website.

  11. Event driven executive

    NASA Technical Reports Server (NTRS)

    Tulpule, Bhalchandra R. (Inventor); Collins, Robert E. (Inventor); Cheetham, John (Inventor); Cornwell, Smith (Inventor)

    1990-01-01

    Tasks may be planned for execution on a single processor or are split up by the designer for execution among a plurality of signal processors. The tasks are modeled using a design aid called a precedence graph, from which a dependency table and a prerequisite table are established for reference within each processor. During execution, at the completion of a given task, an end of task interrupt is provided from any processor which has completed a task to any and all other processors including itself in which completion of that task is a prerequisite for commencement of any dependent tasks. The relevant updated data may be transferred by the processor either before or after signalling task completion to the processors needing the updated data prior to commencing execution of the dependent tasks. Coherency may be ensured, however, by sending the data before the interrupt. When the end of task interrupt is received in a processor, its dependency table is consulted to determine those tasks dependent upon completion of the task which has just been signalled as completed, and task dependency signals indicative thereof are provided and stored in a current status list of a prerequisite table. The current status of all current prerequisites are compared to the complete prerequisites listed for all affected tasks and those tasks for which the comparison indicates that all prerequisites have been met are queued for execution in a selected order.

  12. Authorship Attribution of Source Code

    ERIC Educational Resources Information Center

    Tennyson, Matthew F.

    2013-01-01

    Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…

  13. Executive function following child stroke: the impact of lesion location.

    PubMed

    Long, Brian; Spencer-Smith, Megan M; Jacobs, Rani; Mackay, Mark; Leventer, Richard; Barnes, Chris; Anderson, Vicki

    2011-03-01

    Child stroke is a major cause of death in children, although limited information exists on neurobehavioral functioning of stroke survivors. Executive function (important for goal-directed behavior) is thought to be vulnerable to early insults such as stroke because of its widespread representation in the immature brain. This study investigated the impact of lesion location on executive skills. Twenty-eight children diagnosed with stroke at least 18 months before assessment were recruited. Lesion characteristics were coded from magnetic resonance imaging (MRI) scans. Neurobehavioral assessment focused on cognitive and everyday executive skills. Deficits were found in the context of overall normal intellectual functioning (M = 91.60; SD = 19.40). Generally, insults involving frontal and extra-frontal regions impacted equally on cognitive performance. Everyday deficits were marginally more prominent following frontal insult. Subcortical frontal lesions were associated with impairments in everyday executive skills. Results provide further support for the diffuse representation of executive function in the immature brain.

  14. cgpCaVEManWrapper: Simple Execution of CaVEMan in Order to Detect Somatic Single Nucleotide Variants in NGS Data.

    PubMed

    Jones, David; Raine, Keiran M; Davies, Helen; Tarpey, Patrick S; Butler, Adam P; Teague, Jon W; Nik-Zainal, Serena; Campbell, Peter J

    2016-12-08

    CaVEMan is an expectation maximization-based somatic substitution-detection algorithm that is written in C. The algorithm analyzes sequence data from a test sample, such as a tumor relative to a reference normal sample from the same patient and the reference genome. It performs a comparative analysis of the tumor and normal sample to derive a probabilistic estimate for putative somatic substitutions. When combined with a set of validated post-hoc filters, CaVEMan generates a set of somatic substitution calls with high recall and positive predictive value. Here we provide instructions for using a wrapper script called cgpCaVEManWrapper, which runs the CaVEMan algorithm and additional downstream post-hoc filters. We describe both a simple one-shot run of cgpCaVEManWrapper and a more in-depth implementation suited to large-scale compute farms. © 2016 by John Wiley & Sons, Inc.

  15. Sharing code.

    PubMed

    Kubilius, Jonas

    2014-01-01

    Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  16. School Executive Website Study

    ERIC Educational Resources Information Center

    Thiede, Robert

    2009-01-01

    The School Executive Website will be a one-stop, online site for officials who are looking for educational data, best practices, product reviews, school documents, professional opinions, and/or job-related networking. The format of the website is designed in certain sections similar to other current and popular websites, such as Angie's List.com,…

  17. Healthcare. Executive Summary

    ERIC Educational Resources Information Center

    Carnevale, Anthony P.; Smith, Nicole; Gulish, Artem; Beach, Bennett H.

    2012-01-01

    This executive summary highlights several findings about healthcare. These are: (1) Healthcare is 18 percent of the U.S. economy, twice as high as in other countries; (2) There are two labor markets in healthcare: high-skill, high-wage professional and technical jobs and low-skill, low-wage support jobs; (3) Demand for postsecondary education in…

  18. An Executive Training Program.

    ERIC Educational Resources Information Center

    DeAnda, Natividad

    This manual describes the implementation of the Far West Laboratory's educational research and development management training program for women and minorities and offers guidelines to institutions and industries creating their own internship programs. A chapter on holistic learning for executives analyses a model incorporating a coordinating…

  19. Leadership and Executive Development.

    ERIC Educational Resources Information Center

    1997

    This document contains three papers from a symposium on leadership and executive development. "Leading and Managing in a Service Organization: An Examination of Line vs. Staff Effectiveness" (Allan H. Church, Janine Waclawski) presents an analysis of differences in managerial strengths and weaknesses between 45 line managers and 52 human resources…

  20. New hybrid peak-to-average power ratio reduction technique based on carrier interferometry codes and companding technique for optical direct-detection orthogonal frequency division multiplexing system

    NASA Astrophysics Data System (ADS)

    Maivan, Lap; He, Jing; Chen, Ming; Mangone, Fall; Chen, Lin

    2014-08-01

    In direct-detection optical orthogonal frequency division multiplexing (OFDM) systems, the high peak-to-average power ratio (PAPR) will cause nonlinear effects in both electrical and optical devices and optical fiber transmission when the nonlinear amplifiers are employed. A new hybrid technique based on carrier interferometry codes and companding transform has been proposed and experimentally demonstrated to reduce the high PAPR in an optical direct-detection optical OFDM system. The proposed technique is then experimentally demonstrated and the results show the effectiveness of the new method. The PAPR of the hybrid signal has been reduced by about 5.7 dB when compared to the regular system at a complementary cumulative distribution function of 10-4. At a bit error rate of 10-4, after transmission over 100-km single-mode fiber with a μ of 2, the receiver sensitivity is improved by 3.7, 4.2, and 5 dB with launch powers of 3, 6, and 9 dBm, respectively.

  1. Investigation on iterative multiuser detection physical layer network coding in two-way relay free-space optical links with turbulences and pointing errors.

    PubMed

    Abu-Almaalie, Zina; Ghassemlooy, Zabih; Bhatnagar, Manav R; Le-Minh, Hoa; Aslam, Nauman; Liaw, Shien-Kuei; Lee, It Ee

    2016-11-20

    Physical layer network coding (PNC) improves the throughput in wireless networks by enabling two nodes to exchange information using a minimum number of time slots. The PNC technique is proposed for two-way relay channel free space optical (TWR-FSO) communications with the aim of maximizing the utilization of network resources. The multipair TWR-FSO is considered in this paper, where a single antenna on each pair seeks to communicate via a common receiver aperture at the relay. Therefore, chip interleaving is adopted as a technique to separate the different transmitted signals at the relay node to perform PNC mapping. Accordingly, this scheme relies on the iterative multiuser technique for detection of users at the receiver. The bit error rate (BER) performance of the proposed system is examined under the combined influences of atmospheric loss, turbulence-induced channel fading, and pointing errors (PEs). By adopting the joint PNC mapping with interleaving and multiuser detection techniques, the BER results show that the proposed scheme can achieve a significant performance improvement against the degrading effects of turbulences and PEs. It is also demonstrated that a larger number of simultaneous users can be supported with this new scheme in establishing a communication link between multiple pairs of nodes in two time slots, thereby improving the channel capacity.

  2. Embedding Temporal Constraints For Coordinated Execution in Habitat Automation

    NASA Technical Reports Server (NTRS)

    Morris, Paul; Schwabacher, Mark; Dalal, Michael; Fry, Charles

    2013-01-01

    Future NASA plans call for long-duration deep space missions with human crews. Because of light-time delay and other considerations, increased autonomy will be needed. This will necessitate integration of tools in such areas as anomaly detection, diagnosis, planning, and execution. In this paper we investigate an approach that integrates planning and execution by embedding planner-derived temporal constraints in an execution procedure. To avoid the need for propagation, we convert the temporal constraints to dispatchable form. We handle some uncertainty in the durations without it affecting the execution; larger variations may cause activities to be skipped.

  3. The cooking task: making a meal of executive functions.

    PubMed

    Doherty, T A; Barker, L A; Denniss, R; Jalil, A; Beer, M D

    2015-01-01

    Current standardized neuropsychological tests may fail to accurately capture real-world executive deficits. We developed a computer-based Cooking Task (CT) assessment of executive functions and trialed the measure with a normative group before use with a head-injured population. Forty-six participants completed the computerized CT and subtests from standardized neuropsychological tasks, including the Tower and Sorting Tests of executive function from the Delis-Kaplan Executive Function System (D-KEFS) and the Cambridge prospective memory test (CAMPROMPT), in order to examine whether standardized executive function tasks, predicted performance on measurement indices from the CT. Findings showed that verbal comprehension, rule detection and prospective memory contributed to measures of prospective planning accuracy and strategy implementation of the CT. Results also showed that functions necessary for cooking efficacy differ as an effect of task demands (difficulty levels). Performance on rule detection, strategy implementation and flexible thinking executive function measures contributed to accuracy on the CT. These findings raise questions about the functions captured by present standardized tasks particularly at varying levels of difficulty and during dual-task performance. Our preliminary findings also indicate that CT measures can effectively distinguish between executive function and Full Scale IQ abilities. Results of the present study indicate that the CT shows promise as an ecologically valid measure of executive function for future use with a head-injured population and indexes selective executive function's captured by standardized tests.

  4. 12 CFR 1710.14 - Code of conduct and ethics.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 9 2012-01-01 2012-01-01 false Code of conduct and ethics. 1710.14 Section... Code of conduct and ethics. (a) General. An Enterprise shall establish and administer a written code of conduct and ethics that is reasonably designed to assure the ability of board members, executive...

  5. 12 CFR 1710.14 - Code of conduct and ethics.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 10 2014-01-01 2014-01-01 false Code of conduct and ethics. 1710.14 Section... Code of conduct and ethics. (a) General. An Enterprise shall establish and administer a written code of conduct and ethics that is reasonably designed to assure the ability of board members, executive...

  6. 12 CFR 1710.14 - Code of conduct and ethics.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 9 2013-01-01 2013-01-01 false Code of conduct and ethics. 1710.14 Section... Code of conduct and ethics. (a) General. An Enterprise shall establish and administer a written code of conduct and ethics that is reasonably designed to assure the ability of board members, executive...

  7. 48 CFR 204.7005 - Assignment of order codes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Assignment of order codes... Identification Numbers 204.7005 Assignment of order codes. (a) The Defense Logistics Agency, Acquisition Policy Branch (J71), Fort Belvoir, VA 22060-6221, is the executive agent for maintenance of code assignments...

  8. 12 CFR 1710.14 - Code of conduct and ethics.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 7 2011-01-01 2011-01-01 false Code of conduct and ethics. 1710.14 Section... Code of conduct and ethics. (a) General. An Enterprise shall establish and administer a written code of conduct and ethics that is reasonably designed to assure the ability of board members, executive...

  9. Remote procedure execution software for distributed systems

    SciTech Connect

    Petravick, D.L.; Berman, E.F.; Sergey, G.P.

    1989-05-01

    Remote Procedure Execution facilitates the construction of distributed software systems, spanning computers of various types. Programmers who use the RPX package specify subroutine calls which are to be executed on a remote computer. RPX is used to generate code for dummy routines which transmit input parameters and receive output parameters, as well as a main program which receives procedure call requests, calls the requested procedure, and returns the result. The package automatically performs datatype conversions and uses an appropriate connection oriented protocol. Supported operating systems/processors are VMS(VAX), UNIX(MIPS R2000, R3000) and Software Components Group's pSOS (680x0). Connection oriented protocols are supported over Ethernet (TCP/IP) and RS232 (a package of our own design). 2 refs., 2 figs.

  10. What executives should remember.

    PubMed

    Drucker, Peter F

    2006-02-01

    In more than 30 essays for Harvard Business Review, Peter Drucker (1909-2005) urged readers to take on the hard work of thinking--always combined, he insisted, with decisive action. He closely analyzed the phenomenon of knowledge work--the growing call for employees who use their minds rather than their hands--and explained how it challenged the conventional wisdom about the way organizations should be run. He was intrigued by employees who knew more about certain subjects than their bosses or colleagues but who still had to cooperate with others in a large organization. As the business world matured in the second half of the twentieth century, executives came to think that they knew how to run companies--and Drucker took it upon himself to poke holes in their assumptions, lest organizations become stale. But he did so sympathetically, operating from the premise that his readers were intelligent, hardworking people of goodwill. Well suited to HBR's format of practical, idea-based essays for executives, his clear-eyed, humanistic writing enriched the magazine time and again. This article is a compilation of the savviest management advice Drucker offered HBR readers over the years--in short, his greatest hits. It revisits the following insightful, influential contributions: "The Theory of the Business" (September-October 1994), "Managing for Business Effectiveness" (May-June 1963), "What Business Can Learn from Nonprofits" (July-August 1989), "The New Society of Organizations" (September-October 1992), "The Information Executives Truly Need" (January-February 1995), "Managing Oneself" (March-April 1999 republished January 2005), "They're Not Employees, They're People" (February 2002), "What Makes an Effective Executive" (June 2004).

  11. Sharing code

    PubMed Central

    Kubilius, Jonas

    2014-01-01

    Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing. PMID:25165519

  12. Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution

    DTIC Science & Technology

    2010-10-01

    concurrently. The users exe- cuted, in a round - robin fashion, a set of five queries over 100 trials. The average length of the queries was 639 bytes...interpreted languages that could benefit from ISR include VBS , Python, and others. 6 SQL Randomization SQL-injection attacks have serious security and

  13. Genome-Wide Detection of Predicted Non-coding RNAs Related to the Adhesion Process in Vibrio alginolyticus Using High-Throughput Sequencing

    PubMed Central

    Huang, Lixing; Hu, Jiao; Su, Yongquan; Qin, Yingxue; Kong, Wendi; Zhao, Lingmin; Ma, Ying; Xu, Xiaojin; Lin, Mao; Zheng, Jiang; Yan, Qingpi

    2016-01-01

    The ability of bacteria to adhere to fish mucus can be affected by environmental conditions and is considered to be a key virulence factor of Vibrio alginolyticus. However, the molecular mechanism underlying this ability remains unclear. Our previous study showed that stress conditions such as exposure to Cu, Pb, Hg, and low pH are capable of reducing the adhesion ability of V. alginolyticus. Non-coding RNAs (ncRNAs) play a crucial role in the intricate regulation of bacterial gene expression, thereby affecting bacterial pathogenicity. Thus, we hypothesized that ncRNAs play a key role in the V. alginolyticus adhesion process. To validate this, we combined high-throughput sequencing with computational techniques to detect ncRNA dynamics in samples after stress treatments. The expression of randomly selected novel ncRNAs was confirmed by QPCR. Among the significantly altered ncRNAs, 30 were up-regulated and 2 down-regulated by all stress treatments. The QPCR results reinforced the reliability of the sequencing data. Target prediction and KEGG pathway analysis indicated that these ncRNAs are closely related to pathways associated with in vitro adhesion, and our results indicated that chemical stress-induced reductions in the adhesion ability of V. alginolyticus might be due to the perturbation of ncRNA expression. Our findings provide important information for further functional characterization of ncRNAs during the adhesion process of V. alginolyticus. PMID:27199948

  14. Detection of genetic diversity and selection at the coding region of the melanocortin receptor 1 (MC1R) gene in Tibetan pigs and Landrace pigs.

    PubMed

    Liu, Rui; Jin, Long; Long, Keren; Chai, Jie; Ma, Jideng; Tang, Qianzi; Tian, Shilin; Hu, Yaodong; Lin, Ling; Wang, Xun; Jiang, Anan; Li, Xuewei; Li, Mingzhou

    2016-01-10

    Domestication and subsequent selective pressures have produced a large variety of pig coat colors in different regions and breeds. The melanocortin 1 receptor (MC1R) gene plays a crucial role in determining coat color of mammals. Here, we investigated genetic diversity and selection at the coding region of the porcine melanocortin receptor 1 (MC1R) in Tibetan pigs and Landrace pigs. By contrast, genetic variability was much lower in Landrace pigs than in Tibetan pigs. Meanwhile, haplotype analysis showed that Tibetan pigs possessed shared haplotypes, suggesting a possibility of recent introgression event by way of crossbreeding with neighboring domestic pigs or shared ancestral polymorphism. Additionally, we detected positive selection at the MC1R in both Tibetan pigs and Landrace pigs through the dN/dS analysis. These findings suggested that novel phenotypic change (dark coat color) caused by novel mutations may help Tibetan pigs against intensive solar ultraviolet (UV) radiation and camouflage in wild environment, whereas white coat color in Landrace were intentionally selected by human after domestication. Furthermore, both the phylogenetic analysis and the network analysis provided clues that MC1R in Asian and European wild boars may have initially experienced different selective pressures, and MC1R alleles diversified in modern domesticated pigs.

  15. A concatenated coding scheme for error control

    NASA Technical Reports Server (NTRS)

    Lin, S.

    1985-01-01

    A concatenated coding scheme for error contol in data communications was analyzed. The inner code is used for both error correction and detection, however the outer code is used only for error detection. A retransmission is requested if either the inner code decoder fails to make a successful decoding or the outer code decoder detects the presence of errors after the inner code decoding. Probability of undetected error of the proposed scheme is derived. An efficient method for computing this probability is presented. Throughout efficiency of the proposed error control scheme incorporated with a selective repeat ARQ retransmission strategy is analyzed.

  16. The Unknown Computer Viruses Detection Based on Similarity

    NASA Astrophysics Data System (ADS)

    Liu, Zhongda; Nakaya, Naoshi; Koui, Yuuji

    New computer viruses are continually being generated and they cause damage all over the world. In general, current anti-virus software detects viruses by matching a pattern based on the signature; thus, unknown viruses without any signature cannot be detected. Although there are some static analysis technologies that do not depend on signatures, virus writers often use code obfuscation techniques, which make it difficult to execute a code analysis. As is generally known, unknown viruses and known viruses share a common feature. In this paper we propose a new static analysis technology that can circumvent code obfuscation to extract the common feature and detect unknown viruses based on similarity. The results of evaluation experiments demonstrated that this technique is able to detect unknown viruses without false positives.

  17. From Verified Models to Verifiable Code

    NASA Technical Reports Server (NTRS)

    Lensink, Leonard; Munoz, Cesar A.; Goodloe, Alwyn E.

    2009-01-01

    Declarative specifications of digital systems often contain parts that can be automatically translated into executable code. Automated code generation may reduce or eliminate the kinds of errors typically introduced through manual code writing. For this approach to be effective, the generated code should be reasonably efficient and, more importantly, verifiable. This paper presents a prototype code generator for the Prototype Verification System (PVS) that translates a subset of PVS functional specifications into an intermediate language and subsequently to multiple target programming languages. Several case studies are presented to illustrate the tool's functionality. The generated code can be analyzed by software verification tools such as verification condition generators, static analyzers, and software model-checkers to increase the confidence that the generated code is correct.

  18. Income, neural executive processes, and preschool children's executive control.

    PubMed

    Ruberry, Erika J; Lengua, Liliana J; Crocker, Leanna Harris; Bruce, Jacqueline; Upshaw, Michaela B; Sommerville, Jessica A

    2017-02-01

    This study aimed to specify the neural mechanisms underlying the link between low household income and diminished executive control in the preschool period. Specifically, we examined whether individual differences in the neural processes associated with executive attention and inhibitory control accounted for income differences observed in performance on a neuropsychological battery of executive control tasks. The study utilized a sample of preschool-aged children (N = 118) whose families represented the full range of income, with 32% of families at/near poverty, 32% lower income, and 36% middle to upper income. Children completed a neuropsychological battery of executive control tasks and then completed two computerized executive control tasks while EEG data were collected. We predicted that differences in the event-related potential (ERP) correlates of executive attention and inhibitory control would account for income differences observed on the executive control battery. Income and ERP measures were related to performance on the executive control battery. However, income was unrelated to ERP measures. The findings suggest that income differences observed in executive control during the preschool period might relate to processes other than executive attention and inhibitory control.

  19. Speech coding

    SciTech Connect

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  20. Directly Executed Languages.

    DTIC Science & Technology

    2014-09-26

    Architecture 2 1.1 An Evaluation of Adept-A Pascal Based Architecture 2 1.2 A Microprocessor Implementation of a DCA 2 1.3 The Instruction Bandwidth of...Direct Correspondence Architectures 3 1.4 Memory Hierarchies for Directly Executed Language Microprocessors 3 2 Architectural Analysis 4 3 Concurrent...reduction: 3.46 I data read reduction (in bytes): 5.42 "-data write reduction (in bytes): 14.72 A microprocessor based implementation of a Pascal-based DCA

  1. Discovering of execution patterns of subprograms in execution traces

    NASA Astrophysics Data System (ADS)

    Komorowski, Michał

    2015-09-01

    This article describes an approach to the analysis of historical debuggers logs (execution traces). Historical debuggers are tools that provide insight into the history of programs execution. The author focuses on finding execution patterns of subprograms in these logs in an efficient way and proposes a method of visualising them. Execution patterns are a form of automatically generated specification/documentation of software which show usage of subprograms. In order to discover them in execution traces an existing algorithm was adapted. This algorithm is based on suffix arrays and it finds patterns in text application logs in the linear time with the respect to the length of logs. Additionally, Extended Call Graphs were introduced to visualise the execution patterns. They contain more information in comparison with standard call graphs.

  2. On Nondeterministic Workflow Executions

    NASA Astrophysics Data System (ADS)

    Potapova, Alexandra; Su, Jianwen

    The ability to compose existing services to form new functionality is one of the most promising ideas enabled by SOA and the framework of (web) services. A composition or a workflow often involves services distributed over a network and possibly many organizations and administrative domains. Nondeterminism could occur in a composition in at least two ways. The first form is the result of modeling abstraction that hides the detail information and thus makes the "computation" appear non-deterministic. The second form is closely related to "operational optimization", e.g., one may try to invoke more than multiple services for a task, whichever completes first will produce the result and preempts all other services. In this paper, we focus on the latter and measure the complexity of service execution as the amount of needed resources and controlling mechanism for executing nondeterministic service compositions. We formalize the model and complexity problem and develop technical results for this problem in the general setting as well as special cases.

  3. Parallelized direct execution simulation of message-passing parallel programs

    NASA Technical Reports Server (NTRS)

    Dickens, Phillip M.; Heidelberger, Philip; Nicol, David M.

    1994-01-01

    As massively parallel computers proliferate, there is growing interest in findings ways by which performance of massively parallel codes can be efficiently predicted. This problem arises in diverse contexts such as parallelizing computers, parallel performance monitoring, and parallel algorithm development. In this paper we describe one solution where one directly executes the application code, but uses a discrete-event simulator to model details of the presumed parallel machine such as operating system and communication network behavior. Because this approach is computationally expensive, we are interested in its own parallelization specifically the parallelization of the discrete-event simulator. We describe methods suitable for parallelized direct execution simulation of message-passing parallel programs, and report on the performance of such a system, Large Application Parallel Simulation Environment (LAPSE), we have built on the Intel Paragon. On all codes measured to date, LAPSE predicts performance well typically within 10 percent relative error. Depending on the nature of the application code, we have observed low slowdowns (relative to natively executing code) and high relative speedups using up to 64 processors.

  4. The Cheerleaders' Mock Execution

    ERIC Educational Resources Information Center

    Trujillo-Jenks, Laura

    2011-01-01

    The fervor of student speech is demonstrated through different mediums and venues in public schools. In this case, a new principal encounters the mores of a community that believes in free speech, specifically student free speech. When a pep rally becomes a venue for hate speech, terroristic threats, and profanity, the student code of conduct…

  5. Relations between Short-term Memory Deficits, Semantic Processing, and Executive Function

    PubMed Central

    Allen, Corinne M.; Martin, Randi C.; Martin, Nadine

    2012-01-01

    Background Previous research has suggested separable short-term memory (STM) buffers for the maintenance of phonological and lexical-semantic information, as some patients with aphasia show better ability to retain semantic than phonological information and others show the reverse. Recently, researchers have proposed that deficits to the maintenance of semantic information in STM are related to executive control abilities. Aims The present study investigated the relationship of executive function abilities with semantic and phonological short-term memory (STM) and semantic processing in such patients, as some previous research has suggested that semantic STM deficits and semantic processing abilities are critically related to specific or general executive function deficits. Method and Procedures 20 patients with aphasia and STM deficits were tested on measures of short-term retention, semantic processing, and both complex and simple executive function tasks. Outcome and Results In correlational analyses, we found no relation between semantic STM and performance on simple or complex executive function tasks. In contrast, phonological STM was related to executive function performance in tasks that had a verbal component, suggesting that performance in some executive function tasks depends on maintaining or rehearsing phonological codes. Although semantic STM was not related to executive function ability, performance on semantic processing tasks was related to executive function, perhaps due to similar executive task requirements in both semantic processing and executive function tasks. Conclusions Implications for treatment and interpretations of executive deficits are discussed. PMID:22736889

  6. QR Codes

    ERIC Educational Resources Information Center

    Lai, Hsin-Chih; Chang, Chun-Yen; Li, Wen-Shiane; Fan, Yu-Lin; Wu, Ying-Tien

    2013-01-01

    This study presents an m-learning method that incorporates Integrated Quick Response (QR) codes. This learning method not only achieves the objectives of outdoor education, but it also increases applications of Cognitive Theory of Multimedia Learning (CTML) (Mayer, 2001) in m-learning for practical use in a diverse range of outdoor locations. When…

  7. Translating expert system rules into Ada code with validation and verification

    NASA Technical Reports Server (NTRS)

    Becker, Lee; Duckworth, R. James; Green, Peter; Michalson, Bill; Gosselin, Dave; Nainani, Krishan; Pease, Adam

    1991-01-01

    The purpose of this ongoing research and development program is to develop software tools which enable the rapid development, upgrading, and maintenance of embedded real-time artificial intelligence systems. The goals of this phase of the research were to investigate the feasibility of developing software tools which automatically translate expert system rules into Ada code and develop methods for performing validation and verification testing of the resultant expert system. A prototype system was demonstrated which automatically translated rules from an Air Force expert system was demonstrated which detected errors in the execution of the resultant system. The method and prototype tools for converting AI representations into Ada code by converting the rules into Ada code modules and then linking them with an Activation Framework based run-time environment to form an executable load module are discussed. This method is based upon the use of Evidence Flow Graphs which are a data flow representation for intelligent systems. The development of prototype test generation and evaluation software which was used to test the resultant code is discussed. This testing was performed automatically using Monte-Carlo techniques based upon a constraint based description of the required performance for the system.

  8. Plan Execution Interchange Language (PLEXIL)

    NASA Technical Reports Server (NTRS)

    Estlin, Tara; Jonsson, Ari; Pasareanu, Corina; Simmons, Reid; Tso, Kam; Verma, Vandi

    2006-01-01

    Plan execution is a cornerstone of spacecraft operations, irrespective of whether the plans to be executed are generated on board the spacecraft or on the ground. Plan execution frameworks vary greatly, due to both different capabilities of the execution systems, and relations to associated decision-making frameworks. The latter dependency has made the reuse of execution and planning frameworks more difficult, and has all but precluded information sharing between different execution and decision-making systems. As a step in the direction of addressing some of these issues, a general plan execution language, called the Plan Execution Interchange Language (PLEXIL), is being developed. PLEXIL is capable of expressing concepts used by many high-level automated planners and hence provides an interface to multiple planners. PLEXIL includes a domain description that specifies command types, expansions, constraints, etc., as well as feedback to the higher-level decision-making capabilities. This document describes the grammar and semantics of PLEXIL. It includes a graphical depiction of this grammar and illustrative rover scenarios. It also outlines ongoing work on implementing a universal execution system, based on PLEXIL, using state-of-the-art rover functional interfaces and planners as test cases.

  9. Television and children's executive function.

    PubMed

    Lillard, Angeline S; Li, Hui; Boguszewski, Katie

    2015-01-01

    Children spend a lot of time watching television on its many platforms: directly, online, and via videos and DVDs. Many researchers are concerned that some types of television content appear to negatively influence children's executive function. Because (1) executive function predicts key developmental outcomes, (2) executive function appears to be influenced by some television content, and (3) American children watch large quantities of television (including the content of concern), the issues discussed here comprise a crucial public health issue. Further research is needed to reveal exactly what television content is implicated, what underlies television's effect on executive function, how long the effect lasts, and who is affected.

  10. TRAPEDS: Producing traces for multicomputers via execution-driven simulation

    NASA Technical Reports Server (NTRS)

    Stunkel, Craig B.; Fuchs, W. Kent

    1988-01-01

    Trace-driven simulation is an important aid in performance analysis of computer systems. Capturing address traces for these simulations is a difficult problem for single processors and particularly for multicomputers. Even when existing trace methods can be used on multicomputers, the amount of collected data typically grows with the number of processors, so I/O and trace storage costs increase. A new technique is presented which modifies the executable code to dynamically collect the address trace from the user code and analyzes this trace during the execution of the program. This method helps resolve the I/O and storage problems and facilitates parallel analysis of the address trace. If a trace stored on disk is desired, the generated trace information can also be written to files during execution, with a resultant drop in program execution speed. An initial implementation on the Intel iPSC/2 hypercube multicomputer is detailed, and sample simulation results are presented. The effect of this trace collection method on execution time is illustrated.

  11. Upgrades to NRLMOL code

    NASA Astrophysics Data System (ADS)

    Basurto, Luis

    This project consists of performing upgrades to the massively parallel NRLMOL electronic structure code in order to enhance its performance by increasing its flexibility by: a) Utilizing dynamically allocated arrays, b) Executing in a parallel environment sections of the program that were previously executed in a serial mode, c) Exploring simultaneous concurrent executions of the program through the use of an already existing MPI environment; thus enabling the simulation of larger systems than it is currently capable of performing. Also developed was a graphical user interface that will allow less experienced users to start performing electronic structure calculations by aiding them in performing the necessary configuration of input files as well as providing graphical tools for the displaying and analysis of results. Additionally, a computational toolkit that can avail of large supercomputers and make use of various levels of approximation for atomic interactions was developed to search for stable atomic clusters and predict novel stable endohedral fullerenes. As an application of the developed computational toolkit, a search was conducted for stable isomers of Sc3N C80 fullerene. In this search, about 1.2 million isomers of C80 were optimized in various charged states at the PM6 level. Subsequently, using the selected optimized isomers of C80 in various charged state, about 10,000 isomers of Sc3N C80 were constructed which were optimized using semi-empirical PM6 quantum chemical method. A few selected lowest isomers of Sc3N C80 were optimized at the DFT level. The calculation confirms the lowest 3 isomers previously reported in literature but 4 new isomers are found within the lowest 10 isomers. Using the upgraded NRLMOL code, a study was done of the electronic structure of a multichromoric molecular complex containing two of each borondipyrromethane dye, Zn-tetraphenyl-porphyrin, bisphenyl anthracene and a fullerene. A systematic examination of the effect of

  12. Two executives, one career.

    PubMed

    Cunningham, Cynthia R; Murray, Shelley S

    2005-02-01

    For six years, Cynthia Cunningham and Shelley Murray shared an executive job at Fleet Bank. One desk, one chair, one computer, one telephone, and one voice-mail account. To their clients and colleagues, they were effectively one person, though one person with the strengths and ideas of two, seamlessly handing projects back and forth. Although their department was dissolved after the bank merged with Bank of America, the two continue to consider themselves a package-they have one resume, and they are seeking their next opportunity together. Their choice to share a job was not only a quality-of-life decision but one intended to keep their careers on course: "Taking two separate part-time jobs would have thrown us completely off track" they write in this first-person account."We're both ambitious people, and neither of us wanted just a job. We wanted careers" In this article, the two highly motivated women reveal their determination to manage the demands of both family and career. Flextime,telecommuting, and compressed workweeks are just some of the options open to executives seeking greater work/ life balance, and the job share, as described by Cunningham and Murray, could well be the next solution for those wishing to avoid major trade-offs between their personal and professional lives. Cunningham and Murray describe in vivid detail how they structured their unusual arrangement, how they sold themselves to management, and the hurdles they faced along the way. Theirs is a win-win story, for the company and for them.

  13. Circular codes, symmetries and transformations.

    PubMed

    Fimmel, Elena; Giannerini, Simone; Gonzalez, Diego Luis; Strüngmann, Lutz

    2015-06-01

    Circular codes, putative remnants of primeval comma-free codes, have gained considerable attention in the last years. In fact they represent a second kind of genetic code potentially involved in detecting and maintaining the normal reading frame in protein coding sequences. The discovering of an universal code across species suggested many theoretical and experimental questions. However, there is a key aspect that relates circular codes to symmetries and transformations that remains to a large extent unexplored. In this article we aim at addressing the issue by studying the symmetries and transformations that connect different circular codes. The main result is that the class of 216 C3 maximal self-complementary codes can be partitioned into 27 equivalence classes defined by a particular set of transformations. We show that such transformations can be put in a group theoretic framework with an intuitive geometric interpretation. More general mathematical results about symmetry transformations which are valid for any kind of circular codes are also presented. Our results pave the way to the study of the biological consequences of the mathematical structure behind circular codes and contribute to shed light on the evolutionary steps that led to the observed symmetries of present codes.

  14. Executive Education: Predicting Student Success in Executive MBA Programs

    ERIC Educational Resources Information Center

    Siegert, Kara O.

    2008-01-01

    Applicants to executive education programs have increased over recent years. Previous researchers had not thoroughly examined admission procedures related to the selection of applicants. In this study, the author examined common admission requirements that researchers and educators have used to predict success in 22 unique executive education…

  15. Higher-Performance Executives: Bringing Executive Development Programs Into Balance

    ERIC Educational Resources Information Center

    Gilad, Benjamin; Chussil, Mark

    2013-01-01

    Executive development programs teach various skills deemed important in future leaders and help shape future leadership and its performance. However, they are often excessively focused on competencies required for dealing with internal issues and relationships. They do a much less admirable job preparing future executives for the unique skills…

  16. Model-free execution monitoring in behavior-based robotics.

    PubMed

    Pettersson, Ola; Karlsson, Lars; Saffiotti, Alessandro

    2007-08-01

    In the near future, autonomous mobile robots are expected to help humans by performing service tasks in many different areas, including personal assistance, transportation, cleaning, mining, or agriculture. In order to manage these tasks in a changing and partially unpredictable environment without the aid of humans, the robot must have the ability to plan its actions and to execute them robustly and safely. The robot must also have the ability to detect when the execution does not proceed as planned and to correctly identify the causes of the failure. An execution monitoring system allows the robot to detect and classify these failures. Most current approaches to execution monitoring in robotics are based on the idea of predicting the outcomes of the robot's actions by using some sort of predictive model and comparing the predicted outcomes with the observed ones. In contrary, this paper explores the use of model-free approaches to execution monitoring, that is, approaches that do not use predictive models. In this paper, we show that pattern recognition techniques can be applied to realize model-free execution monitoring by classifying observed behavioral patterns into normal or faulty execution. We investigate the use of several such techniques and verify their utility in a number of experiments involving the navigation of a mobile robot in indoor environments.

  17. Code query by example

    NASA Astrophysics Data System (ADS)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  18. Execution time support for scientific programs on distributed memory machines

    NASA Technical Reports Server (NTRS)

    Berryman, Harry; Saltz, Joel; Scroggs, Jeffrey

    1990-01-01

    Optimizations are considered that are required for efficient execution of code segments that consists of loops over distributed data structures. The PARTI (Parallel Automated Runtime Toolkit at ICASE) execution time primitives are designed to carry out these optimizations and can be used to implement a wide range of scientific algorithms on distributed memory machines. These primitives allow the user to control array mappings in a way that gives an appearance of shared memory. Computations can be based on a global index set. Primitives are used to carry out gather and scatter operations on distributed arrays. Communications patterns are derived at runtime, and the appropriate send and receive messages are automatically generated.

  19. Effects of Acute Laboratory Stress on Executive Functions

    PubMed Central

    Starcke, Katrin; Wiesen, Carina; Trotzke, Patrick; Brand, Matthias

    2016-01-01

    Recent research indicates that stress can affect executive functioning. However, previous results are mixed with respect to the direction and size of effects, especially when considering different subcomponents of executive functions. The current study systematically investigates the effects of stress on the five components of executive functions proposed by Smith and Jonides (1999): attention and inhibition; task management; planning; monitoring; and coding. Healthy participants (N = 40) were either exposed to the computerized version of the Paced Auditory Serial Addition Test as a stressor (N = 20), or to a rest condition (N = 20). Stress reactions were assessed with heart rate and subjective measures. After the experimental manipulation, all participants performed tasks that measure the different executive functions. The manipulation check indicates that stress induction was successful (i.e., the stress group showed a higher heart rate and higher subjective responses than the control group). The main results demonstrate that stressed participants show a poorer performance compared with unstressed participants in all executive subcomponents, with the exception of monitoring. Effect sizes for the tasks that reveal differences between stressed and unstressed participants are high. We conclude that the laboratory stressor used here overall reduced executive functioning. PMID:27065926

  20. Effects of Acute Laboratory Stress on Executive Functions.

    PubMed

    Starcke, Katrin; Wiesen, Carina; Trotzke, Patrick; Brand, Matthias

    2016-01-01

    Recent research indicates that stress can affect executive functioning. However, previous results are mixed with respect to the direction and size of effects, especially when considering different subcomponents of executive functions. The current study systematically investigates the effects of stress on the five components of executive functions proposed by Smith and Jonides (1999): attention and inhibition; task management; planning; monitoring; and coding. Healthy participants (N = 40) were either exposed to the computerized version of the Paced Auditory Serial Addition Test as a stressor (N = 20), or to a rest condition (N = 20). Stress reactions were assessed with heart rate and subjective measures. After the experimental manipulation, all participants performed tasks that measure the different executive functions. The manipulation check indicates that stress induction was successful (i.e., the stress group showed a higher heart rate and higher subjective responses than the control group). The main results demonstrate that stressed participants show a poorer performance compared with unstressed participants in all executive subcomponents, with the exception of monitoring. Effect sizes for the tasks that reveal differences between stressed and unstressed participants are high. We conclude that the laboratory stressor used here overall reduced executive functioning.

  1. Motor Execution Affects Action Prediction

    ERIC Educational Resources Information Center

    Springer, Anne; Brandstadter, Simone; Liepelt, Roman; Birngruber, Teresa; Giese, Martin; Mechsner, Franz; Prinz, Wolfgang

    2011-01-01

    Previous studies provided evidence of the claim that the prediction of occluded action involves real-time simulation. We report two experiments that aimed to study how real-time simulation is affected by simultaneous action execution under conditions of full, partial or no overlap between observed and executed actions. This overlap was analysed by…

  2. Error coding simulations

    NASA Technical Reports Server (NTRS)

    Noble, Viveca K.

    1993-01-01

    There are various elements such as radio frequency interference (RFI) which may induce errors in data being transmitted via a satellite communication link. When a transmission is affected by interference or other error-causing elements, the transmitted data becomes indecipherable. It becomes necessary to implement techniques to recover from these disturbances. The objective of this research is to develop software which simulates error control circuits and evaluate the performance of these modules in various bit error rate environments. The results of the evaluation provide the engineer with information which helps determine the optimal error control scheme. The Consultative Committee for Space Data Systems (CCSDS) recommends the use of Reed-Solomon (RS) and convolutional encoders and Viterbi and RS decoders for error correction. The use of forward error correction techniques greatly reduces the received signal to noise needed for a certain desired bit error rate. The use of concatenated coding, e.g. inner convolutional code and outer RS code, provides even greater coding gain. The 16-bit cyclic redundancy check (CRC) code is recommended by CCSDS for error detection.

  3. The Astrophysics Source Code Library: An Update

    NASA Astrophysics Data System (ADS)

    Allen, Alice; Nemiroff, R. J.; Shamir, L.; Teuben, P. J.

    2012-01-01

    The Astrophysics Source Code Library (ASCL), founded in 1999, takes an active approach to sharing astrophysical source code. ASCL's editor seeks out both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and adds entries for the found codes to the library. This approach ensures that source codes are added without requiring authors to actively submit them, resulting in a comprehensive listing that covers a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL moved to a new location in 2010, and has over 300 codes in it and continues to grow. In 2011, the ASCL (http://asterisk.apod.com/viewforum.php?f=35) has on average added 19 new codes per month; we encourage scientists to submit their codes for inclusion. An advisory committee has been established to provide input and guide the development and expansion of its new site, and a marketing plan has been developed and is being executed. All ASCL source codes have been used to generate results published in or submitted to a refereed journal and are freely available either via a download site or from an identified source. This presentation covers the history of the ASCL and examines the current state and benefits of the ASCL, the means of and requirements for including codes, and outlines its future plans.

  4. The Environment for Application Software Integration and Execution (EASIE) version 1.0. Volume 1: Executive overview

    NASA Technical Reports Server (NTRS)

    Rowell, Lawrence F.; Davis, John S.

    1989-01-01

    The Environment for Application Software Integration and Execution (EASIE) provides a methodology and a set of software utility programs to ease the task of coordinating engineering design and analysis codes. EASIE was designed to meet the needs of conceptual design engineers that face the task of integrating many stand-alone engineering analysis programs. Using EASIE, programs are integrated through a relational database management system. Volume 1, Executive Overview, gives an overview of the functions provided by EASIE and describes their use. Three operational design systems based upon the EASIE software are briefly described.

  5. Symbolically Modeling Concurrent MCAPI Executions

    NASA Technical Reports Server (NTRS)

    Fischer, Topher; Mercer, Eric; Rungta, Neha

    2011-01-01

    Improper use of Inter-Process Communication (IPC) within concurrent systems often creates data races which can lead to bugs that are challenging to discover. Techniques that use Satisfiability Modulo Theories (SMT) problems to symbolically model possible executions of concurrent software have recently been proposed for use in the formal verification of software. In this work we describe a new technique for modeling executions of concurrent software that use a message passing API called MCAPI. Our technique uses an execution trace to create an SMT problem that symbolically models all possible concurrent executions and follows the same sequence of conditional branch outcomes as the provided execution trace. We check if there exists a satisfying assignment to the SMT problem with respect to specific safety properties. If such an assignment exists, it provides the conditions that lead to the violation of the property. We show how our method models behaviors of MCAPI applications that are ignored in previously published techniques.

  6. An improved algorithm for evaluating trellis phase codes

    NASA Technical Reports Server (NTRS)

    Mulligan, M. G.; Wilson, S. G.

    1984-01-01

    A method is described for evaluating the minimum distance parameters of trellis phase codes, including CPFSK, partial response FM, and more importantly, coded CPM (continuous phase modulation) schemes. The algorithm provides dramatically faster execution times and lesser memory requirements than previous algorithms. Results of sample calculations and timing comparisons are included.

  7. An improved algorithm for evaluating trellis phase codes

    NASA Technical Reports Server (NTRS)

    Mulligan, M. G.; Wilson, S. G.

    1982-01-01

    A method is described for evaluating the minimum distance parameters of trellis phase codes, including CPFSK, partial response FM, and more importantly, coded CPM (continuous phase modulation) schemes. The algorithm provides dramatically faster execution times and lesser memory requirements than previous algorithms. Results of sample calculations and timing comparisons are included.

  8. Maneuver Performance Assessment of the Cassini Spacecraft Through Execution-Error Modeling and Analysis

    NASA Technical Reports Server (NTRS)

    Wagner, Sean

    2014-01-01

    The Cassini spacecraft has executed nearly 300 maneuvers since 1997, providing ample data for execution-error model updates. With maneuvers through 2017, opportunities remain to improve on the models and remove biases identified in maneuver executions. This manuscript focuses on how execution-error models can be used to judge maneuver performance, while providing a means for detecting performance degradation. Additionally, this paper describes Cassini's execution-error model updates in August 2012. An assessment of Cassini's maneuver performance through OTM-368 on January 5, 2014 is also presented.

  9. Transversal Clifford gates on folded surface codes

    SciTech Connect

    Moussa, Jonathan E.

    2016-10-12

    Surface and color codes are two forms of topological quantum error correction in two spatial dimensions with complementary properties. Surface codes have lower-depth error detection circuits and well-developed decoders to interpret and correct errors, while color codes have transversal Clifford gates and better code efficiency in the number of physical qubits needed to achieve a given code distance. A formal equivalence exists between color codes and folded surface codes, but it does not guarantee the transferability of any of these favorable properties. However, the equivalence does imply the existence of constant-depth circuit implementations of logical Clifford gates on folded surface codes. We achieve and improve this result by constructing two families of folded surface codes with transversal Clifford gates. This construction is presented generally for qudits of any dimension. Lastly, the specific application of these codes to universal quantum computation based on qubit fusion is also discussed.

  10. Transversal Clifford gates on folded surface codes

    DOE PAGES

    Moussa, Jonathan E.

    2016-10-12

    Surface and color codes are two forms of topological quantum error correction in two spatial dimensions with complementary properties. Surface codes have lower-depth error detection circuits and well-developed decoders to interpret and correct errors, while color codes have transversal Clifford gates and better code efficiency in the number of physical qubits needed to achieve a given code distance. A formal equivalence exists between color codes and folded surface codes, but it does not guarantee the transferability of any of these favorable properties. However, the equivalence does imply the existence of constant-depth circuit implementations of logical Clifford gates on folded surfacemore » codes. We achieve and improve this result by constructing two families of folded surface codes with transversal Clifford gates. This construction is presented generally for qudits of any dimension. Lastly, the specific application of these codes to universal quantum computation based on qubit fusion is also discussed.« less

  11. Transversal Clifford gates on folded surface codes

    NASA Astrophysics Data System (ADS)

    Moussa, Jonathan E.

    2016-10-01

    Surface and color codes are two forms of topological quantum error correction in two spatial dimensions with complementary properties. Surface codes have lower-depth error detection circuits and well-developed decoders to interpret and correct errors, while color codes have transversal Clifford gates and better code efficiency in the number of physical qubits needed to achieve a given code distance. A formal equivalence exists between color codes and folded surface codes, but it does not guarantee the transferability of any of these favorable properties. However, the equivalence does imply the existence of constant-depth circuit implementations of logical Clifford gates on folded surface codes. We achieve and improve this result by constructing two families of folded surface codes with transversal Clifford gates. This construction is presented generally for qudits of any dimension. The specific application of these codes to universal quantum computation based on qubit fusion is also discussed.

  12. Malware detection and analysis

    DOEpatents

    Chiang, Ken; Lloyd, Levi; Crussell, Jonathan; Sanders, Benjamin; Erickson, Jeremy Lee; Fritz, David Jakob

    2016-03-22

    Embodiments of the invention describe systems and methods for malicious software detection and analysis. A binary executable comprising obfuscated malware on a host device may be received, and incident data indicating a time when the binary executable was received and identifying processes operating on the host device may be recorded. The binary executable is analyzed via a scalable plurality of execution environments, including one or more non-virtual execution environments and one or more virtual execution environments, to generate runtime data and deobfuscation data attributable to the binary executable. At least some of the runtime data and deobfuscation data attributable to the binary executable is stored in a shared database, while at least some of the incident data is stored in a private, non-shared database.

  13. On the undetected error probability for shortened Hamming codes

    NASA Technical Reports Server (NTRS)

    Fujiwara, T.; Kasami, T.; Kitai, A.; Lin, S.

    1985-01-01

    Shortened Hamming codes are widely used for error detection in data communications. In this paper, a method for computing the probability of an undetected error for these codes is presented. This method is then used to evaluate the error-detection performance of the shortened codes obtained from the two distance-four Hamming codes adopted by CCITT X.25 for error control for packet-switched networks. It is shown that shortening a code does affect its error-detection performance.

  14. Trichomoniasis: evaluation to execution

    PubMed Central

    Harp, Djana F.; Chowdhury, Indrajit

    2011-01-01

    Trichomoniasis is the most common sexually transmitted disease, caused by a motile flagellate non-invasive parasitic protozoan, Trichomonas vaginalis (T. vaginalis). More than 160 million people worldwide are annually infected by this protozoan. T. vaginalis occupies an extracellular niche in the complex human genito-urinary environment (vagina, cervix, penis, prostate gland, and urethra) to survive, multiply and evade host defenses. T. vaginalis (strain G3) has a ~160 megabase genome with 60,000 genes, the largest number of genes ever identified in protozoans. The T. vaginalis genome is a highly conserved gene family that encodes a massive proteome with one of the largest coding (expressing ~4000 genes) capacities in the trophozoite stage, and helps T. vaginalis to adapt and survive in diverse environment. Based on recent developments in the field, we review T. vaginalis structure, patho-mechanisms, parasitic virulence, and advances in diagnosis and therapeutics. PMID:21440359

  15. Caltech campus executive LDRD.

    SciTech Connect

    Shepodd, Timothy J.; Knudsen, Tamara

    2013-01-01

    merely help execute the chosen action.

  16. Bio-bar-code dendrimer-like DNA as signal amplifier for cancerous cells assay using ruthenium nanoparticle-based ultrasensitive chemiluminescence detection.

    PubMed

    Bi, Sai; Hao, Shuangyuan; Li, Li; Zhang, Shusheng

    2010-09-07

    Bio-bar-code dendrimer-like DNA (bbc-DL-DNA) is employed as a label for the amplification assay of cancer cells in combination with the newly explored chemiluminescence (CL) system of luminol-H(2)O(2)-Ru(3+) and specificity of structure-switching aptamers selected by cell-based SELEX.

  17. Acceleration of a Monte Carlo radiation transport code

    SciTech Connect

    Hochstedler, R.D.; Smith, L.M.

    1996-03-01

    Execution time for the Integrated TIGER Series (ITS) Monte Carlo radiation transport code has been reduced by careful re-coding of computationally intensive subroutines. Three test cases for the TIGER (1-D slab geometry), CYLTRAN (2-D cylindrical geometry), and ACCEPT (3-D arbitrary geometry) codes were identified and used to benchmark and profile program execution. Based upon these results, sixteen top time-consuming subroutines were examined and nine of them modified to accelerate computations with equivalent numerical output to the original. The results obtained via this study indicate that speedup factors of 1.90 for the TIGER code, 1.67 for the CYLTRAN code, and 1.11 for the ACCEPT code are achievable. {copyright} {ital 1996 American Institute of Physics.}

  18. Executing clinical guidelines: temporal issues.

    PubMed Central

    Terenziani, P.; Mastromonaco, F.; Molino, G.; Torchio, M.

    2000-01-01

    In our previous work, we proposed a domain-independent language to describe clinical guidelines and a graphical tool to acquire them. In this paper, we describe an approach to execute clinical guidelines. We propose a flexible execution engine that can be used in clinical decision support applications, and also for medical education, or for integrating guidelines into the clinical workflow. We also focus our attention on temporal issues in the execution of guidelines, including the treatment of composite, concurrent and/or cyclic actions. PMID:11080004

  19. 5 CFR 842.211 - Senior Executive Service, Defense Intelligence Senior Executive Service, and Senior Cryptologic...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. 842.211 Section 842.211... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. (a) A member of the Senior Executive Service, the Defense Intelligence Senior Executive Service, or the Senior Cryptologic...

  20. 5 CFR 842.211 - Senior Executive Service, Defense Intelligence Senior Executive Service, and Senior Cryptologic...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. 842.211 Section 842.211... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. (a) A member of the Senior Executive Service, the Defense Intelligence Senior Executive Service, or the Senior Cryptologic...

  1. 5 CFR 842.211 - Senior Executive Service, Defense Intelligence Senior Executive Service, and Senior Cryptologic...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. 842.211 Section 842.211... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. (a) A member of the Senior Executive Service, the Defense Intelligence Senior Executive Service, or the Senior Cryptologic...

  2. 5 CFR 842.211 - Senior Executive Service, Defense Intelligence Senior Executive Service, and Senior Cryptologic...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. 842.211 Section 842.211... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. (a) A member of the Senior Executive Service, the Defense Intelligence Senior Executive Service, or the Senior Cryptologic...

  3. 5 CFR 842.211 - Senior Executive Service, Defense Intelligence Senior Executive Service, and Senior Cryptologic...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. 842.211 Section 842.211... Intelligence Senior Executive Service, and Senior Cryptologic Executive Service. (a) A member of the Senior Executive Service, the Defense Intelligence Senior Executive Service, or the Senior Cryptologic...

  4. Direct-execution parallel architecture for the Advanced Continuous Simulation Language (ACSL)

    SciTech Connect

    Carroll, C.C.; Owen, J.E.

    1988-05-01

    A direct-execution parallel architecture for the Advanced Continuous Simulation Language (ACSL) is presented which overcomes the traditional disadvantages of simulations executed on a digital computer. The incorporation of parallel processing allows the mapping of simulations into a digital computer to be done in the same inherently parallel manner as they are currently mapped onto an analog computer. The direct-execution format maximizes the efficiency of the executed code since the need for a high level language compiler is eliminated. Resolution is greatly increased over that which is available with an analog computer without the sacrifice in execution speed normally expected with digitial computer simulations. Although this report covers all aspects of the new architecture, key emphasis is placed on the processing element configuration and the microprogramming of the ACLS constructs. The execution times for all ACLS constructs are computed using a model of a processing element based on the AMD 29000 CPU and the AMD 29027 FPU. The increase in execution speed provided by parallel processing is exemplified by comparing the derived execution times of two ACSL programs with the execution times for the same programs executed on a similar sequential architecture.

  5. A direct-execution parallel architecture for the Advanced Continuous Simulation Language (ACSL)

    NASA Technical Reports Server (NTRS)

    Carroll, Chester C.; Owen, Jeffrey E.

    1988-01-01

    A direct-execution parallel architecture for the Advanced Continuous Simulation Language (ACSL) is presented which overcomes the traditional disadvantages of simulations executed on a digital computer. The incorporation of parallel processing allows the mapping of simulations into a digital computer to be done in the same inherently parallel manner as they are currently mapped onto an analog computer. The direct-execution format maximizes the efficiency of the executed code since the need for a high level language compiler is eliminated. Resolution is greatly increased over that which is available with an analog computer without the sacrifice in execution speed normally expected with digitial computer simulations. Although this report covers all aspects of the new architecture, key emphasis is placed on the processing element configuration and the microprogramming of the ACLS constructs. The execution times for all ACLS constructs are computed using a model of a processing element based on the AMD 29000 CPU and the AMD 29027 FPU. The increase in execution speed provided by parallel processing is exemplified by comparing the derived execution times of two ACSL programs with the execution times for the same programs executed on a similar sequential architecture.

  6. Among three different executive functions, general executive control ability is a key predictor of decision making under objective risk.

    PubMed

    Schiebener, Johannes; Wegmann, Elisa; Gathmann, Bettina; Laier, Christian; Pawlikowski, Mirko; Brand, Matthias

    2014-01-01

    Executive functioning is supposed to have an important role in decision making under risk. Several studies reported that more advantageous decision-making behavior was accompanied by better performance in tests of executive functioning and that the decision-making process was accompanied by activations in prefrontal and subcortical brain regions associated with executive functioning. However, to what extent different components of executive functions contribute to decision making is still unclear. We tested direct and indirect effects of three executive functions on decision-making performance in a laboratory gambling task, the Game of Dice Task (GDT). Using Brand's model of decisions under risk (2006) we tested seven structural equation models with three latent variables that represent executive functions supposed to be involved in decision making. The latent variables were general control (represented by the general ability to exert attentional and behavioral self-control that is in accordance with task goals despite interfering information), concept formation (represented by categorization, rule detection, and set maintenance), and monitoring (represented by supervision of cognition and behavior). The seven models indicated that only the latent dimension general control had a direct effect on decision making under risk. Concept formation and monitoring only contributed in terms of indirect effects, when mediated by general control. Thus, several components of executive functioning seem to be involved in decision making under risk. However, general control functions seem to have a key role. They may be important for implementing the calculative and cognitively controlled processes involved in advantageous decision making under risk.

  7. Lean and Efficient Software: Whole-Program Optimization of Executables

    DTIC Science & Technology

    2015-09-30

    executables by using static and dynamic binary program analysis techniques to perform whole-program optimization directly on compiled programs...LACI. We did invest some time in continuing to explore options for handling the overly conservative static /dynamic code partitioning problem...4) is constant and always returns the same value. Ideally, we’d like to evaluate this computation statically , eliminate the variable z, and inline

  8. Spatiotemporal tuning of the facilitation of biological motion perception by concurrent motor execution.

    PubMed

    Christensen, Andrea; Ilg, Winfried; Giese, Martin A

    2011-03-02

    The execution of motor behavior influences concurrent visual action observation and especially the perception of biological motion. The neural mechanisms underlying this interaction between perception and motor execution are not exactly known. In addition, the available experimental evidence is partially inconsistent because previous studies have reported facilitation as well as impairments of action perception by concurrent execution. Exploiting a novel virtual reality paradigm, we investigated the spatiotemporal tuning of the influence of motor execution on the perception of biological motion within a signal-detection task. Human observers were presented with point-light stimuli that were controlled by their own movements. Participants had to detect a point-light arm in a scrambled mask, either while executing waving movements or without concurrent motor execution (baseline). The temporal and spatial coherence between the observed and executed movements was parametrically varied. We found a systematic tuning of the facilitatory versus inhibitory influences of motor execution on biological motion detection with respect to the temporal and the spatial congruency between observed and executed movements. Specifically, we found a gradual transition between facilitatory and inhibitory interactions for decreasing temporal synchrony and spatial congruency. This result provides evidence for a spatiotemporally highly selective coupling between dynamic motor representations and neural structures involved in the visual processing of biological motion. In addition, our study offers a unifying explanation that reconciles contradicting results about modulatory effects of motor execution on biological motion perception in previous studies.

  9. A dip-stick type biosensor using bioluminescent bacteria encapsulated in color-coded alginate microbeads for detection of water toxicity.

    PubMed

    Jung, Insup; Seo, Ho Bin; Lee, Ji-eun; Kim, Byoung Chan; Gu, Man Bock

    2014-09-21

    The use of genetically engineered bioluminescent bacteria, in which bioluminescence is induced by different modes of toxic action, represents an alternative to acute toxicity tests using living aquatic organisms (plants, vertebrates, or invertebrates) in an aqueous environment. A number of these bacterial strains have been developed, but there have been no attempts to develop a hand-held type of biosensor for monitoring or identification of toxicity. We report a facile dip-stick type biosensor using genetically engineered bioluminescent bacteria as a new platform for classification and identification of toxicity in water environments. This dip-stick type biosensor is composed of eight different optically color-coded functional alginate beads that each encapsulates a different bioluminescent bacterial strain and its corresponding fluorescent microbead. These color-coded microbeads exhibit easy identification of encapsulated microbeads, since each microbead has a different color code depending on the bioluminescent bacterial strain contained and improved cell-stability compared to liquid culture. This dip-stick type biosensor can discriminate different modes of toxic actions (i.e. DNA damage, oxidative damage, cell-membrane damage, or protein damage) of sample water tested by simply dipping the stick into the water samples. It was found that each color-coded microbead emitted distinct bioluminescence, and each dip-stick type biosensor showed different bioluminescence patterns within 2 hours, depending on the toxic chemicals contained in LB medium, tap water, or river water samples. This dip-stick type biosensor can, therefore, be widely and practically used in checking toxicity of water in the environment primarily in situ, possibly indicating the status of biodiversity.

  10. Methods, media, and systems for detecting attack on a digital processing device

    SciTech Connect

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  11. Methods, media, and systems for detecting attack on a digital processing device

    DOEpatents

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromytis, Angelos D.; Androulaki, Elli

    2017-02-21

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  12. Transferring ecosystem simulation codes to supercomputers

    NASA Technical Reports Server (NTRS)

    Skiles, J. W.; Schulbach, C. H.

    1995-01-01

    Many ecosystem simulation computer codes have been developed in the last twenty-five years. This development took place initially on main-frame computers, then mini-computers, and more recently, on micro-computers and workstations. Supercomputing platforms (both parallel and distributed systems) have been largely unused, however, because of the perceived difficulty in accessing and using the machines. Also, significant differences in the system architectures of sequential, scalar computers and parallel and/or vector supercomputers must be considered. We have transferred a grassland simulation model (developed on a VAX) to a Cray Y-MP/C90. We describe porting the model to the Cray and the changes we made to exploit the parallelism in the application and improve code execution. The Cray executed the model 30 times faster than the VAX and 10 times faster than a Unix workstation. We achieved an additional speedup of 30 percent by using the compiler's vectoring and 'in-line' capabilities. The code runs at only about 5 percent of the Cray's peak speed because it ineffectively uses the vector and parallel processing capabilities of the Cray. We expect that by restructuring the code, it could execute an additional six to ten times faster.

  13. Generalized optical code construction for enhanced and Modified Double Weight like codes without mapping for SAC-OCDMA systems

    NASA Astrophysics Data System (ADS)

    Kumawat, Soma; Ravi Kumar, M.

    2016-07-01

    Double Weight (DW) code family is one of the coding schemes proposed for Spectral Amplitude Coding-Optical Code Division Multiple Access (SAC-OCDMA) systems. Modified Double Weight (MDW) code for even weights and Enhanced Double Weight (EDW) code for odd weights are two algorithms extending the use of DW code for SAC-OCDMA systems. The above mentioned codes use mapping technique to provide codes for higher number of users. A new generalized algorithm to construct EDW and MDW like codes without mapping for any weight greater than 2 is proposed. A single code construction algorithm gives same length increment, Bit Error Rate (BER) calculation and other properties for all weights greater than 2. Algorithm first constructs a generalized basic matrix which is repeated in a different way to produce the codes for all users (different from mapping). The generalized code is analysed for BER using balanced detection and direct detection techniques.

  14. Error-correction coding

    NASA Technical Reports Server (NTRS)

    Hinds, Erold W. (Principal Investigator)

    1996-01-01

    This report describes the progress made towards the completion of a specific task on error-correcting coding. The proposed research consisted of investigating the use of modulation block codes as the inner code of a concatenated coding system in order to improve the overall space link communications performance. The study proposed to identify and analyze candidate codes that will complement the performance of the overall coding system which uses the interleaved RS (255,223) code as the outer code.

  15. Flexible Generation of Kalman Filter Code

    NASA Technical Reports Server (NTRS)

    Richardson, Julian; Wilson, Edward

    2006-01-01

    Domain-specific program synthesis can automatically generate high quality code in complex domains from succinct specifications, but the range of programs which can be generated by a given synthesis system is typically narrow. Obtaining code which falls outside this narrow scope necessitates either 1) extension of the code generator, which is usually very expensive, or 2) manual modification of the generated code, which is often difficult and which must be redone whenever changes are made to the program specification. In this paper, we describe adaptations and extensions of the AUTOFILTER Kalman filter synthesis system which greatly extend the range of programs which can be generated. Users augment the input specification with a specification of code fragments and how those fragments should interleave with or replace parts of the synthesized filter. This allows users to generate a much wider range of programs without their needing to modify the synthesis system or edit generated code. We demonstrate the usefulness of the approach by applying it to the synthesis of a complex state estimator which combines code from several Kalman filters with user-specified code. The work described in this paper allows the complex design decisions necessary for real-world applications to be reflected in the synthesized code. When executed on simulated input data, the generated state estimator was found to produce comparable estimates to those produced by a handcoded estimator

  16. Reusable State Machine Code Generator

    NASA Astrophysics Data System (ADS)

    Hoffstadt, A. A.; Reyes, C.; Sommer, H.; Andolfato, L.

    2010-12-01

    The State Machine model is frequently used to represent the behaviour of a system, allowing one to express and execute this behaviour in a deterministic way. A graphical representation such as a UML State Chart diagram tames the complexity of the system, thus facilitating changes to the model and communication between developers and domain experts. We present a reusable state machine code generator, developed by the Universidad Técnica Federico Santa María and the European Southern Observatory. The generator itself is based on the open source project architecture, and uses UML State Chart models as input. This allows for a modular design and a clean separation between generator and generated code. The generated state machine code has well-defined interfaces that are independent of the implementation artefacts such as the middle-ware. This allows using the generator in the substantially different observatory software of the Atacama Large Millimeter Array and the ESO Very Large Telescope. A project-specific mapping layer for event and transition notification connects the state machine code to its environment, which can be the Common Software of these projects, or any other project. This approach even allows to automatically create tests for a generated state machine, using techniques from software testing, such as path-coverage.

  17. Video coding with dynamic background

    NASA Astrophysics Data System (ADS)

    Paul, Manoranjan; Lin, Weisi; Lau, Chiew Tong; Lee, Bu-Sung

    2013-12-01

    Motion estimation (ME) and motion compensation (MC) using variable block size, sub-pixel search, and multiple reference frames (MRFs) are the major reasons for improved coding performance of the H.264 video coding standard over other contemporary coding standards. The concept of MRFs is suitable for repetitive motion, uncovered background, non-integer pixel displacement, lighting change, etc. The requirement of index codes of the reference frames, computational time in ME & MC, and memory buffer for coded frames limits the number of reference frames used in practical applications. In typical video sequences, the previous frame is used as a reference frame with 68-92% of cases. In this article, we propose a new video coding method using a reference frame [i.e., the most common frame in scene (McFIS)] generated by dynamic background modeling. McFIS is more effective in terms of rate-distortion and computational time performance compared to the MRFs techniques. It has also inherent capability of scene change detection (SCD) for adaptive group of picture (GOP) size determination. As a result, we integrate SCD (for GOP determination) with reference frame generation. The experimental results show that the proposed coding scheme outperforms the H.264 video coding with five reference frames and the two relevant state-of-the-art algorithms by 0.5-2.0 dB with less computational time.

  18. 45 CFR 1700.5 - Executive Director.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... INFORMATION SCIENCE ORGANIZATION AND FUNCTIONS § 1700.5 Executive Director. (a) The Executive Director serves... 45 Public Welfare 4 2011-10-01 2011-10-01 false Executive Director. 1700.5 Section 1700.5 Public... laws. (b) The Executive Director is directly responsible to the Commission, works under the...

  19. 45 CFR 1700.5 - Executive Director.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... INFORMATION SCIENCE ORGANIZATION AND FUNCTIONS § 1700.5 Executive Director. (a) The Executive Director serves... 45 Public Welfare 4 2013-10-01 2013-10-01 false Executive Director. 1700.5 Section 1700.5 Public... laws. (b) The Executive Director is directly responsible to the Commission, works under the...

  20. Complete coding regions of two novel HLA-B alleles detected by phototyping (PCR-SSP) in the British caucasoid population: B*5108 and B*5002.

    PubMed

    Vilches, C; Bunce, M; de Pablo, R; Murray, A K; McIntyre, C A; Kreisler, M

    1997-07-01

    Two previously reported PCR-SSP variants of the HLA-B locus, B51GAC and B45v, were investigated by RT-PCR cloning and nucleotide sequence analysis of their complete coding regions. They have been shown to correspond to the new alleles B*5108 and B*5002, both of which differ from the common B*5101 and B*5001 subtypes, respectively, by amino acid replacements at their alpha-2 domain alpha-helices. The primary structure of B*5002, intermediate between those of B*4501 and B*5001, raises further concern about the current classification of B*45 as a B12 rather than as a B*50 subtype.

  1. A draft model aggregated code of ethics for bioethicists.

    PubMed

    Baker, Robert

    2005-01-01

    Bioethicists function in an environment in which their peers--healthcare executives, lawyers, nurses, physicians--assert the integrity of their fields through codes of professional ethics. Is it time for bioethics to assert its integrity by developing a code of ethics? Answering in the affirmative, this paper lays out a case by reviewing the historical nature and function of professional codes of ethics. Arguing that professional codes are aggregative enterprises growing in response to a field's historical experiences, it asserts that bioethics now needs to assert its integrity and independence and has already developed a body of formal statements that could be aggregated to create a comprehensive code of ethics for bioethics. A Draft Model Aggregated Code of Ethics for Bioethicists is offered in the hope that analysis and criticism of this draft code will promote further discussion of the nature and content of a code of ethics for bioethicists.

  2. Comparative genomics approach to detecting split-coding regions in a low-coverage genome: lessons from the chimaera Callorhinchus milii (Holocephali, Chondrichthyes).

    PubMed

    Dessimoz, Christophe; Zoller, Stefan; Manousaki, Tereza; Qiu, Huan; Meyer, Axel; Kuraku, Shigehiro

    2011-09-01

    Recent development of deep sequencing technologies has facilitated de novo genome sequencing projects, now conducted even by individual laboratories. However, this will yield more and more genome sequences that are not well assembled, and will hinder thorough annotation when no closely related reference genome is available. One of the challenging issues is the identification of protein-coding sequences split into multiple unassembled genomic segments, which can confound orthology assignment and various laboratory experiments requiring the identification of individual genes. In this study, using the genome of a cartilaginous fish, Callorhinchus milii, as test case, we performed gene prediction using a model specifically trained for this genome. We implemented an algorithm, designated ESPRIT, to identify possible linkages between multiple protein-coding portions derived from a single genomic locus split into multiple unassembled genomic segments. We developed a validation framework based on an artificially fragmented human genome, improvements between early and recent mouse genome assemblies, comparison with experimentally validated sequences from GenBank, and phylogenetic analyses. Our strategy provided insights into practical solutions for efficient annotation of only partially sequenced (low-coverage) genomes. To our knowledge, our study is the first formulation of a method to link unassembled genomic segments based on proteomes of relatively distantly related species as references.

  3. 3 CFR 13644 - Executive Order 13644 of May 21, 2013. Amendment to Executive Order 13639

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 3 The President 1 2014-01-01 2014-01-01 false Executive Order 13644 of May 21, 2013. Amendment to Executive Order 13639 13644 Order 13644 Presidential Documents Executive Orders Executive Order 13644 of May 21, 2013 EO 13644 Amendment to Executive Order 13639 By the authority vested in me as President...

  4. 3 CFR 13516 - Executive Order 13516 of October 28, 2009. Amending Executive Order 13462

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... functions under this order.” (f) by substituting “section 1.6(c) of Executive Order 12333, as amended” for... 3 The President 1 2010-01-01 2010-01-01 false Executive Order 13516 of October 28, 2009. Amending Executive Order 13462 13516 Order 13516 Presidential Documents Executive Orders Executive Order 13516...

  5. A concatenated coding scheme for error control

    NASA Technical Reports Server (NTRS)

    Kasami, T.; Fujiwara, T.; Lin, S.

    1986-01-01

    In this paper, a concatenated coding scheme for error control in data communications is presented and analyzed. In this scheme, the inner code is used for both error correction and detection; however, the outer code is used only for error detection. A retransmission is requested if either the inner code decoder fails to make a successful decoding or the outer code decoder detects the presence of errors after the inner code decoding. Probability of undetected error (or decoding error) of the proposed scheme is derived. An efficient method for computing this probability is presented. Throughput efficiency of the proposed error control scheme incorporated with a selective-repeat ARQ retransmission strategy is also analyzed. Three specific examples are presented. One of the examples is proposed for error control in the NASA Telecommand System.

  6. Business Development Executive (BDE) Program

    SciTech Connect

    Rice, E.J. "Woody"; Frederick, W. James

    2005-12-05

    The IPST BDE (Institute of Paper Science and Technology Business Development Executive) program was initiated in 1997 to make the paper industry better aware of the new manufacturing technologies being developed at IPST for the U.S. pulp and paper industry's use. In April 2000, the BDE program management and the 20 BDEs, all retired senior level industry manufacturing and research executives, were asked by Ms. Denise Swink of OIT at DOE to take the added responsibility of bringing DOE developed energy conservation technology to the paper industry. This project was funded by a DOE grant of $950,000.

  7. Atomicity violation detection using access interleaving invariants

    DOEpatents

    Zhou, Yuanyuan; Lu, Shan; Tucek, Joseph Andrew

    2013-09-10

    During execution of a program, the situation where the atomicity of a pair of instructions that are to be executed atomically is violated is identified, and a bug is detected as occurring in the program at the pair of instructions. The pairs of instructions that are to be executed atomically can be identified in different manners, such as by executing a program multiple times and using the results of those executions to automatically identify the pairs of instructions.

  8. Bar coded retroreflective target

    DOEpatents

    Vann, Charles S.

    2000-01-01

    This small, inexpensive, non-contact laser sensor can detect the location of a retroreflective target in a relatively large volume and up to six degrees of position. The tracker's laser beam is formed into a plane of light which is swept across the space of interest. When the beam illuminates the retroreflector, some of the light returns to the tracker. The intensity, angle, and time of the return beam is measured to calculate the three dimensional location of the target. With three retroreflectors on the target, the locations of three points on the target are measured, enabling the calculation of all six degrees of target position. Until now, devices for three-dimensional tracking of objects in a large volume have been heavy, large, and very expensive. Because of the simplicity and unique characteristics of this tracker, it is capable of three-dimensional tracking of one to several objects in a large volume, yet it is compact, light-weight, and relatively inexpensive. Alternatively, a tracker produces a diverging laser beam which is directed towards a fixed position, and senses when a retroreflective target enters the fixed field of view. An optically bar coded target can be read by the tracker to provide information about the target. The target can be formed of a ball lens with a bar code on one end. As the target moves through the field, the ball lens causes the laser beam to scan across the bar code.

  9. GridRun: A lightweight packaging and execution environment forcompact, multi-architecture binaries

    SciTech Connect

    Shalf, John; Goodale, Tom

    2004-02-01

    GridRun offers a very simple set of tools for creating and executing multi-platform binary executables. These ''fat-binaries'' archive native machine code into compact packages that are typically a fraction the size of the original binary images they store, enabling efficient staging of executables for heterogeneous parallel jobs. GridRun interoperates with existing distributed job launchers/managers like Condor and the Globus GRAM to greatly simplify the logic required launching native binary applications in distributed heterogeneous environments.

  10. ATLAS, an integrated structural analysis and design system. Volume 3: User's manual, input and execution data

    NASA Technical Reports Server (NTRS)

    Dreisbach, R. L. (Editor)

    1979-01-01

    The input data and execution control statements for the ATLAS integrated structural analysis and design system are described. It is operational on the Control Data Corporation (CDC) 6600/CYBER computers in a batch mode or in a time-shared mode via interactive graphic or text terminals. ATLAS is a modular system of computer codes with common executive and data base management components. The system provides an extensive set of general-purpose technical programs with analytical capabilities including stiffness, stress, loads, mass, substructuring, strength design, unsteady aerodynamics, vibration, and flutter analyses. The sequence and mode of execution of selected program modules are controlled via a common user-oriented language.

  11. Flexible Policy-Directed Code Safety

    DTIC Science & Technology

    2006-01-01

    archive of all other files. Policy R esource O perations W rapped M ethods S ize (K B ) T im e (m in:sec) Null 0 17 20 1:08 LimitWrite...developed Security Automata SFI Implementation ( SASI ) [6], a system that enforces policies defined using automata by inserting code in program...executables similarly to what is done by Naccio. Although no performance analysis is available, SASI should be able to enforce many policies more

  12. Getting the right grasp on executive function

    PubMed Central

    Gonzalez, Claudia L. R.; Mills, Kelly J.; Genee, Inge; Li, Fangfang; Piquette, Noella; Rosen, Nicole; Gibb, Robbin

    2014-01-01

    Executive Function (EF) refers to important socio-emotional and cognitive skills that are known to be highly correlated with both academic and life success. EF is a blanket term that is considered to include self-regulation, working memory, and planning. Recent studies have shown a relationship between EF and motor control. The emergence of motor control coincides with that of EF, hence understanding the relationship between these two domains could have significant implications for early detection and remediation of later EF deficits. The purpose of the current study was to investigate this relationship in young children. This study incorporated the Behavioral Rating Inventory of Executive Function (BRIEF) and two motor assessments with a focus on precision grasping to test this hypothesis. The BRIEF is comprised of two indices of EF: (1) the Behavioral Regulation Index (BRI) containing three subscales: Inhibit, Shift, and Emotional Control; (2) the Metacognition Index (MI) containing five subscales: Initiate, Working Memory, Plan/Organize, Organization of Materials, and Monitor. A global executive composite (GEC) is derived from the two indices. In this study, right-handed children aged 5–6 and 9–10 were asked to: grasp-to-construct (Lego® models); and grasp-to-place (wooden blocks), while their parents completed the BRIEF questionnaire. Analysis of results indicated significant correlations between the strength of right hand preference for grasping and numerous elements of the BRIEF including the BRI, MI, and GEC. Specifically, the more the right hand was used for grasping the better the EF ratings. In addition, patterns of space-use correlated with the GEC in several subscales of the BRIEF. Finally and remarkably, the results also showed a reciprocal relationship between hand and space use for grasping and EF. These findings are discussed with respect to: (1) the developmental overlap of motor and executive functions; (2) detection of EF deficits through

  13. Qualitative Change in Executive Control during Childhood and Adulthood

    ERIC Educational Resources Information Center

    Chevalier, Nicolas; Huber, Kristina L.; Wiebe, Sandra A.; Espy, Kimberly Andrews

    2013-01-01

    Executive control development typically has been conceptualized to result from quantitative changes in the efficiency of the underlying processes. In contrast, the present study addressed the possibility of qualitative change with age by examining how children and adults detect task switches. Participants in three age groups (5- and 10-year-old…

  14. Dinucleotide circular codes and bijective transformations.

    PubMed

    Fimmel, Elena; Giannerini, Simone; Gonzalez, Diego Luis; Strüngmann, Lutz

    2015-12-07

    The presence of circular codes in mRNA coding sequences is postulated to be involved in informational mechanisms aimed at detecting and maintaining the normal reading frame during protein synthesis. Most of the recent research is focused on trinucleotide circular codes. However, also dinucleotide circular codes are important since dinucleotides are ubiquitous in genomes and associated to important biological functions. In this work we adopt the group theoretic approach used for trinucleotide codes in Fimmel et al. (2015) to study dinucleotide circular codes and highlight their symmetry properties. Moreover, we characterize such codes in terms of n-circularity and provide a graph representation that allows to visualize them geometrically. The results establish a theoretical framework for the study of the biological implications of dinucleotide circular codes in genomic sequences.

  15. Ultrasensitive and selective detection of copper (II) and mercury (II) ions by dye-coded silver nanoparticle-based SERS probes.

    PubMed

    Li, Feng; Wang, Jing; Lai, Yuming; Wu, Chong; Sun, Shuqing; He, Yonghong; Ma, Hui

    2013-01-15

    A simple and distinctive method for the ultrasensitive detection of Cu(2+) and Hg(2+) based on surface-enhanced Raman scattering (SERS) using cysteine-functionalized silver nanoparticles (AgNPs) attached with Raman-labeling molecules was developed. The glycine residue in a silver nanoparticle-bound cysteine can selectively bind with Cu(2+) and Hg(2+) and form a stable inner complex. Silver nanoparticles co-functionalized with cysteine and 3,5-Dimethoxy-4-(6'-azobenzotriazolyl)phenol (AgNP conjugates) can be used to detect Cu(2+) and Hg(2+) based on aggregation-induced SERS of the Raman tags. The addition of SCN(-) to the analyte can successfully mask Hg(2+) and allow for the selective detection of Cu(2+). This SERS-based assay showed an unprecedented limit of detection (LOD) of 10pM for Cu(2+) and 1pM for Hg(2+); these LODs are a few orders of magnitude more sensitive than the typical colorimetric approach based on the aggregation of noble nanoparticles. The analysis of real water samples diluted with pure water was performed and verified this conclusion. We envisage that this SERS-based assay may provide a general and simple approach for the detection of other metal ions of interest, which can be adopted from their corresponding colorimetric assays that have already been developed with significantly improved sensitivity and thus have wide-range applications in many areas.

  16. Diagnostic Coding for Epilepsy.

    PubMed

    Williams, Korwyn; Nuwer, Marc R; Buchhalter, Jeffrey R

    2016-02-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  17. Model Children's Code.

    ERIC Educational Resources Information Center

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  18. Phylogeny of genetic codes and punctuation codes within genetic codes.

    PubMed

    Seligmann, Hervé

    2015-03-01

    Punctuation codons (starts, stops) delimit genes, reflect translation apparatus properties. Most codon reassignments involve punctuation. Here two complementary approaches classify natural genetic codes: (A) properties of amino acids assigned to codons (classical phylogeny), coding stops as X (A1, antitermination/suppressor tRNAs insert unknown residues), or as gaps (A2, no translation, classical stop); and (B) considering only punctuation status (start, stop and other codons coded as -1, 0 and 1 (B1); 0, -1 and 1 (B2, reflects ribosomal translational dynamics); and 1, -1, and 0 (B3, starts/stops as opposites)). All methods separate most mitochondrial codes from most nuclear codes; Gracilibacteria consistently cluster with metazoan mitochondria; mitochondria co-hosted with chloroplasts cluster with nuclear codes. Method A1 clusters the euplotid nuclear code with metazoan mitochondria; A2 separates euplotids from mitochondria. Firmicute bacteria Mycoplasma/Spiroplasma and Protozoan (and lower metazoan) mitochondria share codon-amino acid assignments. A1 clusters them with mitochondria, they cluster with the standard genetic code under A2: constraints on amino acid ambiguity versus punctuation-signaling produced the mitochondrial versus bacterial versions of this genetic code. Punctuation analysis B2 converges best with classical phylogenetic analyses, stressing the need for a unified theory of genetic code punctuation accounting for ribosomal constraints.

  19. A (72, 36; 15) box code

    NASA Technical Reports Server (NTRS)

    Solomon, G.

    1993-01-01

    A (72,36;15) box code is constructed as a 9 x 8 matrix whose columns add to form an extended BCH-Hamming (8,4;4) code and whose rows sum to odd or even parity. The newly constructed code, due to its matrix form, is easily decodable for all seven-error and many eight-error patterns. The code comes from a slight modification in the parity (eighth) dimension of the Reed-Solomon (8,4;5) code over GF(512). Error correction uses the row sum parity information to detect errors, which then become erasures in a Reed-Solomon correction algorithm.

  20. 78 FR 73586 - Senior Executive Service Performance Review Board (PRB) and Executive Resources Board (ERB...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-06

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Surface Transportation Board Senior Executive Service Performance Review Board (PRB) and Executive Resources Board (ERB) Membership AGENCY: Surface Transportation Board, DOT. ACTION: Senior Executive...

  1. Executive Committee Report, April 2004

    ERIC Educational Resources Information Center

    Sarquis, Jerry L.; Holme, Thomas; Cooper, Melanie; White, Carol

    2004-01-01

    Anaheim executive committee report, April 2004 of American Chemical Society (ACS) is presented. It salutes the recipients of ACS awards at the CHED session and also covers the Spring 2004 ACS meeting abstracts, nominations for the division office and councilor's report.

  2. Formation of Professionalism of Executives

    ERIC Educational Resources Information Center

    Gerasimov, Kirill; Gerasimov, Boris

    2017-01-01

    Purpose: The purpose of this paper is to present the results of the research in the sphere of education and preparation of Russian executives in view of mentality and elements of national model of management. Design/methodology/approach: The research consisted in analysis of modern developments in the sphere of HR management in socio-economic…

  3. 78 FR 28441 - Executive Compensation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-14

    ... Federal Home Loan Banks (Banks) (collectively, the regulated entities). Section 1117, which amended the... to approve, disapprove, or modify the executive compensation of the regulated entities.\\2\\ This... was issued to ensure that the regulated entities and the Office of Finance (OF) comply with...

  4. Executive Center Makes Rapid Progress.

    ERIC Educational Resources Information Center

    Dumarsq, Carolyn C.; Scott, Charles A.

    1987-01-01

    In a pilot test, superintendents participated in self-assessment activities in the American Association of School Administrator's Executive Development Center program. Activity stages centered on professional attitudes and skills, personal health, and fitness. Data provided a profile for professional development. Participants felt activities were…

  5. Integrating planning, execution, and learning

    NASA Technical Reports Server (NTRS)

    Kuokka, Daniel R.

    1989-01-01

    To achieve the goal of building an autonomous agent, the usually disjoint capabilities of planning, execution, and learning must be used together. An architecture, called MAX, within which cognitive capabilities can be purposefully and intelligently integrated is described. The architecture supports the codification of capabilities as explicit knowledge that can be reasoned about. In addition, specific problem solving, learning, and integration knowledge is developed.

  6. The Effect of Repetitive Saccade Execution on the Attention Network Test: Enhancing Executive Function with a Flick of the Eyes

    ERIC Educational Resources Information Center

    Edlin, James M.; Lyle, Keith B.

    2013-01-01

    The simple act of repeatedly looking left and right can enhance subsequent cognition, including divergent thinking, detection of matching letters from visual arrays, and memory retrieval. One hypothesis is that saccade execution enhances subsequent cognition by altering attentional control. To test this hypothesis, we compared performance…

  7. Transionospheric Propagation Code (TIPC)

    SciTech Connect

    Roussel-Dupre, R.; Kelley, T.A.

    1990-10-01

    The Transionospheric Propagation Code is a computer program developed at Los Alamos National Lab to perform certain tasks related to the detection of vhf signals following propagation through the ionosphere. The code is written in Fortran 77, runs interactively and was designed to be as machine independent as possible. A menu format in which the user is prompted to supply appropriate parameters for a given task has been adopted for the input while the output is primarily in the form of graphics. The user has the option of selecting from five basic tasks, namely transionospheric propagation, signal filtering, signal processing, DTOA study, and DTOA uncertainty study. For the first task a specified signal is convolved against the impulse response function of the ionosphere to obtain the transionospheric signal. The user is given a choice of four analytic forms for the input pulse or of supplying a tabular form. The option of adding Gaussian-distributed white noise of spectral noise to the input signal is also provided. The deterministic ionosphere is characterized to first order in terms of a total electron content (TEC) along the propagation path. In addition, a scattering model parameterized in terms of a frequency coherence bandwidth is also available. In the second task, detection is simulated by convolving a given filter response against the transionospheric signal. The user is given a choice of a wideband filter or a narrowband Gaussian filter. It is also possible to input a filter response. The third task provides for quadrature detection, envelope detection, and three different techniques for time-tagging the arrival of the transionospheric signal at specified receivers. The latter algorithms can be used to determine a TEC and thus take out the effects of the ionosphere to first order. Task four allows the user to construct a table of delta-times-of-arrival (DTOAs) vs TECs for a specified pair of receivers.

  8. NRC Job Code V6060: Extended in-situ and real time monitoring. Task 4: Detection and monitoring of leaks at nuclear power plants external to structures

    SciTech Connect

    Sheen, S. H.

    2012-08-01

    In support of Task 4 of the NRC study on compliance with 10 CFR part 20.1406, minimization of contamination, Argonne National Laboratory (ANL) conducted a one-year scoping study, in concert with a parallel study performed by NRC/NRR staff, on monitoring for leaks at nuclear power plants (NPPs) external to structures. The objective of this task-4 study is to identify and assess those sensors and monitoring techniques for early detection of abnormal radioactive releases from the engineered facility structures, systems and components (SSCs) to the surrounding underground environment in existing NPPs and planned new reactors. As such, methods of interest include: (1) detection of anomalous water content of soils surrounding SSCs, (2) radionuclides contained in the leaking water, and (3) secondary signals such as temperature. ANL work scope includes mainly to (1) identify, in concert with the nuclear industry, the sensors and techniques that have most promise to detect radionuclides and/or associated chemical releases from SSCs of existing NPPs and (2) review and provide comments on the results of the NRC/NRR staff scoping study to identify candidate technologies. This report constitutes the ANL deliverable of the task-4 study. It covers a survey of sensor technologies and leak detection methods currently applied to leak monitoring at NPPs. The survey also provides a technology evaluation that identifies their strength and deficiency based on their detection speed, sensitivity, range and reliability. Emerging advanced technologies that are potentially capable of locating releases, identifying the radionuclides, and estimating their concentrations and distributions are also included in the report along with suggestions of required further research and development.

  9. Symbolic PathFinder: Symbolic Execution of Java Bytecode

    NASA Technical Reports Server (NTRS)

    Pasareanu, Corina S.; Rungta, Neha

    2010-01-01

    Symbolic Pathfinder (SPF) combines symbolic execution with model checking and constraint solving for automated test case generation and error detection in Java programs with unspecified inputs. In this tool, programs are executed on symbolic inputs representing multiple concrete inputs. Values of variables are represented as constraints generated from the analysis of Java bytecode. The constraints are solved using off-the shelf solvers to generate test inputs guaranteed to achieve complex coverage criteria. SPF has been used successfully at NASA, in academia, and in industry.

  10. Executive and Language Control in the Multilingual Brain

    PubMed Central

    Kong, Anthony Pak-Hin; Abutalebi, Jubin; Lam, Karen Sze-Yan; Weekes, Brendan

    2014-01-01

    Neuroimaging studies suggest that the neural network involved in language control may not be specific to bi-/multilingualism but is part of a domain-general executive control system. We report a trilingual case of a Cantonese (L1), English (L2), and Mandarin (L3) speaker, Dr. T, who sustained a brain injury at the age of 77 causing lesions in the left frontal lobe and in the left temporo-parietal areas resulting in fluent aphasia. Dr. T's executive functions were impaired according to a modified version of the Stroop color-word test and the Wisconsin Card Sorting Test performance was characterized by frequent perseveration errors. Dr. T demonstrated pathological language switching and mixing across her three languages. Code switching in Cantonese was more prominent in discourse production than confrontation naming. Our case suggests that voluntary control of spoken word production in trilingual speakers shares neural substrata in the frontobasal ganglia system with domain-general executive control mechanisms. One prediction is that lesions to such a system would give rise to both pathological switching and impairments of executive functions in trilingual speakers. PMID:24868121

  11. Executive and language control in the multilingual brain.

    PubMed

    Kong, Anthony Pak-Hin; Abutalebi, Jubin; Lam, Karen Sze-Yan; Weekes, Brendan

    2014-01-01

    Neuroimaging studies suggest that the neural network involved in language control may not be specific to bi-/multilingualism but is part of a domain-general executive control system. We report a trilingual case of a Cantonese (L1), English (L2), and Mandarin (L3) speaker, Dr. T, who sustained a brain injury at the age of 77 causing lesions in the left frontal lobe and in the left temporo-parietal areas resulting in fluent aphasia. Dr. T's executive functions were impaired according to a modified version of the Stroop color-word test and the Wisconsin Card Sorting Test performance was characterized by frequent perseveration errors. Dr. T demonstrated pathological language switching and mixing across her three languages. Code switching in Cantonese was more prominent in discourse production than confrontation naming. Our case suggests that voluntary control of spoken word production in trilingual speakers shares neural substrata in the frontobasal ganglia system with domain-general executive control mechanisms. One prediction is that lesions to such a system would give rise to both pathological switching and impairments of executive functions in trilingual speakers.

  12. Mining dynamic noteworthy functions in software execution sequences

    PubMed Central

    Huang, Guoyan; Wang, Yuqian; He, Haitao; Ren, Jiadong

    2017-01-01

    As the quality of crucial entities can directly affect that of software, their identification and protection become an important premise for effective software development, management, maintenance and testing, which thus contribute to improving the software quality and its attack-defending ability. Most analysis and evaluation on important entities like codes-based static structure analysis are on the destruction of the actual software running. In this paper, from the perspective of software execution process, we proposed an approach to mine dynamic noteworthy functions (DNFM)in software execution sequences. First, according to software decompiling and tracking stack changes, the execution traces composed of a series of function addresses were acquired. Then these traces were modeled as execution sequences and then simplified so as to get simplified sequences (SFS), followed by the extraction of patterns through pattern extraction (PE) algorithm from SFS. After that, evaluating indicators inner-importance and inter-importance were designed to measure the noteworthiness of functions in DNFM algorithm. Finally, these functions were sorted by their noteworthiness. Comparison and contrast were conducted on the experiment results from two traditional complex network-based node mining methods, namely PageRank and DegreeRank. The results show that the DNFM method can mine noteworthy functions in software effectively and precisely. PMID:28278276

  13. 3 CFR 13484 - Executive Order 13484 of January 9, 2009. Amending the Order of Succession Within the Department...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... laws of the United States of America, including the Federal Vacancies Reform Act of 1998, 5 U.S.C. 3345... 3345(a)(3) of title 5, United States Code); and “(n) State Executive Directors of the Farm Service... pay requirements of section 3345(a)(3) of title 5, United States Code).”. Sec. 2. Section 3(a)...

  14. Maximal dinucleotide comma-free codes.

    PubMed

    Fimmel, Elena; Strüngmann, Lutz

    2016-01-21

    The problem of retrieval and maintenance of the correct reading frame plays a significant role in RNA transcription. Circular codes, and especially comma-free codes, can help to understand the underlying mechanisms of error-detection in this process. In recent years much attention has been paid to the investigation of trinucleotide circular codes (see, for instance, Fimmel et al., 2014; Fimmel and Strüngmann, 2015a; Michel and Pirillo, 2012; Michel et al., 2012, 2008), while dinucleotide codes had been touched on only marginally, even though dinucleotides are associated to important biological functions. Recently, all maximal dinucleotide circular codes were classified (Fimmel et al., 2015; Michel and Pirillo, 2013). The present paper studies maximal dinucleotide comma-free codes and their close connection to maximal dinucleotide circular codes. We give a construction principle for such codes and provide a graphical representation that allows them to be visualized geometrically. Moreover, we compare the results for dinucleotide codes with the corresponding situation for trinucleotide maximal self-complementary C(3)-codes. Finally, the results obtained are discussed with respect to Crick׳s hypothesis about frame-shift-detecting codes without commas.

  15. Performing aggressive code optimization with an ability to rollback changes made by the aggressive optimizations

    DOEpatents

    Gschwind, Michael K

    2013-07-23

    Mechanisms for aggressively optimizing computer code are provided. With these mechanisms, a compiler determines an optimization to apply to a portion of source code and determines if the optimization as applied to the portion of source code will result in unsafe optimized code that introduces a new source of exceptions being generated by the optimized code. In response to a determination that the optimization is an unsafe optimization, the compiler generates an aggressively compiled code version, in which the unsafe optimization is applied, and a conservatively compiled code version in which the unsafe optimization is not applied. The compiler stores both versions and provides them for execution. Mechanisms are provided for switching between these versions during execution in the event of a failure of the aggressively compiled code version. Moreover, predictive mechanisms are provided for predicting whether such a failure is likely.

  16. Detection of the oomycete Pythium insidiosum by real-time PCR targeting the gene coding for exo-1,3-β-glucanase.

    PubMed

    Keeratijarut, Angsana; Lohnoo, Tassanee; Yingyong, Wanta; Rujirawat, Thidarat; Srichunrusami, Chutatip; Onpeaw, Pornpit; Chongtrakool, Piriyaporn; Brandhorst, T Tristan; Krajaejun, Theerapong

    2015-09-01

    Pythiosis is a life-threatening infectious disease caused by Pythium insidiosum. Early and accurate diagnosis is the key to prompt treatment and an improved prognosis for patients with pythiosis. An alternative to microbiological and immunological approaches for facilitating diagnosis of pythiosis is the PCR-based assay. Until recently, the ribosomal DNA (rDNA) region was the only target available for PCR-based detection of P. insidiosum. Failure to detect P. insidiosum by PCR amplification using the rDNA-specific primers has been reported. PinsEXO1, encoding an exo-1,3-β-glucanase, is an alternative, novel and efficient target for identification of P. insidiosum by conventional PCR. In this study, we aimed to develop a real-time (RT)-PCR approach targeting PinsEXO1 and compare its performance with conventional PCR for the detection of P. insidiosum. Both conventional and RT-PCR assays were positive for all 35 P. insidiosum strains tested, whilst all 58 control fungi were negative. The turnaround time for conventional PCR was 10 h, whilst that for RT-PCR was 7.5 h. The lowest amounts of genomic DNA template required for successful amplification by conventional and RT-PCR were 1 and 1 × 10(-4) ng, respectively. In conclusion, the RT-PCR assay retained 100% sensitivity and 100% specificity for detection of P. insidiosum. It showed a substantially improved analytical sensitivity and turnaround time that could improve diagnosis of pythiosis. The assay could also facilitate quantitative DNA analysis and epidemiological studies of P. insidiosum.

  17. A Survey of New Trends in Symbolic Execution for Software Testing and Analysis

    NASA Technical Reports Server (NTRS)

    Pasareanu, Corina S.; Visser, Willem

    2009-01-01

    Symbolic execution is a well-known program analysis technique which represents values of program inputs with symbolic values instead of concrete (initialized) data and executes the program by manipulating program expressions involving the symbolic values. Symbolic execution has been proposed over three decades ago but recently it has found renewed interest in the research community, due in part to the progress in decision procedures, availability of powerful computers and new algorithmic developments. We provide a survey of some of the new research trends in symbolic execution, with particular emphasis on applications to test generation and program analysis. We first describe an approach that handles complex programming constructs such as input data structures, arrays, as well as multi-threading. We follow with a discussion of abstraction techniques that can be used to limit the (possibly infinite) number of symbolic configurations that need to be analyzed for the symbolic execution of looping programs. Furthermore, we describe recent hybrid techniques that combine concrete and symbolic execution to overcome some of the inherent limitations of symbolic execution, such as handling native code or availability of decision procedures for the application domain. Finally, we give a short survey of interesting new applications, such as predictive testing, invariant inference, program repair, analysis of parallel numerical programs and differential symbolic execution.

  18. Archimedes: A system that plans and executes mechanical assemblies

    SciTech Connect

    Strip, D.

    1990-01-01

    Archimedes is a prototype mechanical assembly system which generates and executes robot assembly programs from a CAD model input. The system addresses the unrealized potential for flexibility in robotic mechanical assembly applications by automating the programming task. Input is a solid model of the finished assembly. Parts relationships and geometric constraints are deduced from the solid model. A rule-based planner generates a generic'' assembly plan that satisfies the geometric constraints, as well as other constraints embodied in the rules. A retargetable plan compiler converts the generic plan into code specific to an application environment. Execution of the compiled plan in a workcell containing an Adept Two robot, a vision system, and other parts handling equipment will be shown on videotape.

  19. Kepler Scientific Workflow Design and Execution with Contexts

    SciTech Connect

    Ngu, Anne Hee Hiong; Jamnagarwala, Arwa; Chin, George; Sivaramakrishnan, Chandrika; Critchlow, Terence J.

    2011-09-01

    A context-aware scientific workflow is a typical scientific workflow that is enhanced with context binding and awareness mechanisms. Context facilitates further configuration of the scientific workflow at runtime such that it is tuned to its environment during execution and responds intelligently based on such awareness without customized coding of the workflow. In this paper, we present a context annotation framework, which supports rapid development of context-aware scientific workflows. Context annotation enables a diverse type of actor in Kepler that may bind with different sensed environmental information as part of the actor’s regular data. Context-aware actors simplify the construction of scientific workflows that require intricate knowledge in initializing and configuring a large number of parameters to cover all different execution conditions. This paper presents the motivation, system design, implementation, and usage of context annotation in relation to the Kepler scientific workflow system.

  20. An Extended Proof-Carrying Code Framework for Security Enforcement

    NASA Astrophysics Data System (ADS)

    Pirzadeh, Heidar; Dubé, Danny; Hamou-Lhadj, Abdelwahab

    The rapid growth of the Internet has resulted in increased attention to security to protect users from being victims of security threats. In this paper, we focus on security mechanisms that are based on Proof-Carrying Code (PCC) techniques. In a PCC system, a code producer sends a code along with its safety proof to the consumer. The consumer executes the code only if the proof is valid. Although PCC has been shown to be a useful security framework, it suffers from the sheer size of typical proofs -proofs of even small programs can be considerably large. In this paper, we propose an extended PCC framework (EPCC) in which, instead of the proof, a proof generator for the program in question is transmitted. This framework enables the execution of the proof generator and the recovery of the proof on the consumer's side in a secure manner using a newly created virtual machine called the VEP (Virtual Machine for Extended PCC).

  1. Executive Function in Adolescents with ADHD

    ERIC Educational Resources Information Center

    Martel, Michelle; Nikolas, Molly; Nigg, Joel T.

    2007-01-01

    A study is conducted to determine the specificity of executive function weakness in attention-deficit/hyperactivity disorder (ADHD) during adolescence. Results suggest that executive function weakness in ADHD is specifically associated with symptoms of inattention-disorganization.

  2. Accumulate repeat accumulate codes

    NASA Technical Reports Server (NTRS)

    Abbasfar, Aliazam; Divsalar, Dariush; Yao, Kung

    2004-01-01

    In this paper we propose an innovative channel coding scheme called 'Accumulate Repeat Accumulate codes' (ARA). This class of codes can be viewed as serial turbo-like codes, or as a subclass of Low Density Parity Check (LDPC) codes, thus belief propagation can be used for iterative decoding of ARA codes on a graph. The structure of encoder for this class can be viewed as precoded Repeat Accumulate (RA) code or as precoded Irregular Repeat Accumulate (IRA) code, where simply an accumulator is chosen as a precoder. Thus ARA codes have simple, and very fast encoder structure when they representing LDPC codes. Based on density evolution for LDPC codes through some examples for ARA codes, we show that for maximum variable node degree 5 a minimum bit SNR as low as 0.08 dB from channel capacity for rate 1/2 can be achieved as the block size goes to infinity. Thus based on fixed low maximum variable node degree, its threshold outperforms not only the RA and IRA codes but also the best known LDPC codes with the dame maximum node degree. Furthermore by puncturing the accumulators any desired high rate codes close to code rate 1 can be obtained with thresholds that stay close to the channel capacity thresholds uniformly. Iterative decoding simulation results are provided. The ARA codes also have projected graph or protograph representation that allows for high speed decoder implementation.

  3. Concatenated Coding Using Trellis-Coded Modulation

    NASA Technical Reports Server (NTRS)

    Thompson, Michael W.

    1997-01-01

    In the late seventies and early eighties a technique known as Trellis Coded Modulation (TCM) was developed for providing spectrally efficient error correction coding. Instead of adding redundant information in the form of parity bits, redundancy is added at the modulation stage thereby increasing bandwidth efficiency. A digital communications system can be designed to use bandwidth-efficient multilevel/phase modulation such as Amplitude Shift Keying (ASK), Phase Shift Keying (PSK), Differential Phase Shift Keying (DPSK) or Quadrature Amplitude Modulation (QAM). Performance gain can be achieved by increasing the number of signals over the corresponding uncoded system to compensate for the redundancy introduced by the code. A considerable amount of research and development has been devoted toward developing good TCM codes for severely bandlimited applications. More recently, the use of TCM for satellite and deep space communications applications has received increased attention. This report describes the general approach of using a concatenated coding scheme that features TCM and RS coding. Results have indicated that substantial (6-10 dB) performance gains can be achieved with this approach with comparatively little bandwidth expansion. Since all of the bandwidth expansion is due to the RS code we see that TCM based concatenated coding results in roughly 10-50% bandwidth expansion compared to 70-150% expansion for similar concatenated scheme which use convolution code. We stress that combined coding and modulation optimization is important for achieving performance gains while maintaining spectral efficiency.

  4. Coset Codes Viewed as Terminated Convolutional Codes

    NASA Technical Reports Server (NTRS)

    Fossorier, Marc P. C.; Lin, Shu

    1996-01-01

    In this paper, coset codes are considered as terminated convolutional codes. Based on this approach, three new general results are presented. First, it is shown that the iterative squaring construction can equivalently be defined from a convolutional code whose trellis terminates. This convolutional code determines a simple encoder for the coset code considered, and the state and branch labelings of the associated trellis diagram become straightforward. Also, from the generator matrix of the code in its convolutional code form, much information about the trade-off between the state connectivity and complexity at each section, and the parallel structure of the trellis, is directly available. Based on this generator matrix, it is shown that the parallel branches in the trellis diagram of the convolutional code represent the same coset code C(sub 1), of smaller dimension and shorter length. Utilizing this fact, a two-stage optimum trellis decoding method is devised. The first stage decodes C(sub 1), while the second stage decodes the associated convolutional code, using the branch metrics delivered by stage 1. Finally, a bidirectional decoding of each received block starting at both ends is presented. If about the same number of computations is required, this approach remains very attractive from a practical point of view as it roughly doubles the decoding speed. This fact is particularly interesting whenever the second half of the trellis is the mirror image of the first half, since the same decoder can be implemented for both parts.

  5. An Assessment of the Detection of Highly Enriched Uranium and its Use in an Improvised Nuclear Device using the Monte Carlo Computer Code MCNP-5

    NASA Astrophysics Data System (ADS)

    Cochran, Thomas

    2007-04-01

    In 2002 and again in 2003, an investigative journalist unit at ABC News transported a 6.8 kilogram metallic slug of depleted uranium (DU) via shipping container from Istanbul, Turkey to Brooklyn, NY and from Jakarta, Indonesia to Long Beach, CA. Targeted inspection of these shipping containers by Department of Homeland Security (DHS) personnel, included the use of gamma-ray imaging, portal monitors and hand-held radiation detectors, did not uncover the hidden DU. Monte Carlo analysis of the gamma-ray intensity and spectrum of a DU slug and one consisting of highly-enriched uranium (HEU) showed that DU was a proper surrogate for testing the ability of DHS to detect the illicit transport of HEU. Our analysis using MCNP-5 illustrated the ease of fully shielding an HEU sample to avoid detection. The assembly of an Improvised Nuclear Device (IND) -- a crude atomic bomb -- from sub-critical pieces of HEU metal was then examined via Monte Carlo criticality calculations. Nuclear explosive yields of such an IND as a function of the speed of assembly of the sub-critical HEU components were derived. A comparison was made between the more rapid assembly of sub-critical pieces of HEU in the ``Little Boy'' (Hiroshima) weapon's gun barrel and gravity assembly (i.e., dropping one sub-critical piece of HEU on another from a specified height). Based on the difficulty of detection of HEU and the straightforward construction of an IND utilizing HEU, current U.S. government policy must be modified to more urgently prioritize elimination of and securing the global inventories of HEU.

  6. Executive Support Systems: An Innovation Decision Perspective

    DTIC Science & Technology

    1990-01-01

    account . The exception and annotation ability of MIDS alerted the executives to what was happening and prevented a ripple effect of overreactions...information directly to these executives, an executive support system (ESS) allows more effective analysis, control, planning, and decision making...Automated improve- ments to the management process have the potential to highly leverage the executive’s effectiveness . An ESS is a concept, a clustered IT

  7. Optical CDMA with Embedded Spectral-Polarization Coding over Double Balanced Differential-Detector

    NASA Astrophysics Data System (ADS)

    Huang, Jen-Fa; Yen, Chih-Ta; Chen, Bo-Hau

    A spectral-polarization coding (SPC) optical code-division multiple-access (OCDMA) configuration structured over arrayed-waveguide grating (AWG) router is proposed. The polarization-division double balanced detector is adopted to execute difference detection and enhances system performance. The signal-to-noise ratio (SNR) is derived by taking the effect of PIIN into account. The result indicates that there would be up to 9-dB SNR improvement than the conventional spectral-amplitude coding (SAC) structures with Walsh-Hadamard codes. Mathematical deriving results of the SNR demonstrate the system embedded with the orthogonal state of polarization (SOP) will suppress effectively phase-induced intensity noise (PIIN). In addition, we will analyze the relations about bit error rate (BER) vs. the number of active users under the different encoding schemes and compare them with our proposed scheme. The BER vs. the effective power under the different encoding scheme with the same number of simultaneous active user conditions are also revealed. Finally, the polarization-matched factor and the difference between simulated and experimental values are discussed.

  8. Efficiency of a model human image code

    NASA Technical Reports Server (NTRS)

    Watson, Andrew B.

    1987-01-01

    Hypothetical schemes for neural representation of visual information can be expressed as explicit image codes. Here, a code modeled on the simple cells of the primate striate cortex is explored. The Cortex transform maps a digital image into a set of subimages (layers) that are bandpass in spatial frequency and orientation. The layers are sampled so as to minimize the number of samples and still avoid aliasing. Samples are quantized in a manner that exploits the bandpass contrast-masking properties of human vision. The entropy of the samples is computed to provide a lower bound on the code size. Finally, the image is reconstructed from the code. Psychophysical methods are derived for comparing the original and reconstructed images to evaluate the sufficiency of the code. When each resolution is coded at the threshold for detection artifacts, the image-code size is about 1 bit/pixel.

  9. Hydrology Section Executive Committee minutes

    NASA Astrophysics Data System (ADS)

    Mercer, James W.

    The AGU Hydrology Section Executive Committee Meeting was called to order at approximately 4 P.M. on Monday, December 8, 1986 by Marshall Moss. In attendance were George Pinder, Allan Freeze, Jim Mercer, Ron Cummings, Ken Bencala, Jim Wallis, Simon Ince, Jack Stone, Jeff Dozier, Don Nielson, Ivan Johnson, John Wilson, Helen Peters, Jurate Landwehr, Karen Prestegaard, Soroosh Sorooshian, Jery Stedinger, Peter Kitanidis, Rafael Bras, and Waldo Smith.

  10. Financial accounting for radiology executives.

    PubMed

    Seidmann, Abraham; Mehta, Tushar

    2005-03-01

    The authors review the role of financial accounting information from the perspective of a radiology executive. They begin by introducing the role of pro forma statements. They discuss the fundamental concepts of accounting, including the matching principle and accrual accounting. The authors then explore the use of financial accounting information in making investment decisions in diagnostic medical imaging. The paper focuses on critically evaluating the benefits and limitations of financial accounting for decision making in a radiology practice.

  11. What makes an effective executive.

    PubMed

    Drucker, Peter F

    2004-06-01

    An effective executive does not need to be a leader in the typical sense of the word. Peter Drucker, the author of more than two dozen HBR articles, says some of the best business and nonprofit CEOs he has worked with over his 65-year consulting career were not stereotypical leaders. They ranged from extroverted to nearly reclusive, from easygoing to controlling, from generous to parsimonious. What made them all effective is that they followed the same eight practices: They asked, "What needs to be done?" They also asked, "What is right for the enterprise?" They developed action plans. They took responsibility for decisions. They took responsibility for communicating. They were focused on opportunities rather than problems. They ran productive meetings. And they thought and said "we" rather than "I." The first two practices provided them with the knowledge they needed. The next four helped them convert this knowledge into effective action, for knowledge is useless to executives until it has been translated into deeds. The last two ensured that the whole organization felt responsible and accountable. Effective executives know that they have authority only because they have the trust of the organization. This means they must think of the needs and opportunities of the organization before they think of their own needs and opportunities. The author also suggests a ninth practice that's so important, he elevates it to the level of a rule: Listen first, speak last. The demand for effective executives is much too great to be satisfied by those few people who are simply born to lead. Effectiveness is a discipline. And, like every discipline, it can be learned and must be earned.

  12. Hydrology Section Executive Committee Minutes

    NASA Astrophysics Data System (ADS)

    Mercer, James W.

    The AGU Hydrology Section Executive Committee Meeting was called to order at approximately 4 P.M. on Monday, May 18, 1987, by Hydrology Section President Marshall Moss. In attendance were President-Elect George Pinder, Secretary Jim Mercer, Ron Cummings, Helen Joyce Peters, Peter Eagleson, Stephen Burges, Jim Wallis, Jurate Landwehr, Don Nielson, Ken Bencala, Pete Loucks, Jery Stedinger, Dennis Lettenmaier, Lenny Konikow, Ken Potter, John Wilson, Ivan Johnson, and Judy Holoviak.

  13. FORTRAN Automated Code Evaluation System (FACES) user's manual, version 2

    NASA Technical Reports Server (NTRS)

    1975-01-01

    A system which provides analysis services for FORTRAN based software systems not normally available from system software is presented. The system is not a compiler, and compiler syntax diagnostics are not duplicated. For maximum adaptation to FORTRAN dialects, the code presented to the system is assumed to be compiler acceptable. The system concentrates on acceptable FORTRAN code features which are likely to produce undesirable results and identifies potential trouble areas before they become execution time malfunctions.

  14. Deterministic Execution of Ptides Programs

    DTIC Science & Technology

    2013-05-15

    are developed in Ptolemy , a design and simulation environment for heteroge- neous systems. This framework also contains a code generation framework... Ptolemy , a design and simulation environment for heteroge- neous systems. This framework also contains a code generation framework which is leveraged to...generation is implemented in Ptolemy II, [4], an academic tool for designing and experimenting with heterogeneous system models. The first section of

  15. Concurrent Image Processing Executive (CIPE)

    NASA Technical Reports Server (NTRS)

    Lee, Meemong; Cooper, Gregory T.; Groom, Steven L.; Mazer, Alan S.; Williams, Winifred I.

    1988-01-01

    The design and implementation of a Concurrent Image Processing Executive (CIPE), which is intended to become the support system software for a prototype high performance science analysis workstation are discussed. The target machine for this software is a JPL/Caltech Mark IIIfp Hypercube hosted by either a MASSCOMP 5600 or a Sun-3, Sun-4 workstation; however, the design will accommodate other concurrent machines of similar architecture, i.e., local memory, multiple-instruction-multiple-data (MIMD) machines. The CIPE system provides both a multimode user interface and an applications programmer interface, and has been designed around four loosely coupled modules; (1) user interface, (2) host-resident executive, (3) hypercube-resident executive, and (4) application functions. The loose coupling between modules allows modification of a particular module without significantly affecting the other modules in the system. In order to enhance hypercube memory utilization and to allow expansion of image processing capabilities, a specialized program management method, incremental loading, was devised. To minimize data transfer between host and hypercube a data management method which distributes, redistributes, and tracks data set information was implemented.

  16. The Planning Execution Monitoring Architecture

    NASA Technical Reports Server (NTRS)

    Wang, Lui; Ly, Bebe; Crocker, Alan; Schreckenghost, Debra; Mueller, Stephen; Phillips, Robert; Wadsworth, David; Sorensen, Charles

    2011-01-01

    The Planning Execution Monitoring (PEM) architecture is a design concept for developing autonomous cockpit command and control software. The PEM architecture is designed to reduce the operations costs in the space transportation system through the use of automation while improving safety and operability of the system. Specifically, the PEM autonomous framework enables automatic performance of many vehicle operations that would typically be performed by a human. Also, this framework supports varying levels of autonomous control, ranging from fully automatic to fully manual control. The PEM autonomous framework interfaces with the core flight software to perform flight procedures. It can either assist human operators in performing procedures or autonomously execute routine cockpit procedures based on the operational context. Most importantly, the PEM autonomous framework promotes and simplifies the capture, verification, and validation of the flight operations knowledge. Through a hierarchical decomposition of the domain knowledge, the vehicle command and control capabilities are divided into manageable functional "chunks" that can be captured and verified separately. These functional units, each of which has the responsibility to manage part of the vehicle command and control, are modular, re-usable, and extensible. Also, the functional units are self-contained and have the ability to plan and execute the necessary steps for accomplishing a task based upon the current mission state and available resources. The PEM architecture has potential for application outside the realm of spaceflight, including management of complex industrial processes, nuclear control, and control of complex vehicles such as submarines or unmanned air vehicles.

  17. On the Evolutionary Origins of Executive Functions

    ERIC Educational Resources Information Center

    Ardila, Alfredo

    2008-01-01

    In this paper it is proposed that the prefrontal lobe participates in two closely related but different executive function abilities: (1) "metacognitive executive functions": problem solving, planning, concept formation, strategy development and implementation, controlling attention, working memory, and the like; that is, executive functions as…

  18. Musical Expertise, Bilingualism, and Executive Functioning

    ERIC Educational Resources Information Center

    Bialystok, Ellen; DePape, Anne-Marie

    2009-01-01

    The authors investigated whether intensive musical experience leads to enhancements in executive processing, as has been shown for bilingualism. Young adults who were bilinguals, musical performers (instrumentalists or vocalists), or neither completed 3 cognitive measures and 2 executive function tasks based on conflict. Both executive function…

  19. 45 CFR 1700.5 - Executive Director.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Executive Director. 1700.5 Section 1700.5 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL COMMISSION ON LIBRARIES AND INFORMATION SCIENCE ORGANIZATION AND FUNCTIONS § 1700.5 Executive Director. (a) The Executive Director...

  20. Assessing Executive Functioning: A Pragmatic Review

    ERIC Educational Resources Information Center

    Hass, Michael R.; Patterson, Ashlea; Sukraw, Jocelyn; Sullivan, Brianna M.

    2014-01-01

    Despite the common usage of the term "executive functioning" in neuropsychology, several aspects of this concept remain unsettled. In this paper, we will address some of the issues surrounding the notion of executive functioning and how an understanding of executive functioning and its components might assist school-based practitioners…

  1. 29 CFR 452.19 - Executive functions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 2 2014-07-01 2014-07-01 false Executive functions. 452.19 Section 452.19 Labor... DISCLOSURE ACT OF 1959 Coverage of Election Provisions § 452.19 Executive functions. The definitional phrase... other executive functions of a labor organization” brings within the term “officer” any person who...

  2. 29 CFR 452.19 - Executive functions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Executive functions. 452.19 Section 452.19 Labor... DISCLOSURE ACT OF 1959 Coverage of Election Provisions § 452.19 Executive functions. The definitional phrase... other executive functions of a labor organization” brings within the term “officer” any person who...

  3. 29 CFR 452.19 - Executive functions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 2 2011-07-01 2011-07-01 false Executive functions. 452.19 Section 452.19 Labor... DISCLOSURE ACT OF 1959 Coverage of Election Provisions § 452.19 Executive functions. The definitional phrase... other executive functions of a labor organization” brings within the term “officer” any person who...

  4. 49 CFR 1.39 - Executive Secretariat.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 1 2013-10-01 2013-10-01 false Executive Secretariat. 1.39 Section 1.39... of the Secretary Ost Officials § 1.39 Executive Secretariat. The Executive Secretariat provides... management functions and their responsibilities for formulating, coordinating and communicating major...

  5. 29 CFR 452.19 - Executive functions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 2 2013-07-01 2013-07-01 false Executive functions. 452.19 Section 452.19 Labor... DISCLOSURE ACT OF 1959 Coverage of Election Provisions § 452.19 Executive functions. The definitional phrase... other executive functions of a labor organization” brings within the term “officer” any person who...

  6. Executive Functions in Savant Artists with Autism

    ERIC Educational Resources Information Center

    Crane, Laura; Pring, Linda; Ryder, Nicola; Hermelin, Beate

    2011-01-01

    Although executive functions have been widely studied in individuals with autism spectrum disorders (ASD), there have been no direct empirical studies of executive abilities in savants with ASD. This study assessed three facets of executive ability (fluency, perseveration and monitoring) in savant artists with ASD, compared to non-talented adults…

  7. Primer for the Transportable Applications Executive

    NASA Technical Reports Server (NTRS)

    Carlson, P. A.; Emmanuelli, C. A.; Harris, E. L.; Perkins, D. C.

    1984-01-01

    The Transportable Applications Executive (TAE), an interactive multipurpose executive that provides commonly required functions for scientific analysis systems, is discussed. The concept of an executive is discussed and the various components of TAE are presented. These include on-line help information, the use of menus or commands to access analysis programs, and TAE command procedures.

  8. 29 CFR 452.19 - Executive functions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 2 2012-07-01 2012-07-01 false Executive functions. 452.19 Section 452.19 Labor... DISCLOSURE ACT OF 1959 Coverage of Election Provisions § 452.19 Executive functions. The definitional phrase... other executive functions of a labor organization” brings within the term “officer” any person who...

  9. 45 CFR 1700.5 - Executive Director.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 4 2014-10-01 2014-10-01 false Executive Director. 1700.5 Section 1700.5 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL COMMISSION ON LIBRARIES AND INFORMATION SCIENCE ORGANIZATION AND FUNCTIONS § 1700.5 Executive Director. (a) The Executive Director...

  10. Discussion on LDPC Codes and Uplink Coding

    NASA Technical Reports Server (NTRS)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  11. Bar Codes for Libraries.

    ERIC Educational Resources Information Center

    Rahn, Erwin

    1984-01-01

    Discusses the evolution of standards for bar codes (series of printed lines and spaces that represent numbers, symbols, and/or letters of alphabet) and describes the two types most frequently adopted by libraries--Code-A-Bar and CODE 39. Format of the codes is illustrated. Six references and definitions of terminology are appended. (EJS)

  12. Manually operated coded switch

    DOEpatents

    Barnette, Jon H.

    1978-01-01

    The disclosure relates to a manually operated recodable coded switch in which a code may be inserted, tried and used to actuate a lever controlling an external device. After attempting a code, the switch's code wheels must be returned to their zero positions before another try is made.

  13. Automatic Code Generation for Instrument Flight Software

    NASA Technical Reports Server (NTRS)

    Wagstaff, Kiri L.; Benowitz, Edward; Byrne, D. J.; Peters, Ken; Watney, Garth

    2008-01-01

    Automatic code generation can be used to convert software state diagrams into executable code, enabling a model- based approach to software design and development. The primary benefits of this process are reduced development time and continuous consistency between the system design (statechart) and its implementation. We used model-based design and code generation to produce software for the Electra UHF radios that is functionally equivalent to software that will be used by the Mars Reconnaissance Orbiter (MRO) and the Mars Science Laboratory to communicate with each other. The resulting software passed all of the relevant MRO flight software tests, and the project provides a useful case study for future work in model-based software development for flight software systems.

  14. How Executive Coaches Assess and Develop Emotional Intelligence in the Executive Suite

    ERIC Educational Resources Information Center

    McNevin, Mary

    2010-01-01

    This qualitative research study explores the connections between executive coaching and emotional intelligence (EI) when working with senior level executives. The focus is on coaching the senior executives (chief executive officer, chief financial officer, senior vice-presidents) of companies of over $1 billion dollars in revenue. Since research…

  15. Antiplagiarism Software Takes on the Honor Code

    ERIC Educational Resources Information Center

    Wasley, Paula

    2008-01-01

    Among the 100-odd colleges with academic honor codes, plagiarism-detection services raise a knotty problem: Is software compatible with a system based on trust? The answer frequently devolves to the size and culture of the university. Colleges with traditional student-run honor codes tend to "forefront" trust, emphasizing it above all else. This…

  16. QR Codes 101

    ERIC Educational Resources Information Center

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  17. ARA type protograph codes

    NASA Technical Reports Server (NTRS)

    Divsalar, Dariush (Inventor); Abbasfar, Aliazam (Inventor); Jones, Christopher R. (Inventor); Dolinar, Samuel J. (Inventor); Thorpe, Jeremy C. (Inventor); Andrews, Kenneth S. (Inventor); Yao, Kung (Inventor)

    2008-01-01

    An apparatus and method for encoding low-density parity check codes. Together with a repeater, an interleaver and an accumulator, the apparatus comprises a precoder, thus forming accumulate-repeat-accumulate (ARA codes). Protographs representing various types of ARA codes, including AR3A, AR4A and ARJA codes, are described. High performance is obtained when compared to the performance of current repeat-accumulate (RA) or irregular-repeat-accumulate (IRA) codes.

  18. CRYPTOCHROME mediates behavioral executive choice in response to UV light

    PubMed Central

    Baik, Lisa S.; Fogle, Keri J.; Roberts, Logan; Galschiodt, Alexis M.; Chevez, Joshua A.; Recinos, Yocelyn; Nguy, Vinh; Holmes, Todd C.

    2017-01-01

    Drosophila melanogaster CRYPTOCHROME (CRY) mediates behavioral and electrophysiological responses to blue light coded by circadian and arousal neurons. However, spectroscopic and biochemical assays of heterologously expressed CRY suggest that CRY may mediate functional responses to UV-A (ultraviolet A) light as well. To determine the relative contributions of distinct phototransduction systems, we tested mutants lacking CRY and mutants with disrupted opsin-based phototransduction for behavioral and electrophysiological responses to UV light. CRY and opsin-based external photoreceptor systems cooperate for UV light-evoked acute responses. CRY mediates behavioral avoidance responses related to executive choice, consistent with its expression in central brain neurons. PMID:28062690

  19. Peripheral coding of taste

    PubMed Central

    Liman, Emily R.; Zhang, Yali V.; Montell, Craig

    2014-01-01

    Five canonical tastes, bitter, sweet, umami (amino acid), salty and sour (acid) are detected by animals as diverse as fruit flies and humans, consistent with a near universal drive to consume fundamental nutrients and to avoid toxins or other harmful compounds. Surprisingly, despite this strong conservation of basic taste qualities between vertebrates and invertebrates, the receptors and signaling mechanisms that mediate taste in each are highly divergent. The identification over the last two decades of receptors and other molecules that mediate taste has led to stunning advances in our understanding of the basic mechanisms of transduction and coding of information by the gustatory systems of vertebrates and invertebrates. In this review, we discuss recent advances in taste research, mainly from the fly and mammalian systems, and we highlight principles that are common across species, despite stark differences in receptor types. PMID:24607224

  20. Autism Spectrum Disorder and intact executive functioning.

    PubMed

    Ferrara, R; Ansermet, F; Massoni, F; Petrone, L; Onofri, E; Ricci, P; Archer, T; Ricci, S

    2016-01-01

    Earliest notions concerning autism (Autism Spectrum Disorders, ASD) describe the disturbance in executive functioning. Despite altered definition, executive functioning, expressed as higher cognitive skills required complex behaviors linked to the prefrontal cortex, are defective in autism. Specific difficulties in children presenting autism or verbal disabilities at executive functioning levels have been identified. Nevertheless, the developmental deficit of executive functioning in autism is highly diversified with huge individual variation and may even be absent. The aim of the present study to examine the current standing of intact executive functioning intact in ASD.

  1. Advanced Avionics Breadboard Executive Design and Implementation

    NASA Technical Reports Server (NTRS)

    Adams, L. R.

    1972-01-01

    The advanced avionics breadboard (AAB) executive evolved from an effort to design and develop an avionics system. This executive is unique in that it supervises a triple redundant avionics computer system. Three IBM System 4 Pi/CP computers, operating synchronously and executing identical software, comprise the central processors which route data to and from a data bus via an input/output controller. The executive's basic function is to provide application programs with an efficient software structure within which to perform specific avionics application tasks. Although implemented in a triplex data management system, the AAB executive contains the flexibility to be adapted to other systems with minimal change.

  2. 28 CFR 2.46 - Execution of warrant and service of summons.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Execution of warrant and service of summons. 2.46 Section 2.46 Judicial Administration DEPARTMENT OF JUSTICE PAROLE, RELEASE, SUPERVISION AND RECOMMITMENT OF PRISONERS, YOUTH OFFENDERS, AND JUVENILE DELINQUENTS United States Code Prisoners and...

  3. 28 CFR 2.46 - Execution of warrant and service of summons.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Execution of warrant and service of summons. 2.46 Section 2.46 Judicial Administration DEPARTMENT OF JUSTICE PAROLE, RELEASE, SUPERVISION AND RECOMMITMENT OF PRISONERS, YOUTH OFFENDERS, AND JUVENILE DELINQUENTS United States Code Prisoners and...

  4. 28 CFR 2.46 - Execution of warrant and service of summons.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Execution of warrant and service of summons. 2.46 Section 2.46 Judicial Administration DEPARTMENT OF JUSTICE PAROLE, RELEASE, SUPERVISION AND RECOMMITMENT OF PRISONERS, YOUTH OFFENDERS, AND JUVENILE DELINQUENTS United States Code Prisoners and...

  5. Shift register generators and applications to coding

    NASA Technical Reports Server (NTRS)

    Morakis, J. C.

    1968-01-01

    The most important properties of shift register generated sequences are exposed. The application of shift registers as multiplication and division circuits leads to the generation of some error correcting and detecting codes.

  6. Robust entanglement distribution via quantum network coding

    NASA Astrophysics Data System (ADS)

    Epping, Michael; Kampermann, Hermann; Bruß, Dagmar

    2016-10-01

    Many protocols of quantum information processing, like quantum key distribution or measurement-based quantum computation, ‘consume’ entangled quantum states during their execution. When participants are located at distant sites, these resource states need to be distributed. Due to transmission losses quantum repeater become necessary for large distances (e.g. ≳ 300 {{km}}). Here we generalize the concept of the graph state repeater to D-dimensional graph states and to repeaters that can perform basic measurement-based quantum computations, which we call quantum routers. This processing of data at intermediate network nodes is called quantum network coding. We describe how a scheme to distribute general two-colourable graph states via quantum routers with network coding can be constructed from classical linear network codes. The robustness of the distribution of graph states against outages of network nodes is analysed by establishing a link to stabilizer error correction codes. Furthermore we show, that for any stabilizer error correction code there exists a corresponding quantum network code with similar error correcting capabilities.

  7. Multiplexed coding in the human basal ganglia

    NASA Astrophysics Data System (ADS)

    Andres, D. S.; Cerquetti, D.; Merello, M.

    2016-04-01

    A classic controversy in neuroscience is whether information carried by spike trains is encoded by a time averaged measure (e.g. a rate code), or by complex time patterns (i.e. a time code). Here we apply a tool to quantitatively analyze the neural code. We make use of an algorithm based on the calculation of the temporal structure function, which permits to distinguish what scales of a signal are dominated by a complex temporal organization or a randomly generated process. In terms of the neural code, this kind of analysis makes it possible to detect temporal scales at which a time patterns coding scheme or alternatively a rate code are present. Additionally, finding the temporal scale at which the correlation between interspike intervals fades, the length of the basic information unit of the code can be established, and hence the word length of the code can be found. We apply this algorithm to neuronal recordings obtained from the Globus Pallidus pars interna from a human patient with Parkinson’s disease, and show that a time pattern coding and a rate coding scheme co-exist at different temporal scales, offering a new example of multiplexed neuronal coding.

  8. An algorithm to find critical execution paths of software based on complex network

    NASA Astrophysics Data System (ADS)

    Huang, Guoyan; Zhang, Bing; Ren, Rong; Ren, Jiadong

    2015-01-01

    The critical execution paths play an important role in software system in terms of reducing the numbers of test date, detecting the vulnerabilities of software structure and analyzing software reliability. However, there are no efficient methods to discover them so far. Thus in this paper, a complex network-based software algorithm is put forward to find critical execution paths (FCEP) in software execution network. First, by analyzing the number of sources and sinks in FCEP, software execution network is divided into AOE subgraphs, and meanwhile, a Software Execution Network Serialization (SENS) approach is designed to generate execution path set in each AOE subgraph, which not only reduces ring structure's influence on path generation, but also guarantees the nodes' integrity in network. Second, according to a novel path similarity metric, similarity matrix is created to calculate the similarity among sets of path sequences. Third, an efficient method is taken to cluster paths through similarity matrices, and the maximum-length path in each cluster is extracted as the critical execution path. At last, a set of critical execution paths is derived. The experimental results show that the FCEP algorithm is efficient in mining critical execution path under software complex network.

  9. Average Likelihood Methods for Code Division Multiple Access (CDMA)

    DTIC Science & Technology

    2014-05-01

    AFOSR). Some of the work accomplished was possible by using the AFRL High Performance Computing servers ( Condor HPC). Approved for Public Release...A Matlab implementation of the parameters is shown below. The code was executed using AFRL Condor HPC cluster for calculating the values of

  10. Efficient entropy coding for scalable video coding

    NASA Astrophysics Data System (ADS)

    Choi, Woong Il; Yang, Jungyoup; Jeon, Byeungwoo

    2005-10-01

    The standardization for the scalable extension of H.264 has called for additional functionality based on H.264 standard to support the combined spatio-temporal and SNR scalability. For the entropy coding of H.264 scalable extension, Context-based Adaptive Binary Arithmetic Coding (CABAC) scheme is considered so far. In this paper, we present a new context modeling scheme by using inter layer correlation between the syntax elements. As a result, it improves coding efficiency of entropy coding in H.264 scalable extension. In simulation results of applying the proposed scheme to encoding the syntax element mb_type, it is shown that improvement in coding efficiency of the proposed method is up to 16% in terms of bit saving due to estimation of more adequate probability model.

  11. Hydrology Section Executive Committee Minutes

    NASA Astrophysics Data System (ADS)

    Johnson, A. Ivan

    The Hydrology Section Executive Committee (EC) convened at 8:20 A.M. on May 28, 1985, in Room 311 of the Convention Center in Baltimore, Md. The meeting was chaired by Hydrology Section President R. Allan Freeze. Section President-Elect Marshall Moss kept the minutes in the absence of the Section Secretary Thomas Maddock III. Also in attendance were William Back, Rafael Bras, Stephen Burges, Jerry Cohon, Ron Cummings, David Dawdy, Jacques Delleur, Leonard Konikow, Jurate Landwehr, Fred Molz, Don Nielsen, Joyce Peters, Karen Prestegaard, Tom Schmugge, Waldo Smith, Jery Stedinger, and Eric Wood.

  12. Rapid detection of HCV genotyping 1a, 1b, 2a, 3a, 3b and 6a in a single reaction using two-melting temperature codes by a real-time PCR-based assay.

    PubMed

    Athar, Muhammad Ammar; Xu, Ye; Xie, Xiaoting; Xu, Zhenxing; Ahmad, Vakil; Hayder, Zulfiqar; Hussain, Syed Sajid; Liao, Yiqun; Li, Qingge

    2015-09-15

    The genotype of the hepatitis C virus (HCV) is an important indicator for antiviral therapeutic response. We hereby described development of a rapid HCV genotyping approach that enabled the identification of the six most common HCV subtypes of Asia, i.e., 1a, 1b, 2a, 3a, 3b, and 6a, in a single reaction. Using two dual-labeled, self-quenched probes that target the core region of the HCV genome, the exact subtype could be accurately identified by two-melting temperature codes determined from the two respective probes in a real-time PCR assay. Analytical sensitivity studies using armored RNA samples representing each of the six HCV subtypes showed that 5 copies/reaction of HCV RNA could be detected. The assay was evaluated using 244 HCV-positive serum samples and the results were compared with sequencing analysis. Of the 224 samples, subtype 3a (127, 52.3%) was the dominant, followed by 1b (51, 20.9%), 3b (47, 19.3%), 2a (8, 3.3%), 6a (4, 1.6%) and the least was subtype 1a (1, 0.4%). Moreover, 6 (2.5%) mixed infection samples were also detected. These results were fully concordant with sequencing analysis. We concluded that this real-time PCR-based assay could provide a rapid and reliable tool for routine HCV genotyping in most Asian countries.

  13. Automatic generation of executable communication specifications from parallel applications

    SciTech Connect

    Pakin, Scott; Wu, Xing; Mueller, Frank

    2011-01-19

    Portable parallel benchmarks are widely used and highly effective for (a) the evaluation, analysis and procurement of high-performance computing (HPC) systems and (b) quantifying the potential benefits of porting applications for new hardware platforms. Yet, past techniques to synthetically parameterized hand-coded HPC benchmarks prove insufficient for today's rapidly-evolving scientific codes particularly when subject to multi-scale science modeling or when utilizing domain-specific libraries. To address these problems, this work contributes novel methods to automatically generate highly portable and customizable communication benchmarks from HPC applications. We utilize ScalaTrace, a lossless, yet scalable, parallel application tracing framework to collect selected aspects of the run-time behavior of HPC applications, including communication operations and execution time, while abstracting away the details of the computation proper. We subsequently generate benchmarks with identical run-time behavior from the collected traces. A unique feature of our approach is that we generate benchmarks in CONCEPTUAL, a domain-specific language that enables the expression of sophisticated communication patterns using a rich and easily understandable grammar yet compiles to ordinary C + MPI. Experimental results demonstrate that the generated benchmarks are able to preserve the run-time behavior - including both the communication pattern and the execution time - of the original applications. Such automated benchmark generation is particularly valuable for proprietary, export-controlled, or classified application codes: when supplied to a third party. Our auto-generated benchmarks ensure performance fidelity but without the risks associated with releasing the original code. This ability to automatically generate performance-accurate benchmarks from parallel applications is novel and without any precedence, to our knowledge.

  14. Coded continuous wave meteor radar

    NASA Astrophysics Data System (ADS)

    Vierinen, Juha; Chau, Jorge L.; Pfeffer, Nico; Clahsen, Matthias; Stober, Gunter

    2016-03-01

    The concept of a coded continuous wave specular meteor radar (SMR) is described. The radar uses a continuously transmitted pseudorandom phase-modulated waveform, which has several advantages compared to conventional pulsed SMRs. The coding avoids range and Doppler aliasing, which are in some cases problematic with pulsed radars. Continuous transmissions maximize pulse compression gain, allowing operation at lower peak power than a pulsed system. With continuous coding, the temporal and spectral resolution are not dependent on the transmit waveform and they can be fairly flexibly changed after performing a measurement. The low signal-to-noise ratio before pulse compression, combined with independent pseudorandom transmit waveforms, allows multiple geographically separated transmitters to be used in the same frequency band simultaneously without significantly interfering with each other. Because the same frequency band can be used by multiple transmitters, the same interferometric receiver antennas can be used to receive multiple transmitters at the same time. The principles of the signal processing are discussed, in addition to discussion of several practical ways to increase computation speed, and how to optimally detect meteor echoes. Measurements from a campaign performed with a coded continuous wave SMR are shown and compared with two standard pulsed SMR measurements. The type of meteor radar described in this paper would be suited for use in a large-scale multi-static network of meteor radar transmitters and receivers. Such a system would be useful for increasing the number of meteor detections to obtain improved meteor radar data products.

  15. GAMER: GPU-accelerated Adaptive MEsh Refinement code

    NASA Astrophysics Data System (ADS)

    Schive, Hsi-Yu; Tsai, Yu-Chih; Chiueh, Tzihong

    2016-12-01

    GAMER (GPU-accelerated Adaptive MEsh Refinement) serves as a general-purpose adaptive mesh refinement + GPU framework and solves hydrodynamics with self-gravity. The code supports adaptive mesh refinement (AMR), hydrodynamics with self-gravity, and a variety of GPU-accelerated hydrodynamic and Poisson solvers. It also supports hybrid OpenMP/MPI/GPU parallelization, concurrent CPU/GPU execution for performance optimization, and Hilbert space-filling curve for load balance. Although the code is designed for simulating galaxy formation, it can be easily modified to solve a variety of applications with different governing equations. All optimization strategies implemented in the code can be inherited straightforwardly.

  16. SOFIA: flight planning and execution

    NASA Astrophysics Data System (ADS)

    Leppik, K.

    2016-09-01

    The Stratospheric Observatory For Infrared Astronomy (SOFIA) is a 2.5-m telescope mounted inside of a Boeing 747SP. Planning and executing astronomical observations from an aircraft moving at 500 miles per hour has its own unique challenges and advantages. Scheduling and optimizing an entire year of science observations is a balancing act with target availability, instrument availability, and operational constraints. A SOFIA flight is well choreographed, and successfully executing observations on SOFIA requires many systems and people to work together- from the telescope assembly compensating for the continual vibration and movement of the plane in order to accurately point the telescope, the expertise of the telescope operators to prepare the telescope for use by the instrument operators, aircraft operations ensuring that the aircraft is ready for flight, and the mission systems control computers keeping track of all the data. In this paper we will discuss what it takes to plan a SOFIA flight, and what we do once we're in the air. We will share a typical science flight, as well as more challenging and unique observations that require SOFIA being in the right place at the right time.

  17. Honesty and Honor Codes.

    ERIC Educational Resources Information Center

    McCabe, Donald; Trevino, Linda Klebe

    2002-01-01

    Explores the rise in student cheating and evidence that students cheat less often at schools with an honor code. Discusses effective use of such codes and creation of a peer culture that condemns dishonesty. (EV)

  18. Cellulases and coding sequences

    DOEpatents

    Li, Xin-Liang; Ljungdahl, Lars G.; Chen, Huizhong

    2001-02-20

    The present invention provides three fungal cellulases, their coding sequences, recombinant DNA molecules comprising the cellulase coding sequences, recombinant host cells and methods for producing same. The present cellulases are from Orpinomyces PC-2.

  19. Cellulases and coding sequences

    DOEpatents

    Li, Xin-Liang; Ljungdahl, Lars G.; Chen, Huizhong

    2001-01-01

    The present invention provides three fungal cellulases, their coding sequences, recombinant DNA molecules comprising the cellulase coding sequences, recombinant host cells and methods for producing same. The present cellulases are from Orpinomyces PC-2.

  20. QR Code Mania!

    ERIC Educational Resources Information Center

    Shumack, Kellie A.; Reilly, Erin; Chamberlain, Nik

    2013-01-01

    space, has error-correction capacity, and can be read from any direction. These codes are used in manufacturing, shipping, and marketing, as well as in education. QR codes can be created to produce…

  1. DIANE multiparticle transport code

    NASA Astrophysics Data System (ADS)

    Caillaud, M.; Lemaire, S.; Ménard, S.; Rathouit, P.; Ribes, J. C.; Riz, D.

    2014-06-01

    DIANE is the general Monte Carlo code developed at CEA-DAM. DIANE is a 3D multiparticle multigroup code. DIANE includes automated biasing techniques and is optimized for massive parallel calculations.

  2. Method and apparatus for executing a shift in a hybrid transmission

    SciTech Connect

    Gupta, Pinaki; Kaminsky, Lawrence A; Demirovic, Besim

    2013-09-03

    A method for executing a transmission shift in a hybrid transmission including first and second electric machines includes executing a shift-through-neutral sequence from an initial transmission state to a target transmission state including executing an intermediate shift to neutral. Upon detecting a change in an output torque request while executing the shift-through-neutral sequence, possible recovery shift paths are identified. Available ones of the possible recovery shift paths are identified and a shift cost for each said available recovery shift path is evaluated. The available recovery shift path having a minimum shift cost is selected as a preferred recovery shift path and is executed to achieve a non-neutral transmission state.

  3. The Contribution of Prefrontal Executive Processes to Creating a Sense of Self**

    PubMed Central

    Hirstein, William

    2011-01-01

    According to several current theories, executive processes help achieve various mental actions such as remembering, planning and decision-making, by executing cognitive operations on representations held in consciousness. I plan to argue that these executive processes are partly responsible for our sense of self, because of the way they produce the impression of an active, controlling presence in consciousness. If we examine what philosophers have said about the “ego” (Descartes), “the Self” (Locke and Hume), the “self of all selves” (William James), we will find that it fits what is now known about executive processes. Hume, for instance, famously argued that he could not detect the self in consciousness, and this would correspond to the claim (made by Crick and Koch, for instance) that we are not conscious of the executive processes themselves, but rather of their results. PMID:21694967

  4. Operations analysis (study 2.1). Program listing for the LOVES computer code

    NASA Technical Reports Server (NTRS)

    Wray, S. T., Jr.

    1974-01-01

    A listing of the LOVES computer program is presented. The program is coded partially in SIMSCRIPT and FORTRAN. This version of LOVES is compatible with both the CDC 7600 and the UNIVAC 1108 computers. The code has been compiled, loaded, and executed successfully on the EXEC 8 system for the UNIVAC 1108.

  5. EMF wire code research

    SciTech Connect

    Jones, T.

    1993-11-01

    This paper examines the results of previous wire code research to determines the relationship with childhood cancer, wire codes and electromagnetic fields. The paper suggests that, in the original Savitz study, biases toward producing a false positive association between high wire codes and childhood cancer were created by the selection procedure.

  6. Universal Noiseless Coding Subroutines

    NASA Technical Reports Server (NTRS)

    Schlutsmeyer, A. P.; Rice, R. F.

    1986-01-01

    Software package consists of FORTRAN subroutines that perform universal noiseless coding and decoding of integer and binary data strings. Purpose of this type of coding to achieve data compression in sense that coded data represents original data perfectly (noiselessly) while taking fewer bits to do so. Routines universal because they apply to virtually any "real-world" data source.

  7. Executable Architecture Research at Old Dominion University

    NASA Technical Reports Server (NTRS)

    Tolk, Andreas; Shuman, Edwin A.; Garcia, Johnny J.

    2011-01-01

    Executable Architectures allow the evaluation of system architectures not only regarding their static, but also their dynamic behavior. However, the systems engineering community do not agree on a common formal specification of executable architectures. To close this gap and identify necessary elements of an executable architecture, a modeling language, and a modeling formalism is topic of ongoing PhD research. In addition, systems are generally defined and applied in an operational context to provide capabilities and enable missions. To maximize the benefits of executable architectures, a second PhD effort introduces the idea of creating an executable context in addition to the executable architecture. The results move the validation of architectures from the current information domain into the knowledge domain and improve the reliability of such validation efforts. The paper presents research and results of both doctoral research efforts and puts them into a common context of state-of-the-art of systems engineering methods supporting more agility.

  8. Mapping Local Codes to Read Codes.

    PubMed

    Bonney, Wilfred; Galloway, James; Hall, Christopher; Ghattas, Mikhail; Tramma, Leandro; Nind, Thomas; Donnelly, Louise; Jefferson, Emily; Doney, Alexander

    2017-01-01

    Background & Objectives: Legacy laboratory test codes make it difficult to use clinical datasets for meaningful translational research, where populations are followed for disease risk and outcomes over many years. The Health Informatics Centre (HIC) at the University of Dundee hosts continuous biochemistry data from the clinical laboratories in Tayside and Fife dating back as far as 1987. However, the HIC-managed biochemistry dataset is coupled with incoherent sample types and unstandardised legacy local test codes, which increases the complexity of using the dataset for reasonable population health outcomes. The objective of this study was to map the legacy local test codes to the Scottish 5-byte Version 2 Read Codes using biochemistry data extracted from the repository of the Scottish Care Information (SCI) Store.

  9. PREREM: an interactive data preprocessing code for INREM II. Part I: user's manual. Part II: code structure

    SciTech Connect

    Ryan, M.T.; Fields, D.E.

    1981-05-01

    PREREM is an interactive computer code developed as a data preprocessor for the INREM-II (Killough, Dunning, and Pleasant, 1978a) internal dose program. PREREM is intended to provide easy access to current and self-consistent nuclear decay and radionuclide-specific metabolic data sets. Provision is made for revision of metabolic data, and the code is intended for both production and research applications. Documentation for the code is in two parts. Part I is a user's manual which emphasizes interpretation of program prompts and choice of user input. Part II stresses internal structure and flow of program control and is intended to assist the researcher who wishes to revise or modify the code or add to its capabilities. PREREM is written for execution on a Digital Equipment Corporation PDP-10 System and much of the code will require revision before it can be run on other machines. The source program length is 950 lines (116 blocks) and computer core required for execution is 212 K bytes. The user must also have sufficient file space for metabolic and S-factor data sets. Further, 64 100 K byte blocks of computer storage space are required for the nuclear decay data file. Computer storage space must also be available for any output files produced during the PREREM execution. 9 refs., 8 tabs.

  10. Culture, executive function, and social understanding.

    PubMed

    Lewis, Charlie; Koyasu, Masuo; Oh, Seungmi; Ogawa, Ayako; Short, Benjamin; Huang, Zhao

    2009-01-01

    Much of the evidence from the West has shown links between children's developing self-control (executive function), their social experiences, and their social understanding (Carpendale & Lewis, 2006, chapters 5 and 6), across a range of cultures including China. This chapter describes four studies conducted in three Oriental cultures, suggesting that the relationships among social interaction, executive function, and social understanding are different in these cultures, implying that social and executive skills are underpinned by key cultural processes.

  11. Software Certification - Coding, Code, and Coders

    NASA Technical Reports Server (NTRS)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  12. 48 CFR 9901.315 - Executive Secretary.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... FEDERAL PROCUREMENT POLICY, OFFICE OF MANAGEMENT AND BUDGET ADMINISTRATION RULES AND PROCEDURES 9901.315 Executive Secretary. The Board's staff of professional, technical and supporting personnel is directed...

  13. NASA Capability Roadmaps Executive Summary

    NASA Technical Reports Server (NTRS)

    Willcoxon, Rita; Thronson, Harley; Varsi, Guilio; Mueller, Robert; Regenie, Victoria; Inman, Tom; Crooke, Julie; Coulter, Dan

    2005-01-01

    This document is the result of eight months of hard work and dedication from NASA, industry, other government agencies, and academic experts from across the nation. It provides a summary of the capabilities necessary to execute the Vision for Space Exploration and the key architecture decisions that drive the direction for those capabilities. This report is being provided to the Exploration Systems Architecture Study (ESAS) team for consideration in development of an architecture approach and investment strategy to support NASA future mission, programs and budget requests. In addition, it will be an excellent reference for NASA's strategic planning. A more detailed set of roadmaps at the technology and sub-capability levels are available on CD. These detailed products include key driving assumptions, capability maturation assessments, and technology and capability development roadmaps.

  14. Advanced Fuels Campaign Execution Plan

    SciTech Connect

    Kemal Pasamehmetoglu

    2010-10-01

    The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the “Grand Challenge” for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

  15. Advanced Fuels Campaign Execution Plan

    SciTech Connect

    Kemal Pasamehmetoglu

    2011-09-01

    The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the 'Grand Challenge' for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

  16. Sequentially Executed Model Evaluation Framework

    SciTech Connect

    2015-10-20

    Provides a message passing framework between generic input, model and output drivers, and specifies an API for developing such drivers. Also provides batch and real-time controllers which step the model and I/O through the time domain (or other discrete domain), and sample I/O drivers. This is a library framework, and does not, itself, solve any problems or execute any modeling. The SeMe framework aids in development of models which operate on sequential information, such as time-series, where evaluation is based on prior results combined with new data for this iteration. Has applications in quality monitoring, and was developed as part of the CANARY-EDS software, where real-time water quality data is being analyzed for anomalies.

  17. Sequentially Executed Model Evaluation Framework

    SciTech Connect

    2014-02-14

    Provides a message passing framework between generic input, model and output drivers, and specifies an API for developing such drivers. Also provides batch and real-time controllers which step the model and 1/0 through the time domain (or other discrete domain), and sample 1/0 drivers. This is a Framework library framework, and does not, itself, solve any problems or execute any modelling. The SeMe framework aids in development of models which operate on sequential information, such as time-series, where evaluation is based on prior results combined with new data for this iteration. Ha) applications in quality monitoring, and was developed as part of the CANARY-EDS software, where real-time water quality data is being analyzed

  18. XSOR codes users manual

    SciTech Connect

    Jow, Hong-Nian; Murfin, W.B.; Johnson, J.D.

    1993-11-01

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ``XSOR``. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms.

  19. Insertion of operation-and-indicate instructions for optimized SIMD code

    DOEpatents

    Eichenberger, Alexander E; Gara, Alan; Gschwind, Michael K

    2013-06-04

    Mechanisms are provided for inserting indicated instructions for tracking and indicating exceptions in the execution of vectorized code. A portion of first code is received for compilation. The portion of first code is analyzed to identify non-speculative instructions performing designated non-speculative operations in the first code that are candidates for replacement by replacement operation-and-indicate instructions that perform the designated non-speculative operations and further perform an indication operation for indicating any exception conditions corresponding to special exception values present in vector register inputs to the replacement operation-and-indicate instructions. The replacement is performed and second code is generated based on the replacement of the at least one non-speculative instruction. The data processing system executing the compiled code is configured to store special exception values in vector output registers, in response to a speculative instruction generating an exception condition, without initiating exception handling.

  20. DLLExternalCode

    SciTech Connect

    Greg Flach, Frank Smith

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  1. Defeating the coding monsters.

    PubMed

    Colt, Ross

    2007-02-01

    Accuracy in coding is rapidly becoming a required skill for military health care providers. Clinic staffing, equipment purchase decisions, and even reimbursement will soon be based on the coding data that we provide. Learning the complicated myriad of rules to code accurately can seem overwhelming. However, the majority of clinic visits in a typical outpatient clinic generally fall into two major evaluation and management codes, 99213 and 99214. If health care providers can learn the rules required to code a 99214 visit, then this will provide a 90% solution that can enable them to accurately code the majority of their clinic visits. This article demonstrates a step-by-step method to code a 99214 visit, by viewing each of the three requirements as a monster to be defeated.

  2. A general multiblock Euler code for propulsion integration. Volume 3: User guide for the Euler code

    NASA Technical Reports Server (NTRS)

    Chen, H. C.; Su, T. Y.; Kao, T. J.

    1991-01-01

    This manual explains the procedures for using the general multiblock Euler (GMBE) code developed under NASA contract NAS1-18703. The code was developed for the aerodynamic analysis of geometrically complex configurations in either free air or wind tunnel environments (vol. 1). The complete flow field is divided into a number of topologically simple blocks within each of which surface fitted grids and efficient flow solution algorithms can easily be constructed. The multiblock field grid is generated with the BCON procedure described in volume 2. The GMBE utilizes a finite volume formulation with an explicit time stepping scheme to solve the Euler equations. A multiblock version of the multigrid method was developed to accelerate the convergence of the calculations. This user guide provides information on the GMBE code, including input data preparations with sample input files and a sample Unix script for program execution in the UNICOS environment.

  3. On the linear programming bound for linear Lee codes.

    PubMed

    Astola, Helena; Tabus, Ioan

    2016-01-01

    Based on an invariance-type property of the Lee-compositions of a linear Lee code, additional equality constraints can be introduced to the linear programming problem of linear Lee codes. In this paper, we formulate this property in terms of an action of the multiplicative group of the field [Formula: see text] on the set of Lee-compositions. We show some useful properties of certain sums of Lee-numbers, which are the eigenvalues of the Lee association scheme, appearing in the linear programming problem of linear Lee codes. Using the additional equality constraints, we formulate the linear programming problem of linear Lee codes in a very compact form, leading to a fast execution, which allows to efficiently compute the bounds for large parameter values of the linear codes.

  4. Low-cost coding techniques for digital fault diagnosis

    NASA Technical Reports Server (NTRS)

    Avizienis, A. A.

    1973-01-01

    Published report discusses fault location properties of arithmetic codes. Criterion for effectiveness of given code is detection probability of local fault by application of checking algorithm to results of entire set of algorithms of processor. Report also presents analysis of arithmetic codes with low-cost check algorithm which possesses partial fault-location properties.

  5. Scalable asynchronous execution of cellular automata

    NASA Astrophysics Data System (ADS)

    Folino, Gianluigi; Giordano, Andrea; Mastroianni, Carlo

    2016-10-01

    The performance and scalability of cellular automata, when executed on parallel/distributed machines, are limited by the necessity of synchronizing all the nodes at each time step, i.e., a node can execute only after the execution of the previous step at all the other nodes. However, these synchronization requirements can be relaxed: a node can execute one step after synchronizing only with the adjacent nodes. In this fashion, different nodes can execute different time steps. This can be a notable advantageous in many novel and increasingly popular applications of cellular automata, such as smart city applications, simulation of natural phenomena, etc., in which the execution times can be different and variable, due to the heterogeneity of machines and/or data and/or executed functions. Indeed, a longer execution time at a node does not slow down the execution at all the other nodes but only at the neighboring nodes. This is particularly advantageous when the nodes that act as bottlenecks vary during the application execution. The goal of the paper is to analyze the benefits that can be achieved with the described asynchronous implementation of cellular automata, when compared to the classical all-to-all synchronization pattern. The performance and scalability have been evaluated through a Petri net model, as this model is very useful to represent the synchronization barrier among nodes. We examined the usual case in which the territory is partitioned into a number of regions, and the computation associated with a region is assigned to a computing node. We considered both the cases of mono-dimensional and two-dimensional partitioning. The results show that the advantage obtained through the asynchronous execution, when compared to the all-to-all synchronous approach is notable, and it can be as large as 90% in terms of speedup.

  6. Comprehensive Small RNA-Seq of Adeno-Associated Virus (AAV)-Infected Human Cells Detects Patterns of Novel, Non-Coding AAV RNAs in the Absence of Cellular miRNA Regulation

    PubMed Central

    Stutika, Catrin; Mietzsch, Mario; Gogol-Döring, Andreas; Weger, Stefan; Sohn, Madlen; Chen, Wei; Heilbronn, Regine

    2016-01-01

    Most DNA viruses express small regulatory RNAs, which interfere with viral or cellular gene expression. For adeno-associated virus (AAV), a small ssDNA virus with a complex biphasic life cycle miRNAs or other small regulatory RNAs have not yet been described. This is the first comprehensive Illumina-based RNA-Seq analysis of small RNAs expressed by AAV alone or upon co-infection with helper adenovirus or HSV. Several hotspots of AAV-specific small RNAs were detected mostly close to or within the AAV-ITR and apparently transcribed from the newly identified anti-p5 promoter. An additional small RNA hotspot was located downstream of the p40 promoter, from where transcription of non-coding RNAs associated with the inhibition of adenovirus replication were recently described. Parallel detection of known Ad and HSV miRNAs indirectly validated the newly identified small AAV RNA species. The predominant small RNAs were analyzed on Northern blots and by human argonaute protein-mediated co-immunoprecipitation. None of the small AAV RNAs showed characteristics of bona fide miRNAs, but characteristics of alternative RNA processing indicative of differentially regulated AAV promoter-associated small RNAs. Furthermore, the AAV-induced regulation of cellular miRNA levels was analyzed at different time points post infection. In contrast to other virus groups AAV infection had virtually no effect on the expression of cellular miRNA, which underscores the long-established concept that wild-type AAV infection is apathogenic. PMID:27611072

  7. Comprehensive Small RNA-Seq of Adeno-Associated Virus (AAV)-Infected Human Cells Detects Patterns of Novel, Non-Coding AAV RNAs in the Absence of Cellular miRNA Regulation.

    PubMed

    Stutika, Catrin; Mietzsch, Mario; Gogol-Döring, Andreas; Weger, Stefan; Sohn, Madlen; Chen, Wei; Heilbronn, Regine

    2016-01-01

    Most DNA viruses express small regulatory RNAs, which interfere with viral or cellular gene expression. For adeno-associated virus (AAV), a small ssDNA virus with a complex biphasic life cycle miRNAs or other small regulatory RNAs have not yet been described. This is the first comprehensive Illumina-based RNA-Seq analysis of small RNAs expressed by AAV alone or upon co-infection with helper adenovirus or HSV. Several hotspots of AAV-specific small RNAs were detected mostly close to or within the AAV-ITR and apparently transcribed from the newly identified anti-p5 promoter. An additional small RNA hotspot was located downstream of the p40 promoter, from where transcription of non-coding RNAs associated with the inhibition of adenovirus replication were recently described. Parallel detection of known Ad and HSV miRNAs indirectly validated the newly identified small AAV RNA species. The predominant small RNAs were analyzed on Northern blots and by human argonaute protein-mediated co-immunoprecipitation. None of the small AAV RNAs showed characteristics of bona fide miRNAs, but characteristics of alternative RNA processing indicative of differentially regulated AAV promoter-associated small RNAs. Furthermore, the AAV-induced regulation of cellular miRNA levels was analyzed at different time points post infection. In contrast to other virus groups AAV infection had virtually no effect on the expression of cellular miRNA, which underscores the long-established concept that wild-type AAV infection is apathogenic.

  8. Detection of 98. 5% of the mutations in 200 Belgian cystic fibrosis alleles by reverse dot-blot and sequencing of the complete coding region and exon/intron junctions of the CFTR gene

    SciTech Connect

    Cuppens, H.; Marynen, P.; Cassiman, J.J. ); De Boeck, C. )

    1993-12-01

    The authors have previously shown that about 85% of the mutations in 194 Belgian cystic fibrosis alleles could be detected by a reverse dot-blot assay. In the present study, 50 Belgian chromosomes were analyzed for mutations in the cystic fibrosis transmembrane conductance regulator gene by means of direct solid phase automatic sequencing of PCR products of individual exons. Twenty-six disease mutations and 14 polymorphisms were found. Twelve of these mutations and 3 polymorphisms were not described before. With the exception of one mutant allele carrying two mutations, these mutations were the only mutations found in the complete coding region and their exon/intron boundaries. The total sensitivity of mutant CF alleles that could be identified was 98.5%. Given the heterogeneity of these mutations, most of them very rare, CFTR mutation screening still remains rather complex in the population, and population screening, whether desirable or not, does not appear to be technically feasible with the methods currently available. 24 refs., 1 fig., 2 tabs.

  9. Modular optimization code package: MOZAIK

    NASA Astrophysics Data System (ADS)

    Bekar, Kursat B.

    This dissertation addresses the development of a modular optimization code package, MOZAIK, for geometric shape optimization problems in nuclear engineering applications. MOZAIK's first mission, determining the optimal shape of the D2O moderator tank for the current and new beam tube configurations for the Penn State Breazeale Reactor's (PSBR) beam port facility, is used to demonstrate its capabilities and test its performance. MOZAIK was designed as a modular optimization sequence including three primary independent modules: the initializer, the physics and the optimizer, each having a specific task. By using fixed interface blocks among the modules, the code attains its two most important characteristics: generic form and modularity. The benefit of this modular structure is that the contents of the modules can be switched depending on the requirements of accuracy, computational efficiency, or compatibility with the other modules. Oak Ridge National Laboratory's discrete ordinates transport code TORT was selected as the transport solver in the physics module of MOZAIK, and two different optimizers, Min-max and Genetic Algorithms (GA), were implemented in the optimizer module of the code package. A distributed memory parallelism was also applied to MOZAIK via MPI (Message Passing Interface) to execute the physics module concurrently on a number of processors for various states in the same search. Moreover, dynamic scheduling was enabled to enhance load balance among the processors while running MOZAIK's physics module thus improving the parallel speedup and efficiency. In this way, the total computation time consumed by the physics module is reduced by a factor close to M, where M is the number of processors. This capability also encourages the use of MOZAIK for shape optimization problems in nuclear applications because many traditional codes related to radiation transport do not have parallel execution capability. A set of computational models based on the

  10. Execution time supports for adaptive scientific algorithms on distributed memory machines

    NASA Technical Reports Server (NTRS)

    Berryman, Harry; Saltz, Joel; Scroggs, Jeffrey

    1990-01-01

    Optimizations are considered that are required for efficient execution of code segments that consists of loops over distributed data structures. The PARTI (Parallel Automated Runtime Toolkit at ICASE) execution time primitives are designed to carry out these optimizations and can be used to implement a wide range of scientific algorithms on distributed memory machines. These primitives allow the user to control array mappings in a way that gives an appearance of shared memory. Computations can be based on a global index set. Primitives are used to carry out gather and scatter operations on distributed arrays. Communications patterns are derived at runtime, and the appropriate send and receive messages are automatically generated.

  11. From an Executive Network to Executive Control: A Computational Model of the "n"-Back Task

    ERIC Educational Resources Information Center

    Chatham, Christopher H.; Herd, Seth A.; Brant, Angela M.; Hazy, Thomas E.; Miyake, Akira; O'Reilly, Randy; Friedman, Naomi P.

    2011-01-01

    A paradigmatic test of executive control, the n-back task, is known to recruit a widely distributed parietal, frontal, and striatal "executive network," and is thought to require an equally wide array of executive functions. The mapping of functions onto substrates in such a complex task presents a significant challenge to any theoretical…

  12. Executive Functions Development and Playing Games

    ERIC Educational Resources Information Center

    Petty, Ana Lucia; de Souza, Maria Thereza C. Coelho

    2012-01-01

    The aim of this paper is to discuss executive functions and playing games, considering Piaget's work (1967) and the neuropsychological framework (Barkley, 1997, 2000; Cypel, 2007). Two questions guide the discussion: What are the intersections between playing games and the development of executive functions? Can we stimulate children with learning…

  13. 32 CFR 724.702 - Executive management.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Executive management. 724.702 Section 724.702 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Organization of the Naval Discharge Review Board § 724.702 Executive management....

  14. 32 CFR 724.702 - Executive management.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 5 2011-07-01 2011-07-01 false Executive management. 724.702 Section 724.702 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Organization of the Naval Discharge Review Board § 724.702 Executive management....

  15. 32 CFR 724.702 - Executive management.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 5 2013-07-01 2013-07-01 false Executive management. 724.702 Section 724.702 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Organization of the Naval Discharge Review Board § 724.702 Executive management....

  16. 32 CFR 724.702 - Executive management.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Executive management. 724.702 Section 724.702 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Organization of the Naval Discharge Review Board § 724.702 Executive management....

  17. 32 CFR 724.702 - Executive management.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Executive management. 724.702 Section 724.702 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Organization of the Naval Discharge Review Board § 724.702 Executive management....

  18. 40 CFR 68.155 - Executive summary.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 15 2010-07-01 2010-07-01 false Executive summary. 68.155 Section 68.155 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CHEMICAL ACCIDENT PREVENTION PROVISIONS Risk Management Plan § 68.155 Executive summary. The owner...

  19. The Relationship between Alertness and Executive Control

    ERIC Educational Resources Information Center

    Weinbach, Noam; Henik, Avishai

    2012-01-01

    The current study focuses on the relationship between alerting and executive attention. Previous studies reported an increased flanker congruency effect following alerting cues. In the first two experiments, we found that the alertness-congruency interaction did not exist for all executive tasks (it appeared for a flanker task but not for a Stroop…

  20. Chief Executive Compensation and Benefits Survey, 1993.

    ERIC Educational Resources Information Center

    College and Univ. Personnel Association, Washington, DC.

    This report provides data on salaries, benefits, and perquisites commonly included in total compensation packages available to higher education chief executives, along with data on employment policies and practices, based on a survey of 1,012 institutions. An executive summary presents findings, observations, and historical trends. Data are then…

  1. Understanding the Executive Functioning Heterogeneity in Schizophrenia

    ERIC Educational Resources Information Center

    Raffard, Stephane; Bayard, Sophie

    2012-01-01

    Schizophrenia is characterized by heterogeneous brain abnormalities involving cerebral regions implied in the executive functioning. The dysexecutive syndrome is one of the most prominent and functionally cognitive features of schizophrenia. Nevertheless, it is not clear to what extend executive deficits are heterogeneous in schizophrenia…

  2. Predictors for the Effects of Televised Executions.

    ERIC Educational Resources Information Center

    McEnteer, James B.

    This paper discusses the controversy that has traditionally surrounded the issue of capital punishment. When a Texas television reporter sought permission to televise the execution of a convicted murderer by lethal injection in 1983, arguments were advanced both for and against televising executions. A recent poll shows that 84% of Americans…

  3. Executive Function and Early Reading Skills

    ERIC Educational Resources Information Center

    Foy, Judith G.; Mann, Virginia A.

    2013-01-01

    The purpose of this study was to examine how executive function skills in verbal and nonverbal auditory tasks are related to early reading skills in beginning readers. Kindergarteners (N = 41, aged 5 years) completed verbal (phonemes) and nonverbal (environmental sounds) Continuous Performance tasks yielding measures of executive function (misses,…

  4. Conceptualization and Operationalization of Executive Function

    ERIC Educational Resources Information Center

    Baggetta, Peter; Alexander, Patricia A.

    2016-01-01

    Executive function is comprised of different behavioral and cognitive elements and is considered to play a significant role in learning and academic achievement. Educational researchers frequently study the construct. However, because of its complexity functionally, the research on executive function can at times be both confusing and…

  5. EsoRex: ESO Recipe Execution Tool

    NASA Astrophysics Data System (ADS)

    ESO CPL Development Team

    2015-04-01

    EsoRex (ESO Recipe Execution Tool) lists, configures, and executes Common Pipeline Library (CPL) (ascl:1402.010) recipes from the command line. Its features include automatically generating configuration files, recursive recipe-path searching, command line and configuration file parameters, and recipe product naming control, among many others.

  6. Financial Management for Childcare Executive Officers.

    ERIC Educational Resources Information Center

    Foster-Jorgensen, Karen; Harrington, Angela

    This handbook is designed to assist childcare executive officers (CEOs) in managing the finances of their programs. The guide is divided into five sections. Section 1, "Financial Entrepreneurship," advocates the adoption of an entrepreneurial spirit in directors and recommends: (1) becoming the Chief Executive Officer of the program; (2) actively…

  7. Expected Utility Distributions for Flexible, Contingent Execution

    NASA Technical Reports Server (NTRS)

    Bresina, John L.; Washington, Richard

    2000-01-01

    This paper presents a method for using expected utility distributions in the execution of flexible, contingent plans. A utility distribution maps the possible start times of an action to the expected utility of the plan suffix starting with that action. The contingent plan encodes a tree of possible courses of action and includes flexible temporal constraints and resource constraints. When execution reaches a branch point, the eligible option with the highest expected utility at that point in time is selected. The utility distributions make this selection sensitive to the runtime context, yet still efficient. Our approach uses predictions of action duration uncertainty as well as expectations of resource usage and availability to determine when an action can execute and with what probability. Execution windows and probabilities inevitably change as execution proceeds, but such changes do not invalidate the cached utility distributions, thus, dynamic updating of utility information is minimized.

  8. Mechanical code comparator

    DOEpatents

    Peter, Frank J.; Dalton, Larry J.; Plummer, David W.

    2002-01-01

    A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

  9. More box codes

    NASA Technical Reports Server (NTRS)

    Solomon, G.

    1992-01-01

    A new investigation shows that, starting from the BCH (21,15;3) code represented as a 7 x 3 matrix and adding a row and column to add even parity, one obtains an 8 x 4 matrix (32,15;8) code. An additional dimension is obtained by specifying odd parity on the rows and even parity on the columns, i.e., adjoining to the 8 x 4 matrix, the matrix, which is zero except for the fourth column (of all ones). Furthermore, any seven rows and three columns will form the BCH (21,15;3) code. This box code has the same weight structure as the quadratic residue and BCH codes of the same dimensions. Whether there exists an algebraic isomorphism to either code is as yet unknown.

  10. Generating code adapted for interlinking legacy scalar code and extended vector code

    DOEpatents

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  11. Computing the LS factor for the Revised Universal Soil Loss Equation through array-based slope processing of digital elevation data using a C++ executable

    NASA Astrophysics Data System (ADS)

    Van Remortel, R. D.; Maichle, R. W.; Hickey, R. J.

    2004-11-01

    Until the mid-1990s, a major limitation of using the Universal Soil Loss Equation and Revised Universal Soil Loss Equation erosion models at regional landscape scales was the difficulty in estimating LS factor (slope length and steepness) values suitable for use in geographic information systems applications. A series of ArcInfo™ Arc Macro Language scripts was subsequently created that enabled the production of either USLE- or RUSLE-based LS factor raster grids using a digital elevation model input data set. These scripts have functioned exceptionally well for both single- and multiple-watershed applications within targeted study areas. However, due to the nature and complexity of flowpath processing necessary to compute cumulative slope length, the scripts have not taken advantage of available computing resources to the extent possible. It was determined that the speed of the computer runs could be significantly increased without sacrificing accuracy in the final results by performing the majority of the elevation data processing in a two-dimensional array framework outside the ArcInfo environment. This paper describes the evolution of a major portion of the original RUSLE-based AML processing code to an array-based executable program using ANSI C++™ software. Examples of the relevant command-line arguments are provided and comparative results from several AML-vs.-executable time trials are also presented. In wide-ranging areas of the United States where it has been tested, the new RUSLE-based executable has produced LS-factor values that mimic those generated by the original AML as well as the RUSLE Handbook estimates. Anticipated uses of the executable program include water quality assessment, landscape ecology, land-use change detection studies, and decision support activities. This research has now given users the option of either running the executable file alone to process a single watershed reporting unit or running a supporting AML shell program that

  12. Industrial Computer Codes

    NASA Technical Reports Server (NTRS)

    Shapiro, Wilbur

    1996-01-01

    This is an overview of new and updated industrial codes for seal design and testing. GCYLT (gas cylindrical seals -- turbulent), SPIRALI (spiral-groove seals -- incompressible), KTK (knife to knife) Labyrinth Seal Code, and DYSEAL (dynamic seal analysis) are covered. CGYLT uses G-factors for Poiseuille and Couette turbulence coefficients. SPIRALI is updated to include turbulence and inertia, but maintains the narrow groove theory. KTK labyrinth seal code handles straight or stepped seals. And DYSEAL provides dynamics for the seal geometry.

  13. Phonological coding during reading

    PubMed Central

    Leinenger, Mallorie

    2014-01-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early (pre-lexical) or that phonological codes come online late (post-lexical)) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eyetracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model (Van Order, 1987), dual-route model (e.g., Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001), parallel distributed processing model (Seidenberg & McClelland, 1989)) are discussed. PMID:25150679

  14. Tokamak Systems Code

    SciTech Connect

    Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.

  15. Topological subsystem codes

    SciTech Connect

    Bombin, H.

    2010-03-15

    We introduce a family of two-dimensional (2D) topological subsystem quantum error-correcting codes. The gauge group is generated by two-local Pauli operators, so that two-local measurements are enough to recover the error syndrome. We study the computational power of code deformation in these codes and show that boundaries cannot be introduced in the usual way. In addition, we give a general mapping connecting suitable classical statistical mechanical models to optimal error correction in subsystem stabilizer codes that suffer from depolarizing noise.

  16. FAA Smoke Transport Code

    SciTech Connect

    Domino, Stefan; Luketa-Hanlin, Anay; Gallegos, Carlos

    2006-10-27

    FAA Smoke Transport Code, a physics-based Computational Fluid Dynamics tool, which couples heat, mass, and momentum transfer, has been developed to provide information on smoke transport in cargo compartments with various geometries and flight conditions. The software package contains a graphical user interface for specification of geometry and boundary conditions, analysis module for solving the governing equations, and a post-processing tool. The current code was produced by making substantial improvements and additions to a code obtained from a university. The original code was able to compute steady, uniform, isothermal turbulent pressurization. In addition, a preprocessor and postprocessor were added to arrive at the current software package.

  17. Transonic airfoil codes

    NASA Technical Reports Server (NTRS)

    Garabedian, P. R.

    1979-01-01

    Computer codes for the design and analysis of transonic airfoils are considered. The design code relies on the method of complex characteristics in the hodograph plane to construct shockless airfoil. The analysis code uses artificial viscosity to calculate flows with weak shock waves at off-design conditions. Comparisons with experiments show that an excellent simulation of two dimensional wind tunnel tests is obtained. The codes have been widely adopted by the aircraft industry as a tool for the development of supercritical wing technology.

  18. 5 CFR 412.401 - Continuing executive development.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 1 2013-01-01 2013-01-01 false Continuing executive development. 412.401... SUPERVISORY, MANAGEMENT, AND EXECUTIVE DEVELOPMENT Executive Development § 412.401 Continuing executive... executives in accordance with 5 U.S.C 3396(a). Such agency programs must include preparation,...

  19. 5 CFR 412.401 - Continuing executive development.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 1 2011-01-01 2011-01-01 false Continuing executive development. 412.401... SUPERVISORY, MANAGEMENT, AND EXECUTIVE DEVELOPMENT Executive Development § 412.401 Continuing executive... executives in accordance with 5 U.S.C 3396(a). Such agency programs must include preparation,...

  20. Project Execution Plan, Rev. 3

    SciTech Connect

    IT Corporation, Las Vegas

    2002-08-01

    This plan addresses project activities encompassed by the U.S. Department of Energy's (DOE's), National Nuclear Security Administration Nevada Operations Office, Environmental Restoration Division and conforms to the requirements contained in the Life-Cycle Asset Management, DOE Order 430.1A; The Joint Program Office Policy on Project Management in Support of DOE Order 430.1; Program and Project Management for the Acquisition of Capital Assets, DOE Order 413.3; the Project Execution and Engineering Management Planning Guide, GPG-FM-010; and other applicable Good Practice Guides; and the FY 2001 Integrated Planning, Accountability, and Budgeting System Policy Guidance. The plan also reflects the milestone philosophies of the Federal Facility Agreement and Consent Order, as agreed to by the State of Nevada, the DOE, and the U.S. Department of Defense; and traditional project management philosophies such as the development of life-cycle costs, schedules, and work scope; identification o f roles and responsibilities; and baseline management and controls.

  1. Real-Time Projection to Verify Plan Success During Execution

    NASA Technical Reports Server (NTRS)

    Wagner, David A.; Dvorak, Daniel L.; Rasmussen, Robert D.; Knight, Russell L.; Morris, John R.; Bennett, Matthew B.; Ingham, Michel D.

    2012-01-01

    The Mission Data System provides a framework for modeling complex systems in terms of system behaviors and goals that express intent. Complex activity plans can be represented as goal networks that express the coordination of goals on different state variables of the system. Real-time projection extends the ability of this system to verify plan achievability (all goals can be satisfied over the entire plan) into the execution domain so that the system is able to continuously re-verify a plan as it is executed, and as the states of the system change in response to goals and the environment. Previous versions were able to detect and respond to goal violations when they actually occur during execution. This new capability enables the prediction of future goal failures; specifically, goals that were previously found to be achievable but are no longer achievable due to unanticipated faults or environmental conditions. Early detection of such situations enables operators or an autonomous fault response capability to deal with the problem at a point that maximizes the available options. For example, this system has been applied to the problem of managing battery energy on a lunar rover as it is used to explore the Moon. Astronauts drive the rover to waypoints and conduct science observations according to a plan that is scheduled and verified to be achievable with the energy resources available. As the astronauts execute this plan, the system uses this new capability to continuously re-verify the plan as energy is consumed to ensure that the battery will never be depleted below safe levels across the entire plan.

  2. Robust Self-Authenticating Network Coding

    DTIC Science & Technology

    2008-11-30

    a subspace U of W u = nk{v) E This formulation is very similar to non-coherent detection in the MIMO case: Zheng and Tse Network coding and...network error correction Just as in the MIMO case: Constructing codes is equivalent to packing subspaces of dimension An in ambient space of dimension n...surveillance and reconnaissance and command and control massive amounts of informa- tion sharing by providing ’bandwidth-available" environment Through

  3. External-Compression Supersonic Inlet Design Code

    NASA Technical Reports Server (NTRS)

    Slater, John W.

    2011-01-01

    A computer code named SUPIN has been developed to perform aerodynamic design and analysis of external-compression, supersonic inlets. The baseline set of inlets include axisymmetric pitot, two-dimensional single-duct, axisymmetric outward-turning, and two-dimensional bifurcated-duct inlets. The aerodynamic methods are based on low-fidelity analytical and numerical procedures. The geometric methods are based on planar geometry elements. SUPIN has three modes of operation: 1) generate the inlet geometry from a explicit set of geometry information, 2) size and design the inlet geometry and analyze the aerodynamic performance, and 3) compute the aerodynamic performance of a specified inlet geometry. The aerodynamic performance quantities includes inlet flow rates, total pressure recovery, and drag. The geometry output from SUPIN includes inlet dimensions, cross-sectional areas, coordinates of planar profiles, and surface grids suitable for input to grid generators for analysis by computational fluid dynamics (CFD) methods. The input data file for SUPIN and the output file from SUPIN are text (ASCII) files. The surface grid files are output as formatted Plot3D or stereolithography (STL) files. SUPIN executes in batch mode and is available as a Microsoft Windows executable and Fortran95 source code with a makefile for Linux.

  4. CHEETAH: A next generation thermochemical code

    SciTech Connect

    Fried, L.; Souers, P.

    1994-11-01

    CHEETAH is an effort to bring the TIGER thermochemical code into the 1990s. A wide variety of improvements have been made in Version 1.0. We have improved the robustness and ease of use of TIGER. All of TIGER`s solvers have been replaced by new algorithms. We find that CHEETAH solves a wider variety of problems with no user intervention (e.g. no guesses for the C-J state) than TIGER did. CHEETAH has been made simpler to use than TIGER; typical use of the code occurs with the new standard run command. CHEETAH will make the use of thermochemical codes more attractive to practical explosive formulators. We have also made an extensive effort to improve over the results of TIGER. CHEETAH`s version of the BKW equation of state (BKWC) is able to accurately reproduce energies from cylinder tests; something that other BKW parameter sets have been unable to do. Calculations performed with BKWC execute very quickly; typical run times are under 10 seconds on a workstation. In the future we plan to improve the underlying science in CHEETAH. More accurate equations of state will be used in the gas and the condensed phase. A kinetics capability will be added to the code that will predict reaction zone thickness. Further ease of use features will eventually be added; an automatic formulator that adjusts concentrations to match desired properties is planned.

  5. 3 CFR 13517 - Executive Order 13517 of October 30, 2009. Amendments to Executive Orders 13183 and 13494

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false Executive Order 13517 of October 30, 2009. Amendments to Executive Orders 13183 and 13494 13517 Order 13517 Presidential Documents Executive Orders Executive Order 13517 of October 30, 2009 EO 13517 Amendments to Executive Orders 13183 and 13494 By...

  6. The Black Executive: A Challenge for Psychiatry

    PubMed Central

    Boone, Lillian Ruth

    1982-01-01

    The task of developing a body of knowledge about specific problems, both intrapsychic and psychosocial, which influence a black executive's maturation, must be initiated. There is currently a definite interest, among black executives, in obtaining access to appropriate psychotherapeutic intervention. A psychobiographical approach facilitates development of a construct for analysis of, and insight into, transference phenomena that translate into organization based behavioral responses to the black executive. Analysis of frequently encountered organizational ethos and also stimulus-response mechanisms in the black executive lead to formulation of viable conclusions for resolution of conflict. Modes of recognition of specific conflict with authority in the black executive psychotherapy patient include examination of (1) defense mechanisms frequently encountered in response to authority conflicts, (2) stated intentions of the patient in relation to career development, and (3) the affective stance of the patient. Psychobiographical issues very often have a direct developmental influence on black familial conceptualizations of authority. Childrearing practices and parentally based ego ideals and other aspects of development are linked to analogues in adult human behavior frequently observed among black executives. Suggestions for therapeutic directions involve affective and thematic strategies, all contingent upon a productive, informed, therapeutic effort. The therapeutic relationship is a most important element in the treatment strategy with the black executive. PMID:7120460

  7. The Application of the PEBBED Code Suite to the PBMR-400 Coupled Code Benchmark - FY 2006 Annual Report

    SciTech Connect

    Not Available

    2006-09-01

    This document describes the recent developments of the PEBBED code suite and its application to the PBMR-400 Coupled Code Benchmark. This report addresses an FY2006 Level 2 milestone under the NGNP Design and Evaluation Methods Work Package. The milestone states "Complete a report describing the results of the application of the integrated PEBBED code package to the PBMR-400 coupled code benchmark". The report describes the current state of the PEBBED code suite, provides an overview of the Benchmark problems to which it was applied, discusses the code developments achieved in the past year, and states some of the results attained. Results of the steady state problems generated by the PEBBED fuel management code compare favorably to the preliminary results generated by codes from other participating institutions and to similar non-Benchmark analyses. Partial transient analysis capability has been achieved through the acquisition of the NEM-THERMIX code from Penn State University. Phase I of the task has been achieved through the development of a self-consistent set of tools for generating cross sections for design and transient analysis and in the successful execution of the steady state benchmark exercises.

  8. Fast Coding Unit Encoding Mechanism for Low Complexity Video Coding

    PubMed Central

    Wu, Yueying; Jia, Kebin; Gao, Guandong

    2016-01-01

    In high efficiency video coding (HEVC), coding tree contributes to excellent compression performance. However, coding tree brings extremely high computational complexity. Innovative works for improving coding tree to further reduce encoding time are stated in this paper. A novel low complexity coding tree mechanism is proposed for HEVC fast coding unit (CU) encoding. Firstly, this paper makes an in-depth study of the relationship among CU distribution, quantization parameter (QP) and content change (CC). Secondly, a CU coding tree probability model is proposed for modeling and predicting CU distribution. Eventually, a CU coding tree probability update is proposed, aiming to address probabilistic model distortion problems caused by CC. Experimental results show that the proposed low complexity CU coding tree mechanism significantly reduces encoding time by 27% for lossy coding and 42% for visually lossless coding and lossless coding. The proposed low complexity CU coding tree mechanism devotes to improving coding performance under various application conditions. PMID:26999741

  9. Fast Coding Unit Encoding Mechanism for Low Complexity Video Coding.

    PubMed

    Gao, Yuan; Liu, Pengyu; Wu, Yueying; Jia, Kebin; Gao, Guandong

    2016-01-01

    In high efficiency video coding (HEVC), coding tree contributes to excellent compression performance. However, coding tree brings extremely high computational complexity. Innovative works for improving coding tree to further reduce encoding time are stated in this paper. A novel low complexity coding tree mechanism is proposed for HEVC fast coding unit (CU) encoding. Firstly, this paper makes an in-depth study of the relationship among CU distribution, quantization parameter (QP) and content change (CC). Secondly, a CU coding tree probability model is proposed for modeling and predicting CU distribution. Eventually, a CU coding tree probability update is proposed, aiming to address probabilistic model distortion problems caused by CC. Experimental results show that the proposed low complexity CU coding tree mechanism significantly reduces encoding time by 27% for lossy coding and 42% for visually lossless coding and lossless coding. The proposed low complexity CU coding tree mechanism devotes to improving coding performance under various application conditions.

  10. Coding Strategies for X-ray Tomography

    NASA Astrophysics Data System (ADS)

    Holmgren, Andrew

    This work focuses on the construction and application of coded apertures to compressive X-ray tomography. Coded apertures can be made in a number of ways, each method having an impact on system background and signal contrast. Methods of constructing coded apertures for structuring X-ray illumination and scatter are compared and analyzed. Apertures can create structured X-ray bundles that investigate specific sets of object voxels. The tailored bundles of rays form a code (or pattern) and are later estimated through computational inversion. Structured illumination can be used to subsample object voxels and make inversion feasible for low dose computed tomography (CT) systems, or it can be used to reduce background in limited angle CT systems. On the detection side, coded apertures modulate X-ray scatter signals to determine the position and radiance of scatter points. By forming object dependent projections in measurement space, coded apertures multiplex modulated scatter signals onto a detector. The multiplexed signals can be inverted with knowledge of the code pattern and system geometry. This work shows two systems capable of determining object position and type in a 2D plane, by illuminating objects with an X-ray `fan beam,' using coded apertures and compressive measurements. Scatter tomography can help identify materials in security and medicine that may be ambiguous with transmission tomography alone.

  11. Automated assembly of large space structures using an expert system executive

    NASA Technical Reports Server (NTRS)

    Allen, Cheryl L.

    1993-01-01

    NASA LaRC has developed a unique testbed for investigating the practical problems associated with the assembly of large space structures using robotic manipulators. The testbed is an interdisciplinary effort which considers the full spectrum of assembly problems from the design of mechanisms to the development of software. This paper will describe the automated structures assembly testbed and its operation, detail the expert system executive and its development, and discuss the planned system evolution. Emphasis will be placed on the expert system development of the program executive. The executive program must be capable of directing and reliably performing complex assembly tasks with the flexibility to recover from realistic system errors. By employing an expert system, information pertaining to the operation of the system was encapsulated concisely within a knowledge base. This lead to a substantial reduction in code, increased flexibility, eased software upgrades, and realized a savings in software maintenance costs.

  12. An expert system executive for automated assembly of large space truss structures

    NASA Technical Reports Server (NTRS)

    Allen, Cheryl L.

    1993-01-01

    Langley Research Center developed a unique test bed for investigating the practical problems associated with the assembly of large space truss structures using robotic manipulators. The test bed is the result of an interdisciplinary effort that encompasses the full spectrum of assembly problems - from the design of mechanisms to the development of software. The automated structures assembly test bed and its operation are described, the expert system executive and its development are detailed, and the planned system evolution is discussed. Emphasis is on the expert system implementation of the program executive. The executive program must direct and reliably perform complex assembly tasks with the flexibility to recover from realistic system errors. The employment of an expert system permits information that pertains to the operation of the system to be encapsulated concisely within a knowledge base. This consolidation substantially reduced code, increased flexibility, eased software upgrades, and realized a savings in software maintenance costs.

  13. Dress Codes for Teachers?

    ERIC Educational Resources Information Center

    Million, June

    2004-01-01

    In this article, the author discusses an e-mail survey of principals from across the country regarding whether or not their school had a formal staff dress code. The results indicate that most did not have a formal dress code, but agreed that professional dress for teachers was not only necessary, but showed respect for the school and had a…

  14. Lichenase and coding sequences

    DOEpatents

    Li, Xin-Liang; Ljungdahl, Lars G.; Chen, Huizhong

    2000-08-15

    The present invention provides a fungal lichenase, i.e., an endo-1,3-1,4-.beta.-D-glucanohydrolase, its coding sequence, recombinant DNA molecules comprising the lichenase coding sequences, recombinant host cells and methods for producing same. The present lichenase is from Orpinomyces PC-2.

  15. Legacy Code Modernization

    NASA Technical Reports Server (NTRS)

    Hribar, Michelle R.; Frumkin, Michael; Jin, Haoqiang; Waheed, Abdul; Yan, Jerry; Saini, Subhash (Technical Monitor)

    1998-01-01

    Over the past decade, high performance computing has evolved rapidly; systems based on commodity microprocessors have been introduced in quick succession from at least seven vendors/families. Porting codes to every new architecture is a difficult problem; in particular, here at NASA, there are many large CFD applications that are very costly to port to new machines by hand. The LCM ("Legacy Code Modernization") Project is the development of an integrated parallelization environment (IPE) which performs the automated mapping of legacy CFD (Fortran) applications to state-of-the-art high performance computers. While most projects to port codes focus on the parallelization of the code, we consider porting to be an iterative process consisting of several steps: 1) code cleanup, 2) serial optimization,3) parallelization, 4) performance monitoring and visualization, 5) intelligent tools for automated tuning using performance prediction and 6) machine specific optimization. The approach for building this parallelization environment is to build the components for each of the steps simultaneously and then integrate them together. The demonstration will exhibit our latest research in building this environment: 1. Parallelizing tools and compiler evaluation. 2. Code cleanup and serial optimization using automated scripts 3. Development of a code generator for performance prediction 4. Automated partitioning 5. Automated insertion of directives. These demonstrations will exhibit the effectiveness of an automated approach for all the steps involved with porting and tuning a legacy code application for a new architecture.

  16. Synthesizing Certified Code

    NASA Technical Reports Server (NTRS)

    Whalen, Michael; Schumann, Johann; Fischer, Bernd

    2002-01-01

    Code certification is a lightweight approach to demonstrate software quality on a formal level. Its basic idea is to require producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates which can be checked independently. Since code certification uses the same underlying technology as program verification, it also requires many detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding theses annotations to the code is time-consuming and error-prone. We address this problem by combining code certification with automatic program synthesis. We propose an approach to generate simultaneously, from a high-level specification, code and all annotations required to certify generated code. Here, we describe a certification extension of AUTOBAYES, a synthesis tool which automatically generates complex data analysis programs from compact specifications. AUTOBAYES contains sufficient high-level domain knowledge to generate detailed annotations. This allows us to use a general-purpose verification condition generator to produce a set of proof obligations in first-order logic. The obligations are then discharged using the automated theorem E-SETHEO. We demonstrate our approach by certifying operator safety for a generated iterative data classification program without manual annotation of the code.

  17. Coding Acoustic Metasurfaces.

    PubMed

    Xie, Boyang; Tang, Kun; Cheng, Hua; Liu, Zhengyou; Chen, Shuqi; Tian, Jianguo

    2017-02-01

    Coding acoustic metasurfaces can combine simple logical bits to acquire sophisticated functions in wave control. The acoustic logical bits can achieve a phase difference of exactly π and a perfect match of the amplitudes for the transmitted waves. By programming the coding sequences, acoustic metasurfaces with various functions, including creating peculiar antenna patterns and waves focusing, have been demonstrated.

  18. Computerized mega code recording.

    PubMed

    Burt, T W; Bock, H C

    1988-04-01

    A system has been developed to facilitate recording of advanced cardiac life support mega code testing scenarios. By scanning a paper "keyboard" using a bar code wand attached to a portable microcomputer, the person assigned to record the scenario can easily generate an accurate, complete, timed, and typewritten record of the given situations and the obtained responses.

  19. Pseudonoise code tracking loop

    NASA Technical Reports Server (NTRS)

    Laflame, D. T. (Inventor)

    1980-01-01

    A delay-locked loop is presented for tracking a pseudonoise (PN) reference code in an incoming communication signal. The loop is less sensitive to gain imbalances, which can otherwise introduce timing errors in the PN reference code formed by the loop.

  20. The role of executive functions in the control of aggressive behavior.

    PubMed

    Krämer, Ulrike M; Kopyciok, Robert P J; Richter, Sylvia; Rodriguez-Fornells, Antoni; Münte, Thomas F

    2011-01-01

    An extensive literature suggests a link between executive functions and aggressive behavior in humans, pointing mostly to an inverse relationship, i.e., increased tendencies toward aggression in individuals scoring low on executive function tests. This literature is limited, though, in terms of the groups studied and the measures of executive functions. In this paper, we present data from two studies addressing these issues. In a first behavioral study, we asked whether high trait aggressiveness is related to reduced executive functions. A sample of over 600 students performed in an extensive behavioral test battery including paradigms addressing executive functions such as the Eriksen Flanker task, Stroop task, n-back task, and Tower of London (TOL). High trait aggressive participants were found to have a significantly reduced latency score in the TOL, indicating more impulsive behavior compared to low trait aggressive participants. No other differences were detected. In an EEG-study, we assessed neural and behavioral correlates of error monitoring and response inhibition in participants who were characterized based on their laboratory-induced aggressive behavior in a competitive reaction time task. Participants who retaliated more in the aggression paradigm and had reduced frontal activity when being provoked did not, however, show any reduction in behavioral or neural correlates of executive control compared to the less aggressive participants. Our results question a strong relationship between aggression and executive functions at least for healthy, high-functioning people.

  1. Testing Flight Systems with Machine Executable Scripts

    NASA Technical Reports Server (NTRS)

    Gibbs, Don; Bone, Brian

    2009-01-01

    The MSAP project at JPL has been testing spacecraft avionics and flight software since 2005, in part using computer executable scripts. The scripts are document files of a common word processor and comply with the format of a traditional, formal test procedure common at JPL. These procedures use keywords to issue commands and evaluate responses, mimicking a human test operator. In effect, script lines are inserted into a normal procedure. Even though the executable structure of the procedures is limited to linear sequences of fairly simple operations, we have found significant value in certain test regimes given the repeatability, ease of execution, and readily understandable intent of these procedures.

  2. Social inappropriateness, executive control, and aging.

    PubMed

    Henry, Julie D; von Hippel, William; Baynes, Kate

    2009-03-01

    Age-related deficits in executive control might lead to socially inappropriate behavior if they compromise the ability to withhold inappropriate responses. Consistent with this possibility, older adults in the current study showed greater social inappropriateness than younger adults--as rated by their peers--and this effect was mediated by deficits in executive control as well as deficits in general cognitive ability. Older adults also responded with greater social inappropriateness to a provocative event in the laboratory, but this effect was unrelated to executive functioning or general cognitive ability. These findings suggest that changes in both social and cognitive factors are important in understanding age-related changes in social behavior.

  3. Dual compile strategy for parallel heterogeneous execution.

    SciTech Connect

    Smith, Tyler Barratt; Perry, James Thomas

    2012-06-01

    The purpose of the Dual Compile Strategy is to increase our trust in the Compute Engine during its execution of instructions. This is accomplished by introducing a heterogeneous Monitor Engine that checks the execution of the Compute Engine. This leads to the production of a second and custom set of instructions designed for monitoring the execution of the Compute Engine at runtime. This use of multiple engines differs from redundancy in that one engine is working on the application while the other engine is monitoring and checking in parallel instead of both applications (and engines) performing the same work at the same time.

  4. Nurse executives' perspectives on succession planning.

    PubMed

    Beyers, Marjorie

    2006-06-01

    Six nurse executives from 5 settings were interviewed to learn more about how succession planning is being applied in today's practice. Their experiences, presented in this article, provide a snapshot of ways succession planning can be applied in different organizations. Interviewees share their personal philosophy, concepts, and approaches to succession planning. Although these nurse executives approach succession planning differently, they share a belief that succession planning is embedded in the nurse executive role and that succession planning is key to sustaining quality nursing practice. Insights and recommendations for further study of succession planning are summarized.

  5. Job transition assistance for managers and executives: rekindling entrepreneurial spirit.

    PubMed

    Johason, S H

    1995-06-01

    Management and executive positions are being combined or changed during restructuring. Although stressful, the transition offers opportunities for some managers and executives to look for new opportunities. Developing entrepreneurial spirit helps managers and executives make the transition.

  6. 75 FR 68385 - Senior Executive Service-Performance Review Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-05

    ... MANAGEMENT Senior Executive Service-Performance Review Board AGENCY: Office of Personnel Management. ACTION... of a senior executive's performance by the supervisor, and considers recommendations to the appointing authority regarding the performance of the senior executive. Office of Personnel Management....

  7. 76 FR 57980 - Senior Executive Service Performance Review Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-19

    ... SAFETY BOARD Senior Executive Service Performance Review Board AGENCY: Defense Nuclear Facilities Safety... Safety Board (DNFSB) Senior Executive Service (SES) Performance Review Board (PRB). DATES: Effective Date... review and evaluate the initial summary rating of the senior executive's performance, the...

  8. Evolving genetic code

    PubMed Central

    OHAMA, Takeshi; INAGAKI, Yuji; BESSHO, Yoshitaka; OSAWA, Syozo

    2008-01-01

    In 1985, we reported that a bacterium, Mycoplasma capricolum, used a deviant genetic code, namely UGA, a “universal” stop codon, was read as tryptophan. This finding, together with the deviant nuclear genetic codes in not a few organisms and a number of mitochondria, shows that the genetic code is not universal, and is in a state of evolution. To account for the changes in codon meanings, we proposed the codon capture theory stating that all the code changes are non-disruptive without accompanied changes of amino acid sequences of proteins. Supporting evidence for the theory is presented in this review. A possible evolutionary process from the ancient to the present-day genetic code is also discussed. PMID:18941287

  9. Combustion chamber analysis code

    NASA Technical Reports Server (NTRS)

    Przekwas, A. J.; Lai, Y. G.; Krishnan, A.; Avva, R. K.; Giridharan, M. G.

    1993-01-01

    A three-dimensional, time dependent, Favre averaged, finite volume Navier-Stokes code has been developed to model compressible and incompressible flows (with and without chemical reactions) in liquid rocket engines. The code has a non-staggered formulation with generalized body-fitted-coordinates (BFC) capability. Higher order differencing methodologies such as MUSCL and Osher-Chakravarthy schemes are available. Turbulent flows can be modeled using any of the five turbulent models present in the code. A two-phase, two-liquid, Lagrangian spray model has been incorporated into the code. Chemical equilibrium and finite rate reaction models are available to model chemically reacting flows. The discrete ordinate method is used to model effects of thermal radiation. The code has been validated extensively against benchmark experimental data and has been applied to model flows in several propulsion system components of the SSME and the STME.

  10. TECATE - a code for anisotropic thermoelasticity in high-average-power laser technology. Phase 1 final report

    SciTech Connect

    Gelinas, R.J.; Doss, S.K.; Carlson, N.N.

    1985-01-01

    This report describes a totally Eulerian code for anisotropic thermoelasticity (code name TECATE) which may be used in evaluations of prospective crystal media for high-average-power lasers. The present TECATE code version computes steady-state distributions of material temperatures, stresses, strains, and displacement fields in 2-D slab geometry. Numerous heat source and coolant boundary condition options are available in the TECATE code for laser design considerations. Anisotropic analogues of plane stress and plane strain evaluations can be executed for any and all crystal symmetry classes. As with all new and/or large physics codes, it is likely that some code imperfections will emerge at some point in time.

  11. A Pseudorandom Code Modulated LIDAR

    NASA Astrophysics Data System (ADS)

    Hunt, K. P.; Eichinger, W. E.; Kruger, A.

    2009-12-01

    Typical Light Detection and Ranging (LIDAR) uses high power pulsed lasers to ensure a detectable return signal. For short ranges, modulated diode lasers offer an attractive alternative, particularly in the areas of size, weight, cost, eye safety and use of energy. Flexible electronic modulation of the laser diode allows the development of pseudorandom code (PRC) LIDAR systems that can overcome the disadvantage of low output power and thus low signal to noise ratios. Different PRCs have been proposed. For example, so called M-sequences can be generated simply, but are unbalanced: they have more ones than zeros, which results in a residual noise component. Other sequences such as the A1 and A2 sequences are balanced, but have two autocorrelation peaks, resulting in undesirable pickup of signals from different ranges. In this work, we investigate a new code, an M-sequence with a zero added at the end. The result is still easily generated and has a single autocorrelation peak, but is now balanced. We loaded these sequences into a commercial arbitrary waveform generator (ARB), an Agilent 33250A, which then modulates the laser diode. This allows sequences to be changed quickly and easily, permitting us to design and investigate a wide range of PRC sequences with desirable properties. The ARB modulates a Melles Griot 56ICS near infrared laser diode at a 10 MHz chip rate. Backscatter is collected and focused by a telescope and the detected signal is sampled and correlated with the known PRC. We have gathered data from this LIDAR system and experimentally assessed the performance of this new class of codes.

  12. Lessons from Archimedes, a system for planning and executing mechanical assemblies

    SciTech Connect

    Strip, D.

    1992-04-01

    Archimedes is a prototype mechanical assembly system which generates and executes robot assembly programs from a CAD model input. The system seeks to increase flexibility in robotic mechanical assembly applications by automating the programming task. Input is a solid model of the finished assembly, augmented by additional design information such as weld specifications. Parts relationships and geometric constraints are deduced from the solid model. A rule-based planner generates a ``generic`` assembly plan that satisfies the geometric constraints, as well as other constraints embodied in the rules. A plan compiler then converts the generic plan into code specific to an application environment. Other outputs include fixture designs, workcell layout information, object-recognition (vision) routines, grasp plans, and executable code for controlling the robot and workcell accessories. Lessons from operating and demonstrating the system are presented, with a particular emphasis on the implications for future systems. 12 refs.

  13. Lessons from Archimedes, a system for planning and executing mechanical assemblies

    SciTech Connect

    Strip, D.

    1992-01-01

    Archimedes is a prototype mechanical assembly system which generates and executes robot assembly programs from a CAD model input. The system seeks to increase flexibility in robotic mechanical assembly applications by automating the programming task. Input is a solid model of the finished assembly, augmented by additional design information such as weld specifications. Parts relationships and geometric constraints are deduced from the solid model. A rule-based planner generates a generic'' assembly plan that satisfies the geometric constraints, as well as other constraints embodied in the rules. A plan compiler then converts the generic plan into code specific to an application environment. Other outputs include fixture designs, workcell layout information, object-recognition (vision) routines, grasp plans, and executable code for controlling the robot and workcell accessories. Lessons from operating and demonstrating the system are presented, with a particular emphasis on the implications for future systems. 12 refs.

  14. Prefrontal cortex and neural mechanisms of executive function.

    PubMed

    Funahashi, Shintaro; Andreau, Jorge Mario

    2013-12-01

    Executive function is a product of the coordinated operation of multiple neural systems and an essential prerequisite for a variety of cognitive functions. The prefrontal cortex is known to be a key structure for the performance of executive functions. To accomplish the coordinated operations of multiple neural systems, the prefrontal cortex must monitor the activities in other cortical and subcortical structures and control and supervise their operations by sending command signals, which is called top-down signaling. Although neurophysiological and neuroimaging studies have provided evidence that the prefrontal cortex sends top-down signals to the posterior cortices to control information processing, the neural correlate of these top-down signals is not yet known. Through use of the paired association task, it has been demonstrated that top-down signals are used to retrieve specific information stored in long-term memory. Therefore, we used a paired association task to examine the neural correlates of top-down signals in the prefrontal cortex. The preliminary results indicate that 32% of visual neurons exhibit pair-selectivity, which is similar to the characteristics of pair-coding activities in temporal neurons. The latency of visual responses in prefrontal neurons was longer than bottom-up signals but faster than top-down signals in inferior temporal neurons. These results suggest that pair-selective visual responses may be top-down signals that the prefrontal cortex provides to the temporal cortex, although further studies are needed to elucidate the neural correlates of top-down signals and their characteristics to understand the neural mechanism of executive control by the prefrontal cortex.

  15. A Fault-oblivious Extreme-scale Execution Environment

    SciTech Connect

    Sadayappan, Ponnuswamy

    2016-08-31

    Exascale computing systems will provide a thousand-fold increase in parallelism and a proportional increase in failure rate relative to today's machines. Systems software for exascale machines must provide the infrastructure to support existing applications while simultaneously enabling efficient execution of new programming models that naturally express dynamic, adaptive, irregular computation; coupled simulations; and massive data analysis in a highly unreliable hardware environment with billions of threads of execution. We propose a new approach to the data and work distribution model provided by system software based on the unifying formalism of an abstract file system. The proposed hierarchical data model provides simple, familiar visibility and access to data structures through the file system hierarchy, while providing fault tolerance through selective redundancy. The hierarchical task model features work queues whose form and organization are represented as file system objects. Data and work are both first class entities. By exposing the relationships between data and work to the runtime system, information is available to optimize execution time and provide fault tolerance. The data distribution scheme provides replication (where desirable and possible) for fault tolerance and efficiency, and it is hierarchical to make it possible to take advantage of locality. The user, tools, and applications, including legacy applications, can interface with the data, work queues, and one another through the abstract file model. This runtime environment will provide multiple interfaces to support traditional Message Passing Interface applications, languages developed under DARPA's High Productivity Computing Systems program, as well as other, experimental programming models. We will validate our runtime system with pilot codes on existing platforms and will use simulation to validate for exascale-class platforms. In this final report, we summarize research results from

  16. 50 CFR 38.3 - Executive authority; duration.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... (CONTINUED) THE NATIONAL WILDLIFE REFUGE SYSTEM MIDWAY ATOLL NATIONAL WILDLIFE REFUGE Executive Authority... executive authority of the Service Regional Director may be redelegated to the Refuge Manager, Midway...

  17. 50 CFR 38.3 - Executive authority; duration.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... (CONTINUED) THE NATIONAL WILDLIFE REFUGE SYSTEM MIDWAY ATOLL NATIONAL WILDLIFE REFUGE Executive Authority... executive authority of the Service Regional Director may be redelegated to the Refuge Manager, Midway...

  18. 50 CFR 38.3 - Executive authority; duration.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... (CONTINUED) THE NATIONAL WILDLIFE REFUGE SYSTEM MIDWAY ATOLL NATIONAL WILDLIFE REFUGE Executive Authority... executive authority of the Service Regional Director may be redelegated to the Refuge Manager, Midway...

  19. 50 CFR 38.3 - Executive authority; duration.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... (CONTINUED) THE NATIONAL WILDLIFE REFUGE SYSTEM MIDWAY ATOLL NATIONAL WILDLIFE REFUGE Executive Authority... executive authority of the Service Regional Director may be redelegated to the Refuge Manager, Midway...

  20. 50 CFR 38.3 - Executive authority; duration.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... (CONTINUED) THE NATIONAL WILDLIFE REFUGE SYSTEM MIDWAY ATOLL NATIONAL WILDLIFE REFUGE Executive Authority... executive authority of the Service Regional Director may be redelegated to the Refuge Manager, Midway...

  1. Modulations among the alerting, orienting and executive control networks.

    PubMed

    Callejas, Alicia; Lupiàñez, Juan; Funes, María Jesús; Tudela, Pío

    2005-11-01

    This paper reports a series of experiments that were carried out in order to study the attentional system. Three networks make up this system, and each of them specializes in particular processes. The executive control network specializes in control processes, such as conflict resolution or detection of errors; the orienting network directs the processing system to the source of input and enhances its processing; the alerting network prepares the system for a fast response by maintaining an adequate level of activation in the cognitive system. Recently, Fan and collaborators [J Cogn Neurosci 14(3):340-347, 2002] designed a task to measure the efficiency of each network. We modified Fan's task to test the influences among the networks. We found that the executive control network is inhibited by the alerting network, whereas the orienting network raises the efficiency of the executive control network (Experiment 1). We also found that the alerting network influences the orienting network by speeding up its time course function (Experiment 2). Results were replicated in a third experiment, proving the effects to be stable over time, participants and experimental context, and to be potentially important as a tool for neuropsychological assessment.

  2. Genetic overlap between schizophrenia and selective components of executive function.

    PubMed

    Owens, Sheena F; Rijsdijk, Fruhling; Picchioni, Marco M; Stahl, Daniel; Nenadic, Igor; Murray, Robin M; Toulopoulou, Timothea

    2011-04-01

    Impairments in selective components of executive function are seen in unaffected family members of patients with schizophrenia and may represent the biological expression of increased genetic risk. However no study has quantified the extent to which liability to schizophrenia overlaps genetically with that of executive dysfunction. We studied a total of 418 monozygotic and dizygotic twins, including pairs concordant and discordant for schizophrenia. Participants completed the trail making test part A and verbal fluency tasks to assess initiation, TMT part B to test mental flexibility, and the WAIS-III to assess general intellectual function. Bivariate genetic modeling was used to investigate whether selective measures of executive processing are genetically linked to schizophrenia and to quantify the genetic (i.e. heritability) and environmental contributions to their variability. Genetic influences contributed substantially to test variance for initiation and mental flexibility. Genetic factors were the main source of the phenotypic correlations between schizophrenia and these processes. Verbal fluency tasks shared a large genetic correlation with IQ whilst TMT scales did not, suggesting that they measure discreet processes, and therefore indexing discreet endophenotypes. Both verbal fluency and mental flexibility meet some of the criteria for endophenotypes, but our data suggest that mental flexibility is a purer cognitive process sharing very little common variance with general intellectual functioning. The inclusion of this mental flexibility phenotype in linkage or association analysis should improve the power to detect susceptibility genes for schizophrenia.

  3. State recovery and lockstep execution restart in a system with multiprocessor pairing

    DOEpatents

    Gara, Alan; Gschwind, Michael K; Salapura, Valentina

    2014-01-21

    System, method and computer program product for a multiprocessing system to offer selective pairing of processor cores for increased processing reliability. A selective pairing facility is provided that selectively connects, i.e., pairs, multiple microprocessor or processor cores to provide one highly reliable thread (or thread group). Each paired microprocessor or processor cores that provide one highly reliable thread for high-reliability connect with a system components such as a memory "nest" (or memory hierarchy), an optional system controller, and optional interrupt controller, optional I/O or peripheral devices, etc. The memory nest is attached to a selective pairing facility via a switch or a bus. Each selectively paired processor core is includes a transactional execution facility, whereing the system is configured to enable processor rollback to a previous state and reinitialize lockstep execution in order to recover from an incorrect execution when an incorrect execution has been detected by the selective pairing facility.

  4. Exact and Approximate Probabilistic Symbolic Execution

    NASA Technical Reports Server (NTRS)

    Luckow, Kasper; Pasareanu, Corina S.; Dwyer, Matthew B.; Filieri, Antonio; Visser, Willem

    2014-01-01

    Probabilistic software analysis seeks to quantify the likelihood of reaching a target event under uncertain environments. Recent approaches compute probabilities of execution paths using symbolic execution, but do not support nondeterminism. Nondeterminism arises naturally when no suitable probabilistic model can capture a program behavior, e.g., for multithreading or distributed systems. In this work, we propose a technique, based on symbolic execution, to synthesize schedulers that resolve nondeterminism to maximize the probability of reaching a target event. To scale to large systems, we also introduce approximate algorithms to search for good schedulers, speeding up established random sampling and reinforcement learning results through the quantification of path probabilities based on symbolic execution. We implemented the techniques in Symbolic PathFinder and evaluated them on nondeterministic Java programs. We show that our algorithms significantly improve upon a state-of- the-art statistical model checking algorithm, originally developed for Markov Decision Processes.

  5. Charles River Residual Designation: Executive Summary

    EPA Pesticide Factsheets

    Read an executive summary of the Record of Decision's preliminary decision by the Regional Administrator of EPA Region 1 that storm water permits are needed to address serious water quality problems in the Charles River.

  6. Turning Polite Guests into Executive Readers.

    ERIC Educational Resources Information Center

    Gates, Dale D.

    1983-01-01

    Expands the usual notion of critical reading from just the judgments readers make about the text to include judgments they make about their "reading" of the text. Describes activities to develop "executive" metacomprehension skills. (HTH)

  7. Stateless and stateful implementations of faithful execution

    DOEpatents

    Pierson, Lyndon G; Witzke, Edward L; Tarman, Thomas D; Robertson, Perry J; Eldridge, John M; Campbell, Philip L

    2014-12-16

    A faithful execution system includes system memory, a target processor, and protection engine. The system memory stores a ciphertext including value fields and integrity fields. The value fields each include an encrypted executable instruction and the integrity fields each include an encrypted integrity value for determining whether a corresponding one of the value fields has been modified. The target processor executes plaintext instructions decoded from the ciphertext while the protection engine is coupled between the system memory and the target processor. The protection engine includes logic to retrieve the ciphertext from the system memory, decrypt the value fields into the plaintext instructions, perform an integrity check based on the integrity fields to determine whether any of the corresponding value fields have been modified, and provide the plaintext instructions to the target processor for execution.

  8. Women School Executives Get Serious about Success.

    ERIC Educational Resources Information Center

    Rist, Marilee C.

    1984-01-01

    Summarizes the business and discussions of the Chicago convention of the National Conference of Women School Executives. Includes tips on how women can swim in the shark-infested waters of administration--and survive. (JW)

  9. 17 CFR 200.13 - Executive Director.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... management improvements, telecommunications and information technology policies, and other government-wide... AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management General Organization... Office of Information Technology. In addition, the Executive Director implements the following...

  10. Local Governments (Executive Offices) Sector (NAICS 921110)

    EPA Pesticide Factsheets

    EPA regulatory information for government executive offices, including state implementation plans (SIPs), local emergency planning under EPCRA, drinking water treatment, water supply security, and compliance assistance for boiler & combustion regulations.

  11. Executive Coaching Practices in the Adult Workplace

    ERIC Educational Resources Information Center

    Campone, Francine

    2015-01-01

    This chapter provides an overview of key principles and practices in executive coaching. Coaching is discussed as a reflective learning opportunity and offers the theoretical grounding, strategies, and case studies for each of four key elements of a coaching engagement.

  12. Nurse Executive Role Socialization and Occupational Image.

    ERIC Educational Resources Information Center

    Krugman, Mary Elizabeth

    1990-01-01

    The effects of educational and experiential variables on occupational image were explored through a survey of 640 nurse executives (386 responses). Early socialization as a nurse seems to remain a constant and institutional management climate is another important variable. (JOW)

  13. Executive Summary of Systems Analysis to Develop Future Civil Aircraft Noise Reduction Alternatives.

    DTIC Science & Technology

    1982-05-01

    AD-AIIB 4 PEER CONSULTANTS INC ROCKVILLE NO F/6 1/3 EXECUTIVE SUMMARY OF SYSTEMS ANALYSIS TO DEVELOP FUTURE CIVIL A-ETC(U) MAY B2 L A ROBINSON DTFAOI...Energy Washington, D.C. 20591 Develop Future Civil Aircraft Noise Reduction Alternatives Lilia Abron Robinson, Ph. D. PEER Consultants, Inc. 1160...ORGANIZATION CODE 7. AUTHOR(S) B. PERFORMING ORGANIZATION REPORT NO. PEER Consultants, Inc. 9. PERFORMING ORGANIZATION NAME AND ADDRESS 10. PROGRAM

  14. SecureQEMU: Emulation-Based Software Protection Providing Encrypted Code Execution and Page Granularity Code Signing

    DTIC Science & Technology

    2008-12-01

    2.1.4 Summary . . . . . . . . . . . . . . . . . . . . . 16 2.2 Introduction to Backdoors . . . . . . . . . . . . . . . . . 16 2.2.1 Backdoor Passwords... 16 2.2.2 Standalone Backdoors . . . . . . . . . . . . . . 18 2.2.3 Exploits vs. Backdoors . . . . . . . . . . . . . . 20...Randomization . . . . . . . . . . . 15 SAM Security Accounts Manager . . . . . . . . . . . . . . . . . 16 DB Database

  15. Wavelet Kernels on a DSP: A Comparison between Lifting and Filter Banks for Image Coding

    NASA Astrophysics Data System (ADS)

    Gnavi, Stefano; Penna, Barbara; Grangetto, Marco; Magli, Enrico; Olmo, Gabriella

    2002-12-01

    We develop wavelet engines on a digital signal processors (DSP) platform, the target application being image and intraframe video compression by means of the forthcoming JPEG2000 and Motion-JPEG2000 standards. We describe two implementations, based on the lifting scheme and the filter bank scheme, respectively, and we present experimental results on code profiling. In particular, we address the following problems: (1) evaluating the execution speed of a wavelet engine on a modern DSP; (2) comparing the actual execution speed of the lifting scheme and the filter bank scheme with the theoretical results; (3) using the on-board direct memory access (DMA) to possibly optimize the execution speed. The results allow to assess the performance of a modern DSP in the image coding task, as well as to compare the lifting and filter bank performance in a realistic application scenario. Finally, guidelines for optimizing the code efficiency are provided by investigating the possible use of the on-board DMA.

  16. Pyramid image codes

    NASA Technical Reports Server (NTRS)

    Watson, Andrew B.

    1990-01-01

    All vision systems, both human and machine, transform the spatial image into a coded representation. Particular codes may be optimized for efficiency or to extract useful image features. Researchers explored image codes based on primary visual cortex in man and other primates. Understanding these codes will advance the art in image coding, autonomous vision, and computational human factors. In cortex, imagery is coded by features that vary in size, orientation, and position. Researchers have devised a mathematical model of this transformation, called the Hexagonal oriented Orthogonal quadrature Pyramid (HOP). In a pyramid code, features are segregated by size into layers, with fewer features in the layers devoted to large features. Pyramid schemes provide scale invariance, and are useful for coarse-to-fine searching and for progressive transmission of images. The HOP Pyramid is novel in three respects: (1) it uses a hexagonal pixel lattice, (2) it uses oriented features, and (3) it accurately models most of the prominent aspects of primary visual cortex. The transform uses seven basic features (kernels), which may be regarded as three oriented edges, three oriented bars, and one non-oriented blob. Application of these kernels to non-overlapping seven-pixel neighborhoods yields six oriented, high-pass pyramid layers, and one low-pass (blob) layer.

  17. Report number codes

    SciTech Connect

    Nelson, R.N.

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  18. Embedded foveation image coding.

    PubMed

    Wang, Z; Bovik, A C

    2001-01-01

    The human visual system (HVS) is highly space-variant in sampling, coding, processing, and understanding. The spatial resolution of the HVS is highest around the point of fixation (foveation point) and decreases rapidly with increasing eccentricity. By taking advantage of this fact, it is possible to remove considerable high-frequency information redundancy from the peripheral regions and still reconstruct a perceptually good quality image. Great success has been obtained previously by a class of embedded wavelet image coding algorithms, such as the embedded zerotree wavelet (EZW) and the set partitioning in hierarchical trees (SPIHT) algorithms. Embedded wavelet coding not only provides very good compression performance, but also has the property that the bitstream can be truncated at any point and still be decoded to recreate a reasonably good quality image. In this paper, we propose an embedded foveation image coding (EFIC) algorithm, which orders the encoded bitstream to optimize foveated visual quality at arbitrary bit-rates. A foveation-based image quality metric, namely, foveated wavelet image quality index (FWQI), plays an important role in the EFIC system. We also developed a modified SPIHT algorithm to improve the coding efficiency. Experiments show that EFIC integrates foveation filtering with foveated image coding and demonstrates very good coding performance and scalability in terms of foveated image quality measurement.

  19. Executive Function Mechanisms of Theory of Mind

    ERIC Educational Resources Information Center

    Ahmed, Fayeza S.; Miller, L. Stephen

    2011-01-01

    This study examined the relationship between Executive Function (EF) and Theory of Mind (ToM) using the Delis-Kaplan Executive Function System (D-KEFS) and three tests of ToM (Reading the Mind in the Eyes test (RMET), Strange Stories test, and Faux Pas test). Separate regression analyses were conducted, and EF predictors varied by ToM test. No EF…

  20. Motivation and Politics in Executive Compensation.

    DTIC Science & Technology

    1983-07-01

    Behavior, Value and Growth. New York, N. Y.: Harcourt, Brace and World, 1967. Berg, N. A. What’s different about conglomerate management? Harvard Business Review , 1969...How to make incentive plans work. Harvard Business Review , 50 (4), 1972, 117-124. 26 Deckop, J. R. and Mahoney, T. A. The economics of executive...8217devaluation’ of the american executive. Harvard Business Review , 1976, 54 (3), 84-94. Lawler, E. E. Motivation in Work Organizations. Monterey, CA

  1. Principles of Faithful Execution in the implementation of trusted objects.

    SciTech Connect

    Tarman, Thomas David; Campbell, Philip LaRoche; Pierson, Lyndon George

    2003-09-01

    We begin with the following definitions: Definition: A trusted volume is the computing machinery (including communication lines) within which data is assumed to be physically protected from an adversary. A trusted volume provides both integrity and privacy. Definition: Program integrity consists of the protection necessary to enable the detection of changes in the bits comprising a program as specified by the developer, for the entire time that the program is outside a trusted volume. For ease of discussion we consider program integrity to be the aggregation of two elements: instruction integrity (detection of changes in the bits within an instruction or block of instructions), and sequence integrity (detection of changes in the locations of instructions within a program). Definition: Faithful Execution (FE) is a type of software protection that begins when the software leaves the control of the developer and ends within the trusted volume of a target processor. That is, FE provides program integrity, even while the program is in execution. (As we will show below, FE schemes are a function of trusted volume size.) FE is a necessary quality for computing. Without it we cannot trust computations. In the early days of computing FE came for free since the software never left a trusted volume. At that time the execution environment was the same as the development environment. In some circles that environment was referred to as a ''closed shop:'' all of the software that was used there was developed there. When an organization bought a large computer from a vendor the organization would run its own operating system on that computer, use only its own editors, only its own compilers, only its own debuggers, and so on. However, with the continuing maturity of computing technology, FE becomes increasingly difficult to achieve

  2. Prevalence of executive dysfunction in cocaine, heroin and alcohol users enrolled in therapeutic communities.

    PubMed

    Fernández-Serrano, María José; Pérez-García, Miguel; Perales, José C; Verdejo-García, Antonio

    2010-01-10

    Many studies have observed relevant executive alterations in polysubstance users but no data have been generated in terms of prevalence of these alterations. Studies of the prevalence of neuropsychological impairment can be useful in the design and implementations of interventional programs for substance abusers. The present study was conducted to estimate the prevalence of neuropsychological impairment in different components of executive functions in polysubstance users enrolled in therapeutic communities. Moreover, we estimated the effect size of the differences in the executive performance between polysubstance users and non substance users in order to know which neuropsychological tasks can be useful to detect alterations in the executive functions. Study results showed a high prevalence of executive function impairment in polysubstance users. Working memory was the component with the highest impairment proportion, followed by fluency, shifting, planning, multi-tasking and interference. Comparisons between user groups showed very similar executive impairment prevalence for all the analyzed executive components. The best discriminating task between users and controls was Arithmetic (Wechsler Adult Intelligence Scale, WAIS-III). Moreover FAS and Ruff Figural Fluency Test was discriminating for fluency, Category Test for shifting, Stroop Colour-Word Interference Test for interference, Zoo Map (Behavioural Assessment of the Dysexecutive Syndrome, BADS) for planning and Six Elements (BADS) for multi-tasking. The existence of significant prevalence of executive impairment in polysubstance users reveals the need to redirect the actuation policies in the field of drug-dependency towards the creation of treatments addressed at the executive deficits of the participants, which in turn would facilitate the individuals' compliance and final rehabilitation.

  3. Prison brain? Executive dysfunction in prisoners

    PubMed Central

    Meijers, Jesse; Harte, Joke M.; Jonker, Frank A.; Meynen, Gerben

    2015-01-01

    A better understanding of the functioning of the brain, particularly executive functions, of the prison population could aid in reducing crime rates through the reduction of recidivism rates. Indeed, reoffending appears to be related to executive dysfunction and it is known that executive functions are crucial for self-regulation. In the current paper, studies to executive functions in regular adult prisoners compared to non-offender controls were reviewed. Seven studies were found. Specific executive functions were found to be impaired in the general prison population, i.e., attention and set-shifting, as well as in separate subgroups of violent (i.e., set-shifting and working memory) and non-violent offenders (i.e., inhibition, working memory and problem solving). We conclude that the limited number of studies is remarkable, considering the high impact of this population on society and elaborate on the implications of these specific impairments that were found. Further empirical research is suggested, measuring executive functioning within subjects over time for a group of detainees as well as a control group. PMID:25688221

  4. Statistical Symbolic Execution with Informed Sampling

    NASA Technical Reports Server (NTRS)

    Filieri, Antonio; Pasareanu, Corina S.; Visser, Willem; Geldenhuys, Jaco

    2014-01-01

    Symbolic execution techniques have been proposed recently for the probabilistic analysis of programs. These techniques seek to quantify the likelihood of reaching program events of interest, e.g., assert violations. They have many promising applications but have scalability issues due to high computational demand. To address this challenge, we propose a statistical symbolic execution technique that performs Monte Carlo sampling of the symbolic program paths and uses the obtained information for Bayesian estimation and hypothesis testing with respect to the probability of reaching the target events. To speed up the convergence of the statistical analysis, we propose Informed Sampling, an iterative symbolic execution that first explores the paths that have high statistical significance, prunes them from the state space and guides the execution towards less likely paths. The technique combines Bayesian estimation with a partial exact analysis for the pruned paths leading to provably improved convergence of the statistical analysis. We have implemented statistical symbolic execution with in- formed sampling in the Symbolic PathFinder tool. We show experimentally that the informed sampling obtains more precise results and converges faster than a purely statistical analysis and may also be more efficient than an exact symbolic analysis. When the latter does not terminate symbolic execution with informed sampling can give meaningful results under the same time and memory limits.

  5. SAP- FORTRAN STATIC SOURCE CODE ANALYZER PROGRAM (IBM VERSION)

    NASA Technical Reports Server (NTRS)

    Manteufel, R.

    1994-01-01

    The FORTRAN Static Source Code Analyzer program, SAP, was developed to automatically gather statistics on the occurrences of statements and structures within a FORTRAN program and to provide for the reporting of those statistics. Provisions have been made for weighting each statistic and to provide an overall figure of complexity. Statistics, as well as figures of complexity, are gathered on a module by module basis. Overall summed statistics are also accumulated for the complete input source file. SAP accepts as input syntactically correct FORTRAN source code written in the FORTRAN 77 standard language. In addition, code written using features in the following languages is also accepted: VAX-11 FORTRAN, IBM S/360 FORTRAN IV Level H Extended; and Structured FORTRAN. The SAP program utilizes two external files in its analysis procedure. A keyword file allows flexibility in classifying statements and in marking a statement as either executable or non-executable. A statistical weight file allows the user to assign weights to all output statistics, thus allowing the user flexibility in defining the figure of complexity. The SAP program is written in FORTRAN IV for batch execution and has been implemented on a DEC VAX series computer under VMS and on an IBM 370 series computer under MVS. The SAP program was developed in 1978 and last updated in 1985.

  6. SAP- FORTRAN STATIC SOURCE CODE ANALYZER PROGRAM (DEC VAX VERSION)

    NASA Technical Reports Server (NTRS)

    Merwarth, P. D.

    1994-01-01

    The FORTRAN Static Source Code Analyzer program, SAP, was developed to automatically gather statistics on the occurrences of statements and structures within a FORTRAN program and to provide for the reporting of those statistics. Provisions have been made for weighting each statistic and to provide an overall figure of complexity. Statistics, as well as figures of complexity, are gathered on a module by module basis. Overall summed statistics are also accumulated for the complete input source file. SAP accepts as input syntactically correct FORTRAN source code written in the FORTRAN 77 standard language. In addition, code written using features in the following languages is also accepted: VAX-11 FORTRAN, IBM S/360 FORTRAN IV Level H Extended; and Structured FORTRAN. The SAP program utilizes two external files in its analysis procedure. A keyword file allows flexibility in classifying statements and in marking a statement as either executable or non-executable. A statistical weight file allows the user to assign weights to all output statistics, thus allowing the user flexibility in defining the figure of complexity. The SAP program is written in FORTRAN IV for batch execution and has been implemented on a DEC VAX series computer under VMS and on an IBM 370 series computer under MVS. The SAP program was developed in 1978 and last updated in 1985.

  7. Code Disentanglement: Initial Plan

    SciTech Connect

    Wohlbier, John Greaton; Kelley, Timothy M.; Rockefeller, Gabriel M.; Calef, Matthew Thomas

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  8. Compressible Astrophysics Simulation Code

    SciTech Connect

    Howell, L.; Singer, M.

    2007-07-18

    This is an astrophysics simulation code involving a radiation diffusion module developed at LLNL coupled to compressible hydrodynamics and adaptive mesh infrastructure developed at LBNL. One intended application is to neutrino diffusion in core collapse supernovae.

  9. Seals Flow Code Development

    NASA Technical Reports Server (NTRS)

    1991-01-01

    In recognition of a deficiency in the current modeling capability for seals, an effort was established by NASA to develop verified computational fluid dynamic concepts, codes, and analyses for seals. The objectives were to develop advanced concepts for the design and analysis of seals, to effectively disseminate the information to potential users by way of annual workshops, and to provide experimental verification for the models and codes under a wide range of operating conditions.

  10. Identifying personal microbiomes using metagenomic codes.

    PubMed

    Franzosa, Eric A; Huang, Katherine; Meadow, James F; Gevers, Dirk; Lemon, Katherine P; Bohannan, Brendan J M; Huttenhower, Curtis

    2015-06-02

    Community composition within the human microbiome varies across individuals, but it remains unknown if this variation is sufficient to uniquely identify individuals within large populations or stable enough to identify them over time. We investigated this by developing a hitting set-based coding algorithm and applying it to the Human Microbiome Project population. Our approach defined body site-specific metagenomic codes: sets of microbial taxa or genes prioritized to uniquely and stably identify individuals. Codes capturing strain variation in clade-specific marker genes were able to distinguish among 100s of individuals at an initial sampling time point. In comparisons with follow-up samples collected 30-300 d later, ∼30% of individuals could still be uniquely pinpointed using metagenomic codes from a typical body site; coincidental (false positive) matches were rare. Codes based on the gut microbiome were exceptionally stable and pinpointed >80% of individuals. The failure of a code to match its owner at a later time point was largely explained by the loss of specific microbial strains (at current limits of detection) and was only weakly associated with the length of the sampling interval. In addition to highlighting patterns of temporal variation in the ecology of the human microbiome, this work demonstrates the feasibility of microbiome-based identifiability-a result with important ethical implications for microbiome study design. The datasets and code used in this work are available for download from huttenhower.sph.harvard.edu/idability.

  11. Ultrasound strain imaging using Barker code

    NASA Astrophysics Data System (ADS)

    Peng, Hui; Tie, Juhong; Guo, Dequan

    2017-01-01

    Ultrasound strain imaging is showing promise as a new way of imaging soft tissue elasticity in order to help clinicians detect lesions or cancers in tissues. In this paper, Barker code is applied to strain imaging to improve its quality. Barker code as a coded excitation signal can be used to improve the echo signal-to-noise ratio (eSNR) in ultrasound imaging system. For the Baker code of length 13, the sidelobe level of the matched filter output is -22dB, which is unacceptable for ultrasound strain imaging, because high sidelobe level will cause high decorrelation noise. Instead of using the conventional matched filter, we use the Wiener filter to decode the Barker-coded echo signal to suppress the range sidelobes. We also compare the performance of Barker code and the conventional short pulse in simulation method. The simulation results demonstrate that the performance of the Wiener filter is much better than the matched filter, and Baker code achieves higher elastographic signal-to-noise ratio (SNRe) than the short pulse in low eSNR or great depth conditions due to the increased eSNR with it.

  12. Robust Nonlinear Neural Codes

    NASA Astrophysics Data System (ADS)

    Yang, Qianli; Pitkow, Xaq

    2015-03-01

    Most interesting natural sensory stimuli are encoded in the brain in a form that can only be decoded nonlinearly. But despite being a core function of the brain, nonlinear population codes are rarely studied and poorly understood. Interestingly, the few existing models of nonlinear codes are inconsistent with known architectural features of the brain. In particular, these codes have information content that scales with the size of the cortical population, even if that violates the data processing inequality by exceeding the amount of information entering the sensory system. Here we provide a valid theory of nonlinear population codes by generalizing recent work on information-limiting correlations in linear population codes. Although these generalized, nonlinear information-limiting correlations bound the performance of any decoder, they also make decoding more robust to suboptimal computation, allowing many suboptimal decoders to achieve nearly the same efficiency as an optimal decoder. Although these correlations are extremely difficult to measure directly, particularly for nonlinear codes, we provide a simple, practical test by which one can use choice-related activity in small populations of neurons to determine whether decoding is suboptimal or optimal and limited by correlated noise. We conclude by describing an example computation in the vestibular system where this theory applies. QY and XP was supported by a grant from the McNair foundation.

  13. Performance Bounds on Two Concatenated, Interleaved Codes

    NASA Technical Reports Server (NTRS)

    Moision, Bruce; Dolinar, Samuel

    2010-01-01

    A method has been developed of computing bounds on the performance of a code comprised of two linear binary codes generated by two encoders serially concatenated through an interleaver. Originally intended for use in evaluating the performances of some codes proposed for deep-space communication links, the method can also be used in evaluating the performances of short-block-length codes in other applications. The method applies, more specifically, to a communication system in which following processes take place: At the transmitter, the original binary information that one seeks to transmit is first processed by an encoder into an outer code (Co) characterized by, among other things, a pair of numbers (n,k), where n (n > k)is the total number of code bits associated with k information bits and n k bits are used for correcting or at least detecting errors. Next, the outer code is processed through either a block or a convolutional interleaver. In the block interleaver, the words of the outer code are processed in blocks of I words. In the convolutional interleaver, the interleaving operation is performed bit-wise in N rows with delays that are multiples of B bits. The output of the interleaver is processed through a second encoder to obtain an inner code (Ci) characterized by (ni,ki). The output of the inner code is transmitted over an additive-white-Gaussian- noise channel characterized by a symbol signal-to-noise ratio (SNR) Es/No and a bit SNR Eb/No. At the receiver, an inner decoder generates estimates of bits. Depending on whether a block or a convolutional interleaver is used at the transmitter, the sequence of estimated bits is processed through a block or a convolutional de-interleaver, respectively, to obtain estimates of code words. Then the estimates of the code words are processed through an outer decoder, which generates estimates of the original information along with flags indicating which estimates are presumed to be correct and which are found to

  14. The Wild West of executive coaching.

    PubMed

    Sherman, Stratford; Freas, Alyssa

    2004-11-01

    Annual spending on executive coaching in the United States is estimated at 1 billion dollars. Yet information about coaching's effectiveness is scarce and unreliable. No one has yet demonstrated conclusively what qualifies an executive coach or what makes one approach to executive coaching better than another. Barriers to entry are nonexistent--many executive coaches know little about business, and some know little about coaching. The coaching certifications offered by various self-appointed bodies are difficult to assess, and methods of measuring return on investment are questionable. But strategic coaching can provide critical help both to individuals and to organizations. In this article, Stratford Sherman, a senior vice president of Executive Coaching Network, and Alyssa Freas, the founder and CEO, explore the popularity of executive coaching and investigate ways to make the most of the experience. They argue that coaching is inevitably a triangular relationship between the client, the "coachee," and the coach. Its purpose is to produce behavioral change and growth in the coachee for the economic benefit of the client. The best way to maximize the likelihood of good results is to qualify all the people involved. Even so, many triangular relationships continue to generate conflict among all three parties. At the most basic level, coaches serve as suppliers of candor, providing leaders with the objective feedback they need to nourish their growth. Coaching gets executives to slow down, gain awareness, and notice the effects of their words and actions. On a larger scale, the best coaching fosters cultural change for the benefit of the entire organization. It provides a disciplined way for businesses to deepen relationships with their most valued employees while also increasing their effectiveness.

  15. Toward Synthesizing Executable Models in Biology

    PubMed Central

    Fisher, Jasmin; Piterman, Nir; Bodik, Rastislav

    2014-01-01

    Over the last decade, executable models of biological behaviors have repeatedly provided new scientific discoveries, uncovered novel insights, and directed new experimental avenues. These models are computer programs whose execution mechanistically simulates aspects of the cell’s behaviors. If the observed behavior of the program agrees with the observed biological behavior, then the program explains the phenomena. This approach has proven beneficial for gaining new biological insights and directing new experimental avenues. One advantage of this approach is that techniques for analysis of computer programs can be applied to the analysis of executable models. For example, one can confirm that a model agrees with experiments for all possible executions of the model (corresponding to all environmental conditions), even if there are a huge number of executions. Various formal methods have been adapted for this context, for example, model checking or symbolic analysis of state spaces. To avoid manual construction of executable models, one can apply synthesis, a method to produce programs automatically from high-level specifications. In the context of biological modeling, synthesis would correspond to extracting executable models from experimental data. We survey recent results about the usage of the techniques underlying synthesis of computer programs for the inference of biological models from experimental data. We describe synthesis of biological models from curated mutation experiment data, inferring network connectivity models from phosphoproteomic data, and synthesis of Boolean networks from gene expression data. While much work has been done on automated analysis of similar datasets using machine learning and artificial intelligence, using synthesis techniques provides new opportunities such as efficient computation of disambiguating experiments, as well as the ability to produce different kinds of models automatically from biological data. PMID:25566538

  16. A Review on Spectral Amplitude Coding Optical Code Division Multiple Access

    NASA Astrophysics Data System (ADS)

    Kaur, Navpreet; Goyal, Rakesh; Rani, Monika

    2017-03-01

    This manuscript deals with analysis of Spectral Amplitude Coding Optical Code Division Multiple Access (SACOCDMA) system. The major noise source in optical CDMA is co-channel interference from other users known as multiple access interference (MAI). The system performance in terms of bit error rate (BER) degrades as a result of increased MAI. It is perceived that number of users and type of codes used for optical system directly decide the performance of system. MAI can be restricted by efficient designing of optical codes and implementing them with unique architecture to accommodate more number of users. Hence, it is a necessity to design a technique like spectral direct detection (SDD) technique with modified double weight code, which can provide better cardinality and good correlation property.

  17. 48 CFR 552.270-3 - Parties To Execute Lease.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Parties To Execute Lease... Parties To Execute Lease. As prescribed in 570.602, insert the following provision: Parties To Execute Lease (SEP 1999) (a) If the lease is executed by an attorney, agent, or trustee on behalf of the...

  18. 5 CFR 412.401 - Continuing executive development.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Continuing executive development. 412.401... SUPERVISORY, MANAGEMENT, AND EXECUTIVE DEVELOPMENT Executive Development § 412.401 Continuing executive development. (a) Each agency must establish a program or programs for the continuing development of its...

  19. 17 CFR 200.16 - Executive Assistant to the Chairman.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Executive Assistant to the... Organization § 200.16 Executive Assistant to the Chairman. The Executive Assistant to the Chairman assists the..., executive direction, and authority for staff studies and reports bearing on the Commission's...

  20. 47 CFR 54.704 - The Administrator's Chief Executive Officer.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SERVICES (CONTINUED) UNIVERSAL SERVICE Administration § 54.704 The Administrator's Chief Executive Officer. (a) Chief Executive Officer's functions. (1) The Chief Executive Officer shall have management... 47 Telecommunication 3 2013-10-01 2013-10-01 false The Administrator's Chief Executive Officer....