Science.gov

Sample records for identification code bic

  1. Consistent model identification of varying coefficient quantile regression with BIC tuning parameter selection

    PubMed Central

    Zheng, Qi; Peng, Limin

    2016-01-01

    Quantile regression provides a flexible platform for evaluating covariate effects on different segments of the conditional distribution of response. As the effects of covariates may change with quantile level, contemporaneously examining a spectrum of quantiles is expected to have a better capacity to identify variables with either partial or full effects on the response distribution, as compared to focusing on a single quantile. Under this motivation, we study a general adaptively weighted LASSO penalization strategy in the quantile regression setting, where a continuum of quantile index is considered and coefficients are allowed to vary with quantile index. We establish the oracle properties of the resulting estimator of coefficient function. Furthermore, we formally investigate a BIC-type uniform tuning parameter selector and show that it can ensure consistent model selection. Our numerical studies confirm the theoretical findings and illustrate an application of the new variable selection procedure. PMID:28008212

  2. 49 CFR 178.502 - Identification codes for packagings.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Identification codes for packagings. 178.502... FOR PACKAGINGS Non-bulk Performance-Oriented Packaging Standards § 178.502 Identification codes for packagings. (a) Identification codes for designating kinds of packagings consist of the following: (1)...

  3. 49 CFR 178.905 - Large Packaging identification codes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Large Packaging identification codes. 178.905... FOR PACKAGINGS Large Packagings Standards § 178.905 Large Packaging identification codes. Large packaging code designations consist of: two numerals specified in paragraph (a) of this section; followed...

  4. 33 CFR 181.31 - Manufacturer identification code assignment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Manufacturer identification code... SECURITY (CONTINUED) BOATING SAFETY MANUFACTURER REQUIREMENTS Identification of Boats § 181.31 Manufacturer... request a manufacturer identification code in writing from the Recreational Boating Product...

  5. Improving the Use of Self-Generated Identification Codes

    ERIC Educational Resources Information Center

    Schnell, Rainer; Bachteler, Tobias; Reiher, Jorg

    2010-01-01

    In panel studies on sensitive topics, respondent-generated identification codes are often used to link records across surveys. However, usually a substantial number of cases are lost due to the codes. These losses may cause biased estimates. Using more components and linking the codes by the Levenshtein string distance function will reduce the…

  6. Polycistronic RNA polymerase II expression vectors for RNA interference based on BIC/miR-155

    PubMed Central

    Chung, Kwan-Ho; Hart, Christopher C.; Al-Bassam, Sarmad; Avery, Adam; Taylor, Jennifer; Patel, Paresh D.; Vojtek, Anne B.; Turner, David L.

    2006-01-01

    Vector-based RNA interference (RNAi) has emerged as a valuable tool for analysis of gene function. We have developed new RNA polymerase II expression vectors for RNAi, designated SIBR vectors, based upon the non-coding RNA BIC. BIC contains the miR-155 microRNA (miRNA) precursor, and we find that expression of a short region of the third exon of mouse BIC is sufficient to produce miR-155 in mammalian cells. The SIBR vectors use a modified miR-155 precursor stem–loop and flanking BIC sequences to express synthetic miRNAs complementary to target RNAs. Like RNA polymerase III driven short hairpin RNA vectors, the SIBR vectors efficiently reduce target mRNA and protein expression. The synthetic miRNAs can be expressed from an intron, allowing coexpression of a marker or other protein with the miRNAs. In addition, intronic expression of a synthetic miRNA from a two intron vector enhances RNAi. A SIBR vector can express two different miRNAs from a single transcript for effective inhibition of two different target mRNAs. Furthermore, at least eight tandem copies of a synthetic miRNA can be expressed in a polycistronic transcript to increase the inhibition of a target RNA. The SIBR vectors are flexible tools for a variety of RNAi applications. PMID:16614444

  7. Identification coding schemes for modulated reflectance systems

    DOEpatents

    Coates, Don M.; Briles, Scott D.; Neagley, Daniel L.; Platts, David; Clark, David D.

    2006-08-22

    An identifying coding apparatus employing modulated reflectance technology involving a base station emitting a RF signal, with a tag, located remotely from the base station, and containing at least one antenna and predetermined other passive circuit components, receiving the RF signal and reflecting back to the base station a modulated signal indicative of characteristics related to the tag.

  8. The mRNA transportome of the BicD/Egl transport machinery

    PubMed Central

    Vazquez-Pianzola, Paula; Schaller, Bogdan; Colombo, Martino; Beuchle, Dirk; Neuenschwander, Samuel; Marcil, Anne; Bruggmann, Rémy

    2017-01-01

    ABSTRACT mRNA (mRNA) transport focuses the expression of encoded proteins to specific regions within cells providing them with the means to assume specific functions and even identities. BicD and the mRNA binding protein Egl interact with the microtubule motor dynein to localize mRNAs in Drosophila. Because relatively few mRNA cargos were known, we isolated and identified Egl::GFP associated mRNAs. The top candidates were validated by qPCR, in situ hybridization and genetically by showing that their localization requires BicD. In young embryos these Egl target mRNAs are preferentially localized apically, between the plasma membrane and the blastoderm nuclei, but also in the pole plasm at the posterior pole. Egl targets expressed in the ovary were mostly enriched in the oocyte and some were apically localized in follicle cells. The identification of a large group of novel mRNAs associated with BicD/Egl points to several novel developmental and physiological functions of this dynein dependent localization machinery. The verified dataset also allowed us to develop a tool that predicts conserved A'-form-like stem loops that serve as localization elements in 3′UTRs. PMID:27801632

  9. BicSPAM: flexible biclustering using sequential patterns

    PubMed Central

    2014-01-01

    Background Biclustering is a critical task for biomedical applications. Order-preserving biclusters, submatrices where the values of rows induce the same linear ordering across columns, capture local regularities with constant, shifting, scaling and sequential assumptions. Additionally, biclustering approaches relying on pattern mining output deliver exhaustive solutions with an arbitrary number and positioning of biclusters. However, existing order-preserving approaches suffer from robustness, scalability and/or flexibility issues. Additionally, they are not able to discover biclusters with symmetries and parameterizable levels of noise. Results We propose new biclustering algorithms to perform flexible, exhaustive and noise-tolerant biclustering based on sequential patterns (BicSPAM). Strategies are proposed to allow for symmetries and to seize efficiency gains from item-indexable properties and/or from partitioning methods with conservative distance guarantees. Results show BicSPAM ability to capture symmetries, handle planted noise, and scale in terms of memory and time. BicSPAM also achieves the best match-scores for the recovery of hidden biclusters in synthetic datasets with varying noise distributions and levels of missing values. Finally, results on gene expression data lead to complete solutions, delivering new biclusters corresponding to putative modules with heightened biological relevance. Conclusions BicSPAM provides an exhaustive way to discover flexible structures of order-preserving biclusters. To the best of our knowledge, BicSPAM is the first attempt to deal with order-preserving biclusters that allow for symmetries and that are robust to varying levels of noise. PMID:24885271

  10. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 1 2013-04-01 2013-04-01 false Controls for identification codes/passwords. 11... identification codes/passwords. Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls...

  11. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 1 2011-04-01 2011-04-01 false Controls for identification codes/passwords. 11... identification codes/passwords. Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls...

  12. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... must I use for identification codes and passwords? 73.12 Section 73.12 Alcohol, Tobacco Products and... controls must I use for identification codes and passwords? If you use electronic signatures based upon use of identification codes in combination with passwords, you must employ controls to ensure...

  13. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... I use for identification codes and passwords? 73.12 Section 73.12 Alcohol, Tobacco Products and... controls must I use for identification codes and passwords? If you use electronic signatures based upon use of identification codes in combination with passwords, you must employ controls to ensure...

  14. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... must I use for identification codes and passwords? 73.12 Section 73.12 Alcohol, Tobacco Products and... controls must I use for identification codes and passwords? If you use electronic signatures based upon use of identification codes in combination with passwords, you must employ controls to ensure...

  15. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Controls for identification codes/passwords. 11... identification codes/passwords. Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls...

  16. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 1 2014-04-01 2014-04-01 false Controls for identification codes/passwords. 11... identification codes/passwords. Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls...

  17. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... must I use for identification codes and passwords? 73.12 Section 73.12 Alcohol, Tobacco Products and... controls must I use for identification codes and passwords? If you use electronic signatures based upon use of identification codes in combination with passwords, you must employ controls to ensure...

  18. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... must I use for identification codes and passwords? 73.12 Section 73.12 Alcohol, Tobacco Products and... controls must I use for identification codes and passwords? If you use electronic signatures based upon use of identification codes in combination with passwords, you must employ controls to ensure...

  19. Bar Coding MS(2) Spectra for Metabolite Identification.

    PubMed

    Spalding, Jonathan L; Cho, Kevin; Mahieu, Nathaniel G; Nikolskiy, Igor; Llufrio, Elizabeth M; Johnson, Stephen L; Patti, Gary J

    2016-03-01

    Metabolite identifications are most frequently achieved in untargeted metabolomics by matching precursor mass and full, high-resolution MS(2) spectra to metabolite databases and standards. Here we considered an alternative approach for establishing metabolite identifications that does not rely on full, high-resolution MS(2) spectra. First, we select mass-to-charge regions containing the most informative metabolite fragments and designate them as bins. We then translate each metabolite fragmentation pattern into a binary code by assigning 1's to bins containing fragments and 0's to bins without fragments. With 20 bins, this binary-code system is capable of distinguishing 96% of the compounds in the METLIN MS(2) library. A major advantage of the approach is that it extends untargeted metabolomics to low-resolution triple quadrupole (QqQ) instruments, which are typically less expensive and more robust than other types of mass spectrometers. We demonstrate a method of acquiring MS(2) data in which the third quadrupole of a QqQ instrument cycles over 20 wide isolation windows (coinciding with the location and width of our bins) for each precursor mass selected by the first quadrupole. Operating the QqQ instrument in this mode yields diagnostic bar codes for each precursor mass that can be matched to the bar codes of metabolite standards. Furthermore, our data suggest that using low-resolution bar codes enables QqQ instruments to make MS(2)-based identifications in untargeted metabolomics with a specificity and sensitivity that is competitive to high-resolution time-of-flight technologies.

  20. CRITICA: coding region identification tool invoking comparative analysis

    NASA Technical Reports Server (NTRS)

    Badger, J. H.; Olsen, G. J.; Woese, C. R. (Principal Investigator)

    1999-01-01

    Gene recognition is essential to understanding existing and future DNA sequence data. CRITICA (Coding Region Identification Tool Invoking Comparative Analysis) is a suite of programs for identifying likely protein-coding sequences in DNA by combining comparative analysis of DNA sequences with more common noncomparative methods. In the comparative component of the analysis, regions of DNA are aligned with related sequences from the DNA databases; if the translation of the aligned sequences has greater amino acid identity than expected for the observed percentage nucleotide identity, this is interpreted as evidence for coding. CRITICA also incorporates noncomparative information derived from the relative frequencies of hexanucleotides in coding frames versus other contexts (i.e., dicodon bias). The dicodon usage information is derived by iterative analysis of the data, such that CRITICA is not dependent on the existence or accuracy of coding sequence annotations in the databases. This independence makes the method particularly well suited for the analysis of novel genomes. CRITICA was tested by analyzing the available Salmonella typhimurium DNA sequences. Its predictions were compared with the DNA sequence annotations and with the predictions of GenMark. CRITICA proved to be more accurate than GenMark, and moreover, many of its predictions that would seem to be errors instead reflect problems in the sequence databases. The source code of CRITICA is freely available by anonymous FTP (rdp.life.uiuc.edu in/pub/critica) and on the World Wide Web (http:/(/)rdpwww.life.uiuc.edu).

  1. 22 CFR 228.03 - Identification of principal geographic code numbers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Identification of principal geographic code... § 228.03 Identification of principal geographic code numbers. The USAID Geographic Code Book sets forth the official description of all geographic codes used by USAID in authorizing or...

  2. 33 CFR 181.33 - Conditions for use of manufacturer identification codes.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... manufacturer identification codes. 181.33 Section 181.33 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) BOATING SAFETY MANUFACTURER REQUIREMENTS Identification of Boats § 181.33 Conditions for use of manufacturer identification codes. (a) No manufacturer or importer...

  3. PIPI: PTM-Invariant Peptide Identification Using Coding Method.

    PubMed

    Yu, Fengchao; Li, Ning; Yu, Weichuan

    2016-12-02

    In computational proteomics, the identification of peptides with an unlimited number of post-translational modification (PTM) types is a challenging task. The computational cost associated with database search increases exponentially with respect to the number of modified amino acids and linearly with respect to the number of potential PTM types at each amino acid. The problem becomes intractable very quickly if we want to enumerate all possible PTM patterns. To address this issue, one group of methods named restricted tools (including Mascot, Comet, and MS-GF+) only allow a small number of PTM types in database search process. Alternatively, the other group of methods named unrestricted tools (including MS-Alignment, ProteinProspector, and MODa) avoids enumerating PTM patterns with an alignment-based approach to localizing and characterizing modified amino acids. However, because of the large search space and PTM localization issue, the sensitivity of these unrestricted tools is low. This paper proposes a novel method named PIPI to achieve PTM-invariant peptide identification. PIPI belongs to the category of unrestricted tools. It first codes peptide sequences into Boolean vectors and codes experimental spectra into real-valued vectors. For each coded spectrum, it then searches the coded sequence database to find the top scored peptide sequences as candidates. After that, PIPI uses dynamic programming to localize and characterize modified amino acids in each candidate. We used simulation experiments and real data experiments to evaluate the performance in comparison with restricted tools (i.e., Mascot, Comet, and MS-GF+) and unrestricted tools (i.e., Mascot with error tolerant search, MS-Alignment, ProteinProspector, and MODa). Comparison with restricted tools shows that PIPI has a close sensitivity and running speed. Comparison with unrestricted tools shows that PIPI has the highest sensitivity except for Mascot with error tolerant search and Protein

  4. We Are Not Numbers: The Use of Identification Codes in Online Learning

    ERIC Educational Resources Information Center

    Francis-Poscente, Krista; Moisey, Susan Darlene

    2012-01-01

    This paper discusses students' experiences with the use of identification codes in a graduate course delivered asynchronously via the Internet. While teaching an introductory masters level graduate course in distance learning, the authors discovered that the learning management system, Moodle, was programmed to display identification codes rather…

  5. Proposing national identification number on dental prostheses as universal personal identification code - A revolution in forensic odontology.

    PubMed

    Baad, Rajendra K; Belgaumi, Uzma; Vibhute, Nupura; Kadashetti, Vidya; Chandrappa, Pramod Redder; Gugwad, Sushma

    2015-01-01

    The proper identification of a decedent is not only important for humanitarian and emotional reasons, but also for legal and administrative purposes. During the reconstructive identification process, all necessary information is gathered from the unknown body of the victim and hence that an objective reconstructed profile can be established. Denture marking systems are being used in various situations, and a number of direct and indirect methods are reported. We propose that national identification numbers be incorporated in all removable and fixed prostheses, so as to adopt a single and definitive universal personal identification code with the aim of achieving a uniform, standardized, easy, and fast identification method worldwide for forensic identification.

  6. Proposing national identification number on dental prostheses as universal personal identification code - A revolution in forensic odontology

    PubMed Central

    Baad, Rajendra K.; Belgaumi, Uzma; Vibhute, Nupura; Kadashetti, Vidya; Chandrappa, Pramod Redder; Gugwad, Sushma

    2015-01-01

    The proper identification of a decedent is not only important for humanitarian and emotional reasons, but also for legal and administrative purposes. During the reconstructive identification process, all necessary information is gathered from the unknown body of the victim and hence that an objective reconstructed profile can be established. Denture marking systems are being used in various situations, and a number of direct and indirect methods are reported. We propose that national identification numbers be incorporated in all removable and fixed prostheses, so as to adopt a single and definitive universal personal identification code with the aim of achieving a uniform, standardized, easy, and fast identification method worldwide for forensic identification. PMID:26005294

  7. Identification of proteins binding coding and non-coding human RNAs using protein microarrays

    PubMed Central

    2012-01-01

    Background The regulation and function of mammalian RNAs has been increasingly appreciated to operate via RNA-protein interactions. With the recent discovery of thousands of novel human RNA molecules by high-throughput RNA sequencing, efficient methods to uncover RNA-protein interactions are urgently required. Existing methods to study proteins associated with a given RNA are laborious and require substantial amounts of cell-derived starting material. To overcome these limitations, we have developed a rapid and large-scale approach to characterize binding of in vitro transcribed labeled RNA to ~9,400 human recombinant proteins spotted on protein microarrays. Results We have optimized methodology to probe human protein microarrays with full-length RNA molecules and have identified 137 RNA-protein interactions specific for 10 coding and non-coding RNAs. Those proteins showed strong enrichment for common human RNA binding domains such as RRM, RBD, as well as K homology and CCCH type zinc finger motifs. Previously unknown RNA-protein interactions were discovered using this technique, and these interactions were biochemically verified between TP53 mRNA and Staufen1 protein as well as between HRAS mRNA and CNBP protein. Functional characterization of the interaction between Staufen 1 protein and TP53 mRNA revealed a novel role for Staufen 1 in preserving TP53 RNA stability. Conclusions Our approach demonstrates a scalable methodology, allowing rapid and efficient identification of novel human RNA-protein interactions using RNA hybridization to human protein microarrays. Biochemical validation of newly identified interactions between TP53-Stau1 and HRAS-CNBP using reciprocal pull-down experiments, both in vitro and in vivo, demonstrates the utility of this approach to study uncharacterized RNA-protein interactions. PMID:23157412

  8. Thought and Second Language: A Vygotskian Framework for Understanding BICS and CALP

    ERIC Educational Resources Information Center

    Bylund, James

    2011-01-01

    Researchers often point to the work of Cummins (1981), who proposed that two distinct types of language proficiency exist, basic interpersonal communications skills (BICS) and cognitive/academic language proficiency (CALP). BICS includes aspects of language such as basic vocabulary and pronunciation, skills that are readily apparent during…

  9. Identification of ICD Codes Suggestive of Child Maltreatment

    ERIC Educational Resources Information Center

    Schnitzer, Patricia G.; Slusher, Paula L.; Kruse, Robin L.; Tarleton, Molly M.

    2011-01-01

    Objective: In order to be reimbursed for the care they provide, hospitals in the United States are required to use a standard system to code all discharge diagnoses: the International Classification of Disease, 9th Revision, Clinical Modification (ICD-9). Although ICD-9 codes specific for child maltreatment exist, they do not identify all…

  10. The effect of a redundant color code on an overlearned identification task

    NASA Technical Reports Server (NTRS)

    Obrien, Kevin

    1992-01-01

    The possibility of finding redundancy gains with overlearned tasks was examined using a paradigm varying familiarity with the stimulus set. Redundant coding in a multidimensional stimulus was demonstrated to result in increased identification accuracy and decreased latency of identification when compared to stimuli varying on only one dimension. The advantages attributable to redundant coding are referred to as redundancy gain and were found for a variety of stimulus dimension combinations, including the use of hue or color as one of the dimensions. Factors that have affected redundancy gain include the discriminability of the levels of one stimulus dimension and the level of stimulus-to-response association. The results demonstrated that response time is in part a function of familiarity, but no effect of redundant color coding was demonstrated. Implications of research on coding in identification tasks for display design are discussed.

  11. Alcohol misuse Y91 coding in ICD-11: rational terminology and logical coding specifically to encourage early identification and advice.

    PubMed

    Touquet, Robin; Harris, Dan

    2012-01-01

    Alcohol misuse is a common presentation to the Emergency Department (ED). The International Classification of Diseases ICD-10 for alcohol misuse, both under F10 and Y90/Y91, is not straightforward. The practicalities of coding ED attendances reveal an increasing detachment from ICD-10 (currently under review). Early identification [sometimes using blood alcohol concentrations (BACs)] and brief advice (IBA) can reduce unscheduled alcohol-related ED re-attendance. The UK Government Department of Health has implemented use of the terms 'Hazardous Drinking', 'Harmful Drinking' and 'Dependent Drinking' in its Public Service Agreements aimed at reducing harm by alcohol. Simplifying coding might increase IBA usage. We suggest that coding improvements in ICD-11 should update Y91 (currently 'clinical assessment')-with ICD-10 Y90 remaining for BAC to classify a patient's 'alcohol status'. Y90 and Y91 together would indicate the urgency for early IBA and/or speciality referral, aiming to reduce the prevalence of 'Dependent Drinking'.

  12. BicD-dependent localization processes: from Drosophilia development to human cell biology.

    PubMed

    Claussen, Maike; Suter, Beat

    2005-11-01

    Many eukaryotic cells depend on proper cell polarization for their development and physiological function. The establishment of these polarities often involve the subcellular localization of a specific subset of proteins, RNAs and organelles. In Drosophila, the microtubule-dependent BicD (BicaudalD) localization machinery is involved in the proper localization of mRNA during oogenesis and embryogenesis and the proper positioning of the oocyte and photoreceptor nuclei. BicD acts together with the minus-end directed motor dynein as well as Egl and Lis-1. The finding that the mammalian homologs of BicD function in retrograde Golgi-to-ER transport has supported the view that BicD may be part of a repeatedly used and evolutionary conserved localization machinery. In this review we focus on the various processes in which BicD is involved during Drosophilian development and in mammals. In addition, we evaluate the interactions between BicD, the dynein localization machinery and associated factors.

  13. Binary Code Extraction and Interface Identification for Security Applications

    DTIC Science & Technology

    2009-10-02

    October 2007. [24] Juan Caballero, Heng Yin , Zhenkai Liang, and Dawn Song. Polyglot: Automatic extraction of protocol message format using dynamic...from binary code. In Proceedings of the 7th International Workshop on Program Comprehension, 1999. [27] Weidong Cui, Vern Paxson, Nicholas C. Weaver...Intel IA-32 architecture. In Workshop on Binary Translation, Barcelona, Spain, September 2001. [39] Dawn Song, David Brumley, Heng Yin , Juan Caballero

  14. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 1 2012-04-01 2012-04-01 false Controls for identification codes/passwords. 11.300 Section 11.300 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Signatures § 11.300 Controls...

  15. 47 CFR 3.22 - Number of accounting authority identification codes per applicant.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... AUTHORIZATION AND ADMINISTRATION OF ACCOUNTING AUTHORITIES IN MARITIME AND MARITIME MOBILE-SATELLITE RADIO SERVICES Application Procedures § 3.22 Number of accounting authority identification codes per applicant... assign U.S. AAICs for entities settling accounts of U.S. licensed vessels in the maritime mobile...

  16. 47 CFR 3.22 - Number of accounting authority identification codes per applicant.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... AUTHORIZATION AND ADMINISTRATION OF ACCOUNTING AUTHORITIES IN MARITIME AND MARITIME MOBILE-SATELLITE RADIO SERVICES Application Procedures § 3.22 Number of accounting authority identification codes per applicant... assign U.S. AAICs for entities settling accounts of U.S. licensed vessels in the maritime mobile...

  17. Identification of a Polyketide Synthase Coding Sequence Specific for Anatoxin-a-Producing Oscillatoria Cyanobacteria▿ †

    PubMed Central

    Cadel-Six, Sabrina; Iteman, Isabelle; Peyraud-Thomas, Caroline; Mann, Stéphane; Ploux, Olivier; Méjean, Annick

    2009-01-01

    We report the identification of a sequence from the genome of Oscillatoria sp. strain PCC 6506 coding for a polyketide synthase. Using 50 axenic cyanobacteria, we found this sequence only in the genomes of Oscillatoria strains producing anatoxin-a or homoanatoxin-a, indicating its likely involvement in the biosynthesis of these toxins. PMID:19447947

  18. Towards a spectrum-based bar code for identification of weakly fluorescent microparticles

    NASA Astrophysics Data System (ADS)

    Petrášek, Zdeněk; Wiedemann, Jens; Schwille, Petra

    2014-03-01

    Spectrally resolved detection of fluorescent probes can be used to identify multiple labeled target molecules in an unknown mixture. We study how the spectral shape, the experimental noise, and the number of spectral detection channels affect the success of identification of weakly fluorescent beads on basis of their emission spectra. The proposed formalism allows to estimate the performance of the spectral identification procedure with a given set of spectral codes on the basis of the reference spectra only. We constructed a simple prism-based setup for spectral detection and demonstrate that seven distinct but overlapping spectral codes realized by combining up to three fluorescent dyes bound to a single bead in a barcode-based manner can be reliably identified. The procedure allows correct identification even in the presence of known autofluorescence background stronger than the actual signal.

  19. Identification and characterization of the gene expression profiles for protein coding and non-coding RNAs of pancreatic ductal adenocarcinomas

    PubMed Central

    Gutiérrez, María Laura; Corchete, Luis; Teodosio, Cristina; Sarasquete, María Eugenia; Abad, María del Mar; Iglesias, Manuel; Esteban, Carmen

    2015-01-01

    Significant advances have been achieved in recent years in the identification of the genetic and the molecular alterations of pancreatic ductal adenocarcinoma (PDAC). Despite this, at present the understanding of the precise mechanisms involved in the development and malignant transformation of PDAC remain relatively limited. Here, we evaluated for the first time, the molecular heterogeneity of PDAC tumors, through simultaneous assessment of the gene expression profile (GEP) for both coding and non-coding genes of tumor samples from 27 consecutive PDAC patients. Overall, we identified a common GEP for all PDAC tumors, characterized by an increased expression of genes involved in PDAC cell proliferation, local invasion and metastatic capacity, together with a significant alteration of the early steps of the cellular immune response. At the same time, we confirm and extend on previous observations about the genetic complexity of PDAC tumors as revealed by the demonstration of two clearly distinct and unique GEPs (e.g. epithelial-like vs. mesenchymal-like) reflecting the alteration of different signaling pathways involved in the oncogenesis and progression of these tumors. Our results also highlight the potential role of the immune system microenvironment in these tumors, with potential diagnostic and therapeutic implications. PMID:26053098

  20. Stylizing Genderlect Online for Social Action: A Corpus Analysis of "BIC Cristal for Her" Reviews

    ERIC Educational Resources Information Center

    Ray, Brian

    2016-01-01

    This article introduces the concept of stylization and illustrates its usefulness for studying online discourse by examining how writers have employed it in order to parody sexist products such as BIC Cristal for Her, using genderlect in order to introduce dissonance into and reframe patriarchal discourse. A corpus analysis of 671 reviews, written…

  1. 78 FR 25256 - Petition Requesting Exception From Lead Content Limits: BIC USA Inc.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-30

    ... COMMISSION Petition Requesting Exception From Lead Content Limits: BIC USA Inc. AGENCY: Consumer Product...) has received a petition requesting an exception from the 100 ppm lead content limit under section 101... content in excess of 100 ppm are considered to be banned hazardous substances under the Federal...

  2. Wind turbine control systems: Dynamic model development using system identification and the fast structural dynamics code

    SciTech Connect

    Stuart, J.G.; Wright, A.D.; Butterfield, C.P.

    1996-10-01

    Mitigating the effects of damaging wind turbine loads and responses extends the lifetime of the turbine and, consequently, reduces the associated Cost of Energy (COE). Active control of aerodynamic devices is one option for achieving wind turbine load mitigation. Generally speaking, control system design and analysis requires a reasonable dynamic model of {open_quotes}plant,{close_quotes} (i.e., the system being controlled). This paper extends the wind turbine aileron control research, previously conducted at the National Wind Technology Center (NWTC), by presenting a more detailed development of the wind turbine dynamic model. In prior research, active aileron control designs were implemented in an existing wind turbine structural dynamics code, FAST (Fatigue, Aerodynamics, Structures, and Turbulence). In this paper, the FAST code is used, in conjunction with system identification, to generate a wind turbine dynamic model for use in active aileron control system design. The FAST code is described and an overview of the system identification technique is presented. An aileron control case study is used to demonstrate this modeling technique. The results of the case study are then used to propose ideas for generalizing this technique for creating dynamic models for other wind turbine control applications.

  3. Fratricide-preventing friend identification tag based on photonic band structure coding

    NASA Astrophysics Data System (ADS)

    Eliyahu, Danny; Sadovnik, Lev S.; Manasson, Vladimir A.

    2000-07-01

    A new friend foe identification tag based on photonic band structure (PBS) is presented. The tag utilizes frequency-coded radar signal return. Targets that include the passive tag responds selectively to slightly different frequencies generated by interrogating MMW radar. It is possible to use in- and out-of-band gap frequencies or defect modes of the PBS in order to obtain frequency dependent radar waves reflections. This tag can be made in the form of patch attachable such as plate or corner reflectors, to be worn by an individual marine, or to be integrated into the platform camouflage. Ultimately, it can be incorporated as smart skin or a ground or airborne vehicle. The proposed tag takes full advantage of existing sensors for interrogation (minimal chances required), it is lightweight and small in dimensions, it operates in degraded environments, it has no impact on platform vulnerability, it has low susceptibility to spoofing and mimicking (code of the day) and it has low susceptibility to active jamming. We demonstrated the operation of the tag using multi-layer dielectric (Duroid) having periodic structure of metal on top of each of the layers (metal strips in this case). The experimental results are consistent with numerical simulation. The device can be combined with temporal coding to increase target detection and identification resolution.

  4. Cracking the Dual Code: Toward a Unitary Model of Phoneme Identification

    PubMed Central

    Foss, Donald J.; Gernsbacher, Morton Ann

    2014-01-01

    The results of five experiments on the nature of the speech code and on the role of sentence context on speech processing are reported. The first three studies test predictions from the dual code model of phoneme identification (Foss, D. J., & Blank, M. A. Cognitive Psychology, 1980, 12, 1–31). According to that model, subjects in a phoneme monitoring experiment respond to a prelexical code when engaged in a relatively easy task, and to a postlexical code when the task is difficult. The experiments controlled ease of processing either by giving subjects multiple targets for which to monitor or by preceding the target with a similar-sounding phoneme that draws false alarms. The predictions from the model were not sustained. Furthermore, evidence for a paradoxical nonword superiority effect was observed. In Experiment IV reaction times (RTs) to all possible /d/-initial CVCs were gathered. RTs were unaffected by the target item's status as a word or nonword. but they were affected by the internal phonetic structure of the target-bearing item. Vowel duration correlated highly (0.627) with RTs. Experiment V examined previous work purporting to demonstrate that semantic predictability affects how the speech code is processed, in particular that semantic predictability leads to responses based upon a postlexical code. That study found “predictability” effects when words occurred in isolation; further, it found that vowel duration and other phonetic factors can account parsimoniously for the existing results. These factors also account for the apparent nonword superiority effects observed earlier. Implications of the present work for theoretical models that stress the interaction between semantic context and speech processing are discussed, as are implications for use of the phoneme monitoring task. PMID:25520528

  5. The genomic fingerprinting of the coding region of the beta-tubulin gene in Leishmania identification.

    PubMed

    Luis, L; Ramírez, A; Aguilar, C M; Eresh, S; Barker, D C; Mendoza-León, A

    1998-06-01

    We have demonstrated the polymorphism of the beta-tubulin gene region in Leishmania and its value in the identification of the parasite. In this work we have shown that the coding region of the gene has sufficient variation to accurately discriminate these parasites at the subgenus level. Nevertheless, intrasubgenus diversity, for particular restriction enzymes, was found in New World Leishmania belonging to the Leishmania subgenus. For instance, differences were found between mexicana and amazonensis strains. A unique pattern at the species level was found in particular species of both subgenera, e.g. L. (L.) major strain P and L. (L.) tropica belonging to the Leishmania subgenus, and L. (V.) panamensis strain LS94 from the Viannia subgenus. Particular endonucleases are diagnostic in Leishmania species discrimination as in the case of PvuII for the mexicana and amazonensis. This variation evidenced in the beta-tubulin gene region of Leishmania also occurred in other Kinetoplastida e.g. Trypanosoma cruzi, Leptomonas spp. and Crithidia spp. Moreover, these organisms showed a different genomic fingerprinting for the beta-tubulin gene among them and also Leishmania. Thus, the polymorphism of the coding region of the beta-tubulin gene can be used as a molecular marker for the identification of Leishmania.

  6. Evaluation of the personalized bar-code identification card to verify high-risk, high-alert medications.

    PubMed

    Thomas, Maria

    2013-09-01

    An effective intervention to decrease medication errors related to high-risk, high-alert medications is to implement double checks and second verification using the five rights of medication administration. To evaluate the effectiveness and use of the Personalized Bar-Code Identification card in verifying high-risk, high-alert medications, the High-Risk, High-Alert Medication Verification Audit Tool was used to collect data from the medical records of patients who received high-risk, high-alert medications in four ICUs. Data were collected for administered high-risk, high-alert medication, primary registered nurses who administered the high-risk, high-alert medication, and secondary registered nurses who verified the medication. The percentage of medications that were "not verified," "Personalized Bar-Code Identification verified," and "verified" using a method other than the Personalized Bar-Code Identification was calculated and compared using Z tests for two proportions. The percentage of Personalized Bar-Code Identification-verified medications (83.5%) was significantly higher than the percentage of medications that were not verified (10.9%) (Z = 38.43, P < .05). Also, the difference between the proportion of the Personalized Bar-Code Identification-verified medications and those that were verified using another method (5.6%) was significant (Z = 41.42, P < .05). The results show that nurses generally tend to follow the standardized procedure for verifying high-risk, high-alert medications in the four ICUs.

  7. Computational identification of human long intergenic non-coding RNAs using a GA-SVM algorithm.

    PubMed

    Wang, Yanqiu; Li, Yang; Wang, Qi; Lv, Yingli; Wang, Shiyuan; Chen, Xi; Yu, Xuexin; Jiang, Wei; Li, Xia

    2014-01-01

    Long intergenic non-coding RNAs (lincRNAs) are a new type of non-coding RNAs and are closely related with the occurrence and development of diseases. In previous studies, most lincRNAs have been identified through next-generation sequencing. Because lincRNAs exhibit tissue-specific expression, the reproducibility of lincRNA discovery in different studies is very poor. In this study, not including lincRNA expression, we used the sequence, structural and protein-coding potential features as potential features to construct a classifier that can be used to distinguish lincRNAs from non-lincRNAs. The GA-SVM algorithm was performed to extract the optimized feature subset. Compared with several feature subsets, the five-fold cross validation results showed that this optimized feature subset exhibited the best performance for the identification of human lincRNAs. Moreover, the LincRNA Classifier based on Selected Features (linc-SF) was constructed by support vector machine (SVM) based on the optimized feature subset. The performance of this classifier was further evaluated by predicting lincRNAs from two independent lincRNA sets. Because the recognition rates for the two lincRNA sets were 100% and 99.8%, the linc-SF was found to be effective for the prediction of human lincRNAs.

  8. Feasibility and validation of virtual autopsy for dental identification using the Interpol dental codes.

    PubMed

    Franco, Ademir; Thevissen, Patrick; Coudyzer, Walter; Develter, Wim; Van de Voorde, Wim; Oyen, Raymond; Vandermeulen, Dirk; Jacobs, Reinhilde; Willems, Guy

    2013-05-01

    Virtual autopsy is a medical imaging technique, using full body computed tomography (CT), allowing for a noninvasive and permanent observation of all body parts. For dental identification clinically and radiologically observed ante-mortem (AM) and post-mortem (PM) oral identifiers are compared. The study aimed to verify if a PM dental charting can be performed on virtual reconstructions of full-body CT's using the Interpol dental codes. A sample of 103 PM full-body CT's was collected from the forensic autopsy files of the Department of Forensic Medicine University Hospitals, KU Leuven, Belgium. For validation purposes, 3 of these bodies underwent a complete dental autopsy, a dental radiological and a full-body CT examination. The bodies were scanned in a Siemens Definition Flash CT Scanner (Siemens Medical Solutions, Germany). The images were examined on 8- and 12-bit screen resolution as three-dimensional (3D) reconstructions and as axial, coronal and sagittal slices. InSpace(®) (Siemens Medical Solutions, Germany) software was used for 3D reconstruction. The dental identifiers were charted on pink PM Interpol forms (F1, F2), using the related dental codes. Optimal dental charting was obtained by combining observations on 3D reconstructions and CT slices. It was not feasible to differentiate between different kinds of dental restoration materials. The 12-bit resolution enabled to collect more detailed evidences, mainly related to positions within a tooth. Oral identifiers, not implemented in the Interpol dental coding were observed. Amongst these, the observed (3D) morphological features of dental and maxillofacial structures are important identifiers. The latter can become particularly more relevant towards the future, not only because of the inherent spatial features, yet also because of the increasing preventive dental treatment, and the decreasing application of dental restorations. In conclusion, PM full-body CT examinations need to be implemented in the

  9. Identification and Role of Regulatory Non-Coding RNAs in Listeria monocytogenes

    PubMed Central

    Izar, Benjamin; Mraheil, Mobarak Abu; Hain, Torsten

    2011-01-01

    Bacterial regulatory non-coding RNAs control numerous mRNA targets that direct a plethora of biological processes, such as the adaption to environmental changes, growth and virulence. Recently developed high-throughput techniques, such as genomic tiling arrays and RNA-Seq have allowed investigating prokaryotic cis- and trans-acting regulatory RNAs, including sRNAs, asRNAs, untranslated regions (UTR) and riboswitches. As a result, we obtained a more comprehensive view on the complexity and plasticity of the prokaryotic genome biology. Listeria monocytogenes was utilized as a model system for intracellular pathogenic bacteria in several studies, which revealed the presence of about 180 regulatory RNAs in the listerial genome. A regulatory role of non-coding RNAs in survival, virulence and adaptation mechanisms of L. monocytogenes was confirmed in subsequent experiments, thus, providing insight into a multifaceted modulatory function of RNA/mRNA interference. In this review, we discuss the identification of regulatory RNAs by high-throughput techniques and in their functional role in L. monocytogenes. PMID:21954346

  10. CuBIC: cumulant based inference of higher-order correlations in massively parallel spike trains

    PubMed Central

    Rotter, Stefan; Grün, Sonja

    2009-01-01

    Recent developments in electrophysiological and optical recording techniques enable the simultaneous observation of large numbers of neurons. A meaningful interpretation of the resulting multivariate data, however, presents a serious challenge. In particular, the estimation of higher-order correlations that characterize the cooperative dynamics of groups of neurons is impeded by the combinatorial explosion of the parameter space. The resulting requirements with respect to sample size and recording time has rendered the detection of coordinated neuronal groups exceedingly difficult. Here we describe a novel approach to infer higher-order correlations in massively parallel spike trains that is less susceptible to these problems. Based on the superimposed activity of all recorded neurons, the cumulant-based inference of higher-order correlations (CuBIC) presented here exploits the fact that the absence of higher-order correlations imposes also strong constraints on correlations of lower order. Thus, estimates of only few lower-order cumulants suffice to infer higher-order correlations in the population. As a consequence, CuBIC is much better compatible with the constraints of in vivo recordings than previous approaches, which is shown by a systematic analysis of its parameter dependence. PMID:19862611

  11. Identification of Long Non-Coding RNAs Deregulated in Multiple Myeloma Cells Resistant to Proteasome Inhibitors

    PubMed Central

    Malek, Ehsan; Kim, Byung-Gyu; Driscoll, James J.

    2016-01-01

    While the clinical benefit of proteasome inhibitors (PIs) for multiple myeloma (MM) treatment remains unchallenged, dose-limiting toxicities and the inevitable emergence of drug resistance limit their long-term utility. Disease eradication is compromised by drug resistance that is either present de novo or therapy-induced, which accounts for the majority of tumor relapses and MM-related deaths. Non-coding RNAs (ncRNAs) are a broad class of RNA molecules, including long non-coding RNAs (lncRNAs), that do not encode proteins but play a major role in regulating the fundamental cellular processes that control cancer initiation, metastasis, and therapeutic resistance. While lncRNAs have recently attracted significant attention as therapeutic targets to potentially improve cancer treatment, identification of lncRNAs that are deregulated in cells resistant to PIs has not been previously addressed. We have modeled drug resistance by generating three MM cell lines with acquired resistance to either bortezomib, carfilzomib, or ixazomib. Genome-wide profiling identified lncRNAs that were significantly deregulated in all three PI-resistant cell lines relative to the drug-sensitive parental cell line. Strikingly, certain lncRNAs deregulated in the three PI-resistant cell lines were also deregulated in MM plasma cells isolated from newly diagnosed patients compared to healthy plasma cells. Taken together, these preliminary studies strongly suggest that lncRNAs represent potential therapeutic targets to prevent or overcome drug resistance. More investigations are ongoing to expand these initial studies in a greater number of MM patients to better define lncRNAs signatures that contribute to PI resistance in MM. PMID:27782060

  12. Systematic Identification and Characterization of Long Non-Coding RNAs in the Silkworm, Bombyx mori.

    PubMed

    Wu, Yuqian; Cheng, Tingcai; Liu, Chun; Liu, Duolian; Zhang, Quan; Long, Renwen; Zhao, Ping; Xia, Qingyou

    2016-01-01

    Long noncoding RNAs (lncRNAs) are emerging as important regulators in various biological processes. However, to date, no systematic characterization of lncRNAs has been reported in the silkworm Bombyx mori. In the present study, we generated eighteen RNA-seq datasets with relatively high depth. Using an in-house designed lncRNA identification pipeline, 11,810 lncRNAs were identified for 5,556 loci. Among these lncRNAs, 474 transcripts were intronic lncRNAs (ilncRNAs), 6,250 transcripts were intergenic lncRNAs (lincRNAs), and 5,086 were natural antisense lncRNAs (lncNATs). Compared with protein-coding mRNAs, silkworm lncRNAs are shorter in terms of full length but longer in terms of exon and intron length. In addition, lncRNAs exhibit a lower level of sequence conservation, more repeat sequences overlapped and higher tissue specificity than protein-coding mRNAs in the silkworm. We found that 69 lncRNA transcripts from 33 gene loci may function as miRNA precursors, and 104 lncRNA transcripts from 72 gene loci may act as competing endogenous RNAs (ceRNAs). In total, 49.47% of all gene loci (2,749/5,556) for which lncRNAs were identified showed sex-biased expression. Co-expression network analysis resulted in 19 modules, 12 of which revealed relatively high tissue specificity. The highlighted darkgoldenrod module was specifically associated with middle and posterior silk glands, and the hub lncRNAs within this module were co-expressed with proteins involved in translation, translocation, and secretory processes, suggesting that these hub lncRNAs may function as regulators of the biosynthesis, translocation, and secretion of silk proteins. This study presents the first comprehensive genome-wide analysis of silkworm lncRNAs and provides an invaluable resource for genetic, evolutionary, and genomic studies of B. mori.

  13. Systematic Identification and Characterization of Long Non-Coding RNAs in the Silkworm, Bombyx mori

    PubMed Central

    Wu, Yuqian; Cheng, Tingcai; Liu, Chun; Liu, Duolian; Zhang, Quan; Long, Renwen; Zhao, Ping; Xia, Qingyou

    2016-01-01

    Long noncoding RNAs (lncRNAs) are emerging as important regulators in various biological processes. However, to date, no systematic characterization of lncRNAs has been reported in the silkworm Bombyx mori. In the present study, we generated eighteen RNA-seq datasets with relatively high depth. Using an in-house designed lncRNA identification pipeline, 11,810 lncRNAs were identified for 5,556 loci. Among these lncRNAs, 474 transcripts were intronic lncRNAs (ilncRNAs), 6,250 transcripts were intergenic lncRNAs (lincRNAs), and 5,086 were natural antisense lncRNAs (lncNATs). Compared with protein-coding mRNAs, silkworm lncRNAs are shorter in terms of full length but longer in terms of exon and intron length. In addition, lncRNAs exhibit a lower level of sequence conservation, more repeat sequences overlapped and higher tissue specificity than protein-coding mRNAs in the silkworm. We found that 69 lncRNA transcripts from 33 gene loci may function as miRNA precursors, and 104 lncRNA transcripts from 72 gene loci may act as competing endogenous RNAs (ceRNAs). In total, 49.47% of all gene loci (2,749/5,556) for which lncRNAs were identified showed sex-biased expression. Co-expression network analysis resulted in 19 modules, 12 of which revealed relatively high tissue specificity. The highlighted darkgoldenrod module was specifically associated with middle and posterior silk glands, and the hub lncRNAs within this module were co-expressed with proteins involved in translation, translocation, and secretory processes, suggesting that these hub lncRNAs may function as regulators of the biosynthesis, translocation, and secretion of silk proteins. This study presents the first comprehensive genome-wide analysis of silkworm lncRNAs and provides an invaluable resource for genetic, evolutionary, and genomic studies of B. mori. PMID:26771876

  14. Topology mapping to characterize cyanobacterial bicarbonate transporters: BicA (SulP/SLC26 family) and SbtA.

    PubMed

    Price, G Dean; Howitt, Susan M

    2014-09-01

    This mini-review addresses advances in understanding the transmembrane topologies of two unrelated, single-subunit bicarbonate transporters from cyanobacteria, namely BicA and SbtA. BicA is a Na(+)-dependent bicarbonate transporter that belongs to the SulP/SLC26 family that is widespread in both eukaryotes and prokaryotes. Topology mapping of BicA via the phoA/lacZ fusion reporter method identified 12 transmembrane helices with an unresolved hydrophobic region just beyond helix 8. Re-interpreting this data in the light of a recent topology study on rat prestin leads to a consensus topology of 14 transmembrane domains with a 7+7 inverted repeat structure. SbtA is also a Na(+)-dependent bicarbonate transporter, but of considerably higher affinity (Km 2-5 μM versus >100 μM for BicA). Whilst SbtA is widespread in cyanobacteria and a few bacteria, it appears to be absent from eukaryotes. Topology mapping of SbtA via the phoA/lacZ fusion reporter method identified 10 transmembrane helices. The topology consists of a 5+5 inverted repeat, with the two repeats separated by a large intracellular loop. The unusual location of the N and C-termini outside the cell raises the possibility that SbtA forms a novel fold, not so far identified by structural and topological studies on transport proteins.

  15. The identification and characterization of non-coding and coding RNAs and their modified nucleosides by mass spectrometry

    PubMed Central

    Gaston, Kirk W; Limbach, Patrick A

    2014-01-01

    The analysis of ribonucleic acids (RNA) by mass spectrometry has been a valuable analytical approach for more than 25 years. In fact, mass spectrometry has become a method of choice for the analysis of modified nucleosides from RNA isolated out of biological samples. This review summarizes recent progress that has been made in both nucleoside and oligonucleotide mass spectral analysis. Applications of mass spectrometry in the identification, characterization and quantification of modified nucleosides are discussed. At the oligonucleotide level, advances in modern mass spectrometry approaches combined with the standard RNA modification mapping protocol enable the characterization of RNAs of varying lengths ranging from low molecular weight short interfering RNAs (siRNAs) to the extremely large 23 S rRNAs. New variations and improvements to this protocol are reviewed, including top-down strategies, as these developments now enable qualitative and quantitative measurements of RNA modification patterns in a variety of biological systems. PMID:25616408

  16. CSTminer: a web tool for the identification of coding and noncoding conserved sequence tags through cross-species genome comparison.

    PubMed

    Castrignanò, Tiziana; Canali, Alessandro; Grillo, Giorgio; Liuni, Sabino; Mignone, Flavio; Pesole, Graziano

    2004-07-01

    The identification and characterization of genome tracts that are highly conserved across species during evolution may contribute significantly to the functional annotation of whole-genome sequences. Indeed, such sequences are likely to correspond to known or unknown coding exons or regulatory motifs. Here, we present a web server implementing a previously developed algorithm that, by comparing user-submitted genome sequences, is able to identify statistically significant conserved blocks and assess their coding or noncoding nature through the measure of a coding potential score. The web tool, available at http://www.caspur.it/CSTminer/, is dynamically interconnected with the Ensembl genome resources and produces a graphical output showing a map of detected conserved sequences and annotated gene features.

  17. Identification and analysis of mouse non-coding RNA using transcriptome data.

    PubMed

    Zhao, Yuhui; Liu, Wanfei; Zeng, Jingyao; Liu, Shoucheng; Tan, Xinyu; Aljohi, Hasanawad; Hu, Songnian

    2016-06-01

    Transcripts are expressed spatially and temporally and they are very complicated, precise and specific; however, most studies are focused on protein-coding related genes. Recently, massively parallel cDNA sequencing (RNA-seq) has emerged to be a new and promising tool for transcriptome research, and numbers of non-coding RNAs, especially lincRNAs, have been widely identified and well characterized as important regulators of diverse biological processes. In this study, we used ultra-deep RNA-seq data from 15 mouse tissues to study the diversity and dynamic of non-coding RNAs in mouse. Using our own criteria, we identified totally 16,249 non-coding genes (21,569 non-coding RNAs) in mouse. We annotated these non-coding RNAs by diverse properties and found non-coding RNAs are generally shorter, have fewer exons, express in lower level and are more strikingly tissue-specific compared with protein-coding genes. Moreover, these non-coding RNAs show significant enrichment with transcriptional initiation and elongation signals including histone modifications (H3K4me3, H3K27me3 and H3K36me3), RNAPII binding sites and CAGE tags. The gene set enrichment analysis (GSEA) result revealed several sets of lincRNAs associated with diverse biological processes such as immune effector process, muscle development and sexual reproduction. Taken together, this study provides a more comprehensive annotation of mouse non-coding RNAs and gives an opportunity for future functional and evolutionary study of mouse non-coding RNAs.

  18. Identification and Analysis of Critical Gaps in Nuclear Fuel Cycle Codes Required by the SINEMA Program

    SciTech Connect

    Adrian Miron; Joshua Valentine; John Christenson; Majd Hawwari; Santosh Bhatt; Mary Lou Dunzik-Gougar: Michael Lineberry

    2009-10-01

    The current state of the art in nuclear fuel cycle (NFC) modeling is an eclectic mixture of codes with various levels of applicability, flexibility, and availability. In support of the advanced fuel cycle systems analyses, especially those by the Advanced Fuel Cycle Initiative (AFCI), Unviery of Cincinnati in collaboration with Idaho State University carried out a detailed review of the existing codes describing various aspects of the nuclear fuel cycle and identified the research and development needs required for a comprehensive model of the global nuclear energy infrastructure and the associated nuclear fuel cycles. Relevant information obtained on the NFC codes was compiled into a relational database that allows easy access to various codes' properties. Additionally, the research analyzed the gaps in the NFC computer codes with respect to their potential integration into programs that perform comprehensive NFC analysis.

  19. SiBIC: a web server for generating gene set networks based on biclusters obtained by maximal frequent itemset mining.

    PubMed

    Takahashi, Kei-ichiro; Takigawa, Ichigaku; Mamitsuka, Hiroshi

    2013-01-01

    Detecting biclusters from expression data is useful, since biclusters are coexpressed genes under only part of all given experimental conditions. We present a software called SiBIC, which from a given expression dataset, first exhaustively enumerates biclusters, which are then merged into rather independent biclusters, which finally are used to generate gene set networks, in which a gene set assigned to one node has coexpressed genes. We evaluated each step of this procedure: 1) significance of the generated biclusters biologically and statistically, 2) biological quality of merged biclusters, and 3) biological significance of gene set networks. We emphasize that gene set networks, in which nodes are not genes but gene sets, can be more compact than usual gene networks, meaning that gene set networks are more comprehensible. SiBIC is available at http://utrecht.kuicr.kyoto-u.ac.jp:8080/miami/faces/index.jsp.

  20. Identification of long non-coding RNAs biomarkers for early diagnosis of myocardial infarction from the dysregulated coding-non-coding co-expression network

    PubMed Central

    Sun, Chaoyu; Jiang, Hao; Sun, Zhiguo; Gui, Yifang; Xia, Hongyuan

    2016-01-01

    Long non-coding RNAs (lncRNAs) have recently been shown as novel promising diagnostic or prognostic biomarkers for various cancers. However, lncRNA expression patterns and their predictive value in early diagnosis of myocardial infarction (MI) have not been systematically investigated. In our study, we performed a comprehensive analysis of lncRNA expression profiles in MI and found altered lncRNA expression pattern in MI compared to healthy samples. We then constructed a lncRNA-mRNA dysregulation network (DLMCEN) by integrating aberrant lncRNAs, mRNAs and their co-dysregulation relationships, and found that some of mRNAs were previously reported to be involved in cardiovascular disease, suggesting the functional roles of dysregulated lncRNAs in the pathogenesis of MI. Therefore, using support vector machine (SVM) and leave one out cross-validation (LOOCV), we developed a 9-lncRNA signature (termed 9LncSigAMI) from the discovery cohort which could distinguish MI patients from healthy samples with accuracy of 95.96%, sensitivity of 93.88% and specificity of 98%, and validated its predictive power in early diagnosis of MI in another completely independent cohort. Functional analysis demonstrated that these nine lncRNA biomarkers in the 9LncSigAMI may be involved in myocardial innate immune and inflammatory response, and their deregulation may lead to the dysfunction of the inflammatory and immune system contributing to MI recurrence. With prospective validation, the 9LncSigAMI identified by our work will provide additional diagnostic information beyond other known clinical parameters, and increase the understanding of the molecular mechanism underlying the pathogenesis of MI. PMID:27634901

  1. TPASS: a gamma-ray spectrum analysis and isotope identification computer code

    SciTech Connect

    Dickens, J.K.

    1981-03-01

    The gamma-ray spectral data-reduction and analysis computer code TPASS is described. This computer code is used to analyze complex Ge(Li) gamma-ray spectra to obtain peak areas corrected for detector efficiencies, from which are determined gamma-ray yields. These yields are compared with an isotope gamma-ray data file to determine the contributions to the observed spectrum from decay of specific radionuclides. A complete FORTRAN listing of the code and a complex test case are given.

  2. Validity of ICD-9-CM codes for the identification of complications related to central venous catheterization.

    PubMed

    Tukey, Melissa H; Borzecki, Ann M; Wiener, Renda Soylemez

    2015-01-01

    Two complications of central venous catheterization (CVC), iatrogenic pneumothorax and central line-associated bloodstream infection (CLABSI), have dedicated International Classification of Diseases, Ninth Revision, Clinical Modification (ICD-9-CM) codes. Despite increasing use of ICD-9-CM codes for research and pay-for-performance purposes, their validity for detecting complications of CVC has not been established. Complications of CVCs placed between July 2010 and December 2011 were identified by ICD-9-CM codes in discharge records from a single hospital and compared with those revealed by medical record abstraction. The ICD-9-CM code for iatrogenic pneumothorax had a sensitivity of 66.7%, specificity of 100%, positive predictive value (PPV) of 100%, and negative predictive value (NPV) of 99.5%. The ICD-9-CM codes for CLABSI had a sensitivity of 33.3%, specificity of 99.0%, PPV of 28.6%, and NPV of 99.2%. The low sensitivity and variable PPV of ICD-9-CM codes for detection of complications of CVC raise concerns about their use for research or pay-for-performance purposes.

  3. Dose calculations at high altitudes and in deep space with GEANT4 using BIC and JQMD models for nucleus nucleus reactions

    NASA Astrophysics Data System (ADS)

    Sihver, L.; Matthiä, D.; Koi, T.; Mancusi, D.

    2008-10-01

    Radiation exposure of aircrew is more and more recognized as an occupational hazard. The ionizing environment at standard commercial aircraft flight altitudes consists mainly of secondary particles, of which the neutrons give a major contribution to the dose equivalent. Accurate estimations of neutron spectra in the atmosphere are therefore essential for correct calculations of aircrew doses. Energetic solar particle events (SPE) could also lead to significantly increased dose rates, especially at routes close to the North Pole, e.g. for flights between Europe and USA. It is also well known that the radiation environment encountered by personnel aboard low Earth orbit (LEO) spacecraft or aboard a spacecraft traveling outside the Earth's protective magnetosphere is much harsher compared with that within the atmosphere since the personnel are exposed to radiation from both galactic cosmic rays (GCR) and SPE. The relative contribution to the dose from GCR when traveling outside the Earth's magnetosphere, e.g. to the Moon or Mars, is even greater, and reliable and accurate particle and heavy ion transport codes are essential to calculate the radiation risks for both aircrew and personnel on spacecraft. We have therefore performed calculations of neutron distributions in the atmosphere, total dose equivalents, and quality factors at different depths in a water sphere in an imaginary spacecraft during solar minimum in a geosynchronous orbit. The calculations were performed with the GEANT4 Monte Carlo (MC) code using both the binary cascade (BIC) model, which is part of the standard GEANT4 package, and the JQMD model, which is used in the particle and heavy ion transport code PHITS GEANT4.

  4. Model selection and psychological theory: A discussion of the differences between the Akaike Information Criterion (AIC) and the Bayesian Information Criterion (BIC)

    PubMed Central

    Vrieze, Scott I.

    2012-01-01

    This article reviews the Akaike Information Criterion (AIC) and the Bayesian Information Criterion (BIC) in model selection and the appraisal of psychological theory. The focus is on latent variable models given their growing use in theory testing and construction. We discuss theoretical statistical results in regression and illustrate more important issues with novel simulations involving latent variable models including factor analysis, latent profile analysis, and factor mixture models. Asymptotically, the BIC is consistent, in that it will select the true model if, among other assumptions, the true model is among the candidate models considered. The AIC is not consistent under these circumstances. When the true model is not in the candidate model set the AIC is effcient, in that it will asymptotically choose whichever model minimizes the mean squared error of prediction/estimation. The BIC is not effcient under these circumstances. Unlike the BIC, the AIC also has a minimax property, in that it can minimize the maximum possible risk in finite sample sizes. In sum, the AIC and BIC have quite different properties that require different assumptions, and applied researchers and methodologists alike will benefit from improved understanding of the asymptotic and finite-sample behavior of these criteria. The ultimate decision to use AIC or BIC depends on many factors, including: the loss function employed, the study's methodological design, the substantive research question, and the notion of a true model and its applicability to the study at hand. PMID:22309957

  5. Model selection and psychological theory: a discussion of the differences between the Akaike information criterion (AIC) and the Bayesian information criterion (BIC).

    PubMed

    Vrieze, Scott I

    2012-06-01

    This article reviews the Akaike information criterion (AIC) and the Bayesian information criterion (BIC) in model selection and the appraisal of psychological theory. The focus is on latent variable models, given their growing use in theory testing and construction. Theoretical statistical results in regression are discussed, and more important issues are illustrated with novel simulations involving latent variable models including factor analysis, latent profile analysis, and factor mixture models. Asymptotically, the BIC is consistent, in that it will select the true model if, among other assumptions, the true model is among the candidate models considered. The AIC is not consistent under these circumstances. When the true model is not in the candidate model set the AIC is efficient, in that it will asymptotically choose whichever model minimizes the mean squared error of prediction/estimation. The BIC is not efficient under these circumstances. Unlike the BIC, the AIC also has a minimax property, in that it can minimize the maximum possible risk in finite sample sizes. In sum, the AIC and BIC have quite different properties that require different assumptions, and applied researchers and methodologists alike will benefit from improved understanding of the asymptotic and finite-sample behavior of these criteria. The ultimate decision to use the AIC or BIC depends on many factors, including the loss function employed, the study's methodological design, the substantive research question, and the notion of a true model and its applicability to the study at hand.

  6. Genome-Wide Identification and Characterization of Long Non-Coding RNAs from Mulberry (Morus notabilis) RNA-seq Data

    PubMed Central

    Song, Xiaobo; Sun, Liang; Luo, Haitao; Ma, Qingguo; Zhao, Yi; Pei, Dong

    2016-01-01

    Numerous sources of evidence suggest that most of the eukaryotic genome is transcribed into protein-coding mRNAs and also into a large number of non-coding RNAs (ncRNAs). Long ncRNAs (lncRNAs), a group consisting of ncRNAs longer than 200 nucleotides, have been found to play critical roles in transcriptional, post-transcriptional, and epigenetic gene regulation across all kingdoms of life. However, lncRNAs and their regulatory roles remain poorly characterized in plants, especially in woody plants. In this paper, we used a computational approach to identify novel lncRNAs from a published RNA-seq data set and analyzed their sequences and expression patterns. In total, 1133 novel lncRNAs were identified in mulberry, and 106 of these lncRNAs displayed a predominant tissue-specific expression in the five major tissues investigated. Additionally, functional predictions revealed that tissue-specific lncRNAs adjacent to protein-coding genes might play important regulatory roles in the development of floral organ and root in mulberry. The pipeline used in this study would be useful for the identification of lncRNAs obtained from other deep sequencing data. Furthermore, the predicted lncRNAs would be beneficial towards an understanding of the variations in gene expression in plants. PMID:26938562

  7. COME: a robust coding potential calculation tool for lncRNA identification and characterization based on multiple features

    PubMed Central

    Hu, Long; Xu, Zhiyu; Hu, Boqin; Lu, Zhi John

    2017-01-01

    Recent genomic studies suggest that novel long non-coding RNAs (lncRNAs) are specifically expressed and far outnumber annotated lncRNA sequences. To identify and characterize novel lncRNAs in RNA sequencing data from new samples, we have developed COME, a coding potential calculation tool based on multiple features. It integrates multiple sequence-derived and experiment-based features using a decompose–compose method, which makes it more accurate and robust than other well-known tools. We also showed that COME was able to substantially improve the consistency of predication results from other coding potential calculators. Moreover, COME annotates and characterizes each predicted lncRNA transcript with multiple lines of supporting evidence, which are not provided by other tools. Remarkably, we found that one subgroup of lncRNAs classified by such supporting features (i.e. conserved local RNA secondary structure) was highly enriched in a well-validated database (lncRNAdb). We further found that the conserved structural domains on lncRNAs had better chance than other RNA regions to interact with RNA binding proteins, based on the recent eCLIP-seq data in human, indicating their potential regulatory roles. Overall, we present COME as an accurate, robust and multiple-feature supported method for the identification and characterization of novel lncRNAs. The software implementation is available at https://github.com/lulab/COME. PMID:27608726

  8. Identification of evolutionarily conserved non-AUG-initiated N-terminal extensions in human coding sequences

    PubMed Central

    Ivanov, Ivaylo P.; Firth, Andrew E.; Michel, Audrey M.; Atkins, John F.; Baranov, Pavel V.

    2011-01-01

    In eukaryotes, it is generally assumed that translation initiation occurs at the AUG codon closest to the messenger RNA 5′ cap. However, in certain cases, initiation can occur at codons differing from AUG by a single nucleotide, especially the codons CUG, UUG, GUG, ACG, AUA and AUU. While non-AUG initiation has been experimentally verified for a handful of human genes, the full extent to which this phenomenon is utilized—both for increased coding capacity and potentially also for novel regulatory mechanisms—remains unclear. To address this issue, and hence to improve the quality of existing coding sequence annotations, we developed a methodology based on phylogenetic analysis of predicted 5′ untranslated regions from orthologous genes. We use evolutionary signatures of protein-coding sequences as an indicator of translation initiation upstream of annotated coding sequences. Our search identified novel conserved potential non-AUG-initiated N-terminal extensions in 42 human genes including VANGL2, FGFR1, KCNN4, TRPV6, HDGF, CITED2, EIF4G3 and NTF3, and also affirmed the conservation of known non-AUG-initiated extensions in 17 other genes. In several instances, we have been able to obtain independent experimental evidence of the expression of non-AUG-initiated products from the previously published literature and ribosome profiling data. PMID:21266472

  9. Identification and characterization of long non-coding RNAs in rainbow trout eggs

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Long non-coding RNAs (lncRNAs) are in general considered as a diverse class of transcripts longer than 200 nucleotides that structurally resemble mRNAs but do not encode proteins. Recent advances in RNA sequencing (RNA-Seq) and bioinformatics methods have provided an opportunity to indentify and ana...

  10. Key for protein coding sequences identification: computer analysis of codon strategy.

    PubMed Central

    Rodier, F; Gabarro-Arpa, J; Ehrlich, R; Reiss, C

    1982-01-01

    The signal qualifying an AUG or GUG as an initiator in mRNAs processed by E. coli ribosomes is not found to be a systematic, literal homology sequence. In contrast, stability analysis reveals that initiators always occur within nucleic acid domains of low stability, for which a high A/U content is observed. Since no aminoacid selection pressure can be detected at N-termini of the proteins, the A/U enrichment results from a biased usage of the code degeneracy. A computer analysis is presented which allows easy detection of the codon strategy. N-terminal codons carry rather systematically A or U in third position, which suggests a mechanism for translation initiation and helps to detect protein coding sequences in sequenced DNA. PMID:7038623

  11. Genome-wide identification and characterization of long intergenic non-coding RNAs in Ganoderma lucidum.

    PubMed

    Li, Jianqin; Wu, Bin; Xu, Jiang; Liu, Chang

    2014-01-01

    Ganoderma lucidum is a white-rot fungus best-known for its medicinal activities. We have previously sequenced its genome and annotated the protein coding genes. However, long non-coding RNAs in G. lucidum genome have not been analyzed. In this study, we have identified and characterized long intergenic non-coding RNAs (lincRNA) in G. lucidum systematically. We developed a computational pipeline, which was used to analyze RNA-Seq data derived from G. lucidum samples collected from three developmental stages. A total of 402 lincRNA candidates were identified, with an average length of 609 bp. Analysis of their adjacent protein-coding genes (apcGenes) revealed that 46 apcGenes belong to the pathways of triterpenoid biosynthesis and lignin degradation, or families of cytochrome P450, mating type B genes, and carbohydrate-active enzymes. To determine if lincRNAs and these apcGenes have any interactions, the corresponding pairs of lincRNAs and apcGenes were analyzed in detail. We developed a modified 3' RACE method to analyze the transcriptional direction of a transcript. Among the 46 lincRNAs, 37 were found unidirectionally transcribed, and 9 were found bidirectionally transcribed. The expression profiles of 16 of these 37 lincRNAs were found to be highly correlated with those of the apcGenes across the three developmental stages. Among them, 11 are positively correlated (r>0.8) and 5 are negatively correlated (r<-0.8). The co-localization and co-expression of lincRNAs and those apcGenes playing important functions is consistent with the notion that lincRNAs might be important regulators for cellular processes. In summary, this represents the very first study to identify and characterize lincRNAs in the genomes of basidiomycetes. The results obtained here have laid the foundation for study of potential lincRNA-mediated expression regulation of genes in G. lucidum.

  12. Identification of Non-Coding RNAs in the Candida parapsilosis Species Group

    PubMed Central

    Donovan, Paul D.; Schröder, Markus S.; Higgins, Desmond G.

    2016-01-01

    The Candida CTG clade is a monophyletic group of fungal species that translates CTG as serine, and includes the pathogens Candida albicans and Candida parapsilosis. Research has typically focused on identifying protein-coding genes in these species. Here, we use bioinformatic and experimental approaches to annotate known classes of non-coding RNAs in three CTG-clade species, Candida parapsilosis, Candida orthopsilosis and Lodderomyces elongisporus. We also update the annotation of ncRNAs in the C. albicans genome. The majority of ncRNAs identified were snoRNAs. Approximately 50% of snoRNAs (including most of the C/D box class) are encoded in introns. Most are within mono- and polycistronic transcripts with no protein coding potential. Five polycistronic clusters of snoRNAs are highly conserved in fungi. In polycistronic regions, splicing occurs via the classical pathway, as well as by nested and recursive splicing. We identified spliceosomal small nuclear RNAs, the telomerase RNA component, signal recognition particle, RNase P RNA component and the related RNase MRP RNA component in all three genomes. Stem loop IV of the U2 spliceosomal RNA and the associated binding proteins were lost from the ancestor of C. parapsilosis and C. orthopsilosis, following the divergence from L. elongisporus. The RNA component of the MRP is longer in C. parapsilosis, C. orthopsilosis and L. elongisporus than in S. cerevisiae, but is substantially shorter than in C. albicans. PMID:27658249

  13. Auditory evoked responses to binaural beat illusion: stimulus generation and the derivation of the Binaural Interaction Component (BIC).

    PubMed

    Ozdamar, Ozcan; Bohorquez, Jorge; Mihajloski, Todor; Yavuz, Erdem; Lachowska, Magdalena

    2011-01-01

    Electrophysiological indices of auditory binaural beats illusions are studied using late latency evoked responses. Binaural beats are generated by continuous monaural FM tones with slightly different ascending and descending frequencies lasting about 25 ms presented at 1 sec intervals. Frequency changes are carefully adjusted to avoid any creation of abrupt waveform changes. Binaural Interaction Component (BIC) analysis is used to separate the neural responses due to binaural involvement. The results show that the transient auditory evoked responses can be obtained from the auditory illusion of binaural beats.

  14. Genome-Wide Identification and Characterization of Long Intergenic Non-Coding RNAs in Ganoderma lucidum

    PubMed Central

    Xu, Jiang; Liu, Chang

    2014-01-01

    Ganoderma lucidum is a white-rot fungus best-known for its medicinal activities. We have previously sequenced its genome and annotated the protein coding genes. However, long non-coding RNAs in G. lucidum genome have not been analyzed. In this study, we have identified and characterized long intergenic non-coding RNAs (lincRNA) in G. lucidum systematically. We developed a computational pipeline, which was used to analyze RNA-Seq data derived from G. lucidum samples collected from three developmental stages. A total of 402 lincRNA candidates were identified, with an average length of 609 bp. Analysis of their adjacent protein-coding genes (apcGenes) revealed that 46 apcGenes belong to the pathways of triterpenoid biosynthesis and lignin degradation, or families of cytochrome P450, mating type B genes, and carbohydrate-active enzymes. To determine if lincRNAs and these apcGenes have any interactions, the corresponding pairs of lincRNAs and apcGenes were analyzed in detail. We developed a modified 3′ RACE method to analyze the transcriptional direction of a transcript. Among the 46 lincRNAs, 37 were found unidirectionally transcribed, and 9 were found bidirectionally transcribed. The expression profiles of 16 of these 37 lincRNAs were found to be highly correlated with those of the apcGenes across the three developmental stages. Among them, 11 are positively correlated (r>0.8) and 5 are negatively correlated (r<−0.8). The co-localization and co-expression of lincRNAs and those apcGenes playing important functions is consistent with the notion that lincRNAs might be important regulators for cellular processes. In summary, this represents the very first study to identify and characterize lincRNAs in the genomes of basidiomycetes. The results obtained here have laid the foundation for study of potential lincRNA-mediated expression regulation of genes in G. lucidum. PMID:24932683

  15. Identification of a Novel Small Non-Coding RNA Modulating the Intracellular Survival of Brucella melitensis

    PubMed Central

    Wang, Yufei; Ke, Yuehua; Xu, Jie; Wang, Ligui; Wang, Tongkun; Liang, Hui; Zhang, Wei; Gong, Chunli; Yuan, Jiuyun; Zhuang, Yubin; An, Chang; Lei, Shuangshuang; Du, Xinying; Wang, Zhoujia; Li, Wenna; Yuan, Xitong; Huang, Liuyu; Yang, Xiaoli; Chen, Zeliang

    2015-01-01

    Bacterial small non-coding RNAs (sRNAs) are gene expression modulators respond to environmental changes, stressful conditions, and pathogenesis. In this study, by using a combined bioinformatic and experimental approach, eight novel sRNA genes were identified in intracellular pathogen Brucella melitensis. BSR0602, one sRNA that was highly induced in stationary phase, was further examined and found to modulate the intracellular survival of B. melitensis. BSR0602 was present at very high levels in vitro under stresses similar to those encountered during infection in host macrophages. Furthermore, BSR0602 was found to be highly expressed in the spleens of infected mice, suggesting its potential role in the control of pathogenesis. BSR0602 targets the mRNAs coding for gntR, a global transcriptional regulator, which is required for B. melitensis virulence. Overexpression of BSR0602 results in distinct reduction in the gntR mRNA level. B. melitensis with high level of BSR0602 is defective in bacteria intracellular survival in macrophages and defective in growth in the spleens of infected mice. Therefore, BSR0602 may directly inhibit the expression of gntR, which then impairs Brucellae intracellular survival and contributes to Brucella infection. Our findings suggest that BSR0602 is responsible for bacterial adaptation to stress conditions and thus modulate B. melitensis intracellular survival. PMID:25852653

  16. Identification of Genes Coding Aminoglycoside Modifying Enzymes in E. coli of UTI Patients in India

    PubMed Central

    Bashir, Yasir; Dar, Firdous Ahmad; Sekhar, M.

    2016-01-01

    This study is to probe the pattern of antibiotic resistance against aminoglycosides and its mechanism in E. coli obtained from patients from Chennai, India. Isolation and identification of pathogens were done on MacConkey agar. Antimicrobial sensitivity testing was done by disc diffusion test. The identification of genes encoding aminoglycoside modifying enzymes was done by Polymerase Chain Reaction (PCR). Out of 98 isolates, 71 (72.45%) isolates were identified as E. coli and the remaining 27 (27.55%) as other bacteria. Disc diffusion method results showed a resistance level of 72.15% for streptomycin, 73.4% for gentamicin, 63.26% for neomycin, 57.14% for tobramycin, 47.9% for netilmicin, and 8.16% for amikacin in E. coli. PCR screening showed the presence of four genes, namely, rrs, aacC2, aacA-aphD, and aphA3, in their plasmid DNA. The results point towards the novel mechanism of drug resistance in E. coli from UTI patients in India as they confirm the presence of genes encoding enzymes that cause resistance to aminoglycoside drugs. This could be an alarm for drug prescription to UTI patients. PMID:27403451

  17. Identification of non-coding RNAs with a new composite feature in the Hybrid Random Forest Ensemble algorithm

    PubMed Central

    Lertampaiporn, Supatcha; Thammarongtham, Chinae; Nukoolkit, Chakarida; Kaewkamnerdpong, Boonserm; Ruengjitchatchawalya, Marasri

    2014-01-01

    To identify non-coding RNA (ncRNA) signals within genomic regions, a classification tool was developed based on a hybrid random forest (RF) with a logistic regression model to efficiently discriminate short ncRNA sequences as well as long complex ncRNA sequences. This RF-based classifier was trained on a well-balanced dataset with a discriminative set of features and achieved an accuracy, sensitivity and specificity of 92.11%, 90.7% and 93.5%, respectively. The selected feature set includes a new proposed feature, SCORE. This feature is generated based on a logistic regression function that combines five significant features—structure, sequence, modularity, structural robustness and coding potential—to enable improved characterization of long ncRNA (lncRNA) elements. The use of SCORE improved the performance of the RF-based classifier in the identification of Rfam lncRNA families. A genome-wide ncRNA classification framework was applied to a wide variety of organisms, with an emphasis on those of economic, social, public health, environmental and agricultural significance, such as various bacteria genomes, the Arthrospira (Spirulina) genome, and rice and human genomic regions. Our framework was able to identify known ncRNAs with sensitivities of greater than 90% and 77.7% for prokaryotic and eukaryotic sequences, respectively. Our classifier is available at http://ncrna-pred.com/HLRF.htm. PMID:24771344

  18. Co-expression analysis and identification of fecundity-related long non-coding RNAs in sheep ovaries

    PubMed Central

    Miao, Xiangyang; Luo, Qingmiao; Zhao, Huijing; Qin, Xiaoyu

    2016-01-01

    Small Tail Han sheep, including the FecBBFecBB (Han BB) and FecB+ FecB+ (Han++) genotypes, and Dorset sheep exhibit different fecundities. To identify novel long non-coding RNAs (lncRNAs) associated with sheep fecundity to better understand their molecular mechanisms, a genome-wide analysis of mRNAs and lncRNAs from Han BB, Han++ and Dorset sheep was performed. After the identification of differentially expressed mRNAs and lncRNAs, 16 significant modules were explored by using weighted gene coexpression network analysis (WGCNA) followed by functional enrichment analysis of the genes and lncRNAs in significant modules. Among these selected modules, the yellow and brown modules were significantly related to sheep fecundity. lncRNAs (e.g., NR0B1, XLOC_041882, and MYH15) in the yellow module were mainly involved in the TGF-β signalling pathway, and NYAP1 and BCORL1 were significantly associated with the oxytocin signalling pathway, which regulates several genes in the coexpression network of the brown module. Overall, we identified several gene modules associated with sheep fecundity, as well as networks consisting of hub genes and lncRNAs that may contribute to sheep prolificacy by regulating the target mRNAs related to the TGF-β and oxytocin signalling pathways. This study provides an alternative strategy for the identification of potential candidate regulatory lncRNAs. PMID:27982099

  19. An improved method for identification of small non-coding RNAs in bacteria using support vector machine

    PubMed Central

    Barman, Ranjan Kumar; Mukhopadhyay, Anirban; Das, Santasabuj

    2017-01-01

    Bacterial small non-coding RNAs (sRNAs) are not translated into proteins, but act as functional RNAs. They are involved in diverse biological processes like virulence, stress response and quorum sensing. Several high-throughput techniques have enabled identification of sRNAs in bacteria, but experimental detection remains a challenge and grossly incomplete for most species. Thus, there is a need to develop computational tools to predict bacterial sRNAs. Here, we propose a computational method to identify sRNAs in bacteria using support vector machine (SVM) classifier. The primary sequence and secondary structure features of experimentally-validated sRNAs of Salmonella Typhimurium LT2 (SLT2) was used to build the optimal SVM model. We found that a tri-nucleotide composition feature of sRNAs achieved an accuracy of 88.35% for SLT2. We validated the SVM model also on the experimentally-detected sRNAs of E. coli and Salmonella Typhi. The proposed model had robustly attained an accuracy of 81.25% and 88.82% for E. coli K-12 and S. Typhi Ty2, respectively. We confirmed that this method significantly improved the identification of sRNAs in bacteria. Furthermore, we used a sliding window-based method and identified sRNAs from complete genomes of SLT2, S. Typhi Ty2 and E. coli K-12 with sensitivities of 89.09%, 83.33% and 67.39%, respectively. PMID:28383059

  20. DD3MAT - a code for yield criteria anisotropy parameters identification.

    NASA Astrophysics Data System (ADS)

    Barros, P. D.; Carvalho, P. D.; Alves, J. L.; Oliveira, M. C.; Menezes, L. F.

    2016-08-01

    This work presents the main strategies and algorithms adopted in the DD3MAT inhouse code, specifically developed for identifying the anisotropy parameters. The algorithm adopted is based on the minimization of an error function, using a downhill simplex method. The set of experimental values can consider yield stresses and r -values obtained from in-plane tension, for different angles with the rolling direction (RD), yield stress and r -value obtained for biaxial stress state, and yield stresses from shear tests performed also for different angles to RD. All these values can be defined for a specific value of plastic work. Moreover, it can also include the yield stresses obtained from in-plane compression tests. The anisotropy parameters are identified for an AA2090-T3 aluminium alloy, highlighting the importance of the user intervention to improve the numerical fit.

  1. Systematic identification and characterization of long non-coding RNAs in mouse mature sperm

    PubMed Central

    Zhang, Xiaoning; Gao, Fengxin; Fu, Jianbo; Zhang, Peng; Wang, Yuqing; Zeng, Xuhui

    2017-01-01

    Increasing studies have shown that mature spermatozoa contain many transcripts including mRNAs and miRNAs. However, the expression profile of long non-coding RNAs (lncRNAs) in mammalian sperm has not been systematically investigated. Here, we used highly purified RNA to investigate lncRNA expression profiles in mouse mature sperm by stranded-specific RNA-seq. We identified 20,907 known and 4,088 novel lncRNAs transcripts, and the existence of intact lncRNAs was confirmed by RT-PCR and fluorescence in situ hybridization on two representative lncRNAs. Compared to round spermatids, 1,794 upregulated and 165 downregulated lncRNAs and 4,435 upregulated and 3,920 downregulated mRNAs were identified in sperm. Based on the “Cis and Trans” RNA-RNA interaction principle, we found 14,259 targeted coding genes of differently expressed lncRNAs. In terms of Gene ontology (GO) analysis, differentially expressed lncRNAs targeted genes mainly related to nucleic acid metabolic, protein modification, chromatin and histone modification, heterocycle compound metabolic, sperm function, spermatogenesis and other processes. In contrast, differentially expressed transcripts of mRNAs were highly enriched for protein metabolic process and RNA metabolic, spermatogenesis, sperm motility, cell cycle, chromatin organization, heterocycle and aromatic compound metabolic processes. Kyoto encyclopedia of genes and genomes (KEGG) pathway analysis showed that the differentially expressed lncRNAs were involved in RNA transport, mRNA surveillance pathway, PI3K-Akt signaling pathway, AMPK signaling pathway, protein processing in endoplasmic reticulum. Metabolic pathways, mRNA surveillance pathway, AMPK signaling pathway, cell cycle, RNA transport splicesome and endocytosis incorporated with the differentially expressed mRNA. Furthermore, many lncRNAs were specifically expressed in testis/sperm, and 880 lncRNAs were conserved between human and mouse. In summary, this study provides a preliminary

  2. Identification and characterisation of coding tandem repeat variants in incA gene of Chlamydophila pecorum.

    PubMed

    Yousef Mohamad, Khalil; Rekiki, Abdessalem; Myers, Garry; Bavoil, Patrik M; Rodolakis, Annie

    2008-01-01

    Bacteria of the family Chlamydiaceae are obligate intracellular pathogens of human and animals. Chlamydophila pecorum is associated with different pathological conditions in ruminants, swine and koala. To characterize a coding tandem repeat (CTR) identified at the 3' end of incA gene of C. pecorum, 51 strains of different chlamydial species were examined. The CTR were observed in 18 of 18 tested C. pecorum isolates including symptomatic and asymptomatic animals from diverse geographical origins. The CTR were also found in two strains of C. abortus respectively isolated from faeces from a healthy ewe and from a goat belonging to asymptomatic herds, but were absent in C. abortus strains isolated from clinical disease specimens, and in tested strains of C. psittaci, C. caviae, C. felis and C. trachomatis. The number of CTR repeats is variable and encode several motifs that are rich in alanine and proline. The CTR-derived variable structure of incA, which encode the Chlamydiaceae-specific type III secreted inclusion membrane protein, IncA, may be involved in the adaptation of C. pecorum to its environment by allowing it to persist in the host cell.

  3. Streptococcus gordonii Biofilm Formation: Identification of Genes that Code for Biofilm Phenotypes

    PubMed Central

    Loo, C. Y.; Corliss, D. A.; Ganeshkumar, N.

    2000-01-01

    Viridans streptococci, which include Streptococcus gordonii, are pioneer oral bacteria that initiate dental plaque formation. Sessile bacteria in a biofilm exhibit a mode of growth that is distinct from that of planktonic bacteria. Biofilm formation of S. gordonii Challis was characterized using an in vitro biofilm formation assay on polystyrene surfaces. The same assay was used as a nonbiased method to screen isogenic mutants generated by Tn916 transposon mutagenesis for defective biofilm formation. Biofilms formed optimally when bacteria were grown in a minimal medium under anaerobic conditions. Biofilm formation was affected by changes in pH, osmolarity, and carbohydrate content of the growth media. Eighteen biofilm-defective mutants of S. gordonii Challis were identified based on Southern hybridization with a Tn916-based probe and DNA sequences of the Tn916-flanking regions. Molecular analyses of these mutants showed that some of the genes required for biofilm formation are involved in signal transduction, peptidoglycan biosynthesis, and adhesion. These characteristics are associated with quorum sensing, osmoadaptation, and adhesion functions in oral streptococci. Only nine of the biofilm-defective mutants had defects in genes of known function, suggesting that novel aspects of bacterial physiology may play a part in biofilm formation. Further identification and characterization of biofilm-associated genes will provide insight into the molecular mechanisms of biofilm formation of oral streptococci. PMID:10671461

  4. Identification and Molecular Characterization of Genes Coding Pharmaceutically Important Enzymes from Halo-Thermo Tolerant Bacillus.

    PubMed

    Safary, Azam; Moniri, Rezvan; Hamzeh-Mivehroud, Maryam; Dastmalchi, Siavoush

    2016-12-01

    Purpose: Robust pharmaceutical and industrial enzymes from extremophile microorganisms are main source of enzymes with tremendous stability under harsh conditions which make them potential tools for commercial and biotechnological applications. Methods: The genome of a Gram-positive halo-thermotolerant Bacillus sp. SL1, new isolate from Saline Lake, was investigated for the presence of genes coding for potentially pharmaceutical enzymes. We determined gene sequences for the enzymes laccase (CotA), l-asparaginase (ansA3, ansA1), glutamate-specific endopeptidase (blaSE), l-arabinose isomerase (araA2), endo-1,4-β mannosidase (gmuG), glutaminase (glsA), pectate lyase (pelA), cellulase (bglC1), aldehyde dehydrogenase (ycbD) and allantoinases (pucH) in the genome of Bacillus sp. SL1. Results: Based on the DNA sequence alignment results, six of the studied enzymes of Bacillus sp. SL-1 showed 100% similarity at the nucleotide level to the same genes of B. licheniformis 14580 demonstrating extensive organizational relationship between these two strains. Despite high similarities between the B. licheniformis and Bacillus sp. SL-1 genomes, there are minor differences in the sequences of some enzyme. Approximately 30% of the enzyme sequences revealed more than 99% identity with some variations in nucleotides leading to amino acid substitution in protein sequences. Conclusion: Molecular characterization of this new isolate provides useful information regarding evolutionary relationship between B. subtilis and B. licheniformis species. Since, the most industrial processes are often performed in harsh conditions, enzymes from such halo-thermotolerant bacteria may provide economically and industrially appealing biocatalysts to be used under specific physicochemical situations in medical, pharmaceutical, chemical and other industries.

  5. Identification and Molecular Characterization of Genes Coding Pharmaceutically Important Enzymes from Halo-Thermo Tolerant Bacillus

    PubMed Central

    Safary, Azam; Moniri, Rezvan; Hamzeh-Mivehroud, Maryam; Dastmalchi, Siavoush

    2016-01-01

    Purpose: Robust pharmaceutical and industrial enzymes from extremophile microorganisms are main source of enzymes with tremendous stability under harsh conditions which make them potential tools for commercial and biotechnological applications. Methods: The genome of a Gram-positive halo-thermotolerant Bacillus sp. SL1, new isolate from Saline Lake, was investigated for the presence of genes coding for potentially pharmaceutical enzymes. We determined gene sequences for the enzymes laccase (CotA), l-asparaginase (ansA3, ansA1), glutamate-specific endopeptidase (blaSE), l-arabinose isomerase (araA2), endo-1,4-β mannosidase (gmuG), glutaminase (glsA), pectate lyase (pelA), cellulase (bglC1), aldehyde dehydrogenase (ycbD) and allantoinases (pucH) in the genome of Bacillus sp. SL1. Results: Based on the DNA sequence alignment results, six of the studied enzymes of Bacillus sp. SL-1 showed 100% similarity at the nucleotide level to the same genes of B. licheniformis 14580 demonstrating extensive organizational relationship between these two strains. Despite high similarities between the B. licheniformis and Bacillus sp. SL-1 genomes, there are minor differences in the sequences of some enzyme. Approximately 30% of the enzyme sequences revealed more than 99% identity with some variations in nucleotides leading to amino acid substitution in protein sequences. Conclusion: Molecular characterization of this new isolate provides useful information regarding evolutionary relationship between B. subtilis and B. licheniformis species. Since, the most industrial processes are often performed in harsh conditions, enzymes from such halo-thermotolerant bacteria may provide economically and industrially appealing biocatalysts to be used under specific physicochemical situations in medical, pharmaceutical, chemical and other industries. PMID:28101462

  6. Identification and expression profiling of Ceratitis capitata genes coding for β-hexosaminidases.

    PubMed

    Pasini, Maria E; Intra, Jari; Gomulski, Ludvik M; Calvenzani, Valentina; Petroni, Katia; Briani, Federica; Perotti, Maria Elisa

    2011-02-15

    The goal of this study was to identify the genes coding for β-N-acetylhexosaminidases in the Mediterranean fruit fly (medfly) Ceratitis capitata, one of the most destructive agricultural pests, belonging to the Tephritidae family, order Diptera. Two dimeric β-N-acetylhexosaminidases, HEXA and HEXB, have been recently identified on Drosophila sperm. These enzymes are involved in egg binding through interactions with complementary carbohydrates on the surface of the egg shell. Three genes, Hexosaminidase 1 (Hexo1), Hexosaminidase 2 (Hexo2) and fused lobes (fdl), encode for HEXA and HEXB subunits. The availability of C. capitata EST libraries derived from embryos and adult heads allowed us to identify three sequences homologous to the D. melanogaster Hexo1, Hexo2 and fdl genes. Here, we report the expression profile analysis of CcHexo1, CcHexo2 and Ccfdld in several tissues, organs and stages. Ccfdl expression was highest in heads of both sexes and in whole adult females. In the testis and ovary the three genes showed distinct spatial and temporal expression patterns. All the mRNAs were detectable in early stages of spermatogenesis; CcHexo2 and Ccfdl were also expressed in early elongating spermatid cysts. All three genes are expressed in the ovarian nurse cells. CcHexo1 and Ccfdl are stage specific, since they have been observed in stages 12 and 13 during oocyte growth, when programmed cell death occurs in nurse cells. The expression pattern of the three genes in medfly gonads suggests that, as their Drosophila counterparts, they may encode for proteins involved in gametogenesis and fertilization.

  7. Genome Wide Identification and Functional Prediction of Long Non-Coding RNAs Responsive to Sclerotinia sclerotiorum Infection in Brassica napus

    PubMed Central

    Joshi, Raj Kumar; Megha, Swati; Basu, Urmila; Rahman, Muhammad H.; Kav, Nat N. V.

    2016-01-01

    Sclerotinia stem rot caused by Sclerotinia sclerotiorum affects canola production worldwide. Emerging evidence suggests that long non-coding RNAs (lncRNAs) play important roles in the regulation of gene expression in plants, in response to both abiotic and biotic stress. So far, identification of lncRNAs has been limited to a few model plant species, and their roles in mediating responses to biotic stresses are yet to be characterized in Brassica napus. The present study reports the identification of novel lncRNAs responsive to S. sclerotiorum infection in B. napus at two time points after infection (24 hpi and 48 hpi) using a stranded RNA-Sequencing technique and a detection pipeline for lncRNAs. Of the total 3,181 lncRNA candidates, 2,821 lncRNAs were intergenic, 111 were natural antisense transcripts, 76 possessed exonic overlap with the reference coding transcripts while the remaining 173 represented novel lnc- isoforms. Forty one lncRNAs were identified as the precursors for microRNAs (miRNAs) including miR156, miR169 and miR394, with significant roles in mediating plant responses to fungal phytopathogens. A total of 931 differentially expressed lncRNAs were identified in response to S. sclerotiorum infection and the expression of 12 such lncRNAs was further validated using qRT-PCR. B. napus antisense lncRNA, TCONS_00000966, having 90% overlap with a plant defensin gene, showed significant induction at both infection stages, suggesting its involvement in the transcriptional regulation of defense responsive genes under S. sclerotiorum infection. Additionally, nine lncRNAs showed overlap with cis-regulatory regions of differentially expressed genes of B. napus. Quantitative RT-PCR verification of a set of S. sclerotiorum responsive sense/antisense transcript pairs revealed contrasting expression patterns, supporting the hypothesis that steric clashes of transcriptional machinery may lead to inactivation of sense promoter. Our findings highlight the potential

  8. Identification of Aedes aegypti Long Intergenic Non-coding RNAs and Their Association with Wolbachia and Dengue Virus Infection

    PubMed Central

    Etebari, Kayvan; Asad, Sultan; Zhang, Guangmei; Asgari, Sassan

    2016-01-01

    Long intergenic non-coding RNAs (lincRNAs) are appearing as an important class of regulatory RNAs with a variety of biological functions. The aim of this study was to identify the lincRNA profile in the dengue vector Aedes aegypti and evaluate their potential role in host-pathogen interaction. The majority of previous RNA-Seq transcriptome studies in Ae. aegypti have focused on the expression pattern of annotated protein coding genes under different biological conditions. Here, we used 35 publically available RNA-Seq datasets with relatively high depth to screen the Ae. aegypti genome for lincRNA discovery. This led to the identification of 3,482 putative lincRNAs. These lincRNA genes displayed a slightly lower GC content and shorter transcript lengths compared to protein-encoding genes. Ae. aegypti lincRNAs also demonstrate low evolutionary sequence conservation even among closely related species such as Culex quinquefasciatus and Anopheles gambiae. We examined their expression in dengue virus serotype 2 (DENV-2) and Wolbachia infected and non-infected adult mosquitoes and Aa20 cells. The results revealed that DENV-2 infection increased the abundance of a number of host lincRNAs, from which some suppress viral replication in mosquito cells. RNAi-mediated silencing of lincRNA_1317 led to enhancement in viral replication, which possibly indicates its potential involvement in the host anti-viral defense. A number of lincRNAs were also differentially expressed in Wolbachia-infected mosquitoes. The results will facilitate future studies to unravel the function of lncRNAs in insects and may prove to be beneficial in developing new ways to control vectors or inhibit replication of viruses in them. PMID:27760142

  9. Model Selection and Psychological Theory: A Discussion of the Differences between the Akaike Information Criterion (AIC) and the Bayesian Information Criterion (BIC)

    ERIC Educational Resources Information Center

    Vrieze, Scott I.

    2012-01-01

    This article reviews the Akaike information criterion (AIC) and the Bayesian information criterion (BIC) in model selection and the appraisal of psychological theory. The focus is on latent variable models, given their growing use in theory testing and construction. Theoretical statistical results in regression are discussed, and more important…

  10. Self-generated identification codes in longitudinal prevention research with adolescents: a pilot study of matched and unmatched subjects.

    PubMed

    Kristjansson, Alfgeir Logi; Sigfusdottir, Inga Dora; Sigfusson, Jon; Allegrante, John P

    2014-04-01

    Self-generated identification codes (SGICs) are an increasingly utilized methodological feature of longitudinal prevention research among adolescents. This study sought to test the differences between the matched and unmatched groups at baseline on a number of background, health, and well-being and risk behavior measures in a prevention study among 13- to 16-year-old Icelandic adolescents where a SGIC was constructed and used to link individual-level respondent data over two data collection points one year apart. We use pilot data from two Reykjavik city secondary schools collected as part of the population study Youth in Iceland in February 2010 and 2011 (N = 366, SGIC matching rate 61%). Baseline results for the matched and unmatched participants are compared. Findings indicate that the unmatched subjects are both more likely to be substance users than their matched counterparts as well as being more likely to be boys and/or from disrupted families. Five out of the seven scaled measures for risk and protective factors and personality indicators reveal no difference between the matched and unmatched subjects and the significantly different measures reveal small effect sizes between the two groups. However, the effect sizes for substance use are significantly different between the matched and unmatched groups for all seven substance use measures with effect sizes from 0.52 to 1.32. These findings therefore indicate that the measurement validity of adolescent risk behaviors such as substance use may be put in jeopardy when using SGIC and that unmatched subjects may be more likely to distrust the SGIC process.

  11. Validation of ICD-9 Code 787.2 for identification of individuals with dysphagia from administrative databases.

    PubMed

    González-Fernández, Marlís; Gardyn, Michael; Wyckoff, Shamolie; Ky, Paul K S; Palmer, Jeffrey B

    2009-12-01

    The aim of this study was to determine the accuracy of dysphagia coding using the International Classification of Diseases version 9 (ICD-9) code 787.2. We used the administrative database of a tertiary hospital and sequential videofluorographic swallowing study (VFSS) reports for patients admitted to the same hospital from January to June 2007. The VFSS reports were abstracted and the hospital's database was queried to abstract the coding associated with the admission during which the VFSS was performed. The VFSS and administrative data were merged for data analysis. Dysphagia was coded (using code 787.2) in 36 of 168 cases that had a VFSS. Of these, 34 had dysphagia diagnosed by VFSS (our gold standard) and one had a prior history of dysphagia. Code 787.2 had sensitivity of 22.8, specificity of 89.5, and positive and negative predictive values of 94.4 and 12.9, respectively. Dysphagia was largely undercoded in this database, but when the code was present those individuals were very likely to be dysphagic. Selection of dysphagic cases using the ICD-9 code is appropriate for within-group comparisons. Absence of the code, however, is not a good predictor of the absence of dysphagia.

  12. Identification of Predictive Markers for Response to Neoadjuvant Chemoradiation in Rectal Carcinomas by Proteomic Isotope Coded Protein Label (ICPL) Analysis

    PubMed Central

    Croner, Roland S.; Sevim, Müzeyyen; Metodiev, Metodi V.; Jo, Peter; Ghadimi, Michael; Schellerer, Vera; Brunner, Maximillian; Geppert, Carol; Rau, Tilman; Stürzl, Michael; Naschberger, Elisabeth; Matzel, Klaus E.; Hohenberger, Werner; Lottspeich, Friedrich; Kellermann, Josef

    2016-01-01

    Neoadjuvant chemoradiation (nCRT) is an established procedure in stage union internationale contre le cancer (UICC) II/III rectal carcinomas. Around 53% of the tumours present with good tumor regression after nCRT, and 8%–15% are complete responders. Reliable selection markers would allow the identification of poor or non-responders prior to therapy. Tumor biopsies were harvested from 20 patients with rectal carcinomas, and stored in liquid nitrogen prior to therapy after obtaining patients’ informed consent (Erlangen-No.3784). Patients received standardized nCRT with 5-Fluoruracil (nCRT I) or 5-Fluoruracil ± Oxaliplatin (nCRT II) according to the CAO/ARO/AIO-04 protocol. After surgery, regression grading (Dworak) of the tumors was performed during histopathological examination of the specimens. Tumors were classified as poor (Dworak 1 + 2) or good (Dworak 3 + 4) responders. Laser capture microdissection (LCM) for tumor enrichment was performed on preoperative biopsies. Differences in expressed proteins between poor and good responders to nCRT I and II were identified by proteomic analysis (Isotope Coded Protein Label, ICPL™) and selected markers were validated by immunohistochemistry. Tumors of 10 patients were classified as histopathologically poor (Dworak 1 or 2) and the other 10 tumor samples as histopathologically good (Dworak 3 or 4) responders to nCRT after surgery. Sufficient material in good quality was harvested for ICPL analysis by LCM from all biopsies. We identified 140 differentially regulated proteins regarding the selection criteria and the response to nCRT. Fourteen of these proteins were synchronously up-regulated at least 1.5-fold after nCRT I or nCRT II (e.g., FLNB, TKT, PKM2, SERINB1, IGHG2). Thirty-five proteins showed a complete reciprocal regulation (up or down) after nCRT I or nCRT II and the rest was regulated either according to nCRT I or II. The protein expression of regulated proteins such as PLEC1, TKT, HADHA and TAGLN was

  13. The Fusion Protein Signal-Peptide-Coding Region of Canine Distemper Virus: A Useful Tool for Phylogenetic Reconstruction and Lineage Identification

    PubMed Central

    Sarute, Nicolás; Calderón, Marina Gallo; Pérez, Ruben; La Torre, José; Hernández, Martín; Francia, Lourdes; Panzera, Yanina

    2013-01-01

    Canine distemper virus (CDV; Paramyxoviridae, Morbillivirus) is the etiologic agent of a multisystemic infectious disease affecting all terrestrial carnivore families with high incidence and mortality in domestic dogs. Sequence analysis of the hemagglutinin (H) gene has been widely employed to characterize field strains, permitting the identification of nine CDV lineages worldwide. Recently, it has been established that the sequences of the fusion protein signal-peptide (Fsp) coding region are extremely variable, suggesting that analysis of its sequence might be useful for strain characterization studies. However, the divergence of Fsp sequences among worldwide strains and its phylogenetic resolution has not yet been evaluated. We constructed datasets containing the Fsp-coding region and H gene sequences of the same strains belonging to eight CDV lineages. Both datasets were used to evaluate their phylogenetic resolution. The phylogenetic analysis revealed that both datasets clustered the same strains into eight different branches, corresponding to CDV lineages. The inter-lineage amino acid divergence was fourfold greater for the Fsp peptide than for the H protein. The likelihood mapping revealed that both datasets display strong phylogenetic signals in the region of well-resolved topologies. These features indicate that Fsp-coding region sequence analysis is suitable for evolutionary studies as it allows for straightforward identification of CDV lineages. PMID:23675493

  14. Potential prognostic long non-coding RNA identification and their validation in predicting survival of patients with multiple myeloma.

    PubMed

    Hu, Ai-Xin; Huang, Zhi-Yong; Zhang, Lin; Shen, Jian

    2017-04-01

    Multiple myeloma, a typical hematological malignancy, is characterized by malignant proliferation of plasma cells. This study was to identify differently expressed long non-coding RNAs to predict the survival of patients with multiple myeloma efficiently. Gene expressing profiles of diagnosed patients with multiple myeloma, GSE24080 (559 samples) and GSE57317 (55 samples), were downloaded from Gene Expression Omnibus database. After processing, survival-related long non-coding RNAs were identified by Cox regression analysis. The prognosis of multiple myeloma patients with differently expressed long non-coding RNAs was predicted by Kaplan-Meier analysis. Meanwhile, stratified analysis was performed based on the concentrations of serum beta 2-microglobulin (S-beta 2m), albumin, and lactate dehydrogenase of multiple myeloma patients. Gene set enrichment analysis was performed to further explore the functions of identified long non-coding RNAs. A total of 176 long non-coding RNAs significantly related to the survival of multiple myeloma patients (p < 0.05) were identified. In dataset GSE24080 and GSE57317, there were 558 and 55 patients being clustered into two groups with significant differences, respectively. Stratified analysis indicated that prediction of the prognoses with these long non-coding RNAs was independent from other clinical phenotype of multiple myeloma. Gene set enrichment analysis-identified pathways of cell cycle, focal adhesion, and G2-M checkpoint were associated with these long non-coding RNAs. A total of 176 long non-coding RNAs, especially RP1-286D6.1, AC008875.2, MTMR9L, AC069360.2, and AL512791.1, were potential biomarkers to evaluate the prognosis of multiple myeloma patients. These long non-coding RNAs participated indispensably in many pathways associated to the development of multiple myeloma; however, the molecular mechanisms need to be further studied.

  15. Identification of a long non-coding RNA gene, growth hormone secretagogue receptor opposite strand, which stimulates cell migration in non-small cell lung cancer cell lines.

    PubMed

    Whiteside, Eliza J; Seim, Inge; Pauli, Jana P; O'Keeffe, Angela J; Thomas, Patrick B; Carter, Shea L; Walpole, Carina M; Fung, Jenny N T; Josh, Peter; Herington, Adrian C; Chopin, Lisa K

    2013-08-01

    The molecular mechanisms involved in non‑small cell lung cancer tumourigenesis are largely unknown; however, recent studies have suggested that long non-coding RNAs (lncRNAs) are likely to play a role. In this study, we used public databases to identify an mRNA-like, candidate long non-coding RNA, GHSROS (GHSR opposite strand), transcribed from the antisense strand of the ghrelin receptor gene, growth hormone secretagogue receptor (GHSR). Quantitative real-time RT-PCR revealed higher expression of GHSROS in lung cancer tissue compared to adjacent, non-tumour lung tissue. In common with many long non-coding RNAs, GHSROS is 5' capped and 3' polyadenylated (mRNA-like), lacks an extensive open reading frame and harbours a transposable element. Engineered overexpression of GHSROS stimulated cell migration in the A549 and NCI-H1299 non-small cell lung cancer cell lines, but suppressed cell migration in the Beas-2B normal lung-derived bronchoepithelial cell line. This suggests that GHSROS function may be dependent on the oncogenic context. The identification of GHSROS, which is expressed in lung cancer and stimulates cell migration in lung cancer cell lines, contributes to the growing number of non-coding RNAs that play a role in the regulation of tumourigenesis and metastatic cancer progression.

  16. Analyzing large gene expression and methylation data profiles using StatBicRM: statistical biclustering-based rule mining.

    PubMed

    Maulik, Ujjwal; Mallik, Saurav; Mukhopadhyay, Anirban; Bandyopadhyay, Sanghamitra

    2015-01-01

    Microarray and beadchip are two most efficient techniques for measuring gene expression and methylation data in bioinformatics. Biclustering deals with the simultaneous clustering of genes and samples. In this article, we propose a computational rule mining framework, StatBicRM (i.e., statistical biclustering-based rule mining) to identify special type of rules and potential biomarkers using integrated approaches of statistical and binary inclusion-maximal biclustering techniques from the biological datasets. At first, a novel statistical strategy has been utilized to eliminate the insignificant/low-significant/redundant genes in such way that significance level must satisfy the data distribution property (viz., either normal distribution or non-normal distribution). The data is then discretized and post-discretized, consecutively. Thereafter, the biclustering technique is applied to identify maximal frequent closed homogeneous itemsets. Corresponding special type of rules are then extracted from the selected itemsets. Our proposed rule mining method performs better than the other rule mining algorithms as it generates maximal frequent closed homogeneous itemsets instead of frequent itemsets. Thus, it saves elapsed time, and can work on big dataset. Pathway and Gene Ontology analyses are conducted on the genes of the evolved rules using David database. Frequency analysis of the genes appearing in the evolved rules is performed to determine potential biomarkers. Furthermore, we also classify the data to know how much the evolved rules are able to describe accurately the remaining test (unknown) data. Subsequently, we also compare the average classification accuracy, and other related factors with other rule-based classifiers. Statistical significance tests are also performed for verifying the statistical relevance of the comparative results. Here, each of the other rule mining methods or rule-based classifiers is also starting with the same post-discretized data

  17. Choice of ICD-10 codes for the identification of acute coronary syndrome in the French hospitalization database.

    PubMed

    Bezin, Julien; Girodet, Pierre-Olivier; Rambelomanana, Sahondra; Touya, Maëlys; Ferreira, Paul; Gilleron, Véronique; Robinson, Philip; Moore, Nicholas; Pariente, Antoine

    2015-12-01

    The objective of this study was to evaluate the performance of the ICD-10 (International Classification of Diseases and Related Health Problems, 10(th) Edition) coding in the French hospitalization database (PMSI) to identify acute coronary syndrome (ACS) occurrence. Eligible hospitalizations were those that occurred at the Bordeaux teaching hospitals between 1 January 2011 and 31 December 2011 and had one of the ICD-10 codes related to ischaemic heart diseases (I20 to I25, excluding I23 and I25.2). Among these, 100 hospitalizations were randomly selected; for each case, the ACS diagnosis was confirmed/excluded after medical file examination by an independent events validation committee and the performance of codes, and combinations of codes, to identify ACS was evaluated by calculating the positive predictive value (PPV). Of the individual codes, I20.0, I21 and I24 had the highest PPV; 100.0% for I24 (95%CI [15.8-100.0]); 90.0% for I21 (95%CI [76.3-97.2]); and 66.7% for I20.0 (95%CI [38.4-88.2]). The combination of I20.0 or I24 codes was able to identify 12 of the 56 validated ACS cases with a PPV of 70.6% (95%CI [44.0-89.7]), the combination of I21 or I24 identified 38 cases with a PPV of 90.5% (95%CI [77.4-97.3]), the combination of I20.0 or I21 identified 46 cases with a PPV of 83.6% (95%CI [71.2-92.2]), and the combination of I20.0, I21 or I24 identified 48 cases with a PPV of 84.2% (95%CI [72.1-92.5]). The combination of I20.0, I21 or I24 codes had the best performance to identify occurrence of ACS in the French hospitalization database.

  18. Redirecting the Cyanobacterial Bicarbonate Transporters BicA and SbtA to the Chloroplast Envelope: Soluble and Membrane Cargos Need Different Chloroplast Targeting Signals in Plants

    PubMed Central

    Rolland, Vivien; Badger, Murray R.; Price, G. Dean

    2016-01-01

    Most major crops used for human consumption are C3 plants, which yields are limited by photosynthetic inefficiency. To circumvent this, it has been proposed to implement the cyanobacterial CO2-concentrating mechanism (CCM), principally consisting of bicarbonate transporters and carboxysomes, into plant chloroplasts. As it is currently not possible to recover homoplasmic transplastomic monocots, foreign genes must be introduced in these plants via nuclear transformation. Consequently, it is paramount to ensure that resulting proteins reach the appropriate sub-cellular compartment, which for cyanobacterial transporters BicA and SbtA, is the chloroplast inner-envelope membrane (IEM). At present, targeting signals to redirect large transmembrane proteins from non-chloroplastic organisms to plant chloroplast envelopes are unknown. The goal of this study was to identify such signals, using agrobacteria-mediated transient expression and confocal microscopy to determine the sub-cellular localization of ∼37 GFP-tagged chimeras. Initially, fragments of chloroplast proteins known to target soluble cargos to the stroma were tested for their ability to redirect BicA, but they proved ineffective. Next, different N-terminal regions from Arabidopsis IEM transporters were tested. We demonstrated that the N-terminus of AtHP59, AtPLGG1 or AtNTT1 (92–115 amino acids), containing a cleavable chloroplast transit peptide (cTP) and a membrane protein leader (MPL), was sufficient to redirect BicA or SbtA to the chloroplast envelope. This constitutes the first evidence that nuclear-encoded transmembrane proteins from non-chloroplastic organisms can be targeted to the envelope of plant chloroplasts; a finding which represents an important advance in chloroplast engineering by opening up the door to further manipulation of the chloroplastic envelope. PMID:26973659

  19. Maximum Likelihood Expectation-Maximization Algorithms Applied to Localization and Identification of Radioactive Sources with Recent Coded Mask Gamma Cameras

    SciTech Connect

    Lemaire, H.; Barat, E.; Carrel, F.; Dautremer, T.; Dubos, S.; Limousin, O.; Montagu, T.; Normand, S.; Schoepff, V.; Amgarou, K.; Menaa, N.; Angelique, J.-C.; Patoz, A.

    2015-07-01

    In this work, we tested Maximum likelihood expectation-maximization (MLEM) algorithms optimized for gamma imaging applications on two recent coded mask gamma cameras. We respectively took advantage of the characteristics of the GAMPIX and Caliste HD-based gamma cameras: noise reduction thanks to mask/anti-mask procedure but limited energy resolution for GAMPIX, high energy resolution for Caliste HD. One of our short-term perspectives is the test of MAPEM algorithms integrating specific prior values for the data to reconstruct adapted to the gamma imaging topic. (authors)

  20. Isolation and identification of a cDNA clone coding for an HLA-DR transplantation antigen alpha-chain.

    PubMed

    Gustafsson, K; Bill, P; Larhammar, D; Wiman, K; Claesson, L; Schenning, L; Servenius, B; Sundelin, J; Rask, L; Peterson, P A

    1982-10-01

    Membrane-bound mRNA was isolated from Raji cells and enriched for message coding for the HLA-DR transplantation antigen alpha-chain by sucrose gradient centrifugation. Double-stranded cDNA was constructed from this mRNA fraction, ligated to plasmid pBR322, and cloned into Escherichia coli. By hybrid selection, a plasmid, pDR-alpha-1, able to hybridize with mRNA coding for the HLA-DR alpha-chain was identified. From the nucleotide sequence of one end of the insert an amino acid sequence was predicted which is identical to part of the amino-terminal sequence of an HLA-DR alpha-chain preparation isolated from Raji cells. This clearly shows that pDR-alpha-1 carries almost the complete message for an HLD-DR alpha-chain. From the nucleotide sequence of this plasmid it will be possible to predict the primary structure of an HLA-DR alpha-chain.

  1. Identification of differentially expressed small non-coding RNAs in the legume endosymbiont Sinorhizobium meliloti by comparative genomics.

    PubMed

    del Val, Coral; Rivas, Elena; Torres-Quesada, Omar; Toro, Nicolás; Jiménez-Zurdo, José I

    2007-12-01

    Bacterial small non-coding RNAs (sRNAs) are being recognized as novel widespread regulators of gene expression in response to environmental signals. Here, we present the first search for sRNA-encoding genes in the nitrogen-fixing endosymbiont Sinorhizobium meliloti, performed by a genome-wide computational analysis of its intergenic regions. Comparative sequence data from eight related alpha-proteobacteria were obtained, and the interspecies pairwise alignments were scored with the programs eQRNA and RNAz as complementary predictive tools to identify conserved and stable secondary structures corresponding to putative non-coding RNAs. Northern experiments confirmed that eight of the predicted loci, selected among the original 32 candidates as most probable sRNA genes, expressed small transcripts. This result supports the combined use of eQRNA and RNAz as a robust strategy to identify novel sRNAs in bacteria. Furthermore, seven of the transcripts accumulated differentially in free-living and symbiotic conditions. Experimental mapping of the 5'-ends of the detected transcripts revealed that their encoding genes are organized in autonomous transcription units with recognizable promoter and, in most cases, termination signatures. These findings suggest novel regulatory functions for sRNAs related to the interactions of alpha-proteobacteria with their eukaryotic hosts.

  2. Identification of prognostic biomarkers in glioblastoma using a long non-coding RNA-mediated, competitive endogenous RNA network

    PubMed Central

    Cao, Yuze; Wang, Peng; Ning, Shangwei; Xiao, Wenbiao; Xiao, Bo; Li, Xia

    2016-01-01

    Glioblastoma multiforme (GBM) is a highly malignant brain tumor associated with a poor prognosis. Cross-talk between competitive endogenous RNAs (ceRNAs) plays a critical role in tumor development and physiology. In this study, we present a multi-step computational approach to construct a functional GBM long non-coding RNA (lncRNA)-mediated ceRNA network (LMCN) by integrating genome-wide lncRNA and mRNA expression profiles, miRNA-target interactions, functional analyses, and clinical survival analyses. LncRNAs in the LMCN exhibited specific topological features consistent with a regulatory association with coding mRNAs across GBM pathology. We determined that the lncRNA MCM3AP-AS was involved in RNA processing and cell cycle-related functions, and was correlated with patient survival. MCM3AP-AS and MIR17HG acted synergistically to regulate mRNAs in a network module of the competitive LMCN. By integrating the expression profile of this module into a risk model, we stratified GBM patients in both the The Cancer Genome Atlas and an independent GBM dataset into distinct risk groups. Finally, survival analyses demonstrated that the lncRNAs and network module are potential prognostic biomarkers for GBM. Thus, ceRNAs could accelerate biomarker discovery and therapeutic development in GBM. PMID:27229531

  3. Identification of coding exon 3 duplication in the BMPR1A gene in a patient with juvenile polyposis syndrome.

    PubMed

    Yamaguchi, Junya; Nagayama, Satoshi; Chino, Akiko; Sakata, Ai; Yamamoto, Noriko; Sato, Yuri; Ashihara, Yuumi; Kita, Mizuho; Nomura, Sachio; Ishikawa, Yuichi; Igarashi, Masahiro; Ueno, Masashi; Arai, Masami

    2014-10-01

    Juvenile polyposis syndrome is an autosomal dominant inherited disorder characterized by multiple juvenile polyps arising in the gastrointestinal tract and an increased risk of gastrointestinal cancers, specifically colon cancer. BMPR1A and SMAD4 germline mutations have been found in patients with juvenile polyposis syndrome. We identified a BMPR1A mutation, which involves a duplication of coding exon 3 (c.230+452_333+441dup1995), on multiple ligation dependent probe amplification in a patient with juvenile polyposis syndrome. The mutation causes a frameshift, producing a truncated protein (p.D112NfsX2). Therefore, the mutation is believed to be pathogenic. We also identified a duplication breakpoint in which Alu sequences are located. These results suggest that the duplication event resulted from recombination between Alu sequences. To our knowledge, partial duplication in the BMPR1A gene has not been reported previously. This is the first case report to document coding exon 3 duplication in the BMPR1A gene in a patient with juvenile polyposis syndrome.

  4. Mobile, hybrid Compton/coded aperture imaging for detection, identification and localization of gamma-ray sources at stand-off distances

    NASA Astrophysics Data System (ADS)

    Tornga, Shawn R.

    The Stand-off Radiation Detection System (SORDS) program is an Advanced Technology Demonstration (ATD) project through the Department of Homeland Security's Domestic Nuclear Detection Office (DNDO) with the goal of detection, identification and localization of weak radiological sources in the presence of large dynamic backgrounds. The Raytheon-SORDS Tri-Modal Imager (TMI) is a mobile truck-based, hybrid gamma-ray imaging system able to quickly detect, identify and localize, radiation sources at standoff distances through improved sensitivity while minimizing the false alarm rate. Reconstruction of gamma-ray sources is performed using a combination of two imaging modalities; coded aperture and Compton scatter imaging. The TMI consists of 35 sodium iodide (NaI) crystals 5x5x2 in3 each, arranged in a random coded aperture mask array (CA), followed by 30 position sensitive NaI bars each 24x2.5x3 in3 called the detection array (DA). The CA array acts as both a coded aperture mask and scattering detector for Compton events. The large-area DA array acts as a collection detector for both Compton scattered events and coded aperture events. In this thesis, developed coded aperture, Compton and hybrid imaging algorithms will be described along with their performance. It will be shown that multiple imaging modalities can be fused to improve detection sensitivity over a broader energy range than either alone. Since the TMI is a moving system, peripheral data, such as a Global Positioning System (GPS) and Inertial Navigation System (INS) must also be incorporated. A method of adapting static imaging algorithms to a moving platform has been developed. Also, algorithms were developed in parallel with detector hardware, through the use of extensive simulations performed with the Geometry and Tracking Toolkit v4 (GEANT4). Simulations have been well validated against measured data. Results of image reconstruction algorithms at various speeds and distances will be presented as well as

  5. Antibody-mediated complement C3b/iC3b binding to group B Streptococcus in paired mother and baby serum samples in a refugee population on the Thailand-Myanmar border.

    PubMed

    Herbert, Jenny; Thomas, Stephen; Brookes, Charlotte; Turner, Claudia; Turner, Paul; Nosten, Francois; Le Doare, Kirsty; Hudson, Michael; Heath, Paul T; Gorringe, Andrew; Taylor, Stephen

    2015-03-01

    Streptococcus agalactiae (group B streptococcus [GBS]) is the leading cause of neonatal sepsis and meningitis. In this study, we determined antibody-mediated deposition of complement C3b/iC3b onto the bacterial cell surface of GBS serotypes Ia, Ib, II, III, and V. This was determined for 520 mother and umbilical cord serum sample pairs obtained at the time of birth from a population on the Thailand-Myanmar border. Antibody-mediated deposition of complement C3b/iC3b was detected to at least one serotype in 91% of mothers, despite a known carriage rate in this population of only 12%. Antibody-mediated C3b/iC3b deposition corresponded to known carriage rates, with the highest levels of complement deposition observed onto the most prevalent serotype (serotype II) followed by serotypes Ia, III, V, and Ib. Finally, neonates born to mothers carrying serotype II GBS at the time of birth showed higher antibody-mediated C3b/iC3b deposition against serotype II GBS than neonates born to mothers with no serotype II carriage. Assessment of antibody-mediated C3b/iC3b deposition against GBS may provide insights into the seroepidemiology of anti-GBS antibodies in mothers and infants in different populations.

  6. Antibody-Mediated Complement C3b/iC3b Binding to Group B Streptococcus in Paired Mother and Baby Serum Samples in a Refugee Population on the Thailand-Myanmar Border

    PubMed Central

    Herbert, Jenny; Thomas, Stephen; Brookes, Charlotte; Turner, Claudia; Turner, Paul; Nosten, Francois; Le Doare, Kirsty; Hudson, Michael; Heath, Paul T.; Gorringe, Andrew

    2015-01-01

    Streptococcus agalactiae (group B streptococcus [GBS]) is the leading cause of neonatal sepsis and meningitis. In this study, we determined antibody-mediated deposition of complement C3b/iC3b onto the bacterial cell surface of GBS serotypes Ia, Ib, II, III, and V. This was determined for 520 mother and umbilical cord serum sample pairs obtained at the time of birth from a population on the Thailand-Myanmar border. Antibody-mediated deposition of complement C3b/iC3b was detected to at least one serotype in 91% of mothers, despite a known carriage rate in this population of only 12%. Antibody-mediated C3b/iC3b deposition corresponded to known carriage rates, with the highest levels of complement deposition observed onto the most prevalent serotype (serotype II) followed by serotypes Ia, III, V, and Ib. Finally, neonates born to mothers carrying serotype II GBS at the time of birth showed higher antibody-mediated C3b/iC3b deposition against serotype II GBS than neonates born to mothers with no serotype II carriage. Assessment of antibody-mediated C3b/iC3b deposition against GBS may provide insights into the seroepidemiology of anti-GBS antibodies in mothers and infants in different populations. PMID:25589553

  7. Perceptions of Usefulness: Using the Holland Code Theory, Multiple Intelligences Theory, and Role Model Identification to Determine a Career Niche in the Fashion Industry for First-Quarter Fashion Students

    ERIC Educational Resources Information Center

    Green, Crystal D.

    2010-01-01

    This action research study investigated the perceptions that student participants had on the development of a career exploration model and a career exploration project. The Holland code theory was the primary assessment used for this research study, in addition to the Multiple Intelligences theory and the identification of a role model for the…

  8. Genome-wide long non-coding RNA screening, identification and characterization in a model microorganism Chlamydomonas reinhardtii.

    PubMed

    Li, Hui; Wang, Yuting; Chen, Meirong; Xiao, Peng; Hu, Changxing; Zeng, Zhiyong; Wang, Chaogang; Wang, Jiangxin; Hu, Zhangli

    2016-09-23

    Microalgae are regarded as the most promising biofuel candidates and extensive metabolic engineering were conducted but very few improvements were achieved. Long non-coding RNA (lncRNA) investigation and manipulation may provide new insights for this issue. LncRNAs refer to transcripts that are longer than 200 nucleotides, do not encode proteins but play important roles in eukaryotic gene regulation. However, no information of potential lncRNAs has been reported in eukaryotic alga. Recently, we performed RNA sequencing in Chlamydomonas reinhardtii, and obtained totally 3,574 putative lncRNAs. 1440 were considered as high-confidence lncRNAs, including 936 large intergenic, 310 intronic and 194 anti-sense lncRNAs. The average transcript length, ORF length and numbers of exons for lncRNAs are much less than for genes in this green alga. In contrast with human lncRNAs of which more than 98% are spliced, the percentage in C. reinhardtii is only 48.1%. In addition, we identified 367 lncRNAs responsive to sulfur deprivation, including 36 photosynthesis-related lncRNAs. This is the first time that lncRNAs were explored in the unicellular model organism C. reinhardtii. The lncRNA data could also provide new insights into C. reinhardtii hydrogen production under sulfur deprivation.

  9. Identification and expression of small non-coding RNA, L10-Leader, in different growth phases of Streptococcus mutans.

    PubMed

    Xia, Li; Xia, Wei; Li, Shaohua; Li, Wuju; Liu, Jiaojiao; Ding, Hongmei; Li, Jie; Li, Hui; Chen, Ying; Su, Xueting; Wang, Wei; Sun, Li; Wang, Chenglong; Shao, Ningsheng; Chu, Bingfeng

    2012-06-01

    Streptococcus mutans is one of the major cariogenic bacteria in the oral environment. Small non-coding RNAs (sRNAs) play important roles in the regulation of bacterial growth, stress tolerance, and virulence. In this study, we experimentally verified the existence of sRNA, L10-Leader, in S. mutans for the first time. Our results show that the expression level of L10-Leader was growth-phase dependent in S. mutans and varied among different clinical strains of S. mutans. The level of L10-Leader in S. mutans UA159 was closely related to the pH value, but not to the concentrations of glucose and sucrose in culture medium. We predicted target mRNAs of L10-Leader bioinformatically and found that some of these mRNAs were related to growth and stress response. Five predicted mRNA targets were selected and detected by quantitative reverse transcriptase-polymerase chain reaction (qRT-PCR), and we found that the expression levels of these mRNAs were closely related to the level of L10-Leader at different growth phases of the bacteria. Our results indicate that L10-Leader may play an important role in the regulation of responses in S. mutans, especially during its growth phase and acid adaption response.

  10. Identification and characterization of an enhancer in the coding region of the genome of human immunodeficiency virus type 1.

    PubMed Central

    Verdin, E; Becker, N; Bex, F; Droogmans, L; Burny, A

    1990-01-01

    Transcription of human immunodeficiency virus type 1 (HIV-1) is regulated by cis-acting DNA elements located in the viral long terminal repeats, by viral transregulatory proteins, and by cellular transcription factors acting in concert to modulate the degree of viral expression. We demonstrate that a DNA fragment corresponding to the central portion of the HIV-1 genome exhibits enhancer activity when cloned upstream of the thymidine kinase promoter of herpes simplex virus. This enhancer is inducible by phorbol 12-myristate 13-acetate in HeLa cells and is independent of its position and orientation with respect to the promoter. We have mapped the activity of the enhancer to two independent domains encompassing nucleotides 4079-4342 (end of the pol gene) and nucleotides 4781-6026 (vif gene and first coding exon of tat). This intragenic enhancer and its subdomains demonstrate cellular specificity because they are only active in specific cell lines. The presence of similar intragenic enhancer elements in other retroviruses suggests that they might be a conserved feature of this family of viruses. Images PMID:2352955

  11. Identification of a novel human long non-coding RNA that regulates hepatic lipid metabolism by inhibiting SREBP-1c

    PubMed Central

    Li, Duan; Cheng, Min; Niu, Yuqiang; Chi, Xiaojing; Liu, Xiuying; Fan, Jingjing; Fan, Heng; Chang, Yongsheng; Yang, Wei

    2017-01-01

    Sterol regulatory element binding proteins (SREBPs) are master regulators of hepatic lipid homeostasis. Aberrant expression of SREBPs frequently leads to lipid metabolism dysregulation. Long non-coding RNAs (lncRNAs) have been identified with diverse biological functions, but the effects of lncRNAs on lipid metabolism are rarely reported. Here, we identified a novel human specific lncRNA, lncHR1, as a negative regulator of SREBP-1c expression. Overexpression of lncHR1 inhibited expression of SREBP-1c and fatty acid synthase (FAS) and then repressed oleic acid-induced hepatic cell triglyceride (TG) and lipid droplet (LD) accumulation. In vivo, the data of established transgenic animals showed that mice with lncHR1 expression had less hepatic expression of SREBP-1c, FAS, Acetyl-CoA carboxylase α (ACCα), and less hepatic and plasma TG after being fed a high-fat diet. Therefore, we report a novel lncRNA which can decrease lipid metabolism by repressing SREBP-1c gene expression. PMID:28367099

  12. Genome-wide long non-coding RNA screening, identification and characterization in a model microorganism Chlamydomonas reinhardtii

    PubMed Central

    Li, Hui; Wang, Yuting; Chen, Meirong; Xiao, Peng; Hu, Changxing; Zeng, Zhiyong; Wang, Chaogang; Wang, Jiangxin; Hu, Zhangli

    2016-01-01

    Microalgae are regarded as the most promising biofuel candidates and extensive metabolic engineering were conducted but very few improvements were achieved. Long non-coding RNA (lncRNA) investigation and manipulation may provide new insights for this issue. LncRNAs refer to transcripts that are longer than 200 nucleotides, do not encode proteins but play important roles in eukaryotic gene regulation. However, no information of potential lncRNAs has been reported in eukaryotic alga. Recently, we performed RNA sequencing in Chlamydomonas reinhardtii, and obtained totally 3,574 putative lncRNAs. 1440 were considered as high-confidence lncRNAs, including 936 large intergenic, 310 intronic and 194 anti-sense lncRNAs. The average transcript length, ORF length and numbers of exons for lncRNAs are much less than for genes in this green alga. In contrast with human lncRNAs of which more than 98% are spliced, the percentage in C. reinhardtii is only 48.1%. In addition, we identified 367 lncRNAs responsive to sulfur deprivation, including 36 photosynthesis-related lncRNAs. This is the first time that lncRNAs were explored in the unicellular model organism C. reinhardtii. The lncRNA data could also provide new insights into C. reinhardtii hydrogen production under sulfur deprivation. PMID:27659799

  13. Identification of a cell lineage-specific gene coding for a sea urchin alpha 2(IV)-like collagen chain.

    PubMed

    Exposito, J Y; Suzuki, H; Geourjon, C; Garrone, R; Solursh, M; Ramirez, F

    1994-05-06

    We report the isolation of several overlapping cDNAs from an embryonic library of Strongylocentrotus purpuratus coding for a novel sea urchin collagen chain. The conceptual amino acid translation of the cDNAs indicated that the protein displays the structural features of a vertebrate type IV-like collagen alpha chain. In addition to a putative 31-residue signal peptide, the sea urchin molecule contains a 14-residue amino-terminal non-collagenous segment, a discontinuous 1,477-amino acid triple helical domain, and a 225-residue carboxyl-terminal domain rich in cysteines. The amino- and carboxyl-terminal non-collagenous regions of the echinoid molecule are remarkably similar to the 7 S and carboxyl-terminal non-collagenous (NC1) domains of the alpha 1 and alpha 2 chains of vertebrate type IV collagen. The sequence similarity and distinct structural features of the 7 S and NC1 domains strongly suggest that the sea urchin polypeptide is evolutionarily related to the alpha 2(IV) class of collagen chains. Finally, in situ hybridizations revealed that expression of this collagen gene is restricted to the mesenchyme cell lineage of the developing sea urchin embryo.

  14. Experimental RNomics in Aquifex aeolicus: identification of small non-coding RNAs and the putative 6S RNA homolog

    PubMed Central

    Willkomm, Dagmar K.; Minnerup, Jens; Hüttenhofer, Alexander; Hartmann, Roland K.

    2005-01-01

    By an experimental RNomics approach, we have generated a cDNA library from small RNAs expressed from the genome of the hyperthermophilic bacterium Aquifex aeolicus. The library included RNAs that were antisense to mRNAs and tRNAs as well as RNAs encoded in intergenic regions. Substantial steady-state levels in A.aeolicus cells were confirmed for several of the cloned RNAs by northern blot analysis. The most abundant intergenic RNA of the library was identified as the 6S RNA homolog of A.aeolicus. Although shorter in size (150 nt) than its γ-proteobacterial homologs (∼185 nt), it is predicted to have the most stable structure among known 6S RNAs. As in the γ-proteobacteria, the A.aeolicus 6S RNA gene (ssrS) is located immediately upstream of the ygfA gene encoding a widely conserved 5-formyltetrahydrofolate cyclo-ligase. We identifed novel 6S RNA candidates within the γ-proteobacteria but were unable to identify reasonable 6S RNA candidates in other bacterial branches, utilizing mfold analyses of the region immediately upstream of ygfA combined with 6S RNA blastn searches. By RACE experiments, we mapped the major transcription initiation site of A.aeolicus 6S RNA primary transcripts, located within the pheT gene preceding ygfA, as well as three processing sites. PMID:15814812

  15. Identification and characterization of three Vibrio alginolyticus non-coding RNAs involved in adhesion, chemotaxis, and motility processes.

    PubMed

    Huang, Lixing; Hu, Jiao; Su, Yongquan; Qin, Yingxue; Kong, Wendi; Ma, Ying; Xu, Xiaojin; Lin, Mao; Yan, Qingpi

    2015-01-01

    The capability of Vibrio alginolyticus to adhere to fish mucus is a key virulence factor of the bacteria. Our previous research showed that stress conditions, such as Cu(2+), Pb(2+), Hg(2+), and low pH, can reduce this adhesion ability. Non-coding (nc) RNAs play a crucial role in regulating bacterial gene expression, affecting the bacteria's pathogenicity. To investigate the mechanism(s) underlying the decline in adhesion ability caused by stressors, we combined high-throughput sequencing with computational techniques to detect stressed ncRNA dynamics. These approaches yielded three commonly altered ncRNAs that are predicted to regulate the bacterial chemotaxis pathway, which plays a key role in the adhesion process of bacteria. We hypothesized they play a key role in the adhesion process of V. alginolyticus. In this study, we validated the effects of these three ncRNAs on their predicted target genes and their role in the V. alginolyticus adhesion process with RNA interference (i), quantitative real-time polymerase chain reaction (qPCR), northern blot, capillary assay, and in vitro adhesion assays. The expression of these ncRNAs and their predicted target genes were confirmed by qPCR and northern blot, which reinforced the reliability of the sequencing data and the target prediction. Overexpression of these ncRNAs was capable of reducing the chemotactic and adhesion ability of V. alginolyticus, and the expression levels of their target genes were also significantly reduced. Our results indicated that these three ncRNAs: (1) are able to regulate the bacterial chemotaxis pathway, and (2) play a key role in the adhesion process of V. alginolyticus.

  16. Identification and characterization of three Vibrio alginolyticus non-coding RNAs involved in adhesion, chemotaxis, and motility processes

    PubMed Central

    Huang, Lixing; Hu, Jiao; Su, Yongquan; Qin, Yingxue; Kong, Wendi; Ma, Ying; Xu, Xiaojin; Lin, Mao; Yan, Qingpi

    2015-01-01

    The capability of Vibrio alginolyticus to adhere to fish mucus is a key virulence factor of the bacteria. Our previous research showed that stress conditions, such as Cu2+, Pb2+, Hg2+, and low pH, can reduce this adhesion ability. Non-coding (nc) RNAs play a crucial role in regulating bacterial gene expression, affecting the bacteria's pathogenicity. To investigate the mechanism(s) underlying the decline in adhesion ability caused by stressors, we combined high-throughput sequencing with computational techniques to detect stressed ncRNA dynamics. These approaches yielded three commonly altered ncRNAs that are predicted to regulate the bacterial chemotaxis pathway, which plays a key role in the adhesion process of bacteria. We hypothesized they play a key role in the adhesion process of V. alginolyticus. In this study, we validated the effects of these three ncRNAs on their predicted target genes and their role in the V. alginolyticus adhesion process with RNA interference (i), quantitative real-time polymerase chain reaction (qPCR), northern blot, capillary assay, and in vitro adhesion assays. The expression of these ncRNAs and their predicted target genes were confirmed by qPCR and northern blot, which reinforced the reliability of the sequencing data and the target prediction. Overexpression of these ncRNAs was capable of reducing the chemotactic and adhesion ability of V. alginolyticus, and the expression levels of their target genes were also significantly reduced. Our results indicated that these three ncRNAs: (1) are able to regulate the bacterial chemotaxis pathway, and (2) play a key role in the adhesion process of V. alginolyticus. PMID:26217589

  17. Identification of the long non‑coding RNA LET as a novel tumor suppressor in gastric cancer.

    PubMed

    Tian, Jingjing; Hu, Xibao; Gao, Wei; Zhang, Jie; Chen, Ming; Zhang, Xinrong; Ma, Junhong; Yuan, Hongxia

    2017-04-01

    Long non-coding RNAs (lncRNAs) have emerged recently as important factors in regulating fundamental biological processes. Alterations in the expression and function of lncRNAs have been observed to promote tumor formation, progression and metastasis. Although downregulation of the expression levels of LET lncRNA in several tumors has been reported, its role in gastric cancer remains unknown. The aim of the present study was to investigate the expression and function of LET in gastric cancer development. The expression levels of LET in 37 pairs of gastric cancer and adjacent non‑tumor tissues were detected by reverse transcription‑quantitative polymerase chain reaction (RT‑qPCR). In addition, LET expression in gastric cancer cell lines was analyzed by RT‑qPCR assay analysis. Furthermore, the impact of LET on cell proliferation, migration and apoptosis were detected using the cell counting kit‑8, wound scratch and ELISA assays, respectively. The results demonstrated that the expression level of LET was downregulated in gastric cancer tissues and cell lines (SGC‑7901 and MGC‑803) compared with normal tissues and a normal human gastric epithelial cell line (GES‑1). Restoration of LET expression using a synthesized recombinant overexpression vector transfected into SGC‑7901 and MGC‑803 cells, significantly inhibited cell proliferation and migration, and promoted cell apoptosis in vitro. The present study is the first to demonstrate that LET may function as a tumor suppressor in gastric cancer. The results indicate that LET may be a promising biomarker and/or a therapeutic target for gastric cancer.

  18. Identification of a RNA-Seq Based 8-Long Non-Coding RNA Signature Predicting Survival in Esophageal Cancer

    PubMed Central

    Fan, Qiaowei; Liu, Bingrong

    2016-01-01

    Background Accumulating evidence suggests the involvement of long non-coding RNAs (lncRNAs) as oncogenic or tumor suppressive regulators in the development of various cancers. In the present study, we aimed to identify a lncRNA signature based on RNA sequencing (RNA-seq) data to predict survival in esophageal cancer. Material/Methods The RNA-seq lncRNA expression data and clinical information were downloaded from The Cancer Genome Atlas (TCGA) database. Differentially expressed lncRNAs were screened out between esophageal cancer and normal tissues. Univariate and multivariate Cox regression analysis were performed to establish a lncRNA-related prognostic model. Receiver operating characteristic (ROC) analysis was conducted to test the sensitivity and specificity of the model. GO (gene ontology) functional and KEGG pathway enrichment analyses were performed for mRNAs co-expressed with the lncRNAs to explore the potential functions of the prognostic lncRNAs. Results A total of 265 differentially expressed lncRNAs were identified between esophageal cancer and normal tissues. After univariate and multivariate Cox regression analysis, eight lncRNAs (GS1-600G8.5, LINC00365, CTD-2357A8.3, RP11-705O24.1, LINC01554, RP1-90J4.1, RP11-327J17.1, and LINC00176) were finally screened out to establish a predictive model by which patients could be classified into high-risk and low-risk groups with significantly different overall survival. Further analysis indicated independent prognostic capability of the 8-lncRNA signature from other clinicopathological factors. ROC curve analysis demonstrated good performance of the 8-lncRNA signature. Functional enrichment analysis showed that the prognostic lncRNAs were mainly associated with esophageal cancer related biological processes such as regulation of glucose metabolic process and amino acid and lipids metabolism. Conclusions Our study developed a novel candidate model providing additional and more powerful prognostic information

  19. Polar Codes

    DTIC Science & Technology

    2014-12-01

    density parity check (LDPC) code, a Reed–Solomon code, and three convolutional codes. iii CONTENTS EXECUTIVE SUMMARY...the most common. Many civilian systems use low density parity check (LDPC) FEC codes, and the Navy is planning to use LDPC for some future systems...other forward error correction methods: a turbo code, a low density parity check (LDPC) code, a Reed–Solomon code, and three convolutional codes

  20. Metal-ferroelectric-metal capacitor based persistent memory for electronic product code class-1 generation-2 uhf passive radio-frequency identification tag

    NASA Astrophysics Data System (ADS)

    Yoon, Bongno; Sung, Man Young; Yeon, Sujin; Oh, Hyun S.; Kwon, Yoonjoo; Kim, Chuljin; Kim, Kyung-Ho

    2009-03-01

    With the circuits using metal-ferroelectric-metal (MFM) capacitor, rf operational signal properties are almost the same or superior to those of polysilicon-insulator-polysilicon, metal-insulator-metal, and metal-oxide-semiconductor (MOS) capacitors. In electronic product code global class-1 generation-2 uhf radio-frequency identification (RFID) protocols, the MFM can play a crucial role in satisfying the specifications of the inventoried flag's persistence times (Tpt) for each session (S0-S3, SL). In this paper, we propose and design a new MFM capacitor based memory scheme of which persistence time for S1 flag is measured at 2.2 s as well as indefinite for S2, S3, and SL flags during the period of power-on. A ferroelectric random access memory embedded RFID tag chip is fabricated with an industry-standard complementary MOS process. The chip size is around 500×500 μm2 and the measured power consumption is about 10 μW.

  1. Clinical coding. Code breakers.

    PubMed

    Mathieson, Steve

    2005-02-24

    --The advent of payment by results has seen the role of the clinical coder pushed to the fore in England. --Examinations for a clinical coding qualification began in 1999. In 2004, approximately 200 people took the qualification. --Trusts are attracting people to the role by offering training from scratch or through modern apprenticeships.

  2. BOOK REVIEW: Gravitation: Following the Prague Inspiration A Volume in Celebration of the 60th Birthday of Jiri Bicák

    NASA Astrophysics Data System (ADS)

    Semerák, O.; Podolsky, J.; Zofka, M.

    2003-10-01

    To a relativist, a time period equivalent to that of 60 orbits of the Earth around the Sun, or 5.676438379482·1019 cm of proper time, may not sound particularly significant. Yet, in our human society, it gives us the opportunity of honouring those we love and respect. Such was the occasion for the publication of this volume in honour of Professor Jiri Bicák of the Institute of Theoretical Physics at Charles University in Prague - a city in which Tycho Brahe and Kepler worked together, and where Einstein struggled to construct his general theory of relativity. An appropriate, but unusual, celebratory event which was organized on the relevant January evening involved an intersection of interesting time-shifted worldlines. A record of this is available at http://astro.troja.mff.cuni.cz/bicak/, which may help in comprehending the preface. Our purpose here, however, is to comment on the more permanent item that was produced for the occasion. It must immediately be stated that this is not a typical festschrift in which leading authorities around the world contribute articles dedicated to an academic colleague. It was a surprise present from past research students to their teacher. It maintains the character of a personal tribute but, basically, the contributions are research papers of the highest quality. The result is a very valuable academic reference. As Bicák would have wanted, this is a substantial contribution to objective science, not a piece of post-modern sentimentalism. Reflecting Bicák's own wide interests, the different contributions to this volume cover specific topics in general relativity, astrophysics, theoretical physics and cosmology. They include original articles and thorough up-to-date reviews. In all cases, detailed mathematical or computational analysis is guided by requirements of physical significance. The first paper is by Dolezel on observations from within slowly rotating voids in cosmological models and their compatibility with Mach

  3. Identification of an ortholog of the eukaryotic RNA polymerase III subunit RPC34 in Crenarchaeota and Thaumarchaeota suggests specialization of RNA polymerases for coding and non-coding RNAs in Archaea

    PubMed Central

    Blombach, Fabian; Makarova, Kira S; Marrero, Jeannette; Siebers, Bettina; Koonin, Eugene V; Oost, John van der

    2009-01-01

    One of the hallmarks of eukaryotic information processing is the co-existence of 3 distinct, multi-subunit RNA polymerase complexes that are dedicated to the transcription of specific classes of coding or non-coding RNAs. Archaea encode only one RNA polymerase that resembles the eukaryotic RNA polymerase II with respect to the subunit composition. Here we identify archaeal orthologs of the eukaryotic RNA polymerase III subunit RPC34. Genome context analysis supports a function of this archaeal protein in the transcription of non-coding RNAs. These findings suggest that functional separation of RNA polymerases for protein-coding genes and non-coding RNAs might predate the origin of the Eukaryotes. Reviewers: This article was reviewed by Andrei Osterman and Patrick Forterre (nominated by Purificación López-García) PMID:19828044

  4. Identification of an ortholog of the eukaryotic RNA polymerase III subunit RPC34 in Crenarchaeota and Thaumarchaeota suggests specialization of RNA polymerases for coding and non-coding RNAs in Archaea.

    PubMed

    Blombach, Fabian; Makarova, Kira S; Marrero, Jeannette; Siebers, Bettina; Koonin, Eugene V; van der Oost, John

    2009-10-14

    One of the hallmarks of eukaryotic information processing is the co-existence of 3 distinct, multi-subunit RNA polymerase complexes that are dedicated to the transcription of specific classes of coding or non-coding RNAs. Archaea encode only one RNA polymerase that resembles the eukaryotic RNA polymerase II with respect to the subunit composition. Here we identify archaeal orthologs of the eukaryotic RNA polymerase III subunit RPC34. Genome context analysis supports a function of this archaeal protein in the transcription of non-coding RNAs. These findings suggest that functional separation of RNA polymerases for protein-coding genes and non-coding RNAs might predate the origin of the Eukaryotes.

  5. Binary coding for hyperspectral imagery

    NASA Astrophysics Data System (ADS)

    Wang, Jing; Chang, Chein-I.; Chang, Chein-Chi; Lin, Chinsu

    2004-10-01

    Binary coding is one of simplest ways to characterize spectral features. One commonly used method is a binary coding-based image software system, called Spectral Analysis Manager (SPAM) for remotely sensed imagery developed by Mazer et al. For a given spectral signature, the SPAM calculates its spectral mean and inter-band spectral difference and uses them as thresholds to generate a binary code word for this particular spectral signature. Such coding scheme is generally effective and also very simple to implement. This paper revisits the SPAM and further develops three new SPAM-based binary coding methods, called equal probability partition (EPP) binary coding, halfway partition (HP) binary coding and median partition (MP) binary coding. These three binary coding methods along with the SPAM well be evaluated for spectral discrimination and identification. In doing so, a new criterion, called a posteriori discrimination probability (APDP) is also introduced for performance measure.

  6. Phonological coding during reading

    PubMed Central

    Leinenger, Mallorie

    2014-01-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early (pre-lexical) or that phonological codes come online late (post-lexical)) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eyetracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model (Van Order, 1987), dual-route model (e.g., Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001), parallel distributed processing model (Seidenberg & McClelland, 1989)) are discussed. PMID:25150679

  7. Ethical coding.

    PubMed

    Resnik, Barry I

    2009-01-01

    It is ethical, legal, and proper for a dermatologist to maximize income through proper coding of patient encounters and procedures. The overzealous physician can misinterpret reimbursement requirements or receive bad advice from other physicians and cross the line from aggressive coding to coding fraud. Several of the more common problem areas are discussed.

  8. Identification and Functional Characterization of G6PC2 Coding Variants Influencing Glycemic Traits Define an Effector Transcript at the G6PC2-ABCB11 Locus

    PubMed Central

    Mahajan, Anubha; Sim, Xueling; Ng, Hui Jin; Manning, Alisa; Rivas, Manuel A.; Highland, Heather M.; Locke, Adam E.; Grarup, Niels; Im, Hae Kyung; Cingolani, Pablo; Flannick, Jason; Fontanillas, Pierre; Fuchsberger, Christian; Gaulton, Kyle J.; Teslovich, Tanya M.; Rayner, N. William; Robertson, Neil R.; Beer, Nicola L.; Rundle, Jana K.; Bork-Jensen, Jette; Ladenvall, Claes; Blancher, Christine; Buck, David; Buck, Gemma; Burtt, Noël P.; Gabriel, Stacey; Gjesing, Anette P.; Groves, Christopher J.; Hollensted, Mette; Huyghe, Jeroen R.; Jackson, Anne U.; Jun, Goo; Justesen, Johanne Marie; Mangino, Massimo; Murphy, Jacquelyn; Neville, Matt; Onofrio, Robert; Small, Kerrin S.; Stringham, Heather M.; Syvänen, Ann-Christine; Trakalo, Joseph; Abecasis, Goncalo; Bell, Graeme I.; Blangero, John; Cox, Nancy J.; Duggirala, Ravindranath; Hanis, Craig L.; Seielstad, Mark; Wilson, James G.; Christensen, Cramer; Brandslund, Ivan; Rauramaa, Rainer; Surdulescu, Gabriela L.; Doney, Alex S. F.; Lannfelt, Lars; Linneberg, Allan; Isomaa, Bo; Tuomi, Tiinamaija; Jørgensen, Marit E.; Jørgensen, Torben; Kuusisto, Johanna; Uusitupa, Matti; Salomaa, Veikko; Spector, Timothy D.; Morris, Andrew D.; Palmer, Colin N. A.; Collins, Francis S.; Mohlke, Karen L.; Bergman, Richard N.; Ingelsson, Erik; Lind, Lars; Tuomilehto, Jaakko; Hansen, Torben; Watanabe, Richard M.; Prokopenko, Inga; Dupuis, Josee; Karpe, Fredrik; Groop, Leif; Laakso, Markku; Pedersen, Oluf; Florez, Jose C.; Morris, Andrew P.; Altshuler, David; Meigs, James B.; Boehnke, Michael; McCarthy, Mark I.; Lindgren, Cecilia M.; Gloyn, Anna L.

    2015-01-01

    Genome wide association studies (GWAS) for fasting glucose (FG) and insulin (FI) have identified common variant signals which explain 4.8% and 1.2% of trait variance, respectively. It is hypothesized that low-frequency and rare variants could contribute substantially to unexplained genetic variance. To test this, we analyzed exome-array data from up to 33,231 non-diabetic individuals of European ancestry. We found exome-wide significant (P<5×10-7) evidence for two loci not previously highlighted by common variant GWAS: GLP1R (p.Ala316Thr, minor allele frequency (MAF)=1.5%) influencing FG levels, and URB2 (p.Glu594Val, MAF = 0.1%) influencing FI levels. Coding variant associations can highlight potential effector genes at (non-coding) GWAS signals. At the G6PC2/ABCB11 locus, we identified multiple coding variants in G6PC2 (p.Val219Leu, p.His177Tyr, and p.Tyr207Ser) influencing FG levels, conditionally independent of each other and the non-coding GWAS signal. In vitro assays demonstrate that these associated coding alleles result in reduced protein abundance via proteasomal degradation, establishing G6PC2 as an effector gene at this locus. Reconciliation of single-variant associations and functional effects was only possible when haplotype phase was considered. In contrast to earlier reports suggesting that, paradoxically, glucose-raising alleles at this locus are protective against type 2 diabetes (T2D), the p.Val219Leu G6PC2 variant displayed a modest but directionally consistent association with T2D risk. Coding variant associations for glycemic traits in GWAS signals highlight PCSK1, RREB1, and ZHX3 as likely effector transcripts. These coding variant association signals do not have a major impact on the trait variance explained, but they do provide valuable biological insights. PMID:25625282

  9. Sharing code.

    PubMed

    Kubilius, Jonas

    2014-01-01

    Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  10. CADD score has limited clinical validity for the identification of pathogenic variants in non-coding regions in a hereditary cancer panel

    PubMed Central

    Mather, Cheryl A; Mooney, Sean D; Salipante, Stephen J; Scroggins, Sheena; Wu, David; Pritchard, Colin C; Shirts, Brian H

    2016-01-01

    PURPOSE Several in silico tools have been shown to have reasonable research sensitivity and specificity for classifying sequence variants in coding regions. The recently-developed Combined Annotation Dependent Depletion (CADD) method generates predictive scores for single nucleotide variants (SNVs) in all areas of the genome, including non-coding regions. We sought to determine the clinical validity of non-coding variant CADD scores. METHODS We evaluated 12,391 unique SNVs in 624 patient samples submitted for germline mutation testing in a cancer-related gene panel. We compared the distributions of CADD scores of rare SNVs, common SNVs in our patient population, and the null distribution of all possible SNVs stratifying by genomic region. RESULTS The median CADD scores of intronic and nonsynonymous variants were significantly different between rare and common SNVs (p<0.0001). Despite these different distributions, no individual variants could be identified as plausibly causative among rare intronic variants with the highest scores. The ROC AUC for non-coding variants is modest, and the positive predictive value of CADD for intronic variants in panel testing was found to be 0.088. CONCLUSION Focused in-silico scoring systems with much higher predictive value will be necessary for clinical genomic applications. PMID:27148939

  11. Characterization of the DNF15S2locus on human chromosome 3: Identification of a gene coding for four kringle domains with homology to hepatocytes growth factor

    SciTech Connect

    Han, Su; Stuart, L.A.; Degen, S.J.F. )

    1991-10-08

    A human genomic DNA library was screened by using conditions of reduced stringency with a bovine cDNA probe coding for the kringle domains in prothrombin in order to isolate the human prothrombin gene. Twelve positives were identified, three of which coded for prothrombin. Phage L5 was characterized in more detail because of its strong hybridization to the cDNA probe and its unique restriction map compare to the gene coding for human prothrombin. The gene in L5 was sequenced and found to code for a kringle-containing protein. A human liver cDNA library was screened by using a genomic probe from the gene in L5. cDNAs were isolated that contained sequence identical with regions in the gene in L5. Comparison of the cDNA with the gene indicated that the gene in L5 was composed of 18 exons separated by 17 intervening sequences and is 4,690 bp in length. The putative protein encoded by the gene in L5 contains four kringle domains followed by a serine protease-like domain. The authors propose that the putative L5 protein be tentatively called HGF-like protein until a function is identified. The DNA sequence of the gene and cDNA and its translated amino acid sequence were compared against GenBank and NBRF databases. The DNF15S2 locus has been proposed to code for one or more tumor suppressor genes since this locus is deleted in DNA from small cell lung carcinoma, other lung cancers, renal cell carcinoma, and von Hippel-Lindau syndrome.

  12. Identification of novel non-coding RNA-based negative feedback regulating the expression of the oncogenic transcription factor GLI1.

    PubMed

    Villegas, Victoria E; Rahman, Mohammed Ferdous-Ur; Fernandez-Barrena, Maite G; Diao, Yumei; Liapi, Eleni; Sonkoly, Enikö; Ståhle, Mona; Pivarcsi, Andor; Annaratone, Laura; Sapino, Anna; Ramírez Clavijo, Sandra; Bürglin, Thomas R; Shimokawa, Takashi; Ramachandran, Saraswathi; Kapranov, Philipp; Fernandez-Zapico, Martin E; Zaphiropoulos, Peter G

    2014-07-01

    Non-coding RNAs are a complex class of nucleic acids, with growing evidence supporting regulatory roles in gene expression. Here we identify a non-coding RNA located head-to-head with the gene encoding the Glioma-associated oncogene 1 (GLI1), a transcriptional effector of multiple cancer-associated signaling pathways. The expression of this three-exon GLI1 antisense (GLI1AS) RNA in cancer cells was concordant with GLI1 levels. siRNAs knockdown of GLI1AS up-regulated GLI1 and increased cellular proliferation and tumor growth in a xenograft model system. Conversely, GLI1AS overexpression decreased the levels of GLI1, its target genes PTCH1 and PTCH2, and cellular proliferation. Additionally, we demonstrate that GLI1 knockdown reduced GLI1AS, while GLI1 overexpression increased GLI1AS, supporting the role of GLI1AS as a target gene of the GLI1 transcription factor. Activation of TGFβ and Hedgehog signaling, two known regulators of GLI1 expression, conferred a concordant up-regulation of GLI1 and GLI1AS in cancer cells. Finally, analysis of the mechanism underlying the interplay between GLI1 and GLI1AS indicates that the non-coding RNA elicits a local alteration of chromatin structure by increasing the silencing mark H3K27me3 and decreasing the recruitment of RNA polymerase II to this locus. Taken together, the data demonstrate the existence of a novel non-coding RNA-based negative feedback loop controlling GLI1 levels, thus expanding the repertoire of mechanisms regulating the expression of this oncogenic transcription factor.

  13. In Silico identification and annotation of non-coding RNAs by RNA-seq and De Novo assembly of the transcriptome of Tomato Fruits

    PubMed Central

    Scarano, Daria; Rao, Rosa; Corrado, Giandomenico

    2017-01-01

    The complexity of the tomato (Solanum lycopersicum) transcriptome has not yet been fully elucidated. To gain insights into the diversity and features of coding and non-coding RNA molecules of tomato fruits, we generated strand-specific libraries from berries of two tomato cultivars grown in two open-field conditions with different soil type. Following high-throughput Illumina RNA-sequencing (RNA-seq), more than 90% of the reads (over one billion, derived from twelve dataset) were aligned to the tomato reference genome. We report a comprehensive analysis of the transcriptome, improved with 39,095 transcripts, which reveals previously unannotated novel transcripts, natural antisense transcripts, long non-coding RNAs and alternative splicing variants. In addition, we investigated the sequence variants between the cultivars under investigation to highlight their genetic difference. Our strand-specific analysis allowed us to expand the current tomato transcriptome annotation and it is the first to reveal the complexity of the poly-adenylated RNA world in tomato. Moreover, our work demonstrates the usefulness of strand specific RNA-seq approach for the transcriptome-based genome annotation and provides a resource valuable for further functional studies. PMID:28187155

  14. Improvement of genome assembly completeness and identification of novel full-length protein-coding genes by RNA-seq in the giant panda genome

    PubMed Central

    Chen, Meili; Hu, Yibo; Liu, Jingxing; Wu, Qi; Zhang, Chenglin; Yu, Jun; Xiao, Jingfa; Wei, Fuwen; Wu, Jiayan

    2015-01-01

    High-quality and complete gene models are the basis of whole genome analyses. The giant panda (Ailuropoda melanoleuca) genome was the first genome sequenced on the basis of solely short reads, but the genome annotation had lacked the support of transcriptomic evidence. In this study, we applied RNA-seq to globally improve the genome assembly completeness and to detect novel expressed transcripts in 12 tissues from giant pandas, by using a transcriptome reconstruction strategy that combined reference-based and de novo methods. Several aspects of genome assembly completeness in the transcribed regions were effectively improved by the de novo assembled transcripts, including genome scaffolding, the detection of small-size assembly errors, the extension of scaffold/contig boundaries, and gap closure. Through expression and homology validation, we detected three groups of novel full-length protein-coding genes. A total of 12.62% of the novel protein-coding genes were validated by proteomic data. GO annotation analysis showed that some of the novel protein-coding genes were involved in pigmentation, anatomical structure formation and reproduction, which might be related to the development and evolution of the black-white pelage, pseudo-thumb and delayed embryonic implantation of giant pandas. The updated genome annotation will help further giant panda studies from both structural and functional perspectives. PMID:26658305

  15. Improvement of genome assembly completeness and identification of novel full-length protein-coding genes by RNA-seq in the giant panda genome.

    PubMed

    Chen, Meili; Hu, Yibo; Liu, Jingxing; Wu, Qi; Zhang, Chenglin; Yu, Jun; Xiao, Jingfa; Wei, Fuwen; Wu, Jiayan

    2015-12-11

    High-quality and complete gene models are the basis of whole genome analyses. The giant panda (Ailuropoda melanoleuca) genome was the first genome sequenced on the basis of solely short reads, but the genome annotation had lacked the support of transcriptomic evidence. In this study, we applied RNA-seq to globally improve the genome assembly completeness and to detect novel expressed transcripts in 12 tissues from giant pandas, by using a transcriptome reconstruction strategy that combined reference-based and de novo methods. Several aspects of genome assembly completeness in the transcribed regions were effectively improved by the de novo assembled transcripts, including genome scaffolding, the detection of small-size assembly errors, the extension of scaffold/contig boundaries, and gap closure. Through expression and homology validation, we detected three groups of novel full-length protein-coding genes. A total of 12.62% of the novel protein-coding genes were validated by proteomic data. GO annotation analysis showed that some of the novel protein-coding genes were involved in pigmentation, anatomical structure formation and reproduction, which might be related to the development and evolution of the black-white pelage, pseudo-thumb and delayed embryonic implantation of giant pandas. The updated genome annotation will help further giant panda studies from both structural and functional perspectives.

  16. NemaFootPrinter: a web based software for the identification of conserved non-coding genome sequence regions between C. elegans and C. briggsae

    PubMed Central

    Rambaldi, Davide; Guffanti, Alessandro; Morandi, Paolo; Cassata, Giuseppe

    2005-01-01

    Background NemaFootPrinter (Nematode Transcription Factor Scan Through Philogenetic Footprinting) is a web-based software for interactive identification of conserved, non-exonic DNA segments in the genomes of C. elegans and C. briggsae. It has been implemented according to the following project specifications: a) Automated identification of orthologous gene pairs. b) Interactive selection of the boundaries of the genes to be compared. c) Pairwise sequence comparison with a range of different methods. d) Identification of putative transcription factor binding sites on conserved, non-exonic DNA segments. Results Starting from a C. elegans or C. briggsae gene name or identifier, the software identifies the putative ortholog (if any), based on information derived from public nematode genome annotation databases. The investigator can then retrieve the genome DNA sequences of the two orthologous genes; visualize graphically the genes' intron/exon structure and the surrounding DNA regions; select, through an interactive graphical user interface, subsequences of the two gene regions. Using a bioinformatics toolbox (Blast2seq, Dotmatcher, Ssearch and connection to the rVista database) the investigator is able at the end of the procedure to identify and analyze significant sequences similarities, detecting the presence of transcription factor binding sites corresponding to the conserved segments. The software automatically masks exons. Discussion This software is intended as a practical and intuitive tool for the researchers interested in the identification of non-exonic conserved sequence segments between C. elegans and C. briggsae. These sequences may contain regulatory transcriptional elements since they are conserved between two related, but rapidly evolving genomes. This software also highlights the power of genome annotation databases when they are conceived as an open resource and the possibilities offered by seamless integration of different web services via the http

  17. Identification of a cDNA clone that contains the complete coding sequence for a 140-kD rat NCAM polypeptide

    PubMed Central

    1987-01-01

    Neural cell adhesion molecules (NCAMs) are cell surface glycoproteins that appear to mediate cell-cell adhesion. In vertebrates NCAMs exist in at least three different polypeptide forms of apparent molecular masses 180, 140, and 120 kD. The 180- and 140-kD forms span the plasma membrane whereas the 120-kD form lacks a transmembrane region. In this study, we report the isolation of NCAM clones from an adult rat brain cDNA library. Sequence analysis indicated that the longest isolate, pR18, contains a 2,574 nucleotide open reading frame flanked by 208 bases of 5' and 409 bases of 3' untranslated sequence. The predicted polypeptide encoded by clone pR18 contains a single membrane-spanning region and a small cytoplasmic domain (120 amino acids), suggesting that it codes for a full-length 140-kD NCAM form. In Northern analysis, probes derived from 5' sequences of pR18, which presumably code for extracellular portions of the molecule hybridized to five discrete mRNA size classes (7.4, 6.7, 5.2, 4.3, and 2.9 kb) in adult rat brain but not to liver or muscle RNA. However, the 5.2- and 2.9-kb mRNA size classes did not hybridize to either a large restriction fragment or three oligonucleotides derived from the putative transmembrane coding region and regions that lie 3' to it. The 3' probes did hybridize to the 7.4-, 6.7-, and 4.3-kb message size classes. These combined results indicate that clone pR18 is derived from either the 7.4-, 6.7-, or 4.3- kb adult rat brain RNA size class. Comparison with chicken and mouse NCAM cDNA sequences suggests that pR18 represents the amino acid coding region of the 6.7- or 4.3-kb mRNA. The isolation of pR18, the first cDNA that contains the complete coding sequence of an NCAM polypeptide, unambiguously demonstrates the predicted linear amino acid sequence of this probable rat 140-kD polypeptide. This cDNA also contains a 30-base pair segment not found in NCAM cDNAs isolated from other species. The significance of this segment and other

  18. Sharing code

    PubMed Central

    Kubilius, Jonas

    2014-01-01

    Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing. PMID:25165519

  19. Identification of Potential Key Long Non-Coding RNAs and Target Genes Associated with Pneumonia Using Long Non-Coding RNA Sequencing (lncRNA-Seq): A Preliminary Study

    PubMed Central

    Huang, Sai; Feng, Cong; Chen, Li; Huang, Zhi; Zhou, Xuan; Li, Bei; Wang, Li-li; Chen, Wei; Lv, Fa-qin; Li, Tan-shi

    2016-01-01

    Background This study aimed to identify the potential key long non-coding RNAs (lncRNAs) and target genes associated with pneumonia using lncRNA sequencing (lncRNA-seq). Material/Methods A total of 9 peripheral blood samples from patients with mild pneumonia (n=3) and severe pneumonia (n=3), as well as volunteers without pneumonia (n=3), were received for lncRNA-seq. Based on the sequencing data, differentially expressed lncRNAs (DE-lncRNAs) were identified by the limma package. After the functional enrichment analysis, target genes of DE-lncRNAs were predicted, and the regulatory network was constructed. Results In total, 99 DE-lncRNAs (14 upregulated and 85 downregulated ones) were identified in the mild pneumonia group and 85 (72 upregulated and 13 downregulated ones) in the severe pneumonia group, compared with the control group. Among these DE-lncRNAs, 9 lncRNAs were upregulated in both the mild and severe pneumonia groups. A set of 868 genes were predicted to be targeted by these 9 DE-lncRNAs. In the network, RP11-248E9.5 and RP11-456D7.1 targeted the majority of genes. RP11-248E9.5 regulated several genes together with CTD-2300H10.2, such as QRFP and EPS8. Both upregulated RP11-456D7.1 and RP11-96C23.9 regulated several genes, such as PDK2. RP11-456D7.1 also positively regulated CCL21. Conclusions These novel lncRNAs and their target genes may be closely associated with the progression of pneumonia. PMID:27663962

  20. Identification of circulating long non-coding RNA GAS5 as a potential biomarker for non-small cell lung cancer diagnosisnon-small cell lung cancer, long non-coding RNA, plasma, GAS5, biomarker.

    PubMed

    Tan, Qian; Zuo, Jiangcheng; Qiu, Shili; Yu, Yalan; Zhou, Hu; Li, Nandi; Wang, Hui; Liang, Chunzi; Yu, Mingxia; Tu, Jiancheng

    2017-05-01

    Non-small cell lung cancer (NSCLC) is one of the most malignant cancers in the world. Early diagnosis of NSCLC has become especially important for patient treatment and prognosis. Increasing evidence suggest that long non-coding RNA GAS5 plays vital roles in cancer proliferation and differentiation in NSCLC. However, its clinical value in the diagnosis of NSCLC is unclear. The objective of this study was to evaluate the importance of circulating GAS5 as a biomarker for NSCLC diagnosis. In our study, quantitative real-time PCR (QRT-PCR) was applied to detect the GAS5 expression level in 80 pairs of cancer tissues and 57 pairs of plasma samples of NSCLC patients. Further analysis was performed to study the differential expression of circulating GAS5 in 111 NSCLC patients and 78 healthy controls in our study. The results showed that GAS5 decreased in NSCLC tissues compared to noncancerous tissues (P<0.001). Furthermore, the GAS5 expression level was statistically declined in early stage of NSCLC before surgery compared with healthy controls (P<0.05) and sharply increased in postoperative groups (P=0.026). ROC curve analysis for early stage of NSCLC with the combination of GAS5, CEA and CA199 showed that the area under the ROC curve (AUC) was 0.734 (95% CI, 0.628‑0.839; P<0.0005). In conclusion, circulating GAS5 could be functioned as a potential combined biomarker for screening NSCLC and patient monitoring after surgical treatment.

  1. Identification of an androgen-repressed mRNA in rat ventral prostate as coding for sulphated glycoprotein 2 by cDNA cloning and sequence analysis.

    PubMed Central

    Bettuzzi, S; Hiipakka, R A; Gilna, P; Liao, S T

    1989-01-01

    The concentrations of a small number of mRNAs in the rat ventral prostate increase after castration and then decrease upon androgen treatment. Since the repression of specific gene expression may be important in the regulation of organ growth, we have cloned a cDNA for an androgen-repressed mRNA, the concentration of which increased 17-fold 4 days after castration, and this increase was reversed rapidly by androgen treatment. By sequence analysis the androgen-repressed mRNA was identified as that coding for sulphated glycoprotein 2. Images Fig. 1. PMID:2920020

  2. Speech coding

    SciTech Connect

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  3. Comprehensive Identification of Long Non-coding RNAs in Purified Cell Types from the Brain Reveals Functional LncRNA in OPC Fate Determination

    PubMed Central

    Dong, Xiaomin; Chen, Kenian; Cuevas-Diaz Duran, Raquel; You, Yanan; Sloan, Steven A.; Zhang, Ye; Zong, Shan; Cao, Qilin; Barres, Ben A.; Wu, Jia Qian

    2015-01-01

    Long non-coding RNAs (lncRNAs) (> 200 bp) play crucial roles in transcriptional regulation during numerous biological processes. However, it is challenging to comprehensively identify lncRNAs, because they are often expressed at low levels and with more cell-type specificity than are protein-coding genes. In the present study, we performed ab initio transcriptome reconstruction using eight purified cell populations from mouse cortex and detected more than 5000 lncRNAs. Predicting the functions of lncRNAs using cell-type specific data revealed their potential functional roles in Central Nervous System (CNS) development. We performed motif searches in ENCODE DNase I digital footprint data and Mouse ENCODE promoters to infer transcription factor (TF) occupancy. By integrating TF binding and cell-type specific transcriptomic data, we constructed a novel framework that is useful for systematically identifying lncRNAs that are potentially essential for brain cell fate determination. Based on this integrative analysis, we identified lncRNAs that are regulated during Oligodendrocyte Precursor Cell (OPC) differentiation from Neural Stem Cells (NSCs) and that are likely to be involved in oligodendrogenesis. The top candidate, lnc-OPC, shows highly specific expression in OPCs and remarkable sequence conservation among placental mammals. Interestingly, lnc-OPC is significantly up-regulated in glial progenitors from experimental autoimmune encephalomyelitis (EAE) mouse models compared to wild-type mice. OLIG2-binding sites in the upstream regulatory region of lnc-OPC were identified by ChIP (chromatin immunoprecipitation)-Sequencing and validated by luciferase assays. Loss-of-function experiments confirmed that lnc-OPC plays a functional role in OPC genesis. Overall, our results substantiated the role of lncRNA in OPC fate determination and provided an unprecedented data source for future functional investigations in CNS cell types. We present our datasets and analysis results

  4. Molecular Characterization of the Tumor Suppressor Candidate 5 Gene: Regulation by PPARγ and Identification of TUSC5 Coding Variants in Lean and Obese Humans

    PubMed Central

    Knotts, Trina A.; Lee, Hyun Woo; Kim, Jae Bum; Oort, Pieter J.; McPherson, Ruth; Dent, Robert; Tachibana, Keisuke; Doi, Takefumi; Yu, Songtao; Reddy, Janardan K.; Uno, Kenji; Katagiri, Hideki; Pasarica, Magdalena; Smith, Steven R.; Sears, Dorothy D.; Grino, Michel; Adams, Sean H.

    2009-01-01

    Tumor suppressor candidate 5 (TUSC5) is a gene expressed abundantly in white adipose tissue (WAT), brown adipose tissue (BAT), and peripheral afferent neurons. Strong adipocyte expression and increased expression following peroxisome proliferator activated receptor γ (PPARγ) agonist treatment of 3T3-L1 adipocytes suggested a role for Tusc5 in fat cell proliferation and/or metabolism. However, the regulation of Tusc5 in WAT and its potential association with obesity phenotypes remain unclear. We tested the hypothesis that the TUSC5 gene is a bona fide PPARγ target and evaluated whether its WAT expression or single-nucleotide polymorphisms (SNPs) in the TUSC5 coding region are associated with human obesity. Induction of Tusc5 mRNA levels in 3T3-L1 adipocytes by troglitazone and GW1929 followed a dose-response consistent with these agents' binding affinities for PPARγ. Chromatin immunoprecipitation (ChIP) experiments confirmed that PPARγ protein binds a ∼ −1.1 kb promotor sequence of murine TUSC5 transiently during 3T3-L1 adipogenesis, concurrent with histone H3 acetylation. No change in Tusc5 mRNA or protein levels was evident in type 2 diabetic patients treated with pioglitazone. Tusc5 expression was not induced appreciably in liver preparations overexpressing PPARs, suggesting that tissue-specific factors regulate PPARγ responsiveness of the TUSC5 gene. Finally, we observed no differences in Tusc5 WAT expression or prevalence of coding region SNPs in lean versus obese human subjects. These studies firmly establish the murine TUSC5 gene locus as a PPARγ target, but the significance of Tusc5 in obesity phenotypes or in the pharmacologic actions of PPARγ agonists in humans remains equivocal. PMID:20204174

  5. Molecular Characterization of the Tumor Suppressor Candidate 5 Gene: Regulation by PPARgamma and Identification of TUSC5 Coding Variants in Lean and Obese Humans.

    PubMed

    Knotts, Trina A; Lee, Hyun Woo; Kim, Jae Bum; Oort, Pieter J; McPherson, Ruth; Dent, Robert; Tachibana, Keisuke; Doi, Takefumi; Yu, Songtao; Reddy, Janardan K; Uno, Kenji; Katagiri, Hideki; Pasarica, Magdalena; Smith, Steven R; Sears, Dorothy D; Grino, Michel; Adams, Sean H

    2009-01-01

    Tumor suppressor candidate 5 (TUSC5) is a gene expressed abundantly in white adipose tissue (WAT), brown adipose tissue (BAT), and peripheral afferent neurons. Strong adipocyte expression and increased expression following peroxisome proliferator activated receptor gamma (PPARgamma) agonist treatment of 3T3-L1 adipocytes suggested a role for Tusc5 in fat cell proliferation and/or metabolism. However, the regulation of Tusc5 in WAT and its potential association with obesity phenotypes remain unclear. We tested the hypothesis that the TUSC5 gene is a bona fide PPARgamma target and evaluated whether its WAT expression or single-nucleotide polymorphisms (SNPs) in the TUSC5 coding region are associated with human obesity. Induction of Tusc5 mRNA levels in 3T3-L1 adipocytes by troglitazone and GW1929 followed a dose-response consistent with these agents' binding affinities for PPARgamma. Chromatin immunoprecipitation (ChIP) experiments confirmed that PPARgamma protein binds a approximately -1.1 kb promotor sequence of murine TUSC5 transiently during 3T3-L1 adipogenesis, concurrent with histone H3 acetylation. No change in Tusc5 mRNA or protein levels was evident in type 2 diabetic patients treated with pioglitazone. Tusc5 expression was not induced appreciably in liver preparations overexpressing PPARs, suggesting that tissue-specific factors regulate PPARgamma responsiveness of the TUSC5 gene. Finally, we observed no differences in Tusc5 WAT expression or prevalence of coding region SNPs in lean versus obese human subjects. These studies firmly establish the murine TUSC5 gene locus as a PPARgamma target, but the significance of Tusc5 in obesity phenotypes or in the pharmacologic actions of PPARgamma agonists in humans remains equivocal.

  6. Identification of mRNA-like non-coding RNAs and validation of a mighty one named MAR in Panax ginseng.

    PubMed

    Wang, Meizhen; Wu, Bin; Chen, Chao; Lu, Shanfa

    2015-03-01

    Increasing evidence suggests that long non-coding RNAs (lncRNAs) play significant roles in plants. However, little is known about lncRNAs in Panax ginseng C. A. Meyer, an economically significant medicinal plant species. A total of 3,688 mRNA-like non-coding RNAs (mlncRNAs), a class of lncRNAs, were identified in P. ginseng. Approximately 40% of the identified mlncRNAs were processed into small RNAs, implying their regulatory roles via small RNA-mediated mechanisms. Eleven miRNA-generating mlncRNAs also produced siRNAs, suggesting the coordinated production of miRNAs and siRNAs in P. ginseng. The mlncRNA-derived small RNAs might be 21-, 22-, or 24-nt phased and could be generated from both or only one strand of mlncRNAs, or from super long hairpin structures. A full-length mlncRNA, termed MAR (multiple-function-associated mlncRNA), was cloned. It generated the most abundant siRNAs. The MAR siRNAs were predominantly 24-nt and some of them were distributed in a phased pattern. A total of 228 targets were predicted for 71 MAR siRNAs. Degradome sequencing validated 68 predicted targets involved in diverse metabolic pathways, suggesting the significance of MAR in P. ginseng. Consistently, MAR was detected in all tissues analyzed and responded to methyl jasmonate (MeJA) treatment. It sheds light on the function of mlncRNAs in plants.

  7. QR Codes

    ERIC Educational Resources Information Center

    Lai, Hsin-Chih; Chang, Chun-Yen; Li, Wen-Shiane; Fan, Yu-Lin; Wu, Ying-Tien

    2013-01-01

    This study presents an m-learning method that incorporates Integrated Quick Response (QR) codes. This learning method not only achieves the objectives of outdoor education, but it also increases applications of Cognitive Theory of Multimedia Learning (CTML) (Mayer, 2001) in m-learning for practical use in a diverse range of outdoor locations. When…

  8. A genetic scale of reading frame coding.

    PubMed

    Michel, Christian J

    2014-08-21

    The reading frame coding (RFC) of codes (sets) of trinucleotides is a genetic concept which has been largely ignored during the last 50 years. A first objective is the definition of a new and simple statistical parameter PrRFC for analysing the probability (efficiency) of reading frame coding (RFC) of any trinucleotide code. A second objective is to reveal different classes and subclasses of trinucleotide codes involved in reading frame coding: the circular codes of 20 trinucleotides and the bijective genetic codes of 20 trinucleotides coding the 20 amino acids. This approach allows us to propose a genetic scale of reading frame coding which ranges from 1/3 with the random codes (RFC probability identical in the three frames) to 1 with the comma-free circular codes (RFC probability maximal in the reading frame and null in the two shifted frames). This genetic scale shows, in particular, the reading frame coding probabilities of the 12,964,440 circular codes (PrRFC=83.2% in average), the 216 C(3) self-complementary circular codes (PrRFC=84.1% in average) including the code X identified in eukaryotic and prokaryotic genes (PrRFC=81.3%) and the 339,738,624 bijective genetic codes (PrRFC=61.5% in average) including the 52 codes without permuted trinucleotides (PrRFC=66.0% in average). Otherwise, the reading frame coding probabilities of each trinucleotide code coding an amino acid with the universal genetic code are also determined. The four amino acids Gly, Lys, Phe and Pro are coded by codes (not circular) with RFC probabilities equal to 2/3, 1/2, 1/2 and 2/3, respectively. The amino acid Leu is coded by a circular code (not comma-free) with a RFC probability equal to 18/19. The 15 other amino acids are coded by comma-free circular codes, i.e. with RFC probabilities equal to 1. The identification of coding properties in some classes of trinucleotide codes studied here may bring new insights in the origin and evolution of the genetic code.

  9. Identification of non-coding genetic variants in samples from hypoxemic respiratory disease patients that affect the transcriptional response to hypoxia

    PubMed Central

    Roche, Olga; Deguiz, María Laura; Tiana, María; Galiana-Ribote, Clara; Martinez-Alcazar, Daniel; Rey-Serra, Carlos; Ranz-Ribeiro, Beatriz; Casitas, Raquel; Galera, Raúl; Fernández-Navarro, Isabel; Sánchez-Cuéllar, Silvia; Bernard, Virginie; Ancochea, Julio; Wasserman, Wyeth W.; García-Rio, Francisco; Jimenez, Benilde; del Peso, Luis

    2016-01-01

    A wide range of diseases course with an unbalance between the consumption of oxygen by tissues and its supply. This situation triggers a transcriptional response, mediated by the hypoxia inducible factors (HIFs), that aims to restore oxygen homeostasis. Little is known about the inter-individual variation in this response and its role in the progression of disease. Herein, we sought to identify common genetic variants mapping to hypoxia response elements (HREs) and characterize their effect on transcription. To this end, we constructed a list of genome-wide HIF-binding regions from publicly available experimental datasets and studied the genetic variability in these regions by targeted re-sequencing of genomic samples from 96 chronic obstructive pulmonary disease and 144 obstructive sleep apnea patients. This study identified 14 frequent variants disrupting potential HREs. The analysis of the genomic regions containing these variants by means of reporter assays revealed that variants rs1009329, rs6593210 and rs150921338 impaired the transcriptional response to hypoxia. Finally, using genome editing we confirmed the functional role of rs6593210 in the transcriptional regulation of EGFR. In summary, we found that inter-individual variability in non-coding regions affect the response to hypoxia and could potentially impact on the progression of pulmonary diseases. PMID:27625398

  10. Identification and functional analysis of long non-coding RNAs in human and mouse early embryos based on single-cell transcriptome data

    PubMed Central

    Qiu, Jia-jun; Ren, Zhao-rui; Yan, Jing-bin

    2016-01-01

    Epigenetics regulations have an important role in fertilization and proper embryonic development, and several human diseases are associated with epigenetic modification disorders, such as Rett syndrome, Beckwith-Wiedemann syndrome and Angelman syndrome. However, the dynamics and functions of long non-coding RNAs (lncRNAs), one type of epigenetic regulators, in human pre-implantation development have not yet been demonstrated. In this study, a comprehensive analysis of human and mouse early-stage embryonic lncRNAs was performed based on public single-cell RNA sequencing data. Expression profile analysis revealed that lncRNAs are expressed in a developmental stage–specific manner during human early-stage embryonic development, whereas a more temporal-specific expression pattern was identified in mouse embryos. Weighted gene co-expression network analysis suggested that lncRNAs involved in human early-stage embryonic development are associated with several important functions and processes, such as oocyte maturation, zygotic genome activation and mitochondrial functions. We also found that the network of lncRNAs involved in zygotic genome activation was highly preservative between human and mouse embryos, whereas in other stages no strong correlation between human and mouse embryo was observed. This study provides insight into the molecular mechanism underlying lncRNA involvement in human pre-implantation embryonic development. PMID:27542205

  11. Combined identification of long non-coding RNA CCAT1 and HOTAIR in serum as an effective screening for colorectal carcinoma.

    PubMed

    Zhao, Weimin; Song, Mu; Zhang, Jie; Kuerban, Mulati; Wang, Haijiang

    2015-01-01

    Long non-coding RNAs (lncRNAs) CCAT1 and HOTAIR have been shown to play an important regulatory role in cancer biology, and CCAT1 and HOTAIR are upregulated in several cancers, however, its value in the diagnosis of colorectal cancer (CRC) is unclear. Therefore, the aim of this study is to evaluate the clinical significance of plasma CCAT1 and HOTAIR as a biomarker in the screening of CRC. In our study, we found that the levels of HOTAIR (P < 0.05) and CCAT1 (P < 0.05) were significantly higher in plasma of CRC patients than that of the healthy control. Moreover, the levels of lincRNA-p21 (P < 0.05) were obviously decreased in plasma of CRC patients as compared to those of healthy control. There was highly correlated for CCAT1 (R = 0.752, mean differences = -0.06 ± 1.20), HOTAIR (R = 0.739, mean differences = -0.26 ± 0.76) and lincRNA-p21 (R = 0.848, mean differences = -0.41 ± 0.89) in plasma and serum. By receiver operating characteristic curve (ROC) analysis, plasma CCAT1 provided the higher diagnostic performance for detection of CRC (the area under the ROC curve (AUC), 0.836; P < 0.001; sensitivity, 75.7%; specificity, 85.3%). Moreover, CCAT1 combining with HOTAIR could provide a more effective diagnosis performance (AUC, 0.954, P < 0.001, sensitivity, 84.3%; specificity, 80.2%). Most importantly, this combination was effective to detect CRC at an early stage (85%). In conclusion, our results demonstrated that increased plasma HOTAIR and CCAT1 could be used as a predictive biomarker for CRC screening, and that combination of HOTAIR and CCAT1 had a higher positive diagnostic rate of CRC than HOTAIR or CCAT1 alone.

  12. MMA, A Computer Code for Multi-Model Analysis

    SciTech Connect

    Eileen P. Poeter and Mary C. Hill

    2007-08-20

    This report documents the Multi-Model Analysis (MMA) computer code. MMA can be used to evaluate results from alternative models of a single system using the same set of observations for all models. As long as the observations, the observation weighting, and system being represented are the same, the models can differ in nearly any way imaginable. For example, they may include different processes, different simulation software, different temporal definitions (for example, steady-state and transient models could be considered), and so on. The multiple models need to be calibrated by nonlinear regression. Calibration of the individual models needs to be completed before application of MMA. MMA can be used to rank models and calculate posterior model probabilities. These can be used to (1) determine the relative importance of the characteristics embodied in the alternative models, (2) calculate model-averaged parameter estimates and predictions, and (3) quantify the uncertainty of parameter estimates and predictions in a way that integrates the variations represented by the alternative models. There is a lack of consensus on what model analysis methods are best, so MMA provides four default methods. Two are based on Kullback-Leibler information, and use the AIC (Akaike Information Criterion) or AICc (second-order-bias-corrected AIC) model discrimination criteria. The other two default methods are the BIC (Bayesian Information Criterion) and the KIC (Kashyap Information Criterion) model discrimination criteria. Use of the KIC criterion is equivalent to using the maximum-likelihood Bayesian model averaging (MLBMA) method. AIC, AICc, and BIC can be derived from Frequentist or Bayesian arguments. The default methods based on Kullback-Leibler information have a number of theoretical advantages, including that they tend to favor more complicated models as more data become available than do the other methods, which makes sense in many situations.

  13. 7 CFR 54.17 - Official identifications.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... identifications. (a) A shield enclosing the letters “USDA” and code identification letters of the grader.... The code identification letters of the grader performing the service will appear intermittently... in Figure 1, with the appropriate yield grade designation “1,” “2,” “3”, “4,” or “5” as provided...

  14. 7 CFR 54.17 - Official identifications.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... identifications. (a) A shield enclosing the letters “USDA” and code identification letters of the grader.... The code identification letters of the grader performing the service will appear intermittently... in Figure 1, with the appropriate yield grade designation “1,” “2,” “3”, “4,” or “5” as provided...

  15. 7 CFR 54.17 - Official identifications.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... identifications. (a) A shield enclosing the letters “USDA” and code identification letters of the grader.... The code identification letters of the grader performing the service will appear intermittently... in Figure 1, with the appropriate yield grade designation “1,” “2,” “3”, “4,” or “5” as provided...

  16. 7 CFR 54.17 - Official identifications.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... identifications. (a) A shield enclosing the letters “USDA” and code identification letters of the grader.... The code identification letters of the grader performing the service will appear intermittently... in Figure 1, with the appropriate yield grade designation “1,” “2,” “3”, “4,” or “5” as provided...

  17. 7 CFR 54.17 - Official identifications.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... identifications. (a) A shield enclosing the letters “USDA” and code identification letters of the grader.... The code identification letters of the grader performing the service will appear intermittently... in Figure 1, with the appropriate yield grade designation “1,” “2,” “3”, “4,” or “5” as provided...

  18. Federal Logistics Information System (FLIS) Procedures Manual. Volume 8. Document Identifier Code Input/Output Formats (Fixed Length)

    DTIC Science & Technology

    1994-07-01

    COLLABORATION CODE 0002X B Fl 41-42 2533 AUTHORIZED ITEM IDENTIFICATION DATA COLLABORATION CODE 0002X B Fl 43-44 2533 AUTHORIZED ITEM IDENTIFICATION DATA ... COLLABORATION CODE 0002X B Fl 45-46 2533 AUTHORIZED ITEM IDENTIFICATION DATA COLLABORATION CODE 0002X B F1 47-48 2533 AUTHORIZED ITEM IDENTIFICATION... DATA COLLABORATION CODE 0002X B F1 49-50 2533 AUTHORIZED ITEM IDENTIFICATION DATA COLLABORATION CODE 0002X B Fl 51-52 0 3 DIC LMD DoD 4100.39-M Volume

  19. Classification and Coding, An Introduction and Review of Classification and Coding Systems. Management Guide No. 1.

    ERIC Educational Resources Information Center

    MacConnell, W.

    Nearly all organizations are faced with problems of classifying and coding financial data, management and technical information, components, stores, etc. and need to apply some logical and meaningful system of identification. This report examines the objectives and applications of classification and coding systems and reviews eight systems…

  20. 48 CFR 204.7202-1 - CAGE codes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false CAGE codes. 204.7202-1..., DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contractor Identification 204.7202-1 CAGE codes. (a) DLIS assigns or records and maintains CAGE codes to identify commercial and Government entities....

  1. 48 CFR 204.7005 - Assignment of order codes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Assignment of order codes... Identification Numbers 204.7005 Assignment of order codes. (a) The Defense Logistics Agency, Acquisition Policy Branch (J71), Fort Belvoir, VA 22060-6221, is the executive agent for maintenance of code assignments...

  2. Peripheral coding of taste

    PubMed Central

    Liman, Emily R.; Zhang, Yali V.; Montell, Craig

    2014-01-01

    Five canonical tastes, bitter, sweet, umami (amino acid), salty and sour (acid) are detected by animals as diverse as fruit flies and humans, consistent with a near universal drive to consume fundamental nutrients and to avoid toxins or other harmful compounds. Surprisingly, despite this strong conservation of basic taste qualities between vertebrates and invertebrates, the receptors and signaling mechanisms that mediate taste in each are highly divergent. The identification over the last two decades of receptors and other molecules that mediate taste has led to stunning advances in our understanding of the basic mechanisms of transduction and coding of information by the gustatory systems of vertebrates and invertebrates. In this review, we discuss recent advances in taste research, mainly from the fly and mammalian systems, and we highlight principles that are common across species, despite stark differences in receptor types. PMID:24607224

  3. Error-correction coding

    NASA Technical Reports Server (NTRS)

    Hinds, Erold W. (Principal Investigator)

    1996-01-01

    This report describes the progress made towards the completion of a specific task on error-correcting coding. The proposed research consisted of investigating the use of modulation block codes as the inner code of a concatenated coding system in order to improve the overall space link communications performance. The study proposed to identify and analyze candidate codes that will complement the performance of the overall coding system which uses the interleaved RS (255,223) code as the outer code.

  4. Event-recording devices with identification codes

    NASA Technical Reports Server (NTRS)

    Watters, David G. (Inventor); Huestis, David L. (Inventor); Bahr, Alfred J. (Inventor); Vidmar, Robert J. (Inventor)

    2003-01-01

    A recording device allows wireless interrogation to determine its identity and its state. The state indicates whether one or more physical or chemical events have taken place. In effect, the one or more physical or chemical events are recorded by the device. The identity of the device allows it to be distinguished from a number of similar devices. The recording device may be used in an array of devices that allows wireless probing by an interrogation unit. When probed, each device tells the interrogator who it is and what state it is in. The devices allow multiple use and the interrogator may use a logical reset to determine the state of each device. The interrogator can thus easily identify particular items in an array that have reached a particular condition. The device may record the status of each device in a database to maintain a history for each.

  5. An ortho-rhom-bic polymorph of N (1),N (4)-diphenyl-3,6-bis-(phenyl-imino)-cyclo-hexa-1,4-diene-1,4-di-amine.

    PubMed

    Ohno, Keiji; Fujihara, Takashi; Nagasawa, Akira

    2014-04-01

    A new ortho-rhom-bic polymorph of the title compound, C30H24N4, with a density of 1.315 Mg m(-3), has been obtained. The mol-ecule is centrosymmetric with the centroid of the cyclo-hexa-1,4-diene ring located on an inversion center. The two unique benzene rings are almost perpendicular to each other [dihedral angle = 86.70 (6)°] and are oriented at dihedral angles of 30.79 (5) and 68.07 (5)° with respect to the central cyclo-hexa-diene ring. In the crystal, π-π stacking is observed between the central cyclo-hexa-1,4-diene-1,4-di-amine unit and a phenyl ring of a neighboring mol-ecule [centroid-centroid distance = 3.7043 (7) Å]. The crystal structure of the triclinic polymorph [Ohno et al. (2014 ▶). Acta Cryst. E70, o303-o304] showed chains running along the b-axis direction through weak C-H⋯π inter-actions.

  6. Thermal neutron response of a boron-coated GEM detector via GEANT4 Monte Carlo code.

    PubMed

    Jamil, M; Rhee, J T; Kim, H G; Ahmad, Farzana; Jeon, Y J

    2014-10-22

    In this work, we report the design configuration and the performance of the hybrid Gas Electron Multiplier (GEM) detector. In order to make the detector sensitive to thermal neutrons, the forward electrode of the GEM has been coated with the enriched boron-10 material, which works as a neutron converter. A total of 5×5cm(2) configuration of GEM has been used for thermal neutron studies. The response of the detector has been estimated via using GEANT4 MC code with two different physics lists. Using the QGSP_BIC_HP physics list, the neutron detection efficiency was determined to be about 3%, while with QGSP_BERT_HP physics list the efficiency was around 2.5%, at the incident thermal neutron energies of 25meV. The higher response of the detector proves that GEM-coated with boron converter improves the efficiency for thermal neutrons detection.

  7. MMA, A Computer Code for Multi-Model Analysis

    USGS Publications Warehouse

    Poeter, Eileen P.; Hill, Mary C.

    2007-01-01

    This report documents the Multi-Model Analysis (MMA) computer code. MMA can be used to evaluate results from alternative models of a single system using the same set of observations for all models. As long as the observations, the observation weighting, and system being represented are the same, the models can differ in nearly any way imaginable. For example, they may include different processes, different simulation software, different temporal definitions (for example, steady-state and transient models could be considered), and so on. The multiple models need to be calibrated by nonlinear regression. Calibration of the individual models needs to be completed before application of MMA. MMA can be used to rank models and calculate posterior model probabilities. These can be used to (1) determine the relative importance of the characteristics embodied in the alternative models, (2) calculate model-averaged parameter estimates and predictions, and (3) quantify the uncertainty of parameter estimates and predictions in a way that integrates the variations represented by the alternative models. There is a lack of consensus on what model analysis methods are best, so MMA provides four default methods. Two are based on Kullback-Leibler information, and use the AIC (Akaike Information Criterion) or AICc (second-order-bias-corrected AIC) model discrimination criteria. The other two default methods are the BIC (Bayesian Information Criterion) and the KIC (Kashyap Information Criterion) model discrimination criteria. Use of the KIC criterion is equivalent to using the maximum-likelihood Bayesian model averaging (MLBMA) method. AIC, AICc, and BIC can be derived from Frequentist or Bayesian arguments. The default methods based on Kullback-Leibler information have a number of theoretical advantages, including that they tend to favor more complicated models as more data become available than do the other methods, which makes sense in many situations. Many applications of MMA will

  8. Diagnostic Coding for Epilepsy.

    PubMed

    Williams, Korwyn; Nuwer, Marc R; Buchhalter, Jeffrey R

    2016-02-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  9. Model Children's Code.

    ERIC Educational Resources Information Center

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  10. Phylogeny of genetic codes and punctuation codes within genetic codes.

    PubMed

    Seligmann, Hervé

    2015-03-01

    Punctuation codons (starts, stops) delimit genes, reflect translation apparatus properties. Most codon reassignments involve punctuation. Here two complementary approaches classify natural genetic codes: (A) properties of amino acids assigned to codons (classical phylogeny), coding stops as X (A1, antitermination/suppressor tRNAs insert unknown residues), or as gaps (A2, no translation, classical stop); and (B) considering only punctuation status (start, stop and other codons coded as -1, 0 and 1 (B1); 0, -1 and 1 (B2, reflects ribosomal translational dynamics); and 1, -1, and 0 (B3, starts/stops as opposites)). All methods separate most mitochondrial codes from most nuclear codes; Gracilibacteria consistently cluster with metazoan mitochondria; mitochondria co-hosted with chloroplasts cluster with nuclear codes. Method A1 clusters the euplotid nuclear code with metazoan mitochondria; A2 separates euplotids from mitochondria. Firmicute bacteria Mycoplasma/Spiroplasma and Protozoan (and lower metazoan) mitochondria share codon-amino acid assignments. A1 clusters them with mitochondria, they cluster with the standard genetic code under A2: constraints on amino acid ambiguity versus punctuation-signaling produced the mitochondrial versus bacterial versions of this genetic code. Punctuation analysis B2 converges best with classical phylogenetic analyses, stressing the need for a unified theory of genetic code punctuation accounting for ribosomal constraints.

  11. Accumulate repeat accumulate codes

    NASA Technical Reports Server (NTRS)

    Abbasfar, Aliazam; Divsalar, Dariush; Yao, Kung

    2004-01-01

    In this paper we propose an innovative channel coding scheme called 'Accumulate Repeat Accumulate codes' (ARA). This class of codes can be viewed as serial turbo-like codes, or as a subclass of Low Density Parity Check (LDPC) codes, thus belief propagation can be used for iterative decoding of ARA codes on a graph. The structure of encoder for this class can be viewed as precoded Repeat Accumulate (RA) code or as precoded Irregular Repeat Accumulate (IRA) code, where simply an accumulator is chosen as a precoder. Thus ARA codes have simple, and very fast encoder structure when they representing LDPC codes. Based on density evolution for LDPC codes through some examples for ARA codes, we show that for maximum variable node degree 5 a minimum bit SNR as low as 0.08 dB from channel capacity for rate 1/2 can be achieved as the block size goes to infinity. Thus based on fixed low maximum variable node degree, its threshold outperforms not only the RA and IRA codes but also the best known LDPC codes with the dame maximum node degree. Furthermore by puncturing the accumulators any desired high rate codes close to code rate 1 can be obtained with thresholds that stay close to the channel capacity thresholds uniformly. Iterative decoding simulation results are provided. The ARA codes also have projected graph or protograph representation that allows for high speed decoder implementation.

  12. Concatenated Coding Using Trellis-Coded Modulation

    NASA Technical Reports Server (NTRS)

    Thompson, Michael W.

    1997-01-01

    In the late seventies and early eighties a technique known as Trellis Coded Modulation (TCM) was developed for providing spectrally efficient error correction coding. Instead of adding redundant information in the form of parity bits, redundancy is added at the modulation stage thereby increasing bandwidth efficiency. A digital communications system can be designed to use bandwidth-efficient multilevel/phase modulation such as Amplitude Shift Keying (ASK), Phase Shift Keying (PSK), Differential Phase Shift Keying (DPSK) or Quadrature Amplitude Modulation (QAM). Performance gain can be achieved by increasing the number of signals over the corresponding uncoded system to compensate for the redundancy introduced by the code. A considerable amount of research and development has been devoted toward developing good TCM codes for severely bandlimited applications. More recently, the use of TCM for satellite and deep space communications applications has received increased attention. This report describes the general approach of using a concatenated coding scheme that features TCM and RS coding. Results have indicated that substantial (6-10 dB) performance gains can be achieved with this approach with comparatively little bandwidth expansion. Since all of the bandwidth expansion is due to the RS code we see that TCM based concatenated coding results in roughly 10-50% bandwidth expansion compared to 70-150% expansion for similar concatenated scheme which use convolution code. We stress that combined coding and modulation optimization is important for achieving performance gains while maintaining spectral efficiency.

  13. Coset Codes Viewed as Terminated Convolutional Codes

    NASA Technical Reports Server (NTRS)

    Fossorier, Marc P. C.; Lin, Shu

    1996-01-01

    In this paper, coset codes are considered as terminated convolutional codes. Based on this approach, three new general results are presented. First, it is shown that the iterative squaring construction can equivalently be defined from a convolutional code whose trellis terminates. This convolutional code determines a simple encoder for the coset code considered, and the state and branch labelings of the associated trellis diagram become straightforward. Also, from the generator matrix of the code in its convolutional code form, much information about the trade-off between the state connectivity and complexity at each section, and the parallel structure of the trellis, is directly available. Based on this generator matrix, it is shown that the parallel branches in the trellis diagram of the convolutional code represent the same coset code C(sub 1), of smaller dimension and shorter length. Utilizing this fact, a two-stage optimum trellis decoding method is devised. The first stage decodes C(sub 1), while the second stage decodes the associated convolutional code, using the branch metrics delivered by stage 1. Finally, a bidirectional decoding of each received block starting at both ends is presented. If about the same number of computations is required, this approach remains very attractive from a practical point of view as it roughly doubles the decoding speed. This fact is particularly interesting whenever the second half of the trellis is the mirror image of the first half, since the same decoder can be implemented for both parts.

  14. 21 CFR 206.10 - Code imprint required.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... identification than a symbol or logo by itself. Homeopathic drug products are required only to bear an imprint... National Drug Code, or a mark, symbol, logo, or monogram, or a combination of letters, numbers, and...

  15. Nonbinary codeword-stabilized quantum codes

    NASA Astrophysics Data System (ADS)

    Chen, Xie; Zeng, Bei; Chuang, Isaac L.

    2008-12-01

    The codeword-stabilized (CWS) quantum code formalism presents a unifying approach to both additive and nonadditive quantum error-correcting codes [see A. Cross , e-print arXiv:0708.1021], but only for binary states. Here we generalize the CWS framework to the nonbinary case (of both prime and nonprime dimensions) and map the search for nonbinary quantum codes to a corresponding search problem for classical nonbinary codes with specific error patterns. We show that while the additivity properties of nonbinary CWS codes are similar to the binary case, the structural properties of the nonbinary codes differ substantially from the binary case, even for prime dimensions. In particular, we identify specific structure patterns of stabilizer groups, based on which efficient constructions might be possible for codes that encode more dimensions than any stabilizer codes of the same length and distance; similar methods cannot be applied in the binary case. Understanding of these structural properties can help prune the search space and facilitate the identification of good nonbinary CWS codes.

  16. Everyday Engineering: What Makes a Bic Click?

    ERIC Educational Resources Information Center

    Moyer, Richard; Everett, Susan

    2009-01-01

    The ballpoint pen is an ideal example of simple engineering that we use everyday. But is it really so simple? The ballpoint pen is a remarkable combination of technology and science. Its operation uses several scientific principles related to chemistry and physics, such as properties of liquids and simple machines. They represent significant…

  17. Thermoelectric pump performance analysis computer code

    NASA Technical Reports Server (NTRS)

    Johnson, J. L.

    1973-01-01

    A computer program is presented that was used to analyze and design dual-throat electromagnetic dc conduction pumps for the 5-kwe ZrH reactor thermoelectric system. In addition to a listing of the code and corresponding identification of symbols, the bases for this analytical model are provided.

  18. Discussion on LDPC Codes and Uplink Coding

    NASA Technical Reports Server (NTRS)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  19. Bar Codes for Libraries.

    ERIC Educational Resources Information Center

    Rahn, Erwin

    1984-01-01

    Discusses the evolution of standards for bar codes (series of printed lines and spaces that represent numbers, symbols, and/or letters of alphabet) and describes the two types most frequently adopted by libraries--Code-A-Bar and CODE 39. Format of the codes is illustrated. Six references and definitions of terminology are appended. (EJS)

  20. Manually operated coded switch

    DOEpatents

    Barnette, Jon H.

    1978-01-01

    The disclosure relates to a manually operated recodable coded switch in which a code may be inserted, tried and used to actuate a lever controlling an external device. After attempting a code, the switch's code wheels must be returned to their zero positions before another try is made.

  1. 47 CFR 95.119 - Station identification.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... station identification is the call sign assigned to the GMRS station or system. (c) A unit number may be included after the call sign in the identification. (d) The station identification must be transmitted in: (1) Voice in the English language; or (2) International Morse code telegraphy. (e) A station need...

  2. QR Codes 101

    ERIC Educational Resources Information Center

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  3. ARA type protograph codes

    NASA Technical Reports Server (NTRS)

    Divsalar, Dariush (Inventor); Abbasfar, Aliazam (Inventor); Jones, Christopher R. (Inventor); Dolinar, Samuel J. (Inventor); Thorpe, Jeremy C. (Inventor); Andrews, Kenneth S. (Inventor); Yao, Kung (Inventor)

    2008-01-01

    An apparatus and method for encoding low-density parity check codes. Together with a repeater, an interleaver and an accumulator, the apparatus comprises a precoder, thus forming accumulate-repeat-accumulate (ARA codes). Protographs representing various types of ARA codes, including AR3A, AR4A and ARJA codes, are described. High performance is obtained when compared to the performance of current repeat-accumulate (RA) or irregular-repeat-accumulate (IRA) codes.

  4. Efficient entropy coding for scalable video coding

    NASA Astrophysics Data System (ADS)

    Choi, Woong Il; Yang, Jungyoup; Jeon, Byeungwoo

    2005-10-01

    The standardization for the scalable extension of H.264 has called for additional functionality based on H.264 standard to support the combined spatio-temporal and SNR scalability. For the entropy coding of H.264 scalable extension, Context-based Adaptive Binary Arithmetic Coding (CABAC) scheme is considered so far. In this paper, we present a new context modeling scheme by using inter layer correlation between the syntax elements. As a result, it improves coding efficiency of entropy coding in H.264 scalable extension. In simulation results of applying the proposed scheme to encoding the syntax element mb_type, it is shown that improvement in coding efficiency of the proposed method is up to 16% in terms of bit saving due to estimation of more adequate probability model.

  5. Finding the Key to a Better Code: Code Team Restructure to Improve Performance and Outcomes

    PubMed Central

    Prince, Cynthia R.; Hines, Elizabeth J.; Chyou, Po-Huang; Heegeman, David J.

    2014-01-01

    Code teams respond to acute life threatening changes in a patient’s status 24 hours a day, 7 days a week. If any variable, whether a medical skill or non-medical quality, is lacking, the effectiveness of a code team’s resuscitation could be hindered. To improve the overall performance of our hospital’s code team, we implemented an evidence-based quality improvement restructuring plan. The code team restructure, which occurred over a 3-month period, included a defined number of code team participants, clear identification of team members and their primary responsibilities and position relative to the patient, and initiation of team training events and surprise mock codes (simulations). Team member assessments of the restructured code team and its performance were collected through self-administered electronic questionnaires. Time-to-defibrillation, defined as the time the code was called until the start of defibrillation, was measured for each code using actual time recordings from code summary sheets. Significant improvements in team member confidence in the skills specific to their role and clarity in their role’s position were identified. Smaller improvements were seen in team leadership and reduction in the amount of extra talking and noise during a code. The average time-to-defibrillation during real codes decreased each year since the code team restructure. This type of code team restructure resulted in improvements in several areas that impact the functioning of the team, as well as decreased the average time-to-defibrillation, making it beneficial to many, including the team members, medical institution, and patients. PMID:24667218

  6. Finding the key to a better code: code team restructure to improve performance and outcomes.

    PubMed

    Prince, Cynthia R; Hines, Elizabeth J; Chyou, Po-Huang; Heegeman, David J

    2014-09-01

    Code teams respond to acute life threatening changes in a patient's status 24 hours a day, 7 days a week. If any variable, whether a medical skill or non-medical quality, is lacking, the effectiveness of a code team's resuscitation could be hindered. To improve the overall performance of our hospital's code team, we implemented an evidence-based quality improvement restructuring plan. The code team restructure, which occurred over a 3-month period, included a defined number of code team participants, clear identification of team members and their primary responsibilities and position relative to the patient, and initiation of team training events and surprise mock codes (simulations). Team member assessments of the restructured code team and its performance were collected through self-administered electronic questionnaires. Time-to-defibrillation, defined as the time the code was called until the start of defibrillation, was measured for each code using actual time recordings from code summary sheets. Significant improvements in team member confidence in the skills specific to their role and clarity in their role's position were identified. Smaller improvements were seen in team leadership and reduction in the amount of extra talking and noise during a code. The average time-to-defibrillation during real codes decreased each year since the code team restructure. This type of code team restructure resulted in improvements in several areas that impact the functioning of the team, as well as decreased the average time-to-defibrillation, making it beneficial to many, including the team members, medical institution, and patients.

  7. Spectral derivative feature coding for hyperspectral signature analysis

    NASA Astrophysics Data System (ADS)

    Chang, Chein-I.; Chakravarty, Sumit

    2006-08-01

    This paper presents a new approach to hyperspectral signature analysis, called Spectral Derivative Feature Coding (SDFC). It makes use of gradient changes in adjacent bands to characterize spectral variations so as to improve spectral discrimination and identification. In order to evaluate its performance, two binary coding methods, SPectral Analysis Manager (SPAM) and Spectral Feature-based Binary Coding (SFBC) are used to conduct comparative analysis. The experimental results demonstrate the proposed SDFC performs more effectively in capturing spectral characteristics.

  8. Oil and gas field code master list, 1993

    SciTech Connect

    Not Available

    1993-12-16

    This document contains data collected through October 1993 and provides standardized field name spellings and codes for all identified oil and/or gas fields in the United States. Other Federal and State government agencies, as well as industry, use the EIA Oil and Gas Field Code Master List as the standard for field identification. A machine-readable version of the Oil and Gas Field Code Master List is available from the National Technical Information Service.

  9. Honesty and Honor Codes.

    ERIC Educational Resources Information Center

    McCabe, Donald; Trevino, Linda Klebe

    2002-01-01

    Explores the rise in student cheating and evidence that students cheat less often at schools with an honor code. Discusses effective use of such codes and creation of a peer culture that condemns dishonesty. (EV)

  10. Cellulases and coding sequences

    DOEpatents

    Li, Xin-Liang; Ljungdahl, Lars G.; Chen, Huizhong

    2001-02-20

    The present invention provides three fungal cellulases, their coding sequences, recombinant DNA molecules comprising the cellulase coding sequences, recombinant host cells and methods for producing same. The present cellulases are from Orpinomyces PC-2.

  11. Cellulases and coding sequences

    DOEpatents

    Li, Xin-Liang; Ljungdahl, Lars G.; Chen, Huizhong

    2001-01-01

    The present invention provides three fungal cellulases, their coding sequences, recombinant DNA molecules comprising the cellulase coding sequences, recombinant host cells and methods for producing same. The present cellulases are from Orpinomyces PC-2.

  12. QR Code Mania!

    ERIC Educational Resources Information Center

    Shumack, Kellie A.; Reilly, Erin; Chamberlain, Nik

    2013-01-01

    space, has error-correction capacity, and can be read from any direction. These codes are used in manufacturing, shipping, and marketing, as well as in education. QR codes can be created to produce…

  13. DIANE multiparticle transport code

    NASA Astrophysics Data System (ADS)

    Caillaud, M.; Lemaire, S.; Ménard, S.; Rathouit, P.; Ribes, J. C.; Riz, D.

    2014-06-01

    DIANE is the general Monte Carlo code developed at CEA-DAM. DIANE is a 3D multiparticle multigroup code. DIANE includes automated biasing techniques and is optimized for massive parallel calculations.

  14. EMF wire code research

    SciTech Connect

    Jones, T.

    1993-11-01

    This paper examines the results of previous wire code research to determines the relationship with childhood cancer, wire codes and electromagnetic fields. The paper suggests that, in the original Savitz study, biases toward producing a false positive association between high wire codes and childhood cancer were created by the selection procedure.

  15. Universal Noiseless Coding Subroutines

    NASA Technical Reports Server (NTRS)

    Schlutsmeyer, A. P.; Rice, R. F.

    1986-01-01

    Software package consists of FORTRAN subroutines that perform universal noiseless coding and decoding of integer and binary data strings. Purpose of this type of coding to achieve data compression in sense that coded data represents original data perfectly (noiselessly) while taking fewer bits to do so. Routines universal because they apply to virtually any "real-world" data source.

  16. Mapping Local Codes to Read Codes.

    PubMed

    Bonney, Wilfred; Galloway, James; Hall, Christopher; Ghattas, Mikhail; Tramma, Leandro; Nind, Thomas; Donnelly, Louise; Jefferson, Emily; Doney, Alexander

    2017-01-01

    Background & Objectives: Legacy laboratory test codes make it difficult to use clinical datasets for meaningful translational research, where populations are followed for disease risk and outcomes over many years. The Health Informatics Centre (HIC) at the University of Dundee hosts continuous biochemistry data from the clinical laboratories in Tayside and Fife dating back as far as 1987. However, the HIC-managed biochemistry dataset is coupled with incoherent sample types and unstandardised legacy local test codes, which increases the complexity of using the dataset for reasonable population health outcomes. The objective of this study was to map the legacy local test codes to the Scottish 5-byte Version 2 Read Codes using biochemistry data extracted from the repository of the Scottish Care Information (SCI) Store.

  17. Software Certification - Coding, Code, and Coders

    NASA Technical Reports Server (NTRS)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  18. XSOR codes users manual

    SciTech Connect

    Jow, Hong-Nian; Murfin, W.B.; Johnson, J.D.

    1993-11-01

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ``XSOR``. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms.

  19. DLLExternalCode

    SciTech Connect

    Greg Flach, Frank Smith

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  20. Defeating the coding monsters.

    PubMed

    Colt, Ross

    2007-02-01

    Accuracy in coding is rapidly becoming a required skill for military health care providers. Clinic staffing, equipment purchase decisions, and even reimbursement will soon be based on the coding data that we provide. Learning the complicated myriad of rules to code accurately can seem overwhelming. However, the majority of clinic visits in a typical outpatient clinic generally fall into two major evaluation and management codes, 99213 and 99214. If health care providers can learn the rules required to code a 99214 visit, then this will provide a 90% solution that can enable them to accurately code the majority of their clinic visits. This article demonstrates a step-by-step method to code a 99214 visit, by viewing each of the three requirements as a monster to be defeated.

  1. Identification of linc-NeD125, a novel long non coding RNA that hosts miR-125b-1 and negatively controls proliferation of human neuroblastoma cells

    PubMed Central

    Bevilacqua, Valeria; Gioia, Ubaldo; Di Carlo, Valerio; Tortorelli, Anna F; Colombo, Teresa; Bozzoni, Irene; Laneve, Pietro; Caffarelli, Elisa

    2015-01-01

    The human genome contains some thousands of long non coding RNAs (lncRNAs). Many of these transcripts are presently considered crucial regulators of gene expression and functionally implicated in developmental processes in Eukaryotes. Notably, despite a huge number of lncRNAs are expressed in the Central Nervous System (CNS), only a few of them have been characterized in terms of molecular structure, gene expression regulation and function. In the present study, we identify linc-NeD125 as a novel cytoplasmic, neuronal-induced long intergenic non coding RNA (lincRNA). Linc-NeD125 represents the host gene for miR-125b-1, a microRNA with an established role as negative regulator of human neuroblastoma cell proliferation. Here, we demonstrate that these two overlapping non coding RNAs are coordinately induced during in vitro neuronal differentiation, and that their expression is regulated by different mechanisms. While the production of miR-125b-1 relies on transcriptional regulation, linc-NeD125 is controlled at the post-transcriptional level, through modulation of its stability. We also demonstrate that linc-NeD125 functions independently of the hosted microRNA, by reducing cell proliferation and activating the antiapoptotic factor BCL-2. PMID:26480000

  2. Mechanical code comparator

    DOEpatents

    Peter, Frank J.; Dalton, Larry J.; Plummer, David W.

    2002-01-01

    A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

  3. More box codes

    NASA Technical Reports Server (NTRS)

    Solomon, G.

    1992-01-01

    A new investigation shows that, starting from the BCH (21,15;3) code represented as a 7 x 3 matrix and adding a row and column to add even parity, one obtains an 8 x 4 matrix (32,15;8) code. An additional dimension is obtained by specifying odd parity on the rows and even parity on the columns, i.e., adjoining to the 8 x 4 matrix, the matrix, which is zero except for the fourth column (of all ones). Furthermore, any seven rows and three columns will form the BCH (21,15;3) code. This box code has the same weight structure as the quadratic residue and BCH codes of the same dimensions. Whether there exists an algebraic isomorphism to either code is as yet unknown.

  4. Generating code adapted for interlinking legacy scalar code and extended vector code

    DOEpatents

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  5. Industrial Computer Codes

    NASA Technical Reports Server (NTRS)

    Shapiro, Wilbur

    1996-01-01

    This is an overview of new and updated industrial codes for seal design and testing. GCYLT (gas cylindrical seals -- turbulent), SPIRALI (spiral-groove seals -- incompressible), KTK (knife to knife) Labyrinth Seal Code, and DYSEAL (dynamic seal analysis) are covered. CGYLT uses G-factors for Poiseuille and Couette turbulence coefficients. SPIRALI is updated to include turbulence and inertia, but maintains the narrow groove theory. KTK labyrinth seal code handles straight or stepped seals. And DYSEAL provides dynamics for the seal geometry.

  6. 47 CFR 90.735 - Station identification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... termination of the communication in progress on this frequency. (c) Station identification may be by voice or... Commission, upon its request, information (such as digital codes and algorithms) sufficient to decipher...

  7. Tokamak Systems Code

    SciTech Connect

    Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.

  8. Topological subsystem codes

    SciTech Connect

    Bombin, H.

    2010-03-15

    We introduce a family of two-dimensional (2D) topological subsystem quantum error-correcting codes. The gauge group is generated by two-local Pauli operators, so that two-local measurements are enough to recover the error syndrome. We study the computational power of code deformation in these codes and show that boundaries cannot be introduced in the usual way. In addition, we give a general mapping connecting suitable classical statistical mechanical models to optimal error correction in subsystem stabilizer codes that suffer from depolarizing noise.

  9. FAA Smoke Transport Code

    SciTech Connect

    Domino, Stefan; Luketa-Hanlin, Anay; Gallegos, Carlos

    2006-10-27

    FAA Smoke Transport Code, a physics-based Computational Fluid Dynamics tool, which couples heat, mass, and momentum transfer, has been developed to provide information on smoke transport in cargo compartments with various geometries and flight conditions. The software package contains a graphical user interface for specification of geometry and boundary conditions, analysis module for solving the governing equations, and a post-processing tool. The current code was produced by making substantial improvements and additions to a code obtained from a university. The original code was able to compute steady, uniform, isothermal turbulent pressurization. In addition, a preprocessor and postprocessor were added to arrive at the current software package.

  10. Transonic airfoil codes

    NASA Technical Reports Server (NTRS)

    Garabedian, P. R.

    1979-01-01

    Computer codes for the design and analysis of transonic airfoils are considered. The design code relies on the method of complex characteristics in the hodograph plane to construct shockless airfoil. The analysis code uses artificial viscosity to calculate flows with weak shock waves at off-design conditions. Comparisons with experiments show that an excellent simulation of two dimensional wind tunnel tests is obtained. The codes have been widely adopted by the aircraft industry as a tool for the development of supercritical wing technology.

  11. Multifractal detrended cross-correlation analysis of coding and non-coding DNA sequences through chaos-game representation

    NASA Astrophysics Data System (ADS)

    Pal, Mayukha; Satish, B.; Srinivas, K.; Rao, P. Madhusudana; Manimaran, P.

    2015-10-01

    We propose a new approach combining the chaos game representation and the two dimensional multifractal detrended cross correlation analysis methods to examine multifractal behavior in power law cross correlation between any pair of nucleotide sequences of unequal lengths. In this work, we analyzed the characteristic behavior of coding and non-coding DNA sequences of eight prokaryotes. The results show the presence of strong multifractal nature between coding and non-coding sequences of all data sets. We found that this integrative approach helps us to consider complete DNA sequences for characterization, and further it may be useful for classification, clustering, identification of class affiliation of nucleotide sequences etc. with high precision.

  12. Optimal patch code design via device characterization

    NASA Astrophysics Data System (ADS)

    Wu, Wencheng; Dalal, Edul N.

    2012-01-01

    In many color measurement applications, such as those for color calibration and profiling, "patch code" has been used successfully for job identification and automation to reduce operator errors. A patch code is similar to a barcode, but is intended primarily for use in measurement devices that cannot read barcodes due to limited spatial resolution, such as spectrophotometers. There is an inherent tradeoff between decoding robustness and the number of code levels available for encoding. Previous methods have attempted to address this tradeoff, but those solutions have been sub-optimal. In this paper, we propose a method to design optimal patch codes via device characterization. The tradeoff between decoding robustness and the number of available code levels is optimized in terms of printing and measurement efforts, and decoding robustness against noises from the printing and measurement devices. Effort is drastically reduced relative to previous methods because print-and-measure is minimized through modeling and the use of existing printer profiles. Decoding robustness is improved by distributing the code levels in CIE Lab space rather than in CMYK space.

  13. Fast Coding Unit Encoding Mechanism for Low Complexity Video Coding

    PubMed Central

    Wu, Yueying; Jia, Kebin; Gao, Guandong

    2016-01-01

    In high efficiency video coding (HEVC), coding tree contributes to excellent compression performance. However, coding tree brings extremely high computational complexity. Innovative works for improving coding tree to further reduce encoding time are stated in this paper. A novel low complexity coding tree mechanism is proposed for HEVC fast coding unit (CU) encoding. Firstly, this paper makes an in-depth study of the relationship among CU distribution, quantization parameter (QP) and content change (CC). Secondly, a CU coding tree probability model is proposed for modeling and predicting CU distribution. Eventually, a CU coding tree probability update is proposed, aiming to address probabilistic model distortion problems caused by CC. Experimental results show that the proposed low complexity CU coding tree mechanism significantly reduces encoding time by 27% for lossy coding and 42% for visually lossless coding and lossless coding. The proposed low complexity CU coding tree mechanism devotes to improving coding performance under various application conditions. PMID:26999741

  14. Fast Coding Unit Encoding Mechanism for Low Complexity Video Coding.

    PubMed

    Gao, Yuan; Liu, Pengyu; Wu, Yueying; Jia, Kebin; Gao, Guandong

    2016-01-01

    In high efficiency video coding (HEVC), coding tree contributes to excellent compression performance. However, coding tree brings extremely high computational complexity. Innovative works for improving coding tree to further reduce encoding time are stated in this paper. A novel low complexity coding tree mechanism is proposed for HEVC fast coding unit (CU) encoding. Firstly, this paper makes an in-depth study of the relationship among CU distribution, quantization parameter (QP) and content change (CC). Secondly, a CU coding tree probability model is proposed for modeling and predicting CU distribution. Eventually, a CU coding tree probability update is proposed, aiming to address probabilistic model distortion problems caused by CC. Experimental results show that the proposed low complexity CU coding tree mechanism significantly reduces encoding time by 27% for lossy coding and 42% for visually lossless coding and lossless coding. The proposed low complexity CU coding tree mechanism devotes to improving coding performance under various application conditions.

  15. Sequence of the intron/exon junctions of the coding region of the human androgen receptor gene and identification of a point mutation in a family with complete androgen insensitivity.

    PubMed

    Lubahn, D B; Brown, T R; Simental, J A; Higgs, H N; Migeon, C J; Wilson, E M; French, F S

    1989-12-01

    Androgens act through a receptor protein (AR) to mediate sex differentiation and development of the male phenotype. We have isolated the eight exons in the amino acid coding region of the AR gene from a human X chromosome library. Nucleotide sequences of the AR gene intron/exon boundaries were determined for use in designing synthetic oligonucleotide primers to bracket coding exons for amplification by the polymerase chain reaction. Genomic DNA was amplified from 46,XY phenotypic female siblings with complete androgen insensitivity syndrome. AR binding affinity for dihydrotestosterone in the affected siblings was lower than in normal males, but the binding capacity was normal. Sequence analysis of amplified exons demonstrated within the AR steroid-binding domain (exon G) a single guanine to adenine mutation, resulting in replacement of valine with methionine at amino acid residue 866. As expected, the carrier mother had both normal and mutant AR genes. Thus, a single point mutation in the steroid-binding domain of the AR gene correlated with the expression of an AR protein ineffective in stimulating male sexual development.

  16. Identification of two factors which bind to the upstream sequences of a number of nuclear genes coding for mitochondrial proteins and to genetic elements important for cell division in yeast.

    PubMed Central

    Dorsman, J C; van Heeswijk, W C; Grivell, L A

    1988-01-01

    Two abundant factors, GFI and GFII which interact with the 5' flanking regions of nuclear genes coding for proteins of the mitochondrial respiratory chain have been identified. In one case (subunit VIII of QH2: cytochrome c oxidoreductase) the binding sites for both factors overlap completely and their binding is mutually exclusive. For the other 5' regions tested the GFI and GFII binding sites do not coincide. Interestingly, binding sites for GFI and GFII are also present in or at the 3' ends of the coding regions of two genes of the PHO gene family and in DNA elements important for optimal ARS and CEN function respectively. The sites recognized by GFI conform to the consensus RTCRNNNNNNACGNR, while those recognized by GFII contain the element RTCACGTG. We speculate that GFI and GFII may play a role in different cellular processes, dependent on the context of their binding sites and that one of these processes may be the coordination of the expression of genes involved in mitochondrial biogenesis with the progress of the cell cycle. Images PMID:3045755

  17. Dress Codes for Teachers?

    ERIC Educational Resources Information Center

    Million, June

    2004-01-01

    In this article, the author discusses an e-mail survey of principals from across the country regarding whether or not their school had a formal staff dress code. The results indicate that most did not have a formal dress code, but agreed that professional dress for teachers was not only necessary, but showed respect for the school and had a…

  18. Lichenase and coding sequences

    DOEpatents

    Li, Xin-Liang; Ljungdahl, Lars G.; Chen, Huizhong

    2000-08-15

    The present invention provides a fungal lichenase, i.e., an endo-1,3-1,4-.beta.-D-glucanohydrolase, its coding sequence, recombinant DNA molecules comprising the lichenase coding sequences, recombinant host cells and methods for producing same. The present lichenase is from Orpinomyces PC-2.

  19. Legacy Code Modernization

    NASA Technical Reports Server (NTRS)

    Hribar, Michelle R.; Frumkin, Michael; Jin, Haoqiang; Waheed, Abdul; Yan, Jerry; Saini, Subhash (Technical Monitor)

    1998-01-01

    Over the past decade, high performance computing has evolved rapidly; systems based on commodity microprocessors have been introduced in quick succession from at least seven vendors/families. Porting codes to every new architecture is a difficult problem; in particular, here at NASA, there are many large CFD applications that are very costly to port to new machines by hand. The LCM ("Legacy Code Modernization") Project is the development of an integrated parallelization environment (IPE) which performs the automated mapping of legacy CFD (Fortran) applications to state-of-the-art high performance computers. While most projects to port codes focus on the parallelization of the code, we consider porting to be an iterative process consisting of several steps: 1) code cleanup, 2) serial optimization,3) parallelization, 4) performance monitoring and visualization, 5) intelligent tools for automated tuning using performance prediction and 6) machine specific optimization. The approach for building this parallelization environment is to build the components for each of the steps simultaneously and then integrate them together. The demonstration will exhibit our latest research in building this environment: 1. Parallelizing tools and compiler evaluation. 2. Code cleanup and serial optimization using automated scripts 3. Development of a code generator for performance prediction 4. Automated partitioning 5. Automated insertion of directives. These demonstrations will exhibit the effectiveness of an automated approach for all the steps involved with porting and tuning a legacy code application for a new architecture.

  20. Synthesizing Certified Code

    NASA Technical Reports Server (NTRS)

    Whalen, Michael; Schumann, Johann; Fischer, Bernd

    2002-01-01

    Code certification is a lightweight approach to demonstrate software quality on a formal level. Its basic idea is to require producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates which can be checked independently. Since code certification uses the same underlying technology as program verification, it also requires many detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding theses annotations to the code is time-consuming and error-prone. We address this problem by combining code certification with automatic program synthesis. We propose an approach to generate simultaneously, from a high-level specification, code and all annotations required to certify generated code. Here, we describe a certification extension of AUTOBAYES, a synthesis tool which automatically generates complex data analysis programs from compact specifications. AUTOBAYES contains sufficient high-level domain knowledge to generate detailed annotations. This allows us to use a general-purpose verification condition generator to produce a set of proof obligations in first-order logic. The obligations are then discharged using the automated theorem E-SETHEO. We demonstrate our approach by certifying operator safety for a generated iterative data classification program without manual annotation of the code.

  1. Coding Acoustic Metasurfaces.

    PubMed

    Xie, Boyang; Tang, Kun; Cheng, Hua; Liu, Zhengyou; Chen, Shuqi; Tian, Jianguo

    2017-02-01

    Coding acoustic metasurfaces can combine simple logical bits to acquire sophisticated functions in wave control. The acoustic logical bits can achieve a phase difference of exactly π and a perfect match of the amplitudes for the transmitted waves. By programming the coding sequences, acoustic metasurfaces with various functions, including creating peculiar antenna patterns and waves focusing, have been demonstrated.

  2. Computerized mega code recording.

    PubMed

    Burt, T W; Bock, H C

    1988-04-01

    A system has been developed to facilitate recording of advanced cardiac life support mega code testing scenarios. By scanning a paper "keyboard" using a bar code wand attached to a portable microcomputer, the person assigned to record the scenario can easily generate an accurate, complete, timed, and typewritten record of the given situations and the obtained responses.

  3. Pseudonoise code tracking loop

    NASA Technical Reports Server (NTRS)

    Laflame, D. T. (Inventor)

    1980-01-01

    A delay-locked loop is presented for tracking a pseudonoise (PN) reference code in an incoming communication signal. The loop is less sensitive to gain imbalances, which can otherwise introduce timing errors in the PN reference code formed by the loop.

  4. Evolving genetic code

    PubMed Central

    OHAMA, Takeshi; INAGAKI, Yuji; BESSHO, Yoshitaka; OSAWA, Syozo

    2008-01-01

    In 1985, we reported that a bacterium, Mycoplasma capricolum, used a deviant genetic code, namely UGA, a “universal” stop codon, was read as tryptophan. This finding, together with the deviant nuclear genetic codes in not a few organisms and a number of mitochondria, shows that the genetic code is not universal, and is in a state of evolution. To account for the changes in codon meanings, we proposed the codon capture theory stating that all the code changes are non-disruptive without accompanied changes of amino acid sequences of proteins. Supporting evidence for the theory is presented in this review. A possible evolutionary process from the ancient to the present-day genetic code is also discussed. PMID:18941287

  5. Combustion chamber analysis code

    NASA Technical Reports Server (NTRS)

    Przekwas, A. J.; Lai, Y. G.; Krishnan, A.; Avva, R. K.; Giridharan, M. G.

    1993-01-01

    A three-dimensional, time dependent, Favre averaged, finite volume Navier-Stokes code has been developed to model compressible and incompressible flows (with and without chemical reactions) in liquid rocket engines. The code has a non-staggered formulation with generalized body-fitted-coordinates (BFC) capability. Higher order differencing methodologies such as MUSCL and Osher-Chakravarthy schemes are available. Turbulent flows can be modeled using any of the five turbulent models present in the code. A two-phase, two-liquid, Lagrangian spray model has been incorporated into the code. Chemical equilibrium and finite rate reaction models are available to model chemically reacting flows. The discrete ordinate method is used to model effects of thermal radiation. The code has been validated extensively against benchmark experimental data and has been applied to model flows in several propulsion system components of the SSME and the STME.

  6. Iris Recognition for Human Identification

    NASA Astrophysics Data System (ADS)

    Alandkar, Lajari; Gengaje, Sachin

    2010-11-01

    Iris recognition system is the biometric identification system. Iris has an intricate structure, uniqueness, stability, and natural protection. Due to these features of the iris it can be used for biometric identification. This system gives better performance than other biometric identification systems. A novel eyelash removal method for preprocessing of human iris images in a human iris recognition system is presented.. Discrete cosine transform (DCT) method is used for feature extraction. For matching of two-iris code Hamming distance calculation is used. EER value must be less for the optimum performance of the system.

  7. 47 CFR 90.425 - Station identification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... co-channel licensee. (4) Should activation of automatic Morse code identification equipment interrupt the communications of another co-channel licensee, the Commission may require the use of equipment which will delay automatic station identification until such co-channel communications are completed....

  8. Pyramid image codes

    NASA Technical Reports Server (NTRS)

    Watson, Andrew B.

    1990-01-01

    All vision systems, both human and machine, transform the spatial image into a coded representation. Particular codes may be optimized for efficiency or to extract useful image features. Researchers explored image codes based on primary visual cortex in man and other primates. Understanding these codes will advance the art in image coding, autonomous vision, and computational human factors. In cortex, imagery is coded by features that vary in size, orientation, and position. Researchers have devised a mathematical model of this transformation, called the Hexagonal oriented Orthogonal quadrature Pyramid (HOP). In a pyramid code, features are segregated by size into layers, with fewer features in the layers devoted to large features. Pyramid schemes provide scale invariance, and are useful for coarse-to-fine searching and for progressive transmission of images. The HOP Pyramid is novel in three respects: (1) it uses a hexagonal pixel lattice, (2) it uses oriented features, and (3) it accurately models most of the prominent aspects of primary visual cortex. The transform uses seven basic features (kernels), which may be regarded as three oriented edges, three oriented bars, and one non-oriented blob. Application of these kernels to non-overlapping seven-pixel neighborhoods yields six oriented, high-pass pyramid layers, and one low-pass (blob) layer.

  9. Report number codes

    SciTech Connect

    Nelson, R.N.

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  10. Embedded foveation image coding.

    PubMed

    Wang, Z; Bovik, A C

    2001-01-01

    The human visual system (HVS) is highly space-variant in sampling, coding, processing, and understanding. The spatial resolution of the HVS is highest around the point of fixation (foveation point) and decreases rapidly with increasing eccentricity. By taking advantage of this fact, it is possible to remove considerable high-frequency information redundancy from the peripheral regions and still reconstruct a perceptually good quality image. Great success has been obtained previously by a class of embedded wavelet image coding algorithms, such as the embedded zerotree wavelet (EZW) and the set partitioning in hierarchical trees (SPIHT) algorithms. Embedded wavelet coding not only provides very good compression performance, but also has the property that the bitstream can be truncated at any point and still be decoded to recreate a reasonably good quality image. In this paper, we propose an embedded foveation image coding (EFIC) algorithm, which orders the encoded bitstream to optimize foveated visual quality at arbitrary bit-rates. A foveation-based image quality metric, namely, foveated wavelet image quality index (FWQI), plays an important role in the EFIC system. We also developed a modified SPIHT algorithm to improve the coding efficiency. Experiments show that EFIC integrates foveation filtering with foveated image coding and demonstrates very good coding performance and scalability in terms of foveated image quality measurement.

  11. Non-coding RNAs: An Introduction.

    PubMed

    Yang, Jennifer X; Rastetter, Raphael H; Wilhelm, Dagmar

    2016-01-01

    For many years the main role of RNA, it addition to the housekeeping functions of for example tRNAs and rRNAs, was believed to be a messenger between the genes encoded on the DNA and the functional units of the cell, the proteins. This changed drastically with the identification of the first small non-coding RNA, termed microRNA, some 20 years ago. This discovery opened the field of regulatory RNAs with no or little protein-coding potential. Since then many new classes of regulatory non-coding RNAs, including endogenous small interfering RNAs (endo-siRNAs), PIWI-associated RNAs (piRNAs), and long non-coding RNAs, have been identified and we have made amazing progress in elucidating their expression, biogenesis, mechanisms and mode of action, and function in many, if not all, biological processes. In this chapter we provide an introduction about the current knowledge of the main classes of non-coding RNAs, what is know about their biogenesis and mechanism of function.

  12. Code Disentanglement: Initial Plan

    SciTech Connect

    Wohlbier, John Greaton; Kelley, Timothy M.; Rockefeller, Gabriel M.; Calef, Matthew Thomas

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  13. Compressible Astrophysics Simulation Code

    SciTech Connect

    Howell, L.; Singer, M.

    2007-07-18

    This is an astrophysics simulation code involving a radiation diffusion module developed at LLNL coupled to compressible hydrodynamics and adaptive mesh infrastructure developed at LBNL. One intended application is to neutrino diffusion in core collapse supernovae.

  14. Seals Flow Code Development

    NASA Technical Reports Server (NTRS)

    1991-01-01

    In recognition of a deficiency in the current modeling capability for seals, an effort was established by NASA to develop verified computational fluid dynamic concepts, codes, and analyses for seals. The objectives were to develop advanced concepts for the design and analysis of seals, to effectively disseminate the information to potential users by way of annual workshops, and to provide experimental verification for the models and codes under a wide range of operating conditions.

  15. Robust Nonlinear Neural Codes

    NASA Astrophysics Data System (ADS)

    Yang, Qianli; Pitkow, Xaq

    2015-03-01

    Most interesting natural sensory stimuli are encoded in the brain in a form that can only be decoded nonlinearly. But despite being a core function of the brain, nonlinear population codes are rarely studied and poorly understood. Interestingly, the few existing models of nonlinear codes are inconsistent with known architectural features of the brain. In particular, these codes have information content that scales with the size of the cortical population, even if that violates the data processing inequality by exceeding the amount of information entering the sensory system. Here we provide a valid theory of nonlinear population codes by generalizing recent work on information-limiting correlations in linear population codes. Although these generalized, nonlinear information-limiting correlations bound the performance of any decoder, they also make decoding more robust to suboptimal computation, allowing many suboptimal decoders to achieve nearly the same efficiency as an optimal decoder. Although these correlations are extremely difficult to measure directly, particularly for nonlinear codes, we provide a simple, practical test by which one can use choice-related activity in small populations of neurons to determine whether decoding is suboptimal or optimal and limited by correlated noise. We conclude by describing an example computation in the vestibular system where this theory applies. QY and XP was supported by a grant from the McNair foundation.

  16. Identification by sequencing based typing and complete coding region analysis of three new HLA class II alleles: DRB3*0210, DRB3*0211 and DQB1*0310.

    PubMed

    Balas, A; Santos, S; Aviles, M J; Garcia-Sanchez, F; Lillo, R; Vicario, J L

    2000-10-01

    The study of HLA class II polymorphism by direct exon 2 DNA sequencing analysis has been established to be a reliable and accurate high-resolution typing procedure. This approach shows some advantages in relation to previous methods, polymerase chain reaction using sequence-specific oligonucleotides (PCR-SSO) and sequence-specific primers (PCR-SSP), basically due to the capability of analysis for the complete sequenced genomic region, including non-polymorphic motifs. DRB3 and DQB1 sequencing based typing (SBT) in unrelated bone marrow donor searching allowed us to detect three new alleles. The complete coding region sequences were characterised from cDNA. Two new DRB3 alleles, DRB3*0210 and DRB3*0211, were described in two Caucasian bone marrow donors. Both sequences showed single point mutations regarding DRB3*0202, producing amino acid replacements at positions 51 (Asp to Thr) and 67 (Leu to Ile), respectively. These two point mutations can be found in other DRB alleles, and suggest that gene conversion would be involved in the origin of both alleles. A new DQB1 sequence was found in a Spanish patient that showed two nucleotide differences, positions 134 and 141, with regard to its close similar DQB1*03011 allele. Only substitution at position 134 provoked amino acid replacement at residue 45, Glu to Gly. This single amino acid change would be involved in the lack of serologic recognition of this new molecule by DQ7-specific reagents.

  17. Application of isotope coded affinity tag (ICAT) analysis for the identification of differentially expressed proteins following infection of atlantic salmon (Salmo salar) with infectious hematopoietic necrosis virus (IHNV) or Renibacterium salmoninarum (BKD).

    PubMed

    Booy, A T; Haddow, J D; Ohlund, L B; Hardie, D B; Olafson, R W

    2005-01-01

    Aquaculture and commercial fisheries worldwide suffer from significant economic loss due to diseases of net-pen reared fish. In British Columbia, infectious hematopoietic necrosis (IHN) and bacterial kidney disease (BKD) epidemics occur because there are currently no commercially available drugs or fully licensed vaccines to treat these diseases. With a better understanding of the molecular mechanisms underlying these diseases, this circumstance might be significantly improved. In the present study, we have used a proteomics approach in an effort to identify and quantitate differentially expressed proteins in the liver and kidneys of diseased and healthy Atlantic salmon (Salmo salar). Isotope coded affinity tagging (ICAT), 2D gel electrophoresis, and multidimensional liquid chromatography coupled to tandem mass spectrometry (2D-LC MS/MS) were used to identify hundreds of differentially expressed proteins. While the direct significance of changes in expression levels of many proteins remains to be elucidated, others appear to be more clearly related to the infectious process. Examples of the latter are discussed here and include, a natural killer cell enhancement factor (NKEF), procathepsin L, superoxide-producing NADPH oxidase and interferon-induced viral resistance protein Mx (IFI-Mx).

  18. Coded source neutron imaging

    SciTech Connect

    Bingham, Philip R; Santos-Villalobos, Hector J

    2011-01-01

    Coded aperture techniques have been applied to neutron radiography to address limitations in neutron flux and resolution of neutron detectors in a system labeled coded source imaging (CSI). By coding the neutron source, a magnified imaging system is designed with small spot size aperture holes (10 and 100 m) for improved resolution beyond the detector limits and with many holes in the aperture (50% open) to account for flux losses due to the small pinhole size. An introduction to neutron radiography and coded aperture imaging is presented. A system design is developed for a CSI system with a development of equations for limitations on the system based on the coded image requirements and the neutron source characteristics of size and divergence. Simulation has been applied to the design using McStas to provide qualitative measures of performance with simulations of pinhole array objects followed by a quantitative measure through simulation of a tilted edge and calculation of the modulation transfer function (MTF) from the line spread function. MTF results for both 100um and 10um aperture hole diameters show resolutions matching the hole diameters.

  19. Error coding simulations

    NASA Technical Reports Server (NTRS)

    Noble, Viveca K.

    1993-01-01

    There are various elements such as radio frequency interference (RFI) which may induce errors in data being transmitted via a satellite communication link. When a transmission is affected by interference or other error-causing elements, the transmitted data becomes indecipherable. It becomes necessary to implement techniques to recover from these disturbances. The objective of this research is to develop software which simulates error control circuits and evaluate the performance of these modules in various bit error rate environments. The results of the evaluation provide the engineer with information which helps determine the optimal error control scheme. The Consultative Committee for Space Data Systems (CCSDS) recommends the use of Reed-Solomon (RS) and convolutional encoders and Viterbi and RS decoders for error correction. The use of forward error correction techniques greatly reduces the received signal to noise needed for a certain desired bit error rate. The use of concatenated coding, e.g. inner convolutional code and outer RS code, provides even greater coding gain. The 16-bit cyclic redundancy check (CRC) code is recommended by CCSDS for error detection.

  20. Coded source neutron imaging

    NASA Astrophysics Data System (ADS)

    Bingham, Philip; Santos-Villalobos, Hector; Tobin, Ken

    2011-03-01

    Coded aperture techniques have been applied to neutron radiography to address limitations in neutron flux and resolution of neutron detectors in a system labeled coded source imaging (CSI). By coding the neutron source, a magnified imaging system is designed with small spot size aperture holes (10 and 100μm) for improved resolution beyond the detector limits and with many holes in the aperture (50% open) to account for flux losses due to the small pinhole size. An introduction to neutron radiography and coded aperture imaging is presented. A system design is developed for a CSI system with a development of equations for limitations on the system based on the coded image requirements and the neutron source characteristics of size and divergence. Simulation has been applied to the design using McStas to provide qualitative measures of performance with simulations of pinhole array objects followed by a quantitative measure through simulation of a tilted edge and calculation of the modulation transfer function (MTF) from the line spread function. MTF results for both 100μm and 10μm aperture hole diameters show resolutions matching the hole diameters.

  1. In search of coding and non-coding regions of DNA sequences based on balanced estimation of diffusion entropy.

    PubMed

    Zhang, Jin; Zhang, Wenqing; Yang, Huijie

    2016-01-01

    Identification of coding regions in DNA sequences remains challenging. Various methods have been proposed, but these are limited by species-dependence and the need for adequate training sets. The elements in DNA coding regions are known to be distributed in a quasi-random way, while those in non-coding regions have typical similar structures. For short sequences, these statistical characteristics cannot be extracted correctly and cannot even be detected. This paper introduces a new way to solve the problem: balanced estimation of diffusion entropy (BEDE).

  2. Code query by example

    NASA Astrophysics Data System (ADS)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  3. Seals Code Development Workshop

    NASA Technical Reports Server (NTRS)

    Hendricks, Robert C. (Compiler); Liang, Anita D. (Compiler)

    1996-01-01

    Seals Workshop of 1995 industrial code (INDSEAL) release include ICYL, GCYLT, IFACE, GFACE, SPIRALG, SPIRALI, DYSEAL, and KTK. The scientific code (SCISEAL) release includes conjugate heat transfer and multidomain with rotordynamic capability. Several seals and bearings codes (e.g., HYDROFLEX, HYDROTRAN, HYDROB3D, FLOWCON1, FLOWCON2) are presented and results compared. Current computational and experimental emphasis includes multiple connected cavity flows with goals of reducing parasitic losses and gas ingestion. Labyrinth seals continue to play a significant role in sealing with face, honeycomb, and new sealing concepts under investigation for advanced engine concepts in view of strict environmental constraints. The clean sheet approach to engine design is advocated with program directions and anticipated percentage SFC reductions cited. Future activities center on engine applications with coupled seal/power/secondary flow streams.

  4. SAC: Sheffield Advanced Code

    NASA Astrophysics Data System (ADS)

    Griffiths, Mike; Fedun, Viktor; Mumford, Stuart; Gent, Frederick

    2013-06-01

    The Sheffield Advanced Code (SAC) is a fully non-linear MHD code designed for simulations of linear and non-linear wave propagation in gravitationally strongly stratified magnetized plasma. It was developed primarily for the forward modelling of helioseismological processes and for the coupling processes in the solar interior, photosphere, and corona; it is built on the well-known VAC platform that allows robust simulation of the macroscopic processes in gravitationally stratified (non-)magnetized plasmas. The code has no limitations of simulation length in time imposed by complications originating from the upper boundary, nor does it require implementation of special procedures to treat the upper boundaries. SAC inherited its modular structure from VAC, thereby allowing modification to easily add new physics.

  5. Autocatalysis, information and coding.

    PubMed

    Wills, P R

    2001-01-01

    Autocatalytic self-construction in macromolecular systems requires the existence of a reflexive relationship between structural components and the functional operations they perform to synthesise themselves. The possibility of reflexivity depends on formal, semiotic features of the catalytic structure-function relationship, that is, the embedding of catalytic functions in the space of polymeric structures. Reflexivity is a semiotic property of some genetic sequences. Such sequences may serve as the basis for the evolution of coding as a result of autocatalytic self-organisation in a population of assignment catalysts. Autocatalytic selection is a mechanism whereby matter becomes differentiated in primitive biochemical systems. In the case of coding self-organisation, it corresponds to the creation of symbolic information. Prions are present-day entities whose replication through autocatalysis reflects aspects of biological semiotics less obvious than genetic coding.

  6. Code inspection instructional validation

    NASA Technical Reports Server (NTRS)

    Orr, Kay; Stancil, Shirley

    1992-01-01

    The Shuttle Data Systems Branch (SDSB) of the Flight Data Systems Division (FDSD) at Johnson Space Center contracted with Southwest Research Institute (SwRI) to validate the effectiveness of an interactive video course on the code inspection process. The purpose of this project was to determine if this course could be effective for teaching NASA analysts the process of code inspection. In addition, NASA was interested in the effectiveness of this unique type of instruction (Digital Video Interactive), for providing training on software processes. This study found the Carnegie Mellon course, 'A Cure for the Common Code', effective for teaching the process of code inspection. In addition, analysts prefer learning with this method of instruction, or this method in combination with other methods. As is, the course is definitely better than no course at all; however, findings indicate changes are needed. Following are conclusions of this study. (1) The course is instructionally effective. (2) The simulation has a positive effect on student's confidence in his ability to apply new knowledge. (3) Analysts like the course and prefer this method of training, or this method in combination with current methods of training in code inspection, over the way training is currently being conducted. (4) Analysts responded favorably to information presented through scenarios incorporating full motion video. (5) Some course content needs to be changed. (6) Some content needs to be added to the course. SwRI believes this study indicates interactive video instruction combined with simulation is effective for teaching software processes. Based on the conclusions of this study, SwRI has outlined seven options for NASA to consider. SwRI recommends the option which involves creation of new source code and data files, but uses much of the existing content and design from the current course. Although this option involves a significant software development effort, SwRI believes this option

  7. Polar Code Validation

    DTIC Science & Technology

    1989-09-30

    Unclassified 2a SECURITY CLASSiF-ICATiON AUTHORIT’Y 3 DIStRIBUTION AVAILABILITY OF REPORT N,A Approved for public release; 2o DECLASSIFICAIiON DOWNGRADING SCH DI...SUMMARY OF POLAR ACHIEVEMENTS ..... .......... 3 3 . POLAR CODE PHYSICAL MODELS ..... ............. 5 3.1 PL-ASMA Su ^"ru5 I1LS SH A...11 Structure of the Bipolar Plasma Sheath Generated by SPEAR I ... ...... 1 3 The POLAR Code Wake Model: Comparison with in Situ Observations . . 23

  8. Aeroacoustic Prediction Codes

    NASA Technical Reports Server (NTRS)

    Gliebe, P; Mani, R.; Shin, H.; Mitchell, B.; Ashford, G.; Salamah, S.; Connell, S.; Huff, Dennis (Technical Monitor)

    2000-01-01

    This report describes work performed on Contract NAS3-27720AoI 13 as part of the NASA Advanced Subsonic Transport (AST) Noise Reduction Technology effort. Computer codes were developed to provide quantitative prediction, design, and analysis capability for several aircraft engine noise sources. The objective was to provide improved, physics-based tools for exploration of noise-reduction concepts and understanding of experimental results. Methods and codes focused on fan broadband and 'buzz saw' noise and on low-emissions combustor noise and compliment work done by other contractors under the NASA AST program to develop methods and codes for fan harmonic tone noise and jet noise. The methods and codes developed and reported herein employ a wide range of approaches, from the strictly empirical to the completely computational, with some being semiempirical analytical, and/or analytical/computational. Emphasis was on capturing the essential physics while still considering method or code utility as a practical design and analysis tool for everyday engineering use. Codes and prediction models were developed for: (1) an improved empirical correlation model for fan rotor exit flow mean and turbulence properties, for use in predicting broadband noise generated by rotor exit flow turbulence interaction with downstream stator vanes: (2) fan broadband noise models for rotor and stator/turbulence interaction sources including 3D effects, noncompact-source effects. directivity modeling, and extensions to the rotor supersonic tip-speed regime; (3) fan multiple-pure-tone in-duct sound pressure prediction methodology based on computational fluid dynamics (CFD) analysis; and (4) low-emissions combustor prediction methodology and computer code based on CFD and actuator disk theory. In addition. the relative importance of dipole and quadrupole source mechanisms was studied using direct CFD source computation for a simple cascadeigust interaction problem, and an empirical combustor

  9. Securing mobile code.

    SciTech Connect

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements

  10. Granada oscillation code (GraCo)

    NASA Astrophysics Data System (ADS)

    Moya, A.; Garrido, R.

    2008-08-01

    Granada oscillation code (GraCo) is a software constructed to compute adiabatic and non-adiabatic oscillation eigenfunctions and eigenvalues. The adiabatic version gives the standard numerical resolution, and also the Richardson extrapolation, different sets of eigenfunctions, different outer mechanical boundary conditions or different integration variables. The non-adiabatic version can include the atmosphere-pulsation interaction. The code has been used for intensive studies of δ Scuti, γ Doradus, β Ceph., SdO and, SdB stars. The non adiabatic observables “phase-lag” (the phase between the effective temperature variations and the radial displacement) and {δ T_{eff}over T_{eff}} (relative surface temperature variation) can help to the modal identification. These quantities together with the energy balance (“growth rate”) provide useful additional information to the adiabatic resolution (eigenfrequencies and eigenfunctions).

  11. Coding and traceability for cells, tissues and organs for transplantation

    PubMed Central

    Shinozaki, Naoshi

    2010-01-01

    Modern transplantation of cells, tissues and organs has been practiced within the last century achieving both life saving and enhancing results. Associated risks have been recognized including infectious disease transmission, malignancy, immune mediated disease and graft failure. This has resulted in establishment of government regulation, professional standard setting and establishment of vigilance and surveillance systems for early detection and prevention and to improve patient safety. The increased transportation of grafts across national boundaries has made traceability difficult and sometimes impossible. Experience during the first Gulf War with miss-identification of blood units coming from multiple countries without standardized coding and labeling has led international organizations to develop standardized nomenclature and coding for blood. Following this example, cell therapy and tissue transplant practitioners have also moved to standardization of coding systems. Establishment of an international coding system has progressed rapidly and implementation for blood has demonstrated multiple advantages. WHO has held two global consultations on human cells and tissues for transplantation, which recognized the global circulation of cells and tissues and growing commercialization and the need for means of coding to identify tissues and cells used in transplantation, are essential for full traceability. There is currently a wide diversity in the identification and coding of tissue and cell products. For tissues, with a few exceptions, product terminology has not been standardized even at the national level. Progress has been made in blood and cell therapies with a slow and steady trend towards implementation of the international code ISBT 128. Across all fields, there are now 3,700 licensed facilities in 66 countries. Efforts are necessary to encourage the introduction of a standardized international coding system for donation identification numbers, such as ISBT

  12. Coding and traceability for cells, tissues and organs for transplantation.

    PubMed

    Strong, D Michael; Shinozaki, Naoshi

    2010-11-01

    Modern transplantation of cells, tissues and organs has been practiced within the last century achieving both life saving and enhancing results. Associated risks have been recognized including infectious disease transmission, malignancy, immune mediated disease and graft failure. This has resulted in establishment of government regulation, professional standard setting and establishment of vigilance and surveillance systems for early detection and prevention and to improve patient safety. The increased transportation of grafts across national boundaries has made traceability difficult and sometimes impossible. Experience during the first Gulf War with mis-identification of blood units coming from multiple countries without standardized coding and labeling has led international organizations to develop standardized nomenclature and coding for blood. Following this example, cell therapy and tissue transplant practitioners have also moved to standardization of coding systems. Establishment of an international coding system has progressed rapidly and implementation for blood has demonstrated multiple advantages. WHO has held two global consultations on human cells and tissues for transplantation, which recognized the global circulation of cells and tissues and growing commercialization and the need for means of coding to identify tissues and cells used in transplantation, are essential for full traceability. There is currently a wide diversity in the identification and coding of tissue and cell products. For tissues, with a few exceptions, product terminology has not been standardized even at the national level. Progress has been made in blood and cell therapies with a slow and steady trend towards implementation of the international code ISBT 128. Across all fields, there are now 3,700 licensed facilities in 66 countries. Efforts are necessary to encourage the introduction of a standardized international coding system for donation identification numbers, such as ISBT

  13. Malnutrition coding 101: financial impact and more.

    PubMed

    Giannopoulos, Georgia A; Merriman, Louise R; Rumsey, Alissa; Zwiebel, Douglas S

    2013-12-01

    Recent articles have addressed the characteristics associated with adult malnutrition as published by the Academy of Nutrition and Dietetics (the Academy) and the American Society for Parenteral and Enteral Nutrition (A.S.P.E.N.). This article describes a successful interdisciplinary program developed by the Department of Food and Nutrition at New York-Presbyterian Hospital to maintain and monitor clinical documentation, ensure accurate International Classification of Diseases 9th Edition (ICD-9) coding, and identify subsequent incremental revenue resulting from the early identification, documentation, and treatment of malnutrition in an adult inpatient population. The first step in the process requires registered dietitians to identify patients with malnutrition; then clear and specifically worded diagnostic statements that include the type and severity of malnutrition are documented in the medical record by the physician, nurse practitioner, or physician's assistant. This protocol allows the Heath Information Management/Coding department to accurately assign ICD-9 codes associated with protein-energy malnutrition. Once clinical coding is complete, a final diagnosis related group (DRG) is generated to ensure appropriate hospital reimbursement. Successful interdisciplinary programs such as this can drive optimal care and ensure appropriate reimbursement.

  14. Optimal probabilistic dense coding schemes

    NASA Astrophysics Data System (ADS)

    Kögler, Roger A.; Neves, Leonardo

    2017-04-01

    Dense coding with non-maximally entangled states has been investigated in many different scenarios. We revisit this problem for protocols adopting the standard encoding scheme. In this case, the set of possible classical messages cannot be perfectly distinguished due to the non-orthogonality of the quantum states carrying them. So far, the decoding process has been approached in two ways: (i) The message is always inferred, but with an associated (minimum) error; (ii) the message is inferred without error, but only sometimes; in case of failure, nothing else is done. Here, we generalize on these approaches and propose novel optimal probabilistic decoding schemes. The first uses quantum-state separation to increase the distinguishability of the messages with an optimal success probability. This scheme is shown to include (i) and (ii) as special cases and continuously interpolate between them, which enables the decoder to trade-off between the level of confidence desired to identify the received messages and the success probability for doing so. The second scheme, called multistage decoding, applies only for qudits ( d-level quantum systems with d>2) and consists of further attempts in the state identification process in case of failure in the first one. We show that this scheme is advantageous over (ii) as it increases the mutual information between the sender and receiver.

  15. Coding for urologic office procedures.

    PubMed

    Dowling, Robert A; Painter, Mark

    2013-11-01

    This article summarizes current best practices for documenting, coding, and billing common office-based urologic procedures. Topics covered include general principles, basic and advanced urologic coding, creation of medical records that support compliant coding practices, bundled codes and unbundling, global periods, modifiers for procedure codes, when to bill for evaluation and management services during the same visit, coding for supplies, and laboratory and radiology procedures pertinent to urology practice. Detailed information is included for the most common urology office procedures, and suggested resources and references are provided. This information is of value to physicians, office managers, and their coding staff.

  16. Accumulate Repeat Accumulate Coded Modulation

    NASA Technical Reports Server (NTRS)

    Abbasfar, Aliazam; Divsalar, Dariush; Yao, Kung

    2004-01-01

    In this paper we propose an innovative coded modulation scheme called 'Accumulate Repeat Accumulate Coded Modulation' (ARA coded modulation). This class of codes can be viewed as serial turbo-like codes, or as a subclass of Low Density Parity Check (LDPC) codes that are combined with high level modulation. Thus at the decoder belief propagation can be used for iterative decoding of ARA coded modulation on a graph, provided a demapper transforms the received in-phase and quadrature samples to reliability of the bits.

  17. Dental orthopantomogram biometrics system for human identification.

    PubMed

    Singh, Sandeep; Bhargava, Darpan; Deshpande, Ashwini

    2013-07-01

    Fingerprinting is the most widely accepted method of identification of people. But in cases of disfigured, decomposed, burnt or fragmented bodies, it is of limited value. Teeth and dental restorations on the other hand are extremely resistant to destruction by fire. They retain a number of their original characteristics, which are often unique and hence offer a possibility of rather accurate and legally acceptable identification of such remains. This study was undertaken to evaluate the utility of orthopantomography for human identification and propose a coding system for orthopantomogram (OPG), which can be utilized as an identification tool in forensic sciences.

  18. Dress Codes. Legal Brief.

    ERIC Educational Resources Information Center

    Zirkel, Perry A.

    2000-01-01

    As illustrated by two recent decisions, the courts in the past decade have demarcated wide boundaries for school officials considering dress codes, whether in the form of selective prohibitions or required uniforms. Administrators must warn the community, provide legitimate justification and reasonable clarity, and comply with state law. (MLH)

  19. Dress Codes and Uniforms.

    ERIC Educational Resources Information Center

    Lumsden, Linda; Miller, Gabriel

    2002-01-01

    Students do not always make choices that adults agree with in their choice of school dress. Dress-code issues are explored in this Research Roundup, and guidance is offered to principals seeking to maintain a positive school climate. In "Do School Uniforms Fit?" Kerry White discusses arguments for and against school uniforms and summarizes the…

  20. Building Codes and Regulations.

    ERIC Educational Resources Information Center

    Fisher, John L.

    The hazard of fire is of great concern to libraries due to combustible books and new plastics used in construction and interiors. Building codes and standards can offer architects and planners guidelines to follow but these standards should be closely monitored, updated, and researched for fire prevention. (DS)

  1. Student Dress Codes.

    ERIC Educational Resources Information Center

    Uerling, Donald F.

    School officials see a need for regulations that prohibit disruptive and inappropriate forms of expression and attire; students see these regulations as unwanted restrictions on their freedom. This paper reviews court litigation involving constitutional limitations on school authority, dress and hair codes, state law constraints, and school…

  2. Video Coding for ESL.

    ERIC Educational Resources Information Center

    King, Kevin

    1992-01-01

    Coding tasks, a valuable technique for teaching English as a Second Language, are presented that enable students to look at patterns and structures of marital communication as well as objectively evaluate the degree of happiness or distress in the marriage. (seven references) (JL)

  3. Electrical Circuit Simulation Code

    SciTech Connect

    Wix, Steven D.; Waters, Arlon J.; Shirley, David

    2001-08-09

    Massively-Parallel Electrical Circuit Simulation Code. CHILESPICE is a massively-arallel distributed-memory electrical circuit simulation tool that contains many enhanced radiation, time-based, and thermal features and models. Large scale electronic circuit simulation. Shared memory, parallel processing, enhance convergence. Sandia specific device models.

  4. Multiple trellis coded modulation

    NASA Technical Reports Server (NTRS)

    Simon, Marvin K. (Inventor); Divsalar, Dariush (Inventor)

    1990-01-01

    A technique for designing trellis codes to minimize bit error performance for a fading channel. The invention provides a criteria which may be used in the design of such codes which is significantly different from that used for average white Gaussian noise channels. The method of multiple trellis coded modulation of the present invention comprises the steps of: (a) coding b bits of input data into s intermediate outputs; (b) grouping said s intermediate outputs into k groups of s.sub.i intermediate outputs each where the summation of all s.sub.i,s is equal to s and k is equal to at least 2; (c) mapping each of said k groups of intermediate outputs into one of a plurality of symbols in accordance with a plurality of modulation schemes, one for each group such that the first group is mapped in accordance with a first modulation scheme and the second group is mapped in accordance with a second modulation scheme; and (d) outputting each of said symbols to provide k output symbols for each b bits of input data.

  5. Coding Theory and Projective Spaces

    NASA Astrophysics Data System (ADS)

    Silberstein, Natalia

    2008-05-01

    The projective space of order n over a finite field F_q is a set of all subspaces of the vector space F_q^{n}. In this work, we consider error-correcting codes in the projective space, focusing mainly on constant dimension codes. We start with the different representations of subspaces in the projective space. These representations involve matrices in reduced row echelon form, associated binary vectors, and Ferrers diagrams. Based on these representations, we provide a new formula for the computation of the distance between any two subspaces in the projective space. We examine lifted maximum rank distance (MRD) codes, which are nearly optimal constant dimension codes. We prove that a lifted MRD code can be represented in such a way that it forms a block design known as a transversal design. The incidence matrix of the transversal design derived from a lifted MRD code can be viewed as a parity-check matrix of a linear code in the Hamming space. We find the properties of these codes which can be viewed also as LDPC codes. We present new bounds and constructions for constant dimension codes. First, we present a multilevel construction for constant dimension codes, which can be viewed as a generalization of a lifted MRD codes construction. This construction is based on a new type of rank-metric codes, called Ferrers diagram rank-metric codes. Then we derive upper bounds on the size of constant dimension codes which contain the lifted MRD code, and provide a construction for two families of codes, that attain these upper bounds. We generalize the well-known concept of a punctured code for a code in the projective space to obtain large codes which are not constant dimension. We present efficient enumerative encoding and decoding techniques for the Grassmannian. Finally we describe a search method for constant dimension lexicodes.

  6. Evaluation and implementation of QR Code Identity Tag system for Healthcare in Turkey.

    PubMed

    Uzun, Vassilya; Bilgin, Sami

    2016-01-01

    For this study, we designed a QR Code Identity Tag system to integrate into the Turkish healthcare system. This system provides QR code-based medical identification alerts and an in-hospital patient identification system. Every member of the medical system is assigned a unique QR Code Tag; to facilitate medical identification alerts, the QR Code Identity Tag can be worn as a bracelet or necklace or carried as an ID card. Patients must always possess the QR Code Identity bracelets within hospital grounds. These QR code bracelets link to the QR Code Identity website, where detailed information is stored; a smartphone or standalone QR code scanner can be used to scan the code. The design of this system allows authorized personnel (e.g., paramedics, firefighters, or police) to access more detailed patient information than the average smartphone user: emergency service professionals are authorized to access patient medical histories to improve the accuracy of medical treatment. In Istanbul, we tested the self-designed system with 174 participants. To analyze the QR Code Identity Tag system's usability, the participants completed the System Usability Scale questionnaire after using the system.

  7. Sinusoidal transform coding

    NASA Technical Reports Server (NTRS)

    Mcaulay, Robert J.; Quatieri, Thomas F.

    1988-01-01

    It has been shown that an analysis/synthesis system based on a sinusoidal representation of speech leads to synthetic speech that is essentially perceptually indistinguishable from the original. Strategies for coding the amplitudes, frequencies and phases of the sine waves have been developed that have led to a multirate coder operating at rates from 2400 to 9600 bps. The encoded speech is highly intelligible at all rates with a uniformly improving quality as the data rate is increased. A real-time fixed-point implementation has been developed using two ADSP2100 DSP chips. The methods used for coding and quantizing the sine-wave parameters for operation at the various frame rates are described.

  8. WHPA Code available

    NASA Astrophysics Data System (ADS)

    The Wellhead Protection Area code is now available for distribution by the International Ground Water Modeling Center in Indianapolis, Ind. The WHPA code is a modular, semianalytical, groundwater flow model developed for the U.S. Environmental Protection Agency, Office of Ground Water Protection, designed to assist state and local technical staff with the task of Wellhead Protection Area (WHPA) delineation. A complete news item appeared in Eos, May 1, 1990, p. 690.The model consists of four independent, semianalytical modules that may be used to identify the areal extent of groundwater contribution to one or multiple pumping wells. One module is a general particle tracking program that may be used as a post-processor for two-dimensional, numerical models of groundwater flow. One module incorporates a Monte Carlo approach to investigate the effects of uncertain input parameters on capture zones. Multiple pumping and injection wells may be present and barrier or stream boundary conditions may be investigated.

  9. WHPA Code available

    NASA Astrophysics Data System (ADS)

    The Wellhead Protection Area (WHPA) code is now available for distribution by the International Ground Water Modeling Center in Indianapolis, Ind. The WHPA code is a modular, semi-analytical, groundwater flow model developed for the U.S. Environmental Protection Agency, Office of Ground Water Protection. It is designed to assist state and local technical staff with the task of WHPA delineation.The model consists of four independent, semi-analytical modules that may be used to identify the areal extent of groundwater contribution to one or multiple pumping wells. One module is a general particle tracking program that may be used as a post-processor for two-dimensional, numerical models of groundwater flow. One module incorporates a Monte Carlo approach to investigate the effects of uncertain input parameters on capture zones. Multiple pumping and injection wells may be present and barrier or stream boundary conditions may be investigated.

  10. Confocal coded aperture imaging

    DOEpatents

    Tobin, Jr., Kenneth William; Thomas, Jr., Clarence E.

    2001-01-01

    A method for imaging a target volume comprises the steps of: radiating a small bandwidth of energy toward the target volume; focusing the small bandwidth of energy into a beam; moving the target volume through a plurality of positions within the focused beam; collecting a beam of energy scattered from the target volume with a non-diffractive confocal coded aperture; generating a shadow image of said aperture from every point source of radiation in the target volume; and, reconstructing the shadow image into a 3-dimensional image of the every point source by mathematically correlating the shadow image with a digital or analog version of the coded aperture. The method can comprise the step of collecting the beam of energy scattered from the target volume with a Fresnel zone plate.

  11. Acceptability of identification bracelets for hospital inpatients

    PubMed Central

    Cleopas, A; Kolly, V; Bovier, P; Garnerin, P; Perneger, T

    2004-01-01

    Objective: To evaluate whether hospitalised patients would agree to wear an identification bracelet and whether patient acceptability is improved by more detailed explanations or by using a code instead of a name on the bracelet. Design: Patient survey that tested two variables in a randomised factorial design. Explanations about identification bracelets were given (a) with or without examples of situations where patient identification may be important, and (b) with the patient name or an anonymous code appearing on the bracelet. Setting: Swiss teaching hospital where wearing of identification bracelets was not systematic. Participants: Adult patients discharged from hospital (n = 1411). Main outcome measures: Patients' responses to the questions: (a) should the hospital introduce a compulsory identification bracelet? and (b) would the patient agree to wear such a bracelet? Results: Globally, 83.9% of patients thought that the hospital should introduce bracelets and 90.2% stated that they would agree to wear one. Providing examples increased support for both the hospital policy (87.9% v 79.2%, p<0.001) and personal acceptance (92.2% v 88.1%, p = 0.015). Whether or not the bracelet carried the patient's name or an anonymous code did not influence patient choice. Conclusions: The majority of patients were in favour of wearing an identification bracelet during their hospital stay. This proportion increased significantly when an explanation based on examples of the consequences of incorrect patient identification had been provided. PMID:15465937

  12. 29 CFR 1910.144 - Safety color code for marking physical hazards.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 5 2012-07-01 2012-07-01 false Safety color code for marking physical hazards. 1910.144... § 1910.144 Safety color code for marking physical hazards. (a) Color identification—(1) Red. Red shall be the basic color for the identification of: (i) Fire protection equipment and apparatus. (ii)...

  13. 29 CFR 1910.144 - Safety color code for marking physical hazards.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 5 2014-07-01 2014-07-01 false Safety color code for marking physical hazards. 1910.144... § 1910.144 Safety color code for marking physical hazards. (a) Color identification—(1) Red. Red shall be the basic color for the identification of: (i) Fire protection equipment and apparatus. (ii)...

  14. [Is the Furness-Moore Code applicable for computer and telex?].

    PubMed

    Rötzscher, K

    1979-12-01

    The extent to which the identification of disaster victims could be improved with the code for dental findings developed by Furness and Moore (1969) was studied. This code records the most important data for a set of teeth in 12 digits.

  15. HYCOM Code Development

    DTIC Science & Technology

    2003-02-10

    HYCOM code development Alan J. Wallcraft Naval Research Laboratory 2003 Layered Ocean Model Users’ Workshop February 10, 2003 Report Documentation...unlimited 13. SUPPLEMENTARY NOTES Layered Ocean Modeling Workshop (LOM 2003), Miami, FL, Feb 2003 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY...Kraus-Turner mixed-layer Æ Energy-Loan (passive) ice model Æ High frequency atmospheric forcing Æ New I/O scheme (.a and .b files) Æ Scalability via

  16. Reeds computer code

    NASA Technical Reports Server (NTRS)

    Bjork, C.

    1981-01-01

    The REEDS (rocket exhaust effluent diffusion single layer) computer code is used for the estimation of certain rocket exhaust effluent concentrations and dosages and their distributions near the Earth's surface following a rocket launch event. Output from REEDS is used in producing near real time air quality and environmental assessments of the effects of certain potentially harmful effluents, namely HCl, Al2O3, CO, and NO.

  17. Trajectory Code Studies, 1987

    SciTech Connect

    Poukey, J.W.

    1988-01-01

    The trajectory code TRAJ has been used extensively to study nonimmersed foilless electron diodes. The basic goal of the research is to design low-emittance injectors for electron linacs and propagation experiments. Systems studied during 1987 include Delphi, Recirc, and Troll. We also discuss a partly successful attempt to extend the same techniques to high currents (tens of kA). 7 refs., 30 figs.

  18. The PHARO Code.

    DTIC Science & Technology

    1981-11-24

    n.cet..ary ad Identfy by block nutrb.) Visible radiation Sensors Infrared radiation Line and band transitions Isophots High altitude nuclear data...radiation (watts sr) in arbitrary wavelength intervals is determined. The results are a series of " isophot " plots for rbitrariiy placed cameras or sensors...Section II. The output of the PHARO code consists of contour plots of radiative intensity (watts/cm ster) or " isophot " plots for arbitrarily placed sensors

  19. The Phantom SPH code

    NASA Astrophysics Data System (ADS)

    Price, Daniel; Wurster, James; Nixon, Chris

    2016-05-01

    I will present the capabilities of the Phantom SPH code for global simulations of dust and gas in protoplanetary discs. I will present our new algorithms for simulating both small and large grains in discs, as well as our progress towards simulating evolving grain populations and coupling with radiation. Finally, I will discuss our recent applications to HL Tau and the physics of dust gap opening.

  20. Status of MARS Code

    SciTech Connect

    N.V. Mokhov

    2003-04-09

    Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

  1. Orthopedics coding and funding.

    PubMed

    Baron, S; Duclos, C; Thoreux, P

    2014-02-01

    The French tarification à l'activité (T2A) prospective payment system is a financial system in which a health-care institution's resources are based on performed activity. Activity is described via the PMSI medical information system (programme de médicalisation du système d'information). The PMSI classifies hospital cases by clinical and economic categories known as diagnosis-related groups (DRG), each with an associated price tag. Coding a hospital case involves giving as realistic a description as possible so as to categorize it in the right DRG and thus ensure appropriate payment. For this, it is essential to understand what determines the pricing of inpatient stay: namely, the code for the surgical procedure, the patient's principal diagnosis (reason for admission), codes for comorbidities (everything that adds to management burden), and the management of the length of inpatient stay. The PMSI is used to analyze the institution's activity and dynamism: change on previous year, relation to target, and comparison with competing institutions based on indicators such as the mean length of stay performance indicator (MLS PI). The T2A system improves overall care efficiency. Quality of care, however, is not presently taken account of in the payment made to the institution, as there are no indicators for this; work needs to be done on this topic.

  2. MELCOR computer code manuals

    SciTech Connect

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L.; Hodge, S.A.; Hyman, C.R.; Sanders, R.L.

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  3. Bar coded retroreflective target

    DOEpatents

    Vann, Charles S.

    2000-01-01

    This small, inexpensive, non-contact laser sensor can detect the location of a retroreflective target in a relatively large volume and up to six degrees of position. The tracker's laser beam is formed into a plane of light which is swept across the space of interest. When the beam illuminates the retroreflector, some of the light returns to the tracker. The intensity, angle, and time of the return beam is measured to calculate the three dimensional location of the target. With three retroreflectors on the target, the locations of three points on the target are measured, enabling the calculation of all six degrees of target position. Until now, devices for three-dimensional tracking of objects in a large volume have been heavy, large, and very expensive. Because of the simplicity and unique characteristics of this tracker, it is capable of three-dimensional tracking of one to several objects in a large volume, yet it is compact, light-weight, and relatively inexpensive. Alternatively, a tracker produces a diverging laser beam which is directed towards a fixed position, and senses when a retroreflective target enters the fixed field of view. An optically bar coded target can be read by the tracker to provide information about the target. The target can be formed of a ball lens with a bar code on one end. As the target moves through the field, the ball lens causes the laser beam to scan across the bar code.

  4. Suboptimum decoding of block codes

    NASA Technical Reports Server (NTRS)

    Lin, Shu; Kasami, Tadao

    1991-01-01

    This paper investigates a class of decomposable codes, their distance and structural properties. it is shown that this class includes several classes of well known and efficient codes as subclasses. Several methods for constructing decomposable codes or decomposing codes are presented. A two-stage soft decision decoding scheme for decomposable codes, their translates or unions of translates is devised. This two-stage soft-decision decoding is suboptimum, and provides an excellent trade-off between the error performance and decoding complexity for codes of moderate and long block length.

  5. Preliminary Assessment of Turbomachinery Codes

    NASA Technical Reports Server (NTRS)

    Mazumder, Quamrul H.

    2007-01-01

    This report assesses different CFD codes developed and currently being used at Glenn Research Center to predict turbomachinery fluid flow and heat transfer behavior. This report will consider the following codes: APNASA, TURBO, GlennHT, H3D, and SWIFT. Each code will be described separately in the following section with their current modeling capabilities, level of validation, pre/post processing, and future development and validation requirements. This report addresses only previously published and validations of the codes. However, the codes have been further developed to extend the capabilities of the codes.

  6. Construction of new quantum MDS codes derived from constacyclic codes

    NASA Astrophysics Data System (ADS)

    Taneja, Divya; Gupta, Manish; Narula, Rajesh; Bhullar, Jaskaran

    Obtaining quantum maximum distance separable (MDS) codes from dual containing classical constacyclic codes using Hermitian construction have paved a path to undertake the challenges related to such constructions. Using the same technique, some new parameters of quantum MDS codes have been constructed here. One set of parameters obtained in this paper has achieved much larger distance than work done earlier. The remaining constructed parameters of quantum MDS codes have large minimum distance and were not explored yet.

  7. Convolutional coding techniques for data protection

    NASA Technical Reports Server (NTRS)

    Massey, J. L.

    1975-01-01

    Results of research on the use of convolutional codes in data communications are presented. Convolutional coding fundamentals are discussed along with modulation and coding interaction. Concatenated coding systems and data compression with convolutional codes are described.

  8. Combinatorial neural codes from a mathematical coding theory perspective.

    PubMed

    Curto, Carina; Itskov, Vladimir; Morrison, Katherine; Roth, Zachary; Walker, Judy L

    2013-07-01

    Shannon's seminal 1948 work gave rise to two distinct areas of research: information theory and mathematical coding theory. While information theory has had a strong influence on theoretical neuroscience, ideas from mathematical coding theory have received considerably less attention. Here we take a new look at combinatorial neural codes from a mathematical coding theory perspective, examining the error correction capabilities of familiar receptive field codes (RF codes). We find, perhaps surprisingly, that the high levels of redundancy present in these codes do not support accurate error correction, although the error-correcting performance of receptive field codes catches up to that of random comparison codes when a small tolerance to error is introduced. However, receptive field codes are good at reflecting distances between represented stimuli, while the random comparison codes are not. We suggest that a compromise in error-correcting capability may be a necessary price to pay for a neural code whose structure serves not only error correction, but must also reflect relationships between stimuli.

  9. New quantum MDS-convolutional codes derived from constacyclic codes

    NASA Astrophysics Data System (ADS)

    Li, Fengwei; Yue, Qin

    2015-12-01

    In this paper, we utilize a family of Hermitian dual-containing constacyclic codes to construct classical and quantum MDS convolutional codes. Our classical and quantum convolutional codes are optimal in the sense that they attain the classical (quantum) generalized Singleton bound.

  10. A class of constacyclic BCH codes and new quantum codes

    NASA Astrophysics Data System (ADS)

    liu, Yang; Li, Ruihu; Lv, Liangdong; Ma, Yuena

    2017-03-01

    Constacyclic BCH codes have been widely studied in the literature and have been used to construct quantum codes in latest years. However, for the class of quantum codes of length n=q^{2m}+1 over F_{q^2} with q an odd prime power, there are only the ones of distance δ ≤ 2q^2 are obtained in the literature. In this paper, by a detailed analysis of properties of q2-ary cyclotomic cosets, maximum designed distance δ _{max} of a class of Hermitian dual-containing constacyclic BCH codes with length n=q^{2m}+1 are determined, this class of constacyclic codes has some characteristic analog to that of primitive BCH codes over F_{q^2}. Then we can obtain a sequence of dual-containing constacyclic codes of designed distances 2q^2<δ ≤ δ _{max}. Consequently, new quantum codes with distance d > 2q^2 can be constructed from these dual-containing codes via Hermitian Construction. These newly obtained quantum codes have better code rate compared with those constructed from primitive BCH codes.

  11. Summary of 1990 Code Conference

    SciTech Connect

    Cooper, R.K.; Chan, Kwok-Chi D.

    1990-01-01

    The Conference on Codes and the Linear Accelerator Community was held in Los Alamos in January 1990, and had approximately 100 participants. This conference was the second in a series which has as its goal the exchange of information about codes and code practices among those writing and actually using these codes for the design and analysis of linear accelerators and their components. The first conference was held in San Diego in January 1988, and concentrated on beam dynamics codes and Maxwell solvers. This most recent conference concentrated on 3-D codes and techniques to handle the large amounts of data required for three-dimensional problems. In addition to descriptions of codes, their algorithms and implementations, there were a number of paper describing the use of many of the codes. Proceedings of both these conferences are available. 3 refs., 2 tabs.

  12. Biological identification systems: genetic markers.

    PubMed

    Cunningham, E P; Meghen, C M

    2001-08-01

    Individual animals differ from each other on a number of biological levels. At the most basic level, the deoxyribonucleic acid (DNA) of each animal is different, and transcription of the DNA code yields variations at the protein level, which in turn give rise to individual diversity at the physical level. In recent years, accessing the primary genetic code of individual animals has become straightforward. The authors briefly review the development of biological identification technologies and then consider in more detail the application of current DNA testing technologies to issues of traceability of live animals and derived products. Although largely focused on cattle and beef traceability, the principles described are relevant to ovine, porcine and equine traceability. The accelerating pace of innovation and development within the field of molecular genetics suggests that the technologies described may soon be superseded. However, the principles of genetic identification will remain unchanged.

  13. 40 CFR 62.5160 - Identification of plan.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Existing Hospital/medical/infectious Waste Incinerators (hmiwis)(section 111(d)/129 Plan) § 62.5160 Identification of plan. Section 111(d)/129 plan for HMIWIs and the associated Code of Maryland (COMAR)...

  14. 40 CFR 62.5160 - Identification of plan.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Existing Hospital/medical/infectious Waste Incinerators (hmiwis)(section 111(d)/129 Plan) § 62.5160 Identification of plan. Section 111(d)/129 plan for HMIWIs and the associated Code of Maryland (COMAR)...

  15. JUPITER PROJECT - JOINT UNIVERSAL PARAMETER IDENTIFICATION AND EVALUATION OF RELIABILITY

    EPA Science Inventory

    The JUPITER (Joint Universal Parameter IdenTification and Evaluation of Reliability) project builds on the technology of two widely used codes for sensitivity analysis, data assessment, calibration, and uncertainty analysis of environmental models: PEST and UCODE.

  16. Chemical Laser Computer Code Survey,

    DTIC Science & Technology

    1980-12-01

    DOCUMENTATION: Resonator Geometry Synthesis Code Requi rement NV. L. Gamiz); Incorporate General Resonator into Ray Trace Code (W. H. Southwell... Synthesis Code Development (L. R. Stidhm) CATEGRY ATIUEOPTICS KINETICS GASOYNAM41CS None * None *iNone J.LEVEL Simrple Fabry Perot Simple SaturatedGt... Synthesis Co2de Require- ment (V L. ami l ncor~orate General Resonatorn into Ray Trace Code (W. H. Southwel) Srace Optimization Algorithms and Equations (W

  17. Energy Codes and Standards: Facilities

    SciTech Connect

    Bartlett, Rosemarie; Halverson, Mark A.; Shankle, Diana L.

    2007-01-01

    Energy codes and standards play a vital role in the marketplace by setting minimum requirements for energy-efficient design and construction. They outline uniform requirements for new buildings as well as additions and renovations. This article covers basic knowledge of codes and standards; development processes of each; adoption, implementation, and enforcement of energy codes and standards; and voluntary energy efficiency programs.

  18. Coding Issues in Grounded Theory

    ERIC Educational Resources Information Center

    Moghaddam, Alireza

    2006-01-01

    This paper discusses grounded theory as one of the qualitative research designs. It describes how grounded theory generates from data. Three phases of grounded theory--open coding, axial coding, and selective coding--are discussed, along with some of the issues which are the source of debate among grounded theorists, especially between its…

  19. IRIG Serial Time Code Formats

    DTIC Science & Technology

    2016-08-01

    TELECOMMUNICATIONS AND TIMING GROUP IRIG STANDARD 200-16 IRIG SERIAL TIME CODE FORMATS DISTRIBUTION A: APPROVED FOR...ARNOLD ENGINEERING DEVELOPMENT COMPLEX NATIONAL AERONAUTICS AND SPACE ADMINISTRATION This page intentionally left blank. IRIG SERIAL TIME CODE ...Serial Time Code Formats, RCC 200-16, August 2016 v Table of Contents Preface

  20. Coding Major Fields of Study.

    ERIC Educational Resources Information Center

    Bobbitt, L. G.; Carroll, C. D.

    The National Center for Education Statistics conducts surveys which require the coding of the respondent's major field of study. This paper presents a new system for the coding of major field of study. It operates on-line i a Computer Assisted Telephone Interview (CATI) environment and allows conversational checks to verify coding directly from…

  1. Improved code-tracking loop

    NASA Technical Reports Server (NTRS)

    Laflame, D. T.

    1980-01-01

    Delay-locked loop tracks pseudonoise codes without introducing dc timing errors, because it is not sensitive to gain imbalance between signal processing arms. "Early" and "late" reference codes pass in combined form through both arms, and each arm acts on both codes. Circuit accomodates 1 dB weaker input signals with tracking ability equal to that of tau-dither loops.

  2. Validation of the BEPLATE code

    SciTech Connect

    Giles, G.E.; Bullock, J.S.

    1997-11-01

    The electroforming simulation code BEPLATE (Boundary Element-PLATE) has been developed and validated for specific applications at Oak Ridge. New areas of application are opening up and more validations are being performed. This paper reports the validation experience of the BEPLATE code on two types of electroforms and describes some recent applications of the code.

  3. Authorship Attribution of Source Code

    ERIC Educational Resources Information Center

    Tennyson, Matthew F.

    2013-01-01

    Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…

  4. Ptolemy Coding Style

    DTIC Science & Technology

    2014-09-05

    COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Ptolemy Coding Style 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6...lisp module for GNU Emacs that has appropriate indenting rules. This file works well with Emacs under both Unix and Windows. • testsuite/ptspell is a...Unix. It is much more liberal that the commonly used “GPL” or “ GNU Public License,” which encumbers the software and derivative works with the

  5. Structured error recovery for code-word-stabilized quantum codes

    SciTech Connect

    Li Yunfan; Dumer, Ilya; Grassl, Markus; Pryadko, Leonid P.

    2010-05-15

    Code-word-stabilized (CWS) codes are, in general, nonadditive quantum codes that can correct errors by an exhaustive search of different error patterns, similar to the way that we decode classical nonlinear codes. For an n-qubit quantum code correcting errors on up to t qubits, this brute-force approach consecutively tests different errors of weight t or less and employs a separate n-qubit measurement in each test. In this article, we suggest an error grouping technique that allows one to simultaneously test large groups of errors in a single measurement. This structured error recovery technique exponentially reduces the number of measurements by about 3{sup t} times. While it still leaves exponentially many measurements for a generic CWS code, the technique is equivalent to syndrome-based recovery for the special case of additive CWS codes.

  6. Structured error recovery for code-word-stabilized quantum codes

    NASA Astrophysics Data System (ADS)

    Li, Yunfan; Dumer, Ilya; Grassl, Markus; Pryadko, Leonid P.

    2010-05-01

    Code-word-stabilized (CWS) codes are, in general, nonadditive quantum codes that can correct errors by an exhaustive search of different error patterns, similar to the way that we decode classical nonlinear codes. For an n-qubit quantum code correcting errors on up to t qubits, this brute-force approach consecutively tests different errors of weight t or less and employs a separate n-qubit measurement in each test. In this article, we suggest an error grouping technique that allows one to simultaneously test large groups of errors in a single measurement. This structured error recovery technique exponentially reduces the number of measurements by about 3t times. While it still leaves exponentially many measurements for a generic CWS code, the technique is equivalent to syndrome-based recovery for the special case of additive CWS codes.

  7. Low Density Parity Check Codes: Bandwidth Efficient Channel Coding

    NASA Technical Reports Server (NTRS)

    Fong, Wai; Lin, Shu; Maki, Gary; Yeh, Pen-Shu

    2003-01-01

    Low Density Parity Check (LDPC) Codes provide near-Shannon Capacity performance for NASA Missions. These codes have high coding rates R=0.82 and 0.875 with moderate code lengths, n=4096 and 8176. Their decoders have inherently parallel structures which allows for high-speed implementation. Two codes based on Euclidean Geometry (EG) were selected for flight ASIC implementation. These codes are cyclic and quasi-cyclic in nature and therefore have a simple encoder structure. This results in power and size benefits. These codes also have a large minimum distance as much as d,,, = 65 giving them powerful error correcting capabilities and error floors less than lo- BER. This paper will present development of the LDPC flight encoder and decoder, its applications and status.

  8. New quantum codes constructed from quaternary BCH codes

    NASA Astrophysics Data System (ADS)

    Xu, Gen; Li, Ruihu; Guo, Luobin; Ma, Yuena

    2016-10-01

    In this paper, we firstly study construction of new quantum error-correcting codes (QECCs) from three classes of quaternary imprimitive BCH codes. As a result, the improved maximal designed distance of these narrow-sense imprimitive Hermitian dual-containing quaternary BCH codes are determined to be much larger than the result given according to Aly et al. (IEEE Trans Inf Theory 53:1183-1188, 2007) for each different code length. Thus, families of new QECCs are newly obtained, and the constructed QECCs have larger distance than those in the previous literature. Secondly, we apply a combinatorial construction to the imprimitive BCH codes with their corresponding primitive counterpart and construct many new linear quantum codes with good parameters, some of which have parameters exceeding the finite Gilbert-Varshamov bound for linear quantum codes.

  9. Quantum Codes From Cyclic Codes Over The Ring R2

    NASA Astrophysics Data System (ADS)

    Altinel, Alev; Güzeltepe, Murat

    2016-10-01

    Let R 2 denotes the ring F 2 + μF 2 + υ2 + μυF 2 + wF 2 + μwF 2 + υwF 2 + μυwF2. In this study, we construct quantum codes from cyclic codes over the ring R2, for arbitrary length n, with the restrictions μ2 = 0, υ2 = 0, w 2 = 0, μυ = υμ, μw = wμ, υw = wυ and μ (υw) = (μυ) w. Also, we give a necessary and sufficient condition for cyclic codes over R2 that contains its dual. As a final point, we obtain the parameters of quantum error-correcting codes from cyclic codes over R2 and we give an example of quantum error-correcting codes form cyclic codes over R 2.

  10. Why are [P(C6H5)4](+)N3- and [As(C6H5)4](+)N3- ionic salts and Sb(C6H5)4N3 and Bi(C6H5)4N3 covalent solids? A theoretical study provides an unexpected answer.

    PubMed

    Christe, Karl O; Haiges, Ralf; Boatz, Jerry A; Jenkins, H Donald Brooke; Garner, Edward B; Dixon, David A

    2011-04-18

    A recent crystallographic study has shown that, in the solid state, P(C(6)H(5))(4)N(3) and As(C(6)H(5))(4)N(3) have ionic [M(C(6)H(5))(4)](+)N(3)(-)-type structures, whereas Sb(C(6)H(5))(4)N(3) exists as a pentacoordinated covalent solid. Using the results from density functional theory, lattice energy (VBT) calculations, sublimation energy estimates, and Born-Fajans-Haber cycles, it is shown that the maximum coordination numbers of the central atom M, the lattice energies of the ionic solids, and the sublimation energies of the covalent solids have no or little influence on the nature of the solids. Unexpectedly, the main factor determining whether the covalent or ionic structures are energetically favored is the first ionization potential of [M(C(6)H(5))(4)]. The calculations show that at ambient temperature the ionic structure is favored for P(C(6)H(5))(4)N(3) and the covalent structures are favored for Sb(C(6)H(5))(4)N(3) and Bi(C(6)H(5))(4)N(3), while As(C(6)H(5))(4)N(3) presents a borderline case.

  11. Measuring Diagnoses: ICD Code Accuracy

    PubMed Central

    O'Malley, Kimberly J; Cook, Karon F; Price, Matt D; Wildes, Kimberly Raiford; Hurdle, John F; Ashton, Carol M

    2005-01-01

    Objective To examine potential sources of errors at each step of the described inpatient International Classification of Diseases (ICD) coding process. Data Sources/Study Setting The use of disease codes from the ICD has expanded from classifying morbidity and mortality information for statistical purposes to diverse sets of applications in research, health care policy, and health care finance. By describing a brief history of ICD coding, detailing the process for assigning codes, identifying where errors can be introduced into the process, and reviewing methods for examining code accuracy, we help code users more systematically evaluate code accuracy for their particular applications. Study Design/Methods We summarize the inpatient ICD diagnostic coding process from patient admission to diagnostic code assignment. We examine potential sources of errors at each step and offer code users a tool for systematically evaluating code accuracy. Principle Findings Main error sources along the “patient trajectory” include amount and quality of information at admission, communication among patients and providers, the clinician's knowledge and experience with the illness, and the clinician's attention to detail. Main error sources along the “paper trail” include variance in the electronic and written records, coder training and experience, facility quality-control efforts, and unintentional and intentional coder errors, such as misspecification, unbundling, and upcoding. Conclusions By clearly specifying the code assignment process and heightening their awareness of potential error sources, code users can better evaluate the applicability and limitations of codes for their particular situations. ICD codes can then be used in the most appropriate ways. PMID:16178999

  12. Code System for Isotope Identification by Gamma-Ray Analysis

    SciTech Connect

    1996-01-01

    For a set of a priori given nuclides taken from a work library, DIMEN uses median estimates of the peak areas and estimates of their errors to produce a list of possible nuclides matching a gamma-ray line and some measure of the reliability of this assignment.

  13. 49 CFR 178.502 - Identification codes for packagings.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...” means a jerrican. (iv) “4” means a box. (v) “5” means a bag. (vi) “6” means a composite packaging. (vii...) “H” means plastic. (viii) “L” means textile. (ix) “M” means paper, multi-wall. (x) “N” means metal... (i.e., “1A2”). (b) For composite packagings, two capital letters are used in sequence in the...

  14. 49 CFR 178.502 - Identification codes for packagings.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...” means a jerrican. (iv) “4” means a box. (v) “5” means a bag. (vi) “6” means a composite packaging. (vii...) “H” means plastic. (viii) “L” means textile. (ix) “M” means paper, multi-wall. (x) “N” means metal... (i.e., “1A2”). (b) For composite packagings, two capital letters are used in sequence in the...

  15. 49 CFR 178.502 - Identification codes for packagings.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...” means a jerrican. (iv) “4” means a box. (v) “5” means a bag. (vi) “6” means a composite packaging. (vii...) “H” means plastic. (viii) “L” means textile. (ix) “M” means paper, multi-wall. (x) “N” means metal... (i.e., “1A2”). (b) For composite packagings, two capital letters are used in sequence in the...

  16. 49 CFR 178.502 - Identification codes for packagings.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...” means a jerrican. (iv) “4” means a box. (v) “5” means a bag. (vi) “6” means a composite packaging. (vii...) “H” means plastic. (viii) “L” means textile. (ix) “M” means paper, multi-wall. (x) “N” means metal... (i.e., “1A2”). (b) For composite packagings, two capital letters are used in sequence in the...

  17. Wireless event-recording device with identification codes

    NASA Technical Reports Server (NTRS)

    Watters, David G. (Inventor); Huestis, David L. (Inventor); Bahr, Alfred J. (Inventor)

    2004-01-01

    A wireless recording device can be interrogated to determine its identity and its state. The state indicates whether a particular physical or chemical event has taken place. In effect, the physical or chemical event is recorded by the device. The identity of the device allows it to be distinguished from a number of similar devices. Thus the sensor device may be used in an array of devices that can be probed by a wireless interrogation unit. The device tells the interrogator who it is and what state it is in. The interrogator can thus easily identify particular items in an array that have reached a particular condition.

  18. Genetic code for sine

    NASA Astrophysics Data System (ADS)

    Abdullah, Alyasa Gan; Wah, Yap Bee

    2015-02-01

    The computation of the approximate values of the trigonometric sines was discovered by Bhaskara I (c. 600-c.680), a seventh century Indian mathematician and is known as the Bjaskara's I's sine approximation formula. The formula is given in his treatise titled Mahabhaskariya. In the 14th century, Madhava of Sangamagrama, a Kerala mathematician astronomer constructed the table of trigonometric sines of various angles. Madhava's table gives the measure of angles in arcminutes, arcseconds and sixtieths of an arcsecond. The search for more accurate formulas led to the discovery of the power series expansion by Madhava of Sangamagrama (c.1350-c. 1425), the founder of the Kerala school of astronomy and mathematics. In 1715, the Taylor series was introduced by Brook Taylor an English mathematician. If the Taylor series is centered at zero, it is called a Maclaurin series, named after the Scottish mathematician Colin Maclaurin. Some of the important Maclaurin series expansions include trigonometric functions. This paper introduces the genetic code of the sine of an angle without using power series expansion. The genetic code using square root approach reveals the pattern in the signs (plus, minus) and sequence of numbers in the sine of an angle. The square root approach complements the Pythagoras method, provides a better understanding of calculating an angle and will be useful for teaching the concepts of angles in trigonometry.

  19. FAST GYROSYNCHROTRON CODES

    SciTech Connect

    Fleishman, Gregory D.; Kuznetsov, Alexey A.

    2010-10-01

    Radiation produced by charged particles gyrating in a magnetic field is highly significant in the astrophysics context. Persistently increasing resolution of astrophysical observations calls for corresponding three-dimensional modeling of the radiation. However, available exact equations are prohibitively slow in computing a comprehensive table of high-resolution models required for many practical applications. To remedy this situation, we develop approximate gyrosynchrotron (GS) codes capable of quickly calculating the GS emission (in non-quantum regime) from both isotropic and anisotropic electron distributions in non-relativistic, mildly relativistic, and ultrarelativistic energy domains applicable throughout a broad range of source parameters including dense or tenuous plasmas and weak or strong magnetic fields. The computation time is reduced by several orders of magnitude compared with the exact GS algorithm. The new algorithm performance can gradually be adjusted to the user's needs depending on whether precision or computation speed is to be optimized for a given model. The codes are made available for users as a supplement to this paper.

  20. Determinate-state convolutional codes

    NASA Technical Reports Server (NTRS)

    Collins, O.; Hizlan, M.

    1991-01-01

    A determinate state convolutional code is formed from a conventional convolutional code by pruning away some of the possible state transitions in the decoding trellis. The type of staged power transfer used in determinate state convolutional codes proves to be an extremely efficient way of enhancing the performance of a concatenated coding system. The decoder complexity is analyzed along with free distances of these new codes and extensive simulation results is provided of their performance at the low signal to noise ratios where a real communication system would operate. Concise, practical examples are provided.

  1. Circular codes, symmetries and transformations.

    PubMed

    Fimmel, Elena; Giannerini, Simone; Gonzalez, Diego Luis; Strüngmann, Lutz

    2015-06-01

    Circular codes, putative remnants of primeval comma-free codes, have gained considerable attention in the last years. In fact they represent a second kind of genetic code potentially involved in detecting and maintaining the normal reading frame in protein coding sequences. The discovering of an universal code across species suggested many theoretical and experimental questions. However, there is a key aspect that relates circular codes to symmetries and transformations that remains to a large extent unexplored. In this article we aim at addressing the issue by studying the symmetries and transformations that connect different circular codes. The main result is that the class of 216 C3 maximal self-complementary codes can be partitioned into 27 equivalence classes defined by a particular set of transformations. We show that such transformations can be put in a group theoretic framework with an intuitive geometric interpretation. More general mathematical results about symmetry transformations which are valid for any kind of circular codes are also presented. Our results pave the way to the study of the biological consequences of the mathematical structure behind circular codes and contribute to shed light on the evolutionary steps that led to the observed symmetries of present codes.

  2. Making your code citable with the Astrophysics Source Code Library

    NASA Astrophysics Data System (ADS)

    Allen, Alice; DuPrie, Kimberly; Schmidt, Judy; Berriman, G. Bruce; Hanisch, Robert J.; Mink, Jessica D.; Nemiroff, Robert J.; Shamir, Lior; Shortridge, Keith; Taylor, Mark B.; Teuben, Peter J.; Wallin, John F.

    2016-01-01

    The Astrophysics Source Code Library (ASCL, ascl.net) is a free online registry of codes used in astronomy research. With nearly 1,200 codes, it is the largest indexed resource for astronomy codes in existence. Established in 1999, it offers software authors a path to citation of their research codes even without publication of a paper describing the software, and offers scientists a way to find codes used in refereed publications, thus improving the transparency of the research. It also provides a method to quantify the impact of source codes in a fashion similar to the science metrics of journal articles. Citations using ASCL IDs are accepted by major astronomy journals and if formatted properly are tracked by ADS and other indexing services. The number of citations to ASCL entries increased sharply from 110 citations in January 2014 to 456 citations in September 2015. The percentage of code entries in ASCL that were cited at least once rose from 7.5% in January 2014 to 17.4% in September 2015. The ASCL's mid-2014 infrastructure upgrade added an easy entry submission form, more flexible browsing, search capabilities, and an RSS feeder for updates. A Changes/Additions form added this past fall lets authors submit links for papers that use their codes for addition to the ASCL entry even if those papers don't formally cite the codes, thus increasing the transparency of that research and capturing the value of their software to the community.

  3. Practices in Code Discoverability: Astrophysics Source Code Library

    NASA Astrophysics Data System (ADS)

    Allen, A.; Teuben, P.; Nemiroff, R. J.; Shamir, L.

    2012-09-01

    Here we describe the Astrophysics Source Code Library (ASCL), which takes an active approach to sharing astrophysics source code. ASCL's editor seeks out both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and adds entries for the found codes to the library. This approach ensures that source codes are added without requiring authors to actively submit them, resulting in a comprehensive listing that covers a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL now has over 340 codes in it and continues to grow. In 2011, the ASCL has on average added 19 codes per month. An advisory committee has been established to provide input and guide the development and expansion of the new site, and a marketing plan has been developed and is being executed. All ASCL source codes have been used to generate results published in or submitted to a refereed journal and are freely available either via a download site or from an identified source. This paper provides the history and description of the ASCL. It lists the requirements for including codes, examines the advantages of the ASCL, and outlines some of its future plans.

  4. Signal Prediction With Input Identification

    NASA Technical Reports Server (NTRS)

    Juang, Jer-Nan; Chen, Ya-Chin

    1999-01-01

    A novel coding technique is presented for signal prediction with applications including speech coding, system identification, and estimation of input excitation. The approach is based on the blind equalization method for speech signal processing in conjunction with the geometric subspace projection theory to formulate the basic prediction equation. The speech-coding problem is often divided into two parts, a linear prediction model and excitation input. The parameter coefficients of the linear predictor and the input excitation are solved simultaneously and recursively by a conventional recursive least-squares algorithm. The excitation input is computed by coding all possible outcomes into a binary codebook. The coefficients of the linear predictor and excitation, and the index of the codebook can then be used to represent the signal. In addition, a variable-frame concept is proposed to block the same excitation signal in sequence in order to reduce the storage size and increase the transmission rate. The results of this work can be easily extended to the problem of disturbance identification. The basic principles are outlined in this report and differences from other existing methods are discussed. Simulations are included to demonstrate the proposed method.

  5. Denture bar-coding: An innovative technique in forensic dentistry.

    PubMed

    Dineshshankar, Janardhanam; Venkateshwaran, Rajendran; Vidhya, J; Anuradha, R; Mary, Gold Pealin; Pradeep, R; Senthileagappan, A R

    2015-08-01

    Denture markers play an important role in forensic odontology and also in identifying a person. A number of methods are there for identifying dentures from a less expensive technique to a more expensive technique. Out of different denture markers, the bar-coding system is a way of collecting data from the mobile. Even a huge amount of data can be stored in that. It can be easily incorporated during acrylization of the denture and thus could be helpful in identification. This article reviews the strengths of bar-coding and how easily it can be used in the routine procedure.

  6. The development of non-coding RNA ontology

    PubMed Central

    Eilbeck, Karen; Smith, Barry; Blake, Judith A.; Dou, Dejing; Huang, Weili; Natale, Darren A.; Ruttenberg, Alan; Huan, Jun; Zimmermann, Michael T.; Jiang, Guoqian; Lin, Yu; Wu, Bin; Strachan, Harrison J.; de Silva, Nisansa; Kasukurthi, Mohan Vamsi; Jha, Vikash Kumar; He, Yongqun; Zhang, Shaojie; Wang, Xiaowei; Liu, Zixing; Borchert, Glen M.; Tan, Ming

    2016-01-01

    Identification of non-coding RNAs (ncRNAs) has been significantly improved over the past decade. On the other hand, semantic annotation of ncRNA data is facing critical challenges due to the lack of a comprehensive ontology to serve as common data elements and data exchange standards in the field. We developed the Non-Coding RNA Ontology (NCRO) to handle this situation. By providing a formally defined ncRNA controlled vocabulary, the NCRO aims to fill a specific and highly needed niche in semantic annotation of large amounts of ncRNA biological and clinical data. PMID:27990175

  7. Denture bar-coding: An innovative technique in forensic dentistry

    PubMed Central

    Dineshshankar, Janardhanam; Venkateshwaran, Rajendran; Vidhya, J.; Anuradha, R.; Mary, Gold Pealin; Pradeep, R.; Senthileagappan, A. R.

    2015-01-01

    Denture markers play an important role in forensic odontology and also in identifying a person. A number of methods are there for identifying dentures from a less expensive technique to a more expensive technique. Out of different denture markers, the bar-coding system is a way of collecting data from the mobile. Even a huge amount of data can be stored in that. It can be easily incorporated during acrylization of the denture and thus could be helpful in identification. This article reviews the strengths of bar-coding and how easily it can be used in the routine procedure. PMID:26538876

  8. Electromagnetic particle simulation codes

    NASA Technical Reports Server (NTRS)

    Pritchett, P. L.

    1985-01-01

    Electromagnetic particle simulations solve the full set of Maxwell's equations. They thus include the effects of self-consistent electric and magnetic fields, magnetic induction, and electromagnetic radiation. The algorithms for an electromagnetic code which works directly with the electric and magnetic fields are described. The fields and current are separated into transverse and longitudinal components. The transverse E and B fields are integrated in time using a leapfrog scheme applied to the Fourier components. The particle pushing is performed via the relativistic Lorentz force equation for the particle momentum. As an example, simulation results are presented for the electron cyclotron maser instability which illustrate the importance of relativistic effects on the wave-particle resonance condition and on wave dispersion.

  9. Telescope Adaptive Optics Code

    SciTech Connect

    Phillion, D.

    2005-07-28

    The Telescope AO Code has general adaptive optics capabilities plus specialized models for three telescopes with either adaptive optics or active optics systems. It has the capability to generate either single-layer or distributed Kolmogorov turbulence phase screens using the FFT. Missing low order spatial frequencies are added using the Karhunen-Loeve expansion. The phase structure curve is extremely dose to the theoreUcal. Secondly, it has the capability to simulate an adaptive optics control systems. The default parameters are those of the Keck II adaptive optics system. Thirdly, it has a general wave optics capability to model the science camera halo due to scintillation from atmospheric turbulence and the telescope optics. Although this capability was implemented for the Gemini telescopes, the only default parameter specific to the Gemini telescopes is the primary mirror diameter. Finally, it has a model for the LSST active optics alignment strategy. This last model is highly specific to the LSST

  10. Code lock with microcircuit

    NASA Astrophysics Data System (ADS)

    Korobka, A.; May, I.

    1985-01-01

    A code lock with a microcircuit was invented which contains only a very few components. Two DD-triggers control the state of two identical transistors. When both transistors are turned on simultaneously the transistor VS1 is turned on so that the electromagnet YA1 pulls in the bolt and the door opens. This will happen only when a logic 1 appears at the inverted output of the first trigger and at the straight output of the second one. After the door is opened, a button on it resets the contactors to return both triggers to their original state. The electromagnetic is designed to produce the necessary pull force and sufficient power when under rectified 127 V line voltage, with the neutral wire of the lock circuit always connected to the - terminal of the power supply.

  11. Surface acoustic wave coding for orthogonal frequency coded devices

    NASA Technical Reports Server (NTRS)

    Malocha, Donald (Inventor); Kozlovski, Nikolai (Inventor)

    2011-01-01

    Methods and systems for coding SAW OFC devices to mitigate code collisions in a wireless multi-tag system. Each device producing plural stepped frequencies as an OFC signal with a chip offset delay to increase code diversity. A method for assigning a different OCF to each device includes using a matrix based on the number of OFCs needed and the number chips per code, populating each matrix cell with OFC chip, and assigning the codes from the matrix to the devices. The asynchronous passive multi-tag system includes plural surface acoustic wave devices each producing a different OFC signal having the same number of chips and including a chip offset time delay, an algorithm for assigning OFCs to each device, and a transceiver to transmit an interrogation signal and receive OFC signals in response with minimal code collisions during transmission.

  12. Improved lossless intra coding for next generation video coding

    NASA Astrophysics Data System (ADS)

    Vanam, Rahul; He, Yuwen; Ye, Yan

    2016-09-01

    Recently, there have been efforts by the ITU-T VCEG and ISO/IEC MPEG to further improve the compression performance of the High Efficiency Video Coding (HEVC) standard for developing a potential next generation video coding standard. The exploratory codec software of this potential standard includes new coding tools for inter and intra coding. In this paper, we present a new intra prediction mode for lossless intra coding. Our new intra mode derives a prediction filter for each input pixel using its neighboring reconstructed pixels, and applies this filter to the nearest neighboring reconstructed pixels to generate a prediction pixel. The proposed intra mode is demonstrated to improve the performance of the exploratory software for lossless intra coding, yielding a maximum and average bitrate savings of 4.4% and 2.11%, respectively.

  13. Transionospheric Propagation Code (TIPC)

    SciTech Connect

    Roussel-Dupre, R.; Kelley, T.A.

    1990-10-01

    The Transionospheric Propagation Code is a computer program developed at Los Alamos National Lab to perform certain tasks related to the detection of vhf signals following propagation through the ionosphere. The code is written in Fortran 77, runs interactively and was designed to be as machine independent as possible. A menu format in which the user is prompted to supply appropriate parameters for a given task has been adopted for the input while the output is primarily in the form of graphics. The user has the option of selecting from five basic tasks, namely transionospheric propagation, signal filtering, signal processing, DTOA study, and DTOA uncertainty study. For the first task a specified signal is convolved against the impulse response function of the ionosphere to obtain the transionospheric signal. The user is given a choice of four analytic forms for the input pulse or of supplying a tabular form. The option of adding Gaussian-distributed white noise of spectral noise to the input signal is also provided. The deterministic ionosphere is characterized to first order in terms of a total electron content (TEC) along the propagation path. In addition, a scattering model parameterized in terms of a frequency coherence bandwidth is also available. In the second task, detection is simulated by convolving a given filter response against the transionospheric signal. The user is given a choice of a wideband filter or a narrowband Gaussian filter. It is also possible to input a filter response. The third task provides for quadrature detection, envelope detection, and three different techniques for time-tagging the arrival of the transionospheric signal at specified receivers. The latter algorithms can be used to determine a TEC and thus take out the effects of the ionosphere to first order. Task four allows the user to construct a table of delta-times-of-arrival (DTOAs) vs TECs for a specified pair of receivers.

  14. Speech coding, reconstruction and recognition using acoustics and electromagnetic waves

    DOEpatents

    Holzrichter, John F.; Ng, Lawrence C.

    1998-01-01

    The use of EM radiation in conjunction with simultaneously recorded acoustic speech information enables a complete mathematical coding of acoustic speech. The methods include the forming of a feature vector for each pitch period of voiced speech and the forming of feature vectors for each time frame of unvoiced, as well as for combined voiced and unvoiced speech. The methods include how to deconvolve the speech excitation function from the acoustic speech output to describe the transfer function each time frame. The formation of feature vectors defining all acoustic speech units over well defined time frames can be used for purposes of speech coding, speech compression, speaker identification, language-of-speech identification, speech recognition, speech synthesis, speech translation, speech telephony, and speech teaching.

  15. Speech coding, reconstruction and recognition using acoustics and electromagnetic waves

    DOEpatents

    Holzrichter, J.F.; Ng, L.C.

    1998-03-17

    The use of EM radiation in conjunction with simultaneously recorded acoustic speech information enables a complete mathematical coding of acoustic speech. The methods include the forming of a feature vector for each pitch period of voiced speech and the forming of feature vectors for each time frame of unvoiced, as well as for combined voiced and unvoiced speech. The methods include how to deconvolve the speech excitation function from the acoustic speech output to describe the transfer function each time frame. The formation of feature vectors defining all acoustic speech units over well defined time frames can be used for purposes of speech coding, speech compression, speaker identification, language-of-speech identification, speech recognition, speech synthesis, speech translation, speech telephony, and speech teaching. 35 figs.

  16. On multilevel block modulation codes

    NASA Technical Reports Server (NTRS)

    Kasami, Tadao; Takata, Toyoo; Fujiwara, Toru; Lin, Shu

    1991-01-01

    The multilevel (ML) technique for combining block coding and modulation is investigated. A general formulation is presented for ML modulation codes in terms of component codes with appropriate distance measures. A specific method for constructing ML block modulation codes (MLBMCs) with interdependency among component codes is proposed. Given an MLBMC C with no interdependency among the binary component codes, the proposed method gives an MLBC C-prime that has the same rate as C, a minimum squared Euclidean distance not less than that of C, a trellis diagram with the same number of states as that of C, and a smaller number of nearest-neighbor codewords than that of C. Finally, a technique is presented for analyzing the error performance of MLBMCs for an additive white Gaussian noise channel based on soft-decision maximum-likelihood decoding.

  17. QR code for medical information uses.

    PubMed

    Fontelo, Paul; Liu, Fang; Ducut, Erick G

    2008-11-06

    We developed QR code online tools, simulated and tested QR code applications for medical information uses including scanning QR code labels, URLs and authentication. Our results show possible applications for QR code in medicine.

  18. Code Speed Measuring for VC++

    DTIC Science & Technology

    2015-10-01

    UNCLASSIFIED AD-E403 688 Technical Report ARWSE-TR-14025 CODE SPEED MEASURING FOR VC++ Tom Nealis...TYPE Final 3. DATES COVERED (From – To) 4. TITLE AND SUBTITLE CODE SPEED MEASURING FOR VC++ 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...ABSTRACT It’s often important to know how fast a snippet of code executes. This information allows the coder to make important decisions

  19. Explosive Formulation Code Naming SOP

    SciTech Connect

    Martz, H. E.

    2014-09-19

    The purpose of this SOP is to provide a procedure for giving individual HME formulations code names. A code name for an individual HME formulation consists of an explosive family code, given by the classified guide, followed by a dash, -, and a number. If the formulation requires preparation such as packing or aging, these add additional groups of symbols to the X-ray specimen name.

  20. Bar-Code-Scribing Tool

    NASA Technical Reports Server (NTRS)

    Badinger, Michael A.; Drouant, George J.

    1991-01-01

    Proposed hand-held tool applies indelible bar code to small parts. Possible to identify parts for management of inventory without tags or labels. Microprocessor supplies bar-code data to impact-printer-like device. Device drives replaceable scribe, which cuts bar code on surface of part. Used to mark serially controlled parts for military and aerospace equipment. Also adapts for discrete marking of bulk items used in food and pharmaceutical processing.

  1. Upgrades to NRLMOL code

    NASA Astrophysics Data System (ADS)

    Basurto, Luis

    This project consists of performing upgrades to the massively parallel NRLMOL electronic structure code in order to enhance its performance by increasing its flexibility by: a) Utilizing dynamically allocated arrays, b) Executing in a parallel environment sections of the program that were previously executed in a serial mode, c) Exploring simultaneous concurrent executions of the program through the use of an already existing MPI environment; thus enabling the simulation of larger systems than it is currently capable of performing. Also developed was a graphical user interface that will allow less experienced users to start performing electronic structure calculations by aiding them in performing the necessary configuration of input files as well as providing graphical tools for the displaying and analysis of results. Additionally, a computational toolkit that can avail of large supercomputers and make use of various levels of approximation for atomic interactions was developed to search for stable atomic clusters and predict novel stable endohedral fullerenes. As an application of the developed computational toolkit, a search was conducted for stable isomers of Sc3N C80 fullerene. In this search, about 1.2 million isomers of C80 were optimized in various charged states at the PM6 level. Subsequently, using the selected optimized isomers of C80 in various charged state, about 10,000 isomers of Sc3N C80 were constructed which were optimized using semi-empirical PM6 quantum chemical method. A few selected lowest isomers of Sc3N C80 were optimized at the DFT level. The calculation confirms the lowest 3 isomers previously reported in literature but 4 new isomers are found within the lowest 10 isomers. Using the upgraded NRLMOL code, a study was done of the electronic structure of a multichromoric molecular complex containing two of each borondipyrromethane dye, Zn-tetraphenyl-porphyrin, bisphenyl anthracene and a fullerene. A systematic examination of the effect of

  2. Reliability of ICD-10 external cause of death codes in the National Coroners Information System.

    PubMed

    Bugeja, Lyndal; Clapperton, Angela J; Killian, Jessica J; Stephan, Karen L; Ozanne-Smith, Joan

    2010-01-01

    Availability of ICD-10 cause of death codes in the National Coroners Information System (NCIS) strengthens its value as a public health surveillance tool. This study quantified the completeness of external cause ICD-10 codes in the NCIS for Victorian deaths (as assigned by the Australian Bureau of Statistics (ABS) in the yearly Cause of Death data). It also examined the concordance between external cause ICD-10 codes contained in the NCIS and a re-code of the same deaths conducted by an independent coder. Of 7,400 NCIS external cause deaths included in this study, 961 (13.0%) did not contain an ABS assigned ICD-10 code and 225 (3.0%) contained only a natural cause code. Where an ABS assigned external cause ICD-10 code was present (n=6,214), 4,397 (70.8%) matched exactly with the independently assigned ICD-10 code. Coding disparity primarily related to differences in assignment of intent and specificity. However, in a small number of deaths (n=49, 0.8%) there was coding disparity for both intent and external cause category. NCIS users should be aware of the limitations of relying only on ICD-10 codes contained within the NCIS for deaths prior to 2007 and consider using these in combination with the other NCIS data fields and code sets to ensure optimum case identification.

  3. Digital Image Analysis for DETCHIP® Code Determination

    PubMed Central

    Lyon, Marcus; Wilson, Mark V.; Rouhier, Kerry A.; Symonsbergen, David J.; Bastola, Kiran; Thapa, Ishwor; Holmes, Andrea E.

    2013-01-01

    DETECHIP® is a molecular sensing array used for identification of a large variety of substances. Previous methodology for the analysis of DETECHIP® used human vision to distinguish color changes induced by the presence of the analyte of interest. This paper describes several analysis techniques using digital images of DETECHIP®. Both a digital camera and flatbed desktop photo scanner were used to obtain Jpeg images. Color information within these digital images was obtained through the measurement of red-green-blue (RGB) values using software such as GIMP, Photoshop and ImageJ. Several different techniques were used to evaluate these color changes. It was determined that the flatbed scanner produced in the clearest and more reproducible images. Furthermore, codes obtained using a macro written for use within ImageJ showed improved consistency versus pervious methods. PMID:25267940

  4. The FLUKA Code: an Overview

    SciTech Connect

    Ballarini, F.; Battistoni, G.; Campanella, M.; Carboni, M.; Cerutti, F.; Empl, A.; Fasso, A.; Ferrari, A.; Gadioli, E.; Garzelli, M.V.; Lantz, M.; Liotta, M.; Mairani, A.; Mostacci, A.; Muraro, S.; Ottolenghi, A.; Pelliccioni, M.; Pinsky, L.; Ranft, J.; Roesler, S.; Sala, P.R.; /Milan U. /INFN, Milan /Pavia U. /INFN, Pavia /CERN /Siegen U. /Houston U. /SLAC /Frascati /NASA, Houston /ENEA, Frascati

    2005-11-09

    FLUKA is a multipurpose Monte Carlo code which can transport a variety of particles over a wide energy range in complex geometries. The code is a joint project of INFN and CERN: part of its development is also supported by the University of Houston and NASA. FLUKA is successfully applied in several fields, including but not only, particle physics, cosmic ray physics, dosimetry, radioprotection, hadron therapy, space radiation, accelerator design and neutronics. The code is the standard tool used at CERN for dosimetry, radioprotection and beam-machine interaction studies. Here we give a glimpse into the code physics models with a particular emphasis to the hadronic and nuclear sector.

  5. High Order Modulation Protograph Codes

    NASA Technical Reports Server (NTRS)

    Nguyen, Thuy V. (Inventor); Nosratinia, Aria (Inventor); Divsalar, Dariush (Inventor)

    2014-01-01

    Digital communication coding methods for designing protograph-based bit-interleaved code modulation that is general and applies to any modulation. The general coding framework can support not only multiple rates but also adaptive modulation. The method is a two stage lifting approach. In the first stage, an original protograph is lifted to a slightly larger intermediate protograph. The intermediate protograph is then lifted via a circulant matrix to the expected codeword length to form a protograph-based low-density parity-check code.

  6. Astrophysics Source Code Library Enhancements

    NASA Astrophysics Data System (ADS)

    Hanisch, R. J.; Allen, A.; Berriman, G. B.; DuPrie, K.; Mink, J.; Nemiroff, R. J.; Schmidt, J.; Shamir, L.; Shortridge, K.; Taylor, M.; Teuben, P. J.; Wallin, J.

    2015-09-01

    The Astrophysics Source Code Library (ASCL)1 is a free online registry of codes used in astronomy research; it currently contains over 900 codes and is indexed by ADS. The ASCL has recently moved a new infrastructure into production. The new site provides a true database for the code entries and integrates the WordPress news and information pages and the discussion forum into one site. Previous capabilities are retained and permalinks to ascl.net continue to work. This improvement offers more functionality and flexibility than the previous site, is easier to maintain, and offers new possibilities for collaboration. This paper covers these recent changes to the ASCL.

  7. The FLUKA Code: An Overview

    NASA Technical Reports Server (NTRS)

    Ballarini, F.; Battistoni, G.; Campanella, M.; Carboni, M.; Cerutti, F.; Empl, A.; Fasso, A.; Ferrari, A.; Gadioli, E.; Garzelli, M. V.; Lantz, M.; Liotta, M.; Mairani, A.; Mostacci, A.; Muraro, S.; Ottolenghi, A.; Pelliccioni, M.; Pinsky, L.; Ranft, J.; Roesler, S.; Sala, P. R.; Scannicchio, D.; Trovati, S.; Villari, R.; Wilson, T.

    2006-01-01

    FLUKA is a multipurpose Monte Carlo code which can transport a variety of particles over a wide energy range in complex geometries. The code is a joint project of INFN and CERN: part of its development is also supported by the University of Houston and NASA. FLUKA is successfully applied in several fields, including but not only, particle physics, cosmic ray physics, dosimetry, radioprotection, hadron therapy, space radiation, accelerator design and neutronics. The code is the standard tool used at CERN for dosimetry, radioprotection and beam-machine interaction studies. Here we give a glimpse into the code physics models with a particular emphasis to the hadronic and nuclear sector.

  8. Golay and other box codes

    NASA Technical Reports Server (NTRS)

    Solomon, G.

    1992-01-01

    The (24,12;8) extended Golay Code can be generated as a 6 x 4 binary matrix from the (15,11;3) BCH-Hamming Code, represented as a 5 x 3 matrix, by adding a row and a column, both of odd or even parity. The odd-parity case provides the additional 12th dimension. Furthermore, any three columns and five rows of the 6 x 4 Golay form a BCH-Hamming (15,11;3) Code. Similarly a (80,58;8) code can be generated as a 10 x 8 binary matrix from the (63,57;3) BCH-Hamming Code represented as a 9 x 7 matrix by adding a row and a column both of odd and even parity. Furthermore, any seven columns along with the top nine rows is a BCH-Hamming (53,57;3) Code. A (80,40;16) 10 x 8 matrix binary code with weight structure identical to the extended (80,40;16) Quadratic Residue Code is generated from a (63,39;7) binary cyclic code represented as a 9 x 7 matrix, by adding a row and a column, both of odd or even parity.

  9. Golay and other box codes

    NASA Technical Reports Server (NTRS)

    Solomon, G.

    1992-01-01

    The (24,12;8) extended Golay Code can be generated as a 6x4 binary matrix from the (15,11;3) BCH-Hamming Code, represented as a 5 x 3 matrix, by adding a row and a column, both of odd or even parity. The odd-parity case provides the additional 12th dimension. Furthermore, any three columns and five rows of the 6 x 4 Golay form a BCH-Hamming (15,11;3) Code. Similarly a (80,58;8) code can be generated as a 10 x 8 binary matrix from the (63,57;3) BCH-Hamming Code represented as a 9 x 7 matrix by adding a row and a column both of odd and even parity. Furthermore, any seven columns along with the top nine rows is a BCH-Hamming (63,57;3) Code. A (80,40;16) 10 x 8 matrix binary code with weight structure identical to the extended (80,40;16) Quadratic Residue Code is generated from a (63,39;7) binary cyclic code represented as a 9 x 7 matrix, by adding a row and a column, both of odd or even parity.

  10. Implementation issues in source coding

    NASA Technical Reports Server (NTRS)

    Sayood, Khalid; Chen, Yun-Chung; Hadenfeldt, A. C.

    1989-01-01

    An edge preserving image coding scheme which can be operated in both a lossy and a lossless manner was developed. The technique is an extension of the lossless encoding algorithm developed for the Mars observer spectral data. It can also be viewed as a modification of the DPCM algorithm. A packet video simulator was also developed from an existing modified packet network simulator. The coding scheme for this system is a modification of the mixture block coding (MBC) scheme described in the last report. Coding algorithms for packet video were also investigated.

  11. 47 CFR 22.313 - Station identification.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... telephony using the English language or by telegraphy using the international Morse code, and in a form that... digital transmission to ascertain the call sign. Station identification comprises transmission of the call sign assigned by the Commission to the station, however, the following may be used in lieu of the...

  12. 47 CFR 22.313 - Station identification.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... telephony using the English language or by telegraphy using the international Morse code, and in a form that... digital transmission to ascertain the call sign. Station identification comprises transmission of the call sign assigned by the Commission to the station, however, the following may be used in lieu of the...

  13. 47 CFR 22.313 - Station identification.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... telephony using the English language or by telegraphy using the international Morse code, and in a form that... digital transmission to ascertain the call sign. Station identification comprises transmission of the call sign assigned by the Commission to the station, however, the following may be used in lieu of the...

  14. The KIDTALK Behavior and Language Code: Manual and Coding Protocol.

    ERIC Educational Resources Information Center

    Delaney, Elizabeth M.; Ezell, Sara S.; Solomon, Ned A.; Hancock, Terry B.; Kaiser, Ann P.

    Developed as part of the Milieu Language Teaching Project at the John F. Kennedy Center at Vanderbilt University in Nashville, Tennessee, this KIDTALK Behavior-Language Coding Protocol and manual measures behavior occurring during adult-child interactions. The manual is divided into 5 distinct sections: (1) the adult behavior codes describe…

  15. n-Nucleotide circular codes in graph theory.

    PubMed

    Fimmel, Elena; Michel, Christian J; Strüngmann, Lutz

    2016-03-13

    The circular code theory proposes that genes are constituted of two trinucleotide codes: the classical genetic code with 61 trinucleotides for coding the 20 amino acids (except the three stop codons {TAA,TAG,TGA}) and a circular code based on 20 trinucleotides for retrieving, maintaining and synchronizing the reading frame. It relies on two main results: the identification of a maximal C(3) self-complementary trinucleotide circular code X in genes of bacteria, eukaryotes, plasmids and viruses (Michel 2015 J. Theor. Biol. 380, 156-177. (doi:10.1016/j.jtbi.2015.04.009); Arquès & Michel 1996 J. Theor. Biol. 182, 45-58. (doi:10.1006/jtbi.1996.0142)) and the finding of X circular code motifs in tRNAs and rRNAs, in particular in the ribosome decoding centre (Michel 2012 Comput. Biol. Chem. 37, 24-37. (doi:10.1016/j.compbiolchem.2011.10.002); El Soufi & Michel 2014 Comput. Biol. Chem. 52, 9-17. (doi:10.1016/j.compbiolchem.2014.08.001)). The univerally conserved nucleotides A1492 and A1493 and the conserved nucleotide G530 are included in X circular code motifs. Recently, dinucleotide circular codes were also investigated (Michel & Pirillo 2013 ISRN Biomath. 2013, 538631. (doi:10.1155/2013/538631); Fimmel et al. 2015 J. Theor. Biol. 386, 159-165. (doi:10.1016/j.jtbi.2015.08.034)). As the genetic motifs of different lengths are ubiquitous in genes and genomes, we introduce a new approach based on graph theory to study in full generality n-nucleotide circular codes X, i.e. of length 2 (dinucleotide), 3 (trinucleotide), 4 (tetranucleotide), etc. Indeed, we prove that an n-nucleotide code X is circular if and only if the corresponding graph [Formula: see text] is acyclic. Moreover, the maximal length of a path in [Formula: see text] corresponds to the window of nucleotides in a sequence for detecting the correct reading frame. Finally, the graph theory of tournaments is applied to the study of dinucleotide circular codes. It has full equivalence between the combinatorics

  16. Patched Conic Trajectory Code

    NASA Technical Reports Server (NTRS)

    Park, Brooke Anderson; Wright, Henry

    2012-01-01

    PatCon code was developed to help mission designers run trade studies on launch and arrival times for any given planet. Initially developed in Fortran, the required inputs included launch date, arrival date, and other orbital parameters of the launch planet and arrival planets at the given dates. These parameters include the position of the planets, the eccentricity, semi-major axes, argument of periapsis, ascending node, and inclination of the planets. With these inputs, a patched conic approximation is used to determine the trajectory. The patched conic approximation divides the planetary mission into three parts: (1) the departure phase, in which the two relevant bodies are Earth and the spacecraft, and where the trajectory is a departure hyperbola with Earth at the focus; (2) the cruise phase, in which the two bodies are the Sun and the spacecraft, and where the trajectory is a transfer ellipse with the Sun at the focus; and (3) the arrival phase, in which the two bodies are the target planet and the spacecraft, where the trajectory is an arrival hyperbola with the planet as the focus.

  17. Gender Differences in the Factor Structure of the Alcohol Use Disorders Identification Test in Multinational General Population Surveys*

    PubMed Central

    Peng, Chun-Zi; Wilsnack, Richard W.; Kristjanson, Arlinda F.; Benson, Perry; Wilsnack, Sharon C.

    2012-01-01

    Background Most gender-specific studies of the Alcohol Use Disorders Identification Test (AUDIT) have focused on gender differences in thresholds for hazardous drinking. This study examines gender differences in the factor structure of the AUDIT in general-population surveys. Methods General-population surveys from 15 countries provided 27,478 current drinkers’ responses to the AUDIT and related measures. We used single-group confirmatory factor analysis (CFA) to evaluate goodness-of-fit of three hypothesized models for responses to the AUDIT by men and women in each country. Bayesian Information Criteria (BIC) using a maximum likelihood robust (MLR) estimator was evaluated to identify the best fitted model. We then assessed factorial invariance within country surveys where fit indices were acceptable for both genders. Gender-specific internal consistency and concurrent validity were also evaluated in all 15 countries. Results: CFA revealed that the fit indices of 2-factor or 3-factor models were consistently better than fit indices for a 1-factor model in 14 of 15 countries. Comparisons of BIC values indicated that the 2-factor solution was the best fitted model. Factorial invariance tests in data from 3 countries indicated that the factor loadings and thresholds of the AUDIT were invariant across gender. The internal reliability and concurrent validity of AUDIT and its subscales were acceptable in both genders. Conclusions A two-factor model best describes AUDIT responses across general-population surveys in 12 of 15 countries, with acceptable internal reliability and concurrent validity, and supports a gender-invariant structure in at least three of those countries. PMID:22236536

  18. Civil Code, 11 December 1987.

    PubMed

    1988-01-01

    Article 162 of this Mexican Code provides, among other things, that "Every person has the right freely, responsibly, and in an informed fashion to determine the number and spacing of his or her children." When a marriage is involved, this right is to be observed by the spouses "in agreement with each other." The civil codes of the following states contain the same provisions: 1) Baja California (Art. 159 of the Civil Code of 28 April 1972 as revised in Decree No. 167 of 31 January 1974); 2) Morelos (Art. 255 of the Civil Code of 26 September 1949 as revised in Decree No. 135 of 29 December 1981); 3) Queretaro (Art. 162 of the Civil Code of 29 December 1950 as revised in the Act of 9 January 1981); 4) San Luis Potosi (Art. 147 of the Civil Code of 24 March 1946 as revised in 13 June 1978); Sinaloa (Art. 162 of the Civil Code of 18 June 1940 as revised in Decree No. 28 of 14 October 1975); 5) Tamaulipas (Art. 146 of the Civil Code of 21 November 1960 as revised in Decree No. 20 of 30 April 1975); 6) Veracruz-Llave (Art. 98 of the Civil Code of 1 September 1932 as revised in the Act of 30 December 1975); and 7) Zacatecas (Art. 253 of the Civil Code of 9 February 1965 as revised in Decree No. 104 of 13 August 1975). The Civil Codes of Puebla and Tlaxcala provide for this right only in the context of marriage with the spouses in agreement. See Art. 317 of the Civil Code of Puebla of 15 April 1985 and Article 52 of the Civil Code of Tlaxcala of 31 August 1976 as revised in Decree No. 23 of 2 April 1984. The Family Code of Hidalgo requires as a formality of marriage a certification that the spouses are aware of methods of controlling fertility, responsible parenthood, and family planning. In addition, Article 22 the Civil Code of the Federal District provides that the legal capacity of natural persons is acquired at birth and lost at death; however, from the moment of conception the individual comes under the protection of the law, which is valid with respect to the

  19. Identification System

    NASA Technical Reports Server (NTRS)

    1998-01-01

    Under a NASA Space Act Agreement with Marshall Space Flight Center, Symbology Research Center commercialized a new method of identifying products with invisible and virtually indestructible markings. This digital data matrix technology was developed at Marshall Space Flight Center to identify the millions of parts that comprise space shuttles. The laser-etched markings are seen as the next generation of product "bar codes."

  20. Two-dimensional QR-coded metamaterial absorber

    NASA Astrophysics Data System (ADS)

    Sui, Sai; Ma, Hua; Wang, Jiafu; Pang, Yongqiang; Zhang, Jieqiu; Qu, Shaobo

    2016-01-01

    In this paper, the design of metamaterial absorbers is proposed based on QR coding and topology optimization. Such absorbers look like QR codes and can be recognized by decoding softwares as well as mobile phones. To verify the design, two lightweight wideband absorbers are designed, which can achieve wideband absorption above 90 % in 6.68-19.30 and 7.00-19.70 GHz, respectively. More importantly, polarization-independent absorption over 90 % can be maintained under incident angle within 55°. The QR code absorber not only can achieve wideband absorption, but also can carry information such as texts and Web sites. They are of important values in applications such identification and electromagnetic protection.

  1. Toward the Automated Generation of Components from Existing Source Code

    SciTech Connect

    Quinlan, D; Yi, Q; Kumfert, G; Epperly, T; Dahlgren, T; Schordan, M; White, B

    2004-12-02

    A major challenge to achieving widespread use of software component technology in scientific computing is an effective migration strategy for existing, or legacy, source code. This paper describes initial work and challenges in automating the identification and generation of components using the ROSE compiler infrastructure and the Babel language interoperability tool. Babel enables calling interfaces expressed in the Scientific Interface Definition Language (SIDL) to be implemented in, and called from, an arbitrary combination of supported languages. ROSE is used to build specialized source-to-source translators that (1) extract a SIDL interface specification from information implicit in existing C++ source code and (2) transform Babel's output to include dispatches to the legacy code.

  2. Oil and gas field code master list 1997

    SciTech Connect

    1998-02-01

    The Oil and Gas Field Code Master List 1997 is the sixteenth annual listing of all identified oil and gas fields in the US. It is updated with field information collected through October 1997. The purpose of this publication is to provide unique, standardized codes for identification of domestic fields. Use of these field codes fosters consistency of field identification by government and industry. As a result of their widespread adoption they have in effect become a national standard. The use of field names and codes listed in this publication is required on survey forms and other reports regarding field-specific data collected by EIA. There are 58,366 field records in this year`s FCML, 437 more than last year. The FCML includes: field records for each State and county in which a field resides; field records for each offshore area block in the Gulf of Mexico in which a field resides; field records for each alias field name (definition of alias is listed); fields crossing State boundaries that may be assigned different names by the respective State naming authorities. This report also contains an Invalid Field Record List of 4 records that have been removed from the FCML since last year`s report. These records were found to be either technically incorrect or to represent field names which were never recognized by State naming authorities.

  3. Coding in pigeons: Multiple-coding versus single-code/default strategies.

    PubMed

    Pinto, Carlos; Machado, Armando

    2015-05-01

    To investigate the coding strategies that pigeons may use in a temporal discrimination tasks, pigeons were trained on a matching-to-sample procedure with three sample durations (2s, 6s and 18s) and two comparisons (red and green hues). One comparison was correct following 2-s samples and the other was correct following both 6-s and 18-s samples. Tests were then run to contrast the predictions of two hypotheses concerning the pigeons' coding strategies, the multiple-coding and the single-code/default. According to the multiple-coding hypothesis, three response rules are acquired, one for each sample. According to the single-code/default hypothesis, only two response rules are acquired, one for the 2-s sample and a "default" rule for any other duration. In retention interval tests, pigeons preferred the "default" key, a result predicted by the single-code/default hypothesis. In no-sample tests, pigeons preferred the key associated with the 2-s sample, a result predicted by multiple-coding. Finally, in generalization tests, when the sample duration equaled 3.5s, the geometric mean of 2s and 6s, pigeons preferred the key associated with the 6-s and 18-s samples, a result predicted by the single-code/default hypothesis. The pattern of results suggests the need for models that take into account multiple sources of stimulus control.

  4. Fact or fiction: updates on how protein-coding genes might emerge de novo from previously non-coding DNA.

    PubMed

    Schmitz, Jonathan F; Bornberg-Bauer, Erich

    2017-01-01

    Over the last few years, there has been an increasing amount of evidence for the de novo emergence of protein-coding genes, i.e. out of non-coding DNA. Here, we review the current literature and summarize the state of the field. We focus specifically on open questions and challenges in the study of de novo protein-coding genes such as the identification and verification of de novo-emerged genes. The greatest obstacle to date is the lack of high-quality genomic data with very short divergence times which could help precisely pin down the location of origin of a de novo gene. We conclude that, while there is plenty of evidence from a genetics perspective, there is a lack of functional studies of bona fide de novo genes and almost no knowledge about protein structures and how they come about during the emergence of de novo protein-coding genes. We suggest that future studies should concentrate on the functional and structural characterization of de novo protein-coding genes as well as the detailed study of the emergence of functional de novo protein-coding genes.

  5. Fact or fiction: updates on how protein-coding genes might emerge de novo from previously non-coding DNA

    PubMed Central

    Schmitz, Jonathan F; Bornberg-Bauer, Erich

    2017-01-01

    Over the last few years, there has been an increasing amount of evidence for the de novo emergence of protein-coding genes, i.e. out of non-coding DNA. Here, we review the current literature and summarize the state of the field. We focus specifically on open questions and challenges in the study of de novo protein-coding genes such as the identification and verification of de novo-emerged genes. The greatest obstacle to date is the lack of high-quality genomic data with very short divergence times which could help precisely pin down the location of origin of a de novo gene. We conclude that, while there is plenty of evidence from a genetics perspective, there is a lack of functional studies of bona fide de novo genes and almost no knowledge about protein structures and how they come about during the emergence of de novo protein-coding genes. We suggest that future studies should concentrate on the functional and structural characterization of de novo protein-coding genes as well as the detailed study of the emergence of functional de novo protein-coding genes. PMID:28163910

  6. Mean-based neural coding of voices.

    PubMed

    Andics, Attila; McQueen, James M; Petersson, Karl Magnus

    2013-10-01

    The social significance of recognizing the person who talks to us is obvious, but the neural mechanisms that mediate talker identification are unclear. Regions along the bilateral superior temporal sulcus (STS) and the inferior frontal cortex (IFC) of the human brain are selective for voices, and they are sensitive to rapid voice changes. Although it has been proposed that voice recognition is supported by prototype-centered voice representations, the involvement of these category-selective cortical regions in the neural coding of such "mean voices" has not previously been demonstrated. Using fMRI in combination with a voice identity learning paradigm, we show that voice-selective regions are involved in the mean-based coding of voice identities. Voice typicality is encoded on a supra-individual level in the right STS along a stimulus-dependent, identity-independent (i.e., voice-acoustic) dimension, and on an intra-individual level in the right IFC along a stimulus-independent, identity-dependent (i.e., voice identity) dimension. Voice recognition therefore entails at least two anatomically separable stages, each characterized by neural mechanisms that reference the central tendencies of voice categories.

  7. Cracking the bioelectric code

    PubMed Central

    Tseng, AiSun; Levin, Michael

    2013-01-01

    Patterns of resting potential in non-excitable cells of living tissue are now known to be instructive signals for pattern formation during embryogenesis, regeneration and cancer suppression. The development of molecular-level techniques for tracking ion flows and functionally manipulating the activity of ion channels and pumps has begun to reveal the mechanisms by which voltage gradients regulate cell behaviors and the assembly of complex large-scale structures. A recent paper demonstrated that a specific voltage range is necessary for demarcation of eye fields in the frog embryo. Remarkably, artificially setting other somatic cells to the eye-specific voltage range resulted in formation of eyes in aberrant locations, including tissues that are not in the normal anterior ectoderm lineage: eyes could be formed in the gut, on the tail, or in the lateral plate mesoderm. These data challenge the existing models of eye fate restriction and tissue competence maps, and suggest the presence of a bioelectric code—a mapping of physiological properties to anatomical outcomes. This Addendum summarizes the current state of knowledge in developmental bioelectricity, proposes three possible interpretations of the bioelectric code that functionally maps physiological states to anatomical outcomes, and highlights the biggest open questions in this field. We also suggest a speculative hypothesis at the intersection of cognitive science and developmental biology: that bioelectrical signaling among non-excitable cells coupled by gap junctions simulates neural network-like dynamics, and underlies the information processing functions required by complex pattern formation in vivo. Understanding and learning to control the information stored in physiological networks will have transformative implications for developmental biology, regenerative medicine and synthetic bioengineering. PMID:23802040

  8. Breaking the Code of Silence.

    ERIC Educational Resources Information Center

    Halbig, Wolfgang W.

    2000-01-01

    Schools and communities must break the adolescent code of silence concerning threats of violence. Schools need character education stressing courage, caring, and responsibility; regular discussions of the school discipline code; formal security discussions with parents; 24-hour hotlines; and protocols for handling reports of potential violence.…

  9. ACCELERATION PHYSICS CODE WEB REPOSITORY.

    SciTech Connect

    WEI, J.

    2006-06-26

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic accelerator-physics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  10. Accelerator Physics Code Web Repository

    SciTech Connect

    Zimmermann, F.; Basset, R.; Bellodi, G.; Benedetto, E.; Dorda, U.; Giovannozzi, M.; Papaphilippou, Y.; Pieloni, T.; Ruggiero, F.; Rumolo, G.; Schmidt, F.; Todesco, E.; Zotter, B.W.; Payet, J.; Bartolini, R.; Farvacque, L.; Sen, T.; Chin, Y.H.; Ohmi, K.; Oide, K.; Furman, M.; /LBL, Berkeley /Oak Ridge /Pohang Accelerator Lab. /SLAC /TRIUMF /Tech-X, Boulder /UC, San Diego /Darmstadt, GSI /Rutherford /Brookhaven

    2006-10-24

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic accelerator-physics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  11. LFSC - Linac Feedback Simulation Code

    SciTech Connect

    Ivanov, Valentin; /Fermilab

    2008-05-01

    The computer program LFSC (Code>) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output.

  12. Indices for Testing Neural Codes

    PubMed Central

    Victor, Jonathan D.; Nirenberg, Sheila

    2009-01-01

    One of the most critical challenges in systems neuroscience is determining the neural code. A principled framework for addressing this can be found in information theory. With this approach, one can determine whether a proposed code can account for the stimulus-response relationship. Specifically, one can compare the transmitted information between the stimulus and the hypothesized neural code with the transmitted information between the stimulus and the behavioral response. If the former is smaller than the latter (i.e., if the code cannot account for the behavior), the code can be ruled out. The information-theoretic index most widely used in this context is Shannon’s mutual information. The Shannon test, however, is not ideal for this purpose: while the codes it will rule out are truly nonviable, there will be some nonviable codes that it will fail to rule out. Here we describe a wide range of alternative indices that can be used for ruling codes out. The range includes a continuum from Shannon information to measures of the performance of a Bayesian decoder. We analyze the relationship of these indices to each other and their complementary strengths and weaknesses for addressing this problem. PMID:18533812

  13. Population coding in somatosensory cortex.

    PubMed

    Petersen, Rasmus S; Panzeri, Stefano; Diamond, Mathew E

    2002-08-01

    Computational analyses have begun to elucidate which components of somatosensory cortical population activity may encode basic stimulus features. Recent results from rat barrel cortex suggest that the essence of this code is not synergistic spike patterns, but rather the precise timing of single neuron's first post-stimulus spikes. This may form the basis for a fast, robust population code.

  14. QPhiX Code Generator

    SciTech Connect

    Joo, Balint

    2014-09-16

    A simple code-generator to generate the low level code kernels used by the QPhiX Library for Lattice QCD. Generates Kernels for Wilson-Dslash, and Wilson-Clover kernels. Can be reused to write other optimized kernels for Intel Xeon Phi(tm), Intel Xeon(tm) and potentially other architectures.

  15. Using NAEYC's Code of Ethics.

    ERIC Educational Resources Information Center

    Young Children, 1995

    1995-01-01

    Considers how to deal with an ethical dilemma concerning a caregiver's dislike for a child. Recognizes that no statement in NAEYC's Code of Ethical Conduct requires that a professional must like each child, and presents some ideals and principles from the code that may guide professionals through similar situations. (BAC)

  16. Video coding with dynamic background

    NASA Astrophysics Data System (ADS)

    Paul, Manoranjan; Lin, Weisi; Lau, Chiew Tong; Lee, Bu-Sung

    2013-12-01

    Motion estimation (ME) and motion compensation (MC) using variable block size, sub-pixel search, and multiple reference frames (MRFs) are the major reasons for improved coding performance of the H.264 video coding standard over other contemporary coding standards. The concept of MRFs is suitable for repetitive motion, uncovered background, non-integer pixel displacement, lighting change, etc. The requirement of index codes of the reference frames, computational time in ME & MC, and memory buffer for coded frames limits the number of reference frames used in practical applications. In typical video sequences, the previous frame is used as a reference frame with 68-92% of cases. In this article, we propose a new video coding method using a reference frame [i.e., the most common frame in scene (McFIS)] generated by dynamic background modeling. McFIS is more effective in terms of rate-distortion and computational time performance compared to the MRFs techniques. It has also inherent capability of scene change detection (SCD) for adaptive group of picture (GOP) size determination. As a result, we integrate SCD (for GOP determination) with reference frame generation. The experimental results show that the proposed coding scheme outperforms the H.264 video coding with five reference frames and the two relevant state-of-the-art algorithms by 0.5-2.0 dB with less computational time.

  17. PARAVT: Parallel Voronoi tessellation code

    NASA Astrophysics Data System (ADS)

    González, R. E.

    2016-10-01

    In this study, we present a new open source code for massive parallel computation of Voronoi tessellations (VT hereafter) in large data sets. The code is focused for astrophysical purposes where VT densities and neighbors are widely used. There are several serial Voronoi tessellation codes, however no open source and parallel implementations are available to handle the large number of particles/galaxies in current N-body simulations and sky surveys. Parallelization is implemented under MPI and VT using Qhull library. Domain decomposition takes into account consistent boundary computation between tasks, and includes periodic conditions. In addition, the code computes neighbors list, Voronoi density, Voronoi cell volume, density gradient for each particle, and densities on a regular grid. Code implementation and user guide are publicly available at https://github.com/regonzar/paravt.

  18. Medical coding in clinical trials.

    PubMed

    Babre, Deven

    2010-01-01

    Data generated in all clinical trial are recorded on the data collection instrument Case report Form / Electronic Case Report Form by investigators located at various sites in various countries. In multicentric clinical trials since different investigator or medically qualified experts are from different sites / centers recording the medical term(s) uniformly is a big challenge. Medical coders from clinical data management team process these terms and perform medical coding. Medical coding is performed to categorize the medical terms reported appropriately so that they can be analyzed/reviewed. This article describes process which is used for medical coding in clinical data management and two most commonly used medical dictionaries MedDRA and WHO-DDE in brief. It is expected to help medical coders to understand the process of medical coding in clinical data management. Few common issues which the medical coder faces while performing medical coding, are also highlighted.

  19. FORTRAN Automated Code Evaluation System (faces) system documentation, version 2, mod 0. [error detection codes/user manuals (computer programs)

    NASA Technical Reports Server (NTRS)

    1975-01-01

    A system is presented which processes FORTRAN based software systems to surface potential problems before they become execution malfunctions. The system complements the diagnostic capabilities of compilers, loaders, and execution monitors rather than duplicating these functions. Also, it emphasizes frequent sources of FORTRAN problems which require inordinate manual effort to identify. The principle value of the system is extracting small sections of unusual code from the bulk of normal sequences. Code structures likely to cause immediate or future problems are brought to the user's attention. These messages stimulate timely corrective action of solid errors and promote identification of 'tricky' code. Corrective action may require recoding or simply extending software documentation to explain the unusual technique.

  20. Detecting non-coding selective pressure in coding regions

    PubMed Central

    Chen, Hui; Blanchette, Mathieu

    2007-01-01

    Background Comparative genomics approaches, where orthologous DNA regions are compared and inter-species conserved regions are identified, have proven extremely powerful for identifying non-coding regulatory regions located in intergenic or intronic regions. However, non-coding functional elements can also be located within coding region, as is common for exonic splicing enhancers, some transcription factor binding sites, and RNA secondary structure elements affecting mRNA stability, localization, or translation. Since these functional elements are located in regions that are themselves highly conserved because they are coding for a protein, they generally escaped detection by comparative genomics approaches. Results We introduce a comparative genomics approach for detecting non-coding functional elements located within coding regions. Codon evolution is modeled as a mixture of codon substitution models, where each component of the mixture describes the evolution of codons under a specific type of coding selective pressure. We show how to compute the posterior distribution of the entropy and parsimony scores under this null model of codon evolution. The method is applied to a set of growth hormone 1 orthologous mRNA sequences and a known exonic splicing elements is detected. The analysis of a set of CORTBP2 orthologous genes reveals a region of several hundred base pairs under strong non-coding selective pressure whose function remains unknown. Conclusion Non-coding functional elements, in particular those involved in post-transcriptional regulation, are likely to be much more prevalent than is currently known. With the numerous genome sequencing projects underway, comparative genomics approaches like that proposed here are likely to become increasingly powerful at detecting such elements. PMID:17288582

  1. BASS Code Development

    NASA Technical Reports Server (NTRS)

    Sawyer, Scott

    2004-01-01

    The BASS computational aeroacoustic code solves the fully nonlinear Euler equations in the time domain in two-dimensions. The acoustic response of the stator is determined simultaneously for the first three harmonics of the convected vortical gust of the rotor. The spatial mode generation, propagation and decay characteristics are predicted by assuming the acoustic field away from the stator can be represented as a uniform flow with small harmonic perturbations superimposed. The computed field is then decomposed using a joint temporal-spatial transform to determine the wave amplitudes as a function of rotor harmonic and spatial mode order. This report details the following technical aspects of the computations and analysis. 1) the BASS computational technique; 2) the application of periodic time shifted boundary conditions; 3) the linear theory aspects unique to rotor-stator interactions; and 4) the joint spatial-temporal transform. The computational results presented herein are twofold. In each case, the acoustic response of the stator is determined simultaneously for the first three harmonics of the convected vortical gust of the rotor. The fan under consideration here like modern fans is cut-off at +, and propagating acoustic waves are only expected at 2BPF and 3BPF. In the first case, the computations showed excellent agreement with linear theory predictions. The frequency and spatial mode order of acoustic field was computed and found consistent with linear theory. Further, the propagation of the generated modes was also correctly predicted. The upstream going waves propagated from the domain without reflection from the in ow boundary. However, reflections from the out ow boundary were noticed. The amplitude of the reflected wave was approximately 5% of the incident wave. The second set of computations were used to determine the influence of steady loading on the generated noise. Toward this end, the acoustic response was determined with three steady loading

  2. Coding for effective denial management.

    PubMed

    Miller, Jackie; Lineberry, Joe

    2004-01-01

    Nearly everyone will agree that accurate and consistent coding of diagnoses and procedures is the cornerstone for operating a compliant practice. The CPT or HCPCS procedure code tells the payor what service was performed and also (in most cases) determines the amount of payment. The ICD-9-CM diagnosis code, on the other hand, tells the payor why the service was performed. If the diagnosis code does not meet the payor's criteria for medical necessity, all payment for the service will be denied. Implementation of an effective denial management program can help "stop the bleeding." Denial management is a comprehensive process that works in two ways. First, it evaluates the cause of denials and takes steps to prevent them. Second, denial management creates specific procedures for refiling or appealing claims that are initially denied. Accurate, consistent and compliant coding is key to both of these functions. The process of proactively managing claim denials also reveals a practice's administrative strengths and weaknesses, enabling radiology business managers to streamline processes, eliminate duplicated efforts and shift a larger proportion of the staff's focus from paperwork to servicing patients--all of which are sure to enhance operations and improve practice management and office morale. Accurate coding requires a program of ongoing training and education in both CPT and ICD-9-CM coding. Radiology business managers must make education a top priority for their coding staff. Front office staff, technologists and radiologists should also be familiar with the types of information needed for accurate coding. A good staff training program will also cover the proper use of Advance Beneficiary Notices (ABNs). Registration and coding staff should understand how to determine whether the patient's clinical history meets criteria for Medicare coverage, and how to administer an ABN if the exam is likely to be denied. Staff should also understand the restrictions on use of

  3. Non-Pauli observables for CWS codes

    NASA Astrophysics Data System (ADS)

    Santiago, Douglas F. G.; Portugal, Renato; Melo, Nolmar

    2013-05-01

    It is known that nonadditive quantum codes can have higher code dimensions than stabilizer codes for the same length and minimum distance. The class of codeword stabilized codes (CWS) provides tools to obtain new nonadditive quantum codes by reducing the problem to finding nonlinear classical codes. In this work, we establish some results on the kind of non-Pauli operators that can be used as observables in the decoding scheme of CWS codes and propose a procedure to obtain those observables.

  4. ETR/ITER systems code

    SciTech Connect

    Barr, W.L.; Bathke, C.G.; Brooks, J.N.; Bulmer, R.H.; Busigin, A.; DuBois, P.F.; Fenstermacher, M.E.; Fink, J.; Finn, P.A.; Galambos, J.D.; Gohar, Y.; Gorker, G.E.; Haines, J.R.; Hassanein, A.M.; Hicks, D.R.; Ho, S.K.; Kalsi, S.S.; Kalyanam, K.M.; Kerns, J.A.; Lee, J.D.; Miller, J.R.; Miller, R.L.; Myall, J.O.; Peng, Y-K.M.; Perkins, L.J.; Spampinato, P.T.; Strickler, D.J.; Thomson, S.L.; Wagner, C.E.; Willms, R.S.; Reid, R.L.

    1988-04-01

    A tokamak systems code capable of modeling experimental test reactors has been developed and is described in this document. The code, named TETRA (for Tokamak Engineering Test Reactor Analysis), consists of a series of modules, each describing a tokamak system or component, controlled by an optimizer/driver. This code development was a national effort in that the modules were contributed by members of the fusion community and integrated into a code by the Fusion Engineering Design Center. The code has been checked out on the Cray computers at the National Magnetic Fusion Energy Computing Center and has satisfactorily simulated the Tokamak Ignition/Burn Experimental Reactor II (TIBER) design. A feature of this code is the ability to perform optimization studies through the use of a numerical software package, which iterates prescribed variables to satisfy a set of prescribed equations or constraints. This code will be used to perform sensitivity studies for the proposed International Thermonuclear Experimental Reactor (ITER). 22 figs., 29 tabs.

  5. A secure and efficient entropy coding based on arithmetic coding

    NASA Astrophysics Data System (ADS)

    Li, Hengjian; Zhang, Jiashu

    2009-12-01

    A novel security arithmetic coding scheme based on nonlinear dynamic filter (NDF) with changeable coefficients is proposed in this paper. The NDF is employed to generate the pseudorandom number generator (NDF-PRNG) and its coefficients are derived from the plaintext for higher security. During the encryption process, the mapping interval in each iteration of arithmetic coding (AC) is decided by both the plaintext and the initial values of NDF, and the data compression is also achieved with entropy optimality simultaneously. And this modification of arithmetic coding methodology which also provides security is easy to be expanded into the most international image and video standards as the last entropy coding stage without changing the existing framework. Theoretic analysis and numerical simulations both on static and adaptive model show that the proposed encryption algorithm satisfies highly security without loss of compression efficiency respect to a standard AC or computation burden.

  6. CodedStream: live media streaming with overlay coded multicast

    NASA Astrophysics Data System (ADS)

    Guo, Jiang; Zhu, Ying; Li, Baochun

    2003-12-01

    Multicasting is a natural paradigm for streaming live multimedia to multiple end receivers. Since IP multicast is not widely deployed, many application-layer multicast protocols have been proposed. However, all of these schemes focus on the construction of multicast trees, where a relatively small number of links carry the multicast streaming load, while the capacity of most of the other links in the overlay network remain unused. In this paper, we propose CodedStream, a high-bandwidth live media distribution system based on end-system overlay multicast. In CodedStream, we construct a k-redundant multicast graph (a directed acyclic graph) as the multicast topology, on which network coding is applied to work around bottlenecks. Simulation results have shown that the combination of k-redundant multicast graph and network coding may indeed bring significant benefits with respect to improving the quality of live media at the end receivers.

  7. New optimal asymmetric quantum codes constructed from constacyclic codes

    NASA Astrophysics Data System (ADS)

    Xu, Gen; Li, Ruihu; Guo, Luobin; Lü, Liangdong

    2017-02-01

    In this paper, we propose the construction of asymmetric quantum codes from two families of constacyclic codes over finite field 𝔽q2 of code length n, where for the first family, q is an odd prime power with the form 4t + 1 (t ≥ 1 is integer) or 4t ‑ 1 (t ≥ 2 is integer) and n1 = q2+1 2; for the second family, q is an odd prime power with the form 10t + 3 or 10t + 7 (t ≥ 0 is integer) and n2 = q2+1 5. As a result, families of new asymmetric quantum codes [[n,k,dz/dx

  8. Weighted SAW reflector gratings for orthogonal frequency coded SAW tags and sensors

    NASA Technical Reports Server (NTRS)

    Puccio, Derek (Inventor); Malocha, Donald (Inventor)

    2011-01-01

    Weighted surface acoustic wave reflector gratings for coding identification tags and sensors to enable unique sensor operation and identification for a multi-sensor environment. In an embodiment, the weighted reflectors are variable while in another embodiment the reflector gratings are apodized. The weighting technique allows the designer to decrease reflectively and allows for more chips to be implemented in a device and, consequently, more coding diversity. As a result, more tags and sensors can be implemented using a given bandwidth when compared with uniform reflectors. Use of weighted reflector gratings with OFC makes various phase shifting schemes possible, such as in-phase and quadrature implementations of coded waveforms resulting in reduced device size and increased coding.

  9. State building energy codes status

    SciTech Connect

    1996-09-01

    This document contains the State Building Energy Codes Status prepared by Pacific Northwest National Laboratory for the U.S. Department of Energy under Contract DE-AC06-76RL01830 and dated September 1996. The U.S. Department of Energy`s Office of Codes and Standards has developed this document to provide an information resource for individuals interested in energy efficiency of buildings and the relevant building energy codes in each state and U.S. territory. This is considered to be an evolving document and will be updated twice a year. In addition, special state updates will be issued as warranted.

  10. DNA barcode goes two-dimensions: DNA QR code web server.

    PubMed

    Liu, Chang; Shi, Linchun; Xu, Xiaolan; Li, Huan; Xing, Hang; Liang, Dong; Jiang, Kun; Pang, Xiaohui; Song, Jingyuan; Chen, Shilin

    2012-01-01

    The DNA barcoding technology uses a standard region of DNA sequence for species identification and discovery. At present, "DNA barcode" actually refers to DNA sequences, which are not amenable to information storage, recognition, and retrieval. Our aim is to identify the best symbology that can represent DNA barcode sequences in practical applications. A comprehensive set of sequences for five DNA barcode markers ITS2, rbcL, matK, psbA-trnH, and CO1 was used as the test data. Fifty-three different types of one-dimensional and ten two-dimensional barcode symbologies were compared based on different criteria, such as coding capacity, compression efficiency, and error detection ability. The quick response (QR) code was found to have the largest coding capacity and relatively high compression ratio. To facilitate the further usage of QR code-based DNA barcodes, a web server was developed and is accessible at http://qrfordna.dnsalias.org. The web server allows users to retrieve the QR code for a species of interests, convert a DNA sequence to and from a QR code, and perform species identification based on local and global sequence similarities. In summary, the first comprehensive evaluation of various barcode symbologies has been carried out. The QR code has been found to be the most appropriate symbology for DNA barcode sequences. A web server has also been constructed to allow biologists to utilize QR codes in practical DNA barcoding applications.

  11. Indoor Mobile Positioning Based on Lidar Data and Coded Sequence Pattern

    NASA Astrophysics Data System (ADS)

    Wang, Z.; Dong, B.; Chen, D.

    2016-10-01

    This paper proposed a coded sequence pattern for automatic matching of LiDAR point data, the methods including SIFT features, Otsu segmentation and Fast Hough transformation for the identification, positioning and interpret of the coded sequence patterns, the POSIT model for fast computing the translation and rotation parameters of LiDAR point data, so as to achieve fast matching of LiDAR point data and automatic 3D mapping of indoor shafts and tunnels.

  12. Code to generate random identifiers and select QA/QC samples

    USGS Publications Warehouse

    Mehnert, Edward

    1992-01-01

    SAMPLID is a PC-based, FORTRAN-77 code which generates unique numbers for identification of samples, selection of QA/QC samples, and generation of labels. These procedures are tedious, but using a computer code such as SAMPLID can increase efficiency and reduce or eliminate errors and bias. The algorithm, used in SAMPLID, for generation of pseudorandom numbers is free of statistical flaws present in commonly available algorithms.

  13. Facilitating Internet-Scale Code Retrieval

    ERIC Educational Resources Information Center

    Bajracharya, Sushil Krishna

    2010-01-01

    Internet-Scale code retrieval deals with the representation, storage, and access of relevant source code from a large amount of source code available on the Internet. Internet-Scale code retrieval systems support common emerging practices among software developers related to finding and reusing source code. In this dissertation we focus on some…

  14. Bandwidth efficient coding for satellite communications

    NASA Technical Reports Server (NTRS)

    Lin, Shu; Costello, Daniel J., Jr.; Miller, Warner H.; Morakis, James C.; Poland, William B., Jr.

    1992-01-01

    An error control coding scheme was devised to achieve large coding gain and high reliability by using coded modulation with reduced decoding complexity. To achieve a 3 to 5 dB coding gain and moderate reliability, the decoding complexity is quite modest. In fact, to achieve a 3 dB coding gain, the decoding complexity is quite simple, no matter whether trellis coded modulation or block coded modulation is used. However, to achieve coding gains exceeding 5 dB, the decoding complexity increases drastically, and the implementation of the decoder becomes very expensive and unpractical. The use is proposed of coded modulation in conjunction with concatenated (or cascaded) coding. A good short bandwidth efficient modulation code is used as the inner code and relatively powerful Reed-Solomon code is used as the outer code. With properly chosen inner and outer codes, a concatenated coded modulation scheme not only can achieve large coding gains and high reliability with good bandwidth efficiency but also can be practically implemented. This combination of coded modulation and concatenated coding really offers a way of achieving the best of three worlds, reliability and coding gain, bandwidth efficiency, and decoding complexity.

  15. Meteor Shower Identification and Characterization with Python

    NASA Technical Reports Server (NTRS)

    Moorhead, Althea

    2015-01-01

    The short development time associated with Python and the number of astronomical packages available have led to increased usage within NASA. The Meteoroid Environment Office in particular uses the Python language for a number of applications, including daily meteor shower activity reporting, searches for potential parent bodies of meteor showers, and short dynamical simulations. We present our development of a meteor shower identification code that identifies statistically significant groups of meteors on similar orbits. This code overcomes several challenging characteristics of meteor showers such as drastic differences in uncertainties between meteors and between the orbital elements of a single meteor, and the variation of shower characteristics such as duration with age or planetary perturbations. This code has been proven to successfully and quickly identify unusual meteor activity such as the 2014 kappa Cygnid outburst. We present our algorithm along with these successes and discuss our plans for further code development.

  16. Internationalizing professional codes in engineering.

    PubMed

    Harris, Charles E

    2004-07-01

    Professional engineering societies which are based in the United States, such as the American Society of Mechanical Engineers (ASME, now ASME International) are recognizing that their codes of ethics must apply to engineers working throughout the world. An examination of the ethical code of the ASME International shows that its provisions pose many problems of application, especially in societies outside the United States. In applying the codes effectively in the international environment, two principal issues must be addressed. First, some Culture Transcending Guidelines must be identified and justified. Nine such guidelines are identified Second, some methods for applying the codes to particular situations must be identified Three such methods are specification, balancing, and finding a creative middle way.

  17. FLYCHK Collisional-Radiative Code

    National Institute of Standards and Technology Data Gateway

    SRD 160 FLYCHK Collisional-Radiative Code (Web, free access)   FLYCHK provides a capability to generate atomic level populations and charge state distributions for low-Z to mid-Z elements under NLTE conditions.

  18. Seals Flow Code Development 1993

    NASA Technical Reports Server (NTRS)

    Liang, Anita D. (Compiler); Hendricks, Robert C. (Compiler)

    1994-01-01

    Seals Workshop of 1993 code releases include SPIRALI for spiral grooved cylindrical and face seal configurations; IFACE for face seals with pockets, steps, tapers, turbulence, and cavitation; GFACE for gas face seals with 'lift pad' configurations; and SCISEAL, a CFD code for research and design of seals of cylindrical configuration. GUI (graphical user interface) and code usage was discussed with hands on usage of the codes, discussions, comparisons, and industry feedback. Other highlights for the Seals Workshop-93 include environmental and customer driven seal requirements; 'what's coming'; and brush seal developments including flow visualization, numerical analysis, bench testing, T-700 engine testing, tribological pairing and ceramic configurations, and cryogenic and hot gas facility brush seal results. Also discussed are seals for hypersonic engines and dynamic results for spiral groove and smooth annular seals.

  19. NFPA's Hydrogen Technologies Code Project

    SciTech Connect

    Rivkin, C. H.

    2008-12-01

    This article discusses the development of National Fire Protection Association 2 (NFPA), a comprehensive hydrogen safety code. It analyses the contents of this document with particular attention focused on new requirements for setting hydrogen storage systems. These new requirements use computational fluid dynamic modeling and risk assessment procedures to develop requirements that are based on both technical analyses and defined risk criteria. The intent is to develop requirements based on procedures that can be replicated based on the information provided in the code document. This code will require documentation of the modeling inputs and risk criteria and analyses in the supporting information. This article also includes a description of the codes and standards that address hydrogen technologies in general.

  20. Property Control through Bar Coding.

    ERIC Educational Resources Information Center

    Kingma, Gerben J.

    1984-01-01

    A public utility company uses laser wands to read bar-coded labels on furniture and equipment. The system allows an 80 percent savings of the time required to create reports for inventory control. (MLF)

  1. The moving mesh code SHADOWFAX

    NASA Astrophysics Data System (ADS)

    Vandenbroucke, B.; De Rijcke, S.

    2016-07-01

    We introduce the moving mesh code SHADOWFAX, which can be used to evolve a mixture of gas, subject to the laws of hydrodynamics and gravity, and any collisionless fluid only subject to gravity, such as cold dark matter or stars. The code is written in C++ and its source code is made available to the scientific community under the GNU Affero General Public Licence. We outline the algorithm and the design of our implementation, and demonstrate its validity through the results of a set of basic test problems, which are also part of the public version. We also compare SHADOWFAX with a number of other publicly available codes using different hydrodynamical integration schemes, illustrating the advantages and disadvantages of the moving mesh technique.

  2. Edge equilibrium code for tokamaks

    SciTech Connect

    Li, Xujing; Drozdov, Vladimir V.

    2014-01-15

    The edge equilibrium code (EEC) described in this paper is developed for simulations of the near edge plasma using the finite element method. It solves the Grad-Shafranov equation in toroidal coordinate and uses adaptive grids aligned with magnetic field lines. Hermite finite elements are chosen for the numerical scheme. A fast Newton scheme which is the same as implemented in the equilibrium and stability code (ESC) is applied here to adjust the grids.

  3. Computer-Access-Code Matrices

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr.

    1990-01-01

    Authorized users respond to changing challenges with changing passwords. Scheme for controlling access to computers defeats eavesdroppers and "hackers". Based on password system of challenge and password or sign, challenge, and countersign correlated with random alphanumeric codes in matrices of two or more dimensions. Codes stored on floppy disk or plug-in card and changed frequently. For even higher security, matrices of four or more dimensions used, just as cubes compounded into hypercubes in concurrent processing.

  4. Product Work Classification and Coding

    DTIC Science & Technology

    1986-06-01

    detail is much more useful in planning steel welding processes. In this regard remember that mild steel , HSLA steel , and high-yield steel (e.g. HY80 ...manufacturing facility. In Figure 2.3-2, a classification and coding system for steel parts is shown. This classification and coding system sorts steel parts...system would provide a shop which produced steel parts with a means of organizing parts. Rather than attempting to manage all of its parts as a single

  5. The Integrated TIGER Series Codes

    SciTech Connect

    Kensek, Ronald P.; Franke, Brian C.; Laub, Thomas W.

    2006-01-15

    ITS is a powerful and user-friendly software package permitting state-of-the-art Monte Carlo solution of linear time-independent coupled electron/photon radiation transport problems, with or without the presence of macroscopic electric and magnetic fields of arbitrary spatial dependence. Our goal has been to simultaneously maximize operational simplicity and physical accuracy. Through a set of preprocessor directives, the user selects one of the many ITS codes. The ease with which the makefile system is applied combines with an input scheme based on order-independent descriptive keywords that makes maximum use of defaults and intemal error checking to provide experimentalists and theorists alike with a method for the routine but rigorous solution of sophisticated radiation transport problems. Physical rigor is provided by employing accurate cross sections, sampling distributions, and physical models for describing the production and transport of the electron/photon cascade from 1.0 GeV down to 1.0 keV. The availability of source code permits the more sophisticated user to tailor the codes to specific applications and to extend the capabilities of the codes to more complex applications. Version 5.0, the latest version of ITS, contains (1) improvements to the ITS 3.0 continuous-energy codes, (2) multigroup codes with adjoint transport capabilities, (3) parallel implementations of all ITS codes, (4) a general purpose geometry engine for linking with CAD or other geometry formats, and (5) the Cholla facet geometry library. Moreover, the general user friendliness of the software has been enhanced through increased internal error checking and improved code portability.

  6. National Combustion Code: Parallel Performance

    NASA Technical Reports Server (NTRS)

    Babrauckas, Theresa

    2001-01-01

    This report discusses the National Combustion Code (NCC). The NCC is an integrated system of codes for the design and analysis of combustion systems. The advanced features of the NCC meet designers' requirements for model accuracy and turn-around time. The fundamental features at the inception of the NCC were parallel processing and unstructured mesh. The design and performance of the NCC are discussed.

  7. UNIX code management and distribution

    SciTech Connect

    Hung, T.; Kunz, P.F.

    1992-09-01

    We describe a code management and distribution system based on tools freely available for the UNIX systems. At the master site, version control is managed with CVS, which is a layer on top of RCS, and distribution is done via NFS mounted file systems. At remote sites, small modifications to CVS provide for interactive transactions with the CVS system at the master site such that remote developers are true peers in the code development process.

  8. Spaceflight Validation of Hzetrn Code

    NASA Technical Reports Server (NTRS)

    Wilson, J. W.; Shinn, J. L.; Singleterry, R. C.; Badavi, F. F.; Badhwar, G. D.; Reitz, G.; Beaujean, R.; Cucinotta, F. A.

    1999-01-01

    HZETRN is being developed as a fast deterministic radiation transport code applicable to neutrons, protons, and multiply charged ions in the space environment. It was recently applied to 50 hours of IMP8 data measured during the August 4, 1972 solar event to map the hourly exposures within the human body under several shield configurations. This calculation required only 18 hours on a VAX 4000 machine. A similar calculation using the Monte Carlo method would have required two years of dedicated computer time. The code has been benchmarked against well documented and tested Monte Carlo proton transport codes with good success. The code will allow important trade studies to be made with relative ease due to the computational speed and will be useful in assessing design alternatives in an integrated system software environment. Since there are no well tested Monte Carlo codes for HZE particles, we have been engaged in flight validation of the HZETRN results. To date we have made comparison with TEPC, CR-39, charge particle telescopes, and Bonner spheres. This broad range of detectors allows us to test a number of functions related to differing physical processes which add to the complicated radiation fields within a spacecraft or the human body, which functions can be calculated by the HZETRN code system. In the present report we will review these results.

  9. Rotating-Pump Design Code

    NASA Technical Reports Server (NTRS)

    Walker, James F.; Chen, Shu-Cheng; Scheer, Dean D.

    2006-01-01

    Pump Design (PUMPDES) is a computer program for designing a rotating pump for liquid hydrogen, liquid oxygen, liquid nitrogen, water, methane, or ethane. Using realistic properties of these fluids provided by another program called GASPAK, this code performs a station-by-station, mean-line analysis along the pump flow path, obtaining thermodynamic properties of the pumped fluid at each station and evaluating hydraulic losses along the flow path. The variables at each station are obtained under constraints that are consistent with the underlying physical principles. The code evaluates the performance of each stage and the overall pump. In addition, by judiciously choosing the givens and the unknowns, the code can perform a geometric inverse design function: that is, it can compute a pump geometry that yields a closest approximation of given design point. The code contains two major parts: one for an axial-rotor/inducer and one for a multistage centrifugal pump. The inducer and the centrifugal pump are functionally integrated. The code can be used in designing and/or evaluating the inducer/centrifugal-pump combination or the centrifugal pump alone. The code is written in standard Fortran 77.

  10. Identification of the plasma boundary shape and position in the Damavand tokamak

    NASA Astrophysics Data System (ADS)

    Rasouli, C.; Abbasi Davani, F.

    2017-01-01

    A series of experiments and numerical calculations have been done on the Damavand tokamak for accurate determination of equilibrium parameters, such as the plasma boundary position and shape. For this work, the pickup coils of the Damavand tokamak were recalibrated and after that a plasma boundary shape identification code was developed for analyzing the experimental data, such as magnetic probes and coils currents data. The plasma boundary position, shape and other parameters are determined by the plasma shape identification code. A free-boundary equilibrium code was also generated for comparison with the plasma boundary shape identification results and determination of required fields to obtain elongated plasma in the Damavand tokamak.

  11. Oil and gas field code master list 1994

    SciTech Connect

    Not Available

    1995-01-01

    This is the thirteenth annual edition of the Energy Information Administration`s (EIA) Oil and Gas Field Code Master List. It reflects data collected through October 1994 and provides standardized field name spellings and codes for all identified oil and/or gas fields in the United States. The master field name spellings and codes are to be used by respondents when filing the following Department of Energy (DOE) forms: Form EIA-23, {open_quotes}Annual Survey of Domestic Oil and Gas Reserves,{close_quotes} filed by oil and gas well operators (field codes are required from larger operators only); Forms FERC 8 and EIA-191, {open_quotes}Underground Gas Storage Report,{close_quotes} filed by natural gas producers and distributors who operate underground natural gas storage facilities. Other Federal and State government agencies, as well as industry, use the EIA Oil and Gas Field Code Master List as the standard for field identification. A machine-readable version of the Oil and Gas Field Code Master List is available from the National Technical Information Service, 5285 Port Royal Road, Springfield, Virginia 22161, (703) 487-4650. In order for the Master List to be useful, it must be accurate and remain current. To accomplish this, EIA constantly reviews and revises this list. The EIA welcomes all comments, corrections, and additions to the Master List. All such information should be given to the EIA Field Code Coordinator at (214) 953-1858. EIA gratefully acknowledges the assistance provides by numerous State organizations and trade associations in verifying the existence of fields and their official nomenclature.

  12. The Proteomic Code: a molecular recognition code for proteins

    PubMed Central

    Biro, Jan C

    2007-01-01

    Background The Proteomic Code is a set of rules by which information in genetic material is transferred into the physico-chemical properties of amino acids. It determines how individual amino acids interact with each other during folding and in specific protein-protein interactions. The Proteomic Code is part of the redundant Genetic Code. Review The 25-year-old history of this concept is reviewed from the first independent suggestions by Biro and Mekler, through the works of Blalock, Root-Bernstein, Siemion, Miller and others, followed by the discovery of a Common Periodic Table of Codons and Nucleic Acids in 2003 and culminating in the recent conceptualization of partial complementary coding of interacting amino acids as well as the theory of the nucleic acid-assisted protein folding. Methods and conclusions A novel cloning method for the design and production of specific, high-affinity-reacting proteins (SHARP) is presented. This method is based on the concept of proteomic codes and is suitable for large-scale, industrial production of specifically interacting peptides. PMID:17999762

  13. Cleanup MAC and MBA code ATP

    SciTech Connect

    Russell, V.K.

    1994-10-17

    The K Basins Materials Accounting (MAC) and Material Balance (MBA) database system had some minor code cleanup performed to its code. This ATP describes how the code was to be tested to verify its correctness.

  14. Codes That Support Smart Growth Development

    EPA Pesticide Factsheets

    Provides examples of local zoning codes that support smart growth development, categorized by: unified development code, form-based code, transit-oriented development, design guidelines, street design standards, and zoning overlay.

  15. Tribal Green Building Administrative Code Example

    EPA Pesticide Factsheets

    This Tribal Green Building Administrative Code Example can be used as a template for technical code selection (i.e., building, electrical, plumbing, etc.) to be adopted as a comprehensive building code.

  16. Whale Identification

    NASA Technical Reports Server (NTRS)

    1991-01-01

    R:BASE for DOS, a computer program developed under NASA contract, has been adapted by the National Marine Mammal Laboratory and the College of the Atlantic to provide and advanced computerized photo matching technique for identification of humpback whales. The program compares photos with stored digitized descriptions, enabling researchers to track and determine distribution and migration patterns. R:BASE is a spinoff of RIM (Relational Information Manager), which was used to store data for analyzing heat shielding tiles on the Space Shuttle Orbiter. It is now the world's second largest selling line of microcomputer database management software.

  17. 75 FR 19944 - International Code Council: The Update Process for the International Codes and Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-16

    ... National Institute of Standards and Technology International Code Council: The Update Process for the International Codes and Standards AGENCY: National Institute of Standards and Technology, Commerce. ACTION: Notice. SUMMARY: The International Code Council (ICC), promulgator of the International Codes...

  18. 78 FR 18321 - International Code Council: The Update Process for the International Codes and Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-26

    ... National Institute of Standards and Technology International Code Council: The Update Process for the International Codes and Standards AGENCY: National Institute of Standards and Technology, Commerce. ACTION: Notice. SUMMARY: The International Code Council (ICC), promulgator of the International Codes...

  19. Evolution of the genetic code.

    PubMed

    Davis, B K

    1999-01-01

    Comparative path lengths in amino acid biosynthesis and other molecular indicators of the timing of codon assignment were examined to reconstruct the main stages of code evolution. The codon tree obtained was rooted in the 4 N-fixing amino acids (Asp, Glu, Asn, Gln) and 16 triplets of the NAN set. This small, locally phased (commaless) code evidently arose from ambiguous translation on a poly(A) collector strand, in a surface reaction network. Copolymerisation of these amino acids yields polyanionic peptide chains, which could anchor uncharged amide residues to a positively charged mineral surface. From RNA virus structure and replication in vitro, the first genes seemed to be RNA segments spliced into tRNA. Expansion of the code reduced the risk of mutation to an unreadable codon. This step was conditional on initiation at the 5'-codon of a translated sequence. Incorporation of increasingly hydrophobic amino acids accompanied expansion. As codons of the NUN set were assigned most slowly, they received the most nonpolar amino acids. The origin of ferredoxin and Gln synthetase was traced to mid-expansion phase. Surface metabolism ceased by the end of code expansion, as cells bounded by a proteo-phospholipid membrane, with a protoATPase, had emerged. Incorporation of positively charged and aromatic amino acids followed. They entered the post-expansion code by codon capture. Synthesis of efficient enzymes with acid-base catalysis was then possible. Both types of aminoacyl-tRNA synthetases were attributed to this stage. tRNA sequence diversity and error rates in RNA replication indicate the code evolved within 20 million yr in the preIsuan era. These findings on the genetic code provide empirical evidence, from a contemporaneous source, that a surface reaction network, centred on C-fixing autocatalytic cycles, rapidly led to cellular life on Earth.

  20. NASA Rotor 37 CFD Code Validation: Glenn-HT Code

    NASA Technical Reports Server (NTRS)

    Ameri, Ali A.

    2010-01-01

    In order to advance the goals of NASA aeronautics programs, it is necessary to continuously evaluate and improve the computational tools used for research and design at NASA. One such code is the Glenn-HT code which is used at NASA Glenn Research Center (GRC) for turbomachinery computations. Although the code has been thoroughly validated for turbine heat transfer computations, it has not been utilized for compressors. In this work, Glenn-HT was used to compute the flow in a transonic compressor and comparisons were made to experimental data. The results presented here are in good agreement with this data. Most of the measures of performance are well within the measurement uncertainties and the exit profiles of interest agree with the experimental measurements.

  1. Coordinated design of coding and modulation systems

    NASA Technical Reports Server (NTRS)

    Massey, J. L.; Ancheta, T.; Johannesson, R.; Lauer, G.; Lee, L.

    1976-01-01

    The joint optimization of the coding and modulation systems employed in telemetry systems was investigated. Emphasis was placed on formulating inner and outer coding standards used by the Goddard Spaceflight Center. Convolutional codes were found that are nearly optimum for use with Viterbi decoding in the inner coding of concatenated coding systems. A convolutional code, the unit-memory code, was discovered and is ideal for inner system usage because of its byte-oriented structure. Simulations of sequential decoding on the deep-space channel were carried out to compare directly various convolutional codes that are proposed for use in deep-space systems.

  2. Slow and fast ultrasonic wave detection improvement in human trabecular bones using Golay code modulation.

    PubMed

    Lashkari, Bahman; Manbachi, Amir; Mandelis, Andreas; Cobbold, Richard S C

    2012-09-01

    The identification of fast and slow waves propagating through trabecular bone is a challenging task due to temporal wave overlap combined with the high attenuation of the fast wave in the presence of noise. However, it can provide valuable information about bone integrity and become a means for monitoring osteoporosis. The objective of this work is to apply different coded excitation methods for this purpose. The results for single-sine cycle pulse, Golay code, and chirp excitations are compared. It is shown that Golay code is superior to the other techniques due to its signal enhancement while exhibiting excellent resolution without the ambiguity of sidelobes.

  3. Snapshot 2D tomography via coded aperture x-ray scatter imaging

    PubMed Central

    MacCabe, Kenneth P.; Holmgren, Andrew D.; Tornai, Martin P.; Brady, David J.

    2015-01-01

    This paper describes a fan beam coded aperture x-ray scatter imaging system which acquires a tomographic image from each snapshot. This technique exploits cylindrical symmetry of the scattering cross section to avoid the scanning motion typically required by projection tomography. We use a coded aperture with a harmonic dependence to determine range, and a shift code to determine cross-range. Here we use a forward-scatter configuration to image 2D objects and use serial exposures to acquire tomographic video of motion within a plane. Our reconstruction algorithm also estimates the angular dependence of the scattered radiance, a step toward materials imaging and identification. PMID:23842254

  4. 76 FR 77549 - Lummi Nation-Title 20-Code of Laws-Liquor Code

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-13

    ... Bureau of Indian Affairs Lummi Nation--Title 20--Code of Laws--Liquor Code AGENCY: Bureau of Indian...--Code of Laws--Liquor Code. The Code regulates and controls the possession, sale and consumption of... this Code allows for the possession and sale of alcoholic beverages within the Lummi...

  5. International assessment of PCA codes

    SciTech Connect

    Neymotin, L.; Lui, C.; Glynn, J.; Archarya, S.

    1993-11-01

    Over the past three years (1991-1993), an extensive international exercise for intercomparison of a group of six Probabilistic Consequence Assessment (PCA) codes was undertaken. The exercise was jointly sponsored by the Commission of European Communities (CEC) and OECD Nuclear Energy Agency. This exercise was a logical continuation of a similar effort undertaken by OECD/NEA/CSNI in 1979-1981. The PCA codes are currently used by different countries for predicting radiological health and economic consequences of severe accidents at nuclear power plants (and certain types of non-reactor nuclear facilities) resulting in releases of radioactive materials into the atmosphere. The codes participating in the exercise were: ARANO (Finland), CONDOR (UK), COSYMA (CEC), LENA (Sweden), MACCS (USA), and OSCAAR (Japan). In parallel with this inter-code comparison effort, two separate groups performed a similar set of calculations using two of the participating codes, MACCS and COSYMA. Results of the intercode and inter-MACCS comparisons are presented in this paper. The MACCS group included four participants: GREECE: Institute of Nuclear Technology and Radiation Protection, NCSR Demokritos; ITALY: ENEL, ENEA/DISP, and ENEA/NUC-RIN; SPAIN: Universidad Politecnica de Madrid (UPM) and Consejo de Seguridad Nuclear; USA: Brookhaven National Laboratory, US NRC and DOE.

  6. Driver Code for Adaptive Optics

    NASA Technical Reports Server (NTRS)

    Rao, Shanti

    2007-01-01

    A special-purpose computer code for a deformable-mirror adaptive-optics control system transmits pixel-registered control from (1) a personal computer running software that generates the control data to (2) a circuit board with 128 digital-to-analog converters (DACs) that generate voltages to drive the deformable-mirror actuators. This program reads control-voltage codes from a text file, then sends them, via the computer s parallel port, to a circuit board with four AD5535 (or equivalent) chips. Whereas a similar prior computer program was capable of transmitting data to only one chip at a time, this program can send data to four chips simultaneously. This program is in the form of C-language code that can be compiled and linked into an adaptive-optics software system. The program as supplied includes source code for integration into the adaptive-optics software, documentation, and a component that provides a demonstration of loading DAC codes from a text file. On a standard Windows desktop computer, the software can update 128 channels in 10 ms. On Real-Time Linux with a digital I/O card, the software can update 1024 channels (8 boards in parallel) every 8 ms.

  7. AEST: Adaptive Eigenvalue Stability Code

    NASA Astrophysics Data System (ADS)

    Zheng, L.-J.; Kotschenreuther, M.; Waelbroeck, F.; van Dam, J. W.; Berk, H.

    2002-11-01

    An adaptive eigenvalue linear stability code is developed. The aim is on one hand to include the non-ideal MHD effects into the global MHD stability calculation for both low and high n modes and on the other hand to resolve the numerical difficulty involving MHD singularity on the rational surfaces at the marginal stability. Our code follows some parts of philosophy of DCON by abandoning relaxation methods based on radial finite element expansion in favor of an efficient shooting procedure with adaptive gridding. The δ W criterion is replaced by the shooting procedure and subsequent matrix eigenvalue problem. Since the technique of expanding a general solution into a summation of the independent solutions employed, the rank of the matrices involved is just a few hundreds. This makes easier to solve the eigenvalue problem with non-ideal MHD effects, such as FLR or even full kinetic effects, as well as plasma rotation effect, taken into account. To include kinetic effects, the approach of solving for the distribution function as a local eigenvalue ω problem as in the GS2 code will be employed in the future. Comparison of the ideal MHD version of the code with DCON, PEST, and GATO will be discussed. The non-ideal MHD version of the code will be employed to study as an application the transport barrier physics in tokamak discharges.

  8. Taste Coding after Selective Inhibition by Chlorhexidine

    PubMed Central

    Wang, Miao-Fen; Marks, Lawrence E.

    2009-01-01

    Coding of the complex tastes of ionic stimuli in humans was studied by combining taste confusion matrix (TCM) methodology and treatment with chlorhexidine gluconate. The TCM evaluates discrimination of multiple stimuli simultaneously. Chlorhexidine, a bis-biguanide antiseptic, reversibly inhibits salty taste and tastes of a subset of bitter stimuli, including quinine hydrochloride. Identifications of salty (NaCl, “salt”), bitter (quinine·HCl, “quinine”), sweet (sucrose, “sugar”), and sour (citric acid, “acid”) prototypes, alone and as components of binary mixtures, were measured under 4 conditions. One was a water-rinse control and the others had the salt and quinine tastes progressively reduced by treatment with 1 mM chlorhexidine, 3 mM chlorhexidine, and ultimately to zero by elimination of NaCl and quinine·HCl. Treatment with chlorhexidine perturbed identification of salt more than quinine; both were thereafter more often confused with “water” and unidentified when mixed with sucrose or citric acid. All pairwise discriminations that depended on the tastes of NaCl and quinine·HCl deteriorated, and although H2O was mistakenly identified as quinine after chlorhexidine, this may have been a decisional bias. Other confusions reflected “unprompted mixture analysis” and an obscuring of salt taste by a less-inhibited stronger quinine or sugar or acid tastes in mixtures. Partial inhibition of the tastes of NaCl and quinine·HCl by chlorhexidine was considered in the context of multiple receptors for the 2 compounds. Discrimination among prototypic stimuli with varying strengths was consistent with a gustatory system that evaluates a small number of independent tastes. PMID:19703921

  9. Three narrative-based coding systems: Innovative moments, ambivalence and ambivalence resolution.

    PubMed

    Gonçalves, Miguel M; Ribeiro, António P; Mendes, Inês; Alves, Daniela; Silva, Joana; Rosa, Catarina; Braga, Cátia; Batista, João; Fernández-Navarro, Pablo; Oliveira, João Tiago

    2016-11-18

    Narrative and dialogical perspectives suggest that personal meaning systems' flexibility is an important resource for change in psychotherapy. Drawn from these theoretical backgrounds, a research program focused on the identification of Innovative Moments (IMs)-exceptions to the inflexible meaning systems present in psychopathological suffering-has been carried out. For this purpose, three process-oriented coding systems were developed: The IMs Coding System, the Ambivalence Coding System, and the Ambivalence Resolution Coding System. They allow, respectively, for the study of change, ambivalence, and ambivalence resolution in therapy. This paper presents these coding systems, the main findings that resulted from their application to different samples and therapeutic models, the main current and future lines of research, as well as the clinical applications of this research program.

  10. Roadmap to Majorana surface codes

    NASA Astrophysics Data System (ADS)

    Plugge, S.; Landau, L. A.; Sela, E.; Altland, A.; Flensberg, K.; Egger, R.

    2016-11-01

    Surface codes offer a very promising avenue towards fault-tolerant quantum computation. We argue that two-dimensional interacting networks of Majorana bound states in topological superconductor/semiconductor heterostructures hold several key advantages in that direction, concerning both the hardware realization and the actual operation of the code. We here discuss how topologically protected logical qubits in this Majorana surface code architecture can be defined, initialized, manipulated, and read out. All physical ingredients needed to implement these operations are routinely used in topologically trivial quantum devices. By means of quantum interference terms in linear conductance measurements, single-electron pumping protocols, and gate-tunable tunnel barriers, the full set of quantum gates required for universal quantum computation can be achieved. In particular, we show that designated multistep pumping sequences via tunnel-coupled quantum dots realize high-fidelity ancilla states for phase gates.

  11. ASME Code Efforts Supporting HTGRs

    SciTech Connect

    D.K. Morton

    2012-09-01

    In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

  12. A coded tracking telemetry system

    USGS Publications Warehouse

    Howey, P.W.; Seegar, W.S.; Fuller, M.R.; Titus, K.; Amlaner, Charles J.

    1989-01-01

    We describe the general characteristics of an automated radio telemetry system designed to operate for prolonged periods on a single frequency. Each transmitter sends a unique coded signal to a receiving system that encodes and records only the appropriater, pre-programmed codes. A record of the time of each reception is stored on diskettes in a micro-computer. This system enables continuous monitoring of infrequent signals (e.g. one per minute or one per hour), thus extending operation life or allowing size reduction of the transmitter, compared to conventional wildlife telemetry. Furthermore, when using unique codes transmitted on a single frequency, biologists can monitor many individuals without exceeding the radio frequency allocations for wildlife.

  13. FLOWTRAN-TF code benchmarking

    SciTech Connect

    Flach, G.P.

    1990-12-01

    FLOWTRAN-TF is a two-component (air-water), two-phase thermal-hydraulics code designed for performing accident analyses of SRS reactor fuel assemblies during the Emergency Cooling System (ECS) phase of a Double Ended Guillotine Break (DEGB) Loss Of Coolant Accident (LOCA). A description of the code is given by Flach et al. (1990). This report provides benchmarking results for the version of FLOWTRAN-TF used to compute the Recommended K-Reactor Restart ECS Power Limit (Smith et al., 1990a; 1990b). Individual constitutive relations are benchmarked in Sections 2 through 5 while in Sections 6 and 7 integral code benchmarking results are presented. An overall assessment of FLOWTRAN-TF for its intended use in computing the ECS power limit completes the document.

  14. FLOWTRAN-TF code description

    SciTech Connect

    Flach, G.P.

    1990-12-01

    FLOWTRAN-TF is a two-component (air-water), two-phase thermal-hydraulics code designed for performing accident analyses of SRS reactor fuel assemblies during the Emergency Cooling System (ECS) phase of a Double Ended Guillotine Break (DEGB) Loss of Coolant Accident (LOCA). This report provides a brief description of the physical models in the version of FLOWTRAN-TF used to compute the Recommended K-Reactor Restart ECS Power Limit. This document is viewed as an interim report and should ultimately be superseded by a comprehensive user/programmer manual. In general, only high level discussions of governing equations and constitutive laws are presented. Numerical implementation of these models, code architecture and user information are not generally covered. A companion document describing code benchmarking is available.

  15. FLOWTRAN-TF code description

    SciTech Connect

    Flach, G.P.

    1991-09-01

    FLOWTRAN-TF is a two-component (air-water), two-phase thermal-hydraulics code designed for performing accident analyses of SRS reactor fuel assemblies during the Emergency Cooling System (ECS) phase of a Double Ended Guillotine Break (DEGB) Loss of Coolant Accident (LOCA). This report provides a brief description of the physical models in the version of FLOWTRAN-TF used to compute the Recommended K-Reactor Restart ECS Power Limit. This document is viewed as an interim report and should ultimately be superseded by a comprehensive user/programmer manual. In general, only high level discussions of governing equations and constitutive laws are presented. Numerical implementation of these models, code architecture and user information are not generally covered. A companion document describing code benchmarking is available.

  16. ASME Code Efforts Supporting HTGRs

    SciTech Connect

    D.K. Morton

    2011-09-01

    In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

  17. ASME Code Efforts Supporting HTGRs

    SciTech Connect

    D.K. Morton

    2010-09-01

    In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

  18. Verification of FANTASTIC integrated code

    NASA Technical Reports Server (NTRS)

    Chauhan, Rajinder Singh

    1987-01-01

    FANTASTIC is an acronym for Failure Analysis Nonlinear Thermal and Structural Integrated Code. This program was developed by Failure Analysis Associates, Palo Alto, Calif., for MSFC to improve the accuracy of solid rocket motor nozzle analysis. FANTASTIC has three modules: FACT - thermochemical analysis; FAHT - heat transfer analysis; and FAST - structural analysis. All modules have keywords for data input. Work is in progress for the verification of the FAHT module, which is done by using data for various problems with known solutions as inputs to the FAHT module. The information obtained is used to identify problem areas of the code and passed on to the developer for debugging purposes. Failure Analysis Associates have revised the first version of the FANTASTIC code and a new improved version has been released to the Thermal Systems Branch.

  19. The stellar atmosphere simulation code Bifrost. Code description and validation

    NASA Astrophysics Data System (ADS)

    Gudiksen, B. V.; Carlsson, M.; Hansteen, V. H.; Hayek, W.; Leenaarts, J.; Martínez-Sykora, J.

    2011-07-01

    Context. Numerical simulations of stellar convection and photospheres have been developed to the point where detailed shapes of observed spectral lines can be explained. Stellar atmospheres are very complex, and very different physical regimes are present in the convection zone, photosphere, chromosphere, transition region and corona. To understand the details of the atmosphere it is necessary to simulate the whole atmosphere since the different layers interact strongly. These physical regimes are very diverse and it takes a highly efficient massively parallel numerical code to solve the associated equations. Aims: The design, implementation and validation of the massively parallel numerical code Bifrost for simulating stellar atmospheres from the convection zone to the corona. Methods: The code is subjected to a number of validation tests, among them the Sod shock tube test, the Orzag-Tang colliding shock test, boundary condition tests and tests of how the code treats magnetic field advection, chromospheric radiation, radiative transfer in an isothermal scattering atmosphere, hydrogen ionization and thermal conduction. Results.Bifrost completes the tests with good results and shows near linear efficiency scaling to thousands of computing cores.

  20. A comprehensive catalogue of the coding and non-coding transcripts of the human inner ear.

    PubMed

    Schrauwen, Isabelle; Hasin-Brumshtein, Yehudit; Corneveaux, Jason J; Ohmen, Jeffrey; White, Cory; Allen, April N; Lusis, Aldons J; Van Camp, Guy; Huentelman, Matthew J; Friedman, Rick A

    2016-03-01

    The mammalian inner ear consists of the cochlea and the vestibular labyrinth (utricle, saccule, and semicircular canals), which participate in both hearing and balance. Proper development and life-long function of these structures involves a highly complex coordinated system of spatial and temporal gene expression. The characterization of the inner ear transcriptome is likely important for the functional study of auditory and vestibular components, yet, primarily due to tissue unavailability, detailed expression catalogues of the human inner ear remain largely incomplete. We report here, for the first time, comprehensive transcriptome characterization of the adult human cochlea, ampulla, saccule and utricle of the vestibule obtained from patients without hearing abnormalities. Using RNA-Seq, we measured the expression of >50,000 predicted genes corresponding to approximately 200,000 transcripts, in the adult inner ear and compared it to 32 other human tissues. First, we identified genes preferentially expressed in the inner ear, and unique either to the vestibule or cochlea. Next, we examined expression levels of specific groups of potentially interesting RNAs, such as genes implicated in hearing loss, long non-coding RNAs, pseudogenes and transcripts subject to nonsense mediated decay (NMD). We uncover the spatial specificity of expression of these RNAs in the hearing/balance system, and reveal evidence of tissue specific NMD. Lastly, we investigated the non-syndromic deafness loci to which no gene has been mapped, and narrow the list of potential candidates for each locus. These data represent the first high-resolution transcriptome catalogue of the adult human inner ear. A comprehensive identification of coding and non-coding RNAs in the inner ear will enable pathways of auditory and vestibular function to be further defined in the study of hearing and balance. Expression data are freely accessible at https://www.tgen.org/home/research/research-divisions/neurogenomics/supplementary-data/inner-ear-transcriptome.aspx.

  1. Hybrid codes: Methods and applications

    SciTech Connect

    Winske, D. ); Omidi, N. )

    1991-01-01

    In this chapter we discuss hybrid'' algorithms used in the study of low frequency electromagnetic phenomena, where one or more ion species are treated kinetically via standard PIC methods used in particle codes and the electrons are treated as a single charge neutralizing massless fluid. Other types of hybrid models are possible, as discussed in Winske and Quest, but hybrid codes with particle ions and massless fluid electrons have become the most common for simulating space plasma physics phenomena in the last decade, as we discuss in this paper.

  2. Sensor Authentication: Embedded Processor Code

    SciTech Connect

    Svoboda, John

    2012-09-25

    Described is the c code running on the embedded Microchip 32bit PIC32MX575F256H located on the INL developed noise analysis circuit board. The code performs the following functions: Controls the noise analysis circuit board preamplifier voltage gains of 1, 10, 100, 000 Initializes the analog to digital conversion hardware, input channel selection, Fast Fourier Transform (FFT) function, USB communications interface, and internal memory allocations Initiates high resolution 4096 point 200 kHz data acquisition Computes complex 2048 point FFT and FFT magnitude. Services Host command set Transfers raw data to Host Transfers FFT result to host Communication error checking

  3. Guidelines for Coding FORTRAN Programs.

    DTIC Science & Technology

    1982-07-01

    39529 PE63759N I I CONTROLLING OFFICE NAME AND ADDRESS 12. REPORT DATE Naval Ocean Research and Development Activity July 1982 Code 320 13. NUMBER OF...Element 63759N. ,-! ri ii Contents 1. INTRODUCTION 1 1.1 Scope 1 2. CODING FORTRAN STATEMENTS 2 2.1 General Remarks and Sug- 2 gestions 2.2 FORTRAN...Assignment 11 5.3 Masking Assignment 11 5.4 Multiple Assignment 11 6. CONTROL STATEMENTS 11 6.1 GO TO Statement 11 6.1.1 Unconditional GO TO 11 Statement

  4. Radio Losses for Concatenated Codes

    NASA Astrophysics Data System (ADS)

    Shambayati, S.

    2002-07-01

    The advent of higher powered spacecraft amplifiers and better ground receivers capable of tracking spacecraft carrier signals with narrower loop bandwidths requires better understanding of the carrier tracking loss (radio loss) mechanism of the concatenated codes used for deep-space missions. In this article, we present results of simulations performed for a (7,1/2), Reed-Solomon (255,223), interleaver depth-5 concatenated code in order to shed some light on this issue. Through these simulations, we obtained the performance of this code over an additive white Gaussian noise (AWGN) channel (the baseline performance) in terms of both its frame-error rate (FER) and its bit-error rate at the output of the Reed-Solomon decoder (RS-BER). After obtaining these results, we curve fitted the baseline performance curves for FER and RS-BER and calculated the high-rate radio losses for this code for an FER of 10^(-4) and its corresponding baseline RS-BER of 2.1 x 10^(-6) for a carrier loop signal-to-noise ratio (SNR) of 14.8 dB. This calculation revealed that even though over the AWGN channel the FER value and the RS-BER value correspond to each other (i.e., these values are obtained by the same bit SNR value), the RS-BER value has higher high-rate losses than does the FER value. Furthermore, this calculation contradicted the previous assumption th at at high data rates concatenated codes have the same radio losses as their constituent convolutional codes. Our results showed much higher losses for the FER and the RS-BER (by as much as 2 dB) than for the corresponding baseline BER of the convolutional code. Further simulations were performed to investigate the effects of changes in the data rate on the code's radio losses. It was observed that as the data rate increased the radio losses for both the FER and the RS-BER approached their respective calculated high-rate values. Furthermore, these simulations showed that a simple two-parameter function could model the increase in the

  5. Peptide identification

    DOEpatents

    Jarman, Kristin H [Richland, WA; Cannon, William R [Richland, WA; Jarman, Kenneth D [Richland, WA; Heredia-Langner, Alejandro [Richland, WA

    2011-07-12

    Peptides are identified from a list of candidates using collision-induced dissociation tandem mass spectrometry data. A probabilistic model for the occurrence of spectral peaks corresponding to frequently observed partial peptide fragment ions is applied. As part of the identification procedure, a probability score is produced that indicates the likelihood of any given candidate being the correct match. The statistical significance of the score is known without necessarily having reference to the actual identity of the peptide. In one form of the invention, a genetic algorithm is applied to candidate peptides using an objective function that takes into account the number of shifted peaks appearing in the candidate spectrum relative to the test spectrum.

  6. Use of Phonological Codes for Chinese Characters: Evidence from Processing of Parafoveal Preview when Reading Sentences

    ERIC Educational Resources Information Center

    Tsai, Jie-Li; Lee, Chia-Ying; Tzeng, Ovid J. L.; Hung, Daisy L.; Yen, Nai-Shing

    2004-01-01

    The role of phonological coding for character identification was examined with the benefit of processing parafoveal characters in eye fixations while reading Chinese sentences. In Experiment 1, the orthogonal manipulation of phonological and orthographic similarity can separate two types of phonological benefits for homophonic previews, according…

  7. Code-Switching in Iranian Elementary EFL Classrooms: An Exploratory Investigation

    ERIC Educational Resources Information Center

    Rezvani, Ehsan; Street, Hezar Jerib; Rasekh, Abbass Eslami

    2011-01-01

    This paper presents the results of a small-scale exploratory investigation of code-switching (CS) between English and Farsi by 4 Iranian English foreign language (EFL) teachers in elementary level EFL classrooms in a language school in Isfahan, Iran. Specifically, the present study aimed at exploring the syntactical identification of switches and…

  8. 40 CFR 261.35 - Deletion of certain hazardous waste codes following equipment cleaning and replacement.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) IDENTIFICATION AND LISTING OF HAZARDOUS WASTE Lists of Hazardous Wastes § 261.35 Deletion of certain hazardous waste codes following equipment... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Deletion of certain hazardous...

  9. LACEwING: A New Moving Group Analysis Code

    NASA Astrophysics Data System (ADS)

    Riedel, Adric R.; Blunt, Sarah C.; Lambrides, Erini L.; Rice, Emily L.; Cruz, Kelle L.; Faherty, Jacqueline K.

    2017-03-01

    We present a new nearby young moving group (NYMG) kinematic membership analysis code, LocAting Constituent mEmbers In Nearby Groups (LACEwING), a new Catalog of Suspected Nearby Young Stars, a new list of bona fide members of moving groups, and a kinematic traceback code. LACEwING is a convergence-style algorithm with carefully vetted membership statistics based on a large numerical simulation of the Solar Neighborhood. Given spatial and kinematic information on stars, LACEwING calculates membership probabilities in 13 NYMGs and three open clusters within 100 pc. In addition to describing the inputs, methods, and products of the code, we provide comparisons of LACEwING to other popular kinematic moving group membership identification codes. As a proof of concept, we use LACEwING to reconsider the membership of 930 stellar systems in the Solar Neighborhood (within 100 pc) that have reported measurable lithium equivalent widths. We quantify the evidence in support of a population of young stars not attached to any NYMGs, which is a possible sign of new as-yet-undiscovered groups or of a field population of young stars.

  10. Coding productivity in Sydney public hospitals.

    PubMed

    Dimitropoulos, Vera; Bennett, Adam; McIntosh, Jean

    2002-01-01

    The aims of this study were to compare Sydney public hospitals regarding medical record coding times to compare observed coding times with coding times necessary to avoid backlog and to evaluate the impact on coding time of casemix complexity, coder age, experience, job satisfaction, employment status, and salary. Coding time (in minutes) for each medical record over a two-week period was documented by 61 coders employed in 13 hospitals: six principal referral (PR), six major metropolitan (MM), and one paediatric specialist (PS) hospitals. The mean coding time for each coder was estimated by averaging across coding times for all records during the two-week period. In order to compare hospital mean coding times, the hospitals were grouped into PR and MM/PS groups. The mean coding time necessary to avoid coding backlog (expected coding time) for each hospital group was based on the total number of annual separations and filled full-time equivalent coding positions. The observed mean coding time was longer in the PR group than in the MM/PS group (p = 0.019); however, the observed coding time was within the expected coding time limit in both the PR and MM/PS groups. Casemix complexity tended to influence coding time, but neither age, experience, job satisfaction, employment status nor salary had any impact. In conclusion, the expected coding times, if reliable, indicate that coders in the two hospital groups were keeping coding up-to-date. Thus, the variation between hospital groups in coding time is of little importance, given that the main objective in coding productivity is to maintain the coding workload.

  11. Multiple component codes based generalized LDPC codes for high-speed optical transport.

    PubMed

    Djordjevic, Ivan B; Wang, Ting

    2014-07-14

    A class of generalized low-density parity-check (GLDPC) codes suitable for optical communications is proposed, which consists of multiple local codes. It is shown that Hamming, BCH, and Reed-Muller codes can be used as local codes, and that the maximum a posteriori probability (MAP) decoding of these local codes by Ashikhmin-Lytsin algorithm is feasible in terms of complexity and performance. We demonstrate that record coding gains can be obtained from properly designed GLDPC codes, derived from multiple component codes. We then show that several recently proposed classes of LDPC codes such as convolutional and spatially-coupled codes can be described using the concept of GLDPC coding, which indicates that the GLDPC coding can be used as a unified platform for advanced FEC enabling ultra-high speed optical transport. The proposed class of GLDPC codes is also suitable for code-rate adaption, to adjust the error correction strength depending on the optical channel conditions.

  12. 49 CFR 178.702 - IBC codes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false IBC codes. 178.702 Section 178.702 Transportation...-Oriented Standards § 178.702 IBC codes. (a) Intermediate bulk container code designations consist of: two... the category of intermediate bulk container. (1) IBC code number designations are as follows: Type...

  13. 32 CFR 635.19 - Offense codes.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Offense codes. 635.19 Section 635.19 National... INVESTIGATIONS LAW ENFORCEMENT REPORTING Offense Reporting § 635.19 Offense codes. (a) The offense code describes, as nearly as possible, the complaint or offense by using an alphanumeric code. Appendix C of AR...

  14. 7 CFR 201.24 - Code designation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Code designation. 201.24 Section 201.24 Agriculture... REGULATIONS Labeling Agricultural Seeds § 201.24 Code designation. The code designation used in lieu of the... as may be designated by him for the purpose. When used, the code designation shall appear on...

  15. 7 CFR 201.28 - Code designation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Code designation. 201.28 Section 201.28 Agriculture... REGULATIONS Labeling Vegetable Seeds § 201.28 Code designation. The code designation used in lieu of the full... as may be designated by him for the purpose. When used, the code designation shall appear on...

  16. An Interactive Concatenated Turbo Coding System

    NASA Technical Reports Server (NTRS)

    Liu, Ye; Tang, Heng; Lin, Shu; Fossorier, Marc

    1999-01-01

    This paper presents a concatenated turbo coding system in which a Reed-Solomon outer code is concatenated with a binary turbo inner code. In the proposed system, the outer code decoder and the inner turbo code decoder interact to achieve both good bit error and frame error performances. The outer code decoder helps the inner turbo code decoder to terminate its decoding iteration while the inner turbo code decoder provides soft-output information to the outer code decoder to carry out a reliability-based soft- decision decoding. In the case that the outer code decoding fails, the outer code decoder instructs the inner code decoder to continue its decoding iterations until the outer code decoding is successful or a preset maximum number of decoding iterations is reached. This interaction between outer and inner code decoders reduces decoding delay. Also presented in the paper are an effective criterion for stopping the iteration process of the inner code decoder and a new reliability-based decoding algorithm for nonbinary codes.

  17. Identification of Potential Hazard using Hazard Identification and Risk Assessment

    NASA Astrophysics Data System (ADS)

    Sari, R. M.; Syahputri, K.; Rizkya, I.; Siregar, I.

    2017-03-01

    This research was conducted in the paper production’s company. These Paper products will be used as a cigarette paper. Along in the production’s process, Company provides the machines and equipment that operated by workers. During the operations, all workers may potentially injured. It known as a potential hazard. Hazard identification and risk assessment is one part of a safety and health program in the stage of risk management. This is very important as part of efforts to prevent occupational injuries and diseases resulting from work. This research is experiencing a problem that is not the identification of potential hazards and risks that would be faced by workers during the running production process. The purpose of this study was to identify the potential hazards by using hazard identification and risk assessment methods. Risk assessment is done using severity criteria and the probability of an accident. According to the research there are 23 potential hazard that occurs with varying severity and probability. Then made the determination Risk Assessment Code (RAC) for each potential hazard, and gained 3 extreme risks, 10 high risks, 6 medium risks and 3 low risks. We have successfully identified potential hazard using RAC.

  18. Improving radiopharmaceutical supply chain safety by implementing bar code technology.

    PubMed

    Matanza, David; Hallouard, François; Rioufol, Catherine; Fessi, Hatem; Fraysse, Marc

    2014-11-01

    The aim of this study was to describe and evaluate an approach for improving radiopharmaceutical supply chain safety by implementing bar code technology. We first evaluated the current situation of our radiopharmaceutical supply chain and, by means of the ALARM protocol, analysed two dispensing errors that occurred in our department. Thereafter, we implemented a bar code system to secure selected key stages of the radiopharmaceutical supply chain. Finally, we evaluated the cost of this implementation, from overtime, to overheads, to additional radiation exposure to workers. An analysis of the events that occurred revealed a lack of identification of prepared or dispensed drugs. Moreover, the evaluation of the current radiopharmaceutical supply chain showed that the dispensation and injection steps needed to be further secured. The bar code system was used to reinforce product identification at three selected key stages: at usable stock entry; at preparation-dispensation; and during administration, allowing to check conformity between the labelling of the delivered product (identity and activity) and the prescription. The extra time needed for all these steps had no impact on the number and successful conduct of examinations. The investment cost was reduced (2600 euros for new material and 30 euros a year for additional supplies) because of pre-existing computing equipment. With regard to the radiation exposure to workers there was an insignificant overexposure for hands with this new organization because of the labelling and scanning processes of radiolabelled preparation vials. Implementation of bar code technology is now an essential part of a global securing approach towards optimum patient management.

  19. Convolutional coding combined with continuous phase modulation

    NASA Technical Reports Server (NTRS)

    Pizzi, S. V.; Wilson, S. G.

    1985-01-01

    Background theory and specific coding designs for combined coding/modulation schemes utilizing convolutional codes and continuous-phase modulation (CPM) are presented. In this paper the case of r = 1/2 coding onto a 4-ary CPM is emphasized, with short-constraint length codes presented for continuous-phase FSK, double-raised-cosine, and triple-raised-cosine modulation. Coding buys several decibels of coding gain over the Gaussian channel, with an attendant increase of bandwidth. Performance comparisons in the power-bandwidth tradeoff with other approaches are made.

  20. Multichannel error correction code decoder

    NASA Technical Reports Server (NTRS)

    Wagner, Paul K.; Ivancic, William D.

    1993-01-01

    A brief overview of a processing satellite for a mesh very-small-aperture (VSAT) communications network is provided. The multichannel error correction code (ECC) decoder system, the uplink signal generation and link simulation equipment, and the time-shared decoder are described. The testing is discussed. Applications of the time-shared decoder are recommended.

  1. Tri-Coding of Information.

    ERIC Educational Resources Information Center

    Simpson, Timothy J.

    Paivio's Dual Coding Theory has received widespread recognition for its connection between visual and aural channels of internal information processing. The use of only two channels, however, cannot satisfactorily explain the effects witnessed every day. This paper presents a study suggesting the presence a third, kinesthetic channel, currently…

  2. Three-dimensional stellarator codes

    PubMed Central

    Garabedian, P. R.

    2002-01-01

    Three-dimensional computer codes have been used to develop quasisymmetric stellarators with modular coils that are promising candidates for a magnetic fusion reactor. The mathematics of plasma confinement raises serious questions about the numerical calculations. Convergence studies have been performed to assess the best configurations. Comparisons with recent data from large stellarator experiments serve to validate the theory. PMID:12140367

  3. Overview of CODE V development

    NASA Astrophysics Data System (ADS)

    Harris, Thomas I.

    1991-01-01

    This paper is part of a session that is aimed at briefly describing some of today''s optical design software packages with emphasis on the program''s philosophy and technology. CODE V is the ongoing result of a development process that began in the 1960''s it is now the result of many people''s efforts. This paper summarizes the roots of the program some of its history dominant philosophies and technologies that have contributed to its usefulness and some that drive its continued development. ROOTS OF CODE V Conceived in the early 60''s This was at a time when there was skepticism that " automatic design" could design lenses equal or better than " hand" methods. The concepts underlying CODE V and its predecessors were based on ten years of experience and exposure to the problems of a group of lens designers in a design-for-manufacture environment. The basic challenge was to show that lens design could be done better easier and faster by high quality computer-assisted design tools. The earliest development was for our own use as an engineering services organization -an in-house tool for custom design. As a tool it had to make us efficient in providing lens design and engineering services as a self-sustaining business. PHILOSOPHY OF OVTIM!ZATION IN CODE V Error function formation Based on experience as a designer we felt very strongly that there should be a clear separation of

  4. Reusable State Machine Code Generator

    NASA Astrophysics Data System (ADS)

    Hoffstadt, A. A.; Reyes, C.; Sommer, H.; Andolfato, L.

    2010-12-01

    The State Machine model is frequently used to represent the behaviour of a system, allowing one to express and execute this behaviour in a deterministic way. A graphical representation such as a UML State Chart diagram tames the complexity of the system, thus facilitating changes to the model and communication between developers and domain experts. We present a reusable state machine code generator, developed by the Universidad Técnica Federico Santa María and the European Southern Observatory. The generator itself is based on the open source project architecture, and uses UML State Chart models as input. This allows for a modular design and a clean separation between generator and generated code. The generated state machine code has well-defined interfaces that are independent of the implementation artefacts such as the middle-ware. This allows using the generator in the substantially different observatory software of the Atacama Large Millimeter Array and the ESO Very Large Telescope. A project-specific mapping layer for event and transition notification connects the state machine code to its environment, which can be the Common Software of these projects, or any other project. This approach even allows to automatically create tests for a generated state machine, using techniques from software testing, such as path-coverage.

  5. Changing Postal ZIP Code Boundaries

    DTIC Science & Technology

    2006-06-23

    for distribution to a specific delivery post office, identified by the fourth and fifth digits. For example, the ZIP Code for Alturas , the county seat...distribution point for some California post offices such as Alturas , Cedarville (96104), Fort Bidwell (96112), and Likely (96116), distinguished by the

  6. Coded continuous wave meteor radar

    NASA Astrophysics Data System (ADS)

    Vierinen, Juha; Chau, Jorge L.; Pfeffer, Nico; Clahsen, Matthias; Stober, Gunter

    2016-03-01

    The concept of a coded continuous wave specular meteor radar (SMR) is described. The radar uses a continuously transmitted pseudorandom phase-modulated waveform, which has several advantages compared to conventional pulsed SMRs. The coding avoids range and Doppler aliasing, which are in some cases problematic with pulsed radars. Continuous transmissions maximize pulse compression gain, allowing operation at lower peak power than a pulsed system. With continuous coding, the temporal and spectral resolution are not dependent on the transmit waveform and they can be fairly flexibly changed after performing a measurement. The low signal-to-noise ratio before pulse compression, combined with independent pseudorandom transmit waveforms, allows multiple geographically separated transmitters to be used in the same frequency band simultaneously without significantly interfering with each other. Because the same frequency band can be used by multiple transmitters, the same interferometric receiver antennas can be used to receive multiple transmitters at the same time. The principles of the signal processing are discussed, in addition to discussion of several practical ways to increase computation speed, and how to optimally detect meteor echoes. Measurements from a campaign performed with a coded continuous wave SMR are shown and compared with two standard pulsed SMR measurements. The type of meteor radar described in this paper would be suited for use in a large-scale multi-static network of meteor radar transmitters and receivers. Such a system would be useful for increasing the number of meteor detections to obtain improved meteor radar data products.

  7. QR Codes: Taking Collections Further

    ERIC Educational Resources Information Center

    Ahearn, Caitlin

    2014-01-01

    With some thought and direction, QR (quick response) codes are a great tool to use in school libraries to enhance access to information. From March through April 2013, Caitlin Ahearn interned at Sanborn Regional High School (SRHS) under the supervision of Pam Harland. As a result of Harland's un-Deweying of the nonfiction collection at SRHS,…

  8. Generating Constant Weight Binary Codes

    ERIC Educational Resources Information Center

    Knight, D.G.

    2008-01-01

    The determination of bounds for A(n, d, w), the maximum possible number of binary vectors of length n, weight w, and pairwise Hamming distance no less than d, is a classic problem in coding theory. Such sets of vectors have many applications. A description is given of how the problem can be used in a first-year undergraduate computational…

  9. Dress Codes and Gang Activity.

    ERIC Educational Resources Information Center

    Gluckman, Ivan B.

    1996-01-01

    Concern with school violence and efforts to reduce gang visibility at school have led to controversy about students' constitutional rights to freedom of expression. This document outlines legal precedents and offers guidelines for developing a sound school policy on dress codes. It answers the following questions: (1) Are gang clothing and symbols…

  10. AEDS Property Classification Code Manual.

    ERIC Educational Resources Information Center

    Association for Educational Data Systems, Washington, DC.

    The control and inventory of property items using data processing machines requires a form of numerical description or code which will allow a maximum of description in a minimum of space on the data card. An adaptation of a standard industrial classification system is given to cover any expendable warehouse item or non-expendable piece of…

  11. Quantum rate-distortion coding

    NASA Astrophysics Data System (ADS)

    Barnum, Howard

    2000-10-01

    I introduce rate-distortion theory for the coding of quantum information, and derive a lower bound, involving the coherent information, on the rate at which qubits must be used to store or compress an entangled quantum source with a given maximum level of distortion per source emission.

  12. Secure Fingerprint Identification of High Accuracy

    DTIC Science & Technology

    2014-01-01

    work on secure face recognition ([12], [29] and others), DNA matching ([35], [6], and others), iris code comparisons ([9], [7]), fingerprint ...1 Secure Fingerprint Identification of High Accuracy Marina Blanton and Siddharth Saraph Department of Computer Science and Engineering University of...In this work, we treat the problem of privacy- preserving matching of two fingerprints , which can be used for secure fingerprint authentication and

  13. Transversal Clifford gates on folded surface codes

    SciTech Connect

    Moussa, Jonathan E.

    2016-10-12

    Surface and color codes are two forms of topological quantum error correction in two spatial dimensions with complementary properties. Surface codes have lower-depth error detection circuits and well-developed decoders to interpret and correct errors, while color codes have transversal Clifford gates and better code efficiency in the number of physical qubits needed to achieve a given code distance. A formal equivalence exists between color codes and folded surface codes, but it does not guarantee the transferability of any of these favorable properties. However, the equivalence does imply the existence of constant-depth circuit implementations of logical Clifford gates on folded surface codes. We achieve and improve this result by constructing two families of folded surface codes with transversal Clifford gates. This construction is presented generally for qudits of any dimension. Lastly, the specific application of these codes to universal quantum computation based on qubit fusion is also discussed.

  14. Transversal Clifford gates on folded surface codes

    DOE PAGES

    Moussa, Jonathan E.

    2016-10-12

    Surface and color codes are two forms of topological quantum error correction in two spatial dimensions with complementary properties. Surface codes have lower-depth error detection circuits and well-developed decoders to interpret and correct errors, while color codes have transversal Clifford gates and better code efficiency in the number of physical qubits needed to achieve a given code distance. A formal equivalence exists between color codes and folded surface codes, but it does not guarantee the transferability of any of these favorable properties. However, the equivalence does imply the existence of constant-depth circuit implementations of logical Clifford gates on folded surfacemore » codes. We achieve and improve this result by constructing two families of folded surface codes with transversal Clifford gates. This construction is presented generally for qudits of any dimension. Lastly, the specific application of these codes to universal quantum computation based on qubit fusion is also discussed.« less

  15. Coded Modulations for Mobile Satellite Communication Channels

    NASA Astrophysics Data System (ADS)

    Rhee, Dojun

    1995-01-01

    The mobile satellite (MSAT) channel is subject to multipath fading, shadowing, Doppler frequency shift, and adjacent channel interference (ACI). Therefore, transmitted signals face severe amplitude and phase distortions. This dissertation investigates various high performance and low decoding complexity coded modulation schemes for reliable voice and data transmissions over the shadowed mobile satellite channel and the Rayleigh fading channel. The dissertation consists of four parts. The first part presents a systematic technique for constructing MPSK trellis coded modulation (TCM) codes for voice transmission over the MSAT channel. The multilevel coding method is used for constructing TCM codes using convolutional codes with good free branch distances as the component codes or using both convolutional and block codes as the component codes. Simulation results show that these codes achieve good coding gains over the uncoded reference system and outperform existing TCM codes with the same decoding complexity. In the second part, using the multilevel coding method, multilevel block coded modulation (BCM) codes are constructed for voice transmission over the MSAT channel. Even though BCM is generally less power efficient than TCM for AWGN channels, BCM has a great potential to compete with TCM in the MSAT channel because of its shorter decoding depth and hence more effective interleaving. Binary Reed -Muller (RM) codes of length up to 32 are used as component codes. Simulation results show that these codes achieve good coding gains over the uncoded reference system and outperform TCM codes with the same decoding complexity. In the third part, a simple and systematic technique for constructing multilevel concatenated BCM schemes for data transmission over the shadowed MSAT channel and the Rayleigh fading channel is presented. These schemes are designed to achieve high-performance or large coding gain with reduced decoding complexity. Construction is based on a

  16. Accumulate-Repeat-Accumulate-Accumulate Codes

    NASA Technical Reports Server (NTRS)

    Divsalar, Dariush; Dolinar, Samuel; Thorpe, Jeremy

    2007-01-01

    Accumulate-repeat-accumulate-accumulate (ARAA) codes have been proposed, inspired by the recently proposed accumulate-repeat-accumulate (ARA) codes. These are error-correcting codes suitable for use in a variety of wireless data-communication systems that include noisy channels. ARAA codes can be regarded as serial turbolike codes or as a subclass of low-density parity-check (LDPC) codes, and, like ARA codes they have projected graph or protograph representations; these characteristics make it possible to design high-speed iterative decoders that utilize belief-propagation algorithms. The objective in proposing ARAA codes as a subclass of ARA codes was to enhance the error-floor performance of ARA codes while maintaining simple encoding structures and low maximum variable node degree.

  17. Transversal Clifford gates on folded surface codes

    NASA Astrophysics Data System (ADS)

    Moussa, Jonathan E.

    2016-10-01

    Surface and color codes are two forms of topological quantum error correction in two spatial dimensions with complementary properties. Surface codes have lower-depth error detection circuits and well-developed decoders to interpret and correct errors, while color codes have transversal Clifford gates and better code efficiency in the number of physical qubits needed to achieve a given code distance. A formal equivalence exists between color codes and folded surface codes, but it does not guarantee the transferability of any of these favorable properties. However, the equivalence does imply the existence of constant-depth circuit implementations of logical Clifford gates on folded surface codes. We achieve and improve this result by constructing two families of folded surface codes with transversal Clifford gates. This construction is presented generally for qudits of any dimension. The specific application of these codes to universal quantum computation based on qubit fusion is also discussed.

  18. Letting the Data Lead the Code

    DTIC Science & Technology

    2015-08-01

    UNCLASSIFIED Page 1 of 4 UNCLASSIFIED: Distribution Statement A. Approved for public release. Letting the Data Lead the Code Darryl Bryk...used can radically simplify the code . A simple change to the way data is stored in a file can make a big difference in the code required to read it...This was made apparent recently with some Visual Basic code which would locate a list of numbers based on certain search criteria. The code was about

  19. Colour cyclic code for Brillouin distributed sensors

    NASA Astrophysics Data System (ADS)

    Le Floch, Sébastien; Sauser, Florian; Llera, Miguel; Rochat, Etienne

    2015-09-01

    For the first time, a colour cyclic coding (CCC) is theoretically and experimentally demonstrated for Brillouin optical time-domain analysis (BOTDA) distributed sensors. Compared to traditional intensity-modulated cyclic codes, the code presents an additional gain of √2 while keeping the same number of sequences as for a colour coding. A comparison with a standard BOTDA sensor is realized and validates the theoretical coding gain.

  20. Intellectual system of identification of Arabic graphics

    NASA Astrophysics Data System (ADS)

    Abdoullayeva, Gulchin G.; Aliyev, Telman A.; Gurbanova, Nazakat G.

    2001-08-01

    The studies made by using the domain of graphic images allowed creating facilities of the artificial intelligence for letters, letter combinations etc. for various graphics and prints. The work proposes a system of recognition and identification of symbols of the Arabic graphics, which has its own specificity as compared to Latin and Cyrillic ones. The starting stage of the recognition and the identification is coding with further entry of information into a computer. Here the problem of entry is one of the essentials. For entry of a large volume of information in the unit of time a scanner is usually employed. Along with the scanner the authors suggest their elaboration of technical facilities for effective input and coding of the information. For refinement of symbols not identified from the scanner mostly for a small bulk of information the developed coding devices are used directly in the process of writing. The functional design of the software is elaborated on the basis of the heuristic model of the creative activity of a researcher and experts in the description and estimation of states of the weakly formalizable systems on the strength of the methods of identification and of selection of geometric features.

  1. Bilingualism affects audiovisual phoneme identification.

    PubMed

    Burfin, Sabine; Pascalis, Olivier; Ruiz Tada, Elisa; Costa, Albert; Savariaux, Christophe; Kandel, Sonia

    2014-01-01

    We all go through a process of perceptual narrowing for phoneme identification. As we become experts in the languages we hear in our environment we lose the ability to identify phonemes that do not exist in our native phonological inventory. This research examined how linguistic experience-i.e., the exposure to a double phonological code during childhood-affects the visual processes involved in non-native phoneme identification in audiovisual speech perception. We conducted a phoneme identification experiment with bilingual and monolingual adult participants. It was an ABX task involving a Bengali dental-retroflex contrast that does not exist in any of the participants' languages. The phonemes were presented in audiovisual (AV) and audio-only (A) conditions. The results revealed that in the audio-only condition monolinguals and bilinguals had difficulties in discriminating the retroflex non-native phoneme. They were phonologically "deaf" and assimilated it to the dental phoneme that exists in their native languages. In the audiovisual presentation instead, both groups could overcome the phonological deafness for the retroflex non-native phoneme and identify both Bengali phonemes. However, monolinguals were more accurate and responded quicker than bilinguals. This suggests that bilinguals do not use the same processes as monolinguals to decode visual speech.

  2. Bilingualism affects audiovisual phoneme identification

    PubMed Central

    Burfin, Sabine; Pascalis, Olivier; Ruiz Tada, Elisa; Costa, Albert; Savariaux, Christophe; Kandel, Sonia

    2014-01-01

    We all go through a process of perceptual narrowing for phoneme identification. As we become experts in the languages we hear in our environment we lose the ability to identify phonemes that do not exist in our native phonological inventory. This research examined how linguistic experience—i.e., the exposure to a double phonological code during childhood—affects the visual processes involved in non-native phoneme identification in audiovisual speech perception. We conducted a phoneme identification experiment with bilingual and monolingual adult participants. It was an ABX task involving a Bengali dental-retroflex contrast that does not exist in any of the participants' languages. The phonemes were presented in audiovisual (AV) and audio-only (A) conditions. The results revealed that in the audio-only condition monolinguals and bilinguals had difficulties in discriminating the retroflex non-native phoneme. They were phonologically “deaf” and assimilated it to the dental phoneme that exists in their native languages. In the audiovisual presentation instead, both groups could overcome the phonological deafness for the retroflex non-native phoneme and identify both Bengali phonemes. However, monolinguals were more accurate and responded quicker than bilinguals. This suggests that bilinguals do not use the same processes as monolinguals to decode visual speech. PMID:25374551

  3. Nonparametric identification experiment

    NASA Technical Reports Server (NTRS)

    Yam, Yeung

    1988-01-01

    The following constitutes a summary of this paper: on-orbit identification methodology starts with nonparametric techniques for a priori system identification; development of the nonparametric identification and model determination experiment software has been completed; the validation experiments to be performed on the JPL Control and Identification Technology Validation Laboratory have been designed.

  4. The chromatin regulatory code: Beyond a histone code

    NASA Astrophysics Data System (ADS)

    Lesne, A.

    2006-03-01

    In this commentary on the contribution by Arndt Benecke in this issue, I discuss why the notion of “chromatin code” introduced and elaborated in this paper is to be preferred to that of “histone code”. Speaking of a code as regards nucleosome conformation and histone tail post-translational modifications only makes sense within the chromatin fiber, where their physico-chemical features can be translated into regulatory programs at the genome level, by means of a complex, multi-level interplay with the fiber architecture and dynamics settled in the course of Evolution. In particular, this chromatin code presumably exploits allosteric transitions of the chromatin fiber. The chromatin structure dependence of its translation suggests two alternative modes of transcription initiation regulation, also proposed in the paper by A. Benecke in this issue for interpreting strikingly bimodal micro-array data.

  5. The neuronal code(s) of the cerebellum.

    PubMed

    Heck, Detlef H; De Zeeuw, Chris I; Jaeger, Dieter; Khodakhah, Kamran; Person, Abigail L

    2013-11-06

    Understanding how neurons encode information in sequences of action potentials is of fundamental importance to neuroscience. The cerebellum is widely recognized for its involvement in the coordination of movements, which requires muscle activation patterns to be controlled with millisecond precision. Understanding how cerebellar neurons accomplish such high temporal precision is critical to understanding cerebellar function. Inhibitory Purkinje cells, the only output neurons of the cerebellar cortex, and their postsynaptic target neurons in the cerebellar nuclei, fire action potentials at high, sustained frequencies, suggesting spike rate modulation as a possible code. Yet, millisecond precise spatiotemporal spike activity patterns in Purkinje cells and inferior olivary neurons have also been observed. These results and ongoing studies suggest that the neuronal code used by cerebellar neurons may span a wide time scale from millisecond precision to slow rate modulations, likely depending on the behavioral context.

  6. Superimposed Code Theorectic Analysis of DNA Codes and DNA Computing

    DTIC Science & Technology

    2010-03-01

    that the hybridization that occurs between a DNA strand and its Watson - Crick complement can be used to perform mathematical computation. This research... Watson - Crick (WC) duplex, e.g., TCGCA TCGCA . Note that non-WC duplexes can form and such a formation is called a cross-hybridization. Cross...5’GAAAGTCGCGTA3’ Watson Crick (WC) Duplexes TACGCGACTTTC Cross Hybridized (CH) Duplexes ATTTTTGCGTTA GAAAAAGAAGAA Coding Strands for Ligation

  7. Genetic coding and gene expression - new Quadruplet genetic coding model

    NASA Astrophysics Data System (ADS)

    Shankar Singh, Rama

    2012-07-01

    Successful demonstration of human genome project has opened the door not only for developing personalized medicine and cure for genetic diseases, but it may also answer the complex and difficult question of the origin of life. It may lead to making 21st century, a century of Biological Sciences as well. Based on the central dogma of Biology, genetic codons in conjunction with tRNA play a key role in translating the RNA bases forming sequence of amino acids leading to a synthesized protein. This is the most critical step in synthesizing the right protein needed for personalized medicine and curing genetic diseases. So far, only triplet codons involving three bases of RNA, transcribed from DNA bases, have been used. Since this approach has several inconsistencies and limitations, even the promise of personalized medicine has not been realized. The new Quadruplet genetic coding model proposed and developed here involves all four RNA bases which in conjunction with tRNA will synthesize the right protein. The transcription and translation process used will be the same, but the Quadruplet codons will help overcome most of the inconsistencies and limitations of the triplet codes. Details of this new Quadruplet genetic coding model and its subsequent potential applications including relevance to the origin of life will be presented.

  8. Code-excited linear predictive coding of multispectral MR images

    NASA Astrophysics Data System (ADS)

    Hu, Jian-Hong; Wang, Yao; Cahill, Patrick

    1996-02-01

    This paper reports a multispectral code excited linear predictive coding method for the compression of well-registered multispectral MR images. Different linear prediction models and the adaptation schemes have been compared. The method which uses forward adaptive autoregressive (AR) model has proven to achieve a good compromise between performance, complexity and robustness. This approach is referred to as the MFCELP method. Given a set of multispectral images, the linear predictive coefficients are updated over non-overlapping square macroblocks. Each macro-block is further divided into several micro-blocks and, the best excitation signals for each microblock are determined through an analysis-by-synthesis procedure. To satisfy the high quality requirement for medical images, the error between the original images and the synthesized ones are further specified using a vector quantizer. The MFCELP method has been applied to 26 sets of clinical MR neuro images (20 slices/set, 3 spectral bands/slice, 256 by 256 pixels/image, 12 bits/pixel). It provides a significant improvement over the discrete cosine transform (DCT) based JPEG method, a wavelet transform based embedded zero-tree wavelet (EZW) coding method, as well as the MSARMA method we developed before.

  9. Amino acid codes in mitochondria as possible clues to primitive codes

    NASA Technical Reports Server (NTRS)

    Jukes, T. H.

    1981-01-01

    Differences between mitochondrial codes and the universal code indicate that an evolutionary simplification has taken place, rather than a return to a more primitive code. However, these differences make it evident that the universal code is not the only code possible, and therefore earlier codes may have differed markedly from the previous code. The present universal code is probably a 'frozen accident.' The change in CUN codons from leucine to threonine (Neurospora vs. yeast mitochondria) indicates that neutral or near-neutral changes occurred in the corresponding proteins when this code change took place, caused presumably by a mutation in a tRNA gene.

  10. An evaluation of the quality of obstetric morbidity coding using an objective assessment tool, the Performance Indicators For Coding Quality (PICQ).

    PubMed

    Lamb, Mary K; Innes, Kerry; Saad, Patricia; Rust, Julie; Dimitropoulos, Vera; Cumerlato, Megan

    2008-01-01

    The Performance Indicators for Coding Quality (PICQ) is a data quality assessment tool developed by Australia's National Centre for Classification in Health (NCCH). PICQ consists of a number of indicators covering all ICD-10-AM disease chapters, some procedure chapters from the Australian Classification of Health Intervention (ACHI) and some Australian Coding Standards (ACS). The indicators can be used to assess the coding quality of hospital morbidity data by monitoring compliance of coding conventions and ACS; this enables the identification of particular records that may be incorrectly coded, thus providing a measure of data quality. There are 31 obstetric indicators available for the ICD-10-AM Fourth Edition. Twenty of these 31 indicators were classified as Fatal, nine as Warning and two Relative. These indicators were used to examine coding quality of obstetric records in the 2004-2005 financial year Australian national hospital morbidity dataset. Records with obstetric disease or procedure codes listed anywhere in the code string were extracted and exported from the SPSS source file. Data were then imported into a Microsoft Access database table as per PICQ instructions, and run against all Fatal and Warning and Relative (N=31) obstetric PICQ 2006 Fourth Edition Indicators v.5 for the ICD-10- AM Fourth Edition. There were 689,905 gynaecological and obstetric records in the 2004-2005 financial year, of which 1.14% were found to have triggered Fatal degree errors, 3.78% Warning degree errors and 8.35% Relative degree errors. The types of errors include completeness, redundancy, specificity and sequencing problems. It was found that PICQ is a useful initial screening tool for the assessment of ICD-10-AM/ACHI coding quality. The overall quality of codes assigned to obstetric records in the 2004- 2005 Australian national morbidity dataset is of fair quality.

  11. EMPLACEMENT GANTRY ITS STANDARDS IDENTIFICATION STUDY

    SciTech Connect

    M. Voegele

    2005-04-06

    To date, the project has established ITS performance requirements for SSCs based on identification and categorization of event sequences that may result in a radiological release. These performance requirements are defined within the NSDB. Further, SSCs credited with performing safe functions are classified as ITS. In turn, perform confirmation for these SSCs is sought through the use of consensus code and standards. The purpose of this study is to identify applicable codes and standards for the WP Emplacement Gantry ITS SSCs. Further, this study will form the basis for selection and the extent of applicability of each code and standard. This study is based on the design development completed for LA only. Accordingly, identification of ITS SSCs beyond those defined within the NSDB are based on designs that may be subject to further development during detail design. Furthermore, several design alternatives may still be under consideration to satisfy certain safety functions, and that final selection will not be determined until further design development has occurred. Therefore, for completeness, throughout this study alternative designs currently under considered will be discussed. Further, the results of this study will be subject to evaluation as part of a follow-on GAP analysis study. Based on the results of this study the GAP analysis will evaluate each code and standard to ensure each ITS performance requirement is fully satisfied. When a performance requirement is not fully satisfied a ''gap'' is highlighted. Thereafter, the study will identify supplemental requirements to augment the code or standard to meet performance requirements. Further, the GAP analysis will identify non-standard areas of the design that will be subject to a Development Plan. Non-standard components and non-standard design configurations are defined as areas of the design that do not follow standard industry practices or codes and standards. Whereby, performance confirmation cannot be

  12. The Mystery Behind the Code: Differentiated Instruction with Quick Response Codes in Secondary Physical Education

    ERIC Educational Resources Information Center

    Adkins, Megan; Wajciechowski, Misti R.; Scantling, Ed

    2013-01-01

    Quick response codes, better known as QR codes, are small barcodes scanned to receive information about a specific topic. This article explains QR code technology and the utility of QR codes in the delivery of physical education instruction. Consideration is given to how QR codes can be used to accommodate learners of varying ability levels as…

  13. Biological Information Transfer Beyond the Genetic Code: The Sugar Code

    NASA Astrophysics Data System (ADS)

    Gabius, H.-J.

    In the era of genetic engineering, cloning, and genome sequencing the focus of research on the genetic code has received an even further accentuation in the public eye. In attempting, however, to understand intra- and intercellular recognition processes comprehensively, the two biochemical dimensions established by nucleic acids and proteins are not sufficient to satisfactorily explain all molecular events in, for example, cell adhesion or routing. The consideration of further code systems is essential to bridge this gap. A third biochemical alphabet forming code words with an information storage capacity second to no other substance class in rather small units (words, sentences) is established by monosaccharides (letters). As hardware oligosaccharides surpass peptides by more than seven orders of magnitude in the theoretical ability to build isomers, when the total of conceivable hexamers is calculated. In addition to the sequence complexity, the use of magnetic resonance spectroscopy and molecular modeling has been instrumental in discovering that even small glycans can often reside in not only one but several distinct low-energy conformations (keys). Intriguingly, conformers can display notably different capacities to fit snugly into the binding site of nonhomologous receptors (locks). This process, experimentally verified for two classes of lectins, is termed "differential conformer selection." It adds potential for shifts of the conformer equilibrium to modulate ligand properties dynamically and reversibly to the well-known changes in sequence (including anomeric positioning and linkage points) and in pattern of substitution, for example, by sulfation. In the intimate interplay with sugar receptors (lectins, enzymes, and antibodies) the message of coding units of the sugar code is deciphered. Their recognition will trigger postbinding signaling and the intended biological response. Knowledge about the driving forces for the molecular rendezvous, i

  14. Maximal dinucleotide and trinucleotide circular codes.

    PubMed

    Michel, Christian J; Pellegrini, Marco; Pirillo, Giuseppe

    2016-01-21

    We determine here the number and the list of maximal dinucleotide and trinucleotide circular codes. We prove that there is no maximal dinucleotide circular code having strictly less than 6 elements (maximum size of dinucleotide circular codes). On the other hand, a computer calculus shows that there are maximal trinucleotide circular codes with less than 20 elements (maximum size of trinucleotide circular codes). More precisely, there are maximal trinucleotide circular codes with 14, 15, 16, 17, 18 and 19 elements and no maximal trinucleotide circular code having less than 14 elements. We give the same information for the maximal self-complementary dinucleotide and trinucleotide circular codes. The amino acid distribution of maximal trinucleotide circular codes is also determined.

  15. Quantum codes with low weight stabilizers

    NASA Astrophysics Data System (ADS)

    Kovalev, Alexey A.; Dumer, Ilya; Pryadko, Leonid P.

    2012-02-01

    We study quantum cyclic stabilizer codes whose stabilizer can be always defined by one or two stabilizer generators. Our main goal is to construct low-weight stabilizer generators that can yield quantum codes with high code rate and simple error correction. To do so, we apply the classical quaternary representation of stabilizer codes and extend our recent study of one-generator cyclic codes [1]. For any stabilizer generator of weight four or five, we formulate a necessary and sufficient condition for its commutativity. We then proceed with a design of additive cyclic codes with such generators. In some cases, we also extend our commutativity condition and code design to generators of weight six. In particular, quantum cyclic codes with stabilizers of weight four are mapped to the generalized toric codes. Here we also extend the notion of toric codes using a translationally invariant generator and periodic boundary conditions on a two dimensional lattice. Some of our numerically constructed codes can be redefined by means of Code Word Stabilized (CWS) representation [1] as quantum versions of repetition codes. We particularly concentrate on codes with a fixed nonzero rate for which the minimum distance asymptotically grows as the blocklength grows.[4pt] [1] arXiv:1108.5490v1

  16. Dual-code quantum computation model

    NASA Astrophysics Data System (ADS)

    Choi, Byung-Soo

    2015-08-01

    In this work, we propose the dual-code quantum computation model—a fault-tolerant quantum computation scheme which alternates between two different quantum error-correction codes. Since the chosen two codes have different sets of transversal gates, we can implement a universal set of gates transversally, thereby reducing the overall cost. We use code teleportation to convert between quantum states in different codes. The overall cost is decreased if code teleportation requires fewer resources than the fault-tolerant implementation of the non-transversal gate in a specific code. To analyze the cost reduction, we investigate two cases with different base codes, namely the Steane and Bacon-Shor codes. For the Steane code, neither the proposed dual-code model nor another variation of it achieves any cost reduction since the conventional approach is simple. For the Bacon-Shor code, the three proposed variations of the dual-code model reduce the overall cost. However, as the encoding level increases, the cost reduction decreases and becomes negative. Therefore, the proposed dual-code model is advantageous only when the encoding level is low and the cost of the non-transversal gate is relatively high.

  17. The EGS5 Code System

    SciTech Connect

    Hirayama, Hideo; Namito, Yoshihito; Bielajew, Alex F.; Wilderman, Scott J.; U., Michigan; Nelson, Walter R.; /SLAC

    2005-12-20

    In the nineteen years since EGS4 was released, it has been used in a wide variety of applications, particularly in medical physics, radiation measurement studies, and industrial development. Every new user and every new application bring new challenges for Monte Carlo code designers, and code refinements and bug fixes eventually result in a code that becomes difficult to maintain. Several of the code modifications represented significant advances in electron and photon transport physics, and required a more substantial invocation than code patching. Moreover, the arcane MORTRAN3[48] computer language of EGS4, was highest on the complaint list of the users of EGS4. The size of the EGS4 user base is difficult to measure, as there never existed a formal user registration process. However, some idea of the numbers may be gleaned from the number of EGS4 manuals that were produced and distributed at SLAC: almost three thousand. Consequently, the EGS5 project was undertaken. It was decided to employ the FORTRAN 77 compiler, yet include as much as possible, the structural beauty and power of MORTRAN3. This report consists of four chapters and several appendices. Chapter 1 is an introduction to EGS5 and to this report in general. We suggest that you read it. Chapter 2 is a major update of similar chapters in the old EGS4 report[126] (SLAC-265) and the old EGS3 report[61] (SLAC-210), in which all the details of the old physics (i.e., models which were carried over from EGS4) and the new physics are gathered together. The descriptions of the new physics are extensive, and not for the faint of heart. Detailed knowledge of the contents of Chapter 2 is not essential in order to use EGS, but sophisticated users should be aware of its contents. In particular, details of the restrictions on the range of applicability of EGS are dispersed throughout the chapter. First-time users of EGS should skip Chapter 2 and come back to it later if necessary. With the release of the EGS4 version

  18. Dopamine reward prediction error coding.

    PubMed

    Schultz, Wolfram

    2016-03-01

    Reward prediction errors consist of the differences between received and predicted rewards. They are crucial for basic forms of learning about rewards and make us strive for more rewards-an evolutionary beneficial trait. Most dopamine neurons in the midbrain of humans, monkeys, and rodents signal a reward prediction error; they are activated by more reward than predicted (positive prediction error), remain at baseline activity for fully predicted rewards, and show depressed activity with less reward than predicted (negative prediction error). The dopamine signal increases nonlinearly with reward value and codes formal economic utility. Drugs of addiction generate, hijack, and amplify the dopamine reward signal and induce exaggerated, uncontrolled dopamine effects on neuronal plasticity. The striatum, amygdala, and frontal cortex also show reward prediction error coding, but only in subpopulations of neurons. Thus, the important concept of reward prediction errors is implemented in neuronal hardware.

  19. Axisymmetric generalized harmonic evolution code

    SciTech Connect

    Sorkin, Evgeny

    2010-04-15

    We describe the first axisymmetric numerical code based on the generalized harmonic formulation of the Einstein equations, which is regular at the axis. We test the code by investigating gravitational collapse of distributions of complex scalar field in a Kaluza-Klein spacetime. One of the key issues of the harmonic formulation is the choice of the gauge source functions, and we conclude that a damped-wave gauge is remarkably robust in this case. Our preliminary study indicates that evolution of regular initial data leads to formation both of black holes with spherical and cylindrical horizon topologies. Intriguingly, we find evidence that near threshold for black hole formation the number of outcomes proliferates. Specifically, the collapsing matter splits into individual pulses, two of which travel in the opposite directions along the compact dimension and one which is ejected radially from the axis. Depending on the initial conditions, a curvature singularity develops inside the pulses.

  20. Multidimensional Fuel Performance Code: BISON

    SciTech Connect

    2014-09-03

    BISON is a finite element based nuclear fuel performance code applicable to a variety of fuel forms including light water reactor fuel rods, TRISO fuel particles, and metallic rod and plate fuel (Refs. [a, b, c]). It solves the fully-coupled equations of thermomechanics and species diffusion and includes important fuel physics such as fission gas release and material property degradation with burnup. BISON is based on the MOOSE framework (Ref. [d]) and can therefore efficiently solve problems on 1-, 2- or 3-D meshes using standard workstations or large high performance computers. BISON is also coupled to a MOOSE-based mesoscale phase field material property simulation capability (Refs. [e, f]). As described here, BISON includes the code library named FOX, which was developed concurrent with BISON. FOX contains material and behavioral models that are specific to oxide fuels.