Powered by Deep Web Technologies
Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

2

V-170: Apache Subversion Hook Scripts Arbitrary Command Injection...  

Broader source: Energy.gov (indexed) [DOE]

script while processing filenames and can be exploited to inject and execute arbitrary shell commands via a specially crafted request. Successful exploitation requires that...

3

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct...

4

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222:...

5

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

6

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

7

T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS X v10.6.

8

T-529: Apple Mac OS PackageKit Distribution Script Remote Code...  

Broader source: Energy.gov (indexed) [DOE]

29: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability January...

9

V-170: Apache Subversion Hook Scripts Arbitrary Command Injection  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks |DepartmentVulnerability |

10

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks  

Broader source: Energy.gov [DOE]

Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

11

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

12

Nested Lattice Codes for Arbitrary Continuous Sources and Channels  

E-Print Network [OSTI]

Nested Lattice Codes for Arbitrary Continuous Sources and Channels Aria G. Sahebi and S. Sandeep 48109, USA. Email: ariaghs@umich.edu, pradhanv@umich.edu Abstract--In this paper, we show that nested information at the transmitter. We also show that nested lattice codes are optimal for source coding

Pradhan, Sandeep

13

Quantum Coding Theorems for Arbitrary Sources, Channels and Entanglement Resources  

E-Print Network [OSTI]

The information spectrum approach gives general formulae for optimal rates of various information theoretic protocols, under minimal assumptions on the nature of the sources, channels and entanglement resources involved. This paper culminates in the derivation of the dense coding capacity for a noiseless quantum channel, assisted by arbitrary shared entanglement, using this approach. We also review the currently known coding theorems, and their converses, for protocols such as data compression for arbitrary quantum sources and transmission of classical information through arbitrary quantum channels. In addition, we derive the optimal rate of data compression for a mixed source

Garry Bowen; Nilanjana Datta

2006-09-30T23:59:59.000Z

14

V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...  

Broader source: Energy.gov (indexed) [DOE]

2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 -...

15

ETFOD: a point model physics code with arbitrary input  

SciTech Connect (OSTI)

ETFOD is a zero-dimensional code which solves a set of physics equations by minimization. The technique used is different than normally used, in that the input is arbitrary. The user is supplied with a set of variables from which he specifies which variables are input (unchanging). The remaining variables become the output. Presently the code is being used for ETF reactor design studies. The code was written in a manner to allow easy modificaton of equations, variables, and physics calculations. The solution technique is presented along with hints for using the code.

Rothe, K.E.; Attenberger, S.E.

1980-06-01T23:59:59.000Z

16

V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

17

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Office of Environmental Management (EM)

165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May...

18

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs...

19

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and...  

Broader source: Energy.gov (indexed) [DOE]

4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain...

20

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

22

T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

23

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

24

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

25

U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

26

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can cause the target application to execute arbitrary code on the target user's system.

27

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

28

U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabil...  

Office of Environmental Management (EM)

have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. PLATFORM:...

29

EXPLORING EFFICIENT CODING SCHEMES FOR STORING ARBITRARY TREE DATA STRUCTURES IN FLASH MEMORIES  

E-Print Network [OSTI]

fulfillment of the requirements for the designation as UNDERGRADUATE RESEARCH SCHOLAR A Senior Scholars Thesis by JUSTIN ALLEN FALCK EXPLORING EFFICIENT CODING SCHEMES FOR STORING ARBITRARY TREE DATA STRUCTURES IN FLASH MEMORIES Approved by... for the designation as UNDERGRADUATE RESEARCH SCHOLAR A Senior Scholars Thesis by JUSTIN ALLEN FALCK iii ABSTRACT Exploring Efficient Coding Schemes for Storing Arbitrary Tree Data Structures in Flash Memories. (April 2009) Justin Allen Falck...

Falck, Justin

2009-06-09T23:59:59.000Z

30

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

31

U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

32

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

33

T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code  

Broader source: Energy.gov [DOE]

Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

34

U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

35

Reduced Space-Time and Time Costs Using Dislocation Codes and Arbitrary Ancillas  

E-Print Network [OSTI]

We propose two distinct methods of improving quantum computing protocols based on surface codes. First, we analyze the use of dislocations instead of holes to produce logical qubits, potentially reducing spacetime volume required. Dislocations induce defects which, in many respects, behave like Majorana quasi-particles. We construct circuits to implement these codes and present fault-tolerant measurement methods for these and other defects which may reduce spatial overhead. One advantage of these codes is that Hadamard gates take exactly $0$ time to implement. We numerically study the performance of these codes using a minimum weight and a greedy decoder using finite-size scaling. Second, we consider state injection of arbitrary ancillas to produce arbitrary rotations. This avoids the logarithmic (in precision) overhead in online cost required if $T$ gates are used to synthesize arbitrary rotations. While this has been considered before, we consider also the parallel performance of this protocol. Arbitrary ancilla injection leads to a probabilistic protocol in which there is a constant chance of success on each round; we use an amortized analysis to show that even in a parallel setting this leads to only a constant factor slowdown as opposed to the logarithmic slowdown that might be expected naively.

M. B. Hastings; A. Geller

2014-08-14T23:59:59.000Z

36

Detecting arbitrary quantum errors via stabilizer measurements on a sublattice of the surface code  

E-Print Network [OSTI]

To build a fault-tolerant quantum computer, it is necessary to implement a quantum error correcting code. Such codes rely on the ability to extract information about the quantum error syndrome while not destroying the quantum information encoded in the system. Stabilizer codes are attractive solutions to this problem, as they are analogous to classical linear codes, have simple and easily computed encoding networks, and allow efficient syndrome extraction. In these codes, syndrome extraction is performed via multi-qubit stabilizer measurements, which are bit and phase parity checks up to local operations. Previously, stabilizer codes have been realized in nuclei, trapped-ions, and superconducting qubits. However these implementations lack the ability to perform fault-tolerant syndrome extraction which continues to be a challenge for all physical quantum computing systems. Here we experimentally demonstrate a key step towards this problem by using a two-by-two lattice of superconducting qubits to perform syndrome extraction and arbitrary error detection via simultaneous quantum non-demolition stabilizer measurements. This lattice represents a primitive tile for the surface code, which is a promising stabilizer code for scalable quantum computing. Furthermore, we successfully show the preservation of an entangled state in the presence of an arbitrary applied error through high-fidelity syndrome measurement. Our results bolster the promise of employing lattices of superconducting qubits for larger-scale fault-tolerant quantum computing.

A. D. Córcoles; Easwar Magesan; Srikanth J. Srinivasan; Andrew W. Cross; M. Steffen; Jay M. Gambetta; Jerry M. Chow

2014-10-23T23:59:59.000Z

37

BETHE-Hydro: An Arbitrary Lagrangian-Eulerian Multi-dimensional Hydrodynamics Code for Astrophysical Simulations  

E-Print Network [OSTI]

In this paper, we describe a new hydrodynamics code for 1D and 2D astrophysical simulations, BETHE-hydro, that uses time-dependent, arbitrary, unstructured grids. The core of the hydrodynamics algorithm is an arbitrary Lagrangian-Eulerian (ALE) approach, in which the gradient and divergence operators are made compatible using the support-operator method. We present 1D and 2D gravity solvers that are finite differenced using the support-operator technique, and the resulting system of linear equations are solved using the tridiagonal method for 1D simulations and an iterative multigrid-preconditioned conjugate-gradient method for 2D simulations. Rotational terms are included for 2D calculations using cylindrical coordinates. We document an incompatibility between a subcell pressure algorithm to suppress hourglass motions and the subcell remapping algorithm and present a modified subcell pressure scheme that avoids this problem. Strengths of this code include a straightforward structure, enabling simple inclusion of additional physics packages, the ability to use a general equation of state, and most importantly, the ability to solve self-gravitating hydrodynamic flows on time-dependent, arbitrary grids. In what follows, we describe in detail the numerical techniques employed and, with a large suite of tests, demonstrate that BETHE-hydro finds accurate solutions with 2$^{nd}$-order convergence.

Jeremiah W. Murphy; Adam Burrows

2008-07-09T23:59:59.000Z

38

2-D Stellar Evolution Code Including Arbitrary Magnetic Fields. I. Mathematical Techniques and Test Cases  

E-Print Network [OSTI]

A high-precision two-dimensional stellar evolution code has been developed for studying solar variability due to structural changes produced by varying internal magnetic fields of arbitrary configurations. Specifically, we are interested in modeling the effects of a dynamo-type field on the detailed internal structure and on the global parameters of the Sun. The high precision is required both to model very small solar changes (of order of $10^{-4}$) and short time scales (or order of one year). It is accomplished by using the mass coordinate to replace the radial coordinate, by using fixed and adjustable time steps, a realistic stellar atmosphere, elements diffusion, and by adjusting the grid points. We have also built into the code the potential to subsequently include rotation and turbulence. The current code has been tested for several cases, including its ability to reproduce the 1-D results.

L. H. Li; P. Ventura; S. Basu; S. Sofia; P. Demarque

2006-01-27T23:59:59.000Z

39

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code| Department

40

T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

42

U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

43

Energy Citations Database (ECD) - Widget Code  

Office of Scientific and Technical Information (OSTI)

Widget Inclusion Code <script type"textjavascript" src"http:cdn.widgetserver.comsyndicationsubscriberInsertWidget.js"><script> type"textjavascript">if (WIDGETBOX)...

44

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURL Address Bar, Conduct

45

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURL Address| DepartmentObtain

46

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURLDepartment ofDepartment of|

48

T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

49

U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks  

Broader source: Energy.gov [DOE]

Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

50

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 3, MARCH 2004 417 On the Application of LDPC Codes to Arbitrary  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 3, MARCH 2004 417 On the Application of LDPC, Senior Member, IEEE Abstract--We discuss three structures of modified low-density parity-check (LDPC Gaussian noise (AWGN) channel confirming the effectiveness of the codes. Index Terms-- -ary low-density

Bennatan, Amir

51

TWO-DIMENSIONAL STELLAR EVOLUTION CODE INCLUDING ARBITRARY MAGNETIC FIELDS. II. PRECISION IMPROVEMENT AND INCLUSION OF TURBULENCE AND ROTATION  

SciTech Connect (OSTI)

In the second paper of this series we pursue two objectives. First, in order to make the code more sensitive to small effects, we remove many approximations made in Paper I. Second, we include turbulence and rotation in the two-dimensional framework. The stellar equilibrium is described by means of a set of five differential equations, with the introduction of a new dependent variable, namely the perturbation to the radial gravity, that is found when the nonradial effects are considered in the solution of the Poisson equation. Following the scheme of the first paper, we write the equations in such a way that the two-dimensional effects can be easily disentangled. The key concept introduced in this series is the equipotential surface. We use the underlying cause-effect relation to develop a recurrence relation to calculate the equipotential surface functions for uniform rotation, differential rotation, rotation-like toroidal magnetic fields, and turbulence. We also develop a more precise code to numerically solve the two-dimensional stellar structure and evolution equations based on the equipotential surface calculations. We have shown that with this formulation we can achieve the precision required by observations by appropriately selecting the convergence criterion. Several examples are presented to show that the method works well. Since we are interested in modeling the effects of a dynamo-type field on the detailed envelope structure and global properties of the Sun, the code has been optimized for short timescales phenomena (down to 1 yr). The time dependence of the code has so far been tested exclusively to address such problems.

Li Linghuai; Sofia, Sabatino; Basu, Sarbani; Demarque, Pierre [Department of Astronomy, Yale University, P.O. Box 208101, New Haven, CT 06520-8101 (United States); Ventura, Paolo [INAF, Osservatorio Astronomico di Roma, 00040 Monteporzio Catone (Italy); Penza, Valentina [Universita Di Roma 'Tor Vergata', Via Della Ricerca Scientifica 1, 00133 Roma (Italy); Bi Shaolan [Department of Astronomy, Beijing Normal University, Beijing 100875 (China)], E-mail: li@astro.yale.edu

2009-06-15T23:59:59.000Z

52

Two-Dimensional Stellar Evolution Code Including Arbitrary Magnetic Fields. II. Precision Improvement and Inclusion of Turbulence and Rotation  

E-Print Network [OSTI]

In the second paper of this series we pursue two objectives. First, in order to make the code more sensitive to small effects, we remove many approximations made in Paper I. Second, we include turbulence and rotation in the two-dimensional framework. The stellar equilibrium is described by means of a set of five differential equations, with the introduction of a new dependent variable, namely the perturbation to the radial gravity, that is found when the non-radial effects are considered in the solution of the Poisson equation; following the scheme of the first paper, we write the equations in such a way that the two-dimensional effects can be easily disentangled. The key concept introduced in this series is the equipotential surface. We use the underlying cause-effect relation to develop a recurrence relation to calculate the equipotential surface functions for uniform rotation, differential rotation, rotation-like toroidal magnetic fields and turbulence. We also develop a more precise code to numerically solve the two-dimensional stellar structure and evolution equations based on the equipotential surface calculations. We have shown that with this formulation we can achieve the precision required by observations by appropriately selecting the convergence criterion. Several examples are presented to show that the method works well. Since we are interested in modeling the effects of a dynamo-type field on the detailed envelope structure and global properties of the Sun, the code has been optimized for short timescales phenomena (down to 1 yr). The time dependence of the code has so far been tested exclusively to address such problems.

Linghuai Li; Sabatino Sofia; Paolo Ventura; Valentina Penza; Shaolan Bi; Sarbani Basu; Pierre Demarque

2008-10-27T23:59:59.000Z

53

Transparent runtime parallelization of the R scripting language  

SciTech Connect (OSTI)

Scripting languages such as R and Matlab are widely used in scientific data processing. As the data volume and the complexity of analysis tasks both grow, sequential data processing using these tools often becomes the bottleneck in scientific workflows. We describe pR, a runtime framework for automatic and transparent parallelization of the popular R language used in statistical computing. Recognizing scripting languages interpreted nature and data analysis codes use pattern, we propose several novel techniques: (1) applying parallelizing compiler technology to runtime, whole-program dependence analysis of scripting languages, (2) incremental code analysis assisted with evaluation results, and (3) runtime parallelization of file accesses. Our framework does not require any modification to either the source code or the underlying R implementation. Experimental results demonstrate that pR can exploit both task and data parallelism transparently and overall has better performance as well as scalability compared to an existing parallel R package that requires code modification.

Yoginath, Srikanth B [ORNL

2011-01-01T23:59:59.000Z

54

V-216: Drupal Monster Menus Module Security Bypass and Script...  

Office of Environmental Management (EM)

Module Security Bypass and Denial of Service Vulnerability U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities...

55

V-043: Perl Locale::Maketext Module '_compile()' Multiple Code...  

Broader source: Energy.gov (indexed) [DOE]

Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

56

Example Edison Batch Scripts  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvan FelixExperimentsExample Batch Scripts

57

Revising the worksheet with L3: a language and environment foruser-script interaction  

SciTech Connect (OSTI)

This paper describes a novel approach to the parameter anddata handling issues commonly found in experimental scientific computingand scripting in general. The approach is based on the familiarcombination of scripting language and user interface, but using alanguage expressly designed for user interaction and convenience. The L3language combines programming facilities of procedural and functionallanguages with the persistence and need-based evaluation of data flowlanguages. It is implemented in Python, has access to all Pythonlibraries, and retains almost complete source code compatibility to allowsimple movement of code between the languages. The worksheet interfaceuses metadata produced by L3 to provide selection of values through thescriptit self and allow users to dynamically evolve scripts withoutre-running the prior versions. Scripts can be edited via text editors ormanipulated as structures on a drawing canvas. Computed values are validscripts and can be used further in other scripts via simplecopy-and-paste operations. The implementation is freely available underan open-source license.

Hohn, Michael H.

2008-01-22T23:59:59.000Z

58

Using JavaScript to simulate formative assessment questioning in web-based open learning materials   

E-Print Network [OSTI]

This paper provides the JavaScript code for asking questions in web-based learning materials. The paper situates the setting of formative assessment exercises and questioning in the tradition of open learning materials design. Re-usable examples...

Bowerman, Chris; Mansfield, Charlie; Sewell, Keith

1997-12-19T23:59:59.000Z

59

List decoding of subspace codes and rank-metric codes  

E-Print Network [OSTI]

2.2.2 Koetter-Kschischang Codes . . . . . . . . . . . .of Subspace Codes . . . . . . . . . . . . . . 2.3.1 OverviewList-decodable Codes of Arbitrary Dimension . . . . . . .

Mahdavifar, Hessam

2012-01-01T23:59:59.000Z

60

HyRAM Testing Script.  

SciTech Connect (OSTI)

The testing script is to provide a method of inspections to HyRAM (v1.0.0.244 Alpha) application features. This document will lead participants through the use of the application to make sure the application performs as designed. If a feature of the application becomes non-working, this script will relay useful information back to the designers of the application so that the feature can be fixed. This is essential to keep the application updated and performing as designed so that the users of this program can be satisfied. There will be frequent updates of this document to ensure proper testing of future application versions.

Parkins, Owen

2014-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Scripted Building Energy Modeling and Analysis: Preprint  

SciTech Connect (OSTI)

Building energy modeling and analysis is currently a time-intensive, error-prone, and nonreproducible process. This paper describes the scripting platform of the OpenStudio tool suite (http://openstudio.nrel.gov) and demonstrates its use in several contexts. Two classes of scripts are described and demonstrated: measures and free-form scripts. Measures are small, single-purpose scripts that conform to a predefined interface. Because measures are fairly simple, they can be written or modified by inexperienced programmers.

Hale, E.; Macumber, D.; Benne, K.; Goldwasser, D.

2012-08-01T23:59:59.000Z

62

CSc-165 Spring 2014 Week 6(c) Scripting (3-script functions)  

E-Print Network [OSTI]

" + scriptFile + e4); } } // an Action which invokes a script function private class UpdateCharacterAction.util.*; import net.java.games.input.Event; import sage.input.*; import sage.input.action.*; import sageScript functions to apply // changes to GameWorld nodes. It attaches a JavaScript function // to a keyboard action

Gordon, Scott

63

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service...

64

UDP: an integral management system of embedded scripts implemented into the IMaX instrument of the Sunrise mission  

E-Print Network [OSTI]

The UDP (User Defined Program) system is a scripting framework for controlling and extending instrumentation software. It has been specially designed for air- and space-borne instruments with flexibility, error control, reuse, automation, traceability and ease of development as its main objectives. All the system applications are connected through a database containing the valid script commands including descriptive information and source code. The system can be adapted to different projects without changes in the framework tools, thus achieving great level of flexibility and reusability. The UDP system comprises: an embedded system for the execution of scripts by the instrument software; automatic tools for aiding in the creation, modification, documentation and tracing of new scripting language commands; and interfaces for the creation of scripts and execution control.

Munoz, R Morales; de la Rosa, J Marco

2008-01-01T23:59:59.000Z

65

FOUNDATIONS OF WEB SCRIPT SECURITY Aaron Bohannon  

E-Print Network [OSTI]

FOUNDATIONS OF WEB SCRIPT SECURITY Aaron Bohannon A DISSERTATION in Computer and Information Science #12;FOUNDATIONS OF WEB SCRIPT SECURITY COPYRIGHT 2012 Aaron Bohannon #12;Acknowledgements applying reactive noninterference to web browsers. Before I started the final phase of my thesis research

Plotkin, Joshua B.

66

SCRIPTING BEHAVIOUR TOWARDS A NEW LANGUAGE FOR MAKING NPCS ACT INTELLIGENTLY  

E-Print Network [OSTI]

-scenes, directing camera movements or triggering events inside the game world. The use of scripting is also the most part of the ­ previously hard-coded ­ internal game logic from the game engine and transforms however has usually been limited to the game developers, and only in recent years the power to modify

Davies, Christopher

67

ScriptGard: Automatic Context-Sensitive Sanitization for Large-Scale Legacy Web Applications  

E-Print Network [OSTI]

ScriptGard: Automatic Context-Sensitive Sanitization for Large-Scale Legacy Web Applications@microsoft.com ABSTRACT We empirically analyzed sanitizer use in a shipping web ap- plication with over 400,000 lines of code and over 23,244 methods, the largest empirical analysis of sanitizer use of which we are aware

Livshits, Ben

68

Introduction to SCRIPT-ed Special Edition on Privacy and Technology   

E-Print Network [OSTI]

Introduction to a special edition of SCRIPT-ed online journal focussing on the regulation of privacy, in light of new and changing technologies. The edition discusses privacy as a human right, or as a commodity, and presents articles from invited...

Edwards, Lilian

2006-01-01T23:59:59.000Z

69

T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code  

Broader source: Energy.gov [DOE]

Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers.

70

Parallel Web Scripting with Reactive Constraints Thibaud Hottelier  

E-Print Network [OSTI]

Parallel Web Scripting with Reactive Constraints Thibaud Hottelier James Ide Doug Kimelman Ras Bodik Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report to lists, requires prior specific permission. #12;Parallel Web Scripting with Reactive Constraints Thibaud

Bodik, Rastisla

71

Programmazione (scripting) server-side con PHP  

E-Print Network [OSTI]

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.c Goy - a.a. 2010 contenuto nel cookie) Goy - a.a. 2010/2011 Programmazione Web 3 PHP: cookie - I E' possibile scrivere e leggere cookie utilizzando PHP Per scrivere un cookie, utilizzo la funzione predefinita setcookie

Goy, Anna

72

Programmazione (scripting) server-side con PHP  

E-Print Network [OSTI]

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.d Goy - a.a. 2009 di interazione home.html ll h identif.php cancella.php cancellato.php logout.phpacquisti.php Goy - a.a. 2009/2010 Programmazione Web 5 sess_scad.html home.html - login/registrazione utente identif.php

Goy, Anna

73

Programmazione (scripting) server-side con PHP  

E-Print Network [OSTI]

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.d Goy - a.a. 2010 di interazione home.html ll h identif.php cancella.php cancellato.php logout.phpacquisti.php Goy - a.a. 2010/2011 Programmazione Web 5 sess_scad.html home.html - login/registrazione utente identif.php

Goy, Anna

74

Programmazione (scripting) server-side con PHP  

E-Print Network [OSTI]

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.c Goy - a.a. 2011 server contenuto nel cookie) Goy - a.a. 2011/2012 Programmazione Web 3 PHP: cookie - I E' possibile scrivere e leggere cookie utilizzando PHP Per scrivere un cookie, utilizzo la funzione predefinita

Goy, Anna

75

Programmazione (scripting) server-side con PHP  

E-Print Network [OSTI]

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.c Goy - a.a. 2012 server contenuto nel cookie) Goy - a.a. 2012/2013 Programmazione Web 3 PHP: cookie - I E' possibile scrivere e leggere cookie utilizzando PHP Per scrivere un cookie, utilizzo la funzione predefinita

Goy, Anna

76

Programmazione (scripting) server-side con PHP  

E-Print Network [OSTI]

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.c Goy - a.a. 2009) Goy - a.a. 2009/2010 Programmazione Web 3 PHP: cookie - I E' possibile scrivere e leggere cookie utilizzando PHP Per scrivere un cookie, utilizzo la funzione predefinita setcookie(...): nome del cookie

Goy, Anna

77

Programmazione (scripting) server-side con PHP  

E-Print Network [OSTI]

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.d Goy - a.a. 2012 di interazione home.html ll h identif.php cancella.php cancellato.php logout.phpacquisti.php Goy - a.a. 2012/2013 Programmazione Web 5 sess_scad.html home.html - login/registrazione utente identif.php

Goy, Anna

78

Programmazione (scripting) server-side con PHP  

E-Print Network [OSTI]

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.d Goy - a.a. 2011 di interazione home.html ll h identif.php cancella.php cancellato.php logout.phpacquisti.php Goy - a.a. 2011/2012 Programmazione Web 5 sess_scad.html home.html - login/registrazione utente identif.php

Goy, Anna

79

Scripted Building Energy Modeling and Analysis (Presentation)  

SciTech Connect (OSTI)

Building energy analysis is often time-intensive, error-prone, and non-reproducible. Entire energy analyses can be scripted end-to-end using the OpenStudio Ruby API. Common tasks within an analysis can be automated using OpenStudio Measures. Graphical user interfaces (GUI's) and component libraries reduce time, decrease errors, and improve repeatability in energy modeling.

Macumber, D.

2012-10-01T23:59:59.000Z

80

Arbitrary Function Generator LSN-  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout theOFFICEAmesApplication2 (CRAC 2 period)Office2Arbitrary Function

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Script identification from images using cluster-based templates  

DOE Patents [OSTI]

A computer-implemented method identifies a script used to create a document. A set of training documents for each script to be identified is scanned into the computer to store a series of exemplary images representing each script. Pixels forming the exemplary images are electronically processed to define a set of textual symbols corresponding to the exemplary images. Each textual symbol is assigned to a cluster of textual symbols that most closely represents the textual symbol. The cluster of textual symbols is processed to form a representative electronic template for each cluster. A document having a script to be identified is scanned into the computer to form one or more document images representing the script to be identified. Pixels forming the document images are electronically processed to define a set of document textual symbols corresponding to the document images. The set of document textual symbols is compared to the electronic templates to identify the script.

Hochberg, Judith G. (Los Alamos, NM); Kelly, Patrick M. (Los Alamos, NM); Thomas, Timothy R. (Santa Fe, NM)

1998-01-01T23:59:59.000Z

82

Script identification from images using cluster-based templates  

DOE Patents [OSTI]

A computer-implemented method identifies a script used to create a document. A set of training documents for each script to be identified is scanned into the computer to store a series of exemplary images representing each script. Pixels forming the exemplary images are electronically processed to define a set of textual symbols corresponding to the exemplary images. Each textual symbol is assigned to a cluster of textual symbols that most closely represents the textual symbol. The cluster of textual symbols is processed to form a representative electronic template for each cluster. A document having a script to be identified is scanned into the computer to form one or more document images representing the script to be identified. Pixels forming the document images are electronically processed to define a set of document textual symbols corresponding to the document images. The set of document textual symbols is compared to the electronic templates to identify the script. 17 figs.

Hochberg, J.G.; Kelly, P.M.; Thomas, T.R.

1998-12-01T23:59:59.000Z

83

User scripting on Android using BladeDroid Ravi Bhoraskar *  

E-Print Network [OSTI]

control over the app at all interesting points. 3 Status and Next Steps We have implemented BladeUser scripting on Android using BladeDroid Ravi Bhoraskar * , Dominic Langenegger* , Pingyang He to mobile applications. Using our tool, BladeDroid, users can write scripts that enable them to customize

Ernst, Michael

84

Script generation and multitasking in HIV-1 infection : implications for everyday functioning  

E-Print Network [OSTI]

Gagnon S. (2004). Script generation following frontal andGroup. (2005). Action (verb) generation in HIV-1 infection.Note. SG = Script Generation test; MT = Multitasking test. *

Scott, James Cobb

2009-01-01T23:59:59.000Z

85

U-069: Telnet code execution vulnerability: FreeBSD and Kerberos  

Broader source: Energy.gov [DOE]

Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

86

U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks  

Broader source: Energy.gov [DOE]

Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

87

MHD Generation Code  

E-Print Network [OSTI]

A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

Frutos-Alfaro, Francisco

2015-01-01T23:59:59.000Z

88

Perturbative Gadgets at Arbitrary Orders  

E-Print Network [OSTI]

Adiabatic quantum algorithms are often most easily formulated using many-body interactions. However, experimentally available interactions are generally two-body. In 2004, Kempe, Kitaev, and Regev introduced perturbative gadgets, by which arbitrary three-body effective interactions can be obtained using Hamiltonians consisting only of two-body interactions. These three-body effective interactions arise from the third order in perturbation theory. Since their introduction, perturbative gadgets have become a standard tool in the theory of quantum computation. Here we construct generalized gadgets so that one can directly obtain arbitrary k-body effective interactions from two-body Hamiltonians. These effective interactions arise from the kth order in perturbation theory.

Stephen P. Jordan; Edward Farhi

2012-01-31T23:59:59.000Z

89

Quantum stabilizer codes and beyond  

E-Print Network [OSTI]

The importance of quantum error correction in paving the way to build a practical quantum computer is no longer in doubt. This dissertation makes a threefold contribution to the mathematical theory of quantum error-correcting codes. Firstly, it extends the framework of an important class of quantum codes -- nonbinary stabilizer codes. It clarifies the connections of stabilizer codes to classical codes over quadratic extension fields, provides many new constructions of quantum codes, and develops further the theory of optimal quantum codes and punctured quantum codes. Secondly, it contributes to the theory of operator quantum error correcting codes also called as subsystem codes. These codes are expected to have efficient error recovery schemes than stabilizer codes. This dissertation develops a framework for study and analysis of subsystem codes using character theoretic methods. In particular, this work establishes a close link between subsystem codes and classical codes showing that the subsystem codes can be constructed from arbitrary classical codes. Thirdly, it seeks to exploit the knowledge of noise to design efficient quantum codes and considers more realistic channels than the commonly studied depolarizing channel. It gives systematic constructions of asymmetric quantum stabilizer codes that exploit the asymmetry of errors in certain quantum channels.

Pradeep Kiran Sarvepalli

2008-10-14T23:59:59.000Z

90

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...  

Energy Savers [EERE]

129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and...

91

U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site...

92

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...  

Broader source: Energy.gov (indexed) [DOE]

8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis...

93

V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...  

Broader source: Energy.gov (indexed) [DOE]

4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis...

94

U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerabilit...  

Broader source: Energy.gov (indexed) [DOE]

U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability October 26, 2011 - 9:00am Addthis...

95

MacWilliams identities for codes on graphs  

E-Print Network [OSTI]

The MacWilliams identity for linear time-invariant convolutional codes that has recently been found by Gluesing-Luerssen and Schneider is proved concisely, and generalized to arbitrary group codes on graphs. A similar ...

Forney, G. David, Jr.

96

T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

97

Automated Data Mining from Web Servers Using Perl Script  

E-Print Network [OSTI]

Automated Data Mining from Web Servers Using Perl Script Sandeep Neeli , Kannan Govindasamy IL, USA olekmali@bradley.edu Abstract-Data mining from the Web is the process of extracting essential data from any web server. In this paper, we present a method called Ethernet Robot to extract

Wilamowski, Bogdan Maciej

98

Scripting Coordination Styles1 Franz Achermann, Stefan Kneubuehl, Oscar Nierstrasz  

E-Print Network [OSTI]

: software architecture, scripting and object-orientation. First, it is now well-established that different architectural styles exhibit different prop- 1. Proceedings Coordination '2000, António Porto and Gruia-Catalin Roman (Eds.), LNCS, vol. 1906, Springer-Verlag, Limassol, Cyprus, September 2000, pp. 19-35. 2. Authors

Nierstrasz, Oscar

99

ScriptEase II: Platform Independent Story Creation Using High-Level Patterns  

E-Print Network [OSTI]

this bottleneck and ease story cre- ation. ScriptEase II (referred to as SEII) is a game engine inde- pendent toolScriptEase II: Platform Independent Story Creation Using High-Level Patterns Kevin Schenk1 , Adel authors seek new ways to simplify the process of controlling story content using scripts. This paper de

Szafron, Duane

100

U-071:HP Database Archiving Software Bugs Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

SAE2.py : a python script to automate parameter studies using SCREAMER with application to magnetic switching on Z.  

SciTech Connect (OSTI)

The SCREAMER simulation code is widely used at Sandia National Laboratories for designing and simulating pulsed power accelerator experiments on super power accelerators. A preliminary parameter study of Z with a magnetic switching retrofit illustrates the utility of the automating script for optimizing pulsed power designs. SCREAMER is a circuit based code commonly used in pulsed-power design and requires numerous iterations to find optimal configurations. System optimization using simulations like SCREAMER is by nature inefficient and incomplete when done manually. This is especially the case when the system has many interactive elements whose emergent effects may be unforeseeable and complicated. For increased completeness, efficiency and robustness, investigators should probe a suitably confined parameter space using deterministic, genetic, cultural, ant-colony algorithms or other computational intelligence methods. I have developed SAE2 - a user-friendly, deterministic script that automates the search for optima of pulsed-power designs with SCREAMER. This manual demonstrates how to make input decks for SAE2 and optimize any pulsed-power design that can be modeled using SCREAMER. Application of SAE2 to magnetic switching on model of a potential Z refurbishment illustrates the power of SAE2. With respect to the manual optimization, the automated optimization resulted in 5% greater peak current (10% greater energy) and a 25% increase in safety factor for the most highly stressed element.

Orndorff-Plunkett, Franklin

2011-05-01T23:59:59.000Z

102

U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload...  

Office of Environmental Management (EM)

The vulnerability is caused due to the sitesallmodulesdragdropgalleryupload.php script improperly validating uploaded files, which can be exploited to execute...

103

HERCULES: A Pattern Driven Code Transformation System  

SciTech Connect (OSTI)

New parallel computers are emerging, but developing efficient scientific code for them remains difficult. A scientist must manage not only the science-domain complexity but also the performance-optimization complexity. HERCULES is a code transformation system designed to help the scientist to separate the two concerns, which improves code maintenance, and facilitates performance optimization. The system combines three technologies, code patterns, transformation scripts and compiler plugins, to provide the scientist with an environment to quickly implement code transformations that suit his needs. Unlike existing code optimization tools, HERCULES is unique in its focus on user-level accessibility. In this paper we discuss the design, implementation and an initial evaluation of HERCULES.

Kartsaklis, Christos [ORNL; Hernandez, Oscar R [ORNL; Hsu, Chung-Hsing [ORNL; Ilsche, Thomas [Technische Universitat Dresden; Joubert, Wayne [ORNL; Graham, Richard L [ORNL

2012-01-01T23:59:59.000Z

104

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks |Department of EnergyCode |

105

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting Attacks |Service |Code |

106

Code Description Code Description  

E-Print Network [OSTI]

Leave* 5127 Officials 5217 Faculty Sick Leave Payment 5124 Personal Service Contracts 5211 Research Services Contracts Scholarships & Fellowships Faculty Fringe Contract Services #12;Banner Account Code

107

Dynamic Code Overlay of SDF-Modeled Programs on Low-end Embedded Systems  

E-Print Network [OSTI]

Dynamic Code Overlay of SDF-Modeled Programs on Low-end Embedded Systems Hae-woo Park Kyoungjoo Oh of synchronous data-flow (SDF) ­modeled program for low-end embedded systems which lack MMU- support-program code, dynamic loader and linker script files from the given SDF- modeled blocks and schematic, so we

Ha, Soonhoi

108

T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks  

Broader source: Energy.gov [DOE]

A potential security vulnerability has been identified in HP Diagnostics. The vulnerability could be exploited remotely resulting in cross site scripting (XSS).

109

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...  

Broader source: Energy.gov (indexed) [DOE]

Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS:...

110

Indus script corpora, archaeo-metallurgy and Meluhha (Mleccha)  

E-Print Network [OSTI]

Jules Bloch's work on formation of the Marathi language has to be expanded further to provide for a study of evolution and formation of Indian languages in the Indian language union (sprachbund). The paper analyses the stages in the evolution of early writing systems which began with the evolution of counting in the ancient Near East. A stage anterior to the stage of syllabic representation of sounds of a language, is identified. Unique geometric shapes required for tokens to categorize objects became too large to handle to abstract hundreds of categories of goods and metallurgical processes during the production of bronze-age goods. About 3500 BCE, Indus script as a writing system was developed to use hieroglyphs to represent the 'spoken words' identifying each of the goods and processes. A rebus method of representing similar sounding words of the lingua franca of the artisans was used in Indus script. This method is recognized and consistently applied for the lingua franca of the Indian sprachbund. That th...

Kalyanaraman, Srinivasan

2012-01-01T23:59:59.000Z

111

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,...

112

POET: A Scripting Language For Applying Parameterized Source-to-source Program  

E-Print Network [OSTI]

POET: A Scripting Language For Applying Parameterized Source-to-source Program Transformations Qing Yi (qingyi@cs.utsa.edu) University of Texas at San Antonio Abstract We present POET, a scripting as well as building ad-hoc translators between these languages. We have used POET to support a large

Yi, Qing

113

POET: A Scripting Language For Applying Parameterized Source-to-source Program  

E-Print Network [OSTI]

POET: A Scripting Language For Applying Parameterized Source-to-source Program Transformations Qing Yi (qingyi@cs.utsa.edu) University of Texas at San Antonio Abstract We present POET, a scripting as well as building ad- hoc translators between these languages. We have used POET to support a large

Yi, Qing

114

COMPUTER-SUPPORTED COLLABORATIVE INQUIRY LEARNING IN DIFFERENTLY STRUCTURED CLASSROOM SCRIPTS: EFFECTS ON HELP-  

E-Print Network [OSTI]

: EFFECTS ON HELP- SEEKING PROCESSES AND LEARNING OUTCOMES This is a post-print of an article submitted). Computer-supported collaborative inquiry learning and classroom scripts: Effects on help-seeking processes-Supported Collaborative Inquiry Learning in Differently Structured Classroom Scripts: Effects on Help-Seeking Processes

Paris-Sud XI, Université de

115

ComicKit: Acquiring Story Scripts Using Common Sense Ryan Williams  

E-Print Network [OSTI]

. The suggestion engine uses an existing commonsense rea- soning system, ConceptNet, whose knowledge base consistsComicKit: Acquiring Story Scripts Using Common Sense Feedback Ryan Williams MIT Media Lab 20 Ames are developing a resource called Sto- ryNet, a very-large database of story scripts that can be used

116

Story Scripting for Automating Cinematics and Cut-Scenes in Video Games  

E-Print Network [OSTI]

. This paper discusses these story scripting elements in depth, along with a prototype software engine capableStory Scripting for Automating Cinematics and Cut-Scenes in Video Games W. Zhang, M. Mc for writers to directly create and integrate story content into games on their own, and they must instead rely

Katchabaw, Michael James

117

Writing World-Wide Web CGI scripts in the REXX language  

SciTech Connect (OSTI)

This talk is aimed at people who have experience with REXX and are interested in using it to write WWW CGI scripts. As part of this, the author describes several functions that are available in a library of REXX functions that simplify writing WWW CGI scripts. This library is freely available at //www.slac.standard.edu/slac/www/tool/cgi-rexx/.

Cottrell, R.L.A.

1996-03-01T23:59:59.000Z

118

GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code  

E-Print Network [OSTI]

to reject the submission of widgets that do not meet the site's security policies. To show the practicality

Livshits, Ben

119

U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian|| Department of

120

Homological Error Correction: Classical and Quantum Codes  

E-Print Network [OSTI]

We prove several theorems characterizing the existence of homological error correction codes both classically and quantumly. Not every classical code is homological, but we find a family of classical homological codes saturating the Hamming bound. In the quantum case, we show that for non-orientable surfaces it is impossible to construct homological codes based on qudits of dimension $D>2$, while for orientable surfaces with boundaries it is possible to construct them for arbitrary dimension $D$. We give a method to obtain planar homological codes based on the construction of quantum codes on compact surfaces without boundaries. We show how the original Shor's 9-qubit code can be visualized as a homological quantum code. We study the problem of constructing quantum codes with optimal encoding rate. In the particular case of toric codes we construct an optimal family and give an explicit proof of its optimality. For homological quantum codes on surfaces of arbitrary genus we also construct a family of codes asymptotically attaining the maximum possible encoding rate. We provide the tools of homology group theory for graphs embedded on surfaces in a self-contained manner.

H. Bombin; M. A. Martin-Delgado

2006-05-10T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Systematic Techniques for Finding and Preventing Script Injection Vulnerabilities  

E-Print Network [OSTI]

Architecture diagram for Kudzu. The components drawn in theapplications. . . . . . . . . . . . 4.10 Kudzu code coveragealone (dark bars) vs. complete Kudzu (light bars). For each

Saxena, Prateek

2012-01-01T23:59:59.000Z

122

Spinal codes  

E-Print Network [OSTI]

Spinal codes are a new class of rateless codes that enable wireless networks to cope with time-varying channel conditions in a natural way, without requiring any explicit bit rate selection. The key idea in the code is the ...

Perry, Jonathan, S.M. Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

123

Corrected Analytical Solution of the Generalized Woods-Saxon Potential for Arbitrary $\\ell$ States  

E-Print Network [OSTI]

The bound state solution of the radial Schr\\"{o}dinger equation with the generalized Woods-Saxon potential is carefully examined by using the Pekeris approximation for arbitrary $\\ell$ states. The energy eigenvalues and the corresponding eigenfunctions are analytically obtained for different $n$ and $\\ell$ quantum numbers. The obtained closed forms are applied to calculate the single particle energy levels of neutron orbiting around $^{56}$Fe nucleus in order to check consistency between the analytical and Gamow code results. The analytical results are in good agreement with the results obtained by Gamow code for $\\ell=0$.

Bayrak, O

2015-01-01T23:59:59.000Z

124

U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks  

Broader source: Energy.gov [DOE]

Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

125

U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks  

Broader source: Energy.gov [DOE]

Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

126

A Limit Study of JavaScript Parallelism Emily Fortuna Owen Anderson Luis Ceze Susan Eggers  

E-Print Network [OSTI]

A Limit Study of JavaScript Parallelism Emily Fortuna Owen Anderson Luis Ceze Susan Eggers Computer Science and Engineering, University of Washington {fortuna, owen, luisceze, eggers}@cs.washington.edu http

Anderson, Richard

127

How the Arts Help Children to Create Healthy Social Scripts: Exploring the Perceptions of Elementary Teachers  

E-Print Network [OSTI]

How the Arts Help Children to Create Healthy Social Scripts:drama activities in particular—help children to develop anhuman inter- actions may help children learn healthy social

Brouillette, Liane

2009-01-01T23:59:59.000Z

128

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning...  

Broader source: Energy.gov (indexed) [DOE]

WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security...

129

V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...  

Broader source: Energy.gov (indexed) [DOE]

Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue U-129: RSA...

130

Chaotic Turbo Codes  

E-Print Network [OSTI]

This paper describes a new class of codes, chaotic turbo codes. They were born from a symbiosis between a chaotical digital encoder and a turbo code. This paper investigates the most important properties of both chaotic digital encoders and turbo encoders in order to understand how the two complement each other. A Chaotic Turbo Encoder is then described and initial results will be presented. I. INTRODUCTION A chaotic digital encoder was defined for the first time in [1] as a non--linear digital filter with finite precision (8 bits) which behaves in a quasi--chaotic fashion, both with zero and nonzero input sequences. A simple chaotic encoder is shown in Figure 1 [1]. D Y k X k LCIRC D Figure 1: Chaotic Digital Encoder Mapper L L L L L L 1 The main features of chaotic digital encoders that are used in this paper are: # The system is digital which makes possible its integration with a turbo code. # The output of a chaotic digital encoder with arbitrary inputs has a broad...

S. Adrian Barbulescu; Andrew Guidi; Steven S. Pietrobon

131

Coding theorems for hybrid channels. II  

E-Print Network [OSTI]

The present work continues investigation of the capacities of measurement (quantum-classical) channels in the most general setting, initiated in~\\cite{HCT}. The proof of coding theorems is given for the classical capacity and entanglement-assisted classical capacity of the measurement channel with arbitrary output alphabet, without assuming that the channel is given by a bounded operator-valued density.

A. A. Kuznetsova; A. S. Holevo

2014-08-14T23:59:59.000Z

132

Code design based on metric-spectrum and applications  

E-Print Network [OSTI]

We introduced nested search methods to design (n, k) block codes for arbitrary channels by optimizing an appropriate metric spectrum in each iteration. For a given k, the methods start with a good high rate code, say k/(k + 1), and successively...

Papadimitriou, Panayiotis D.

2005-02-17T23:59:59.000Z

133

Efficient quantum circuits for arbitrary sparse unitaries  

SciTech Connect (OSTI)

Arbitrary exponentially large unitaries cannot be implemented efficiently by quantum circuits. However, we show that quantum circuits can efficiently implement any unitary provided it has at most polynomially many nonzero entries in any row or column, and these entries are efficiently computable. One can formulate a model of computation based on the composition of sparse unitaries which includes the quantum Turing machine model, the quantum circuit model, anyonic models, permutational quantum computation, and discrete time quantum walks as special cases. Thus, we obtain a simple unified proof that these models are all contained in BQP. Furthermore, our general method for implementing sparse unitaries simplifies several existing quantum algorithms.

Jordan, Stephen P. [Institute for Quantum Information, Caltech, Pasadena, California 91125 (United States); Wocjan, Pawel [School of Electrical Engineering and Computer Science, University of Central Florida, Orlando, Florida 32816 (United States)

2009-12-15T23:59:59.000Z

134

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

135

Introduction to Algebraic Codes  

E-Print Network [OSTI]

codes. Since the elementary coding theory is assumed to be of interest only to ... the algebraic codes, mainly BCH codes, Reed-Solomon codes and classical ...

136

Holographic codes  

E-Print Network [OSTI]

There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

Latorre, Jose I

2015-01-01T23:59:59.000Z

137

Holographic codes  

E-Print Network [OSTI]

There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

Jose I. Latorre; German Sierra

2015-02-23T23:59:59.000Z

138

Arbitrary manipulation of nonlinear optical processes  

E-Print Network [OSTI]

Nonlinear optical processes are governed by the relative-phase relationships among the relevant electromagnetic fields in these processes. In this Letter, we describe the physics of arbitrary manipulation of nonlinear optical processes (AMNOP) by artificial control of relative phases. As a typical example, we show freely designable optical-frequency conversions to extreme spectral regions, mid-infrared and vacuum-ultraviolet, with near-unity quantum efficiencies. Furthermore, we show that such optical-frequency conversions can be realized by using a surprisingly simple technology where transparent plates are placed in a nonlinear optical medium and their positions and thicknesses are adjusted precisely. In a numerical experiment assuming practically applicable parameters in detail, we demonstrate a single-frequency tunable laser that covers the whole vacuum-ultraviolet spectral range of 120 to 200 nm.

Jian Zheng; Masayuki Katsuragawa

2014-06-16T23:59:59.000Z

139

Progress on Problem about Quantum Hamming Bound for Impure Quantum Codes  

E-Print Network [OSTI]

A famous open problem in the theory of quantum error-correcting codes is whether or not the parameters of an impure quantum code can violate the quantum Hamming bound for pure quantum codes. We partially solve this problem. We demonstrate that there exists a threshold such that an arbitrary quantum code must obey the quantum Hamming bound whenever . We list some values of for small d and binary quantum codes.

Zhuo Li; Lijuan Xing

2009-07-22T23:59:59.000Z

140

A COPERNICAN TURN FOR THE DEVELOPMENT OF FLEXIBLY REUSABLE SCAFFOLDS AND COLLABORATION SCRIPTS: THE S-COL APPROACH  

E-Print Network [OSTI]

Informatik, Boltzmannstr. 3, D-85748 Garching, Germany Corresponding author: Christof Wecker Ludwig: THE S-COL APPROACH This is a post-print of an article submitted for consideration in the International-COL (Scripting for Collaborative Online Learning) and allows for the sustainable development of scripts

Boyer, Edmond

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Is It Possible To Clone Using An Arbitrary Blank State?  

E-Print Network [OSTI]

We show that in a cloning process, whether deterministic inexact or probabilistic exact, one can take an arbitrary blank state while still using a fixed cloning machine.

Anirban Roy; Aditi Sen; Ujjwal Sen

2001-11-29T23:59:59.000Z

142

arbitrary optical trapping: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

passing through Schieber, Jay D. 238 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

143

arbitrary apertures ii: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Washington at Seattle, University of 385 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

144

arbitrary quantum system: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

theory. Sergio Giardino 2013-09-10 30 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

145

arbitrary ionic strength: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Washington at Seattle, University of 327 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

146

arbitrary degree sequence: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Washington at Seattle, University of 412 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

147

arbitrary hard ellipses: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Washington at Seattle, University of 342 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

148

arbitrary control loop: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Washington at Seattle, University of 330 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

149

Mercury/Waterfilling: Optimum Power Allocation with Arbitrary Input Constellations  

E-Print Network [OSTI]

Mercury/Waterfilling: Optimum Power Allocation with Arbitrary Input Constellations Angel Lozano gives the power allocation policy, referred to as mercury/waterfilling, that maximizes the sum mutual

Verdú, Sergio

150

T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution  

Broader source: Energy.gov [DOE]

Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

151

Title An MLP using Hough transform based fuzzy feature extraction for Bengali script recognition  

E-Print Network [OSTI]

recognition as well as in other pattern recognition problems. We propose here the application of the neuro-fuzzyTitle An MLP using Hough transform based fuzzy feature extraction for Bengali script recognition on the Hough transform of character pattern pixels from which additional fuzzy sets are synthesized using t

Sural, Shamik

152

PHP Script Documentation for .include Pages in CODA Repositories To be able to make this work for you, your web server must be php-enabled. Please contact  

E-Print Network [OSTI]

PHP Script Documentation for .include Pages in CODA Repositories To be able to make this work for you, your web server must be php-enabled. Please contact your web administrator about this. This PDF of the script preceding the ".include". To be able to make this work for you, your browser must have PHP scripts

Koch, Christof

153

ASTROMETRY.NET: BLIND ASTROMETRIC CALIBRATION OF ARBITRARY ASTRONOMICAL IMAGES  

E-Print Network [OSTI]

ASTROMETRY.NET: BLIND ASTROMETRIC CALIBRATION OF ARBITRARY ASTRONOMICAL IMAGES This article has CALIBRATION OF ARBITRARY ASTRONOMICAL IMAGES Dustin Lang1,2,7 , David W. Hogg3,4 , Keir Mierle1,5 , Michael Blanton3 , and Sam Roweis1,5,6 1 Department of Computer Science, University of Toronto, 6 King's College

Masci, Frank

154

High Performance “Reach” Codes  

E-Print Network [OSTI]

Jim Edelson New Buildings Institute A Growing Role for Codes and Stretch Codes in Utility Programs Clean Air Through Energy Efficiency November 9, 2011 ESL-KT-11-11-39 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 New Buildings Institute ESL..., Nov. 7 ? 9, 2011 ?31? Flavors of Codes ? Building Codes Construction Codes Energy Codes Stretch or Reach Energy Codes Above-code programs Green or Sustainability Codes Model Codes ?Existing Building? Codes Outcome-Based Codes ESL-KT-11...

Edelson, J.

2011-01-01T23:59:59.000Z

155

Quantum Szilard engines with arbitrary spin  

E-Print Network [OSTI]

The quantum Szilard engine (QSZE) is a conceptual quantum engine for understanding the fundamental physics of quantum thermodynamics and information physics. We generalize the QSZE to an arbitrary spin case, i.e., a spin QSZE (SQSZE), and we systematically study the basic physical properties of both fermion and boson SQSZEs in a low-temperature approximation. We give the analytic formulation of the total work. For the fermion SQSZE, the work might be absorbed from the environment, and the change rate of the work with temperature exhibits periodicity and even-odd oscillation, which is a generalization of a spinless QSZE. It is interesting that the average absorbed work oscillates regularly and periodically in a large-number limit, which implies that the average absorbed work in a fermion SQSZE is neither an intensive quantity nor an extensive quantity. The phase diagrams of both fermion and boson SQSZEs give the SQSZE doing positive or negative work in the parameter space of the temperature and the particle number of the system, but they have different behaviors because the spin degrees of the fermion and the boson play different roles in their configuration states and corresponding statistical properties. The critical temperature of phase transition depends sensitively on the particle number. By using Landauer's erasure principle, we give the erasure work in a thermodynamic cycle, and we define an efficiency (we refer to it as information-work efficiency) to measure the engine's ability of utilizing information to extract work. We also give the conditions under which the maximum extracted work and highest information-work efficiencies for fermion and boson SQSZEs can be achieved.

Zekun Zhuang; Shi-Dong Liang

2015-02-02T23:59:59.000Z

156

PostScript versions of Dynkin diagrams This note describes a package of encapsulated PostScript figures of Dynkin diagrams. They were first  

E-Print Network [OSTI]

the plain Dynkin diagrams for the finite root systems: File Diagram an.eps bn.eps cn.eps dn.eps e6.eps e7.eps e8.eps f4.eps g2.eps Here are the corresponding affine diagrams: File Diagram anz.eps bnz.eps cnz.eps #12;PostScript versions of Dynkin diagrams 2 dnz.eps e6z.eps e7z.eps e8z.eps f4z.eps g2z.eps Here

Casselman, William

157

Speech coding  

SciTech Connect (OSTI)

Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the coding techniques are equally applicable to any voice signal whether or not it carries any intelligible information, as the term speech implies. Other terms that are commonly used are speech compression and voice compression since the fundamental idea behind speech coding is to reduce (compress) the transmission rate (or equivalently the bandwidth) And/or reduce storage requirements In this document the terms speech and voice shall be used interchangeably.

Ravishankar, C., Hughes Network Systems, Germantown, MD

1998-05-08T23:59:59.000Z

158

Statistical Mechanical Models and Topological Color Codes  

E-Print Network [OSTI]

We find that the overlapping of a topological quantum color code state, representing a quantum memory, with a factorized state of qubits can be written as the partition function of a 3-body classical Ising model on triangular or Union Jack lattices. This mapping allows us to test that different computational capabilities of color codes correspond to qualitatively different universality classes of their associated classical spin models. By generalizing these statistical mechanical models for arbitrary inhomogeneous and complex couplings, it is possible to study a measurement-based quantum computation with a color code state and we find that their classical simulatability remains an open problem. We complement the meaurement-based computation with the construction of a cluster state that yields the topological color code and this also gives the possibility to represent statistical models with external magnetic fields.

H. Bombin; M. A. Martin-Delgado

2007-11-03T23:59:59.000Z

159

Schwinger Mechanism for Gluon Pair Production in the Presence of Arbitrary Time Dependent Chromo-Electric Field in Arbitrary Gauge  

E-Print Network [OSTI]

We study non-perturbative gluon pair production from arbitrary time dependent chromo-electric field E^a(t) with arbitrary color index a =1,2,...8 via Schwinger mechanism in arbitrary covariant background gauge \\alpha. We show that the probability of non-perturbative gluon pair production per unit time per unit volume per unit transverse momentum \\frac{dW}{d^4xd^2p_T} is independent of gauge fixing parameter \\alpha. Hence the result obtained in the Fynman-'t Hooft gauge, \\alpha=1, is the correct gauge invariant and gauge parameter \\alpha independent result.

Gouranga C Nayak

2009-10-02T23:59:59.000Z

160

SCALING RANDOM WALKS ON ARBITRARY SETS Simon C. Harris  

E-Print Network [OSTI]

SCALING RANDOM WALKS ON ARBITRARY SETS by Simon C. Harris , Robin Sibson and David Williams School deterministic sets I. In the 1-dimensional case discussed here and in the following paper by Harris, much

Harris, Simon Colin

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Simplification of Arbitrary Polyhedral Meshes Shaun D. Ramsey  

E-Print Network [OSTI]

email: bertram@informatik.uni-kl.de Charles Hansen University of Utah Salt Lake City, UT, USA emailSimplification of Arbitrary Polyhedral Meshes Shaun D. Ramsey University of Utah Salt Lake City, UT

Hering-Bertram, Martin

162

Skin effect with arbitrary specularity in Maxwellian plasma  

E-Print Network [OSTI]

The problem of skin effect with arbitrary specularity in maxwellian plasma with specular--diffuse boundary conditions is solved. A new analytical method is developed that makes it possible to to obtain a solution up to an arbitrary degree of accuracy. The method is based on the idea of symmetric continuation not only the electric field, but also electron distribution function. The solution is obtained in a form of von Neumann series.

Anatoly V. Latyshev; Alexander A. Yushkanov

2009-12-10T23:59:59.000Z

163

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

be exploited by malicious people to compromise a user's system. March 9, 2012 U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

164

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

be exploited by malicious people to compromise a user's system. March 9, 2012 U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

165

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote...  

Broader source: Energy.gov (indexed) [DOE]

information. Solution: The vendor has issued a fix. Addthis Related Articles U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

166

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially...  

Broader source: Energy.gov (indexed) [DOE]

of service. Solution: Pidgin has issued a fix (2.10.0). Addthis Related Articles V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting...

167

V-024: Ubuntu update for libav | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

update for tomcat6 V-051: Oracle Solaris Java Multiple Vulnerabilities U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

168

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site...  

Energy Savers [EERE]

IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be...

169

T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

170

T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

171

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOSEnergy IBM

172

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartment ofDepartment of

173

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartment

174

V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08: DebianVulnerabilities |

175

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94: IBMof8:

176

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery Attacks and|

177

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multiple | Department|Conduct

178

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian||

179

V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsA document

180

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitraryprinters andCross-Site

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Nested linear codes achieve Marton's inner bound for general broadcast channels  

E-Print Network [OSTI]

Nested linear codes achieve Marton's inner bound for general broadcast channels Arun Padakandla the point-to-point capacity of an arbitrary discrete memoryless channel. In this paper, we study nested with and without channel state information at the transmitter. Furthermore, we prove nested linear codes achieve

Pradhan, Sandeep

182

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

183

Generalized concatenated quantum codes  

E-Print Network [OSTI]

We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using ...

Grassl, Markus

184

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks |Department ofDepartment

185

V-193: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere isAttacksServiceAttacks |

186

V-216: Drupal Monster Menus Module Security Bypass and Script Insertion  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilitiesVulnerabilities |

187

U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting AttacksForgery, and

188

Hypersonic Arbitrary-Body Aerodynamics (HABA) for conceptual design  

SciTech Connect (OSTI)

The Hypersonic Arbitrary-Body Aerodynamics (HABA) computer program predicts static and dynamic aerodynamic derivatives at hypersonic speeds for any vehicle geometry. It is intended to be used during conceptual design studies where fast computational speed is required. It uses the same geometry and hypersonic aerodynamic methods as the Mark IV Supersonic/Hypersonic Arbitrary-Body Program (SHABP) developed under sponsorship of the Air Force Flight Dynamics Laboratory; however, the input and output formats have been improved to make it easier to use. This program is available as part of the Department 9140 CAE software.

Salguero, D.E.

1990-03-15T23:59:59.000Z

189

Generalizing entanglement via informational invariance for arbitrary statistical theories  

E-Print Network [OSTI]

Given an arbitrary statistical theory, di?erent from quantum mechanics, how to decide which are the nonclassical correlations? We present a formal framework which allows for a definition of nonclassical correlations in such theories, alternative to the current one. This enables one to formulate extrapolations of some important quantum mechanical features via adequate extensions of reciprocal maps relating states of a system with states of its subsystems. These extended maps permit one to generalize i) separability measures to any arbitrary statistical model as well as ii) previous entanglement criteria. The standard definition of entanglement becomes just a particular case of the ensuing, more general notion.

F. Holik; C. Massri; A. Plastino

2014-06-04T23:59:59.000Z

190

Concatenated Conjugate Codes  

E-Print Network [OSTI]

A conjugate code pair is defined as a pair of linear codes either of which contains the dual of the other. A conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is known that conjugate code pairs are applicable to (quantum) cryptography. We give a construction method for efficiently decodable conjugate code pairs.

Mitsuru Hamada

2006-10-31T23:59:59.000Z

191

JLIFE: THE JEFFERSON LAB INTERACTIVE FRONT END FOR THE OPTICAL PROPAGATION CODE  

SciTech Connect (OSTI)

We present details on a graphical interface for the open source software program Optical Propagation Code, or OPC. This interface, written in Java, allows a user with no knowledge of OPC to create an optical system, with lenses, mirrors, apertures, etc. and the appropriate drifts between them. The Java code creates the appropriate Perl script that serves as the input for OPC. The mode profile is then output at each optical element. The display can be either an intensity profile along the x axis, or as an isometric 3D plot which can be tilted and rotated. These profiles can be saved. Examples of the input and output will be presented.

Watson, Anne M. [JLAB; Shinn, Michelle D. [JLAB

2013-08-01T23:59:59.000Z

192

Quantum Mechanics of Successive Measurements with Arbitrary Meter Coupling  

E-Print Network [OSTI]

We study successive measurements of two observables using von Neumann's measurement model. The two-pointer correlation for arbitrary coupling strength allows retrieving the initial system state. We recover Luders rule, the Wigner formula and the Kirkwood-Dirac distribution in the appropriate limits of the coupling strength.

Lars M. Johansen; Pier A. Mello

2009-01-21T23:59:59.000Z

193

Computationally Efficient Winding Loss Calculation with Multiple Windings, Arbitrary  

E-Print Network [OSTI]

windings occurs at the level of individual turns, the method could be applied, but its advantages are lessComputationally Efficient Winding Loss Calculation with Multiple Windings, Arbitrary Waveforms and Two- or Three-Dimensional Field Geometry C. R. Sullivan From IEEE Transactions on Power Electronics

194

A review of "Indian Ink: Script and Print in the Making of the English East India Company" by Miles Ogborn  

E-Print Network [OSTI]

, Indian Ink: Script and Print in the Making of the English East India Company. Chicago and London: The University of Chicago Press, 2007. xiii + 318 pp. + 22 illus. $40.00. Review by TILLMAN W. NECHTMAN, SKIDMORE COLLEGE. The India Office Records... Company (EIC) and the English/British empire in South Asia. Miles Ogborn?s impressive new book, Indian Ink: Script and Print in the Making of the English East India Company, approaches this same archive from an important new direction. Rather than reading...

Nechtman, Tillman W.

2008-01-01T23:59:59.000Z

195

T-623: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks  

Broader source: Energy.gov [DOE]

The software does not properly filter HTML code from user-supplied input before displaying the input.

196

Homological stabilizer codes  

SciTech Connect (OSTI)

In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

Anderson, Jonas T., E-mail: jonastyleranderson@gmail.com

2013-03-15T23:59:59.000Z

197

IFP --Oil & Gas Science and Technology --(Script : 1er specimen) --1 --Oil & Gas Science and Technology --rev. IFP, Vol. xx (2009), No X, pp. 00-00  

E-Print Network [OSTI]

IFP -- Oil & Gas Science and Technology -- (Script : 1er specimen) -- 1 -- Oil & Gas Science2010 Author manuscript, published in "Oil & Gas Science and Technology - Rev. IFP, 65, 3 (2010) 435-444" DOI : 10.2516/ogst/2010007 #12;IFP -- Oil & Gas Science and Technology -- (Script : 1er specimen) -- 2

Boyer, Edmond

198

Analytically solvable geometric network growth model with arbitrary degree distribution  

E-Print Network [OSTI]

We construct a class of network growth models capable of producing arbitrary degree distributions. The conditions necessary for generating the desired degree distribution can be derived analytically. In this model, a network is generated as a result of local interactions among agents residing on a metric space. Specifically, we study the case of random-walking agents who form bonds when they meet at designated locations we refer to as "rendezvous points." The spatial distribution of the rendezvous points determines key characteristics of the network such as the degree distribution. For any arbitrary (monotonic) degree distribution, we are able to analytically solve for the required rendezvous point distribution. Certain features of the model including high clustering coefficients suggest that it may be a suitable candidate for modeling biological and urban networks.

Dianati, Navid

2015-01-01T23:59:59.000Z

199

Arbitrary mass Majorana neutrinos in neutrinoless double beta decay  

E-Print Network [OSTI]

We revisit the mechanism of neutrinoless double beta (NLDBD) decay mediated by the exchange with the heavy Majorana neutrino N of arbitrary mass mN, slightly mixed with the electron neutrino. By assuming the dominance of this mechanism, we update the well-known NLDBD-decay exclusion plot in the mass-mixing angle plane taking into account recent progress in the calculation of nuclear matrix elements within quasiparticle random phase approximation and improved experimental bounds on the NLDBD-decay half-life of Ge-76 and Xe-136. We also consider the known formula approximating the mN dependence of the NLDBD-decay nuclear matrix element in a simple explicit form. We analyze its accuracy and specify the corresponding parameters, allowing one to easily calculate the NLDBD-decay half-life for arbitrary mN for all the experimentally interesting isotopes without resorting to real nuclear structure calculations.

Amand Faessler; Marcela Gonzalez; Sergey Kovalenko; Fedor Simkovic

2014-08-26T23:59:59.000Z

200

Generalized Concatenation for Quantum Codes  

E-Print Network [OSTI]

We show how good quantum error-correcting codes can be constructed using generalized concatenation. The inner codes are quantum codes, the outer codes can be linear or nonlinear classical codes. Many new good codes are ...

Grassl, Markus

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Dynamical density functional theory for colloidal particles with arbitrary shape  

E-Print Network [OSTI]

Starting from the many-particle Smoluchowski equation, we derive dynamical density functional theory for Brownian particles with an arbitrary shape. Both passive and active (self-propelled) particles are considered. The resulting theory constitutes a microscopic framework to explore the collective dynamical behavior of biaxial particles in nonequilibrium. For spherical and uniaxial particles, earlier derived dynamical density functional theories are recovered as special cases. Our study is motivated by recent experimental progress in preparing colloidal particles with many different biaxial shapes.

Raphael Wittkowski; Hartmut Löwen

2011-06-12T23:59:59.000Z

202

Guam- Building Energy Code  

Broader source: Energy.gov [DOE]

NOTE: In September 2012, The Guam Building Code Council adopted the draft [http://www.guamenergy.com/outreach-education/guam-tropical-energy-code/ Guam Tropical Energy Code]. It must be adopted by...

203

A compact, multichannel, and low noise arbitrary waveform generator  

SciTech Connect (OSTI)

A new type of high functionality, fast, compact, and easy programmable arbitrary waveform generator for low noise physical measurements is presented. The generator provides 7 fast differential waveform channels with a maximum bandwidth up to 200 MHz frequency. There are 6 fast pulse generators on the generator board with 78 ps time resolution in both duration and delay, 3 of them with amplitude control. The arbitrary waveform generator is additionally equipped with two auxiliary slow 16 bit analog-to-digital converters and four 16 bit digital-to-analog converters for low frequency applications. Electromagnetic shields are introduced to the power supply, digital, and analog compartments and with a proper filter design perform more than 110 dB digital noise isolation to the output signals. All the output channels of the board have 50 ? SubMiniature version A termination. The generator board is suitable for use as a part of a high sensitive physical equipment, e.g., fast read out and manipulation of nuclear magnetic resonance or superconducting quantum systems and any other application, which requires electromagnetic interference free fast pulse and arbitrary waveform generation.

Govorkov, S. [Sema Systems, 302-5553 16th ave., Delta, British Columbia V4M 2H7 (Canada)] [Sema Systems, 302-5553 16th ave., Delta, British Columbia V4M 2H7 (Canada); Ivanov, B. I. [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany) [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany); Novosibirsk State Technical University, K.Marx-Ave. 20, Novosibirsk 630092 (Russian Federation); Il'ichev, E.; Meyer, H.-G. [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany)] [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany)

2014-05-15T23:59:59.000Z

204

Codeword Stabilized Quantum Codes  

E-Print Network [OSTI]

We present a unifying approach to quantum error correcting code design that encompasses additive (stabilizer) codes, as well as all known examples of nonadditive codes with good parameters. We use this framework to generate new codes with superior parameters to any previously known. In particular, we find ((10,18,3)) and ((10,20,3)) codes. We also show how to construct encoding circuits for all codes within our framework.

Andrew Cross; Graeme Smith; John A. Smolin; Bei Zeng

2007-09-27T23:59:59.000Z

205

Generalized Concatenated Quantum Codes  

E-Print Network [OSTI]

We introduce the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of new single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length, but also asymptotically achieve the quantum Hamming bound for large block length.

Markus Grassl; Peter Shor; Graeme Smith; John Smolin; Bei Zeng

2009-01-09T23:59:59.000Z

206

Encoding Subsystem Codes  

E-Print Network [OSTI]

In this paper we investigate the encoding of operator quantum error correcting codes i.e. subsystem codes. We show that encoding of subsystem codes can be reduced to encoding of a related stabilizer code making it possible to use all the known results on encoding of stabilizer codes. Along the way we also show how Clifford codes can be encoded. We also show that gauge qubits can be exploited to reduce the encoding complexity.

Pradeep Kiran Sarvepalli; Andreas Klappenecker

2008-06-30T23:59:59.000Z

207

On optimal constacyclic codes  

E-Print Network [OSTI]

In this paper we investigate the class of constacyclic codes, which is a natural generalization of the class of cyclic and negacyclic codes. This class of codes is interesting in the sense that it contains codes with good or even optimal parameters. In this light, we propose constructions of families of classical block and convolutional maximum-distance-separable (MDS) constacyclic codes, as well as families of asymmetric quantum MDS codes derived from (classical-block) constacyclic codes. These results are mainly derived from the investigation of suitable properties on cyclotomic cosets of these corresponding codes.

Giuliano G. La Guardia

2013-11-11T23:59:59.000Z

208

V-054: IBM WebSphere Application Server for z/OS Arbitrary Command...  

Broader source: Energy.gov (indexed) [DOE]

4: IBM WebSphere Application Server for zOS Arbitrary Command Execution Vulnerability V-054: IBM WebSphere Application Server for zOS Arbitrary Command Execution Vulnerability...

209

Arbitrary Nesting of Spatial Computations Antoine Spicher, Olivier Michel, Jean-Louis Giavitto  

E-Print Network [OSTI]

Arbitrary Nesting of Spatial Computations Antoine Spicher, Olivier Michel, Jean-Louis Giavitto LACL-louis.giavitto@ircam.fr Abstract--Modern programming languages allow the definition and the use of arbitrary nested data structures but this is not generally considered in unconventional programming models. In this paper, we present arbitrary nesting

Paris-Sud XI, Université de

210

U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks  

Broader source: Energy.gov [DOE]

Flex applications created using the Flex SDK may not properly filter HTML code from user-supplied input before displaying the input.

211

Consistent interaction vertices in arbitrary topological BF theories  

SciTech Connect (OSTI)

Here we extend the previous results from [12] to the computation of all consistent self-interactions for topological BF theories with maximal field spectra in D =5,6,7,8 and present some partial results on possible generalizations on a space-time of arbitrary dimension D. For convenience, the deformation of the solution to the master equation in the context of the BRST-antifield formalism is used as a general method of constructing consistent interacting gauge field theories together with most of the standard hypotheses on quantum field theories on Minkowski space-times.

Bizdadea, C.; Cioroianu, E. M.; Saliu, S. O.; Sararu, S. C.; Stanciu-Oprean, L. [Department of Physics, University of Craiova, 13 Al. I. Cuza Street, Craiova 200585 (Romania)

2013-11-13T23:59:59.000Z

212

Quantum teleportation of an arbitrary superposition of atomic Dicke states  

E-Print Network [OSTI]

, USA 2Departments of Chemistry and Aerospace & Mechanical Engineering, Princeton University, New Jersey 08544, USA sReceived 20 December 2004; revised manuscript received 18 February 2005; published 9 June 2005d We propose a scheme for teleporting... insetd. States uccl and ubbl represent both atoms in the same state, and subcl+ ucbld /?2 is a state with one atom in state ubl and one in state ucl. The coeffi- cients C0 I , C1 I , and C2I are arbitrary and satisfy uC0I u2+ uC1I u2 + uC 2I u2...

Di, TG; Muthukrishnan, A.; Scully, Marlan O.; Zubairy, M. Suhail

2005-01-01T23:59:59.000Z

213

Towards radio astronomical imaging using an arbitrary basis  

E-Print Network [OSTI]

The new generation of radio telescopes, such as the Square Kilometer Array (SKA), requires dramatic advances in computer hardware and software, in order to process the large amounts of produced data efficiently. In this document, we explore a new approach to wide-field imaging. By generalizing the image reconstruction, which is performed by an inverse Fourier transform, to arbitrary transformations, we gain enormous new possibilities. In particular, we outline an approach that might allow to obtain a sky image of size P times Q in (optimal) O(PQ) time. This could be a step in the direction of real-time, wide-field sky imaging for future telescopes.

Petschow, Matthias

2015-01-01T23:59:59.000Z

214

Quantum lithography with classical light: Generation of arbitrary patterns  

E-Print Network [OSTI]

Quantum lithography with classical light: Generation of arbitrary patterns Qingqing Sun,1,2 Philip R. Hemmer,3 and M. Suhail Zubairy1,2 1Department of Physics and Institute of Quantum Studies, Texas A&M University, College Station, Texas 77843..., Phys. Rev. Lett. 85, 2733 #1;2000#2;. #3;7#4; S. Kawata, H.-B. Sun, T. Tanaka, and K. Takada, Nature #1;Lon- don#2; 412, 697 #1;2001#2;. #3;8#4; M. D?Angelo, M. V. Chekhova, and Y. Shih, Phys. Rev. Lett. 87, 013602 #1;2001#2;. #3;9#4; A. Pe?er, B...

Sun, Qingqing; Hemmer, Philip R.; Zubairy, M. Suhail

2007-01-01T23:59:59.000Z

215

Generalized Concatenation for Quantum Codes  

E-Print Network [OSTI]

We show how good quantum error-correcting codes can be constructed using generalized concatenation. The inner codes are quantum codes, the outer codes can be linear or nonlinear classical codes. Many new good codes are found, including both stabilizer codes as well as so-called nonadditive codes.

Markus Grassl; Peter W. Shor; Bei Zeng

2009-05-04T23:59:59.000Z

216

Graph concatenation for quantum codes  

E-Print Network [OSTI]

Graphs are closely related to quantum error-correcting codes: every stabilizer code is locally equivalent to a graph code and every codeword stabilized code can be described by a graph and a classical code. For the ...

Beigi, Salman

217

CONCATENATED CODES BASED ON MULTIDIMENSIONAL PARITY-CHECK CODES AND TURBO CODES  

E-Print Network [OSTI]

CONCATENATED CODES BASED ON MULTIDIMENSIONAL PARITY-CHECK CODES AND TURBO CODES John M. Shea, Florida Abstract--Turbo-codes provide communications near capac- ity when very large interleavers (and parity-check code can be used as an outer code with a turbo code as an inner code in a serial

Wong, Tan F.

218

VizScript: Visualizing Complex Interactions in Multi-Agent Systems Jing Jin and Rajiv T. Maheswaran and Romeo Sanchez and Pedro Szekely  

E-Print Network [OSTI]

for a complex multi- agent system with an order-of-magnitude less effort than was required in a Java, and charts that show the evo- lution of nominal variables. VizScript supports the ability to Copyright c 2007

Yorke-Smith, Neil

219

A review of "The Uses of Script and Print, 1300-1700." by Julia Crick and Alexandra Walsham eds.  

E-Print Network [OSTI]

50 SEVENTEENTH-CENTURY NEWS Julia Crick and Alexandra Walsham, eds. The Uses of Script and Print, 1300- 1700. Cambridge: Cambridge University Press, 2004. xiv + 298 pp. + 6 illus. Review by WILLIAM E. ENGEL, UNIVERSITY OF THE SOUTH, SEWANEE... conscious of the mutability of exchange that oper- ated in the early modern period between the spoken, handwritten and printed? (289), the word ?revisionism? does not appear, and ?interaction? rather than ?impact? is used to ?describe the dynamism of texts...

William E. Engel

2005-01-01T23:59:59.000Z

220

Joint Source-Channel Coding via Turbo Codes  

E-Print Network [OSTI]

Joint Source-Channel Coding via Turbo Codes by Guang-Chong Zhu A dissertation submitted coding. One of the most exciting break- throughs in channel coding is the invention of Turbo codes, whose- tigate three joint source-channel coding issues in the context of Turbo codes. In the #12;rst part

Alajaji, Fady

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Unfolding the color code  

E-Print Network [OSTI]

The topological color code and the toric code are two leading candidates for realizing fault-tolerant quantum computation. Here we show that the color code on a $d$-dimensional closed manifold is equivalent to multiple decoupled copies of the $d$-dimensional toric code up to local unitary transformations and adding or removing ancilla qubits. Our result not only generalizes the proven equivalence for $d=2$, but also provides an explicit recipe of how to decouple independent components of the color code, highlighting the importance of colorability in the construction of the code. Moreover, for the $d$-dimensional color code with $d+1$ boundaries of $d+1$ distinct colors, we find that the code is equivalent to multiple copies of the $d$-dimensional toric code which are attached along a $(d-1)$-dimensional boundary. In particular, for $d=2$, we show that the (triangular) color code with boundaries is equivalent to the (folded) toric code with boundaries. We also find that the $d$-dimensional toric code admits logical non-Pauli gates from the $d$-th level of the Clifford hierarchy, and thus saturates the bound by Bravyi and K\\"{o}nig. In particular, we show that the $d$-qubit control-$Z$ logical gate can be fault-tolerantly implemented on the stack of $d$ copies of the toric code by a local unitary transformation.

Aleksander Kubica; Beni Yoshida; Fernando Pastawski

2015-03-06T23:59:59.000Z

222

Building Energy Code  

Broader source: Energy.gov [DOE]

Note: Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

223

Building Energy Code  

Broader source: Energy.gov [DOE]

''Note: Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For...

224

Model Building Energy Code  

Broader source: Energy.gov [DOE]

''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

225

Compiling Codes on Euclid  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Compiling Codes Compiling Codes Overview Open Mpi is the the only MPI library available on Euclid. This implementation of MPI-2 is described at Open MPI: Open Source High...

226

Building Energy Code  

Broader source: Energy.gov [DOE]

''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

227

Multiple phase estimation for arbitrary pure states under white noise  

E-Print Network [OSTI]

In any realistic quantum metrology scenarios, the ultimate precision in the estimation of parameters is limited not only by the so-called Heisenberg scaling, but also the environmental noise encountered by the underlying system. In the context of quantum estimation theory, it is of great significance to carefully evaluate the impact of a specific type of noise on the corresponding quantum Fisher information (QFI) or quantum Fisher information matrix (QFIM). Here we investigate the multiple phase estimation problem for a natural parametrization of arbitrary pure states under white noise. We obtain the explicit expression of the symmetric logarithmic derivative (SLD) and hence the analytical formula of QFIM. Moreover, the attainability of the quantum Cram\\'{e}r-Rao bound (QCRB) is confirmed by the commutability of SLDs and the optimal estimators are elucidated for the experimental purpose. These findings generalize previously known partial results and highlight the role of white noise in quantum metrology.

Yao Yao; Li Ge; Xing Xiao; Xiaoguang Wang; C. P. Sun

2014-09-08T23:59:59.000Z

228

Falcon: automated optimization method for arbitrary assessment criteria  

DOE Patents [OSTI]

FALCON is a method for automatic multivariable optimization for arbitrary assessment criteria that can be applied to numerous fields where outcome simulation is combined with optimization and assessment criteria. A specific implementation of FALCON is for automatic radiation therapy treatment planning. In this application, FALCON implements dose calculations into the planning process and optimizes available beam delivery modifier parameters to determine the treatment plan that best meets clinical decision-making criteria. FALCON is described in the context of the optimization of external-beam radiation therapy and intensity modulated radiation therapy (IMRT), but the concepts could also be applied to internal (brachytherapy) radiotherapy. The radiation beams could consist of photons or any charged or uncharged particles. The concept of optimizing source distributions can be applied to complex radiography (e.g. flash x-ray or proton) to improve the imaging capabilities of facilities proposed for science-based stockpile stewardship.

Yang, Tser-Yuan (Livermore, CA); Moses, Edward I. (Livermore, CA); Hartmann-Siantar, Christine (Livermore, CA)

2001-01-01T23:59:59.000Z

229

Method of preparing mercury with an arbitrary isotopic distribution  

DOE Patents [OSTI]

This invention provides for a process for preparing mercury with a predetermined, arbitrary, isotopic distribution. In one embodiment, different isotopic types of Hg[sub 2]Cl[sub 2], corresponding to the predetermined isotopic distribution of Hg desired, are placed in an electrolyte solution of HCl and H[sub 2]O. The resulting mercurous ions are then electrolytically plated onto a cathode wire producing mercury containing the predetermined isotopic distribution. In a similar fashion, Hg with a predetermined isotopic distribution is obtained from different isotopic types of HgO. In this embodiment, the HgO is dissolved in an electrolytic solution of glacial acetic acid and H[sub 2]O. The isotopic specific Hg is then electrolytically plated onto a cathode and then recovered. 1 fig.

Grossman, M.W.; George, W.A.

1986-12-16T23:59:59.000Z

230

Method of preparing mercury with an arbitrary isotopic distribution  

DOE Patents [OSTI]

This invention provides for a process for preparing mercury with a predetermined, arbitrary, isotopic distribution. In one embodiment, different isotopic types of Hg.sub.2 Cl.sub.2, corresponding to the predetermined isotopic distribution of Hg desired, are placed in an electrolyte solution of HCl and H.sub.2 O. The resulting mercurous ions are then electrolytically plated onto a cathode wire producing mercury containing the predetermined isotopic distribution. In a similar fashion, Hg with a predetermined isotopic distribution is obtained from different isotopic types of HgO. In this embodiment, the HgO is dissolved in an electrolytic solution of glacial acetic acid and H.sub.2 O. The isotopic specific Hg is then electrolytically plated onto a cathode and then recovered.

Grossman, Mark W. (Belmont, MA); George, William A. (Rockport, MA)

1986-01-01T23:59:59.000Z

231

Arbitrary two-qubit computation in 23 elementary gates  

SciTech Connect (OSTI)

We address the problem of constructing quantum circuits to implement an arbitrary two-qubit quantum computation. We pursue circuits without ancilla qubits and as small a number of elementary quantum gates as possible. Our lower bound for worst-case optimal two-qubit circuits calls for at least 17 gates: 15 one-qubit rotations and 2 controlled-NOT (CNOT) gates. We also constructively prove a worst-case upper bound of 23 elementary gates, of which at most four (CNOT gates) entail multiqubit interactions. Our analysis shows that synthesis algorithms suggested in previous work, although more general, entail larger quantum circuits than ours in the special case of two qubits. One such algorithm has a worst case of 61 gates, of which 18 may be CNOT gates.

Bullock, Stephen S.; Markov, Igor L. [Department of Mathematics, The University of Michigan, Ann Arbor, Michigan 48109-2122, USA (United States); Mathematical and Computational Sciences Division, National Institute of Standards and Technology, Gaithersburg, Maryland 20899-8910, USA (United States); Department of Electrical Engineering and Computer Science, The University of Michigan, 1301 Beal Avenue-EECS, Ann Arbor, Michigan 48109-2122, USA (United States)

2003-07-01T23:59:59.000Z

232

Homological Product Codes  

E-Print Network [OSTI]

Quantum codes with low-weight stabilizers known as LDPC codes have been actively studied recently due to their simple syndrome readout circuits and potential applications in fault-tolerant quantum computing. However, all families of quantum LDPC codes known to this date suffer from a poor distance scaling limited by the square-root of the code length. This is in a sharp contrast with the classical case where good families of LDPC codes are known that combine constant encoding rate and linear distance. Here we propose the first family of good quantum codes with low-weight stabilizers. The new codes have a constant encoding rate, linear distance, and stabilizers acting on at most $\\sqrt{n}$ qubits, where $n$ is the code length. For comparison, all previously known families of good quantum codes have stabilizers of linear weight. Our proof combines two techniques: randomized constructions of good quantum codes and the homological product operation from algebraic topology. We conjecture that similar methods can produce good stabilizer codes with stabilizer weight $n^a$ for any $a>0$. Finally, we apply the homological product to construct new small codes with low-weight stabilizers.

Sergey Bravyi; Matthew B. Hastings

2013-11-04T23:59:59.000Z

233

Sustainable Acquisition Coding System | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Sustainable Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System More Documents &...

234

Understanding Perception Through Neural 'Codes'  

E-Print Network [OSTI]

Perception Through Neural ‘Codes’. In: Special Issue on “Perception Through Neural ‘Codes’. In: Special Issue on “Perception Through Neural ‘Codes’. In: Special Issue on “

Freeman, Walter J III

2011-01-01T23:59:59.000Z

235

arbitrary grey-level optical: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Pijush K. Ghosh 1996-07-02 71 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

236

arbitrary sub-diffraction-limit pattern: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Washington at Seattle, University of 243 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

237

adaptive arbitrary lagrangian-eulerian: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Washington at Seattle, University of 282 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

238

arbitrary particle-channel interaction: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Washington at Seattle, University of 315 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

239

E-Print Network 3.0 - arbitrary time dependent Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Technical Report CS96466, CSE Dept., UCSD, January 1996 Determining Asynchronous Acyclic Pipeline Execution Times Summary: units. For an arbitrary graph G, G:time 1 can be...

240

E-Print Network 3.0 - arbitrary input distributions Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

results for: arbitrary input distributions Page: << < 1 2 3 4 5 > >> 1 Generalized MercuryWaterfilling for Multiple-Input Multiple-Output Channels Summary: -interacting...

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

E-Print Network 3.0 - arbitrary waveform generation Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

arbitrary waveform synthesizer with output voltage three times higher... of 4096 Josephson junctions. With this circuit it is now possible to synthesize ... Source: Benz,...

242

Shortened Turbo Codes  

E-Print Network [OSTI]

Simple arguments suggest that shortened codes must have distance properties equal to or better than those of their parent codes, and that they should be equally practical to decode. This relationship holds true in the case of low density generator codes and low density parity check codes. We investigate the properties of shortened turbo codes. I. Motivation for Shortening In our previous work on codes based on very sparse matrices we have observed that while codes with a low density generator matrix [1] are asymptotically bad, codes with a low density parity check matrix [2] are asymptotically good [3, 4, 5]. One way of viewing the relationship between low density generator matrix codes and low density parity check matrix codes is that one obtains a low density parity check matrix by taking the M \\Theta N parity check matrix [P IM ] of a (N; K) low density generator matrix code and chopping off its right-most M columns (where M = N \\Gamma K), to yield an M \\Theta K matrix [P], which...

David J.C. MacKay

243

Code Red 2 kills off Code Red 1  

E-Print Network [OSTI]

#12;#12;Code Red 2 kills off Code Red 1 Code Red 2 settles into weekly pattern Nimda enters the ecosystem Code Red 2 dies off as programmed CR 1 returns thanks to bad clocks #12;Code Red 2 dies off as programmed Nimda hums along, slowly cleaned up With its predator gone, Code Red 1 comes back, still

Paxson, Vern

244

GPU-optimized Code for Long-term Simulations of Beam-beam Effects in Colliders  

SciTech Connect (OSTI)

We report on the development of the new code for long-term simulation of beam-beam effects in particle colliders. The underlying physical model relies on a matrix-based arbitrary-order symplectic particle tracking for beam transport and the Bassetti-Erskine approximation for beam-beam interaction. The computations are accelerated through a parallel implementation on a hybrid GPU/CPU platform. With the new code, a previously computationally prohibitive long-term simulations become tractable. We use the new code to model the proposed medium-energy electron-ion collider (MEIC) at Jefferson Lab.

Roblin, Yves [JLAB; Morozov, Vasiliy [JLAB; Terzic, Balsa [JLAB; Aturban, Mohamed A. [Old Dominion University; Ranjan, D. [Old Dominion University; Zubair, Mohammed [Old Dominion University

2013-06-01T23:59:59.000Z

245

ASTROMETRY.NET: BLIND ASTROMETRIC CALIBRATION OF ARBITRARY ASTRONOMICAL IMAGES  

SciTech Connect (OSTI)

We have built a reliable and robust system that takes as input an astronomical image, and returns as output the pointing, scale, and orientation of that image (the astrometric calibration or World Coordinate System information). The system requires no first guess, and works with the information in the image pixels alone; that is, the problem is a generalization of the 'lost in space' problem in which nothing-not even the image scale-is known. After robust source detection is performed in the input image, asterisms (sets of four or five stars) are geometrically hashed and compared to pre-indexed hashes to generate hypotheses about the astrometric calibration. A hypothesis is only accepted as true if it passes a Bayesian decision theory test against a null hypothesis. With indices built from the USNO-B catalog and designed for uniformity of coverage and redundancy, the success rate is >99.9% for contemporary near-ultraviolet and visual imaging survey data, with no false positives. The failure rate is consistent with the incompleteness of the USNO-B catalog; augmentation with indices built from the Two Micron All Sky Survey catalog brings the completeness to 100% with no false positives. We are using this system to generate consistent and standards-compliant meta-data for digital and digitized imaging from plate repositories, automated observatories, individual scientific investigators, and hobbyists. This is the first step in a program of making it possible to trust calibration meta-data for astronomical data of arbitrary provenance.

Lang, Dustin; Mierle, Keir; Roweis, Sam [Department of Computer Science, University of Toronto, 6 King's College Road, Toronto, Ontario M5S 3G4 (Canada); Hogg, David W.; Blanton, Michael [Center for Cosmology and Particle Physics, Department of Physics, New York University, 4 Washington Place, New York, NY 10003 (United States)], E-mail: dstn@astro.princeton.edu

2010-05-15T23:59:59.000Z

246

Arbitrary spin conformal fields in (A)dS  

E-Print Network [OSTI]

Totally symmetric arbitrary spin conformal fields in (A)dS space of even dimension greater than or equal to four are studied. Ordinary-derivative and gauge invariant Lagrangian formulation for such fields is obtained. Gauge symmetries are realized by using auxiliary fields and Stueckelberg fields. We demonstrate that Lagrangian of conformal field is decomposed into a sum of gauge invariant Lagrangians for massless, partial-massless, and massive fields. We obtain a mass spectrum of the partial-massless and massive fields and confirm the conjecture about the mass spectrum made in the earlier literature. In contrast to conformal fields in flat space, the kinetic terms of conformal fields in (A)dS space turn out to be diagonal with respect to fields entering the Lagrangian. Explicit form of conformal transformation which maps conformal field in flat space to conformal field in (A)dS space is obtained. Covariant Lorentz-like and de-Donder like gauge conditions leading to simple gauge-fixed Lagrangian of conformal fields are proposed. Using such gauge-fixed Lagrangian, which is invariant under global BRST transformations, we explain how the partition function of conformal field is obtained in the framework of our approach.

R. R. Metsaev

2014-07-02T23:59:59.000Z

247

Optimal control theory with arbitrary superpositions of waveforms  

E-Print Network [OSTI]

Standard optimal control methods perform optimization in the time domain. However, many experimental settings demand the expression of the control signal as a superposition of given waveforms, a case that cannot easily be accommodated using time-local constraints. Previous approaches [1,2] have circumvented this difficulty by performing optimization in a parameter space, using the chain rule to make a connection to the time domain. In this paper, we present an extension to Optimal Control Theory which allows gradient-based optimization for superpositions of arbitrary waveforms directly in a time-domain subspace. Its key is the use of the Moore-Penrose pseudoinverse as an efficient means of transforming between a time-local and waveform-based descriptions. To illustrate this optimization technique, we study the parametrically driven harmonic oscillator as model system and reduce its energy, considering both Hamiltonian dynamics and stochastic dynamics under the influence of a thermal reservoir. We demonstrate the viability and efficiency of the method for these test cases and find significant advantages in the case of waveforms which do not form an orthogonal basis.

Selina Meister; Jürgen T. Stockburger; Rebecca Schmidt; Joachim Ankerhold

2014-11-20T23:59:59.000Z

248

Mechanical code comparator  

DOE Patents [OSTI]

A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

Peter, Frank J. (Albuquerque, NM); Dalton, Larry J. (Bernalillo, NM); Plummer, David W. (Albuquerque, NM)

2002-01-01T23:59:59.000Z

249

Green's Conjecture for curves on arbitrary K3 Marian Aprodu and Gavril Farkas  

E-Print Network [OSTI]

Green's Conjecture for curves on arbitrary K3 surfaces Marian Aprodu and Gavril Farkas Abstract Green's Conjecture predicts than one can read off special linear series on an algebraic curve-Ramanan, provides a complete solution to Green's Conjecture for smooth curves on arbitrary K3 surfaces. 1

Farkas, Gavril

250

Optical Arbitrary Waveform Generation Based Optical-Label Switching Transmitter with  

E-Print Network [OSTI]

Optical Arbitrary Waveform Generation Based Optical-Label Switching Transmitter with All-Optical, 95616 Email: sbyoo@ucdavis.edu Abstract: This paper introduces a modulation-format transparent optical-label switching transmitter based on optical arbitrary waveform generation. Packets consisting of 100 Gb

Kolner, Brian H.

251

Electric field in hard superconductors with arbitrary cross section and general critical current law  

E-Print Network [OSTI]

Electric field in hard superconductors with arbitrary cross section and general critical current-28871 Alcala´ de Henares, Spain Received 18 February 2004; accepted 11 March 2004 The induced electric field E x during magnetic flux entry in superconductors with arbitrary cross section and general

Majós, Antonio Badía

252

Nonlinear dynamics of magnetohydrodynamic flows of heavy fluid over an arbitrary surface  

E-Print Network [OSTI]

equations system for heavy fluid over an arbitrary surface in shallow water approximation is studied to the study of nonlinear flows of heavy fluid described by the shallow water magnetohydrodynamic equations1 Nonlinear dynamics of magnetohydrodynamic flows of heavy fluid over an arbitrary surface

253

Closed Form of the Biphoton K-Vector Spectrum for Arbitrary Spatio-Temporal Pump Modes  

E-Print Network [OSTI]

A closed form solution is derived for the biphoton k-vector spectrum for an arbitrary pump spatial mode. The resulting mode coefficients for the pump input that maximize the probability of biphoton detection in the far field are found. It is thus possible to include the effect of arbitrary crystal poling strucures, and optimize the resulting biphoton flux.

Jeffrey Perkins

2011-09-02T23:59:59.000Z

254

MULTICHANNEL BLIND DECONVOLUTION OF ARBITRARY SIGNALS: ADAPTIVE ALGORITHMS AND STABILITY ANALYSIES  

E-Print Network [OSTI]

MULTICHANNEL BLIND DECONVOLUTION OF ARBITRARY SIGNALS: ADAPTIVE ALGORITHMS AND STABILITY ANALYSIES for the multichannel blind deconvolution of arbitrary non-Gaussian source mixtures. Two of the algorithms are spa- tia-temporal extensions of recently-derived blind signal separation algorithms that combine kurta- sis-based contrast

Douglas, Scott C.

255

Banner Index Codes The Index code is a data-entry shortcut for the Fund code, Org code, and Program code in Banner  

E-Print Network [OSTI]

Banner Index Codes The Index code is a data-entry shortcut for the Fund code, Org code, and Program code in Banner Finance (FO-P's). Implementation of the Index has greatly decreased data entry coding ­ Account (object) - Program (FOAP) code numbers on any of your accounting forms (Contracts, Purchase Orders

256

Graph Concatenation for Quantum Codes  

E-Print Network [OSTI]

Graphs are closely related to quantum error-correcting codes: every stabilizer code is locally equivalent to a graph code, and every codeword stabilized code can be described by a graph and a classical code. For the construction of good quantum codes of relatively large block length, concatenated quantum codes and their generalizations play an important role. We develop a systematic method for constructing concatenated quantum codes based on "graph concatenation", where graphs representing the inner and outer codes are concatenated via a simple graph operation called "generalized local complementation." Our method applies to both binary and non-binary concatenated quantum codes as well as their generalizations.

Salman Beigi; Isaac Chuang; Markus Grassl; Peter Shor; Bei Zeng

2010-02-03T23:59:59.000Z

257

Quantum gravitational corrections to propagator in arbitrary spacetimes  

E-Print Network [OSTI]

The action for a relativistic free particle of mass m receives a contribution $-m R(x,y)$ from a path of length R(x,y) connecting the events $x^i$ and $y^i$. Using this action in a path integral, one can obtain the Feynman propagator for a spinless particle of mass m in any background spacetime. If one of the effects of quantizing gravity is to introduce a minimum length scale $L_P$ in the spacetime, then one would expect the segments of paths with lengths less than $L_P$ to be suppressed in the path integral. Assuming that the path integral amplitude is invariant under the `duality' transformation ${\\cal R}\\to L_P^2/R$, one can calculate the modified Feynman propagator in an arbitrary background spacetime. It turns out that the key feature of this modification is the following: The proper distance $(\\Delta x)^2$ between two events, which are infinitesimally separated, is replaced by $\\Delta x^2 + L_P^2$; that is the spacetime behaves as though it has a `zero-point length' of $L_P$. This equivalence suggests a deep relationship between introducing a `zero-point-length' to the spacetime and postulating invariance of path integral amplitudes under duality transformations. In the Schwinger's proper time description of the propagator, the weightage for a path with proper time s becomes $m(s+L_P^2/s)$ rather than as ms. As to be expected, the ultraviolet behavior of the theory is improved significantly and divergences will disappear if this modification is taken into account. Implications of this result are discussed.

T. Padmanabhan

1997-03-18T23:59:59.000Z

258

Reed-Muller Codes: Spherically-Punctured Codes and Decoding Algorithms  

E-Print Network [OSTI]

Linear codes . . . . . . . . . . . . . . . . . . . . . . .3.3 Code parameters . . . . . . . . . . . . . .of linear codes . . . . . . . . . . . . 1.5 Reed-Muller

Kapralova, Olga

2013-01-01T23:59:59.000Z

259

Universal space-time codes from demultiplexed trellis codes  

E-Print Network [OSTI]

and A. R. Calderbank, “Space-time codes for high data ratePerformance criteria and code construction,” IEEE Trans.of space–time trellis codes,” IEEE Trans. Commun. , vol. 51,

Kose, Cenk; Wesel, R D

2006-01-01T23:59:59.000Z

260

Relation Between Surface Codes and Hypermap-Homology Quantum Codes  

E-Print Network [OSTI]

Recently, a new class of quantum codes based on hypermaps were proposed. These codes are obtained from embeddings of hypergraphs as opposed to surface codes which are obtained from the embeddings of graphs. It is natural to compare these two classes of codes and their relation to each other. In this context two related questions are addressed in this paper: Can the parameters of hypermap-homology codes be superior to those of surface codes and what is precisely the relation between these two classes of quantum codes? We show that a canonical hypermap code is identical to a surface code while a noncanonical hypermap code can be transformed to a surface code by CNOT gates alone. Our approach is constructive; we construct the related surface code and the transformation involving CNOT gates.

Pradeep Sarvepalli

2014-03-14T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Report number codes  

SciTech Connect (OSTI)

This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

Nelson, R.N. (ed.)

1985-05-01T23:59:59.000Z

262

A three-dimensional fast solver for arbitrary vorton distributions  

SciTech Connect (OSTI)

A method which is capable of an efficient calculation of the three-dimensional flow field produced by a large system of vortons (discretized regions of vorticity) is presented in this report. The system of vortons can, in turn, be used to model body surfaces, container boundaries, free-surfaces, plumes, jets, and wakes in unsteady three-dimensional flow fields. This method takes advantage of multipole and local series expansions which enables one to make calculations for interactions between groups of vortons which are in well-separated spatial domains rather than having to consider interactions between every pair of vortons. In this work, series expansions for the vector potential of the vorton system are obtained. From such expansions, the three components of velocity can be obtained explicitly. A Fortran computer code FAST3D has been written to calculate the vector potential and the velocity components at selected points in the flow field. In this code, the evaluation points do not have to coincide with the location of the vortons themselves. Test cases have been run to benchmark the truncation errors and CPU time savings associated with the method. Non-dimensional truncation errors for the magnitudes of the vector potential and velocity fields are on the order of 10{sup {minus}4}and 10{sup {minus}3} respectively. Single precision accuracy produces errors in these quantities of up to 10{sup {minus}5}. For less than 1,000 to 2,000 vortons in the field, there is virtually no CPU time savings with the fast solver. For 100,000 vortons in the flow, the fast solver obtains solutions in 1 % to 10% of the time required for the direct solution technique depending upon the configuration.

Strickland, J.H.; Baty, R.S.

1994-05-01T23:59:59.000Z

263

Quantum convolutional stabilizer codes  

E-Print Network [OSTI]

constructions of good quantum error-correcting codes were given by Steane [2] and Calderbank and Shor [3]. These codes protect the quantum information using additional qubits and make it possible to reverse the e®ects of the most likely errors. 10 Encouraged... is that accurate computation does not require perfect physical devices. B. Background The ¯rst quantum error correcting codes were discovered independently by Shor [1] and Steane [2], as mentioned in the previous section. Shor proved that 9 qubits could be used...

Chinthamani, Neelima

2004-09-30T23:59:59.000Z

264

Unequal Error Protection Turbo Codes  

E-Print Network [OSTI]

Unequal Error Protection Turbo Codes Diploma Thesis Neele von Deetzen Arbeitsbereich Nachrichtentechnik School of Engineering and Science Bremen, February 28th, 2005 #12;Unequal Error Protection Turbo Convolutional Codes / Turbo Codes 18 3.1 Structure

Henkel, Werner

265

Rateless Codes for AVC Models  

E-Print Network [OSTI]

2004. [7] M. Luby, “LT codes,” in Proc. 43rd Ann. IEEE Symp.8] A. Shokrollahi, “Fountain codes,” in Proc. 41st AllertonChannel capacities for list codes,” J. Appl. Probabil. ,

Sarwate, A D; Gastpar, M

2010-01-01T23:59:59.000Z

266

Climate Code Foundation  

E-Print Network [OSTI]

Climate Code Foundation - who are we? A non-profit organisation founded in August 2010; our goal is to promote the public understanding of climate science, by increasing the visibility and clarity of the software used in climate science...

Barnes, Nick; Jones, David

2011-07-05T23:59:59.000Z

267

No Code: Null Programs  

E-Print Network [OSTI]

To continue the productive discussion of uninscribed artworks in Craig Dworkin’s No Medium, this report discusses, in detail, those computer programs that have no code, and are thus empty or null. Several specific examples ...

Montfort, Nick

2014-06-05T23:59:59.000Z

268

Quantum Error Correcting Subsystem Codes From Two Classical Linear Codes  

E-Print Network [OSTI]

The essential insight of quantum error correction was that quantum information can be protected by suitably encoding this quantum information across multiple independently erred quantum systems. Recently it was realized that, since the most general method for encoding quantum information is to encode it into a subsystem, there exists a novel form of quantum error correction beyond the traditional quantum error correcting subspace codes. These new quantum error correcting subsystem codes differ from subspace codes in that their quantum correcting routines can be considerably simpler than related subspace codes. Here we present a class of quantum error correcting subsystem codes constructed from two classical linear codes. These codes are the subsystem versions of the quantum error correcting subspace codes which are generalizations of Shor's original quantum error correcting subspace codes. For every Shor-type code, the codes we present give a considerable savings in the number of stabilizer measurements needed in their error recovery routines.

Dave Bacon; Andrea Casaccino

2006-10-17T23:59:59.000Z

269

E-Print Network 3.0 - arbitrary microvascular geometries Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

on the cell free layer and Summary: -759. Udaykumar, H.S., Kan, H.C., Shyy, W., Tran-Son-Tay, R., 1997. Multiphase dynamics in arbitrary geometries... and cow- orkers (Pozrikidis,...

270

E-Print Network 3.0 - arbitrary spins non-linearly Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sciences 86 Origin and Control of Spin Currents in a Magnetic Triplet Josephson Junction Philip M. R. BRYDON Summary: a spin-filter for arbitrary . As displayed in Fig....

271

E-Print Network 3.0 - arbitrary-profile slow-wave structure Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1607-7962graEGU2007-A-00262 Summary: to examine flows with arbitrary profiles of zonal wind and vertical stratification. We apply the techniques... structure. What is the role...

272

Quantum error control codes  

E-Print Network [OSTI]

QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2008 Major... Subject: Computer Science QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY...

Abdelhamid Awad Aly Ahmed, Sala

2008-10-10T23:59:59.000Z

273

CIP/multi-moment finite volume method with arbitrary order of accuracy  

E-Print Network [OSTI]

This paper presents a general formulation of the CIP/multi-moment finite volume method (CIP/MM FVM) for arbitrary order of accuracy. Reconstruction up to arbitrary order can be built on single cell by adding extra derivative moments at the cell boundary. The volume integrated average (VIA) is updated via a flux-form finite volume formulation, whereas the point-based derivative moments are computed as local derivative Riemann problems by either direct interpolation or approximate Riemann solvers.

Xiao, Feng

2012-01-01T23:59:59.000Z

274

Nested Quantum Error Correction Codes  

E-Print Network [OSTI]

The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

Zhuo Wang; Kai Sun; Hen Fan; Vlatko Vedral

2009-09-28T23:59:59.000Z

275

Code: A Lightweight and Flexible Mobile Code Toolkit  

E-Print Network [OSTI]

evaluation of mobile code technology does not exist yet, some studies already evidenced that the powerful of client­server and mobile code in reducing the network traffic generated by management. The theoretical¯Code: A Lightweight and Flexible Mobile Code Toolkit Gian Pietro Picco Dip. Automatica e

Picco, Gian Pietro

276

T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks  

Broader source: Energy.gov [DOE]

The software does not properly filter HTML code from user-supplied input in the The "mobile phone" profile entry before displaying the input.

277

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURLDepartment of Energy

278

Extended quantum color coding  

SciTech Connect (OSTI)

The quantum color coding scheme proposed by Korff and Kempe [e-print quant-ph/0405086] is easily extended so that the color coding quantum system is allowed to be entangled with an extra auxiliary quantum system. It is shown that in the extended scheme we need only {approx}2{radical}(N) quantum colors to order N objects in large N limit, whereas {approx}N/e quantum colors are required in the original nonextended version. The maximum success probability has asymptotics expressed by the Tracy-Widom distribution of the largest eigenvalue of a random Gaussian unitary ensemble (GUE) matrix.

Hayashi, A.; Hashimoto, T.; Horibe, M. [Department of Applied Physics, Fukui University, Fukui 910-8507 (Japan)

2005-01-01T23:59:59.000Z

279

Coding for Cooperative Communications  

E-Print Network [OSTI]

develop and design practical coding strategies which perform very close to the infor- mation theoretic limits. The cooperative communication channels we consider are: (a) The Gaussian re- lay channel, (b) the quasi-static fading relay channel, (c... modulation. The CF strategy is implemented with low-density parity-check (LDPC) and irregular repeat- accumulate codes and is found to operate within 0.34 dB of the theoretical limit. For the quasi-static fading relay channel, we assume that no channel...

Uppal, Momin Ayub

2011-10-21T23:59:59.000Z

280

The Woodland Carbon Code  

E-Print Network [OSTI]

The Woodland Carbon Code While society must continue to make every effort to reduce greenhouse gas a role by removing carbon dioxide from the atmosphere. The potential of woodlands to soak up carbon to help compensate for their carbon emissions. But before investing in such projects, people want to know

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Course Code: Course Title  

E-Print Network [OSTI]

- Frameworks; Decision Making Development life-cycle of a software system Bi-directional influence between-Critical Systems; Technology & Society. Brave New Worlds - Co-operative Computing; eLife. Learning OutcomesCourse Code: F29PD Course Title: Professional Development Course Co-ordinator: Sandy Jean

Painter, Kevin

282

Hydrogen Production CODES & STANDARDS  

E-Print Network [OSTI]

Hydrogen Production DELIVERY FUEL CELLS STORAGE PRODUCTION TECHNOLOGY VALIDATION CODES & STANDARDS for 2010 · Reduce the cost of distributed production of hydrogen from natural gas and/or liquid fuels to $1 SYSTEMS INTEGRATION / ANALYSES SAFETY EDUCATION RESEARCH & DEVELOPMENT Economy Pete Devlin #12;Hydrogen

283

Minor Codes Accounting 1100  

E-Print Network [OSTI]

Minor Codes Accounting 1100 Adult/Extension Education 1220 Aerospace Studies 1225 Agricultural Business Management 1250 Agricultural Mechanization and Business 1600 American Sign Language Studies 5650 and Policy 3790 Equine Business 4690 Film Studies 7756 Financial Management 3900 Food Science 4100 Forest

Bolding, M. Chad

284

Development code for sensitivity and uncertainty analysis of input on the MCNPX for neutronic calculation in PWR core  

SciTech Connect (OSTI)

This research was carried out on the development of code for uncertainty analysis is based on a statistical approach for assessing the uncertainty input parameters. In the butn-up calculation of fuel, uncertainty analysis performed for input parameters fuel density, coolant density and fuel temperature. This calculation is performed during irradiation using Monte Carlo N-Particle Transport. The Uncertainty method based on the probabilities density function. Development code is made in python script to do coupling with MCNPX for criticality and burn-up calculations. Simulation is done by modeling the geometry of PWR terrace, with MCNPX on the power 54 MW with fuel type UO2 pellets. The calculation is done by using the data library continuous energy cross-sections ENDF / B-VI. MCNPX requires nuclear data in ACE format. Development of interfaces for obtaining nuclear data in the form of ACE format of ENDF through special process NJOY calculation to temperature changes in a certain range.

Hartini, Entin, E-mail: entin@batan.go.id; Andiwijayakusuma, Dinan, E-mail: entin@batan.go.id [Center for Development of Nuclear Informatics - National Nuclear Energy Agency, PUSPIPTEK, Serpong, Tangerang, Banten (Indonesia)

2014-09-30T23:59:59.000Z

285

All solutions of arbitrary first order autonomous partial differential equations in any dimensions  

E-Print Network [OSTI]

All solutions of $F(u,\\ u_t,\\ u_{x_1},\\ \\ldots,\\ u_{x_n})=0$ with arbitrary function $F$ can be completely determined by its symmetries $\\sigma=G(\\tau_1,\\ \\ldots,\\ \\tau_n)u_t$, where $G$ is an arbitrary function of $\\tau_i\\equiv u_{x_i}/u_t$, if one can find a special non-degenerate solution $u_s$ such that $\\{\\tau_{s,i}\\equiv u_{s,x_i}/u_{s,t},\\ i=1,\\ 2,\\ \\ldots\\ n\\}$ are functional independent. Especially, the Lax pair, recursion operator and infinitely many high order symmetries are also explicitly given for arbitrary (1+1)-dimensional first order autonomous partial differential equations.

Sen-Yue Lou; Ruo-Xia Yao

2014-06-06T23:59:59.000Z

286

Erasure Techniques in MRD codes  

E-Print Network [OSTI]

This book is organized into six chapters. The first chapter introduces the basic algebraic structures essential to make this book a self contained one. Algebraic linear codes and their basic properties are discussed in chapter two. In chapter three the authors study the basic properties of erasure decoding in maximum rank distance codes. Some decoding techniques about MRD codes are described and discussed in chapter four of this book. Rank distance codes with complementary duals and MRD codes with complementary duals are introduced and their applications are discussed. Chapter five introduces the notion of integer rank distance codes. The final chapter introduces some concatenation techniques.

W. B. Vasantha Kandasamy; Florentin Smarandache; R. Sujatha; R. S. Raja Durai

2012-05-03T23:59:59.000Z

287

REDUCED-COMPLEXITY DECODING FOR CONCATENATED CODES BASED ON RECTANGULAR PARITY-CHECK CODES AND TURBO CODES  

E-Print Network [OSTI]

AND TURBO CODES John M. Shea and Tan F. Wong University of Florida Department of Electrical and Computer-check code (RPCC) with a turbo code. These concatenated codes are referred to as RPCC+turbo codes. RPCC+turbo codes have been shown to significantly outperform turbo codes in several scenarios [1],[2]. One

Wong, Tan F.

288

Arbitrary amplitude double layers in warm dust kinetic Alfven wave plasmas  

SciTech Connect (OSTI)

Large amplitude electrostatic structures associated with low-frequency dust kinetic Alfvenic waves are investigated under the pressure (temperature) gradient indicative of dust dynamics. The set of equations governing the dust dynamics, Boltzmann electrons, ions and Maxwell's equation have been reduced to a single equation known as the Sagdeev potential equation. Parameter ranges for the existence of arbitrary amplitude double layers are observed. Exact analytical expressions for the energy integral is obtained and computed numerically through which sub-Alfvenic arbitrary amplitude rarefactive double layers are found to exist.

Gogoi, Runmoni; Devi, Nirupama [Department of Mathematics, Cotton College, Guwahati-781001, Assam (India)

2008-07-15T23:59:59.000Z

289

Adaptive code generators for tree coding of speech  

E-Print Network [OSTI]

Tree coding is a promising way of obtaining good performance for medium-to-low rate speech coding. The key part of a tree coder is the code generator which consists of a short-term predictor and a long-term predictor. The best predictor designed...

Dong, Hui

1998-01-01T23:59:59.000Z

290

Nevada Energy Code for Buildings  

Broader source: Energy.gov [DOE]

''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

291

Matlab-Kinect Interface Code  

E-Print Network [OSTI]

This .zip file contains code and installation instructions for acquiring 3d arm movements in Matlab using the Microsoft Kinect 3d camera. The provided code has been validated in 32-bit and 64-bit Matlab with 32-bit and ...

Kowalski, Kevin

2012-06-01T23:59:59.000Z

292

City of Austin- Zoning Code  

Broader source: Energy.gov [DOE]

The Zoning Code (Chapter 25-2) of the Austin City Code provides a height limitation exemption for solar installations. Solar installations may exceed the zoning district height limit by 15% or the...

293

Code of Practice Research Degrees  

E-Print Network [OSTI]

........................................................................ 15 Section Ten: FacilitiesCode of Practice For Research Degrees 2014/15 #12;2 Contents Section One: Preface ­ the purpose of the Code........................................................ 3 Section Two: Context

Evans, Paul

294

MODIFICATION OF THE MOOG SPECTRAL SYNTHESIS CODES TO ACCOUNT FOR ZEEMAN BROADENING OF SPECTRAL LINES  

SciTech Connect (OSTI)

In an attempt to widen access to the study of magnetic fields in stellar astronomy, I present MOOGStokes, a version of the MOOG one-dimensional local thermodynamic equilibrium radiative transfer code, overhauled to incorporate a Stokes vector treatment of polarized radiation through a magnetic medium. MOOGStokes is a suite of three complementary programs, which together can synthesize the disk-averaged emergent spectrum of a star with a magnetic field. The first element (a pre-processing script called CounterPoint) calculates for a given magnetic field strength, wavelength shifts, and polarizations for the components of Zeeman-sensitive lines. The second element (a MOOG driver called SynStokes derived from the existing MOOG driver Synth) uses the list of Zeeman-shifted absorption lines together with the existing machinery of MOOG to synthesize the emergent spectrum at numerous locations across the stellar disk, accounting for stellar and magnetic field geometry. The third and final element (a post-processing script called DiskoBall) calculates the disk-averaged spectrum by weighting the individual emergent spectra by limb darkening and projected area, and applying the effects of Doppler broadening. All together, the MOOGStokes package allows users to synthesize emergent spectra of stars with magnetic fields in a familiar computational framework. MOOGStokes produces disk-averaged spectra for all Stokes vectors ( I, Q, U, V ), normalized by the continuum. MOOGStokes agrees well with the predictions of INVERS10 a polarized radiative transfer code with a long history of use in the study of stellar magnetic fields. In the non-magnetic limit, MOOGStokes also agrees with the predictions of the scalar version of MOOG.

Deen, Casey P. [Max Planck Institut fuer Astronomie, Koenigstuhl 17, D-69117 Heidelberg, GermanyAND (Germany); Department of Astronomy, University of Texas at Austin, 1 University Station, Austin, TX 78712 (United States)

2013-09-15T23:59:59.000Z

295

MELCOR computer code manuals  

SciTech Connect (OSTI)

MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

1995-03-01T23:59:59.000Z

296

What's coming in 2012 codes  

E-Print Network [OSTI]

Administration Why Building Energy Codes Matter Why Building Energy Codes Matter ? Buildings account for 70% of electricity use ? Buildings account for 38% of CO2 emissions (Source: US Green Building Council) Residential Progress Commercial Progress... ? Southeast Energy Efficiency Alliance ? Southwest Energy Efficiency Project Why Building Energy Codes Matter Why Building Energy Codes Matter ? Share of Energy Consumed by Major Sectors of the Economy (2010) Source: U.S. Energy Information...

Lacey, E

2011-01-01T23:59:59.000Z

297

Energy Codes and Standards: Facilities  

SciTech Connect (OSTI)

Energy codes and standards play a vital role in the marketplace by setting minimum requirements for energy-efficient design and construction. They outline uniform requirements for new buildings as well as additions and renovations. This article covers basic knowledge of codes and standards; development processes of each; adoption, implementation, and enforcement of energy codes and standards; and voluntary energy efficiency programs.

Bartlett, Rosemarie; Halverson, Mark A.; Shankle, Diana L.

2007-01-01T23:59:59.000Z

298

Design of proximity detecting codes  

E-Print Network [OSTI]

class of codes called Proximity Detecting Codes can be used to overcome this problem associated with asynchronous channels. A t-proximity detecting (t-PD) code can detect when a received word is within distance t from the transmitted codeword, when using...

Perisetty, Srinivas

1997-01-01T23:59:59.000Z

299

Code for Hydrogen Hydrogen Pipeline  

E-Print Network [OSTI]

#12;2 Code for Hydrogen Pipelines Hydrogen Pipeline Working Group Workshop Augusta, Georgia August development · Charge from BPTCS to B31 Standards Committee for Hydrogen Piping/Pipeline code development · B31.12 Status & Structure · Hydrogen Pipeline issues · Research Needs · Where Do We Go From Here? #12;4 Code

300

PERFORMANCE EVALUATION OF TURBO CODES  

E-Print Network [OSTI]

PERFORMANCE EVALUATION OF TURBO CODES by Guangchong Zhu A project submitted to the Department named ``Turbo codes'' which claims an extraordinary performance with reasonable decoding complexity. In this project, we begin with a study on the structure and principle of Turbo codes. We then investigate

Alajaji, Fady

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Travel Codes Traveler Is Employee  

E-Print Network [OSTI]

Travel Codes Traveler Is Employee: 64100-Domestic Travel 64150-Mileage 64200-International Travel Supplies & Expense Codes 71410-Office Supplies 71430-Lab/Research Supplies (dollar value of each item less Charges Equipment Codes 84320-Equipment (non-computer & peripherals) with a cost of $5,000.00 or more per

Arnold, Jonathan

302

Surface code quantum communication  

E-Print Network [OSTI]

Quantum communication typically involves a linear chain of repeater stations, each capable of reliable local quantum computation and connected to their nearest neighbors by unreliable communication links. The communication rate in existing protocols is low as two-way classical communication is used. We show that, if Bell pairs are generated between neighboring stations with a probability of heralded success greater than 0.65 and fidelity greater than 0.96, two-way classical communication can be entirely avoided and quantum information can be sent over arbitrary distances with arbitrarily low error at a rate limited only by the local gate speed. The number of qubits per repeater scales logarithmically with the communication distance. If the probability of heralded success is less than 0.65 and Bell pairs between neighboring stations with fidelity no less than 0.92 are generated only every T_B seconds, the logarithmic resource scaling remains and the communication rate through N links is proportional to 1/(T_B log^2 N).

Austin G. Fowler; David S. Wang; Charles D. Hill; Thaddeus D. Ladd; Rodney Van Meter; Lloyd C. L. Hollenberg

2010-02-05T23:59:59.000Z

303

BINGO: A code for the efficient computation of the scalar bi-spectrum  

E-Print Network [OSTI]

We present a new and accurate Fortran code, the BI-spectra and Non-Gaussianity Operator (BINGO), for the efficient numerical computation of the scalar bi-spectrum and the non-Gaussianity parameter f_{NL} in single field inflationary models involving the canonical scalar field. The code can calculate all the different contributions to the bi-spectrum and the parameter f_{NL} for an arbitrary triangular configuration of the wavevectors. Focusing firstly on the equilateral limit, we illustrate the accuracy of BINGO by comparing the results from the code with the spectral dependence of the bi-spectrum expected in power law inflation. Then, considering an arbitrary triangular configuration, we contrast the numerical results with the analytical expression available in the slow roll limit, for, say, the case of the conventional quadratic potential. Considering a non-trivial scenario involving deviations from slow roll, we compare the results from the code with the analytical results that have recently been obtained in the case of the Starobinsky model in the equilateral limit. As an immediate application, we utilize BINGO to examine of the power of the non-Gaussianity parameter f_{NL} to discriminate between various inflationary models that admit departures from slow roll and lead to similar features in the scalar power spectrum. We close with a summary and discussion on the implications of the results we obtain.

Dhiraj Kumar Hazra; L. Sriramkumar; Jerome Martin

2013-05-18T23:59:59.000Z

304

Development of integrated core disruptive accident analysis code for FBR - ASTERIA-FBR  

SciTech Connect (OSTI)

The evaluation of consequence at the severe accident is the most important as a safety licensing issue for the reactor core of liquid metal cooled fast breeder reactor (LMFBR), since the LMFBR core is not in an optimum condition from the viewpoint of reactivity. This characteristics might induce a super-prompt criticality due to the core geometry change during the core disruptive accident (CDA). The previous CDA analysis codes have been modeled in plural phases dependent on the mechanism driving a super-prompt criticality. Then, the following event is calculated by connecting different codes. This scheme, however, should introduce uncertainty and/or arbitrary to calculation results. To resolve the issues and obtain the consistent calculation results without arbitrary, JNES is developing the ASTERIA-FBR code for the purpose of providing the cross-check analysis code, which is another required scheme to confirm the validity of the evaluation results prepared by applicants, in the safety licensing procedure of the planned high performance core of Monju. ASTERIA-FBR consists of the three major calculation modules, CONCORD, dynamic-GMVP, and FEMAXI-FBR. CONCORD is a three-dimensional thermal-hydraulics calculation module with multi-phase, multi-component, and multi-velocity field model. Dynamic-GMVP is a space-time neutronics calculation module. FEMAXI-FBR calculates the fuel pellet deformation behavior and fuel pin failure behavior. This paper describes the needs of ASTERIA-FBR development, major module outlines, and the model validation status. (authors)

Ishizu, T.; Endo, H.; Tatewaki, I.; Yamamoto, T. [Japan Nuclear Energy Safety Organization JNES, Toranomon Towers Office, 4-1-28, Toranomon, Minato-ku, Tokyo (Japan); Shirakawa, N. [Inst. of Applied Energy IAE, Shimbashi SY Bldg., 14-2 Nishi-Shimbashi 1-Chome, Minato-ku, Tokyo (Japan)

2012-07-01T23:59:59.000Z

305

Southeast Energy Efficiency Alliance's Building Energy Codes...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Southeast Energy Efficiency Alliance's Building Energy Codes Project Southeast Energy Efficiency Alliance's Building Energy Codes Project Building Codes Project for the 2013...

306

2013 Reporting Unit Codes | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2013 Reporting Unit Codes 2013 Reporting Unit Codes CFC Reporting Unit Codes 2013.pdf More Documents & Publications EA-0372: Final Environmental Assessment Alignment: Achieving...

307

Random Walk on an Arbitrary Set By Simon C. Harris, Robin Sibson, and  

E-Print Network [OSTI]

Random Walk on an Arbitrary Set By Simon C. Harris, Robin Sibson, and David Williams School be a countably infinite set of points in R, and suppose that I has no points of accumulation and that its convex hull is the whole of R. It will be convenient to index I as {ui : i Z}, with ui

Harris, Simon Colin

308

Mass and spin content of a free relativistic particle of arbitrary spins and the group  

E-Print Network [OSTI]

of particles with several spins and masses which can exist in positive as well as negative energy states Postal 20-364, 01000 Mexico D. F., Mexico 2 Instituto de Ciencias Nucleares, UNAM, Apdo. Postal 70 approach to the free parti- cle of arbitrary spins whose relativistic equation can be obtained from

Nikitin, Anatoly

309

Fast Detection and Processing of Arbitrary Contrast Agent Injections in Coronary  

E-Print Network [OSTI]

: condura@isip.uni-luebeck.de Abstract. Percutaneous transluminal coronary angioplasty (PTCA) re- quires pre-interventional and inter- ventional X-ray images. In the pre-interventional coronary angiogramsFast Detection and Processing of Arbitrary Contrast Agent Injections in Coronary Angiography

Lübeck, Universität zu

310

A Closed-Form Solution to the Arbitrary Order Cauchy Problem with Propagators  

E-Print Network [OSTI]

The general abstract arbitrary order (N) Cauchy problem was solved in a closed form as a sum of exponential propagator functions. The infinite sparse exponential series was solved with the aid of a homogeneous differential equation. It generated a linear combination of exponential functions. The Cauchy problem solution was formed with N linear combinations of N exponential propagators.

Henrik Stenlund

2014-11-24T23:59:59.000Z

311

Reversing the weak measurement of an arbitrary field with finite photon number  

E-Print Network [OSTI]

For an arbitrary field with finite photon number inside a leaky cavity, we show that the null-result measurement can be conditionally reversed, using either multiple atoms or a multilevel atom. Even with photons detected, a certain class of fields...

Sun, Qingqing; Al-Amri, M.; Zubairy, M. Suhail.

2009-01-01T23:59:59.000Z

312

SPAIN: COTS Data-Center Ethernet for Multipathing over Arbitrary Topologies  

E-Print Network [OSTI]

SPAIN: COTS Data-Center Ethernet for Multipathing over Arbitrary Topologies Jayaram Mudigonda switches, which could obviate the commodity pricing of these parts. In this paper, we describe SPAIN ("Smart Path Assign- ment In Networks"). SPAIN provides multipath forward- ing using inexpensive

313

Fast and accurate direct MDCT to DFT conversion with arbitrary window functions  

E-Print Network [OSTI]

1 Fast and accurate direct MDCT to DFT conversion with arbitrary window functions Shuhua Zhang* and Laurent Girin Abstract--In this paper, we propose a method for direct con- version of MDCT coefficients of the MDCT-to- DFT conversion matrices into a Toeplitz part plus a Hankel part. The latter is split

Paris-Sud XI, Université de

314

Self-Assembly of Arbitrary Shapes Using RNAse Enzymes: Meeting the Kolmogorov Bound with  

E-Print Network [OSTI]

Self-Assembly of Arbitrary Shapes Using RNAse Enzymes: Meeting the Kolmogorov Bound with Small@uwplatt.edu Abstract We consider a model of algorithmic self-assembly of geometric shapes out of square Wang tiles Biomolecular computation, RNAse enzyme self-assembly, algorithmic self-assembly, Komogorov complexity Digital

Paris-Sud XI, Université de

315

Self-Assembly of Arbitrary Shapes Using RNAse Enzymes: Meeting the Kolmogorov Bound with  

E-Print Network [OSTI]

Self-Assembly of Arbitrary Shapes Using RNAse Enzymes: Meeting the Kolmogorov Bound with Small@uwplatt.edu This research was supported in part by NSF grant CDI-0941538 Abstract We consider a model of algorithmic self-assembly Biomolecular computation, RNAse enzyme self-assembly, algorithmic self-assembly, Komogorov complexity Digital

Demaine, Erik

316

Staged Self-Assembly: Nanomanufacture of Arbitrary Shapes with O(1) Glues  

E-Print Network [OSTI]

Staged Self-Assembly: Nanomanufacture of Arbitrary Shapes with O(1) Glues Erik D. Demaine Martin L We introduce staged self-assembly of Wang tiles, where tiles can be added dynamically in sequence- neering. Staging allows us to break through the traditional lower bounds in tile self-assembly by encoding

Demaine, Erik

317

Staged Self-Assembly: Nanomanufacture of Arbitrary Shapes with O(1) Glues  

E-Print Network [OSTI]

Staged Self-Assembly: Nanomanufacture of Arbitrary Shapes with O(1) Glues Erik D. Demaine Martin L We introduce staged self-assembly of Wang tiles, where tiles can be added dynamically in sequence-based bioengineering. Staging allows us to break through the traditional lower bounds in tile self-assembly by encoding

Demaine, Erik

318

Spectroscopic Raman Nanometrology of Graphene and Graphene Multilayers on Arbitrary Substrates  

E-Print Network [OSTI]

Spectroscopic Raman Nanometrology of Graphene and Graphene Multilayers on Arbitrary Substrates I to be an effective tool for characterization of graphene and graphene multilayers on the standard Si/SiO2 (300 nm) substrates, which allows one to determine non-destructively the number of the graphene layers and assess

319

Single crystal growth and heteroepitaxy of polyacene thin films on arbitrary substrates  

E-Print Network [OSTI]

in a number of low-cost, large area electronic applications such as flat panel displays. Organic thin film as other substrates.6-12 Recently, significant progress has been made towards fabricating high quality is to prepare single crystal films on arbitrary substrates. Here we describe two significant advances towards

Headrick, Randall L.

320

Trigger-Wave Propagation in Arbitrary Metrics in Asynchronous Cellular Logic Arrays  

E-Print Network [OSTI]

Trigger-Wave Propagation in Arbitrary Metrics in Asynchronous Cellular Logic Arrays Przemyslaw image processing tasks using trigger-wave propagation in a medium with a hardware-controlled metric. The principles of wave propagation in cellular four-connected logic arrays emulating different distance measure

Dudek, Piotr

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Multiuser Mercury/waterfilling for Downlink OFDM with Arbitrary Signal Constellations  

E-Print Network [OSTI]

Multiuser Mercury/waterfilling for Downlink OFDM with Arbitrary Signal Constellations Angel Lozano tracked by the base station, adopts the form of a multiuser mercury/waterfilling procedure that generalizes the single-user mercury/waterfilling introduced in [1]. I. INTRODUCTION There is, of late, great

Lozano, Angel

322

The Arbitrariness of the Sign: Learning Advantages From the Structure of the Vocabulary  

E-Print Network [OSTI]

the simulations and the behavioral studies, we found that the optimal structure of the vocabulary for learningThe Arbitrariness of the Sign: Learning Advantages From the Structure of the Vocabulary Padraic and their meanings can facilitate language learning (e.g., in the form of sound symbolism or cues to grammatical

323

Conditional generation of arbitrary multimode entangled states of light with linear optics  

E-Print Network [OSTI]

We propose a universal scheme for the probabilistic generation of an arbitrary multimode entangled state of light with finite expansion in Fock basis. The suggested setup involves passive linear optics, single photon sources, strong coherent laser beams, and photodetectors with single-photon resolution. The efficiency of this setup may be greatly enhanced if, in addition, a quantum memory is available.

J. Fiurasek; S. Massar; N. J. Cerf

2003-04-01T23:59:59.000Z

324

Factorization of Darboux transformations of arbitrary order for 2D Schroedinger operators  

E-Print Network [OSTI]

We give a proof of Darboux's conjecture that every Darboux transformation of arbitrary order of a 2D Schroedinger type operator can be factorized into Darboux transformations of order one. The proof is constructive. The result was achieved in the framework of an algebraic approach to Darboux transformations which is put forward in this paper.

Ekaterina Shemyakova

2014-02-24T23:59:59.000Z

325

Comment on the shape of Hydrogen equation in spaces of arbitrary dimension  

E-Print Network [OSTI]

We note that presenting Hydrogen atom Schrodinger equation in the case of arbitrary dimensions require simultaneous modification of the Coulomb potential that only in three dimensions has the form Z/r . This was not done in a number of relatively recent papers [1-5]. Therefore some results obtained there seem to be doubtful. Some required considerations in the area are mentioned.

M. Ya. Amusia

2015-02-20T23:59:59.000Z

326

Minkovskii-type inequality for arbitrary density matrix of composite and noncomposite systems  

E-Print Network [OSTI]

New kind of matrix inequality known for bipartite system density matrix is obtained for arbitrary density matrix of composite or noncomposite qudit systems including the single qudit state. The examples of two qubit system and qudit with j=3/2 are discussed.

V. N. Chernega; O. V. Manko; V. I. Manko

2014-05-20T23:59:59.000Z

327

Error Floors of LDPC Codes and Related Topics  

E-Print Network [OSTI]

Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.2 LDPC Codes . . . . . . . .2.1 Binary Linear Block Codes . . . . . . .

Butler, Brian K.

328

Energy Codes at a Glance  

SciTech Connect (OSTI)

Feeling dim from energy code confusion? Read on to give your inspections a charge. The U.S. Department of Energy’s Building Energy Codes Program addresses hundreds of inquiries from the energy codes community every year. This article offers clarification for topics of confusion submitted to BECP Technical Support of interest to electrical inspectors, focusing on the residential and commercial energy code requirements based on the most recently published 2006 International Energy Conservation Code® and ANSI/ASHRAE/IESNA1 Standard 90.1-2004.

Cole, Pamala C.; Richman, Eric E.

2008-09-01T23:59:59.000Z

329

Wyner-Ziv coding based on TCQ and LDPC codes and extensions to multiterminal source coding  

E-Print Network [OSTI]

to approach the Wyner-Ziv distortion limit D??W Z(R), the trellis coded quantization (TCQ) technique is employed to quantize the source X, and irregular LDPC code is used to implement Slepian-Wolf coding of the quantized source input Q(X) given the side...

Yang, Yang

2005-11-01T23:59:59.000Z

330

MARS15 Code Developments Driven by the Intensity Frontier Needs  

E-Print Network [OSTI]

The MARS15(2012) is the latest version of a multi-purpose Monte-Carlo code developed since 1974 for detailed simulation of hadronic and electromagnetic cascades in an arbitrary 3-D geometry of shielding, accelerator, detector and spacecraft components with energy ranging from a fraction of an electronvolt to 100 TeV. Driven by needs of the intensity frontier projects with their Megawatt beams, e.g., ESS, FAIR and Project X, the code has been recently substantially improved and extended. These include inclusive and exclusive particle event generators in the 0.7 to 12 GeV energy range, proton inelastic interaction modeling below 20 MeV, implementation of the EGS5 code for electromagnetic shower simulation at energies from 1 keV to 20 MeV, stopping power description in compound materials, new module for DPA calculations for neutrons from a fraction of eV to 20-150 MeV, user-friendly DeTra-based method to calculate nuclide inventories, and new ROOT-based geometry.

Mokhov, N V; Rakhno, I L; Striganov, S I; Tropin, I S; Eidelman, Yu I; Aarnio, P; Gudima, K K; Konobeev, A Yu

2014-01-01T23:59:59.000Z

331

Midwest Energy Codes Project  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion | Department ofT ib l L d F S i DOE TribaltheMy nameMid-LevelMidwest Energy Codes Project 2014

332

Warm wave breaking of nonlinear plasma waves with arbitrary phase velocities C. B. Schroeder, E. Esarey, and B. A. Shadwick  

E-Print Network [OSTI]

Warm wave breaking of nonlinear plasma waves with arbitrary phase velocities C. B. Schroeder, E, collisionless plasma is developed to analyze nonlinear plasma waves excited by intense drive beams. The maximum amplitude and wavelength are calculated for nonrelativistic plasma temperatures and arbitrary plasma wave

Geddes, Cameron Guy Robinson

333

Two Poisson structures invariant with respect to discrete transformation in the case of arbitrary semi-simple algebras  

E-Print Network [OSTI]

Two Poisson structures invariant with respect to discrete transformation of the Maximal root in the case of arbitrary semi-simple algebras are presented in explicit form. Thus the problem of construction of equations of n-wave hierarchy in the case of arbitrary semi simple algebra is solved finally.

A. N. Leznov

2008-01-16T23:59:59.000Z

334

X-Band EPR Spectrometer with Customizable Arbitrary Waveform Generator based on a 1 GHz DAC Board  

E-Print Network [OSTI]

X-Band EPR Spectrometer with Customizable Arbitrary Waveform Generator based on a 1 GHz DAC Board-4120 , Email: songi@chem.ucsb.edu Abstract We present an EPR spectrometer featuring an arbitrary waveform of pulsed electron paramagnetic resonance (EPR) and enable new experiments. It generates shaped X

Martinis, John M.

335

PICLE: a 2-D code for laser-beam - gas-jet interaction studies  

SciTech Connect (OSTI)

A heat transport hydrodynamic PIC code was adapted for application to the KMSF gas-jet experiments. The input material density profile was changed from the original solid slab geometry to a cylindrically symmetric profile modeling the gas-jet plume. The target material was changed from the original Z = 1 to arbitrary Z. Energy deposition was modified to include inverse bremsstrahlung and resonance absorption. Preliminary results indicate electron thermal conduction dominates over mass flow for times up to about the laser pulse length. Electron thermal conduction is seen to vary between classical and flux-limited values spatially and temporally according to plasma conditions. Applications of this code, entitled PICLE (Particle-In-Cell Laser Equipment code), to absorption and flux-limit parameter studies are described. A source listing and sample input deck are included.

Dunning, M.J.

1981-01-01T23:59:59.000Z

336

Quantum serial turbo-codes  

E-Print Network [OSTI]

We present a theory of quantum serial turbo-codes, describe their iterative decoding algorithm, and study their performances numerically on a depolarization channel. Our construction offers several advantages over quantum LDPC codes. First, the Tanner graph used for decoding is free of 4-cycles that deteriorate the performances of iterative decoding. Secondly, the iterative decoder makes explicit use of the code's degeneracy. Finally, there is complete freedom in the code design in terms of length, rate, memory size, and interleaver choice. We define a quantum analogue of a state diagram that provides an efficient way to verify the properties of a quantum convolutional code, and in particular its recursiveness and the presence of catastrophic error propagation. We prove that all recursive quantum convolutional encoder have catastrophic error propagation. In our constructions, the convolutional codes have thus been chosen to be non-catastrophic and non-recursive. While the resulting families of turbo-codes have bounded minimum distance, from a pragmatic point of view the effective minimum distances of the codes that we have simulated are large enough not to degrade the iterative decoding performance up to reasonable word error rates and block sizes. With well chosen constituent convolutional codes, we observe an important reduction of the word error rate as the code length increases.

David Poulin; Jean-Pierre Tillich; Harold Ollivier

2009-06-10T23:59:59.000Z

337

Turbo and LDPC Codes: Implementation, Simulation,  

E-Print Network [OSTI]

1 Turbo and LDPC Codes: Implementation, Simulation, and Standardization June 7, 2006 Matthew/7/2006 Turbo and LDPC Codes 2/133 Tutorial Overview Channel capacity Convolutional codes ­ the MAP algorithm Turbo codes ­ Standard binary turbo codes: UMTS and cdma2000 ­ Duobinary CRSC turbo codes: DVB

Valenti, Matthew C.

338

Conjugate Codes and Applications to Cryptography  

E-Print Network [OSTI]

A conjugate code pair is defined as a pair of linear codes such that one contains the dual of the other. The conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is argued that conjugate code pairs are applicable to quantum cryptography in order to motivate studies on conjugate code pairs.

Mitsuru Hamada

2006-10-23T23:59:59.000Z

339

Schwinger Mechanism for Fermion Pair Production in the Presence of Arbitrary Time Dependent Background Electric Field  

E-Print Network [OSTI]

We study the Schwinger mechanism for the pair production of fermions in the presence of an arbitrary time-dependent background electric field E(t) by directly evaluating the path integral. We obtain an exact non-perturbative result for the probability of fermion-antifermion pair production per unit time per unit volume per unit transverse momentum (of the fermion or antifermion) from the arbitrary time dependent electric field E(t) via Schwinger mechanism. We find that the exact non-perturbative result is independent of all the time derivatives d^nE(t)/dt^n, where n=1,2,....\\infty. This result has the same functional dependence on E as the Schwinger's constant electric field E result with the replacement: E -> E(t).

Fred Cooper; Gouranga C. Nayak

2006-12-29T23:59:59.000Z

340

Complete hierarchies of SIR models on arbitrary networks with exact and approximate moment closure  

E-Print Network [OSTI]

We first generalise ideas discussed by Kiss et al. (2015) to prove a theorem for generating exact closures (here expressing joint probabilities in terms of their constituent marginal probabilities) for susceptible-infectious-removed (SIR) dynamics on arbitrary graphs (networks). For Poisson transmission and removal processes, this enables us to obtain a systematic reduction in the number of differential equations needed for an exact `moment closure' representation of the underlying stochastic model. We define `transmission blocks' as a possible extension of the block concept in graph theory and show that the order at which the exact moment closure representation is curtailed is the size of the largest transmission block. More generally, approximate closures of the hierarchy of moment equations for these dynamics are typically defined for the first and second order yielding mean-field and pairwise models respectively. It is frequently implied that, in principle, closed models can be written down at arbitrary o...

Sharkey, Kieran J

2015-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Benchmark of the IMPACT Code for High Intensity Beam DynamicsSimulation  

SciTech Connect (OSTI)

The IMPACT (Integrated Map and Particle Accelerator Tracking) code was first developed under Computational Grand Challenge project in the mid 1990s [1]. It started as a three-dimensional (3D) data parallel particle-in-cell (PIC) code written in High Performance Fortran. The code used a split-operator based method to solve the Hamiltonian equations of motion. It contained linear transfer maps for drifts, quadrupole magnets and rf cavities. The space-charge forces were calculated using an FFT-based method with 3D open boundary conditions and longitudinal periodic boundary conditions. This code was completely rewritten in the late 1990s based on a message passing parallel programming paradigm using Fortran 90 and MPI following an object-oriented software design. This improved the code's scalability on large parallel computer systems and also gave the code better software maintainability and extensibility [2]. In the following years, under the SciDAC-1 accelerator project, the code was extended to include more accelerating and focusing elements such as DTL, CCL, superconducting linac, solenoid, dipole, multipoles, and others. Besides the original split-operator based integrator, a direct integration of Lorentz equations of motion using a leap-frog algorithm was also added to the IMPACT code to handle arbitrary external nonlinear fields. This integrator can read in 3D electromagnetic fields in a Cartesian grid or in a cylindrical coordinate system. Using the Lorentz integrator, we also extended the original code to handle multiple charge-state beams. The space-charge solvers were also extended to include conducting wall effects for round and rectangular pipes with longitudinal open and periodic boundary conditions. Recently, it has also been extended to handle short-range wake fields (longitudinal monopole and transverse dipole) and longitudinal coherent synchrotron radiation wake fields. Besides the parallel macroparticle tracking code, an rf linac lattice design code, an envelope matching and analysis code, and a number of pre- and post-processing codes were also developed to form the IMPACT code suite. The IMPACT code suite has been used to study beam dynamics in the SNS linac, the J-PARC linac commissioning, the CERN superconducting linac design, the Los Alamos Low Energy Demonstration Accelerator (LEDA) halo experiment, the Rare Isotope Accelerator (RIA) driver linac design, and the FERMI{at}Elettra FEL linac design [3-8]. It has also been used to study space-charge resonance in anisotropic beams [9-11].

Qiang, J.; Ryne, R.D.

2006-11-16T23:59:59.000Z

342

Clark County- Energy Conservation Code  

Broader source: Energy.gov [DOE]

In September 2010, Clark County adopted Ordinance 3897, implementing the Southern Nevada version of the 2009 International Energy Conservation Code for both residential and commercial buildings...

343

Nonbinary Codeword Stabilized Quantum Codes  

E-Print Network [OSTI]

The codeword stabilized (CWS) quantum codes formalism presents a unifying approach to both additive and nonadditive quantum error-correcting codes (arXiv:0708.1021 [quant-ph]), but only for binary states. Here we generalize the CWS framework to the nonbinary case (of both prime and nonprime dimension) and map the search for nonbinary quantum codes to a corresponding search problem for classical nonbinary codes with specific error patterns. We show that while the additivity properties of nonbinary CWS codes are similar to the binary case, the structural properties of the nonbinary codes differ substantially from the binary case, even for prime dimensions. In particular, we identify specific structure patterns of stabilizer groups, based on which efficient constructions might be possible for codes that encode more dimensions than any stabilizer codes of the same length and distance; similar methods cannot be applied in the binary case. Understanding of these structural properties can help prune the search space and facilitate the identification of good nonbinary CWS codes.

Xie Chen; Bei Zeng; Isaac L. Chuang

2008-08-22T23:59:59.000Z

344

Marin County- Solar Access Code  

Broader source: Energy.gov [DOE]

Marin County's Energy Conservation Code is designed to assure new subdivisions provide for future passive or natural heating or cooling opportunities in the subdivision to the extent feasible. ...

345

Random Walk on an Arbitrary Set By Simon C. Harris, Robin Sibson, and  

E-Print Network [OSTI]

j 6=i q i;j (u j u i ) = 0 for every i: (1:1) Write ` i and r i for the gaps to the leftRandom Walk on an Arbitrary Set By Simon C. Harris, Robin Sibson, and David Williams School be a countably in#12;nite set of points in R, and suppose that I has no points of accumulation and that its

Harris, Simon Colin

346

Practical Formula for Bunch Power Loss in Resonators of Almost Arbitrary Quality Factor  

E-Print Network [OSTI]

SSC-N-142 Practical Formula for Bunch Power Loss in Resonators of Almost Arbitrary Quality Factor a resonant structure with impedance Z() = RS 1 + iQ r - r (1) then the power loss is [1] P = (cf0)2 m in the summation in Eq. (2) yield an accurate estimate for the power loss. If, on the other hand, ~() is very broad

Furman, Miguel

347

Quantum Quasi-Cyclic LDPC Codes  

E-Print Network [OSTI]

In this paper, a construction of a pair of "regular" quasi-cyclic LDPC codes as ingredient codes for a quantum error-correcting code is proposed. That is, we find quantum regular LDPC codes with various weight distributions. Furthermore our proposed codes have lots of variations for length, code rate. These codes are obtained by a descrete mathematical characterization for model matrices of quasi-cyclic LDPC codes. Our proposed codes achieve a bounded distance decoding (BDD) bound, or known as VG bound, and achieve a lower bound of the code length.

Manabu Hagiwara; Hideki Imai

2010-08-28T23:59:59.000Z

348

Super Special Codes using Super Matrices  

E-Print Network [OSTI]

The new classes of super special codes are constructed in this book using the specially constructed super special vector spaces. These codes mainly use the super matrices. These codes can be realized as a special type of concatenated codes. This book has four chapters. In chapter one basic properties of codes and super matrices are given. A new type of super special vector space is constructed in chapter two of this book. Three new classes of super special codes namely, super special row code, super special column code and super special codes are introduced in chapter three. Applications of these codes are given in the final chapter.

W. B. Vasantha Kandasamy; Florentin Smarandache; K. Ilanthenral

2010-06-30T23:59:59.000Z

349

On the logical operators of quantum codes  

E-Print Network [OSTI]

I show how applying a symplectic Gram-Schmidt orthogonalization to the normalizer of a quantum code gives a different way of determining the code's logical operators. This approach may be more natural in the setting where we produce a quantum code from classical codes because the generator matrices of the classical codes form the normalizer of the resulting quantum code. This technique is particularly useful in determining the logical operators of an entanglement-assisted code produced from two classical binary codes or from one classical quaternary code. Finally, this approach gives additional formulas for computing the amount of entanglement that an entanglement-assisted code requires.

Mark M. Wilde

2009-03-30T23:59:59.000Z

350

A Reconstructed Discontinuous Galerkin Method for the Compressible Navier-Stokes Equations on Arbitrary Grids  

SciTech Connect (OSTI)

A reconstruction-based discontinuous Galerkin (RDG) method is presented for the solution of the compressible Navier–Stokes equations on arbitrary grids. The RDG method, originally developed for the compressible Euler equations, is extended to discretize viscous and heat fluxes in the Navier–Stokes equations using a so-called inter-cell reconstruction, where a smooth solution is locally reconstructed using a least-squares method from the underlying discontinuous DG solution. Similar to the recovery-based DG (rDG) methods, this reconstructed DG method eliminates the introduction of ad hoc penalty or coupling terms commonly found in traditional DG methods. Unlike rDG methods, this RDG method does not need to judiciously choose a proper form of a recovered polynomial, thus is simple, flexible, and robust, and can be used on arbitrary grids. The developed RDG method is used to compute a variety of flow problems on arbitrary meshes to demonstrate its accuracy, efficiency, robustness, and versatility. The numerical results indicate that this RDG method is able to deliver the same accuracy as the well-known Bassi–Rebay II scheme, at a half of its computing costs for the discretization of the viscous fluxes in the Navier–Stokes equations, clearly demonstrating its superior performance over the existing DG methods for solving the compressible Navier–Stokes equations.

Hong Luo; Luqing Luo; Robert Nourgaliev; Vincent A. Mousseau

2010-09-01T23:59:59.000Z

351

A Reconstructed Discontinuous Galerkin Method for the Compressible Navier-Stokes Equations on Arbitrary Grids  

SciTech Connect (OSTI)

A reconstruction-based discontinuous Galerkin (RDG) method is presented for the solution of the compressible Navier-Stokes equations on arbitrary grids. The RDG method, originally developed for the compressible Euler equations, is extended to discretize viscous and heat fluxes in the Navier-Stokes equations using a so-called inter-cell reconstruction, where a smooth solution is locally reconstructed using a least-squares method from the underlying discontinuous DG solution. Similar to the recovery-based DG (rDG) methods, this reconstructed DG method eliminates the introduction of ad hoc penalty or coupling terms commonly found in traditional DG methods. Unlike rDG methods, this RDG method does not need to judiciously choose a proper form of a recovered polynomial, thus is simple, flexible, and robust, and can be used on arbitrary grids. The developed RDG method is used to compute a variety of flow problems on arbitrary meshes to demonstrate its accuracy, efficiency, robustness, and versatility. The numerical results indicate that this RDG method is able to deliver the same accuracy as the well-known Bassi-Rebay II scheme, at a half of its computing costs for the discretization of the viscous fluxes in the Navier-Stokes equations, clearly demonstrating its superior performance over the existing DG methods for solving the compressible Navier-Stokes equations.

Hong Luo; Luqing Luo; Robert Nourgaliev; Vincent A. Mousseau

2010-01-01T23:59:59.000Z

352

Rate-Adaptive Codes for Distributed Source Coding David Varodayan  

E-Print Network [OSTI]

S with respect to a channel code C. Upon receipt of the syndrome, the distributed source decoder can narrow down- proach with their DISCUS framework [7]. The distributed source encoder compresses X into its syndrome is an at- tractive solution. The encoder transmits a short syndrome based on an aggressive code

Girod, Bernd

353

FOUNDATION REVENUE OBJECT CODES LSU Foundation Revenue Object Codes  

E-Print Network [OSTI]

FOUNDATION REVENUE OBJECT CODES 4 page 1 LSU Foundation Revenue Object Codes 0F00 Foundation - Balance Forward 0F01 Foundation - Other Contributions 0F02 Foundation - State of Louisiana 0F03 Foundation - Corporate Contributions 0F04 Foundation - Corporate Match Contributions 0F05 Foundation - Individual

Harms, Kyle E.

354

Non-Residential Energy Code National and Regional Codes  

E-Print Network [OSTI]

Non-Residential Energy Code Comparison National and Regional Codes David Baylon Mike Kennedy #12 2003 · ASHRAE 90.1 2001 & addenda · E-Benchmark Guidelines (NBI) #12;Approach · Comparison of the State;Approach (cont.) · Provisions compared ­ Lighting power ­ Lighting controls ­ Mechanical systems ­ Building

355

Building and Facility Codes Code Building Location Bldg # Coordinates  

E-Print Network [OSTI]

Building and Facility Codes Code Building Location Bldg # Coordinates APM Applied Physics & Mathematics Building Muir 249 F7 ASANT Asante Hall Eleanor Roosevelt 446 F5 BIO Biology Building Muir 259 F7 BIRCH Birch Aquarium SIO 2300 S-D7 BONN Bonner Hall Revelle 131 G8 BSB Biomedical Sciences Building

Russell, Lynn

356

Space time coded code division multiplexing on SC140 DSP  

E-Print Network [OSTI]

The aim of this research is to design a high data rate wireless communication system for multi-path fading channels. Code-division multiplexing is proposed as a modulation scheme for a space-time coded multiple antenna system that would guarantee...

Menon, Murali P

2001-01-01T23:59:59.000Z

357

T-549: Adobe ColdFusion 9.0.1 CHF1 and earlier  

Broader source: Energy.gov [DOE]

Cross-site scripting (XSS) vulnerability in Adobe ColdFusion before 9.0.1 CHF1 allows remote attackers to inject arbitrary web script or HTML via vectors involving a "tag script.

358

ITS Version 6 : the integrated TIGER series of coupled electron/photon Monte Carlo transport codes.  

SciTech Connect (OSTI)

ITS is a powerful and user-friendly software package permitting state-of-the-art Monte Carlo solution of lineartime-independent coupled electron/photon radiation transport problems, with or without the presence of macroscopic electric and magnetic fields of arbitrary spatial dependence. Our goal has been to simultaneously maximize operational simplicity and physical accuracy. Through a set of preprocessor directives, the user selects one of the many ITS codes. The ease with which the makefile system is applied combines with an input scheme based on order-independent descriptive keywords that makes maximum use of defaults and internal error checking to provide experimentalists and theorists alike with a method for the routine but rigorous solution of sophisticated radiation transport problems. Physical rigor is provided by employing accurate cross sections, sampling distributions, and physical models for describing the production and transport of the electron/photon cascade from 1.0 GeV down to 1.0 keV. The availability of source code permits the more sophisticated user to tailor the codes to specific applications and to extend the capabilities of the codes to more complex applications. Version 6, the latest version of ITS, contains (1) improvements to the ITS 5.0 codes, and (2) conversion to Fortran 90. The general user friendliness of the software has been enhanced through memory allocation to reduce the need for users to modify and recompile the code.

Franke, Brian Claude; Kensek, Ronald Patrick; Laub, Thomas William

2008-04-01T23:59:59.000Z

359

PostScript file  

E-Print Network [OSTI]

For the Bona-Smith system (a = 0,b > 0,c 0) the decay ..... amplitude long waves in nonlinear dispersive media I: Derivation and the linear theory, J.

360

Example Hopper Batch Scripts  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvan FelixExperimentsExample Batch

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Batch Script Examples  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to someone6 M. Babzien, I. Ben-Zvi, P. Study ofJ UBasicsQueues andBatch

362

Parallel Batch Scripts  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratorySpeedingOptimizingToolsto control intensePageveterans4 -

363

LFSC - Linac Feedback Simulation Code  

SciTech Connect (OSTI)

The computer program LFSC (Code>) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output.

Ivanov, Valentin; /Fermilab

2008-05-01T23:59:59.000Z

364

Secure Symmetrical Multilevel Diversity Coding  

E-Print Network [OSTI]

Secure symmetrical multilevel diversity coding (S-SMDC) is a source coding problem, where a total of L - N discrete memoryless sources (S1,...,S_L-N) are to be encoded by a total of L encoders. This thesis considers a natural generalization of SMDC...

Li, Shuo

2012-07-16T23:59:59.000Z

365

Stabilizer Codes over Frobenius Rings  

E-Print Network [OSTI]

now, the methods for quantum error correction were mainly based on quantum codes that rely on the arithmetic in finite fields. In contrast, this thesis aims to develop a basic framework for quantum error correcting codes over a class of rings known...

Nadella, Sushma

2012-07-16T23:59:59.000Z

366

CODE OF PRACTICE HYDROGEN SULFIDE  

E-Print Network [OSTI]

CODE OF PRACTICE HYDROGEN SULFIDE 1 The following generic Code of Practice applies to all work areas within the University of Alberta that use hydrogen sulfide gas. It outlines responsibilities, safe procedure requirements. All work areas where hydrogen sulfide is used within the University of Alberta must

Machel, Hans

367

CODE OF PRACTICE HYDROGEN SULFIDE  

E-Print Network [OSTI]

CODE OF PRACTICE HYDROGEN SULFIDE Rev January 2013 1 The following generic Code of Practice applies to all work areas within the University of Alberta that use hydrogen sulfide gas or where hydrogen response procedure requirements. All work areas where hydrogen sulfide is used or may be present within

Machel, Hans

369

Weight Distribution of a Class of Binary Linear Block Codes Formed from RCPC Codes  

E-Print Network [OSTI]

formed from convolutional codes,” IEEE Trans. Commun. , vol.terminated convolutional codes,” IEEE Trans. Inform. Theory,decoding of linear block codes and related soft- decision

Shen, Yushi Dr.; Cosman, Pamela C; Milstein, Laurence B

2006-01-01T23:59:59.000Z

370

Introduction Space Time Codes Space Time Coding with Feedback New Thoughts Summary Space-Time Coding for Multi-Antenna  

E-Print Network [OSTI]

Introduction Space Time Codes Space Time Coding with Feedback New Thoughts Summary Space 2007 #12;Introduction Space Time Codes Space Time Coding with Feedback New Thoughts Summary MIMO: Diversity vs Multiplexing Multiplexing Diversity Pictures taken from lectures notes on Space Time Coding

Veeravalli, Venugopal

371

Entanglement boosts quantum turbo codes  

E-Print Network [OSTI]

One of the unexpected breakdowns in the existing theory of quantum serial turbo coding is that a quantum convolutional encoder cannot simultaneously be recursive and non-catastrophic. These properties are essential for a quantum turbo code to have an unbounded minimum distance and for its iterative decoding algorithm to converge, respectively. Here, we show that the entanglement-assisted paradigm gives a theoretical and practical "turbo boost" to these codes, in the sense that an entanglement-assisted quantum (EAQ) convolutional encoder can possess both of the aforementioned desirable properties, and simulation results indicate that entanglement-assisted turbo codes can operate reliably in a noise regime 5.5 dB beyond that of standard quantum turbo codes. Entanglement is the resource that enables a convolutional encoder to satisfy both properties because an encoder acting on only information qubits, classical bits, gauge qubits, and ancilla qubits cannot simultaneously satisfy them. We give several examples o...

Wilde, Mark M

2010-01-01T23:59:59.000Z

372

Remarkable Degenerate Quantum Stabilizer Codes Derived from Duadic Codes  

E-Print Network [OSTI]

Good quantum codes, such as quantum MDS codes, are typically nondegenerate, meaning that errors of small weight require active error-correction, which is--paradoxically--itself prone to errors. Decoherence free subspaces, on the other hand, do not require active error correction, but perform poorly in terms of minimum distance. In this paper, examples of degenerate quantum codes are constructed that have better minimum distance than decoherence free subspaces and allow some errors of small weight that do not require active error correction. In particular, two new families of [[n,1,>= sqrt(n)

Salah A. Aly; Andreas Klappenecker; Pradeep Kiran Sarvepalli

2006-01-18T23:59:59.000Z

373

On Quantum and Classical BCH Codes  

E-Print Network [OSTI]

Classical BCH codes that contain their (Euclidean or Hermitian) dual codes can be used to construct quantum stabilizer codes; this correspondence studies the properties of such codes. It is shown that a BCH code of length n can contain its dual code only if its designed distance d=O(sqrt(n)), and the converse is proved in the case of narrow-sense codes. Furthermore, the dimension of narrow-sense BCH codes with small design distance is completely determined, and - consequently - the bounds on their minimum distance are improved. These results make it possible to determine the parameters of quantum BCH codes in terms of their design parameters.

Salah A. Aly; Andreas Klappenecker; Pradeep Kiran Sarvepalli

2006-04-14T23:59:59.000Z

374

Computing observables in curved multifield models of inflation - A guide (with code) to the transport method  

E-Print Network [OSTI]

We describe how to apply the transport method to compute inflationary observables in a broad range of multiple-field models. The method is efficient and encompasses scenarios with curved field-space metrics, violations of slow-roll conditions and turns of the trajectory in field space. It can be used for an arbitrary mass spectrum, including massive modes and models with quasi-single-field dynamics. In this note we focus on practical issues. It is accompanied by a Mathematica code which can be used to explore suitable models, or as a basis for further development.

Mafalda Dias; Jonathan Frazer; David Seery

2015-02-10T23:59:59.000Z

375

Computing observables in curved multifield models of inflation - A guide (with code) to the transport method  

E-Print Network [OSTI]

We describe how to apply the transport method to compute inflationary observables in a broad range of multiple-field models. The method is efficient and encompasses scenarios with curved field-space metrics, violations of slow-roll conditions and turns of the trajectory in field space. It can be used for an arbitrary mass spectrum, including massive modes and models with quasi-single-field dynamics. In this note we focus on practical issues. It is accompanied by a Mathematica code which can be used to explore suitable models, or as a basis for further development.

Dias, Mafalda; Seery, David

2015-01-01T23:59:59.000Z

376

A Computational Method for Determining Distributed Aerodynamic Loads on Planforms of Arbitrary Shape in Compressible Subsonic Flow  

E-Print Network [OSTI]

The methods presented in this work are intended to provided an easy to understand and easy to apply method for determining the distributed aerodynamic loads and aerodynamic characteristics of planforms of nearly arbitrary shape. Through application...

Brown, Matthew Alan

2013-12-31T23:59:59.000Z

377

deForm: An interactive malleable surface for capturing 2.5D arbitrary objects, tools and touch  

E-Print Network [OSTI]

We introduce a novel input device, deForm, that supports 2.5D touch gestures, tangible tools, and arbitrary objects through real-time structured light scanning of a malleable surface of interaction. DeForm captures ...

Ishii, Hiroshi

378

San Francisco Building Code Amendments to the  

E-Print Network [OSTI]

Green Building Standards Code 2010 California Residential Code Operative date: January 1, 2011 #12;2 #121 2010 San Francisco Building Code Amendments to the 2010 California Building Code 2010 California;3 CHAPTER 1 SCOPE AND ADMINISTRATION DIVISION I CALIFORNIA ADMINISTRATION No San Francisco Building Code

379

Spherical codes, maximal local packing density, and the golden ratio  

E-Print Network [OSTI]

The densest local packing (DLP) problem in d-dimensional Euclidean space Rd involves the placement of N nonoverlapping spheres of unit diameter near an additional fixed unit-diameter sphere such that the greatest distance from the center of the fixed sphere to the centers of any of the N surrounding spheres is minimized. Solutions to the DLP problem are relevant to the realizability of pair correlation functions for packings of nonoverlapping spheres and might prove useful in improving upon the best known upper bounds on the maximum packing fraction of sphere packings in dimensions greater than three. The optimal spherical code problem in Rd involves the placement of the centers of N nonoverlapping spheres of unit diameter onto the surface of a sphere of radius R such that R is minimized. It is proved that in any dimension, all solutions between unity and the golden ratio to the optimal spherical code problem for N spheres are also solutions to the corresponding DLP problem. It follows that for any packing of nonoverlapping spheres of unit diameter, a spherical region of radius less than or equal to the golden ratio centered on an arbitrary sphere center cannot enclose a number of sphere centers greater than one more than the number that can be placed on the region's surface.

A. B. Hopkins; F. H. Stillinger; S. Torquato

2010-03-18T23:59:59.000Z

380

Study of stopping power for a proton moving in a plasma with arbitrary degeneracy  

SciTech Connect (OSTI)

Excitation of bulk solid electrons with arbitrary degeneracy, by external charged particles, is investigated by a two-dimensional nonlinear quantum hydrodynamic (QHD) model. The nonlinear stopping power and wake potential are calculated by solving the nonlinear QHD equations with the flux corrected transport numerical method. Two cases of fully degenerated and partially degenerated electrons are compared and discussed in the same self-consistent QHD model. Our results are consistent with the well known dielectric calculation of the stopping power at higher velocity, but include the nonlinear terms of the interactions and give larger stopping power at smaller velocity.

Zhang, Ya; Song, Yuan-Hong; Wang, You-Nian [School of Physics and Optoelectronic Technology, Dalian University of Technology, Dalian 116024 (China)] [School of Physics and Optoelectronic Technology, Dalian University of Technology, Dalian 116024 (China)

2013-10-15T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Predictive wavefront control for Adaptive Optics with arbitrary control loop delays  

SciTech Connect (OSTI)

We present a modification of the closed-loop state space model for AO control which allows delays that are a non-integer multiple of the system frame rate. We derive the new forms of the Predictive Fourier Control Kalman filters for arbitrary delays and show that they are linear combinations of the whole-frame delay terms. This structure of the controller is independent of the delay. System stability margins and residual error variance both transition gracefully between integer-frame delays.

Poyneer, L A; Veran, J

2007-10-30T23:59:59.000Z

382

Arbitrary-level hanging nodes for adaptive hphp-FEM approximations in 3D  

SciTech Connect (OSTI)

In this paper we discuss constrained approximation with arbitrary-level hanging nodes in adaptive higher-order finite element methods (hphp-FEM) for three-dimensional problems. This technique enables using highly irregular meshes, and it greatly simplifies the design of adaptive algorithms as it prevents refinements from propagating recursively through the finite element mesh. The technique makes it possible to design efficient adaptive algorithms for purely hexahedral meshes. We present a detailed mathematical description of the method and illustrate it with numerical examples.

Pavel Kus; Pavel Solin; David Andrs

2014-11-01T23:59:59.000Z

383

Longitudinal permeability of collisional plasmas under arbitrary degree of degeneration of electron gas  

E-Print Network [OSTI]

Electric conductivity and dielectric permeability of the non-degenerate electronic gas for the collisional plasmas under arbitrary degree of degeneration of electron gas is found. The kinetic equation of Wigner - Vlasov - Boltzmann with collision integral in relaxation form BGK (Bhatnagar, Gross and Krook) in coordinate space is used. Dielectric permeability with using of the relaxation equation in the momentum space has been received by Mermin. Comparison with Mermin's formula has been realized. It is shown, that in the limit when Planck's constant tends to zero expression for dielectric permeability passes in the classical.

A. V. Latyshev; A. A. Yushkanov

2010-03-04T23:59:59.000Z

384

Effect of a polynomial arbitrary dust size distribution on dust acoustic solitons  

SciTech Connect (OSTI)

The investigation of dust-acoustic solitons when dust grains are size-distributed and ions adiabatically heated is conducted. The influence of an arbitrary dust size-distribution described by a polynomial function on the properties of dust acoustic waves is investigated. An energy-like integral equation involving Sagdeev potential is derived. The solitary solutions are shown to undergo a transformation into cnoidal ones under some physical conditions. The dust size-distribution can significantly affect both lower and upper critical Mach numbers for both solitons and cnoidal solutions.

Ishak-Boushaki, M.; Djellout, D.; Annou, R. [Faculty of Physics, USTHB, P.B. 32 El Alia, Bab-ezzouar, Algiers (Algeria)

2012-07-15T23:59:59.000Z

385

Example of Environmental Restoration Code of Accounts  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This chapter describes the fundamental structure of an example remediation cost code system, lists and describes the Level 1 cost codes, and lists the Level 2 and Level 3 cost codes.

1997-03-28T23:59:59.000Z

386

DEPARTMENT CODE Department of Computer Science  

E-Print Network [OSTI]

DEPARTMENT CODE Department of Computer Science College of Natural Sciences Colorado State and Amendment of this Code 19 #12;1 MISSION AND OBJECTIVES 3 Preamble This Code of the Department of Computer

387

Arkansas Underground Injection Control Code (Arkansas)  

Broader source: Energy.gov [DOE]

The Arkansas Underground Injection Control Code (UIC code) is adopted pursuant to the provisions of the Arkansas Water and Air Pollution Control Act (Arkansas Code Annotated 8-5-11). It is the...

388

Entanglement-assisted codeword stabilized quantum codes  

SciTech Connect (OSTI)

Entangled qubits can increase the capacity of quantum error-correcting codes based on stabilizer codes. In addition, by using entanglement quantum stabilizer codes can be construct from classical linear codes that do not satisfy the dual-containing constraint. We show that it is possible to construct both additive and nonadditive quantum codes using the codeword stabilized quantum code framework. Nonadditive codes may offer improved performance over the more common stabilizer codes. Like other entanglement-assisted codes, the encoding procedure acts only on the qubits on Alice's side, and only these qubits are assumed to pass through the channel. However, errors in the codeword stabilized quantum code framework give rise to effective Z errors on Bob's side. We use this scheme to construct entanglement-assisted nonadditive quantum codes, in particular, ((5,16,2;1)) and ((7,4,5;4)) codes.

Shin, Jeonghwan; Heo, Jun; Brun, Todd A. [School of Electrical Engineering, Korea University, Seoul (Korea, Republic of); Communication Sciences Institute, University of Southern California, Los Angeles, California 90089 (United States)

2011-12-15T23:59:59.000Z

389

Entanglement-assisted codeword stabilized quantum codes  

E-Print Network [OSTI]

Entangled qubit can increase the capacity of quantum error correcting codes based on stabilizer codes. In addition, by using entanglement quantum stabilizer codes can be construct from classical linear codes that do not satisfy the dual-containing constraint. We show that it is possible to construct both additive and non-additive quantum codes using the codeword stabilized quantum code framework. Nonadditive codes may offer improved performance over the more common sta- bilizer codes. Like other entanglement-assisted codes, the encoding procedure acts only the qubits on Alice's side, and only these qubits are assumed to pass through the channel. However, errors the codeword stabilized quantum code framework gives rise to effective Z errors on Bob side. We use this scheme to construct new entanglement-assisted non-additive quantum codes, in particular, ((5,16,2;1)) and ((7,4,5;4)) codes.

Jeonghwan Shin; Jun Heo; Todd A. Brun

2011-09-15T23:59:59.000Z

390

STDS91.COD: Grief and Mourning Codes  

E-Print Network [OSTI]

conflict 2000 Age of Marriage, Females (code book variable87) N Code NA Meaning Missing data Scores range from 8.2 toGRIEF AND MOURNING CODES Paul C. Rosenblatt Department of

Rosenblatt, Paul C.; Walsh, R. Patricia; Jackson, Douglas A.

2011-01-01T23:59:59.000Z

391

LDPC codes : structural analysis and decoding techniques  

E-Print Network [OSTI]

to Low-Density Parity-Check Codes 2.1 Representation of LDPC4.2 Error Floors of LDPC Codes . . . . . . . . . . . . . . .LP Decoding of LDPC Codes with Alternating Direction Method

Zhang, Xiaojie

2012-01-01T23:59:59.000Z

392

Codes for the fast SSS QR eigens  

E-Print Network [OSTI]

Fortran 90 codes (zip file); Matlab codes (zip file). Please email. A fast O(n^2) time QR eigensolver for companion matrices/polynomials. Fortran 90 codes (zip ...

393

Graphical models for coding and computation  

E-Print Network [OSTI]

n, k, d ) linear code over F q , with generator matrix G andrepresents the generator matrix of a random linear code. Asrepresents the generator matrix of a random linear code. As

Santhi, Nandakishore

2006-01-01T23:59:59.000Z

394

08/04/2005 09:17 AMPentagon's New Goal: Put Science Into Scripts -New York Times Page 1 of 2http://www.nytimes.com/2005/08/04/movies/04flyb.html?ei=5070&en=ac6783c49c5cc94f&ex=1123819200&emc=eta1&pagewanted=print  

E-Print Network [OSTI]

for help with accuracy. For now, though, the hopes of the Pentagon for a science-friendly cinema seem08/04/2005 09:17 AMPentagon's New Goal: Put Science Into Scripts - New York Times Page 1 of 2http=print August 4, 2005 Pentagon's New Goal: Put Science Into Scripts By DAVID M. HALBFINGER LOS ANGELES, Aug. 3

Valero-Cuevas, Francisco

395

Budget/Object Codes -REVENUE Budget/Object Codes -REVENUE BUDGET/OBJECT BUDGET/OBJECT  

E-Print Network [OSTI]

Budget/Object Codes -REVENUE Budget/Object Codes - REVENUE BUDGET/OBJECT BUDGET/OBJECT BUDGET CODE DESCRIPTION BUDGET CODE DESCRIPTION 01 30 0101 On-Campus-Full Time 3001 Federal Program 0102 On APPROPRIATIONS #12;Budget/Object Codes -REVENUE Budget/Object Codes - REVENUE BUDGET/OBJECT BUDGET/OBJECT BUDGET

Selmic, Sandra

396

MultiModeCode: An efficient numerical solver for multifield inflation  

E-Print Network [OSTI]

We present MultiModeCode, a Fortran 95/2000 package for the numerical exploration of multifield inflation models. This program facilitates efficient Monte Carlo sampling of prior probabilities for inflationary model parameters and initial conditions and is the first publicly available code that can efficiently generate large sample-sets for inflation models with $\\mathcal O(100)$ fields. The code numerically solves the equations of motion for the background and first-order perturbations of multi-field inflation models with canonical kinetic terms and arbitrary potentials, providing the adiabatic, isocurvature, and tensor power spectra at the end of inflation. For models with sum-separable potentials MultiModeCode also computes the slow-roll prediction via the $\\delta N$ formalism for easy model exploration and validation. We pay particular attention to the isocurvature perturbations as the system approaches the adiabatic limit, showing how to avoid numerical instabilities that affect some other approaches to this problem. We demonstrate the use of MultiModeCode by exploring a few toy models. Finally, we give a concise review of multifield perturbation theory and a user's manual for the program.

Layne C. Price; Jonathan Frazer; Jiajun Xu; Hiranya V. Peiris; Richard Easther

2014-10-02T23:59:59.000Z

397

YNOGK: A NEW PUBLIC CODE FOR CALCULATING NULL GEODESICS IN THE KERR SPACETIME  

SciTech Connect (OSTI)

Following the work of Dexter and Agol, we present a new public code for the fast calculation of null geodesics in the Kerr spacetime. Using Weierstrass's and Jacobi's elliptic functions, we express all coordinates and affine parameters as analytical and numerical functions of a parameter p, which is an integral value along the geodesic. This is the main difference between our code and previous similar ones. The advantage of this treatment is that the information about the turning points does not need to be specified in advance by the user, and many applications such as imaging, the calculation of line profiles, and the observer-emitter problem, become root-finding problems. All elliptic integrations are computed by Carlson's elliptic integral method as in Dexter and Agol, which guarantees the fast computational speed of our code. The formulae to compute the constants of motion given by Cunningham and Bardeen have been extended, which allow one to readily handle situations in which the emitter or the observer has an arbitrary distance from, and motion state with respect to, the central compact object. The validation of the code has been extensively tested through applications to toy problems from the literature. The source FORTRAN code is freely available for download on our Web site http://www1.ynao.ac.cn/{approx}yangxl/yxl.html.

Yang Xiaolin; Wang Jiancheng, E-mail: yangxl@ynao.ac.cn [National Astronomical Observatories, Yunnan Observatory, Chinese Academy of Sciences, Kunming 650011 (China)

2013-07-01T23:59:59.000Z

398

Codeword Stabilized Quantum Codes and Their Error Correction  

E-Print Network [OSTI]

5.1.4 Generic CWS codes . . . . . . . . . . .USt codes . . . . . . . . . . . . . . . . . . . . . .Quantum Codes 2.1 Notations . . . . . . . . . . . . . . 2.2

Li, Yunfan

2010-01-01T23:59:59.000Z

399

Algebraic list-decoding of error-correcting codes  

E-Print Network [OSTI]

Solomon codes . . . . . . . . . . . . . . . 1.2.2 Guruswami-Simple trivariate codes and theirdecoding . . . . . . . . . . . . . 3.3.1 Code parameters and

Parvaresh, Farzad

2007-01-01T23:59:59.000Z

400

Gas Code of Conduct (Connecticut)  

Broader source: Energy.gov [DOE]

The Gas Code of Conduct sets forth the standard of conduct for transactions, direct or indirect, between gas companies and their affiliates. The purpose of these regulations is to promote...

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

NFPA's Hydrogen Technologies Code Project  

SciTech Connect (OSTI)

This article discusses the development of National Fire Protection Association 2 (NFPA), a comprehensive hydrogen safety code. It analyses the contents of this document with particular attention focused on new requirements for setting hydrogen storage systems. These new requirements use computational fluid dynamic modeling and risk assessment procedures to develop requirements that are based on both technical analyses and defined risk criteria. The intent is to develop requirements based on procedures that can be replicated based on the information provided in the code document. This code will require documentation of the modeling inputs and risk criteria and analyses in the supporting information. This article also includes a description of the codes and standards that address hydrogen technologies in general.

Rivkin, C. H.

2008-12-01T23:59:59.000Z

402

Commercial Building Codes and Standards  

Broader source: Energy.gov [DOE]

Once an energy-efficient technology or practice is widely available in the market, it can become the baseline of performance through building energy codes and equipment standards. The Building...

403

Optimization of the CMDFT Code  

SciTech Connect (OSTI)

This report outlines the optimization of the CMDFT code by Xiaoguang Zhang during June-July 2006. The overall improvement in speed is nearly 40%. Possible further optimizatins are also discussed.

Zhang, Xiaoguang [ORNL; Kent, P. R. C. [University of Tennessee, Knoxville (UTK)

2011-09-01T23:59:59.000Z

404

Montana Coal Mining Code (Montana)  

Broader source: Energy.gov [DOE]

The Department of Labor and Industry is authorized to adopt rules pertaining to safety standards for all coal mines in the state. The Code requires coal mine operators to make an accurate map or...

405

Edge equilibrium code for tokamaks  

SciTech Connect (OSTI)

The edge equilibrium code (EEC) described in this paper is developed for simulations of the near edge plasma using the finite element method. It solves the Grad-Shafranov equation in toroidal coordinate and uses adaptive grids aligned with magnetic field lines. Hermite finite elements are chosen for the numerical scheme. A fast Newton scheme which is the same as implemented in the equilibrium and stability code (ESC) is applied here to adjust the grids.

Li, Xujing [Institute of Computational Mathematics and Scientific/Engineering Computing, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, P.O. Box 2719, Beijing 100190 (China)] [Institute of Computational Mathematics and Scientific/Engineering Computing, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, P.O. Box 2719, Beijing 100190 (China); Zakharov, Leonid E. [Princeton Plasma Physics Laboratory Princeton, MS-27 P.O. Box 451, New Jersey (United States)] [Princeton Plasma Physics Laboratory Princeton, MS-27 P.O. Box 451, New Jersey (United States); Drozdov, Vladimir V. [Euratom/CCFE Fusion Association, Culham Science Centre, Abingdon OX14 3DB (United Kingdom)] [Euratom/CCFE Fusion Association, Culham Science Centre, Abingdon OX14 3DB (United Kingdom)

2014-01-15T23:59:59.000Z

406

Rotationally invariant multilevel block codes  

E-Print Network [OSTI]

ROTATIONALLY INVARIANT MULTILEVEL BLOCK CODES A Thesis by ANITA KULANDAIVELU Submitted to the Office of Graduate Studies of Texas AfjrM University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE December 1993... Major Subject: Electrical Engineering ROTATIONALLY INVARIANT MULTILEVEL BLOCK CODES A Thesis by ANITA KULANDAIVELU Submitted to Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved...

Kulandaivelu, Anita

1993-01-01T23:59:59.000Z

407

Quantum stabilizer codes and beyond  

E-Print Network [OSTI]

QUANTUM STABILIZER CODES AND BEYOND A Dissertation by PRADEEP KIRAN SARVEPALLI Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY August 2008 Major... Subject: Computer Science QUANTUM STABILIZER CODES AND BEYOND A Dissertation by PRADEEP KIRAN SARVEPALLI Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY...

Sarvepalli, Pradeep Kiran

2008-10-10T23:59:59.000Z

408

Program School/ Career: Descripton ISIS Program Codes  

E-Print Network [OSTI]

Program School/ Career: Descripton ISIS Program Codes Program Career: Descripton College School;Program School/ Career: Descripton ISIS Program Codes Program Career: Descripton College School/ College 1

Wisconsin at Madison, University of

409

Building Energy Codes Collaborative Technical Assistance for...  

Energy Savers [EERE]

State Energy Officials - 2014 BTO Peer Review Southeast Energy Efficiency Alliance's Building Energy Codes Project Reducing Energy Demand in Buildings Through State Energy Codes...

410

Trace formulae for non-equilibrium Casimir interactions, heat radiation and heat transfer for arbitrary objects  

E-Print Network [OSTI]

We present a detailed derivation of heat radiation, heat transfer and (Casimir) interactions for N arbitrary objects in the framework of fluctuational electrodynamics in thermal non-equilibrium. The results can be expressed as basis-independent trace formulae in terms of the scattering operators of the individual objects. We prove that heat radiation of a single object is positive, and that heat transfer (for two arbitrary passive objects) is from the hotter to a colder body. The heat transferred is also symmetric, exactly reversed if the two temperatures are exchanged. Introducing partial wave-expansions, we transform the results for radiation, transfer and forces into traces of matrices that can be evaluated in any basis, analogous to the equilibrium Casimir force. The method is illustrated by (re)deriving the heat radiation of a plate, a sphere and a cylinder. We analyze the radiation of a sphere for different materials, emphasizing that a simplification often employed for metallic nano-spheres is typically invalid. We derive asymptotic formulae for heat transfer and non-equilibrium interactions for the cases of a sphere in front a plate and for two spheres, extending previous results. As an example, we show that a hot nano-sphere can levitate above a plate with the repulsive non-equilibrium force overcoming gravity -- an effect that is not due to radiation pressure.

Matthias Krüger; Giuseppe Bimonte; Thorsten Emig; Mehran Kardar

2012-07-16T23:59:59.000Z

411

Graphical Quantum Error-Correcting Codes  

E-Print Network [OSTI]

We introduce a purely graph-theoretical object, namely the coding clique, to construct quantum errorcorrecting codes. Almost all quantum codes constructed so far are stabilizer (additive) codes and the construction of nonadditive codes, which are potentially more efficient, is not as well understood as that of stabilizer codes. Our graphical approach provides a unified and classical way to construct both stabilizer and nonadditive codes. In particular we have explicitly constructed the optimal ((10,24,3)) code and a family of 1-error detecting nonadditive codes with the highest encoding rate so far. In the case of stabilizer codes a thorough search becomes tangible and we have classified all the extremal stabilizer codes up to 8 qubits.

Sixia Yu; Qing Chen; C. H. Oh

2007-09-12T23:59:59.000Z

412

Codeword stabilized quantum codes on subsystems  

E-Print Network [OSTI]

Codeword stabilized quantum codes provide a unified approach to constructing quantum error-correcting codes, including both additive and non-additive quantum codes. Standard codeword stabilized quantum codes encode quantum information into subspaces. The more general notion of encoding quantum information into a subsystem is known as an operator (or subsystem) quantum error correcting code. Most operator codes studied to date are based in the usual stabilizer formalism. We introduce operator quantum codes based on the codeword stabilized quantum code framework. Based on the necessary and sufficient conditions for operator quantum error correction, we derive a error correction condition for operator codeword stabilized quantum codes. Based on this condition, the word operators of a operator codeword stabilized quantum code are constructed from a set of classical binary errors induced by generators of the gauge group. We use this scheme to construct examples of both additive and non-additive codes that encode quantum information into a subsystem.

Jeonghwan Shin; Jun Heo; Todd A. Brun

2012-08-29T23:59:59.000Z

413

Energy Consumption of Minimum Energy Coding in  

E-Print Network [OSTI]

Energy Consumption of Minimum Energy Coding in CDMA Wireless Sensor Networks Benigno Zurita Ares://www.ee.kth.se/control Abstract. A theoretical framework is proposed for accurate perfor- mance analysis of minimum energy coding energy consumption is analyzed for two coding schemes proposed in the literature: Minimum Energy coding

Johansson, Karl Henrik

414

Presented by Campus Services Object Code Classifications  

E-Print Network [OSTI]

) Decrease expense from the wrong object code (From) Example: Expensed a service contract that covered 12

Stephens, Graeme L.

415

Michigan Technological University_010114 R 10/25/13 Group Number: 71571 Package Code(s): 040 045 Section Code(s): 4000 4200  

E-Print Network [OSTI]

Section Code(s): 4000 4200 PPO - HuskyCare HDHP Benefits-at-a-Glance Michigan Technological University In% after deductible Maternity Services Provided by a Physician Prenatal and Postnatal Care Visits CoveredMichigan Technological University_010114 R 10/25/13 Group Number: 71571 Package Code(s): 040 045

416

A simple family of nonadditive quantum codes  

E-Print Network [OSTI]

Most known quantum codes are additive, meaning the codespace can be described as the simultaneous eigenspace of an abelian subgroup of the Pauli group. While in some scenarios such codes are strictly suboptimal, very little is understood about how to construct nonadditive codes with good performance. Here we present a family of nonadditive quantum codes for all odd blocklengths, n, that has a particularly simple form. Our codes correct single qubit erasures while encoding a higher dimensional space than is possible with an additive code or, for n of 11 or greater, any previous codes.

John A. Smolin; Graeme Smith; Stephanie Wehner

2007-03-20T23:59:59.000Z

417

Parallization of Stellar Atmosphere Codes  

E-Print Network [OSTI]

Parallel computing has turned out to be the enabling technology to solve complex physical systems. However, the transition from shared memory, vector computers to massively parallel, distributed memory systems and, recently, to hybrid systems poses new challenges to the scientist. We want to present a cook-book (with a very strong, personal bias) based on our experience with parallization of our existing codes. Some of the general tools and communication libraries are discussed. Our approach includes a mixture of algorithm, domain and physical module based parallization. The advantages, scalability and limitations of each are discussed at some examples. We want show that it becomes easier to write parallel code with increasing complexity of the physical problem making stellar atmosphere codes beyond the classical assumptions very suitable.

P. Hoeflich

2002-09-19T23:59:59.000Z

418

ASME Code Efforts Supporting HTGRs  

SciTech Connect (OSTI)

In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

D.K. Morton

2011-09-01T23:59:59.000Z

419

ASME Code Efforts Supporting HTGRs  

SciTech Connect (OSTI)

In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

D.K. Morton

2012-09-01T23:59:59.000Z

420

Light-cone gauge approach to arbitrary spin fields, currents, and shadows  

E-Print Network [OSTI]

Totally symmetric arbitrary spin fields in AdS space, conformal fields, conformal currents, and shadow fields in flat space are studied. Light-cone formulation for such fields, currents, and shadows is obtained. Use of the Poincare parametrization of AdS space allows us to treat fields in flat and AdS spaces on equal footing. Light-cone gauge realization of relativistic symmetries for fields, currents, and shadows is also obtained. The light-cone formulation for fields is obtained by using the gauge invariant Lagrangian which is presented in terms of the modified de Donder divergence, while the light-cone formulation for currents and shadows is obtained by using gauge invariant approach to currents and shadows. This allows us to demonstrate explicitly how ladder operators entering the gauge invariant formulation of fields, currents, and shadows manifest themselves in the light-cone formulation for fields, currents, and shadows.

R. R. Metsaev

2014-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Mass shift effects in nonperturbative multiphoton pair production for arbitrary polarized electric fields  

E-Print Network [OSTI]

The mass shift effects in multiphoton pair production of a nonperturbative nature for arbitrary polarized electric fields are investigated numerically by employing the real-time Dirac-Heisenberg-Wigner formalism, and theoretically by proposing an effective energy concept. It is found that the theoretical results are agreement with the numerical ones very well. It is the first time to consider the roles of the momenta of created particles and the polarizations of external fields played in the mass shift effects. These results can deepen the understanding of pair production in the nonperturbative threshold regime. Moreover, the distinct mass shift effects are observable in the forthcoming experiments and can be used as a probe to distinguish the electron-positron pair production from other background events.

Z. L. Li; D. Lu; B. F. Shen; L. B. Fu; J. Liu; B. S. Xie

2014-10-23T23:59:59.000Z

422

Two-particle multichannel systems in a finite volume with arbitrary spin  

DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

The quantization condition for two-particle systems with arbitrary number of two-body open coupled channels, spin and masses in a finite cubic volume with either periodic or twisted boundary conditions is presented. The condition presented is in agreement with all previous studies of two-body systems in a finite volume. The result is relativistic, holds for all momenta below the three- and four-particle thresholds, and is exact up to exponential volume corrections that are governed by L/r, where L is the spatial extent of the volume and r is the range of the interactions between the particles. For hadronic systems the range of the interaction is set by the inverse of the pion mass, m?, and as a result the formalism presented is suitable for m?L>>1. Implications of the formalism for the studies of multichannel baryon-baryon systems are discussed.

Briceno, Raul A. [JLAB

2014-04-01T23:59:59.000Z

423

Normalization conventions for Newton's constant and the Planck scale in arbitrary spacetime dimension  

E-Print Network [OSTI]

We calculate, in d spacetime dimensions, the relationship between the coefficient 1/K^2 of the Einstein-Hilbert term in the action of general relativity and the coefficient G_N of the force law that results from the Newtonian limit of general relativity. The result is K^2=2[(d-2)/(d-3)]Vol(S^[d-2])G_N, where Vol(S^n) is the volume of the unit n-sphere. While the d=4 case is an elementary calculation in any general relativity text, the arbitrary case presented here is slightly less well known. We discuss the relevance of this result for the definition of the so-called "reduced Planck mass" and comment very briefly on the implications for brane world models. [abstract abridged

Sean P. Robinson

2006-09-17T23:59:59.000Z

424

Ab-initio multimode linewidth theory for arbitrary inhomogeneous laser cavities  

E-Print Network [OSTI]

We present a multimode laser-linewidth theory for arbitrary cavity structures and geometries that contains nearly all previously known effects and also finds new nonlinear and multimode corrections, e.g. a bad-cavity correction to the Henry $\\alpha$ factor and a multimode Schawlow--Townes relation (each linewidth is proportional to a sum of inverse powers of all lasing modes). Our theory produces a quantitatively accurate formula for the linewidth, with no free parameters, including the full spatial degrees of freedom of the system. Starting with the Maxwell--Bloch equations, we handle quantum and thermal noise by introducing random currents whose correlations are given by the fluctuation--dissipation theorem. We derive coupled-mode equations for the lasing-mode amplitudes and obtain a formula for the linewidths in terms of simple integrals over the steady-state lasing modes.

Pick, A; Liu, D; Rodriguez, A W; Stone, A D; Chong, Y D; Johnson, S G

2015-01-01T23:59:59.000Z

425

Nonlinear oscillations and waves in an arbitrary mass ratio cold plasma  

SciTech Connect (OSTI)

It is well known that nonlinear standing oscillations in an arbitrary mass ratio cold plasma always phase mix away. However, there exist nonlinear electron-ion traveling wave solutions, which do not exhibit phase mixing because they have zero ponderomotive force. The existence of these waves has been demonstrated using a perturbation method. Moreover, it is shown that cold plasma BGK waves [Albritton et al., Nucl. Fusion 15, 1199 (1975)] phase mix away if ions are allowed to move and the scaling of phase mixing is found to be different from earlier work [Sengupta et al., Phys. Rev. Lett. 82, 1867 (1999)]. Phase mixing of these waves has been further verified in 1-D particle in cell simulation.

Verma, Prabal Singh [Institute for Plasma Research, Bhat, Gandhinagar 382 428 (India)

2011-12-15T23:59:59.000Z

426

Device For Determining Therophysical Properties Of A Multi-Component Gas At Arbitrary Temperature And Pressure  

DOE Patents [OSTI]

A computer product for determining thermodynamic properties of a natural gas hydrocarbon, when the speed of sound in the gas is known at an arbitrary temperature and pressure. Thus, the known parameters are the sound speed, temperature, pressure, and concentrations of any dilute components of the gas. The method uses a set of reference gases and their calculated density and speed of sound values to estimate the density of the subject gas. Additional calculations can be made to estimate the molecular weight of the subject gas, which can then be used as the basis for mass flow calculations, to determine the speed of sound at standard pressure and temperature, and to determine various thermophysical characteristics of the gas.

Morrow, Thomas B. (San Antonio, TX); Behring, II, Kendricks A. (Gilbert, AZ)

2005-02-01T23:59:59.000Z

427

The Smoluchowski-Kramers limit of stochastic differential equations with arbitrary state-dependent friction  

E-Print Network [OSTI]

We study a class of systems of stochastic differential equations describing diffusive phenomena. The Smoluchowski-Kramers approximation is used to describe their dynamics in the small mass limit. Our systems have arbitrary state-dependent friction and noise coefficients. We identify the limiting equation and, in particular, the additional drift term that appears in the limit is expressed in terms of the solution to a Lyapunov matrix equation. The proof uses a theory of convergence of stochastic integrals developed by Kurtz and Protter. The result is sufficiently general to include systems driven by both white and Ornstein-Uhlenbeck colored noises. We discuss applications of the main theorem to several physical phenomena, including the experimental study of Brownian motion in a diffusion gradient.

Scott Hottovy; Austin McDaniel; Giovanni Volpe; Jan Wehr

2014-04-08T23:59:59.000Z

428

Passive Lossless Huygens Metasurfaces for Conversion of Arbitrary Source Field to Directive Radiation  

E-Print Network [OSTI]

We present a semi-analytical formulation of the interaction between a given source field and a scalar Huygens metasurface (HMS), a recently introduced promising concept for wavefront manipulation based on a sheet of orthogonal electric and magnetic dipoles. Utilizing the equivalent surface impedance representation of these metasurfaces, we establish that an arbitrary source field can be converted into directive radiation via a passive lossless HMS if two physical conditions are met: local power conservation and local impedance equalization. Expressing the fields via their plane-wave spectrum and harnessing the slowly-varying envelope approximation we obtain semi-analytical formulae for the scattered fields, and prescribe the surface reactance required for the metasurface implementation. The resultant design procedure indicates that the local impedance equalization induces a Fresnel-like reflection, while local power conservation forms a radiating virtual aperture which follows the total excitation field magni...

Epstein, Ariel

2014-01-01T23:59:59.000Z

429

A unified physical boundary condition for massless fields of arbitrary spin  

E-Print Network [OSTI]

Boundary conditions for the Maxwell and Dirac fields at material surfaces are widely-used and physically well-motivated, but do not appear to have been generalised to deal with higher spin fields. A consequence of this is that calculations of, for example, Casimir forces associated with higher spin fields always select some arbitrary mathematical boundary conditions, rather than those which are physically motivated. Here, we use the two-spinor calculus formalism to present a unified treatment of the boundary conditions routinely employed in the treatment of spin-1/2 and spin-1 fields. We then use this unification to obtain a completely new boundary condition that can be applied to massless fields of any spin, including the spin-2 graviton, and its supersymmetric partner the spin-3/2 gravitino. We demonstrate one important consequence of our generalisation, which is that periodic boundary conditions cannot be applied to any physically-confined fermionic field.

Adam Stokes; Robert Bennett

2014-11-04T23:59:59.000Z

430

Measurement of arbitrary two-photon entanglement state with the photonic Faraday rotation  

E-Print Network [OSTI]

We propose an efficient protocol for measuring the concurrence of arbitrary two-photon pure entangled state with the help of the photonic Faraday rotation. In the protocol, the concurrence of the photonic entangled state can be conversed into the total success probability for picking up the odd-parity photonic state. For completing the measurement task, we require some auxiliary three-level atoms, which are trapped in the low-quality cavities. Our protocol can be well realized under current experimental conditions. Moreover, under practical imperfect atom state detection and photonic Faraday rotation conditions, our protocol can also work well. Based on these features, our protocol may be useful in current quantum information processing.

Lan Zhou

2014-02-05T23:59:59.000Z

431

Two-particle multichannel systems in a finite volume with arbitrary spin  

SciTech Connect (OSTI)

The quantization condition for two-particle systems with arbitrary number of two-body open coupled channels, spin and masses in a finite cubic volume with either periodic or twisted boundary conditions is presented. The condition presented is in agreement with all previous studies of two-body systems in a finite volume. The result is relativistic, holds for all momenta below the three- and four-particle thresholds, and is exact up to exponential volume corrections that are governed by L/r, where L is the spatial extent of the volume and r is the range of the interactions between the particles. For hadronic systems the range of the interaction is set by the inverse of the pion mass, m?, and as a result the formalism presented is suitable for m?L>>1. Implications of the formalism for the studies of multichannel baryon-baryon systems are discussed.

Briceno, Raul A. [JLAB

2014-04-01T23:59:59.000Z

432

Electromagnetic Properties for Arbitrary Spin Particles: Part 1 $-$ Electromagnetic Current and Multipole Decomposition  

E-Print Network [OSTI]

In a set of two papers, we propose to study an old-standing problem, namely the electromagnetic interaction for particles of arbitrary spin. Based on the assumption that light-cone helicity at tree level and $Q^2=0$ should be conserved non-trivially by the electromagnetic interaction, we are able to derive \\emph{all} the natural electromagnetic moments for a pointlike particle of \\emph{any} spin. In this first paper, we propose a transparent decomposition of the electromagnetic current in terms of covariant vertex functions. We also define in a general way the electromagnetic multipole form factors, and show their relation with the electromagnetic moments. Finally, by considering the Breit frame, we relate the covariant vertex functions to multipole form factors.

Cédric Lorcé

2009-01-27T23:59:59.000Z

433

On the potential energy in a gravitationally bound two-body system with arbitrary mass distribution  

E-Print Network [OSTI]

The potential energy problem in a gravitationally bound two-body system has recently been studied in the framework of a proposed impact model of gravitation (Wilhelm and Dwivedi 2015). The result was applied to the free fall of the so-called Mintrop--Ball in G\\"ottingen with the implicit assumption that the mass distribution of the system is extremely unbalanced. An attempt to generalize the study to arbitrary mass distributions indicated a conflict with the energy conservation law in a closed system. This necessitated us to reconsider an earlier assumption made in selecting a specific process out of two options (Wilhelm et al. 2013). With the result obtained here we can now make an educated selection and reverse our choice. The consequences are presented and discussed in detail for several processes. Energy and momentum conservation could now be demonstrated in all cases.

Wilhelm, K

2015-01-01T23:59:59.000Z

434

(Super)^n-Energy for arbitrary fields and its interchange: Conserved quantities  

E-Print Network [OSTI]

Inspired by classical work of Bel and Robinson, a natural purely algebraic construction of super-energy tensors for arbitrary fields is presented, having good mathematical and physical properties. Remarkably, there appear quantities with mathematical characteristics of energy densities satisfying the dominant property, which provides super-energy estimates useful for global results and helpful in other matters. For physical fields, higher order (super)^n-energy tensors involving the field and its derivatives arise. In Special Relativity, they provide infinitely many conserved quantities. The interchange of super-energy between different fields is shown. The discontinuity propagation law in Einstein-Maxwell fields is related to super-energy tensors, providing quantities conserved along null hypersurfaces. Finally, conserved super-energy currents are found for any minimally coupled scalar field whenever there is a Killing vector.

J. M. M. Senovilla

1999-05-17T23:59:59.000Z

435

Schwinger Mechanism for Quark-Antiquark Production in the Presence of Arbitrary Time Dependent Chromo-Electric Field  

E-Print Network [OSTI]

We study the Schwinger mechanism in QCD in the presence of an arbitrary time-dependent chromo-electric background field $E^a(t)$ with arbitrary color index $a$=1,2,...8 in SU(3). We obtain an exact result for the non-perturbative quark (antiquark) production from an arbitrary $E^a(t)$ by directly evaluating the path integral. We find that the exact result is independent of all the time derivatives $\\frac{d^nE^a(t)}{dt^n}$ where $n=1,2,...\\infty$. This result has the same functional dependence on two Casimir invariants $[E^a(t)E^a(t)]$ and $[d_{abc}E^a(t)E^b(t)E^c(t)]^2$ as the constant chromo-electric field $E^a$ result with the replacement: $E^a \\rightarrow E^a(t)$. This result relies crucially on the validity of the shift conjecture, which has not yet been established.

Gouranga C. Nayak

2011-05-23T23:59:59.000Z

436

Polarization of Astronomical Maser Radiation. III. Arbitrary Zeeman Splitting and Anisotropic Pumping  

E-Print Network [OSTI]

General solutions of the maser polarization problem are presented for arbitrary absorption coefficients. The results are used to calculate polarization for masers permeated by magnetic fields with arbitrary values of \\xB, the ratio of Zeeman splitting to Doppler linewidth, and for anisotropic pumping. The $\\xb \\to 0$ limit of the magnetic solution reproduces the linear polarization derived in previous studies, which were always conducted at this unphysical limit. While terms of higher order in \\xb\\ have a negligible effect on the magnitude of $q$, they produce some major new results. In particular, the linear polarization is accompanied by circular polarization, proportional to \\xb. Because \\xb\\ is proportional to the transition wavelength, the circular polarization of SiO masers should decrease with rotation quantum number, as observed. In the absence of theory for $\\xb < 1$, previous estimates of magnetic fields from detected maser circular polarization had to rely on conjectures in this case and generally need to be revised downward. The fields in SiO masers are \\about\\ 2--10 G and were overestimated by a factor of 8. The OH maser regions around supergiants have fields of \\about\\ 0.1--0.5 mG, which were overestimated by factors of 10--100. The fields were properly estimated for OH/IR masers ($\\la$ 0.1 mG) and \\H2O masers in star-forming regions (\\about\\ 15--50 mG). Spurious solutions that required stability analysis for their removal in all previous studies are never reproduced here; in particular, there are no stationary physical solutions for propagation at $\\sin^2\\theta < \\third$, where $\\theta$ is the angle from the direction of the magnetic field, so such radiation is unpolarized. These spurious solutions can be identified as the \\xb\\ = 0 limits of non-physical solutions and they never arise at finite

Moshe Elitzur

1995-08-01T23:59:59.000Z

437

THE GOVERNANCE OF CODE: CODE AS GOVERNANCE Serena Syme[1  

E-Print Network [OSTI]

by the creation of information property. The establishment of a market involves the development of a bundle of rights that both create property and define the rules under which property-based transactions might occur, proprietary licenses, and the Uniform Computer Information Transactions Act (UCITA). The open code licenses

Camp, L. Jean

438

Validation issues for SSI codes  

SciTech Connect (OSTI)

The paper describes the results of a recent work which was performed to verify computer code predictions in the SSI area. The first part of the paper is concerned with analytic solutions of the system response. The mathematical derivations are reasonably reduced by the use of relatively simple models which capture fundamental ingredients of the physics of the system motion while allowing for the response to be obtained analytically. Having established explicit forms of the system response, numerical solutions from three computer codes are presented in comparative format.

Philippacopoulos, A.J.

1995-02-01T23:59:59.000Z

439

Turbo Codes are Low Density Parity Check Codes David J. C. MacKay  

E-Print Network [OSTI]

Turbo Codes are Low Density Parity Check Codes David J. C. MacKay July 8, 1998--- Draft 0.2, not for distribution! (First draft written July 5, 1998) Abstract Turbo codes and Gallager codes (also known as low note that the parity check matrix of a Turbo code can be written as low density parity check matrix

MacKay, David J.C.

440

IEEE VEHICULAR TECHNOLOGY CONFERENCE SPRING, 2003 1 Space-Time Block Coding applied to Turbo Coded  

E-Print Network [OSTI]

IEEE VEHICULAR TECHNOLOGY CONFERENCE SPRING, 2003 1 Space-Time Block Coding applied to Turbo Coded and a Turbo Code (TC) as channel code. MC-CDMA is likely to be one of the most promising access technique. Then, since Turbo Coded MC-CDMA was demonstrated to be very efficient for a Single Input Single Output

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Non-Perturbative Gluon pair production from a Constant Chromo-Electric Field via the Schwinger Mechanism in Arbitrary Gauge  

E-Print Network [OSTI]

We study the non-perturbative production of gluon pairs from a constant SU(3) chromo-electric background field via the Schwinger mechanism. We fix the covariant background gauge with an arbitrary gauge parameter \\alpha. We determine the transverse momentum distribution of the gluons, as well as the total probability of creating pairs per unit space time volume. We find that the result is independent of the covariant gauge parameter \\alpha used to define arbitrary covariant background gauges. We find that our non-perturbative result is both gauge invariant and gauge parameter \\alpha independent.

Fred Cooper; Gouranga C. Nayak

2006-02-21T23:59:59.000Z

442

PAYMENT VOUCHER Vendor Code: L#  

E-Print Network [OSTI]

PAYMENT VOUCHER Vendor Code: L# Vendor Name: Person Picking Up Check* Addrl: Mail Stop AddR: Check#/ DESCRIPTION(20) HumanSbjt Payments ORGN (4) 0000 OBJECT(2) 30 VENDOR INVOICE# (11) AMOUNT 100.00 SUB-OBJECT(2

Hemmers, Oliver

443

Project Juno Code of Practice  

E-Print Network [OSTI]

Project Juno Code of Practice Institute of Physics Advancing women's careers in physics higher: Appointment, promotion and selection processes and procedures that encourage men and women to apply for academic posts at all levels. 2.1 Transparent processes and procedures 2.1.1 Ensure that selection criteria

Davies, Christopher

444

WESTERN MICHIGAN UNIVERSITY STUDENT CODE  

E-Print Network [OSTI]

WESTERN MICHIGAN UNIVERSITY STUDENT CODE Approved by The Western Michigan University Board Michigan University Kalamazoo, MI 49008 Effective August 2008 #12;A UNIVERSITY COMMUNITY IS... ...a for the Advancement of Teaching; Ernest L. Boyer (frwd.); Princeton, New Jersey; 1990 #12;WESTERN MICHIGAN UNIVERSITY

de Doncker, Elise

445

Free Energy Code Online Discussion  

E-Print Network [OSTI]

Free Energy Code Online Discussion for Building Department Personnel Join us for this FREE 90 by California utility customers under the auspices of the California Public Utilities Commission and in support -- availability subject to enrollment levels: Tuesday, October 1 ­ Click here to register Wednesday, October 2

446

Degenerate Quantum Codes for Pauli Channels  

E-Print Network [OSTI]

A striking feature of quantum error correcting codes is that they can sometimes be used to correct more errors than they can uniquely identify. Such degenerate codes have long been known, but have remained poorly understood. We provide a heuristic for designing degenerate quantum codes for high noise rates, which is applied to generate codes that can be used to communicate over almost any Pauli channel at rates that are impossible for a nondegenerate code. The gap between nondegenerate and degenerate code performance is quite large, in contrast to the tiny magnitude of the only previous demonstration of this effect. We also identify a channel for which none of our codes outperform the best nondegenerate code and show that it is nevertheless quite unlike any channel for which nondegenerate codes are known to be optimal.

Graeme Smith; John A. Smolin

2006-12-23T23:59:59.000Z

447

Code Booster Award-winning research on code optimization explores multicore computing  

E-Print Network [OSTI]

May 2008 Code Booster Award-winning research on code optimization explores multicore computing paper exploring ways to make a popular scientific analysis code run smoothly on different types of multicore computers. SamuelWilliams,aresearcherfromBerkeleyLab'sComputational

Knowles, David William

448

Two-Layer Error Control Codes Combining Rectangular and Hamming Product Codes for Cache Error  

E-Print Network [OSTI]

We propose a novel two-layer error control code, combining error detection capability of rectangular codes and error correction capability of Hamming product codes in an efficient way, in order to increase cache error ...

Zhang, Meilin

449

REMAP: A computer code that transfers node information between dissimilar grids  

SciTech Connect (OSTI)

REMAP is a computer code that transfers the axisymmetric, two dimensional planar, or three dimensional temperature field from one finite element mesh to another. The meshes may be arbitrary as far as the number of elements and their geometry. REMAP interpolates or extrapolates the node temperatures from the old mesh to the new mesh using linear, bilinear, or trilinear isoparametric finite element shape functions. REMAP is used to transfer the temperature field from a thermal analysis mesh to a more finely discretized structural analysis mesh when performing a thermal stress analysis. REMAP was designed to be used with the finite element heat transfer codes TOPAZ2D and TOPAZ3D, and the solid mechanics codes NIKE2D and NIKE3D. The I/O formats in REMAP can be easily modified to accept input from other codes (e.g., finite difference) and generate output files for other structural codes. REMAP can be used to transfer any scalar field variable between dissimilar finite element meshes. The idea of a coarse filter by a fine filter to determine which element from the old mesh contains a node point from the new mesh was used. The coarse filter determines a subset of elements from the old mesh that may contain the new node point. The fine filter determines the element that contains the new node point. REMAP uses the ray-surface intersection algorithm developed for the FACET code for the fine filter. This algorithm has the added capability to determine which element the node is closest to if the node point lies outside the perimeter of the old mesh. Once an element from the old mesh has been identified as containing or closest to the new node point, the natural coordinates for the node point are calculated. The isoparametric finite element shape functions are calculated next. These shape functions are then used to interpolate or extrapolate the temperatures from the nodes comprising the old element to the new node point.

Shapiro, A.B.

1990-04-01T23:59:59.000Z

450

Bounds on Effective Hamiltonians for Stabilizer Codes  

E-Print Network [OSTI]

This manuscript introduces various notions of k-locality of stabilizer codes inherited from the associated stabilizer groups. A choice of generators for the group leads to a Hamiltonian with the code in its groundspace, while a Hamiltonian holding the code in its groundspace might be called effective if its locality is less than that of a natural choice of generators (or any choice). This paper establishes some conditions under which effective Hamiltonians for stabilizer codes do not exist. Our results simplify in the cases of Calderbank-Shor-Steane stabilizer codes and topologically-ordered stabilizer codes arising from surface cellulations.

Stephen S. Bullock; Dianne P. O'Leary

2008-02-05T23:59:59.000Z

451

Quantum Stabilizer Codes Embedding Qubits Into Qudits  

E-Print Network [OSTI]

We study, by means of the stabilizer formalism, a quantum error correcting code which is alternative to the standard block codes since it embeds a qubit into a qudit. The code exploits the non-commutative geometry of discrete phase space to protect the qubit against both amplitude and phase errors. The performance of such code is evaluated on Weyl channels by means of the entanglement fidelity as function of the error probability. A comparison with standard block codes, like five and seven qubit stabilizer codes, shows its superiority.

Carlo Cafaro; Federico Maiolini; Stefano Mancini

2012-07-30T23:59:59.000Z

452

Thermal noise in advanced gravitational wave interferometric antennas: A comparison between arbitrary order Hermite and Laguerre Gaussian modes  

SciTech Connect (OSTI)

We study the thermal noise caused by mechanical or thermomechanical dissipation in mirrors of interferometric gravitational wave antennas. We give relative figures of merit for arbitrary Hermite-Gauss or Laguerre-Gauss optical beams regarding the Brownian and thermoelastic noises (substrate and coating) in the infinite mirror approximation.

Vinet, Jean-Yves [Dpt. ARTEMIS, Universite de Nice-Sophia Antipolis, C.N.R.S. and Observatoire de la Cote d'Azur, 06304 Nice (France)

2010-08-15T23:59:59.000Z

453

Analytical theory for the dark-soliton interaction in nonlocal nonlinear materials with an arbitrary degree of nonlocality  

SciTech Connect (OSTI)

We investigate theoretically the interaction of dark solitons in materials with a spatially nonlocal nonlinearity. In particular we do this analytically and for arbitrary degree of nonlocality. We employ the variational technique to show that nonlocality induces an attractive force in the otherwise repulsive soliton interaction.

Kong Qian [Laser Physics Center, Research School of Physics and Engineering, Australian National University, Canberra, Australian Capital Territory 0200 (Australia); Department of Physics, Shanghai University, Shanghai 200444 (China); Wang, Q. [Department of Physics, Shanghai University, Shanghai 200444 (China); Bang, O. [DTU Fotonik, Department of Photonics Engineering, Technical University of Denmark, DK-2800 Kgs. Lyngby (Denmark); Krolikowski, W. [Laser Physics Center, Research School of Physics and Engineering, Australian National University, Canberra, Australian Capital Territory 0200 (Australia)

2010-07-15T23:59:59.000Z

454

Energy Spectrum of a Relativistic Two-dimensional Hydrogen-like Atom in a Constant Magnetic Field of arbitrary strength  

E-Print Network [OSTI]

We compute, via a variational mixed-base method, the energy spectrum of a two dimensional relativistic atom in the presence of a constant magnetic field of arbitrary strength. The results are compared to those obtained in the non-relativistic and spinless case. We find that the relativistic spectrum does not present $s$ states.

V. M. Villalba; R. Pino

2001-01-23T23:59:59.000Z

455

Quantifying the Performance of Quantum Codes  

E-Print Network [OSTI]

We study the properties of error correcting codes for noise models in the presence of asymmetries and/or correlations by means of the entanglement fidelity and the code entropy. First, we consider a dephasing Markovian memory channel and characterize the performance of both a repetition code and an error avoiding code in terms of the entanglement fidelity. We also consider the concatenation of such codes and show that it is especially advantageous in the regime of partial correlations. Finally, we characterize the effectiveness of the codes and their concatenation by means of the code entropy and find, in particular, that the effort required for recovering such codes decreases when the error probability decreases and the memory parameter increases. Second, we consider both symmetric and asymmetric depolarizing noisy quantum memory channels and perform quantum error correction via the five qubit stabilizer code. We characterize this code by means of the entanglement fidelity and the code entropy as function of the asymmetric error probabilities and the degree of memory. Specifically, we uncover that while the asymmetry in the depolarizing errors does not affect the entanglement fidelity of the five qubit code, it becomes a relevant feature when the code entropy is used as a performance quantifier.

C. Cafaro; S. L'Innocente; C. Lupo; S. Mancini

2011-01-12T23:59:59.000Z

456

An implicit Smooth Particle Hydrodynamic code  

SciTech Connect (OSTI)

An implicit version of the Smooth Particle Hydrodynamic (SPH) code SPHINX has been written and is working. In conjunction with the SPHINX code the new implicit code models fluids and solids under a wide range of conditions. SPH codes are Lagrangian, meshless and use particles to model the fluids and solids. The implicit code makes use of the Krylov iterative techniques for solving large linear-systems and a Newton-Raphson method for non-linear corrections. It uses numerical derivatives to construct the Jacobian matrix. It uses sparse techniques to save on memory storage and to reduce the amount of computation. It is believed that this is the first implicit SPH code to use Newton-Krylov techniques, and is also the first implicit SPH code to model solids. A description of SPH and the techniques used in the implicit code are presented. Then, the results of a number of tests cases are discussed, which include a shock tube problem, a Rayleigh-Taylor problem, a breaking dam problem, and a single jet of gas problem. The results are shown to be in very good agreement with analytic solutions, experimental results, and the explicit SPHINX code. In the case of the single jet of gas case it has been demonstrated that the implicit code can do a problem in much shorter time than the explicit code. The problem was, however, very unphysical, but it does demonstrate the potential of the implicit code. It is a first step toward a useful implicit SPH code.

Charles E. Knapp

2000-04-01T23:59:59.000Z

457

Visual analysis of code security  

SciTech Connect (OSTI)

To help increase the confidence that software is secure, researchers and vendors have developed different kinds of automated software security analysis tools. These tools analyze software for weaknesses and vulnerabilities, but the individual tools catch different vulnerabilities and produce voluminous data with many false positives. This paper describes a system that brings together the results of disparate software analysis tools into a visual environment to support the triage and exploration of code vulnerabilities. Our system allows software developers to explore vulnerability results to uncover hidden trends, triage the most important code weaknesses, and show who is responsible for introducing software vulnerabilities. By correlating and normalizing multiple software analysis tools' data, the overall vulnerability detection coverage of software is increased. A visual overview and powerful interaction allows the user to focus attention on the most pressing vulnerabilities within huge volumes of data, and streamlines the secure software development workflow through integration with development tools.

Goodall, John R [ORNL] [ORNL; Radwan, Hassan [Applied Visions, Inc.] [Applied Visions, Inc.; Halseth, Lenny [Applied Visions, Inc.] [Applied Visions, Inc.

2010-01-01T23:59:59.000Z

458

The EGS5 Code System  

SciTech Connect (OSTI)

In the nineteen years since EGS4 was released, it has been used in a wide variety of applications, particularly in medical physics, radiation measurement studies, and industrial development. Every new user and every new application bring new challenges for Monte Carlo code designers, and code refinements and bug fixes eventually result in a code that becomes difficult to maintain. Several of the code modifications represented significant advances in electron and photon transport physics, and required a more substantial invocation than code patching. Moreover, the arcane MORTRAN3[48] computer language of EGS4, was highest on the complaint list of the users of EGS4. The size of the EGS4 user base is difficult to measure, as there never existed a formal user registration process. However, some idea of the numbers may be gleaned from the number of EGS4 manuals that were produced and distributed at SLAC: almost three thousand. Consequently, the EGS5 project was undertaken. It was decided to employ the FORTRAN 77 compiler, yet include as much as possible, the structural beauty and power of MORTRAN3. This report consists of four chapters and several appendices. Chapter 1 is an introduction to EGS5 and to this report in general. We suggest that you read it. Chapter 2 is a major update of similar chapters in the old EGS4 report[126] (SLAC-265) and the old EGS3 report[61] (SLAC-210), in which all the details of the old physics (i.e., models which were carried over from EGS4) and the new physics are gathered together. The descriptions of the new physics are extensive, and not for the faint of heart. Detailed knowledge of the contents of Chapter 2 is not essential in order to use EGS, but sophisticated users should be aware of its contents. In particular, details of the restrictions on the range of applicability of EGS are dispersed throughout the chapter. First-time users of EGS should skip Chapter 2 and come back to it later if necessary. With the release of the EGS4 version, a deliberate attempt was made to present example problems in order to help the user ''get started'', and we follow that spirit in this report. A series of elementary tutorial user codes are presented in Chapter 3, with more sophisticated sample user codes described in Chapter 4. Novice EGS users will find it helpful to read through the initial sections of the EGS5 User Manual (provided in Appendix B of this report), proceeding then to work through the tutorials in Chapter 3. The User Manuals and other materials found in the appendices contain detailed flow charts, variable lists, and subprogram descriptions of EGS5 and PEGS. Included are step-by-step instructions for developing basic EGS5 user codes and for accessing all of the physics options available in EGS5 and PEGS. Once acquainted with the basic structure of EGS5, users should find the appendices the most frequently consulted sections of this report.

Hirayama, Hideo; Namito, Yoshihito; /KEK, Tsukuba; Bielajew, Alex F.; Wilderman, Scott J.; U., Michigan; Nelson, Walter R.; /SLAC

2005-12-20T23:59:59.000Z

459

CBP PHASE I CODE INTEGRATION  

SciTech Connect (OSTI)

The goal of the Cementitious Barriers Partnership (CBP) is to develop a reasonable and credible set of software tools to predict the structural, hydraulic, and chemical performance of cement barriers used in nuclear applications over extended time frames (greater than 100 years for operating facilities and greater than 1000 years for waste management). The simulation tools will be used to evaluate and predict the behavior of cementitious barriers used in near surface engineered waste disposal systems including waste forms, containment structures, entombments, and environmental remediation. These cementitious materials are exposed to dynamic environmental conditions that cause changes in material properties via (i) aging, (ii) chloride attack, (iii) sulfate attack, (iv) carbonation, (v) oxidation, and (vi) primary constituent leaching. A set of state-of-the-art software tools has been selected as a starting point to capture these important aging and degradation phenomena. Integration of existing software developed by the CBP partner organizations was determined to be the quickest method of meeting the CBP goal of providing a computational tool that improves the prediction of the long-term behavior of cementitious materials. These partner codes were selected based on their maturity and ability to address the problems outlined above. The GoldSim Monte Carlo simulation program (GTG 2010a, GTG 2010b) was chosen as the code integration platform (Brown & Flach 2009b). GoldSim (current Version 10.5) is a Windows based graphical object-oriented computer program that provides a flexible environment for model development (Brown & Flach 2009b). The linking of GoldSim to external codes has previously been successfully demonstrated (Eary 2007, Mattie et al. 2007). GoldSim is capable of performing deterministic and probabilistic simulations and of modeling radioactive decay and constituent transport. As part of the CBP project, a general Dynamic Link Library (DLL) interface was developed to link GoldSim with external codes (Smith III et al. 2010). The DLL uses a list of code inputs provided by GoldSim to create an input file for the external application, runs the external code, and returns a list of outputs (read from files created by the external application) back to GoldSim. In this way GoldSim provides: (1) a unified user interface to the applications, (2) the capability of coupling selected codes in a synergistic manner, and (3) the capability of performing probabilistic uncertainty analysis with the codes. GoldSim is made available by the GoldSim Technology Group as a free 'Player' version that allows running but not editing GoldSim models. The player version makes the software readily available to a wider community of users that would wish to use the CBP application but do not have a license for GoldSim.

Smith, F.; Brown, K.; Flach, G.; Sarkar, S.

2011-09-30T23:59:59.000Z

460

Design of additive quantum codes via the code-word-stabilized framework  

SciTech Connect (OSTI)

We consider design of the quantum stabilizer codes via a two-step, low-complexity approach based on the framework of codeword-stabilized (CWS) codes. In this framework, each quantum CWS code can be specified by a graph and a binary code. For codes that can be obtained from a given graph, we give several upper bounds on the distance of a generic (additive or nonadditive) CWS code, and the lower Gilbert-Varshamov bound for the existence of additive CWS codes. We also consider additive cyclic CWS codes and show that these codes correspond to a previously unexplored class of single-generator cyclic stabilizer codes. We present several families of simple stabilizer codes with relatively good parameters.

Kovalev, Alexey A.; Pryadko, Leonid P. [Department of Physics and Astronomy, University of California, Riverside, California 92521 (United States); Dumer, Ilya [Department of Electrical Engineering, University of California, Riverside, California 92521 (United States)

2011-12-15T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Evolutionary approaches toward practical network coding  

E-Print Network [OSTI]

There have been numerous studies showing various benefits of network coding. However, in order to have network coding widely deployed in real networks, it is also important to show that the amount of overhead incurred by ...

Kim, Minkyu, 1976-

2008-01-01T23:59:59.000Z

462

Reusing code by reasoning about its purpose  

E-Print Network [OSTI]

When programmers face unfamiliar or challenging tasks, code written by others could give them inspiration or reusable pieces. But how can they find code appropriate for their goals? This thesis describes a programming ...

Arnold, Kenneth Charles

2010-01-01T23:59:59.000Z

463

Efficient, transparent, and comprehensive runtime code manipulation  

E-Print Network [OSTI]

This thesis addresses the challenges of building a software system for general-purpose runtime code manipulation. Modern applications, with dynamically-loaded modules and dynamically-generated code, are assembled at runtime. ...

Bruening, Derek L. (Derek Lane), 1976-

2004-01-01T23:59:59.000Z

464

Designing Distributed Applications with Mobile Code Paradigms  

E-Print Network [OSTI]

Designing Distributed Applications with Mobile Code Paradigms Antonio Carzaniga Politecnico di code, design paradigms, distributed applica­ tions. INTRODUCTION Distributed systems have been with the design of distributed applications, that aims at identifying the distributable components

Carzaniga, Antonio

465

Designing Distributed Applications with Mobile Code Paradigms  

E-Print Network [OSTI]

Designing Distributed Applications with Mobile Code Paradigms Antonio Carzaniga Politecnico di the selection of the correct paradigm for a given distributed application. Keywords Mobile code, design with the design of distributed applications, that aims at identifying the distributable components

Carzaniga, Antonio

466

Green Codes and Programs | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Green Codes and Programs Green Codes and Programs Blue version of the EERE PowerPoint template, for use with PowerPoint 2007. Transcript Presentation More Documents & Publications...

467

Quantum error-correcting codes and devices  

DOE Patents [OSTI]

A method of forming quantum error-correcting codes by first forming a stabilizer for a Hilbert space. A quantum information processing device can be formed to implement such quantum codes.

Gottesman, Daniel (Los Alamos, NM)

2000-10-03T23:59:59.000Z

468

N. Mariana Islands- Building Energy Code  

Broader source: Energy.gov [DOE]

''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

469

The College Station Residential Energy Compliance Code  

E-Print Network [OSTI]

The City of College Station, Texas adopted a new residential Energy Compliance Code in January, 1988. The code, which strengthens compliance requirements in several areas, has received broadly based support and acceptance from all major constituent...

Claridge, D. E.; Schrock, D.

1988-01-01T23:59:59.000Z

470

Arkansas Air Pollution Control Code (Arkansas)  

Broader source: Energy.gov [DOE]

The Arkansas Air Pollution Control code is adopted pursuant to Subchapter 2 of the Arkansas Water and Air Pollution Control Act (Arkansas Code Annotated 8-4-101). ) By authority of the same State...

471

Transforms for prediction residuals in video coding  

E-Print Network [OSTI]

Typically the same transform, the 2-D Discrete Cosine Transform (DCT), is used to compress both image intensities in image coding and prediction residuals in video coding. Major prediction residuals include the motion ...

Kam??l?, Fatih

2010-01-01T23:59:59.000Z

472

Medical imaging with coded apertures  

SciTech Connect (OSTI)

Now algorithms were investigated for image reconstruction in emission tomography which could incorporate complex instrumental effects such as might be obtained with a coded aperture system. The investigation focused on possible uses of the wavelet transform to handle non-stationary instrumental effects and analytic continuation of the Radon transform to handle self-absorption. Neither investigation was completed during the funding period and whether such algorithms will be useful remains an open question.

Keto, E.; Libby, S.

1995-06-16T23:59:59.000Z

473

A 6 kV arbitrary waveform generator for the Tevatron Electron Lens  

DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

This paper reports on a 6 kV modulator built and installed at Fermilab to drive the electron gun anode for the Tevatron Electron Lens (TEL). The TEL was built with the intention of shifting the individual (anti)proton bunch tunes to even out the tune spread among all 36 bunches with the desire of improving Tevatron integrated luminosity. This modulator is essentially a 6 kV arbitrary waveform generator that enables the TEL to define the electron beam intensity on a bunch-by-bunch basis. A voltage waveform is constructed having a 7 {micro}s duration that corresponds to the tune shift requirements of a 12-bunch (anti)proton beam pulse train. This waveform is played out for any one or all three bunch trains in the Tevatron. The programmed waveform voltages transition to different levels at time intervals corresponding to the 395 ns bunch spacing. Thus, complex voltage waveforms can be played out at a sustained rate of 143 kHz over the full 6 kV output range. This paper describes the novel design of the inductive adder topology employing five transformers. It describes the design aspects that minimize switching losses for this multi-kilovolt, high repetition rate and high duty factor application.

Pfeffer, H; Saewert, G

2011-11-01T23:59:59.000Z

474

Code input alternatives John C. Wright  

E-Print Network [OSTI]

Code input alternatives John C. Wright John Wright Oct 2009 ­ CSWIM Workshop@ORNL Extensible markup

Wright, John C.

475

San Francisco Building Code Amendments to the  

E-Print Network [OSTI]

1 2010 San Francisco Building Code Amendments to the 2010 California Green Building Standards Code not pertain to energy) Operative date: January 1, 2011 #12;139 Chapter 13C GREEN BUILDING REQUIREMENTS shall be known as the California San Francisco Green Building Standards Code and may be cited

476

Ultra-narrow bandwidth voice coding  

DOE Patents [OSTI]

A system of removing excess information from a human speech signal and coding the remaining signal information, transmitting the coded signal, and reconstructing the coded signal. The system uses one or more EM wave sensors and one or more acoustic microphones to determine at least one characteristic of the human speech signal.

Holzrichter, John F. (Berkeley, CA); Ng, Lawrence C. (Danville, CA)

2007-01-09T23:59:59.000Z

477

CARD No. 23 Models and Computer Codes  

E-Print Network [OSTI]

CARD No. 23 Models and Computer Codes 23.A BACKGROUND Section 194.23 addresses the compliance criteria requirements for conceptual models and computer codes. Conceptual models capture a general (PA). The design of computer codes begins with the development of conceptual models. Conceptual models

478

STUDENT CONDUCT CODE REVIEW/DISCUSSION  

E-Print Network [OSTI]

STUDENT CONDUCT CODE REVISION REVIEW/DISCUSSION Student Conduct Code Revision Workgroup #12;Agenda Introductions/Purpose History of the Student Conduct Code Revision Workgroup Highlights of the Draft Revision Introduction: Principles Promoting Student Responsibility Jurisdiction Conduct in Violation of Community

Fainman, Yeshaiahu

479

Using closures for code generation Marc Feeley  

E-Print Network [OSTI]

which offers the advantages of an interpreter with the speed of compiled code. Code generation relies - environment (i.e. the set of current variable bindings). This operation is called closure. We speakUsing closures for code generation Marc Feeley Guy Lapalme D´epartement d'informatique et de

Feeley, Marc

480

A Turbo Code Tutorial William E. Ryan  

E-Print Network [OSTI]

A Turbo Code Tutorial William E. Ryan New Mexico State University Box 30001 Dept. 3-O, Las Cruces, NM 88003 wryan@nmsu.edu Abstract| We give a tutorial exposition of turbo codes and the associated algorithms. Included are a simple derivation for the performance of turbo codes, and a straightforward

Shea, John M.

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Cost Codes and the Work Breakdown Structure  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The chapter discusses the purpose of the work breakdown structure (WBS) and code of account (COA) cost code system, shows the purpose and fundamental structure of both the WBS and the cost code system, and explains the interface between the two systems.

1997-03-28T23:59:59.000Z

482

Final Report A Multi-Language Environment For Programmable Code Optimization and Empirical Tuning  

SciTech Connect (OSTI)

This report summarizes our effort and results of building an integrated optimization environment to effectively combine the programmable control and the empirical tuning of source-to-source compiler optimizations within the framework of multiple existing languages, specifically C, C++, and Fortran. The environment contains two main components: the ROSE analysis engine, which is based on the ROSE C/C++/Fortran2003 source-to-source compiler developed by Co-PI Dr.Quinlan et. al at DOE/LLNL, and the POET transformation engine, which is based on an interpreted program transformation language developed by Dr. Yi at University of Texas at San Antonio (UTSA). The ROSE analysis engine performs advanced compiler analysis, identifies profitable code transformations, and then produces output in POET, a language designed to provide programmable control of compiler optimizations to application developers and to support the parameterization of architecture-sensitive optimizations so that their configurations can be empirically tuned later. This POET output can then be ported to different machines together with the user application, where a POET-based search engine empirically reconfigures the parameterized optimizations until satisfactory performance is found. Computational specialists can write POET scripts to directly control the optimization of their code. Application developers can interact with ROSE to obtain optimization feedback as well as provide domain-specific knowledge and high-level optimization strategies. The optimization environment is expected to support different levels of automation and programmer intervention, from fully-automated tuning to semi-automated development and to manual programmable control.

Yi, Qing [University of Colorado at Colorado Springs; Whaley, Richard Clint [Louisiana State University; Qasem, Apan [Texas State University; Quinlan, Daniel [Lawrence Livermore National Laboratory

2013-11-23T23:59:59.000Z

483

Hydrogen Pipeline Working Group Workshop: Code for Hydrogen Pipelines...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Working Group Workshop: Code for Hydrogen Pipelines Hydrogen Pipeline Working Group Workshop: Code for Hydrogen Pipelines Code for Hydrogen Piping and Pipelines. B31 Hydrogen...

484

State and Local Code Implementation: Northeast Region - 2014...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Local Code Implementation: South-central Region - 2014 BTO Peer Review Building Energy Codes Program - 2014 BTO Peer Review State and Local Code Implementation: State Energy...

485

Technical Assistance: Increasing Code Compliance - 2014 BTO Peer...  

Energy Savers [EERE]

Code Compliance - 2014 BTO Peer Review More Documents & Publications Building Energy Codes Program - 2014 BTO Peer Review Building Energy Codes Program Overview - 2014 BTO Peer...

486

Energy Codes and the Landlord-Tenant Problem  

E-Print Network [OSTI]

a Commercial Building Energy Code in Michigan,” Report PNNL-Grant Summaries,” 1999. Office of Codes and Standards. , “2004,” , “Building Energy Codes: An Introduction,” 2010.

Papineau, Maya

2013-01-01T23:59:59.000Z

487

The Cost of Enforcing Building Energy Codes: Phase 1  

E-Print Network [OSTI]

B. (2005). Residential Energy Code Evaluatinons: Review andProvidence, RI: Building Codes Assistance Project. ZING2007 Commercial Energy Code Compliance Study. Calgary, AB:

Williams, Alison

2013-01-01T23:59:59.000Z

488

Two-Level Nonregular Designs From Quaternary Linear Codes  

E-Print Network [OSTI]

Goethals, and related codes. IEEE Trans. Inform. Theory 40,Theory of Error-Correcting Codes. North- Holland, Amsterdam.1967). An optimum nonlinear code. Inform. Control 11, Sun,

Hongquan Xu; Alan Wong

2011-01-01T23:59:59.000Z

489

Stationary and Portable Fuel Cell Systems Codes and Standards...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Stationary and Portable Fuel Cell Systems Codes and Standards Citations Stationary and Portable Fuel Cell Systems Codes and Standards Citations This document lists codes and...

490

Webinar: Residential Energy Code Compliance | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Webinar: Residential Energy Code Compliance Webinar: Residential Energy Code Compliance View the Code Compliance Funding Opportunity video or see the slides below. This webinar...

491

Reducing Energy Demand in Buildings Through State Energy Codes...  

Energy Savers [EERE]

Reducing Energy Demand in Buildings Through State Energy Codes Reducing Energy Demand in Buildings Through State Energy Codes Building Codes Project for the 2013 Building...

492

Hydrogen Vehicle and Infrastructure Codes and Standards Citations...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Vehicle and Infrastructure Codes and Standards Citations Hydrogen Vehicle and Infrastructure Codes and Standards Citations This document lists codes and standards typically used...

493

Performance of Turbo Coded WCDMA with Downlink Space Time Block Coding in Correlated Fading Channels  

E-Print Network [OSTI]

Performance of Turbo Coded WCDMA with Downlink Space Time Block Coding in Correlated Fading due to potential high data rate applications such as wireless internet access. Turbo codes. In this paper, we evaluate the performance of turbo coded WCDMA systems with downlink transmit diversity

Mandayam, Narayan

494

Code Generation on Steroids: Enhancing COTS Code Generators via Generative Aspects  

E-Print Network [OSTI]

Code Generation on Steroids: Enhancing COTS Code Generators via Generative Aspects Cody Henthorne tilevich@cs.vt.edu Abstract Commercial of-the-shelf (COTS) code generators have become an integral part of modern commercial software development. Programmers use code generators to facilitate many tedious

Ryder, Barbara G.

495

Absorbing Set Analysis of LDPC Codes and Read-Channel Quantization in Flash Memory  

E-Print Network [OSTI]

codes . . . . . . . . . . . . . . . . . . . . . . . . . .61 SCB codes for r = 5 . . . . . . . . . . . . . .63 SCB codes for r =

Wang, Jiadong

2012-01-01T23:59:59.000Z

496

National Agenda for Hydrogen Codes and Standards  

SciTech Connect (OSTI)

This paper provides an overview of hydrogen codes and standards with an emphasis on the national effort supported and managed by the U.S. Department of Energy (DOE). With the help and cooperation of standards and model code development organizations, industry, and other interested parties, DOE has established a coordinated national agenda for hydrogen and fuel cell codes and standards. With the adoption of the Research, Development, and Demonstration Roadmap and with its implementation through the Codes and Standards Technical Team, DOE helps strengthen the scientific basis for requirements incorporated in codes and standards that, in turn, will facilitate international market receptivity for hydrogen and fuel cell technologies.

Blake, C.

2010-05-01T23:59:59.000Z

497

Efficient Decoding of Topological Color Codes  

E-Print Network [OSTI]

Color codes are a class of topological quantum codes with a high error threshold and large set of transversal encoded gates, and are thus suitable for fault tolerant quantum computation in two-dimensional architectures. Recently, computationally efficient decoders for the color codes were proposed. We describe an alternate efficient iterative decoder for topological color codes, and apply it to the color code on hexagonal lattice embedded on a torus. In numerical simulations, we find an error threshold of 7.8% for independent dephasing and spin flip errors.

Pradeep Sarvepalli; Robert Raussendorf

2011-11-03T23:59:59.000Z

498

Data compression using inverted block codes  

E-Print Network [OSTI]

Fields 2. Minimum Distance and Error Correction 3. Matrix Notation for Codes 4. Cosets, Coset Leaders, and Maximum Likelihood Decoding C. Syndrome Decoding . D. Inversion of Codes E. Distortion Measure for Inverted Block Codes . F. Perfect Codes...+. The average distortion for block code C is found by averaging the word distortion measure of Equation 3. 3 over all codewords (n-tuples) x, so that p (C) = E[ (xlC)] = Q p(x)p. (?x). all x If the codewords are uniformly identically distributed, N...

McClellan, Stan

1991-01-01T23:59:59.000Z

499

A Symbolic Execution Framework for JavaScript Prateek Saxena, Devdatta Akhawe, Steve Hanna, Feng Mao, Stephen McCamant, Dawn Song  

E-Print Network [OSTI]

an automatic end-to-end tool, Kudzu, and apply it to the problem of finding client-side code injection vulnerabilities. In experiments on 18 live web applications, Kudzu automatically discovers 2 previously unknown

California at Irvine, University of

500

Neutronics code VALE for two-dimensional triagonal (hexagonal) and three-dimensional geometries  

SciTech Connect (OSTI)

This report documents the computer code VALE designed to solve multigroup neutronics problems with the diffusion theory approximation to neutron transport for a triagonal arrangement of mesh points on planes in two- and three-dimensional geometry. This code parallels the VENTURE neutronics code in the local computation system, making exposure and fuel management capabilities available. It uses and generates interface data files adopted in the cooperative effort sponsored by Reactor Physics RRT Division of the US DOE. The programming in FORTRAN is straightforward, although data is transferred in blocks between auxiliary storage devices and main core, and direct access schemes are used. The size of problems which can be handled is essentially limited only by cost of calculation since the arrays are variably dimensioned. The memory requirement is held down while data transfer during iteration is increased only as necessary with problem size. There is provision for the more common boundary conditions including the repeating boundary, 180/sup 0/ rotational symmetry, and the rotational symmetry conditions for the 30/sup 0/, 60/sup 0/, and 120/sup 0/ triangular grids on planes. A variety of types of problems may be solved: the usual neutron flux eignevalue problem, or a direct criticality search on the buckling, on a reciprocal velocity absorber (prompt mode), or on nuclide concentrations. The adjoint problem and fixed source problem may be solved, as well as the dominating higher harmonic, or the importance problem for an arbitrary fixed source.

Vondy, D.R.; Fowler, T.B.

1981-08-01T23:59:59.000Z