Broader source: Energy.gov [DOE]
PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code
V-170: Apache Subversion Hook Scripts Arbitrary Command Injection...
Broader source: Energy.gov (indexed) [DOE]
script while processing filenames and can be exploited to inject and execute arbitrary shell commands via a specially crafted request. Successful exploitation requires that...
T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability
Broader source: Energy.gov [DOE]
A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS X v10.6.
V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...
Broader source: Energy.gov (indexed) [DOE]
Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were...
U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...
Broader source: Energy.gov [DOE]
Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.
Broader source: Energy.gov [DOE]
Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target
Quantum Coding Theorems for Arbitrary Sources, Channels and Entanglement Resources
Garry Bowen; Nilanjana Datta
2006-09-30T23:59:59.000Z
The information spectrum approach gives general formulae for optimal rates of various information theoretic protocols, under minimal assumptions on the nature of the sources, channels and entanglement resources involved. This paper culminates in the derivation of the dense coding capacity for a noiseless quantum channel, assisted by arbitrary shared entanglement, using this approach. We also review the currently known coding theorems, and their converses, for protocols such as data compression for arbitrary quantum sources and transmission of classical information through arbitrary quantum channels. In addition, we derive the optimal rate of data compression for a mixed source
ETFOD: a point model physics code with arbitrary input
Rothe, K.E.; Attenberger, S.E.
1980-06-01T23:59:59.000Z
ETFOD is a zero-dimensional code which solves a set of physics equations by minimization. The technique used is different than normally used, in that the input is arbitrary. The user is supplied with a set of variables from which he specifies which variables are input (unchanging). The remaining variables become the output. Presently the code is being used for ETF reactor design studies. The code was written in a manner to allow easy modificaton of equations, variables, and physics calculations. The solution technique is presented along with hints for using the code.
U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...
Office of Environmental Management (EM)
5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9,...
U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code
Broader source: Energy.gov [DOE]
Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system
Broader source: Energy.gov [DOE]
Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.
T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code
Broader source: Energy.gov [DOE]
A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.
V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...
Office of Environmental Management (EM)
can exploit these issues to execute arbitrary PHP code within the context of the web server, bypass certain security restrictions, and perform unauthorized actions; this may aid...
T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code
Broader source: Energy.gov [DOE]
A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.
U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code
Broader source: Energy.gov [DOE]
Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.
U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code
Broader source: Energy.gov [DOE]
Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.
V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service
Broader source: Energy.gov [DOE]
Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.
U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code
Broader source: Energy.gov [DOE]
A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.
T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability
Broader source: Energy.gov [DOE]
Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.
U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabil...
Office of Environmental Management (EM)
have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. PLATFORM:...
EXPLORING EFFICIENT CODING SCHEMES FOR STORING ARBITRARY TREE DATA STRUCTURES IN FLASH MEMORIES
Falck, Justin
2009-06-09T23:59:59.000Z
fulfillment of the requirements for the designation as UNDERGRADUATE RESEARCH SCHOLAR A Senior Scholars Thesis by JUSTIN ALLEN FALCK EXPLORING EFFICIENT CODING SCHEMES FOR STORING ARBITRARY TREE DATA STRUCTURES IN FLASH MEMORIES Approved by... for the designation as UNDERGRADUATE RESEARCH SCHOLAR A Senior Scholars Thesis by JUSTIN ALLEN FALCK iii ABSTRACT Exploring Efficient Coding Schemes for Storing Arbitrary Tree Data Structures in Flash Memories. (April 2009) Justin Allen Falck...
Broader source: Energy.gov [DOE]
Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.
U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code
Broader source: Energy.gov [DOE]
Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.
Broader source: Energy.gov [DOE]
Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.
Broader source: Energy.gov [DOE]
A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.
Detecting arbitrary quantum errors via stabilizer measurements on a sublattice of the surface code
A. D. Córcoles; Easwar Magesan; Srikanth J. Srinivasan; Andrew W. Cross; M. Steffen; Jay M. Gambetta; Jerry M. Chow
2014-10-23T23:59:59.000Z
To build a fault-tolerant quantum computer, it is necessary to implement a quantum error correcting code. Such codes rely on the ability to extract information about the quantum error syndrome while not destroying the quantum information encoded in the system. Stabilizer codes are attractive solutions to this problem, as they are analogous to classical linear codes, have simple and easily computed encoding networks, and allow efficient syndrome extraction. In these codes, syndrome extraction is performed via multi-qubit stabilizer measurements, which are bit and phase parity checks up to local operations. Previously, stabilizer codes have been realized in nuclei, trapped-ions, and superconducting qubits. However these implementations lack the ability to perform fault-tolerant syndrome extraction which continues to be a challenge for all physical quantum computing systems. Here we experimentally demonstrate a key step towards this problem by using a two-by-two lattice of superconducting qubits to perform syndrome extraction and arbitrary error detection via simultaneous quantum non-demolition stabilizer measurements. This lattice represents a primitive tile for the surface code, which is a promising stabilizer code for scalable quantum computing. Furthermore, we successfully show the preservation of an entangled state in the presence of an arbitrary applied error through high-fidelity syndrome measurement. Our results bolster the promise of employing lattices of superconducting qubits for larger-scale fault-tolerant quantum computing.
Jeremiah W. Murphy; Adam Burrows
2008-07-09T23:59:59.000Z
In this paper, we describe a new hydrodynamics code for 1D and 2D astrophysical simulations, BETHE-hydro, that uses time-dependent, arbitrary, unstructured grids. The core of the hydrodynamics algorithm is an arbitrary Lagrangian-Eulerian (ALE) approach, in which the gradient and divergence operators are made compatible using the support-operator method. We present 1D and 2D gravity solvers that are finite differenced using the support-operator technique, and the resulting system of linear equations are solved using the tridiagonal method for 1D simulations and an iterative multigrid-preconditioned conjugate-gradient method for 2D simulations. Rotational terms are included for 2D calculations using cylindrical coordinates. We document an incompatibility between a subcell pressure algorithm to suppress hourglass motions and the subcell remapping algorithm and present a modified subcell pressure scheme that avoids this problem. Strengths of this code include a straightforward structure, enabling simple inclusion of additional physics packages, the ability to use a general equation of state, and most importantly, the ability to solve self-gravitating hydrodynamic flows on time-dependent, arbitrary grids. In what follows, we describe in detail the numerical techniques employed and, with a large suite of tests, demonstrate that BETHE-hydro finds accurate solutions with 2$^{nd}$-order convergence.
L. H. Li; P. Ventura; S. Basu; S. Sofia; P. Demarque
2006-01-27T23:59:59.000Z
A high-precision two-dimensional stellar evolution code has been developed for studying solar variability due to structural changes produced by varying internal magnetic fields of arbitrary configurations. Specifically, we are interested in modeling the effects of a dynamo-type field on the detailed internal structure and on the global parameters of the Sun. The high precision is required both to model very small solar changes (of order of $10^{-4}$) and short time scales (or order of one year). It is accomplished by using the mass coordinate to replace the radial coordinate, by using fixed and adjustable time steps, a realistic stellar atmosphere, elements diffusion, and by adjusting the grid points. We have also built into the code the potential to subsequently include rotation and turbulence. The current code has been tested for several cases, including its ability to reproduce the 1-D results.
U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct
Broader source: Energy.gov (indexed) [DOE]
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary Code | Department
Broader source: Energy.gov [DOE]
A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.
U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
A remote user can exploit this to spoof content on the target server, attempt to poison any intermediate web caches, or conduct cross-site scripting attacks. A remote user...
U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability
Broader source: Energy.gov [DOE]
The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.
Winters, W.S.
1984-01-01T23:59:59.000Z
An overview of the computer code TOPAZ (Transient-One-Dimensional Pipe Flow Analyzer) is presented. TOPAZ models the flow of compressible and incompressible fluids through complex and arbitrary arrangements of pipes, valves, flow branches and vessels. Heat transfer to and from the fluid containment structures (i.e. vessel and pipe walls) can also be modeled. This document includes discussions of the fluid flow equations and containment heat conduction equations. The modeling philosophy, numerical integration technique, code architecture, and methods for generating the computational mesh are also discussed.
U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code
Broader source: Energy.gov (indexed) [DOE]
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartmentScripting
Broader source: Energy.gov [DOE]
A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.
Web Interfaces 1 Python Scripts in Browsers
Verschelde, Jan
Web Interfaces 1 Python Scripts in Browsers the web server Apache processing forms with Python scripts Python code to write HTML 2 Web Interfaces for the Determinant dynamic interactive forms passing, 28 October 2013 Scientific Software (MCS 507 L-27) web interfaces 28 October 2013 1 / 42 #12;Web
U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of
Broader source: Energy.gov (indexed) [DOE]
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitrary CodeImpactEnergy
Broader source: Energy.gov [DOE]
An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.
Broader source: Energy.gov [DOE]
The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.
U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
Broader source: Energy.gov [DOE]
Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
scriptEnv - loading modules before starting a script
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
interpreter (e.g., perl, python) with any specified flags. This allows a script to bootstrap to the needed environment without needing a separate wrapper script. This allows you...
Transparent runtime parallelization of the R scripting language
Yoginath, Srikanth B [ORNL
2011-01-01T23:59:59.000Z
Scripting languages such as R and Matlab are widely used in scientific data processing. As the data volume and the complexity of analysis tasks both grow, sequential data processing using these tools often becomes the bottleneck in scientific workflows. We describe pR, a runtime framework for automatic and transparent parallelization of the popular R language used in statistical computing. Recognizing scripting languages interpreted nature and data analysis codes use pattern, we propose several novel techniques: (1) applying parallelizing compiler technology to runtime, whole-program dependence analysis of scripting languages, (2) incremental code analysis assisted with evaluation results, and (3) runtime parallelization of file accesses. Our framework does not require any modification to either the source code or the underlying R implementation. Experimental results demonstrate that pR can exploit both task and data parallelism transparently and overall has better performance as well as scalability compared to an existing parallel R package that requires code modification.
Linghuai Li; Sabatino Sofia; Paolo Ventura; Valentina Penza; Shaolan Bi; Sarbani Basu; Pierre Demarque
2008-10-27T23:59:59.000Z
In the second paper of this series we pursue two objectives. First, in order to make the code more sensitive to small effects, we remove many approximations made in Paper I. Second, we include turbulence and rotation in the two-dimensional framework. The stellar equilibrium is described by means of a set of five differential equations, with the introduction of a new dependent variable, namely the perturbation to the radial gravity, that is found when the non-radial effects are considered in the solution of the Poisson equation; following the scheme of the first paper, we write the equations in such a way that the two-dimensional effects can be easily disentangled. The key concept introduced in this series is the equipotential surface. We use the underlying cause-effect relation to develop a recurrence relation to calculate the equipotential surface functions for uniform rotation, differential rotation, rotation-like toroidal magnetic fields and turbulence. We also develop a more precise code to numerically solve the two-dimensional stellar structure and evolution equations based on the equipotential surface calculations. We have shown that with this formulation we can achieve the precision required by observations by appropriately selecting the convergence criterion. Several examples are presented to show that the method works well. Since we are interested in modeling the effects of a dynamo-type field on the detailed envelope structure and global properties of the Sun, the code has been optimized for short timescales phenomena (down to 1 yr). The time dependence of the code has so far been tested exclusively to address such problems.
Li Linghuai; Sofia, Sabatino; Basu, Sarbani; Demarque, Pierre [Department of Astronomy, Yale University, P.O. Box 208101, New Haven, CT 06520-8101 (United States); Ventura, Paolo [INAF, Osservatorio Astronomico di Roma, 00040 Monteporzio Catone (Italy); Penza, Valentina [Universita Di Roma 'Tor Vergata', Via Della Ricerca Scientifica 1, 00133 Roma (Italy); Bi Shaolan [Department of Astronomy, Beijing Normal University, Beijing 100875 (China)], E-mail: li@astro.yale.edu
2009-06-15T23:59:59.000Z
In the second paper of this series we pursue two objectives. First, in order to make the code more sensitive to small effects, we remove many approximations made in Paper I. Second, we include turbulence and rotation in the two-dimensional framework. The stellar equilibrium is described by means of a set of five differential equations, with the introduction of a new dependent variable, namely the perturbation to the radial gravity, that is found when the nonradial effects are considered in the solution of the Poisson equation. Following the scheme of the first paper, we write the equations in such a way that the two-dimensional effects can be easily disentangled. The key concept introduced in this series is the equipotential surface. We use the underlying cause-effect relation to develop a recurrence relation to calculate the equipotential surface functions for uniform rotation, differential rotation, rotation-like toroidal magnetic fields, and turbulence. We also develop a more precise code to numerically solve the two-dimensional stellar structure and evolution equations based on the equipotential surface calculations. We have shown that with this formulation we can achieve the precision required by observations by appropriately selecting the convergence criterion. Several examples are presented to show that the method works well. Since we are interested in modeling the effects of a dynamo-type field on the detailed envelope structure and global properties of the Sun, the code has been optimized for short timescales phenomena (down to 1 yr). The time dependence of the code has so far been tested exclusively to address such problems.
U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...
V-170: Apache Subversion Hook Scripts Arbitrary Command Injection
Broader source: Energy.gov (indexed) [DOE]
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment of
V-043: Perl Locale::Maketext Module '_compile()' Multiple Code...
Broader source: Energy.gov (indexed) [DOE]
Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...
Automated Analysis of Security-Critical JavaScript APIs Stanford University
Pratt, Vaughan
Automated Analysis of Security-Critical JavaScript APIs Ankur Taly Stanford University ataly. The trusted portion of each application may then expose an API to untrusted code, interposing a reference define the semantics of a restricted version of JavaScript devised by the ECMA Standards committee
Revising the worksheet with L3: a language and environment foruser-script interaction
Hohn, Michael H.
2008-01-22T23:59:59.000Z
This paper describes a novel approach to the parameter anddata handling issues commonly found in experimental scientific computingand scripting in general. The approach is based on the familiarcombination of scripting language and user interface, but using alanguage expressly designed for user interaction and convenience. The L3language combines programming facilities of procedural and functionallanguages with the persistence and need-based evaluation of data flowlanguages. It is implemented in Python, has access to all Pythonlibraries, and retains almost complete source code compatibility to allowsimple movement of code between the languages. The worksheet interfaceuses metadata produced by L3 to provide selection of values through thescriptit self and allow users to dynamically evolve scripts withoutre-running the prior versions. Scripts can be edited via text editors ormanipulated as structures on a drawing canvas. Computed values are validscripts and can be used further in other scripts via simplecopy-and-paste operations. The implementation is freely available underan open-source license.
Using JavaScript to simulate formative assessment questioning in web-based open learning materials
Bowerman, Chris; Mansfield, Charlie; Sewell, Keith
1997-12-19T23:59:59.000Z
This paper provides the JavaScript code for asking questions in web-based learning materials. The paper situates the setting of formative assessment exercises and questioning in the tradition of open learning materials design. Re-usable examples...
2012 PATRIOT SCRIPT User's Guide
Cuellar, Leticia [Los Alamos National Laboratory; Cleland, Timothy J. [Los Alamos National Laboratory; Kubicek, Deborah A. [Los Alamos National Laboratory; Mathis, Mark M. [Los Alamos National Laboratory; Stroud, Phillip D. [Los Alamos National Laboratory
2012-05-31T23:59:59.000Z
PATRIOT Script is an application that executes Patriot batch runs. This document provides a description of this application and how to run it. The basic user access tool PATRIOT Client allows a user to generate several most reliable paths in one run: one can specify a list of sources (origins) and targets, and PATRIOT finds for a given architecture option and one choice of device all the most reliable paths between all these sources and targets. The main objective of PATRIOT Script is to provide a tool for making automatic PATRIOT runs not only for a prespecified set of sources and targets, but also for a pre-specified set of devices and various architecture options. Running PATRIOT Script requires two basic steps that will be explained in more detail next: (1) Pre-preparation of an excel spreadsheet with the information about the desired runs; and (2) Opening the PATRIOT Script application, reading in the excel-spreadsheet and running the desired scenarios. Sections 1 and 2 explain each of these steps, and section 3 describes the output of the PATRIOT Script. For a detail description of the models and data behind PATRIOT and a detailed explanation of all the architecture options see [1]. For instructions of how to run PATRIOT Client see [2].
List decoding of subspace codes and rank-metric codes
Mahdavifar, Hessam
2012-01-01T23:59:59.000Z
2.2.2 Koetter-Kschischang Codes . . . . . . . . . . . .of Subspace Codes . . . . . . . . . . . . . . 2.3.1 OverviewList-decodable Codes of Arbitrary Dimension . . . . . . .
Parkins, Owen
2014-12-01T23:59:59.000Z
The testing script is to provide a method of inspections to HyRAM (v1.0.0.244 Alpha) application features. This document will lead participants through the use of the application to make sure the application performs as designed. If a feature of the application becomes non-working, this script will relay useful information back to the designers of the application so that the feature can be fixed. This is essential to keep the application updated and performing as designed so that the users of this program can be satisfied. There will be frequent updates of this document to ensure proper testing of future application versions.
The Eval that Men Do A Large-scale Study of the Use of Eval in JavaScript Applications
Vitek, Jan
The Eval that Men Do A Large-scale Study of the Use of Eval in JavaScript Applications Gregor. Transforming text into executable code with a function such as Java- Script's eval endows programmers with the ability to extend applications, at any time, and in almost any way they choose. But, this expressive power
Scripted Building Energy Modeling and Analysis: Preprint
Hale, E.; Macumber, D.; Benne, K.; Goldwasser, D.
2012-08-01T23:59:59.000Z
Building energy modeling and analysis is currently a time-intensive, error-prone, and nonreproducible process. This paper describes the scripting platform of the OpenStudio tool suite (http://openstudio.nrel.gov) and demonstrates its use in several contexts. Two classes of scripts are described and demonstrated: measures and free-form scripts. Measures are small, single-purpose scripts that conform to a predefined interface. Because measures are fairly simple, they can be written or modified by inexperienced programmers.
CSc-165 Spring 2014 Week 6(c) Scripting (3-script functions)
Gordon, Scott
" + scriptFile + e4); } } // an Action which invokes a script function private class UpdateCharacterAction.util.*; import net.java.games.input.Event; import sage.input.*; import sage.input.action.*; import sageScript functions to apply // changes to GameWorld nodes. It attaches a JavaScript function // to a keyboard action
An Introduction to JavaScript Godmar Back
Back, Godmar
An Introduction to JavaScript Godmar Back #12;JavaScript Â The Basics Â· Standardized as ECMAScript
V -209:Cisco WAAS (Wide Area Application Services) Arbitrary...
Broader source: Energy.gov (indexed) [DOE]
as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system. REFERENCE LINKS: Secunia...
FOUNDATIONS OF WEB SCRIPT SECURITY Aaron Bohannon
Plotkin, Joshua B.
FOUNDATIONS OF WEB SCRIPT SECURITY Aaron Bohannon A DISSERTATION in Computer and Information Science #12;FOUNDATIONS OF WEB SCRIPT SECURITY COPYRIGHT 2012 Aaron Bohannon #12;Acknowledgements applying reactive noninterference to web browsers. Before I started the final phase of my thesis research
SCRIPTING BEHAVIOUR TOWARDS A NEW LANGUAGE FOR MAKING NPCS ACT INTELLIGENTLY
Davies, Christopher
-scenes, directing camera movements or triggering events inside the game world. The use of scripting is also the most part of the Â previously hard-coded Â internal game logic from the game engine and transforms however has usually been limited to the game developers, and only in recent years the power to modify
Introduction to SCRIPT-ed Special Edition on Privacy and Technology
Edwards, Lilian
2006-01-01T23:59:59.000Z
Introduction to a special edition of SCRIPT-ed online journal focussing on the regulation of privacy, in light of new and changing technologies. The edition discusses privacy as a human right, or as a commodity, and presents articles from invited...
Andreeva, J; Karavakis, E; Kokoszkiewicz, L; Nowotka, M; Saiz, P; Tuckett, D
2012-01-01T23:59:59.000Z
Improvements in web browser performance and web standards compliance, as well as the availability of comprehensive JavaScript libraries, provides an opportunity to develop functionally rich yet intuitive web applications that allow users to access, render and analyse data in novel ways. However, the development of such large-scale JavaScript web applications presents new challenges, in particular with regard to code sustainability and team-based work. We present an approach that meets the challenges of large-scale JavaScript web application design and development, including client-side model-view-controller architecture, design patterns, and JavaScript libraries. Furthermore, we show how the approach leads naturally to the encapsulation of the data source as a web API, allowing applications to be easily ported to new data sources. The Experiment Dashboard framework is used for the development of applications for monitoring the distributed computing activities of virtual organisations on the Worldwide LHC Comp...
Parallel Web Scripting with Reactive Constraints Thibaud Hottelier
Bodik, Rastisla
Parallel Web Scripting with Reactive Constraints Thibaud Hottelier James Ide Doug Kimelman Ras Bodik Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report to lists, requires prior specific permission. #12;Parallel Web Scripting with Reactive Constraints Thibaud
Scripted Building Energy Modeling and Analysis (Presentation)
Macumber, D.
2012-10-01T23:59:59.000Z
Building energy analysis is often time-intensive, error-prone, and non-reproducible. Entire energy analyses can be scripted end-to-end using the OpenStudio Ruby API. Common tasks within an analysis can be automated using OpenStudio Measures. Graphical user interfaces (GUI's) and component libraries reduce time, decrease errors, and improve repeatability in energy modeling.
Script identification from images using cluster-based templates
Hochberg, J.G.; Kelly, P.M.; Thomas, T.R.
1998-12-01T23:59:59.000Z
A computer-implemented method identifies a script used to create a document. A set of training documents for each script to be identified is scanned into the computer to store a series of exemplary images representing each script. Pixels forming the exemplary images are electronically processed to define a set of textual symbols corresponding to the exemplary images. Each textual symbol is assigned to a cluster of textual symbols that most closely represents the textual symbol. The cluster of textual symbols is processed to form a representative electronic template for each cluster. A document having a script to be identified is scanned into the computer to form one or more document images representing the script to be identified. Pixels forming the document images are electronically processed to define a set of document textual symbols corresponding to the document images. The set of document textual symbols is compared to the electronic templates to identify the script. 17 figs.
Script identification from images using cluster-based templates
Hochberg, Judith G. (Los Alamos, NM); Kelly, Patrick M. (Los Alamos, NM); Thomas, Timothy R. (Santa Fe, NM)
1998-01-01T23:59:59.000Z
A computer-implemented method identifies a script used to create a document. A set of training documents for each script to be identified is scanned into the computer to store a series of exemplary images representing each script. Pixels forming the exemplary images are electronically processed to define a set of textual symbols corresponding to the exemplary images. Each textual symbol is assigned to a cluster of textual symbols that most closely represents the textual symbol. The cluster of textual symbols is processed to form a representative electronic template for each cluster. A document having a script to be identified is scanned into the computer to form one or more document images representing the script to be identified. Pixels forming the document images are electronically processed to define a set of document textual symbols corresponding to the document images. The set of document textual symbols is compared to the electronic templates to identify the script.
Handwritten Character Recognition of South Indian Scripts: A Review
Jomy, John; Kannan, Balakrishnan
2011-01-01T23:59:59.000Z
Handwritten character recognition is always a frontier area of research in the field of pattern recognition and image processing and there is a large demand for OCR on hand written documents. Even though, sufficient studies have performed in foreign scripts like Chinese, Japanese and Arabic characters, only a very few work can be traced for handwritten character recognition of Indian scripts especially for the South Indian scripts. This paper provides an overview of offline handwritten character recognition in South Indian Scripts, namely Malayalam, Tamil, Kannada and Telungu.
Script generation and multitasking in HIV-1 infection : implications for everyday functioning
Scott, James Cobb
2009-01-01T23:59:59.000Z
Gagnon S. (2004). Script generation following frontal andGroup. (2005). Action (verb) generation in HIV-1 infection.Note. SG = Script Generation test; MT = Multitasking test. *
Mathematical Modeling and Analysis The Arbitrary-Lagrangian-
Kurien, Susan
of the fluid, (ii) preserve positivity of density and specific internal energy, (iii) satisfy the maximumMathematical Modeling and Analysis The Arbitrary-Lagrangian- Eulerian Code for 1D Compressible- zone phase in which a new grid is defined, and a remapping (conservative interpolation) phase in which
U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks
Broader source: Energy.gov [DOE]
Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.
Scripting graphics with graphics : icons as a visual editing tool
Shamonsky, Dorothy J
1984-01-01T23:59:59.000Z
This thesis describes a system for scripting and editing graphic procedures with graphic representations or "icons." The icons are small bitmap images that carry with them information about spatial placement, list placement, ...
Scripting Game AI: An Alternative Approach using Embedded Languages
Pace, Gordon J.
Department University of Malta Msida, Malta acal010@um.edu.mt Gordon Pace Computer Science Department University of Malta Msida, Malta gordon.pace@um.edu.mt ABSTRACT Scripting is often used in games to enable
U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability...
Broader source: Energy.gov (indexed) [DOE]
and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-082: McAfee SaaS...
U-069: Telnet code execution vulnerability: FreeBSD and Kerberos
Broader source: Energy.gov [DOE]
Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.
Frutos-Alfaro, Francisco
2015-01-01T23:59:59.000Z
A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.
U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...
U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and...
U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerabilit...
Office of Environmental Management (EM)
0: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability October 26, 2011 - 9:00am Addthis...
V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis...
V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning...
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am...
T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks
Broader source: Energy.gov [DOE]
A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.
Automated Data Mining from Web Servers Using Perl Script
Wilamowski, Bogdan Maciej
Automated Data Mining from Web Servers Using Perl Script Sandeep Neeli , Kannan Govindasamy IL, USA olekmali@bradley.edu Abstract-Data mining from the Web is the process of extracting essential data from any web server. In this paper, we present a method called Ethernet Robot to extract
Perturbative Gadgets at Arbitrary Orders
Stephen P. Jordan; Edward Farhi
2012-01-31T23:59:59.000Z
Adiabatic quantum algorithms are often most easily formulated using many-body interactions. However, experimentally available interactions are generally two-body. In 2004, Kempe, Kitaev, and Regev introduced perturbative gadgets, by which arbitrary three-body effective interactions can be obtained using Hamiltonians consisting only of two-body interactions. These three-body effective interactions arise from the third order in perturbation theory. Since their introduction, perturbative gadgets have become a standard tool in the theory of quantum computation. Here we construct generalized gadgets so that one can directly obtain arbitrary k-body effective interactions from two-body Hamiltonians. These effective interactions arise from the kth order in perturbation theory.
Quantum stabilizer codes and beyond
Pradeep Kiran Sarvepalli
2008-10-14T23:59:59.000Z
The importance of quantum error correction in paving the way to build a practical quantum computer is no longer in doubt. This dissertation makes a threefold contribution to the mathematical theory of quantum error-correcting codes. Firstly, it extends the framework of an important class of quantum codes -- nonbinary stabilizer codes. It clarifies the connections of stabilizer codes to classical codes over quadratic extension fields, provides many new constructions of quantum codes, and develops further the theory of optimal quantum codes and punctured quantum codes. Secondly, it contributes to the theory of operator quantum error correcting codes also called as subsystem codes. These codes are expected to have efficient error recovery schemes than stabilizer codes. This dissertation develops a framework for study and analysis of subsystem codes using character theoretic methods. In particular, this work establishes a close link between subsystem codes and classical codes showing that the subsystem codes can be constructed from arbitrary classical codes. Thirdly, it seeks to exploit the knowledge of noise to design efficient quantum codes and considers more realistic channels than the commonly studied depolarizing channel. It gives systematic constructions of asymmetric quantum stabilizer codes that exploit the asymmetry of errors in certain quantum channels.
T-619: Skype for Mac Message Processing Code Execution Vulnerability
Broader source: Energy.gov [DOE]
A remote user can send a specially crafted message to a Skype user to execute arbitrary code on the target user's system. The code will run with the privileges of the target user.
MacWilliams identities for codes on graphs
Forney, G. David, Jr.
The MacWilliams identity for linear time-invariant convolutional codes that has recently been found by Gluesing-Luerssen and Schneider is proved concisely, and generalized to arbitrary group codes on graphs. A similar ...
The Arbitrary Trajectory Quantization Method
Debabrata Biswas
2001-07-12T23:59:59.000Z
The arbitrary trajectory quantization method (ATQM) is a time dependent approach to quasiclassical quantization based on the approximate dual relationship that exists between the quantum energy spectra and classical periodic orbits. It has recently been shown however, that, for polygonal billiards, the periodicity criterion must be relaxed to include closed almost-periodic (CAP) orbit families in this relationship. In light of this result, we reinvestigate the ATQM and show that at finite energies, a smoothened quasiclassical kernel corresponds to the modified formula that includes CAP families while the delta function kernel corresponding to the periodic orbit formula is recovered at high energies. Several clarifications are also provided.
Orndorff-Plunkett, Franklin
2011-05-01T23:59:59.000Z
The SCREAMER simulation code is widely used at Sandia National Laboratories for designing and simulating pulsed power accelerator experiments on super power accelerators. A preliminary parameter study of Z with a magnetic switching retrofit illustrates the utility of the automating script for optimizing pulsed power designs. SCREAMER is a circuit based code commonly used in pulsed-power design and requires numerous iterations to find optimal configurations. System optimization using simulations like SCREAMER is by nature inefficient and incomplete when done manually. This is especially the case when the system has many interactive elements whose emergent effects may be unforeseeable and complicated. For increased completeness, efficiency and robustness, investigators should probe a suitably confined parameter space using deterministic, genetic, cultural, ant-colony algorithms or other computational intelligence methods. I have developed SAE2 - a user-friendly, deterministic script that automates the search for optima of pulsed-power designs with SCREAMER. This manual demonstrates how to make input decks for SAE2 and optimize any pulsed-power design that can be modeled using SCREAMER. Application of SAE2 to magnetic switching on model of a potential Z refurbishment illustrates the power of SAE2. With respect to the manual optimization, the automated optimization resulted in 5% greater peak current (10% greater energy) and a 25% increase in safety factor for the most highly stressed element.
T-614: Cisco Unified Communications Manager Database Security...
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified...
T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks
Broader source: Energy.gov [DOE]
A potential security vulnerability has been identified in HP Diagnostics. The vulnerability could be exploited remotely resulting in cross site scripting (XSS).
V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...
Broader source: Energy.gov (indexed) [DOE]
Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS:...
HERCULES: A Pattern Driven Code Transformation System
Kartsaklis, Christos [ORNL; Hernandez, Oscar R [ORNL; Hsu, Chung-Hsing [ORNL; Ilsche, Thomas [Technische Universitat Dresden; Joubert, Wayne [ORNL; Graham, Richard L [ORNL
2012-01-01T23:59:59.000Z
New parallel computers are emerging, but developing efficient scientific code for them remains difficult. A scientist must manage not only the science-domain complexity but also the performance-optimization complexity. HERCULES is a code transformation system designed to help the scientist to separate the two concerns, which improves code maintenance, and facilitates performance optimization. The system combines three technologies, code patterns, transformation scripts and compiler plugins, to provide the scientist with an environment to quickly implement code transformations that suit his needs. Unlike existing code optimization tools, HERCULES is unique in its focus on user-level accessibility. In this paper we discuss the design, implementation and an initial evaluation of HERCULES.
Dynamic Code Overlay of SDF-Modeled Programs on Low-end Embedded Systems
Ha, Soonhoi
Dynamic Code Overlay of SDF-Modeled Programs on Low-end Embedded Systems Hae-woo Park Kyoungjoo Oh of synchronous data-flow (SDF) Âmodeled program for low-end embedded systems which lack MMU- support-program code, dynamic loader and linker script files from the given SDF- modeled blocks and schematic, so we
Indus script corpora, archaeo-metallurgy and Meluhha (Mleccha)
Kalyanaraman, Srinivasan
2012-01-01T23:59:59.000Z
Jules Bloch's work on formation of the Marathi language has to be expanded further to provide for a study of evolution and formation of Indian languages in the Indian language union (sprachbund). The paper analyses the stages in the evolution of early writing systems which began with the evolution of counting in the ancient Near East. A stage anterior to the stage of syllabic representation of sounds of a language, is identified. Unique geometric shapes required for tokens to categorize objects became too large to handle to abstract hundreds of categories of goods and metallurgical processes during the production of bronze-age goods. About 3500 BCE, Indus script as a writing system was developed to use hieroglyphs to represent the 'spoken words' identifying each of the goods and processes. A rebus method of representing similar sounding words of the lingua franca of the artisans was used in Indus script. This method is recognized and consistently applied for the lingua franca of the Indian sprachbund. That th...
Code Description Code Description
Leave* 5127 Officials 5217 Faculty Sick Leave Payment 5124 Personal Service Contracts 5211 Research Services Contracts Scholarships & Fellowships Faculty Fringe Contract Services #12;Banner Account Code
K. STEGMANN, A. WEINBERGER, F. FISCHER, & H. MANDL SCRIPTING ARGUMENTATIVE KNOWLEDGE
Paris-Sud XI, UniversitÃ© de
320 K. STEGMANN, A. WEINBERGER, F. FISCHER, & H. MANDL SCRIPTING ARGUMENTATIVE KNOWLEDGE of argumentation during process as well as with respect to the individual outcome. Both types of scripts were varied independently in a 2X2-factorial design. 120 students of Educational Science participated
POET: A Scripting Language For Applying Parameterized Source-to-source Program
Yi, Qing
POET: A Scripting Language For Applying Parameterized Source-to-source Program Transformations Qing Yi (qingyi@cs.utsa.edu) University of Texas at San Antonio Abstract We present POET, a scripting as well as building ad-hoc translators between these languages. We have used POET to support a large
POET: A Scripting Language For Applying Parameterized Source-to-source Program
Yi, Qing
POET: A Scripting Language For Applying Parameterized Source-to-source Program Transformations Qing Yi (qingyi@cs.utsa.edu) University of Texas at San Antonio Abstract We present POET, a scripting as well as building ad- hoc translators between these languages. We have used POET to support a large
User scripting on Android using BladeDroid Ravi Bhoraskar , Dominic Langenegger
Ernst, Michael
. In this paper, we introduce BladeDroid, a system that supports custom user scripts, which we call "BladesUser scripting on Android using BladeDroid Ravi Bhoraskar , Dominic Langenegger , Pingyang He. This paper presents BladeDroid, a system enabling user customization of mobile applications, using a novel
U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities
Office of Environmental Management (EM)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY6: Adobe| Department
U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...
Broader source: Energy.gov (indexed) [DOE]
4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,...
Systematic Techniques for Finding and Preventing Script Injection Vulnerabilities
Saxena, Prateek
2012-01-01T23:59:59.000Z
Architecture diagram for Kudzu. The components drawn in theapplications. . . . . . . . . . . . 4.10 Kudzu code coveragealone (dark bars) vs. complete Kudzu (light bars). For each
Analysis I & II -Vorlesungs-Script Prof. Dietmar Salamon
Salamon, Dietmar A.
Honegger Co-Coding: Eveline Hardmeier Graphics: Cyrill Grueter $Id: analysis.tex 533 2005-10-28 10:35:10Z
Homological Error Correction: Classical and Quantum Codes
H. Bombin; M. A. Martin-Delgado
2006-05-10T23:59:59.000Z
We prove several theorems characterizing the existence of homological error correction codes both classically and quantumly. Not every classical code is homological, but we find a family of classical homological codes saturating the Hamming bound. In the quantum case, we show that for non-orientable surfaces it is impossible to construct homological codes based on qudits of dimension $D>2$, while for orientable surfaces with boundaries it is possible to construct them for arbitrary dimension $D$. We give a method to obtain planar homological codes based on the construction of quantum codes on compact surfaces without boundaries. We show how the original Shor's 9-qubit code can be visualized as a homological quantum code. We study the problem of constructing quantum codes with optimal encoding rate. In the particular case of toric codes we construct an optimal family and give an explicit proof of its optimality. For homological quantum codes on surfaces of arbitrary genus we also construct a family of codes asymptotically attaining the maximum possible encoding rate. We provide the tools of homology group theory for graphs embedded on surfaces in a self-contained manner.
U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks
Broader source: Energy.gov [DOE]
Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).
U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks
Broader source: Energy.gov [DOE]
Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).
V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...
Broader source: Energy.gov (indexed) [DOE]
was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS:...
U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site...
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
Addthis Related Articles V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks T-597: WordPress Multiple Security Vulnerabilities T-693: Symantec Endpoint...
A Limit Study of JavaScript Parallelism Emily Fortuna Owen Anderson Luis Ceze Susan Eggers
Anderson, Richard
A Limit Study of JavaScript Parallelism Emily Fortuna Owen Anderson Luis Ceze Susan Eggers Computer Science and Engineering, University of Washington {fortuna, owen, luisceze, eggers}@cs.washington.edu http
V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...
Broader source: Energy.gov (indexed) [DOE]
Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue U-129: RSA...
Perry, Jonathan, S.M. Massachusetts Institute of Technology
2012-01-01T23:59:59.000Z
Spinal codes are a new class of rateless codes that enable wireless networks to cope with time-varying channel conditions in a natural way, without requiring any explicit bit rate selection. The key idea in the code is the ...
Dynamic optical arbitrary waveform generation and measurement
Kolner, Brian H.
(7), 2701Â2719 (2006). 4. N. K. Fontaine, R. P. Scott, J. Cao, A. Karalar, W. Jiang, K. Okamoto, J. PDynamic optical arbitrary waveform generation and measurement Ryan P. Scott,* Nicolas K. Fontaine. Lett. 32(7), 865Â867 (2007). 5. R. P. Scott, N. K. Fontaine, J. Cao, K. Okamoto, B. H. Kolner, J. P
Broader source: Energy.gov [DOE]
Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.
S. Adrian Barbulescu; Andrew Guidi; Steven S. Pietrobon
This paper describes a new class of codes, chaotic turbo codes. They were born from a symbiosis between a chaotical digital encoder and a turbo code. This paper investigates the most important properties of both chaotic digital encoders and turbo encoders in order to understand how the two complement each other. A Chaotic Turbo Encoder is then described and initial results will be presented. I. INTRODUCTION A chaotic digital encoder was defined for the first time in [1] as a non--linear digital filter with finite precision (8 bits) which behaves in a quasi--chaotic fashion, both with zero and nonzero input sequences. A simple chaotic encoder is shown in Figure 1 [1]. D Y k X k LCIRC D Figure 1: Chaotic Digital Encoder Mapper L L L L L L 1 The main features of chaotic digital encoders that are used in this paper are: # The system is digital which makes possible its integration with a turbo code. # The output of a chaotic digital encoder with arbitrary inputs has a broad...
Code design based on metric-spectrum and applications
Papadimitriou, Panayiotis D.
2005-02-17T23:59:59.000Z
We introduced nested search methods to design (n, k) block codes for arbitrary channels by optimizing an appropriate metric spectrum in each iteration. For a given k, the methods start with a good high rate code, say k/(k + 1), and successively...
Efficient quantum circuits for arbitrary sparse unitaries
Jordan, Stephen P. [Institute for Quantum Information, Caltech, Pasadena, California 91125 (United States); Wocjan, Pawel [School of Electrical Engineering and Computer Science, University of Central Florida, Orlando, Florida 32816 (United States)
2009-12-15T23:59:59.000Z
Arbitrary exponentially large unitaries cannot be implemented efficiently by quantum circuits. However, we show that quantum circuits can efficiently implement any unitary provided it has at most polynomially many nonzero entries in any row or column, and these entries are efficiently computable. One can formulate a model of computation based on the composition of sparse unitaries which includes the quantum Turing machine model, the quantum circuit model, anyonic models, permutational quantum computation, and discrete time quantum walks as special cases. Thus, we obtain a simple unified proof that these models are all contained in BQP. Furthermore, our general method for implementing sparse unitaries simplifies several existing quantum algorithms.
Thermoacoustic tomography with an arbitrary elliptic operator
Michael V. Klibanov
2012-08-26T23:59:59.000Z
Thermoacoustic tomography is a term for the inverse problem of determining of one of initial conditions of a hyperbolic equation from boundary measurements. In the past publications both stability estimates and convergent numerical methods for this problem were obtained only under some restrictive conditions imposed on the principal part of the elliptic operator. In this paper logarithmic stability estimates are obatined for an arbitrary variable principal part of that operator. Convergence of the Quasi-Reversibility Method to the exact solution is also established for this case. Both complete and incomplete data collection cases are considered.
Multiboson Correlation Interferometry with arbitrary single-photon pure states
Vincenzo Tamma; Simon Laibacher
2015-04-23T23:59:59.000Z
We provide a compact full description of multiboson correlation measurements of arbitrary order N in passive linear interferometers with arbitrary input single-photon pure states. We give evidence, even for non-identical photons, of the tremendous computational power of multiphoton quantum interference at the heart of the complexity of multiboson correlation sampling at the output of random linear interferometers. Moreover, our results describe general multiboson correlation landscapes for an arbitrary number of input single photons and arbitrary interferometers. In particular, we use two different schemes to demonstrate, respectively, arbitrary-order quantum beat interference and 100 % visibility entanglement correlations even for input photons distinguishable in their frequencies.
Code constructions and code families for nonbinary quantum stabilizer code
Ketkar, Avanti Ulhas
2005-11-01T23:59:59.000Z
Stabilizer codes form a special class of quantum error correcting codes. Nonbinary quantum stabilizer codes are studied in this thesis. A lot of work on binary quantum stabilizer codes has been done. Nonbinary stabilizer codes have received much...
Title An MLP using Hough transform based fuzzy feature extraction for Bengali script recognition
Sural, Shamik
recognition as well as in other pattern recognition problems. We propose here the application of the neuro-fuzzyTitle An MLP using Hough transform based fuzzy feature extraction for Bengali script recognition on the Hough transform of character pattern pixels from which additional fuzzy sets are synthesized using t
Progress on Problem about Quantum Hamming Bound for Impure Quantum Codes
Zhuo Li; Lijuan Xing
2009-07-22T23:59:59.000Z
A famous open problem in the theory of quantum error-correcting codes is whether or not the parameters of an impure quantum code can violate the quantum Hamming bound for pure quantum codes. We partially solve this problem. We demonstrate that there exists a threshold such that an arbitrary quantum code must obey the quantum Hamming bound whenever . We list some values of for small d and binary quantum codes.
Latorre, Jose I
2015-01-01T23:59:59.000Z
There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.
Jose I. Latorre; German Sierra
2015-02-23T23:59:59.000Z
There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.
Is It Possible To Clone Using An Arbitrary Blank State?
Anirban Roy; Aditi Sen; Ujjwal Sen
2001-11-29T23:59:59.000Z
We show that in a cloning process, whether deterministic inexact or probabilistic exact, one can take an arbitrary blank state while still using a fixed cloning machine.
arbitrary optical trapping: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
passing through Schieber, Jay D. 238 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...
arbitrary apertures ii: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
Washington at Seattle, University of 385 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...
arbitrary quantum system: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
theory. Sergio Giardino 2013-09-10 30 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...
arbitrary ionic strength: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
Washington at Seattle, University of 327 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...
arbitrary degree sequence: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
Washington at Seattle, University of 412 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...
arbitrary hard ellipses: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
Washington at Seattle, University of 342 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...
arbitrary control loop: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
Washington at Seattle, University of 330 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...
T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution
Broader source: Energy.gov [DOE]
Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.
U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary
Broader source: Energy.gov (indexed) [DOE]
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitraryDrupalCode | Department of
High Performance “Reach” Codes
Edelson, J.
2011-01-01T23:59:59.000Z
Jim Edelson New Buildings Institute A Growing Role for Codes and Stretch Codes in Utility Programs Clean Air Through Energy Efficiency November 9, 2011 ESL-KT-11-11-39 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 New Buildings Institute ESL..., Nov. 7 ? 9, 2011 ?31? Flavors of Codes ? Building Codes Construction Codes Energy Codes Stretch or Reach Energy Codes Above-code programs Green or Sustainability Codes Model Codes ?Existing Building? Codes Outcome-Based Codes ESL-KT-11...
CURRICULUM CODE: 611 & 613 MINOR CODE 061 DEGREE CODE: 31
Qiu, Weigang
CURRICULUM CODE: 611 & 613 MINOR CODE 061 DEGREE CODE: 31 DAAF 12/09 Hunter College of the City Stamp THIS AUDIT IS NOT OFFICIAL UNTIL APPROVED BY THE OFFICE OF THE REGISTRAR DEGREE AUDIT UNIT Student Specialization Section #12;CURRICULUM CODE: 611 & 613 MINOR CODE 061 DEGREE CODE: 31 DAAF 12/09 *****A SEPARATE
CURRICULUM CODE_611 & 613 MINOR CODE 062 DEGREE CODE _31_
Qiu, Weigang
CURRICULUM CODE_611 & 613 MINOR CODE 062 DEGREE CODE _31_ 1/24/2006 Hunter College of the City-mail address Department Stamp THIS AUDIT IS NOT OFFICIAL UNTIL APPROVED BY THE OFFICE OF THE REGISTRAR, DEGREE Section Only For January 2010 Graduate #12;CURRICULUM CODE_611 & 613 MINOR CODE 062 DEGREE CODE _31_ 1
Damage from pulses with arbitrary temporal shapes
Trenholme, J.B.
1994-06-06T23:59:59.000Z
In fusion laser designs, the laser pulse has a complicated temporal shape which undergoes significant change as it passes through the laser. Our damage data, however, was taken with pulses whose temporal shapes were (more or less) Gaussian. We want to determine the damage propensity of a material exposed to a pulse of arbitrary temporal shape , given data taken with Gaussian pulses of different pulse widths. To do so, we must adopt a physical model of damage. This model will contain some number of parameters that depend on material properties, geometry, and so forth. We determine the parameters of the model appropriate to each material by fitting the model to the Gaussian data for that material. The resulting normalized model is then applied, using the appropriate pulse shape, to find the damage level for a specific material subjected to a specific pulse. The model we shall assume is related to diffusion, although (as we shall see) the experimental results do not fit any simple diffusion model. Initially, we will discuss simple diffusion models. We then examine some experimental data, and then develop a modified diffusive model from that data. That modified model is then used to predict damage levels in various portions of the NIF laser design.
Virtual Clay: Haptics-based Deformable Solids of Arbitrary Topology
McDonnell, Kevin
Virtual Clay: Haptics-based Deformable Solids of Arbitrary Topology Kevin T. McDonnell and Hong Qin|qin}@cs.sunysb.edu Abstract. This paper presents Virtual Clay as a novel, interactive, dy- namic, haptics-based deformable solid of arbitrary topology. Our Virtual Clay methodology is a unique, powerful visual modeling paradigm
Wavelet Radiosity on Arbitrary Planar Nicolas Holzschuch1
Paris-Sud XI, Université de
Wavelet Radiosity on Arbitrary Planar Surfaces Nicolas Holzschuch1 , Franc¸ois Cuny2 and Laurent Abstract. Wavelet radiosity is, by its nature, restricted to parallelograms or tri- angles. This paper presents an innovative technique enabling wavelet radiosity computations on planar surfaces of arbitrary
ASTROMETRY.NET: BLIND ASTROMETRIC CALIBRATION OF ARBITRARY ASTRONOMICAL IMAGES
Masci, Frank
ASTROMETRY.NET: BLIND ASTROMETRIC CALIBRATION OF ARBITRARY ASTRONOMICAL IMAGES This article has CALIBRATION OF ARBITRARY ASTRONOMICAL IMAGES Dustin Lang1,2,7 , David W. Hogg3,4 , Keir Mierle1,5 , Michael Blanton3 , and Sam Roweis1,5,6 1 Department of Computer Science, University of Toronto, 6 King's College
ARPREC: An arbitrary precision computation package
Bailey, David H.; Yozo, Hida; Li, Xiaoye S.; Thompson, Brandon
2002-09-01T23:59:59.000Z
This paper describes a new software package for performing arithmetic with an arbitrarily high level of numeric precision. It is based on the earlier MPFUN package, enhanced with special IEEE floating-point numerical techniques and several new functions. This package is written in C++ code for high performance and broad portability and includes both C++ and Fortran-90 translation modules, so that conventional C++ and Fortran-90 programs can utilize the package with only very minor changes. This paper includes a survey of some of the interesting applications of this package and its predecessors.
Quantum Szilard engines with arbitrary spin
Zekun Zhuang; Shi-Dong Liang
2015-02-02T23:59:59.000Z
The quantum Szilard engine (QSZE) is a conceptual quantum engine for understanding the fundamental physics of quantum thermodynamics and information physics. We generalize the QSZE to an arbitrary spin case, i.e., a spin QSZE (SQSZE), and we systematically study the basic physical properties of both fermion and boson SQSZEs in a low-temperature approximation. We give the analytic formulation of the total work. For the fermion SQSZE, the work might be absorbed from the environment, and the change rate of the work with temperature exhibits periodicity and even-odd oscillation, which is a generalization of a spinless QSZE. It is interesting that the average absorbed work oscillates regularly and periodically in a large-number limit, which implies that the average absorbed work in a fermion SQSZE is neither an intensive quantity nor an extensive quantity. The phase diagrams of both fermion and boson SQSZEs give the SQSZE doing positive or negative work in the parameter space of the temperature and the particle number of the system, but they have different behaviors because the spin degrees of the fermion and the boson play different roles in their configuration states and corresponding statistical properties. The critical temperature of phase transition depends sensitively on the particle number. By using Landauer's erasure principle, we give the erasure work in a thermodynamic cycle, and we define an efficiency (we refer to it as information-work efficiency) to measure the engine's ability of utilizing information to extract work. We also give the conditions under which the maximum extracted work and highest information-work efficiencies for fermion and boson SQSZEs can be achieved.
Ravishankar, C., Hughes Network Systems, Germantown, MD
1998-05-08T23:59:59.000Z
Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the coding techniques are equally applicable to any voice signal whether or not it carries any intelligible information, as the term speech implies. Other terms that are commonly used are speech compression and voice compression since the fundamental idea behind speech coding is to reduce (compress) the transmission rate (or equivalently the bandwidth) And/or reduce storage requirements In this document the terms speech and voice shall be used interchangeably.
U-141: Sourcefire Defense Center Bugs | Department of Energy
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
Traversal Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct...
T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site...
Office of Environmental Management (EM)
IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be...
Statistical Mechanical Models and Topological Color Codes
H. Bombin; M. A. Martin-Delgado
2007-11-03T23:59:59.000Z
We find that the overlapping of a topological quantum color code state, representing a quantum memory, with a factorized state of qubits can be written as the partition function of a 3-body classical Ising model on triangular or Union Jack lattices. This mapping allows us to test that different computational capabilities of color codes correspond to qualitatively different universality classes of their associated classical spin models. By generalizing these statistical mechanical models for arbitrary inhomogeneous and complex couplings, it is possible to study a measurement-based quantum computation with a color code state and we find that their classical simulatability remains an open problem. We complement the meaurement-based computation with the construction of a cluster state that yields the topological color code and this also gives the possibility to represent statistical models with external magnetic fields.
T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability
Broader source: Energy.gov [DOE]
Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.
Gouranga C Nayak
2009-10-02T23:59:59.000Z
We study non-perturbative gluon pair production from arbitrary time dependent chromo-electric field E^a(t) with arbitrary color index a =1,2,...8 via Schwinger mechanism in arbitrary covariant background gauge \\alpha. We show that the probability of non-perturbative gluon pair production per unit time per unit volume per unit transverse momentum \\frac{dW}{d^4xd^2p_T} is independent of gauge fixing parameter \\alpha. Hence the result obtained in the Fynman-'t Hooft gauge, \\alpha=1, is the correct gauge invariant and gauge parameter \\alpha independent result.
A Markov-type inequality for arbitrary plane continua
1910-51-20T23:59:59.000Z
Dec 8, 2005 ... for all polynomials f. We prove a precise version of this inequality with an arbitrary continuum in the complex plane instead of the interval. [?1,1].
Skin effect with arbitrary specularity in Maxwellian plasma
Anatoly V. Latyshev; Alexander A. Yushkanov
2009-12-10T23:59:59.000Z
The problem of skin effect with arbitrary specularity in maxwellian plasma with specular--diffuse boundary conditions is solved. A new analytical method is developed that makes it possible to to obtain a solution up to an arbitrary degree of accuracy. The method is based on the idea of symmetric continuation not only the electric field, but also electron distribution function. The solution is obtained in a form of von Neumann series.
U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting
Broader source: Energy.gov (indexed) [DOE]
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartmentScriptingAttacks |
T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability
Broader source: Energy.gov [DOE]
Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.
U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code
Broader source: Energy.gov [DOE]
A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.
V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution
Broader source: Energy.gov (indexed) [DOE]
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities | Department of
V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |
Broader source: Energy.gov (indexed) [DOE]
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department of Energy Symantec
V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |
Broader source: Energy.gov (indexed) [DOE]
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department ofDepartment ofDepartment
V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |
Broader source: Energy.gov (indexed) [DOE]
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department ofDepartmentDepartment of
T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code
Broader source: Energy.gov (indexed) [DOE]
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department ofForgery Attacks and|
T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,
Broader source: Energy.gov (indexed) [DOE]
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |VulnerabilityEnergy July
U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the
Broader source: Energy.gov (indexed) [DOE]
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment of EnergyDepartmentURL
U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and
Broader source: Energy.gov (indexed) [DOE]
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartment of|
U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code
Broader source: Energy.gov (indexed) [DOE]
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartmentAuthentication Client 3.5|
U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof
Office of Environmental Management (EM)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY6: Adobe|2:
V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution
Broader source: Energy.gov (indexed) [DOE]
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|Potomac RiverWith theirabout
V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and
Broader source: Energy.gov (indexed) [DOE]
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment ofConduct Cross-Site
T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability
Broader source: Energy.gov [DOE]
Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.
Broader source: Energy.gov [DOE]
The Bureau of Construction Codes is responsible for the administration of the State Construction Code Act (1972 PA 230), also known as the Uniform Construction Code.
JLIFE: THE JEFFERSON LAB INTERACTIVE FRONT END FOR THE OPTICAL PROPAGATION CODE
Watson, Anne M. [JLAB; Shinn, Michelle D. [JLAB
2013-08-01T23:59:59.000Z
We present details on a graphical interface for the open source software program Optical Propagation Code, or OPC. This interface, written in Java, allows a user with no knowledge of OPC to create an optical system, with lenses, mirrors, apertures, etc. and the appropriate drifts between them. The Java code creates the appropriate Perl script that serves as the input for OPC. The mode profile is then output at each optical element. The display can be either an intensity profile along the x axis, or as an isometric 3D plot which can be tilted and rotated. These profiles can be saved. Examples of the input and output will be presented.
Nechtman, Tillman W.
2008-01-01T23:59:59.000Z
, Indian Ink: Script and Print in the Making of the English East India Company. Chicago and London: The University of Chicago Press, 2007. xiii + 318 pp. + 22 illus. $40.00. Review by TILLMAN W. NECHTMAN, SKIDMORE COLLEGE. The India Office Records... Company (EIC) and the English/British empire in South Asia. Miles Ogborn?s impressive new book, Indian Ink: Script and Print in the Making of the English East India Company, approaches this same archive from an important new direction. Rather than reading...
Generalized concatenated quantum codes
Grassl, Markus
We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using ...
Boyer, Edmond
2009-01-01T23:59:59.000Z
IFP -- Oil & Gas Science and Technology -- (Script : 1er specimen) -- 1 -- Oil & Gas Science2010 Author manuscript, published in "Oil & Gas Science and Technology - Rev. IFP, 65, 3 (2010) 435-444" DOI : 10.2516/ogst/2010007 #12;IFP -- Oil & Gas Science and Technology -- (Script : 1er specimen) -- 2
T-623: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks
Broader source: Energy.gov [DOE]
The software does not properly filter HTML code from user-supplied input before displaying the input.
Mitsuru Hamada
2006-10-31T23:59:59.000Z
A conjugate code pair is defined as a pair of linear codes either of which contains the dual of the other. A conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is known that conjugate code pairs are applicable to (quantum) cryptography. We give a construction method for efficiently decodable conjugate code pairs.
CURRICULUM CODE 308 DEGREE CODE _40
Qiu, Weigang
CURRICULUM CODE 308 DEGREE CODE _40 Hunter College of the City University of New York - Office Print) E-mail address OES Stamp THIS AUDIT IS NOT OFFICIAL UNTIL APPROVED BY THE OFFICE OF THE REGISTRAR Specialization Section #12;CURRICULUM CODE_308_ DEGREE CODE _40__ Course Prefix & Number Course Title Credits
Boyer, Edmond
CEA Service hospitalier Frédéric Joliot, DRM, Orsay, France f Sint Maartenskliniek Research Neurologie, Centre Hospitalier Universitaire, 4 rue Larrey, 49033 Angers Cedex 01. Telephone: +33 (0)2 41 35 in the management of script event knowledge required in planning behavior. Methods: This study was designated to map
THERMOACOUSTIC TOMOGRAPHY WITH AN ARBITRARY ELLIPTIC OPERATOR MICHAEL V. KLIBANOV
1 THERMOACOUSTIC TOMOGRAPHY WITH AN ARBITRARY ELLIPTIC OPERATOR MICHAEL V. KLIBANOV Abstract. Thermoacoustic tomography is a term for the inverse problem of determining of one of initial conditions. In thermoacoustic tomography (TAT) a short radio frequency pulse is sent in a biological tissue [1, 9]. Some energy
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups
Fehr, Serge
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups Ronald Cramer and Serge Fehr BRICS-box secret sharing scheme for the threshold access structure Tt,n is one which works over any finite Abelian group G. Briefly, such a scheme differs from an ordinary linear secret sharing scheme (over, say
Optimal BlackBox Secret Sharing over Arbitrary Abelian Groups
Fehr, Serge
Optimal BlackÂBox Secret Sharing over Arbitrary Abelian Groups Ronald Cramer and Serge Fehr BRICSÂbox secret sharing scheme for the threshold access structure Tt,n is one which works over any finite Abelian group G. Briefly, such a scheme di#ers from an ordinary linear secret sharing scheme (over, say, a given
Anderson, Jonas T., E-mail: jonastyleranderson@gmail.com
2013-03-15T23:59:59.000Z
In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.
Emmadi, Santosh Kumar
2014-12-11T23:59:59.000Z
A class of codes, half-product codes, derived from product codes, is characterized. These codes have the implementation advantages of product codes and possess a special structural property which leads them to have larger (at least 3/2 times more...
U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks
Broader source: Energy.gov [DOE]
Flex applications created using the Flex SDK may not properly filter HTML code from user-supplied input before displaying the input.
List of codes Language abbreviation codes
Portugal MT Malta GR Greece SE Sweden TR Turkey Country codes for the ERASMUS Institutional Identification codes A Austria IR L Ireland BG Bulgaria LV Latvia B Belgium IS Iceland CY Cyprus MT Malta D Germany L
Generalized Concatenation for Quantum Codes
Grassl, Markus
We show how good quantum error-correcting codes can be constructed using generalized concatenation. The inner codes are quantum codes, the outer codes can be linear or nonlinear classical codes. Many new good codes are ...
Quantum convolutional stabilizer codes
Chinthamani, Neelima
2004-09-30T23:59:59.000Z
Quantum error correction codes were introduced as a means to protect quantum information from decoherance and operational errors. Based on their approach to error control, error correcting codes can be divided into two different classes: block codes...
Broader source: Energy.gov [DOE]
NOTE: In September 2012, The Guam Building Code Council adopted the draft [http://www.guamenergy.com/outreach-education/guam-tropical-energy-code/ Guam Tropical Energy Code]. It must be adopted by...
Broader source: Energy.gov [DOE]
In 2009 S.B. 1182 created the Oklahoma Uniform Building Code Commission. The 11-member Commission was given the power to conduct rulemaking processes to adopt new building codes. The codes adopted...
Codeword Stabilized Quantum Codes
Andrew Cross; Graeme Smith; John A. Smolin; Bei Zeng
2007-09-27T23:59:59.000Z
We present a unifying approach to quantum error correcting code design that encompasses additive (stabilizer) codes, as well as all known examples of nonadditive codes with good parameters. We use this framework to generate new codes with superior parameters to any previously known. In particular, we find ((10,18,3)) and ((10,20,3)) codes. We also show how to construct encoding circuits for all codes within our framework.
Generalized Concatenated Quantum Codes
Markus Grassl; Peter Shor; Graeme Smith; John Smolin; Bei Zeng
2009-01-09T23:59:59.000Z
We introduce the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of new single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length, but also asymptotically achieve the quantum Hamming bound for large block length.
Pradeep Kiran Sarvepalli; Andreas Klappenecker
2008-06-30T23:59:59.000Z
In this paper we investigate the encoding of operator quantum error correcting codes i.e. subsystem codes. We show that encoding of subsystem codes can be reduced to encoding of a related stabilizer code making it possible to use all the known results on encoding of stabilizer codes. Along the way we also show how Clifford codes can be encoded. We also show that gauge qubits can be exploited to reduce the encoding complexity.
Giuliano G. La Guardia
2013-11-11T23:59:59.000Z
In this paper we investigate the class of constacyclic codes, which is a natural generalization of the class of cyclic and negacyclic codes. This class of codes is interesting in the sense that it contains codes with good or even optimal parameters. In this light, we propose constructions of families of classical block and convolutional maximum-distance-separable (MDS) constacyclic codes, as well as families of asymmetric quantum MDS codes derived from (classical-block) constacyclic codes. These results are mainly derived from the investigation of suitable properties on cyclotomic cosets of these corresponding codes.
Broader source: Energy.gov [DOE]
The West Virginia State Fire Commission is responsible for adopting and promulgating statewide construction codes. These codes may be voluntarily adopted at the local level. Local jurisdictions...
Massive "spin-2" theories in arbitrary $D \\ge 3$ dimensions
D. Dalmazi; A. L. R. dos Santos; E. L. Mendonça
2014-08-28T23:59:59.000Z
Here we show that in arbitrary dimensions $D\\ge 3$ there are two families of second order Lagrangians describing massive "spin-2" particles via a nonsymmetric rank-2 tensor. They differ from the usual Fierz-Pauli theory in general. At zero mass one of the families is Weyl invariant. Such massless theory has no particle content in $D=3$ and gives rise, via master action, to a dual higher order (in derivatives) description of massive spin-2 particles in $D=3$ where both the second and the fourth order terms are Weyl invariant, contrary to the linearized New Massive Gravity. However, only the fourth order term is invariant under arbitrary antisymmetric shifts. Consequently, the antisymmetric part of the tensor $e_{[\\mu\
Arbitrary Rotation Invariant Random Matrix Ensembles and Supersymmetry
Thomas Guhr
2006-06-03T23:59:59.000Z
We generalize the supersymmetry method in Random Matrix Theory to arbitrary rotation invariant ensembles. Our exact approach further extends a previous contribution in which we constructed a supersymmetric representation for the class of norm-dependent Random Matrix Ensembles. Here, we derive a supersymmetric formulation under very general circumstances. A projector is identified that provides the mapping of the probability density from ordinary to superspace. Furthermore, it is demonstrated that setting up the theory in Fourier superspace has considerable advantages. General and exact expressions for the correlation functions are given. We also show how the use of hyperbolic symmetry can be circumvented in the present context in which the non-linear sigma model is not used. We construct exact supersymmetric integral representations of the correlation functions for arbitrary positions of the imaginary increments in the Green functions.
Security of quantum key distribution with arbitrary individual imperfections
Øystein Marøy; Lars Lydersen; Johannes Skaar
2010-06-01T23:59:59.000Z
We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.
A compact, multichannel, and low noise arbitrary waveform generator
Govorkov, S. [Sema Systems, 302-5553 16th ave., Delta, British Columbia V4M 2H7 (Canada)] [Sema Systems, 302-5553 16th ave., Delta, British Columbia V4M 2H7 (Canada); Ivanov, B. I. [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany) [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany); Novosibirsk State Technical University, K.Marx-Ave. 20, Novosibirsk 630092 (Russian Federation); Il'ichev, E.; Meyer, H.-G. [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany)] [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany)
2014-05-15T23:59:59.000Z
A new type of high functionality, fast, compact, and easy programmable arbitrary waveform generator for low noise physical measurements is presented. The generator provides 7 fast differential waveform channels with a maximum bandwidth up to 200 MHz frequency. There are 6 fast pulse generators on the generator board with 78 ps time resolution in both duration and delay, 3 of them with amplitude control. The arbitrary waveform generator is additionally equipped with two auxiliary slow 16 bit analog-to-digital converters and four 16 bit digital-to-analog converters for low frequency applications. Electromagnetic shields are introduced to the power supply, digital, and analog compartments and with a proper filter design perform more than 110 dB digital noise isolation to the output signals. All the output channels of the board have 50 ? SubMiniature version A termination. The generator board is suitable for use as a part of a high sensitive physical equipment, e.g., fast read out and manipulation of nuclear magnetic resonance or superconducting quantum systems and any other application, which requires electromagnetic interference free fast pulse and arbitrary waveform generation.
Remote state preparation: arbitrary remote control of photon polarization Nicholas A. Peters,1
Kwiat, Paul
Remote state preparation: arbitrary remote control of photon polarization Nicholas A. Peters,1 University, Kirksville, MO 63501 (Dated: October 22, 2004) We experimentally demonstrate the first remote, we remotely prepare arbitrary states at two wavelengths. Further, we derive theoretical bounds
A review of "The Uses of Script and Print, 1300-1700." by Julia Crick and Alexandra Walsham eds.
William E. Engel
2005-01-01T23:59:59.000Z
50 SEVENTEENTH-CENTURY NEWS Julia Crick and Alexandra Walsham, eds. The Uses of Script and Print, 1300- 1700. Cambridge: Cambridge University Press, 2004. xiv + 298 pp. + 6 illus. Review by WILLIAM E. ENGEL, UNIVERSITY OF THE SOUTH, SEWANEE... conscious of the mutability of exchange that oper- ated in the early modern period between the spoken, handwritten and printed? (289), the word ?revisionism? does not appear, and ?interaction? rather than ?impact? is used to ?describe the dynamism of texts...
Generalized Concatenation for Quantum Codes
Markus Grassl; Peter W. Shor; Bei Zeng
2009-05-04T23:59:59.000Z
We show how good quantum error-correcting codes can be constructed using generalized concatenation. The inner codes are quantum codes, the outer codes can be linear or nonlinear classical codes. Many new good codes are found, including both stabilizer codes as well as so-called nonadditive codes.
Graph concatenation for quantum codes
Beigi, Salman
Graphs are closely related to quantum error-correcting codes: every stabilizer code is locally equivalent to a graph code and every codeword stabilized code can be described by a graph and a classical code. For the ...
CONCATENATED CODES BASED ON MULTIDIMENSIONAL PARITY-CHECK CODES AND TURBO CODES
Wong, Tan F.
CONCATENATED CODES BASED ON MULTIDIMENSIONAL PARITY-CHECK CODES AND TURBO CODES John M. Shea, Florida Abstract--Turbo-codes provide communications near capac- ity when very large interleavers (and parity-check code can be used as an outer code with a turbo code as an inner code in a serial
An arbitrary function generator for use with an analog computer
Shanks, John Lee
1956-01-01T23:59:59.000Z
an output voltage, f(x)x which is a function of an input voltage, x. II ' THE PROBLEN Statement of the problem. It was the purpose of this research to design and build an arbitrary function generator Granino A. Kozn and Theresa N, Korn, Electronic... I CL L LI L') c) IW Qg d pJ O TABLE OF CONTENTS CHAPTER I. INTRODUCTION TO THE PROBLEM De f i ni t i on o f Terms. Analog computer Computer components. Function generator The Problem Statement of the problem Justification of the problem...
Quantum memory of a squeezed vacuum for arbitrary frequency sidebands
Arikawa, Manabu; Honda, Kazuhito; Akamatsu, Daisuke; Nagatsuka, Satoshi; Akiba, Keiichirou [Department of Physics, Tokyo Institute of Technology, 2-12-1 O-okayama, Meguro-ku, Tokyo 152-8550 (Japan); Furusawa, Akira [Department of Applied Physics, School of Engineering, University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-8656 (Japan); Kozuma, Mikio [Department of Physics, Tokyo Institute of Technology, 2-12-1 O-okayama, Meguro-ku, Tokyo 152-8550 (Japan); CREST, Japan Science and Technology Agency, 1-9-9 Yaesu, Chuo-ku, Tokyo 103-0028 (Japan)
2010-02-15T23:59:59.000Z
We have developed a quantum memory that is completely compatible with current quantum information processing for continuous variables of light, where arbitrary frequency sidebands of a squeezed vacuum can be stored and retrieved using bichromatic electromagnetic induced transparency. The 2 MHz sidebands of squeezed vacuum pulses with temporal widths of 470 ns and a squeezing level of -1.78{+-}0.02 dB were stored for 3 {mu}s in laser-cooled {sup 87}Rb atoms. Squeezing of -0.44{+-}0.02 dB, which is the highest squeezing reported for a retrieved pulse, was achieved.
Towards radio astronomical imaging using an arbitrary basis
Petschow, Matthias
2015-01-01T23:59:59.000Z
The new generation of radio telescopes, such as the Square Kilometer Array (SKA), requires dramatic advances in computer hardware and software, in order to process the large amounts of produced data efficiently. In this document, we explore a new approach to wide-field imaging. By generalizing the image reconstruction, which is performed by an inverse Fourier transform, to arbitrary transformations, we gain enormous new possibilities. In particular, we outline an approach that might allow to obtain a sky image of size P times Q in (optimal) O(PQ) time. This could be a step in the direction of real-time, wide-field sky imaging for future telescopes.
Generalized Intelligent States for an Arbitrary Quantum System
A. H. EL Kinani; M. Daoud
2003-11-06T23:59:59.000Z
Generalized Intelligent States (coherent and squeezed states) are derived for an arbitrary quantum system by using the minimization of the so-called Robertson-Schr\\"odinger uncertainty relation. The Fock-Bargmann representation is also considered. As a direct illustration of our construction, the P\\"oschl-Teller potentials of trigonometric type will be shosen. We will show the advantage of the Fock-Bargmann representation in obtaining the generalized intelligent states in an analytical way. Many properties of these states are studied.
Colored knot polynomials for arbitrary pretzel knots and links
DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)
Galakhov, D.; Melnikov, D.; Mironov, A.; Morozov, A.; Sleptsov, A.
2015-04-01T23:59:59.000Z
A very simple expression is conjectured for arbitrary colored Jones and HOMFLY polynomials of a rich (g+1)-parametric family of pretzel knots and links. The answer for the Jones and HOMFLY is fully and explicitly expressed through the Racah matrix of Uq(SUN), and looks related to a modular transformation of toric conformal block.Knot polynomials are among the hottest topics in modern theory. They are supposed to summarize nicely representation theory of quantum algebras and modular properties of conformal blocks. The result reported in the present letter, provides a spectacular illustration and support to this general expectation.
Ising Model on Networks with an Arbitrary Distribution of Connections
S. N. Dorogovtsev; A. V. Goltsev; J. F. F. Mendes
2002-04-11T23:59:59.000Z
We find the exact critical temperature $T_c$ of the nearest-neighbor ferromagnetic Ising model on an `equilibrium' random graph with an arbitrary degree distribution $P(k)$. We observe an anomalous behavior of the magnetization, magnetic susceptibility and specific heat, when $P(k)$ is fat-tailed, or, loosely speaking, when the fourth moment of the distribution diverges in infinite networks. When the second moment becomes divergent, $T_c$ approaches infinity, the phase transition is of infinite order, and size effect is anomalously strong.
Joint Source-Channel Coding via Turbo Codes
Alajaji, Fady
Joint Source-Channel Coding via Turbo Codes by Guang-Chong Zhu A dissertation submitted coding. One of the most exciting break- throughs in channel coding is the invention of Turbo codes, whose- tigate three joint source-channel coding issues in the context of Turbo codes. In the #12;rst part
Aleksander Kubica; Beni Yoshida; Fernando Pastawski
2015-03-06T23:59:59.000Z
The topological color code and the toric code are two leading candidates for realizing fault-tolerant quantum computation. Here we show that the color code on a $d$-dimensional closed manifold is equivalent to multiple decoupled copies of the $d$-dimensional toric code up to local unitary transformations and adding or removing ancilla qubits. Our result not only generalizes the proven equivalence for $d=2$, but also provides an explicit recipe of how to decouple independent components of the color code, highlighting the importance of colorability in the construction of the code. Moreover, for the $d$-dimensional color code with $d+1$ boundaries of $d+1$ distinct colors, we find that the code is equivalent to multiple copies of the $d$-dimensional toric code which are attached along a $(d-1)$-dimensional boundary. In particular, for $d=2$, we show that the (triangular) color code with boundaries is equivalent to the (folded) toric code with boundaries. We also find that the $d$-dimensional toric code admits logical non-Pauli gates from the $d$-th level of the Clifford hierarchy, and thus saturates the bound by Bravyi and K\\"{o}nig. In particular, we show that the $d$-qubit control-$Z$ logical gate can be fault-tolerantly implemented on the stack of $d$ copies of the toric code by a local unitary transformation.
Broader source: Energy.gov [DOE]
''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...
Broader source: Energy.gov [DOE]
''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
Compiling Codes Compiling Codes Overview Open Mpi is the the only MPI library available on Euclid. This implementation of MPI-2 is described at Open MPI: Open Source High...
Mercier, Rachel Havens
2008-01-01T23:59:59.000Z
This thesis analyzes the impact of form-based codes, focusing on two research questions: (1) What is the underlying motivation for adopting a form-based code? (2) What motivations have the most significant impact on ...
Introduction to Algebraic Codes
for health care. These self-correcting codes that occur in nature might be better than all of. our coding theory based on algebra or algebraic geometry. It is a myth
Broader source: Energy.gov [DOE]
Note: Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...
Broader source: Energy.gov [DOE]
''Note: Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For...
Cellulases and coding sequences
Li, Xin-Liang (Athens, GA); Ljungdahl, Lars G. (Athens, GA); Chen, Huizhong (Lawrenceville, GA)
2001-02-20T23:59:59.000Z
The present invention provides three fungal cellulases, their coding sequences, recombinant DNA molecules comprising the cellulase coding sequences, recombinant host cells and methods for producing same. The present cellulases are from Orpinomyces PC-2.
Broader source: Energy.gov [DOE]
The New Jersey Uniform Construction Code Act provides that model codes and standards publications shall not be adopted more frequently than once every three years. However, a revision or amendment...
Broader source: Energy.gov [DOE]
All residential and commercial structures are required to comply with the state’s energy code. The 2009 New Mexico Energy Conservation Code (NMECC), effective June 2013, is based on 2009...
Broader source: Energy.gov [DOE]
Prior to 1997, South Carolina's local governments adopted and enforced the building codes. In 1997, the law required statewide use of the most up-to-date building codes, which then required the...
V-193: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting
Broader source: Energy.gov (indexed) [DOE]
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCodeService on
Coding for Cooperative Communications
Uppal, Momin Ayub
2011-10-21T23:59:59.000Z
of SWCNSQ based CF relaying as a performance benchmark, we will present a practical code design using low-density parity-check (LDPC) codes for error protection at the source, and nested scalar quantization plus irregular repeat-accumulate (IRA) codes... develop and design practical coding strategies which perform very close to the infor- mation theoretic limits. The cooperative communication channels we consider are: (a) The Gaussian re- lay channel, (b) the quasi-static fading relay channel, (c...
M. T. Homer Reid; Jacob White; Steven G. Johnson
2012-07-12T23:59:59.000Z
This paper presents a new method for the efficient numerical computation of Casimir interactions between objects of arbitrary geometries, composed of materials with arbitrary frequency-dependent electrical properties. Our method formulates the Casimir effect as an interaction between effective electric and magnetic current distributions on the surfaces of material bodies, and obtains Casimir energies, forces, and torques from the spectral properties of a matrix that quantifies the interactions of these surface currents. The method can be formulated and understood in two distinct ways: \\textbf{(1)} as a consequence of the familiar \\textit{stress-tensor} approach to Casimir physics, or, alternatively, \\textbf{(2)} as a particular case of the \\textit{path-integral} approach to Casimir physics, and we present both formulations in full detail. In addition to providing an algorithm for computing Casimir interactions in geometries that could not be efficiently handled by any other method, the framework proposed here thus achieves an explicit unification of two seemingly disparate approaches to computational Casimir physics.
Sergey Bravyi; Matthew B. Hastings
2013-11-04T23:59:59.000Z
Quantum codes with low-weight stabilizers known as LDPC codes have been actively studied recently due to their simple syndrome readout circuits and potential applications in fault-tolerant quantum computing. However, all families of quantum LDPC codes known to this date suffer from a poor distance scaling limited by the square-root of the code length. This is in a sharp contrast with the classical case where good families of LDPC codes are known that combine constant encoding rate and linear distance. Here we propose the first family of good quantum codes with low-weight stabilizers. The new codes have a constant encoding rate, linear distance, and stabilizers acting on at most $\\sqrt{n}$ qubits, where $n$ is the code length. For comparison, all previously known families of good quantum codes have stabilizers of linear weight. Our proof combines two techniques: randomized constructions of good quantum codes and the homological product operation from algebraic topology. We conjecture that similar methods can produce good stabilizer codes with stabilizer weight $n^a$ for any $a>0$. Finally, we apply the homological product to construct new small codes with low-weight stabilizers.
Understanding Perception Through Neural 'Codes'
Freeman, Walter J III
2011-01-01T23:59:59.000Z
Perception Through Neural ‘Codes’. In: Special Issue on “Perception Through Neural ‘Codes’. In: Special Issue on “Perception Through Neural ‘Codes’. In: Special Issue on “
EXTENSION OF THE EMPIRE CODE TO THE RESONANCE REGION.
CHO,Y.S.; HERMAN, M.; MUGHABGHAB, S.F.; OBLOZINSKY, P.; ROCHMAN, D.; LEE, Y.O.
2007-04-22T23:59:59.000Z
The preliminary version of a new module has been developed to be added to a nuclear reaction model code EMPIRE to allow for an evaluation of neutron cross sections in a resonance region. It automates most of the evaluation procedures and can be executed within EMPIRE or as a stand-alone program. The module includes a graphic user interface (GUI) and a number of codes and scripts that read individual, as well as average, resonance parameters from the Atlas of Neutron Resonances and other physical constants from RIPL-2, perform an analysis of the available resonances, carry out statistical distributions, and compute cross sections in resolved and unresolved resonance regions which are then compared with experimental data. The module also provides an ENDF-formatted file for a resonance region and various plots allowing for a verification of the procedure. The formatted file can be integrated later into the final ENDF-6 file as generated by the EMPIRE code. However, as a preliminary version, extensive testing and further improvements are needed before this new capability can be incorporated into the production version of EMPIRE.
Residual zonal flows in tokamaks and stellarators at arbitrary wavelengths
Monreal, P; Sánchez, E; Parra, F I; Bustos, A; Könies, A; Kleiber, R; Görler, T
2015-01-01T23:59:59.000Z
In the linear collisionless limit, a zonal potential perturbation in a toroidal plasma relaxes, in general, to a non-zero residual value. Expressions for the residual value in tokamak and stellarator geometries, and for arbitrary wavelengths, are derived. These expressions involve averages over the lowest order particle trajectories, that typically cannot be evaluated analytically. In this work, an efficient numerical method for the evaluation of such expressions is reported. It is shown that this method is faster than direct gyrokinetic simulations. Calculations of the residual value in stellarators are provided for much shorter wavelengths than previously available in the literature. Electrons must be treated kinetically in stellarators because, unlike in tokamaks, kinetic electrons modify the residual value even at long wavelengths. This effect, that had already been predicted theoretically, is confirmed by gyrokinetic simulations.
Decay of Graviton Condensates and their Generalizations in Arbitrary Dimensions
Florian Kuhnel; Bo Sundborg
2014-09-30T23:59:59.000Z
Classicalons are self-bound classical field configurations, which include black holes in General Relativity. In quantum theory, they are described by condensates of many soft quanta. In this work, their decay properties are studied in arbitrary dimensions. It is found that generically the decays of other classicalons are enhanced compared to pure graviton condensates, ie. black holes. The evaporation of higher dimensional graviton condensates turns out to match Hawking radiation solely due to non-linearites captured by the classicalon picture. Although less stable than black holes, all self-bound condensates are shown to be stable in the limit of large mass. Like for black holes, the effective coupling always scales as the inverse of the number of constituents, indicating that these systems are at critical points of quantum phase transitions. Consequences for cosmology, astro- and collider physics are briefly discussed.
Multiple phase estimation for arbitrary pure states under white noise
Yao Yao; Li Ge; Xing Xiao; Xiaoguang Wang; C. P. Sun
2014-09-08T23:59:59.000Z
In any realistic quantum metrology scenarios, the ultimate precision in the estimation of parameters is limited not only by the so-called Heisenberg scaling, but also the environmental noise encountered by the underlying system. In the context of quantum estimation theory, it is of great significance to carefully evaluate the impact of a specific type of noise on the corresponding quantum Fisher information (QFI) or quantum Fisher information matrix (QFIM). Here we investigate the multiple phase estimation problem for a natural parametrization of arbitrary pure states under white noise. We obtain the explicit expression of the symmetric logarithmic derivative (SLD) and hence the analytical formula of QFIM. Moreover, the attainability of the quantum Cram\\'{e}r-Rao bound (QCRB) is confirmed by the commutability of SLDs and the optimal estimators are elucidated for the experimental purpose. These findings generalize previously known partial results and highlight the role of white noise in quantum metrology.
Magnetic and Electric Black Holes in Arbitrary Dimension
Adil Belhaj; Pablo Diaz; Antonio segui
2009-06-02T23:59:59.000Z
In this work, we compare two different objects: electric black holes and magnetic black holes in arbitrary dimension. The comparison is made in terms of the corresponding moduli space and their extremal geometries. We treat parallelly the magnetic and the electric cases. Specifically, we discuss the gravitational solution of these spherically symmetric objects in the presence of a positive cosmological constant. Then, we find the bounded region of the moduli space allowing the existence of black holes. After identifying it in both the electric and the magnetic case, we calculate the geometry that comes out between the horizons at the coalescence points. Although the electric and magnetic cases are both very different (only dual in four dimensions), gravity solutions seem to clear up most of the differences and lead to very similar geometries.
Agile high resolution arbitrary waveform generator with jitterless frequency stepping
Reilly, Peter T.; Koizumi, Hideya
2010-05-11T23:59:59.000Z
Jitterless transition of the programmable clock waveform is generated employing a set of two coupled direct digital synthesis (DDS) circuits. The first phase accumulator in the first DDS circuit runs at least one cycle of a common reference clock for the DDS circuits ahead of the second phase accumulator in the second DDS circuit. As a phase transition through the beginning of a phase cycle is detected from the first phase accumulator, a first phase offset word and a second phase offset word for the first and second phase accumulators are calculated and loaded into the first and second DDS circuits. The programmable clock waveform is employed as a clock input for the RAM address controller. A well defined jitterless transition in frequency of the arbitrary waveform is provided which coincides with the beginning of the phase cycle of the DDS output signal from the second DDS circuit.
Falcon: automated optimization method for arbitrary assessment criteria
Yang, Tser-Yuan (Livermore, CA); Moses, Edward I. (Livermore, CA); Hartmann-Siantar, Christine (Livermore, CA)
2001-01-01T23:59:59.000Z
FALCON is a method for automatic multivariable optimization for arbitrary assessment criteria that can be applied to numerous fields where outcome simulation is combined with optimization and assessment criteria. A specific implementation of FALCON is for automatic radiation therapy treatment planning. In this application, FALCON implements dose calculations into the planning process and optimizes available beam delivery modifier parameters to determine the treatment plan that best meets clinical decision-making criteria. FALCON is described in the context of the optimization of external-beam radiation therapy and intensity modulated radiation therapy (IMRT), but the concepts could also be applied to internal (brachytherapy) radiotherapy. The radiation beams could consist of photons or any charged or uncharged particles. The concept of optimizing source distributions can be applied to complex radiography (e.g. flash x-ray or proton) to improve the imaging capabilities of facilities proposed for science-based stockpile stewardship.
ARBITRARY LAGRANGIAN-EULERIAN (ALE) METHODS IN COMPRESSIBLE FLUID DYNAMICS
Kurien, Susan
· . Scalar quantities (density , pressure p, specific internal energy and temperature T) are approximated Lagrangian system is numerically treated by compatible method [8, 9] conserving total energy. Several types Lagrangian-Eulerian (ALE [1]) code for simulation of problems in compressible fluid dynamics and plasma
David J.C. MacKay
Simple arguments suggest that shortened codes must have distance properties equal to or better than those of their parent codes, and that they should be equally practical to decode. This relationship holds true in the case of low density generator codes and low density parity check codes. We investigate the properties of shortened turbo codes. I. Motivation for Shortening In our previous work on codes based on very sparse matrices we have observed that while codes with a low density generator matrix [1] are asymptotically bad, codes with a low density parity check matrix [2] are asymptotically good [3, 4, 5]. One way of viewing the relationship between low density generator matrix codes and low density parity check matrix codes is that one obtains a low density parity check matrix by taking the M \\Theta N parity check matrix [P IM ] of a (N; K) low density generator matrix code and chopping off its right-most M columns (where M = N \\Gamma K), to yield an M \\Theta K matrix [P], which...
arbitrary grey-level optical: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
Pijush K. Ghosh 1996-07-02 71 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...
arbitrary sub-diffraction-limit pattern: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
Washington at Seattle, University of 243 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...
adaptive arbitrary lagrangian-eulerian: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
Washington at Seattle, University of 282 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...
arbitrary particle-channel interaction: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
Washington at Seattle, University of 315 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...
GPU-optimized Code for Long-term Simulations of Beam-beam Effects in Colliders
Roblin, Yves [JLAB; Morozov, Vasiliy [JLAB; Terzic, Balsa [JLAB; Aturban, Mohamed A. [Old Dominion University; Ranjan, D. [Old Dominion University; Zubair, Mohammed [Old Dominion University
2013-06-01T23:59:59.000Z
We report on the development of the new code for long-term simulation of beam-beam effects in particle colliders. The underlying physical model relies on a matrix-based arbitrary-order symplectic particle tracking for beam transport and the Bassetti-Erskine approximation for beam-beam interaction. The computations are accelerated through a parallel implementation on a hybrid GPU/CPU platform. With the new code, a previously computationally prohibitive long-term simulations become tractable. We use the new code to model the proposed medium-energy electron-ion collider (MEIC) at Jefferson Lab.
Peter, Frank J. (Albuquerque, NM); Dalton, Larry J. (Bernalillo, NM); Plummer, David W. (Albuquerque, NM)
2002-01-01T23:59:59.000Z
A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.
Banner Index Codes The Index code is a data-entry shortcut for the Fund code, Org code, and Program code in Banner Finance (FO-P's). Implementation of the Index has greatly decreased data entry coding Â Account (object) - Program (FOAP) code numbers on any of your accounting forms (Contracts, Purchase Orders
Energy Citations Database (ECD) - Widget Code
Office of Scientific and Technical Information (OSTI)
script>
Sandia National Laboratories: Codes
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
Codes Solar Thermochemical Hydrogen Production On June 13, 2014, in SNL maintains the equipment, experts, and partnerships required to develop technology for solar thermochemical...
Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.
1985-03-01T23:59:59.000Z
The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.
Graph Concatenation for Quantum Codes
Salman Beigi; Isaac Chuang; Markus Grassl; Peter Shor; Bei Zeng
2010-02-03T23:59:59.000Z
Graphs are closely related to quantum error-correcting codes: every stabilizer code is locally equivalent to a graph code, and every codeword stabilized code can be described by a graph and a classical code. For the construction of good quantum codes of relatively large block length, concatenated quantum codes and their generalizations play an important role. We develop a systematic method for constructing concatenated quantum codes based on "graph concatenation", where graphs representing the inner and outer codes are concatenated via a simple graph operation called "generalized local complementation." Our method applies to both binary and non-binary concatenated quantum codes as well as their generalizations.
Optimal control theory with arbitrary superpositions of waveforms
Selina Meister; Jürgen T. Stockburger; Rebecca Schmidt; Joachim Ankerhold
2014-11-20T23:59:59.000Z
Standard optimal control methods perform optimization in the time domain. However, many experimental settings demand the expression of the control signal as a superposition of given waveforms, a case that cannot easily be accommodated using time-local constraints. Previous approaches [1,2] have circumvented this difficulty by performing optimization in a parameter space, using the chain rule to make a connection to the time domain. In this paper, we present an extension to Optimal Control Theory which allows gradient-based optimization for superpositions of arbitrary waveforms directly in a time-domain subspace. Its key is the use of the Moore-Penrose pseudoinverse as an efficient means of transforming between a time-local and waveform-based descriptions. To illustrate this optimization technique, we study the parametrically driven harmonic oscillator as model system and reduce its energy, considering both Hamiltonian dynamics and stochastic dynamics under the influence of a thermal reservoir. We demonstrate the viability and efficiency of the method for these test cases and find significant advantages in the case of waveforms which do not form an orthogonal basis.
ASTROMETRY.NET: BLIND ASTROMETRIC CALIBRATION OF ARBITRARY ASTRONOMICAL IMAGES
Lang, Dustin; Mierle, Keir; Roweis, Sam [Department of Computer Science, University of Toronto, 6 King's College Road, Toronto, Ontario M5S 3G4 (Canada); Hogg, David W.; Blanton, Michael [Center for Cosmology and Particle Physics, Department of Physics, New York University, 4 Washington Place, New York, NY 10003 (United States)], E-mail: dstn@astro.princeton.edu
2010-05-15T23:59:59.000Z
We have built a reliable and robust system that takes as input an astronomical image, and returns as output the pointing, scale, and orientation of that image (the astrometric calibration or World Coordinate System information). The system requires no first guess, and works with the information in the image pixels alone; that is, the problem is a generalization of the 'lost in space' problem in which nothing-not even the image scale-is known. After robust source detection is performed in the input image, asterisms (sets of four or five stars) are geometrically hashed and compared to pre-indexed hashes to generate hypotheses about the astrometric calibration. A hypothesis is only accepted as true if it passes a Bayesian decision theory test against a null hypothesis. With indices built from the USNO-B catalog and designed for uniformity of coverage and redundancy, the success rate is >99.9% for contemporary near-ultraviolet and visual imaging survey data, with no false positives. The failure rate is consistent with the incompleteness of the USNO-B catalog; augmentation with indices built from the Two Micron All Sky Survey catalog brings the completeness to 100% with no false positives. We are using this system to generate consistent and standards-compliant meta-data for digital and digitized imaging from plate repositories, automated observatories, individual scientific investigators, and hobbyists. This is the first step in a program of making it possible to trust calibration meta-data for astronomical data of arbitrary provenance.
V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information
Broader source: Energy.gov (indexed) [DOE]
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCode |Disclosure Attacks
MULTICHANNEL BLIND DECONVOLUTION OF ARBITRARY SIGNALS: ADAPTIVE ALGORITHMS AND STABILITY ANALYSIES
Douglas, Scott C.
MULTICHANNEL BLIND DECONVOLUTION OF ARBITRARY SIGNALS: ADAPTIVE ALGORITHMS AND STABILITY ANALYSIES for the multichannel blind deconvolution of arbitrary non-Gaussian source mixtures. Two of the algorithms are spa- tia-temporal extensions of recently-derived blind signal separation algorithms that combine kurta- sis-based contrast
Closed Form of the Biphoton K-Vector Spectrum for Arbitrary Spatio-Temporal Pump Modes
Jeffrey Perkins
2011-09-02T23:59:59.000Z
A closed form solution is derived for the biphoton k-vector spectrum for an arbitrary pump spatial mode. The resulting mode coefficients for the pump input that maximize the probability of biphoton detection in the far field are found. It is thus possible to include the effect of arbitrary crystal poling strucures, and optimize the resulting biphoton flux.
Green's Conjecture for curves on arbitrary K3 Marian Aprodu and Gavril Farkas
Farkas, Gavril
Green's Conjecture for curves on arbitrary K3 surfaces Marian Aprodu and Gavril Farkas Abstract Green's Conjecture predicts than one can read off special linear series on an algebraic curve-Ramanan, provides a complete solution to Green's Conjecture for smooth curves on arbitrary K3 surfaces. 1
Electric field in hard superconductors with arbitrary cross section and general critical current law
Majós, Antonio Badía
Electric field in hard superconductors with arbitrary cross section and general critical current-28871 Alcala´ de Henares, Spain Received 18 February 2004; accepted 11 March 2004 The induced electric field E x during magnetic flux entry in superconductors with arbitrary cross section and general
Remote State Preparation: Arbitrary remote control of photon polarizations for quantum communication
Kwiat, Paul
Remote State Preparation: Arbitrary remote control of photon polarizations for quantum measurement to one photon of a polarization- entangled pair, we remotely prepare single photons in arbitrary. Finally, we discuss the states remotely preparable given a particular two-qubit resource state. Keywords
Broader source: Energy.gov [DOE]
There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect.
Reed-Muller Codes: Spherically-Punctured Codes and Decoding Algorithms
Kapralova, Olga
2013-01-01T23:59:59.000Z
Linear codes . . . . . . . . . . . . . . . . . . . . . . .3.3 Code parameters . . . . . . . . . . . . . .of linear codes . . . . . . . . . . . . 1.5 Reed-Muller
Quantum gravitational corrections to propagator in arbitrary spacetimes
T. Padmanabhan
1997-03-18T23:59:59.000Z
The action for a relativistic free particle of mass m receives a contribution $-m R(x,y)$ from a path of length R(x,y) connecting the events $x^i$ and $y^i$. Using this action in a path integral, one can obtain the Feynman propagator for a spinless particle of mass m in any background spacetime. If one of the effects of quantizing gravity is to introduce a minimum length scale $L_P$ in the spacetime, then one would expect the segments of paths with lengths less than $L_P$ to be suppressed in the path integral. Assuming that the path integral amplitude is invariant under the `duality' transformation ${\\cal R}\\to L_P^2/R$, one can calculate the modified Feynman propagator in an arbitrary background spacetime. It turns out that the key feature of this modification is the following: The proper distance $(\\Delta x)^2$ between two events, which are infinitesimally separated, is replaced by $\\Delta x^2 + L_P^2$; that is the spacetime behaves as though it has a `zero-point length' of $L_P$. This equivalence suggests a deep relationship between introducing a `zero-point-length' to the spacetime and postulating invariance of path integral amplitudes under duality transformations. In the Schwinger's proper time description of the propagator, the weightage for a path with proper time s becomes $m(s+L_P^2/s)$ rather than as ms. As to be expected, the ultraviolet behavior of the theory is improved significantly and divergences will disappear if this modification is taken into account. Implications of this result are discussed.
Exploring JavaScript and ROOT technologies to create Web-based ATLAS analysis and monitoring tools
Sanchez, Arturo; The ATLAS collaboration
2015-01-01T23:59:59.000Z
We explore the potentialities of current web applications to create online interfaces that allow the visualization, interaction and real physics cut-based analysis and monitoring of processes trough a web browser. The project consists in the initial development of web-based and cloud computing services to allow students and researches to perform fast and very useful cut-based analysis on a browser, reading and using real data and official Monte-Carlo simulations stored in ATLAS computing facilities. Several tools are considered: ROOT, JavaScript and HTML. Our study case is the current cut-based H->ZZ->llqq analysis of the ATLAS experiment. Preliminary but satisfactory results have been obtained online; this presentation describes the tests and plans and future upgrades.
Exploring JavaScript and ROOT technologies to create Web-based ATLAS analysis and monitoring tools
Sanchez, Arturo; The ATLAS collaboration
2015-01-01T23:59:59.000Z
We explore the potentialities of current web applications to create online interfaces that allow the visualization, interaction and real physics cut-based analysis and monitoring of processes trough a web browser. The project consists in the initial development of web-based and cloud computing services to allow students and researches to perform fast and very useful cut-based analysis on a browser, reading and using real data and official Monte-Carlo simulations stored in ATLAS computing facilities. Several tools are considered: ROOT, JavaScript and HTML. Our study case is the current cut-based $H \\rightarrow ZZ \\rightarrow llqq$ analysis of the ATLAS experiment. Preliminary but satisfactory results have been obtained online.
Universal space-time codes from demultiplexed trellis codes
Kose, Cenk; Wesel, R D
2006-01-01T23:59:59.000Z
and A. R. Calderbank, “Space-time codes for high data ratePerformance criteria and code construction,” IEEE Trans.of space–time trellis codes,” IEEE Trans. Commun. , vol. 51,
Relation Between Surface Codes and Hypermap-Homology Quantum Codes
Pradeep Sarvepalli
2014-03-14T23:59:59.000Z
Recently, a new class of quantum codes based on hypermaps were proposed. These codes are obtained from embeddings of hypergraphs as opposed to surface codes which are obtained from the embeddings of graphs. It is natural to compare these two classes of codes and their relation to each other. In this context two related questions are addressed in this paper: Can the parameters of hypermap-homology codes be superior to those of surface codes and what is precisely the relation between these two classes of quantum codes? We show that a canonical hypermap code is identical to a surface code while a noncanonical hypermap code can be transformed to a surface code by CNOT gates alone. Our approach is constructive; we construct the related surface code and the transformation involving CNOT gates.
Nelson, R.N. (ed.)
1985-05-01T23:59:59.000Z
This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.
Sarwate, A D; Gastpar, M
2010-01-01T23:59:59.000Z
2004. [7] M. Luby, “LT codes,” in Proc. 43rd Ann. IEEE Symp.8] A. Shokrollahi, “Fountain codes,” in Proc. 41st AllertonChannel capacities for list codes,” J. Appl. Probabil. ,
Unequal Error Protection Turbo Codes
Henkel, Werner
Unequal Error Protection Turbo Codes Diploma Thesis Neele von Deetzen Arbeitsbereich Nachrichtentechnik School of Engineering and Science Bremen, February 28th, 2005 #12;Unequal Error Protection Turbo Convolutional Codes / Turbo Codes 18 3.1 Structure
A three-dimensional fast solver for arbitrary vorton distributions
Strickland, J.H.; Baty, R.S.
1994-05-01T23:59:59.000Z
A method which is capable of an efficient calculation of the three-dimensional flow field produced by a large system of vortons (discretized regions of vorticity) is presented in this report. The system of vortons can, in turn, be used to model body surfaces, container boundaries, free-surfaces, plumes, jets, and wakes in unsteady three-dimensional flow fields. This method takes advantage of multipole and local series expansions which enables one to make calculations for interactions between groups of vortons which are in well-separated spatial domains rather than having to consider interactions between every pair of vortons. In this work, series expansions for the vector potential of the vorton system are obtained. From such expansions, the three components of velocity can be obtained explicitly. A Fortran computer code FAST3D has been written to calculate the vector potential and the velocity components at selected points in the flow field. In this code, the evaluation points do not have to coincide with the location of the vortons themselves. Test cases have been run to benchmark the truncation errors and CPU time savings associated with the method. Non-dimensional truncation errors for the magnitudes of the vector potential and velocity fields are on the order of 10{sup {minus}4}and 10{sup {minus}3} respectively. Single precision accuracy produces errors in these quantities of up to 10{sup {minus}5}. For less than 1,000 to 2,000 vortons in the field, there is virtually no CPU time savings with the fast solver. For 100,000 vortons in the flow, the fast solver obtains solutions in 1 % to 10% of the time required for the direct solution technique depending upon the configuration.
Broader source: Energy.gov [DOE]
A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.
Quantum Error Correcting Subsystem Codes From Two Classical Linear Codes
Dave Bacon; Andrea Casaccino
2006-10-17T23:59:59.000Z
The essential insight of quantum error correction was that quantum information can be protected by suitably encoding this quantum information across multiple independently erred quantum systems. Recently it was realized that, since the most general method for encoding quantum information is to encode it into a subsystem, there exists a novel form of quantum error correction beyond the traditional quantum error correcting subspace codes. These new quantum error correcting subsystem codes differ from subspace codes in that their quantum correcting routines can be considerably simpler than related subspace codes. Here we present a class of quantum error correcting subsystem codes constructed from two classical linear codes. These codes are the subsystem versions of the quantum error correcting subspace codes which are generalizations of Shor's original quantum error correcting subspace codes. For every Shor-type code, the codes we present give a considerable savings in the number of stabilizer measurements needed in their error recovery routines.
Montfort, Nick
2014-06-05T23:59:59.000Z
To continue the productive discussion of uninscribed artworks in Craig Dworkin’s No Medium, this report discusses, in detail, those computer programs that have no code, and are thus empty or null. Several specific examples ...
Barnes, Nick; Jones, David
2011-07-05T23:59:59.000Z
Climate Code Foundation - who are we? A non-profit organisation founded in August 2010; our goal is to promote the public understanding of climate science, by increasing the visibility and clarity of the software used in climate science...
Broader source: Energy.gov [DOE]
Authority for adopting the state energy codes was previously vested in the Energy Security Office of the Department of Commerce (originally the Department of Public Services). In 1999-2000, the...
Broader source: Energy.gov [DOE]
The software does not properly filter HTML code from user-supplied input in the The "mobile phone" profile entry before displaying the input.
Abdelhamid Awad Aly Ahmed, Sala
2008-10-10T23:59:59.000Z
QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2008 Major... Subject: Computer Science QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY...
Nested Quantum Error Correction Codes
Zhuo Wang; Kai Sun; Hen Fan; Vlatko Vedral
2009-09-28T23:59:59.000Z
The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.
Accumulate-Repeat-Accumulate Codes: Systematic Codes Achieving the Binary
Sason, Igal
Accumulate-Repeat-Accumulate Codes: Systematic Codes Achieving the Binary Erasure Channel Capacity@ee.technion.ac.il Abstract The paper introduces ensembles of accumulate-repeat-accumulate (ARA) codes which asymp- totically by the first capacity-achieving ensembles of ir- regular repeat-accumulate (IRA) codes with bounded complexity
Code: A Lightweight and Flexible Mobile Code Toolkit
Picco, Gian Pietro
evaluation of mobile code technology does not exist yet, some studies already evidenced that the powerful of clientserver and mobile code in reducing the network traffic generated by management. The theoretical¯Code: A Lightweight and Flexible Mobile Code Toolkit Gian Pietro Picco Dip. Automatica e
Symmetric multiparty-controlled teleportation of an arbitrary two-particle entanglement
Deng Fuguo; Zhou Hongyu [Key Laboratory of Beam Technology and Material Modification of Ministry of Education, Beijing Normal University, Beijing 100875 (China); Institute of Low Energy Nuclear Physics and Department of Material Science and Engineering, Beijing Normal University, Beijing 100875 (China); Beijing Radiation Center, Beijing 100875 (China); Li Chunyan; Wang Yan [Key Laboratory of Beam Technology and Material Modification of Ministry of Education, Beijing Normal University, Beijing 100875 (China); Institute of Low Energy Nuclear Physics and Department of Material Science and Engineering, Beijing Normal University, Beijing 100875 (China); Li Yansong [Department of Physics and Key Laboratory for Quantum Information and Measurements of Ministry of Education, Tsinghua University, Beijing 100084 (China)
2005-08-15T23:59:59.000Z
We present a way for symmetric multiparty-controlled teleportation of an arbitrary two-particle entangled state based on Bell-basis measurements by using two Greenberger-Horne-Zeilinger states, i.e., a sender transmits an arbitrary two-particle entangled state to a distant receiver, an arbitrary one of the n+1 agents, via the control of the others in a network. It will be shown that the outcomes in the cases that n is odd or is even are different in principle as the receiver has to perform a controlled-NOT operation on his particles for reconstructing the original arbitrary entangled state in addition to some local unitary operations in the former. Also we discuss the applications of this controlled teleporation for quantum secret sharing of classical and quantum information. As all the instances can be used to carry useful information, its efficiency for qubit approaches the maximal value.
Use of associated polynomials for division involving polynomials over arbitrary fields
Jones, James Edgar
1968-01-01T23:59:59.000Z
USE OF ASSOCIATED POLYNOMIALS FOR DIVISION INVOLVING POLYNOMIALS OVER ARBITRARY FIELDS A Thesis by JAMES EDGAR JOiVES Submitted to the Graduate College of the Texas A&M University in partiai fulfillment of the requirements for the degree... of MASTER OF SCIENCE August 1968 Major Subject: MATHEJRTICS USE OF ASSOCIATED POLYNOMIALS FOR DIVISION INVOLVING POLYNOMIALS OVER ARBITRARY FIELDS A Thesis by JAMES EDGAR JONES Approved as to style and content by (Chairman of Committee) (Head...
Hartini, Entin, E-mail: entin@batan.go.id; Andiwijayakusuma, Dinan, E-mail: entin@batan.go.id [Center for Development of Nuclear Informatics - National Nuclear Energy Agency, PUSPIPTEK, Serpong, Tangerang, Banten (Indonesia)
2014-09-30T23:59:59.000Z
This research was carried out on the development of code for uncertainty analysis is based on a statistical approach for assessing the uncertainty input parameters. In the butn-up calculation of fuel, uncertainty analysis performed for input parameters fuel density, coolant density and fuel temperature. This calculation is performed during irradiation using Monte Carlo N-Particle Transport. The Uncertainty method based on the probabilities density function. Development code is made in python script to do coupling with MCNPX for criticality and burn-up calculations. Simulation is done by modeling the geometry of PWR terrace, with MCNPX on the power 54 MW with fuel type UO2 pellets. The calculation is done by using the data library continuous energy cross-sections ENDF / B-VI. MCNPX requires nuclear data in ACE format. Development of interfaces for obtaining nuclear data in the form of ACE format of ENDF through special process NJOY calculation to temperature changes in a certain range.
Fault-tolerant logical gates in quantum error-correcting codes
Fernando Pastawski; Beni Yoshida
2014-08-07T23:59:59.000Z
Recently, Bravyi and K\\"onig have shown that there is a tradeoff between fault-tolerantly implementable logical gates and geometric locality of stabilizer codes. They consider locality-preserving operations which are implemented by a constant depth geometrically local circuit and are thus fault-tolerant by construction. In particular, they shown that, for local stabilizer codes in D spatial dimensions, locality preserving gates are restricted to a set of unitary gates known as the D-th level of the Clifford hierarchy. In this paper, we elaborate this idea and provide several extensions and applications of their characterization in various directions. First, we present a new no-go theorem for self-correcting quantum memory. Namely, we prove that a three-dimensional stabilizer Hamiltonian with a locality-preserving implementation of a non-Clifford gate cannot have a macroscopic energy barrier. Second, we prove that the code distance of a D-dimensional local stabilizer code with non-trivial locality-preserving m-th level Clifford logical gate is upper bounded by $O(L^{D+1-m})$. For codes with non-Clifford gates (m>2), this improves the previous best bound by Bravyi and Terhal. Third we prove that a qubit loss threshold of codes with non-trivial transversal m-th level Clifford logical gate is upper bounded by 1/m. As such, no family of fault-tolerant codes with transversal gates in increasing level of the Clifford hierarchy may exist. This result applies to arbitrary stabilizer and subsystem codes, and is not restricted to geometrically-local codes. Fourth we extend the result of Bravyi and K\\"onig to subsystem codes. A technical difficulty is that, unlike stabilizer codes, the so-called union lemma does not apply to subsystem codes. This problem is avoided by assuming the presence of error threshold in a subsystem code, and the same conclusion as Bravyi-K\\"onig is recovered.
Park, Namkyoo
Cyclic simplex coded OTDR SNR enhancement of coded optical time domain reflectometry using cyclic simplex codes *, , , e-mail : nkpark@plaza.snu.ac.kr Abstract: We propose and experimentally demonstrate the performance improvement of a coded optical time domain reflectometry using cyclic simplex
Hayashi, A.; Hashimoto, T.; Horibe, M. [Department of Applied Physics, Fukui University, Fukui 910-8507 (Japan)
2005-01-01T23:59:59.000Z
The quantum color coding scheme proposed by Korff and Kempe [e-print quant-ph/0405086] is easily extended so that the color coding quantum system is allowed to be entangled with an extra auxiliary quantum system. It is shown that in the extended scheme we need only {approx}2{radical}(N) quantum colors to order N objects in large N limit, whereas {approx}N/e quantum colors are required in the original nonextended version. The maximum success probability has asymptotics expressed by the Tracy-Widom distribution of the largest eigenvalue of a random Gaussian unitary ensemble (GUE) matrix.
Delene, J.
1984-01-01T23:59:59.000Z
CONCEPT is a computer code that will provide conceptual capital investment cost estimates for nuclear and coal-fired power plants. The code can develop an estimate for construction at any point in time. Any unit size within the range of about 400 to 1300 MW electric may be selected. Any of 23 reference site locations across the United States and Canada may be selected. PWR, BWR, and coal-fired plants burning high-sulfur and low-sulfur coal can be estimated. Multiple-unit plants can be estimated. Costs due to escalation/inflation and interest during construction are calculated.
Zhou, Shan; Ying, Lei
2011-01-01T23:59:59.000Z
In wireless networks, the transmission rate of a link is determined by received signal strength, interference from simultaneous transmissions, and available coding-modulation schemes. Rate allocation is a key problem in wireless network design, but a very challenging problem because: (i) wireless interference is global, i.e., a transmission interferes all other simultaneous transmissions, and (ii) the rate-power relation is non-convex and non-continuous, where the discontinuity is due to limited number of coding-modulation choices in practical systems. In this paper, we propose a distributed power control and coding-modulation adaptation algorithm using annealed Gibbs sampling, which achieves throughput optimality in an arbitrary network topology. We consider a realistic Signal-to-Interference-and-Noise-Ratio (SINR) based interference model, and assume continuous power space and finite rate options (coding-modulation choices). Our algorithm first decomposes network-wide interference to local interference by p...
Coding for Transmission Coding for Compression Bonus Section CMPSCI 240: Reasoning about Uncertainty
McGregor, Andrew
Coding for Transmission Coding for Compression Bonus Section CMPSCI 240: Reasoning about: April 29, 2014 #12;Coding for Transmission Coding for Compression Bonus Section Information Theory. #12;Coding for Transmission Coding for Compression Bonus Section Encoding Messages with Redundancy
Painter, Kevin
- Frameworks; Decision Making Development life-cycle of a software system Bi-directional influence between-Critical Systems; Technology & Society. Brave New Worlds - Co-operative Computing; eLife. Learning OutcomesCourse Code: F29PD Course Title: Professional Development Course Co-ordinator: Sandy Jean
The Woodland Carbon Code While society must continue to make every effort to reduce greenhouse gas a role by removing carbon dioxide from the atmosphere. The potential of woodlands to soak up carbon to help compensate for their carbon emissions. But before investing in such projects, people want to know
MODIFICATION OF THE MOOG SPECTRAL SYNTHESIS CODES TO ACCOUNT FOR ZEEMAN BROADENING OF SPECTRAL LINES
Deen, Casey P. [Max Planck Institut fuer Astronomie, Koenigstuhl 17, D-69117 Heidelberg, GermanyAND (Germany); Department of Astronomy, University of Texas at Austin, 1 University Station, Austin, TX 78712 (United States)
2013-09-15T23:59:59.000Z
In an attempt to widen access to the study of magnetic fields in stellar astronomy, I present MOOGStokes, a version of the MOOG one-dimensional local thermodynamic equilibrium radiative transfer code, overhauled to incorporate a Stokes vector treatment of polarized radiation through a magnetic medium. MOOGStokes is a suite of three complementary programs, which together can synthesize the disk-averaged emergent spectrum of a star with a magnetic field. The first element (a pre-processing script called CounterPoint) calculates for a given magnetic field strength, wavelength shifts, and polarizations for the components of Zeeman-sensitive lines. The second element (a MOOG driver called SynStokes derived from the existing MOOG driver Synth) uses the list of Zeeman-shifted absorption lines together with the existing machinery of MOOG to synthesize the emergent spectrum at numerous locations across the stellar disk, accounting for stellar and magnetic field geometry. The third and final element (a post-processing script called DiskoBall) calculates the disk-averaged spectrum by weighting the individual emergent spectra by limb darkening and projected area, and applying the effects of Doppler broadening. All together, the MOOGStokes package allows users to synthesize emergent spectra of stars with magnetic fields in a familiar computational framework. MOOGStokes produces disk-averaged spectra for all Stokes vectors ( I, Q, U, V ), normalized by the continuum. MOOGStokes agrees well with the predictions of INVERS10 a polarized radiative transfer code with a long history of use in the study of stellar magnetic fields. In the non-magnetic limit, MOOGStokes also agrees with the predictions of the scalar version of MOOG.
Erasure Techniques in MRD codes
W. B. Vasantha Kandasamy; Florentin Smarandache; R. Sujatha; R. S. Raja Durai
2012-05-03T23:59:59.000Z
This book is organized into six chapters. The first chapter introduces the basic algebraic structures essential to make this book a self contained one. Algebraic linear codes and their basic properties are discussed in chapter two. In chapter three the authors study the basic properties of erasure decoding in maximum rank distance codes. Some decoding techniques about MRD codes are described and discussed in chapter four of this book. Rank distance codes with complementary duals and MRD codes with complementary duals are introduced and their applications are discussed. Chapter five introduces the notion of integer rank distance codes. The final chapter introduces some concatenation techniques.
Wong, Tan F.
AND TURBO CODES John M. Shea and Tan F. Wong University of Florida Department of Electrical and Computer-check code (RPCC) with a turbo code. These concatenated codes are referred to as RPCC+turbo codes. RPCC+turbo codes have been shown to significantly outperform turbo codes in several scenarios [1],[2]. One
Coded modulation with Low Density Parity Check codes
Narayanaswami, Ravi
2001-01-01T23:59:59.000Z
This thesis proposes the design of Low Density Parity Check (LDPC) codes for cases where coded modulation is used. We design these codes by extending the idea of Density Evolution (DE) that has been introduced as a powerful tool to analyze LDPC...
Generating Code for High-Level Operations through Code Composition
Generating Code for High-Level Operations through Code Composition James M. Stichnoth August 1997 of the authors and should not be interpreted as necessarily representing the official policies or endorsements: Compilers, code generation, parallelism, communication generation #12;Abstract A traditional compiler
Multiclass learning with simplex coding
Mroueh, Youssef
In this paper we discuss a novel framework for multiclass learning, defined by a suitable coding/decoding strategy, namely the simplex coding, that allows us to generalize to multiple classes a relaxation approach commonly ...
Distributed control of coded networks
Zhao, Fang, Ph. D. Massachusetts Institute of Technology
2010-01-01T23:59:59.000Z
The introduction of network coding has the potential to revolutionize the way people operate networks. For the benefits of network coding to be realized, distributed solutions are needed for various network problems. In ...
Nevada Energy Code for Buildings
Broader source: Energy.gov [DOE]
''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...
Confocal coded aperture imaging
Tobin, Jr., Kenneth William (Harriman, TN); Thomas, Jr., Clarence E. (Knoxville, TN)
2001-01-01T23:59:59.000Z
A method for imaging a target volume comprises the steps of: radiating a small bandwidth of energy toward the target volume; focusing the small bandwidth of energy into a beam; moving the target volume through a plurality of positions within the focused beam; collecting a beam of energy scattered from the target volume with a non-diffractive confocal coded aperture; generating a shadow image of said aperture from every point source of radiation in the target volume; and, reconstructing the shadow image into a 3-dimensional image of the every point source by mathematically correlating the shadow image with a digital or analog version of the coded aperture. The method can comprise the step of collecting the beam of energy scattered from the target volume with a Fresnel zone plate.
Plasma diagnostics in TFTR using emission of cyclotron radiation at arbitrary frequencies
Fidone, I.; Giruzzi, G.; Taylor, G.
1995-07-01T23:59:59.000Z
Emission of cyclotron radiation at arbitrary wave frequency for diagnostic purposes is discussed. It is shown that the radiation spectrum at arbitrary frequencies is more informative than the first few harmonics and it is suited for diagnosis of superthermal electrons without any {open_quotes}ad hoc{close_quotes} value of the wall reflection coefficient. Thermal radiation from TFTR is investigated and it is shown that the bulk and the tail of the electron momentum distribution during strong neutral beam injection is a Maxwellian with a single temperature in all ranges of electron energies.
Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)
1995-03-01T23:59:59.000Z
MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.
Travel Codes Traveler Is Employee
Arnold, Jonathan
Travel Codes Traveler Is Employee: 64100-Domestic Travel 64150-Mileage 64200-International Travel Supplies & Expense Codes 71410-Office Supplies 71430-Lab/Research Supplies (dollar value of each item less Charges Equipment Codes 84320-Equipment (non-computer & peripherals) with a cost of $5,000.00 or more per
Rotationally invariant multilevel block codes
Kulandaivelu, Anita
1993-01-01T23:59:59.000Z
The objective of this thesis is to evaluate the performance of block codes that are designed to be rotationally invariant, in a multilevel coding scheme, over a channel modelled to be white gaussian noise. Also, the use of non-binary codes...
Design of proximity detecting codes
Perisetty, Srinivas
1997-01-01T23:59:59.000Z
delay insensitive, codes like unordered codes have been proposed. Although these codes are delay insensitive, the receiver still has to wait for all the 1s in the transmitted data to be received before sending an acknowledge signal to the sender. A new...
Code for Hydrogen Hydrogen Pipeline
#12;2 Code for Hydrogen Pipelines Hydrogen Pipeline Working Group Workshop Augusta, Georgia August development Â· Charge from BPTCS to B31 Standards Committee for Hydrogen Piping/Pipeline code development Â· B31.12 Status & Structure Â· Hydrogen Pipeline issues Â· Research Needs Â· Where Do We Go From Here? #12;4 Code
Energy Codes and Standards: Facilities
Bartlett, Rosemarie; Halverson, Mark A.; Shankle, Diana L.
2007-01-01T23:59:59.000Z
Energy codes and standards play a vital role in the marketplace by setting minimum requirements for energy-efficient design and construction. They outline uniform requirements for new buildings as well as additions and renovations. This article covers basic knowledge of codes and standards; development processes of each; adoption, implementation, and enforcement of energy codes and standards; and voluntary energy efficiency programs.
PERFORMANCE EVALUATION OF TURBO CODES
Alajaji, Fady
PERFORMANCE EVALUATION OF TURBO CODES by Guangchong Zhu A project submitted to the Department named ``Turbo codes'' which claims an extraordinary performance with reasonable decoding complexity. In this project, we begin with a study on the structure and principle of Turbo codes. We then investigate
Southeast Energy Efficiency Alliance's Building Energy Codes...
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
Southeast Energy Efficiency Alliance's Building Energy Codes Project Southeast Energy Efficiency Alliance's Building Energy Codes Project Building Codes Project for the 2013...
2013 Reporting Unit Codes | Department of Energy
Broader source: Energy.gov (indexed) [DOE]
2013 Reporting Unit Codes 2013 Reporting Unit Codes CFC Reporting Unit Codes 2013.pdf More Documents & Publications EA-0372: Final Environmental Assessment Alignment: Achieving...
Error Floors of LDPC Codes and Related Topics
Butler, Brian K.
Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.2 LDPC Codes . . . . . . . .2.1 Binary Linear Block Codes . . . . . . .
Development of integrated core disruptive accident analysis code for FBR - ASTERIA-FBR
Ishizu, T.; Endo, H.; Tatewaki, I.; Yamamoto, T. [Japan Nuclear Energy Safety Organization JNES, Toranomon Towers Office, 4-1-28, Toranomon, Minato-ku, Tokyo (Japan); Shirakawa, N. [Inst. of Applied Energy IAE, Shimbashi SY Bldg., 14-2 Nishi-Shimbashi 1-Chome, Minato-ku, Tokyo (Japan)
2012-07-01T23:59:59.000Z
The evaluation of consequence at the severe accident is the most important as a safety licensing issue for the reactor core of liquid metal cooled fast breeder reactor (LMFBR), since the LMFBR core is not in an optimum condition from the viewpoint of reactivity. This characteristics might induce a super-prompt criticality due to the core geometry change during the core disruptive accident (CDA). The previous CDA analysis codes have been modeled in plural phases dependent on the mechanism driving a super-prompt criticality. Then, the following event is calculated by connecting different codes. This scheme, however, should introduce uncertainty and/or arbitrary to calculation results. To resolve the issues and obtain the consistent calculation results without arbitrary, JNES is developing the ASTERIA-FBR code for the purpose of providing the cross-check analysis code, which is another required scheme to confirm the validity of the evaluation results prepared by applicants, in the safety licensing procedure of the planned high performance core of Monju. ASTERIA-FBR consists of the three major calculation modules, CONCORD, dynamic-GMVP, and FEMAXI-FBR. CONCORD is a three-dimensional thermal-hydraulics calculation module with multi-phase, multi-component, and multi-velocity field model. Dynamic-GMVP is a space-time neutronics calculation module. FEMAXI-FBR calculates the fuel pellet deformation behavior and fuel pin failure behavior. This paper describes the needs of ASTERIA-FBR development, major module outlines, and the model validation status. (authors)
BINGO: A code for the efficient computation of the scalar bi-spectrum
Dhiraj Kumar Hazra; L. Sriramkumar; Jerome Martin
2013-05-18T23:59:59.000Z
We present a new and accurate Fortran code, the BI-spectra and Non-Gaussianity Operator (BINGO), for the efficient numerical computation of the scalar bi-spectrum and the non-Gaussianity parameter f_{NL} in single field inflationary models involving the canonical scalar field. The code can calculate all the different contributions to the bi-spectrum and the parameter f_{NL} for an arbitrary triangular configuration of the wavevectors. Focusing firstly on the equilateral limit, we illustrate the accuracy of BINGO by comparing the results from the code with the spectral dependence of the bi-spectrum expected in power law inflation. Then, considering an arbitrary triangular configuration, we contrast the numerical results with the analytical expression available in the slow roll limit, for, say, the case of the conventional quadratic potential. Considering a non-trivial scenario involving deviations from slow roll, we compare the results from the code with the analytical results that have recently been obtained in the case of the Starobinsky model in the equilateral limit. As an immediate application, we utilize BINGO to examine of the power of the non-Gaussianity parameter f_{NL} to discriminate between various inflationary models that admit departures from slow roll and lead to similar features in the scalar power spectrum. We close with a summary and discussion on the implications of the results we obtain.
Surface code quantum communication
Austin G. Fowler; David S. Wang; Charles D. Hill; Thaddeus D. Ladd; Rodney Van Meter; Lloyd C. L. Hollenberg
2010-02-05T23:59:59.000Z
Quantum communication typically involves a linear chain of repeater stations, each capable of reliable local quantum computation and connected to their nearest neighbors by unreliable communication links. The communication rate in existing protocols is low as two-way classical communication is used. We show that, if Bell pairs are generated between neighboring stations with a probability of heralded success greater than 0.65 and fidelity greater than 0.96, two-way classical communication can be entirely avoided and quantum information can be sent over arbitrary distances with arbitrarily low error at a rate limited only by the local gate speed. The number of qubits per repeater scales logarithmically with the communication distance. If the probability of heralded success is less than 0.65 and Bell pairs between neighboring stations with fidelity no less than 0.92 are generated only every T_B seconds, the logarithmic resource scaling remains and the communication rate through N links is proportional to 1/(T_B log^2 N).
Trigger-Wave Propagation in Arbitrary Metrics in Asynchronous Cellular Logic Arrays
Dudek, Piotr
Trigger-Wave Propagation in Arbitrary Metrics in Asynchronous Cellular Logic Arrays Przemyslaw image processing tasks using trigger-wave propagation in a medium with a hardware-controlled metric. The principles of wave propagation in cellular four-connected logic arrays emulating different distance measure
Off-diagonal Bethe ansatz solution of the XXX spin-chain with arbitrary boundary conditions
Cao, Junpeng; Shi, Kangjie; Wang, Yupeng
2013-01-01T23:59:59.000Z
With the off-diagonal Bethe ansatz method proposed recently by the present authors, we exactly diagonalize the $XXX$ spin chain with arbitrary boundary fields. By constructing a functional relation between the eigenvalues of the transfer matrix and the quantum determinant, the associated $T-Q$ relation and the Bethe ansatz equations are derived.
Off-diagonal Bethe ansatz solution of the XXX spin-chain with arbitrary boundary conditions
Junpeng Cao; Wenli Yang; Kangjie Shi; Yupeng Wang
2013-08-12T23:59:59.000Z
With the off-diagonal Bethe ansatz method proposed recently by the present authors, we exactly diagonalize the $XXX$ spin chain with arbitrary boundary fields. By constructing a functional relation between the eigenvalues of the transfer matrix and the quantum determinant, the associated $T-Q$ relation and the Bethe ansatz equations are derived.
Factorization of Darboux transformations of arbitrary order for 2D Schroedinger operators
Ekaterina Shemyakova
2015-05-04T23:59:59.000Z
We give a proof of Darboux's conjecture that every Darboux transformation of arbitrary order of a 2D Schroedinger type operator can be factorized into Darboux transformations of order one. The proof is constructive. The result is obtained in the framework of an algebraic approach to Darboux transformations which is suggested in this paper and is a further improvement of S. Tsarev's earlier idea.
Comment on the shape of Hydrogen equation in spaces of arbitrary dimension
M. Ya. Amusia
2015-02-20T23:59:59.000Z
We note that presenting Hydrogen atom Schrodinger equation in the case of arbitrary dimensions require simultaneous modification of the Coulomb potential that only in three dimensions has the form Z/r . This was not done in a number of relatively recent papers [1-5]. Therefore some results obtained there seem to be doubtful. Some required considerations in the area are mentioned.
SPAIN: COTS Data-Center Ethernet for Multipathing over Arbitrary Topologies
SPAIN: COTS Data-Center Ethernet for Multipathing over Arbitrary Topologies Jayaram Mudigonda switches, which could obviate the commodity pricing of these parts. In this paper, we describe SPAIN ("Smart Path Assign- ment In Networks"). SPAIN provides multipath forward- ing using inexpensive
Intro Algo ring Arbitrary graphs Conclusion PING PONG IN DANGEROUS GRAPHS
Fondements et Applications, Université Paris 7
Intro Algo ring Arbitrary graphs Conclusion PING PONG IN DANGEROUS GRAPHS Optimal Black Hole Search blocking and destroying any mobile agent entering it. Motivations : Site which is destroyed or dangerous blocking and destroying any mobile agent entering it. Motivations : Site which is destroyed or dangerous
The Arbitrariness of the Sign: Learning Advantages From the Structure of the Vocabulary
the simulations and the behavioral studies, we found that the optimal structure of the vocabulary for learningThe Arbitrariness of the Sign: Learning Advantages From the Structure of the Vocabulary Padraic and their meanings can facilitate language learning (e.g., in the form of sound symbolism or cues to grammatical
How the diffusivity profile reduces the arbitrariness of protein folding free energies
Thirumalai, Devarajan
How the diffusivity profile reduces the arbitrariness of protein folding free energies M 2010 The concept of a protein diffusing in its free-energy folding landscape has been fruitful for both as it stochastically folds and unfolds. The free-energy profiles for different RCs exhibit significant variations, some
Fast Detection and Processing of Arbitrary Contrast Agent Injections in Coronary
LÃ¼beck, UniversitÃ¤t zu
: condura@isip.uni-luebeck.de Abstract. Percutaneous transluminal coronary angioplasty (PTCA) re- quires pre-interventional and inter- ventional X-ray images. In the pre-interventional coronary angiogramsFast Detection and Processing of Arbitrary Contrast Agent Injections in Coronary Angiography
A Closed-Form Solution to the Arbitrary Order Cauchy Problem with Propagators
Henrik Stenlund
2014-11-24T23:59:59.000Z
The general abstract arbitrary order (N) Cauchy problem was solved in a closed form as a sum of exponential propagator functions. The infinite sparse exponential series was solved with the aid of a homogeneous differential equation. It generated a linear combination of exponential functions. The Cauchy problem solution was formed with N linear combinations of N exponential propagators.
Fast and accurate direct MDCT to DFT conversion with arbitrary window functions
Paris-Sud XI, UniversitÃ© de
1 Fast and accurate direct MDCT to DFT conversion with arbitrary window functions Shuhua Zhang* and Laurent Girin Abstract--In this paper, we propose a method for direct con- version of MDCT coefficients of the MDCT-to- DFT conversion matrices into a Toeplitz part plus a Hankel part. The latter is split
Mass and spin content of a free relativistic particle of arbitrary spins and the group
Nikitin, Anatoly
of particles with several spins and masses which can exist in positive as well as negative energy states Postal 20-364, 01000 Mexico D. F., Mexico 2 Instituto de Ciencias Nucleares, UNAM, Apdo. Postal 70 approach to the free parti- cle of arbitrary spins whose relativistic equation can be obtained from
Any: from scalarity to arbitrariness Lucia M. Tovena and Jacques Jayez
Paris-Sud XI, Université de
Any: from scalarity to arbitrariness Lucia M. Tovena and Jacques Jayez ITC-IRST EHESS Trento Paris) it is neither an indefinite nor a quantifier but a more abstract item which signals that some property holds), is asserted to hold of absolutely every individual of the N class, not only of the most typical ones
Single crystal growth and heteroepitaxy of polyacene thin films on arbitrary substrates
Headrick, Randall L.
in a number of low-cost, large area electronic applications such as flat panel displays. Organic thin film as other substrates.6-12 Recently, significant progress has been made towards fabricating high quality is to prepare single crystal films on arbitrary substrates. Here we describe two significant advances towards
Minkovskii-type inequality for arbitrary density matrix of composite and noncomposite systems
V. N. Chernega; O. V. Manko; V. I. Manko
2014-05-20T23:59:59.000Z
New kind of matrix inequality known for bipartite system density matrix is obtained for arbitrary density matrix of composite or noncomposite qudit systems including the single qudit state. The examples of two qubit system and qudit with j=3/2 are discussed.
Kolner, Brian H.
Optical Arbitrary Waveform Generation and Measurement Transmission Systems and Its Application to Flexible Bandwidth Networking By David Jason Geisler B.S. (Tufts University) 2004 M.S. (University . . . . . . . . . . . . . . . . . . . . . . . . . 10 1.4.1 The Case for Flexible Bandwidth Networking . . . . . . . . 11 1.4.2 Impairment Awareness
National Nuclear Security Administration (NNSA)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:AdministrationAnalysisDarby Dietrich5 | NUMBER 1 | MARCHT ID CODE I
MARS15 Code Developments Driven by the Intensity Frontier Needs
Mokhov, N V; Rakhno, I L; Striganov, S I; Tropin, I S; Eidelman, Yu I; Aarnio, P; Gudima, K K; Konobeev, A Yu
2014-01-01T23:59:59.000Z
The MARS15(2012) is the latest version of a multi-purpose Monte-Carlo code developed since 1974 for detailed simulation of hadronic and electromagnetic cascades in an arbitrary 3-D geometry of shielding, accelerator, detector and spacecraft components with energy ranging from a fraction of an electronvolt to 100 TeV. Driven by needs of the intensity frontier projects with their Megawatt beams, e.g., ESS, FAIR and Project X, the code has been recently substantially improved and extended. These include inclusive and exclusive particle event generators in the 0.7 to 12 GeV energy range, proton inelastic interaction modeling below 20 MeV, implementation of the EGS5 code for electromagnetic shower simulation at energies from 1 keV to 20 MeV, stopping power description in compound materials, new module for DPA calculations for neutrons from a fraction of eV to 20-150 MeV, user-friendly DeTra-based method to calculate nuclide inventories, and new ROOT-based geometry.
Coding for Transmission Coding for Compression Bonus Section CMPSCI 240: Reasoning about Uncertainty
McGregor, Andrew
Coding for Transmission Coding for Compression Bonus Section CMPSCI 240: Reasoning about 1, 2013 #12;Coding for Transmission Coding for Compression Bonus Section Information Theory Encoding for Transmission Coding for Compression Bonus Section Encoding Messages with Redundancy: Error Correcting Suppose
PICLE: a 2-D code for laser-beam - gas-jet interaction studies
Dunning, M.J.
1981-01-01T23:59:59.000Z
A heat transport hydrodynamic PIC code was adapted for application to the KMSF gas-jet experiments. The input material density profile was changed from the original solid slab geometry to a cylindrically symmetric profile modeling the gas-jet plume. The target material was changed from the original Z = 1 to arbitrary Z. Energy deposition was modified to include inverse bremsstrahlung and resonance absorption. Preliminary results indicate electron thermal conduction dominates over mass flow for times up to about the laser pulse length. Electron thermal conduction is seen to vary between classical and flux-limited values spatially and temporally according to plasma conditions. Applications of this code, entitled PICLE (Particle-In-Cell Laser Equipment code), to absorption and flux-limit parameter studies are described. A source listing and sample input deck are included.
David Poulin; Jean-Pierre Tillich; Harold Ollivier
2009-06-10T23:59:59.000Z
We present a theory of quantum serial turbo-codes, describe their iterative decoding algorithm, and study their performances numerically on a depolarization channel. Our construction offers several advantages over quantum LDPC codes. First, the Tanner graph used for decoding is free of 4-cycles that deteriorate the performances of iterative decoding. Secondly, the iterative decoder makes explicit use of the code's degeneracy. Finally, there is complete freedom in the code design in terms of length, rate, memory size, and interleaver choice. We define a quantum analogue of a state diagram that provides an efficient way to verify the properties of a quantum convolutional code, and in particular its recursiveness and the presence of catastrophic error propagation. We prove that all recursive quantum convolutional encoder have catastrophic error propagation. In our constructions, the convolutional codes have thus been chosen to be non-catastrophic and non-recursive. While the resulting families of turbo-codes have bounded minimum distance, from a pragmatic point of view the effective minimum distances of the codes that we have simulated are large enough not to degrade the iterative decoding performance up to reasonable word error rates and block sizes. With well chosen constituent convolutional codes, we observe an important reduction of the word error rate as the code length increases.
For the Bona-Smith system (a = 0,b > 0,c 0) the decay ..... amplitude long waves in nonlinear dispersive media I: Derivation and the linear theory, J.
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeeding access toTestPhysics LabInterconnection RiskMarch
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWP TWPAlumniComplex historian ...BESFor Users Live Status My
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental Assessments (EA) /Email Announcements12:25Sequedex:
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental Assessments (EA) /Email Announcements12:25Sequedex:Example Batch
Conjugate Codes and Applications to Cryptography
Mitsuru Hamada
2006-10-23T23:59:59.000Z
A conjugate code pair is defined as a pair of linear codes such that one contains the dual of the other. The conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is argued that conjugate code pairs are applicable to quantum cryptography in order to motivate studies on conjugate code pairs.
Turbo and LDPC Codes: Implementation, Simulation,
Valenti, Matthew C.
1 Turbo and LDPC Codes: Implementation, Simulation, and Standardization June 7, 2006 Matthew/7/2006 Turbo and LDPC Codes 2/133 Tutorial Overview Channel capacity Convolutional codes Â the MAP algorithm Turbo codes Â Standard binary turbo codes: UMTS and cdma2000 Â Duobinary CRSC turbo codes: DVB
T-549: Adobe ColdFusion 9.0.1 CHF1 and earlier
Broader source: Energy.gov [DOE]
Cross-site scripting (XSS) vulnerability in Adobe ColdFusion before 9.0.1 CHF1 allows remote attackers to inject arbitrary web script or HTML via vectors involving a "tag script.
Geddes, Cameron Guy Robinson
Warm wave breaking of nonlinear plasma waves with arbitrary phase velocities C. B. Schroeder, E, collisionless plasma is developed to analyze nonlinear plasma waves excited by intense drive beams. The maximum amplitude and wavelength are calculated for nonrelativistic plasma temperatures and arbitrary plasma wave
Benchmark of the IMPACT Code for High Intensity Beam DynamicsSimulation
Qiang, J.; Ryne, R.D.
2006-11-16T23:59:59.000Z
The IMPACT (Integrated Map and Particle Accelerator Tracking) code was first developed under Computational Grand Challenge project in the mid 1990s [1]. It started as a three-dimensional (3D) data parallel particle-in-cell (PIC) code written in High Performance Fortran. The code used a split-operator based method to solve the Hamiltonian equations of motion. It contained linear transfer maps for drifts, quadrupole magnets and rf cavities. The space-charge forces were calculated using an FFT-based method with 3D open boundary conditions and longitudinal periodic boundary conditions. This code was completely rewritten in the late 1990s based on a message passing parallel programming paradigm using Fortran 90 and MPI following an object-oriented software design. This improved the code's scalability on large parallel computer systems and also gave the code better software maintainability and extensibility [2]. In the following years, under the SciDAC-1 accelerator project, the code was extended to include more accelerating and focusing elements such as DTL, CCL, superconducting linac, solenoid, dipole, multipoles, and others. Besides the original split-operator based integrator, a direct integration of Lorentz equations of motion using a leap-frog algorithm was also added to the IMPACT code to handle arbitrary external nonlinear fields. This integrator can read in 3D electromagnetic fields in a Cartesian grid or in a cylindrical coordinate system. Using the Lorentz integrator, we also extended the original code to handle multiple charge-state beams. The space-charge solvers were also extended to include conducting wall effects for round and rectangular pipes with longitudinal open and periodic boundary conditions. Recently, it has also been extended to handle short-range wake fields (longitudinal monopole and transverse dipole) and longitudinal coherent synchrotron radiation wake fields. Besides the parallel macroparticle tracking code, an rf linac lattice design code, an envelope matching and analysis code, and a number of pre- and post-processing codes were also developed to form the IMPACT code suite. The IMPACT code suite has been used to study beam dynamics in the SNS linac, the J-PARC linac commissioning, the CERN superconducting linac design, the Los Alamos Low Energy Demonstration Accelerator (LEDA) halo experiment, the Rare Isotope Accelerator (RIA) driver linac design, and the FERMI{at}Elettra FEL linac design [3-8]. It has also been used to study space-charge resonance in anisotropic beams [9-11].
Clark County- Energy Conservation Code
Broader source: Energy.gov [DOE]
In September 2010, Clark County adopted Ordinance 3897, implementing the Southern Nevada version of the 2009 International Energy Conservation Code for both residential and commercial buildings...
Nonbinary Codeword Stabilized Quantum Codes
Xie Chen; Bei Zeng; Isaac L. Chuang
2008-08-22T23:59:59.000Z
The codeword stabilized (CWS) quantum codes formalism presents a unifying approach to both additive and nonadditive quantum error-correcting codes (arXiv:0708.1021 [quant-ph]), but only for binary states. Here we generalize the CWS framework to the nonbinary case (of both prime and nonprime dimension) and map the search for nonbinary quantum codes to a corresponding search problem for classical nonbinary codes with specific error patterns. We show that while the additivity properties of nonbinary CWS codes are similar to the binary case, the structural properties of the nonbinary codes differ substantially from the binary case, even for prime dimensions. In particular, we identify specific structure patterns of stabilizer groups, based on which efficient constructions might be possible for codes that encode more dimensions than any stabilizer codes of the same length and distance; similar methods cannot be applied in the binary case. Understanding of these structural properties can help prune the search space and facilitate the identification of good nonbinary CWS codes.
Marin County- Solar Access Code
Broader source: Energy.gov [DOE]
Marin County's Energy Conservation Code is designed to assure new subdivisions provide for future passive or natural heating or cooling opportunities in the subdivision to the extent feasible. ...
Quantum Quasi-Cyclic LDPC Codes
Manabu Hagiwara; Hideki Imai
2010-08-28T23:59:59.000Z
In this paper, a construction of a pair of "regular" quasi-cyclic LDPC codes as ingredient codes for a quantum error-correcting code is proposed. That is, we find quantum regular LDPC codes with various weight distributions. Furthermore our proposed codes have lots of variations for length, code rate. These codes are obtained by a descrete mathematical characterization for model matrices of quasi-cyclic LDPC codes. Our proposed codes achieve a bounded distance decoding (BDD) bound, or known as VG bound, and achieve a lower bound of the code length.
Super Special Codes using Super Matrices
W. B. Vasantha Kandasamy; Florentin Smarandache; K. Ilanthenral
2010-06-30T23:59:59.000Z
The new classes of super special codes are constructed in this book using the specially constructed super special vector spaces. These codes mainly use the super matrices. These codes can be realized as a special type of concatenated codes. This book has four chapters. In chapter one basic properties of codes and super matrices are given. A new type of super special vector space is constructed in chapter two of this book. Three new classes of super special codes namely, super special row code, super special column code and super special codes are introduced in chapter three. Applications of these codes are given in the final chapter.
On the logical operators of quantum codes
Mark M. Wilde
2009-03-30T23:59:59.000Z
I show how applying a symplectic Gram-Schmidt orthogonalization to the normalizer of a quantum code gives a different way of determining the code's logical operators. This approach may be more natural in the setting where we produce a quantum code from classical codes because the generator matrices of the classical codes form the normalizer of the resulting quantum code. This technique is particularly useful in determining the logical operators of an entanglement-assisted code produced from two classical binary codes or from one classical quaternary code. Finally, this approach gives additional formulas for computing the amount of entanglement that an entanglement-assisted code requires.
Non-Residential Energy Code National and Regional Codes
Non-Residential Energy Code Comparison National and Regional Codes David Baylon Mike Kennedy #12 2003 Â· ASHRAE 90.1 2001 & addenda Â· E-Benchmark Guidelines (NBI) #12;Approach Â· Comparison of the State;Approach (cont.) Â· Provisions compared Â Lighting power Â Lighting controls Â Mechanical systems Â Building
Building and Facility Codes Code Building Location Bldg # Coordinates
Russell, Lynn
Building and Facility Codes Code Building Location Bldg # Coordinates APM Applied Physics & Mathematics Building Muir 249 F7 ASANT Asante Hall Eleanor Roosevelt 446 F5 BIO Biology Building Muir 259 F7 BIRCH Birch Aquarium SIO 2300 S-D7 BONN Bonner Hall Revelle 131 G8 BSB Biomedical Sciences Building
Space time coded code division multiplexing on SC140 DSP
Menon, Murali P
2001-01-01T23:59:59.000Z
The aim of this research is to design a high data rate wireless communication system for multi-path fading channels. Code-division multiplexing is proposed as a modulation scheme for a space-time coded multiple antenna system that would guarantee...
ITS Version 6 : the integrated TIGER series of coupled electron/photon Monte Carlo transport codes.
Franke, Brian Claude; Kensek, Ronald Patrick; Laub, Thomas William
2008-04-01T23:59:59.000Z
ITS is a powerful and user-friendly software package permitting state-of-the-art Monte Carlo solution of lineartime-independent coupled electron/photon radiation transport problems, with or without the presence of macroscopic electric and magnetic fields of arbitrary spatial dependence. Our goal has been to simultaneously maximize operational simplicity and physical accuracy. Through a set of preprocessor directives, the user selects one of the many ITS codes. The ease with which the makefile system is applied combines with an input scheme based on order-independent descriptive keywords that makes maximum use of defaults and internal error checking to provide experimentalists and theorists alike with a method for the routine but rigorous solution of sophisticated radiation transport problems. Physical rigor is provided by employing accurate cross sections, sampling distributions, and physical models for describing the production and transport of the electron/photon cascade from 1.0 GeV down to 1.0 keV. The availability of source code permits the more sophisticated user to tailor the codes to specific applications and to extend the capabilities of the codes to more complex applications. Version 6, the latest version of ITS, contains (1) improvements to the ITS 5.0 codes, and (2) conversion to Fortran 90. The general user friendliness of the software has been enhanced through memory allocation to reduce the need for users to modify and recompile the code.
Complete hierarchies of SIR models on arbitrary networks with exact and approximate moment closure
Sharkey, Kieran J
2015-01-01T23:59:59.000Z
We first generalise ideas discussed by Kiss et al. (2015) to prove a theorem for generating exact closures (here expressing joint probabilities in terms of their constituent marginal probabilities) for susceptible-infectious-removed (SIR) dynamics on arbitrary graphs (networks). For Poisson transmission and removal processes, this enables us to obtain a systematic reduction in the number of differential equations needed for an exact `moment closure' representation of the underlying stochastic model. We define `transmission blocks' as a possible extension of the block concept in graph theory and show that the order at which the exact moment closure representation is curtailed is the size of the largest transmission block. More generally, approximate closures of the hierarchy of moment equations for these dynamics are typically defined for the first and second order yielding mean-field and pairwise models respectively. It is frequently implied that, in principle, closed models can be written down at arbitrary o...
Fred Cooper; Gouranga C. Nayak
2006-12-29T23:59:59.000Z
We study the Schwinger mechanism for the pair production of fermions in the presence of an arbitrary time-dependent background electric field E(t) by directly evaluating the path integral. We obtain an exact non-perturbative result for the probability of fermion-antifermion pair production per unit time per unit volume per unit transverse momentum (of the fermion or antifermion) from the arbitrary time dependent electric field E(t) via Schwinger mechanism. We find that the exact non-perturbative result is independent of all the time derivatives d^nE(t)/dt^n, where n=1,2,....\\infty. This result has the same functional dependence on E as the Schwinger's constant electric field E result with the replacement: E -> E(t).
Generalized Remote Preparation of Arbitrary $m$-qubit Entangled States via Genuine Entanglements
Dong Wang; Ross D. Hoehn; Liu Ye; Sabre Kais
2015-03-30T23:59:59.000Z
Herein, we present a feasible, general protocol for quantum communication within a network via generalized remote preparation of an arbitrary $m$-qubit entangled state designed with genuine tripartite Greenberger--Horne--Zeilinger-type entangled resources. During the implementations, we construct novel collective unitary operations; these operations are tasked with performing the necessary phase transfers during remote state preparations. We have distilled our implementation methods into a five-step procedure, which can be used to faithfully recover the desired state during transfer. Compared to previous existing schemes, our methodology features a greatly increased success probability. After the consumption of auxiliary qubits and the performance of collective unitary operations, the probability of successful state transfer is increased four-fold and eight-fold for arbitrary two- and three-qubit entanglements when compared to other methods within the literature, respectively. We conclude this paper with a discussion of the presented scheme for state preparation, including: success probabilities, reducibility and generalizability.
Practical Formula for Bunch Power Loss in Resonators of Almost Arbitrary Quality Factor
Furman, Miguel
SSC-N-142 Practical Formula for Bunch Power Loss in Resonators of Almost Arbitrary Quality Factor a resonant structure with impedance Z() = RS 1 + iQ r - r (1) then the power loss is [1] P = (cf0)2 m in the summation in Eq. (2) yield an accurate estimate for the power loss. If, on the other hand, ~() is very broad
F. A. Barone; G. Flores-Hidalgo
2008-12-20T23:59:59.000Z
In this paper we investigate the vacuum energies of several models of quantum fields interacting with static external currents (linear couplings) concentrated along parallel branes with an arbitrary number of codimensions. We show that we can simulate the presence of static charges distributions as well as the presence of classical static dipoles in any dimension for massive and massless fields. We also show that we can produce confining potentials with massless self interacting scalar fields as well as long range anisotropic potentials.
Weight Distribution of a Class of Binary Linear Block Codes Formed from RCPC Codes
Shen, Yushi Dr.; Cosman, Pamela C; Milstein, Laurence B
2006-01-01T23:59:59.000Z
formed from convolutional codes,” IEEE Trans. Commun. , vol.terminated convolutional codes,” IEEE Trans. Inform. Theory,decoding of linear block codes and related soft- decision
Hong Luo; Luqing Luo; Robert Nourgaliev; Vincent A. Mousseau
2010-01-01T23:59:59.000Z
A reconstruction-based discontinuous Galerkin (RDG) method is presented for the solution of the compressible Navier-Stokes equations on arbitrary grids. The RDG method, originally developed for the compressible Euler equations, is extended to discretize viscous and heat fluxes in the Navier-Stokes equations using a so-called inter-cell reconstruction, where a smooth solution is locally reconstructed using a least-squares method from the underlying discontinuous DG solution. Similar to the recovery-based DG (rDG) methods, this reconstructed DG method eliminates the introduction of ad hoc penalty or coupling terms commonly found in traditional DG methods. Unlike rDG methods, this RDG method does not need to judiciously choose a proper form of a recovered polynomial, thus is simple, flexible, and robust, and can be used on arbitrary grids. The developed RDG method is used to compute a variety of flow problems on arbitrary meshes to demonstrate its accuracy, efficiency, robustness, and versatility. The numerical results indicate that this RDG method is able to deliver the same accuracy as the well-known Bassi-Rebay II scheme, at a half of its computing costs for the discretization of the viscous fluxes in the Navier-Stokes equations, clearly demonstrating its superior performance over the existing DG methods for solving the compressible Navier-Stokes equations.
Veeravalli, Venugopal
Introduction Space Time Codes Space Time Coding with Feedback New Thoughts Summary Space 2007 #12;Introduction Space Time Codes Space Time Coding with Feedback New Thoughts Summary MIMO: Diversity vs Multiplexing Multiplexing Diversity Pictures taken from lectures notes on Space Time Coding
Valero-Cuevas, Francisco
for help with accuracy. For now, though, the hopes of the Pentagon for a science-friendly cinema seem08/04/2005 09:17 AMPentagon's New Goal: Put Science Into Scripts - New York Times Page 1 of 2http=print August 4, 2005 Pentagon's New Goal: Put Science Into Scripts By DAVID M. HALBFINGER LOS ANGELES, Aug. 3
LFSC - Linac Feedback Simulation Code
Ivanov, Valentin; /Fermilab
2008-05-01T23:59:59.000Z
The computer program LFSC (
Stabilizer Codes over Frobenius Rings
Nadella, Sushma
2012-07-16T23:59:59.000Z
now, the methods for quantum error correction were mainly based on quantum codes that rely on the arithmetic in finite fields. In contrast, this thesis aims to develop a basic framework for quantum error correcting codes over a class of rings known...
Entanglement boosts quantum turbo codes
Wilde, Mark M
2010-01-01T23:59:59.000Z
One of the unexpected breakdowns in the existing theory of quantum serial turbo coding is that a quantum convolutional encoder cannot simultaneously be recursive and non-catastrophic. These properties are essential for a quantum turbo code to have an unbounded minimum distance and for its iterative decoding algorithm to converge, respectively. Here, we show that the entanglement-assisted paradigm gives a theoretical and practical "turbo boost" to these codes, in the sense that an entanglement-assisted quantum (EAQ) convolutional encoder can possess both of the aforementioned desirable properties, and simulation results indicate that entanglement-assisted turbo codes can operate reliably in a noise regime 5.5 dB beyond that of standard quantum turbo codes. Entanglement is the resource that enables a convolutional encoder to satisfy both properties because an encoder acting on only information qubits, classical bits, gauge qubits, and ancilla qubits cannot simultaneously satisfy them. We give several examples o...
On Quantum and Classical BCH Codes
Salah A. Aly; Andreas Klappenecker; Pradeep Kiran Sarvepalli
2006-04-14T23:59:59.000Z
Classical BCH codes that contain their (Euclidean or Hermitian) dual codes can be used to construct quantum stabilizer codes; this correspondence studies the properties of such codes. It is shown that a BCH code of length n can contain its dual code only if its designed distance d=O(sqrt(n)), and the converse is proved in the case of narrow-sense codes. Furthermore, the dimension of narrow-sense BCH codes with small design distance is completely determined, and - consequently - the bounds on their minimum distance are improved. These results make it possible to determine the parameters of quantum BCH codes in terms of their design parameters.
G. Morlino; P. Blasi; M. Vietri
2007-01-08T23:59:59.000Z
A mathematical approach to investigate particle acceleration at shock waves moving at arbitrary speed in a medium with arbitrary scattering properties was first discussed in (Vietri 2003) and (Blasi & Vietri 2005}. We use this method and somewhat extend it in order to include the effect of a large scale magnetic field in the upstream plasma, with arbitrary orientation with respect to the direction of motion of the shock. We also use this approach to investigate the effects of anisotropic scattering on spectra and anisotropies of the distribution function of the accelerated particles.
San Francisco Building Code Amendments to the
Green Building Standards Code 2010 California Residential Code Operative date: January 1, 2011 #12;2 #121 2010 San Francisco Building Code Amendments to the 2010 California Building Code 2010 California;3 CHAPTER 1 SCOPE AND ADMINISTRATION DIVISION I CALIFORNIA ADMINISTRATION No San Francisco Building Code
NHA HYDROGEN SAFETY CODES AND STANDARDS ACTIVITIES
laboratories, code officials and model building code organizations to bring experts together in a focused and other information needed by the Code Officials to complete the development of these new codes needs to be disseminated to building code officials such as National Fire Protection Association (NFPA
Remarkable Degenerate Quantum Stabilizer Codes Derived from Duadic Codes
Salah A. Aly; Andreas Klappenecker; Pradeep Kiran Sarvepalli
2006-01-18T23:59:59.000Z
Good quantum codes, such as quantum MDS codes, are typically nondegenerate, meaning that errors of small weight require active error-correction, which is--paradoxically--itself prone to errors. Decoherence free subspaces, on the other hand, do not require active error correction, but perform poorly in terms of minimum distance. In this paper, examples of degenerate quantum codes are constructed that have better minimum distance than decoherence free subspaces and allow some errors of small weight that do not require active error correction. In particular, two new families of [[n,1,>= sqrt(n)
Gabbouj, Moncef
-27 November 2007, Dubai, United Arab Emirates EFFECTS OF ARBITRARY-SHAPED REGIONS ON TEXTURE RETRIEVAL Serkan
Mafalda Dias; Jonathan Frazer; David Seery
2015-02-10T23:59:59.000Z
We describe how to apply the transport method to compute inflationary observables in a broad range of multiple-field models. The method is efficient and encompasses scenarios with curved field-space metrics, violations of slow-roll conditions and turns of the trajectory in field space. It can be used for an arbitrary mass spectrum, including massive modes and models with quasi-single-field dynamics. In this note we focus on practical issues. It is accompanied by a Mathematica code which can be used to explore suitable models, or as a basis for further development.
Dias, Mafalda; Seery, David
2015-01-01T23:59:59.000Z
We describe how to apply the transport method to compute inflationary observables in a broad range of multiple-field models. The method is efficient and encompasses scenarios with curved field-space metrics, violations of slow-roll conditions and turns of the trajectory in field space. It can be used for an arbitrary mass spectrum, including massive modes and models with quasi-single-field dynamics. In this note we focus on practical issues. It is accompanied by a Mathematica code which can be used to explore suitable models, or as a basis for further development.
Surface code implementation of block code state distillation
Austin G. Fowler; Simon J. Devitt; Cody Jones
2013-01-29T23:59:59.000Z
State distillation is the process of taking a number of imperfect copies of a particular quantum state and producing fewer better copies. Until recently, the lowest overhead method of distilling states |A>=(|0>+e^{i\\pi/4}|1>)/\\sqrt{2} produced a single improved |A> state given 15 input copies. New block code state distillation methods can produce k improved |A> states given 3k+8 input copies, potentially significantly reducing the overhead associated with state distillation. We construct an explicit surface code implementation of block code state distillation and quantitatively compare the overhead of this approach to the old. We find that, using the best available techniques, for parameters of practical interest, block code state distillation does not always lead to lower overhead, and, when it does, the overhead reduction is typically less than a factor of three.
Spherical codes, maximal local packing density, and the golden ratio
A. B. Hopkins; F. H. Stillinger; S. Torquato
2010-03-18T23:59:59.000Z
The densest local packing (DLP) problem in d-dimensional Euclidean space Rd involves the placement of N nonoverlapping spheres of unit diameter near an additional fixed unit-diameter sphere such that the greatest distance from the center of the fixed sphere to the centers of any of the N surrounding spheres is minimized. Solutions to the DLP problem are relevant to the realizability of pair correlation functions for packings of nonoverlapping spheres and might prove useful in improving upon the best known upper bounds on the maximum packing fraction of sphere packings in dimensions greater than three. The optimal spherical code problem in Rd involves the placement of the centers of N nonoverlapping spheres of unit diameter onto the surface of a sphere of radius R such that R is minimized. It is proved that in any dimension, all solutions between unity and the golden ratio to the optimal spherical code problem for N spheres are also solutions to the corresponding DLP problem. It follows that for any packing of nonoverlapping spheres of unit diameter, a spherical region of radius less than or equal to the golden ratio centered on an arbitrary sphere center cannot enclose a number of sphere centers greater than one more than the number that can be placed on the region's surface.
Entanglement-assisted codeword stabilized quantum codes
Shin, Jeonghwan; Heo, Jun; Brun, Todd A. [School of Electrical Engineering, Korea University, Seoul (Korea, Republic of); Communication Sciences Institute, University of Southern California, Los Angeles, California 90089 (United States)
2011-12-15T23:59:59.000Z
Entangled qubits can increase the capacity of quantum error-correcting codes based on stabilizer codes. In addition, by using entanglement quantum stabilizer codes can be construct from classical linear codes that do not satisfy the dual-containing constraint. We show that it is possible to construct both additive and nonadditive quantum codes using the codeword stabilized quantum code framework. Nonadditive codes may offer improved performance over the more common stabilizer codes. Like other entanglement-assisted codes, the encoding procedure acts only on the qubits on Alice's side, and only these qubits are assumed to pass through the channel. However, errors in the codeword stabilized quantum code framework give rise to effective Z errors on Bob's side. We use this scheme to construct entanglement-assisted nonadditive quantum codes, in particular, ((5,16,2;1)) and ((7,4,5;4)) codes.
Entanglement-assisted codeword stabilized quantum codes
Jeonghwan Shin; Jun Heo; Todd A. Brun
2011-09-15T23:59:59.000Z
Entangled qubit can increase the capacity of quantum error correcting codes based on stabilizer codes. In addition, by using entanglement quantum stabilizer codes can be construct from classical linear codes that do not satisfy the dual-containing constraint. We show that it is possible to construct both additive and non-additive quantum codes using the codeword stabilized quantum code framework. Nonadditive codes may offer improved performance over the more common sta- bilizer codes. Like other entanglement-assisted codes, the encoding procedure acts only the qubits on Alice's side, and only these qubits are assumed to pass through the channel. However, errors the codeword stabilized quantum code framework gives rise to effective Z errors on Bob side. We use this scheme to construct new entanglement-assisted non-additive quantum codes, in particular, ((5,16,2;1)) and ((7,4,5;4)) codes.
STDS91.COD: Grief and Mourning Codes
Rosenblatt, Paul C.; Walsh, R. Patricia; Jackson, Douglas A.
2011-01-01T23:59:59.000Z
conflict 2000 Age of Marriage, Females (code book variable87) N Code NA Meaning Missing data Scores range from 8.2 toGRIEF AND MOURNING CODES Paul C. Rosenblatt Department of
LDPC codes : structural analysis and decoding techniques
Zhang, Xiaojie
2012-01-01T23:59:59.000Z
to Low-Density Parity-Check Codes 2.1 Representation of LDPC4.2 Error Floors of LDPC Codes . . . . . . . . . . . . . . .LP Decoding of LDPC Codes with Alternating Direction Method
Codes for the fast SSS QR eigens
Fortran 90 codes (zip file); Matlab codes (zip file). Please email. A fast O(n^2) time QR eigensolver for companion matrices/polynomials. Fortran 90 codes (zip ...
DEPARTMENT CODE Department of Computer Science
DEPARTMENT CODE Department of Computer Science College of Natural Sciences Colorado State and Amendment of this Code 19 #12;1 MISSION AND OBJECTIVES 3 Preamble This Code of the Department of Computer
Example of Environmental Restoration Code of Accounts
Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]
1997-03-28T23:59:59.000Z
This chapter describes the fundamental structure of an example remediation cost code system, lists and describes the Level 1 cost codes, and lists the Level 2 and Level 3 cost codes.
Arkansas Underground Injection Control Code (Arkansas)
Broader source: Energy.gov [DOE]
The Arkansas Underground Injection Control Code (UIC code) is adopted pursuant to the provisions of the Arkansas Water and Air Pollution Control Act (Arkansas Code Annotated 8-5-11). It is the...
Codeword Stabilized Quantum Codes and Their Error Correction
Li, Yunfan
2010-01-01T23:59:59.000Z
5.1.4 Generic CWS codes . . . . . . . . . . .USt codes . . . . . . . . . . . . . . . . . . . . . .Quantum Codes 2.1 Notations . . . . . . . . . . . . . . 2.2
Algebraic list-decoding of error-correcting codes
Parvaresh, Farzad
2007-01-01T23:59:59.000Z
Solomon codes . . . . . . . . . . . . . . . 1.2.2 Guruswami-Simple trivariate codes and theirdecoding . . . . . . . . . . . . . 3.3.1 Code parameters and
Budget/Object Codes -REVENUE Budget/Object Codes -REVENUE BUDGET/OBJECT BUDGET/OBJECT
Selmic, Sandra
Budget/Object Codes -REVENUE Budget/Object Codes - REVENUE BUDGET/OBJECT BUDGET/OBJECT BUDGET CODE DESCRIPTION BUDGET CODE DESCRIPTION 01 30 0101 On-Campus-Full Time 3001 Federal Program 0102 On APPROPRIATIONS #12;Budget/Object Codes -REVENUE Budget/Object Codes - REVENUE BUDGET/OBJECT BUDGET/OBJECT BUDGET
MultiModeCode: An efficient numerical solver for multifield inflation
Layne C. Price; Jonathan Frazer; Jiajun Xu; Hiranya V. Peiris; Richard Easther
2014-10-02T23:59:59.000Z
We present MultiModeCode, a Fortran 95/2000 package for the numerical exploration of multifield inflation models. This program facilitates efficient Monte Carlo sampling of prior probabilities for inflationary model parameters and initial conditions and is the first publicly available code that can efficiently generate large sample-sets for inflation models with $\\mathcal O(100)$ fields. The code numerically solves the equations of motion for the background and first-order perturbations of multi-field inflation models with canonical kinetic terms and arbitrary potentials, providing the adiabatic, isocurvature, and tensor power spectra at the end of inflation. For models with sum-separable potentials MultiModeCode also computes the slow-roll prediction via the $\\delta N$ formalism for easy model exploration and validation. We pay particular attention to the isocurvature perturbations as the system approaches the adiabatic limit, showing how to avoid numerical instabilities that affect some other approaches to this problem. We demonstrate the use of MultiModeCode by exploring a few toy models. Finally, we give a concise review of multifield perturbation theory and a user's manual for the program.
YNOGK: A NEW PUBLIC CODE FOR CALCULATING NULL GEODESICS IN THE KERR SPACETIME
Yang Xiaolin; Wang Jiancheng, E-mail: yangxl@ynao.ac.cn [National Astronomical Observatories, Yunnan Observatory, Chinese Academy of Sciences, Kunming 650011 (China)
2013-07-01T23:59:59.000Z
Following the work of Dexter and Agol, we present a new public code for the fast calculation of null geodesics in the Kerr spacetime. Using Weierstrass's and Jacobi's elliptic functions, we express all coordinates and affine parameters as analytical and numerical functions of a parameter p, which is an integral value along the geodesic. This is the main difference between our code and previous similar ones. The advantage of this treatment is that the information about the turning points does not need to be specified in advance by the user, and many applications such as imaging, the calculation of line profiles, and the observer-emitter problem, become root-finding problems. All elliptic integrations are computed by Carlson's elliptic integral method as in Dexter and Agol, which guarantees the fast computational speed of our code. The formulae to compute the constants of motion given by Cunningham and Bardeen have been extended, which allow one to readily handle situations in which the emitter or the observer has an arbitrary distance from, and motion state with respect to, the central compact object. The validation of the code has been extensively tested through applications to toy problems from the literature. The source FORTRAN code is freely available for download on our Web site http://www1.ynao.ac.cn/{approx}yangxl/yxl.html.
The Cost of Enforcing Building Energy Codes: Phase 1
Williams, Alison
2013-01-01T23:59:59.000Z
practices among code officials. Stakeholders recommendboth applicants and code officials and help to inform thecomply with the code and code officials to enforce the new
Gas Code of Conduct (Connecticut)
Broader source: Energy.gov [DOE]
The Gas Code of Conduct sets forth the standard of conduct for transactions, direct or indirect, between gas companies and their affiliates. The purpose of these regulations is to promote...
Commercial Building Codes and Standards
Broader source: Energy.gov [DOE]
Once an energy-efficient technology or practice is widely available in the market, it can become the baseline of performance through building energy codes and equipment standards. The Building...
Montana Coal Mining Code (Montana)
Broader source: Energy.gov [DOE]
The Department of Labor and Industry is authorized to adopt rules pertaining to safety standards for all coal mines in the state. The Code requires coal mine operators to make an accurate map or...
Fuel cycle code, "FUELMOVE III"
Sovka, Jerry Alois
1963-01-01T23:59:59.000Z
Further modifications to the fuel cycle code FUELMOVE are described which were made in an attempt to obtain results for reflected reactors operated under batch, outin, and bidirectional fueling schemes. Numerical methods ...
LATTICE: AN INTERACTIVE LATTICE COMPUTER CODE
Staples, John
2010-01-01T23:59:59.000Z
4500-R65 I LATTICE AN INTERACTIVE LATTICE COMPUTER CODE Johnr LBL-4843 LATTICE An interactive lattice computer code Johncode which enables an interactive user to calculate the
Building Energy Codes Collaborative Technical Assistance for...
State Energy Officials - 2014 BTO Peer Review Southeast Energy Efficiency Alliance's Building Energy Codes Project Reducing Energy Demand in Buildings Through State Energy Codes...
Program School/ Career: Descripton ISIS Program Codes
Wisconsin at Madison, University of
Program School/ Career: Descripton ISIS Program Codes Program Career: Descripton College School;Program School/ Career: Descripton ISIS Program Codes Program Career: Descripton College School/ College 1
Building Energy Code | Department of Energy
Broader source: Energy.gov (indexed) [DOE]
Building Codes Assistance Project (BCAP). For more detailed information about building energy codes, visit the http:www.energycodes.govstates DOE and http:...
Quantum stabilizer codes and beyond
Sarvepalli, Pradeep Kiran
2008-10-10T23:59:59.000Z
QUANTUM STABILIZER CODES AND BEYOND A Dissertation by PRADEEP KIRAN SARVEPALLI Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY August 2008 Major... Subject: Computer Science QUANTUM STABILIZER CODES AND BEYOND A Dissertation by PRADEEP KIRAN SARVEPALLI Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY...
Edge equilibrium code for tokamaks
Li, Xujing [Institute of Computational Mathematics and Scientific/Engineering Computing, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, P.O. Box 2719, Beijing 100190 (China)] [Institute of Computational Mathematics and Scientific/Engineering Computing, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, P.O. Box 2719, Beijing 100190 (China); Zakharov, Leonid E. [Princeton Plasma Physics Laboratory Princeton, MS-27 P.O. Box 451, New Jersey (United States)] [Princeton Plasma Physics Laboratory Princeton, MS-27 P.O. Box 451, New Jersey (United States); Drozdov, Vladimir V. [Euratom/CCFE Fusion Association, Culham Science Centre, Abingdon OX14 3DB (United Kingdom)] [Euratom/CCFE Fusion Association, Culham Science Centre, Abingdon OX14 3DB (United Kingdom)
2014-01-15T23:59:59.000Z
The edge equilibrium code (EEC) described in this paper is developed for simulations of the near edge plasma using the finite element method. It solves the Grad-Shafranov equation in toroidal coordinate and uses adaptive grids aligned with magnetic field lines. Hermite finite elements are chosen for the numerical scheme. A fast Newton scheme which is the same as implemented in the equilibrium and stability code (ESC) is applied here to adjust the grids.
Lower Bound of Concurrence and Distillation for Arbitrary Dimensional Bipartite Quantum States
Zhao, Ming-Jing; Fei, Shao-Ming; Li-Jost, Xianqing; 10.1103/PhysRevA.84.062322
2011-01-01T23:59:59.000Z
We present a lower bound of concurrence for arbitrary dimensional bipartite quantum states. This lower bound may be used to improve all the known lower bounds of concurrence. Moreover, the lower bound gives rise to an operational sufficient criterion of distillability of quantum entanglement. The significance of our result is illustrated by quantitative evaluation of entanglement for entangled states that fail to be identified by the usual concurrence estimation method, and by showing the distillability of mixed states that can not be recognized by other distillability criteria.
Lower Bound of Concurrence and Distillation for Arbitrary Dimensional Bipartite Quantum States
Ming-Jing Zhao; Xue-Na Zhu; Shao-Ming Fei; Xianqing Li-Jost
2011-12-23T23:59:59.000Z
We present a lower bound of concurrence for arbitrary dimensional bipartite quantum states. This lower bound may be used to improve all the known lower bounds of concurrence. Moreover, the lower bound gives rise to an operational sufficient criterion of distillability of quantum entanglement. The significance of our result is illustrated by quantitative evaluation of entanglement for entangled states that fail to be identified by the usual concurrence estimation method, and by showing the distillability of mixed states that can not be recognized by other distillability criteria.
Effect of a polynomial arbitrary dust size distribution on dust acoustic solitons
Ishak-Boushaki, M.; Djellout, D.; Annou, R. [Faculty of Physics, USTHB, P.B. 32 El Alia, Bab-ezzouar, Algiers (Algeria)
2012-07-15T23:59:59.000Z
The investigation of dust-acoustic solitons when dust grains are size-distributed and ions adiabatically heated is conducted. The influence of an arbitrary dust size-distribution described by a polynomial function on the properties of dust acoustic waves is investigated. An energy-like integral equation involving Sagdeev potential is derived. The solitary solutions are shown to undergo a transformation into cnoidal ones under some physical conditions. The dust size-distribution can significantly affect both lower and upper critical Mach numbers for both solitons and cnoidal solutions.
Predictive wavefront control for Adaptive Optics with arbitrary control loop delays
Poyneer, L A; Veran, J
2007-10-30T23:59:59.000Z
We present a modification of the closed-loop state space model for AO control which allows delays that are a non-integer multiple of the system frame rate. We derive the new forms of the Predictive Fourier Control Kalman filters for arbitrary delays and show that they are linear combinations of the whole-frame delay terms. This structure of the controller is independent of the delay. System stability margins and residual error variance both transition gracefully between integer-frame delays.
Robust Dynamical Decoupling for Arbitrary Quantum States of a Single NV Center in Diamond
J. H. Shim; I. Niemeyer; J. Zhang; D. Suter
2012-07-24T23:59:59.000Z
Dynamical decoupling is a powerful technique for extending the coherence time (T$_2$) of qubits. We apply this technique to the electron spin qubit of a single nitrogen-vacancy center in type IIa diamond. In a crystal with natural abundance of $^{13}$C nuclear spins, we extend the decoherence time up to 2.2 ms. This is close to the T$_1$ value of this NV center (4 ms). Since dynamical decoupling must perform well for arbitrary initial conditions, we measured the dependence on the initial state and compared the performance of different sequences with respect to initial state dependence and robustness to experimental imperfections.
Study of stopping power for a proton moving in a plasma with arbitrary degeneracy
Zhang, Ya; Song, Yuan-Hong; Wang, You-Nian [School of Physics and Optoelectronic Technology, Dalian University of Technology, Dalian 116024 (China)] [School of Physics and Optoelectronic Technology, Dalian University of Technology, Dalian 116024 (China)
2013-10-15T23:59:59.000Z
Excitation of bulk solid electrons with arbitrary degeneracy, by external charged particles, is investigated by a two-dimensional nonlinear quantum hydrodynamic (QHD) model. The nonlinear stopping power and wake potential are calculated by solving the nonlinear QHD equations with the flux corrected transport numerical method. Two cases of fully degenerated and partially degenerated electrons are compared and discussed in the same self-consistent QHD model. Our results are consistent with the well known dielectric calculation of the stopping power at higher velocity, but include the nonlinear terms of the interactions and give larger stopping power at smaller velocity.
Reversing the weak measurement of an arbitrary field with finite photon number
Sun, Qingqing; Al-Amri, M.; Zubairy, M. Suhail.
2009-01-01T23:59:59.000Z
phase qubit was performed. A general procedure for N-dimensional sys- tem was also proposed in #3;12#4;, which requires 2N steps. An important question remains: can we reverse a multidi- mensional state in a simpler way? In Sec. II, we address... is the conclusion. II. SCHEMES The state of interest is an arbitrary cavity field with finite photon number #5;n,m=0nmax #1;nm#6;n#7;#8;m#6;, which is continuously monitored by an ideal photon detector outside. If there is no click, the field evolves into #5;n...
On the Motion of Free Material Test Particles in Arbitrary Spatial Flows
Tom Martin
1999-06-03T23:59:59.000Z
We show how the motion of free material test particles in arbitrary spatial flows is easily determined within the context of ordinary vector calculus. This may be useful for everyone, including engineers and other non-specialists, when thinking about gravitational problems. It already has valid application to simple problems such as the problems of motion in rotating and accelerating frames and to the gravitational problem of the single spherically symmetric attractor. When applied to the two body gravitational problem, it may help us determine the actual direction of the flow.
Remote preparation of arbitrary time-encoded single-photon ebits
Alessandro Zavatta; Milena D'Angelo; Valentina Parigi; Marco Bellini
2005-12-01T23:59:59.000Z
We propose and experimentally verify a novel method for the remote preparation of entangled bits (ebits) made of a single-photon coherently delocalized in two well-separated temporal modes. The proposed scheme represents a remotely tunable source for tailoring arbitrary ebits, whether maximally or non-maximally entangled, which is highly desirable for applications in quantum information technology. The remotely prepared ebit is studied by performing homodyne tomography with an ultra-fast balanced homodyne detection scheme recently developed in our laboratory.
M. Ángeles García-Ferrero; David Gómez-Ullate
2014-08-05T23:59:59.000Z
The work of Adler provides necessary and sufficient conditions for the Wronskian of a given sequence of eigenfunctions of Schr\\"odinger's equation to have constant sign in its domain of definition. We extend this result by giving explicit formulas for the number of real zeros of the Wronskian of an arbitrary sequence of eigenfunctions. Our results apply in particular to Wronskians of classical orthogonal polynomials, thus generalizing classical results by Karlin and Szeg\\H{o}. Our formulas hold under very mild conditions that are believed to hold for generic values of the parameters. In the Hermite case, our results allow to prove some conjectures recently formulated by Felder et al.
Graphical Quantum Error-Correcting Codes
Sixia Yu; Qing Chen; C. H. Oh
2007-09-12T23:59:59.000Z
We introduce a purely graph-theoretical object, namely the coding clique, to construct quantum errorcorrecting codes. Almost all quantum codes constructed so far are stabilizer (additive) codes and the construction of nonadditive codes, which are potentially more efficient, is not as well understood as that of stabilizer codes. Our graphical approach provides a unified and classical way to construct both stabilizer and nonadditive codes. In particular we have explicitly constructed the optimal ((10,24,3)) code and a family of 1-error detecting nonadditive codes with the highest encoding rate so far. In the case of stabilizer codes a thorough search becomes tangible and we have classified all the extremal stabilizer codes up to 8 qubits.
Codeword stabilized quantum codes on subsystems
Jeonghwan Shin; Jun Heo; Todd A. Brun
2012-08-29T23:59:59.000Z
Codeword stabilized quantum codes provide a unified approach to constructing quantum error-correcting codes, including both additive and non-additive quantum codes. Standard codeword stabilized quantum codes encode quantum information into subspaces. The more general notion of encoding quantum information into a subsystem is known as an operator (or subsystem) quantum error correcting code. Most operator codes studied to date are based in the usual stabilizer formalism. We introduce operator quantum codes based on the codeword stabilized quantum code framework. Based on the necessary and sufficient conditions for operator quantum error correction, we derive a error correction condition for operator codeword stabilized quantum codes. Based on this condition, the word operators of a operator codeword stabilized quantum code are constructed from a set of classical binary errors induced by generators of the gauge group. We use this scheme to construct examples of both additive and non-additive codes that encode quantum information into a subsystem.
Baluev, Roman V
2015-01-01T23:59:59.000Z
We present an attempt to improve models of the Rossiter-McLaughlin effect by relaxing several restrictive assumptions. For our main model of the Doppler anomaly, we consider the entire multiline stellar spectrum rather than just a single line, use no assumptions about the shape of the lines profiles, and allow arbitrary size ratio for the star and its eclipser. However, we neglect the effect of macro-turbulence and differential rotation. We construct our model as a power series in the stellar rotation velocity, $V\\sin i$, giving a closed set of analytic formulae for up to three terms, and assuming quadratic limb-darkening law. We consider three major approaches of determining the Doppler shift: cross-correlation with a predefined template, cross-correlation with an out-of-transit stellar spectrum, and parametric modelling of the spectrum. We reveal that the Doppler anomaly has an additional first-order (in $V\\sin i$) correction term, while previous works primarily deal with only a second-order correction. Thi...
Hong Luo; Luquing Luo; Robert Nourgaliev; Vincent Mousseau
2009-06-01T23:59:59.000Z
A reconstruction-based discontinuous Galerkin (DG) method is presented for the solution of the compressible Euler equations on arbitrary grids. By taking advantage of handily available and yet invaluable information, namely the derivatives, in the context of the discontinuous Galerkin methods, a solution polynomial of one degree higher is reconstructed using a least-squares method. The stencils used in the reconstruction involve only the van Neumann neighborhood (face-neighboring cells) and are compact and consistent with the underlying DG method. The resulting DG method can be regarded as an improvement of a recovery-based DG method in the sense that it shares the same nice features as the recovery-based DG method, such as high accuracy and efficiency, and yet overcomes some of its shortcomings such as a lack of flexibility, compactness, and robustness. The developed DG method is used to compute a variety of flow problems on arbitrary meshes to demonstrate the accuracy and efficiency of the method. The numerical results indicate that this reconstructed DG method is able to obtain a third-order accurate solution at a slightly higher cost than its second-order DG method and provide an increase in performance over the third order DG method in terms of computing time and storage requirement.
Presented by Campus Services Object Code Classifications
Stephens, Graeme L.
) Decrease expense from the wrong object code (From) Example: Expensed a service contract that covered 12
Section Code(s): 4000 4200 PPO - HuskyCare HDHP Benefits-at-a-Glance Michigan Technological University In% after deductible Maternity Services Provided by a Physician Prenatal and Postnatal Care Visits CoveredMichigan Technological University_010114 R 10/25/13 Group Number: 71571 Package Code(s): 040 045
The environment and ASME performance test codes
Bannister, R.L. [Westinghouse Electric Corp., Orlando, FL (United States); Macak, J.J. III [Mostardi-Platt Associates, Inc., Elmhurst, IL (United States); Newby, R.A. [Westinghouse Science and Technology Center, Pittsburgh, PA (United States)
1995-12-31T23:59:59.000Z
Today, federal, state and local governmental agencies have enacted comprehensive legislation on power generation emission limits which affects all aspects of the energy sector. This paper reviews the indirect impact of Performance Test Codes on environmental testing, reviewing past, current, and future practices. Existing codes and three new codes currently under development will be cited along with possible future code development.
SECTION GS1020 CONSTRUCTION CODE REQUIREMENTS
Zhang, Yuanlin
101, Life Safety Code; 5. National Fire Protection Association Codes and Standards; 6. ANSI/ASME A17SECTION GS1020 Â CONSTRUCTION CODE REQUIREMENTS PART 1 - GENERAL 1.1 RELATED DOCUMENTS A. Drawings includes the following: 1. Construction code requirements for all construction at Texas Tech University. 1
A simple family of nonadditive quantum codes
John A. Smolin; Graeme Smith; Stephanie Wehner
2007-03-20T23:59:59.000Z
Most known quantum codes are additive, meaning the codespace can be described as the simultaneous eigenspace of an abelian subgroup of the Pauli group. While in some scenarios such codes are strictly suboptimal, very little is understood about how to construct nonadditive codes with good performance. Here we present a family of nonadditive quantum codes for all odd blocklengths, n, that has a particularly simple form. Our codes correct single qubit erasures while encoding a higher dimensional space than is possible with an additive code or, for n of 11 or greater, any previous codes.
ASME Code Efforts Supporting HTGRs
D.K. Morton
2011-09-01T23:59:59.000Z
In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.
Parallization of Stellar Atmosphere Codes
P. Hoeflich
2002-09-19T23:59:59.000Z
Parallel computing has turned out to be the enabling technology to solve complex physical systems. However, the transition from shared memory, vector computers to massively parallel, distributed memory systems and, recently, to hybrid systems poses new challenges to the scientist. We want to present a cook-book (with a very strong, personal bias) based on our experience with parallization of our existing codes. Some of the general tools and communication libraries are discussed. Our approach includes a mixture of algorithm, domain and physical module based parallization. The advantages, scalability and limitations of each are discussed at some examples. We want show that it becomes easier to write parallel code with increasing complexity of the physical problem making stellar atmosphere codes beyond the classical assumptions very suitable.
ASME Code Efforts Supporting HTGRs
D.K. Morton
2010-09-01T23:59:59.000Z
In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.
ASME Code Efforts Supporting HTGRs
D.K. Morton
2012-09-01T23:59:59.000Z
In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.
Light-water reactor safety analysis codes
Jackson, J.F.; Ransom, V.H.; Ybarrondo, L.J.; Liles, D.R.
1980-01-01T23:59:59.000Z
A brief review of the evolution of light-water reactor safety analysis codes is presented. Included is a summary comparison of the technical capabilities of major system codes. Three recent codes are described in more detail to serve as examples of currently used techniques. Example comparisons between calculated results using these codes and experimental data are given. Finally, a brief evaluation of current code capability and future development trends is presented.
Energy Codes and the Landlord-Tenant Problem
Papineau, Maya
2013-01-01T23:59:59.000Z
of the International Energy Conservation Code 2000 edition (in The International Energy Conservation Code (IECC) is
V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary
Broader source: Energy.gov (indexed) [DOE]
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCode | Department of
Turbo Codes are Low Density Parity Check Codes David J. C. MacKay
MacKay, David J.C.
Turbo Codes are Low Density Parity Check Codes David J. C. MacKay July 8, 1998--- Draft 0.2, not for distribution! (First draft written July 5, 1998) Abstract Turbo codes and Gallager codes (also known as low note that the parity check matrix of a Turbo code can be written as low density parity check matrix
IEEE VEHICULAR TECHNOLOGY CONFERENCE SPRING, 2003 1 Space-Time Block Coding applied to Turbo Coded
Paris-Sud XI, UniversitÃ© de
IEEE VEHICULAR TECHNOLOGY CONFERENCE SPRING, 2003 1 Space-Time Block Coding applied to Turbo Coded and a Turbo Code (TC) as channel code. MC-CDMA is likely to be one of the most promising access technique. Then, since Turbo Coded MC-CDMA was demonstrated to be very efficient for a Single Input Single Output
Validation issues for SSI codes
Philippacopoulos, A.J.
1995-02-01T23:59:59.000Z
The paper describes the results of a recent work which was performed to verify computer code predictions in the SSI area. The first part of the paper is concerned with analytic solutions of the system response. The mathematical derivations are reasonably reduced by the use of relatively simple models which capture fundamental ingredients of the physics of the system motion while allowing for the response to be obtained analytically. Having established explicit forms of the system response, numerical solutions from three computer codes are presented in comparative format.
Texas Energy Code Compliance Collaborative
Herbert, C.
2013-01-01T23:59:59.000Z
document these practices? What is the role of alternative code compliance programs like EnergyStar? What is the role of third party inspectors? 15 ESL-KT-13-12-29 CATEE 2013: Clean Air Through Energy Efficiency Conference, San Antonio, Texas Dec... Conference, San Antonio, Texas Dec. 16-18 7 Source: ACEEE Building Energy Codes Program 2010 ESL-KT-13-12-29 CATEE 2013: Clean Air Through Energy Efficiency Conference, San Antonio, Texas Dec. 16-18 Residential (Single Family Residences And Duplexes...
Scott Hottovy; Austin McDaniel; Giovanni Volpe; Jan Wehr
2014-10-24T23:59:59.000Z
We study a class of systems of stochastic differential equations describing diffusive phenomena. The Smoluchowski-Kramers approximation is used to describe their dynamics in the small mass limit. Our systems have arbitrary state-dependent friction and noise coefficients. We identify the limiting equation and, in particular, the additional drift term that appears in the limit is expressed in terms of the solution to a Lyapunov matrix equation. The proof uses a theory of convergence of stochastic integrals developed by Kurtz and Protter. The result is sufficiently general to include systems driven by both white and Ornstein-Uhlenbeck colored noises. We discuss applications of the main theorem to several physical phenomena, including the experimental study of Brownian motion in a diffusion gradient.
On the potential energy in a gravitationally bound two-body system with arbitrary mass distribution
K. Wilhelm; B. N. Dwivedi
2015-02-12T23:59:59.000Z
The potential energy problem in a gravitationally bound two-body system has recently been studied in the framework of a proposed impact model of gravitation (Wilhelm and Dwivedi 2015). The result was applied to the free fall of the so-called Mintrop--Ball in G\\"ottingen with the implicit assumption that the mass distribution of the system is extremely unbalanced. An attempt to generalize the study to arbitrary mass distributions indicated a conflict with the energy conservation law in a closed system. This necessitated us to reconsider an earlier assumption made in selecting a specific process out of two options (Wilhelm et al. 2013). With the result obtained here we can now make an educated selection and reverse our choice. The consequences are presented and discussed in detail for several processes. Energy and momentum conservation could now be demonstrated in all cases.
Generalized Solovev equilibrium with sheared flow of arbitrary direction and stability consideration
Kaltsas, D. A., E-mail: dkaltsas@cc.uoi.gr, E-mail: gthroum@cc.uoi.gr; Throumoulopoulos, G. N., E-mail: dkaltsas@cc.uoi.gr, E-mail: gthroum@cc.uoi.gr [Department of Physics, University of Ioannina, GR 451 10 Ioannina (Greece)
2014-08-15T23:59:59.000Z
A Solovev-like solution describing equilibria with field aligned incompressible flows [G. N. Throumoulopoulos and H. Tasso, Phys. Plasmas 19, 014504 (2012)] is extended to non parallel flows. The solution expressed as a superposition of Bessel functions contains an arbitrary number of free parameters which are exploited to construct a variety of configurations including ITER shaped ones. For parallel flows, application of a sufficient condition for linear stability shows that this condition is satisfied in an appreciable part of the plasma region on the high-field side mostly due to the variation of the magnetic field perpendicular to the magnetic surfaces. Also, the results indicate that depending on the shape of the Mach-function profile and the values of the free parameters the flow and flow shear may have either stabilizing or destabilizing effects.
Nonlinear oscillations and waves in an arbitrary mass ratio cold plasma
Verma, Prabal Singh [Institute for Plasma Research, Bhat, Gandhinagar 382 428 (India)
2011-12-15T23:59:59.000Z
It is well known that nonlinear standing oscillations in an arbitrary mass ratio cold plasma always phase mix away. However, there exist nonlinear electron-ion traveling wave solutions, which do not exhibit phase mixing because they have zero ponderomotive force. The existence of these waves has been demonstrated using a perturbation method. Moreover, it is shown that cold plasma BGK waves [Albritton et al., Nucl. Fusion 15, 1199 (1975)] phase mix away if ions are allowed to move and the scaling of phase mixing is found to be different from earlier work [Sengupta et al., Phys. Rev. Lett. 82, 1867 (1999)]. Phase mixing of these waves has been further verified in 1-D particle in cell simulation.
Light-cone gauge approach to arbitrary spin fields, currents, and shadows
R. R. Metsaev
2014-09-01T23:59:59.000Z
Totally symmetric arbitrary spin fields in AdS space, conformal fields, conformal currents, and shadow fields in flat space are studied. Light-cone formulation for such fields, currents, and shadows is obtained. Use of the Poincare parametrization of AdS space allows us to treat fields in flat and AdS spaces on equal footing. Light-cone gauge realization of relativistic symmetries for fields, currents, and shadows is also obtained. The light-cone formulation for fields is obtained by using the gauge invariant Lagrangian which is presented in terms of the modified de Donder divergence, while the light-cone formulation for currents and shadows is obtained by using gauge invariant approach to currents and shadows. This allows us to demonstrate explicitly how ladder operators entering the gauge invariant formulation of fields, currents, and shadows manifest themselves in the light-cone formulation for fields, currents, and shadows.
On Thermodynamics of AdS Black Holes in Arbitrary Dimensions
A. Belhaj; M. Chabab; H. El Moumni; M. B. Sedra
2012-09-23T23:59:59.000Z
Considering the cosmological constant $\\Lambda$ as a thermodynamic pressure and its conjugate quantity as a thermodynamic volume as proposed in Kubiznak and Mann (2012), we discuss the critical behavior of charged AdS black hole in arbitrary dimensions $d$. In particular, we present a comparative study in terms of the spacetime dimension $d$ and the displacement of critical points controlling the transition between the small and the large black holes. Such behaviors vary nicely in terms of $d$. Among our result in this context consists in showing that the equation of state for a charged RN-AdS black hole predicts an universal number given by $\\frac{2d-5}{4d-8}$. The three dimensional solution is also discussed.
Z. L. Li; D. Lu; B. F. Shen; L. B. Fu; J. Liu; B. S. Xie
2014-10-23T23:59:59.000Z
The mass shift effects in multiphoton pair production of a nonperturbative nature for arbitrary polarized electric fields are investigated numerically by employing the real-time Dirac-Heisenberg-Wigner formalism, and theoretically by proposing an effective energy concept. It is found that the theoretical results are agreement with the numerical ones very well. It is the first time to consider the roles of the momenta of created particles and the polarizations of external fields played in the mass shift effects. These results can deepen the understanding of pair production in the nonperturbative threshold regime. Moreover, the distinct mass shift effects are observable in the forthcoming experiments and can be used as a probe to distinguish the electron-positron pair production from other background events.
Sean P. Robinson
2006-09-17T23:59:59.000Z
We calculate, in d spacetime dimensions, the relationship between the coefficient 1/K^2 of the Einstein-Hilbert term in the action of general relativity and the coefficient G_N of the force law that results from the Newtonian limit of general relativity. The result is K^2=2[(d-2)/(d-3)]Vol(S^[d-2])G_N, where Vol(S^n) is the volume of the unit n-sphere. While the d=4 case is an elementary calculation in any general relativity text, the arbitrary case presented here is slightly less well known. We discuss the relevance of this result for the definition of the so-called "reduced Planck mass" and comment very briefly on the implications for brane world models. [abstract abridged
Ab-initio multimode linewidth theory for arbitrary inhomogeneous laser cavities
Pick, A; Liu, D; Rodriguez, A W; Stone, A D; Chong, Y D; Johnson, S G
2015-01-01T23:59:59.000Z
We present a multimode laser-linewidth theory for arbitrary cavity structures and geometries that contains nearly all previously known effects and also finds new nonlinear and multimode corrections, e.g. a bad-cavity correction to the Henry $\\alpha$ factor and a multimode Schawlow--Townes relation (each linewidth is proportional to a sum of inverse powers of all lasing modes). Our theory produces a quantitatively accurate formula for the linewidth, with no free parameters, including the full spatial degrees of freedom of the system. Starting with the Maxwell--Bloch equations, we handle quantum and thermal noise by introducing random currents whose correlations are given by the fluctuation--dissipation theorem. We derive coupled-mode equations for the lasing-mode amplitudes and obtain a formula for the linewidths in terms of simple integrals over the steady-state lasing modes.
Epstein, Ariel
2014-01-01T23:59:59.000Z
We present a semi-analytical formulation of the interaction between a given source field and a scalar Huygens metasurface (HMS), a recently introduced promising concept for wavefront manipulation based on a sheet of orthogonal electric and magnetic dipoles. Utilizing the equivalent surface impedance representation of these metasurfaces, we establish that an arbitrary source field can be converted into directive radiation via a passive lossless HMS if two physical conditions are met: local power conservation and local impedance equalization. Expressing the fields via their plane-wave spectrum and harnessing the slowly-varying envelope approximation we obtain semi-analytical formulae for the scattered fields, and prescribe the surface reactance required for the metasurface implementation. The resultant design procedure indicates that the local impedance equalization induces a Fresnel-like reflection, while local power conservation forms a radiating virtual aperture which follows the total excitation field magni...
How the diffusivity profile reduces the arbitrariness of protein folding free energies
Hinczewski, Michael; Dzubiella, Joachim; Netz, Roland R
2010-01-01T23:59:59.000Z
The concept of a protein diffusing in its free energy folding landscape has been fruitful for both theory and experiment. Yet the choice of the reaction coordinate (RC) introduces an undesirable degree of arbitrariness into the problem. We analyze extensive simulation data of an alpha-helix in explicit water solvent as it stochastically folds and unfolds. The free energy profiles for different RCs exhibit significant variation, some having an activation barrier, others not. We show that this variation has little effect on the predicted folding kinetics if the diffusivity profiles are properly taken into account. This kinetic quasi-universality is rationalized by an RC rescaling, which, due to the reparameterization invariance of the Fokker-Planck equation, allows the combination of free energy and diffusivity effects into a single function, the rescaled free energy profile. This rescaled free energy indeed shows less variation among different RCs than the bare free energy and diffusivity profiles separately d...
A unified physical boundary condition for massless fields of arbitrary spin
Adam Stokes; Robert Bennett
2014-11-04T23:59:59.000Z
Boundary conditions for the Maxwell and Dirac fields at material surfaces are widely-used and physically well-motivated, but do not appear to have been generalised to deal with higher spin fields. A consequence of this is that calculations of, for example, Casimir forces associated with higher spin fields always select some arbitrary mathematical boundary conditions, rather than those which are physically motivated. Here, we use the two-spinor calculus formalism to present a unified treatment of the boundary conditions routinely employed in the treatment of spin-1/2 and spin-1 fields. We then use this unification to obtain a completely new boundary condition that can be applied to massless fields of any spin, including the spin-2 graviton, and its supersymmetric partner the spin-3/2 gravitino. We demonstrate one important consequence of our generalisation, which is that periodic boundary conditions cannot be applied to any physically-confined fermionic field.
Two-particle multichannel systems in a finite volume with arbitrary spin
Briceno, Raul A. [JLAB
2014-04-01T23:59:59.000Z
The quantization condition for two-particle systems with arbitrary number of two-body open coupled channels, spin and masses in a finite cubic volume with either periodic or twisted boundary conditions is presented. The condition presented is in agreement with all previous studies of two-body systems in a finite volume. The result is relativistic, holds for all momenta below the three- and four-particle thresholds, and is exact up to exponential volume corrections that are governed by L/r, where L is the spatial extent of the volume and r is the range of the interactions between the particles. For hadronic systems the range of the interaction is set by the inverse of the pion mass, m_{?}, and as a result the formalism presented is suitable for m_{?}L>>1. Implications of the formalism for the studies of multichannel baryon-baryon systems are discussed.
Two-particle multichannel systems in a finite volume with arbitrary spin
DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)
Briceno, Raul A. [JLAB
2014-04-01T23:59:59.000Z
The quantization condition for two-particle systems with arbitrary number of two-body open coupled channels, spin and masses in a finite cubic volume with either periodic or twisted boundary conditions is presented. The condition presented is in agreement with all previous studies of two-body systems in a finite volume. The result is relativistic, holds for all momenta below the three- and four-particle thresholds, and is exact up to exponential volume corrections that are governed by L/r, where L is the spatial extent of the volume and r is the range of the interactions between the particles. For hadronic systems the range of the interaction is set by the inverse of the pion mass, m?, and as a result the formalism presented is suitable for m?L>>1. Implications of the formalism for the studies of multichannel baryon-baryon systems are discussed.
Morrow, Thomas B. (San Antonio, TX); Behring, II, Kendricks A. (Gilbert, AZ)
2005-02-01T23:59:59.000Z
A computer product for determining thermodynamic properties of a natural gas hydrocarbon, when the speed of sound in the gas is known at an arbitrary temperature and pressure. Thus, the known parameters are the sound speed, temperature, pressure, and concentrations of any dilute components of the gas. The method uses a set of reference gases and their calculated density and speed of sound values to estimate the density of the subject gas. Additional calculations can be made to estimate the molecular weight of the subject gas, which can then be used as the basis for mass flow calculations, to determine the speed of sound at standard pressure and temperature, and to determine various thermophysical characteristics of the gas.
On the potential energy in a gravitationally bound two-body system with arbitrary mass distribution
Wilhelm, K
2015-01-01T23:59:59.000Z
The potential energy problem in a gravitationally bound two-body system has recently been studied in the framework of a proposed impact model of gravitation (Wilhelm and Dwivedi 2015). The result was applied to the free fall of the so-called Mintrop--Ball in G\\"ottingen with the implicit assumption that the mass distribution of the system is extremely unbalanced. An attempt to generalize the study to arbitrary mass distributions indicated a conflict with the energy conservation law in a closed system. This necessitated us to reconsider an earlier assumption made in selecting a specific process out of two options (Wilhelm et al. 2013). With the result obtained here we can now make an educated selection and reverse our choice. The consequences are presented and discussed in detail for several processes. Energy and momentum conservation could now be demonstrated in all cases.
An Arbitrary Lagrangian-Eulerian Discretization of MHD on 3D Unstructured Grids
Rieben, R N; White, D A; Wallin, B K; Solberg, J M
2006-06-12T23:59:59.000Z
We present an arbitrary Lagrangian-Eulerian (ALE) discretization of the equations of resistive magnetohydrodynamics (MHD) on unstructured hexahedral grids. The method is formulated using an operator-split approach with three distinct phases: electromagnetic diffusion, Lagrangian motion, and Eulerian advection. The resistive magnetic dynamo equation is discretized using a compatible mixed finite element method with a 2nd order accurate implicit time differencing scheme which preserves the divergence-free nature of the magnetic field. At each discrete time step, electromagnetic force and heat terms are calculated and coupled to the hydrodynamic equations to compute the Lagrangian motion of the conducting materials. By virtue of the compatible discretization method used, the invariants of Lagrangian MHD motion are preserved in a discrete sense. When the Lagrangian motion of the mesh causes significant distortion, that distortion is corrected with a relaxation of the mesh, followed by a 2nd order monotonic remap of the electromagnetic state variables. The remap is equivalent to Eulerian advection of the magnetic flux density with a fictitious mesh relaxation velocity. The magnetic advection is performed using a novel variant of constrained transport (CT) that is valid for unstructured hexahedral grids with arbitrary mesh velocities. The advection method maintains the divergence free nature of the magnetic field and is second order accurate in regions where the solution is sufficiently smooth. For regions in which the magnetic field is discontinuous (e.g. MHD shocks) the method is limited using a novel variant of algebraic flux correction (AFC) which is local extremum diminishing (LED) and divergence preserving. Finally, we verify each stage of the discretization via a set of numerical experiments.
Moshe Elitzur
1995-08-01T23:59:59.000Z
General solutions of the maser polarization problem are presented for arbitrary absorption coefficients. The results are used to calculate polarization for masers permeated by magnetic fields with arbitrary values of \\xB, the ratio of Zeeman splitting to Doppler linewidth, and for anisotropic pumping. The $\\xb \\to 0$ limit of the magnetic solution reproduces the linear polarization derived in previous studies, which were always conducted at this unphysical limit. While terms of higher order in \\xb\\ have a negligible effect on the magnitude of $q$, they produce some major new results. In particular, the linear polarization is accompanied by circular polarization, proportional to \\xb. Because \\xb\\ is proportional to the transition wavelength, the circular polarization of SiO masers should decrease with rotation quantum number, as observed. In the absence of theory for $\\xb < 1$, previous estimates of magnetic fields from detected maser circular polarization had to rely on conjectures in this case and generally need to be revised downward. The fields in SiO masers are \\about\\ 2--10 G and were overestimated by a factor of 8. The OH maser regions around supergiants have fields of \\about\\ 0.1--0.5 mG, which were overestimated by factors of 10--100. The fields were properly estimated for OH/IR masers ($\\la$ 0.1 mG) and \\H2O masers in star-forming regions (\\about\\ 15--50 mG). Spurious solutions that required stability analysis for their removal in all previous studies are never reproduced here; in particular, there are no stationary physical solutions for propagation at $\\sin^2\\theta < \\third$, where $\\theta$ is the angle from the direction of the magnetic field, so such radiation is unpolarized. These spurious solutions can be identified as the \\xb\\ = 0 limits of non-physical solutions and they never arise at finite
Gouranga C. Nayak
2011-05-23T23:59:59.000Z
We study the Schwinger mechanism in QCD in the presence of an arbitrary time-dependent chromo-electric background field $E^a(t)$ with arbitrary color index $a$=1,2,...8 in SU(3). We obtain an exact result for the non-perturbative quark (antiquark) production from an arbitrary $E^a(t)$ by directly evaluating the path integral. We find that the exact result is independent of all the time derivatives $\\frac{d^nE^a(t)}{dt^n}$ where $n=1,2,...\\infty$. This result has the same functional dependence on two Casimir invariants $[E^a(t)E^a(t)]$ and $[d_{abc}E^a(t)E^b(t)E^c(t)]^2$ as the constant chromo-electric field $E^a$ result with the replacement: $E^a \\rightarrow E^a(t)$. This result relies crucially on the validity of the shift conjecture, which has not yet been established.
Degenerate Quantum Codes for Pauli Channels
Graeme Smith; John A. Smolin
2006-12-23T23:59:59.000Z
A striking feature of quantum error correcting codes is that they can sometimes be used to correct more errors than they can uniquely identify. Such degenerate codes have long been known, but have remained poorly understood. We provide a heuristic for designing degenerate quantum codes for high noise rates, which is applied to generate codes that can be used to communicate over almost any Pauli channel at rates that are impossible for a nondegenerate code. The gap between nondegenerate and degenerate code performance is quite large, in contrast to the tiny magnitude of the only previous demonstration of this effect. We also identify a channel for which none of our codes outperform the best nondegenerate code and show that it is nevertheless quite unlike any channel for which nondegenerate codes are known to be optimal.
Ptolemy Coding Style Christopher Brooks
Ptolemy Coding Style Christopher Brooks Edward A. Lee Electrical Engineering and Computer Sciences was supported in part by the iCyPhy Research Center (Industrial Cyber-Physical Systems, supported by IBM (Industrial Cyber-Physical Systems, supported by IBM and United Technologies), and the Center for Hybrid
Free Energy Code Online Discussion
Free Energy Code Online Discussion for Building Department Personnel Join us for this FREE 90 Bruce Cheney from Anchors Aweigh Energy, LLC want to hear from YOU on residential HVAC changeout issues of the California Energy Commission. Date: 3 dates currently offered, choose the one that works for you
WESTERN MICHIGAN UNIVERSITY STUDENT CODE
de Doncker, Elise
WESTERN MICHIGAN UNIVERSITY STUDENT CODE Approved by The Western Michigan University Board Michigan University Kalamazoo, MI 49008 Effective August 2008 #12;A UNIVERSITY COMMUNITY IS... ...a for the Advancement of Teaching; Ernest L. Boyer (frwd.); Princeton, New Jersey; 1990 #12;WESTERN MICHIGAN UNIVERSITY
Two-Layer Error Control Codes Combining Rectangular and Hamming Product Codes for Cache Error
Zhang, Meilin
We propose a novel two-layer error control code, combining error detection capability of rectangular codes and error correction capability of Hamming product codes in an efficient way, in order to increase cache error ...
Code Booster Award-winning research on code optimization explores multicore computing
Knowles, David William
May 2008 Code Booster Award-winning research on code optimization explores multicore computing paper exploring ways to make a popular scientific analysis code run smoothly on different types of multicore computers. SamuelWilliams,aresearcherfromBerkeleyLab'sComputational
SEE ADDENDUM IS CHECKED CODE 18a. PAYMENT WILL BE MADE BY CODE
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
SEE ADDENDUM IS CHECKED CODE 18a. PAYMENT WILL BE MADE BY CODE FACILITY CODE 17b. CHECK IF REMITTANCE IS DIFFERENT AND PUT SUCH ADDRESS IN OFFER OFFEROR 00146 Casper WY 82601 Shale...
Fred Cooper; Gouranga C. Nayak
2006-02-21T23:59:59.000Z
We study the non-perturbative production of gluon pairs from a constant SU(3) chromo-electric background field via the Schwinger mechanism. We fix the covariant background gauge with an arbitrary gauge parameter \\alpha. We determine the transverse momentum distribution of the gluons, as well as the total probability of creating pairs per unit space time volume. We find that the result is independent of the covariant gauge parameter \\alpha used to define arbitrary covariant background gauges. We find that our non-perturbative result is both gauge invariant and gauge parameter \\alpha independent.
Bounds on Effective Hamiltonians for Stabilizer Codes
Stephen S. Bullock; Dianne P. O'Leary
2008-02-05T23:59:59.000Z
This manuscript introduces various notions of k-locality of stabilizer codes inherited from the associated stabilizer groups. A choice of generators for the group leads to a Hamiltonian with the code in its groundspace, while a Hamiltonian holding the code in its groundspace might be called effective if its locality is less than that of a natural choice of generators (or any choice). This paper establishes some conditions under which effective Hamiltonians for stabilizer codes do not exist. Our results simplify in the cases of Calderbank-Shor-Steane stabilizer codes and topologically-ordered stabilizer codes arising from surface cellulations.
Quantum Stabilizer Codes Embedding Qubits Into Qudits
Carlo Cafaro; Federico Maiolini; Stefano Mancini
2012-07-30T23:59:59.000Z
We study, by means of the stabilizer formalism, a quantum error correcting code which is alternative to the standard block codes since it embeds a qubit into a qudit. The code exploits the non-commutative geometry of discrete phase space to protect the qubit against both amplitude and phase errors. The performance of such code is evaluated on Weyl channels by means of the entanglement fidelity as function of the error probability. A comparison with standard block codes, like five and seven qubit stabilizer codes, shows its superiority.
Trellis coded vector quantization for the intraframe coding of images
Chauvin, Todd Henry
1989-01-01T23:59:59.000Z
quantization in both conligurations. The design algo- rithm is also developed for the case of a, constrainl, on the entropy of the channel indices. Performance is evaluated by computer simulation for a variety of encoding rates, number of trellis states.... Rate Expansion . 2. Set Partitioning 3. Viterbi Encoding . C. Codebook Design 15 15 17 17 23 28 29 IV PREDICTIVE TRELLIS CODED VECTOR QUANTIZATION. . . 30 A. Implementation Structure . B. Design of Predictive TCVQ Coders 1. Vector...
An implicit Smooth Particle Hydrodynamic code
Charles E. Knapp
2000-04-01T23:59:59.000Z
An implicit version of the Smooth Particle Hydrodynamic (SPH) code SPHINX has been written and is working. In conjunction with the SPHINX code the new implicit code models fluids and solids under a wide range of conditions. SPH codes are Lagrangian, meshless and use particles to model the fluids and solids. The implicit code makes use of the Krylov iterative techniques for solving large linear-systems and a Newton-Raphson method for non-linear corrections. It uses numerical derivatives to construct the Jacobian matrix. It uses sparse techniques to save on memory storage and to reduce the amount of computation. It is believed that this is the first implicit SPH code to use Newton-Krylov techniques, and is also the first implicit SPH code to model solids. A description of SPH and the techniques used in the implicit code are presented. Then, the results of a number of tests cases are discussed, which include a shock tube problem, a Rayleigh-Taylor problem, a breaking dam problem, and a single jet of gas problem. The results are shown to be in very good agreement with analytic solutions, experimental results, and the explicit SPHINX code. In the case of the single jet of gas case it has been demonstrated that the implicit code can do a problem in much shorter time than the explicit code. The problem was, however, very unphysical, but it does demonstrate the potential of the implicit code. It is a first step toward a useful implicit SPH code.
Quantifying the Performance of Quantum Codes
C. Cafaro; S. L'Innocente; C. Lupo; S. Mancini
2011-01-12T23:59:59.000Z
We study the properties of error correcting codes for noise models in the presence of asymmetries and/or correlations by means of the entanglement fidelity and the code entropy. First, we consider a dephasing Markovian memory channel and characterize the performance of both a repetition code and an error avoiding code in terms of the entanglement fidelity. We also consider the concatenation of such codes and show that it is especially advantageous in the regime of partial correlations. Finally, we characterize the effectiveness of the codes and their concatenation by means of the code entropy and find, in particular, that the effort required for recovering such codes decreases when the error probability decreases and the memory parameter increases. Second, we consider both symmetric and asymmetric depolarizing noisy quantum memory channels and perform quantum error correction via the five qubit stabilizer code. We characterize this code by means of the entanglement fidelity and the code entropy as function of the asymmetric error probabilities and the degree of memory. Specifically, we uncover that while the asymmetry in the depolarizing errors does not affect the entanglement fidelity of the five qubit code, it becomes a relevant feature when the code entropy is used as a performance quantifier.
California at Irvine, University of
an automatic end-to-end tool, Kudzu, and apply it to the problem of finding client-side code injection vulnerabilities. In experiments on 18 live web applications, Kudzu automatically discovers 2 previously unknown
Design of additive quantum codes via the code-word-stabilized framework
Kovalev, Alexey A.; Pryadko, Leonid P. [Department of Physics and Astronomy, University of California, Riverside, California 92521 (United States); Dumer, Ilya [Department of Electrical Engineering, University of California, Riverside, California 92521 (United States)
2011-12-15T23:59:59.000Z
We consider design of the quantum stabilizer codes via a two-step, low-complexity approach based on the framework of codeword-stabilized (CWS) codes. In this framework, each quantum CWS code can be specified by a graph and a binary code. For codes that can be obtained from a given graph, we give several upper bounds on the distance of a generic (additive or nonadditive) CWS code, and the lower Gilbert-Varshamov bound for the existence of additive CWS codes. We also consider additive cyclic CWS codes and show that these codes correspond to a previously unexplored class of single-generator cyclic stabilizer codes. We present several families of simple stabilizer codes with relatively good parameters.
Final Report A Multi-Language Environment For Programmable Code Optimization and Empirical Tuning
Yi, Qing [University of Colorado at Colorado Springs; Whaley, Richard Clint [Louisiana State University; Qasem, Apan [Texas State University; Quinlan, Daniel [Lawrence Livermore National Laboratory
2013-11-23T23:59:59.000Z
This report summarizes our effort and results of building an integrated optimization environment to effectively combine the programmable control and the empirical tuning of source-to-source compiler optimizations within the framework of multiple existing languages, specifically C, C++, and Fortran. The environment contains two main components: the ROSE analysis engine, which is based on the ROSE C/C++/Fortran2003 source-to-source compiler developed by Co-PI Dr.Quinlan et. al at DOE/LLNL, and the POET transformation engine, which is based on an interpreted program transformation language developed by Dr. Yi at University of Texas at San Antonio (UTSA). The ROSE analysis engine performs advanced compiler analysis, identifies profitable code transformations, and then produces output in POET, a language designed to provide programmable control of compiler optimizations to application developers and to support the parameterization of architecture-sensitive optimizations so that their configurations can be empirically tuned later. This POET output can then be ported to different machines together with the user application, where a POET-based search engine empirically reconfigures the parameterized optimizations until satisfactory performance is found. Computational specialists can write POET scripts to directly control the optimization of their code. Application developers can interact with ROSE to obtain optimization feedback as well as provide domain-specific knowledge and high-level optimization strategies. The optimization environment is expected to support different levels of automation and programmer intervention, from fully-automated tuning to semi-automated development and to manual programmable control.
Arkansas Air Pollution Control Code (Arkansas)
Broader source: Energy.gov [DOE]
The Arkansas Air Pollution Control code is adopted pursuant to Subchapter 2 of the Arkansas Water and Air Pollution Control Act (Arkansas Code Annotated 8-4-101). ) By authority of the same State...
Quantum error-correcting codes and devices
Gottesman, Daniel (Los Alamos, NM)
2000-10-03T23:59:59.000Z
A method of forming quantum error-correcting codes by first forming a stabilizer for a Hilbert space. A quantum information processing device can be formed to implement such quantum codes.
The College Station Residential Energy Compliance Code
Claridge, D. E.; Schrock, D.
1988-01-01T23:59:59.000Z
The City of College Station, Texas adopted a new residential Energy Compliance Code in January, 1988. The code, which strengthens compliance requirements in several areas, has received broadly based support and acceptance from all major constituent...
Transforms for prediction residuals in video coding
Kam??l?, Fatih
2010-01-01T23:59:59.000Z
Typically the same transform, the 2-D Discrete Cosine Transform (DCT), is used to compress both image intensities in image coding and prediction residuals in video coding. Major prediction residuals include the motion ...
Microsoft Word - Foreign Obligation Codes.docx
National Nuclear Security Administration (NNSA)
March 2014 Transaction Code Material Balance Code Obligation 1 31 85 Australia 32 86 Canada 33 87 EURATOM 34 88 Japan 35 89 Peoples' Republic of China 36 C1 Russia 37 A8...
Evolutionary approaches toward practical network coding
Kim, Minkyu, 1976-
2008-01-01T23:59:59.000Z
There have been numerous studies showing various benefits of network coding. However, in order to have network coding widely deployed in real networks, it is also important to show that the amount of overhead incurred by ...
N. Mariana Islands- Building Energy Code
Broader source: Energy.gov [DOE]
Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...
A Better Handoff for Code Officials
Conover, David R.; Yerkes, Sara
2010-09-24T23:59:59.000Z
The U.S. Department of Energy's Building Energy Codes Program has partnered with ICC to release the new Building Energy Codes Resource Guide: Code Officials Edition. We created this binder of practical materials for a simple reason: code officials are busy learning and enforcing several codes at once for the diverse buildings across their jurisdictions. This doesn’t leave much time to search www.energycodes.gov, www.iccsafe.org, or the range of other helpful web-based resources for the latest energy codes tools, support, and information. So, we decided to bring the most relevant materials to code officials in a way that works best with their daily routine, and point to where they can find even more. Like a coach’s game plan, the Resource Guide is an "energy playbook" for code officials.
Green Codes and Programs | Department of Energy
Broader source: Energy.gov (indexed) [DOE]
Green Codes and Programs Green Codes and Programs Blue version of the EERE PowerPoint template, for use with PowerPoint 2007. Transcript Presentation More Documents & Publications...
Hirayama, Hideo; Namito, Yoshihito; /KEK, Tsukuba; Bielajew, Alex F.; Wilderman, Scott J.; U., Michigan; Nelson, Walter R.; /SLAC
2005-12-20T23:59:59.000Z
In the nineteen years since EGS4 was released, it has been used in a wide variety of applications, particularly in medical physics, radiation measurement studies, and industrial development. Every new user and every new application bring new challenges for Monte Carlo code designers, and code refinements and bug fixes eventually result in a code that becomes difficult to maintain. Several of the code modifications represented significant advances in electron and photon transport physics, and required a more substantial invocation than code patching. Moreover, the arcane MORTRAN3[48] computer language of EGS4, was highest on the complaint list of the users of EGS4. The size of the EGS4 user base is difficult to measure, as there never existed a formal user registration process. However, some idea of the numbers may be gleaned from the number of EGS4 manuals that were produced and distributed at SLAC: almost three thousand. Consequently, the EGS5 project was undertaken. It was decided to employ the FORTRAN 77 compiler, yet include as much as possible, the structural beauty and power of MORTRAN3. This report consists of four chapters and several appendices. Chapter 1 is an introduction to EGS5 and to this report in general. We suggest that you read it. Chapter 2 is a major update of similar chapters in the old EGS4 report[126] (SLAC-265) and the old EGS3 report[61] (SLAC-210), in which all the details of the old physics (i.e., models which were carried over from EGS4) and the new physics are gathered together. The descriptions of the new physics are extensive, and not for the faint of heart. Detailed knowledge of the contents of Chapter 2 is not essential in order to use EGS, but sophisticated users should be aware of its contents. In particular, details of the restrictions on the range of applicability of EGS are dispersed throughout the chapter. First-time users of EGS should skip Chapter 2 and come back to it later if necessary. With the release of the EGS4 version, a deliberate attempt was made to present example problems in order to help the user ''get started'', and we follow that spirit in this report. A series of elementary tutorial user codes are presented in Chapter 3, with more sophisticated sample user codes described in Chapter 4. Novice EGS users will find it helpful to read through the initial sections of the EGS5 User Manual (provided in Appendix B of this report), proceeding then to work through the tutorials in Chapter 3. The User Manuals and other materials found in the appendices contain detailed flow charts, variable lists, and subprogram descriptions of EGS5 and PEGS. Included are step-by-step instructions for developing basic EGS5 user codes and for accessing all of the physics options available in EGS5 and PEGS. Once acquainted with the basic structure of EGS5, users should find the appendices the most frequently consulted sections of this report.
Smith, F.; Brown, K.; Flach, G.; Sarkar, S.
2011-09-30T23:59:59.000Z
The goal of the Cementitious Barriers Partnership (CBP) is to develop a reasonable and credible set of software tools to predict the structural, hydraulic, and chemical performance of cement barriers used in nuclear applications over extended time frames (greater than 100 years for operating facilities and greater than 1000 years for waste management). The simulation tools will be used to evaluate and predict the behavior of cementitious barriers used in near surface engineered waste disposal systems including waste forms, containment structures, entombments, and environmental remediation. These cementitious materials are exposed to dynamic environmental conditions that cause changes in material properties via (i) aging, (ii) chloride attack, (iii) sulfate attack, (iv) carbonation, (v) oxidation, and (vi) primary constituent leaching. A set of state-of-the-art software tools has been selected as a starting point to capture these important aging and degradation phenomena. Integration of existing software developed by the CBP partner organizations was determined to be the quickest method of meeting the CBP goal of providing a computational tool that improves the prediction of the long-term behavior of cementitious materials. These partner codes were selected based on their maturity and ability to address the problems outlined above. The GoldSim Monte Carlo simulation program (GTG 2010a, GTG 2010b) was chosen as the code integration platform (Brown & Flach 2009b). GoldSim (current Version 10.5) is a Windows based graphical object-oriented computer program that provides a flexible environment for model development (Brown & Flach 2009b). The linking of GoldSim to external codes has previously been successfully demonstrated (Eary 2007, Mattie et al. 2007). GoldSim is capable of performing deterministic and probabilistic simulations and of modeling radioactive decay and constituent transport. As part of the CBP project, a general Dynamic Link Library (DLL) interface was developed to link GoldSim with external codes (Smith III et al. 2010). The DLL uses a list of code inputs provided by GoldSim to create an input file for the external application, runs the external code, and returns a list of outputs (read from files created by the external application) back to GoldSim. In this way GoldSim provides: (1) a unified user interface to the applications, (2) the capability of coupling selected codes in a synergistic manner, and (3) the capability of performing probabilistic uncertainty analysis with the codes. GoldSim is made available by the GoldSim Technology Group as a free 'Player' version that allows running but not editing GoldSim models. The player version makes the software readily available to a wider community of users that would wish to use the CBP application but do not have a license for GoldSim.
A study of arbitrary rotations of shells of revolution by the finite element method
Rosenbaum, James Byron
1974-01-01T23:59:59.000Z
. Haisler, Jr. Various nonlinear shell theories are reviewed, discussed, and one is selected for implementation into the solution code SNASOR III. The theory selected, Novozhilov's, is discussed in greater detail, comparing his nonlinear equations... to the ones in SNASOR III. The changes required to employ Novozhilov's nonlinear theory in SNASOR III are illustrated. The finite element method is then briefly discussed, nonlinear solution techniques are reviewed and the mod- ified incremental stiffness...
Kong Qian [Laser Physics Center, Research School of Physics and Engineering, Australian National University, Canberra, Australian Capital Territory 0200 (Australia); Department of Physics, Shanghai University, Shanghai 200444 (China); Wang, Q. [Department of Physics, Shanghai University, Shanghai 200444 (China); Bang, O. [DTU Fotonik, Department of Photonics Engineering, Technical University of Denmark, DK-2800 Kgs. Lyngby (Denmark); Krolikowski, W. [Laser Physics Center, Research School of Physics and Engineering, Australian National University, Canberra, Australian Capital Territory 0200 (Australia)
2010-07-15T23:59:59.000Z
We investigate theoretically the interaction of dark solitons in materials with a spatially nonlocal nonlinearity. In particular we do this analytically and for arbitrary degree of nonlocality. We employ the variational technique to show that nonlocality induces an attractive force in the otherwise repulsive soliton interaction.
Matrix elements of one-body and two-body operators between arbitrary HFB multi-quasiparticle states
Qing-Li Hu; Zao-Chun Gao; Y. S. Chen
2014-08-14T23:59:59.000Z
We present new formulae for the matrix elements of one-body and two-body physical operators in compact forms, which are applicable to arbitrary Hartree-Fock-Bogoliubov wave functions, including those for multi-quasiparticle excitations. The test calculations show that our formulae may substantially accelerate the process of symmetry restoration when applied to the heavy nuclear system.
V. M. Villalba; R. Pino
2001-01-23T23:59:59.000Z
We compute, via a variational mixed-base method, the energy spectrum of a two dimensional relativistic atom in the presence of a constant magnetic field of arbitrary strength. The results are compared to those obtained in the non-relativistic and spinless case. We find that the relativistic spectrum does not present $s$ states.
Vinet, Jean-Yves [Dpt. ARTEMIS, Universite de Nice-Sophia Antipolis, C.N.R.S. and Observatoire de la Cote d'Azur, 06304 Nice (France)
2010-08-15T23:59:59.000Z
We study the thermal noise caused by mechanical or thermomechanical dissipation in mirrors of interferometric gravitational wave antennas. We give relative figures of merit for arbitrary Hermite-Gauss or Laguerre-Gauss optical beams regarding the Brownian and thermoelastic noises (substrate and coating) in the infinite mirror approximation.
Meyer, Tommie
Thomas Meyer Basic Infobase Change Abstract. Generalisations of theory change involving arbitrary these lines by Meyer et al. 15]. We take an infobase as a nite sequence of w s, with each element Kluwer Academic Publishers. Printed in the Netherlands. #12;216 T. Meyer In this paper we propose a form
Kolner, Brian H.
Flexible-Bandwidth and Format-Agile Networking Based on Optical Arbitrary Waveform Generation-based transmitter and its application in flexible spectrum networks. (b) Experimental arrangement for the generation processing. Fig. 1(a) illustrates the concept of flexible spectrum generation of an OAWG-based terahertz
Lacey, E
2011-01-01T23:59:59.000Z
? High performance HVAC ? On-site renewables 2012 IECC Energy Savings and Environmental Impact ?[The 2012 IECC] represents the largest, one-step efficiency increase in the history of the national model energy code.? ? U.S. Department.... Environmental Impact ? Alliance to Save Energy: ?If all states adopted the 2012 IECC in 2012 and achieved full compliance by 2013 ?? ? 3.5 quadrillion Btu annual energy savings by 2030. ? $40 billion annual energy cost savings by 2030. ? 200 million...
Ultra-narrow bandwidth voice coding
Holzrichter, John F. (Berkeley, CA); Ng, Lawrence C. (Danville, CA)
2007-01-09T23:59:59.000Z
A system of removing excess information from a human speech signal and coding the remaining signal information, transmitting the coded signal, and reconstructing the coded signal. The system uses one or more EM wave sensors and one or more acoustic microphones to determine at least one characteristic of the human speech signal.
Using closures for code generation Marc Feeley
Feeley, Marc
which offers the advantages of an interpreter with the speed of compiled code. Code generation relies - environment (i.e. the set of current variable bindings). This operation is called closure. We speakUsing closures for code generation Marc Feeley Guy Lapalme DÂ´epartement d'informatique et de
San Francisco Building Code Amendments to the
1 2010 San Francisco Building Code Amendments to the 2010 California Green Building Standards Code not pertain to energy) Operative date: January 1, 2011 #12;139 Chapter 13C GREEN BUILDING REQUIREMENTS shall be known as the California San Francisco Green Building Standards Code and may be cited
CARD No. 23 Models and Computer Codes
CARD No. 23 Models and Computer Codes 23.A BACKGROUND Section 194.23 addresses the compliance criteria requirements for conceptual models and computer codes. Conceptual models capture a general (PA). The design of computer codes begins with the development of conceptual models. Conceptual models
Cost Codes and the Work Breakdown Structure
Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]
1997-03-28T23:59:59.000Z
The chapter discusses the purpose of the work breakdown structure (WBS) and code of account (COA) cost code system, shows the purpose and fundamental structure of both the WBS and the cost code system, and explains the interface between the two systems.
NUMBER: 1530 TITLE: Code of Student Conduct
. For the purposes of this Code, the term "University Official" is inclusive of "Faculty Member" as defined in IV 1530 1 NUMBER: 1530 TITLE: Code of Student Conduct APPROVED: August 27, 1970; Revised June 14, 2012 I. BASIS AND RATIONALE FOR A CODE OF STUDENT CONDUCT Old Dominion University
Network Coding for Large Scale Content Distribution
Keinan, Alon
Network Coding for Large Scale Content Distribution IEEE Infocom 2005 Christos Gkantsidis College propose a new scheme for content distribution of large files that is based on network coding. With network coding, each node of the distribution network is able to generate and transmit encoded blocks
Update and inclusion of resuspension model codes
Porch, W.M.; Greenly, G.D.; Mitchell, C.S.
1983-12-01T23:59:59.000Z
Model codes for estimating radiation doses from plutonium particles associated with resuspended dust were improved. Only one new code (RSUS) is required in addition to the MATHEW/ADPIC set of codes. The advantage is that it estimates resuspension based on wind blown dust fluxes derived for different soil types. 2 references. (ACR)
A Turbo Code Tutorial William E. Ryan
Shea, John M.
A Turbo Code Tutorial William E. Ryan New Mexico State University Box 30001 Dept. 3-O, Las Cruces, NM 88003 wryan@nmsu.edu Abstract| We give a tutorial exposition of turbo codes and the associated algorithms. Included are a simple derivation for the performance of turbo codes, and a straightforward
The Cost of Enforcing Building Energy Codes: Phase 1
Williams, Alison
2013-01-01T23:59:59.000Z
S. (2011). Utilities and Building Energy Codes: Air QualityUtility Programs and Building Energy Codes: How utilityUtility Programs and Building Energy Codes: How utility
aeroelastic code hawc: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
placing the stability boundary. Safety and sustainability Gao, Grace Xingxin 50 Spinal codes MIT - DSpace Summary: Spinal codes are a new class of rateless codes that enable...
Technical Assistance: Increasing Code Compliance - 2014 BTO Peer...
Code Compliance - 2014 BTO Peer Review More Documents & Publications Building Energy Codes Program - 2014 BTO Peer Review Building Energy Codes Program Overview - 2014 BTO Peer...
Energy Codes and the Landlord-Tenant Problem
Papineau, Maya
2013-01-01T23:59:59.000Z
a Commercial Building Energy Code in Michigan,” Report PNNL-Grant Summaries,” 1999. Office of Codes and Standards. , “2004,” , “Building Energy Codes: An Introduction,” 2010.
The Cost of Enforcing Building Energy Codes: Phase 1
Williams, Alison
2013-01-01T23:59:59.000Z
B. (2005). Residential Energy Code Evaluatinons: Review andProvidence, RI: Building Codes Assistance Project. ZING2007 Commercial Energy Code Compliance Study. Calgary, AB:
Two-Level Nonregular Designs From Quaternary Linear Codes
Hongquan Xu; Alan Wong
2011-01-01T23:59:59.000Z
Goethals, and related codes. IEEE Trans. Inform. Theory 40,Theory of Error-Correcting Codes. North- Holland, Amsterdam.1967). An optimum nonlinear code. Inform. Control 11, Sun,
Stationary and Portable Fuel Cell Systems Codes and Standards...
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
Stationary and Portable Fuel Cell Systems Codes and Standards Citations Stationary and Portable Fuel Cell Systems Codes and Standards Citations This document lists codes and...
Discussion on a Code Comparison Effort for the Geothermal Technologies...
Office of Environmental Management (EM)
Discussion on a Code Comparison Effort for the Geothermal Technologies Program Discussion on a Code Comparison Effort for the Geothermal Technologies Program Code comparison...
Reducing Energy Demand in Buildings Through State Energy Codes...
Reducing Energy Demand in Buildings Through State Energy Codes Reducing Energy Demand in Buildings Through State Energy Codes Building Codes Project for the 2013 Building...
State and Local Code Implementation: Southwest Region - 2014...
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
and Local Code Implementation: Southeast Region - 2014 BTO Peer Review State and Local Code Implementation: State Energy Officials - 2014 BTO Peer Review State and Local Code...
The Cost of Enforcing Building Energy Codes: Phase 1
Williams, Alison
2013-01-01T23:59:59.000Z
for 2009 International Energy Conservation Code Compliance.Council International Energy Conservation Code Institute forICC’s International Energy Conservation Code (IECC), used
Hydrogen Vehicle and Infrastructure Codes and Standards Citations...
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
Vehicle and Infrastructure Codes and Standards Citations Hydrogen Vehicle and Infrastructure Codes and Standards Citations This document lists codes and standards typically used...