Search results for " code"
showing 10 items of 636 documents
A Rayleigh-Ritz approach for postbuckling analysis of variable angle tow composite stiffened panels
2018
Abstract A Rayleigh-Ritz solution approach for generally restrained multilayered variable angle tow stiffened plates in postbuckling regime is presented. The plate model is based on the first order shear deformation theory and accounts for geometrical nonlinearity through the von Karman’s assumptions. Stiffened plates are modelled as assembly of plate-like elements and penalty techniques are used to join the elements in the assembled structure and to apply the kinematical boundary conditions. General symmetric and unsymmetric stacking sequences are considered and Legendre orthogonal polynomials are employed to build the trial functions. A computer code was developed to implement the propose…
A statistical analysis of the three-fold evolution of genomic compression through frame overlaps in prokaryotes
2007
Abstract Background Among microbial genomes, genetic information is frequently compressed, exploiting redundancies in the genetic code in order to store information in overlapping genes. We investigate the length, phase and orientation properties of overlap in 58 prokaryotic species evaluating neutral and selective mechanisms of evolution. Results Using a variety of statistical null models we find patterns of compressive coding that can not be explained purely in terms of the selective processes favoring genome minimization or translational coupling. The distribution of overlap lengths follows a fat-tailed distribution, in which a significant proportion of overlaps are in excess of 100 base…
On strongly tactical codes
1986
We study perfect error correcting codes in which the codewords are protected by Hamming spheres of distinct protective radii. These codes have been introduced by Cohen, Montaron and Frankl [3, 4, 10].
2014
Here we investigate the connection between topological order and the geometric entanglement, as measured by the logarithm of the overlap between a given state and its closest product state of blocks. We do this for a variety of topologically-ordered systems such as the toric code, double semion, color code, and quantum double models. As happens for the entanglement entropy, we find that for sufficiently large block sizes the geometric entanglement is, up to possible sub-leading corrections, the sum of two contributions: a bulk contribution obeying a boundary law times the number of blocks, and a contribution quantifying the underlying pattern of long-range entanglement of the topologically-…
2016
The goal of this article is to present a first list of ethical concerns that may arise from research and personal use of virtual reality (VR) and related technology, and to offer concrete recommendations for minimizing those risks. Many of the recommendations call for focused research initiatives. In the first part of the article, we discuss the relevant evidence from psychology that motivates our concerns. In section 1.1, we cover some of the main results suggesting that one’s environment can influence one’s psychological states, as well as recent work on inducing illusions of embodiment. Then, in section 1.2, we go on to discuss recent evidence indicating that immersion in VR can have psy…
Adaptive antioxidant methionine accumulation in respiratory chain complexes explains the use of a deviant genetic code in mitochondria
2008
Humans and most other animals use 2 different genetic codes to translate their hereditary information: the standard code for nuclear-encoded proteins and a modern variant of this code in mitochondria. Despite the pivotal role of the genetic code for cell biology, the functional significance of the deviant mitochondrial code has remained enigmatic since its first description in 1979. Here, we show that profound and functionally beneficial alterations on the encoded protein level were causative for the AUA codon reassignment from isoleucine to methionine observed in most mitochondrial lineages. We demonstrate that this codon reassignment leads to a massive accumulation of the easily oxidized …
Over 100 Years of Age But Still Entrepreneurially Active in Business: Exploring the Values and Family Characteristics of Old Finnish Family Firms
2002
This article, based on an exploratory study of old Finnish family firms, examines two main research questions: “How do certain firms that have been involved in business for over one century perceive and rank their business values]” and “How do the members of the owner-families self-assess their family characteristics in these century-old family firms]” There are only 68 companies that belong to either the FBN-Finland Association (Perheyritysten liitto ry) or the Association of Finnish Entrepreneurs (Suomen yrittäjät ry) that are over 100 years of age. The data, based on self-assessments of the present active family executives working at the top level, were drawn from 10 FBN companies and 1…
ASLA: reverse engineering approach for software license information retrieval
2006
Software maintenance and reuse require identification of the applied software licenses. The information needs of maintainers and reusers can be supported by reverse engineering tools at different information retrieval levels. The paper presents a reverse engineering approach called ASLA for retrieving license information typically used in OSS. User needs, system architecture, tool features, and tool evaluation are presented. The implemented tool features include support for identifying source file dependencies and licenses in source files. The tool is evaluated against another tool for license information extraction. ASLA supports the same programming languages as GCC. License identificatio…
ISAdetect
2020
Static and dynamic binary analysis techniques are actively used to reverse engineer software's behavior and to detect its vulnerabilities, even when only the binary code is available for analysis. To avoid analysis errors due to misreading op-codes for a wrong CPU architecture, these analysis tools must precisely identify the Instruction Set Architecture (ISA) of the object code under analysis. The variety of CPU architectures that modern security and reverse engineering tools must support is ever increasing due to massive proliferation of IoT devices and the diversity of firmware and malware targeting those devices. Recent studies concluded that falsely identifying the binary code's ISA ca…