Search results for " code"

showing 10 items of 636 documents

A Rayleigh-Ritz approach for postbuckling analysis of variable angle tow composite stiffened panels

2018

Abstract A Rayleigh-Ritz solution approach for generally restrained multilayered variable angle tow stiffened plates in postbuckling regime is presented. The plate model is based on the first order shear deformation theory and accounts for geometrical nonlinearity through the von Karman’s assumptions. Stiffened plates are modelled as assembly of plate-like elements and penalty techniques are used to join the elements in the assembled structure and to apply the kinematical boundary conditions. General symmetric and unsymmetric stacking sequences are considered and Legendre orthogonal polynomials are employed to build the trial functions. A computer code was developed to implement the propose…

Rayleigh–Ritz methodEngineeringSource codemedia_common.quotation_subjectComposite numberStructure (category theory)02 engineering and technologyPhysics::Fluid Dynamics0203 mechanical engineeringGeneral Materials ScienceBoundary value problemSettore ING-IND/04 - Costruzioni E Strutture AerospazialiVariable angle tow composites Composite stiffened plates Postbuckling analysis Rayleigh-Ritz method First Order Shear DeformationLegendre polynomialsCivil and Structural Engineeringmedia_commonbusiness.industryMechanical EngineeringStructural engineering021001 nanoscience & nanotechnologyFinite element methodComputer Science Applications020303 mechanical engineering & transportsModeling and SimulationOrthogonal polynomials0210 nano-technologybusinessComputers & Structures
researchProduct

A statistical analysis of the three-fold evolution of genomic compression through frame overlaps in prokaryotes

2007

Abstract Background Among microbial genomes, genetic information is frequently compressed, exploiting redundancies in the genetic code in order to store information in overlapping genes. We investigate the length, phase and orientation properties of overlap in 58 prokaryotic species evaluating neutral and selective mechanisms of evolution. Results Using a variety of statistical null models we find patterns of compressive coding that can not be explained purely in terms of the selective processes favoring genome minimization or translational coupling. The distribution of overlap lengths follows a fat-tailed distribution, in which a significant proportion of overlaps are in excess of 100 base…

Reading FramesFold (higher-order function)ImmunologyReading frameComputational biologyBiologyGeneral Biochemistry Genetics and Molecular BiologyEvolution MolecularComplementary DNAGenes OverlappingPoint MutationGenomeslcsh:QH301-705.5GeneEcology Evolution Behavior and SystematicsGeneticsModels StatisticalAgricultural and Biological Sciences(all)Biochemistry Genetics and Molecular Biology(all)ResearchApplied MathematicsFrame (networking)Genetic codeStop codonOrder (biology)lcsh:Biology (General)Prokaryotic CellsModeling and SimulationGeneral Agricultural and Biological SciencesGenome BacterialBiology Direct
researchProduct

On strongly tactical codes

1986

We study perfect error correcting codes in which the codewords are protected by Hamming spheres of distinct protective radii. These codes have been introduced by Cohen, Montaron and Frankl [3, 4, 10].

Reed–Solomon error correctionConcatenated error correction codeTurbo codeForward error correctionConstant-weight codeLow-density parity-check codeError detection and correctionHamming codeAlgorithmComputer Science::Cryptography and SecurityComputer Science::Information TheoryMathematics
researchProduct

2014

Here we investigate the connection between topological order and the geometric entanglement, as measured by the logarithm of the overlap between a given state and its closest product state of blocks. We do this for a variety of topologically-ordered systems such as the toric code, double semion, color code, and quantum double models. As happens for the entanglement entropy, we find that for sufficiently large block sizes the geometric entanglement is, up to possible sub-leading corrections, the sum of two contributions: a bulk contribution obeying a boundary law times the number of blocks, and a contribution quantifying the underlying pattern of long-range entanglement of the topologically-…

RenormalizationPhysicsTheoretical physicsToric codeQuantum stateGeneral Physics and AstronomyTopological orderQuantum entanglementRenormalization groupQuantumMultipartite entanglementNew Journal of Physics
researchProduct

2016

The goal of this article is to present a first list of ethical concerns that may arise from research and personal use of virtual reality (VR) and related technology, and to offer concrete recommendations for minimizing those risks. Many of the recommendations call for focused research initiatives. In the first part of the article, we discuss the relevant evidence from psychology that motivates our concerns. In section 1.1, we cover some of the main results suggesting that one’s environment can influence one’s psychological states, as well as recent work on inducing illusions of embodiment. Then, in section 1.2, we go on to discuss recent evidence indicating that immersion in VR can have psy…

Research ethicsKnowledge managementbusiness.industryComputer science05 social sciencesVirtual realityOnline research methodsApplied ethics050105 experimental psychologyComputer Science Applications03 medical and health sciencesImmersive technology0302 clinical medicineArtificial IntelligenceVirtuality (gaming)0501 psychology and cognitive sciencesEngineering ethicsPsychological manipulationbusiness030217 neurology & neurosurgeryEthical codeFrontiers in Robotics and AI
researchProduct

Adaptive antioxidant methionine accumulation in respiratory chain complexes explains the use of a deviant genetic code in mitochondria

2008

Humans and most other animals use 2 different genetic codes to translate their hereditary information: the standard code for nuclear-encoded proteins and a modern variant of this code in mitochondria. Despite the pivotal role of the genetic code for cell biology, the functional significance of the deviant mitochondrial code has remained enigmatic since its first description in 1979. Here, we show that profound and functionally beneficial alterations on the encoded protein level were causative for the AUA codon reassignment from isoleucine to methionine observed in most mitochondrial lineages. We demonstrate that this codon reassignment leads to a massive accumulation of the easily oxidized …

Respiratory chainOxidative phosphorylationMitochondrionBiologyDNA MitochondrialGenomeAntioxidantsElectron Transportchemistry.chemical_compoundMethionineAnimalsIsoleucineInner mitochondrial membraneGeneticschemistry.chemical_classificationGenomeMultidisciplinaryMethionineFungiPlantsBiological SciencesGenetic codeBiological EvolutionAmino acidOxidative StresschemistryGenetic CodeMitochondrial MembranesDatabases Nucleic AcidProceedings of the National Academy of Sciences
researchProduct

Over 100 Years of Age But Still Entrepreneurially Active in Business: Exploring the Values and Family Characteristics of Old Finnish Family Firms

2002

This article, based on an exploratory study of old Finnish family firms, examines two main research questions: “How do certain firms that have been involved in business for over one century perceive and rank their business values]” and “How do the members of the owner-families self-assess their family characteristics in these century-old family firms]” There are only 68 companies that belong to either the FBN-Finland Association (Perheyritysten liitto ry) or the Association of Finnish Entrepreneurs (Suomen yrittäjät ry) that are over 100 years of age. The data, based on self-assessments of the present active family executives working at the top level, were drawn from 10 FBN companies and 1…

Response rate (survey)media_common.quotation_subject05 social sciencesExploratory researchBusiness valueLearned industriousnessHonesty0502 economics and businessCredibilityEconomicsBusiness Management and Accounting (miscellaneous)050211 marketingQuality (business)Marketing050203 business & managementFinanceEthical codemedia_commonFamily Business Review
researchProduct

ASLA: reverse engineering approach for software license information retrieval

2006

Software maintenance and reuse require identification of the applied software licenses. The information needs of maintainers and reusers can be supported by reverse engineering tools at different information retrieval levels. The paper presents a reverse engineering approach called ASLA for retrieving license information typically used in OSS. User needs, system architecture, tool features, and tool evaluation are presented. The implemented tool features include support for identifying source file dependencies and licenses in source files. The tool is evaluated against another tool for license information extraction. ASLA supports the same programming languages as GCC. License identificatio…

Reverse engineeringInformation retrievalSource codeDatabaseComputer sciencebusiness.industrymedia_common.quotation_subjectInformation needsSoftware maintenancecomputer.software_genreSoftware licenseSoftwareSoftware engineeringbusinessSoftware architecturecomputerLicensemedia_commonConference on Software Maintenance and Reengineering (CSMR'06)
researchProduct

ISAdetect

2020

Static and dynamic binary analysis techniques are actively used to reverse engineer software's behavior and to detect its vulnerabilities, even when only the binary code is available for analysis. To avoid analysis errors due to misreading op-codes for a wrong CPU architecture, these analysis tools must precisely identify the Instruction Set Architecture (ISA) of the object code under analysis. The variety of CPU architectures that modern security and reverse engineering tools must support is ever increasing due to massive proliferation of IoT devices and the diversity of firmware and malware targeting those devices. Recent studies concluded that falsely identifying the binary code's ISA ca…

Reverse engineeringprosessoritComputer scienceFirmware02 engineering and technologycomputer.file_formatcomputer.software_genrehaittaohjelmatInstruction setObject codeComputer engineering020204 information systemsEndianness0202 electrical engineering electronic engineering information engineeringMalwareesineiden internet020201 artificial intelligence & image processingBinary codeExecutabletietoturvacomputerProceedings of the Tenth ACM Conference on Data and Application Security and Privacy
researchProduct

TRACE Analysis of the MASLWR Primary/Containment Coupling Phenomena in Beyond Design Accident Scenario

2013

SBLOCATRACEOSU-MASLWROSU-MASLWR SBLOCA TRACETRACE Code MASLWR Beyond Design Accident Scenario Primary/Containment CouplingSettore ING-IND/19 - Impianti Nucleari
researchProduct