Academic literature on the topic 'Code Unknown'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Code Unknown.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Code Unknown"

1

Waldby, Catherine. "Code Unknown." Social Studies of Science 31, no. 5 (October 2001): 779–91. http://dx.doi.org/10.1177/030631201031005005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kruh, Louis. "SLIDING CODE DEVICE OF UNKNOWN ORIGIN." Cryptologia 16, no. 1 (January 1992): 86–88. http://dx.doi.org/10.1080/0161-119291866793.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lai, Yingxu, and Zhenghui Liu. "Unknown Malicious Code Detection Based on Bayesian." Procedia Engineering 15 (2011): 3836–42. http://dx.doi.org/10.1016/j.proeng.2011.08.718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Carrier, Kevin, and Jean-Pierre Tillich. "Identifying an unknown code by partial Gaussian elimination." Designs, Codes and Cryptography 87, no. 2-3 (December 21, 2018): 685–713. http://dx.doi.org/10.1007/s10623-018-00593-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tsai, Wen-Hsuan, and Peng-Hsiang Kao. "Secret Codes of Political Propaganda: The Unknown System of Writing Teams." China Quarterly 214 (May 13, 2013): 394–410. http://dx.doi.org/10.1017/s0305741013000362.

Full text
Abstract:
AbstractWithin the Chinese Communist Party (CCP), some Party units have established a largely unknown network of writing teams which propagate the policies or perspectives of a particular unit by publishing feature articles in Party journals. These writing teams often make use of a pseudonym in the form of a person's name, leading outsiders to believe that the work is written by a journalist. In fact, the pseudonyms of the Party unit writing teams function as a form of secret code. Through this code, inner Party members can recognize which unit's views an article reflects. In order to reveal exactly which units the codes represent, we have collated the names of over 20 writing teams. In addition, we provide an introduction to the functioning of the writing teams and the manner in which articles are produced. Finally, we propose that the CCP's mechanism of “propaganda codes” is gradually undergoing the process of institutionalization.
APA, Harvard, Vancouver, ISO, and other styles
6

Interlando, J. Carmelo. "Decoding the Ternary (23, 11, 9) Quadratic Residue Code." Research Letters in Communications 2009 (2009): 1–3. http://dx.doi.org/10.1155/2009/107432.

Full text
Abstract:
The algebraic decoding of binary quadratic residue codes can be performed using the Peterson or the Berlekamp-Massey algorithm once certain unknown syndromes are determined or eliminated. The technique of determining unknown syndromes is applied to the nonbinary case to decode the expurgated ternary quadratic residue code of length 23.
APA, Harvard, Vancouver, ISO, and other styles
7

Hartanto, Ari Dwi, and Al Sutjijana. "Binary Cyclic Pearson Codes." Jurnal Matematika MANTIK 7, no. 1 (March 18, 2021): 1–8. http://dx.doi.org/10.15642/mantik.2021.7.1.1-8.

Full text
Abstract:
The phenomena of unknown gain or offset on communication systems and modern storages such as optical data storage and non-volatile memory (flash) becomes a serious problem. This problem can be handled by Pearson distance applied to the detector because it offers immunity to gain and offset mismatch. This distance can only be used for a specific set of codewords, called Pearson codes. An interesting example of Pearson code can be found in T-constrained code class. In this paper, we present binary 2-constrained codes with cyclic property. The construction of this code is adopted from cyclic codes, but it cannot be considered as cyclic codes.
APA, Harvard, Vancouver, ISO, and other styles
8

Higgott, Oscar, Matthew Wilson, James Hefford, James Dborin, Farhan Hanif, Simon Burton, and Dan E. Browne. "Optimal local unitary encoding circuits for the surface code." Quantum 5 (August 5, 2021): 517. http://dx.doi.org/10.22331/q-2021-08-05-517.

Full text
Abstract:
The surface code is a leading candidate quantum error correcting code, owing to its high threshold, and compatibility with existing experimental architectures. Bravyi et al. (2006) showed that encoding a state in the surface code using local unitary operations requires time at least linear in the lattice size L, however the most efficient known method for encoding an unknown state, introduced by Dennis et al. (2002), has O(L2) time complexity. Here, we present an optimal local unitary encoding circuit for the planar surface code that uses exactly 2L time steps to encode an unknown state in a distance L planar code. We further show how an O(L) complexity local unitary encoder for the toric code can be found by enforcing locality in the O(log⁡L)-depth non-local renormalisation encoder. We relate these techniques by providing an O(L) local unitary circuit to convert between a toric code and a planar code, and also provide optimal encoders for the rectangular, rotated and 3D surface codes. Furthermore, we show how our encoding circuit for the planar code can be used to prepare fermionic states in the compact mapping, a recently introduced fermion to qubit mapping that has a stabiliser structure similar to that of the surface code and is particularly efficient for simulating the Fermi-Hubbard model.
APA, Harvard, Vancouver, ISO, and other styles
9

Fang-Biau Ueng, Jun-Da Chen, and Shang-Chun Tsai. "Adaptive DS-CDMA Receiver with Code Tracking in Phase Unknown Environments." IEEE Transactions on Wireless Communications 7, no. 4 (April 2008): 1227–35. http://dx.doi.org/10.1109/twc.2008.060803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

AHMED, PERVEZ, and C. Y. SUEN. "COMPUTER RECOGNITION OF TOTALLY UNCONSTRAINED HANDWRITTEN ZIP CODES." International Journal of Pattern Recognition and Artificial Intelligence 01, no. 01 (April 1987): 1–15. http://dx.doi.org/10.1142/s0218001487000023.

Full text
Abstract:
This paper deals with the application of automatic sorting of envelopes with totally unconstrained handwritten numeric postal ZIP codes and presents a complete model (including preprocessing, feature extraction and classification modules) of a ZIP code reader/sorter. Different recognition methods, including statistical, structural and combined were developed and their performance on real-life ZIP code samples (8540 numerals) were measured. The statistical recognition method was used as a front-end recognizer and predictor of an unknown character. Based on edge classification, a new technique was implemented to define and extract the structural features. In the combined recognition method, unknown characters were identified either by the statistical or structural method. Its recognition reliability was found to be in the interval (96.29%, 95.94%) with substitution and rejection rates between (3.45%, 3.96%) and (2.36%, 7.01%) respectively.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Code Unknown"

1

Savari, Serap Ayĩe. "Variable-to-fixed length codes for sources with known and unknown memory." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/11286.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1996.
Includes bibliographical references (leaves 91-93).
by Serap Ayşe Savari.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
2

Koizumi, Kaori. "The unknown core of existence : representations of the self in the novels of Haruki Murakami." Thesis, University of Essex, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.395919.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mestrah, Yasser. "Systèmes de communication robustes dans des environnements inconnus An unsupervised llr estimation with unknown noise distribution." Thesis, Reims, 2019. http://www.theses.fr/2019REIMS026.

Full text
Abstract:
Le nombre croissant des appareils communicants et lacoexistence de réseaux indépen- dants toujours plus abondantsen augmenteront dans le futur la densité et l'hétérogén- éitéavec pour conséquence une accentuation des interférences. Denombreuses études en ont montré leur nature impulsive qui secaractérise par des événements de fortes intensités sur decourtes périodes. Toutefois, ces phénomènes ne sont pascorrectement capturés par un modèle gaussien et nécessiteplutôt le recours à des distributions à queues lourdes. Cesbruits impulsifs ne sont pas l'apanage des réseaux et seretrouvent aussi dans d'autres contextes d'originesnaturelles ou humaines. Les systèmes perdent leur robustesselorsque leur environnement se modifie et lorsqu'ils reposenttrop fortement sur les spécificités de leur modèle. Laplupart des systèmes de communications étant basés sur lemodèle gaussien souffrent de tels problèmes en milieuimpulsif.Plusieurs techniques ont été développées pour limiterl'impact des interférences comme l'alignementd'interférences au niveau de la couche physique ou par destechniques d'évitement de transmissions simultanées comme leCSMA au niveau de la couche MAC. Enfin, d'autres méthodesessaient de les supprimer efficacement au niveau durécepteur à l'instar de l'annulation successivesd'interférences. Toutes ces techniques ne peuventparfaitement annuler toutes les interférences; d'autant plusque nous nous dirigeons vers des réseaux denses comme LoRa,Sigfox, la 5G ou en général l'Internet des objets sanscontrôle centralisé ni d'accès à la ressource radio ni auxpuissances des émissions. Par conséquent, prendre en comptela présence des interférences au niveau du récepteur devientune nécessité, voire une obligation.La robustesse des communications est nécessaire et prendrede bonnes décisions au niveau du récepteur requiertl'évaluation du log rapport de vraisemblance (LLR) quidépend de la distribution du bruit. Le cas du bruit blancgaussien additif est bien connu avec son récepteur linéaireet ses performances bien étudiées. Les non-linéaritésapparaissent avec le bruit impulsif et le LLR devient alorsdifficilement calculable lorsque la distribution de bruitn'est pas parfaitement connue. Malheureusement, dans cettesituation, les récepteurs classiques montrent des pertes deperformances significatives. Nous nous concentrons ici surla conception d'un récepteur adaptatif simple et robuste quiaffiche des performances proches de l'optimum sous bruitgaussien ou non. Ce récepteur aspire à être suffisammentgénérique pour s'adapter automatiquement en situation réel.Nous montrons par nos travaux qu'un simple module entre lasortie du canal et le décodeur de canal permet de combattreefficacement le bruit impulsif et améliore grandement lesperformances globales du système. Ce module approche le LLRpar une fonction adéquate sélectionnée parmi une familleparamétrée qui reflète suffisamment de conditions réelles ducanal allant du cas gaussien au cas sévèrement impulsif.Deux méthodes de sélection sont proposées et étudiées: lapremière utilise une séquence d'apprentissage, la secondeconsiste en un apprentissage non supervisé. Nous montronsque notre solution reste viable même pour des communicationsen paquets courts tout en restant très efficace en terme decoût de calcul. Nos contributions peuvent être amenéesà être appliquées à d'autres domaine que les communicationsnumériques
Future networks will become more dense and heterogeneous due to the inevitable increase in the number of communicated devices and the coexistence of numerous independent networks. One of the consequences is the significant increase in interference. Many studies have shown the impulsive nature of such an interference that is characterized by the presence of high amplitudes during short time durations. In fact, this undesirable phenomenon cannot be captured by the Gaussian model but more properly by heavy-tailed distributions. Beyond networks, impulsive noises are also found in other contexts. They can be generated naturally or be man-made. Systems lose their robustness when the environment changes, as the design takes too much into account the specificities of the model. The problem is that most of the communication systems implemented are based on the Gaussian assumption.Several techniques have been developed to limit the impact of interference, such as interference alignment at the physical layer or simultaneous transmission avoidance techniques like CSMA at the MAC layer. Finally, other methods try to suppress them effectively at the receiver as the successive interference cancellation (SIC). However, all these techniques cannot completely cancel interference. This is all the more true sincewe are heading towards dense networks such as LoRa, Sigfox, 5G or in general the internet of things (IoT) networks without centralized control or access to theradio resources or emission powers. Therefore, taking into account the presence of interference at the receiver level becomes a necessity, or even an obligation.Robust communication is necessary and making a decision at the receiver requires an evaluation of the log-likelihood ratio (LLR), whose derivation depends on the noise distribution. In the presence of additive white Gaussian noise (AWGN) the performance of digital communication schemes has been widely studied, optimized and simply implemented thanks to the linear-based receiver. In impulsive noise, the LLR is not linear anymore and it is computationally prohibitive or even impossible when the noise distribution is not known. Besides, the traditional linear behaviour of the optimal receiver exhibits a significant performance loss. In this study, we focus on designing a simple, adaptive and robust receiver that exhibits a near-optimal performance over Gaussian and non-Gaussian environments. The receiver must strive for universality by adapting automatically and without assistance in real conditions.We prove in this thesis that a simple module between the channel output and the decoder input allows effectively to combat the noise and interference that disrupt point-to-point (P2P) communications in a network. This module can be used as a front end of any LLR-based decoder and it does not require the knowledge of the noise distribution including both thermal noise and interference. This module consists of a LLR approximation selected in a parametric family of functions, flexible enough to be able to represent many communication contexts (Gaussian or non-Gaussian).Then, the judicious use of an information theory criterion allows to search effectively for the LLR approximation function that matches the channel state. Two different methods are proposed and investigated for this search, either using supervised learning or with an unsupervised approach. We show that it is even possible to use such a scheme for short packet communications with a performance close to the true LLR, which is computationally prohibitive. Overall, we believe that our findings can significantly contribute to many communication scenarios and will be desired in different networks wireless or wired, point to point or dense networks
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Yi-Lun, and 吳依倫. "Unknown Word Extraction fromMultilingual Code-Switched Sentences." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/08909589562461278018.

Full text
Abstract:
碩士
元智大學
資訊管理學系
99
Unknown word extraction plays an important rule in the field of Chinese language analysis. Several short terms of compound language are not available in dictionary up to now, and affect the result of Chinese word segmentation. This research focuses on extracting unknown words from code-Switched sentences, especially for “short term”. This research provides several approaches for comparison and examination as follows. My research primarily uses the Pointwise Mutual Information(PMI) to calculate the relationship between two different terms, and PMI would choose bigger value as the candidate. Although PMI only accept nearby words by appearance frequency, Besides PMI, I sieve out new words on all sides more precisely by entropy of sentence meaning.
APA, Harvard, Vancouver, ISO, and other styles
5

Perry, Patrick. "The expected value for the probability of an undetected error using a linear code over an unknown binary symmetric channel." Thesis, 2007. http://hdl.handle.net/10125/20564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Silvey, Vivien. "Network Films: a Global Genre?" Phd thesis, 2012. http://hdl.handle.net/1885/10535.

Full text
Abstract:
Over the past three decades there has been a boom in films which present collections of strangers whose lives coincidentally intersect, in ways unbeknownst to them but revealed to the audience. Love Actually (Curtis 2003), Babel (Iñárritu 2006), Crash (Haggis 2005), and Magnolia (Anderson 1999) are among the most internationally well known examples of such films. While a fair amount of academic attention has been paid to such films, very little work has investigated whether these types of films constitute a genre in distinction to ensemble films. Furthermore, while some cross cultural comparison has been made of such films, few have considered how the films and the concept of a global genre might relate to discursive terms such as “world cinema” and “art cinema”. Drawing on the genre theory of Rick Altman (1984, 1999) and Paul Willemen's endorsement of comparative film studies (2005), I conduct a comparative genre study of seven network films: Babel, Crash, The Edge of Heaven (Akin 2007), Love for Share (Di Nata 2006), Code Unknown: Incomplete Tales of Several Journeys (Haneke 2000), Lantana (Lawrence 2001), and Mumbai My Life (Kamat 2008). I seek to identify whether these seven examples of network films, which show numerous similarities despite their international origins, share generic qualities. Simultaneously, I conduct analyses of their narrative politics in order to ultimately discuss how such a global group of films reframe notions of “world cinema” and “art cinema”.
APA, Harvard, Vancouver, ISO, and other styles
7

Chang, Tsung-Hui, and 張縱輝. "Maximum-Likelihood Detection of Orthogonal Space-Time Block Coded OFDM in Unknown Block Fading Channels." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/68990826625155438466.

Full text
Abstract:
博士
國立清華大學
通訊工程研究所
96
現存大多數針對正交空時區塊碼正交分頻多工(orthogonal space-time block coded orthogonal frequency division multiplexing, OSTBC-OFDM)系統的盲蔽檢測與通道估測技術皆基於一根本假設,通道(channel)在多個OSTBC-OFDM區塊區間內為靜止不變的。本論文考量只需使用一個OSTBC-OFDM區塊信號之盲蔽最大勢然檢測(maximum-likelihood (ML) detection)技術。此技術的優點在於其更適合應用於具有較短同調時間(coherence time)的通道環境。基於BPSK/QPSK符碼調變,我們探討包括接收機實現(receiver implementation)及盲蔽唯一資料鑑別(blind unique data identifiability)的問題。對於接收機實現問題,我們提出降底複雜度的子通道群組(subchannel grouping)檢測機制。對於盲蔽唯一資料鑑別,我們證明所提出的檢偵機制在獨立瑞立衰減通道(Rayleigh fading channels)中只需使用非常少量的前導資料(pilot data)就能保證資料鑑別的唯一性。 本論文的第二部分更進一步針對任意非全零的通道環境,發展能夠在盲蔽接收機唯一鑑別通道的傳輸機制,我們證之為「完美之通道鑑別」(perfect channel identifiability, PCI)機制。我們證明只要使用所謂的子空間無交集碼(nonintersecting subspace codes)就能達到所期望的完美通道鑑別。此外,我們分析證明在獨立瑞立衰減通道中,此完美之通道鑑別傳輸機制能夠保證盲蔽最大勢然檢測器獲得最大之空間分集增益(spatial diversity gain)。最後,我們將所提出的完美之通道鑑別傳輸機制以及所提出之盲蔽最大勢然檢測器延伸到分散式空時編碼(distributed space time coding)系統。
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Code Unknown"

1

Walker, Elsie. Code Unknown. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190495909.003.0005.

Full text
Abstract:
This chapter analyzes Code Unknown from a postcolonial perspective, with particular emphases on multiethnic voices, disempowered sonic presences, and cross-cultural possibilities of communication in the context of racial politics in contemporary France. The analysis considers how the sound track amplifies diverse characters’ choices to hear or not to hear, along with providing patterns and resonances that invite us to make interpretive leaps beyond the characters’ individual capabilities. Code Unknown reminds us how much our efforts to communicate matter, especially through the multiethnic, deaf-mute children who bookend the film with their extended efforts to physically “speak.” By contrast, many hearing-speaking adults of the film fail to speak or listen with patience, good will, or moral kindness, and sometimes with awful consequences. After considering many sonic moments of social discordance through the film, this chapter dwells on the tentative hope of those scenes in which the deaf-mute children create percussive music together.
APA, Harvard, Vancouver, ISO, and other styles
2

Haneke, Michael. Code inconnu, récit incomplet de divers voyages: Code unknown. 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

The Unknown Twin: Code Red, Harlequin Super Romance - 1206. Harlequin, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Institute, Pennsylvania Bar, ed. The new Internal Revenue Code Section 409A: The known and unknown consequences for your clients. [Mechanicsburg, Pa.]: Pennsylvania Bar Institute, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

X, Trader. Forex Trading Secrets : Little Dirty Secrets And Unknown But Crazy Profitable Tricks To Breaking The Forex Code And Easy Instant Forex Millionaire: ... Cycle, Live Anywhere, Join The New Rich. CreateSpace Independent Publishing Platform, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

X, Trader. About Day Trading : Unknown Hidden Secrets and Weird Dirty But Profitable Tricks To Cracking The Code To Striking It Rich With Forex: The Four Hour Forex, Escape 9-5, Live Anywhere, Join The New Rich. CreateSpace Independent Publishing Platform, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Katelouzou, Dionysia, and Dan W. Puchniak, eds. Global Shareholder Stewardship. Cambridge University Press, 2022. http://dx.doi.org/10.1017/9781108914819.

Full text
Abstract:
This is the first in-depth comparative and empirical analysis of shareholder stewardship, revealing the previously unknown complexities of this global movement. It highlights the role of institutional investors and other shareholders, examining how they use their formal and informal power to influence companies. The book includes an in-depth chapter on every jurisdiction which has adopted a stewardship code and an analysis of stewardship in the world's two largest economies which have yet to adopt a code. Several comparative chapters draw on the rich body of jurisdiction-specific analyses, to analyze stewardship comparatively from multiple interdisciplinary perspectives. Ultimately, this book provides a cutting-edge and comprehensive understanding of shareholder stewardship which challenges existing theories and informs many of the most important debates in comparative corporate law and governance.
APA, Harvard, Vancouver, ISO, and other styles
8

Cogliati Dezza, Irene, Eric Schulz, and Charley M. Wu, eds. The Drive for Knowledge. Cambridge University Press, 2022. http://dx.doi.org/10.1017/9781009026949.

Full text
Abstract:
Humans constantly search for and use information to solve a wide range of problems related to survival, social interactions, and learning. While it is clear that curiosity and the drive for knowledge occupies a central role in defining what being human means to ourselves, where does this desire to know the unknown come from? What is its purpose? And how does it operate? These are some of the core questions this book seeks to answer by showcasing new and exciting research on human information-seeking. The volume brings together perspectives from leading researchers at the cutting edge of the cognitive sciences, working on human brains and behavior within psychology, computer science, and neuroscience. These vital connections between disciplines will continue to lead to further breakthroughs in our understanding of human cognition.
APA, Harvard, Vancouver, ISO, and other styles
9

Ben-Haim, Yakov. Uncertainty, Ignorance, Surprise—The Endless Frontier. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198822233.003.0003.

Full text
Abstract:
Some things happen by chance. Chance has diverse interpretations, but probability theory is relevant if there is some regularity of events. Probability also has limitations, especially when considering very rare events that we can only vaguely imagine. There are endless unknown possibilities, and the totality of rare events is massive. Hence it is hard to estimate probabilities of events that are individually rare but collectively not so rare. The rareness illusion is the impression of rareness arising from ignorance of the unknown. The rareness illusion results from our inability to assess probabilities of rare events. Non-probabilistic Knightian uncertainty extends our understanding of the unknown, and Shackle–Popper indeterminism provides a logical foundation. We illustrate these ideas by discussing the vagueness of human language, the impossibility of one unified theory of uncertainty, and the paradox that science is possible because science could someday come to an end.
APA, Harvard, Vancouver, ISO, and other styles
10

Zimansky, Paul. Urartian and the Urartians. Edited by Gregory McMahon and Sharon Steadman. Oxford University Press, 2012. http://dx.doi.org/10.1093/oxfordhb/9780195376142.013.0024.

Full text
Abstract:
This article profiles the history of the discovery of the forgotten kingdom of Urartu and the deciphering of its language, yet another hitherto-unknown linguistic tradition of Anatolia. Through this deciphering, the magnificent monuments of this eastern Anatolian kingdom, which extended well beyond the eastern border of present-day Turkey, come to life. The most minimal definition of an Urartian would be someone who spoke the language of the royal inscriptions of Biainili. The discussion begins with linguistic considerations, before returning to the question of who should be included among the Urartians.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Code Unknown"

1

Fujii, Yoichi Robertus. "Encounter with the Unknown." In The MicroRNA Quantum Code Book, 65–78. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-8586-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Boyun, Jianping Yin, and Jingbo Hao. "Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code." In Fuzzy Systems and Knowledge Discovery, 629–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11539506_78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jamrozik, Żaneta. "Acting as Value: Juliette Binoche in Michael Haneke’S Code Unknown." In Work in Cinema, 91–110. New York: Palgrave Macmillan US, 2013. http://dx.doi.org/10.1057/9781137370860_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cohen, Joshua M., Qinshi Wang, and Andrew W. Appel. "Verified Erasure Correction in Coq with MathComp and VST." In Computer Aided Verification, 272–92. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13188-2_14.

Full text
Abstract:
AbstractMost methods of data transmission and storage are prone to errors, leading to data loss. Forward erasure correction (FEC) is a method to allow data to be recovered in the presence of errors by encoding the data with redundant parity information determined by an error-correcting code. There are dozens of classes of such codes, many based on sophisticated mathematics, making them difficult to verify using automated tools. In this paper, we present a formal, machine-checked proof of a C implementation of FEC based on Reed-Solomon coding. The C code has been actively used in network defenses for over 25 years, but the algorithm it implements was partially unpublished, and it uses certain optimizations whose correctness was unknown even to the code’s authors. We use Coq’s Mathematical Components library to prove the algorithm’s correctness and the Verified Software Toolchain to prove that the C program correctly implements this algorithm, connecting both using a modular, well-encapsulated structure that could easily be used to verify a high-speed, hardware version of this FEC. This is the first end-to-end, formal proof of a real-world FEC implementation; we verified all previously unknown optimizations and found a latent bug in the code.
APA, Harvard, Vancouver, ISO, and other styles
5

Fukui, Hideo. "Land Plots with Unknown Owners: Causes and Legal Measures—The Necessity for a Thorough Reduction of Transaction Costs." In New Frontiers in Regional Science: Asian Perspectives, 31–62. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8848-8_4.

Full text
Abstract:
AbstractThe increase of land plots with unknown owners, namely, land plots whose owner’s name and address are not easily identifiable through repeated inheritance, etc., has emerged as a prominent social issue. The major reason for this phenomenon is the Civil Code that unconditionally allows the sharing of real estate by an unlimited number of co-owners, for one thing, and the registration system of real estate that does not require the true owner to register and thus does not show the real rights of real estate, for another. To reduce the increase of land plots with unknown owners as a proactive measure and to utilize them as a reactive measure, it is necessary to establish the one-owner principle with a ban of the sharing of real estate even through inheritance, to abolish fixed asset tax on buildings and houses, to require the new owner of real estate to register the right upon the transfer of ownership and for the registration office to make it public, to amend the Land Expropriation Act to facilitate the purchase of the land plots for public purpose without owner identification, to create an institutional arrangement that allows the will of the owner to be fictionally replaced, and to amend the Civil Code to allow the disposal of shared real estate by the majority of the co-owners.
APA, Harvard, Vancouver, ISO, and other styles
6

Lykidis, Alex. "Multiculturalism as Class Trauma: Antagonistic Authorship in Caché, Code Unknown, Happy End and Time of the Wolf." In Art Cinema and Neoliberalism, 211–50. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61006-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fukui, Hideo. "Real Estate and the Legal System of Japan." In New Frontiers in Regional Science: Asian Perspectives, 3–7. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8848-8_1.

Full text
Abstract:
AbstractIn Part I, entitled Real Estate and the Legal System, we analyze owner-unknown land issues, land acquisitions, and real estate auctions.The use and value of real estate such as land and buildings are significantly affected by public laws and regulations related to urban planning and construction, the environment, and taxation; for example, contract laws such as the Act on Land and Building Leases; private laws regulating torts, collateral enforcement, and so on; tax laws that regulate transfer taxes, ownership taxes, and transaction taxes; and regulations surrounding land use and urban infrastructure development. This paper discusses, therefore, the relationships between these laws and real estate, identifies problems in the laws associated with real estate in Japan, and proposes improvements.First, in recent years, owner-unknown land issues have become a serious concern in Japan. The Japanese registry does not always reflect the actual rightful owner, primarily because such registration is only a perfection requirement in civil law and registration involves a great deal of time and money. For example, because a large extent of land is registered to owners from nearly 100 years ago, it has changed hands many times through inheritance, which means that today, it is extremely difficult to determine the actual owner (inheritor) without spending a great deal of time and money. However, if the profits to be obtained from the land do not justify such expense, the land remains unused as “owner-unknown land.”Buying and selling land under Japanese civil law requires an agreement from all landowners including in the case of shared ownerships; therefore, even if the land has high returns, if it is “owner-unknown land,” it cannot be used effectively. With a focus on unknown-owner land, in this section, four writers provide multifaceted perspectives on the causes thereof, the defects in the current system, and the possible solutions.Eminent domain, the system which allows the acquisition of land against the land owner’s will for public projects, is widely institutionalized in many countries. It works to mitigate the owner-unknown land issues as far as lands are acquired by public projects.Further, real estate auctions are often held when liens are placed on land and/or residences for housing loan defaults. The Japanese civil auction system, which was institutionalized at the end of the nineteenth century, stipulates that a tenancy that is behind on a mortgage may resist a purchase unconditionally as long as the mortgage default period is within 3 years (short-term lease protection system/former Civil Code Article 395). This system was intended to avoid the unstable use of mortgaged properties and to promote the effective use of real estate; however, because the majority of users and the beneficiaries of this system were in fact anti-social groups, it was used to demand money unjustly from debtors and buyers, thus preventing the effective use of the mortgaged properties.When the protection of short-term leases was abolished in 2004, these types of interferences are said to have decreased drastically. However, successful bids for auctioned real estate properties continue to be lower than in general transactions. Therefore, here, we provide a quantitative analysis of these situations and propose further auction system improvements.Below, we introduce the outlines of each theory in Part I.
APA, Harvard, Vancouver, ISO, and other styles
8

Palit, Sarbani, and Bimal K. Roy. "Cryptanalysis of LFSR-Encrypted Codes with Unknown Combining Function." In Advances in Cryptology - ASIACRYPT’99, 306–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-48000-6_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lamprakos, Christos P., Charalampos Marantos, Lazaros Papadopoulos, and Dimitrios Soudris. "The Known Unknowns: Discovering Trade-Offs Between Heterogeneous Code Changes." In Lecture Notes in Computer Science, 342–53. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04580-6_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lamprakos, Christos P., Charalampos Marantos, Lazaros Papadopoulos, and Dimitrios Soudris. "The Known Unknowns: Discovering Trade-Offs Between Heterogeneous Code Changes." In Lecture Notes in Computer Science, 342–53. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04580-6_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Code Unknown"

1

Lee, Jaehee, Hyoungjun Kim, Hyunsik Yoon, and Kyungho Lee. "How to detect unknown malicious code efficiently?" In 2015 International Conference on Computing, Communication and Security (ICCCS). IEEE, 2015. http://dx.doi.org/10.1109/cccs.2015.7374162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tillich, Jean-Pierre, Audrey Tixier, and Nicolas Sendrier. "Recovering the interleaver of an unknown turbo-code." In 2014 IEEE International Symposium on Information Theory (ISIT). IEEE, 2014. http://dx.doi.org/10.1109/isit.2014.6875341.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tixier, Audrey. "Blind identification of an unknown interleaved convolutional code." In 2015 IEEE International Symposium on Information Theory (ISIT). IEEE, 2015. http://dx.doi.org/10.1109/isit.2015.7282419.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tahmasbi, Mehrdad, and Matthieu R. Bloch. "Covert Communication with Unknown Code at the Warden." In 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2019. http://dx.doi.org/10.1109/allerton.2019.8919792.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Giese and Skoglund. "Space-time code design for unknown frequency-selective channels." In IEEE International Conference on Acoustics Speech and Signal Processing ICASSP-02. IEEE, 2002. http://dx.doi.org/10.1109/icassp.2002.1005171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Giese, Jochen, and Mikael Skoglund. "Space-time code design for unknown frequency-selective channels." In Proceedings of ICASSP '02. IEEE, 2002. http://dx.doi.org/10.1109/icassp.2002.5745133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Negara, Stas, Mihai Codoban, Danny Dig, and Ralph E. Johnson. "Mining fine-grained code changes to detect unknown change patterns." In ICSE '14: 36th International Conference on Software Engineering. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2568225.2568317.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bellard, Marion, and Jean-Pierre Tillich. "Detecting and reconstructing an unknown convolutional code by counting collisions." In 2014 IEEE International Symposium on Information Theory (ISIT). IEEE, 2014. http://dx.doi.org/10.1109/isit.2014.6875378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hou, Yu, Cong Tran, and Won-Yong Shin. "META-CODE: Community Detection via Exploratory Learning in Topologically Unknown Networks." In CIKM '22: The 31st ACM International Conference on Information and Knowledge Management. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3511808.3557639.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Hayoung, Junho Choi, Dongjin Choi, Hansuk Choi, and Pankoo Kim. "Detection of unknown malicious script code using a conceptual graph and SVM." In the 2012 ACM Research in Applied Computation Symposium. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2401603.2401671.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Code Unknown"

1

Knight, R. D., and H. A. J. Russell. Quantifying the invisible: pXRF analyses of three boreholes, British Columbia and Ontario. Natural Resources Canada/CMSS/Information Management, 2022. http://dx.doi.org/10.4095/331176.

Full text
Abstract:
Portable X-ray fluorescence (pXRF) technology collects geochemical data at a fraction of the cost of traditional laboratory methods. Although the pXRF spectrometer provides concentrations for 41 elements, only a subset of these elements meet the criteria for definitive, quantitative, and qualitative data. However, high-quality pXRF data obtained by correct application of analytical protocols, can provide robust insight to stratigraphy and sediment characteristics that are often not observed by, for example, visual core logging, grain size analysis, and geophysical logging. We present examples of geochemical results obtained from pXRF analysis of drill core samples from three boreholes located in Canada, that demonstrate: 1) Definitive stratigraphic boundaries observed in geochemical changes obtained from 380 analyses collected over 150 m of core, which intersects three Ordovician sedimentary formations and Precambrian granite. These boundaries could not be reconciled by traditional visual core logging methods. 2) Significant elemental concentration changes observed in 120 samples collected in each of two ~120 m deep boreholes located in a confined paleo-glacial foreland basin. The collected geochemical data provide insight to sediment provenance and stratigraphic relationships that were previously unknown. 3) Abrupt changes in the geochemical signature in a subset of 135 samples collected from a 151 m deep borehole intersecting Quaternary glacial derived till, sands, and ahomogeneous silt and clay succession. These data provide a platform for discussion on ice sheet dynamics, changes in depositional setting, and changes in provenance. Results from each of these studies highlights previously unknown (invisible) geological information revealed through geochemical analyses. A significant benefit of using pXRF technology is refining sampling strategies in near real time and the ability to increase sample density at geochemical boundaries with little increase in analysis time or budget. The data also provide an opportunity to establish a chemostratigraphic framework that complements other stratigraphic correlation techniques, including geophysical methods. Overall, data collected with pXRF technology provide new insights into topics such as spatial correlations, facies changes, provenance changes, and depositional environment changes.
APA, Harvard, Vancouver, ISO, and other styles
2

Bridges, Todd, Sandra Newell, Alan Kennedy, David Moore, Upal Ghosh, Trevor Needham, Huan Xia, Kibeum Kim, Charles Menzie, and Konrad Kulacki. Long-term stability and efficacy of historic activated carbon (AC) deployments at diverse freshwater and marine remediation sites. Engineer Research and Development Center (U.S.), November 2020. http://dx.doi.org/10.21079/11681/38781.

Full text
Abstract:
A number of sites around the United States have used activated carbon (AC) amendments to remedy contaminated sediments. Variation in site-specific characteristics likely influences the long-term fate and efficacy of AC treatment. The long-term effectiveness of an AC amendment to sediment is largely unknown, as the field performance has not been monitored for more than three years. As a consequence, the focus of this research effort was to evaluate AC’s long-term (6–10 yr) performance. These assessments were performed at two pilot-scale demonstration sites, Grasse River, Massena, New York and Canal Creek, Aberdeen Proving Ground (APG), Aberdeen, Maryland, representing two distinct physical environments. Sediment core samples were collected after 6 and 10 years of remedy implementation at APG and Grasse River, respectively. Core samples were collected and sectioned to determine the current vertical distribution and persistence of AC in the field. The concentration profile of polychlorinated biphenyls (PCBs) in sediment pore water with depth was measured using passive sampling. Sediment samples from the untreated and AC-treated zones were also assessed for bioaccumulation in benthic organisms. The data collected enabled comparison of AC distribution, PCB concentrations, and bioaccumulation measured over the short- and long-term (months to years).
APA, Harvard, Vancouver, ISO, and other styles
3

Hart, Carl R., D. Keith Wilson, Chris L. Pettit, and Edward T. Nykaza. Machine-Learning of Long-Range Sound Propagation Through Simulated Atmospheric Turbulence. U.S. Army Engineer Research and Development Center, July 2021. http://dx.doi.org/10.21079/11681/41182.

Full text
Abstract:
Conventional numerical methods can capture the inherent variability of long-range outdoor sound propagation. However, computational memory and time requirements are high. In contrast, machine-learning models provide very fast predictions. This comes by learning from experimental observations or surrogate data. Yet, it is unknown what type of surrogate data is most suitable for machine-learning. This study used a Crank-Nicholson parabolic equation (CNPE) for generating the surrogate data. The CNPE input data were sampled by the Latin hypercube technique. Two separate datasets comprised 5000 samples of model input. The first dataset consisted of transmission loss (TL) fields for single realizations of turbulence. The second dataset consisted of average TL fields for 64 realizations of turbulence. Three machine-learning algorithms were applied to each dataset, namely, ensemble decision trees, neural networks, and cluster-weighted models. Observational data come from a long-range (out to 8 km) sound propagation experiment. In comparison to the experimental observations, regression predictions have 5–7 dB in median absolute error. Surrogate data quality depends on an accurate characterization of refractive and scattering conditions. Predictions obtained through a single realization of turbulence agree better with the experimental observations.
APA, Harvard, Vancouver, ISO, and other styles
4

King, E. L., A. Normandeau, T. Carson, P. Fraser, C. Staniforth, A. Limoges, B. MacDonald, F. J. Murrillo-Perez, and N. Van Nieuwenhove. Pockmarks, a paleo fluid efflux event, glacial meltwater channels, sponge colonies, and trawling impacts in Emerald Basin, Scotian Shelf: autonomous underwater vehicle surveys, William Kennedy 2022011 cruise report. Natural Resources Canada/CMSS/Information Management, 2022. http://dx.doi.org/10.4095/331174.

Full text
Abstract:
A short but productive cruise aboard RV William Kennedy tested various new field equipment near Halifax (port of departure and return) but also in areas that could also benefit science understanding. The GSC-A Gavia Autonomous Underwater Vehicle equipped with bathymetric, sidescan and sub-bottom profiler was successfully deployed for the first time on Scotian Shelf science targets. It surveyed three small areas: two across known benthic sponge, Vazella (Russian Hat) within a DFO-directed trawling closure area on the SE flank of Sambro Bank, bordering Emerald Basin, and one across known pockmarks, eroded cone-shaped depression in soft mud due to fluid efflux. The sponge study sites (~ 150 170 m water depth) were known to lie in an area of till (subglacial diamict) exposure at the seabed. The AUV data identified gravel and cobble-rich seabed, registering individual clasts at 35 cm gridded resolution. A subtle variation in seabed texture is recognized in sidescan images, from cobble-rich on ridge crests and flanks, to limited mud-rich sediment in intervening troughs. Correlation between seabed topography and texture with the (previously collected) Vazella distribution along two transects is not straightforward. However there may be a preference for the sponge in the depressions, some of which have a thin but possibly ephemeral sediment cover. Both sponge study sites depict a hereto unknown morphology, carved in glacial deposits, consisting of a series of discontinuous ridges interpreted to be generated by erosion in multiple, continuous, meandering and cross-cutting channels. The morphology is identical to glacial Nye, or mp;lt;"N-mp;lt;"channels, cut by sub-glacial meltwater. However their scale (10 to 100 times mp;lt;"typicalmp;gt;" N-channels) and the unique eroded medium, (till rather than bedrock), presents a rare or unknown size and medium and suggests a continuum in sub-glacial meltwater channels between much larger tunnel valleys, common to the eastward, and the bedrock forms. A comparison is made with coastal Nova Scotia forms in bedrock. The Emerald Basin AUV site, targeting pockmarks was in ~260 to 270 m water depth and imaged eight large and one small pockmark. The main aim was to investigate possible recent or continuous fluid flux activity in light of ocean acidification or greenhouse gas contribution; most accounts to date suggested inactivity. While a lack of common attributes marking activity is confirmed, creep or rotational flank failure is recognized, as is a depletion of buried diffuse methane immediately below the seabed features. Discovery of a second, buried, pockmark horizon, with smaller but more numerous erosive cones and no spatial correlation to the buried diffuse gas or the seabed pockmarks, indicates a paleo-event of fluid or gas efflux; general timing and possible mechanisms are suggested. The basinal survey also registered numerous otter board trawl marks cutting the surficial mud from past fishing activity. The AUV data present a unique dataset for follow-up quantification of the disturbance. Recent realization that this may play a significant role in ocean acidification on a global scale can benefit from such disturbance quantification. The new pole-mounted sub-bottom profiler collected high quality data, enabling correlation of recently recognized till ridges exposed at the seabed as they become buried across the flank and base of the basin. These, along with the Nye channels, will help reconstruct glacial behavior and flow patterns which to date are only vaguely documented. Several cores provide the potential for stratigraphic dating of key horizons and will augment Holocene environmental history investigations by a Dalhousie University student. In summary, several unique features have been identified, providing sufficient field data for further compilation, analysis and follow-up publications.
APA, Harvard, Vancouver, ISO, and other styles
5

Schuster, Gadi, and David Stern. Integrated Studies of Chloroplast Ribonucleases. United States Department of Agriculture, September 2011. http://dx.doi.org/10.32747/2011.7697125.bard.

Full text
Abstract:
Gene regulation at the RNA level encompasses multiple mechanisms in prokaryotes and eukaryotes, including splicing, editing, endo- and exonucleolytic cleavage, and various phenomena related to small or interfering RNAs. Ribonucleases are key players in nearly all of these post-transcriptional mechanisms, as the catalytic agents. This proposal continued BARD-funded research into ribonuclease activities in the chloroplast, where RNase mutation or deficiency can cause metabolic defects and is often associated with plant chlorosis, embryo or seedling lethality, and/or failure to tolerate nutrient stress. The first objective of this proposal was to examined a series of point mutations in the PNPase enzyme of Arabidopsis both in vivo and in vitro. This goal is related to structure-function analysis of an enzyme whose importance in many cellular processes in prokaryotes and eukaryotes has only begun to be uncovered. PNPase substrates are mostly generated by endonucleolytic cleavages for which the catalytic enzymes remain poorly described. The second objective of the proposal was to examine two candidate enzymes, RNase E and RNase J. RNase E is well-described in bacteria but its function in plants was still unknown. We hypothesized it catalyzes endonucleolytic cleavages in both RNA maturation and decay. RNase J was recently discovered in bacteria but like RNase E, its function in plants had yet to be explored. The results of this work are described in the scientific manuscripts attached to this report. We have completed the first objective of characterizing in detail TILLING mutants of PNPase Arabidopsis plants and in parallel introducing the same amino acids changes in the protein and characterize the properties of the modified proteins in vitro. This study defined the roles for both RNase PH core domains in polyadenylation, RNA 3’-end maturation and intron degradation. The results are described in the collaborative scientific manuscript (Germain et al 2011). The second part of the project aimed at the characterization of the two endoribonucleases, RNase E and RNase J, also in this case, in vivo and in vitro. Our results described the limited role of RNase E as compared to the pronounced one of RNase J in the elimination of antisense transcripts in the chloroplast (Schein et al 2008; Sharwood et al 2011). In addition, we characterized polyadenylation in the chloroplast of the green alga Chlamydomonas reinhardtii, and in Arabidopsis (Zimmer et al 2009). Our long term collaboration enabling in vivo and in vitro analysis, capturing the expertise of the two collaborating laboratories, has resulted in a biologically significant correlation of biochemical and in planta results for conserved and indispensable ribonucleases. These new insights into chloroplast gene regulation will ultimately support plant improvement for agriculture.
APA, Harvard, Vancouver, ISO, and other styles
6

Ohad, Itzhak, and Himadri Pakrasi. Role of Cytochrome B559 in Photoinhibition. United States Department of Agriculture, December 1995. http://dx.doi.org/10.32747/1995.7613031.bard.

Full text
Abstract:
The aim of this research project was to obtain information on the role of the cytochrome b559 in the function of Photosystem-II (PSII) with special emphasis on the light induced photo inactivation of PSII and turnover of the photochemical reaction center II protein subunit RCII-D1. The major goals of this project were: 1) Isolation and sequencing of the Chlamydomonas chloroplast psbE and psbF genes encoding the cytochrome b559 a and b subunits respectively; 2) Generation of site directed mutants and testing the effect of such mutation on the function of PSII under various light conditions; 3) To obtain further information on the mechanism of the light induced degradation and replacement of the PSII core proteins. This information shall serve as a basis for the understanding of the role of the cytochrome b559 in the process of photoinhibition and recovery of photosynthetic activity as well as during low light induced turnover of the D1 protein. Unlike in other organisms in which the psbE and psbF genes encoding the a and b subunits of cytochrome b559, are part of an operon which also includes the psbL and psbJ genes, in Chlamydomonas these genes are transcribed from different regions of the chloroplast chromosome. The charge distribution of the derived amino-acid sequences of psbE and psbF gene products differs from that of the corresponding genes in other organisms as far as the rule of "positive charge in" is concerned relative to the process of the polypeptide insertion in the thylakoid membrane. However, the sum of the charges of both subunits corresponds to the above rule possibly indicating co-insertion of both subunits in the process of cytochrome b559 assembly. A plasmid designed for the introduction of site-specific mutations into the psbF gene of C. reinhardtii. was constructed. The vector consists of a DNA fragment from the chromosome of C. reinhardtii which spans the region of the psbF gene, upstream of which the spectinomycin-resistance-conferring aadA cassette was inserted. This vector was successfully used to transform wild type C. reinhardtii cells. The spectinomycin resistant strain thus obtained can grow autotrophically and does not show significant changes as compared to the wild-type strain in PSII activity. The following mutations have been introduced in the psbF gene: H23M; H23Y; W19L and W19. The replacement of H23 involved in the heme binding to M and Y was meant to permit heme binding but eventually alter some or all of the electron transport properties of the mutated cytochrome. Tryptophane W19, a strictly conserved residue, is proximal to the heme and may interact with the tetrapyrole ring. Therefore its replacement may effect the heme properties. A change to tyrosine may have a lesser affect on the potential or electron transfer rate while a replacement of W19 by leucine is meant to introduce a more prominent disturbance in these parameters. Two of the mutants, FW19L and FH23M have segregated already and are homoplasmic. The rest are still grown under selection conditions until complete segregation will be obtained. All mutants contain assembled and functional PSII exhibiting an increased sensitivity of PSII to the light. Work is still in progress for the detailed characterization of the mutants PSII properties. A tobacco mutant, S6, obtained by Maliga and coworkers harboring the F26S mutation in the b subunit was made available to us and was characterized. Measurements of PSII charge separation and recombination, polypeptide content and electron flow indicates that this mutation indeed results in light sensitivity. Presently further work is in progress in the detailed characterization of the properties of all the above mutants. Information was obtained demonstrating that photoinactivation of PSII in vivo initiates a series of progressive changes in the properties of RCII which result in an irreversible modification of the RCII-D1 protein leading to its degradation and replacement. The cleavage process of the modified RCII-D1 protein is regulated by the occupancy of the QB site of RCII by plastoquinone. Newly synthesized D1 protein is not accumulated in a stable form unless integrated in reassembled RCII. Thus the degradation of the irreversibly modified RCII-D1 protein is essential for the recovery process. The light induced degradation of the RCII-D1 protein is rapid in mutants lacking the pD1 processing protease such as in the LF-1 mutant of the unicellular alga Scenedesmus obliquus. In this case the Mn binding site of PSII is abolished, the water oxidation process is inhibited and harmful cation radicals are formed following light induced electron flow in PSII. In such mutants photo-inactivation of PSII is rapid, it is not protected by ligands binding at the QB site and the degradation of the inactivated RCII-D1 occurs rapidly also in the dark. Furthermore the degraded D1 protein can be replaced in the dark in absence of light driven redox controlled reactions. The replacement of the RCII-D1 protein involves the de novo synthesis of the precursor protein, pD1, and its processing at the C-terminus end by an unknown processing protease. In the frame of this work, a gene previously isolated and sequenced by Dr. Pakrasi's group has been identified as encoding the RCII-pD1 C-terminus processing protease in the cyanobacterium Synechocystis sp. PCC 6803. The deduced sequence of the ctpA protein shows significant similarity to the bovine, human and insect interphotoreceptor retinoid-binding proteins. Results obtained using C. reinhardtii cells exposes to low light or series of single turnover light flashes have been also obtained indicating that the process of RCII-D1 protein turnover under non-photoinactivating conditions (low light) may be related to charge recombination in RCII due to back electron flow from the semiquinone QB- to the oxidised S2,3 states of the Mn cluster involved in the water oxidation process.
APA, Harvard, Vancouver, ISO, and other styles
7

Genetic factors influence the relationship between the home environment and onset of depressive symptom. ACAMH, August 2018. http://dx.doi.org/10.13056/acamh.10571.

Full text
Abstract:
Clinical depression is prevalent in adolescence, but how depression emerges and the nature of the early risk factors is unknown. Insight has now come from a study performed by researchers at King’s College London.
APA, Harvard, Vancouver, ISO, and other styles
8

African Open Science Platform Part 1: Landscape Study. Academy of Science of South Africa (ASSAf), 2019. http://dx.doi.org/10.17159/assaf.2019/0047.

Full text
Abstract:
This report maps the African landscape of Open Science – with a focus on Open Data as a sub-set of Open Science. Data to inform the landscape study were collected through a variety of methods, including surveys, desk research, engagement with a community of practice, networking with stakeholders, participation in conferences, case study presentations, and workshops hosted. Although the majority of African countries (35 of 54) demonstrates commitment to science through its investment in research and development (R&D), academies of science, ministries of science and technology, policies, recognition of research, and participation in the Science Granting Councils Initiative (SGCI), the following countries demonstrate the highest commitment and political willingness to invest in science: Botswana, Ethiopia, Kenya, Senegal, South Africa, Tanzania, and Uganda. In addition to existing policies in Science, Technology and Innovation (STI), the following countries have made progress towards Open Data policies: Botswana, Kenya, Madagascar, Mauritius, South Africa and Uganda. Only two African countries (Kenya and South Africa) at this stage contribute 0.8% of its GDP (Gross Domestic Product) to R&D (Research and Development), which is the closest to the AU’s (African Union’s) suggested 1%. Countries such as Lesotho and Madagascar ranked as 0%, while the R&D expenditure for 24 African countries is unknown. In addition to this, science globally has become fully dependent on stable ICT (Information and Communication Technologies) infrastructure, which includes connectivity/bandwidth, high performance computing facilities and data services. This is especially applicable since countries globally are finding themselves in the midst of the 4th Industrial Revolution (4IR), which is not only “about” data, but which “is” data. According to an article1 by Alan Marcus (2015) (Senior Director, Head of Information Technology and Telecommunications Industries, World Economic Forum), “At its core, data represents a post-industrial opportunity. Its uses have unprecedented complexity, velocity and global reach. As digital communications become ubiquitous, data will rule in a world where nearly everyone and everything is connected in real time. That will require a highly reliable, secure and available infrastructure at its core, and innovation at the edge.” Every industry is affected as part of this revolution – also science. An important component of the digital transformation is “trust” – people must be able to trust that governments and all other industries (including the science sector), adequately handle and protect their data. This requires accountability on a global level, and digital industries must embrace the change and go for a higher standard of protection. “This will reassure consumers and citizens, benefitting the whole digital economy”, says Marcus. A stable and secure information and communication technologies (ICT) infrastructure – currently provided by the National Research and Education Networks (NRENs) – is key to advance collaboration in science. The AfricaConnect2 project (AfricaConnect (2012–2014) and AfricaConnect2 (2016–2018)) through establishing connectivity between National Research and Education Networks (NRENs), is planning to roll out AfricaConnect3 by the end of 2019. The concern however is that selected African governments (with the exception of a few countries such as South Africa, Mozambique, Ethiopia and others) have low awareness of the impact the Internet has today on all societal levels, how much ICT (and the 4th Industrial Revolution) have affected research, and the added value an NREN can bring to higher education and research in addressing the respective needs, which is far more complex than simply providing connectivity. Apart from more commitment and investment in R&D, African governments – to become and remain part of the 4th Industrial Revolution – have no option other than to acknowledge and commit to the role NRENs play in advancing science towards addressing the SDG (Sustainable Development Goals). For successful collaboration and direction, it is fundamental that policies within one country are aligned with one another. Alignment on continental level is crucial for the future Pan-African African Open Science Platform to be successful. Both the HIPSSA ((Harmonization of ICT Policies in Sub-Saharan Africa)3 project and WATRA (the West Africa Telecommunications Regulators Assembly)4, have made progress towards the regulation of the telecom sector, and in particular of bottlenecks which curb the development of competition among ISPs. A study under HIPSSA identified potential bottlenecks in access at an affordable price to the international capacity of submarine cables and suggested means and tools used by regulators to remedy them. Work on the recommended measures and making them operational continues in collaboration with WATRA. In addition to sufficient bandwidth and connectivity, high-performance computing facilities and services in support of data sharing are also required. The South African National Integrated Cyberinfrastructure System5 (NICIS) has made great progress in planning and setting up a cyberinfrastructure ecosystem in support of collaborative science and data sharing. The regional Southern African Development Community6 (SADC) Cyber-infrastructure Framework provides a valuable roadmap towards high-speed Internet, developing human capacity and skills in ICT technologies, high- performance computing and more. The following countries have been identified as having high-performance computing facilities, some as a result of the Square Kilometre Array7 (SKA) partnership: Botswana, Ghana, Kenya, Madagascar, Mozambique, Mauritius, Namibia, South Africa, Tunisia, and Zambia. More and more NRENs – especially the Level 6 NRENs 8 (Algeria, Egypt, Kenya, South Africa, and recently Zambia) – are exploring offering additional services; also in support of data sharing and transfer. The following NRENs already allow for running data-intensive applications and sharing of high-end computing assets, bio-modelling and computation on high-performance/ supercomputers: KENET (Kenya), TENET (South Africa), RENU (Uganda), ZAMREN (Zambia), EUN (Egypt) and ARN (Algeria). Fifteen higher education training institutions from eight African countries (Botswana, Benin, Kenya, Nigeria, Rwanda, South Africa, Sudan, and Tanzania) have been identified as offering formal courses on data science. In addition to formal degrees, a number of international short courses have been developed and free international online courses are also available as an option to build capacity and integrate as part of curricula. The small number of higher education or research intensive institutions offering data science is however insufficient, and there is a desperate need for more training in data science. The CODATA-RDA Schools of Research Data Science aim at addressing the continental need for foundational data skills across all disciplines, along with training conducted by The Carpentries 9 programme (specifically Data Carpentry 10 ). Thus far, CODATA-RDA schools in collaboration with AOSP, integrating content from Data Carpentry, were presented in Rwanda (in 2018), and during17-29 June 2019, in Ethiopia. Awareness regarding Open Science (including Open Data) is evident through the 12 Open Science-related Open Access/Open Data/Open Science declarations and agreements endorsed or signed by African governments; 200 Open Access journals from Africa registered on the Directory of Open Access Journals (DOAJ); 174 Open Access institutional research repositories registered on openDOAR (Directory of Open Access Repositories); 33 Open Access/Open Science policies registered on ROARMAP (Registry of Open Access Repository Mandates and Policies); 24 data repositories registered with the Registry of Data Repositories (re3data.org) (although the pilot project identified 66 research data repositories); and one data repository assigned the CoreTrustSeal. Although this is a start, far more needs to be done to align African data curation and research practices with global standards. Funding to conduct research remains a challenge. African researchers mostly fund their own research, and there are little incentives for them to make their research and accompanying data sets openly accessible. Funding and peer recognition, along with an enabling research environment conducive for research, are regarded as major incentives. The landscape report concludes with a number of concerns towards sharing research data openly, as well as challenges in terms of Open Data policy, ICT infrastructure supportive of data sharing, capacity building, lack of skills, and the need for incentives. Although great progress has been made in terms of Open Science and Open Data practices, more awareness needs to be created and further advocacy efforts are required for buy-in from African governments. A federated African Open Science Platform (AOSP) will not only encourage more collaboration among researchers in addressing the SDGs, but it will also benefit the many stakeholders identified as part of the pilot phase. The time is now, for governments in Africa, to acknowledge the important role of science in general, but specifically Open Science and Open Data, through developing and aligning the relevant policies, investing in an ICT infrastructure conducive for data sharing through committing funding to making NRENs financially sustainable, incentivising open research practices by scientists, and creating opportunities for more scientists and stakeholders across all disciplines to be trained in data management.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography