Code Loops
Mostrando 1-12 de 15 artigos, teses e dissertações.
-
1. Loops de código: automorfismos e representações / Code loops: automorphisms and representations
Neste trabalho, estudamos Loops de Código. Para este estudo, introduzimos os loops de código a partir de códigos pares e depois, provamos que loops de código de posto $n$ podem ser caracterizados como imagem homomórfica de certos loops de Moufang livres com n geradores. Além disso, introduzimos o conceito de vetores característicos associados a um loo
Publicado em: 2011
-
2. Otimização Unroll and Jam através da refatoração / Unroll and Jam optimization through refactoring
The optimizations of a program can be performed on the intermediate code, generated during compilation time, or through the Performance Refactoring that consists of insertion of optimizations directly in the source code of the application. In the source code structure, iteration loops have a major impact in the performance of the application because they are
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 2011
-
3. Uma ferramenta para execução de algoritmos utilizando o modelo a fluxo de dados dinâmico em hardware reconfigurável para a arquitetura ChipCflow: módulo de conversão C em grafo a fluxo de dados / A tool for algorithms implementation using the dynamic data flow model in reconfigurable hardware for the ChipCflow architecture - C conversion to data flow graph module
ChipCflow is a tool for algorithms execution using a data dynamic flow in reconfigurable hardware. The main purpose of the work is to use the data flow architecture model, associated to the concept of reconfigurable architectures, to speed up C written applications. The program acceleration happens in the most intensive processing parts (example: loops), thr
Publicado em: 2009
-
4. TECHNIQUES FOR THE USE OF HOARE LOGIC IN PCC / TÉCNICAS PARA O USO DO CÁLCULO DE HOARE EM PCC
Atualmente, a maioria dos programas para computadores é obtida através da WEB. Como muitas vezes a procedência são fontes desconhecidas, é preciso se certificar de que o código se comporta como o esperado. A solução ideal seria verificar o código contra uma especificação de políticas de segurança ,contudo, isso pode consumir muito tempo.Uma outr
Publicado em: 2003
-
5. Simulação computacional de eventos termo-hidraulicos transitorios em multicircuitos com multibombas
PANTERA-2 (from Programa para Análise Termo-hidráulica de Reatores a ÁguaProgram for Thermal-hydraulic Analysis of Water Reactors, Version 2), whose fundamentals are described in this work, is intended to carry out rod bundle subchannel analysis in conjunction with multiloop simulation. It solves simultaneously the conservation equations of mass, axial an
Publicado em: 2003
-
6. The use of R-looping for structural gene identification and mRNA purification.
A method is presented for the purification of mRNAs and the identification of structural gene sequences in recombinant DNA molecules. RNA is hybridized to double-stranded linear DNA such that R-loops are formed between most DNAs and their complementary RNA sequences. These R-loops are purified from unhybridized RNAs by gel filtration chromatography in the pr
-
7. Electron microscopy of late adenovirus type 2 mRNA hybridized to double-stranded viral DNA.
R loops were generated with late adenovirus type 2 (Ad2) mRNA in double-stranded viral DNA, and visualized by electron microscopy. Unpaired DNA sequences in Ad2:Ad2+ND4 heteroduplex DNA served as a visual marker for the orientation of R loops with respect to the conventional DNA map. The most abundant classes of late Ad2 mRNA observed by this technique hybri
-
8. On the physical basis for ambiguity in genetic coding interactions.
We report the relative stabilities, in the form of complex lifetimes, of complexes between the tRNAs complementary, or nearly so, in their anticodons. The results show striking parallels with the genetic coding rules, including the wobble interaction and the role of modified nucleotides S2U and V (a 5-oxyacetic acid derivative of U). One important difference
-
9. Modeling RNA folding paths with pseudoknots: Application to hepatitis delta virus ribozyme
A quantitative understanding of nucleic acid hybridization is essential to many aspects of biotechnology, such as DNA microarrays, as well as to the structure and folding kinetics of RNA. However, predictions of nucleic acid secondary structures have long been impeded by the presence of helices interior to loops, so-called pseudoknots, which impose comp
National Academy of Sciences.
-
10. MORLUC numeric system for the identification of Enterobacteriaceae.
Foul hundred eighty-six members of the Enterobacteriaceae representing nine genera were identified by conventional methods, and the results were compared with MORLUC (Biotrol Company Inc., Jamaica, N.Y.). MORLUC, an acronym for melibiose, ONPG (o-nitrophenyl-beta-galactopyranoside), rhamnose, lysine decarboxylase, urease, and citrate, are six prepackaged rea
-
11. Tuning the activity of an enzyme for unusual environments: sequential random mutagenesis of subtilisin E for catalysis in dimethylformamide.
Random mutagenesis has been used to engineer the protease subtilisin E to function in a highly nonnatural environment--high concentrations of a polar organic solvent. Sequential rounds of mutagenesis and screening have yielded a variant (PC3) that hydrolyzes a peptide substrate 256 times more efficiently than wild-type subtilisin in 60% dimethylformamide. PC
-
12. Decoding of tandem quadruplets by adjacent tRNAs with eight-base anticodon loops
To expand the genetic code for specification of multiple non-natural amino acids, unique codons for these novel amino acids are needed. As part of a study of the potential of quadruplets as codons, the decoding of tandem UAGA quadruplets by an engineered tRNALeu with an eight-base anticodon loop, has been investigated. When GCC is the codon immediately 5′
Oxford University Press.