WorldWideScience

Sample records for preprogrammed coded signal

  1. Ultrasound imaging using coded signals

    DEFF Research Database (Denmark)

    Misaridis, Athanasios

    Modulated (or coded) excitation signals can potentially improve the quality and increase the frame rate in medical ultrasound scanners. The aim of this dissertation is to investigate systematically the applicability of modulated signals in medical ultrasound imaging and to suggest appropriate...... methods for coded imaging, with the goal of making better anatomic and flow images and three-dimensional images. On the first stage, it investigates techniques for doing high-resolution coded imaging with improved signal-to-noise ratio compared to conventional imaging. Subsequently it investigates how...... coded excitation can be used for increasing the frame rate. The work includes both simulated results using Field II, and experimental results based on measurements on phantoms as well as clinical images. Initially a mathematical foundation of signal modulation is given. Pulse compression based...

  2. Multimedia signal coding and transmission

    CERN Document Server

    Ohm, Jens-Rainer

    2015-01-01

    This textbook covers the theoretical background of one- and multidimensional signal processing, statistical analysis and modelling, coding and information theory with regard to the principles and design of image, video and audio compression systems. The theoretical concepts are augmented by practical examples of algorithms for multimedia signal coding technology, and related transmission aspects. On this basis, principles behind multimedia coding standards, including most recent developments like High Efficiency Video Coding, can be well understood. Furthermore, potential advances in future development are pointed out. Numerous figures and examples help to illustrate the concepts covered. The book was developed on the basis of a graduate-level university course, and most chapters are supplemented by exercises. The book is also a self-contained introduction both for researchers and developers of multimedia compression systems in industry.

  3. Multichannel Coding of Applause Signals

    Directory of Open Access Journals (Sweden)

    Jeroen Breebaart

    2007-08-01

    Full Text Available We develop a parametric multichannel audio codec dedicated to coding signals consisting of a dense series of transient-type events. These signals of which applause is a typical example are known to be problematic for such audio codecs. The codec design is based on preservation of both timbre and transient-type event density. It combines a very low complexity and a low parameter bit rate (0.2 kbps. In a formal listening test, we compared the proposed codec to the recently standardised MPEG Surround multichannel codec, with an associated parameter bit rate of 9 kbps. We found the new codec to have a significantly higher audio quality than the MPEG Surround codec for the two multichannel applause signals under test. Though this seems promising, the technique presented is not fully mature, for example, because issues related to integration of the proposed codec in the MPEG Surround codec were not addressed.

  4. Modified BTC Algorithm for Audio Signal Coding

    Directory of Open Access Journals (Sweden)

    TOMIC, S.

    2016-11-01

    Full Text Available This paper describes modification of a well-known image coding algorithm, named Block Truncation Coding (BTC and its application in audio signal coding. BTC algorithm was originally designed for black and white image coding. Since black and white images and audio signals have different statistical characteristics, the application of this image coding algorithm to audio signal presents a novelty and a challenge. Several implementation modifications are described in this paper, while the original idea of the algorithm is preserved. The main modifications are performed in the area of signal quantization, by designing more adequate quantizers for audio signal processing. The result is a novel audio coding algorithm, whose performance is presented and analyzed in this research. The performance analysis indicates that this novel algorithm can be successfully applied in audio signal coding.

  5. Signal Constellations for Multilevel Coded Modulation with Sparse Graph Codes

    NARCIS (Netherlands)

    Cronie, Harm S.

    2005-01-01

    A method to combine error-correction coding and spectral efficient modulation for transmission over channels with Gaussian noise is presented. The method of modulation leads to a signal constellation in which the constellation symbols have a nonuniform distribution. This gives a so-called shape gain

  6. Smectic Layer Origami via Preprogrammed Photoalignment.

    Science.gov (United States)

    Ma, Ling-Ling; Tang, Ming-Jie; Hu, Wei; Cui, Ze-Qun; Ge, Shi-Jun; Chen, Peng; Chen, Lu-Jian; Qian, Hao; Chi, Li-Feng; Lu, Yan-Qing

    2017-02-10

    Hierarchical architecture is of vital importance in soft materials. Focal conic domains (FCDs) of smectic liquid crystals, characterized by an ordered lamellar structure, attract intensive attention. Simultaneously tailoring the geometry and clustering characteristics of FCDs remains a challenge. Here, the 3D smectic layer origami via a 2D preprogrammed photoalignment film is accomplished. Full control of hierarchical superstructures is demonstrated, including the domain size, shape, and orientation, and the lattice symmetry of fragmented toric FCDs. The unique symmetry breaking of resultant superstructures combined with the optical anisotropy of the liquid crystals induces an intriguing polarization-dependent diffraction. This work broadens the scientific understanding of self-assembled soft materials and may inspire new opportunities for advanced functional materials and devices.

  7. 46 CFR 108.713 - International Code of Signals.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false International Code of Signals. 108.713 Section 108.713... AND EQUIPMENT Miscellaneous Equipment § 108.713 International Code of Signals. Each vessel on an... Signals. ...

  8. Acetylation modulates the STAT signaling code.

    Science.gov (United States)

    Wieczorek, Martin; Ginter, Torsten; Brand, Peter; Heinzel, Thorsten; Krämer, Oliver H

    2012-12-01

    A fascinating question of modern biology is how a limited number of signaling pathways generate biological diversity and crosstalk phenomena in vivo. Well-defined posttranslational modification patterns dictate the functions and interactions of proteins. The signal transducers and activators of transcription (STATs) are physiologically important cytokine-induced transcription factors. They are targeted by a multitude of posttranslational modifications that control and modulate signaling responses and gene expression. Beyond phosphorylation of serine and tyrosine residues, lysine acetylation has recently emerged as a critical modification regulating STAT functions. Interestingly, acetylation can determine STAT signaling codes by various molecular mechanisms, including the modulation of other posttranslational modifications. Here, we provide an overview on the acetylation of STATs and how this protein modification shapes cellular cytokine responses. We summarize recent advances in understanding the impact of STAT acetylation on cell growth, apoptosis, innate immunity, inflammation, and tumorigenesis. Furthermore, we discuss how STAT acetylation can be targeted by small molecules and we consider the possibility that additional molecules controlling STAT signaling are regulated by acetylation. Our review also summarizes evolutionary aspects and we show similarities between the acetylation-dependent control of STATs and other important molecules. We propose the concept that, similar to the 'histone code', distinct posttranslational modifications and their crosstalk orchestrate the functions and interactions of STAT proteins.

  9. Optimal Subband Coding of Cyclostationary Signals

    Science.gov (United States)

    2007-11-02

    Computer Engineering The University of Iowa Iowa City, IA-52242, USA. Email: dasgupta, pashish @engineering.uiowa.edu ABSTRACT We consider...FILTERS FOR SUBBAND CODING OF WIDESENSE CYCLOSTATIONARY SIGNALS Ashish Pandharipande and Soura Dasgupta Electrical and Computer Engineering ... nonunique . This is consistent with the fact that LTI opti- mum compaction filters for WSS processes are also nonunique , [11]. We now state the main results

  10. 30 CFR 57.19096 - Familiarity with signal code.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Familiarity with signal code. 57.19096 Section... Hoisting Signaling § 57.19096 Familiarity with signal code. Any person reponsible for receiving or giving... with the posted signaling code. Shafts...

  11. 30 CFR 56.19093 - Standard signal code.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Standard signal code. 56.19093 Section 56.19093 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE... Signaling § 56.19093 Standard signal code. A standard code of hoisting signals shall be adopted and used...

  12. 30 CFR 57.19094 - Posting signal code.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Posting signal code. 57.19094 Section 57.19094 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE... Signaling § 57.19094 Posting signal code. A legible signal code shall be posted prominently in the...

  13. 30 CFR 56.19094 - Posting signal code.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Posting signal code. 56.19094 Section 56.19094 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE... Signaling § 56.19094 Posting signal code. A legible signal code shall be posted prominently in the...

  14. 30 CFR 56.19096 - Familiarity with signal code.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Familiarity with signal code. 56.19096 Section... Hoisting Signaling § 56.19096 Familiarity with signal code. Any person responsible for receiving or giving... with the posted signaling code. Shafts...

  15. 30 CFR 57.19093 - Standard signal code.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Standard signal code. 57.19093 Section 57.19093 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE... Signaling § 57.19093 Standard signal code. A standard code of hoisting signals shall be adopted and used...

  16. ASPT software source code: ASPT signal excision software package

    Science.gov (United States)

    Parliament, Hugh

    1992-08-01

    The source code for the ASPT Signal Excision Software Package which is part of the Adaptive Signal Processing Testbed (ASPT) is presented. The source code covers the programs 'excision', 'ab.out', 'd0.out', 'bd1.out', 'develop', 'despread', 'sorting', and 'convert'. These programs are concerned with collecting data, filtering out interference from a spread spectrum signal, analyzing the results, and developing and testing new filtering algorithms.

  17. Digital GPS-Signal Processor With P-Code/No-P-Code Option

    Science.gov (United States)

    Thomas, J. Brooks; Srinivasan, Jeffrey M.

    1994-01-01

    Size, power, and cost reduced by exploiting commonality. Digital signal processor for Global Positioning System (GPS) receiver set to operate in "code" mode when P code known, or in "codeless" mode when P code not known. In codeless mode, processor performs full-quadrature processing, resulting in signal-to-noise ratio (SNR) 6 dB greater than SNR's of processors not performing at full quadrature.

  18. 21 CFR 870.1435 - Single-function, preprogrammed diagnostic computer.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Single-function, preprogrammed diagnostic computer... Single-function, preprogrammed diagnostic computer. (a) Identification. A single-function, preprogrammed diagnostic computer is a hard-wired computer that calculates a specific physiological or blood-flow...

  19. Totally Coded Method for Signal Flow Graph Algorithm

    Institute of Scientific and Technical Information of China (English)

    XU Jing-bo; ZHOU Mei-hua

    2002-01-01

    After a code-table has been established by means of node association information from signal flow graph, the totally coded method (TCM) is applied merely in the domain of code operation beyond any figure-earching algorithm. The code-series (CS) have the holoinformation nature, so that both the content and the sign of each gain- term can be determined via the coded method. The principle of this method is simple and it is suited for computer programming. The capability of the computer-aided analysis for switched current network(SIN) can be enhanced.

  20. System Measures Errors Between Time-Code Signals

    Science.gov (United States)

    Cree, David; Venkatesh, C. N.

    1993-01-01

    System measures timing errors between signals produced by three asynchronous time-code generators. Errors between 1-second clock pulses resolved to 2 microseconds. Basic principle of computation of timing errors as follows: central processing unit in microcontroller constantly monitors time data received from time-code generators for changes in 1-second time-code intervals. In response to any such change, microprocessor buffers count of 16-bit internal timer.

  1. Multiplexed temporal coding of electric communication signals in mormyrid fishes.

    Science.gov (United States)

    Baker, Christa A; Kohashi, Tsunehiko; Lyons-Warren, Ariel M; Ma, Xiaofeng; Carlson, Bruce A

    2013-07-01

    The coding of stimulus information into patterns of spike times occurs widely in sensory systems. Determining how temporally coded information is decoded by central neurons is essential to understanding how brains process sensory stimuli. Mormyrid weakly electric fishes are experts at time coding, making them an exemplary organism for addressing this question. Mormyrids generate brief, stereotyped electric pulses. Pulse waveform carries information about sender identity, and it is encoded into submillisecond-to-millisecond differences in spike timing between receptors. Mormyrids vary the time between pulses to communicate behavioral state, and these intervals are encoded into the sequence of interspike intervals within receptors. Thus, the responses of peripheral electroreceptors establish a temporally multiplexed code for communication signals, one consisting of spike timing differences between receptors and a second consisting of interspike intervals within receptors. These signals are processed in a dedicated sensory pathway, and recent studies have shed light on the mechanisms by which central circuits can extract behaviorally relevant information from multiplexed temporal codes. Evolutionary change in the anatomy of this pathway is related to differences in electrosensory perception, which appears to have influenced the diversification of electric signals and species. However, it remains unknown how this evolutionary change relates to differences in sensory coding schemes, neuronal circuitry and central sensory processing. The mormyrid electric communication pathway is a powerful model for integrating mechanistic studies of temporal coding with evolutionary studies of correlated differences in brain and behavior to investigate neural mechanisms for processing temporal codes.

  2. Detection of Polyphase Codes Radar Signals in Low SNR

    Directory of Open Access Journals (Sweden)

    Runlan Tian

    2016-01-01

    Full Text Available A novel effective detection method is proposed for electronic intelligence (ELINT systems detecting polyphase codes radar signal in the low signal-to-noise ratio (SNR scenario. The core idea of the proposed method is first to calculate the time-frequency distribution of polyphase codes radar signals via Wigner-Ville distribution (WVD; then the modified Hough transform (HT is employed to cumulate all the energy of WVD’s ridges effectively to achieve signal detection. Compared with the generalised Wigner Hough transform (GWHT method, the proposed method has a superior performance in low SNR and is not sensitive to the code type. Simulation results verify the validity of the proposed method.

  3. The caveolae dress code: structure and signaling.

    Science.gov (United States)

    Lamaze, Christophe; Tardif, Nicolas; Dewulf, Melissa; Vassilopoulos, Stéphane; Blouin, Cédric M

    2017-08-01

    Over the past decade, interest in caveolae biology has peaked. These small bulb-shaped plasma membrane invaginations of 50-80nm diameter present in most cell types have been upgraded from simple membrane structures to a more complex bona fide organelle. However, although caveolae are involved in several essential cellular functions and pathologies, the underlying molecular mechanisms remain poorly defined. Following the identification of caveolins and cavins as the main caveolae constituents, recent studies have brought new insight into their structural organization as a coat. In this review, we discuss how these new data on caveolae can be integrated in the context of their role in signaling and pathophysiology. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. The "Wow! signal" of the terrestrial genetic code

    Science.gov (United States)

    shCherbak, Vladimir I.; Makukov, Maxim A.

    2013-05-01

    It has been repeatedly proposed to expand the scope for SETI, and one of the suggested alternatives to radio is the biological media. Genomic DNA is already used on Earth to store non-biological information. Though smaller in capacity, but stronger in noise immunity is the genetic code. The code is a flexible mapping between codons and amino acids, and this flexibility allows modifying the code artificially. But once fixed, the code might stay unchanged over cosmological timescales; in fact, it is the most durable construct known. Therefore it represents an exceptionally reliable storage for an intelligent signature, if that conforms to biological and thermodynamic requirements. As the actual scenario for the origin of terrestrial life is far from being settled, the proposal that it might have been seeded intentionally cannot be ruled out. A statistically strong intelligent-like "signal" in the genetic code is then a testable consequence of such scenario. Here we show that the terrestrial code displays a thorough precision-type orderliness matching the criteria to be considered an informational signal. Simple arrangements of the code reveal an ensemble of arithmetical and ideographical patterns of the same symbolic language. Accurate and systematic, these underlying patterns appear as a product of precision logic and nontrivial computing rather than of stochastic processes (the null hypothesis that they are due to chance coupled with presumable evolutionary pathways is rejected with P-value artificiality, among which are the symbol of zero, the privileged decimal syntax and semantical symmetries. Besides, extraction of the signal involves logically straightforward but abstract operations, making the patterns essentially irreducible to any natural origin. Plausible ways of embedding the signal into the code and possible interpretation of its content are discussed. Overall, while the code is nearly optimized biologically, its limited capacity is used extremely

  5. Space-Time Coding and Signal Processing for MIMO Communications

    Institute of Scientific and Technical Information of China (English)

    Inaki Berenguer; Xiaodong Wang

    2003-01-01

    Rapid growth in mobile computing and other wireless multimedia services is inspiring many research and development activities on high-speed wireless communication systems.Main challenges in this area include the development of efficient coding and modulation signal processing techniques for improving the quality and spectral efficiency of wireless systems. The recently emerged space-time coding and signal processing techniques for wireless communication systems employing multiple transmit and receive antennas offer a powerful paradigm for meeting these challenges. This paper provides an overview on the recent development in space-time coding and signal processing techniques for multiple-input multiple-output (MIMO) communication systems. We first review the information theoretic results on the capacities of wireless systems employing multiple transmit and receive antennas. We then describe two representative categories of space-time systems, namely, the BLAST system and the space-time block coding system, both of which have been proposed for next-generation high-speed wireless system. Signal processing techniques for channel estimation and decoding in space-time systems are also discussed. Finally, some other coding and signal processing techniques for wireless systems employing multiple transmit and receive antennas that are currently under intensive research are also briefly touched upon.

  6. P-code enhanced method for processing encrypted GPS signals without knowledge of the encryption code

    Science.gov (United States)

    Meehan, Thomas K. (Inventor); Thomas, Jr., Jess Brooks (Inventor); Young, Lawrence E. (Inventor)

    2000-01-01

    In the preferred embodiment, an encrypted GPS signal is down-converted from RF to baseband to generate two quadrature components for each RF signal (L1 and L2). Separately and independently for each RF signal and each quadrature component, the four down-converted signals are counter-rotated with a respective model phase, correlated with a respective model P code, and then successively summed and dumped over presum intervals substantially coincident with chips of the respective encryption code. Without knowledge of the encryption-code signs, the effect of encryption-code sign flips is then substantially reduced by selected combinations of the resulting presums between associated quadrature components for each RF signal, separately and independently for the L1 and L2 signals. The resulting combined presums are then summed and dumped over longer intervals and further processed to extract amplitude, phase and delay for each RF signal. Precision of the resulting phase and delay values is approximately four times better than that obtained from straight cross-correlation of L1 and L2. This improved method provides the following options: separate and independent tracking of the L1-Y and L2-Y channels; separate and independent measurement of amplitude, phase and delay L1-Y channel; and removal of the half-cycle ambiguity in L1-Y and L2-Y carrier phase.

  7. All-optical network coding for DPSK signals

    DEFF Research Database (Denmark)

    An, Yi; Da Ros, Francesco; Peucheret, Christophe

    2013-01-01

    All-optical network coding for path protection is experimentally demonstrated using four-wave mixing in SOAs for10 Gbit/s NRZ-DPSK signals with error free performance. The total power penalty after two cascaded XOR stage is only 2 dB.......All-optical network coding for path protection is experimentally demonstrated using four-wave mixing in SOAs for10 Gbit/s NRZ-DPSK signals with error free performance. The total power penalty after two cascaded XOR stage is only 2 dB....

  8. Fundamentals of an Optimal Multirate Subband Coding of Cyclostationary Signals

    Directory of Open Access Journals (Sweden)

    D. Kula

    2000-06-01

    Full Text Available A consistent theory of optimal subband coding of zero mean wide-sense cyclostationary signals, with N-periodic statistics, is presented in this article. An M-channel orthonormal uniform filter bank, employing N-periodic analysis and synthesis filters, is used while an average variance condition is applied to evaluate the output distortion. In three lemmas and final theorem, the necessity of decorrelation of blocked subband signals and requirement of specific ordering of power spectral densities are proven.

  9. Is the functional stretch response servo controlled or preprogrammed?

    Science.gov (United States)

    Chan, C W; Kearney, R E

    1982-03-01

    Recent findings in humans and primates suggest that the long latency electromyographic (EMG) responses, evoked by opposing sudden limb displacements, might be mediated via a transcortical pathway. However, it is not clear whether these "late" responses are servo controlled or preprogrammed. We have addressed these questions in two interrelated experimental series. Firstly, the late EMG responses (termed the FSR) evoked in the ankle muscles of 8-12 normal human subjects were mapped as a function of displacement amplitude and velocity. Secondly, the FSR evoked by sustained ramp displacements (lasting 500 msec) were compared with those elicited by transient pulse displacements (lasting 60 msec) having entirely different amplitude and velocity profiles. The findings demonstrated a general lack of a systematic relationship between the characteristics of the initial component of the FSR and displacement parameters, although exceptions were noted in individual subjects. Furthermore, no marked difference was found in either the latency or the rise time of the FSRs evoked by ramp and pulse displacements. The similarity of the FSRs in spite of widely different input patterns is not consistent with the behaviour of a servo response. However, such a finding is in agreement with the concept of a preprogrammed pattern of activity which, once triggered, has to run its full course without the possibility of modification. It is therefore concluded that, at least the initial part of the FSR is generated by the triggered release of a preformulated pattern of intended movement relatively independent of the specific pattern of limb displacement, rather than acting in the manner of a servo mechanism.

  10. Modeling Guidelines for Code Generation in the Railway Signaling Context

    Science.gov (United States)

    Ferrari, Alessio; Bacherini, Stefano; Fantechi, Alessandro; Zingoni, Niccolo

    2009-01-01

    Modeling guidelines constitute one of the fundamental cornerstones for Model Based Development. Their relevance is essential when dealing with code generation in the safety-critical domain. This article presents the experience of a railway signaling systems manufacturer on this issue. Introduction of Model-Based Development (MBD) and code generation in the industrial safety-critical sector created a crucial paradigm shift in the development process of dependable systems. While traditional software development focuses on the code, with MBD practices the focus shifts to model abstractions. The change has fundamental implications for safety-critical systems, which still need to guarantee a high degree of confidence also at code level. Usage of the Simulink/Stateflow platform for modeling, which is a de facto standard in control software development, does not ensure by itself production of high-quality dependable code. This issue has been addressed by companies through the definition of modeling rules imposing restrictions on the usage of design tools components, in order to enable production of qualified code. The MAAB Control Algorithm Modeling Guidelines (MathWorks Automotive Advisory Board)[3] is a well established set of publicly available rules for modeling with Simulink/Stateflow. This set of recommendations has been developed by a group of OEMs and suppliers of the automotive sector with the objective of enforcing and easing the usage of the MathWorks tools within the automotive industry. The guidelines have been published in 2001 and afterwords revisited in 2007 in order to integrate some additional rules developed by the Japanese division of MAAB [5]. The scope of the current edition of the guidelines ranges from model maintainability and readability to code generation issues. The rules are conceived as a reference baseline and therefore they need to be tailored to comply with the characteristics of each industrial context. Customization of these

  11. Scalable Video Coding with Interlayer Signal Decorrelation Techniques

    Directory of Open Access Journals (Sweden)

    Yang Wenxian

    2007-01-01

    Full Text Available Scalability is one of the essential requirements in the compression of visual data for present-day multimedia communications and storage. The basic building block for providing the spatial scalability in the scalable video coding (SVC standard is the well-known Laplacian pyramid (LP. An LP achieves the multiscale representation of the video as a base-layer signal at lower resolution together with several enhancement-layer signals at successive higher resolutions. In this paper, we propose to improve the coding performance of the enhancement layers through efficient interlayer decorrelation techniques. We first show that, with nonbiorthogonal upsampling and downsampling filters, the base layer and the enhancement layers are correlated. We investigate two structures to reduce this correlation. The first structure updates the base-layer signal by subtracting from it the low-frequency component of the enhancement layer signal. The second structure modifies the prediction in order that the low-frequency component in the new enhancement layer is diminished. The second structure is integrated in the JSVM 4.0 codec with suitable modifications in the prediction modes. Experimental results with some standard test sequences demonstrate coding gains up to 1 dB for I pictures and up to 0.7 dB for both I and P pictures.

  12. A FAST PARAMETER ESTIMATION ALGORITHM FOR POLYPHASE CODED CW SIGNALS

    Institute of Scientific and Technical Information of China (English)

    Li Hong; Qin Yuliang; Wang Hongqiang; Li Yanpeng; Li Xiang

    2011-01-01

    A fast parameter estimation algorithm is discussed for a polyphase coded Continuous Waveform (CW) signal in Additive White Gaussian Noise (AWGN).The proposed estimator is based on the sum of the modulus square of the ambiguity function at the different Doppler shifts.An iterative refinement stage is proposed to avoid the effect of the spurious peaks that arise when the summation length of the estimator exceeds the subcode duration.The theoretical variance of the subcode rate estimate is derived.The Monte-Carlo simulation results show that the proposed estimator is highly accurate and effective at moderate Signal-to-Noise Ratio (SNR).

  13. Amplitude Modulated Sinusoidal Signal Decomposition for Audio Coding

    DEFF Research Database (Denmark)

    Christensen, M. G.; Jacobson, A.; Andersen, S. V.

    2006-01-01

    In this paper, we present a decomposition for sinusoidal coding of audio, based on an amplitude modulation of sinusoids via a linear combination of arbitrary basis vectors. The proposed method, which incorporates a perceptual distortion measure, is based on a relaxation of a nonlinear least......-squares minimization. Rate-distortion curves and listening tests show that, compared to a constant-amplitude sinusoidal coder, the proposed decomposition offers perceptually significant improvements in critical transient signals....

  14. Adjunctive numerical relation codes in multimedia signal covers

    Science.gov (United States)

    Collins, James C.; Agaian, Sos S.

    2013-05-01

    This paper introduces a new redundant number system, the adjunctive numerical relation (ANR) codes, which offer improvements over other well known systems such as the Fibonacci, Lucas, and the Prime number systems when used in multimedia data hiding applications. It will be shown that this new redundant number system has potential applications in digital communications, signal, and image processing. the paper will also offer two illustrative applications for this new redundant coding system. First an enhanced bit-plane decomposition of image formatted files with data embedding (steganography and watermarking). Secondly, an example of an expanded bit-line decomposition of audio formatted files with data embedding and index-based retrieval capability will be described. The computer simulations will detail the statistical stability required for effective data encoding techniques and demonstrate the improvements in the embedding capacity in multimedia carriers.

  15. FREQUENCY-CODED OPTIMIZATION OF HOPPED-FREQUENCY PULSE SIGNAL BASED ON GENETIC ALGORITHM

    Institute of Scientific and Technical Information of China (English)

    Liu Zheng; Mu Xuehua

    2005-01-01

    The Frequency-Coded Pulse (FCP) signal has good performance of range and Doppler resolution. This paper first gives the mathematical expression of the ambiguity function for FCP signals, and then presents a coding rule for optimizing FCP signal. The genetic algorithm is presented to solve this kind of problem for optimizing codes. Finally, an example for optimizing calculation is illustrated and the optimized frequency coding results are given with the code length N=64 and N=128 respectively.

  16. Tools for signal compression applications to speech and audio coding

    CERN Document Server

    Moreau, Nicolas

    2013-01-01

    This book presents tools and algorithms required to compress/uncompress signals such as speech and music. These algorithms are largely used in mobile phones, DVD players, HDTV sets, etc. In a first rather theoretical part, this book presents the standard tools used in compression systems: scalar and vector quantization, predictive quantization, transform quantization, entropy coding. In particular we show the consistency between these different tools. The second part explains how these tools are used in the latest speech and audio coders. The third part gives Matlab programs simulating t

  17. 47 CFR 11.51 - EAS code and Attention Signal Transmission requirements.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false EAS code and Attention Signal Transmission... SYSTEM (EAS) Emergency Operations § 11.51 EAS code and Attention Signal Transmission requirements. (a... messages and required tests by sending the EAS header codes, Attention Signal, emergency message and End...

  18. Computationally efficient sub-band coding of ECG signals.

    Science.gov (United States)

    Husøy, J H; Gjerde, T

    1996-03-01

    A data compression technique is presented for the compression of discrete time electrocardiogram (ECG) signals. The compression system is based on sub-band coding, a technique traditionally used for compressing speech and images. The sub-band coder employs quadrature mirror filter banks (QMF) with up to 32 critically sampled sub-bands. Both finite impulse response (FIR) and the more computationally efficient infinite impulse response (IIR) filter banks are considered as candidates in a complete ECG coding system. The sub-bands are threshold, quantized using uniform quantizers and run-length coded. The output of the run-length coder is further compressed by a Huffman coder. Extensive simulations indicate that 16 sub-bands are a suitable choice for this application. Furthermore, IIR filter banks are preferable due to their superiority in terms of computational efficiency. We conclude that the present scheme, which is suitable for real time implementation on a PC, can provide compression ratios between 5 and 15 without loss of clinical information.

  19. 47 CFR 11.52 - EAS code and Attention Signal Monitoring requirements.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false EAS code and Attention Signal Monitoring... SYSTEM (EAS) Emergency Operations § 11.52 EAS code and Attention Signal Monitoring requirements. (a) EAS Participants must be capable of receiving the Attention Signal required by § 11.32(a)(9) and emergency...

  20. Connect and immerse: a poetry of codes and signals

    Directory of Open Access Journals (Sweden)

    Jesper Olsson

    2012-06-01

    Full Text Available This article investigates how codes and signals were employed in avant-garde poetry and art in the 1960s, and how such attempts were performed in the wake of cybernetics and (partly through the use of new media technologies, such as the tape recorder and the computer. This poetry—as exemplified here by works by Åke Hodell, Peter Weibel, and Henri Chopin—not only employed new materials, media, and methods for the production of poems; it also transformed the interface of literature and the act of reading through immersion in sound, through the activation of different cognitive modes, and through an intersensorial address. On the one hand, this literary and artistic output can be seen as a response to the increasing intermedation (in Katherine Hayles's sense in culture and society during the last century. On the other hand, we might, as contemporary readers, return to these poetic works in order to use them as media archaeological tools that might shed light on the aesthetic transformations taking place within new media today.

  1. P-Code-Enhanced Encryption-Mode Processing of GPS Signals

    Science.gov (United States)

    Young, Lawrence; Meehan, Thomas; Thomas, Jess B.

    2003-01-01

    A method of processing signals in a Global Positioning System (GPS) receiver has been invented to enable the receiver to recover some of the information that is otherwise lost when GPS signals are encrypted at the transmitters. The need for this method arises because, at the option of the military, precision GPS code (P-code) is sometimes encrypted by a secret binary code, denoted the A code. Authorized users can recover the full signal with knowledge of the A-code. However, even in the absence of knowledge of the A-code, one can track the encrypted signal by use of an estimate of the A-code. The present invention is a method of making and using such an estimate. In comparison with prior such methods, this method makes it possible to recover more of the lost information and obtain greater accuracy.

  2. Efficient Signal-Time Coding Design and its Application in Wireless Gaussian Relay Networks

    CERN Document Server

    Fan, Pingyi; Letaief, Khaled Ben

    2009-01-01

    Signal-time coding, which combines the traditional encoding/modulation mode in the signal domain with signal pulse phase modulation in the time domain, was proposed to improve the information flow rate in relay networks. In this paper, we mainly focus on the efficient signal-time coding design. We first derive an explicit iterative algorithm to estimate the maximum number of available codes given the code length of signal-time coding, and then present an iterative construction method of codebooks. It is shown that compared with conventional computer search, the proposed iterative construction method can reduce the complexity greatly. Numerical results will also indicate that the new constructed codebook is optimal in terms of coding rate. To minimize the buffer size needed to store the codebook while keeping a relatively high efficiency, we shall propose a combinatorial construction method. We will then consider applications in wireless Gaussian relay networks. It will be shown that in the three node network ...

  3. An Ionizing Radiation Sensor Using a Pre-Programmed MAHAOS Device

    Directory of Open Access Journals (Sweden)

    Wen-Ching Hsieh

    2014-08-01

    Full Text Available Metal-aluminum oxide–hafnium aluminum oxide‒silicon oxide–silicon (hereafter MAHAOS devices can be candidates for ionizing radiation sensor applications. In this work, MAHAOS devices (SONOS-like structures with high k stack gate dielectric were studied regarding the first known characterization of the ionization radiation sensing response. The change of threshold voltage VT for a MAHAOS device after gamma ray exposure had a strong correlation to the total ionization dose (TID of gamma radiation up to at least 5 Mrad TID. In this paper, the gamma radiation response performances of the pre-programmed and virgin (non-pre-programmed MAHAOS devices are presented. The experimental data show that the change of VT for the pre-programmed MAHAOS device with gamma irradiation is very significant. The data of pre-programmed MAHAOS devices written by 5 Mrad TID of gamma radiation was also stable for a long time with data storage. The sensing of gamma radiation by pre-programmed MAHAOS devices with high k stack gate dielectric reported in this study has demonstrated their potential application for non-volatile ionizing radiation sensing technology in the future.

  4. An all-digital receiver for satellite audio broadcasting signals using trellis coded quasi-orthogonal code-division multiplexing

    Science.gov (United States)

    Braun, Walter; Eglin, Peter; Abello, Ricard

    1993-02-01

    Spread Spectrum Code Division Multiplex is an attractive scheme for the transmission of multiple signals over a satellite transponder. By using orthogonal or quasi-orthogonal spreading codes the interference between the users can be virtually eliminated. However, the acquisition and tracking of the spreading code phase can not take advantage of the code orthogonality since sequential acquisition and Delay-Locked loop tracking depend on correlation with code phases other than the optimal despreading phase. Hence, synchronization is a critical issue in such a system. A demonstration hardware for the verification of the orthogonal CDM synchronization and data transmission concept is being designed and implemented. The system concept, the synchronization scheme, and the implementation are described. The performance of the system is discussed based on computer simulations.

  5. Calculus of the Power Spectral Density of Ultra Wide Band Pulse Position Modulation Signals Coded with Totally Flipped Code

    Directory of Open Access Journals (Sweden)

    DURNEA, T. N.

    2009-02-01

    Full Text Available UWB-PPM systems were noted to have a power spectral density (p.s.d. consisting of a continuous portion and a line spectrum, which is composed of energy components placed at discrete frequencies. These components are the major source of interference to narrowband systems operating in the same frequency interval and deny harmless coexistence of UWB-PPM and narrowband systems. A new code denoted as Totally Flipped Code (TFC is applied to them in order to eliminate these discrete spectral components. The coded signal transports the information inside pulse position and will have the amplitude coded to generate a continuous p.s.d. We have designed the code and calculated the power spectral density of the coded signals. The power spectrum has no discrete components and its envelope is largely flat inside the bandwidth with a maximum at its center and a null at D.C. These characteristics make this code suited for implementation in the UWB systems based on PPM-type modulation as it assures a continuous spectrum and keeps PPM modulation performances.

  6. Modified Suboptimal Iterative Decoding for Regular Repeat- Accumulate Coded Signals

    Directory of Open Access Journals (Sweden)

    Muhammad Thamer Nesr

    2017-05-01

    Full Text Available In this work, two algorithms are suggested in order to improve the performance of systematic Repeat-Accumulate ( decoding. The first one is accomplished by the insertion of pilot symbols among the data stream that entering the encoder. The positions where pilots should be inserted are chosen in such a way that to improve the minimum Hamming distance and/or to reduce the error coefficients of the code. The second proposed algorithm includes the utilization of the inserted pilots to estimate scaling (correction factors. Two-dimensional correction factor was suggested in order to enhance the performance of traditional Minimum-Sum decoding of regular repeat accumulate codes. An adaptive method can be achieved for getting the correction factors by calculating the mean square difference between the values of received pilots and the a-posteriori data of bit and check node related to them which created by the minimum-sum ( decoder

  7. Code division multiple access signaling for modulated reflector technology

    Science.gov (United States)

    Briles, Scott D [Los Alamos, NM

    2012-05-01

    A method and apparatus for utilizing code division multiple access in modulated reflectance transmissions comprises the steps of generating a phase-modulated reflectance data bit stream; modifying the modulated reflectance data bit stream; providing the modified modulated reflectance data bit stream to a switch that connects an antenna to an infinite impedance in the event a "+1" is to be sent, or connects the antenna to ground in the event a "0" or a "-1" is to be sent.

  8. Video signal coding with DCT and vector quantization

    Science.gov (United States)

    Bellifemine, Fabio; Picco, Romualdo

    1994-02-01

    In this paper, an image coding scheme using the Discrete Cosine Transform is analyzed when the transform coefficients are vector quantized. The coding method is based on the known scheme proposed by W. Chen which sorts the picture blocks into classes according to the level of image activity. The coding scheme is modified to allow for vector quantization of the ac coefficients, in particular a Pyramid Vector Quantizer (PVQ) is used. This is based on the statistical and geometric properties of a Laplacian source which, in fact, is the best model for the ac coefficients of the two-dimensional Discrete Cosine Transform (2D-DCT) of an image. A method for forming almost statistically independent vectors is also suggested and improves quantization performance. Images are encoded with both the PVQ and standard scalar quantizer transform coders, demonstrating that the PVQ coder reduces the mean square encoding error and improves image quality. In particular, emphasis is given to how the use of fractional bit rates affects the objective and subjective gains obtained. The results presented (i.e. mean square error values and printed images) have been obtained experimentally, working with a statistical criterion in a group of images whose size was in accordance with the 50 Hz CCIR Recommendation 601 Standard.

  9. Iterative Signal Processing for Blind Code Phase Acquisition of CDMA 1x Signals for Radio Spectrum Monitoring

    Directory of Open Access Journals (Sweden)

    Ron Kerr

    2010-01-01

    Full Text Available This paper addresses the problem of recovering the code phase of the composite spreading sequence for a CDMA 1x signal transmitted from a handset, without the benefit of a priori information from the system. The spreading code is required for the radio spectrum monitoring system for signal detection and measurements rather than for communications. The structure of the CDMA 1x signal is exploited by processing sequential pairs of received samples to form a single soft sample for each pair. The approach models the combination of the long-code generator and the two short-code generators, along with the pair-wise processing, by a single linear system over GF(2, with the initial states of the long- and short-code generators forming the input vector. Consequently, a vector of the pair-wise soft samples can be treated as a noisy received codeword that is decoded using iterative soft-in decoding techniques. If the decoder yields the correct candidate “codeword,” the original states of the code generators can be computed. This approach does not require direct access to the transmitted spreading sequence but can be applied to the data modulated signal. Simulation results provide performance estimates of the method with noise, Rayleigh fading, and co-channel interference.

  10. Video coding with lifted wavelet transforms and complementary motion-compensated signals

    Science.gov (United States)

    Flierl, Markus H.; Vandergheynst, Pierre; Girod, Bernd

    2004-01-01

    This paper investigates video coding with wavelet transforms applied in the temporal direction of a video sequence. The wavelets are implemented with the lifting scheme in order to permit motion compensation between successive pictures. We improve motion compensation in the lifting steps and utilize complementary motion-compensated signals. Similar to superimposed predictive coding with complementary signals, this approach improves compression efficiency. We investigate experimentally and theoretically complementary motion-compensated signals for lifted wavelet transforms. Experimental results with the complementary motion-compensated Haar wavelet and frame-adaptive motion compensation show improvements in coding efficiency of up to 3 dB. The theoretical results demonstrate that the lifted Haar wavelet scheme with complementary motion-compensated signals is able to approach the bound for bit-rate savings of 2 bits per sample and motion-accuracy step when compared to optimum intra-frame coding of the input pictures.

  11. Decoding the phosphorylation code in Hedgehog signal transduction

    Institute of Scientific and Technical Information of China (English)

    Yongbin Chen; Jin Jiang

    2013-01-01

    Hedgehog (Hh) signaling plays pivotal roles in embryonic development and adult tissue homeostasis,and its deregulation leads to numerous human disorders including cancer.Binding of Hh to Patched (Ptc),a twelve-transmembrane protein,alleviates its inhibition of Smoothened (Smo),a seven-transmembrane protein related to G-proteincoupled receptors (GPCRs),leading to Smo phosphorylation and activation.Smo acts through intracellular signaling complexes to convert the latent transcription factor Cubitus interruptus (Ci)/Gli from a truncated repressor to a fulllength activator,leading to derepression/activation of Hh target genes.Increasing evidence suggests that phosphorylation participates in almost every step in the signal relay from Smo to Ci/Gli,and that differential phosphorylation of several key pathway components may be crucial for translating the Hh morphogen gradient into graded pathway activities.In this review,we focus on the multifaceted roles that phosphorylation plays in Hh signal transduction,and discuss the conservation and difference between Drosophila and mammalian Hh signaling mechanisms.

  12. Coding and signal processing for magnetic recording systems

    CERN Document Server

    Vasic, Bane

    2004-01-01

    RECORDING SYSTEMSA BriefHistory of Magnetic Storage, Dean PalmerPhysics of Longitudinal and Perpendicular Recording, Hong Zhou, Tom Roscamp, Roy Gustafson, Eric Boernern, and Roy ChantrellThe Physics of Optical Recording, William A. Challener and Terry W. McDanielHead Design Techniques for Recording Devices, Robert E. RottmayerCOMMUNICATION AND INFORMATION THEORY OF MAGNETIC RECORDING CHANNELSModeling the Recording Channel, Jaekyun MoonSignal and Noise Generation for Magnetic Recording Channel Simulations, Xueshi Yang and Erozan M. KurtasStatistical Analysis of Digital Signals and Systems, Dra

  13. Communication theory and signal processing for transform coding

    CERN Document Server

    El-Shennawy, Khamies Mohammed Ali

    2014-01-01

    This book is tailored to fulfil the requirements in the area of the signal processing in communication systems. The book contains numerous examples, solved problems and exercises to explain the methodology of Fourier Series, Fourier Analysis, Fourier Transform and properties, Fast Fourier Transform FFT, Discrete Fourier Transform DFT and properties, Discrete Cosine Transform DCT, Discrete Wavelet Transform DWT and Contourlet Transform CT. The book is characterized by three directions, the communication theory and signal processing point of view, the mathematical point of view and utility compu

  14. Signal analysis and processing for random binary phase coded pulse radar

    Institute of Scientific and Technical Information of China (English)

    孙光民; 刘国岁; 顾红

    2004-01-01

    The application of the random binary phase coded signal in the CW radar system has been limited by the difficulty to isolate the tranmission and reception signal. In order to make use of the random binary phase coded signal, the random binary phase coded pulse radar (RBPC-PR) system has been studied. First, the average ambiguity function (AAF) of the RBPC-PR signal has been analyzed. Then, a statistical method of reducing the range sidelobe (RSL) is presented. Finally, a signal processing scheme of the RBPC-PR is developed. The simulation results show that by using the scheme, the jamming immunity of the system, the resolution and accuracy of distance and velocity have been improved, and the distance and velocity vagueness caused by periods can also be removed. The RSL can be reduced over 30dB by the statistical average method, thus the probability ambiguity caused by random noise can be avoided.

  15. The Effect of Intermittent Signal on the Performance of Code Tracking Loop in GNSS Receivers

    Directory of Open Access Journals (Sweden)

    Chung-Liang Chang

    2011-01-01

    Full Text Available This paper analyzes the code tracking performance in the presence of signal blanking in Global Navigation Satellite System (GNSS. The blanking effect is usually caused by buildings that obscure the signal in either a periodic or random manner. In some cases, ideal blanking is used to remove random or periodic interference. Nevertheless, the effect of temporary discontinuity of signal often leads to the tracking and position error. To analyze this problem, three types of blanking model are considered: no blanking, periodic blanking, and random blanking of the signals input into the code tracking loop. The mean time to lose lock (MTLL is to assess the performance of code tracking system under signal blanking. Finally, the effect of steady-state tracking errors on the performance of tracking loop resulting from blanking environment is also discussed.

  16. Comparison of skin sensory thresholds using pre-programmed or single-frequency transcutaneous electrical nerve stimulation.

    Science.gov (United States)

    Kang, Jong Ho

    2015-12-01

    [Purpose] The purpose of the present study was to compare the sensory thresholds of healthy subjects using pre-programmed or single-frequency transcutaneous electrical nerve stimulation. [Subjects] Ninety healthy adult subjects were randomly assigned to pre-programmed or single-frequency stimulation groups, each consisting of 45 participants. [Methods] Sensory thresholds were measured in the participants' forearms using von Frey filaments before and after pre-programmed or single-frequency transcutaneous electrical nerve stimulation, and the result in values were analyzed. [Results] Significant increases in sensory threshold after stimulation were observed in both groups. However, there were no significant differences between the two groups in sensory thresholds after stimulation or in the magnitude of threshold increases following stimulation. [Conclusion] Our results show that there are no differences between sensory threshold increases induced by pre-programmed and single-frequency transcutaneous electrical nerve stimulation.

  17. Signal-to-noise-optimal scaling of heterogenous population codes.

    Science.gov (United States)

    Leibold, Christian

    2013-01-01

    Similarity measures for neuronal population responses that are based on scalar products can be little informative if the neurons have different firing statistics. Based on signal-to-noise optimality, this paper derives positive weighting factors for the individual neurons' response rates in a heterogeneous neuronal population. The weights only depend on empirical statistics. If firing follows Poisson statistics, the weights can be interpreted as mutual information per spike. The scaling is shown to improve linear separability and clustering as compared to unscaled inputs.

  18. Analysis and compensation for code Doppler effect of BDS II signal under high dynamics

    Science.gov (United States)

    Ouyang, Xiaofeng; Zeng, Fangling

    2016-01-01

    In high dynamic circumstances, the acquisition of BDS (BeiDou Navigation Satellite System) signal would be affected by the pseudo-code Doppler. The pseudo-code frequency shift is more prominent and complex when BOC modulation has been adopted by BDS-II, but is not yet involved in current compensation algorithm. In addition, the most frequently used code Doppler compensation algorithm is modifying the sampling rate or local bit rate, which not only increases the complexity of the acquisition and tracking, but also is barely realizable for the hardware receiver to modify the local frequency. Therefore, this paper proposes a code Doppler compensation method based on double estimator receiver, which simultaneously controls NCO delay of code tracking loop and subcarrier tracking loop to compensate for pseudo-code frequency shift. The simulation and test are implemented with BDS-II BOC signal. The test results demonstrate that the proposed algorithm can effectively compensate for pseudo-code Doppler of BOC signal and has detection probability 3dB higher than the uncompensated situation when the false alarm rate is under 0.01 and the coherent integration time is 1ms.

  19. A distributed code for colour in natural scenes derived from centre-surround filtered cone signals

    Directory of Open Access Journals (Sweden)

    Christian Johannes Kellner

    2013-09-01

    Full Text Available In the retina of trichromatic primates, chromatic information is encoded in an opponent fashion and transmitted to the lateral geniculate nucleus (LGN and visual cortex via parallel pathways. Chromatic selectivities of neurons in the LGN form two separate clusters, corresponding to two classes of cone opponency. In the visual cortex, however, the chromatic selectivities are more distributed, which is in accordance with a population code for colour. Previous studies of cone signals in natural scenes typically found opponent codes with chromatic selectivities corresponding to two directions in colour space. Here we investigated how the nonlinear spatiochromatic filtering in the retina influences the encoding of colour signals. Cone signals were derived from hyperspectral images of natural scenes and pre-processed by centre-surround filtering and rectification, resulting in parallel ON and OFF channels. Independent Component Analysis on these signals yielded a highly sparse code with basis functions that showed spatio-chromatic selectivities. In contrast to previous analyses of linear transformations of cone signals, chromatic selectivities were not restricted to two main chromatic axes, but were more continuously distributed in colour space, similar to the population code of colour in the early visual cortex. Our results indicate that spatiochromatic processing in the retina leads to a more distributed and more efficient code for natural scenes.

  20. Comparison study of EMG signals compression by methods transform using vector quantization, SPIHT and arithmetic coding.

    Science.gov (United States)

    Ntsama, Eloundou Pascal; Colince, Welba; Ele, Pierre

    2016-01-01

    In this article, we make a comparative study for a new approach compression between discrete cosine transform (DCT) and discrete wavelet transform (DWT). We seek the transform proper to vector quantization to compress the EMG signals. To do this, we initially associated vector quantization and DCT, then vector quantization and DWT. The coding phase is made by the SPIHT coding (set partitioning in hierarchical trees coding) associated with the arithmetic coding. The method is demonstrated and evaluated on actual EMG data. Objective performance evaluations metrics are presented: compression factor, percentage root mean square difference and signal to noise ratio. The results show that method based on the DWT is more efficient than the method based on the DCT.

  1. Evaluation of correlation property of linear-frequency-modulated signals coded by maximum-length sequences

    Science.gov (United States)

    Yamanaka, Kota; Hirata, Shinnosuke; Hachiya, Hiroyuki

    2016-07-01

    Ultrasonic distance measurement for obstacles has been recently applied in automobiles. The pulse-echo method based on the transmission of an ultrasonic pulse and time-of-flight (TOF) determination of the reflected echo is one of the typical methods of ultrasonic distance measurement. Improvement of the signal-to-noise ratio (SNR) of the echo and the avoidance of crosstalk between ultrasonic sensors in the pulse-echo method are required in automotive measurement. The SNR of the reflected echo and the resolution of the TOF are improved by the employment of pulse compression using a maximum-length sequence (M-sequence), which is one of the binary pseudorandom sequences generated from a linear feedback shift register (LFSR). Crosstalk is avoided by using transmitted signals coded by different M-sequences generated from different LFSRs. In the case of lower-order M-sequences, however, the number of measurement channels corresponding to the pattern of the LFSR is not enough. In this paper, pulse compression using linear-frequency-modulated (LFM) signals coded by M-sequences has been proposed. The coding of LFM signals by the same M-sequence can produce different transmitted signals and increase the number of measurement channels. In the proposed method, however, the truncation noise in autocorrelation functions and the interference noise in cross-correlation functions degrade the SNRs of received echoes. Therefore, autocorrelation properties and cross-correlation properties in all patterns of combinations of coded LFM signals are evaluated.

  2. Preprogrammed capillarity to passively control system-level sequential and parallel microfluidic flows.

    Science.gov (United States)

    Kim, Sung-Jin; Paczesny, Sophie; Takayama, Shuichi; Kurabayashi, Katsuo

    2013-06-01

    In microfluidics, capillarity-driven solution flow is often beneficial, owing to its inherently spontaneous motion. However, it is commonly perceived that, in an integrated microfluidic system, the passive capillarity control alone can hardly achieve well-controlled sequential and parallel flow of multiple solutions. Despite this common notion, we hereby demonstrate system-level sequential and parallel microfluidic flow processing by fully passive capillarity-driven control. After manual loading of solutions with a pipette, a network of microfluidic channels passively regulates the flow timing of the multiple solution menisci in a sequential and synchronous manner. Also, use of auxiliary channels and preprogramming of inlet-well meniscus pressure and channel fluidic conductance allow for controlling the flow direction of multiple solutions in our microfluidic system. With those components orchestrated in a single device chip, we show preprogrammed flow control of 10 solutions. The demonstrated system-level flow control proves capillarity as a useful means even for sophisticated microfluidic processing without any actively controlled valves and pumps.

  3. Demonstration of optical steganography transmission using temporal phase coded optical signals with spectral notch filtering.

    Science.gov (United States)

    Hong, Xuezhi; Wang, Dawei; Xu, Lei; He, Sailing

    2010-06-07

    A novel approach is proposed and experimentally demonstrated for optical steganography transmission in WDM networks using temporal phase coded optical signals with spectral notch filtering. A temporal phase coded stealth channel is temporally and spectrally overlaid onto a public WDM channel. Direct detection of the public channel is achieved in the presence of the stealth channel. The interference from the public channel is suppressed by spectral notching before the detection of the optical stealth signal. The approach is shown to have good compatibility and robustness to the existing WDM network for optical steganography transmission.

  4. Compression and Encryption of ECG Signal Using Wavelet and Chaotically Huffman Code in Telemedicine Application.

    Science.gov (United States)

    Raeiatibanadkooki, Mahsa; Quchani, Saeed Rahati; KhalilZade, MohammadMahdi; Bahaadinbeigy, Kambiz

    2016-03-01

    In mobile health care monitoring, compression is an essential tool for solving storage and transmission problems. The important issue is able to recover the original signal from the compressed signal. The main purpose of this paper is compressing the ECG signal with no loss of essential data and also encrypting the signal to keep it confidential from everyone, except for physicians. In this paper, mobile processors are used and there is no need for any computers to serve this purpose. After initial preprocessing such as removal of the baseline noise, Gaussian noise, peak detection and determination of heart rate, the ECG signal is compressed. In compression stage, after 3 steps of wavelet transform (db04), thresholding techniques are used. Then, Huffman coding with chaos for compression and encryption of the ECG signal are used. The compression rates of proposed algorithm is 97.72 %. Then, the ECG signals are sent to a telemedicine center to acquire specialist diagnosis by TCP/IP protocol.

  5. Improved FFTBM by signal mirroring as a tool for code assessment

    Energy Technology Data Exchange (ETDEWEB)

    Andrej, Prosek; Matjaz, Leskovar [Jozef Stefan Institute, Ljubljana (Slovenia)

    2007-07-01

    Comparison between experimental measurements and calculated results is very important for thermal-hydraulic code qualification. Recently the original fast Fourier transform based method (FFTBM) intended for quantitative assessment of code calculations was applied to severe accident FPT1 test (International Standard Problem ISP-46) calculations. It was observed that FFTBM favors certain trends when an edge (difference) is present in the signal between the first and the last data point of the time signal. The purpose of the present study was therefore to improve the FFTBM in this respect. This was achieved by signal mirroring. The improved FFTBM by signal mirroring was demonstrated on the LOFT L2-5 test calculations performed in the frame of the Best-Estimate Methods Uncertainty and Sensitivity Evaluation (BEMUSE) program and the ISP-46 calculation. The results show that the improved FFTBM judges the accuracy in a consistent way. (authors)

  6. BeiDou Signal Acquisition with Neumann–Hoffman Code Modulation in a Degraded Channel

    Directory of Open Access Journals (Sweden)

    Lin Zhao

    2017-02-01

    Full Text Available With the modernization of global navigation satellite systems (GNSS, secondary codes, also known as the Neumann–Hoffman (NH codes, are modulated on the satellite signal to obtain a better positioning performance. However, this leads to an attenuation of the acquisition sensitivity of classic integration algorithms because of the frequent bit transitions that refer to the NH codes. Taking weak BeiDou navigation satellite system (BDS signals as objects, the present study analyzes the side effect of NH codes on acquisition in detail and derives a straightforward formula, which indicates that bit transitions decrease the frequency accuracy. To meet the requirement of carrier-tracking loop initialization, a frequency recalculation algorithm is proposed based on verified fast Fourier transform (FFT to mitigate the effect, meanwhile, the starting point of NH codes is found. Then, a differential correction is utilized to improve the acquisition accuracy of code phase. Monte Carlo simulations and real BDS data tests demonstrate that the new structure is superior to the conventional algorithms both in detection probability and frequency accuracy in a degraded channel.

  7. Random wavelet transforms, algebraic geometric coding, and their applications in signal compression and de-noising

    Energy Technology Data Exchange (ETDEWEB)

    Bieleck, T.; Song, L.M.; Yau, S.S.T. [Univ. of Illinois, Chicago, IL (United States); Kwong, M.K. [Argonne National Lab., IL (United States). Mathematics and Computer Science Div.

    1995-07-01

    The concepts of random wavelet transforms and discrete random wavelet transforms are introduced. It is shown that these transforms can lead to simultaneous compression and de-noising of signals that have been corrupted with fractional noises. Potential applications of algebraic geometric coding theory to encode the ensuing data are also discussed.

  8. Effective number of samples and pseudo-random nonlinear distortions in digital OFDM coded signal

    CERN Document Server

    Rudziński, Adam

    2013-01-01

    This paper concerns theoretical modeling of degradation of signal with OFDM coding caused by pseudo-random nonlinear distortions introduced by an analog-to-digital or digital-to-analog converter. A new quantity, effective number of samples, is defined and used for derivation of accurate expressions for autocorrelation function and the total power of the distortions. The derivation is based on probabilistic model of the signal and its transition probability. It is shown, that for digital (discrete and quantized) signals the effective number of samples replaces the total number of samples and is the proper quantity defining their properties.

  9. Signal processing techniques for phase-coded HF-VHF radars

    Directory of Open Access Journals (Sweden)

    J. A. Baskaradas

    2003-06-01

    Full Text Available HF-VHF radar techniques are easy to employ and commonly used in geophysical applications. They include deep radio soundings, used for probing the ionosphere, stratosphere-mesosphere measurement, weather forecast and radio-glaciology. Fast algorithms and powerful processors facilitate the development of several kinds of low power radars, but the reduction of the transmitted power has to be compensated by on-line processing of an encoded signal to maintain a favorable signal-to-noise ratio suitable for detection. Moreover, radars have to reconstruct return echoes with different travel times due to various origins (multi-path, adjacent objects, etc.. Such needs can be accomplished by means of signal phase coding and one of the most attractive is the reversal phase code. The composite echo signal must be processed to extract the physical information useful for the measurement considered. In this paper some algorithms used for on-line processing of phase-coded signals will be described, both in time and frequency domain.

  10. Temporal Code-Driven Stimulation: Definition and Application to Electric Fish Signaling

    Science.gov (United States)

    Lareo, Angel; Forlim, Caroline G.; Pinto, Reynaldo D.; Varona, Pablo; Rodriguez, Francisco de Borja

    2016-01-01

    Closed-loop activity-dependent stimulation is a powerful methodology to assess information processing in biological systems. In this context, the development of novel protocols, their implementation in bioinformatics toolboxes and their application to different description levels open up a wide range of possibilities in the study of biological systems. We developed a methodology for studying biological signals representing them as temporal sequences of binary events. A specific sequence of these events (code) is chosen to deliver a predefined stimulation in a closed-loop manner. The response to this code-driven stimulation can be used to characterize the system. This methodology was implemented in a real time toolbox and tested in the context of electric fish signaling. We show that while there are codes that evoke a response that cannot be distinguished from a control recording without stimulation, other codes evoke a characteristic distinct response. We also compare the code-driven response to open-loop stimulation. The discussed experiments validate the proposed methodology and the software toolbox. PMID:27766078

  11. Evaluation of the ECHAM family radiation codes performance in the representation of the solar signal

    Directory of Open Access Journals (Sweden)

    T. Sukhodolov

    2014-02-01

    Full Text Available Solar radiation is the main source of energy for the Earth's atmosphere and in many respects defines its composition, photochemistry, temperature profile and dynamics. The magnitude of the solar irradiance variability strongly depends on the wavelength making difficult its representation in climate models. Due to some deficiencies of the applied radiation codes several models fail to show a clear response in middle stratospheric heating rates to solar spectral irradiance variability, therefore it is important to prove reasonable model performance in this respect before doing multiple model runs. In this work we evaluate the performance of three generations of ECHAM (4, 5 and 6 radiation schemes by comparison with the reference high resolution libRadtran code. We found that both original ECHAM5 and 6 solar radiation codes miss almost all solar signal in the heating rates in the mesosphere. In the stratosphere ECHAM5 code reproduces only about a half of the reference signal, while representation of ECHAM6 code is better – it maximally misses about 17% in the upper stratosphere. On the basis of the comparison results we suggest necessary improvements of the ECHAM family codes by inclusion of available parameterizations of the heating rate due to absorption by oxygen (O2 and ozone (O3. Both codes with the introduced parameterizations represent the heating rate response to the spectral solar irradiance variability simulated with libRadtran much better without substantial increase of computer time. The suggested parameterizations are recommended to apply in the middle atmosphere version of the ECHAM-5 and 6 models for the study of the solar irradiance influence on climate.

  12. Non coding RNA: sequence-specific guide for chromatin modification and DNA damage signaling

    Directory of Open Access Journals (Sweden)

    Sofia eFrancia

    2015-11-01

    Full Text Available Chromatin conformation shapes the environment in which our genome is transcribed into RNA. Transcription is a source of DNA damage, thus it often occurs concomitantly to DNA damage signaling. Growing amounts of evidence suggest that different types of RNAs can, independently from their protein-coding properties, directly affect chromatin conformation, transcription and splicing, as well as promote the activation of the DNA damage response (DDR and DNA repair. Therefore, transcription paradoxically functions to both threaten and safeguard genome integrity. On the other hand, DNA damage signaling is known to modulate chromatin to suppress transcription of the surrounding genetic unit. It is thus intriguing to understand how transcription can modulate DDR signaling while, in turn, DDR signaling represses transcription of chromatin around the DNA lesion. An unexpected player in this field is the RNA interference (RNAi machinery, which play roles in transcription, splicing and chromatin modulation in several organisms. Non-coding RNAs (ncRNAs and several protein factors involved in the RNAi pathway are well known master regulators of chromatin while only recent reports suggest that ncRNAs are involved in DDR signaling and homology-mediated DNA repair. Here, we discuss the experimental evidence supporting the idea that ncRNAs act at the genomic loci from which they are transcribed to modulate chromatin, DDR signaling and DNA repair.

  13. Designing a Decision Support System (DSS) for Academic Library Managers Using Preprogrammed Application Software on a Microcomputer.

    Science.gov (United States)

    McDonald, Joseph

    1986-01-01

    Focusing on management decisions in academic libraries, this article compares management information systems (MIS) with decision support systems (DSS) and discusses the decision-making process, information needs of library managers, sources of data, reasons for choosing microcomputer, preprogrammed application software, prototyping a system, and…

  14. [Scar or recurrence--comparison of MRI and color-coded ultrasound with echo signal amplifiers].

    Science.gov (United States)

    Aichinger, U; Schulz-Wendtland, R; Krämer, S; Lell, M; Bautz, W

    2002-11-01

    MRI is the most reliable method to differentiate scar and recurrent carcinoma of the breast after surgical treatment. This study compares MRI and color-coded ultrasound with and without echo signal amplifier (ESA). Forty-two patients with suspected recurrent tumors were enrolled in this prospective study, with 38 patients after breast conserving therapy and 4 after mastectomy. All patients had a clinical examination, mammography (n = 38), real time ultrasound (US), color-coded ultrasound without and with ESA (Levovist(R), Schering, Berlin), and dynamic MRI. The criteria used for duplex ultrasound were tumor vascularisation and flow pattern. The results were compared with histologic findings or the results of follow-up examinations for at least 12 months. The detection of penetrating or central vessels proved to be an accurate sign of malignancy in duplex ultrasound. With the application of ESA, additional vessels were detected within the lesions, increasing the diagnostic accuracy (83 % with ESA versus 79 % without ESA). The sensitivity of color-coded ultrasound improved from 64 % to 86 % with echo signal amplifier. The specificity was 86 % without and 82 % with echo signal amplifier. MRI was found to have a sensitivity of 100 % and a specificity of 82 %. The same 5 lesions were false positive on MRI and color-coded US after Levovist(R). No lesion without signs of vascularity within or in its vicinity was malignant. Color-coded ultrasound seems to be a promising method in the differentiation between scar and recurrence. Lesions with penetrating or central vessels have a high probability of being malignant, whereas lesions without any signs of vascularity inside or nearby have a high probability of being benign. Advantage of contrast-enhanced US is its ubiquitous availability.

  15. The signal sequence coding region promotes nuclear export of mRNA.

    Science.gov (United States)

    Palazzo, Alexander F; Springer, Michael; Shibata, Yoko; Lee, Chung-Sheng; Dias, Anusha P; Rapoport, Tom A

    2007-12-01

    In eukaryotic cells, most mRNAs are exported from the nucleus by the transcription export (TREX) complex, which is loaded onto mRNAs after their splicing and capping. We have studied in mammalian cells the nuclear export of mRNAs that code for secretory proteins, which are targeted to the endoplasmic reticulum membrane by hydrophobic signal sequences. The mRNAs were injected into the nucleus or synthesized from injected or transfected DNA, and their export was followed by fluorescent in situ hybridization. We made the surprising observation that the signal sequence coding region (SSCR) can serve as a nuclear export signal of an mRNA that lacks an intron or functional cap. Even the export of an intron-containing natural mRNA was enhanced by its SSCR. Like conventional export, the SSCR-dependent pathway required the factor TAP, but depletion of the TREX components had only moderate effects. The SSCR export signal appears to be characterized in vertebrates by a low content of adenines, as demonstrated by genome-wide sequence analysis and by the inhibitory effect of silent adenine mutations in SSCRs. The discovery of an SSCR-mediated pathway explains the previously noted amino acid bias in signal sequences and suggests a link between nuclear export and membrane targeting of mRNAs.

  16. Non-Coding RNA: Sequence-Specific Guide for Chromatin Modification and DNA Damage Signaling.

    Science.gov (United States)

    Francia, Sofia

    2015-01-01

    Chromatin conformation shapes the environment in which our genome is transcribed into RNA. Transcription is a source of DNA damage, thus it often occurs concomitantly to DNA damage signaling. Growing amounts of evidence suggest that different types of RNAs can, independently from their protein-coding properties, directly affect chromatin conformation, transcription and splicing, as well as promote the activation of the DNA damage response (DDR) and DNA repair. Therefore, transcription paradoxically functions to both threaten and safeguard genome integrity. On the other hand, DNA damage signaling is known to modulate chromatin to suppress transcription of the surrounding genetic unit. It is thus intriguing to understand how transcription can modulate DDR signaling while, in turn, DDR signaling represses transcription of chromatin around the DNA lesion. An unexpected player in this field is the RNA interference (RNAi) machinery, which play roles in transcription, splicing and chromatin modulation in several organisms. Non-coding RNAs (ncRNAs) and several protein factors involved in the RNAi pathway are well known master regulators of chromatin while only recent reports show their involvement in DDR. Here, we discuss the experimental evidence supporting the idea that ncRNAs act at the genomic loci from which they are transcribed to modulate chromatin, DDR signaling and DNA repair.

  17. Dual-mode immunoassay based on shape code and infrared absorption fingerprint signals of silica nanorods.

    Science.gov (United States)

    Zhao, Pengfei; Ni, Ran; Wang, Kexin; Hong, Xia; Ding, Yadan; Cong, Tie; Liu, Junping; Zhao, Huiying

    2017-07-01

    Silica nanorods were synthesized through a simple one-pot emulsion-droplet-based growth method, in which tetraethylorthosilicate (TEOS) was used as the silica source, ammonia as the catalyst, and polyvinylpyrrolidone (PVP) as the structure-directing agent and stabilizer. By controlling hydrolysis and condensation in the reaction process, we regulated the aspect ratios and the infrared (IR) absorption fingerprint signals (the transverse optical and the longitudinal optical phonon modes) of the silica nanorods. Based on this, a dual-mode immunoassay was performed for detecting model target analyte, human IgG. The shape code of the silica nanorods was used for simple, rapid qualitative, and sensitive semi-quantitative immunoassay by using a conventional optical microscope. The characteristic IR absorption fingerprint signals of the silica nanorods allowed for reliable quantitative immunoassay with good selectivity and high specificity. The detection limit and the linear range were found out to be 0.5 pM and 1 pM-10 nM, respectively. We expect that such dual-mode immunoassay could be applied for the detection of other analytes, such as protein, nucleic acids, bacteria, viruses, explosives, toxins, and so on. Graphical abstract A simple dual-mode immunoassay was performed using the shape code and infrared absorption fingerprint signals of silica nanorods as detection signals.

  18. Preprogrammed, parallel on-chip immunoassay using system-level capillarity control.

    Science.gov (United States)

    Kim, Sung-Jin; Paczesny, Sophie; Takayama, Shuichi; Kurabayashi, Katsuo

    2013-07-16

    Fully manual use of conventional multiwell plates makes enzyme-linked immunosorbent assay (ELISA)-based immunoassays highly time-consuming and labor-intensive. Here, we present a capillarity-driven on-chip immunoassay that greatly saves time and labor with an inexpensive setup. Our immunoassay process starts with pipetting multiple solutions into multiwells constructed on a microfluidic device chip. Subsequently, capillarity spontaneously transports multiple sample solutions and common reagent solutions into assigned detection channels on the chip in a purely passive and preprogrammed manner. Our device implements capillarity-driven immunoassays involving four sample and six reagent solutions within 30 min by orchestrating the functions of on-chip passive components. Notably, our immunoassay technique reduces the total number of pipetting processes by ~5 times, as compared to assays on multiwell plates (48 vs 10). This assay technique allows us to quantify the concentrations of C-reactive protein and suppressor of tumorigenicity 2 with a detection limit of 8 and 90 pM, respectively. This device should be useful for sophisticated, parallel biochemical microfluidic processing in point-of-care settings under limited resources.

  19. A lossless multichannel bio-signal compression based on low-complexity joint coding scheme for portable medical devices.

    Science.gov (United States)

    Kim, Dong-Sun; Kwon, Jin-San

    2014-09-18

    Research on real-time health systems have received great attention during recent years and the needs of high-quality personal multichannel medical signal compression for personal medical product applications are increasing. The international MPEG-4 audio lossless coding (ALS) standard supports a joint channel-coding scheme for improving compression performance of multichannel signals and it is very efficient compression method for multi-channel biosignals. However, the computational complexity of such a multichannel coding scheme is significantly greater than that of other lossless audio encoders. In this paper, we present a multichannel hardware encoder based on a low-complexity joint-coding technique and shared multiplier scheme for portable devices. A joint-coding decision method and a reference channel selection scheme are modified for a low-complexity joint coder. The proposed joint coding decision method determines the optimized joint-coding operation based on the relationship between the cross correlation of residual signals and the compression ratio. The reference channel selection is designed to select a channel for the entropy coding of the joint coding. The hardware encoder operates at a 40 MHz clock frequency and supports two-channel parallel encoding for the multichannel monitoring system. Experimental results show that the compression ratio increases by 0.06%, whereas the computational complexity decreases by 20.72% compared to the MPEG-4 ALS reference software encoder. In addition, the compression ratio increases by about 11.92%, compared to the single channel based bio-signal lossless data compressor.

  20. Multiple symbols soft-decision metrics for coded frequency-shift keying signals

    Institute of Scientific and Technical Information of China (English)

    MA Zheng; PERSSON Danie; LARSSON Erik G.; FAN PingZhi

    2013-01-01

    This paper derives a novel multiple symbols soft-decision metrics for frequency-shift keying signals which are affected by additive symmetric α -stable (S α S) noise and fading. The approximate metric, which is for the case where channel state information (phases, amplitudes, and noise dispersion parameter) is unknown is obtained based on a generalized-likelihood ratio (GLR) approach. The metric is obtained in closed form and proved to be effective. The performances of the multiple symbols soft-decision metrics are compared numerically for a turbo-coded system. The proposed multiple symbols metric provides substantial improvement over earlier single-symbol metrics.

  1. CRAMER-RAO BOUNDS FOR PARAMETER ESTIMATION OF PHASE-CODING SIGNALS

    Institute of Scientific and Technical Information of China (English)

    Huang Chunlin; Jiang Wengli; Zhou Yiyu

    2005-01-01

    In this paper, Cramer-Rao Bound (CRB) is derived from phase-coding signal with additive white noise, where three important parameters are focused on: carrier frequency, chip width and amplitude. Simplified and close form expressions of CRB are obtained through complicated derivation, and then are applied to evaluate the performance of the cyclic estimator.The results are accurate enough and serve well as benchmark for evaluating the performance of parameter estimation method. Numerical simulations illustrate the accuracy and applicability of the derived CRB.

  2. Coherent spectral amplitude coded label detection for DQPSK payload signals in packet-switched metropolitan area networks

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich; Guerrero Gonzalez, Neil; Jensen, Jesper Bevensee;

    2011-01-01

    We report on an experimental demonstration of a frequency swept local oscillator-based spectral amplitude coding (SAC) label detection for DQPSK signals after 40km of fiber transmission. Label detection was performed for a 10.7Gbaud DQPSK signal labeled with a SAC label composed of four-frequency......We report on an experimental demonstration of a frequency swept local oscillator-based spectral amplitude coding (SAC) label detection for DQPSK signals after 40km of fiber transmission. Label detection was performed for a 10.7Gbaud DQPSK signal labeled with a SAC label composed of four...

  3. Efficient Multiple Description Scalable Video Coding Scheme Based on Weighted Signal Combinations

    Institute of Scientific and Technical Information of China (English)

    ZHAO Anbang; WANG Wensheng; CUI Huijuan; TANG Kun

    2007-01-01

    A simple, efficient multiple description coding (MDC) algorithm was developed based on weighted signal combinations. The scheme uses the standard video encoder with a pre-processing stage to generate multiple descriptions.The decoder then uses a post-proprocessing stage to generate multiple descriptions. The decoder then uses a post-processing algorithm to combine the descriptions to provide better image quality. A scalable codec in the MDC system allows the system to provide multiple descriptions and scalability at the same time. In addition, since the different scalable descriptions may have different qualities, a simple averaging process is not optimal. An optimal weighted combination of the two descriptions was developed based on the signal to noise ratios. Compared with the simple average combination, the algorithm significantly improved the video quality, especially with large quality differences between the two descriptions, with gains of up to 3.56 dB.

  4. Simulation on C/A codes and analysis of GPS/pseudolite signals acquisition

    Institute of Scientific and Technical Information of China (English)

    ZHANG Lei

    2009-01-01

    The global positioning system (GPS) is an extremely mature technique in the navigation and position-ing field. However, there are still some limits in some aspects and for some special applications. Spe-cially, the performance of GPS needs to be improved with technological advances. As a GPS-like ground transmitter, the pseudolite provides a new research direction to achieve high positioning ac-curacy and reliability. In this paper, we describe the core technologies of designing and simulation on the coarse acquisition codes in constructing the pseudolite system. In the GPS/pseudolite integration system, the signal PRN 36 of the pseudolite and the GPS satellites signals are acquired in the modified receiver based on the computer software platform. It is shown that the pseudolite technology is ideally suited to augment the GPS alone and provide greater integrity, availability, and continuity of the navi-gation positioning system, especially for indoor use.

  5. Adaptive coded spreading OFDM signal for dynamic-λ optical access network

    Science.gov (United States)

    Liu, Bo; Zhang, Lijia; Xin, Xiangjun

    2015-12-01

    This paper proposes and experimentally demonstrates a novel adaptive coded spreading (ACS) orthogonal frequency division multiplexing (OFDM) signal for dynamic distributed optical ring-based access network. The wavelength can be assigned to different remote nodes (RNs) according to the traffic demand of optical network unit (ONU). The ACS can provide dynamic spreading gain to different signals according to the split ratio or transmission length, which offers flexible power budget for the network. A 10×13.12 Gb/s OFDM access with ACS is successfully demonstrated over two RNs and 120 km transmission in the experiment. The demonstrated method may be viewed as one promising for future optical metro access network.

  6. Energy-Efficient Full Diversity Collaborative Unitary Space-Time Block Code Design via Unique Factorization of Signals

    CERN Document Server

    Xia, Dong; Dumitrescu, Sorina

    2011-01-01

    In this paper, a novel concept called a \\textit{uniquely factorable constellation pair} (UFCP) is proposed for the systematic design of a noncoherent full diversity collaborative unitary space-time block code by normalizing two Alamouti codes for a wireless communication system having two transmitter antennas and a single receiver antenna. It is proved that such a unitary UFCP code assures the unique identification of both channel coefficients and transmitted signals in a noise-free case as well as full diversity for the noncoherent maximum likelihood (ML) receiver in a noise case. To further improve error performance, an optimal unitary UFCP code is designed by appropriately and uniquely factorizing a pair of energy-efficient cross quadrature amplitude modulation (QAM) constellations to maximize the coding gain subject to a transmission bit rate constraint. After a deep investigation of the fractional coding gain function, a technical approach developed in this paper to maximizing the coding gain is to caref...

  7. FAULT DETECTION AND LOCALIZATION IN MOTORCYCLES BASED ON THE CHAIN CODE OF PSEUDOSPECTRA AND ACOUSTIC SIGNALS

    Directory of Open Access Journals (Sweden)

    B. S. Anami

    2013-06-01

    Full Text Available Vehicles produce sound signals with varying temporal and spectral properties under different working conditions. These sounds are indicative of the condition of the engine. Fault diagnosis is a significantly difficult task in geographically remote places where expertise is scarce. Automated fault diagnosis can assist riders to assess the health condition of their vehicles. This paper presents a method for fault detection and location in motorcycles based on the chain code of the pseudospectra and Mel-frequency cepstral coefficient (MFCC features of acoustic signals. The work comprises two stages: fault detection and fault location. The fault detection stage uses the chain code of the pseudospectrum as a feature vector. If the motorcycle is identified as faulty, the MFCCs of the same sample are computed and used as features for fault location. Both stages employ dynamic time warping for the classification of faults. Five types of faults in motorcycles are considered in this work. Observed classification rates are over 90% for the fault detection stage and over 94% for the fault location stage. The work identifies other interesting applications in the development of acoustic fingerprints for fault diagnosis of machinery, tuning of musical instruments, medical diagnosis, etc.

  8. Signal-Independent Timescale Analysis (SITA and its Application for Neural Coding during Reaching and Walking

    Directory of Open Access Journals (Sweden)

    Miriam eZacksenhouse

    2014-08-01

    Full Text Available What are the relevant timescales of neural encoding in the brain? This question is commonly investigated with respect to well-defined stimuli or actions. However, neurons often encode multiple signals, including hidden or internal, which are not experimentally controlled, and thus excluded from such analysis. Here we consider all rate modulations as the signal, and define the rate-modulations signal-to-noise ratio (RM-SNR as the ratio between the variance of the rate and the variance of the neuronal noise. As the bin-width increases, RM-SNR increases while the update rate decreases. This tradeoff is captured by the ratio of RM-SNR to bin-width, and its variations with the bin-width reveal the timescales of neural activity. Theoretical analysis and simulations elucidate how the interactions between the recovery properties of the unit and the spectral content of the encoded signals shape this ratio and determine the timescales of neural coding. The resulting signal-independent timescale analysis (SITA is applied to investigate timescales of neural activity recorded from the motor cortex of monkeys during: (i reaching experiments with Brain-Machine Interface (BMI, and (ii locomotion experiments at different speeds. Interestingly, the timescales during BMI experiments did not change significantly with the control mode or training. During locomotion, the analysis identified units whose timescale varied consistently with the experimentally controlled speed of walking, though the specific timescale reflected also the recovery properties of the unit. Thus, the proposed method, SITA, characterizes the timescales of neural encoding and how they are affected by the motor task, while accounting for all rate modulations.

  9. Phylogenomic Resolution of the Phylogeny of Laurasiatherian Mammals: Exploring Phylogenetic Signals within Coding and Noncoding Sequences.

    Science.gov (United States)

    Chen, Meng-Yun; Liang, Dan; Zhang, Peng

    2017-08-01

    The interordinal relationships of Laurasiatherian mammals are currently one of the most controversial questions in mammalian phylogenetics. Previous studies mainly relied on coding sequences (CDS) and seldom used noncoding sequences. Here, by data mining public genome data, we compiled an intron data set of 3,638 genes (all introns from a protein-coding gene are considered as a gene) (19,055,073 bp) and a CDS data set of 10,259 genes (20,994,285 bp), covering all major lineages of Laurasiatheria (except Pholidota). We found that the intron data contained stronger and more congruent phylogenetic signals than the CDS data. In agreement with this observation, concatenation and species-tree analyses of the intron data set yielded well-resolved and identical phylogenies, whereas the CDS data set produced weakly supported and incongruent results. Further analyses showed that the phylogeny inferred from the intron data is highly robust to data subsampling and change in outgroup, but the CDS data produced unstable results under the same conditions. Interestingly, gene tree statistical results showed that the most frequently observed gene tree topologies for the CDS and intron data are identical, suggesting that the major phylogenetic signal within the CDS data is actually congruent with that within the intron data. Our final result of Laurasiatheria phylogeny is (Eulipotyphla,((Chiroptera, Perissodactyla),(Carnivora, Cetartiodactyla))), favoring a close relationship between Chiroptera and Perissodactyla. Our study 1) provides a well-supported phylogenetic framework for Laurasiatheria, representing a step towards ending the long-standing "hard" polytomy and 2) argues that intron within genome data is a promising data resource for resolving rapid radiation events across the tree of life. © The Author 2017. Published by Oxford University Press on behalf of the Society for Molecular Biology and Evolution.

  10. The histone code reader SPIN1 controls RET signaling in liposarcoma.

    Science.gov (United States)

    Franz, Henriette; Greschik, Holger; Willmann, Dominica; Ozretić, Luka; Jilg, Cordula Annette; Wardelmann, Eva; Jung, Manfred; Buettner, Reinhard; Schüle, Roland

    2015-03-10

    The histone code reader Spindlin1 (SPIN1) has been implicated in tumorigenesis and tumor growth, but the underlying molecular mechanisms remain poorly understood. Here, we show that reducing SPIN1 levels strongly impairs proliferation and increases apoptosis of liposarcoma cells in vitro and in xenograft mouse models. Combining signaling pathway, genome-wide chromatin binding, and transcriptome analyses, we found that SPIN1 directly enhances expression of GDNF, an activator of the RET signaling pathway, in cooperation with the transcription factor MAZ. Accordingly, knockdown of SPIN1 or MAZ results in reduced levels of GDNF and activated RET explaining diminished liposarcoma cell proliferation and survival. In line with these observations, levels of SPIN1, GDNF, activated RET, and MAZ are increased in human liposarcoma compared to normal adipose tissue or lipoma. Importantly, a mutation of SPIN1 within the reader domain interfering with chromatin binding reduces liposarcoma cell proliferation and survival. Together, our data describe a molecular mechanism for SPIN1 function in liposarcoma and suggest that targeting SPIN1 chromatin association with small molecule inhibitors may represent a novel therapeutic strategy.

  11. Simulation on C/A codes and analysis of GPS/pseudolite signals acquisition

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    The global positioning system(GPS) is an extremely mature technique in the navigation and position-ing field.However,there are still some limits in some aspects and for some special applications.Spe-cially,the performance of GPS needs to be improved with technological advances.As a GPS-like ground transmitter,the pseudolite provides a new research direction to achieve high positioning ac-curacy and reliability.In this paper,we describe the core technologies of designing and simulation on the coarse acquisition codes in constructing the pseudolite system.In the GPS/pseudolite integration system,the signal PRN 36 of the pseudolite and the GPS satellites signals are acquired in the modified receiver based on the computer software platform.It is shown that the pseudolite technology is ideally suited to augment the GPS alone and provide greater integrity,availability,and continuity of the navi-gation positioning system,especially for indoor use.

  12. Coherent spectral amplitude coded label detection for DQPSK payload signals in packet-switched metropolitan area networks

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich; Guerrero Gonzalez, Neil; Jensen, Jesper Bevensee

    2011-01-01

    We report on an experimental demonstration of a frequency swept local oscillator-based spectral amplitude coding (SAC) label detection for DQPSK signals after 40km of fiber transmission. Label detection was performed for a 10.7Gbaud DQPSK signal labeled with a SAC label composed of four......-frequency tones with 500MHz spectral separation. Successful label detection and recognition is achieved with the aid of digital signal processing that allows for substantial reduction of the complexity of the detection optical front-end....

  13. Germ cell-specific sustained activation of Wnt signalling perturbs spermatogenesis in aged mice, possibly through non-coding RNAs

    Science.gov (United States)

    Kumar, Manish; Atkins, Joshua; Cairns, Murray; Ali, Ayesha; Tanwar, Pradeep S.

    2016-01-01

    Dysregulated Wnt signalling is associated with human infertility and testicular cancer. However, the role of Wnt signalling in male germ cells remains poorly understood. In this study, we first confirmed the activity of Wnt signalling in mouse, dog and human testes. To determine the physiological importance of the Wnt pathway, we developed a mouse model with germ cell-specific constitutive activation of βcatenin. In young mutants, similar to controls, germ cell development was normal. However, with age, mutant testes showed defective spermatogenesis, progressive germ cell loss, and flawed meiotic entry of spermatogonial cells. Flow sorting confirmed reduced germ cell populations at the leptotene/zygotene stages of meiosis in mutant group. Using thymidine analogues-based DNA double labelling technique, we further established decline in germ cell proliferation and differentiation. Overactivation of Wnt/βcatenin signalling in a spermatogonial cell line resulted in reduced cell proliferation, viability and colony formation. RNA sequencing analysis of testes revealed significant alterations in the non-coding regions of mutant mouse genome. One of the novel non-coding RNAs was switched on in mutant testes compared to controls. QPCR analysis confirmed upregulation of this unique non-coding RNA in mutant testis. In summary, our results highlight the significance of Wnt signalling in male germ cells. PMID:27992363

  14. A computer code to calculate the fast induced signals by electron swarms in gases

    Energy Technology Data Exchange (ETDEWEB)

    Tobias, Carmen C.B. [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil); Mangiarotti, Alessio [Universidade de Coimbra (Portugal). Dept. de Fisica. Lab. de Instrumentacao e Fisica Experimental de Particulas

    2010-07-01

    the cathode, a subject seldom tackled in the past. Finally, the same code allows to fit the measured signals to derive the transport parameters (eventually including longitudinal diffusion) with their associated statistical uncertainties. Although this part is still under active development, some preliminary examples, to demonstrate the capabilities of the program, will be presented. (author)

  15. Beam Forming Property of Coded Acoustic Signal for Long-Range Acoustic Navigation of a Cruising Autonomous Underwater Vehicle

    Science.gov (United States)

    Yoshitaka Watanabe,; Hiroshi Ochi,; Takuya Shimura,; Takehito Hattori,

    2010-07-01

    The property of beam forming by a receiver array placed on the side surface of an autonomous underwater vehicle (AUV) is considered in this paper. The aim of this study is to develop a long-range acoustic navigation system for a cruising AUV on the basis of the estimation of the horizontal direction of arrival (DOA) of an acoustic signal from reference source. The acoustic signal is coded using a maximum length sequence code. The influence of multipath waves to the estimation of horizontal DOA was particularly studied. When there are several multipath waves from various vertical DOAs, even if the horizontal DOAs of all the waves are the same, the multipath waves are influential to the estimation of the horizontal DOA. Then, the coded signal is useful to avoid the influence of the multipath waves. An exploratory experiment on the propagation of the acoustic signal for distance of about 16.6 km was performed in Suruga Bay. By simulating the condition similar to the experiment, it was indicated that the accuracy of the estimation of the horizontal DOA is within zero point several degrees in the experiment.

  16. Resolving arthropod phylogeny: exploring phylogenetic signal within 41 kb of protein-coding nuclear gene sequence.

    Science.gov (United States)

    Regier, Jerome C; Shultz, Jeffrey W; Ganley, Austen R D; Hussey, April; Shi, Diane; Ball, Bernard; Zwick, Andreas; Stajich, Jason E; Cummings, Michael P; Martin, Joel W; Cunningham, Clifford W

    2008-12-01

    This study attempts to resolve relationships among and within the four basal arthropod lineages (Pancrustacea, Myriapoda, Euchelicerata, Pycnogonida) and to assess the widespread expectation that remaining phylogenetic problems will yield to increasing amounts of sequence data. Sixty-eight regions of 62 protein-coding nuclear genes (approximately 41 kilobases (kb)/taxon) were sequenced for 12 taxonomically diverse arthropod taxa and a tardigrade outgroup. Parsimony, likelihood, and Bayesian analyses of total nucleotide data generally strongly supported the monophyly of each of the basal lineages represented by more than one species. Other relationships within the Arthropoda were also supported, with support levels depending on method of analysis and inclusion/exclusion of synonymous changes. Removing third codon positions, where the assumption of base compositional homogeneity was rejected, altered the results. Removing the final class of synonymous mutations--first codon positions encoding leucine and arginine, which were also compositionally heterogeneous--yielded a data set that was consistent with a hypothesis of base compositional homogeneity. Furthermore, under such a data-exclusion regime, all 68 gene regions individually were consistent with base compositional homogeneity. Restricting likelihood analyses to nonsynonymous change recovered trees with strong support for the basal lineages but not for other groups that were variably supported with more inclusive data sets. In a further effort to increase phylogenetic signal, three types of data exploration were undertaken. (1) Individual genes were ranked by their average rate of nonsynonymous change, and three rate categories were assigned--fast, intermediate, and slow. Then, bootstrap analysis of each gene was performed separately to see which taxonomic groups received strong support. Five taxonomic groups were strongly supported independently by two or more genes, and these genes mostly belonged to the slow

  17. Network coding based joint signaling and dynamic bandwidth allocation scheme for inter optical network unit communication in passive optical networks

    Science.gov (United States)

    Wei, Pei; Gu, Rentao; Ji, Yuefeng

    2014-06-01

    As an innovative and promising technology, network coding has been introduced to passive optical networks (PON) in recent years to support inter optical network unit (ONU) communication, yet the signaling process and dynamic bandwidth allocation (DBA) in PON with network coding (NC-PON) still need further study. Thus, we propose a joint signaling and DBA scheme for efficiently supporting differentiated services of inter ONU communication in NC-PON. In the proposed joint scheme, the signaling process lays the foundation to fulfill network coding in PON, and it can not only avoid the potential threat to downstream security in previous schemes but also be suitable for the proposed hybrid dynamic bandwidth allocation (HDBA) scheme. In HDBA, a DBA cycle is divided into two sub-cycles for applying different coding, scheduling and bandwidth allocation strategies to differentiated classes of services. Besides, as network traffic load varies, the entire upstream transmission window for all REPORT messages slides accordingly, leaving the transmission time of one or two sub-cycles to overlap with the bandwidth allocation calculation time at the optical line terminal (the OLT), so that the upstream idle time can be efficiently eliminated. Performance evaluation results validate that compared with the existing two DBA algorithms deployed in NC-PON, HDBA demonstrates the best quality of service (QoS) support in terms of delay for all classes of services, especially guarantees the end-to-end delay bound of high class services. Specifically, HDBA can eliminate queuing delay and scheduling delay of high class services, reduce those of lower class services by at least 20%, and reduce the average end-to-end delay of all services over 50%. Moreover, HDBA also achieves the maximum delay fairness between coded and uncoded lower class services, and medium delay fairness for high class services.

  18. Statistical mechanical analysis of a hierarchical random code ensemble in signal processing

    Energy Technology Data Exchange (ETDEWEB)

    Obuchi, Tomoyuki [Department of Earth and Space Science, Faculty of Science, Osaka University, Toyonaka 560-0043 (Japan); Takahashi, Kazutaka [Department of Physics, Tokyo Institute of Technology, Tokyo 152-8551 (Japan); Takeda, Koujin, E-mail: takeda@sp.dis.titech.ac.jp [Department of Computational Intelligence and Systems Science, Tokyo Institute of Technology, Yokohama 226-8502 (Japan)

    2011-02-25

    We study a random code ensemble with a hierarchical structure, which is closely related to the generalized random energy model with discrete energy values. Based on this correspondence, we analyze the hierarchical random code ensemble by using the replica method in two situations: lossy data compression and channel coding. For both the situations, the exponents of large deviation analysis characterizing the performance of the ensemble, the distortion rate of lossy data compression and the error exponent of channel coding in Gallager's formalism, are accessible by a generating function of the generalized random energy model. We discuss that the transitions of those exponents observed in the preceding work can be interpreted as phase transitions with respect to the replica number. We also show that the replica symmetry breaking plays an essential role in these transitions.

  19. Mechanism of Wnt signaling induced down regulation of mrhl long non-coding RNA in mouse spermatogonial cells

    Science.gov (United States)

    Akhade, Vijay Suresh; Dighe, Shrinivas Nivrutti; Kataruka, Shubhangini; Rao, Manchanahalli R. Satyanarayana

    2016-01-01

    Long non coding RNAs (lncRNAs) have emerged as important regulators of various biological processes. LncRNAs also behave as response elements or targets of signaling pathway(s) mediating cellular function. Wnt signaling is important in regulating mammalian spermatogenesis. Mrhl RNA negatively regulates canonical Wnt pathway and gets down regulated upon Wnt signaling activation in mouse spermatogonial cells. Also, mrhl RNA regulates expression of genes pertaining to Wnt pathway and spermatogenesis by binding to chromatin. In the present study, we delineate the detailed molecular mechanism of Wnt signaling induced mrhl RNA down regulation in mouse spermatogonial cells. Mrhl RNA has an independent transcription unit and our various experiments like Chromatin Immunoprecipitation (in cell line as well as mouse testis) and shRNA mediated down regulation convincingly show that β-catenin and TCF4, which are the key effector proteins of the Wnt signaling pathway are required for down regulation of mrhl RNA. We have identified Ctbp1 as the co-repressor and its occupancy on mrhl RNA promoter depends on both β-catenin and TCF4. Upon Wnt signaling activation, Ctbp1 mediated histone repression marks increase at the mrhl RNA promoter. We also demonstrate that Wnt signaling induced mrhl RNA down regulation results in an up regulation of various meiotic differentiation marker genes. PMID:26446991

  20. A causal perspective on the analysis of signal and noise correlations and their role in population coding.

    Science.gov (United States)

    Chicharro, Daniel

    2014-06-01

    The role of correlations between neuronal responses is crucial to understanding the neural code. A framework used to study this role comprises a breakdown of the mutual information between stimuli and responses into terms that aim to account for different coding modalities and the distinction between different notions of independence. Here we complete the list of types of independence and distinguish activity independence (related to total correlations), conditional independence (related to noise correlations), signal independence (related to signal correlations), coding independence (related to information transmission), and information independence (related to redundancy). For each type, we identify the probabilistic criterion that defines it, indicate the information-theoretic measure used as statistic to test for it, and provide a graphical criterion to recognize the causal configurations of stimuli and responses that lead to its existence. Using this causal analysis, we first provide sufficiency conditions relating these types. Second, we differentiate the use of the measures as statistics to test for the existence of independence from their use for quantification. We indicate that signal and noise correlation cannot be quantified separately. Third, we explicitly define alternative system configurations used to construct the measures, in which noise correlations or noise and signal correlations are eliminated. Accordingly, we examine which measures are meaningful only as a comparison across configurations and which ones provide a characterization of the actually observed responses without resorting to other configurations. Fourth, we compare the commonly used nonparametric approach to eliminate noise correlations with a functional (model-based) approach, showing that the former approach does not remove those effects of noise correlations captured by the tuning properties of the individual neurons, and implies nonlocal causal structure manipulations. These

  1. Absence of Doppler signal in transcranial color-coded ultrasonography may be confirmatory for brain death: A case report

    Directory of Open Access Journals (Sweden)

    Mehmet Akif Topçuoğlu

    2015-08-01

    Full Text Available Transcranial Doppler ultrasonography (TCD is a valuable tool for demonstrating cerebral circulatory arrest (CCA in the setting of brain death. Complete reversal of diastolic flow (to-and-fro flow and systolic spikes in bilateral terminal internal carotid arteries and vertebrobasilar circulation are considered as specific sonogram configurations supporting the diagnosis of CCA. Because of the possibility of sonic bone window impermeability, absence of any waveform in TCD is not confirmatory for CCA unless there is documentation of disappearance of a previously well detected signal by the same recording settings. Transcranial color-coded sonography (TCCS with B-mode imaging can reliably detect adequacy of bone windows with clarity contralateral skull and ipsilateral planum temporale visualization. Therefore, absence of detectable intracranial Doppler signal along with available ultrasound window in TCCS can confirm clinical diagnosis of brain death. We herein discuss this entity from the frame of a representative case.

  2. Perceptual Coding of Audio Signals Using Adaptive Time-Frequency Transform

    Directory of Open Access Journals (Sweden)

    Karthikeyan Umapathy

    2007-08-01

    Full Text Available Wide band digital audio signals have a very high data-rate associated with them due to their complex nature and demand for high-quality reproduction. Although recent technological advancements have significantly reduced the cost of bandwidth and miniaturized storage facilities, the rapid increase in the volume of digital audio content constantly compels the need for better compression algorithms. Over the years various perceptually lossless compression techniques have been introduced, and transform-based compression techniques have made a significant impact in recent years. In this paper, we propose one such transform-based compression technique, where the joint time-frequency (TF properties of the nonstationary nature of the audio signals were exploited in creating a compact energy representation of the signal in fewer coefficients. The decomposition coefficients were processed and perceptually filtered to retain only the relevant coefficients. Perceptual filtering (psychoacoustics was applied in a novel way by analyzing and performing TF specific psychoacoustics experiments. An added advantage of the proposed technique is that, due to its signal adaptive nature, it does not need predetermined segmentation of audio signals for processing. Eight stereo audio signal samples of different varieties were used in the study. Subjective (mean opinion score—MOS listening tests were performed and the subjective difference grades (SDG were used to compare the performance of the proposed coder with MP3, AAC, and HE-AAC encoders. Compression ratios in the range of 8 to 40 were achieved by the proposed technique with subjective difference grades (SDG ranging from –0.53 to –2.27.

  3. Perceptual Coding of Audio Signals Using Adaptive Time-Frequency Transform

    Directory of Open Access Journals (Sweden)

    Umapathy Karthikeyan

    2007-01-01

    Full Text Available Wide band digital audio signals have a very high data-rate associated with them due to their complex nature and demand for high-quality reproduction. Although recent technological advancements have significantly reduced the cost of bandwidth and miniaturized storage facilities, the rapid increase in the volume of digital audio content constantly compels the need for better compression algorithms. Over the years various perceptually lossless compression techniques have been introduced, and transform-based compression techniques have made a significant impact in recent years. In this paper, we propose one such transform-based compression technique, where the joint time-frequency (TF properties of the nonstationary nature of the audio signals were exploited in creating a compact energy representation of the signal in fewer coefficients. The decomposition coefficients were processed and perceptually filtered to retain only the relevant coefficients. Perceptual filtering (psychoacoustics was applied in a novel way by analyzing and performing TF specific psychoacoustics experiments. An added advantage of the proposed technique is that, due to its signal adaptive nature, it does not need predetermined segmentation of audio signals for processing. Eight stereo audio signal samples of different varieties were used in the study. Subjective (mean opinion score—MOS listening tests were performed and the subjective difference grades (SDG were used to compare the performance of the proposed coder with MP3, AAC, and HE-AAC encoders. Compression ratios in the range of 8 to 40 were achieved by the proposed technique with subjective difference grades (SDG ranging from –0.53 to –2.27.

  4. Novel Spectro-Temporal Codes and Computations for Auditory Signal Representation and Separation

    Science.gov (United States)

    2013-02-01

    Low freq FIG. 1. Two views of the representation of vowel -like sounds in the AN. a) Peristimulus time histograms for cat ANF arranged by...Soc Am, vol. 66, pp. 470–479, 1979. [3] B. Delgutte and N.Y.S. Kiang, “Speech coding in the auditory nerve: I. Vowel -like sounds ,” J. Acoust. Soc. Am...Grove, CA, Nov. 1993, pp. 1041–1046. 4 List of Figures FIG. 1 Two views of the representation of vowel -like sounds in the AN. a) Peris- timulus time

  5. PAPR REDUCTION OF OFDM SIGNALS USING SELECTIVE MAPPING WITH TURBO CODES

    Directory of Open Access Journals (Sweden)

    Pawan Sharma

    2011-09-01

    Full Text Available Multiple inputs multiple output orthogonal frequency division multiplexing (MIMO-OFDM is anattractive transmission technique for high bit-rate communication systems. MIMO-OFDM has become apromising candidate for high performance 4G broadband wireless communications. One maindisadvantage of OFDM is the high peak-to-average power ratio (PAPR of the transmitter’s outputsignal. Selected-Mapping (SLM scheme which does not require the transmission of side information andcan reduce the peak to average power ratio (PAPR in turbo coded orthogonal frequency divisionmultiplexing (OFDM system is proposed. Simulation results show that the system can achieve significantreduction in PAPR and satisfactory bit error rate performance over AWGN channels.

  6. An effective coded excitation scheme based on a predistorted FM signal and an optimized digital filter

    DEFF Research Database (Denmark)

    Misaridis, Thanasis; Jensen, Jørgen Arendt

    1999-01-01

    performed with the program Field II. A commercial scanner (B-K Medical 3535) was modified and interfaced to an arbitrary function generator along with an RF power amplifier (Ritec). Hydrophone measurements in water were done to establish excitation voltage and corresponding intensity levels (I-sptp and I......This paper presents a coded excitation imaging system based on a predistorted FM excitation and a digital compression filter designed for medical ultrasonic applications, in order to preserve both axial resolution and contrast. In radars, optimal Chebyshev windows efficiently weight a nearly...

  7. Coding genes and molecular structures of the diffusible signalling proteins (pheromones) of the polar ciliate, Euplotes nobilii.

    Science.gov (United States)

    Vallesi, Adriana; Alimenti, Claudio; Pedrini, Bill; Di Giuseppe, Graziano; Dini, Fernando; Wüthrich, Kurt; Luporini, Pierangelo

    2012-12-01

    In protozoan ciliates, diffusible signalling proteins (pheromones) regulate the vegetative growth and mating interactions. Here, the coding genes and the structures of the encoded pheromones were studied in genetically distinct wild-type strains representing interbreeding Antarctic and Arctic populations of the marine ciliate Euplotes nobilii. Determination of seven allelic pheromone-coding DNA sequences revealed that an unusual extension and high structural conservation of the 5' non-coding region are peculiar traits of this gene family, implying that this region is directly involved in the mechanism of pheromone gene expression, possibly through phenomena of intron splicing and/or frame-shifting. For four pheromones, the three-dimensional structures were determined by nuclear magnetic resonance spectroscopy in solution. These structures show that the pheromones represent a protein family which adapts to its polar environment by combining a structurally stable core of a three-helix bundle with extended polypeptide segments that are devoid of regular secondary structures and concomitantly show enhanced structural flexibility. Copyright © 2012 Elsevier B.V. All rights reserved.

  8. New source of colour coded signal wire sleeving for cryogenic applications

    Science.gov (United States)

    Putnam, A. M.

    Wire sleeving made from Pb core nylon fishing line is presented. Signal wires can easily be sheathed in the nylon outer of weighted trolling line by drawing them through the outer attached to the core. Such line comes with a selection of colours on a single spool.

  9. Beacon signal in transcranial color coded ultrasound: A sign for brain death

    Directory of Open Access Journals (Sweden)

    Mehmet Akif Topçuoğlu

    2014-04-01

    Full Text Available A widely under-recognized brain-death confirming transcranial ultrasonography pattern resembling the red-blue beacon signal was demonstrated. Familiarity to this distinct and characteristic ultrasonic pattern seems to be important in the perspective of point-of-care neurological ultrasound use and knobology.

  10. ERASED-CHASE DECODING FOR RS-CODED MPSK SIGNALING OVER A RAYLEIGH FADING CHANNEL

    Institute of Scientific and Technical Information of China (English)

    Xu Chaojun; Sun Yue; Wang Xinmei

    2007-01-01

    In this paper,a novel dual-metric,the maximum and minimum Squared Euclidean Distance Increment(SEDI)brought by changing the hard decision symbol,is introduced to measure the reliability of the received M-ary Phase Shift Keying(MPSK)symbols over a Rayleigh fading channel.Based on the dual-metric,a Chase-type soft decoding algorithm,which is called erased-Chase algorithm,is developed for Reed-Solomon(RS)coded MPSK schemes.The proposed algorithm treats the unreliable symbols with small maximum SEDI as erasures,and tests the non-erased unreliable symbols with small minimum SEDI as the Chase-2 algorithm does.By introducing optimality test into the decoding procedure,much more reduction in the decoding complexity can be achieved.Simulation results of the RS(63,42,22)-coded 8-PSK scheme over a Rayleigh fading channel show that the proposed algorithm provides a very efficient tradeoff between the decoding complexity and the error performance.Finally,an adaptive scheme for the number of erasures is introduced into the decoding algorithm.

  11. Model-Based Speech Signal Coding Using Optimized Temporal Decomposition for Storage and Broadcasting Applications

    Directory of Open Access Journals (Sweden)

    Chandranath R. N. Athaudage

    2003-09-01

    Full Text Available A dynamic programming-based optimization strategy for a temporal decomposition (TD model of speech and its application to low-rate speech coding in storage and broadcasting is presented. In previous work with the spectral stability-based event localizing (SBEL TD algorithm, the event localization was performed based on a spectral stability criterion. Although this approach gave reasonably good results, there was no assurance on the optimality of the event locations. In the present work, we have optimized the event localizing task using a dynamic programming-based optimization strategy. Simulation results show that an improved TD model accuracy can be achieved. A methodology of incorporating the optimized TD algorithm within the standard MELP speech coder for the efficient compression of speech spectral information is also presented. The performance evaluation results revealed that the proposed speech coding scheme achieves 50%–60% compression of speech spectral information with negligible degradation in the decoded speech quality.

  12. Design of signal-adapted multidimensional lifting scheme for lossy coding.

    Science.gov (United States)

    Gouze, Annabelle; Antonini, Marc; Barlaud, Michel; Macq, Benoît

    2004-12-01

    This paper proposes a new method for the design of lifting filters to compute a multidimensional nonseparable wavelet transform. Our approach is stated in the general case, and is illustrated for the 2-D separable and for the quincunx images. Results are shown for the JPEG2000 database and for satellite images acquired on a quincunx sampling grid. The design of efficient quincunx filters is a difficult challenge which has already been addressed for specific cases. Our approach enables the design of less expensive filters adapted to the signal statistics to enhance the compression efficiency in a more general case. It is based on a two-step lifting scheme and joins the lifting theory with Wiener's optimization. The prediction step is designed in order to minimize the variance of the signal, and the update step is designed in order to minimize a reconstruction error. Application for lossy compression shows the performances of the method.

  13. Reduced-Dimension Linear Transform Coding of Correlated Signals in Networks

    CERN Document Server

    Goela, Naveen

    2012-01-01

    A model, called the linear transform network (LTN), is proposed to analyze the compression and estimation of correlated signals transmitted over directed acyclic graphs (DAGs). An LTN is a DAG network with multiple source and receiver nodes. Source nodes transmit subspace projections of random correlated signals by applying reduced-dimension linear transforms. The subspace projections are linearly processed by multiple relays and routed to intended receivers. Each receiver applies a linear estimator to approximate a subset of the sources with minimum mean squared error (MSE) distortion. The model is extended to include noisy networks with power constraints on transmitters. A key task is to compute all local compression matrices and linear estimators in the network to minimize end-to-end distortion. The non-convex problem is solved iteratively within an optimization framework using constrained quadratic programs (QPs). The proposed algorithm recovers as special cases the regular and distributed Karhunen-Loeve ...

  14. ECG signal compression by multi-iteration EZW coding for different wavelets and thresholds.

    Science.gov (United States)

    Tohumoglu, Gülay; Sezgin, K Erbil

    2007-02-01

    The modified embedded zero-tree wavelet (MEZW) compression algorithm for the one-dimensional signal was originally derived for image compression based on Shapiro's EZW algorithm. It is revealed that the proposed codec is significantly more efficient in compression and in computation than previously proposed ECG compression schemes. The coder also attains exact bit rate control and generates a bit stream progressive in quality or rate. The EZW and MEZW algorithms apply the chosen threshold values or the expressions in order to specify that the significant transformed coefficients are greatly significant. Thus, two different threshold definitions, namely percentage and dyadic thresholds, are used, and they are applied for different wavelet types in biorthogonal and orthogonal classes. In detail, the MEZW and EZW algorithms results are quantitatively compared in terms of the compression ratio (CR) and percentage root mean square difference (PRD). Experiments are carried out on the selected records from the MIT-BIH arrhythmia database and an original ECG signal. It is observed that the MEZW algorithm shows a clear advantage in the CR achieved for a given PRD over the traditional EZW, and it gives better results for the biorthogonal wavelets than the orthogonal wavelets.

  15. Connectivity Reveals Sources of Predictive Coding Signals in Early Visual Cortex During Processing of Visual Optic Flow.

    Science.gov (United States)

    Schindler, Andreas; Bartels, Andreas

    2016-05-24

    Superimposed on the visual feed-forward pathway, feedback connections convey higher level information to cortical areas lower in the hierarchy. A prominent framework for these connections is the theory of predictive coding where high-level areas send stimulus interpretations to lower level areas that compare them with sensory input. Along these lines, a growing body of neuroimaging studies shows that predictable stimuli lead to reduced blood oxygen level-dependent (BOLD) responses compared with matched nonpredictable counterparts, especially in early visual cortex (EVC) including areas V1-V3. The sources of these modulatory feedback signals are largely unknown. Here, we re-examined the robust finding of relative BOLD suppression in EVC evident during processing of coherent compared with random motion. Using functional connectivity analysis, we show an optic flow-dependent increase of functional connectivity between BOLD suppressed EVC and a network of visual motion areas including MST, V3A, V6, the cingulate sulcus visual area (CSv), and precuneus (Pc). Connectivity decreased between EVC and 2 areas known to encode heading direction: entorhinal cortex (EC) and retrosplenial cortex (RSC). Our results provide first evidence that BOLD suppression in EVC for predictable stimuli is indeed mediated by specific high-level areas, in accord with the theory of predictive coding.

  16. Improved method for predicting the peak signal-to-noise ratio quality of decoded images in fractal image coding

    Science.gov (United States)

    Wang, Qiang; Bi, Sheng

    2017-01-01

    To predict the peak signal-to-noise ratio (PSNR) quality of decoded images in fractal image coding more efficiently and accurately, an improved method is proposed. After some derivations and analyses, we find that the linear correlation coefficients between coded range blocks and their respective best-matched domain blocks can determine the dynamic range of their collage errors, which can also provide the minimum and the maximum of the accumulated collage error (ACE) of uncoded range blocks. Moreover, the dynamic range of the actual percentage of accumulated collage error (APACE), APACEmin to APACEmax, can be determined as well. When APACEmin reaches a large value, such as 90%, APACEmin to APACEmax will be limited in a small range and APACE can be computed approximately. Furthermore, with ACE and the approximate APACE, the ACE of all range blocks and the average collage error (ACER) can be obtained. Finally, with the logarithmic relationship between ACER and the PSNR quality of decoded images, the PSNR quality of decoded images can be predicted directly. Experiments show that compared with the previous similar method, the proposed method can predict the PSNR quality of decoded images more accurately and needs less computation time simultaneously.

  17. Hedgehog signaling is a potent regulator of liver lipid metabolism and reveals a GLI-code associated with steatosis.

    Science.gov (United States)

    Matz-Soja, Madlen; Rennert, Christiane; Schönefeld, Kristin; Aleithe, Susanne; Boettger, Jan; Schmidt-Heck, Wolfgang; Weiss, Thomas S; Hovhannisyan, Amalya; Zellmer, Sebastian; Klöting, Nora; Schulz, Angela; Kratzsch, Jürgen; Guthke, Reinhardt; Gebhardt, Rolf

    2016-05-17

    Non-alcoholic fatty liver disease (NAFLD) is the most common liver disease in industrialized countries and is increasing in prevalence. The pathomechanisms, however, are poorly understood. This study assessed the unexpected role of the Hedgehog pathway in adult liver lipid metabolism. Using transgenic mice with conditional hepatocyte-specific deletion of Smoothened in adult mice, we showed that hepatocellular inhibition of Hedgehog signaling leads to steatosis by altering the abundance of the transcription factors GLI1 and GLI3. This steatotic 'Gli-code' caused the modulation of a complex network of lipogenic transcription factors and enzymes, including SREBP1 and PNPLA3, as demonstrated by microarray analysis and siRNA experiments and could be confirmed in other steatotic mouse models as well as in steatotic human livers. Conversely, activation of the Hedgehog pathway reversed the "Gli-code" and mitigated hepatic steatosis. Collectively, our results reveal that dysfunctions in the Hedgehog pathway play an important role in hepatic steatosis and beyond.

  18. Long non-coding RNA HOTAIR regulates proliferation and invasion via activating Notch signalling pathway in retinoblastoma

    Indian Academy of Sciences (India)

    CHANGXIA DONG; SHAOYI LIU; YONGBIN LV; CHUNPING ZHANG; HEYING GAO; LIXIA TAN; HONG WANG

    2016-12-01

    Retinoblastoma is the most frequently occurring tumour in the eyes in early childhood. Novel targets that areimportant for the diagnosis or treatment of retinoblastoma could be valuable in increasing the survival rate of patientsaffected by this disease. Long non-coding RNAs (lncRNAs) are a recently discovered type of RNAs with no proteincodingfunction; yet it has become increasingly clear that lncRNAs are responsible for important gene regulatoryfunctions in various diseases. In this study, the expression of lncRNA HOTAIR was measured by qRT-PCR, andHOTAIR expression was found to be significantly upregulated in human retinoblastomas tissues as compared with thatin paracancerous tissues. Knockdown of HOTAIR restricted the proliferation and invasion of the more invasiveretinoblastoma Y79 cells, and led to G0/G1 arrest, possibly through inhibiting phospho-RB1, RB1 and CCNE.Furthermore, we found that the Notch signalling pathway was activated abnormally in retinoblastoma cell lines, whileknockdown of HOTAIR attenuated the endogenous Notch signalling pathway in vitro and in vivo. In addition,knockdown of HOTAIR could inhibit the tumour progression in a xenograft model of retinoblastoma. In summary,our findings indicate that HOTAIR may play important roles in retinoblastoma progression via Notch pathway.HOTAIR has the potential to enhance the development of novel targeted diagnostic and therapeutic approaches forretinoblastoma.

  19. Theoretical analysis and simulation of a code division multiple access system (cdma for secure signal transmission in wideband channels

    Directory of Open Access Journals (Sweden)

    Stevan M. Berber

    2014-06-01

    Code Division Multiple Access (CDMA technique which allows communications of multiple users in the same communication system. This is achieved in such a way that each user is assigned a unique code sequence, which is used at the receiver side to discover the information dedicated to that user. These systems belong to the group of communication systems for direct sequence spread spectrum systems. Traditionally, CDMA systems use binary orthogonal spreading codes. In this paper, a mathematical model and simulation of a CDMA system based on the application of non-binary, precisely speaking, chaotic spreading sequences. In their nature, these sequences belong to random sequences with infinite periodicity, and due to that they are appropriate for applications in the systems that provide enhanced security against interception and secrecy in signal transmission. Numerous papers are dedicated to the development of CDMA systems in flat fading channels. This paper presents the results of these systems analysis for the case when frequency selective fading is present in the channel. In addition, the paper investigates a possibility of using interleaving techniques to mitigate fading in a wideband channel with the frequency selective fading. Basic structure of a CDMA communication system and its operation In this paper, a CDMA system block schematic is ppresented and the function of all blocks is explained. Notation  to be used in the paper is introduced. Chaotic sequences are defined and explained in accordance with the method of their generation. A wideband channel with frequency selective fading is defined by its impulse response function. Theoretical analysis of a CDMA system with flat fading in a narrowband channel A narrowband channel and flat fading are defined. A mathematical analysis of the system is conducted by presenting the signal expressions at vital points in the transmitter and receiver. The expression of the signal at the output of the sequence correlator is

  20. A new multi-dimensional general relativistic neutrino hydrodynamics code for core-collapse supernovae. IV. The neutrino signal

    Energy Technology Data Exchange (ETDEWEB)

    Müller, Bernhard [Monash Center for Astrophysics, School of Mathematical Sciences, Building 28, Monash University, Victoria 3800 (Australia); Janka, Hans-Thomas, E-mail: bernhard.mueller@monash.edu, E-mail: bjmuellr@mpa-garching.mpg.de, E-mail: thj@mpa-garching.mpg.de [Max-Planck-Institut für Astrophysik, Karl-Schwarzschild-Str. 1, D-85748 Garching (Germany)

    2014-06-10

    Considering six general relativistic, two-dimensional (2D) supernova (SN) explosion models of progenitor stars between 8.1 and 27 M {sub ☉}, we systematically analyze the properties of the neutrino emission from core collapse and bounce to the post-explosion phase. The models were computed with the VERTEX-COCONUT code, using three-flavor, energy-dependent neutrino transport in the ray-by-ray-plus approximation. Our results confirm the close similarity of the mean energies, (E), of ν-bar {sub e} and heavy-lepton neutrinos and even their crossing during the accretion phase for stars with M ≳ 10 M {sub ☉} as observed in previous 1D and 2D simulations with state-of-the-art neutrino transport. We establish a roughly linear scaling of 〈E{sub ν-bar{sub e}}〉 with the proto-neutron star (PNS) mass, which holds in time as well as for different progenitors. Convection inside the PNS affects the neutrino emission on the 10%-20% level, and accretion continuing beyond the onset of the explosion prevents the abrupt drop of the neutrino luminosities seen in artificially exploded 1D models. We demonstrate that a wavelet-based time-frequency analysis of SN neutrino signals in IceCube will offer sensitive diagnostics for the SN core dynamics up to at least ∼10 kpc distance. Strong, narrow-band signal modulations indicate quasi-periodic shock sloshing motions due to the standing accretion shock instability (SASI), and the frequency evolution of such 'SASI neutrino chirps' reveals shock expansion or contraction. The onset of the explosion is accompanied by a shift of the modulation frequency below 40-50 Hz, and post-explosion, episodic accretion downflows will be signaled by activity intervals stretching over an extended frequency range in the wavelet spectrogram.

  1. Long-code Signal Waveform Monitoring Method for Navigation Satellites%卫星导航长码信号波形监测方法

    Institute of Scientific and Technical Information of China (English)

    刘建成; 王宇; 宫磊; 徐晓燕

    2016-01-01

    Due to the weakness of signal,signal waveform monitoring for navigation satellites in orbit is one of the difficulties in satellite navigation signal quality monitoring research,so a signal waveform monitoring method for navigation satellites in orbit is pro⁃posed.Based on the Vernier sampling principle,a large⁃diameter parabolic antenna is used for in⁃orbit satellite signal collection.After in⁃itial phase and residual frequency elimination,accumulation and combination,a clear chip waveform is obtained.For civilian and long⁃code signals with the same code rate,the PN code phase bias can be determined.By using a large⁃diameter parabolic antenna for COM⁃PASS satellite tracking,the civilian and long⁃code chip waveforms of several COMPASS satellites in B1 band are obtained,and the PN code phase bias of the satellite signals are got.The results show that there is little difference between the civilian signal waveform and long⁃code signal waveform,but there is a code phase bias between them.%由于信号微弱,如何获得在轨导航卫星的清晰信号波形是卫星导航信号质量监测研究中的难点之一,为此提出了一种在轨导航卫星的信号波形监测方法。该方法基于Vernier采样原理,利用大口径抛物面天线对在轨卫星进行信号采集,经过消除初相和残余频率、累加平均和数据组合等处理,获得清晰的码片波形。对于相同码速率的民用信号和长码信号,可确定民用信号和长码信号的伪码相位偏差。利用大口径抛物面天线对北斗卫星进行跟踪,获得了多颗北斗卫星B1频点民用信号和长码信号的码片波形。结果表明,民用信号和长码信号的码片波形的轮廓差异较小,但伪码相位存在偏差。

  2. CRNDE, a long non-coding RNA responsive to insulin/IGF signaling, regulates genes involved in central metabolism.

    Science.gov (United States)

    Ellis, Blake C; Graham, Lloyd D; Molloy, Peter L

    2014-02-01

    Colorectal neoplasia differentially expressed (CRNDE) is a novel gene that is activated early in colorectal cancer but whose regulation and functions are unknown. CRNDE transcripts are recognized as long non-coding RNAs (lncRNAs), which potentially interact with chromatin-modifying complexes to regulate gene expression via epigenetic changes. Complex alternative splicing results in numerous transcripts from this gene, and we have identified novel transcripts containing a highly-conserved sequence within intron 4 ("gVC-In4"). In colorectal cancer cells, we demonstrate that treatment with insulin and insulin-like growth factors (IGF) repressed CRNDE nuclear transcripts, including those encompassing gVC-In4. These repressive effects were negated by use of inhibitors against either the PI3K/Akt/mTOR pathway or Raf/MAPK pathway, suggesting CRNDE is a downstream target of both signaling cascades. Expression array analyses revealed that siRNA-mediated knockdown of gVC-In4 transcripts affected the expression of many genes, which showed correlation with insulin/IGF signaling pathway components and responses, including glucose and lipid metabolism. Some of the genes are identical to those affected by insulin treatment in the same cell line. The results suggest that CRNDE expression promotes the metabolic changes by which cancer cells switch to aerobic glycolysis (Warburg effect). This is the first report of a lncRNA regulated by insulin/IGFs, and our findings indicate a role for CRNDE nuclear transcripts in regulating cellular metabolism which may correlate with their upregulation in colorectal cancer. © 2013. Published by Elsevier B.V. All rights reserved.

  3. Sources of signal in 62 protein-coding nuclear genes for higher-level phylogenetics of arthropods.

    Directory of Open Access Journals (Sweden)

    Jerome C Regier

    Full Text Available BACKGROUND: This study aims to investigate the strength of various sources of phylogenetic information that led to recent seemingly robust conclusions about higher-level arthropod phylogeny and to assess the role of excluding or downweighting synonymous change for arriving at those conclusions. METHODOLOGY/PRINCIPAL FINDINGS: The current study analyzes DNA sequences from 68 gene segments of 62 distinct protein-coding nuclear genes for 80 species. Gene segments analyzed individually support numerous nodes recovered in combined-gene analyses, but few of the higher-level nodes of greatest current interest. However, neither is there support for conflicting alternatives to these higher-level nodes. Gene segments with higher rates of nonsynonymous change tend to be more informative overall, but those with lower rates tend to provide stronger support for deeper nodes. Higher-level nodes with bootstrap values in the 80% - 99% range for the complete data matrix are markedly more sensitive to substantial drops in their bootstrap percentages after character subsampling than those with 100% bootstrap, suggesting that these nodes are likely not to have been strongly supported with many fewer data than in the full matrix. Data set partitioning of total data by (mostly synonymous and (mostly nonsynonymous change improves overall node support, but the result remains much inferior to analysis of (unpartitioned nonsynonymous change alone. Clusters of genes with similar nonsynonymous rate properties (e.g., faster vs. slower show some distinct patterns of node support but few conflicts. Synonymous change is shown to contribute little, if any, phylogenetic signal to the support of higher-level nodes, but it does contribute nonphylogenetic signal, probably through its underlying heterogeneous nucleotide composition. Analysis of seemingly conservative indels does not prove useful. CONCLUSIONS: Generating a robust molecular higher-level phylogeny of Arthropoda is

  4. Peak-to-Average Power Ratio Reduction for Integration of Radar and Communication Systems Based on OFDM Signals with Block Golay Coding

    Directory of Open Access Journals (Sweden)

    Li Zi-qi

    2014-10-01

    Full Text Available Integration of radar and communication systems based on OFDM signals results in large Peak-to-Average Power Ratio (PAPR. Limited by the code rate, algorithm that use the Golay sequence code to restrain PAPR can only be applied under the condition of a few subcarriers. This study proposes an algorithm to restrain the PAPR of systems with a large number of subcarriers. The algorithm combines the group parallel code with the optimization of weight coefficients. First, bit streams are divided into several groups of parallel bits. Next, every group proceeds with Golay sequence coding, data symbol modulating and inverse Fourier transform. Finally, the parallel result is combined with an OFDM symbol. Before the parallel data are combined, several weight coefficients for every group are introduced; thus, the system has several candidate symbols for transmitting. Then the symbol with minimum PAPR is then selected as the transmitting signal, and the PAPR of the whole system is reduced. PAPR performance, Bit Error Radio (BER and wideband ambiguity function of three block methods with different coding rate are also simulated. The simulations show that the PAPR of the system decreases and the BER performance improves significantly. The signal exhibits a thumbtack ambiguity function, which suggests good resolution and accuracy for distance and velocity measurements.

  5. Digital signal coding

    Energy Technology Data Exchange (ETDEWEB)

    Gaunt, R.

    1997-05-01

    It seems that digital video has gone by as many names as Jim Blinn has Siggraph ribbons. Some of its various formats and names are: DV, Dl, 4:2:2, CCIR 601-1, ITU-Rec. 601-4,, SMPTE RP125M, and SMPTE 259M. CCIR and CCITT were both absorbed into their parent organization, the International Telecommunications Union (ITU), so technically speaking, CCIR 601 has been renamed to ITU-Rec. 601-4 (``Rec.`` stands for recommendation). But convention is often hard to change, so for some time you will see and hear Dl and CCIR 601 used for serial digital component video. Below are brief descriptions of the various names and formats for digital video.

  6. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  7. System and method for investigating sub-surface features of a rock formation with acoustic sources generating coded signals

    Energy Technology Data Exchange (ETDEWEB)

    Vu, Cung Khac; Nihei, Kurt; Johnson, Paul A; Guyer, Robert; Ten Cate, James A; Le Bas, Pierre-Yves; Larmat, Carene S

    2014-12-30

    A system and a method for investigating rock formations includes generating, by a first acoustic source, a first acoustic signal comprising a first plurality of pulses, each pulse including a first modulated signal at a central frequency; and generating, by a second acoustic source, a second acoustic signal comprising a second plurality of pulses. A receiver arranged within the borehole receives a detected signal including a signal being generated by a non-linear mixing process from the first-and-second acoustic signal in a non-linear mixing zone within the intersection volume. The method also includes-processing the received signal to extract the signal generated by the non-linear mixing process over noise or over signals generated by a linear interaction process, or both.

  8. System and method for investigating sub-surface features of a rock formation with acoustic sources generating coded signals

    Science.gov (United States)

    Vu, Cung Khac; Nihei, Kurt; Johnson, Paul A; Guyer, Robert; Ten Cate, James A; Le Bas, Pierre-Yves; Larmat, Carene S

    2014-12-30

    A system and a method for investigating rock formations includes generating, by a first acoustic source, a first acoustic signal comprising a first plurality of pulses, each pulse including a first modulated signal at a central frequency; and generating, by a second acoustic source, a second acoustic signal comprising a second plurality of pulses. A receiver arranged within the borehole receives a detected signal including a signal being generated by a non-linear mixing process from the first-and-second acoustic signal in a non-linear mixing zone within the intersection volume. The method also includes-processing the received signal to extract the signal generated by the non-linear mixing process over noise or over signals generated by a linear interaction process, or both.

  9. Coding for optical channels

    CERN Document Server

    Djordjevic, Ivan; Vasic, Bane

    2010-01-01

    This unique book provides a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory and optical communication.

  10. Signal enhancement of a novel multi-address coding lidar backscatters based on a combined technique of demodulation and wavelet de-noising

    Science.gov (United States)

    Xu, Fan; Wang, Yuanqing

    2015-11-01

    Multi-address coding (MAC) lidar is a novel lidar system recently developed by our laboratory. By applying a new combined technique of multi-address encoding, multiplexing and decoding, range resolution is effectively improved. In data processing, a signal enhancement method involving laser signal demodulation and wavelet de-noising in the downlink is proposed to improve the signal to noise ratio (SNR) of raw signal and the capability of remote application. In this paper, the working mechanism of MAC lidar is introduced and the implementation of encoding and decoding is also illustrated. We focus on the signal enhancement method and provide the mathematical model and analysis of an algorithm on the basis of the combined method of demodulation and wavelet de-noising. The experimental results and analysis demonstrate that the signal enhancement approach improves the SNR of raw data. Overall, compared with conventional lidar system, MAC lidar achieves a higher resolution and better de-noising performance in long-range detection.

  11. The fusion protein signal-peptide-coding region of canine distemper virus: a useful tool for phylogenetic reconstruction and lineage identification.

    Directory of Open Access Journals (Sweden)

    Nicolás Sarute

    Full Text Available Canine distemper virus (CDV; Paramyxoviridae, Morbillivirus is the etiologic agent of a multisystemic infectious disease affecting all terrestrial carnivore families with high incidence and mortality in domestic dogs. Sequence analysis of the hemagglutinin (H gene has been widely employed to characterize field strains, permitting the identification of nine CDV lineages worldwide. Recently, it has been established that the sequences of the fusion protein signal-peptide (Fsp coding region are extremely variable, suggesting that analysis of its sequence might be useful for strain characterization studies. However, the divergence of Fsp sequences among worldwide strains and its phylogenetic resolution has not yet been evaluated. We constructed datasets containing the Fsp-coding region and H gene sequences of the same strains belonging to eight CDV lineages. Both datasets were used to evaluate their phylogenetic resolution. The phylogenetic analysis revealed that both datasets clustered the same strains into eight different branches, corresponding to CDV lineages. The inter-lineage amino acid divergence was fourfold greater for the Fsp peptide than for the H protein. The likelihood mapping revealed that both datasets display strong phylogenetic signals in the region of well-resolved topologies. These features indicate that Fsp-coding region sequence analysis is suitable for evolutionary studies as it allows for straightforward identification of CDV lineages.

  12. Performance analysis of IM, DPSK and DQPSK payload signals with frequency swept coherent detected spectral amplitude code labelling

    DEFF Research Database (Denmark)

    Cao, Yongsheng; Osadchiy, Alexey Vladimirovich; Xin, Xiangjun

    2011-01-01

    shift keying (DPSK), differential quadrature phase shift keying (DQPSK) and 4-channel multi-rate DQPSK payload signals with 2.5, 10, 20 and 80 Gb/s rates for comparison purposes. The label and payload signal performances are assessed by the eye-diagram opening factor (EOF) and bit-error rate (BER...

  13. Striatal and Tegmental Neurons Code Critical Signals for Temporal-Difference Learning of State Value in Domestic Chicks

    Science.gov (United States)

    Wen, Chentao; Ogura, Yukiko; Matsushima, Toshiya

    2016-01-01

    To ensure survival, animals must update the internal representations of their environment in a trial-and-error fashion. Psychological studies of associative learning and neurophysiological analyses of dopaminergic neurons have suggested that this updating process involves the temporal-difference (TD) method in the basal ganglia network. However, the way in which the component variables of the TD method are implemented at the neuronal level is unclear. To investigate the underlying neural mechanisms, we trained domestic chicks to associate color cues with food rewards. We recorded neuronal activities from the medial striatum or tegmentum in a freely behaving condition and examined how reward omission changed neuronal firing. To compare neuronal activities with the signals assumed in the TD method, we simulated the behavioral task in the form of a finite sequence composed of discrete steps of time. The three signals assumed in the simulated task were the prediction signal, the target signal for updating, and the TD-error signal. In both the medial striatum and tegmentum, the majority of recorded neurons were categorized into three types according to their fitness for three models, though these neurons tended to form a continuum spectrum without distinct differences in the firing rate. Specifically, two types of striatal neurons successfully mimicked the target signal and the prediction signal. A linear summation of these two types of striatum neurons was a good fit for the activity of one type of tegmental neurons mimicking the TD-error signal. The present study thus demonstrates that the striatum and tegmentum can convey the signals critically required for the TD method. Based on the theoretical and neurophysiological studies, together with tract-tracing data, we propose a novel model to explain how the convergence of signals represented in the striatum could lead to the computation of TD error in tegmental dopaminergic neurons. PMID:27877100

  14. Striatal and Tegmental Neurons Code Critical Signals for Temporal-Difference Learning of State Value in Domestic Chicks

    Directory of Open Access Journals (Sweden)

    Chentao Wen

    2016-11-01

    Full Text Available To ensure survival, animals must update the internal representations of their environment in a trial-and-error fashion. Psychological studies of associative learning and neurophysiological analyses of dopaminergic neurons have suggested that this updating process involves the temporal-difference (TD method in the basal ganglia network. However, the way in which the component variables of the TD method are implemented at the neuronal level is unclear. To investigate the underlying neural mechanisms, we trained domestic chicks to associate color cues with food rewards. We recorded neuronal activities from the medial striatum or tegmentum in a freely behaving condition and examined how reward omission changed neuronal firing. To compare neuronal activities with the signals assumed in the TD method, we simulated the behavioral task in the form of a finite sequence composed of discrete steps of time. The three signals assumed in the simulated task were the prediction signal, the target signal for updating, and the TD-error signal. In both the medial striatum and tegmentum, the majority of recorded neurons were categorized into three types according to their fitness for three models, though these neurons tended to form a continuum spectrum without distinct differences in the firing rate. Specifically, two types of striatal neurons successfully mimicked the target signal and the prediction signal. A linear summation of these two types of striatum neurons was a good fit for the activity of one type of tegmental neurons mimicking the TD-error signal. The present study thus demonstrates that the striatum and tegmentum can convey the signals critically required for the TD method. Based on the theoretical and neurophysiological studies, together with tract-tracing data, we propose a novel model to explain how the convergence of signals represented in the striatum could lead to the computation of TD error in tegmental dopaminergic neurons.

  15. GPS M码信号压制干扰样式效能分析%Effectiveness Analysis of the Blanket Jamming Mode to GPS M Code Signal

    Institute of Scientific and Technical Information of China (English)

    毛虎; 吴德伟; 卢虎; 白盟亮

    2015-01-01

    Aiming at the feature and superiority on anti-jamming of global position system (GPS) M code signal, in order to find an effective jamming mode for M code signal, the jamming efficiency of three types of typical blanket jamming, single frequency, band-limited Gaussian noise, and pseudo code with the same rate, are analyzed. In the analysis, the power spectral density change of GPS receiver cross-correlation filtering output is taken as the qualitative evaluation bases;the code tracking error and the ephemeris bit error rate (BER) are taken as the quantitative evaluation indexes. The influence process of jamming to evaluation factor and the oneness of each evaluation factor are derived theoretically by modeling M code signal receiving system. The simulation results show that single frequency jamming exhibits the best jamming effect while band-limited Gaussian noise jamming is the worst, the second comes pseudo code with the same rate jamming when the influence of sub-carrier modulation was eliminated. Considering the complexity of smart jamming implementation, it is suggested to choose the pseudo code with the same rate as M code signal jamming since single frequency jamming needs strict frequency setting and it is easily eliminated by frequency domain filtering.%针对GPS M码信号的特点和在抗干扰方面的优越性,为实现对其有效干扰,以接收机相关滤波输出功率谱变化情况作为定性评估依据,以码跟踪误差和星历误码率作为定量评估指标,对单频、带限高斯噪声和同速率伪码3种典型压制干扰样式的干扰效能进行分析。通过建立M码信号的接收系统模型,从理论上推导了干扰对各具体评估要素的影响过程以及各要素之间的统一性。仿真结果表明,单频干扰效果最好,消除副载波调制影响的同速率伪码干扰次之,带限高斯噪声干扰效果较差。考虑到单频干扰对干扰频偏设置的较高要求以及容易被接收

  16. Research on High-Frequency Combination Coding-Based SSVEP-BCIs and Its Signal Processing Algorithms

    Directory of Open Access Journals (Sweden)

    Feng Zhang

    2015-01-01

    Full Text Available This study presents a new steady-state visual evoked potential (SSVEP paradigm for brain computer interface (BCI systems. The new paradigm is High-Frequency Combination Coding-Based SSVEP (HFCC-SSVEP. The goal of this study is to increase the number of targets using fewer stimulation frequencies, with diminishing subject’s fatigue and reducing the risk of photosensitive epileptic seizures. This paper investigated the HFCC-SSVEP high-frequency response (beyond 25 Hz for 3 frequencies (25 Hz, 33.33 Hz, and 40 Hz. HFCC-SSVEP produces nn with n high stimulation frequencies through Time Series Combination Code. Furthermore, The Improved Hilbert-Huang Transform (IHHT is adopted to extract time-frequency feature of the proposed SSVEP response. Lastly, the differentiation combination (DC method is proposed to select the combination coding sequence in order to increase the recognition rate; as a result, IHHT algorithm and DC method for the proposed SSVEP paradigm in this study increase recognition efficiency so as to improve ITR and increase the stability of the BCI system. Furthermore, SSVEPs evoked by high-frequency stimuli (beyond 25 Hz minimally diminish subject’s fatigue and prevent safety hazards linked to photo-induced epileptic seizures. This study tests five subjects in order to verify the feasibility of the proposed method.

  17. 巴克编码信号检测混凝土缺陷%Defects inspection of concrete with Barker coded signal

    Institute of Scientific and Technical Information of China (English)

    李长征; 王锐

    2013-01-01

    针对超声检测中的低信噪比、回波不易识别的问题,提出了用巴克编码技术检测混凝土缺陷的方法.介绍了巴克编码的基本方法和检测原理,通过在发射端发射13位的巴克编码信号,在接收端通过相关运算,得到峰值较高且信噪比高的信号.介绍了试验的设计方法和检测过程.对混凝土块内的孔洞和裂缝分别进行了巴克编码的激励检测,检测结果证明了该方法的有效性,并且证明在提高回波信噪比方面是有益的.%For the existing problems of low signal noise ratio (SNR) and the difficulty of reading the prime time of echo,concrete defect inspection by Barker coded method is proposed.The basic method and principle is introduced.The Barker signal sent from transmitting terminal,and a signal with high amplitude and high SNR will be obtained at receiving terminal by correlation calculation.Testing method and the process is introduced.The voids and cracks in concrete are inspected by the method.The results show that Barker coded method is effective and helpful to improve the SNR of inspection signals.

  18. A New Multi-dimensional General Relativistic Neutrino Hydrodynamics Code for Core-collapse Supernovae. IV. The Neutrino Signal

    Science.gov (United States)

    Müller, Bernhard; Janka, Hans-Thomas

    2014-06-01

    Considering six general relativistic, two-dimensional (2D) supernova (SN) explosion models of progenitor stars between 8.1 and 27 M ⊙, we systematically analyze the properties of the neutrino emission from core collapse and bounce to the post-explosion phase. The models were computed with the VERTEX-COCONUT code, using three-flavor, energy-dependent neutrino transport in the ray-by-ray-plus approximation. Our results confirm the close similarity of the mean energies, langErang, of \\bar{\

  19. Research on High-Frequency Combination Coding-Based SSVEP-BCIs and Its Signal Processing Algorithms

    OpenAIRE

    Feng Zhang; Chengcheng Han; Lili Li; Xin Zhang; Jun Xie; Yeping Li

    2015-01-01

    This study presents a new steady-state visual evoked potential (SSVEP) paradigm for brain computer interface (BCI) systems. The new paradigm is High-Frequency Combination Coding-Based SSVEP (HFCC-SSVEP). The goal of this study is to increase the number of targets using fewer stimulation frequencies, with diminishing subject’s fatigue and reducing the risk of photosensitive epileptic seizures. This paper investigated the HFCC-SSVEP high-frequency response (beyond 25 Hz) for 3 frequencies (25 H...

  20. Optimal size of stochastic Hodgkin-Huxley neuronal systems for maximal energy efficiency in coding pulse signals

    Science.gov (United States)

    Yu, Lianchun; Liu, Liwei

    2014-03-01

    The generation and conduction of action potentials (APs) represents a fundamental means of communication in the nervous system and is a metabolically expensive process. In this paper, we investigate the energy efficiency of neural systems in transferring pulse signals with APs. By analytically solving a bistable neuron model that mimics the AP generation with a particle crossing the barrier of a double well, we find the optimal number of ion channels that maximizes the energy efficiency of a neuron. We also investigate the energy efficiency of a neuron population in which the input pulse signals are represented with synchronized spikes and read out with a downstream coincidence detector neuron. We find an optimal number of neurons in neuron population, as well as the number of ion channels in each neuron that maximizes the energy efficiency. The energy efficiency also depends on the characters of the input signals, e.g., the pulse strength and the interpulse intervals. These results are confirmed by computer simulation of the stochastic Hodgkin-Huxley model with a detailed description of the ion channel random gating. We argue that the tradeoff between signal transmission reliability and energy cost may influence the size of the neural systems when energy use is constrained.

  1. 巴克码在复合声呐信号中的应用%Simulation on application of Barker code in complex sonar signals

    Institute of Scientific and Technical Information of China (English)

    冯奇; 王英民

    2014-01-01

    The-transmitted-waveform-directly-affects-the-performance-of-sonar-at-range-resolution,-velocity-resolution,-low-interception-ability-and-anti-reverberation-ability.-Therefore,-the-design-and-proper-selection-of-waveform-show-an-important-significance-to-sonar-system.-Barker-code,-whose-ambiguity-function-is-close-to-ideal-thumbtack-shape,-bears-high-time-frequency-resolution.-Resolution-and-anti-reverberation-performance-of-the-complex-sonar-signals-based-on-Barker-code-are-analyzed-by-ambiguity-function-and-Q-function,and-are-compared-with-those-of-Continuous-Waveform(CW)-signal-and-Linear-Frequency-Modulation(LFM)-signal.-Simulations-indicate-that-complex-sonar-signals-based-on-Barker-code-are-featured-with-a-relatively-high-resolution-in-range,and-a-relatively-high-reverberation-suppression,which-make-them-the-prioritized-waveforms-for-active-sonar-operating-in-shallow-water.%信号波形直接影响着声呐对目标的时延分辨力、频移分辨力、低截获能力及抗混响能力。因此,设计和选择合适的波形对声呐系统有着极其重要的影响。巴克(Barker)码的模糊函数呈理想的“图钉型”,具有良好的时频分辨力。本文利用模糊函数和 Q 函数,对基于巴克码的复合声呐信号的分辨力、抗混响等性能进行了仿真分析,并和传统的单频矩形脉冲(CW)信号、线性调频脉冲(LFM)信号进行了比较,得出基于巴克码的复合声呐信号能够实现较高的测量精确度,而且在一定的多普勒频移范围内具有较好的抗混响能力,是浅海中主动声呐的优先选择信号。

  2. Performance Comparison of Alamouti Space-Time Coded and Amplify-Forward Relay Diversities for OFDM Signals

    Directory of Open Access Journals (Sweden)

    Ahmet Oturak

    2011-06-01

    Full Text Available Diversity implementation improves the error rate performance of communication systems. Two diversity techniques among various of them are space-time diversity and cooperative diversity. In this study, symbol error rate performances of space-time and cooperative diversities for Orthogonal Frequency Division Multiplexing (OFDM signals are compared. A simple space-time diversity, Alamouti scheme with two transmitter and one receiver antennas, and a cooperative diversity with single relay amplify-and-forward structure are considered. Both can achieve a transmit diversity order of 2. The considered channel model is a Rayleigh flat fading per carrier frequency due to narrow-band multi-carrier transmitted signal. For modulation technique, phase shift keying (PSK modulation is used. By using both of diversity techniques, performance results are obtained by theoretically and by simulation for different modulation levels (4, 16 ve 64 of PSK. Results show that the Alamouti scheme achieves better symbol error performance than the single relay cooperative diversity.

  3. A Tumor Surveillance Model: A Non-Coding RNA Senses Neoplastic Cells and Its Protein Partner Signals Cell Death

    Directory of Open Access Journals (Sweden)

    Yong Sun Lee

    2012-10-01

    Full Text Available nc886 (= pre-miR-886 or vtRNA2-1 is a non-coding RNA that has been recently identified as a natural repressor for the activity of PKR (Protein Kinase R. The suppression of nc886 activates PKR and thereby provokes a cell death pathway. When combined with the fact that nc886 is suppressed in a wide range of cancer cells, the nc886-PKR relationship suggests a tumor surveillance model. When neoplastic cells develop and nc886 decreases therein, PKR is released from nc886 and becomes the active phosphorylated form, which initiates an apoptotic cascade to eliminate those cells. The nc886-PKR pathway is distinct from conventional mechanisms, such as the immune surveillance hypothesis or intrinsic mechanisms that check/proofread the genomic integrity, and thus represents a novel example of tumor surveillance.

  4. A New Multi-Dimensional General Relativistic Neutrino Hydrodynamics Code for Core-Collapse Supernovae IV. The Neutrino Signal

    CERN Document Server

    Mueller, B

    2014-01-01

    Considering general relativistic, two-dimensional (2D) supernova (SN) explosion models of progenitor stars between 8.1 and 27 solar masses, we systematically analyze the properties of the neutrino emission from core collapse and bounce to the post-explosion phase. The models were computed with the Vertex-CoCoNuT code, using three-flavor, energy-dependent neutrino transport in the ray-by-ray-plus approximation. Our results confirm the close similarity of the mean energies of electron antineutrinos and heavy-lepton neutrinos and even their crossing during the accretion phase for stars with M>10 M_sun as observed in previous 1D and 2D simulations with state-of-the-art neutrino transport. We establish a roughly linear scaling of the electron antineutrino mean energy with the proto-neutron star (PNS) mass, which holds in time as well as for different progenitors. Convection inside the PNS affects the neutrino emission on the 10-20% level, and accretion continuing beyond the onset of the explosion prevents the abru...

  5. Scar or recurrence - comparison of MRI and color-coded ultrasound with echo signal amplifiers; Narbe oder Rezidiv? Einsatz der signalverstaerkten Doppler-Sonographie im Vergleich zur MRT

    Energy Technology Data Exchange (ETDEWEB)

    Aichinger, U.; Schulz-Wendtland, R.; Lell, M.; Bautz, W. [Institut fuer Diagnostische Radiologie, Erlangen Univ., Nuernberg (Germany); Kraemer, S. [Klinik fuer Frauenheilkunde, Friedrich-Alexander-Universitaet Erlangen, Nuernberg (Germany)

    2002-11-01

    Purpose: MRI is the most reliable method to differentiate scar and recurrent carcinoma of the breast after surgical treatment. This study compares MRI and color-coded ultrasound with and without echo signal amplifier (ESA). Materials and Methods: Forty-two patients with suspected recurrent tumors were enrolled in this prospective study, with 38 patients after breast conserving therapy and 4 after mastectomy. All patients had a clinical examination, mammography (n=38), real time ultrasound (US), color-coded ultrasound without and with ESA (Levovist {sup trademark}, Schering, Berlin), and dynamic MRI. The criteria used for duplex ultrasound were tumor vascularisation and flow pattern. The results were compared with histologic findings or the results of follow-up examinations for at least 12 months. Results: The detection of penetrating or central vessels proved to be an accurate sign of malignancy in duplex ultrasound. With the application of ESA, additional vessels were detected within the lesions, increasing the diagnostic accuracy (83% with ESA versus 79% without ESA). The sensitivity of color-coded ultrasound improved from 64% to 86% with echo signal amplifier. The specificity was 86% without and 82% with echo signal amplifier. MRI was found to have a sensitivity fo 100% and a specificity of 82%. The same 5 lesions were false positive on MRI and color-coded US after Levovist {sup trademark}. No lesion without signs of vascularity within or in its vicinity was malignant. Conclusion: Color-coded ultrasound seems to be a promising method in the differentiation between scar and recurrence. Lesions with penetrating or central vessels have a high probability of being malignant, whereas lesions without any signs of vascularity inside or nearby have a high probability of being benign. Advantage of contrast-enhanced US is its ubiquitous availability. (orig.) [German] Studienziel: Die MRT zeigt in der Rezidiverkennung nach behandeltem Mammakarzinom die hoechste

  6. Improved Frequency Domain Parallel Code Acquisition Algorithm for GPS Signal%GPS频域并行码捕获改进算法

    Institute of Scientific and Technical Information of China (English)

    赵丽; 陈小惠; 潘树国

    2011-01-01

    This paper proposes an improved frequency domain parallel code acquisition algorithm for GPS LI signal, which could overcome poor acquisition real-time of GPS software receiver based on FPGA. According to the frequency domain parallel code acquisition algorithm, the improved algorithm samples 5 714 points of data to 1 024 points during one period using average sampling technique. Subsequently, we utilize Altera FFT IP core to work out Fourier transform of 1024 points of data. Simulation experiment implemented to test the optimized algorithm by using ModelSim simulator. Simulation results indicate that the proposed approach could obviously reduce the calculating amount and largely increase acquisition speed. It doesn't affect the final result of tracking process because only a little C/A code phase errors exist.%针对基于FPGA平台的GPS L1信号的软件接收机捕获实时性差的问题,设计并实现了改进的GPS信号频域并行码相位捕获算法.首先分析了频域并行码相位捕获的理论模型,在此基础上采用平均采样方法对5 714点的数据进行下采样,平均采样后为1 024点,用Altera FFT IP核实现1 024点数据的FFT计算,实现算法的改进.利用ModelSim进行了仿真,仿真结果表明改进的算法降低了运算量,极大地提高了捕获速度,尽管平均采样造成了一定的C/A码相位误差,但不影响跟踪的结果,保证了捕获的正确性.

  7. Improved code-tracking loop

    Science.gov (United States)

    Laflame, D. T.

    1980-01-01

    Delay-locked loop tracks pseudonoise codes without introducing dc timing errors, because it is not sensitive to gain imbalance between signal processing arms. "Early" and "late" reference codes pass in combined form through both arms, and each arm acts on both codes. Circuit accomodates 1 dB weaker input signals with tracking ability equal to that of tau-dither loops.

  8. The water-borne protein signals (pheromones) of the Antarctic ciliated protozoan Euplotes nobilii: structure of the gene coding for the En-6 pheromone.

    Science.gov (United States)

    La Terza, Antonietta; Dobri, Nicoleta; Alimenti, Claudio; Vallesi, Adriana; Luporini, Pierangelo

    2009-01-01

    The marine Antarctic ciliate, Euplotes nobilii, secretes a family of water-borne signal proteins, denoted as pheromones, which control vegetative proliferation and mating in the cell. Based on the knowledge of the amino acid sequences of a set of these pheromones isolated from the culture supernatant of wild-type strains, we designed probes to identify their encoding genes in the cell somatic nucleus (macronucleus). The full-length gene of the pheromone En-6 was determined and found to contain an open-reading frame specific for the synthesis of the En-6 cytoplasmic precursor (pre-pro-En-6), which requires 2 proteolytic cleavages to remove the signal peptide (pre) and the prosegment before secretion of the mature protein. In contrast to the sequence variability that distinguishes the secreted pheromones, the pre- and pro-sequences appear to be tightly conserved and useful for the construction of probes to clone every other E. nobilii pheromone gene. Potential intron sequences in the coding region of the En-6 gene imply the synthesis of more En-6 isoforms.

  9. A sandwich-hybridization assay for simultaneous determination of HIV and tuberculosis DNA targets based on signal amplification by quantum dots-PowerVision™ polymer coding nanotracers.

    Science.gov (United States)

    Yan, Zhongdan; Gan, Ning; Zhang, Huairong; Wang, De; Qiao, Li; Cao, Yuting; Li, Tianhua; Hu, Futao

    2015-09-15

    A novel sandwich-hybridization assay for simultaneous electrochemical detection of multiple DNA targets related to human immune deficiency virus (HIV) and tuberculosis (TB) was developed based on the different quantum dots-PowerVision(TM) polymer nanotracers. The polymer nanotracers were respectively fabricated by immobilizing SH-labeled oligonucleotides (s-HIV or s-TB), which can partially hybrid with virus DNA (HIV or TB), on gold nanoparticles (Au NPs) and then modified with PowerVision(TM) (PV) polymer-encapsulated quantum dots (CdS or PbS) as signal tags. PV is a dendrimer enzyme linked polymer, which can immobilize abundant QDs to amplify the stripping voltammetry signals from the metal ions (Pb or Cd). The capture probes were prepared through the immobilization of SH-labeled oligonucleotides, which can complementary with HIV and TB DNA, on the magnetic Fe3O4@Au (GMPs) beads. After sandwich-hybridization, the polymer nanotracers together with HIV and TB DNA targets were simultaneously introduced onto the surface of GMPs. Then the two encoding metal ions (Cd(2+) and Pb(2+)) were used to differentiate two viruses DNA due to the different subsequent anodic stripping voltammetric peaks at -0.84 V (Cd) and -0.61 V (Pb). Because of the excellent signal amplification of the polymer nanotracers and the great specificity of DNA targets, this assay could detect targets DNA as low as 0.2 femtomolar and exhibited excellent selectivity with the dynamitic range from 0.5 fM to 500 pM. Those results demonstrated that this electrochemical coding assay has great potential in applications for screening more viruses DNA while changing the probes.

  10. Noncanonical Wnt11 signaling and cardiomyogenic differentiation.

    Science.gov (United States)

    Flaherty, Michael P; Dawn, Buddhadeb

    2008-10-01

    Although the molecular details remain unclear, Wnt signaling via both canonical and noncanonical pathways is integral to cardiac specification and morphogenesis. A growing body of evidence also suggests substantial overlap between these supposedly discrete pathways in cell- and context-dependent manners. The ability of Wnt11 to induce cardiomyogenesis both during embryonic development and in adult cells makes it an attractive candidate for preprogramming cells for cardiac repair. This review primarily discusses various aspects of noncanonical Wnt signaling in cardiogenesis with particular emphasis on Wnt11.

  11. Pseudonoise code tracking loop

    Science.gov (United States)

    Laflame, D. T. (Inventor)

    1980-01-01

    A delay-locked loop is presented for tracking a pseudonoise (PN) reference code in an incoming communication signal. The loop is less sensitive to gain imbalances, which can otherwise introduce timing errors in the PN reference code formed by the loop.

  12. Noisy Network Coding

    CERN Document Server

    Lim, Sung Hoon; Gamal, Abbas El; Chung, Sae-Young

    2010-01-01

    A noisy network coding scheme for sending multiple sources over a general noisy network is presented. For multi-source multicast networks, the scheme naturally extends both network coding over noiseless networks by Ahlswede, Cai, Li, and Yeung, and compress-forward coding for the relay channel by Cover and El Gamal to general discrete memoryless and Gaussian networks. The scheme also recovers as special cases the results on coding for wireless relay networks and deterministic networks by Avestimehr, Diggavi, and Tse, and coding for wireless erasure networks by Dana, Gowaikar, Palanki, Hassibi, and Effros. The scheme involves message repetition coding, relay signal compression, and simultaneous decoding. Unlike previous compress--forward schemes, where independent messages are sent over multiple blocks, the same message is sent multiple times using independent codebooks as in the network coding scheme for cyclic networks. Furthermore, the relays do not use Wyner--Ziv binning as in previous compress-forward sch...

  13. Random Discrete Frequency Coding Signal Based on Chaotic Series%一种基于混沌序列的随机离散频率编码信号

    Institute of Scientific and Technical Information of China (English)

    杨进; 邱兆坤; 黎湘; 庄钊文

    2011-01-01

    针对正交编码信号已有设计方法计算复杂、编码长度和数量受限等问题,该文利用混沌序列类随机、初值敏感,易产生和易使用的特点,提出应用混沌序列设计随机离散频率编码信号.在给出编码信号设计方案的基础上,详细推导此类信号的模糊函数,分析了其距离、多普勒分辨能力,讨论了信号的准正交特性,并比较了不同混沌序列对信号性能的影响.理论分析和仿真实验表明,结合混沌序列的频率编码信号具有优良的模糊函数、准正交性能,且信号产生容易,编码长度和数量可以任意设置,可以作为一类有潜力的雷达信号使用.%For deficiencies of existing design methods of orthogonal coded signals such as notably computational complexity, limited coding length and limited signal number, a kind of random discrete frequency coding signal based on chaotic series is proposed in this paper, considering the attracting characteristics of chaotic series such as noise like behavior, initial value sensitiveness and easy for generation and use. The time-Doppler ambiguity function of the designed signal is induced in detail, the range and Doppler resolution are analyzed, and the pseudo-orthogonal property is discussed in this paper based on the signal coding model. Signal performances are compared with different chaotic series. The proposed signals present quite good performances in ambiguity function, pseudo-orthogonal property, easy generation and unlimited coding length and large signals' number, and can be applied as a kind of promising radar signals.

  14. 分数阶Fourier变换的多相码雷达信号分离算法%A Separation Algorithm of Poly-Phase Code Radar Signals Based on Fractional Fourier Transform

    Institute of Scientific and Technical Information of China (English)

    熊坤来; 罗景青

    2012-01-01

    利用多相码雷达信号在某个分数阶域内呈现多个间隔相等的冲击这一特性,提出了一种基于分数阶Fourier变换的多相码雷达信号分离算法,首先将混合信号以特定的旋转角作分数阶Fourier变换,然后通过窄带通滤波器抽取多相码雷达信号,去除大量噪声和其他干扰信号,最后再经过分数阶Fourier反变换,恢复出时域的多相码雷达信号.理论分析和仿真实验表明,该算法计算量小,分离效果好,可实现较低信噪比下的多相码雷达信号分离.%By using the characteristics of poly-phase code radar signals that its energy are concentrated in one fractional domain, a separation algorithm of poly-phase code radar signals based on fractional Fourier transform (FrFT) is proposed in this paper. First, a mixed signal is rotated to a certain angle by the FrFT. Then, a narrow band filter is exploited to extract the poly-phase code radar signal and depress most of noise and other signals. Finally, the poly-phase code radar signal is rotated back to the time domain by the inverse FrFT. The theoretical analysis and simulation results demonstrate the validity of the method.

  15. Photonic Generation of Phase-Coded Microwave Signal with Large Frequency Tunability%光生频率大范围可调的相位编码微波信号

    Institute of Scientific and Technical Information of China (English)

    刘双; 钱祖平; 王荣; 蒲涛

    2013-01-01

    提出并验证了一种光生相位编码微波信号的方法,其主要原理是对编码的相干光边带进行差拍,从而得到高频率、高编码数率、低噪声的相位编码微波信号.该方法简单易行,利于集成,能适应不同的编码速率,产生的微波信号频率大范围可调,能解决电子电路方法中遇到的“电子瓶颈”问题.介绍了所提方法的原理,并进行了理论推导,在系统分析中加入了对调制器驱动信号相位噪声的分析,使得系统建模更加科学完善;实验设计制作了所需的光纤光栅带阻滤波器,产生了20 GHz和25 GHz的相位编码微波信号,实验结果与理论值几乎吻合,证明了所提方法提高脉冲压缩比的能力.%A photonic approach to generating a phase-coded microwave signal is proposed and demonstrated. The main principle is to beat the encoded coherent optical sideband to obtain high-frequency, high-coding rate, low-noise encoded microwave signals. The proposed technique, which is simple and conducive to integration, can adapt to different coding rates, generate phase-coded microwave signals with tunable frequency, and solve the bottleneck problem of traditional electronic approaches. The principle is discussed in detail. Mathematical models are developed to consider perturbation on the generated coded signal caused by the phase fluctuations of the microwave driving signal and the optical carrier. The required fiber Bragg grating notch filter is fabricated, and 20 GHz and 25 GHz phase-coded microwave signals are experimentally generated, respectively. The experimental results agree well with theoretical values, and it is proved that the proposed method improves the pulse compression capability.

  16. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  17. The use of machine learning with signal- and NLP processing of source code to detect and classify vulnerabilities and weaknesses with MARFCAT

    CERN Document Server

    Mokhov, Serguei A

    2010-01-01

    We present a machine learning approach to static code analysis for weaknesses related to security and others with the open-source MARF framework and its application to for the NIST's SATE 2010 static analysis tool exhibition workshop.

  18. Improving Robot Motor Learning with Negatively Valenced Reinforcement Signals.

    Science.gov (United States)

    Navarro-Guerrero, Nicolás; Lowe, Robert J; Wermter, Stefan

    2017-01-01

    Both nociception and punishment signals have been used in robotics. However, the potential for using these negatively valenced types of reinforcement learning signals for robot learning has not been exploited in detail yet. Nociceptive signals are primarily used as triggers of preprogrammed action sequences. Punishment signals are typically disembodied, i.e., with no or little relation to the agent-intrinsic limitations, and they are often used to impose behavioral constraints. Here, we provide an alternative approach for nociceptive signals as drivers of learning rather than simple triggers of preprogrammed behavior. Explicitly, we use nociception to expand the state space while we use punishment as a negative reinforcement learning signal. We compare the performance-in terms of task error, the amount of perceived nociception, and length of learned action sequences-of different neural networks imbued with punishment-based reinforcement signals for inverse kinematic learning. We contrast the performance of a version of the neural network that receives nociceptive inputs to that without such a process. Furthermore, we provide evidence that nociception can improve learning-making the algorithm more robust against network initializations-as well as behavioral performance by reducing the task error, perceived nociception, and length of learned action sequences. Moreover, we provide evidence that punishment, at least as typically used within reinforcement learning applications, may be detrimental in all relevant metrics.

  19. Parametric Coding of Stereo Audio

    Directory of Open Access Journals (Sweden)

    Erik Schuijers

    2005-06-01

    Full Text Available Parametric-stereo coding is a technique to efficiently code a stereo audio signal as a monaural signal plus a small amount of parametric overhead to describe the stereo image. The stereo properties are analyzed, encoded, and reinstated in a decoder according to spatial psychoacoustical principles. The monaural signal can be encoded using any (conventional audio coder. Experiments show that the parameterized description of spatial properties enables a highly efficient, high-quality stereo audio representation.

  20. Holographic codes

    CERN Document Server

    Latorre, Jose I

    2015-01-01

    There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

  1. Sharing code

    OpenAIRE

    Kubilius, Jonas

    2014-01-01

    Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  2. A novel photoelectrochemical sensor based on photocathode of PbS quantum dots utilizing catalase mimetics of bio-bar-coded platinum nanoparticles/G-quadruplex/hemin for signal amplification.

    Science.gov (United States)

    Wang, Guang-Li; Liu, Kang-Li; Shu, Jun-Xian; Gu, Tian-Tian; Wu, Xiu-Ming; Dong, Yu-Ming; Li, Zai-Jun

    2015-07-15

    Photocathode based on p-type PbS quantum dots (QDs) combing a novel signal amplification strategy utilizing catalase (CAT) mimetics was designed and utilized for sensitive photoelectrochemical (PEC) detection of DNA. The bio-bar-coded Pt nanoparticles (NPs)/G-quadruplex/hemin exhibited high CAT-like activity following the Michaelis-Menten model for decomposing H2O2 to water and oxygen, whose activity even slightly exceeded that of natural CAT. The bio-bar-code as a catalytic label was conjugated onto the surface of PbS QDs modified electrodes through the formed sandwich-type structure due to DNA hybridization. Oxygen in situ generated by the CAT mimetics of the bio-bar-code of Pt NPs/G-quadruplex/hemin acted as an efficient electron acceptor of illuminated PbS QDs, promoting charge separation and enhancing cathodic photocurrent. Under optimal conditions, the developed PEC biosensor for target DNA exhibited a dynamic range of 0.2pmol/L to 1.0nmol/L with a low detection limit of 0.08pmol/L. The high sensitivity of the method was resulted from the sensitive response of PbS QDs to oxygen and the highly efficient CAT-like catalytic activity of the bio-bar-coded Pt NPs/G-quadruplex/hemin.

  3. A New Multi-Frequency Random Phase Code Radar Signal Designing Method%多载频类随机相位编码雷达信号设计与特性分析

    Institute of Scientific and Technical Information of China (English)

    黄琼丹; 李勇; 付银娟

    2013-01-01

    We propose what we believe to be a new multi-frequency random phase code ( MRPC) radar signal de-signing method .Its core consists of:( 1) we use the chaotic biphased code based on the improved Logistic mapping and the piecewise Logistic mapping to modulate the phase of the multi-carrier phase code ( MCPC) radar signal;(2) we introduce the quasi-random properties of a chaotic signal into the MCPC radar signal and design the MRPC radar signal, whose ambiguity function , interception factor and peak-to-mean envelope power ratio ( PMEPR) is then analyzed;(3) to select the initial value of the chaotic sequence of the MRPC radar signal , the number of its frequency carriers and the number of its phase-modulated bits, we present their influence on the PMEPR .The sim-ulation results, given in Figs.2 through 6, and their analysis show preliminarily that:(1) the new MRPC radar sig-nal we thus designed keeps the strong points of the MCPC radar signal , has the thumbtack function of the quasi-noise radar signal and the excellent anti-jamming and LPI performances;( 2) the piecewise Logistic MRPC radar signal has a better performance of these kinds than the improved one .%基于OFDM技术的多频多相编码(multifrequency complementary phase coded ,简称MCPC)宽带雷达信号具有控制简单、生成便利和良好的频谱利用率等优点,己成为雷达信号研究领域的重要发展方向和研究热点。用基于改进型Logistic及分段Logistic映射的混沌二相码调制MCPC信号各载频的相位,把混沌信号类随机的性质引入到 MCP C 信号中,设计出多载频类随机相位编码(multifrequency random-like phase coded,简称MRPC)雷达信号,并对MRPC信号的模糊函数、截获因子、峰均包络功率比( PMEPR)等进行了分析。给出了混沌序列的初值、MRPC信号的载频数及码元个数对P MEP R的影响关系,以便于选择合适的初值、载频数和码元数。仿真结果表明,设

  4. Bandwidth efficient coding

    CERN Document Server

    Anderson, John B

    2017-01-01

    Bandwidth Efficient Coding addresses the major challenge in communication engineering today: how to communicate more bits of information in the same radio spectrum. Energy and bandwidth are needed to transmit bits, and bandwidth affects capacity the most. Methods have been developed that are ten times as energy efficient at a given bandwidth consumption as simple methods. These employ signals with very complex patterns and are called "coding" solutions. The book begins with classical theory before introducing new techniques that combine older methods of error correction coding and radio transmission in order to create narrowband methods that are as efficient in both spectrum and energy as nature allows. Other topics covered include modulation techniques such as CPM, coded QAM and pulse design.

  5. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...

  6. Polar Codes

    Science.gov (United States)

    2014-12-01

    QPSK Gaussian channels . .......................................................................... 39 vi 1. INTRODUCTION Forward error correction (FEC...Capacity of BSC. 7 Figure 5. Capacity of AWGN channel . 8 4. INTRODUCTION TO POLAR CODES Polar codes were introduced by E. Arikan in [1]. This paper...Under authority of C. A. Wilgenbusch, Head ISR Division EXECUTIVE SUMMARY This report describes the results of the project “More reliable wireless

  7. Coding and decoding for code division multiple user communication systems

    Science.gov (United States)

    Healy, T. J.

    1985-01-01

    A new algorithm is introduced which decodes code division multiple user communication signals. The algorithm makes use of the distinctive form or pattern of each signal to separate it from the composite signal created by the multiple users. Although the algorithm is presented in terms of frequency-hopped signals, the actual transmitter modulator can use any of the existing digital modulation techniques. The algorithm is applicable to error-free codes or to codes where controlled interference is permitted. It can be used when block synchronization is assumed, and in some cases when it is not. The paper also discusses briefly some of the codes which can be used in connection with the algorithm, and relates the algorithm to past studies which use other approaches to the same problem.

  8. Research of direct sequence spread spectrum signal code element synchronization%直序扩频信号码元的同步方法研究

    Institute of Scientific and Technical Information of China (English)

    邱冬冬; 鲁新龙; 杜建尧; 金华松

    2012-01-01

    The spread spectrum technology is a form of information transmitting in which the RF bandwidth is much larger than the bandwidth of the information itself, two kinds of capture methods of direct sequence spread spectrum system code element synchronization were introduced in this paper;they were the full parallel capture method and the serial capture method. Then,classification and principles of the serial capture method were introduced in detail,and they were compared. Finally,code element tracking in code element synchronization was introduced,a general working' model of code element tracking loop-delay locked loop was put forward,and it was simulated by System View.%扩频通信技术是指用来传输信息的射频带宽远大于信息本身带宽的一种信息传输方式,介绍了直接序列扩频系统码元同步的两种捕获方法:全并行捕获方法和串行捕获方法.详细讲述了串行捕获方法的分类和原理,并对它们作了比较,最后,就码元同步中的码元跟踪进行了介绍,给出了码跟踪环—延迟锁定环(DLL)的一般工作模型,并使用System View对其进行了仿真.

  9. Signal to Noise Ratio (SNR Enhancement Comparison of Impulse-, Coding- and Novel Linear-Frequency-Chirp-Based Optical Time Domain Reflectometry (OTDR for Passive Optical Network (PON Monitoring Based on Unique Combinations of Wavelength Selective Mirrors

    Directory of Open Access Journals (Sweden)

    Christopher M. Bentz

    2014-03-01

    Full Text Available We compare optical time domain reflectometry (OTDR techniques based on conventional single impulse, coding and linear frequency chirps concerning their signal to noise ratio (SNR enhancements by measurements in a passive optical network (PON with a maximum one-way attenuation of 36.6 dB. A total of six subscribers, each represented by a unique mirror pair with narrow reflection bandwidths, are installed within a distance of 14 m. The spatial resolution of the OTDR set-up is 3.0 m.

  10. Code breaking in the pacific

    CERN Document Server

    Donovan, Peter

    2014-01-01

    Covers the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945 Describes, explains and analyzes the code breaking techniques developed during the war in the Pacific Exposes the blunders (in code construction and use) made by the Japanese Navy that led to significant US Naval victories

  11. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  12. Experimental demonstration of all-optical 781.25-Mb/s binary phase-coded UWB Signal Generation and Transmission

    DEFF Research Database (Denmark)

    Yu, Xianbin; Gibbon, Timothy Braidwood; Tafur Monroy, Idelfonso

    2009-01-01

    the requirements of Federal Communications Commission regulations. We experimentally demonstrated a 781.25-Mb/s UWB-over-fiber transmission system. A digital-signal-processing-based receiver is employed to calculate the bit-error rate. Our proposed system has potential application in future high-speed UWB impulse...

  13. Coded Path Protection: Efficient Conversion of Sharing to Coding

    CERN Document Server

    Avci, Serhat Nazim

    2011-01-01

    Link failures in wide area networks are common and cause significant data losses. Mesh-based protection schemes offer high capacity efficiency but they are slow and require complex signaling. Additionally, real-time reconfiguration of a cross-connect threatens their transmission integrity. On the other hand, coding-based protection schemes are proactive. Therefore, they have higher restoration speed, lower signaling complexity, and higher transmission integrity. This paper introduces a coding-based protection scheme, named Coded Path Protection (CPP). In CPP, a backup copy of the primary data is encoded with other data streams, resulting in capacity savings. This paper presents an optimal and simple capacity placement and coding group formation algorithm. The algorithm converts the sharing structure of any solution of a Shared Path Protection (SPP) technique into a coding structure with minimum extra capacity. We conducted quantitative and qualitative comparisons of our technique with the SPP and, another tec...

  14. On the Performance of a Multi-Edge Type LDPC Code for Coded Modulation

    NARCIS (Netherlands)

    Cronie, Harm S.

    2005-01-01

    We present a method to combine error-correction coding and spectral-efficient modulation for transmission over the Additive White Gaussian Noise (AWGN) channel. The code employs signal shaping which can provide a so-called shaping gain. The code belongs to the family of sparse graph codes for which

  15. A New Multi-Dimensional General Relativistic Neutrino Hydrodynamics Code of Core-Collapse Supernovae III. Gravitational Wave Signals from Supernova Explosion Models

    CERN Document Server

    Mueller, Bernhard; Marek, Andreas

    2012-01-01

    We present a detailed theoretical analysis of the gravitational-wave (GW) signal of the post-bounce evolution of core-collapse supernovae (SNe), employing for the first time relativistic, two-dimensional (2D) explosion models with multi-group, three-flavor neutrino transport based on the ray-by-ray-plus approximation. The waveforms reflect the accelerated mass motions associated with the characteristic evolutionary stages that were also identified in previous works: A quasi-periodic modulation by prompt postshock convection is followed by a phase of relative quiescence before growing amplitudes signal violent hydrodynamical activity due to convection and the standing accretion shock instability during the accretion period of the stalled shock. Finally, a high-frequency, low-amplitude variation from proto-neutron star (PNS) convection below the neutrinosphere appears superimposed on the low-frequency trend associated with the aspherical expansion of the SN shock after the onset of the explosion. Relativistic e...

  16. Highly expressed long non-coding RNA FOXD2-AS1 promotes non-small cell lung cancer progression via Wnt/β-catenin signaling.

    Science.gov (United States)

    Rong, Lin; Zhao, Ruixing; Lu, Jinxiu

    2017-03-11

    Non-small cell lung cancer (NSCLC) is one of the most common and aggressive tumors around the world. Long-noncoding RNAs (lncRNAs) have been recently shown to play important roles in regulating numerous biological processes including tumor progression. However, the role of lncRNA FOXD2-AS1 in NSCLC remains unclear. In this study, we found that lncRNA FOXD2-AS1 is significantly up-regulated in NSCLC tissues. Loss- and gain-function assays revealed that FOXD2-AS1 promotes NSCLC cell growth and NSCLC tumor progression. Furthermore, we also revealed that FOXD2-AS1 modulates Wnt/β-catenin signaling in NSCLC cells. Taken together, we conclude that lncRNA FOXD2-AS1 promotes NSCLC progression though Wnt/β-catenin signaling. These results suggest that lncRNA FOXD2-AS1 might act as a novel therapeutic target for NSCLC treatment.

  17. Long non-coding RNA BCAR4 promotes chondrosarcoma cell proliferation and migration through activation of mTOR signaling pathway.

    Science.gov (United States)

    Shui, Xiaolong; Zhou, Chengwei; Lin, Wei; Yu, Yang; Feng, Yongzeng; Kong, Jianzhong

    2017-05-01

    Chondrosarcoma is one of the common malignant histologic tumors, very difficult to treat, but the concrete cause and mechanism have not yet been elucidated. The present study aimed to investigate the functional involvement of BCAR4 in chondrosarcoma and its potentially underlying mechanism. QRT-PCR and western blot were used to determine the expression of BCAR4 and mTOR signaling pathway proteins both in chondrosarcoma tissues and cells. Chondrosarcoma cell proliferation and migration were assessed by MTT assay and transwell migration assay, respectively. The expression vectors were constructed and used to modulate the expression of BCAR4 and mTOR. Chondrosarcoma xenograft mouse model was established by subcutaneous injection with chondrosarcoma cell lines. The tumor volume was monitored to evaluate the effect of BCAR4 on chondrosarcoma cell tumorigenicity. The expressions of BCAR4, p-mTOR and p-P70S6K were up-regulated in chondrosarcoma tissues and cell lines. Moreover, BCAR4 overexpression had significant promoting effect on cell proliferation and migration in chondrosarcoma cells. Furthermore, mTOR signaling pathway was epigenetically activated by BCAR4-induced hyperacetylation of histone H3. We also found that mTOR overexpression abolished the decrease of chondrosarcoma cell proliferation and migration induced by BCAR4 knockdown. In vivo experiments confirmed that BCAR4 overexpression significantly accelerated tumor growth, while the knockdown of BCAR4 significantly inhibited tumor growth. BCAR4 promoted chondrosarcoma cell proliferation and migration through activation of mTOR signaling pathway, and thus contributed to chondrosarcoma progression. Impact statement LncRNA BCAR4 promoted chondrosarcoma cell proliferation and migration through activation of mTOR signaling pathway, and thus contributed to chondrosarcoma progression.

  18. An Improved Parallel Code Phase Search Acquisition Algorithm Based on Bit Quantification for GPS Signals%一种基于比特量化的GPS并行码捕获算法

    Institute of Scientific and Technical Information of China (English)

    曹耀传; 王澄非; 潘树国

    2009-01-01

    针对GPS L1信号的软件接收机(SDR)的快速捕获问题,设计了GPS信号并行码相位搜索捕获的优化算法.首先分析了FFT并行码相位搜索捕获的理论模型,由本地C/A码功率谱频谱分布特点,使用前半频域范围内的信息,进行算法的初步优化;在此基础上采用比特量化方法量化数据信号,使单个计算机储存单元存储多路二进制量化数据,实现对多路数据的并行处理.实验证明改进的并行码相位搜索捕获算法极大地提高了捕获速度,是改进前的5倍,尽管有较少信号强度的衰减,但不影响捕获的正确性,实现了GPS信号的快速捕获.%An optimized algorithm is designed to improve parallel code phase search acquisition for GPS L1 sig-nal, which applies to soft-defined GPS receiver for fasting acquisition. In the following, the model of parallel code phase search acquisition algorithm using FIT is analyzed. By the characteristics of the signal power spec-trum, the algorithm is optimized by using the first half of spectrum information. Subsequently, bit quantification method is used to achieve parallel data processing by storing multi-channel data to a single memory unit. The result shows that the modified algorithm improves acquisition speed five times by decreasing little signal-noise ratio, and achieves fast acquisition.

  19. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    ; alternatives to mainstream development, from performances of the live-coding scene to the organizational forms of commons-based peer production; the democratic promise of social media and their paradoxical role in suppressing political expression; and the market’s emptying out of possibilities for free...... development, Speaking Code unfolds an argument to undermine the distinctions between criticism and practice, and to emphasize the aesthetic and political aspects of software studies. Not reducible to its functional aspects, program code mirrors the instability inherent in the relationship of speech...... expression in the public realm. The book’s line of argument defends language against its invasion by economics, arguing that speech continues to underscore the human condition, however paradoxical this may seem in an era of pervasive computing....

  20. The single fgf receptor gene in the beetle Tribolium castaneum codes for two isoforms that integrate FGF8- and Branchless-dependent signals.

    Science.gov (United States)

    Sharma, Rahul; Beer, Katharina; Iwanov, Katharina; Schmöhl, Felix; Beckmann, Paula Indigo; Schröder, Reinhard

    2015-06-15

    The precise regulation of cell-cell communication by numerous signal-transduction pathways is fundamental for many different processes during embryonic development. One important signalling pathway is the evolutionary conserved fibroblast-growth-factor (FGF)-pathway that controls processes like cell migration, axis specification and mesoderm formation in vertebrate and invertebrate animals. In the model insect Drosophila, the FGF ligand / receptor combinations of FGF8 (Pyramus and Thisbe) / Heartless (Htl) and Branchless (Bnl) / Breathless (Btl) are required for the migration of mesodermal cells and for the formation of the tracheal network respectively with both the receptors functioning independently of each other. However, only a single fgf-receptor gene (Tc-fgfr) has been identified in the genome of the beetle Tribolium. We therefore asked whether both the ligands Fgf8 and Bnl could transduce their signal through a common FGF-receptor in Tribolium. Indeed, we found that the function of the single Tc-fgfr gene is essential for mesoderm differentiation as well as for the formation of the tracheal network during early development. Ligand specific RNAi for Tc-fgf8 and Tc-bnl resulted in two distinct non-overlapping phenotypes of impaired mesoderm differentiation and abnormal formation of the tracheal network in Tc-fgf8- and Tc-bnl(RNAi) embryos respectively. We further show that the single Tc-fgfr gene encodes at least two different receptor isoforms that are generated through alternative splicing. We in addition demonstrate through exon-specific RNAi their distinct tissue-specific functions. Finally, we discuss the structure of the fgf-receptor gene from an evolutionary perspective.

  1. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  2. New multilevel codes over GF(q)

    Science.gov (United States)

    Wu, Jiantian; Costello, Daniel J., Jr.

    1992-01-01

    Set partitioning to multi-dimensional signal spaces over GF(q), particularly GF sup q-1(q) and GF sup q (q), and show how to construct both multi-level block codes and multi-level trellis codes over GF(q). Two classes of multi-level (n, k, d) block codes over GF(q) with block length n, number of information symbols k, and minimum distance d sub min greater than or = d, are presented. These two classes of codes use Reed-Solomon codes as component codes. They can be easily decoded as block length q-1 Reed-Solomon codes or block length q or q + 1 extended Reed-Solomon codes using multi-stage decoding. Many of these codes have larger distances than comparable q-ary block codes, as component codes. Low rate q-ary convolutional codes, work error correcting convolutional codes, and binary-to-q-ary convolutional codes can also be used to construct multi-level trellis codes over GF(q) or binary-to-q-ary trellis codes, some of which have better performance than the above block codes. All of the new codes have simple decoding algorithms based on hard decision multi-stage decoding.

  3. Complementary code and digital filtering for detection of weak VHF radar signals from the mesoscale. [SOUSY-VHF radar, Harz Mountains, Germany

    Science.gov (United States)

    Schmidt, G.; Ruster, R.; Czechowsky, P.

    1983-01-01

    The SOUSY-VHF-Radar operates at a frequency of 53.5 MHz in a valley in the Harz mountains, Germany, 90 km from Hanover. The radar controller, which is programmed by a 16-bit computer holds 1024 program steps in core and controls, via 8 channels, the whole radar system: in particular the master oscillator, the transmitter, the transmit-receive-switch, the receiver, the analog to digital converter, and the hardware adder. The high-sensitivity receiver has a dynamic range of 70 dB and a video bandwidth of 1 MHz. Phase coding schemes are applied, in particular for investigations at mesospheric heights, in order to carry out measurements with the maximum duty cycle and the maximum height resolution. The computer takes the data from the adder to store it in magnetic tape or disc. The radar controller is programmed by the computer using simple FORTRAN IV statements. After the program has been loaded and the computer has started the radar controller, it runs automatically, stopping at the program end. In case of errors or failures occurring during the radar operation, the radar controller is shut off caused either by a safety circuit or by a power failure circuit or by a parity check system.

  4. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe...... the codes succinctly using Gröbner bases....

  5. Highly expressed long non-coding RNA NNT-AS1 promotes cell proliferation and invasion through Wnt/β-catenin signaling pathway in cervical cancer.

    Science.gov (United States)

    Hua, Fangfang; Liu, Shanshan; Zhu, Lihong; Ma, Ning; Jiang, Shan; Yang, Jun

    2017-08-01

    Cervical cancer is the most common gynecological malignancies in women worldwide. The previous study showed that lncRNA NNT-AS1 could play an important role in tumor development and metastasis of colorectal cancer. However, little is known about the function of NNT-AS1 in cervical cancer. The aim of this study was to investigate the expression profile of NNT-AS1 in cervical cancer and assess its possible molecular mechanism. Relative expression levels of NNT-AS1 in cervical cancer tissues were determined by qRT-PCR. The biologic functions of NNT-AS1 in cervical cancer were explored by MTT assay, transwell assay and flow cytometric analysis in vitro. The influence of NNT-AS1 on tumorigenesis was measured by mice xenograft model. In addition, we evaluated the activation of Wnt/β-catenin signaling pathway by luciferase assay and western blot. Our results showed that NNT-AS1 expression in cervical cancer tissues compared with adjacent non-tumor tissues the overexpression of NNT-AS1 was positively associated with advanced FIGO stage, lymph node metastasis, depth of cervical invasion and poorer overall survival. Function assays showed that NNT-AS1 inhibition could suppress cervical cancer cells proliferation and invasion ability in vitro as well as the activation of Wnt/β-catenin signaling pathway. In vivo mice xenograft model revealed that silencing NNT-AS1 could reduce tumor growth in nude mice. The results of the current study suggested that NNT-AS1 might play an important role in cervical carcinogenesis and might serve as a potentially therapeutic target and prognostic marker in the treatment of cervical cancer. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  6. Implementation of control rod movement and boron injection options by using control variables in RELAP5/PARCS V2.7 coupled code

    Energy Technology Data Exchange (ETDEWEB)

    Miro, R.; Barrachina, T.; Verdu, G. [Polytechnic University of Valencia (Spain). Chemical and Nuclear Engineering Department], e-mail: rmiro@iqn.upv.es, e-mail: tebarcel@upvnet.upv.es, e-mail: gverdu@iqn.upv.es; Pereira, C. [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, MG (Brazil). Dept. de Engenharia Mecanica], e-mail: claubia@nuclear.ufmg.br; Martinez-Murillo, J.C. [CNAT, Madrid (Spain)], e-mail: jcmm@cnat.es

    2009-07-01

    In actual neutron kinetics codes, control rods banks do not have the possibility of dynamic movement during the simulation of a transient; besides it is necessary to send the boron concentration from the thermal-hydraulic code to the neutronic code to account for changes in cross-sections due to boron dilution. For instance, control rod movements are pre-programmed with simple instructions introduced before the beginning of the calculation. Hence, control rod positions are not related to the core characteristics and the control systems at any time of the simulation. This work presents the changes introduced in RELAP5/PARCS v2.7 codes to achieve that control rods and the boron injection become more dynamic and realistic components in such kind of simulators (author)

  7. Full-length RAG1 promotes contact with coding and intersignal sequences in RAG protein complexes bound to recombination signals paired in cis.

    Science.gov (United States)

    Kumar, Sushil; Swanson, Patrick C

    2009-04-01

    The RAG proteins initiate V(D)J recombination by mediating synapsis and cleavage of two different antigen receptor gene segments through interactions with their flanking recombination signal sequences (RSS). The protein-DNA complexes that support this process have mainly been studied using RAG-RSS complexes assembled using oligonucleotide substrates containing a single RSS that are paired in trans to promote synapsis. How closely these complexes model those formed on longer, more physiologically relevant substrates containing RSSs on the same DNA molecule (in cis) remains unclear. To address this issue, we characterized discrete core and full-length RAG protein complexes bound to RSSs paired in cis. We find these complexes support cleavage activity regulated by V(D)J recombination's '12/23 rule' and exhibit plasticity in RSS usage dependent on partner RSS composition. DNA footprinting studies suggest that the RAG proteins in these complexes mediate more extensive contact with sequences flanking the RSS than previously observed, some of which are enhanced by full-length RAG1, and associated with synapsis and efficient RSS cleavage. Finally, we demonstrate that the RAG1 C-terminus facilitates hairpin formation on long DNA substrates, and full-length RAG1 promotes hairpin retention in the post-cleavage RAG complex. These results provide new insights into the mechanism of physiological V(D)J recombination.

  8. NOVEL BIPHASE CODE -INTEGRATED SIDELOBE SUPPRESSION CODE

    Institute of Scientific and Technical Information of China (English)

    Wang Feixue; Ou Gang; Zhuang Zhaowen

    2004-01-01

    A kind of novel binary phase code named sidelobe suppression code is proposed in this paper. It is defined to be the code whose corresponding optimal sidelobe suppression filter outputs the minimum sidelobes. It is shown that there do exist sidelobe suppression codes better than the conventional optimal codes-Barker codes. For example, the sidelobe suppression code of length 11 with filter of length 39 has better sidelobe level up to 17dB than that of Barker code with the same code length and filter length.

  9. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  10. PN lock indicator for dithered PN code tracking loop

    Science.gov (United States)

    Carson, L. M. (Inventor)

    1981-01-01

    In a delay-lock one-delta (+or - 1/2 chip) dithered PN code tracking loop, an indication of lock in the PN code tracking loop is provided by delaying the dithered local PN code by a half chip to produce a +0, -1 dithered PN code that is then multiplied with the received PN-spread IF signal to produce a signal proportional to the correlation of this dithered code offset from the received code. The correlation signal is bandpass filtered, amplified with AGC control, and square-law detected to obtain a dc signal proportional to the degree of correlation. The dc signal is multiplied by the dithering control signal to effectivity substract noise voltage from the lock correlation signal which is then compared with a PN lock status signal.

  11. Speech coding code- excited linear prediction

    CERN Document Server

    Bäckström, Tom

    2017-01-01

    This book provides scientific understanding of the most central techniques used in speech coding both for advanced students as well as professionals with a background in speech audio and or digital signal processing. It provides a clear connection between the whys hows and whats thus enabling a clear view of the necessity purpose and solutions provided by various tools as well as their strengths and weaknesses in each respect Equivalently this book sheds light on the following perspectives for each technology presented Objective What do we want to achieve and especially why is this goal important Resource Information What information is available and how can it be useful and Resource Platform What kind of platforms are we working with and what are their capabilities restrictions This includes computational memory and acoustic properties and the transmission capacity of devices used. The book goes on to address Solutions Which solutions have been proposed and how can they be used to reach the stated goals and ...

  12. Good Codes From Generalised Algebraic Geometry Codes

    CERN Document Server

    Jibril, Mubarak; Ahmed, Mohammed Zaki; Tjhai, Cen

    2010-01-01

    Algebraic geometry codes or Goppa codes are defined with places of degree one. In constructing generalised algebraic geometry codes places of higher degree are used. In this paper we present 41 new codes over GF(16) which improve on the best known codes of the same length and rate. The construction method uses places of small degree with a technique originally published over 10 years ago for the construction of generalised algebraic geometry codes.

  13. Phase-coded pulse aperiodic transmitter coding

    Directory of Open Access Journals (Sweden)

    I. I. Virtanen

    2009-07-01

    Full Text Available Both ionospheric and weather radar communities have already adopted the method of transmitting radar pulses in an aperiodic manner when measuring moderately overspread targets. Among the users of the ionospheric radars, this method is called Aperiodic Transmitter Coding (ATC, whereas the weather radar users have adopted the term Simultaneous Multiple Pulse-Repetition Frequency (SMPRF. When probing the ionosphere at the carrier frequencies of the EISCAT Incoherent Scatter Radar facilities, the range extent of the detectable target is typically of the order of one thousand kilometers – about seven milliseconds – whereas the characteristic correlation time of the scattered signal varies from a few milliseconds in the D-region to only tens of microseconds in the F-region. If one is interested in estimating the scattering autocorrelation function (ACF at time lags shorter than the F-region correlation time, the D-region must be considered as a moderately overspread target, whereas the F-region is a severely overspread one. Given the technical restrictions of the radar hardware, a combination of ATC and phase-coded long pulses is advantageous for this kind of target. We evaluate such an experiment under infinitely low signal-to-noise ratio (SNR conditions using lag profile inversion. In addition, a qualitative evaluation under high-SNR conditions is performed by analysing simulated data. The results show that an acceptable estimation accuracy and a very good lag resolution in the D-region can be achieved with a pulse length long enough for simultaneous E- and F-region measurements with a reasonable lag extent. The new experiment design is tested with the EISCAT Tromsø VHF (224 MHz radar. An example of a full D/E/F-region ACF from the test run is shown at the end of the paper.

  14. Quantum BCH Codes Based on Spectral Techniques

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    When the time variable in quantum signal processing is discrete, the Fourier transform exists on the vector space of n-tuples over the Galois field F2, which plays an important role in the investigation of quantum signals. By using Fourier transforms, the idea of quantum coding theory can be described in a setting that is much different from that seen that far. Quantum BCH codes can be defined as codes whose quantum states have certain specified consecutive spectral components equal to zero and the error-correcting ability is also described by the number of the consecutive zeros. Moreover, the decoding of quantum codes can be described spectrally with more efficiency.

  15. Code wars: steganography, signals intelligence, and terrorism

    OpenAIRE

    Conway, Maura

    2003-01-01

    This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been claimed. This is because terrorist use of digital steganography is both technically and operationally implausible. The position adopted in this paper is that terrorists are likely to employ low-tech steganography such as semagrams and null cipher...

  16. Code wars: steganography, signals intelligence, and terrorism

    OpenAIRE

    Conway, Maura

    2003-01-01

    This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been claimed. This is because terrorist use of digital steganography is both technically and operationally implausible. The position adopted in this paper is that terrorists are likely to employ low-tech steganography such as semagrams and null cipher...

  17. Space Time Codes from Permutation Codes

    CERN Document Server

    Henkel, Oliver

    2006-01-01

    A new class of space time codes with high performance is presented. The code design utilizes tailor-made permutation codes, which are known to have large minimal distances as spherical codes. A geometric connection between spherical and space time codes has been used to translate them into the final space time codes. Simulations demonstrate that the performance increases with the block lengths, a result that has been conjectured already in previous work. Further, the connection to permutation codes allows for moderate complex en-/decoding algorithms.

  18. Structured LDPC Codes over Integer Residue Rings

    Directory of Open Access Journals (Sweden)

    Mo Elisa

    2008-01-01

    Full Text Available Abstract This paper presents a new class of low-density parity-check (LDPC codes over represented by regular, structured Tanner graphs. These graphs are constructed using Latin squares defined over a multiplicative group of a Galois ring, rather than a finite field. Our approach yields codes for a wide range of code rates and more importantly, codes whose minimum pseudocodeword weights equal their minimum Hamming distances. Simulation studies show that these structured codes, when transmitted using matched signal sets over an additive-white-Gaussian-noise channel, can outperform their random counterparts of similar length and rate.

  19. Structured LDPC Codes over Integer Residue Rings

    Directory of Open Access Journals (Sweden)

    Marc A. Armand

    2008-07-01

    Full Text Available This paper presents a new class of low-density parity-check (LDPC codes over ℤ2a represented by regular, structured Tanner graphs. These graphs are constructed using Latin squares defined over a multiplicative group of a Galois ring, rather than a finite field. Our approach yields codes for a wide range of code rates and more importantly, codes whose minimum pseudocodeword weights equal their minimum Hamming distances. Simulation studies show that these structured codes, when transmitted using matched signal sets over an additive-white-Gaussian-noise channel, can outperform their random counterparts of similar length and rate.

  20. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  1. Scheduling Linearly Indexed Assignment Codes

    Science.gov (United States)

    Kailath, Thomas; Roychowdhury, Vwani P.

    1989-05-01

    It has been recently shown that linearly indexed Assignment Codes can be efficiently used for coding several problems especially in signal processing and matrix algebra. In fact, mathematical expressions for many algorithms are directly in the form of linearly indexed codes, and examples include the formulas for matrix multiplication, any m-dimensional convolution/correlation, matrix transposition, and solving matrix Lyapunov's equation. Systematic procedures for converting linearly indexed Assignment Codes to localized algorithms that are closely related to Regular Iterative Algorithms (RIAs) have also been developed. These localized algorithms can be often efficiently scheduled by modeling them as RIAs; however, it is not always efficient to do so. In this paper we shall analyze and develop systematic procedures for determining efficient schedules directly for the linearly indexed ACs and the localized algorithms. We shall also illustrate our procedures by determining schedules for examples such as matrix transposition and Gauss-Jordan elimination algorithm.

  2. Concatenated wavelet/modified Hadamard-structured discrete cosine transform (MHDCT) coding of images

    Science.gov (United States)

    Barazande-Pour, Majid; Mark, Jon W.

    1995-04-01

    Wavelet transform (WT) is concatenated with the modified Hadamard-structured discrete cosine transform (MHDCT) to encode image signals. As the outer code, the WT decomposes the image signals into uncorrelated low resolution and detailed signal components. As inner codes, the MHDCT adaptively encodes the low resolution signal, while the detailed signals are encoded using pulse code modulation (PCM). The concatenated coding approach offers the possibility of regulated coding for progressive transmission of the image signals over communication networks. Results of image coding using the concatenated WT/MHDCT coder are presented.

  3. Strong Trinucleotide Circular Codes

    Directory of Open Access Journals (Sweden)

    Christian J. Michel

    2011-01-01

    Full Text Available Recently, we identified a hierarchy relation between trinucleotide comma-free codes and trinucleotide circular codes (see our previous works. Here, we extend our hierarchy with two new classes of codes, called DLD and LDL codes, which are stronger than the comma-free codes. We also prove that no circular code with 20 trinucleotides is a DLD code and that a circular code with 20 trinucleotides is comma-free if and only if it is a LDL code. Finally, we point out the possible role of the symmetric group ∑4 in the mathematical study of trinucleotide circular codes.

  4. Report on HOM experimental methods and code

    CERN Document Server

    Shinton, I R R; Flisgen, T

    2013-01-01

    Experimental methods and various codes used are reported on with the aim to understand the signals picked up from the higher order modes in the third harmonic cavities within the ACC39 module at FLASH. Both commercial computer codes have been used, and also codes written for the express purpose of understanding the sensitivity of the modal profiles to geometrical errors and other sources of experimental errors.

  5. Joint source channel coding using arithmetic codes

    CERN Document Server

    Bi, Dongsheng

    2009-01-01

    Based on the encoding process, arithmetic codes can be viewed as tree codes and current proposals for decoding arithmetic codes with forbidden symbols belong to sequential decoding algorithms and their variants. In this monograph, we propose a new way of looking at arithmetic codes with forbidden symbols. If a limit is imposed on the maximum value of a key parameter in the encoder, this modified arithmetic encoder can also be modeled as a finite state machine and the code generated can be treated as a variable-length trellis code. The number of states used can be reduced and techniques used fo

  6. Model Children's Code.

    Science.gov (United States)

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  7. A Subband Coding Method for HDTV

    Science.gov (United States)

    Chung, Wilson; Kossentini, Faouzi; Smith, Mark J. T.

    1995-01-01

    This paper introduces a new HDTV coder based on motion compensation, subband coding, and high order conditional entropy coding. The proposed coder exploits the temporal and spatial statistical dependencies inherent in the HDTV signal by using intra- and inter-subband conditioning for coding both the motion coordinates and the residual signal. The new framework provides an easy way to control the system complexity and performance, and inherently supports multiresolution transmission. Experimental results show that the coder outperforms MPEG-2, while still maintaining relatively low complexity.

  8. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  9. Homogenous Chaotic Network Serving as a Rate/Population Code to Temporal Code Converter

    Directory of Open Access Journals (Sweden)

    Mikhail V. Kiselev

    2014-01-01

    Full Text Available At present, it is obvious that different sections of nervous system utilize different methods for information coding. Primary afferent signals in most cases are represented in form of spike trains using a combination of rate coding and population coding while there are clear evidences that temporal coding is used in various regions of cortex. In the present paper, it is shown that conversion between these two coding schemes can be performed under certain conditions by a homogenous chaotic neural network. Interestingly, this effect can be achieved without network training and synaptic plasticity.

  10. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  11. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  12. Application of quasi-cycle low-density parity check codes with high performance to satellite navigation signals%高性能准循环低密度奇偶校验码在导航信号中的应用

    Institute of Scientific and Technical Information of China (English)

    钱宏; 李广侠; 常江

    2011-01-01

    In the Global Positioning System (GPS) modernization plan, Low-Density Parity Check (LDPC) code is used for the channel coding scheme of L1 C signals, which brings out excellent decoding performance, but higher complexity.The encoder and decoder of random constructed LDPC codes are difficult to implement with Very Large Scale Integration (VLSI).A kind of enhanced Quasi-Cycle LDPC (QC-LDPC) codes based on LDPC codes was proposed, which had both quasi-cycle structure and approximate lower triangular form.The girth of the proposed codes is 8.The simulation results show that QCLDPC codes are superior to LDPC codes used in 802.16e and GPS L1C signals, and it is helpful to the development of new signal scheme of COMPASS navigation system.%全球定位系统(GPS)在其现代化计划中选择低密度奇偶校验(LDPC)码作为其将来的LIC电文的信道编码方案,能够获得优异的译码性能,但复杂度也相对提高,所采用随机LDPC码的编码器和解码器的硬件实现较为困难.在802.16e协议中提出的LDPC码的基础上,提出一种增强型的准循环低密度奇偶校验(QC-LDPC)码,其校验矩阵同时具有准循环结构和近似下三角结构,且最小圈长为8,克服了随机LDPC码的缺点.仿真结果表明,所构造的QC-LDPC码性能优于802.16e协议中的LDPC码和GPS L1C电文中采用的LDPC码,对我国"COMPASS"导航系统的信道编码方案具有参考价值.

  13. Audio coding in wireless acoustic sensor networks

    DEFF Research Database (Denmark)

    Zahedi, Adel; Østergaard, Jan; Jensen, Søren Holdt

    2015-01-01

    ) for the resulting remote DSC problem under covariance matrix distortion constraints. We further show that for this problem, the Gaussian source is the worst to code. Thus, the Gaussian RDF provides an upper bound to other sources such as audio signals. We then turn our attention to audio signals. We consider...

  14. Multiplexed coding in the human basal ganglia

    Science.gov (United States)

    Andres, D. S.; Cerquetti, D.; Merello, M.

    2016-04-01

    A classic controversy in neuroscience is whether information carried by spike trains is encoded by a time averaged measure (e.g. a rate code), or by complex time patterns (i.e. a time code). Here we apply a tool to quantitatively analyze the neural code. We make use of an algorithm based on the calculation of the temporal structure function, which permits to distinguish what scales of a signal are dominated by a complex temporal organization or a randomly generated process. In terms of the neural code, this kind of analysis makes it possible to detect temporal scales at which a time patterns coding scheme or alternatively a rate code are present. Additionally, finding the temporal scale at which the correlation between interspike intervals fades, the length of the basic information unit of the code can be established, and hence the word length of the code can be found. We apply this algorithm to neuronal recordings obtained from the Globus Pallidus pars interna from a human patient with Parkinson’s disease, and show that a time pattern coding and a rate coding scheme co-exist at different temporal scales, offering a new example of multiplexed neuronal coding.

  15. Review of Form Fit Function Specification, Coding Strategy

    DEFF Research Database (Denmark)

    Justesen, Jørn; Larsen, Knud J.

    1997-01-01

    A review of the proposed European standard for EUROBALISE, i.e. a system that communicates signal aspects (e.g. signal at red) to trains. The review contains exact description of the performance of coding strategy of the proposed standard......A review of the proposed European standard for EUROBALISE, i.e. a system that communicates signal aspects (e.g. signal at red) to trains. The review contains exact description of the performance of coding strategy of the proposed standard...

  16. Coded continuous wave meteor radar

    Science.gov (United States)

    Vierinen, Juha; Chau, Jorge L.; Pfeffer, Nico; Clahsen, Matthias; Stober, Gunter

    2016-03-01

    The concept of a coded continuous wave specular meteor radar (SMR) is described. The radar uses a continuously transmitted pseudorandom phase-modulated waveform, which has several advantages compared to conventional pulsed SMRs. The coding avoids range and Doppler aliasing, which are in some cases problematic with pulsed radars. Continuous transmissions maximize pulse compression gain, allowing operation at lower peak power than a pulsed system. With continuous coding, the temporal and spectral resolution are not dependent on the transmit waveform and they can be fairly flexibly changed after performing a measurement. The low signal-to-noise ratio before pulse compression, combined with independent pseudorandom transmit waveforms, allows multiple geographically separated transmitters to be used in the same frequency band simultaneously without significantly interfering with each other. Because the same frequency band can be used by multiple transmitters, the same interferometric receiver antennas can be used to receive multiple transmitters at the same time. The principles of the signal processing are discussed, in addition to discussion of several practical ways to increase computation speed, and how to optimally detect meteor echoes. Measurements from a campaign performed with a coded continuous wave SMR are shown and compared with two standard pulsed SMR measurements. The type of meteor radar described in this paper would be suited for use in a large-scale multi-static network of meteor radar transmitters and receivers. Such a system would be useful for increasing the number of meteor detections to obtain improved meteor radar data products.

  17. New multi-level codes over GF(q)

    Science.gov (United States)

    Wu, Jiantian; Costello, Daniel J., Jr.

    1990-01-01

    Set partitioning to multi-dimensional signal spaces over GF(q), particularly GF sup q-1(q) and GF sup q (q), and show how to construct both multi-level block codes and multi-level trellis codes over GF(q). Two classes of multi-level (n, k, d) block codes over GF(q) with block length n, number of information symbols k, and minimum distance d sub min greater than or = d, are presented. These two classes of codes use Reed-Solomon codes as component codes. They can be easily decoded as block length q-1 Reed-Solomon codes or block length q or q + 1 extended Reed-Solomon codes using multi-stage decoding. Many of these codes have larger distances than comparable q-ary block codes, as component codes. Low rate q-ary convolutional codes, work error correcting convolutional codes, and binary-to-q-ary convolutional codes can also be used to construct multi-level trellis codes over GF(q) or binary-to-q-ary trellis codes, some of which have better performance than the above block codes. All of the new codes have simple decoding algorithms based on hard decision multi-stage decoding.

  18. Locally Orderless Registration Code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  19. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  20. Code Samples Used for Complexity and Control

    Science.gov (United States)

    Ivancevic, Vladimir G.; Reid, Darryn J.

    2015-11-01

    The following sections are included: * MathematicaⓇ Code * Generic Chaotic Simulator * Vector Differential Operators * NLS Explorer * 2C++ Code * C++ Lambda Functions for Real Calculus * Accelerometer Data Processor * Simple Predictor-Corrector Integrator * Solving the BVP with the Shooting Method * Linear Hyperbolic PDE Solver * Linear Elliptic PDE Solver * Method of Lines for a Set of the NLS Equations * C# Code * Iterative Equation Solver * Simulated Annealing: A Function Minimum * Simple Nonlinear Dynamics * Nonlinear Pendulum Simulator * Lagrangian Dynamics Simulator * Complex-Valued Crowd Attractor Dynamics * Freeform Fortran Code * Lorenz Attractor Simulator * Complex Lorenz Attractor * Simple SGE Soliton * Complex Signal Presentation * Gaussian Wave Packet * Hermitian Matrices * Euclidean L2-Norm * Vector/Matrix Operations * Plain C-Code: Levenberg-Marquardt Optimizer * Free Basic Code: 2D Crowd Dynamics with 3000 Agents

  1. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  2. Constructing quantum codes

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Quantum error correcting codes are indispensable for quantum information processing and quantum computation.In 1995 and 1996,Shor and Steane gave first several examples of quantum codes from classical error correcting codes.The construction of efficient quantum codes is now an active multi-discipline research field.In this paper we review the known several constructions of quantum codes and present some examples.

  3. All-optical analog-to-digital conversion using optical interconnection for gray code coding

    Science.gov (United States)

    Nishitani, Takashi; Konishi, Tsuyoshi; Itoh, Kazuyoshi

    2006-09-01

    The gray code based all-optical analog-to-digital conversion (ADC) using optical interconnection is described. Recent tremendous growths of optical communications and digital signal processing have encouraged the demand of high-speed and high-resolution ADC. To pursue a high-speed and high-resolution ADC, optical approaches have attracted much attention recently. ADC generally consists of three procedures: sampling, quantization and coding. Whereas the optical sampling techniques have been proposed and realized, the optical quantization and coding techniques have investigated depending on various applications. For the application to the binary detection of a high-speed digital signal, we previously proposed an all-optical ADC which consists of optical quantization using self-frequency shifting in a fiber and optical coding using optical interconnection for general binary code. In addition, since we can easily prepare optical interconnection patterns corresponding to the various codes, this technique can be used in any coding schemes. In this paper, we demonstrate the gray code based all-optical ADC to verify its scalability. Experimental results show that the 8-levels analog signals can be successfully converted into the bitwise allocated 3-bit gray code.

  4. Coded ultrasound for blood flow estimation using subband processing

    DEFF Research Database (Denmark)

    Gran, F.; Udesen, J.; Jensen, J.A.;

    2008-01-01

    This paper investigates the use of coded excitation for blood flow estimation in medical ultrasound. Traditional autocorrelation estimators use narrow-band excitation signals to provide sufficient signal-to-noise-ratio (SNR) and velocity estimation performance. In this paper, broadband coded sign...

  5. Turbo Codes Extended with Outer BCH Code

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1996-01-01

    The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is proposed...

  6. 32 CFR 935.134 - Arm signals.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Arm signals. 935.134 Section 935.134 National... WAKE ISLAND CODE Motor Vehicle Code § 935.134 Arm signals. (a) Any person operating a motor vehicle and making a turn or coming to a stop shall signal the turn or stop in accordance with this section. (b) A...

  7. Hybrid Noncoherent Network Coding

    CERN Document Server

    Skachek, Vitaly; Nedic, Angelia

    2011-01-01

    We describe a novel extension of subspace codes for noncoherent networks, suitable for use when the network is viewed as a communication system that introduces both dimension and symbol errors. We show that when symbol erasures occur in a significantly large number of different basis vectors transmitted through the network and when the min-cut of the networks is much smaller then the length of the transmitted codewords, the new family of codes outperforms their subspace code counterparts. For the proposed coding scheme, termed hybrid network coding, we derive two upper bounds on the size of the codes. These bounds represent a variation of the Singleton and of the sphere-packing bound. We show that a simple concatenated scheme that represents a combination of subspace codes and Reed-Solomon codes is asymptotically optimal with respect to the Singleton bound. Finally, we describe two efficient decoding algorithms for concatenated subspace codes that in certain cases have smaller complexity than subspace decoder...

  8. Ultrasound elasticity imaging using Golay code

    Directory of Open Access Journals (Sweden)

    Peng Hui

    2017-01-01

    Full Text Available Ultrasound elasticity imaging is becoming a new diagnostic tool for clinicians to detect lesions or cancers in tissues. In this paper, Golay code is applied to elasticity imaging to improve its quality. Phase-zero algorithm is employed as the displacement estimator, and the amplitude modulation correction location estimate method is used as the location estimator. We compared the performance of Golay code and the conventional short pulse in simulation method. The simulation results demonstrate that Golay code can achieve higher elastographic signal-to-noise ratio (SNRe than the short pulse in low echo signal-to-noise ratio (eSNR conditions, because the eSNR gain with Golay code increases the accuracy of the displacement estimates. However, in high eSNR conditions, Golay code performs worse than the short pulse, because the range sidelobe level of Golay code will decrease the SNRe and the performance of Golay code depends mainly on its range sidelobe level in high eSNR conditions. Therefore, the optimal conditions for Goaly code to be used in elasticity imaging are the low eSNR, great depth or high attenuation conditions.

  9. Improved FEC Code Based on Concatenated Code for Optical Transmission Systems

    Institute of Scientific and Technical Information of China (English)

    YUAN Jian-guo; JIANG Ze; MAO You-ju

    2006-01-01

    The improved three novel schemes of the super forward error correction(super-FEC) concatenated codes are proposed after the development trend of long-haul optical transmission systems and the defects of the existing FEC codes have been analyzed. The performance simulation of the Reed-Solomon(RS)+Bose-Chaudhuri-Hocguenghem(BCH) inner-outer serial concatenated code is implemented and the conceptions of encoding/decoding the parallel-concatenated code are presented. Furthermore,the simulation results for the RS(255,239)+RS(255,239) code and the RS(255,239)+RS(255,223) code show that the two consecutive concatenated codes are a superior coding scheme with such advantages as the better error correction,moderate redundancy and easy realization compared to the classic RS(255,239) code and other codes,and their signal to noise ratio gains are respectively 2~3 dB more than that of the RS(255,239)code at the bit error rate of 1×10-13. Finally,the frame structure of the novel consecutive concatenated code is arranged to lay a firm foundation in designing its hardware.

  10. Network coding for computing: Linear codes

    CERN Document Server

    Appuswamy, Rathinakumar; Karamchandani, Nikhil; Zeger, Kenneth

    2011-01-01

    In network coding it is known that linear codes are sufficient to achieve the coding capacity in multicast networks and that they are not sufficient in general to achieve the coding capacity in non-multicast networks. In network computing, Rai, Dey, and Shenvi have recently shown that linear codes are not sufficient in general for solvability of multi-receiver networks with scalar linear target functions. We study single receiver networks where the receiver node demands a target function of the source messages. We show that linear codes may provide a computing capacity advantage over routing only when the receiver demands a `linearly-reducible' target function. % Many known target functions including the arithmetic sum, minimum, and maximum are not linearly-reducible. Thus, the use of non-linear codes is essential in order to obtain a computing capacity advantage over routing if the receiver demands a target function that is not linearly-reducible. We also show that if a target function is linearly-reducible,...

  11. Increasing the resolution of photoelectric angle-to-code converters

    Energy Technology Data Exchange (ETDEWEB)

    Zakharov, L.P.

    1986-04-01

    The authors describe a circuit for processing the signal of the auxiliary photodetector of a converter of angular shaft displacement to code; it increases the resolution of the converter by two or three orders without increasing the number of code tracks. Ther permissible reading error for all bits of the main code except for the least-significant can be half of the width of a code element of the less-bit track. The auxiliary and main codes are matched and are represented by the output binary code.

  12. Reducing Computational Overhead of Network Coding with Intrinsic Information Conveying

    DEFF Research Database (Denmark)

    Heide, Janus; Zhang, Qi; Pedersen, Morten V.;

    is RLNC (Random Linear Network Coding) and the goal is to reduce the amount of coding operations both at the coding and decoding node, and at the same time remove the need for dedicated signaling messages. In a traditional RLNC system, coding operation takes up significant computational resources and adds......This paper investigated the possibility of intrinsic information conveying in network coding systems. The information is embedded into the coding vector by constructing the vector based on a set of predefined rules. This information can subsequently be retrieved by any receiver. The starting point...

  13. Practices in Code Discoverability

    CERN Document Server

    Teuben, Peter; Nemiroff, Robert J; Shamir, Lior

    2012-01-01

    Much of scientific progress now hinges on the reliability, falsifiability and reproducibility of computer source codes. Astrophysics in particular is a discipline that today leads other sciences in making useful scientific components freely available online, including data, abstracts, preprints, and fully published papers, yet even today many astrophysics source codes remain hidden from public view. We review the importance and history of source codes in astrophysics and previous efforts to develop ways in which information about astrophysics codes can be shared. We also discuss why some scientist coders resist sharing or publishing their codes, the reasons for and importance of overcoming this resistance, and alert the community to a reworking of one of the first attempts for sharing codes, the Astrophysics Source Code Library (ASCL). We discuss the implementation of the ASCL in an accompanying poster paper. We suggest that code could be given a similar level of referencing as data gets in repositories such ...

  14. Coded continuous wave meteor radar

    Directory of Open Access Journals (Sweden)

    J. Vierinen

    2015-07-01

    Full Text Available The concept of coded continuous wave meteor radar is introduced. The radar uses a continuously transmitted pseudo-random waveform, which has several advantages: coding avoids range aliased echoes, which are often seen with commonly used pulsed specular meteor radars (SMRs; continuous transmissions maximize pulse compression gain, allowing operation with significantly lower peak transmit power; the temporal resolution can be changed after performing a measurement, as it does not depend on pulse spacing; and the low signal to noise ratio allows multiple geographically separated transmitters to be used in the same frequency band without significantly interfering with each other. The latter allows the same receiver antennas to be used to receive multiple transmitters. The principles of the signal processing are discussed, in addition to discussion of several practical ways to increase computation speed, and how to optimally detect meteor echoes. Measurements from a campaign performed with a coded continuous wave SMR are shown and compared with two standard pulsed SMR measurements. The type of meteor radar described in this paper would be suited for use in a large scale multi-static network of meteor radar transmitters and receivers. This would, for example, provide higher spatio-temporal resolution for mesospheric wind field measurements.

  15. Coded continuous wave meteor radar

    Science.gov (United States)

    Vierinen, J.; Chau, J. L.; Pfeffer, N.; Clahsen, M.; Stober, G.

    2015-07-01

    The concept of coded continuous wave meteor radar is introduced. The radar uses a continuously transmitted pseudo-random waveform, which has several advantages: coding avoids range aliased echoes, which are often seen with commonly used pulsed specular meteor radars (SMRs); continuous transmissions maximize pulse compression gain, allowing operation with significantly lower peak transmit power; the temporal resolution can be changed after performing a measurement, as it does not depend on pulse spacing; and the low signal to noise ratio allows multiple geographically separated transmitters to be used in the same frequency band without significantly interfering with each other. The latter allows the same receiver antennas to be used to receive multiple transmitters. The principles of the signal processing are discussed, in addition to discussion of several practical ways to increase computation speed, and how to optimally detect meteor echoes. Measurements from a campaign performed with a coded continuous wave SMR are shown and compared with two standard pulsed SMR measurements. The type of meteor radar described in this paper would be suited for use in a large scale multi-static network of meteor radar transmitters and receivers. This would, for example, provide higher spatio-temporal resolution for mesospheric wind field measurements.

  16. On a Mathematical Theory of Coded Exposure

    Science.gov (United States)

    2014-08-01

    Coded exposure, computational photography , flutter shutter, motion blur, mean square error (MSE), signal to noise ratio (SNR). 1 Introduction Since the...to be a magic tool that should equip all cameras. However, to the best of our knowledge, little is known on the coded exposure method from a rigorous...and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision

  17. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  18. Joint Source-Channel Coding by Means of an Oversampled Filter Bank Code

    Directory of Open Access Journals (Sweden)

    Marinkovic Slavica

    2006-01-01

    Full Text Available Quantized frame expansions based on block transforms and oversampled filter banks (OFBs have been considered recently as joint source-channel codes (JSCCs for erasure and error-resilient signal transmission over noisy channels. In this paper, we consider a coding chain involving an OFB-based signal decomposition followed by scalar quantization and a variable-length code (VLC or a fixed-length code (FLC. This paper first examines the problem of channel error localization and correction in quantized OFB signal expansions. The error localization problem is treated as an -ary hypothesis testing problem. The likelihood values are derived from the joint pdf of the syndrome vectors under various hypotheses of impulse noise positions, and in a number of consecutive windows of the received samples. The error amplitudes are then estimated by solving the syndrome equations in the least-square sense. The message signal is reconstructed from the corrected received signal by a pseudoinverse receiver. We then improve the error localization procedure by introducing a per-symbol reliability information in the hypothesis testing procedure of the OFB syndrome decoder. The per-symbol reliability information is produced by the soft-input soft-output (SISO VLC/FLC decoders. This leads to the design of an iterative algorithm for joint decoding of an FLC and an OFB code. The performance of the algorithms developed is evaluated in a wavelet-based image coding system.

  19. A Theoretical Method for Estimating Performance of Reed-Solomon Codes Concatenated with Orthogonal Space-Time Block Codes

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Based on the studies of Reed-Solomon codes and orthogonal space-time block codes over Rayleigh fading channel, a theoretical method for estimating performance of Reed-Solomon codes concatenated with orthogonal space-time block codes is presented in this paper. And an upper bound of the bit error rate is also obtained. It is shown through computer simulations that the signal-to-noise ratio reduces about 15 dB or more after orthogonal space-time block codes are concatenate with Reed-Solomon (15,6) codes over Rayleigh fading channel, when the bit error rate is 10-4.

  20. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  1. Informal Control code logic

    CERN Document Server

    Bergstra, Jan A

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

  2. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow...

  3. Refactoring test code

    NARCIS (Netherlands)

    Deursen, A. van; Moonen, L.M.F.; Bergh, A. van den; Kok, G.

    2001-01-01

    Two key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from refactoring product

  4. ARC Code TI: CODE Software Framework

    Data.gov (United States)

    National Aeronautics and Space Administration — CODE is a software framework for control and observation in distributed environments. The basic functionality of the framework allows a user to observe a distributed...

  5. ARC Code TI: ROC Curve Code Augmentation

    Data.gov (United States)

    National Aeronautics and Space Administration — ROC (Receiver Operating Characteristic) curve Code Augmentation was written by Rodney Martin and John Stutz at NASA Ames Research Center and is a modification of ROC...

  6. Fountain Codes: LT And Raptor Codes Implementation

    Directory of Open Access Journals (Sweden)

    Ali Bazzi, Hiba Harb

    2017-01-01

    Full Text Available Digital fountain codes are a new class of random error correcting codes designed for efficient and reliable data delivery over erasure channels such as internet. These codes were developed to provide robustness against erasures in a way that resembles a fountain of water. A digital fountain is rateless in a way that sender can send limitless number of encoded packets. The receiver doesn’t care which packets are received or lost as long as the receiver gets enough packets to recover original data. In this paper, the design of the fountain codes is explored with its implementation of the encoding and decoding algorithm so that the performance in terms of encoding/decoding symbols, reception overhead, data length, and failure probability is studied.

  7. Path Weight Complementary Convolutional Code for Type-II Bit-Interleaved Coded Modulation Hybrid ARQ System

    Institute of Scientific and Technical Information of China (English)

    CHENG Yuxin; ZHANG Lei; YI Na; XIANG Haige

    2007-01-01

    Bit-interleaved coded modulation (BICM) is suitable to bandwidth-efficient communication systems. Hybrid automatic repeat request (HARQ) can provide more reliability to high-speed wireless data transmission. A new path weight complementary convolutional (PWCC) code used in the type-ll BICM-HARQ system is proposed. The PWCC code is composed of the original code and the complimentary code. The path in trellis with large hamming weight of the complimentary code is designed to compensate for the path in trellis with small hamming weight of the original code. Hence, both of the original code and the complimentary code can achieve the performance of the good code criterion of corresponding code rate. The throughput efficiency of the BICM-HARQ system wit PWCC code is higher than repeat code system, a little higher than puncture code system in low signal-to-noise ratio (SNR) values and much higher than puncture code system, the same as repeat code system in high SNR values. These results are confirmed by the simulation.

  8. Universal Rateless Codes From Coupled LT Codes

    CERN Document Server

    Aref, Vahid

    2011-01-01

    It was recently shown that spatial coupling of individual low-density parity-check codes improves the belief-propagation threshold of the coupled ensemble essentially to the maximum a posteriori threshold of the underlying ensemble. We study the performance of spatially coupled low-density generator-matrix ensembles when used for transmission over binary-input memoryless output-symmetric channels. We show by means of density evolution that the threshold saturation phenomenon also takes place in this setting. Our motivation for studying low-density generator-matrix codes is that they can easily be converted into rateless codes. Although there are already several classes of excellent rateless codes known to date, rateless codes constructed via spatial coupling might offer some additional advantages. In particular, by the very nature of the threshold phenomenon one expects that codes constructed on this principle can be made to be universal, i.e., a single construction can uniformly approach capacity over the cl...

  9. Software Certification - Coding, Code, and Coders

    Science.gov (United States)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  10. Coding for Electronic Mail

    Science.gov (United States)

    Rice, R. F.; Lee, J. J.

    1986-01-01

    Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.

  11. Coded continuous wave meteor radar

    Science.gov (United States)

    Chau, J. L.; Vierinen, J.; Pfeffer, N.; Clahsen, M.; Stober, G.

    2016-12-01

    The concept of a coded continuous wave specular meteor radar (SMR) is described. The radar uses a continuously transmitted pseudorandom phase-modulated waveform, which has several advantages compared to conventional pulsed SMRs. The coding avoids range and Doppler aliasing, which are in some cases problematic with pulsed radars. Continuous transmissions maximize pulse compression gain, allowing operation at lower peak power than a pulsed system. With continuous coding, the temporal and spectral resolution are not dependent on the transmit waveform and they can be fairly flexibly changed after performing a measurement. The low signal-to-noise ratio before pulse compression, combined with independent pseudorandom transmit waveforms, allows multiple geographically separated transmitters to be used in the same frequency band simultaneously without significantly interfering with each other. Because the same frequency band can be used by multiple transmitters, the same interferometric receiver antennas can be used to receive multiple transmitters at the same time. The principles of the signal processing are discussed, in addition to discussion of several practical ways to increase computation speed, and how to optimally detect meteor echoes. Measurements from a campaign performed with a coded continuous wave SMR are shown and compared with two standard pulsed SMR measurements. The type of meteor radar described in this paper would be suited for use in a large-scale multi-static network of meteor radar transmitters and receivers. Such a system would be useful for increasing the number of meteor detections to obtain improved meteor radar data products, such as wind fields. This type of a radar would also be useful for over-the-horizon radar, ionosondes, and observations of field-aligned-irregularities.

  12. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2009-01-01

    Property testing was initially studied from various motivations in 1990's.A code C (∩)GF(r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector's coordinates.The problem of testing codes was firstly studied by Blum,Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs).How to characterize locally testable codes is a complex and challenge problem.The local tests have been studied for Reed-Solomon (RS),Reed-Muller (RM),cyclic,dual of BCH and the trace subcode of algebraicgeometric codes.In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions).We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  13. Chinese remainder codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Aili; LIU Xiufeng

    2006-01-01

    Chinese remainder codes are constructed by applying weak block designs and the Chinese remainder theorem of ring theory.The new type of linear codes take the congruence class in the congruence class ring R/I1 ∩ I2 ∩…∩ In for the information bit,embed R/Ji into R/I1 ∩ I2 ∩…∩ In,and assign the cosets of R/Ji as the subring of R/I1 ∩ I2 ∩…∩ In and the cosets of R/Ji in R/I1 ∩ I2 ∩…∩ In as check lines.Many code classes exist in the Chinese remainder codes that have high code rates.Chinese remainder codes are the essential generalization of Sun Zi codes.

  14. Chinese Remainder Codes

    Institute of Scientific and Technical Information of China (English)

    张爱丽; 刘秀峰; 靳蕃

    2004-01-01

    Chinese Remainder Codes are constructed by applying weak block designs and Chinese Remainder Theorem of ring theory. The new type of linear codes take the congruence class in the congruence class ring R/I1∩I2∩…∩In for the information bit, embed R/Ji into R/I1∩I2∩…∩In, and asssign the cosets of R/Ji as the subring of R/I1∩I2∩…∩In and the cosets of R/Ji in R/I1∩I2∩…∩In as check lines. There exist many code classes in Chinese Remainder Codes, which have high code rates. Chinese Remainder Codes are the essential generalization of Sun Zi Codes.

  15. Code of Ethics

    DEFF Research Database (Denmark)

    Adelstein, Jennifer; Clegg, Stewart

    2016-01-01

    Ethical codes have been hailed as an explicit vehicle for achieving more sustainable and defensible organizational practice. Nonetheless, when legal compliance and corporate governance codes are conflated, codes can be used to define organizational interests ostentatiously by stipulating norms...... for employee ethics. Such codes have a largely cosmetic and insurance function, acting subtly and strategically to control organizational risk management and protection. In this paper, we conduct a genealogical discourse analysis of a representative code of ethics from an international corporation...... to understand how management frames expectations of compliance. Our contribution is to articulate the problems inherent in codes of ethics, and we make some recommendations to address these to benefit both an organization and its employees. In this way, we show how a code of ethics can provide a foundation...

  16. Defeating the coding monsters.

    Science.gov (United States)

    Colt, Ross

    2007-02-01

    Accuracy in coding is rapidly becoming a required skill for military health care providers. Clinic staffing, equipment purchase decisions, and even reimbursement will soon be based on the coding data that we provide. Learning the complicated myriad of rules to code accurately can seem overwhelming. However, the majority of clinic visits in a typical outpatient clinic generally fall into two major evaluation and management codes, 99213 and 99214. If health care providers can learn the rules required to code a 99214 visit, then this will provide a 90% solution that can enable them to accurately code the majority of their clinic visits. This article demonstrates a step-by-step method to code a 99214 visit, by viewing each of the three requirements as a monster to be defeated.

  17. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Property testing was initially studied from various motivations in 1990’s. A code C  GF (r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector’s coordinates. The problem of testing codes was firstly studied by Blum, Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs). How to characterize locally testable codes is a complex and challenge problem. The local tests have been studied for Reed-Solomon (RS), Reed-Muller (RM), cyclic, dual of BCH and the trace subcode of algebraicgeometric codes. In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions). We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  18. Serially Concatenated IRA Codes

    CERN Document Server

    Cheng, Taikun; Belzer, Benjamin J

    2007-01-01

    We address the error floor problem of low-density parity check (LDPC) codes on the binary-input additive white Gaussian noise (AWGN) channel, by constructing a serially concatenated code consisting of two systematic irregular repeat accumulate (IRA) component codes connected by an interleaver. The interleaver is designed to prevent stopping-set error events in one of the IRA codes from propagating into stopping set events of the other code. Simulations with two 128-bit rate 0.707 IRA component codes show that the proposed architecture achieves a much lower error floor at higher SNRs, compared to a 16384-bit rate 1/2 IRA code, but incurs an SNR penalty of about 2 dB at low to medium SNRs. Experiments indicate that the SNR penalty can be reduced at larger blocklengths.

  19. A Modular Computer Code for Simulating Reactive Multi-Species Transport in 3-Dimensional Groundwater Systems

    Energy Technology Data Exchange (ETDEWEB)

    TP Clement

    1999-06-24

    RT3DV1 (Reactive Transport in 3-Dimensions) is computer code that solves the coupled partial differential equations that describe reactive-flow and transport of multiple mobile and/or immobile species in three-dimensional saturated groundwater systems. RT3D is a generalized multi-species version of the US Environmental Protection Agency (EPA) transport code, MT3D (Zheng, 1990). The current version of RT3D uses the advection and dispersion solvers from the DOD-1.5 (1997) version of MT3D. As with MT3D, RT3D also requires the groundwater flow code MODFLOW for computing spatial and temporal variations in groundwater head distribution. The RT3D code was originally developed to support the contaminant transport modeling efforts at natural attenuation demonstration sites. As a research tool, RT3D has also been used to model several laboratory and pilot-scale active bioremediation experiments. The performance of RT3D has been validated by comparing the code results against various numerical and analytical solutions. The code is currently being used to model field-scale natural attenuation at multiple sites. The RT3D code is unique in that it includes an implicit reaction solver that makes the code sufficiently flexible for simulating various types of chemical and microbial reaction kinetics. RT3D V1.0 supports seven pre-programmed reaction modules that can be used to simulate different types of reactive contaminants including benzene-toluene-xylene mixtures (BTEX), and chlorinated solvents such as tetrachloroethene (PCE) and trichloroethene (TCE). In addition, RT3D has a user-defined reaction option that can be used to simulate any other types of user-specified reactive transport systems. This report describes the mathematical details of the RT3D computer code and its input/output data structure. It is assumed that the user is familiar with the basics of groundwater flow and contaminant transport mechanics. In addition, RT3D users are expected to have some experience in

  20. Code-excited linear predictive coding of multispectral MR images

    Science.gov (United States)

    Hu, Jian-Hong; Wang, Yao; Cahill, Patrick

    1996-02-01

    This paper reports a multispectral code excited linear predictive coding method for the compression of well-registered multispectral MR images. Different linear prediction models and the adaptation schemes have been compared. The method which uses forward adaptive autoregressive (AR) model has proven to achieve a good compromise between performance, complexity and robustness. This approach is referred to as the MFCELP method. Given a set of multispectral images, the linear predictive coefficients are updated over non-overlapping square macroblocks. Each macro-block is further divided into several micro-blocks and, the best excitation signals for each microblock are determined through an analysis-by-synthesis procedure. To satisfy the high quality requirement for medical images, the error between the original images and the synthesized ones are further specified using a vector quantizer. The MFCELP method has been applied to 26 sets of clinical MR neuro images (20 slices/set, 3 spectral bands/slice, 256 by 256 pixels/image, 12 bits/pixel). It provides a significant improvement over the discrete cosine transform (DCT) based JPEG method, a wavelet transform based embedded zero-tree wavelet (EZW) coding method, as well as the MSARMA method we developed before.

  1. Rewriting the Genetic Code.

    Science.gov (United States)

    Mukai, Takahito; Lajoie, Marc J; Englert, Markus; Söll, Dieter

    2017-09-08

    The genetic code-the language used by cells to translate their genomes into proteins that perform many cellular functions-is highly conserved throughout natural life. Rewriting the genetic code could lead to new biological functions such as expanding protein chemistries with noncanonical amino acids (ncAAs) and genetically isolating synthetic organisms from natural organisms and viruses. It has long been possible to transiently produce proteins bearing ncAAs, but stabilizing an expanded genetic code for sustained function in vivo requires an integrated approach: creating recoded genomes and introducing new translation machinery that function together without compromising viability or clashing with endogenous pathways. In this review, we discuss design considerations and technologies for expanding the genetic code. The knowledge obtained by rewriting the genetic code will deepen our understanding of how genomes are designed and how the canonical genetic code evolved.

  2. On Polynomial Remainder Codes

    CERN Document Server

    Yu, Jiun-Hung

    2012-01-01

    Polynomial remainder codes are a large class of codes derived from the Chinese remainder theorem that includes Reed-Solomon codes as a special case. In this paper, we revisit these codes and study them more carefully than in previous work. We explicitly allow the code symbols to be polynomials of different degrees, which leads to two different notions of weight and distance. Algebraic decoding is studied in detail. If the moduli are not irreducible, the notion of an error locator polynomial is replaced by an error factor polynomial. We then obtain a collection of gcd-based decoding algorithms, some of which are not quite standard even when specialized to Reed-Solomon codes.

  3. Generating code adapted for interlinking legacy scalar code and extended vector code

    Science.gov (United States)

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  4. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  5. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    We welcome Tanya Stivers’s discussion (Stivers, 2015/this issue) of coding social interaction and find that her descriptions of the processes of coding open up important avenues for discussion, among other things of the precise ad hoc considerations that researchers need to bear in mind, both when....... Instead we propose that the promise of coding-based research lies in its ability to open up new qualitative questions....

  6. Industrial Computer Codes

    Science.gov (United States)

    Shapiro, Wilbur

    1996-01-01

    This is an overview of new and updated industrial codes for seal design and testing. GCYLT (gas cylindrical seals -- turbulent), SPIRALI (spiral-groove seals -- incompressible), KTK (knife to knife) Labyrinth Seal Code, and DYSEAL (dynamic seal analysis) are covered. CGYLT uses G-factors for Poiseuille and Couette turbulence coefficients. SPIRALI is updated to include turbulence and inertia, but maintains the narrow groove theory. KTK labyrinth seal code handles straight or stepped seals. And DYSEAL provides dynamics for the seal geometry.

  7. Wavelet based hierarchical coding scheme for radar image compression

    Science.gov (United States)

    Sheng, Wen; Jiao, Xiaoli; He, Jifeng

    2007-12-01

    This paper presents a wavelet based hierarchical coding scheme for radar image compression. Radar signal is firstly quantized to digital signal, and reorganized as raster-scanned image according to radar's repeated period frequency. After reorganization, the reformed image is decomposed to image blocks with different frequency band by 2-D wavelet transformation, each block is quantized and coded by the Huffman coding scheme. A demonstrating system is developed, showing that under the requirement of real time processing, the compression ratio can be very high, while with no significant loss of target signal in restored radar image.

  8. ARC Code TI: ACCEPT

    Data.gov (United States)

    National Aeronautics and Space Administration — ACCEPT consists of an overall software infrastructure framework and two main software components. The software infrastructure framework consists of code written to...

  9. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  10. Tokamak Systems Code

    Energy Technology Data Exchange (ETDEWEB)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.

  11. MORSE Monte Carlo code

    Energy Technology Data Exchange (ETDEWEB)

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described.

  12. 33 CFR 87.5 - Supplemental signals.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Supplemental signals. 87.5... NAVIGATION RULES ANNEX IV: DISTRESS SIGNALS § 87.5 Supplemental signals. Attention is drawn to the relevant sections of the International Code of Signals, the Merchant Ship Search and Rescue Manual, the...

  13. 49 CFR 176.176 - Signals.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Signals. 176.176 Section 176.176 Transportation... Class 1 (Explosive) Materials Handling Class 1 (explosive) Materials in Port § 176.176 Signals. When... exhibit the following signals: (a) By day, flag “B” (Bravo) of the international code of signals; and (b...

  14. Research on universal combinatorial coding.

    Science.gov (United States)

    Lu, Jun; Zhang, Zhuo; Mo, Juan

    2014-01-01

    The conception of universal combinatorial coding is proposed. Relations exist more or less in many coding methods. It means that a kind of universal coding method is objectively existent. It can be a bridge connecting many coding methods. Universal combinatorial coding is lossless and it is based on the combinatorics theory. The combinational and exhaustive property make it closely related with the existing code methods. Universal combinatorial coding does not depend on the probability statistic characteristic of information source, and it has the characteristics across three coding branches. It has analyzed the relationship between the universal combinatorial coding and the variety of coding method and has researched many applications technologies of this coding method. In addition, the efficiency of universal combinatorial coding is analyzed theoretically. The multicharacteristic and multiapplication of universal combinatorial coding are unique in the existing coding methods. Universal combinatorial coding has theoretical research and practical application value.

  15. A quantum analog of Huffman coding

    CERN Document Server

    Braunstein, S L; Gottesman, D; Lo, H K; Braunstein, Samuel L.; Fuchs, Christopher A.; Gottesman, Daniel; Lo, Hoi-Kwong

    1998-01-01

    We analyse a generalization of Huffman coding to the quantum case. In particular, we notice various difficulties in using instantaneous codes for quantum communication. However, for the storage of quantum information, we have succeeded in constructing a Huffman-coding inspired quantum scheme. The number of computational steps in the encoding and decoding processes of N quantum signals can be made to be polynomial in log N by a massively parallel implementation of a quantum gate array. This is to be compared with the N^3 computational steps required in the sequential implementation by Cleve and DiVincenzo of the well-known quantum noiseless block coding scheme by Schumacher. The powers and limitations in using this scheme in communication are also discussed.

  16. Safety Code A12

    CERN Multimedia

    SC Secretariat

    2005-01-01

    Please note that the Safety Code A12 (Code A12) entitled "THE SAFETY COMMISSION (SC)" is available on the web at the following url: https://edms.cern.ch/document/479423/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  17. Dress Codes for Teachers?

    Science.gov (United States)

    Million, June

    2004-01-01

    In this article, the author discusses an e-mail survey of principals from across the country regarding whether or not their school had a formal staff dress code. The results indicate that most did not have a formal dress code, but agreed that professional dress for teachers was not only necessary, but showed respect for the school and had a…

  18. Nuremberg code turns 60

    OpenAIRE

    Thieren, Michel; Mauron, Alex

    2007-01-01

    This month marks sixty years since the Nuremberg code – the basic text of modern medical ethics – was issued. The principles in this code were articulated in the context of the Nuremberg trials in 1947. We would like to use this anniversary to examine its ability to address the ethical challenges of our time.

  19. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  20. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  1. READING A NEURAL CODE

    NARCIS (Netherlands)

    BIALEK, W; RIEKE, F; VANSTEVENINCK, RRD; WARLAND, D

    1991-01-01

    Traditional approaches to neural coding characterize the encoding of known stimuli in average neural responses. Organisms face nearly the opposite task - extracting information about an unknown time-dependent stimulus from short segments of a spike train. Here the neural code was characterized from

  2. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    , Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...

  3. Transformation invariant sparse coding

    DEFF Research Database (Denmark)

    Mørup, Morten; Schmidt, Mikkel Nørgaard

    2011-01-01

    Sparse coding is a well established principle for unsupervised learning. Traditionally, features are extracted in sparse coding in specific locations, however, often we would prefer invariant representation. This paper introduces a general transformation invariant sparse coding (TISC) model....... The model decomposes images into features invariant to location and general transformation by a set of specified operators as well as a sparse coding matrix indicating where and to what degree in the original image these features are present. The TISC model is in general overcomplete and we therefore invoke...... sparse coding to estimate its parameters. We demonstrate how the model can correctly identify components of non-trivial artificial as well as real image data. Thus, the model is capable of reducing feature redundancies in terms of pre-specified transformations improving the component identification....

  4. The SIFT Code Specification

    Science.gov (United States)

    1983-01-01

    The specification of Software Implemented Fault Tolerance (SIFT) consists of two parts, the specifications of the SIFT models and the specifications of the SIFT PASCAL program which actually implements the SIFT system. The code specifications are the last of a hierarchy of models describing the operation of the SIFT system and are related to the SIFT models as well as the PASCAL program. These Specifications serve to link the SIFT models to the running program. The specifications are very large and detailed and closely follow the form and organization of the PASCAL code. In addition to describing each of the components of the SIFT code, the code specifications describe the assumptions of the upper SIFT models which are required to actually prove that the code will work as specified. These constraints are imposed primarily on the schedule tables.

  5. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    discusses code as the artist’s material and, further, formulates a critique of Cramer. The seductive magic in computer-generated art does not lie in the magical expression, but nor does it lie in the code/material/text itself. It lies in the nature of code to do something – as if it was magic......Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  6. Combustion chamber analysis code

    Science.gov (United States)

    Przekwas, A. J.; Lai, Y. G.; Krishnan, A.; Avva, R. K.; Giridharan, M. G.

    1993-05-01

    A three-dimensional, time dependent, Favre averaged, finite volume Navier-Stokes code has been developed to model compressible and incompressible flows (with and without chemical reactions) in liquid rocket engines. The code has a non-staggered formulation with generalized body-fitted-coordinates (BFC) capability. Higher order differencing methodologies such as MUSCL and Osher-Chakravarthy schemes are available. Turbulent flows can be modeled using any of the five turbulent models present in the code. A two-phase, two-liquid, Lagrangian spray model has been incorporated into the code. Chemical equilibrium and finite rate reaction models are available to model chemically reacting flows. The discrete ordinate method is used to model effects of thermal radiation. The code has been validated extensively against benchmark experimental data and has been applied to model flows in several propulsion system components of the SSME and the STME.

  7. Astrophysics Source Code Library

    CERN Document Server

    Allen, Alice; Berriman, Bruce; Hanisch, Robert J; Mink, Jessica; Teuben, Peter J

    2012-01-01

    The Astrophysics Source Code Library (ASCL), founded in 1999, is a free on-line registry for source codes of interest to astronomers and astrophysicists. The library is housed on the discussion forum for Astronomy Picture of the Day (APOD) and can be accessed at http://ascl.net. The ASCL has a comprehensive listing that covers a significant number of the astrophysics source codes used to generate results published in or submitted to refereed journals and continues to grow. The ASCL currently has entries for over 500 codes; its records are citable and are indexed by ADS. The editors of the ASCL and members of its Advisory Committee were on hand at a demonstration table in the ADASS poster room to present the ASCL, accept code submissions, show how the ASCL is starting to be used by the astrophysics community, and take questions on and suggestions for improving the resource.

  8. Analysis of low probability of intercept (LPI) radar signals using the Wigner Distribution

    OpenAIRE

    Gau, Jen-Yu

    2002-01-01

    Approved for public release, distribution is unlimited The parameters of Low Probability of Intercept (LPI) radar signals are hard to identify by using traditional periodogram signal processing techniques. Using the Wigner Distribution (WD), this thesis examines eight types of LPI radar signals. Signal to noise ratios of 0 dB and -6dB are also investigated. The eight types LPI radar signals examined include Frequency Modulation Continuous Wave (FMCW), Frank code, P1 code, P2 code, P3 code,...

  9. Flexibility of the genetic code with respect to DNA structure

    DEFF Research Database (Denmark)

    Baisnée, P. F.; Baldi, Pierre; Brunak, Søren

    2001-01-01

    Motivation. The primary function of DNA is to carry genetic information through the genetic code. DNA, however, contains a variety of other signals related, for instance, to reading frame, codon bias, pairwise codon bias, splice sites and transcription regulation, nucleosome positioning and DNA...... structure. Here we study the relationship between the genetic code and DNA structure and address two questions. First, to which degree does the degeneracy of the genetic code and the acceptable amino acid substitution patterns allow for the superimposition of DNA structural signals to protein coding...... sequences? Second, is the origin or evolution of the genetic code likely to have been constrained by DNA structure? Results. We develop an index for code flexibility with respect to DNA structure. Using five different di- or tri-nucleotide models of sequence-dependent DNA structure, we show...

  10. Embedded foveation image coding.

    Science.gov (United States)

    Wang, Z; Bovik, A C

    2001-01-01

    The human visual system (HVS) is highly space-variant in sampling, coding, processing, and understanding. The spatial resolution of the HVS is highest around the point of fixation (foveation point) and decreases rapidly with increasing eccentricity. By taking advantage of this fact, it is possible to remove considerable high-frequency information redundancy from the peripheral regions and still reconstruct a perceptually good quality image. Great success has been obtained previously by a class of embedded wavelet image coding algorithms, such as the embedded zerotree wavelet (EZW) and the set partitioning in hierarchical trees (SPIHT) algorithms. Embedded wavelet coding not only provides very good compression performance, but also has the property that the bitstream can be truncated at any point and still be decoded to recreate a reasonably good quality image. In this paper, we propose an embedded foveation image coding (EFIC) algorithm, which orders the encoded bitstream to optimize foveated visual quality at arbitrary bit-rates. A foveation-based image quality metric, namely, foveated wavelet image quality index (FWQI), plays an important role in the EFIC system. We also developed a modified SPIHT algorithm to improve the coding efficiency. Experiments show that EFIC integrates foveation filtering with foveated image coding and demonstrates very good coding performance and scalability in terms of foveated image quality measurement.

  11. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity in the net...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof.......Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...

  12. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  13. Application of RS Codes in Decoding QR Code

    Institute of Scientific and Technical Information of China (English)

    Zhu Suxia(朱素霞); Ji Zhenzhou; Cao Zhiyan

    2003-01-01

    The QR Code is a 2-dimensional matrix code with high error correction capability. It employs RS codes to generate error correction codewords in encoding and recover errors and damages in decoding. This paper presents several QR Code's virtues, analyzes RS decoding algorithm and gives a software flow chart of decoding the QR Code with RS decoding algorithm.

  14. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...

  15. Wavelet-Coded OFDM for Next Generation Mobile Communications

    DEFF Research Database (Denmark)

    Cavalcante, Lucas Costa Pereira; Vegas Olmos, Juan José; Tafur Monroy, Idelfonso

    2016-01-01

    In this work, we evaluate the performance of Wavelet-Coding into offering robustness for OFDM signals against the combined effects of varying fading and noise bursts. Wavelet-Code enables high diversity gains with a low complex receiver, and, most notably, without compromising the system’s spectr...

  16. Code-modulated interferometric imaging system using phased arrays

    Science.gov (United States)

    Chauhan, Vikas; Greene, Kevin; Floyd, Brian

    2016-05-01

    Millimeter-wave (mm-wave) imaging provides compelling capabilities for security screening, navigation, and bio- medical applications. Traditional scanned or focal-plane mm-wave imagers are bulky and costly. In contrast, phased-array hardware developed for mass-market wireless communications and automotive radar promise to be extremely low cost. In this work, we present techniques which can allow low-cost phased-array receivers to be reconfigured or re-purposed as interferometric imagers, removing the need for custom hardware and thereby reducing cost. Since traditional phased arrays power combine incoming signals prior to digitization, orthogonal code-modulation is applied to each incoming signal using phase shifters within each front-end and two-bit codes. These code-modulated signals can then be combined and processed coherently through a shared hardware path. Once digitized, visibility functions can be recovered through squaring and code-demultiplexing operations. Pro- vided that codes are selected such that the product of two orthogonal codes is a third unique and orthogonal code, it is possible to demultiplex complex visibility functions directly. As such, the proposed system modulates incoming signals but demodulates desired correlations. In this work, we present the operation of the system, a validation of its operation using behavioral models of a traditional phased array, and a benchmarking of the code-modulated interferometer against traditional interferometer and focal-plane arrays.

  17. Distributed multiple description coding

    CERN Document Server

    Bai, Huihui; Zhao, Yao

    2011-01-01

    This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed to address the problems of conventional image and video compression coding. Covering all fundamental concepts and core technologies, the chapters can also be read as independent and self-sufficient, describing each methodology in sufficient detail to enable readers to repeat the corresponding experiments easily. Topics and features: provides a broad overview of DVC and MDC, from the basic principles to the latest research; covers sub-sampling based MDC, quantization based MDC,

  18. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  19. Coded MapReduce

    OpenAIRE

    Li, Songze; Maddah-Ali, Mohammad Ali; Avestimehr, A. Salman

    2015-01-01

    MapReduce is a commonly used framework for executing data-intensive jobs on distributed server clusters. We introduce a variant implementation of MapReduce, namely "Coded MapReduce", to substantially reduce the inter-server communication load for the shuffling phase of MapReduce, and thus accelerating its execution. The proposed Coded MapReduce exploits the repetitive mapping of data blocks at different servers to create coding opportunities in the shuffling phase to exchange (key,value) pair...

  20. Classical Holographic Codes

    CERN Document Server

    Brehm, Enrico M

    2016-01-01

    In this work, we introduce classical holographic codes. These can be understood as concatenated probabilistic codes and can be represented as networks uniformly covering hyperbolic space. In particular, classical holographic codes can be interpreted as maps from bulk degrees of freedom to boundary degrees of freedom. Interestingly, they are shown to exhibit features similar to those expected from the AdS/CFT correspondence. Among these are a version of the Ryu-Takayanagi formula and intriguing properties regarding bulk reconstruction and boundary representations of bulk operations. We discuss the relation of our findings with expectations from AdS/CFT and, in particular, with recent results from quantum error correction.

  1. The mechanism of long non-coding RNA MEG3 for neurons apoptosis caused by hypoxia: mediated by miR-181b-12/15-LOX signaling pathway

    Directory of Open Access Journals (Sweden)

    Xiaomin Liu

    2016-09-01

    Full Text Available Objective: lncRNAs are recently thought to play a significant role in cellular homeostasis during pathological process of diseases by competing inhibiting miRNA function. The aim of present study was to assess the function of long non-coding RNA (lncRNA MEG3 and its functional interaction with microRNA-181b in cerebral ischemic infarct of mice and hypoxia-induced neurons apoptosis. Methods: To address this question, we performed the experiments with in vivo middle cerebral artery occlusion (MCAO mice model and in vitro oxygen-glucose deprivation (OGD-cultured neuronal HT22 cell line. Relative expression of MEG3, miR-181b and 12/15-LOX (lipoxygenase mRNA was determined using quantitative RT-PCR. Western blot was used to evaluate 12/15-LOX protein expression. TUNEL assay was performed to assess cell apoptosis.Results: In both MCAO mice and OGD-cultured HT22 cell, ischemia or hypoxia treatment results in a time-dependent increase in MEG3 and 12/15-LOX expression and decrease in miR-181b expression. Knockdown of MEG3 contributes to attenuation of hypoxia-induced apoptosis of HT22 cell. Also, expression level of MEG3 negatively correlated with miR-181b expression and positively correlated with 12/15-LOX expression. In contrary to MEG3, miR-181b overexpression attenuated hypoxia-induced HT22 cell apoptosis, as well as suppressed hypoxia-induced increase in 12/15-LOX expression. By luciferase reporter assay, we concluded that miR-181b directly binds to 12/15-LOX 3’-UTR, thereby negatively regulates 12/15-LOX expression. Conclusion: Our data suggested that long non-coding RNA MEG3 functions as a competing endogenous RNA for miR-181b to regulate 12/15-LOX expression in middle cerebral artery occlusion-induced ischemic infarct of brain nerve cells.

  2. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  3. VT ZIP Code Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) A ZIP Code Tabulation Area (ZCTA) is a statistical geographic entity that approximates the delivery area for a U.S. Postal Service five-digit...

  4. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  5. GOOGLE SUMMER OF CODE

    National Research Council Canada - National Science Library

    Leslie Hawthorn

    2008-01-01

      This article examines the Google Summer of Code (GSoC) program, the world's first global initiative to introduce College and University students to free/libre open source software (F/LOSS) development...

  6. Importance of Building Code

    Directory of Open Access Journals (Sweden)

    Reshmi Banerjee

    2015-06-01

    Full Text Available A building code, or building control, is a set of rules that specify the minimum standards for constructed objects such as buildings and non building structures. The main purpose of building codes are to protect public health, safety and general welfare as they relate to the construction and occupancy of buildings and structures. The building code becomes law of a particular jurisdiction when formally enacted by the appropriate governmental or private authority. Building codes are generally intended to be applied by architects, engineers, constructors and regulators but are also used for various purposes by safety inspectors, environmental scientists, real estate developers, subcontractors, manufacturers of building products and materials, insurance companies, facility managers, tenants and others.

  7. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi

    2015-01-01

    , in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of coded......The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered...... as waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access...

  8. Code Disentanglement: Initial Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wohlbier, John Greaton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kelley, Timothy M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rockefeller, Gabriel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Calef, Matthew Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  9. Annotated Raptor Codes

    CERN Document Server

    Mahdaviani, Kaveh; Tellambura, Chintha

    2011-01-01

    In this paper, an extension of raptor codes is introduced which keeps all the desirable properties of raptor codes, including the linear complexity of encoding and decoding per information bit, unchanged. The new design, however, improves the performance in terms of the reception rate. Our simulations show a 10% reduction in the needed overhead at the benchmark block length of 64,520 bits and with the same complexity per information bit.

  10. Robust Nonlinear Neural Codes

    Science.gov (United States)

    Yang, Qianli; Pitkow, Xaq

    2015-03-01

    Most interesting natural sensory stimuli are encoded in the brain in a form that can only be decoded nonlinearly. But despite being a core function of the brain, nonlinear population codes are rarely studied and poorly understood. Interestingly, the few existing models of nonlinear codes are inconsistent with known architectural features of the brain. In particular, these codes have information content that scales with the size of the cortical population, even if that violates the data processing inequality by exceeding the amount of information entering the sensory system. Here we provide a valid theory of nonlinear population codes by generalizing recent work on information-limiting correlations in linear population codes. Although these generalized, nonlinear information-limiting correlations bound the performance of any decoder, they also make decoding more robust to suboptimal computation, allowing many suboptimal decoders to achieve nearly the same efficiency as an optimal decoder. Although these correlations are extremely difficult to measure directly, particularly for nonlinear codes, we provide a simple, practical test by which one can use choice-related activity in small populations of neurons to determine whether decoding is suboptimal or optimal and limited by correlated noise. We conclude by describing an example computation in the vestibular system where this theory applies. QY and XP was supported by a grant from the McNair foundation.

  11. Scalable motion vector coding

    Science.gov (United States)

    Barbarien, Joeri; Munteanu, Adrian; Verdicchio, Fabio; Andreopoulos, Yiannis; Cornelis, Jan P.; Schelkens, Peter

    2004-11-01

    Modern video coding applications require transmission of video data over variable-bandwidth channels to a variety of terminals with different screen resolutions and available computational power. Scalable video coding is needed to optimally support these applications. Recently proposed wavelet-based video codecs employing spatial domain motion compensated temporal filtering (SDMCTF) provide quality, resolution and frame-rate scalability while delivering compression performance comparable to that of the state-of-the-art non-scalable H.264-codec. These codecs require scalable coding of the motion vectors in order to support a large range of bit-rates with optimal compression efficiency. Scalable motion vector coding algorithms based on the integer wavelet transform followed by embedded coding of the wavelet coefficients were recently proposed. In this paper, a new and fundamentally different scalable motion vector codec (MVC) using median-based motion vector prediction is proposed. Extensive experimental results demonstrate that the proposed MVC systematically outperforms the wavelet-based state-of-the-art solutions. To be able to take advantage of the proposed scalable MVC, a rate allocation mechanism capable of optimally dividing the available rate among texture and motion information is required. Two rate allocation strategies are proposed and compared. The proposed MVC and rate allocation schemes are incorporated into an SDMCTF-based video codec and the benefits of scalable motion vector coding are experimentally demonstrated.

  12. On Expanded Cyclic Codes

    CERN Document Server

    Wu, Yingquan

    2008-01-01

    The paper has a threefold purpose. The first purpose is to present an explicit description of expanded cyclic codes defined in $\\GF(q^m)$. The proposed explicit construction of expanded generator matrix and expanded parity check matrix maintains the symbol-wise algebraic structure and thus keeps many important original characteristics. The second purpose of this paper is to identify a class of constant-weight cyclic codes. Specifically, we show that a well-known class of $q$-ary BCH codes excluding the all-zero codeword are constant-weight cyclic codes. Moreover, we show this class of codes achieve the Plotkin bound. The last purpose of the paper is to characterize expanded cyclic codes utilizing the proposed expanded generator matrix and parity check matrix. We analyze the properties of component codewords of a codeword and particularly establish the precise conditions under which a codeword can be represented by a subbasis. With the new insights, we present an improved lower bound on the minimum distance of...

  13. A minimum-error, energy-constrained neural code is an instantaneous-rate code.

    Science.gov (United States)

    Johnson, Erik C; Jones, Douglas L; Ratnam, Rama

    2016-04-01

    Sensory neurons code information about stimuli in their sequence of action potentials (spikes). Intuitively, the spikes should represent stimuli with high fidelity. However, generating and propagating spikes is a metabolically expensive process. It is therefore likely that neural codes have been selected to balance energy expenditure against encoding error. Our recently proposed optimal, energy-constrained neural coder (Jones et al. Frontiers in Computational Neuroscience, 9, 61 2015) postulates that neurons time spikes to minimize the trade-off between stimulus reconstruction error and expended energy by adjusting the spike threshold using a simple dynamic threshold. Here, we show that this proposed coding scheme is related to existing coding schemes, such as rate and temporal codes. We derive an instantaneous rate coder and show that the spike-rate depends on the signal and its derivative. In the limit of high spike rates the spike train maximizes fidelity given an energy constraint (average spike-rate), and the predicted interspike intervals are identical to those generated by our existing optimal coding neuron. The instantaneous rate coder is shown to closely match the spike-rates recorded from P-type primary afferents in weakly electric fish. In particular, the coder is a predictor of the peristimulus time histogram (PSTH). When tested against in vitro cortical pyramidal neuron recordings, the instantaneous spike-rate approximates DC step inputs, matching both the average spike-rate and the time-to-first-spike (a simple temporal code). Overall, the instantaneous rate coder relates optimal, energy-constrained encoding to the concepts of rate-coding and temporal-coding, suggesting a possible unifying principle of neural encoding of sensory signals.

  14. Non-Binary Polar Codes using Reed-Solomon Codes and Algebraic Geometry Codes

    CERN Document Server

    Mori, Ryuhei

    2010-01-01

    Polar codes, introduced by Arikan, achieve symmetric capacity of any discrete memoryless channels under low encoding and decoding complexity. Recently, non-binary polar codes have been investigated. In this paper, we calculate error probability of non-binary polar codes constructed on the basis of Reed-Solomon matrices by numerical simulations. It is confirmed that 4-ary polar codes have significantly better performance than binary polar codes on binary-input AWGN channel. We also discuss an interpretation of polar codes in terms of algebraic geometry codes, and further show that polar codes using Hermitian codes have asymptotically good performance.

  15. Distributed Video Coding: Iterative Improvements

    DEFF Research Database (Denmark)

    Luong, Huynh Van

    Nowadays, emerging applications such as wireless visual sensor networks and wireless video surveillance are requiring lightweight video encoding with high coding efficiency and error-resilience. Distributed Video Coding (DVC) is a new coding paradigm which exploits the source statistics...

  16. Polynomial weights and code constructions

    DEFF Research Database (Denmark)

    Massey, J; Costello, D; Justesen, Jørn

    1973-01-01

    polynomial included. This fundamental property is then used as the key to a variety of code constructions including 1) a simplified derivation of the binary Reed-Muller codes and, for any primepgreater than 2, a new extensive class ofp-ary "Reed-Muller codes," 2) a new class of "repeated-root" cyclic codes...... that are subcodes of the binary Reed-Muller codes and can be very simply instrumented, 3) a new class of constacyclic codes that are subcodes of thep-ary "Reed-Muller codes," 4) two new classes of binary convolutional codes with large "free distance" derived from known binary cyclic codes, 5) two new classes...... of long constraint length binary convolutional codes derived from2^r-ary Reed-Solomon codes, and 6) a new class ofq-ary "repeated-root" constacyclic codes with an algebraic decoding algorithm....

  17. Bayesian anti-sparse coding

    CERN Document Server

    Elvira, Clément; Dobigeon, Nicolas

    2015-01-01

    Sparse representations have proven their efficiency in solving a wide class of inverse problems encountered in signal and image processing. Conversely, enforcing the information to be spread uniformly over representation coefficients exhibits relevant properties in various applications such as digital communications. Anti-sparse regularization can be naturally expressed through an $\\ell_{\\infty}$-norm penalty. This paper derives a probabilistic formulation of such representations. A new probability distribution, referred to as the democratic prior, is first introduced. Its main properties as well as three random variate generators for this distribution are derived. Then this probability distribution is used as a prior to promote anti-sparsity in a Gaussian linear inverse problem, yielding a fully Bayesian formulation of anti-sparse coding. Two Markov chain Monte Carlo (MCMC) algorithms are proposed to generate samples according to the posterior distribution. The first one is a standard Gibbs sampler. The seco...

  18. Multichannel Error Correction Code Decoder

    Science.gov (United States)

    1996-01-01

    NASA Lewis Research Center's Digital Systems Technology Branch has an ongoing program in modulation, coding, onboard processing, and switching. Recently, NASA completed a project to incorporate a time-shared decoder into the very-small-aperture terminal (VSAT) onboard-processing mesh architecture. The primary goal was to demonstrate a time-shared decoder for a regenerative satellite that uses asynchronous, frequency-division multiple access (FDMA) uplink channels, thereby identifying hardware and power requirements and fault-tolerant issues that would have to be addressed in a operational system. A secondary goal was to integrate and test, in a system environment, two NASA-sponsored, proof-of-concept hardware deliverables: the Harris Corp. high-speed Bose Chaudhuri-Hocquenghem (BCH) codec and the TRW multichannel demultiplexer/demodulator (MCDD). A beneficial byproduct of this project was the development of flexible, multichannel-uplink signal-generation equipment.

  19. Product Codes for Optical Communication

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    2002-01-01

    Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes.......Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes....

  20. Some new ternary linear codes

    Directory of Open Access Journals (Sweden)

    Rumen Daskalov

    2017-07-01

    Full Text Available Let an $[n,k,d]_q$ code be a linear code of length $n$, dimension $k$ and minimum Hamming distance $d$ over $GF(q$. One of the most important problems in coding theory is to construct codes with optimal minimum distances. In this paper 22 new ternary linear codes are presented. Two of them are optimal. All new codes improve the respective lower bounds in [11].

  1. Algebraic geometric codes with applications

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2007-01-01

    The theory of linear error-correcting codes from algebraic geomet-ric curves (algebraic geometric (AG) codes or geometric Goppa codes) has been well-developed since the work of Goppa and Tsfasman, Vladut, and Zink in 1981-1982. In this paper we introduce to readers some recent progress in algebraic geometric codes and their applications in quantum error-correcting codes, secure multi-party computation and the construction of good binary codes.

  2. Assessment of TRACE Code for MIT Pressurizer Tests to Review Industrial Code

    Energy Technology Data Exchange (ETDEWEB)

    Song, Chanyi; Bang, Young Seok; Shin, Andong; Woo, Sweng-Wong [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2014-10-15

    Korea Institute of Nuclear Safety (KINS) has initiated to review the industrial code for safety analysis of nuclear power plant, in which MARS-KS and TRACE codes are being used to support the understanding of specific phenomena and code prediction. For this aspect, the TRACE code was assessed for the MIT pressurizer test. The TRACE code has been developed continuously, and NRC released the TRACE code version 5.0 patch 4 recently. This updated version has some improvement from version 5.0 patch 3. In this paper, TRACE code calculations with version 5.0 patch 3 and patch 4 for 3 cases of MIT pressurizer tests have been performed to assess the applicability of the TRACE code for verification of industrial codes. The MIT pressurizer test is one of the fundamental separate effect tests and frequently simulated to verify safety analysis codes. Predictability of the system code for the behavior of pressurizer in the plant is very important because it has an effect on the progress of accidents such as loss of coolant, control rod withdrawal, and loss of feedwater flow, etc. In the reactor protection system, the high pressurizer pressure trip signal provides an assurance of the integrity of the RCS boundary for AOOs that could lead to an over pressurization of the RCS. Also, the low pressurizer pressure trip signal provides an assistance for the ESF during the system pressure reduction events and a LOCA. According to the results, node effect was significantly reduced at patch 4 compared with patch 3 of TRACE version 5.0. Based on the prediction of Test ST4 and Test A, at least 20 cells are needed to predict pressurizer insurge behavior reasonably. However, the results of patch 4 show that 10 cells are enough to simulate the transient behavior of pressurizer. For outsurge case B, there was no major difference between patch 3 and patch 4 even though it was not shown in this paper. Overall, the results of the TRACE code version 5.0 patch 4 fit well with those of experiments

  3. Spectral Analysis Code: PARAS SPEC

    CERN Document Server

    Chaturvedi, Priyanka; Anandarao, B G

    2016-01-01

    The light emitted from the stellar photosphere serves as a unique signature for the nature of stars. The behaviour of these stellar lines depend upon the surface temperature, mass, evolutionary status and chemical composition of the star. With the advent of high-resolution spectrographs coupled with medium to large aperture telescopes around the globe, there is plenty of high-resolution and high signal-to-noise ratio data available to the astronomy community. Apart from radial velocity (RV) studies, such data offer us the unique opportunity to study chemical composition and atmospheric properties of the star. The procedure used to derive these parameters must be automated and well adaptable to data available from any high-resolution spectrograph. We hereby present an IDL code, PARAS SPEC, which was primary designed to handle high-resolution spectroscopy data from PARAS spectrograph coupled with the 1.2~m telescope at Mt. Abu, India. This code is designed to adapt with data from other spectrographs as well. Th...

  4. Segmentation-based video coding

    Energy Technology Data Exchange (ETDEWEB)

    Lades, M. [Lawrence Livermore National Lab., CA (United States); Wong, Yiu-fai; Li, Qi [Texas Univ., San Antonio, TX (United States). Div. of Engineering

    1995-10-01

    Low bit rate video coding is gaining attention through a current wave of consumer oriented multimedia applications which aim, e.g., for video conferencing over telephone lines or for wireless communication. In this work we describe a new segmentation-based approach to video coding which belongs to a class of paradigms appearing very promising among the various proposed methods. Our method uses a nonlinear measure of local variance to identify the smooth areas in an image in a more indicative and robust fashion: First, the local minima in the variance image are identified. These minima then serve as seeds for the segmentation of the image with a watershed algorithm. Regions and their contours are extracted. Motion compensation is used to predict the change of regions between previous frames and the current frame. The error signal is then quantized. To reduce the number of regions and contours, we use the motion information to assist the segmentation process, to merge regions, resulting in a further reduction in bit rate. Our scheme has been tested and good results have been obtained.

  5. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  6. Algebraic and stochastic coding theory

    CERN Document Server

    Kythe, Dave K

    2012-01-01

    Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.

  7. Conditional entropy coding of DCT coefficients for video compression

    Science.gov (United States)

    Sipitca, Mihai; Gillman, David W.

    2000-04-01

    We introduce conditional Huffman encoding of DCT run-length events to improve the coding efficiency of low- and medium-bit rate video compression algorithms. We condition the Huffman code for each run-length event on a classification of the current block. We classify blocks according to coding mode and signal type, which are known to the decoder, and according to energy, which the decoder must receive as side information. Our classification schemes improve coding efficiency with little or no increased running time and some increased memory use.

  8. Grayscale Image Compression Based on Min Max Block Truncating Coding

    Directory of Open Access Journals (Sweden)

    Hilal Almarabeh

    2011-11-01

    Full Text Available This paper presents an image compression techniques based on block truncating coding. In this work, a min max block truncating coding (MM_BTC is presented for grayscale image compression relies on applying dividing image into non-overlapping blocks. MM_BTC differ from other block truncating coding such as block truncating coding (BTC in the way of selecting the quantization level in order to remove redundancy. Objectives measures such as: Bit Rate (BR, Mean Square Error (MSE, Peak Signal to Noise Ratio (PSNR, and Redundancy (R, were used to present a detailed evaluation of MM_BTC of image quality.

  9. Golden Coded Multiple Beamforming

    CERN Document Server

    Li, Boyu

    2010-01-01

    The Golden Code is a full-rate full-diversity space-time code, which achieves maximum coding gain for Multiple-Input Multiple-Output (MIMO) systems with two transmit and two receive antennas. Since four information symbols taken from an M-QAM constellation are selected to construct one Golden Code codeword, a maximum likelihood decoder using sphere decoding has the worst-case complexity of O(M^4), when the Channel State Information (CSI) is available at the receiver. Previously, this worst-case complexity was reduced to O(M^(2.5)) without performance degradation. When the CSI is known by the transmitter as well as the receiver, beamforming techniques that employ singular value decomposition are commonly used in MIMO systems. In the absence of channel coding, when a single symbol is transmitted, these systems achieve the full diversity order provided by the channel. Whereas this property is lost when multiple symbols are simultaneously transmitted. However, uncoded multiple beamforming can achieve the full div...

  10. Coded source neutron imaging

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; Santos-Villalobos, Hector J [ORNL

    2011-01-01

    Coded aperture techniques have been applied to neutron radiography to address limitations in neutron flux and resolution of neutron detectors in a system labeled coded source imaging (CSI). By coding the neutron source, a magnified imaging system is designed with small spot size aperture holes (10 and 100 m) for improved resolution beyond the detector limits and with many holes in the aperture (50% open) to account for flux losses due to the small pinhole size. An introduction to neutron radiography and coded aperture imaging is presented. A system design is developed for a CSI system with a development of equations for limitations on the system based on the coded image requirements and the neutron source characteristics of size and divergence. Simulation has been applied to the design using McStas to provide qualitative measures of performance with simulations of pinhole array objects followed by a quantitative measure through simulation of a tilted edge and calculation of the modulation transfer function (MTF) from the line spread function. MTF results for both 100um and 10um aperture hole diameters show resolutions matching the hole diameters.

  11. Coded source neutron imaging

    Science.gov (United States)

    Bingham, Philip; Santos-Villalobos, Hector; Tobin, Ken

    2011-03-01

    Coded aperture techniques have been applied to neutron radiography to address limitations in neutron flux and resolution of neutron detectors in a system labeled coded source imaging (CSI). By coding the neutron source, a magnified imaging system is designed with small spot size aperture holes (10 and 100μm) for improved resolution beyond the detector limits and with many holes in the aperture (50% open) to account for flux losses due to the small pinhole size. An introduction to neutron radiography and coded aperture imaging is presented. A system design is developed for a CSI system with a development of equations for limitations on the system based on the coded image requirements and the neutron source characteristics of size and divergence. Simulation has been applied to the design using McStas to provide qualitative measures of performance with simulations of pinhole array objects followed by a quantitative measure through simulation of a tilted edge and calculation of the modulation transfer function (MTF) from the line spread function. MTF results for both 100μm and 10μm aperture hole diameters show resolutions matching the hole diameters.

  12. Multi-level trellis coded modulation and multi-stage decoding

    Science.gov (United States)

    Costello, Daniel J., Jr.; Wu, Jiantian; Lin, Shu

    1990-01-01

    Several constructions for multi-level trellis codes are presented and many codes with better performance than previously known codes are found. These codes provide a flexible trade-off between coding gain, decoding complexity, and decoding delay. New multi-level trellis coded modulation schemes using generalized set partitioning methods are developed for Quadrature Amplitude Modulation (QAM) and Phase Shift Keying (PSK) signal sets. New rotationally invariant multi-level trellis codes which can be combined with differential encoding to resolve phase ambiguity are presented.

  13. Coded Ultrasound for Blood Flow Estimation Using Subband Processing

    DEFF Research Database (Denmark)

    Gran, Fredrik; Udesen, Jesper; Nielsen, Michael Bachamnn

    2008-01-01

    the excitation signal is broadband and has good spatial resolution after pulse compression. This means that time can be saved by using the same data for B-mode imaging and blood flow estimation. Two different coding schemes are used in this paper, Barker codes and Golay codes. The performance of the codes...... signals are used to increase SNR, followed by subband processing. The received broadband signal is filtered using a set of narrow-band filters. Estimating the velocity in each of the bands and averaging the results yields better performance compared with what would be possible when transmitting a narrow......-band pulse directly. Also, the spatial resolution of the narrow-band pulse would be too poor for brightness-mode (B-mode) imaging, and additional transmissions would be required to update the B-mode image. For the described approach in the paper, there is no need for additional transmissions, because...

  14. An extensive Markov system for ECG exact coding.

    Science.gov (United States)

    Tai, S C

    1995-02-01

    In this paper, an extensive Markov process, which considers both the coding redundancy and the intersample redundancy, is presented to measure the entropy value of an ECG signal more accurately. It utilizes the intersample correlations by predicting the incoming n samples based on the previous m samples which constitute an extensive Markov process state. Theories of the extensive Markov process and conventional n repeated applications of m-th order Markov process are studied first in this paper. After that, they are realized for ECG exact coding. Results show that a better performance can be achieved by our system. The average code length for the extensive Markov system on the second difference signals was 2.512 b/sample, while the average Huffman code length for the second difference signals was 3.326 b/sample.

  15. Multiscale Signal Analysis and Modeling

    CERN Document Server

    Zayed, Ahmed

    2013-01-01

    Multiscale Signal Analysis and Modeling presents recent advances in multiscale analysis and modeling using wavelets and other systems. This book also presents applications in digital signal processing using sampling theory and techniques from various function spaces, filter design, feature extraction and classification, signal and image representation/transmission, coding, nonparametric statistical signal processing, and statistical learning theory. This book also: Discusses recently developed signal modeling techniques, such as the multiscale method for complex time series modeling, multiscale positive density estimations, Bayesian Shrinkage Strategies, and algorithms for data adaptive statistics Introduces new sampling algorithms for multidimensional signal processing Provides comprehensive coverage of wavelets with presentations on waveform design and modeling, wavelet analysis of ECG signals and wavelet filters Reviews features extraction and classification algorithms for multiscale signal and image proce...

  16. Optimization of Coding of AR Sources for Transmission Across Channels with Loss

    DEFF Research Database (Denmark)

    Arildsen, Thomas

    , and quantization. On this background we propose a new algorithm for optimization of predictive coding of AR sources for transmission across channels with loss. The optimization algorithm takes as its starting point a re-thinking of the source coding operation as an operation producing linear measurements....... Channel coding is usually applied in combination with source coding to ensure reliable transmission of the (source coded) information at the maximal rate across a channel given the properties of this channel. In this thesis, we consider the coding of auto-regressive (AR) sources which are sources that can...... be modeled as auto-regressive processes. The coding of AR sources lends itself to linear predictive coding. We address the problem of joint source/channel coding in the setting of linear predictive coding of AR sources. We consider channels in which individual source coded signal samples can be lost during...

  17. Signal trend identification with fuzzy methods.

    Energy Technology Data Exchange (ETDEWEB)

    Reifman, J.; Tsoukalas, L. H.; Wang, X.; Wei, T. Y. C.

    1999-08-19

    A fuzzy-logic-based methodology for on-line signal trend identification is introduced. Although signal trend identification is complicated by the presence of noise, fuzzy logic can help capture important features of on-line signals and classify incoming power plant signals into increasing, decreasing and steady-state trend categories. In order to verify the methodology, a code named PROTREN is developed and tested using plant data. The results indicate that the code is capable of detecting transients accurately, identifying trends reliably, and not misinterpreting a steady-state signal as a transient one.

  18. Signal Words

    Science.gov (United States)

    SIGNAL WORDS TOPIC FACT SHEET NPIC fact sheets are designed to answer questions that are commonly asked by the ... making decisions about pesticide use. What are Signal Words? Signal words are found on pesticide product labels, ...

  19. Nested Quantum Error Correction Codes

    CERN Document Server

    Wang, Zhuo; Fan, Hen; Vedral, Vlatko

    2009-01-01

    The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

  20. MHD Generation Code

    CERN Document Server

    Frutos-Alfaro, Francisco

    2015-01-01

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

  1. Autocatalysis, information and coding.

    Science.gov (United States)

    Wills, P R

    2001-01-01

    Autocatalytic self-construction in macromolecular systems requires the existence of a reflexive relationship between structural components and the functional operations they perform to synthesise themselves. The possibility of reflexivity depends on formal, semiotic features of the catalytic structure-function relationship, that is, the embedding of catalytic functions in the space of polymeric structures. Reflexivity is a semiotic property of some genetic sequences. Such sequences may serve as the basis for the evolution of coding as a result of autocatalytic self-organisation in a population of assignment catalysts. Autocatalytic selection is a mechanism whereby matter becomes differentiated in primitive biochemical systems. In the case of coding self-organisation, it corresponds to the creation of symbolic information. Prions are present-day entities whose replication through autocatalysis reflects aspects of biological semiotics less obvious than genetic coding.

  2. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  3. Adjoint code generator

    Institute of Scientific and Technical Information of China (English)

    CHENG Qiang; CAO JianWen; WANG Bin; ZHANG HaiBin

    2009-01-01

    The adjoint code generator (ADG) is developed to produce the adjoint codes, which are used to analytically calculate gradients and the Hessian-vector products with the costs independent of the number of the independent variables. Different from other automatic differentiation tools, the implementation of ADG has advantages of using the least program behavior decomposition method and several static dependence analysis techniques. In this paper we first address the concerned concepts and fundamentals, and then introduce the functionality and the features of ADG. In particular, we also discuss the design architecture of ADG and implementation details including the recomputation and storing strategy and several techniques for code optimization. Some experimental results in several applications are presented at the end.

  4. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  5. Spread codes and spread decoding in network coding

    OpenAIRE

    Manganiello, F; Gorla, E.; Rosenthal, J.

    2008-01-01

    In this paper we introduce the class of spread codes for the use in random network coding. Spread codes are based on the construction of spreads in finite projective geometry. The major contribution of the paper is an efficient decoding algorithm of spread codes up to half the minimum distance.

  6. Graph Codes with Reed-Solomon Component Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2006-01-01

    We treat a specific case of codes based on bipartite expander graphs coming from finite geometries. The code symbols are associated with the branches and the symbols connected to a given node are restricted to be codewords in a Reed-Solomon code. We give results on the parameters of the codes...

  7. Review of Form Fit Function Specification, Coding Strategy

    DEFF Research Database (Denmark)

    Justesen, Jørn; Larsen, Knud J.

    1997-01-01

    A review of the proposed European standard for EUROBALISE, i.e. a system that communicates signal aspects (e.g. signal at red) to trains. The review contains exact description of the performance of coding strategy of the proposed standard...

  8. Coded excitation for ultrasound tissue harmonic imaging.

    Science.gov (United States)

    Song, Jaehee; Kim, Sangwon; Sohn, Hak-Yeol; Song, Tai-Kyong; Yoo, Yang Mo

    2010-05-01

    Coded excitation can improve the signal-to-noise ratio (SNR) in ultrasound tissue harmonic imaging (THI). However, it could suffer from the increased sidelobe artifact caused by incomplete pulse compression due to the spectral overlap between the fundamental and harmonic components of ultrasound signal after nonlinear propagation in tissues. In this paper, three coded tissue harmonic imaging (CTHI) techniques based on bandpass filtering, power modulation and pulse inversion (i.e., CTHI-BF, CTHI-PM, and CTHI-PI) were evaluated by measuring the peak range sidelobe level (PRSL) with varying frequency bandwidths. From simulation and in vitro studies, the CTHI-PI outperforms the CTHI-BF and CTHI-PM methods in terms of the PRSL, e.g., -43.5dB vs. -24.8dB and -23.0dB, respectively. Copyright 2010 Elsevier B.V. All rights reserved.

  9. Securing mobile code.

    Energy Technology Data Exchange (ETDEWEB)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called &apos

  10. Coding of object location in the vibrissal thalamocortical system.

    Science.gov (United States)

    Yu, Chunxiu; Horev, Guy; Rubin, Naama; Derdikman, Dori; Haidarliu, Sebastian; Ahissar, Ehud

    2015-03-01

    In whisking rodents, object location is encoded at the receptor level by a combination of motor and sensory related signals. Recoding of the encoded signals can result in various forms of internal representations. Here, we examined the coding schemes occurring at the first forebrain level that receives inputs necessary for generating such internal representations--the thalamocortical network. Single units were recorded in 8 thalamic and cortical stations in artificially whisking anesthetized rats. Neuronal representations of object location generated across these stations and expressed in response latency and magnitude were classified based on graded and binary coding schemes. Both graded and binary coding schemes occurred across the entire thalamocortical network, with a general tendency of graded-to-binary transformation from thalamus to cortex. Overall, 63% of the neurons of the thalamocortical network coded object position in their firing. Thalamocortical responses exhibited a slow dynamics during which the amount of coded information increased across 4-5 whisking cycles and then stabilized. Taken together, the results indicate that the thalamocortical network contains dynamic mechanisms that can converge over time on multiple coding schemes of object location, schemes which essentially transform temporal coding to rate coding and gradual to labeled-line coding.

  11. Soliton coding for secured optical communication link

    CERN Document Server

    Amiri, Iraj Sadegh; Idrus, Sevia Mahdaliza

    2015-01-01

    Nonlinear behavior of light such as chaos can be observed during propagation of a laser beam inside the microring resonator (MRR) systems. This Brief highlights the design of a system of MRRs to generate a series of logic codes. An optical soliton is used to generate an entangled photon. The ultra-short soliton pulses provide the required communication signals to generate a pair of polarization entangled photons required for quantum keys. In the frequency domain, MRRs can be used to generate optical millimetre-wave solitons with a broadband frequency of 0?100 GHz. The soliton signals are multi

  12. Quantization of wavelet packet audio coding

    Institute of Scientific and Technical Information of China (English)

    Tan Jianguo; Zhang Wenjun; Liu Peilin

    2006-01-01

    The method of quantization noise control of audio coding in the wavelet domain is proposed. Using the inverse Discrete Fourier Transform (DFT), it converts the masking threshold coming from MPEG psycho-acoustic model in the frequency domain to the signal in the time domain; the Discrete Wavelet Packet Transform (DWPT) is performed; the energy in each subband is regarded as the maximum allowed quantization noise energy. The experimental result shows that the proposed method can attain the nearly transparent audio quality below 64kbps for the most testing audio signals.

  13. New code match strategy for wideband code division multiple access code tree management

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Orthogonal variable spreading factor channelization codes are widely used to provide variable data rates for supporting different bandwidth requirements in wideband code division multiple access (WCDMA) systems. A new code match scheme for WCDMA code tree management was proposed. The code match scheme is similar to the existing crowed-first scheme. When choosing a code for a user, the code match scheme only compares the one up layer of the allocated codes, unlike the crowed-first scheme which perhaps compares all up layers. So the operation of code match scheme is simple, and the average time delay is decreased by 5.1%. The simulation results also show that the code match strategy can decrease the average code blocking probability by 8.4%.

  14. Reed-Solomon convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Schmale, W

    2005-01-01

    In this paper we will introduce a specific class of cyclic convolutional codes. The construction is based on Reed-Solomon block codes. The algebraic parameters as well as the distance of these codes are determined. This shows that some of these codes are optimal or near optimal.

  15. Multi-stage decoding of multi-level modulation codes

    Science.gov (United States)

    Lin, Shu; Kasami, Tadao; Costello, Daniel J., Jr.

    1991-01-01

    Various types of multi-stage decoding for multi-level modulation codes are investigated. It is shown that if the component codes of a multi-level modulation code and types of decoding at various stages are chosen properly, high spectral efficiency and large coding gain can be achieved with reduced decoding complexity. Particularly, it is shown that the difference in performance between the suboptimum multi-stage soft-decision maximum likelihood decoding of a modulation code and the single-stage optimum soft-decision decoding of the code is very small, only a fraction of dB loss in signal to noise ratio at a bit error rate (BER) of 10(exp -6).

  16. Efficient image compression scheme based on differential coding

    Science.gov (United States)

    Zhu, Li; Wang, Guoyou; Liu, Ying

    2007-11-01

    Embedded zerotree (EZW) and Set Partitioning in Hierarchical Trees (SPIHT) coding, introduced by J.M. Shapiro and Amir Said, are very effective and being used in many fields widely. In this study, brief explanation of the principles of SPIHT was first provided, and then, some improvement of SPIHT algorithm according to experiments was introduced. 1) For redundancy among the coefficients in the wavelet region, we propose differential method to reduce it during coding. 2) Meanwhile, based on characteristic of the coefficients' distribution in subband, we adjust sorting pass and optimize differential coding, in order to reduce the redundancy coding in each subband. 3) The image coding result, calculated by certain threshold, shows that through differential coding, the rate of compression get higher, and the quality of reconstructed image have been get raised greatly, when bpp (bit per pixel)=0.5, PSNR (Peak Signal to Noise Ratio) of reconstructed image exceeds that of standard SPIHT by 0.2~0.4db.

  17. Multilevel LDPC Codes Design for Multimedia Communication CDMA System

    Directory of Open Access Journals (Sweden)

    Hou Jia

    2004-01-01

    Full Text Available We design multilevel coding (MLC with a semi-bit interleaved coded modulation (BICM scheme based on low density parity check (LDPC codes. Different from the traditional designs, we joined the MLC and BICM together by using the Gray mapping, which is suitable to transmit the data over several equivalent channels with different code rates. To perform well at signal-to-noise ratio (SNR to be very close to the capacity of the additive white Gaussian noise (AWGN channel, random regular LDPC code and a simple semialgebra LDPC (SA-LDPC code are discussed in MLC with parallel independent decoding (PID. The numerical results demonstrate that the proposed scheme could achieve both power and bandwidth efficiency.

  18. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  19. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  20. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and compositi

  1. Polar Code Validation

    Science.gov (United States)

    1989-09-30

    SUMMARY OF POLAR ACHIEVEMENTS ..... .......... 3 3. POLAR CODE PHYSICAL MODELS ..... ............. 5 3.1 PL- ASMA Su ^"ru5 I1LS SH A...of this problem. 1.1. The Charge-2 Rocket The Charge-2 payload was launched on a Black Brant VB from White Sands Mis- sile Range in New Mexico in

  2. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and

  3. (Almost) practical tree codes

    KAUST Repository

    Khina, Anatoly

    2016-08-15

    We consider the problem of stabilizing an unstable plant driven by bounded noise over a digital noisy communication link, a scenario at the heart of networked control. To stabilize such a plant, one needs real-time encoding and decoding with an error probability profile that decays exponentially with the decoding delay. The works of Schulman and Sahai over the past two decades have developed the notions of tree codes and anytime capacity, and provided the theoretical framework for studying such problems. Nonetheless, there has been little practical progress in this area due to the absence of explicit constructions of tree codes with efficient encoding and decoding algorithms. Recently, linear time-invariant tree codes were proposed to achieve the desired result under maximum-likelihood decoding. In this work, we take one more step towards practicality, by showing that these codes can be efficiently decoded using sequential decoding algorithms, up to some loss in performance (and with some practical complexity caveats). We supplement our theoretical results with numerical simulations that demonstrate the effectiveness of the decoder in a control system setting.

  4. Corner neutronic code

    Directory of Open Access Journals (Sweden)

    V.P. Bereznev

    2015-10-01

    An iterative solution process is used, including external iterations for the fission source and internal iterations for the scattering source. The paper presents the results of a cross-verification against the Monte Carlo MMK code [3] and on a model of the BN-800 reactor core.

  5. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  6. Focusing Automatic Code Inspections

    NARCIS (Netherlands)

    Boogerd, C.J.

    2010-01-01

    Automatic Code Inspection tools help developers in early detection of defects in software. A well-known drawback of many automatic inspection approaches is that they yield too many warnings and require a clearer focus. In this thesis, we provide such focus by proposing two methods to prioritize

  7. Can the genetic code be mathematically described?

    Science.gov (United States)

    Gonzalez, Diego L

    2004-04-01

    From a mathematical point of view, the genetic code is a surjective mapping between the set of the 64 possible three-base codons and the set of 21 elements composed of the 20 amino acids plus the Stop signal. Redundancy and degeneracy therefore follow. In analogy with the genetic code, non-power integer-number representations are also surjective mappings between sets of different cardinality and, as such, also redundant. However, none of the non-power arithmetics studied so far nor other alternative redundant representations are able to match the actual degeneracy of the genetic code. In this paper we develop a slightly more general framework that leads to the following surprising results: i) the degeneracy of the genetic code is mathematically described, ii) a new symmetry is uncovered within this degeneracy, iii) by assigning a binary string to each of the codons, their classification into definite parity classes according to the corresponding sequence of bases is made possible. This last result is particularly appealing in connection with the fact that parity coding is the basis of the simplest strategies devised for error correction in man-made digital data transmission systems.

  8. Lifting transforms on graphs and their application to video coding

    OpenAIRE

    Martínez Enríquez, Eduardo

    2016-01-01

    Compact representations of data are very useful in many applications such as coding, denoising or feature extraction. “Classical” transforms such as Discrete Cosine Transforms (DCT) or Discrete Wavelets Transforms (DWT) provide sparse approximations of smooth signals, but lose efficiency when they are applied to signals with large discontinuities. In such cases, directional transforms, which are able to adapt their basis functions to the underlying signal structure, improve the...

  9. Fundamentals of coding and reimbursement.

    Science.gov (United States)

    Price, Paula

    2002-01-01

    After completing this introduction to radiology coding and reimbursement, readers will: Understand how health care reimbursement evolved over the past 50 years. Know the importance of documenting the patient's history. Have an overall picture of the standardized numerical coding system. Understand how accurate coding affects reimbursement. Understand coding functions as they pertain to regulatory compliance in the radiology department. Be familiar with the U.S. Justice Department's use of coding in tracking health care fraud.

  10. On Asymmetric Quantum MDS Codes

    CERN Document Server

    Ezerman, Martianus Frederic; Ling, San

    2010-01-01

    Assuming the validity of the MDS Conjecture, the weight distribution of all MDS codes is known. Using a recently-established characterization of asymmetric quantum error-correcting codes, linear MDS codes can be used to construct asymmetric quantum MDS codes with $d_{z} \\geq d_{x}\\geq 2$ for all possible values of length $n$ for which linear MDS codes over $\\F_{q}$ are known to exist.

  11. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...

  12. Rate-adaptive Constellation Shaping for Near-capacity Achieving Turbo Coded BICM

    DEFF Research Database (Denmark)

    Yankov, Metodi Plamenov; Forchhammer, Søren; Larsen, Knud J.

    2014-01-01

    In this paper the problem of constellation shaping is considered. Mapping functions are designed for a many- to-one signal shaping strategy, combined with a turbo coded Bit-interleaved Coded Modulation (BICM), based on symmetric Huffman codes with binary reflected Gray-like properties. An algorit...

  13. Sidelobe reduction of Barker codes, part 7.1C

    Science.gov (United States)

    Green, J. L.

    1984-01-01

    Barker codes can be realized as simple digital preprocessors, or with the use of a delay line, can be realized as an analogue device. Assuming the process observed has an autocorrelation time that is long compared to the code length, a gain in signal to noise, G = N where N is the number of elements in the code, may be realized. Typically Barker codes are implemented by shifting the phase of the transmitted signal by 0 or 180 degrees according to the code pattern. A typical detection scheme is shown where the output of the radar receiver is delayed by an analogue delay line or a shift register. The signal in each element of the delay line or shift register is continuously multiplied by the code and all elements are summed. A principal disadvantage was the sidelobe response. In the case of MST or ST radar echoes where there is a dynamic range as large as 60 dB, these unwanted sidelobes cause an increase in the apparent width of atmospheric layers, or some narrow layer to appear at several altitudes. The sidelobes of a Barker code may be reduced by tapering the response of the decoder. Optimum tapers, are shown. It is found that the sidelobe response is greatly reduced with very little loss in G.

  14. NEW BINARY USER CODES FOR DS CDMA COMMUNICATION

    Directory of Open Access Journals (Sweden)

    NEELAM SRIVASTAVA

    2011-12-01

    Full Text Available Spread spectrum (SS is a modulation technique in which the signal occupies a bandwidth much larger than the minimum necessary to send the information. A synchronized reception with the code at the receiver is used for despreading the information before data recovery. From a long period, Walsh codes and Gold codes have been used as spread spectrum codes in Code Division Multiple Access (CDMA communications because of their ease of generation than the efficiency of these codes. Walsh codes are perfectly orthogonal binary user codes that have many popular applications in synchronous multicarrier communications although they perform poorly for asynchronous multi-user communications. Therefore, the nearly orthogonal Gold codes with their superior performance are the preferred user codes in asynchronous CDMA communications with small number of simultaneous users in the system due to their good auto-correlation (intracode correlation and cross-correlation (inter-code properties. Major drawback of these codes is that they are limited in number and in their lengths. In this paper, we performed MATLAB (7.1version algorithm to obtain the new orthogonal sets of binary space for multiuser spread-spectrum communications. We compared their performance with existing codes like Gold and Walsh code families. Our comparisons include their time domain properties like auto and cross-correlations along with bit error rate (BER performances in additive white Gaussian noise (AWGN and Rayleigh channel for the synchronous and asynchronous DS-CDMA communications. It is shown that these codes outperform the Walsh codes significantly and they match in performance with the popular nearly orthogonal Gold codes closely for asynchronous multiuser communications in AWGN noise. It is also shown that all of the binary code families considered performed comparable for Rayleigh flat-fading channels. So these new codes can be used both for asynchronous and synchronous direct sequence

  15. L2 Orthogonal Space Time Code for Continuous Phase Modulation

    CERN Document Server

    Hesse, Matthias; Deneire, Luc

    2008-01-01

    To combine the high power efficiency of Continuous Phase Modulation (CPM) with either high spectral efficiency or enhanced performance in low Signal to Noise conditions, some authors have proposed to introduce CPM in a MIMO frame, by using Space Time Codes (STC). In this paper, we address the code design problem of Space Time Block Codes combined with CPM and introduce a new design criterion based on L2 orthogonality. This L2 orthogonality condition, with the help of simplifying assumption, leads, in the 2x2 case, to a new family of codes. These codes generalize the Wang and Xia code, which was based on pointwise orthogonality. Simulations indicate that the new codes achieve full diversity and a slightly better coding gain. Moreover, one of the codes can be interpreted as two antennas fed by two conventional CPMs using the same data but with different alphabet sets. Inspection of these alphabet sets lead also to a simple explanation of the (small) spectrum broadening of Space Time Coded CPM.

  16. Fountain Codes with Multiplicatively Repeated Non-Binary LDPC Codes

    CERN Document Server

    Kasai, Kenta

    2010-01-01

    We study fountain codes transmitted over the binary-input symmetric-output channel. For channels with small capacity, receivers needs to collects many channel outputs to recover information bits. Since a collected channel output yields a check node in the decoding Tanner graph, the channel with small capacity leads to large decoding complexity. In this paper, we introduce a novel fountain coding scheme with non-binary LDPC codes. The decoding complexity of the proposed fountain code does not depend on the channel. Numerical experiments show that the proposed codes exhibit better performance than conventional fountain codes, especially for small number of information bits.

  17. Quantum codes from linear codes over finite chain rings

    Science.gov (United States)

    Liu, Xiusheng; Liu, Hualu

    2017-10-01

    In this paper, we provide two methods of constructing quantum codes from linear codes over finite chain rings. The first one is derived from the Calderbank-Shor-Steane (CSS) construction applied to self-dual codes over finite chain rings. The second construction is derived from the CSS construction applied to Gray images of the linear codes over finite chain ring {\\mathbb {F}}_{p^{2m}}+u{\\mathbb {F}}_{p^{2m}}. The good parameters of quantum codes from cyclic codes over finite chain rings are obtained.

  18. Fast QC-LDPC code for free space optical communication

    Science.gov (United States)

    Wang, Jin; Zhang, Qi; Udeh, Chinonso Paschal; Wu, Rangzhong

    2017-02-01

    Free Space Optical (FSO) Communication systems use the atmosphere as a propagation medium. Hence the atmospheric turbulence effects lead to multiplicative noise related with signal intensity. In order to suppress the signal fading induced by multiplicative noise, we propose a fast Quasi-Cyclic (QC) Low-Density Parity-Check (LDPC) code for FSO Communication systems. As a linear block code based on sparse matrix, the performances of QC-LDPC is extremely near to the Shannon limit. Currently, the studies on LDPC code in FSO Communications is mainly focused on Gauss-channel and Rayleigh-channel, respectively. In this study, the LDPC code design over atmospheric turbulence channel which is nether Gauss-channel nor Rayleigh-channel is closer to the practical situation. Based on the characteristics of atmospheric channel, which is modeled as logarithmic-normal distribution and K-distribution, we designed a special QC-LDPC code, and deduced the log-likelihood ratio (LLR). An irregular QC-LDPC code for fast coding, of which the rates are variable, is proposed in this paper. The proposed code achieves excellent performance of LDPC codes and can present the characteristics of high efficiency in low rate, stable in high rate and less number of iteration. The result of belief propagation (BP) decoding shows that the bit error rate (BER) obviously reduced as the Signal-to-Noise Ratio (SNR) increased. Therefore, the LDPC channel coding technology can effectively improve the performance of FSO. At the same time, the BER, after decoding reduces with the increase of SNR arbitrarily, and not having error limitation platform phenomenon with error rate slowing down.

  19. Reserved-Length Prefix Coding

    CERN Document Server

    Baer, Michael B

    2008-01-01

    Huffman coding finds an optimal prefix code for a given probability mass function. Consider situations in which one wishes to find an optimal code with the restriction that all codewords have lengths that lie in a user-specified set of lengths (or, equivalently, no codewords have lengths that lie in a complementary set). This paper introduces a polynomial-time dynamic programming algorithm that finds optimal codes for this reserved-length prefix coding problem. This has applications to quickly encoding and decoding lossless codes. In addition, one modification of the approach solves any quasiarithmetic prefix coding problem, while another finds optimal codes restricted to the set of codes with g codeword lengths for user-specified g (e.g., g=2).

  20. Decoding Generalized Concatenated Codes Using Interleaved Reed-Solomon Codes

    CERN Document Server

    Senger, Christian; Bossert, Martin; Zyablov, Victor

    2008-01-01

    Generalized Concatenated codes are a code construction consisting of a number of outer codes whose code symbols are protected by an inner code. As outer codes, we assume the most frequently used Reed-Solomon codes; as inner code, we assume some linear block code which can be decoded up to half its minimum distance. Decoding up to half the minimum distance of Generalized Concatenated codes is classically achieved by the Blokh-Zyablov-Dumer algorithm, which iteratively decodes by first using the inner decoder to get an estimate of the outer code words and then using an outer error/erasure decoder with a varying number of erasures determined by a set of pre-calculated thresholds. In this paper, a modified version of the Blokh-Zyablov-Dumer algorithm is proposed, which exploits the fact that a number of outer Reed-Solomon codes with average minimum distance d can be grouped into one single Interleaved Reed-Solomon code which can be decoded beyond d/2. This allows to skip a number of decoding iterations on the one...

  1. The NIMROD Code

    Science.gov (United States)

    Schnack, D. D.; Glasser, A. H.

    1996-11-01

    NIMROD is a new code system that is being developed for the analysis of modern fusion experiments. It is being designed from the beginning to make the maximum use of massively parallel computer architectures and computer graphics. The NIMROD physics kernel solves the three-dimensional, time-dependent two-fluid equations with neo-classical effects in toroidal geometry of arbitrary poloidal cross section. The NIMROD system also includes a pre-processor, a grid generator, and a post processor. User interaction with NIMROD is facilitated by a modern graphical user interface (GUI). The NIMROD project is using Quality Function Deployment (QFD) team management techniques to minimize re-engineering and reduce code development time. This paper gives an overview of the NIMROD project. Operation of the GUI is demonstrated, and the first results from the physics kernel are given.

  2. Epetra developers coding guidelines.

    Energy Technology Data Exchange (ETDEWEB)

    Heroux, Michael Allen; Sexton, Paul Michael

    2003-12-01

    Epetra is a package of classes for the construction and use of serial and distributed parallel linear algebra objects. It is one of the base packages in Trilinos. This document describes guidelines for Epetra coding style. The issues discussed here go beyond correct C++ syntax to address issues that make code more readable and self-consistent. The guidelines presented here are intended to aid current and future development of Epetra specifically. They reflect design decisions that were made in the early development stages of Epetra. Some of the guidelines are contrary to more commonly used conventions, but we choose to continue these practices for the purposes of self-consistency. These guidelines are intended to be complimentary to policies established in the Trilinos Developers Guide.

  3. Efficient convolutional sparse coding

    Energy Technology Data Exchange (ETDEWEB)

    Wohlberg, Brendt

    2017-06-20

    Computationally efficient algorithms may be applied for fast dictionary learning solving the convolutional sparse coding problem in the Fourier domain. More specifically, efficient convolutional sparse coding may be derived within an alternating direction method of multipliers (ADMM) framework that utilizes fast Fourier transforms (FFT) to solve the main linear system in the frequency domain. Such algorithms may enable a significant reduction in computational cost over conventional approaches by implementing a linear solver for the most critical and computationally expensive component of the conventional iterative algorithm. The theoretical computational cost of the algorithm may be reduced from O(M.sup.3N) to O(MN log N), where N is the dimensionality of the data and M is the number of elements in the dictionary. This significant improvement in efficiency may greatly increase the range of problems that can practically be addressed via convolutional sparse representations.

  4. Decoding the productivity code

    DEFF Research Database (Denmark)

    Hansen, David

    .e., to be prepared to initiate improvement. The study shows how the effectiveness of the improvement system depends on the congruent fit between the five elements as well as the bridging coherence between the improvement system and the work system. The bridging coherence depends on how improvements are activated...... approach often ends up with demanding intense employee focus to sustain improvement and engagement. Likewise, a single-minded employee development approach often ends up demanding rationalization to achieve the desired financial results. These ineffective approaches make organizations react like pendulums...... that swing between rationalization and employee development. The productivity code is the lack of alternatives to this ineffective approach. This thesis decodes the productivity code based on the results from a 3-year action research study at a medium-sized manufacturing facility. During the project period...

  5. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, however, that national views of good governance reflect different political cultures and institutional heritages. Fourteen national codes of conduct are analyzed. The findings suggest that public values converge and that they match model codes from the United Nations and the European Council as well...... as conceptions of good governance from other international organizations. While values converge, they are balanced and communicated differently, and seem to some extent to be translated into the national cultures. The set of global public values derived from this analysis include public interest, regime dignity...

  6. Confocal coded aperture imaging

    Energy Technology Data Exchange (ETDEWEB)

    Tobin, Jr., Kenneth William (Harriman, TN); Thomas, Jr., Clarence E. (Knoxville, TN)

    2001-01-01

    A method for imaging a target volume comprises the steps of: radiating a small bandwidth of energy toward the target volume; focusing the small bandwidth of energy into a beam; moving the target volume through a plurality of positions within the focused beam; collecting a beam of energy scattered from the target volume with a non-diffractive confocal coded aperture; generating a shadow image of said aperture from every point source of radiation in the target volume; and, reconstructing the shadow image into a 3-dimensional image of the every point source by mathematically correlating the shadow image with a digital or analog version of the coded aperture. The method can comprise the step of collecting the beam of energy scattered from the target volume with a Fresnel zone plate.

  7. The Phantom SPH code

    Science.gov (United States)

    Price, Daniel; Wurster, James; Nixon, Chris

    2016-05-01

    I will present the capabilities of the Phantom SPH code for global simulations of dust and gas in protoplanetary discs. I will present our new algorithms for simulating both small and large grains in discs, as well as our progress towards simulating evolving grain populations and coupling with radiation. Finally, I will discuss our recent applications to HL Tau and the physics of dust gap opening.

  8. The Liege Oscillation Code

    CERN Document Server

    Scuflaire, R; Théado, S; Bourge, P -O; Miglio, A; Godart, M; Thoul, A; Noels, A

    2007-01-01

    The Liege Oscillation code can be used as a stand-alone program or as a library of subroutines that the user calls from a Fortran main program of his own to compute radial and non-radial adiabatic oscillations of stellar models. We describe the variables and the equations used by the program and the methods used to solve them. A brief account is given of the use and the output of the program.

  9. Status of MARS Code

    Energy Technology Data Exchange (ETDEWEB)

    N.V. Mokhov

    2003-04-09

    Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

  10. ARQ for Network Coding

    CERN Document Server

    Sundararajan, Jay Kumar; Médard, Muriel

    2008-01-01

    A new coding and queue management algorithm is proposed for communication networks that employ linear network coding. The algorithm has the feature that the encoding process is truly online, as opposed to a block-by-block approach. The setup assumes a packet erasure broadcast channel with stochastic arrivals and full feedback, but the proposed scheme is potentially applicable to more general lossy networks with link-by-link feedback. The algorithm guarantees that the physical queue size at the sender tracks the backlog in degrees of freedom (also called the virtual queue size). The new notion of a node "seeing" a packet is introduced. In terms of this idea, our algorithm may be viewed as a natural extension of ARQ schemes to coded networks. Our approach, known as the drop-when-seen algorithm, is compared with a baseline queuing approach called drop-when-decoded. It is shown that the expected queue size for our approach is $O(\\frac1{1-\\rho})$ as opposed to $\\Omega(\\frac1{(1-\\rho)^2})$ for the baseline approach...

  11. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  12. Fixed-Length Error Resilient Code and Its Application in Video Coding

    Institute of Scientific and Technical Information of China (English)

    FANChen; YANGMing; CUIHuijuan; TANGKun

    2003-01-01

    Since popular entropy coding techniques such as Variable-length code (VLC) tend to cause severe error propagation in noisy environments, an error resilient entropy coding technique named Fixed-length error resilient code (FLERC) is proposed to mitigate the problem. It is found that even for a non-stationary source, the probability of error propagation could be minimized through introducing intervals into the codeword space of the fixed-length codes. FLERC is particularly suitable for the entropy coding for video signals in error-prone environments, where a little distortion is tolerable, but severe error propagation would lead to fatal consequences. An iterative construction algorithm for FLERC is presented in this paper. In addition, FLERC is adopted instead of VLC as the entropy coder of the DCT coefficients in H.263++Data partitioning slice (DPS) mode, and tested on noisy channels. The simulation results show that this scheme outperforms the scheme of H.263++ combined with FEC when the channel noise is highly extensive, since the error propagation is effectively suppressed by using FLERC. Moreover, it is observed that the reconstructed video quality degrades gracefully as the bit error rate increases.

  13. A MCTF video coding scheme based on distributed source coding principles

    Science.gov (United States)

    Tagliasacchi, Marco; Tubaro, Stefano

    2005-07-01

    Motion Compensated Temporal Filtering (MCTF) has proved to be an efficient coding tool in the design of open-loop scalable video codecs. In this paper we propose a MCTF video coding scheme based on lifting where the prediction step is implemented using PRISM (Power efficient, Robust, hIgh compression Syndrome-based Multimedia coding), a video coding framework built on distributed source coding principles. We study the effect of integrating the update step at the encoder or at the decoder side. We show that the latter approach allows to improve the quality of the side information exploited during decoding. We present the analytical results obtained by modeling the video signal along the motion trajectories as a first order auto-regressive process. We show that the update step at the decoder allows to half the contribution of the quantization noise. We also include experimental results with real video data that demonstrate the potential of this approach when the video sequences are coded at low bitrates.

  14. Performance optimization of spectral amplitude coding OCDMA system using new enhanced multi diagonal code

    Science.gov (United States)

    Imtiaz, Waqas A.; Ilyas, M.; Khan, Yousaf

    2016-11-01

    This paper propose a new code to optimize the performance of spectral amplitude coding-optical code division multiple access (SAC-OCDMA) system. The unique two-matrix structure of the proposed enhanced multi diagonal (EMD) code and effective correlation properties, between intended and interfering subscribers, significantly elevates the performance of SAC-OCDMA system by negating multiple access interference (MAI) and associated phase induce intensity noise (PIIN). Performance of SAC-OCDMA system based on the proposed code is thoroughly analyzed for two detection techniques through analytic and simulation analysis by referring to bit error rate (BER), signal to noise ratio (SNR) and eye patterns at the receiving end. It is shown that EMD code while using SDD technique provides high transmission capacity, reduces the receiver complexity, and provides better performance as compared to complementary subtraction detection (CSD) technique. Furthermore, analysis shows that, for a minimum acceptable BER of 10-9 , the proposed system supports 64 subscribers at data rates of up to 2 Gbps for both up-down link transmission.

  15. low bit rate video coding low bit rate video coding

    African Journals Online (AJOL)

    eobe

    ariable length bit rate (VLBR) broadly encompasses video coding which broadly encompasses ... for motion estimation and compensation to reduce the prediction sation to reduce the ... a special interest among the video coding community ...

  16. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Høholdt, Tom

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K...

  17. Random linear codes in steganography

    Directory of Open Access Journals (Sweden)

    Kamil Kaczyński

    2016-12-01

    Full Text Available Syndrome coding using linear codes is a technique that allows improvement in the steganographic algorithms parameters. The use of random linear codes gives a great flexibility in choosing the parameters of the linear code. In parallel, it offers easy generation of parity check matrix. In this paper, the modification of LSB algorithm is presented. A random linear code [8, 2] was used as a base for algorithm modification. The implementation of the proposed algorithm, along with practical evaluation of algorithms’ parameters based on the test images was made.[b]Keywords:[/b] steganography, random linear codes, RLC, LSB

  18. Differential Space-Time Coded Modulation

    Institute of Scientific and Technical Information of China (English)

    CHENZhonglin; ZHUGuangxi

    2004-01-01

    Relying on amicable orthogonal design, we develop for multiple-antenna systems a General differential space-time block code (GDSTBC), which imposes no restrictions on underlying signal constellation compared with the existing differential space-time designs. This generalization potentially allows the spectral efficiency to be increased by carrying information not only on phases but also on amplitudes. We then derive a Noncoherent decoder (NCD) for fiat Rayleigh fading channels. We show that NCD may recover data symbols with full antenna diversity and linear complexity at high signal-to-noise ratio. Particularly, while three kinds of conventional signal constellations are used in GDSTBC, we derive the simplified versions of NCDs which can effectively reduce the cost of implementation.

  19. Patent landscape for royalty-free video coding

    Science.gov (United States)

    Reader, Cliff

    2016-09-01

    Digital video coding is over 60 years old and the first major video coding standard - H.261 - is over 25 years old, yet today there are more patents than ever related to, or evaluated as essential to video coding standards. This paper examines the historical development of video coding standards, from the perspective of when the significant contributions for video coding technology were made, what performance can be attributed to those contributions and when original patents were filed for those contributions. These patents have now expired, so the main video coding tools, which provide the significant majority of coding performance, are now royalty-free. The deployment of video coding tools in a standard involves several related developments. The tools themselves have evolved over time to become more adaptive, taking advantage of the increased complexity afforded by advances in semiconductor technology. In most cases, the improvement in performance for any given tool has been incremental, although significant improvement has occurred in aggregate across all tools. The adaptivity must be mirrored by the encoder and decoder, and advances have been made in reducing the overhead of signaling adaptive modes and parameters. Efficient syntax has been developed to provide such signaling. Furthermore, efficient ways of implementing the tools with limited precision, simple mathematical operators have been developed. Correspondingly, categories of patents related to video coding can be defined. Without discussing active patents, this paper provides the timeline of the developments of video coding and lays out the landscape of patents related to video coding. This provides a foundation on which royalty free video codec design can take place.

  20. Convolutional coding techniques for data protection

    Science.gov (United States)

    Massey, J. L.

    1975-01-01

    Results of research on the use of convolutional codes in data communications are presented. Convolutional coding fundamentals are discussed along with modulation and coding interaction. Concatenated coding systems and data compression with convolutional codes are described.

  1. Code Flows : Visualizing Structural Evolution of Source Code

    NARCIS (Netherlands)

    Telea, Alexandru; Auber, David

    2008-01-01

    Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared to the understanding of fine and mid-level scale changes across several file versions. We enhance an existing visual met

  2. Code flows : Visualizing structural evolution of source code

    NARCIS (Netherlands)

    Telea, Alexandru; Auber, David

    2008-01-01

    Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared to the understanding of fine and mid-level scale changes across several file versions. We enhance an existing visual met

  3. ATP signals

    DEFF Research Database (Denmark)

    Novak, Ivana

    2016-01-01

    The Department of Biology at the University of Copenhagen explains the function of ATP signalling in the pancreas......The Department of Biology at the University of Copenhagen explains the function of ATP signalling in the pancreas...

  4. What Froze the Genetic Code?

    National Research Council Canada - National Science Library

    Lluís Ribas de Pouplana; Adrian Gabriel Torres; albert Rafels-Ybern

    2017-01-01

    The frozen accident theory of the Genetic Code was a proposal by Francis Crick that attempted to explain the universal nature of the Genetic Code and the fact that it only contains information for twenty amino acids...

  5. Spatially-varying IIR filter banks for image coding

    Science.gov (United States)

    Chung, Wilson C.; Smith, Mark J. T.

    1992-01-01

    This paper reports on the application of spatially variant infinite impulse response (IIR) filter banks to subband image coding. The new filter bank is based on computationally efficient recursive polyphase decompositions that dynamically change in response to the input signal. In the absence of quantization, reconstruction can be made exact. However, by proper choice of an adaptation scheme, we show that subband image coding based on time varying filter banks can yield improvement over the use of conventional filter banks.

  6. Compressed Domain Packet Loss Concealment of Sinusoidally Coded Speech

    DEFF Research Database (Denmark)

    Rødbro, Christoffer A.; Christensen, Mads Græsbøll; Andersen, Søren Vang

    2003-01-01

    We consider the problem of packet loss concealment for voice over IP (VoIP). The speech signal is compressed at the transmitter using a sinusoidal coding scheme working at 8 kbit/s. At the receiver, packet loss concealment is carried out working directly on the quantized sinusoidal parameters......, based on time-scaling of the packets surrounding the missing ones. Subjective listening tests show promising results indicating the potential of sinusoidal speech coding for VoIP....

  7. Organizing conceptual knowledge in humans with a gridlike code.

    Science.gov (United States)

    Constantinescu, Alexandra O; O'Reilly, Jill X; Behrens, Timothy E J

    2016-06-17

    It has been hypothesized that the brain organizes concepts into a mental map, allowing conceptual relationships to be navigated in a manner similar to that of space. Grid cells use a hexagonally symmetric code to organize spatial representations and are the likely source of a precise hexagonal symmetry in the functional magnetic resonance imaging signal. Humans navigating conceptual two-dimensional knowledge showed the same hexagonal signal in a set of brain regions markedly similar to those activated during spatial navigation. This gridlike signal is consistent across sessions acquired within an hour and more than a week apart. Our findings suggest that global relational codes may be used to organize nonspatial conceptual representations and that these codes may have a hexagonal gridlike pattern when conceptual knowledge is laid out in two continuous dimensions.

  8. Decoding Xing-Ling codes

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Refslund

    2002-01-01

    This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed.......This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed....

  9. The path of code linting

    CERN Document Server

    CERN. Geneva

    2017-01-01

    Join the path of code linting and discover how it can help you reach higher levels of programming enlightenment. Today we will cover how to embrace code linters to offload cognitive strain on preserving style standards in your code base as well as avoiding error-prone constructs. Additionally, I will show you the journey ahead for integrating several code linters in the programming tools your already use with very little effort.

  10. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...

  11. Introduction to the High-Efficiency Video Coding Standard

    Institute of Scientific and Technical Information of China (English)

    Ping Wu; Mina Li

    2012-01-01

    The high-efficiency video coding (HEVC) standard is the newest video coding standard currently under joint development by ITU-T Video Coding Experts Group (VCEG) and ISO/IEC Moving Picture Experts Group (MPEG). HEVC is the next-generation video coding standard after H.264/AVC. The goals of the HEVC standardization effort are to double the video coding efficiency of existing H.264/AVC while supporting all the recognized potential applications, such as, video telephony, storage, broadcast, streaming, especially for large picture size video (4k x 2k). The HEVC standard will be completed as an ISO/iEC and ITU-T standard in January 2013. in February 2012, the HEVC standardization process reached its committee draft (CD) stage. The ever-improving HEVC standard has demonstrated a significant gain in coding efficiency in rate-distortion efficiency relative to the existing H.264/AVC. This paper provides an overview of the technical features of HEVC close to HEVC CD stage, covering high-level structure, coding units, prediction units, transform units, spatial signal transformation and PCM representation, intra-picture prediction, inter-picture prediction, entropy coding and in-loop filtering. The HEVC coding efficiency performances comparing with H.264/AVC are also provided.

  12. Code stroke in Asturias.

    Science.gov (United States)

    Benavente, L; Villanueva, M J; Vega, P; Casado, I; Vidal, J A; Castaño, B; Amorín, M; de la Vega, V; Santos, H; Trigo, A; Gómez, M B; Larrosa, D; Temprano, T; González, M; Murias, E; Calleja, S

    2016-04-01

    Intravenous thrombolysis with alteplase is an effective treatment for ischaemic stroke when applied during the first 4.5 hours, but less than 15% of patients have access to this technique. Mechanical thrombectomy is more frequently able to recanalise proximal occlusions in large vessels, but the infrastructure it requires makes it even less available. We describe the implementation of code stroke in Asturias, as well as the process of adapting various existing resources for urgent stroke care in the region. By considering these resources, and the demographic and geographic circumstances of our region, we examine ways of reorganising the code stroke protocol that would optimise treatment times and provide the most appropriate treatment for each patient. We distributed the 8 health districts in Asturias so as to permit referral of candidates for reperfusion therapies to either of the 2 hospitals with 24-hour stroke units and on-call neurologists and providing IV fibrinolysis. Hospitals were assigned according to proximity and stroke severity; the most severe cases were immediately referred to the hospital with on-call interventional neurology care. Patient triage was provided by pre-hospital emergency services according to the NIHSS score. Modifications to code stroke in Asturias have allowed us to apply reperfusion therapies with good results, while emphasising equitable care and managing the severity-time ratio to offer the best and safest treatment for each patient as soon as possible. Copyright © 2015 Sociedad Española de Neurología. Published by Elsevier España, S.L.U. All rights reserved.

  13. MHD Generation Code

    OpenAIRE

    Frutos-Alfaro, Francisco; Carboni-Mendez, Rodrigo

    2015-01-01

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a c...

  14. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  15. Code Optimization in FORM

    CERN Document Server

    Kuipers, J; Vermaseren, J A M

    2013-01-01

    We describe the implementation of output code optimization in the open source computer algebra system FORM. This implementation is based on recently discovered techniques of Monte Carlo tree search to find efficient multivariate Horner schemes, in combination with other optimization algorithms, such as common subexpression elimination. For systems for which no specific knowledge is provided it performs significantly better than other methods we could compare with. Because the method has a number of free parameters, we also show some methods by which to tune them to different types of problems.

  16. Topological code Autotune

    CERN Document Server

    Fowler, Austin G; McInnes, Angus L; Rabbani, Alimohammad

    2012-01-01

    Tailoring a fault-tolerant quantum error correction scheme to a specific physical architecture can be a laborious task. We describe a tool Autotune capable of analyzing and optimizing the classical processing for an arbitrary 2-D qubit architecture making use of arbitrary circuits implementing either the surface code or progressively generated slices of a 3-D topological cluster state with arbitrary stochastic error models for each quantum gate. Autotune is designed to facilitate precise study of the performance of real hardware running topological quantum error correction.

  17. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  18. Memory Code©

    OpenAIRE

    Gómez-Londoño, Ana María

    2013-01-01

    El proyecto Memory Code© pertenece al ámbito de las cosmopolíticas del arte contemporáneo porque se ocupa de una relación singular de lo humano (mujer) con lo no-humano (caballo y técnicas)5. Específicamente enmarca el estudio del Binomio Ecuestre: caballo-jinete en el marco de una relación afectiva y de adiestramiento (doma clásica). Dicha relación estuvo compuesta por los siguientes operadores : a) Elementos de con-tacto entre jinete-caballo: espuelas, estribus, fustas b) Sistemas rítmicos ...

  19. Multipoint videoconferencing with scalable video coding

    Institute of Scientific and Technical Information of China (English)

    ELEFTHERIADIS Alexandros; CIVANLAR M. Reha; SHAPIRO Ofer

    2006-01-01

    We describe a system for multipoint videoconferencing that offers extremely low end-to-end delay, low cost and complexity, and high scalability, alongside standard features associated with high-end solutions such as rate matching and personal video layout. The system accommodates heterogeneous receivers and networks based on the Internet Protocol and relies on scalable video coding to provide a coded representation of a source video signal at multiple temporal and spatial resolutions as well as quality levels. These are represented by distinct bitstream components which are created at each end-user encoder. Depending on the specific conferencing environment, some or all of these components are transmitted to a Scalable Video Conferencing Server (SVCS). The SVCS redirects these components to one or more recipients depending on, e.g., the available network conditions and user preferences. The scalable aspect of the video coding technique allows the system to adapt to different network conditions, and also accommodates different end-user requirements (e.g., a user may elect to view another user at a high or low spatial resolution). Performance results concerning flexibility, video quality and delay of the system are presented using the Joint Scalable Video Model (JSVM) of the forthcoming SVC (H.264 Annex G) standard, demonstrating that scalable coding outperforms existing state-of-the-art systems and offers the right platform for building next-generation multipoint videoconferencing systems.

  20. Non-Coding RNAs in Hodgkin Lymphoma

    Directory of Open Access Journals (Sweden)

    Anna Cordeiro

    2017-05-01

    Full Text Available MicroRNAs (miRNAs, small non-coding RNAs that regulate gene expression by binding to the 3’-UTR of their target genes, can act as oncogenes or tumor suppressors. Recently, other types of non-coding RNAs—piwiRNAs and long non-coding RNAs—have also been identified. Hodgkin lymphoma (HL is a B cell origin disease characterized by the presence of only 1% of tumor cells, known as Hodgkin and Reed-Stenberg (HRS cells, which interact with the microenvironment to evade apoptosis. Several studies have reported specific miRNA signatures that can differentiate HL lymph nodes from reactive lymph nodes, identify histologic groups within classical HL, and distinguish HRS cells from germinal center B cells. Moreover, some signatures are associated with survival or response to chemotherapy. Most of the miRNAs in the signatures regulate genes related to apoptosis, cell cycle arrest, or signaling pathways. Here we review findings on miRNAs in HL, as well as on other non-coding RNAs.

  1. Wavefront coding with adaptive optics

    Science.gov (United States)

    Agbana, Temitope E.; Soloviev, Oleg; Bezzubik, Vitalii; Patlan, Vsevolod; Verhaegen, Michel; Vdovin, Gleb

    2015-03-01

    We have implemented an extended depth of field optical system by wavefront coding with a micromachined membrane deformable mirror. This approach provides a versatile extension to standard wavefront coding based on fixed phase mask. First experimental results validate the feasibility of the use of adaptive optics for variable depth wavefront coding in imaging optical systems.

  2. Authorship Attribution of Source Code

    Science.gov (United States)

    Tennyson, Matthew F.

    2013-01-01

    Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…

  3. Strongly-MDS convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Rosenthal, J; Smarandache, R

    2006-01-01

    Maximum-distance separable (MDS) convolutional codes have the property that their free distance is maximal among all codes of the same rate and the same degree. In this paper, a class of MDS convolutional codes is introduced whose column distances reach the generalized Singleton bound at the earlies

  4. On Maximum Lee Distance Codes

    OpenAIRE

    Alderson, Tim L.; Svenja Huntemann

    2013-01-01

    Singleton-type upper bounds on the minimum Lee distance of general (not necessarily linear) Lee codes over ℤq are discussed. Two bounds known for linear codes are shown to also hold in the general case, and several new bounds are established. Codes meeting these bounds are investigated and in some cases characterised.

  5. Coding Issues in Grounded Theory

    Science.gov (United States)

    Moghaddam, Alireza

    2006-01-01

    This paper discusses grounded theory as one of the qualitative research designs. It describes how grounded theory generates from data. Three phases of grounded theory--open coding, axial coding, and selective coding--are discussed, along with some of the issues which are the source of debate among grounded theorists, especially between its…

  6. The Weights in MDS Codes

    CERN Document Server

    Ezerman, Martianus Frederic; Sole, Patrick

    2009-01-01

    The weights in MDS codes of length n and dimension k over the finite field GF(q) are studied. Up to some explicit exceptional cases, the MDS codes with parameters given by the MDS conjecture are shown to contain all k weights in the range n-k+1 to n. The proof uses the covering radius of the dual code

  7. Coding Issues in Grounded Theory

    Science.gov (United States)

    Moghaddam, Alireza

    2006-01-01

    This paper discusses grounded theory as one of the qualitative research designs. It describes how grounded theory generates from data. Three phases of grounded theory--open coding, axial coding, and selective coding--are discussed, along with some of the issues which are the source of debate among grounded theorists, especially between its…

  8. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    1997-01-01

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy...

  9. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    1997-01-01

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy...... machinery of algebraic geometry....

  10. A class of constacyclic BCH codes and new quantum codes

    Science.gov (United States)

    liu, Yang; Li, Ruihu; Lv, Liangdong; Ma, Yuena

    2017-03-01

    Constacyclic BCH codes have been widely studied in the literature and have been used to construct quantum codes in latest years. However, for the class of quantum codes of length n=q^{2m}+1 over F_{q^2} with q an odd prime power, there are only the ones of distance δ ≤ 2q^2 are obtained in the literature. In this paper, by a detailed analysis of properties of q2-ary cyclotomic cosets, maximum designed distance δ _{max} of a class of Hermitian dual-containing constacyclic BCH codes with length n=q^{2m}+1 are determined, this class of constacyclic codes has some characteristic analog to that of primitive BCH codes over F_{q^2}. Then we can obtain a sequence of dual-containing constacyclic codes of designed distances 2q^2 2q^2 can be constructed from these dual-containing codes via Hermitian Construction. These newly obtained quantum codes have better code rate compared with those constructed from primitive BCH codes.

  11. Signal Processing for Optical Networks

    Science.gov (United States)

    2007-11-02

    understanding and enhancing a number of important recent wavelet-based and DCT- based image coders. We show that Shapiro’s well-known EZW scheme, Said and...comparable to Shapiro’s EZW coder (J. M. Shapiro, "Embedded image coding using zerotrees of wavelet coefficients", IEEE Trans, on Signal Processing, v. 41

  12. ON CLASSICAL BCH CODES AND QUANTUM BCH CODES

    Institute of Scientific and Technical Information of China (English)

    Xu Yajie; Ma Zhi; Zhang Chunyuan

    2009-01-01

    It is a regular way of constructing quantum error-correcting codes via codes with self-orthogonal property, and whether a classical Bose-Chaudhuri-Hocquenghem (BCH) code is self-orthogonal can be determined by its designed distance. In this paper, we give the sufficient and necessary condition for arbitrary classical BCH codes with self-orthogonal property through algorithms. We also give a better upper bound of the designed distance of a classical narrow-sense BCH code which contains its Euclidean dual. Besides these, we also give one algorithm to compute the dimension of these codes. The complexity of all algorithms is analyzed. Then the results can be applied to construct a series of quantum BCH codes via the famous CSS constructions.

  13. New quantum codes constructed from quaternary BCH codes

    Science.gov (United States)

    Xu, Gen; Li, Ruihu; Guo, Luobin; Ma, Yuena

    2016-10-01

    In this paper, we firstly study construction of new quantum error-correcting codes (QECCs) from three classes of quaternary imprimitive BCH codes. As a result, the improved maximal designed distance of these narrow-sense imprimitive Hermitian dual-containing quaternary BCH codes are determined to be much larger than the result given according to Aly et al. (IEEE Trans Inf Theory 53:1183-1188, 2007) for each different code length. Thus, families of new QECCs are newly obtained, and the constructed QECCs have larger distance than those in the previous literature. Secondly, we apply a combinatorial construction to the imprimitive BCH codes with their corresponding primitive counterpart and construct many new linear quantum codes with good parameters, some of which have parameters exceeding the finite Gilbert-Varshamov bound for linear quantum codes.

  14. Structured error recovery for code-word-stabilized quantum codes

    Science.gov (United States)

    Li, Yunfan; Dumer, Ilya; Grassl, Markus; Pryadko, Leonid P.

    2010-05-01

    Code-word-stabilized (CWS) codes are, in general, nonadditive quantum codes that can correct errors by an exhaustive search of different error patterns, similar to the way that we decode classical nonlinear codes. For an n-qubit quantum code correcting errors on up to t qubits, this brute-force approach consecutively tests different errors of weight t or less and employs a separate n-qubit measurement in each test. In this article, we suggest an error grouping technique that allows one to simultaneously test large groups of errors in a single measurement. This structured error recovery technique exponentially reduces the number of measurements by about 3t times. While it still leaves exponentially many measurements for a generic CWS code, the technique is equivalent to syndrome-based recovery for the special case of additive CWS codes.

  15. On (Partial) Unit Memory Codes Based on Gabidulin Codes

    CERN Document Server

    Wachter, Antonia; Bossert, Martin; Zyablov, Victor

    2011-01-01

    (Partial) Unit Memory ((P)UM) codes provide a powerful possibility to construct convolutional codes based on block codes in order to achieve a high decoding performance. In this contribution, a construction based on Gabidulin codes is considered. This construction requires a modified rank metric, the so-called sum rank metric. For the sum rank metric, the free rank distance, the extended row rank distance and its slope are defined analogous to the extended row distance in Hamming metric. Upper bounds for the free rank distance and the slope of (P)UM codes in the sum rank metric are derived and an explicit construction of (P)UM codes based on Gabidulin codes is given, achieving the upper bound for the free rank distance.

  16. On the Performance of Code Acquisition in MIMO CDMA Systems

    Science.gov (United States)

    Kim, Sangchoon; An, Jinyoung

    This letter investigates the effects of using multiple transmit antennas on code acquisition for preamble search in the CDMA uplink when MIMO is used for signal transmission and reception. The performance of a ML code acquisition technique in the presence of MIMO channel is analyzed by considering the detection and miss probabilities. The acquisition performance is numerically evaluated on a frequency selective fading channel. It is found that the performance of code acquisition scheme for a SIMO system is better than that for the case of MIMO on the low thresholds in terms of detection performance and MAT.

  17. Transfer function bounds on the performance of turbo codes

    Science.gov (United States)

    Divsalar, D.; Dolinar, S.; Pollara, F.; Mceliece, R. J.

    1995-01-01

    In this article we apply transfer function bounding techniques to obtain upper bounds on the bit-error rate for maximum likelihood decoding of turbo codes constructed with random permutations. These techniques are applied to two turbo codes with constraint length 3 and later extended to other codes. The performance predicted by these bounds is compared with simulation results. The bounds are useful in estimating the 'error floor' that is difficult to measure by simulation, and they provide insight on how to lower this floor. More refined bounds are needed for accurate performance measures at lower signal-to-noise ratios.

  18. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause/receive inter......Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause....../receive interference. The way to deal with this problem in distributed wireless networks is usage of MAC-layer mechanisms that make a spatial reservation of the shared wireless medium, similar to the well-known RTS/CTS in IEEE 802.11 wireless networks. In this paper, we investigate two-way relaying in presence...

  19. Security Embedding Codes

    CERN Document Server

    Ly, Hung D; Blankenship, Yufei

    2011-01-01

    This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing is considered and is shown to achieve the secrecy capacity region of the channel in several scenarios. Specifying these results to both scalar and independent parallel Gaussian channels (under an average individual per-subchannel power constraint), it is shown that the high-security message can be embedded into the low-security message at full rate (as if the low-security message does not exist) without incurring any loss on the overall rate of communication (as if both messages are low-security messages). Extensions to the wiretap channel II setting of Ozarow and Wyner are also considered, where it is shown that "perfect" security embedding...

  20. Supervised Transfer Sparse Coding

    KAUST Repository

    Al-Shedivat, Maruan

    2014-07-27

    A combination of the sparse coding and transfer learn- ing techniques was shown to be accurate and robust in classification tasks where training and testing objects have a shared feature space but are sampled from differ- ent underlying distributions, i.e., belong to different do- mains. The key assumption in such case is that in spite of the domain disparity, samples from different domains share some common hidden factors. Previous methods often assumed that all the objects in the target domain are unlabeled, and thus the training set solely comprised objects from the source domain. However, in real world applications, the target domain often has some labeled objects, or one can always manually label a small num- ber of them. In this paper, we explore such possibil- ity and show how a small number of labeled data in the target domain can significantly leverage classifica- tion accuracy of the state-of-the-art transfer sparse cod- ing methods. We further propose a unified framework named supervised transfer sparse coding (STSC) which simultaneously optimizes sparse representation, domain transfer and classification. Experimental results on three applications demonstrate that a little manual labeling and then learning the model in a supervised fashion can significantly improve classification accuracy.

  1. Protein tyrosine kinase signaling in the mouse oocyte cortex during sperm-egg interactions and anaphase resumption.

    Science.gov (United States)

    McGinnis, Lynda K; Luo, Jinping; Kinsey, William H

    2013-04-01

    Fertilization triggers activation of a series of pre-programmed signal transduction pathways in the oocyte that establish a block to polyspermy, induce meiotic resumption, and initiate zygotic development. Fusion between sperm and oocyte results in rapid changes in oocyte intracellular free-calcium levels, which in turn activate multiple protein kinase cascades in the ooplasm. The present study examined the possibility that sperm-oocyte interaction involves localized activation of oocyte protein tyrosine kinases, which could provide an alternative signaling mechanism to that triggered by the fertilizing sperm. Confocal immunofluorescence analysis with antibodies to phosphotyrosine and phosphorylated protein tyrosine kinases allowed detection of minute signaling events localized to the site of sperm-oocyte interaction that were not amenable to biochemical analysis. The results provide evidence for localized accumulation of phosphotyrosine at the site of sperm contact, binding, or fusion, which suggests active protein tyrosine kinase signaling prior to and during sperm incorporation. The PYK2 kinase was found to be concentrated and activated at the site of sperm-oocyte interaction, and likely participates in this response. Widespread activation of PYK2 and FAK kinases was subsequently observed within the oocyte cortex, indicating that sperm incorporation is followed by more global signaling via these kinases during meiotic resumption. The results demonstrate an alternate signaling pathway triggered in mammalian oocytes by sperm contact, binding, or fusion with the oocyte.

  2. Lossless Compression of JPEG Coded Photo Collections.

    Science.gov (United States)

    Wu, Hao; Sun, Xiaoyan; Yang, Jingyu; Zeng, Wenjun; Wu, Feng

    2016-04-06

    The explosion of digital photos has posed a significant challenge to photo storage and transmission for both personal devices and cloud platforms. In this paper, we propose a novel lossless compression method to further reduce the size of a set of JPEG coded correlated images without any loss of information. The proposed method jointly removes inter/intra image redundancy in the feature, spatial, and frequency domains. For each collection, we first organize the images into a pseudo video by minimizing the global prediction cost in the feature domain. We then present a hybrid disparity compensation method to better exploit both the global and local correlations among the images in the spatial domain. Furthermore, the redundancy between each compensated signal and the corresponding target image is adaptively reduced in the frequency domain. Experimental results demonstrate the effectiveness of the proposed lossless compression method. Compared to the JPEG coded image collections, our method achieves average bit savings of more than 31%.

  3. Sub-Transport Layer Coding

    DEFF Research Database (Denmark)

    Hansen, Jonas; Krigslund, Jeppe; Roetter, Daniel Enrique Lucani

    2014-01-01

    Packet losses in wireless networks dramatically curbs the performance of TCP. This paper introduces a simple coding shim that aids IP-layer traffic in lossy environments while being transparent to transport layer protocols. The proposed coding approach enables erasure correction while being...... oblivious to the congestion control algorithms of the utilised transport layer protocol. Although our coding shim is indifferent towards the transport layer protocol, we focus on the performance of TCP when ran on top of our proposed coding mechanism due to its widespread use. The coding shim provides gains...

  4. The Art of Readable Code

    CERN Document Server

    Boswell, Dustin

    2011-01-01

    As programmers, we've all seen source code that's so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they're bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it-even if that someone else is you. This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languag

  5. Three Paradigms for Mixing Coding and Games: Coding in a Game, Coding as a Game, and Coding for a Game

    OpenAIRE

    2015-01-01

    Games for teaching coding have been an educational holy grail since at least the early 1980s. Yet for decades, with games more popular than ever and with the need to teach kids coding having been well-recognized, no blockbuster coding games have arisen (see Chapter 2). Over the years, the research community has made various games for teaching computer science: a survey made by shows that most do not teach coding, and of the ones that do teach coding, most are research prototypes (not produc...

  6. Remarks on generalized toric codes

    CERN Document Server

    Little, John B

    2011-01-01

    This note presents some new information on how the minimum distance of the generalized toric code corresponding to a fixed set of integer lattice points S in R^2 varies with the base field. The main results show that in some cases, over sufficiently large fields, the minimum distance of the code corresponding to a set S will be the same as that of the code corresponding to the convex hull of S. In an example, we will also discuss a [49,12,28] generalized toric code over GF(8), better than any previously known code according to M. Grassl's online tables, as of July 2011.

  7. Rotated and Scaled Alamouti Coding

    CERN Document Server

    Willems, Frans M J

    2008-01-01

    Repetition-based retransmission is used in Alamouti-modulation [1998] for $2\\times 2$ MIMO systems. We propose to use instead of ordinary repetition so-called "scaled repetition" together with rotation. It is shown that the rotated and scaled Alamouti code has a hard-decision performance which is only slightly worse than that of the Golden code [2005], the best known $2\\times 2$ space-time code. Decoding the Golden code requires an exhaustive search over all codewords, while our rotated and scaled Alamouti code can be decoded with an acceptable complexity however.

  8. On constructing disjoint linear codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Weiguo; CAI Mian; XIAO Guozhen

    2007-01-01

    To produce a highly nonlinear resilient function,the disjoint linear codes were originally proposed by Johansson and Pasalic in IEEE Trans.Inform.Theory,2003,49(2):494-501.In this paper,an effective method for finding a set of such disjoint linear codes is presented.When n≥2k,we can find a set of[n,k] disjoint linear codes with joint linear codes exists with cardinality at least 2.We also describe a result on constructing a set of [n,k] disjoint linear codes with minimum distance at least some fixed positive integer.

  9. Joint Estimation and Decoding of Space-Time Trellis Codes

    Directory of Open Access Journals (Sweden)

    Zhang Jianqiu

    2002-01-01

    Full Text Available We explore the possibility of using an emerging tool in statistical signal processing, sequential importance sampling (SIS, for joint estimation and decoding of space-time trellis codes (STTC. First, we provide background on SIS, and then we discuss its application to space-time trellis code (STTC systems. It is shown through simulations that SIS is suitable for joint estimation and decoding of STTC with time-varying flat-fading channels when phase ambiguity is avoided. We used a design criterion for STTCs and temporally correlated channels that combats phase ambiguity without pilot signaling. We have shown by simulations that the design is valid.

  10. Efficient Power Allocation for Video over Superposition Coding

    KAUST Repository

    Lau, Chun Pong

    2013-03-01

    In this paper we consider a wireless multimedia system by mapping scalable video coded (SVC) bit stream upon superposition coded (SPC) signals, referred to as (SVC-SPC) architecture. Empirical experiments using a software-defined radio(SDR) emulator are conducted to gain a better understanding of its efficiency, specifically, the impact of the received signal due to different power allocation ratios. Our experimental results show that to maintain high video quality, the power allocated to the base layer should be approximately four times higher than the power allocated to the enhancement layer.

  11. Predictive coding and the slowness principle: an information-theoretic approach.

    Science.gov (United States)

    Creutzig, Felix; Sprekeler, Henning

    2008-04-01

    Understanding the guiding principles of sensory coding strategies is a main goal in computational neuroscience. Among others, the principles of predictive coding and slowness appear to capture aspects of sensory processing. Predictive coding postulates that sensory systems are adapted to the structure of their input signals such that information about future inputs is encoded. Slow feature analysis (SFA) is a method for extracting slowly varying components from quickly varying input signals, thereby learning temporally invariant features. Here, we use the information bottleneck method to state an information-theoretic objective function for temporally local predictive coding. We then show that the linear case of SFA can be interpreted as a variant of predictive coding that maximizes the mutual information between the current output of the system and the input signal in the next time step. This demonstrates that the slowness principle and predictive coding are intimately related.

  12. Development of Reactivity Calculation Code for HANARO

    Energy Technology Data Exchange (ETDEWEB)

    Park, B. G.; Kim, M. S. [KAERI, Daejeon (Korea, Republic of)

    2016-05-15

    Reactivity of the reactor core is measured by a multi-channel wide range reactivity computer (or called reactivity meter), which uses current signals from the compensated ion chamber (CIC) mounted on the courtside wall of the reflector tank in the pool [1]. Because there were a few difficulties in operating the reactivity meter in the MS-DOS environment, some researches have been carried out to improve and upgrade it on the Windows environment [2]. Nevertheless, it is still hard for reactor operators to immediately check the time-dependent reactivity in case of power excursion because of some limitations such as aging of devices and compatibility issues. In this study, a simple off-line tool which can estimate the timedependent reactivity by using the fission chamber signals has been developed, and utilized to the case of loose parts of dummy rod in the 86-2th cycles of HANARO. In order to check the reactivity quickly for reactor operators, the inverse kinetic quations have been incorporated, and several useful functions have been implemented to the code. in the case of 86-2th cycles of HANARO, the developed code showed good performance to estimate time dependent reactivity. In the future, the on line analysis modules will be implanted to the code with upgrade of the measrement equipment such as current meters and data acquisition devices. Additionally, reactivity will be estimated by using the reactivity meter in the MS-DOS enviroment, and the new Windows version, for the verification of the developed code.

  13. Orthogonal coding of object location.

    Science.gov (United States)

    Knutsen, Per Magne; Ahissar, Ehud

    2009-02-01

    It has been argued whether internal representations are encoded using a universal ('the neural code') or multiple codes. Here, we review a series of experiments that demonstrate that tactile encoding of object location via whisking employs an orthogonal, triple-code scheme. Rats, and other rodents, actively move the whiskers back and forth to localize and identify objects. Neural recordings from primary sensory afferents, along with behavioral observations, demonstrate that vertical coordinates of contacted objects are encoded by the identity of activated afferents, horizontal coordinates by the timing of activation and radial coordinates by the intensity of activation. Because these codes are mutually independent, the three-dimensional location of an object could, in principle, be encoded by individual afferents during single whisker-object contacts. One advantage of such a same-neuron-different-codes scheme over the traditionally assumed same-code-different-neurons scheme is a reduction of code ambiguity that, in turn, simplifies decoding circuits.

  14. New Codes for Spectral Amplitude Coding Optical CDMA Systems

    Directory of Open Access Journals (Sweden)

    Hassan Yousif Ahmed

    2011-03-01

    Full Text Available A new code structure with zero in-phase cross correlation for spectral amplitude coding optical code division multiple access (SAC-OCDMA system is proposed, and called zero vectors combinatorial (ZVC. This code is constructed in a simple algebraic way using Euclidean vectors and combinatorial theories based on the relationship between the number of users N and the weight W. One of the important properties of this code is that the maximum cross correlation (CC is always zero, which means that multi-user interference (MUI and phase induced intensity noise (PIIN are reduced. Bit error rate (BER performance is compared with previous reported codes. Therefore, theoretically, we demonstrate the performance of ZVC code with the related equations. In addition, the structure of the encoder/decoder based on fiber Bragg gratings (FBGs and the proposed system have been analyzed theoretically by taking into consideration the effects of some noises. The results characterizing BER with respect to the total number of active users show that ZVC code offers a significantly improved performance over previous reported codes by supporting large numbers of users at BER≥ 10-9. A comprehensive simulation study has been carried out using a commercial optical system simulator “VPI™”. Moreover, it was shown that the proposed code managed to reduce the hardware complexity and eventually the cost.

  15. Making your code citable with the Astrophysics Source Code Library

    Science.gov (United States)

    Allen, Alice; DuPrie, Kimberly; Schmidt, Judy; Berriman, G. Bruce; Hanisch, Robert J.; Mink, Jessica D.; Nemiroff, Robert J.; Shamir, Lior; Shortridge, Keith; Taylor, Mark B.; Teuben, Peter J.; Wallin, John F.

    2016-01-01

    The Astrophysics Source Code Library (ASCL, ascl.net) is a free online registry of codes used in astronomy research. With nearly 1,200 codes, it is the largest indexed resource for astronomy codes in existence. Established in 1999, it offers software authors a path to citation of their research codes even without publication of a paper describing the software, and offers scientists a way to find codes used in refereed publications, thus improving the transparency of the research. It also provides a method to quantify the impact of source codes in a fashion similar to the science metrics of journal articles. Citations using ASCL IDs are accepted by major astronomy journals and if formatted properly are tracked by ADS and other indexing services. The number of citations to ASCL entries increased sharply from 110 citations in January 2014 to 456 citations in September 2015. The percentage of code entries in ASCL that were cited at least once rose from 7.5% in January 2014 to 17.4% in September 2015. The ASCL's mid-2014 infrastructure upgrade added an easy entry submission form, more flexible browsing, search capabilities, and an RSS feeder for updates. A Changes/Additions form added this past fall lets authors submit links for papers that use their codes for addition to the ASCL entry even if those papers don't formally cite the codes, thus increasing the transparency of that research and capturing the value of their software to the community.

  16. Improving the efficiency of the genetic code by varying the codon length--the perfect genetic code.

    Science.gov (United States)

    Doig, A J

    1997-10-07

    The function of DNA is to specify protein sequences. The four-base "alphabet" used in nucleic acids is translated to the 20 base alphabet of proteins (plus a stop signal) via the genetic code. The code is neither overlapping nor punctuated, but has mRNA sequences read in successive triplet codons until reaching a stop codon. The true genetic code uses three bases for every amino acid. The efficiency of the genetic code can be significantly increased if the requirement for a fixed codon length is dropped so that the more common amino acids have shorter codon lengths and rare amino acids have longer codon lengths. More efficient codes can be derived using the Shannon-Fano and Huffman coding algorithms. The compression achieved using a Huffman code cannot be improved upon. I have used these algorithms to derive efficient codes for representing protein sequences using both two and four bases. The length of DNA required to specify the complete set of protein sequences could be significantly shorter if transcription used a variable codon length. The restriction to a fixed codon length of three bases means that it takes 42% more DNA than the minimum necessary, and the genetic code is 70% efficient. One can think of many reasons why this maximally efficient code has not evolved: there is very little redundancy so almost any mutation causes an amino acid change. Many mutations will be potentially lethal frame-shift mutations, if the mutation leads to a change in codon length. It would be more difficult for the machinery of transcription to cope with a variable codon length. Nevertheless, in the strict and narrow sense of coding for protein sequences using the minimum length of DNA possible, the Huffman code derived here is perfect.

  17. On Bounded Weight Codes

    CERN Document Server

    Bachoc, Christine; Cohen, Gerard; Sole, Patrick; Tchamkerten, Aslan

    2010-01-01

    The maximum size of a binary code is studied as a function of its length N, minimum distance D, and minimum codeword weight W. This function B(N,D,W) is first characterized in terms of its exponential growth rate in the limit as N tends to infinity for fixed d=D/N and w=W/N. The exponential growth rate of B(N,D,W) is shown to be equal to the exponential growth rate of A(N,D) for w <= 1/2, and equal to the exponential growth rate of A(N,D,W) for 1/2< w <= 1. Second, analytic and numerical upper bounds on B(N,D,W) are derived using the semidefinite programming (SDP) method. These bounds yield a non-asymptotic improvement of the second Johnson bound and are tight for certain values of the parameters.

  18. Homomorphic encryption from codes

    CERN Document Server

    Bogdanov, Andrej

    2011-01-01

    We propose a new homomorphic encryption scheme based on the hardness of decoding under independent random noise from certain affine families of codes. Unlike in previous lattice-based homomorphic encryption schemes, where the message is hidden in the noisy part of the ciphertext, our scheme carries the message in the affine part of the transformation and applies noise only to achieve security. Our scheme can tolerate noise of arbitrary magnitude, as long as the noise vector has sufficiently small hamming weight (and its entries are independent). Our design achieves "proto-homomorphic" properties in an elementary manner: message addition and multiplication are emulated by pointwise addition and multiplication of the ciphertext vectors. Moreover, the extremely simple nature of our decryption makes the scheme easily amenable to bootstrapping. However, some complications are caused by the inherent presence of noticeable encryption error. Our main technical contribution is the development of two new techniques for...

  19. Signaling aggression.

    Science.gov (United States)

    van Staaden, Moira J; Searcy, William A; Hanlon, Roger T

    2011-01-01

    From psychological and sociological standpoints, aggression is regarded as intentional behavior aimed at inflicting pain and manifested by hostility and attacking behaviors. In contrast, biologists define aggression as behavior associated with attack or escalation toward attack, omitting any stipulation about intentions and goals. Certain animal signals are strongly associated with escalation toward attack and have the same function as physical attack in intimidating opponents and winning contests, and ethologists therefore consider them an integral part of aggressive behavior. Aggressive signals have been molded by evolution to make them ever more effective in mediating interactions between the contestants. Early theoretical analyses of aggressive signaling suggested that signals could never be honest about fighting ability or aggressive intentions because weak individuals would exaggerate such signals whenever they were effective in influencing the behavior of opponents. More recent game theory models, however, demonstrate that given the right costs and constraints, aggressive signals are both reliable about strength and intentions and effective in influencing contest outcomes. Here, we review the role of signaling in lieu of physical violence, considering threat displays from an ethological perspective as an adaptive outcome of evolutionary selection pressures. Fighting prowess is conveyed by performance signals whose production is constrained by physical ability and thus limited to just some individuals, whereas aggressive intent is encoded in strategic signals that all signalers are able to produce. We illustrate recent advances in the study of aggressive signaling with case studies of charismatic taxa that employ a range of sensory modalities, viz. visual and chemical signaling in cephalopod behavior, and indicators of aggressive intent in the territorial calls of songbirds.

  20. The multipath and SNR Quality in civil code L2

    Science.gov (United States)

    Polezel, W. G.; Souza, E. M.; Monico, J. F.

    2007-12-01

    The new generation of GPS satellites, with the addition of the new L2C civil code, may provide to the users better positioning capabilities. The new code in the L2 may increase the signal robustness, improve resistance to interference, reduce tracking noise and consequently, improve accuracy and provide better positioning inside buildings and in wooded areas. The second civil frequency code will eliminate the need of using fragile semi- codeless tracking techniques currently used in connection with L2. The L2C has a different structure that allows civil and military share the same code. L2C owns two codes of different length: moderate code (CM) and long code (CL). The CM was chosen to have 10.230 chips repeated to every 20 millisecond. The CL was chosen to have 767250 chips with period of 1.5 second. The main reasons for these choices were due to excellent correlation properties. Furthermore, L2C enhances performance by having no data modulation on CL code, which improves, among others, the threshold tracking performance. Comparing the L2C acquisition with the C/A, the CM code is ten times longer than the C/A and the two components have half the total power. This is an important feature for many low-power applications. Although this signal has several advantages, some investigations about its performance are necessary, mainly about the provided accuracy under some effects, for example, multipath. Thus, this paper aims to analyze the L2C signal, as well as its quality using some parameters, such as Signal to Noise Ratio (SNR) and multipath level (MP). The experiment was realized at Sao Paulo State University UNESP in Presidente Prudente, Brazil. The data were collected by two receivers of different brands, both able to collect the L2C signal, and connected to the same antenna, thought the use of a splitter. The results showed that the MP and SNR values were better for the modernized satellites. Furthermore, the SNR values of the two receivers were similar while the

  1. LDGM Codes for Channel Coding and Joint Source-Channel Coding of Correlated Sources

    Directory of Open Access Journals (Sweden)

    Javier Garcia-Frias

    2005-05-01

    Full Text Available We propose a coding scheme based on the use of systematic linear codes with low-density generator matrix (LDGM codes for channel coding and joint source-channel coding of multiterminal correlated binary sources. In both cases, the structures of the LDGM encoder and decoder are shown, and a concatenated scheme aimed at reducing the error floor is proposed. Several decoding possibilities are investigated, compared, and evaluated. For different types of noisy channels and correlation models, the resulting performance is very close to the theoretical limits.

  2. Improved lossless intra coding for next generation video coding

    Science.gov (United States)

    Vanam, Rahul; He, Yuwen; Ye, Yan

    2016-09-01

    Recently, there have been efforts by the ITU-T VCEG and ISO/IEC MPEG to further improve the compression performance of the High Efficiency Video Coding (HEVC) standard for developing a potential next generation video coding standard. The exploratory codec software of this potential standard includes new coding tools for inter and intra coding. In this paper, we present a new intra prediction mode for lossless intra coding. Our new intra mode derives a prediction filter for each input pixel using its neighboring reconstructed pixels, and applies this filter to the nearest neighboring reconstructed pixels to generate a prediction pixel. The proposed intra mode is demonstrated to improve the performance of the exploratory software for lossless intra coding, yielding a maximum and average bitrate savings of 4.4% and 2.11%, respectively.

  3. Sequential adaptive compressed sampling via Huffman codes

    CERN Document Server

    Aldroubi, Akram; Zarringhalam, Kourosh

    2008-01-01

    There are two main approaches in compressed sensing: the geometric approach and the combinatorial approach. In this paper we introduce an information theoretic approach and use results from the theory of Huffman codes to construct a sequence of binary sampling vectors to determine a sparse signal. Unlike other approaches, our approach is adaptive in the sense that each sampling vector depends on the previous sample. The number of measurements we need for a k-sparse vector in n-dimensional space is no more than O(k log n) and the reconstruction is O(k).

  4. Selection of Code and Interleaver for Turbo Coding

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1998-01-01

    The selection of component codes for turbo coding has often been based on the performance at high SNR's. However, we will argue that the selection mainly should be based on the performance at low SNR's, i.e. the convergence properties. Further, we will present a way to construct interleavers...... that significantly improve the performance of the turbo coding scheme at high SNR's, i.e. lowers the error floor...

  5. Superimposed Code Theorectic Analysis of DNA Codes and DNA Computing

    Science.gov (United States)

    2010-03-01

    Bounds for DNA Codes Based on Fibonacci Ensembles of DNA Sequences ”, 2008 IEEE Proceedings of International Symposium on Information Theory, pp. 2292...5, June 2008, pp. 525-34. 32 28. A. Macula, et al., “Random Coding Bounds for DNA Codes Based on Fibonacci Ensembles of DNA Sequences ”, 2008...combinatorial method of bio-memory design and detection that encodes item or process information as numerical sequences represented in DNA. ComDMem is a

  6. Bit-Interleaved Coded Multiple Beamforming with Perfect Coding

    CERN Document Server

    Li, Boyu

    2010-01-01

    When the channel state information is known by the transmitter as well as the receiver, beamforming techniques that employ Singular Value Decomposition (SVD) are commonly used in Multiple-Input Multiple-Output (MIMO) systems. Without channel coding, when a single symbol is transmitted, these systems achieve the full diversity order. Whereas, this property is lost when multiple symbols are simultaneously transmitted. Full diversity can be restored when channel coding is added, as long as the code rate Rc and the number of employed subchannels S satisfy the condition RcS =< 1. Moreover, by adding a proper constellation precoder, full diversity can be achieved for both uncoded and coded SVD systems, e.g., Fully Precoded Multiple Beamforming (FPMB) and Bit-Interleaved Coded Multiple Beamforming with Full Precoding (BICMB-FP). Perfect Space-Time Block Code (PSTBC) is a full-rate full-diversity space-time code, which achieves maximum coding gain for MIMO systems. Previously, Perfect Coded Multiple Beamforming (P...

  7. Practices in Code Discoverability: Astrophysics Source Code Library

    CERN Document Server

    Allen, Alice; Nemiroff, Robert J; Shamir, Lior

    2012-01-01

    Here we describe the Astrophysics Source Code Library (ASCL), which takes an active approach to sharing astrophysical source code. ASCL's editor seeks out both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and adds entries for the found codes to the library. This approach ensures that source codes are added without requiring authors to actively submit them, resulting in a comprehensive listing that covers a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL now has over 340 codes in it and continues to grow. In 2011, the ASCL (http://ascl.net) has on average added 19 new codes per month. An advisory committee has been established to provide input and guide the development and expansion of the new site, and a marketing plan has been developed and is being executed. All ASCL source codes have been used to generate results published in or submitted to a refereed journal and are freely available ei...

  8. Method and apparatus for a single channel digital communications system. [synchronization of received PCM signal by digital correlation with reference signal

    Science.gov (United States)

    Couvillon, L. A., Jr.; Carl, C.; Goldstein, R. M.; Posner, E. C.; Green, R. R. (Inventor)

    1973-01-01

    A method and apparatus are described for synchronizing a received PCM communications signal without requiring a separate synchronizing channel. The technique provides digital correlation of the received signal with a reference signal, first with its unmodulated subcarrier and then with a bit sync code modulated subcarrier, where the code sequence length is equal in duration to each data bit.

  9. Elements of algebraic coding systems

    CERN Document Server

    Cardoso da Rocha, Jr, Valdemar

    2014-01-01

    Elements of Algebraic Coding Systems is an introductory textto algebraic coding theory. In the first chapter, you'll gain insideknowledge of coding fundamentals, which is essential for a deeperunderstanding of state-of-the-art coding systems.This book is a quick reference for those who are unfamiliar withthis topic, as well as for use with specific applications such as cryptographyand communication. Linear error-correcting block codesthrough elementary principles span eleven chapters of the text.Cyclic codes, some finite field algebra, Goppa codes, algebraic decodingalgorithms, and applications in public-key cryptography andsecret-key cryptography are discussed, including problems and solutionsat the end of each chapter. Three appendices cover the Gilbertbound and some related derivations, a derivation of the Mac-Williams' identities based on the probability of undetected error,and two important tools for algebraic decoding-namely, the finitefield Fourier transform and the Euclidean algorithm for polynomials.

  10. BILINEAR FORMS AND LINEAR CODES

    Institute of Scientific and Technical Information of China (English)

    高莹

    2004-01-01

    Abraham Lempel et al[1] made a connection between linear codes and systems of bilinear forms over finite fields. In this correspondence, a new simple proof of a theorem in [1] is presented; in addition, the encoding process and the decoding procedure of RS codes are simplified via circulant matrices. Finally, the results show that the correspondence between bilinear forms and linear codes is not unique.

  11. Error correcting coding for OTN

    DEFF Research Database (Denmark)

    Justesen, Jørn; Larsen, Knud J.; Pedersen, Lars A.

    2010-01-01

    Forward error correction codes for 100 Gb/s optical transmission are currently receiving much attention from transport network operators and technology providers. We discuss the performance of hard decision decoding using product type codes that cover a single OTN frame or a small number...... of such frames. In particular we argue that a three-error correcting BCH is the best choice for the component code in such systems....

  12. High performance scalable image coding

    Institute of Scientific and Technical Information of China (English)

    Gan Tao; He Yanmin; Zhu Weile

    2007-01-01

    A high performance scalable image coding algorithm is proposed. The salient features of this algorithm are the ways to form and locate the significant clusters. Thanks to the list structure, the new coding algorithm achieves fine fractional bit-plane coding with negligible additional complexity. Experiments show that it performs comparably or better than the state-of-the-art coders. Furthermore, the flexible codec supports both quality and resolution scalability, which is very attractive in many network applications.

  13. Code Speed Measuring for VC++

    Science.gov (United States)

    2015-10-01

    UNCLASSIFIED AD-E403 688 Technical Report ARWSE-TR-14025 CODE SPEED MEASURING FOR VC++ Tom Nealis...TYPE Final 3. DATES COVERED (From – To) 4. TITLE AND SUBTITLE CODE SPEED MEASURING FOR VC++ 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...ABSTRACT It’s often important to know how fast a snippet of code executes. This information allows the coder to make important decisions

  14. ACE spectrum of LDPC codes

    Directory of Open Access Journals (Sweden)

    Vukobratović Dejan

    2006-01-01

    Full Text Available Construction of short-length LDPC codes with good, both waterfall and error-floor, behavior is still an attractive research problem. Recently proposed construction algorithms in this field are based on remarkably simple ideas, but yet, their effectiveness can still be questioned. In this paper we investigate a novel measure of goodness of a given LDPC code namely its ACE spectrum, based on a previously introduced ACE metrics associated with each cycle in LDPC code graph.

  15. QR code for medical information uses.

    Science.gov (United States)

    Fontelo, Paul; Liu, Fang; Ducut, Erick G

    2008-11-06

    We developed QR code online tools, simulated and tested QR code applications for medical information uses including scanning QR code labels, URLs and authentication. Our results show possible applications for QR code in medicine.

  16. Prospective Coding by Spiking Neurons.

    Directory of Open Access Journals (Sweden)

    Johanni Brea

    2016-06-01

    Full Text Available Animals learn to make predictions, such as associating the sound of a bell with upcoming feeding or predicting a movement that a motor command is eliciting. How predictions are realized on the neuronal level and what plasticity rule underlies their learning is not well understood. Here we propose a biologically plausible synaptic plasticity rule to learn predictions on a single neuron level on a timescale of seconds. The learning rule allows a spiking two-compartment neuron to match its current firing rate to its own expected future discounted firing rate. For instance, if an originally neutral event is repeatedly followed by an event that elevates the firing rate of a neuron, the originally neutral event will eventually also elevate the neuron's firing rate. The plasticity rule is a form of spike timing dependent plasticity in which a presynaptic spike followed by a postsynaptic spike leads to potentiation. Even if the plasticity window has a width of 20 milliseconds, associations on the time scale of seconds can be learned. We illustrate prospective coding with three examples: learning to predict a time varying input, learning to predict the next stimulus in a delayed paired-associate task and learning with a recurrent network to reproduce a temporally compressed version of a sequence. We discuss the potential role of the learning mechanism in classical trace conditioning. In the special case that the signal to be predicted encodes reward, the neuron learns to predict the discounted future reward and learning is closely related to the temporal difference learning algorithm TD(λ.

  17. Astrophysics Source Code Library Enhancements

    CERN Document Server

    Hanisch, Robert J; Berriman, G Bruce; DuPrie, Kimberly; Mink, Jessica; Nemiroff, Robert J; Schmidt, Judy; Shamir, Lior; Shortridge, Keith; Taylor, Mark; Teuben, Peter J; Wallin, John

    2014-01-01

    The Astrophysics Source Code Library (ASCL; ascl.net) is a free online registry of codes used in astronomy research; it currently contains over 900 codes and is indexed by ADS. The ASCL has recently moved a new infrastructure into production. The new site provides a true database for the code entries and integrates the WordPress news and information pages and the discussion forum into one site. Previous capabilities are retained and permalinks to ascl.net continue to work. This improvement offers more functionality and flexibility than the previous site, is easier to maintain, and offers new possibilities for collaboration. This presentation covers these recent changes to the ASCL.

  18. Multiple Beamforming with Perfect Coding

    CERN Document Server

    Li, Boyu

    2011-01-01

    In Singular Value Decomposition (SVD) beamforming, without channel coding, there is a trade-off between full diversity and full multiplexing. Adding channel coding, full diversity and full multiplexing can be both achieved, as long as the code rate Rc and the number of subchannels S satisfy RcS1. Recently discovered Perfect Space-Time Block Codes (PSTBCs) are full-rate full-diversity space-time codes, achieving maximum coding gain. In this paper, two novel techniques, Perfect Coded Multiple Beamforming (PCMB) and Bit-Interleaved Coded Multiple Beamforming with Perfect Coding (BICMB-PC), are proposed, employing PSTBCs. PCMB achieves full diversity, full multiplexing, and full rate simultaneously, and its performance is close to PSTBC and FPMB, while the decoding complexity is significantly less than PSTBC and much lower than FPMB of dimensions 2 and 4. On the other hand, BICMB-PC achieves both full diversity and full multiplexing, and its performance is similar to BICMB-FP, but provides much lower decoding com...

  19. Automatic code generation in practice

    DEFF Research Database (Denmark)

    Adam, Marian Sorin; Kuhrmann, Marco; Schultz, Ulrik Pagh

    2016-01-01

    -specific language to specify those requirements and to allow for generating a safety-enforcing layer of code, which is deployed to the robot. The paper at hand reports experiences in practically applying code generation to mobile robots. For two cases, we discuss how we addressed challenges, e.g., regarding weaving...... code generation into proprietary development environments and testing of manually written code. We find that a DSL based on the same conceptual model can be used across different kinds of hardware modules, but a significant adaptation effort is required in practical scenarios involving different kinds...

  20. Should you learn to code?

    CERN Document Server

    Team, The Hyperink

    2013-01-01

    On May 15, 2012 Jeff Atwood (co-founder of Stack Overflow) published a blog post titled "Please Don't Learn to Code" in response to Mayor Mike Bloomberg's resolution to learn how to code in 2012. In that post he argues against "learning to code just for the sake of learning how to code," a sentiment that sparked an active online debate. This book is a compilation of several different perspectives on that debate. Should programming be taught to every student as part of their core curriculum, similar to mathematics, reading, and writing? Should every working professional take time to learn a

  1. Grassmann codes and Schubert unions

    DEFF Research Database (Denmark)

    Hansen, Johan Peder; Johnsen, Trygve; Ranestad, Kristian

    2009-01-01

    We study subsets of Grassmann varieties over a field , such that these subsets are unions of Schubert cycles, with respect to a fixed flag. We study such sets in detail, and give applications to coding theory, in particular for Grassmann codes. For much is known about such Schubert unions...... with a maximal number of -rational points for a given spanning dimension. We study the case and give a conjecture for general . We also define Schubert union codes in general, and study the parameters and support weights of these codes....

  2. Semi-supervised sparse coding

    KAUST Repository

    Wang, Jim Jing-Yan

    2014-07-06

    Sparse coding approximates the data sample as a sparse linear combination of some basic codewords and uses the sparse codes as new presentations. In this paper, we investigate learning discriminative sparse codes by sparse coding in a semi-supervised manner, where only a few training samples are labeled. By using the manifold structure spanned by the data set of both labeled and unlabeled samples and the constraints provided by the labels of the labeled samples, we learn the variable class labels for all the samples. Furthermore, to improve the discriminative ability of the learned sparse codes, we assume that the class labels could be predicted from the sparse codes directly using a linear classifier. By solving the codebook, sparse codes, class labels and classifier parameters simultaneously in a unified objective function, we develop a semi-supervised sparse coding algorithm. Experiments on two real-world pattern recognition problems demonstrate the advantage of the proposed methods over supervised sparse coding methods on partially labeled data sets.

  3. Applying Physical-Layer Network Coding in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Liew SoungChang

    2010-01-01

    Full Text Available A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes, simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11. This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC scheme to coordinate transmissions among nodes. In contrast to "straightforward" network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput increases compared with traditional transmission and straightforward network coding, respectively, in 1D regular linear networks with multiple random flows. The throughput improvements are even larger in 2D regular networks: 200% and 100%, respectively.

  4. Coding, cryptography and combinatorics

    CERN Document Server

    Niederreiter, Harald; Xing, Chaoping

    2004-01-01

    It has long been recognized that there are fascinating connections between cod­ ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi­ natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the p...

  5. Polymatroids with Network Coding

    CERN Document Server

    Han, Te Sun

    2010-01-01

    The problem of network coding for multicasting a single source to multiple sinks has first been studied by Ahlswede, Cai, Li and Yeung in 2000, in which they have established the celebrated max-flow mini-cut theorem on non-physical information flow over a network of independent channels. On the other hand, in 1980, Han has studied the case with correlated multiple sources and a single sink from the viewpoint of polymatroidal functions in which a necessary and sufficient condition has been demonstrated for reliable transmission over the network. This paper presents an attempt to unify both cases, which leads to establish a necessary and sufficient condition for reliable transmission over a noisy network for multicasting all the correlated multiple sources to all the multiple sinks. Furthermore, we address also the problem of transmitting "independent" sources over a multiple-access-type of network as well as over a broadcast-type of network, which reveals that the (co-) polymatroidal structures are intrinsical...

  6. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup

    2017-04-11

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaickingand 4D light field view synthesis.

  7. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  8. The KIDTALK Behavior and Language Code: Manual and Coding Protocol.

    Science.gov (United States)

    Delaney, Elizabeth M.; Ezell, Sara S.; Solomon, Ned A.; Hancock, Terry B.; Kaiser, Ann P.

    Developed as part of the Milieu Language Teaching Project at the John F. Kennedy Center at Vanderbilt University in Nashville, Tennessee, this KIDTALK Behavior-Language Coding Protocol and manual measures behavior occurring during adult-child interactions. The manual is divided into 5 distinct sections: (1) the adult behavior codes describe…

  9. Digital Signal Processor For GPS Receivers

    Science.gov (United States)

    Thomas, J. B.; Meehan, T. K.; Srinivasan, J. M.

    1989-01-01

    Three innovative components combined to produce all-digital signal processor with superior characteristics: outstanding accuracy, high-dynamics tracking, versatile integration times, lower loss-of-lock signal strengths, and infrequent cycle slips. Three components are digital chip advancer, digital carrier downconverter and code correlator, and digital tracking processor. All-digital signal processor intended for use in receivers of Global Positioning System (GPS) for geodesy, geodynamics, high-dynamics tracking, and ionospheric calibration.

  10. Clinical evaluation of coded excitation in medical ultrasound

    DEFF Research Database (Denmark)

    Pedersen, Morten Høgholm; Misaridis, Thanssis; Jensen, Jørgen Arendt

    2003-01-01

    Despite the enormous development in medical ultrasound (US) imaging over the last decades, penetration depth with satisfying image quality is often a problem in clinical practice. Coded excitation, used for years in radar techniques to increase signal-to-noise ratio (SNR), has recently been...

  11. Energy efficient error-correcting coding for wireless systems

    NARCIS (Netherlands)

    Shao, Xiaoying

    2010-01-01

    The wireless channel is a hostile environment. The transmitted signal does not only suffers multi-path fading but also noise and interference from other users of the wireless channel. That causes unreliable communications. To achieve high-quality communications, error correcting coding is required t

  12. Physical-layer network coding in coherent optical OFDM systems.

    Science.gov (United States)

    Guan, Xun; Chan, Chun-Kit

    2015-04-20

    We present the first experimental demonstration and characterization of the application of optical physical-layer network coding in coherent optical OFDM systems. It combines two optical OFDM frames to share the same link so as to enhance system throughput, while individual OFDM frames can be recovered with digital signal processing at the destined node.

  13. On Predictive Coding for Erasure Channels Using a Kalman Framework

    DEFF Research Database (Denmark)

    Arildsen, Thomas; Murthi, Manohar; Andersen, Søren Vang

    2009-01-01

    We present a new design method for robust low-delay coding of autoregressive sources for transmission across erasure channels. It is a fundamental rethinking of existing concepts. It considers the encoder a mechanism that produces signal measurements from which the decoder estimates the original...

  14. On Predictive Coding for Erasure Channels Using a Kalman Framework

    DEFF Research Database (Denmark)

    Arildsen, Thomas; Murthi, Manohar; Andersen, Søren Vang

    2009-01-01

    We present a new design method for robust low-delay coding of autoregressive sources for transmission across erasure channels. It is a fundamental rethinking of existing concepts. It considers the encoder a mechanism that produces signal measurements from which the decoder estimates the original...

  15. The degeneracy of the genetic code and Hadamard matrices

    CERN Document Server

    Petoukhov, Sergey V

    2008-01-01

    The matrix form of the presentation of the genetic code is described as the cognitive form to analyze structures of the genetic code. A similar matrix form is utilized in the theory of signal processing. The Kronecker family of the genetic matrices is investigated, which is based on the genetic matrix [C A; U G], where C, A, U, G are the letters of the genetic alphabet. This matrix in the third Kronecker power is the (8*8)-matrix, which contains 64 triplets. Peculiarities of the degeneracy of the vertebrate mitochondria genetic code are reflected in the symmetrical black-and-white mosaic of this genetic (8*8)-matrix. This mosaic matrix is connected algorithmically with Hadamard matrices unexpectedly, which are famous in the theory of signal processing, quantum mechanics and quantum computers.

  16. Bit-interleaved coded modulation in the wideband regime

    CERN Document Server

    Martinez, Alfonso; Caire, Giuseppe; Willems, Frans

    2007-01-01

    The wideband regime of bit-interleaved coded modulation (BICM) in Gaussian channels is studied. The Taylor expansion of the coded modulation capacity for generic signal constellations at low signal-to-noise ratio (SNR) is derived and used to determine the corresponding expansion for the BICM capacity. Simple formulas for the minimum energy per bit and the wideband slope are given. BICM is found to be suboptimal in the sense that its minimum energy per bit can be larger than the corresponding value for coded modulation schemes. The minimum energy per bit using standard Gray mapping on M-PAM or M^2-QAM is given by a simple formula and shown to approach -0.34 dB as M increases. Using the low SNR expansion, a general trade-off between power and bandwidth in the wideband regime is used to show how a power loss can be traded off against a bandwidth gain.

  17. Capacity-Approaching Superposition Coding for Optical Fiber Links

    DEFF Research Database (Denmark)

    Estaran Tolosa, Jose Manuel; Zibar, Darko; Tafur Monroy, Idelfonso

    2014-01-01

    We report on the first experimental demonstration of superposition coded modulation (SCM) for polarization-multiplexed coherent-detection optical fiber links. The proposed coded modulation scheme is combined with phase-shifted bit-to-symbol mapping (PSM) in order to achieve geometric and passive...... shaping of the signal's waveform. The output constellations in SCM-PSM exhibit nonbijective quasi-Gaussian statistical distributions that asymptotically reach the Shannon capacity limit, showing up to 0.7 dB sensitivity improvement for 256-ary SCM-PSM with respect to 256-ary quadrature amplitude...... modulation (QAM). The characteristic wave formation based on superposition of antipodal symbols and the lack of need for additional encoders for signal shaping, greatly reduces the transmitter and receiver processing complexity in comparison to conventional alternatives. Single-level coding strategy (SL-SCM...

  18. Coding Strategies and Implementations of Compressive Sensing

    Science.gov (United States)

    Tsai, Tsung-Han

    This dissertation studies the coding strategies of computational imaging to overcome the limitation of conventional sensing techniques. The information capacity of conventional sensing is limited by the physical properties of optics, such as aperture size, detector pixels, quantum efficiency, and sampling rate. These parameters determine the spatial, depth, spectral, temporal, and polarization sensitivity of each imager. To increase sensitivity in any dimension can significantly compromise the others. This research implements various coding strategies subject to optical multidimensional imaging and acoustic sensing in order to extend their sensing abilities. The proposed coding strategies combine hardware modification and signal processing to exploiting bandwidth and sensitivity from conventional sensors. We discuss the hardware architecture, compression strategies, sensing process modeling, and reconstruction algorithm of each sensing system. Optical multidimensional imaging measures three or more dimensional information of the optical signal. Traditional multidimensional imagers acquire extra dimensional information at the cost of degrading temporal or spatial resolution. Compressive multidimensional imaging multiplexes the transverse spatial, spectral, temporal, and polarization information on a two-dimensional (2D) detector. The corresponding spectral, temporal and polarization coding strategies adapt optics, electronic devices, and designed modulation techniques for multiplex measurement. This computational imaging technique provides multispectral, temporal super-resolution, and polarization imaging abilities with minimal loss in spatial resolution and noise level while maintaining or gaining higher temporal resolution. The experimental results prove that the appropriate coding strategies may improve hundreds times more sensing capacity. Human auditory system has the astonishing ability in localizing, tracking, and filtering the selected sound sources or

  19. Allele coding in genomic evaluation

    Directory of Open Access Journals (Sweden)

    Christensen Ole F

    2011-06-01

    Full Text Available Abstract Background Genomic data are used in animal breeding to assist genetic evaluation. Several models to estimate genomic breeding values have been studied. In general, two approaches have been used. One approach estimates the marker effects first and then, genomic breeding values are obtained by summing marker effects. In the second approach, genomic breeding values are estimated directly using an equivalent model with a genomic relationship matrix. Allele coding is the method chosen to assign values to the regression coefficients in the statistical model. A common allele coding is zero for the homozygous genotype of the first allele, one for the heterozygote, and two for the homozygous genotype for the other allele. Another common allele coding changes these regression coefficients by subtracting a value from each marker such that the mean of regression coefficients is zero within each marker. We call this centered allele coding. This study considered effects of different allele coding methods on inference. Both marker-based and equivalent models were considered, and restricted maximum likelihood and Bayesian methods were used in inference. Results Theoretical derivations showed that parameter estimates and estimated marker effects in marker-based models are the same irrespective of the allele coding, provided that the model has a fixed general mean. For the equivalent models, the same results hold, even though different allele coding methods lead to different genomic relationship matrices. Calculated genomic breeding values are independent of allele coding when the estimate of the general mean is included into the values. Reliabilities of estimated genomic breeding values calculated using elements of the inverse of the coefficient matrix depend on the allele coding because different allele coding methods imply different models. Finally, allele coding affects the mixing of Markov chain Monte Carlo algorithms, with the centered coding being

  20. Civil Code, 11 December 1987.

    Science.gov (United States)

    1988-01-01

    Article 162 of this Mexican Code provides, among other things, that "Every person has the right freely, responsibly, and in an informed fashion to determine the number and spacing of his or her children." When a marriage is involved, this right is to be observed by the spouses "in agreement with each other." The civil codes of the following states contain the same provisions: 1) Baja California (Art. 159 of the Civil Code of 28 April 1972 as revised in Decree No. 167 of 31 January 1974); 2) Morelos (Art. 255 of the Civil Code of 26 September 1949 as revised in Decree No. 135 of 29 December 1981); 3) Queretaro (Art. 162 of the Civil Code of 29 December 1950 as revised in the Act of 9 January 1981); 4) San Luis Potosi (Art. 147 of the Civil Code of 24 March 1946 as revised in 13 June 1978); Sinaloa (Art. 162 of the Civil Code of 18 June 1940 as revised in Decree No. 28 of 14 October 1975); 5) Tamaulipas (Art. 146 of the Civil Code of 21 November 1960 as revised in Decree No. 20 of 30 April 1975); 6) Veracruz-Llave (Art. 98 of the Civil Code of 1 September 1932 as revised in the Act of 30 December 1975); and 7) Zacatecas (Art. 253 of the Civil Code of 9 February 1965 as revised in Decree No. 104 of 13 August 1975). The Civil Codes of Puebla and Tlaxcala provide for this right only in the context of marriage with the spouses in agreement. See Art. 317 of the Civil Code of Puebla of 15 April 1985 and Article 52 of the Civil Code of Tlaxcala of 31 August 1976 as revised in Decree No. 23 of 2 April 1984. The Family Code of Hidalgo requires as a formality of marriage a certification that the spouses are aware of methods of controlling fertility, responsible parenthood, and family planning. In addition, Article 22 the Civil Code of the Federal District provides that the legal capacity of natural persons is acquired at birth and lost at death; however, from the moment of conception the individual comes under the protection of the law, which is valid with respect to the