WorldWideScience

Sample records for variable bit width

  1. A fast integrated discriminator with continuously variable width

    International Nuclear Information System (INIS)

    Borghesi, A.; Goggi, G.; Nardo, R.

    1976-01-01

    A simple dc-coupled discriminator with fast switching characteristics has been realized. Both input threshold and output width are continuously variable; the ECL design allows high speed and high density with ample fanout. (Auth.)

  2. Bit rate and pulse width dependence of four-wave mixing of short optical pulses in semiconductor optical amplifiers

    DEFF Research Database (Denmark)

    Diez, S.; Mecozzi, A.; Mørk, Jesper

    1999-01-01

    We investigate the saturation properties of four-wave mixing of short optical pulses in a semiconductor optical amplifier. By varying the gain of the optical amplifier, we find a strong dependence of both conversion efficiency and signal-to-background ratio on pulse width and bit rate....... In particular, the signal-to-background ratio can be optimized for a specific amplifier gain. This behavior, which is coherently described in experiment and theory, is attributed to the dynamics of the amplified spontaneous emission, which is the main source of noise in a semiconductor optical amplifier....

  3. A Temperature-Hardened Sensor Interface with a 12-Bit Digital Output Using a Novel Pulse Width Modulation Technique

    Directory of Open Access Journals (Sweden)

    Emna Chabchoub

    2018-04-01

    Full Text Available A fully integrated sensor interface for a wide operational temperature range is presented. It translates the sensor signal into a pulse width modulated (PWM signal that is then converted into a 12-bit digital output. The sensor interface is based on a pair of injection locked oscillators used to implement a differential time-domain architecture with low sensitivity to temperature variations. A prototype has been fabricated using a 180 nm partially depleted silicon-on-insulator (SOI technology. Experimental results demonstrate a thermal stability as low as 65 ppm/°C over a large temperature range from −20 °C up to 220 °C.

  4. Variable Width Riparian Model Enhances Landscape and Watershed Condition

    Science.gov (United States)

    Abood, S. A.; Spencer, L.

    2017-12-01

    Riparian areas are ecotones that represent about 1% of USFS administered landscape and contribute to numerous valuable ecosystem functions such as wildlife habitat, stream water quality and flows, bank stability and protection against erosion, and values related to diversity, aesthetics and recreation. Riparian zones capture the transitional area between terrestrial and aquatic ecosystems with specific vegetation and soil characteristics which provide critical values/functions and are very responsive to changes in land management activities and uses. Two staff areas at the US Forest Service have coordinated on a two phase project to support the National Forests in their planning revision efforts and to address rangeland riparian business needs at the Forest Plan and Allotment Management Plan levels. The first part of the project will include a national fine scale (USGS HUC-12 digits watersheds) inventory of riparian areas on National Forest Service lands in western United States with riparian land cover, utilizing GIS capabilities and open source geospatial data. The second part of the project will include the application of riparian land cover change and assessment based on selected indicators to assess and monitor riparian areas on annual/5-year cycle basis.This approach recognizes the dynamic and transitional nature of riparian areas by accounting for hydrologic, geomorphic and vegetation data as inputs into the delineation process. The results suggest that incorporating functional variable width riparian mapping within watershed management planning can improve riparian protection and restoration. The application of Riparian Buffer Delineation Model (RBDM) approach can provide the agency Watershed Condition Framework (WCF) with observed riparian area condition on an annual basis and on multiple scales. The use of this model to map moderate to low gradient systems of sufficient width in conjunction with an understanding of the influence of distinctive landscape

  5. Inter-track interference mitigation with two-dimensional variable equalizer for bit patterned media recording

    Directory of Open Access Journals (Sweden)

    Yao Wang

    2017-05-01

    Full Text Available The increased track density in bit patterned media recording (BPMR causes increased inter-track interference (ITI, which degrades the bit error rate (BER performance. In order to mitigate the effect of the ITI, signals from multiple tracks can be equalized by a 2D equalizer with 1D target. Usually, the 2D fixed equalizer coefficients are obtained by using a pseudo-random bit sequence (PRBS for training. In this study, a 2D variable equalizer is proposed, where various sets of 2D equalizer coefficients are predetermined and stored for different ITI patterns besides the usual PRBS training. For data detection, as the ITI patterns are unknown in the first global iteration, the main and adjacent tracks are equalized with the conventional 2D fixed equalizer, detected with Bahl-Cocke-Jelinek-Raviv (BCJR detector and decoded with low-density parity-check (LDPC decoder. Then using the estimated bit information from main and adjacent tracks, the ITI pattern for each island of the main track can be estimated and the corresponding 2D variable equalizers are used to better equalize the bits on the main track. This process is executed iteratively by feeding back the main track information. Simulation results indicate that for both single-track and two-track detection, the proposed 2D variable equalizer can achieve better BER and frame error rate (FER compared to that with the 2D fixed equalizer.

  6. Detection of extremely high bit density signals with a narrow track width GMR head in double layered perpendicular recording media

    International Nuclear Information System (INIS)

    Kiya, T.; Honda, N.; Ariake, J.; Ouchi, K.; Iwasaki, S.

    2001-01-01

    Recording resolution, medium noise and thermal stability have been investigated for double layered perpendicular magnetic recording media. The recording performance was improved by introducing a stacked intermediate layer between a soft magnetic backlayer and a storage layer due to increased crystal orientation with a small magnetic domain size and suppressed initial growing layer of the storage layer. The reproduced output at an extremely high linear density of 950 kFRPI was detected by using a contact-type CF-SPT head for write and a GMR head with a narrow read track width of 0.4 μm

  7. Prototyping of automotive components with variable width and depth

    Science.gov (United States)

    Abeyrathna, B.; Rolfe, B.; Harrasser, J.; Sedlmaier, A.; Ge, Rui; Pan, L.; Weiss, M.

    2017-09-01

    Roll forming enables the manufacturing of longitudinal components from materials that combine high strength with limited formability and is increasingly used in the automotive industry for the manufacture of structural and crash components. An extension of conventional roll forming is the Flexible Roll Forming (FRF) process where the rolls are no longer fixed in space but are free to move which enables the forming of components with variable cross section over the length of the part. Even though FRF components have high weight saving potential the technology has found only limited application in the automotive industry. A new flexible forming facility has recently been developed that enables proof of concept studies and the production of FRF prototypes before a full FRF line is built; this may lead to a wider uptake of the FRF technology in the automotive industry. In this process, the pre-cut blank is placed between two clamps and the whole set up moves back and forth; a forming roll that is mounted on a servo-controlled platform with six degrees of freedom forms the pre-cut blank to the desired shape. In this study an initial forming concept for the flexible roll forming of an automotive component with variable height is developed using COPRA® FEA RF. This is followed by performing experimental prototyping studies on the new concept forming facility. Using the optical strain measurement system Autogrid Compact, material deformation, part shape and wrinkling severity are analysed for some forming passes and compared with the numerical results. The results show that the numerical model gives a good representation of material behaviour and that with increasing forming severity wrinkling issues need to be overcome in the process.

  8. Attention demanding tasks during treadmill walking reduce step width variability in young adults

    Directory of Open Access Journals (Sweden)

    Troy Karen L

    2005-08-01

    Full Text Available Abstract Background The variability of step time and step width is associated with falls by older adults. Further, step time is significantly influenced when performing attention demanding tasks while walking. Without exception, step time variability has been reported to increase in normal and pathologically aging older adults. Because of the role of step width in managing frontal plane dynamic stability, documenting the influence of attention-demanding tasks on step width variability may provide insight to events that can disturb dynamic stability during locomotion and increase fall risk. Preliminary evidence suggests performance of an attention demanding task significantly decreases step width variability of young adults walking on a treadmill. The purpose of the present study was to confirm or refute this finding by characterizing the extent and direction of the effects of a widely used attention demanding task (Stroop test on the step width variability of young adults walking on a motorized treadmill. Methods Fifteen healthy young adults walked on a motorized treadmill at a self-selected velocity for 10 minutes under two conditions; without performing an attention demanding task and while performing the Stroop test. Step width of continuous and consecutive steps during the collection was derived from the data recorded using a motion capture system. Step width variability was computed as the standard deviation of all recorded steps. Results Step width decreased four percent during performance of the Stroop test but the effect was not significant (p = 0.10. In contrast, the 16 percent decrease in step width variability during the Stroop test condition was significant (p = 0.029. Conclusion The results support those of our previous work in which a different attention demanding task also decreased step width variability of young subjects while walking on a treadmill. The decreased step width variability observed while performing an attention

  9. Solar harvesting by a heterostructured cell with built-in variable width quantum wells

    Science.gov (United States)

    Brooks, W.; Wang, H.; Mil'shtein, S.

    2018-02-01

    We propose cascaded heterostructured p-i-n solar cells, where inside of the i-region is a set of Quantum Wells (QWs) with variable thicknesses to enhance absorption of different photonic energies and provide quick relaxation for high energy carriers. Our p-i-n heterostructure carries top p-type and bottom n-type 11.3 Å thick AlAs layers, which are doped by acceptors and donor densities up to 1019/cm3. The intrinsic region is divided into 10 segments where each segment carries ten QWs of the same width and the width of the QWs in each subsequent segment gradually increases. The top segment consists of 10 QWs with widths of 56.5Å, followed by a segment with 10 wider QWs with widths of 84.75Å, followed by increasing QW widths until the last segment has 10 QWs with widths of 565Å, bringing the total number of QWs to 100. The QW wall height is controlled by alternating AlAs and GaAs layers, where the AlAs layers are all 11.3Å thick, throughout the entire intrinsic region. Configuration of variable width QWs prescribes sets of energy levels which are suitable for absorption of a wide range of photon energies and will dissipate high electron-hole energies rapidly, reducing the heat load on the solar cell. We expect that the heating of the solar cell will be reduced by 8-11%, enhancing efficiency. The efficiency of the designed solar cell is 43.71%, the Fill Factor is 0.86, the density of short circuit current (ISC) will not exceed 338 A/m2 and the open circuit voltage (VOC) is 1.51V.

  10. A 12-bit spectroscopy analog-to-digital converter type SAA (Successive Approximation type with channel width Averaging) intended for multichannel pulse height analyzer SWAN-1 based on IBM PC/XT/AT

    International Nuclear Information System (INIS)

    Borsuk, S.; Kulka, Z.

    1989-12-01

    A 12-bit spectroscopy analog-to-digital converter (ADC) type SAA (Successive Approximation type with channel width Averaging) intended for multichannel pulse height analyzer SWAN-1 based on IBM PC/XT/AT has been described. Design principles, specifications and measurements of a fundamental SAA-2 converter version are reported. Finally, two next versions of the converter with introduced modifications are discussed. 6 refs., 7 figs. (author)

  11. Design of a variable width pulse generator feasible for manual or automatic control

    Energy Technology Data Exchange (ETDEWEB)

    Vegas, I., E-mail: ignacio.vegas@pas.ucm.es; Antoranz, P.; Miranda, J.M.; Franco, F.J.

    2017-01-01

    A variable width pulse generator featuring more than 4-V peak amplitude and less than 10-ns FWHM is described. In this design the width of the pulses is controlled by means of the control signal slope. Thus, a variable transition time control circuit (TTCC) is also developed, based on the charge and discharge of a capacitor by means of two tunable current sources. Additionally, it is possible to activate/deactivate the pulses when required, therefore allowing the creation of any desired pulse pattern. Furthermore, the implementation presented here can be electronically controlled. In conclusion, due to its versatility, compactness and low cost it can be used in a wide variety of applications.

  12. Impact of Coastal Development and Marsh Width Variability on Groundwater Quality in Estuarine Tidal Creeks

    Science.gov (United States)

    Shanahan, M.; Wilson, A. M.; Smith, E. M.

    2017-12-01

    Coastal upland development has been shown to negatively impact surface water quality in tidal creeks in the southeastern US, but less is known about its impact on groundwater. We sampled groundwater in the upland and along the marsh perimeter of tidal creeks located within developed and undeveloped watersheds. Samples were analyzed for salinity, dissolved organic carbon, nitrogen and phosphorus concentrations. Groundwater samples collected from the upland in developed and undeveloped watersheds were compared to study the impact of development on groundwater entering the marsh. Groundwater samples collected along the marsh perimeter were analyzed to study the impact of marsh width variability on groundwater quality within each creek. Preliminary results suggest a positive correlation between salinity and marsh width in undeveloped watersheds, and a higher concentration of nutrients in developed versus undeveloped watersheds.

  13. Potential fitting biases resulting from grouping data into variable width bins

    International Nuclear Information System (INIS)

    Towers, S.

    2014-01-01

    When reading peer-reviewed scientific literature describing any analysis of empirical data, it is natural and correct to proceed with the underlying assumption that experiments have made good faith efforts to ensure that their analyses yield unbiased results. However, particle physics experiments are expensive and time consuming to carry out, thus if an analysis has inherent bias (even if unintentional), much money and effort can be wasted trying to replicate or understand the results, particularly if the analysis is fundamental to our understanding of the universe. In this note we discuss the significant biases that can result from data binning schemes. As we will show, if data are binned such that they provide the best comparison to a particular (but incorrect) model, the resulting model parameter estimates when fitting to the binned data can be significantly biased, leading us to too often accept the model hypothesis when it is not in fact true. When using binned likelihood or least squares methods there is of course no a priori requirement that data bin sizes need to be constant, but we show that fitting to data grouped into variable width bins is particularly prone to produce biased results if the bin boundaries are chosen to optimize the comparison of the binned data to a wrong model. The degree of bias that can be achieved simply with variable binning can be surprisingly large. Fitting the data with an unbinned likelihood method, when possible to do so, is the best way for researchers to show that their analyses are not biased by binning effects. Failing that, equal bin widths should be employed as a cross-check of the fitting analysis whenever possible

  14. Potential fitting biases resulting from grouping data into variable width bins

    Energy Technology Data Exchange (ETDEWEB)

    Towers, S., E-mail: smtowers@asu.edu

    2014-07-30

    When reading peer-reviewed scientific literature describing any analysis of empirical data, it is natural and correct to proceed with the underlying assumption that experiments have made good faith efforts to ensure that their analyses yield unbiased results. However, particle physics experiments are expensive and time consuming to carry out, thus if an analysis has inherent bias (even if unintentional), much money and effort can be wasted trying to replicate or understand the results, particularly if the analysis is fundamental to our understanding of the universe. In this note we discuss the significant biases that can result from data binning schemes. As we will show, if data are binned such that they provide the best comparison to a particular (but incorrect) model, the resulting model parameter estimates when fitting to the binned data can be significantly biased, leading us to too often accept the model hypothesis when it is not in fact true. When using binned likelihood or least squares methods there is of course no a priori requirement that data bin sizes need to be constant, but we show that fitting to data grouped into variable width bins is particularly prone to produce biased results if the bin boundaries are chosen to optimize the comparison of the binned data to a wrong model. The degree of bias that can be achieved simply with variable binning can be surprisingly large. Fitting the data with an unbinned likelihood method, when possible to do so, is the best way for researchers to show that their analyses are not biased by binning effects. Failing that, equal bin widths should be employed as a cross-check of the fitting analysis whenever possible.

  15. FODA/IBEA satellite access scheme for MIXED traffic at variable bit and coding rates system description

    OpenAIRE

    Celandroni, Nedo; Ferro, Erina; Mihal, Vlado; Potort?, Francesco

    1992-01-01

    This report describes the FODA system working at variable coding and bit rates (FODA/IBEA-TDMA) FODA/IBEA is the natural evolution of the FODA-TDMA satellite access scheme working at 2 Mbit/s fixed rate with data 1/2 coded or uncoded. FODA-TDMA was used in the European SATINE-II experiment [8]. We remind here that the term FODA/IBEA system is comprehensive of the FODA/IBEA-TDMA (1) satellite access scheme and of the hardware prototype realised by the Marconi R.C. (U.K.). Both of them come fro...

  16. Development of variable width ribbon heating elements for liquid metal and gas-cooled fast breeder reactor fuel rod simulators

    International Nuclear Information System (INIS)

    McCulloch, R.W.; Lovell, R.T.; Post, D.W.; Snyder, S.D.

    1980-01-01

    Variable width ribbon heating elements have been fabricated which provide a chopped cosine, variable heat flux profile for fuel rod simulators used in test loops by the Breeder Reactor Program Thermal Hydraulic Out-of-Reactor Safety test facility and the Gas-Cooled Fast Breeder Reactor Core Flow Test Loop. Thermal, mechanical, and electrical design considerations result in the derivation of an analytical expression for the ribbon contours. From this, the ribbons are machined and wound on numerically controlled equipment. Postprocessing and inspection results in a wound, variable width ribbon with the precise dimensional, electrical, and mechanical properties needed for use in fuel pin simulators

  17. Interannual Variability of the Meridional Width of the Baiu Rainband in June and the Associated Large-Scale Atmospheric Circulations

    Science.gov (United States)

    Tsuji, K.; Tomita, T.

    2016-12-01

    Baiu front, which is defined as a boundary between tropical and polar air masses in the East Asia-western North Pacific sector in boreal early summer, slowly migrates northward with the daily meridional swings. Thus, the interannual variability of meridional width of the baiu rainband reflects the slow northward migration and the daily meridional swings of the baiu front. This study focuses on the meridional width of baiu rainband only in June when the baiu front extends on Japan, and investigates how the width is related to the rainfall of Japan with discussions of associated anomalous large-scale atmospheric circulations. The meridional width of baiu rainband is defined based on the monthly-mean precipitation rate of June, whose threshold is 5mm day-1 that is averaged in 130°-150°E. There is a significant positive correlation between the variations of southern and northern edges of the baiu rainband in June. However, the interannual variance of the southern edge is almost twice larger than that of the northern one. That is, the interannual variability of the meridional width is chiefly caused by the variations of southern edge, and the contribution of northern ones is small. When the meridonal width is narrow (wide), an anomalous anticyclonic (cyclonic) circulation appears to the south of Japan, and the precipitation rate increases (decreases) in the western part of Japan while decreases (increases) in the counterpart. In other words, a local dipole with a node at 140°E appears around Japan in the baiu rainfall anomalies. The anomalous anticyclonic (cyclonic) circulation to the south of Japan, which controls the interannual variability of meridional width of the baiu rainband, is induced by the strength of Indian summer monsoon. When the convective activity of Indian summer monsoon is strong (week), the Tibetan high in the upper troposphere extends more (less) eastward. The induced stronger (weaker) descent leads stronger (weaker) Bonin high in the western

  18. Cross-Layer Resource Allocation for Variable Bit Rate Multiclass Services in a Multirate Multicarrier DS-CDMA Network

    Directory of Open Access Journals (Sweden)

    Kee-Chaing Chua

    2005-02-01

    Full Text Available An approximate analytical formulation of the resource allocation problem for handling variable bit rate multiclass services in a cellular round-robin carrier-hopping multirate multicarrier direct-sequence code-division multiple-access (MC-DS-CDMA system is presented. In this paper, all grade-of-service (GoS or quality-of-service (QoS requirements at the connection level, packet level, and link layer are satisfied simultaneously in the system, instead of being satisfied at the connection level or at the link layer only. The analytical formulation shows how the GoS/QoS in the different layers are intertwined across the layers. A novelty of this paper is that the outages in the subcarriers are minimized by spreading the subcarriers' signal-to-interference ratio evenly among all the subcarriers by using a dynamic round-robin carrier-hopping allocation scheme. A complete sharing (CS scheme with guard capacity is used for the resource sharing policy at the connection level based on the mean rates of the connections. Numerical results illustrate that significant gain in the system utilization is achieved through the joint coupling of connection/packet levels and link layer.

  19. A Novel Joint Problem of Routing, Scheduling, and Variable-Width Channel Allocation in WMNs

    Directory of Open Access Journals (Sweden)

    Chun-Cheng Lin

    2014-01-01

    Full Text Available This paper investigates a novel joint problem of routing, scheduling, and channel allocation for single-radio multichannel wireless mesh networks in which multiple channel widths can be adjusted dynamically through a new software technology so that more concurrent transmissions and suppressed overlapping channel interference can be achieved. Although the previous works have studied this joint problem, their linear programming models for the problem were not incorporated with some delicate constraints. As a result, this paper first constructs a linear programming model with more practical concerns and then proposes a simulated annealing approach with a novel encoding mechanism, in which the configurations of multiple time slots are devised to characterize the dynamic transmission process. Experimental results show that our approach can find the same or similar solutions as the optimal solutions for smaller-scale problems and can efficiently find good-quality solutions for a variety of larger-scale problems.

  20. Too much or too little step width variability is associated with a fall history in older persons who walk at or near normal gait speed

    Directory of Open Access Journals (Sweden)

    Newman Anne B

    2005-07-01

    Full Text Available Abstract Background Decreased gait speed and increased stride time, stride length, double support time, and stance time variability have consistently been associated with falling whereas step width variability has not been strongly related to falls. The purpose was to examine the linear and nonlinear associations between gait variability and fall history in older persons and to examine the influence of gait speed. Methods Gait characteristics and fall history were obtained in 503 older adults (mean age = 79; 61% female participating in the Cardiovascular Health Study who could ambulate independently. Gait characteristics were recorded from two trials on a 4 meter computerized walkway at the subject's self-selected walking speed. Gait variability was calculated as the coefficient of variation. The presence of a fall in the past 12 months was determined by interview. The nonlinear association between gait variability and fall history was examined using a simple three level classification derived from the distribution of the data and from literature based cut-points. Multivariate logistic regression was used to examine the association between step width variability (extreme or moderate and fall history stratifying by gait speed (1.0 m/s and controlling for age and gender. Results Step length, stance time, and step time variability did not differ with respect to fall history (p > .33. Individuals with extreme step width variability (either low or high step width variability were more likely to report a fall in the past year than individuals with moderate step width variability. In individuals who walked ≥ 1.0 m/s (n = 281, after controlling for age, gender, and gait speed, compared to individuals with moderate step width variability individuals with either low or high step width variability were more likely to have fallen in the past year (OR and 95% CI 4.38 [1.79–10.72]. The association between step width variability and fall history was not

  1. Growth rate and ring width variability of teak, Tectona grandis (Verbenaceae in an unmanaged forest in East Timor

    Directory of Open Access Journals (Sweden)

    Vicelina B. Sousa

    2012-03-01

    Full Text Available Teak (Tectona grandis is one of the most valuable timbers in international trade and an important species for tropical forestry. Teak is found on the island of East Timor but no information is available on teak growth from this region. A pure stand planted in 1940-50 in the North of East Timor and left unmanaged was studied. Fifteen trees were sampled in October-November 2003 and stem discs taken at three height levels of its height (1.7m, 9.5m and 18.7m, and cores were collected at DBH. Transverse surfaces of the discs and cores were polished for ring identification. Core cross sections were first digitized and disc cross sections were observed under the microscope. Three randomly selected radii were analyzed in each disc. Ring width measurement and ring counting were done using image analysis software. The distinction between heartwood and sapwood was performed macroscopically by colour difference, and heartwood radius and sapwood width were measured. The relationship between stem and heartwood radius was studied for each disc and heartwood percentage by radius was determined. Radial ring width curves are presented for the different axial positions within the stem, and ring width variability was analyzed. Growth rates were calculated and age-radius relationships were estimated using cumulative growth curves. Growth rings were large and well defined in the juvenile phase, reflecting the specie’s fast-growing character. The year-to-year variation of ring width showed a similar pattern among trees. Mean ring width ranged between 4.3-7.3mm for the first 20 years and 3.3-5.1mm for 30 to 45 years. Pith eccentricity was evident in the lower part of the stem and ring wedging occurred. On average, heartwood represented 84% of the radius and sapwood contained 6 to 11 rings. The age-related variation of ring width and the occurrence in the lower part of the tree stems of eccentricity and wedging rings, highlights the importance of appropriate stand

  2. Evolution of strain localization in variable-width three-dimensional unsaturated laboratory-scale cut slopes

    Science.gov (United States)

    Morse, Michael S.; Lu, Ning; Wayllace, Alexandra; Godt, Jonathan W.

    2017-01-01

    To experimentally validate a recently developed theory for predicting the stability of cut slopes under unsaturated conditions, the authors measured increasing strain localization in unsaturated slope cuts prior to abrupt failure. Cut slope width and moisture content were controlled and varied in a laboratory, and a sliding door that extended the height of the free face of the slope was lowered until the cut slope failed. A particle image velocimetry tool was used to quantify soil displacement in the x-y">x-y (horizontal) and x-z">x-z (vertical) planes, and strain was calculated from the displacement. Areas of maximum strain localization prior to failure were shown to coincide with the location of the eventual failure plane. Experimental failure heights agreed with the recently developed stability theory for unsaturated cut slopes (within 14.3% relative error) for a range of saturation and cut slope widths. A theoretical threshold for sidewall influence on cut slope failures was also proposed to quantify the relationship between normalized sidewall width and critical height. The proposed relationship was consistent with the cut slope experiment results, and is intended for consideration in future geotechnical experiment design. The experimental data of evolution of strain localization presented herein provide a physical basis from which future numerical models of strain localization can be validated.

  3. Practical Relativistic Bit Commitment

    NARCIS (Netherlands)

    Lunghi, T.; Kaniewski, J.; Bussières, F.; Houlmann, R.; Tomamichel, M.; Wehner, S.D.C.; Zbinden, H

    2015-01-01

    Bit commitment is a fundamental cryptographic primitive in which Alice wishes to commit a secret bit to Bob. Perfectly secure bit commitment between two mistrustful parties is impossible through an asynchronous exchange of quantum information. Perfect security is, however, possible when Alice and

  4. Bits and q-bits as versatility measures

    Directory of Open Access Journals (Sweden)

    José R.C. Piqueira

    2004-06-01

    Full Text Available Using Shannon information theory is a common strategy to measure any kind of variability in a signal or phenomenon. Some methods were developed to adapt information entropy measures to bird song data trying to emphasize its versatility aspect. This classical approach, using the concept of bit, produces interesting results. Now, the original idea developed in this paper is to use the quantum information theory and the quantum bit (q-bit concept in order to provide a more complete vision of the experimental results.Usar a teoria da informação de Shannon é uma estratégia comum para medir todo tipo de variabilidade em um sinal ou fenômeno. Alguns métodos foram desenvolvidos para adaptar a medida de entropia informacional a dados de cantos de pássaro, tentando enfatizar seus aspectos de versatilidade. Essa abordagem clássica, usando o conceito de bit, produz resultados interessantes. Agora, a idéia original desenvolvida neste artigo é usar a teoria quântica da informação e o conceito de q-bit, com a finalidade de proporcionar uma visão mais completa dos resultados experimentais.

  5. Proposed first-generation WSQ bit allocation procedure

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, J.N.; Brislawn, C.M.

    1993-09-08

    The Wavelet/Scalar Quantization (WSQ) gray-scale fingerprint image compression algorithm involves a symmetric wavelet transform (SWT) image decomposition followed by uniform scalar quantization of each subband. The algorithm is adaptive insofar as the bin widths for the scalar quantizers are image-specific and are included in the compressed image format. Since the decoder requires only the actual bin width values -- but not the method by which they were computed -- the standard allows for future refinements of the WSQ algorithm by improving the method used to select the scalar quantizer bin widths. This report proposes a bit allocation procedure for use with the first-generation WSQ encoder. In previous work a specific formula is provided for the relative sizes of the scalar quantizer bin widths in terms of the variances of the SWT subbands. An explicit specification for the constant of proportionality, q, that determines the absolute bin widths was not given. The actual compression ratio produced by the WSQ algorithm will generally vary from image to image depending on the amount of coding gain obtained by the run-length and Huffman coding, stages of the algorithm, but testing performed by the FBI established that WSQ compression produces archival quality images at compression ratios of around 20 to 1. The bit allocation procedure described in this report possesses a control parameter, r, that can be set by the user to achieve a predetermined amount of lossy compression, effectively giving the user control over the amount of distortion introduced by quantization noise. The variability observed in final compression ratios is thus due only to differences in lossless coding gain from image to image, chiefly a result of the varying amounts of blank background surrounding the print area in the images. Experimental results are presented that demonstrate the proposed method`s effectiveness.

  6. Development of variable-width ribbon heating elements for liquid-metal and gas-cooled fast breeder reactor fuel-pin simulators

    International Nuclear Information System (INIS)

    McCulloch, R.W.; Post, D.W.; Lovell, R.T.; Snyder, S.D.

    1981-04-01

    Variable-width ribbon heating elements that provide a chopped-cosine variable heat flux profile have been fabricated for fuel pin simulators used in test loops by the Breeder Reactor Program Thermal-Hydraulic Out-of-Reactor Safety test facility and the Gas-Cooled Fast Breeder Reactor-Core Flow Test Loop. Thermal, mechanical, and electrical design considerations are used to derive an analytical expression that precisely describes ribbon contour in terms of the major fabrication parameters. These parameters are used to generate numerical control tapes that control ribbon cutting and winding machines. Infrared scanning techniques are developed to determine the optimum transient thermal profile of the coils and relate this profile to that generated by the coils in completed fuel pin simulators

  7. Probabilistic Analysis of Crack Width

    Directory of Open Access Journals (Sweden)

    J. Marková

    2000-01-01

    Full Text Available Probabilistic analysis of crack width of a reinforced concrete element is based on the formulas accepted in Eurocode 2 and European Model Code 90. Obtained values of reliability index b seem to be satisfactory for the reinforced concrete slab that fulfils requirements for the crack width specified in Eurocode 2. However, the reliability of the slab seems to be insufficient when the European Model Code 90 is considered; reliability index is less than recommended value 1.5 for serviceability limit states indicated in Eurocode 1. Analysis of sensitivity factors of basic variables enables to find out variables significantly affecting the total crack width.

  8. Superconducting frustration bit

    International Nuclear Information System (INIS)

    Tanaka, Y.

    2014-01-01

    Highlights: • A frustration bit element is proposed for a conventional superconducting circuit. • It is composed of π-junctions. • It mimics the multiband superconductor. - Abstract: A basic design is proposed for a classical bit element of a superconducting circuit that mimics a frustrated multiband superconductor and is composed of an array of π-Josephson junctions (π-junction). The phase shift of π provides the lowest energy for one π-junction, but neither a π nor a zero phase shift gives the lowest energy for an assembly of π-junctions. There are two chiral states that can be used to store one bit information. The energy scale for reading and writing to memory is of the same order as the junction energy, and is thus in the same order of the driving energy of the circuit. In addition, random access is also possible

  9. 32-Bit FASTBUS computer

    International Nuclear Information System (INIS)

    Blossom, J.M.; Hong, J.P.; Kellner, R.G.

    1985-01-01

    Los Alamos National Laboratory is building a 32-bit FASTBUS computer using the NATIONAL SEMICONDUCTOR 32032 central processing unit (CPU) and containing 16 million bytes of memory. The board can act both as a FASTBUS master and as a FASTBUS slave. It contains a custom direct memory access (DMA) channel which can perform 80 million bytes per second block transfers across the FASTBUS

  10. Entre grafos y bits

    Directory of Open Access Journals (Sweden)

    Carla Boserman

    2014-02-01

    Full Text Available Este texto se propone ahondar en las intersecciones de lo analógico y lo digital, en el encuentro de la baja y la alta tecnología. Tomando consciencia de la materialidad de ambas esferas para pensar desde ahí en objetos, prácticas de dibujo y documentación que puedan aportar otras formulaciones aplicables a métodos de investigación. Entre grafos y bits, diseccionaremos un objeto, el #relatograma, analizaremos su ecología y propondremos una reflexión acerca de su condición digital que genera paisajes por agregación #coreograma, explorando así su capacidad de ser reporte y aporte cognitivo. Between graphs and bits  Abstract This paper delves into the intersections of analogue and digital cultures, at the points at which low and high technology converge. While acknowledging the materiality of these two spheres, I aim to produce an enquiry into objects, drawings and documentation practices that can contribute to developing new research methods. Among graphs and bits, I will dissect one object: the #relatograma, in order to analyze its ecology and propose a critical reflection on its digital condition and its ability to produce aggregated landscapes, or what I define as #coreograma. I will thereby explore its ability to be share information and produce knowledge. Keywords: Material culture; research methods; digital objects; drawing; #relatograma.

  11. A 16 bit camac ADC with memory

    International Nuclear Information System (INIS)

    Wikne, J.C.

    1986-01-01

    A 16 bit camac-programmable analog-to-digital converter (ADC) with incorporated memory and sampling clock is described. This single-width camac module is especially suited for autonomous, multi-sample data acquisition with high precision. The ADC itself is a hybrid, the ADC76 from Burr-Brown, featuring a programmable input range and direct parallel output in two's complement form. The input programming is done by means of dual-in-line switches, giving input spans from 1.25 V to 20 V, unipolar or bipolar. The outline of the programming of the ADC input and the calibration of the unit is given

  12. Quantum dynamics of quantum bits

    International Nuclear Information System (INIS)

    Nguyen, Bich Ha

    2011-01-01

    The theory of coherent oscillations of the matrix elements of the density matrix of the two-state system as a quantum bit is presented. Different calculation methods are elaborated in the case of a free quantum bit. Then the most appropriate methods are applied to the study of the density matrices of the quantum bits interacting with a classical pumping radiation field as well as with the quantum electromagnetic field in a single-mode microcavity. The theory of decoherence of a quantum bit in Markovian approximation is presented. The decoherence of a quantum bit interacting with monoenergetic photons in a microcavity is also discussed. The content of the present work can be considered as an introduction to the study of the quantum dynamics of quantum bits. (review)

  13. Smart BIT/TSMD Integration

    Science.gov (United States)

    1991-12-01

    integracion . Smart BIT/TSMD provides Rome Laboratory with a laboratory testbed to evaluate and assess the individual characteristics as well as the integration...that assessment. These windows are color-keyed to tie together multiple windows for the same Smart BIT techniques. The display of the neural net- work... Multiple accelerometer icons of any type may therefore be placed (non-overlapping) in the accelerometer Time Line region. The BIT Time Line Editor allows

  14. Superconducting quantum bits

    International Nuclear Information System (INIS)

    Mooij, Hans

    2005-01-01

    Superconducting devices can be used to explore the boundaries between the quantum and classical worlds, and could also have applications in quantum information. The quantum world looks very different to the ordinary world. A quantum particle can, for instance, be in two places simultaneously, while its speed and position cannot both be measured with complete accuracy at the same time. Moreover, if its mass is small enough, a quantum particle can tunnel through energy barriers that its classical counterparts could never cross. Physicists are comfortable with the use of quantum mechanics to describe atomic and subatomic particles. However, in recent years we have discovered that micron-sized objects that have been produced using standard semiconductor-fabrication techniques - objects that are small on everyday scales but large compared with atoms - can also behave as quantum particles. These artificial quantum objects might one day be used as 'quantum bits' in a quantum computer that could perform certain computational tasks much faster than any classical computing device. Before then, however, these devices will allow us to explore the interface between the quantum and classical worlds, and to study how interactions with external degrees of freedom lead to a gradual disappearance of quantum behaviour. (U.K.)

  15. A Holistic Approach to Bit Preservation

    DEFF Research Database (Denmark)

    Zierau, Eld Maj-Britt Olmütz

    2011-01-01

    This thesis presents three main results for a holistic approach to bit preservation, where the ultimate goal is to find the optimal bit preservation strategy for specific digital material that must be digitally preserved. Digital material consists of sequences of bits, where a bit is a binary digit...... which can have the value 0 or 1. Bit preservation must ensure that the bits remain intact and readable in the future, but bit preservation is not concerned with how bits can be interpreted as e.g. an image. A holistic approach to bit preservation includes aspects that influence the final choice of a bit...... a holistic approach and include aspects of digital representation, confidentiality, availability, bit safety and costs when defining requirements for the bit preservation. Analysis of such requirements and choice of the final bit preservation solution can be supported by the three main results presented...

  16. String bit models for superstring

    International Nuclear Information System (INIS)

    Bergman, O.; Thorn, C.B.

    1995-01-01

    The authors extend the model of string as a polymer of string bits to the case of superstring. They mainly concentrate on type II-B superstring, with some discussion of the obstacles presented by not II-B superstring, together with possible strategies for surmounting them. As with previous work on bosonic string work within the light-cone gauge. The bit model possesses a good deal less symmetry than the continuous string theory. For one thing, the bit model is formulated as a Galilei invariant theory in (D - 2) + 1 dimensional space-time. This means that Poincare invariance is reduced to the Galilei subgroup in D - 2 space dimensions. Naturally the supersymmetry present in the bit model is likewise dramatically reduced. Continuous string can arise in the bit models with the formation of infinitely long polymers of string bits. Under the right circumstances (at the critical dimension) these polymers can behave as string moving in D dimensional space-time enjoying the full N = 2 Poincare supersymmetric dynamics of type II-B superstring

  17. String bit models for superstring

    Energy Technology Data Exchange (ETDEWEB)

    Bergman, O.; Thorn, C.B.

    1995-12-31

    The authors extend the model of string as a polymer of string bits to the case of superstring. They mainly concentrate on type II-B superstring, with some discussion of the obstacles presented by not II-B superstring, together with possible strategies for surmounting them. As with previous work on bosonic string work within the light-cone gauge. The bit model possesses a good deal less symmetry than the continuous string theory. For one thing, the bit model is formulated as a Galilei invariant theory in (D {minus} 2) + 1 dimensional space-time. This means that Poincare invariance is reduced to the Galilei subgroup in D {minus} 2 space dimensions. Naturally the supersymmetry present in the bit model is likewise dramatically reduced. Continuous string can arise in the bit models with the formation of infinitely long polymers of string bits. Under the right circumstances (at the critical dimension) these polymers can behave as string moving in D dimensional space-time enjoying the full N = 2 Poincare supersymmetric dynamics of type II-B superstring.

  18. Estimates of the width of the wetting zone along a fracture subjected to an episodic infiltration event in variably saturated, densely welded tuff

    International Nuclear Information System (INIS)

    Buscheck, T.A.; Nitao, J.J.

    1988-01-01

    A central issue to be addressed within the Nevada Nuclear Waste Storage Investigations (NNWSI) is the role which fractures will play as the variably saturated, fractured rock mass surrounding the waste package responds to heating, cooling, and episodic infiltration events. Understanding the role of fractures during such events will, in part, depend on our ability to make geophysical measurements of perturbations in the moisture distribution in the vicinity of fractures. In this study we first examine the details of the perturbation in the moisture distribution in and around a fracture subjected to an episodic infiltration event, and then integrate that behavior over the scale at which moisture measurements are likely to be made during the Engineered Barrier Design Test of the NNWSI project. To model this system we use the TOUGH hydrothermal code and fracture and matrix properties considered relevant to the welded ash flow tuff found in the Topopah Spring member at Yucca Mountain as well as in the Grouse Canyon member within G-Tunnel at the Nevada Test Site. Our calculations provide insight into the anticipated spatial and temporal resolution obtainable through the use of the geophysical techniques being considered. These calculations should prove useful both in planning the implementation of these methods as well as in the interpretation of their results. 41 refs., 28 figs

  19. Rate Control for MPEG-4 Bit Stream

    Institute of Scientific and Technical Information of China (English)

    王振洲; 李桂苓

    2003-01-01

    For a very long time video processing dealt exclusively with fixed-rate sequences of rectangular shaped images. However, interest has been recently moving toward a more flexible concept in which the subject of the processing and encoding operations is a set of visual elements organized in both time and space in a flexible and arbitrarily complex way. The moving picture experts group (MPEG-4) standard supports this concept and its verification model (VM) encoder has adopted scalable rate control (SRC) as the rate control scheme, which is based on the spatial domain and compatible with constant bit rate (CBR) and variable bit rate (VBR). In this paper,a new rate control algorithm based on the DCT domain instead of the pixel domain is presented. More-over, macroblock level rate control scheme to compute the quantization step for each macroblock has been adopted. The experimental results show that the new algorithm can achieve a much better result than the original one in both peak signal-to-noise ratio (PSNR) and the coding bits, and that the new algorithm is more flexible than test model 5 (TM5) rate control algorithm.

  20. Level width broadening effect

    International Nuclear Information System (INIS)

    Zhang Jingshang

    2003-01-01

    In file-6 for double-differential cross sections, the level width broadening effect should be taken into account properly due to Heisenberg' uncertainty. Besides level width broadening effect, the energy resolution in the measurements is also needed in fitting measurement procedure. In general, the traditional normal Gaussian expansion is employed. However, to do so in this way the energy balance could not be held. For this reason, the deformed Gaussian expansion functions with exponential form for both the single energy point and continuous spectrum are introduced, with which the normalization and energy balance conditions could be held exactly in the analytical form. (author)

  1. Flexible Bit Preservation on a National Basis

    DEFF Research Database (Denmark)

    Jurik, Bolette; Nielsen, Anders Bo; Zierau, Eld

    2012-01-01

    In this paper we present the results from The Danish National Bit Repository project. The project aim was establishment of a system that can offer flexible and sustainable bit preservation solutions to Danish cultural heritage institutions. Here the bit preservation solutions must include support...... of bit safety as well as other requirements like e.g. confidentiality and availability. The Danish National Bit Repository is motivated by the need to investigate and handle bit preservation for digital cultural heritage. Digital preservation relies on the integrity of the bits which digital material...

  2. Cheat Sensitive Quantum Bit Commitment

    OpenAIRE

    Hardy, Lucien; Kent, Adrian

    1999-01-01

    We define cheat sensitive cryptographic protocols between mistrustful parties as protocols which guarantee that, if either cheats, the other has some nonzero probability of detecting the cheating. We give an example of an unconditionally secure cheat sensitive non-relativistic bit commitment protocol which uses quantum information to implement a task which is classically impossible; we also describe a simple relativistic protocol.

  3. Cheat sensitive quantum bit commitment.

    Science.gov (United States)

    Hardy, Lucien; Kent, Adrian

    2004-04-16

    We define cheat sensitive cryptographic protocols between mistrustful parties as protocols which guarantee that, if either cheats, the other has some nonzero probability of detecting the cheating. We describe an unconditionally secure cheat sensitive nonrelativistic bit commitment protocol which uses quantum information to implement a task which is classically impossible; we also describe a simple relativistic protocol.

  4. Time-space modal logic for verification of bit-slice circuits

    Science.gov (United States)

    Hiraishi, Hiromi

    1996-03-01

    The major goal of this paper is to propose a new modal logic aiming at formal verification of bit-slice circuits. The new logic is called as time-space modal logic and its major feature is that it can handle two transition relations: one for time transition and the other for space transition. As for a verification algorithm, a symbolic model checking algorithm of the new logic is shown. This could be applicable to verification of bit-slice microprocessor of infinite bit width and 1D systolic array of infinite length. A simple benchmark result shows the effectiveness of the proposed approach.

  5. Stokes line width

    International Nuclear Information System (INIS)

    Nikiskov, A.I.; Ritus, V.I.

    1993-01-01

    The concept of Stokes line width is introduced for the asymptotic expansions of functions near an essential singularity. Explicit expressions are found for functions (switching functions) that switch on the exponentially small terms for the Dawson integral, Airy function, and the gamma function. A different, more natural representation of a function, not associated with expansion in an asymptotic series, in the form of dominant and recessive terms is obtained by a special division of the contour integral which represents the function into contributions of higher and lower saddle points. This division leads to a narrower, natural Stokes line width and a switching function of an argument that depends on the topology of the lines of steepest descent from the saddle point

  6. Pulse-width discriminators

    International Nuclear Information System (INIS)

    Budyashov, Yu.G.; Grebenyuk, V.M.; Zinov, V.G.

    1978-01-01

    A pulse duration discriminator is described which is intended for processing signals from multilayer scintillators. The basic elements of the scintillator are: an input gate, a current generator, an integrating capacitor, a Schmidt trigger and an anticoincidence circuit. The basic circuit of the discriminator and its time diagrams explaining its operating are given. The discriminator is based on microcircuits. Pulse duration discrimination threshold changes continuously from 20 to 100 ns, while its amplitude threshold changes within 20 to 100 mV. The temperature instability of discrimination thresholds (both in pulse width and in amplitude) is better than 0.1 per cent/deg C

  7. Method of making imbalanced compensated drill bit

    International Nuclear Information System (INIS)

    Brett, J.F.; Warren, T.M.

    1991-01-01

    This patent describes a method for making a drill bit of the type having a bearing zone on a side portion of a bit body and a cutting zone with cutters mounted on the bit body. It comprises: mounting a preselected number of cutters within the cutting zone on the bit body; generating a model of the geometry of the bit body and cutters mounted thereon; calculating the imbalance force which would occur in the bit body under defined drilling parameters; using the imbalance force and model to calculate the position of at least one additional cutter which when mounted within the cutting zone on the bit body in the calculated position would create a net imbalance force directed towards the bearing zone; and mounting an additional cutter within the cutting zone on the bit body in the position so calculated

  8. 24-Hour Relativistic Bit Commitment.

    Science.gov (United States)

    Verbanis, Ephanielle; Martin, Anthony; Houlmann, Raphaël; Boso, Gianluca; Bussières, Félix; Zbinden, Hugo

    2016-09-30

    Bit commitment is a fundamental cryptographic primitive in which a party wishes to commit a secret bit to another party. Perfect security between mistrustful parties is unfortunately impossible to achieve through the asynchronous exchange of classical and quantum messages. Perfect security can nonetheless be achieved if each party splits into two agents exchanging classical information at times and locations satisfying strict relativistic constraints. A relativistic multiround protocol to achieve this was previously proposed and used to implement a 2-millisecond commitment time. Much longer durations were initially thought to be insecure, but recent theoretical progress showed that this is not so. In this Letter, we report on the implementation of a 24-hour bit commitment solely based on timed high-speed optical communication and fast data processing, with all agents located within the city of Geneva. This duration is more than 6 orders of magnitude longer than before, and we argue that it could be extended to one year and allow much more flexibility on the locations of the agents. Our implementation offers a practical and viable solution for use in applications such as digital signatures, secure voting and honesty-preserving auctions.

  9. Bit-coded regular expression parsing

    DEFF Research Database (Denmark)

    Nielsen, Lasse; Henglein, Fritz

    2011-01-01

    the DFA-based parsing algorithm due to Dub ´e and Feeley to emit the bits of the bit representation without explicitly materializing the parse tree itself. We furthermore show that Frisch and Cardelli’s greedy regular expression parsing algorithm can be straightforwardly modified to produce bit codings...

  10. A holistic approach to bit preservation

    DEFF Research Database (Denmark)

    Zierau, Eld

    2012-01-01

    Purpose: The purpose of this paper is to point out the importance of taking a holistic approach to bit preservation when setting out to find an optimal bit preservation solution for specific digital materials. In the last decade there has been an increasing awareness that bit preservation, which ...

  11. Analysis of bus width and delay on a fully digital signum nonlinearity chaotic oscillator

    KAUST Repository

    Mansingka, Abhinav S.

    2012-07-29

    This paper introduces the first fully digital implementation of a 3rd order ODE-based chaotic oscillator with signum nonlinearity. A threshold bus width of 12-bits for reliable chaotic behavior is observed, below which the system output becomes periodic. Beyond this threshold, the maximum Lyapunov exponent (MLE) is shown to improve up to a peak value at 16-bits and subsequently decrease with increasing bus width. The MLE is also shown to gradually increase with number of introduced internal delay cycles until a peak value at 14 cycles, after which the system loses chaotic properties. Introduced external delay cycles are shown to rotate the attractors in 3-D phase space. Bus width and delay elements can be independently modulated to optimize the system to suit specifications. The experimental results of the system show low area and high performance on a Xilinx Virtex 4 FPGA with throughput of 13.35 Gbits/s for a 32-bit implementation.

  12. Analysis of bus width and delay on a fully digital signum nonlinearity chaotic oscillator

    KAUST Repository

    Mansingka, Abhinav S.; Radwan, Ahmed G.; Salama, Khaled N.; Zidan, Mohammed A.

    2012-01-01

    This paper introduces the first fully digital implementation of a 3rd order ODE-based chaotic oscillator with signum nonlinearity. A threshold bus width of 12-bits for reliable chaotic behavior is observed, below which the system output becomes periodic. Beyond this threshold, the maximum Lyapunov exponent (MLE) is shown to improve up to a peak value at 16-bits and subsequently decrease with increasing bus width. The MLE is also shown to gradually increase with number of introduced internal delay cycles until a peak value at 14 cycles, after which the system loses chaotic properties. Introduced external delay cycles are shown to rotate the attractors in 3-D phase space. Bus width and delay elements can be independently modulated to optimize the system to suit specifications. The experimental results of the system show low area and high performance on a Xilinx Virtex 4 FPGA with throughput of 13.35 Gbits/s for a 32-bit implementation.

  13. Insecurity of imperfect quantum bit seal

    International Nuclear Information System (INIS)

    Chau, H.F.

    2006-01-01

    Quantum bit seal is a way to encode a classical bit quantum mechanically so that everyone can obtain non-zero information on the value of the bit. Moreover, such an attempt should have a high chance of being detected by an authorized verifier. Surely, a reader looks for a way to get the maximum amount of information on the sealed bit and at the same time to minimize her chance of being caught. And a verifier picks a sealing scheme that maximizes his chance of detecting any measurement of the sealed bit. Here, I report a strategy that passes all measurement detection procedures at least half of the time for all quantum bit sealing schemes. This strategy also minimizes a reader's chance of being caught under a certain scheme. In this way, I extend the result of Bechmann-Pasquinucci et al. by proving that quantum seal is insecure in the case of imperfect sealed bit recovery

  14. Pulse width modulation inverter with battery charger

    Science.gov (United States)

    Slicker, James M.

    1985-01-01

    An inverter is connected between a source of DC power and a three-phase AC induction motor, and a microprocessor-based circuit controls the inverter using pulse width modulation techniques. In the disclosed method of pulse width modulation, both edges of each pulse of a carrier pulse train are equally modulated by a time proportional to sin .theta., where .theta. is the angular displacement of the pulse center at the motor stator frequency from a fixed reference point on the carrier waveform. The carrier waveform frequency is a multiple of the motor stator frequency. The modulated pulse train is then applied to each of the motor phase inputs with respective phase shifts of 120.degree. at the stator frequency. Switching control commands for electronic switches in the inverter are stored in a random access memory (RAM) and the locations of the RAM are successively read out in a cyclic manner, each bit of a given RAM location controlling a respective phase input of the motor. The DC power source preferably comprises rechargeable batteries and all but one of the electronic switches in the inverter can be disabled, the remaining electronic switch being part of a "flyback" DC-DC converter circuit for recharging the battery.

  15. GAP WIDTH STUDY IN LASER BUTT-WELDING

    DEFF Research Database (Denmark)

    Gong, Hui; Olsen, Flemming Ove

    power : 2 and 2.6 kW and the focal point position : 0 and -1.2 mm. Quality of all the butt welds are destructively tested according to ISO 13919-1.Influences of the variable process parameters to the maximum allowable gap width are observed as (1) the maximum gap width is inversely related......In this paper the maximum allowable gap width in laser butt-welding is intensively studied. The gap width study (GWS) is performed on the material of SST of W1.4401 (AISI 316) under various welding conditions, which are the gap width : 0.00-0.50 mm, the welding speed : 0.5-2.0 m/min, the laser...... to the welding speed, (2) the larger laser power leads to the bigger maximum allowable gap width and (3) the focal point position has very little influence on the maximum gap width....

  16. Mourning in Bits and Stone

    DEFF Research Database (Denmark)

    Sabra, Jakob Borrits

    We mourn our dead, publicly and privately, online and offline. Cemeteries, web memorials and social network sites make up parts of todays intricately weaved and interrelated network of death, grief and memorialization practices [1]–[5]. Whether cut in stone or made of bits, graves, cemeteries......, memorials, monuments, websites and social networking services (SNS) all are alterable, controllable and adaptive. They represent a certain rationale contrary to the emotive state of mourning (e.g. gravesites function as both spaces of internment and places of spiritual and emotional recollection). Following...... and memorialization by discussing the publicly and privately digital and social death from a spatial, temporal, physical and digital angle. Further the paper will reflect on how to encompass shifting trends and technologies in ‘traditional’ spaces of mourning and remembrance....

  17. In bits, bytes and stone

    DEFF Research Database (Denmark)

    Sabra, Jakob Borrits; Andersen, Hans Jørgen

    The digital spheres of Information and Communication Technologies (ICT) and Social Network Services (SNS) are influencing 21st. century death. Today the dying and the bereaved attend mourning and remembrance both online and offline. Combined, the cemeteries, web memorials and social network sites...... designs'. Urns, coffins, graves, cemeteries, memorials, monuments, websites, applications and software services, whether cut in stone or made of bits, are all influenced by discourses of publics, economics, power, technology and culture. Designers, programmers, stakeholders and potential end-users often...... the respondents and interviewees are engaged with a prototype design that encompasses digitally enhanced experiences and interactions regarding mourning, memory and remembrance. The design is situated in a traditional public place of death, the Almen Cemetery of Aalborg in Denmark....

  18. FastBit Reference Manual

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Kesheng

    2007-08-02

    An index in a database system is a data structure that utilizes redundant information about the base data to speed up common searching and retrieval operations. Most commonly used indexes are variants of B-trees, such as B+-tree and B*-tree. FastBit implements a set of alternative indexes call compressed bitmap indexes. Compared with B-tree variants, these indexes provide very efficient searching and retrieval operations by sacrificing the efficiency of updating the indexes after the modification of an individual record. In addition to the well-known strengths of bitmap indexes, FastBit has a special strength stemming from the bitmap compression scheme used. The compression method is called the Word-Aligned Hybrid (WAH) code. It reduces the bitmap indexes to reasonable sizes and at the same time allows very efficient bitwise logical operations directly on the compressed bitmaps. Compared with the well-known compression methods such as LZ77 and Byte-aligned Bitmap code (BBC), WAH sacrifices some space efficiency for a significant improvement in operational efficiency. Since the bitwise logical operations are the most important operations needed to answer queries, using WAH compression has been shown to answer queries significantly faster than using other compression schemes. Theoretical analyses showed that WAH compressed bitmap indexes are optimal for one-dimensional range queries. Only the most efficient indexing schemes such as B+-tree and B*-tree have this optimality property. However, bitmap indexes are superior because they can efficiently answer multi-dimensional range queries by combining the answers to one-dimensional queries.

  19. Stinger Enhanced Drill Bits For EGS

    Energy Technology Data Exchange (ETDEWEB)

    Durrand, Christopher J. [Novatek International, Inc., Provo, UT (United States); Skeem, Marcus R. [Novatek International, Inc., Provo, UT (United States); Crockett, Ron B. [Novatek International, Inc., Provo, UT (United States); Hall, David R. [Novatek International, Inc., Provo, UT (United States)

    2013-04-29

    The project objectives were to design, engineer, test, and commercialize a drill bit suitable for drilling in hard rock and high temperature environments (10,000 meters) likely to be encountered in drilling enhanced geothermal wells. The goal is provide a drill bit that can aid in the increased penetration rate of three times over conventional drilling. Novatek has sought to leverage its polycrystalline diamond technology and a new conical cutter shape, known as the Stinger®, for this purpose. Novatek has developed a fixed bladed bit, known as the JackBit®, populated with both shear cutter and Stingers that is currently being tested by major drilling companies for geothermal and oil and gas applications. The JackBit concept comprises a fixed bladed bit with a center indenter, referred to as the Jack. The JackBit has been extensively tested in the lab and in the field. The JackBit has been transferred to a major bit manufacturer and oil service company. Except for the attached published reports all other information is confidential.

  20. Factorization of a 512-bit RSA modulus

    NARCIS (Netherlands)

    S.H. Cavallar; W.M. Lioen (Walter); H.J.J. te Riele (Herman); B. Dodson; A.K. Lenstra (Arjen); P.L. Montgomery; B. Murphy

    2000-01-01

    textabstractOn August 22, 1999, we completed the factorization of the 512--bit 155--digit number RSA--155 with the help of the Number Field Sieve factoring method (NFS). This is a new record for factoring general numbers. Moreover, 512--bit RSA keys are frequently used for the protection of

  1. Efficient Bit-to-Symbol Likelihood Mappings

    Science.gov (United States)

    Moision, Bruce E.; Nakashima, Michael A.

    2010-01-01

    This innovation is an efficient algorithm designed to perform bit-to-symbol and symbol-to-bit likelihood mappings that represent a significant portion of the complexity of an error-correction code decoder for high-order constellations. Recent implementation of the algorithm in hardware has yielded an 8- percent reduction in overall area relative to the prior design.

  2. Hey! A Mosquito Bit Me! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Español Hey! A Mosquito Bit Me! KidsHealth / For Kids / Hey! A Mosquito Bit Me! Print en español ¡ ...

  3. Corrected RMS Error and Effective Number of Bits for Sinewave ADC Tests

    International Nuclear Information System (INIS)

    Jerome J. Blair

    2002-01-01

    A new definition is proposed for the effective number of bits of an ADC. This definition removes the variation in the calculated effective bits when the amplitude and offset of the sinewave test signal is slightly varied. This variation is most pronounced when test signals with amplitudes of a small number of code bin widths are applied to very low noise ADC's. The effectiveness of the proposed definition is compared with that of other proposed definitions over a range of signal amplitudes and noise levels

  4. High bit depth infrared image compression via low bit depth codecs

    DEFF Research Database (Denmark)

    Belyaev, Evgeny; Mantel, Claire; Forchhammer, Søren

    2017-01-01

    images via 8 bit depth codecs in the following way. First, an input 16 bit depth image is mapped into 8 bit depth images, e.g., the first image contains only the most significant bytes (MSB image) and the second one contains only the least significant bytes (LSB image). Then each image is compressed.......264/AVC codecs, which are usually available in efficient implementations, and compare their rate-distortion performance with JPEG2000, JPEG-XT and H.265/HEVC codecs supporting direct compression of infrared images in 16 bit depth format. A preliminary result shows that two 8 bit H.264/AVC codecs can...

  5. A deterministic width function model

    Directory of Open Access Journals (Sweden)

    C. E. Puente

    2003-01-01

    Full Text Available Use of a deterministic fractal-multifractal (FM geometric method to model width functions of natural river networks, as derived distributions of simple multifractal measures via fractal interpolating functions, is reported. It is first demonstrated that the FM procedure may be used to simulate natural width functions, preserving their most relevant features like their overall shape and texture and their observed power-law scaling on their power spectra. It is then shown, via two natural river networks (Racoon and Brushy creeks in the United States, that the FM approach may also be used to closely approximate existing width functions.

  6. Energy detection UWB system based on pulse width modulation

    Directory of Open Access Journals (Sweden)

    Song Cui

    2014-05-01

    Full Text Available A new energy detection ultra-wideband system based on pulse width modulation is proposed. The bit error rate (BER performance of this new system is slightly worst than that of a pulse position modulation (PPM system in additive white Gaussian noise channels. In multipath channels, this system does not suffer from cross-modulation interference as PPM, so it can achieve better BER performance than PPM when cross-modulation interference occurs. In addition, when synchronisation errors occur, this system is more robust than PPM.

  7. Bit-string scattering theory

    Energy Technology Data Exchange (ETDEWEB)

    Noyes, H.P.

    1990-01-29

    We construct discrete space-time coordinates separated by the Lorentz-invariant intervals h/mc in space and h/mc{sup 2} in time using discrimination (XOR) between pairs of independently generated bit-strings; we prove that if this space is homogeneous and isotropic, it can have only 1, 2 or 3 spacial dimensions once we have related time to a global ordering operator. On this space we construct exact combinatorial expressions for free particle wave functions taking proper account of the interference between indistinguishable alternative paths created by the construction. Because the end-points of the paths are fixed, they specify completed processes; our wave functions are born collapsed''. A convenient way to represent this model is in terms of complex amplitudes whose squares give the probability for a particular set of observable processes to be completed. For distances much greater than h/mc and times much greater than h/mc{sup 2} our wave functions can be approximated by solutions of the free particle Dirac and Klein-Gordon equations. Using a eight-counter paradigm we relate this construction to scattering experiments involving four distinguishable particles, and indicate how this can be used to calculate electromagnetic and weak scattering processes. We derive a non-perturbative formula relating relativistic bound and resonant state energies to mass ratios and coupling constants, equivalent to our earlier derivation of the Bohr relativistic formula for hydrogen. Using the Fermi-Yang model of the pion as a relativistic bound state containing a nucleon-antinucleon pair, we find that (G{sub {pi}N}{sup 2}){sup 2} = (2m{sub N}/m{sub {pi}}){sup 2} {minus} 1. 21 refs., 1 fig.

  8. Bit-string scattering theory

    International Nuclear Information System (INIS)

    Noyes, H.P.

    1990-01-01

    We construct discrete space-time coordinates separated by the Lorentz-invariant intervals h/mc in space and h/mc 2 in time using discrimination (XOR) between pairs of independently generated bit-strings; we prove that if this space is homogeneous and isotropic, it can have only 1, 2 or 3 spacial dimensions once we have related time to a global ordering operator. On this space we construct exact combinatorial expressions for free particle wave functions taking proper account of the interference between indistinguishable alternative paths created by the construction. Because the end-points of the paths are fixed, they specify completed processes; our wave functions are ''born collapsed''. A convenient way to represent this model is in terms of complex amplitudes whose squares give the probability for a particular set of observable processes to be completed. For distances much greater than h/mc and times much greater than h/mc 2 our wave functions can be approximated by solutions of the free particle Dirac and Klein-Gordon equations. Using a eight-counter paradigm we relate this construction to scattering experiments involving four distinguishable particles, and indicate how this can be used to calculate electromagnetic and weak scattering processes. We derive a non-perturbative formula relating relativistic bound and resonant state energies to mass ratios and coupling constants, equivalent to our earlier derivation of the Bohr relativistic formula for hydrogen. Using the Fermi-Yang model of the pion as a relativistic bound state containing a nucleon-antinucleon pair, we find that (G πN 2 ) 2 = (2m N /m π ) 2 - 1. 21 refs., 1 fig

  9. A new 12-bit spectroscopy analog-to-digital converter type SAA intended for CAMAC acquisition systems

    International Nuclear Information System (INIS)

    Borsuk, S.; Kulka, Z.

    1989-12-01

    A new 12-bit spectroscopy analog-to-digital converter (ADC) type SAA (Successive Approximation type with channel width Averaging) intended for CAMAC acquisition systems is decsribed. ADC type SAA initiates new series of spectroscopy ADC's based on a binary-approximation method in which differential nonlinearity is corrected by a statistical channel width averaging method. The structure and principle of operation, as well as some circuit realizations and specifications of the new converter are described. 41 refs., 5 figs. (author)

  10. BitPAl: a bit-parallel, general integer-scoring sequence alignment algorithm.

    Science.gov (United States)

    Loving, Joshua; Hernandez, Yozen; Benson, Gary

    2014-11-15

    Mapping of high-throughput sequencing data and other bulk sequence comparison applications have motivated a search for high-efficiency sequence alignment algorithms. The bit-parallel approach represents individual cells in an alignment scoring matrix as bits in computer words and emulates the calculation of scores by a series of logic operations composed of AND, OR, XOR, complement, shift and addition. Bit-parallelism has been successfully applied to the longest common subsequence (LCS) and edit-distance problems, producing fast algorithms in practice. We have developed BitPAl, a bit-parallel algorithm for general, integer-scoring global alignment. Integer-scoring schemes assign integer weights for match, mismatch and insertion/deletion. The BitPAl method uses structural properties in the relationship between adjacent scores in the scoring matrix to construct classes of efficient algorithms, each designed for a particular set of weights. In timed tests, we show that BitPAl runs 7-25 times faster than a standard iterative algorithm. Source code is freely available for download at http://lobstah.bu.edu/BitPAl/BitPAl.html. BitPAl is implemented in C and runs on all major operating systems. jloving@bu.edu or yhernand@bu.edu or gbenson@bu.edu Supplementary data are available at Bioinformatics online. © The Author 2014. Published by Oxford University Press.

  11. Along-strike structural variation and thermokinematic development of the Cenozoic Bitlis-Zagros fold-thrust belt, Turkey and Iraqi Kurdistan

    Science.gov (United States)

    Barber, Douglas E.; Stockli, Daniel F.; Koshnaw, Renas I.; Tamar-Agha, Mazin Y.; Yilmaz, Ismail O.

    2016-04-01

    The Bitlis-Zagros orogen in northern Iraq is a principal element of the Arabia-Eurasia continent collision and is characterized by the lateral intersection of two structural domains: the NW-SE trending Zagros proper system of Iran and the E-W trending Bitlis fold-thrust belt of Turkey and Syria. While these components in northern Iraq share a similar stratigraphic framework, they exhibit along-strike variations in the width and style of tectonic zones, fold morphology and trends, and structural inheritance. However, the distinctions of the Bitlis and Zagros segments remains poorly understood in terms of timing and deformation kinematics as well as first-order controls on fold-thrust development. Structural and stratigraphic study and seismic data combined with low-T thermochronometry provide the basis for reconstructions of the Bitlis-Zagros fold-thrust belt in southeastern Turkey and northern Iraq to elucidate the kinematic and temporal relationship of these two systems. Balanced cross-sections were constructed and incrementally restored to quantify the deformational evolution and use as input for thermokinematic models (FETKIN) to generate thermochronometric ages along the topographic surface of each cross-section line. The forward modeled thermochronometric ages from were then compared to new and previously published apatite and zircon (U-Th)/He and fission-track ages from southeastern Turkey and northern Iraq to test the validity of the timing, rate, and fault-motion geometry associated with each reconstruction. The results of these balanced theromokinematic restorations integrated with constraints from syn-tectonic sedimentation suggest that the Zagros belt between Erbil and Suleimaniyah was affected by an initial phase of Late Cretaceous exhumation related to the Proto-Zagros collision. During the main Zagros phase, deformation advanced rapidly and in-sequence from the Main Zagros Fault to the thin-skinned frontal thrusts (Kirkuk, Shakal, Qamar) from middle

  12. Bit Loading Algorithms for Cooperative OFDM Systems

    Directory of Open Access Journals (Sweden)

    Gui Bo

    2008-01-01

    Full Text Available Abstract We investigate the resource allocation problem for an OFDM cooperative network with a single source-destination pair and multiple relays. Assuming knowledge of the instantaneous channel gains for all links in the entire network, we propose several bit and power allocation schemes aiming at minimizing the total transmission power under a target rate constraint. First, an optimal and efficient bit loading algorithm is proposed when the relay node uses the same subchannel to relay the information transmitted by the source node. To further improve the performance gain, subchannel permutation, in which the subchannels are reallocated at relay nodes, is considered. An optimal subchannel permutation algorithm is first proposed and then an efficient suboptimal algorithm is considered to achieve a better complexity-performance tradeoff. A distributed bit loading algorithm is also proposed for ad hoc networks. Simulation results show that significant performance gains can be achieved by the proposed bit loading algorithms, especially when subchannel permutation is employed.

  13. FastBit: Interactively Searching Massive Data

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Kesheng; Ahern, Sean; Bethel, E. Wes; Chen, Jacqueline; Childs, Hank; Cormier-Michel, Estelle; Geddes, Cameron; Gu, Junmin; Hagen, Hans; Hamann, Bernd; Koegler, Wendy; Lauret, Jerome; Meredith, Jeremy; Messmer, Peter; Otoo, Ekow; Perevoztchikov, Victor; Poskanzer, Arthur; Prabhat,; Rubel, Oliver; Shoshani, Arie; Sim, Alexander; Stockinger, Kurt; Weber, Gunther; Zhang, Wei-Ming

    2009-06-23

    As scientific instruments and computer simulations produce more and more data, the task of locating the essential information to gain insight becomes increasingly difficult. FastBit is an efficient software tool to address this challenge. In this article, we present a summary of the key underlying technologies, namely bitmap compression, encoding, and binning. Together these techniques enable FastBit to answer structured (SQL) queries orders of magnitude faster than popular database systems. To illustrate how FastBit is used in applications, we present three examples involving a high-energy physics experiment, a combustion simulation, and an accelerator simulation. In each case, FastBit significantly reduces the response time and enables interactive exploration on terabytes of data.

  14. Bit Loading Algorithms for Cooperative OFDM Systems

    Directory of Open Access Journals (Sweden)

    Bo Gui

    2007-12-01

    Full Text Available We investigate the resource allocation problem for an OFDM cooperative network with a single source-destination pair and multiple relays. Assuming knowledge of the instantaneous channel gains for all links in the entire network, we propose several bit and power allocation schemes aiming at minimizing the total transmission power under a target rate constraint. First, an optimal and efficient bit loading algorithm is proposed when the relay node uses the same subchannel to relay the information transmitted by the source node. To further improve the performance gain, subchannel permutation, in which the subchannels are reallocated at relay nodes, is considered. An optimal subchannel permutation algorithm is first proposed and then an efficient suboptimal algorithm is considered to achieve a better complexity-performance tradeoff. A distributed bit loading algorithm is also proposed for ad hoc networks. Simulation results show that significant performance gains can be achieved by the proposed bit loading algorithms, especially when subchannel permutation is employed.

  15. Factorization of a 768-Bit RSA Modulus

    OpenAIRE

    Kleinjung, Thorsten; Aoki, Kazumaro; Franke, Jens; Lenstra, Arjen K.; Thome, Emmanuel; Bos, Joppe Willem; Gaudry, Pierrick; Kruppa, Alexander; Montgomery, Peter L.; Osvik, Dag Arne; Riele, Herman Te; Timofeev, Andrey; Zimmermann, Paul

    2010-01-01

    The original publication is available at www.springerlink.com; International audience; This paper reports on the factorization of the 768-bit number RSA-768 by the number field sieve factoring method and discusses some implications for RSA.

  16. Increasing the bit rate in OCDMA systems using pulse position modulation techniques.

    Science.gov (United States)

    Arbab, Vahid R; Saghari, Poorya; Haghi, Mahta; Ebrahimi, Paniz; Willner, Alan E

    2007-09-17

    We have experimentally demonstrated two novel pulse position modulation techniques, namely Double Pulse Position Modulation (2-PPM) and Differential Pulse Position Modulation (DPPM) in Time-Wavelength OCDMA systems that will operate at a higher bit rate compared to traditional OOK-OCDMA systems with the same bandwidth. With 2-PPM technique, the number of active users will be more than DPPM while their bit rate is almost the same. Both techniques provide variable quality of service in OCDMA networks.

  17. Quantum bit commitment with misaligned reference frames

    International Nuclear Information System (INIS)

    Harrow, Aram; Oliveira, Roberto; Terhal, Barbara M.

    2006-01-01

    Suppose that Alice and Bob define their coordinate axes differently, and the change of reference frame between them is given by a probability distribution μ over SO(3). We show that this uncertainty of reference frame is of no use for bit commitment when μ is uniformly distributed over a (sub)group of SO(3), but other choices of μ can give rise to a partially or even arbitrarily secure bit commitment

  18. Bit-Grooming: Shave Your Bits with Razor-sharp Precision

    Science.gov (United States)

    Zender, C. S.; Silver, J.

    2017-12-01

    Lossless compression can reduce climate data storage by 30-40%. Further reduction requires lossy compression that also reduces precision. Fortunately, geoscientific models and measurements generate false precision (scientifically meaningless data bits) that can be eliminated without sacrificing scientifically meaningful data. We introduce Bit Grooming, a lossy compression algorithm that removes the bloat due to false-precision, those bits and bytes beyond the meaningful precision of the data.Bit Grooming is statistically unbiased, applies to all floating point numbers, and is easy to use. Bit-Grooming reduces geoscience data storage requirements by 40-80%. We compared Bit Grooming to competitors Linear Packing, Layer Packing, and GRIB2/JPEG2000. The other compression methods have the edge in terms of compression, but Bit Grooming is the most accurate and certainly the most usable and portable.Bit Grooming provides flexible and well-balanced solutions to the trade-offs among compression, accuracy, and usability required by lossy compression. Geoscientists could reduce their long term storage costs, and show leadership in the elimination of false precision, by adopting Bit Grooming.

  19. Spherical bodies of constant width

    OpenAIRE

    Lassak, Marek; Musielak, Michał

    2018-01-01

    The intersection $L$ of two different non-opposite hemispheres $G$ and $H$ of a $d$-dimensional sphere $S^d$ is called a lune. By the thickness of $L$ we mean the distance of the centers of the $(d-1)$-dimensional hemispheres bounding $L$. For a hemisphere $G$ supporting a %spherical convex body $C \\subset S^d$ we define ${\\rm width}_G(C)$ as the thickness of the narrowest lune or lunes of the form $G \\cap H$ containing $C$. If ${\\rm width}_G(C) =w$ for every hemisphere $G$ supporting $C$, we...

  20. High bit depth infrared image compression via low bit depth codecs

    Science.gov (United States)

    Belyaev, Evgeny; Mantel, Claire; Forchhammer, Søren

    2017-08-01

    Future infrared remote sensing systems, such as monitoring of the Earth's environment by satellites, infrastructure inspection by unmanned airborne vehicles etc., will require 16 bit depth infrared images to be compressed and stored or transmitted for further analysis. Such systems are equipped with low power embedded platforms where image or video data is compressed by a hardware block called the video processing unit (VPU). However, in many cases using two 8-bit VPUs can provide advantages compared with using higher bit depth image compression directly. We propose to compress 16 bit depth images via 8 bit depth codecs in the following way. First, an input 16 bit depth image is mapped into 8 bit depth images, e.g., the first image contains only the most significant bytes (MSB image) and the second one contains only the least significant bytes (LSB image). Then each image is compressed by an image or video codec with 8 bits per pixel input format. We analyze how the compression parameters for both MSB and LSB images should be chosen to provide the maximum objective quality for a given compression ratio. Finally, we apply the proposed infrared image compression method utilizing JPEG and H.264/AVC codecs, which are usually available in efficient implementations, and compare their rate-distortion performance with JPEG2000, JPEG-XT and H.265/HEVC codecs supporting direct compression of infrared images in 16 bit depth format. A preliminary result shows that two 8 bit H.264/AVC codecs can achieve similar result as 16 bit HEVC codec.

  1. Stochastic p -Bits for Invertible Logic

    Science.gov (United States)

    Camsari, Kerem Yunus; Faria, Rafatul; Sutton, Brian M.; Datta, Supriyo

    2017-07-01

    Conventional semiconductor-based logic and nanomagnet-based memory devices are built out of stable, deterministic units such as standard metal-oxide semiconductor transistors, or nanomagnets with energy barriers in excess of ≈40 - 60 kT . In this paper, we show that unstable, stochastic units, which we call "p -bits," can be interconnected to create robust correlations that implement precise Boolean functions with impressive accuracy, comparable to standard digital circuits. At the same time, they are invertible, a unique property that is absent in standard digital circuits. When operated in the direct mode, the input is clamped, and the network provides the correct output. In the inverted mode, the output is clamped, and the network fluctuates among all possible inputs that are consistent with that output. First, we present a detailed implementation of an invertible gate to bring out the key role of a single three-terminal transistorlike building block to enable the construction of correlated p -bit networks. The results for this specific, CMOS-assisted nanomagnet-based hardware implementation agree well with those from a universal model for p -bits, showing that p -bits need not be magnet based: any three-terminal tunable random bit generator should be suitable. We present a general algorithm for designing a Boltzmann machine (BM) with a symmetric connection matrix [J ] (Ji j=Jj i) that implements a given truth table with p -bits. The [J ] matrices are relatively sparse with a few unique weights for convenient hardware implementation. We then show how BM full adders can be interconnected in a partially directed manner (Ji j≠Jj i) to implement large logic operations such as 32-bit binary addition. Hundreds of stochastic p -bits get precisely correlated such that the correct answer out of 233 (≈8 ×1 09) possibilities can be extracted by looking at the statistical mode or majority vote of a number of time samples. With perfect directivity (Jj i=0 ) a small

  2. An efficient parallel pseudorandom bit generator based on an ...

    Indian Academy of Sciences (India)

    bit sequences pass all of the NIST SP800-22 statistical tests. ... local map, the chaotic behaviours of which depend only on the local map parameter, ..... 3, 4, ..., N. Thus, one-bit change of a 64-bit IV can result in 8(N − 2) + 1 bits change for 32N ...

  3. High bit depth infrared image compression via low bit depth codecs

    DEFF Research Database (Denmark)

    Belyaev, Evgeny; Mantel, Claire; Forchhammer, Søren

    .264/AVC codecs, which are usually available in efficient implementations, and compare their rate-distortion performance with JPEG2000, JPEG-XT and H.265/HEVC codecs supporting direct compression of infrared images in 16 bit depth format. A preliminary result shows that two 8 bit H.264/AVC codecs can...

  4. Bits extraction for palmprint template protection with Gabor magnitude and multi-bit quantization

    NARCIS (Netherlands)

    Mu, Meiru; Shao, X.; Ruan, Qiuqi; Spreeuwers, Lieuwe Jan; Veldhuis, Raymond N.J.

    2013-01-01

    In this paper, we propose a method of fixed-length binary string extraction (denoted by LogGM_DROBA) from low-resolution palmprint image for developing palmprint template protection technology. In order to extract reliable (stable and discriminative) bits, multi-bit equal-probability-interval

  5. Ultra low bit-rate speech coding

    CERN Document Server

    Ramasubramanian, V

    2015-01-01

    "Ultra Low Bit-Rate Speech Coding" focuses on the specialized topic of speech coding at very low bit-rates of 1 Kbits/sec and less, particularly at the lower ends of this range, down to 100 bps. The authors set forth the fundamental results and trends that form the basis for such ultra low bit-rates to be viable and provide a comprehensive overview of various techniques and systems in literature to date, with particular attention to their work in the paradigm of unit-selection based segment quantization. The book is for research students, academic faculty and researchers, and industry practitioners in the areas of speech processing and speech coding.

  6. Bit-padding information guided channel hopping

    KAUST Repository

    Yang, Yuli

    2011-02-01

    In the context of multiple-input multiple-output (MIMO) communications, we propose a bit-padding information guided channel hopping (BP-IGCH) scheme which breaks the limitation that the number of transmit antennas has to be a power of two based on the IGCH concept. The proposed scheme prescribes different bit-lengths to be mapped onto the indices of the transmit antennas and then uses padding technique to avoid error propagation. Numerical results and comparisons, on both the capacity and the bit error rate performances, are provided and show the advantage of the proposed scheme. The BP-IGCH scheme not only offers lower complexity to realize the design flexibility, but also achieves better performance. © 2011 IEEE.

  7. Introduction to bit slices and microprogramming

    International Nuclear Information System (INIS)

    Van Dam, A.

    1981-01-01

    Bit-slice logic blocks are fourth-generation LSI components which are natural extensions of traditional mulitplexers, registers, decoders, counters, ALUs, etc. Their functionality is controlled by microprogramming, typically to implement CPUs and peripheral controllers where both speed and easy programmability are required for flexibility, ease of implementation and debugging, etc. Processors built from bit-slice logic give the designer an alternative for approaching the programmibility of traditional fixed-instruction-set microprocessors with a speed closer to that of hardwired random logic. (orig.)

  8. On the maximal diphoton width

    CERN Document Server

    Salvio, Alberto; Strumia, Alessandro; Urbano, Alfredo

    2016-01-01

    Motivated by the 750 GeV diphoton excess found at LHC, we compute the maximal width into $\\gamma\\gamma$ that a neutral scalar can acquire through a loop of charged fermions or scalars as function of the maximal scale at which the theory holds, taking into account vacuum (meta)stability bounds. We show how an extra gauge symmetry can qualitatively weaken such bounds, and explore collider probes and connections with Dark Matter.

  9. Effect of step width manipulation on tibial stress during running.

    Science.gov (United States)

    Meardon, Stacey A; Derrick, Timothy R

    2014-08-22

    Narrow step width has been linked to variables associated with tibial stress fracture. The purpose of this study was to evaluate the effect of step width on bone stresses using a standardized model of the tibia. 15 runners ran at their preferred 5k running velocity in three running conditions, preferred step width (PSW) and PSW±5% of leg length. 10 successful trials of force and 3-D motion data were collected. A combination of inverse dynamics, musculoskeletal modeling and beam theory was used to estimate stresses applied to the tibia using subject-specific anthropometrics and motion data. The tibia was modeled as a hollow ellipse. Multivariate analysis revealed that tibial stresses at the distal 1/3 of the tibia differed with step width manipulation (p=0.002). Compression on the posterior and medial aspect of the tibia was inversely related to step width such that as step width increased, compression on the surface of tibia decreased (linear trend p=0.036 and 0.003). Similarly, tension on the anterior surface of the tibia decreased as step width increased (linear trend p=0.029). Widening step width linearly reduced shear stress at all 4 sites (pstresses experienced by the tibia during running were influenced by step width when using a standardized model of the tibia. Wider step widths were generally associated with reduced loading of the tibia and may benefit runners at risk of or experiencing stress injury at the tibia, especially if they present with a crossover running style. Copyright © 2014 Elsevier Ltd. All rights reserved.

  10. Entropy of a bit-shift channel

    NARCIS (Netherlands)

    Baggen, Stan; Balakirsky, Vladimir; Denteneer, Dee; Egner, Sebastian; Hollmann, Henk; Tolhuizen, Ludo; Verbitskiy, Evgeny

    2006-01-01

    We consider a simple transformation (coding) of an iid source called a bit-shift channel. This simple transformation occurs naturally in magnetic or optical data storage. The resulting process is not Markov of any order. We discuss methods of computing the entropy of the transformed process, and

  11. An efficient parallel pseudorandom bit generator based

    Indian Academy of Sciences (India)

    In this paper, an asymmetric coupled map lattice (CML) combining sawtooth map as a local map is presented and its chaotic behaviours are analysed. Based on this asymmetric CML, a pseudorandom bit generator (PRBG) is proposed. The specific parameters of the system that make complicated floating-point computation ...

  12. Linear, Constant-rounds Bit-decomposition

    DEFF Research Database (Denmark)

    Reistad, Tord; Toft, Tomas

    2010-01-01

    When performing secure multiparty computation, tasks may often be simple or difficult depending on the representation chosen. Hence, being able to switch representation efficiently may allow more efficient protocols. We present a new protocol for bit-decomposition: converting a ring element x ∈ ℤ M...

  13. Masses, widths, and leptonic widths of the higher upsilon resonances

    International Nuclear Information System (INIS)

    Lovelock, D.M.J.; Horstkotte, J.E.; Klopfenstein, C.

    1985-01-01

    The masses, total widths, and leptonic widths of three triplet s-wave bb-bar states UPSILON(4S), UPSILON(5S), and UPSILON(6S) are determined from measurements of the e + e - annihilation cross section into hadrons for 10.55< W<11.25 GeV. The resonances are identified from potential model results and their properties are obtained with the help of a simplified coupled-channels calculation. We find M(4S) = 10.577 GeV, GAMMA(4S) = 25 MeV, GAMMA/sub e/e(4S) = 0.28 keV; M(5S) = 10.845 GeV, GAMMA(5S) = 110 MeV, GAMMA/sub e/e(5S) = 0.37 keV; M(6S) = 11.02 GeV, GAMMA(6S) = 90 MeV, GAMMA/sub e/e(6S) = 0.16 keV

  14. Masses, widths and leptonic widths of the higher upsilon resonances

    International Nuclear Information System (INIS)

    Klopfenstein, C.; Lovelock, D.M.J.; Horstkotte, J.E.

    1985-01-01

    The masses, total widths and leptonic widths of three triplet s-wave bb-bar states Υ(4S), Υ(5S) and Υ(6S) are determined by unfolding the cross section features observed in the hadronic cross section in the √s region betweeen 10.55 to 11.25 GeV. Both the identification of the resonances and the deduction of their properties rely on the validity of potential models' description of heavy quarkonium states which lie close (<0.6 GeV) to the open flavor threshold. The authors find M(4S) = 10.5774 +- 0.0008 GeV, Γ(4S) = 23 +- 2.3 MeV, Γ/sub ee/(4S) = 0.28 +- 0.04 keV; M(5S) = 10.845 +- 0.02 GeV, Γ(5S) = 110 +- 15 MeV, Γ/sub ee/(5S) = 0.37 +- 0.06 keV; M(6S) = 11.02 +- 0.03 GeV, Γ(6S) = 90 +- 20 MeV, Γ/sub ee/(6S) = 0.16 +- 0.04 keV. All errors are statistical only

  15. Line Width Recovery after Vectorization of Engineering Drawings

    Directory of Open Access Journals (Sweden)

    Gramblička Matúš

    2016-12-01

    Full Text Available Vectorization is the conversion process of a raster image representation into a vector representation. The contemporary commercial vectorization software applications do not provide sufficiently high quality outputs for such images as do mechanical engineering drawings. Line width preservation is one of the problems. There are applications which need to know the line width after vectorization because this line attribute carries the important semantic information for the next 3D model generation. This article describes the algorithm that is able to recover line width of individual lines in the vectorized engineering drawings. Two approaches are proposed, one examines the line width at three points, whereas the second uses a variable number of points depending on the line length. The algorithm is tested on real mechanical engineering drawings.

  16. Tourniquet pressures: strap width and tensioning system widths.

    Science.gov (United States)

    Wall, Piper L; Coughlin, Ohmar; Rometti, Mary; Birkholz, Sarah; Gildemaster, Yvonne; Grulke, Lisa; Sahr, Sheryl; Buising, Charisse M

    2014-01-01

    Pressure distribution over tourniquet width is a determinant of pressure needed for arterial occlusion. Different width tensioning systems could result in arterial occlusion pressure differences among nonelastic strap designs of equal width. Ratcheting Medical Tourniquets (RMTs; m2 inc., http://www.ratcheting buckles.com) with a 1.9 cm-wide (Tactical RMT) or 2.3 cm-wide (Mass Casualty RMT) ladder were directly compared (16 recipients, 16 thighs and 16 upper arms for each tourniquetx2). Then, RMTs were retrospectively compared with the windlass Combat Application Tourniquet (C-A-T ["CAT"], http://combattourniquet.com) with a 2.5 cm-wide internal tensioning strap. Pressure was measured with an air-filled No. 1 neonatal blood pressure cuff under each 3.8 cm-wide tourniquet. RMT circumferential pressure distribution was not uniform. Tactical RMT pressures were not higher, and there were no differences between the RMTs in the effectiveness, ease of use ("97% easy"), or discomfort. However, a difference did occur regarding tooth skipping of the pawl during ratchet advancement: it occurred in 1 of 64 Tactical RMT applications versus 27 of 64 Mass Casualty RMT applications. CAT and RMT occlusion pressures were frequently over 300 mmHg. RMT arm occlusion pressures (175-397 mmHg), however, were lower than RMT thigh occlusion pressures (197-562 mmHg). RMT effectiveness was better with 99% reached occlusion and 1% lost occlusion over 1 minute versus the CAT with 95% reached occlusion and 28% lost occlusion over 1 minute. RMT muscle tension changes (up to 232 mmHg) and pressure losses over 1 minute (24±11 mmHg arm under strap to 40±12 mmHg thigh under ladder) suggest more occlusion losses may have occurred if tourniquet duration was extended. The narrower tensioning system Tactical RMT has better performance characteristics than the Mass Casualty RMT. The 3.8 cm-wide RMTs have some pressure and effectiveness similarities and differences compared with the CAT. Clinically

  17. Supersymmetric quantum mechanics for string-bits

    International Nuclear Information System (INIS)

    Thorn, C.B.

    1997-01-01

    The authors develop possible versions of supersymmetric single particle quantum mechanics, with application to superstring-bit models in view. The authors focus principally on space dimensions d = 1,2,4,8, the transverse dimensionalities of superstring in 3, 4, 7, 10 space-time dimensions. These are the cases for which classical superstring makes sense, and also the values of d for which Hooke's force law is compatible with the simplest superparticle dynamics. The basic question they address is: when is it possible to replace such harmonic force laws with more general ones, including forces which vanish at large distances? This is an important question because forces between string-bits that do not fall off with distance will almost certainly destroy cluster decomposition. They show that the answer is affirmative for d = 1,2, negative for d = 8, and so far inconclusive for d = 4

  18. Quantitative Analysis of Memristance Defined Exponential Model for Multi-bits Titanium Dioxide Memristor Memory Cell

    Directory of Open Access Journals (Sweden)

    DAOUD, A. A. D.

    2016-05-01

    Full Text Available The ability to store multiple bits in a single memristor based memory cell is a key feature for high-capacity memory packages. Studying multi-bit memristor circuits requires high accuracy in modelling the memristance change. A memristor model based on a novel definition of memristance is proposed. A design of a single memristor memory cell using the proposed model for the platinum electrodes titanium dioxide memristor is illustrated. A specific voltage pulse is used with varying its parameters (amplitude or pulse width to store different number of states in a single memristor. New state variation parameters associated with the utilized model are provided and their effects on write and read processes of memristive multi-states are analysed. PSPICE simulations are also held, and they show a good agreement with the data obtained from the analysis.

  19. Feasibility of bit patterned media for HAMR at 5 Tb/in{sup 2}

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Sumei, E-mail: wang3936@umn.edu; Ghoreyshi, Ali; Victora, R. H. [MINT, Department of Electrical and Computer Engineering, University of Minnesota, Minneapolis, Minnesota 55455 (United States)

    2015-05-07

    We have investigated the feasibility of BPM for HAMR via Finite Difference Time Domain and atomistic simulation and we have substantiated the feasibility of 5 Tb/in{sup 2} with two filling factors 25% and 56% even when the maximum on-track bit temperature is below the Curie temperature. The success of this underheated switching is attributed to sufficiently low anisotropy instead of reduction of Curie temperature. The temperature gradient in the cross-track direction is almost doubled if the optical head width is reduced by half, indicating the possibility of higher areal densities. Moreover, contrary to continuous media, we also found that the power absorption peaks at the bottom of the bit patterned FePt when the media is illuminated from above, which is probably due to stronger coupling there between FePt and the surrounding materials.

  20. Acquisition and Retaining Granular Samples via a Rotating Coring Bit

    Science.gov (United States)

    Bar-Cohen, Yoseph; Badescu, Mircea; Sherrit, Stewart

    2013-01-01

    This device takes advantage of the centrifugal forces that are generated when a coring bit is rotated, and a granular sample is entered into the bit while it is spinning, making it adhere to the internal wall of the bit, where it compacts itself into the wall of the bit. The bit can be specially designed to increase the effectiveness of regolith capturing while turning and penetrating the subsurface. The bit teeth can be oriented such that they direct the regolith toward the bit axis during the rotation of the bit. The bit can be designed with an internal flute that directs the regolith upward inside the bit. The use of both the teeth and flute can be implemented in the same bit. The bit can also be designed with an internal spiral into which the various particles wedge. In another implementation, the bit can be designed to collect regolith primarily from a specific depth. For that implementation, the bit can be designed such that when turning one way, the teeth guide the regolith outward of the bit and when turning in the opposite direction, the teeth will guide the regolith inward into the bit internal section. This mechanism can be implemented with or without an internal flute. The device is based on the use of a spinning coring bit (hollow interior) as a means of retaining granular sample, and the acquisition is done by inserting the bit into the subsurface of a regolith, soil, or powder. To demonstrate the concept, a commercial drill and a coring bit were used. The bit was turned and inserted into the soil that was contained in a bucket. While spinning the bit (at speeds of 600 to 700 RPM), the drill was lifted and the soil was retained inside the bit. To prove this point, the drill was turned horizontally, and the acquired soil was still inside the bit. The basic theory behind the process of retaining unconsolidated mass that can be acquired by the centrifugal forces of the bit is determined by noting that in order to stay inside the interior of the bit, the

  1. Single Bit Radar Systems for Digital Integration

    OpenAIRE

    Bjørndal, Øystein

    2017-01-01

    Small, low cost, radar systems have exciting applications in monitoring and imaging for the industrial, healthcare and Internet of Things (IoT) sectors. We here explore, and show the feasibility of, several single bit square wave radar architectures; that benefits from the continuous improvement in digital technologies for system-on-chip digital integration. By analysis, simulation and measurements we explore novel and harmonic-rich continuous wave (CW), stepped-frequency CW (SFCW) and freque...

  2. Development of an RSFQ 4-bit ALU

    International Nuclear Information System (INIS)

    Kim, J. Y.; Baek, S. H.; Kim, S. H.; Kang, K. R.; Jung, K. R.; Lim, H. Y.; Park, J. H.; Han, T. S.

    2005-01-01

    We have developed and tested an RSFQ 4-bit Arithmetic Logic Unit (ALU) based on half adder cells and de switches. ALU is a core element of a computer processor that performs arithmetic and logic operations on the operands in computer instruction words. The designed ALU had limited operation functions of OR, AND, XOR, and ADD. It had a pipeline structure. We have simulated the circuit by using Josephson circuit simulation tools in order to reduce the timing problem, and confirmed the correct operation of the designed ALU. We used simulation tools of XIC TM ,WRspice TM , and Julia. The fabricated 4-bit ALU circuit had a size of 3000 calum X 1500, and the chip size was 5 mm X 5 mm. The test speeds were 1000 kHz and 5 GHz. For high-speed test, we used an eye-diagram technique. Our 4-bit ALU operated correctly up to 5 GHz clock frequency. The chip was tested at the liquid-helium temperature.

  3. Drilling bits for deep drilling and process for their manufacture

    Energy Technology Data Exchange (ETDEWEB)

    Rhode, H.; Juergens, R.; Feenstra, R.; Busking, B.E.

    1978-11-30

    The invention concerns a drilling head or a drilling bit for use in deep drilling in underground formations and particularly concerns a drilling bit with a drilling bit body, which has a shank and a hollow space, which is connected with a duct extending through the shank. The drilling bit body has several separate cutting elements for removing material from the floor of a borehole and hydraulic devices for cooling and/or cleaning the cutting elements are provided.

  4. Lathe tool bit and holder for machining fiberglass materials

    Science.gov (United States)

    Winn, L. E. (Inventor)

    1972-01-01

    A lathe tool and holder combination for machining resin impregnated fiberglass cloth laminates is described. The tool holder and tool bit combination is designed to accommodate a conventional carbide-tipped, round shank router bit as the cutting medium, and provides an infinite number of cutting angles in order to produce a true and smooth surface in the fiberglass material workpiece with every pass of the tool bit. The technique utilizes damaged router bits which ordinarily would be discarded.

  5. Method to manufacture bit patterned magnetic recording media

    Science.gov (United States)

    Raeymaekers, Bart; Sinha, Dipen N

    2014-05-13

    A method to increase the storage density on magnetic recording media by physically separating the individual bits from each other with a non-magnetic medium (so-called bit patterned media). This allows the bits to be closely packed together without creating magnetic "cross-talk" between adjacent bits. In one embodiment, ferromagnetic particles are submerged in a resin solution, contained in a reservoir. The bottom of the reservoir is made of piezoelectric material.

  6. Comparison of Arch Width Changes Following Orthodontic ...

    African Journals Online (AJOL)

    2015-11-21

    Nov 21, 2015 ... Materials and Methods: The study was conducted with pre- and post-treatment digital models from ... or posterior arch width following orthodontic treatment ..... premolar extraction cases show significant arch width increases in ...

  7. Bit selection using field drilling data and mathematical investigation

    Science.gov (United States)

    Momeni, M. S.; Ridha, S.; Hosseini, S. J.; Meyghani, B.; Emamian, S. S.

    2018-03-01

    A drilling process will not be complete without the usage of a drill bit. Therefore, bit selection is considered to be an important task in drilling optimization process. To select a bit is considered as an important issue in planning and designing a well. This is simply because the cost of drilling bit in total cost is quite high. Thus, to perform this task, aback propagation ANN Model is developed. This is done by training the model using several wells and it is done by the usage of drilling bit records from offset wells. In this project, two models are developed by the usage of the ANN. One is to find predicted IADC bit code and one is to find Predicted ROP. Stage 1 was to find the IADC bit code by using all the given filed data. The output is the Targeted IADC bit code. Stage 2 was to find the Predicted ROP values using the gained IADC bit code in Stage 1. Next is Stage 3 where the Predicted ROP value is used back again in the data set to gain Predicted IADC bit code value. The output is the Predicted IADC bit code. Thus, at the end, there are two models that give the Predicted ROP values and Predicted IADC bit code values.

  8. A CAMAC display module for fast bit-mapped graphics

    International Nuclear Information System (INIS)

    Abdel-Aal, R.E.

    1992-01-01

    In many data acquisition and analysis facilities for nuclear physics research, utilities for the display of two-dimensional (2D) images and spectra on graphics terminals suffer from low speed, poor resolution, and limit accuracy. Developed of CAMAC bit-mapped graphics modules for this purpose has been discouraged in the past by the large device count needed and the long times required to load the image data from the host computer into the CAMAC hardware; particularly since many such facilities have been designed to support fast DMA block transfers only for data acquisition into the host. This paper describes the design and implementation of a prototype CAMAC graphics display module with a resolution of 256x256 pixels at eight colours for which all components can be easily accommodated in a single-width package. Employed is a hardware technique which reduces the number of programmed CAMAC data transfer operations needed for writing 2D images into the display memory by approximately an order of magnitude, with attendant improvements in the display speed and CPU time consumption. Hardware and software details are given together with sample results. Information on the performance of the module in a typical VAX/MBD data acquisition environment is presented, including data on the mutual effects of simultaneous data acquisition traffic. Suggestions are made for further improvements in performance. (orig.)

  9. A facile approach for screening isolated nanomagnetic behavior for bit-patterned media

    International Nuclear Information System (INIS)

    Thiyagarajah, Naganivetha; Ng, Vivian; Asbahi, Mohamed; Yakovlev, Nikolai L; Yang, Joel K W; Wong, Rick T J; Low, Kendrick W M

    2014-01-01

    Bit-patterned media (BPM) fabricated by the direct deposition of magnetic material onto prepatterned arrays of nanopillars is a promising approach for increasing magnetic recording of areal density. One of the key challenges of this approach is to identify and control the magnetic interaction between the bits (on top of the nanopillars) and the trench material between the pillars. Using independent techniques, including magnetic force microscopy, the variable-angle magneto-optic Kerr effect, and remanence curves, we were able to determine the presence and relative intensities of exchange and dipolar interactions in Co-Pd multilayer-based BPM fabricated by direct deposition. We found that for pitches of 30 nm or less, there were negligible exchange interactions, and the bits were found to be magnetically isolated. As we move to higher densities, the absence of exchange interactions indicates that direct deposition is a promising approach to BPM fabrication. (papers)

  10. Image processing on the image with pixel noise bits removed

    Science.gov (United States)

    Chuang, Keh-Shih; Wu, Christine

    1992-06-01

    Our previous studies used statistical methods to assess the noise level in digital images of various radiological modalities. We separated the pixel data into signal bits and noise bits and demonstrated visually that the removal of the noise bits does not affect the image quality. In this paper we apply image enhancement techniques on noise-bits-removed images and demonstrate that the removal of noise bits has no effect on the image property. The image processing techniques used are gray-level look up table transformation, Sobel edge detector, and 3-D surface display. Preliminary results show no noticeable difference between original image and noise bits removed image using look up table operation and Sobel edge enhancement. There is a slight enhancement of the slicing artifact in the 3-D surface display of the noise bits removed image.

  11. Geneva University - Superconducting flux quantum bits: fabricated quantum objects

    CERN Multimedia

    2007-01-01

    Ecole de physique Département de physique nucléaire et corspusculaire 24, Quai Ernest-Ansermet 1211 GENEVE 4 Tél: (022) 379 62 73 Fax: (022) 379 69 92 Lundi 29 janvier 2007 COLLOQUE DE LA SECTION DE PHYSIQUE 17 heures - Auditoire Stueckelberg Superconducting flux quantum bits: fabricated quantum objects Prof. Hans Mooij / Kavli Institute of Nanoscience, Delft University of Technology The quantum conjugate variables of a superconductor are the charge or number of Cooper pairs, and the phase of the order parameter. In circuits that contain small Josephson junctions, these quantum properties can be brought forward. In Delft we study so-called flux qubits, superconducting rings that contain three small Josephson junctions. When a magnetic flux of half a flux quantum is applied to the loop, there are two states with opposite circulating current. For suitable junction parameters, a quantum superposition of those macroscopic states is possible. Transitions can be driven with resonant microwaves. These quantum ...

  12. Investigation of PDC bit failure base on stick-slip vibration analysis of drilling string system plus drill bit

    Science.gov (United States)

    Huang, Zhiqiang; Xie, Dou; Xie, Bing; Zhang, Wenlin; Zhang, Fuxiao; He, Lei

    2018-03-01

    The undesired stick-slip vibration is the main source of PDC bit failure, such as tooth fracture and tooth loss. So, the study of PDC bit failure base on stick-slip vibration analysis is crucial to prolonging the service life of PDC bit and improving ROP (rate of penetration). For this purpose, a piecewise-smooth torsional model with 4-DOF (degree of freedom) of drilling string system plus PDC bit is proposed to simulate non-impact drilling. In this model, both the friction and cutting behaviors of PDC bit are innovatively introduced. The results reveal that PDC bit is easier to fail than other drilling tools due to the severer stick-slip vibration. Moreover, reducing WOB (weight on bit) and improving driving torque can effectively mitigate the stick-slip vibration of PDC bit. Therefore, PDC bit failure can be alleviated by optimizing drilling parameters. In addition, a new 4-DOF torsional model is established to simulate torsional impact drilling and the effect of torsional impact on PDC bit's stick-slip vibration is analyzed by use of an engineering example. It can be concluded that torsional impact can mitigate stick-slip vibration, prolonging the service life of PDC bit and improving drilling efficiency, which is consistent with the field experiment results.

  13. 0.5 V and 0.43 pJ/bit Capacitive Sensor Interface for Passive Wireless Sensor Systems.

    Science.gov (United States)

    Beriain, Andoni; Gutierrez, Iñigo; Solar, Hector; Berenguer, Roc

    2015-08-28

    This paper presents an ultra low-power and low-voltage pulse-width modulation based ratiometric capacitive sensor interface. The interface was designed and fabricated in a standard 90 nm CMOS 1P9M technology. The measurements show an effective resolution of 10 bits using 0.5 V of supply voltage. The active occupied area is only 0.0045 mm2 and the Figure of Merit (FOM), which takes into account the energy required per conversion bit, is 0.43 pJ/bit. Furthermore, the results show low sensitivity to PVT variations due to the proposed ratiometric architecture. In addition, the sensor interface was connected to a commercial pressure transducer and the measurements of the resulting complete pressure sensor show a FOM of 0.226 pJ/bit with an effective linear resolution of 7.64 bits. The results validate the use of the proposed interface as part of a pressure sensor, and its low-power and low-voltage characteristics make it suitable for wireless sensor networks and low power consumer electronics.

  14. Supersymmetric quantum mechanics for string bits

    International Nuclear Information System (INIS)

    Thorn, C.B.

    1997-01-01

    We develop possible versions of supersymmetric single-particle quantum mechanics, with application to superstring-bit models in view. We focus principally on space dimensions d=1,2,4,8, the transverse dimensionalities of superstring in 3, 4, 6, and 10 space-time dimensions. These are the cases for which open-quotes classicalclose quotes superstring makes sense, and also the values of d for which Hooke close-quote s force law is compatible with the simplest superparticle dynamics. The basic question we address is the following: When is it possible to replace such harmonic force laws with more general ones, including forces which vanish at large distances? This is an important question because forces between string bits that do not fall off with distance will almost certainly destroy cluster decomposition. We show that the answer is affirmative for d=1,2, negative for d=8, and so far inconclusive for d=4. copyright 1997 The American Physical Society

  15. Variable dislocation widths in colloidal crystals of soft thermosensitive spheres

    OpenAIRE

    Hilhorst, J.; Petukhov, A.V.

    2011-01-01

    Themagnetic and structural properties of a cobalt inverse opal-like crystal have been studied by a combination of complementary techniques ranging from polarized neutron scattering and superconducting quantum interference device (SQUID) magnetometry to x-ray diffraction. Microradian small-angle x-ray diffraction shows that the inverse opal-like structure (OLS) synthesized by the electrochemical method fully duplicates the threedimensional net of voids of the template artificial opal. The inve...

  16. Variable dislocation widths in colloidal crystals of soft thermosensitive spheres

    NARCIS (Netherlands)

    Hilhorst, J.; Petukhov, A.V.

    2011-01-01

    Themagnetic and structural properties of a cobalt inverse opal-like crystal have been studied by a combination of complementary techniques ranging from polarized neutron scattering and superconducting quantum interference device (SQUID) magnetometry to x-ray diffraction. Microradian small-angle

  17. Comparing Fixed and Variable-Width Gaussian Networks

    Czech Academy of Sciences Publication Activity Database

    Kůrková, Věra; Kainen, P.C.

    2014-01-01

    Roč. 57, September (2014), s. 23-28 ISSN 0893-6080 R&D Projects: GA MŠk(CZ) LD13002 Institutional support: RVO:67985807 Keywords : Gaussian radial and kernel networks * Functionally equivalent networks * Universal approximators * Stabilizers defined by Gaussian kernels * Argminima of error functionals Subject RIV: IN - Informatics, Computer Science Impact factor: 2.708, year: 2014

  18. Stream Width Dynamics in a Small Headwater Catchment

    Science.gov (United States)

    Barefoot, E. A.; Pavelsky, T.; Allen, G. H.; Zimmer, M. A.; McGlynn, B. L.

    2016-12-01

    Changing streamflow conditions cause small, ephemeral and intermittent stream networks to expand and contract, while simultaneously driving widening and narrowing of streams. The resulting dynamic surface area of ephemeral streams impacts critical hydrological and biogeochemical processes, including air-water gas exchange, solute transport, and sediment transport. Despite the importance of these dynamics, to our knowledge there exists no complete study of how stream widths vary throughout an entire catchment in response to changing streamflow conditions. Here we present the first characterization of how variable hydrologic conditions impact the distribution of stream widths in a 48 ha headwater catchment in the Stony Creek Research Watershed, NC, USA. We surveyed stream widths longitudinally every 5 m on 12 occasions over a range of stream discharge from 7 L/s to 128 L/s at the catchment outlet. We hypothesize that the shape and location of the stream width distribution are driven by the action of two interrelated mechanisms, network extension and at-a-station widening, both of which increase with discharge. We observe that during very low flow conditions, network extension more significantly influences distribution location, and during high flow conditions stream widening is the dominant driver. During moderate flows, we observe an approximately 1 cm rightward shift in the distribution peak with every additional 10 L/s of increased discharge, which we attribute to a greater impact of at-a-station widening on distribution location. Aside from this small shift, the qualitative location and shape of the stream width distribution are largely invariant with changing streamflow. We suggest that the basic characteristics of stream width distributions constitute an equilibrium between the two described mechanisms across variable hydrologic conditions.

  19. Comparison of 12-bit and 8-bit gray scale resolution in MR imaging of the CNS

    International Nuclear Information System (INIS)

    Smith, H.J.; Bakke, S.J.; Smevik, B.; Hald, J.K.; Moen, G.; Rudenhed, B.; Abildgaard, A.

    1992-01-01

    A reduction in gray scale resolution of digital images from 12 to 8 bits per pixel usually means halving the storage space needed for the images. Theoretically, important diagnostic information may be lost in the process. We compared the sensitivity and specificity achieved by 4 radiologists in reading laser-printed films of original 12-bit MR images and cathode ray tube displays of the same images which had been compressed to 8 bits per pixel using a specially developed computer program. Receiver operating characteristics (ROC) curves showed no significant differences between film reading and screen reading. A paired 2-tailed t-test, applied on the data for actually positive cases, showed that the combined, average performance of the reviewers was significantly better at screen reading than at film reading. No such differences were found for actually negative cases. Some individual differences were found, but it is concluded that gray scale resolution of MR images may be reduced from 12 to 8 bits per pixel without any significant reduction in diagnostic information. (orig.)

  20. Capacitor charging FET switcher with controller to adjust pulse width

    Science.gov (United States)

    Mihalka, Alex M.

    1986-01-01

    A switching power supply includes an FET full bridge, a controller to drive the FETs, a programmable controller to dynamically control final output current by adjusting pulse width, and a variety of protective systems, including an overcurrent latch for current control. Power MOSFETS are switched at a variable frequency from 20-50 kHz to charge a capacitor load from 0 to 6 kV. A ferrite transformer steps up the DC input. The transformer primary is a full bridge configuration with the FET switches and the secondary is fed into a high voltage full wave rectifier whose output is connected directly to the energy storage capacitor. The peak current is held constant by varying the pulse width using predetermined timing resistors and counting pulses. The pulse width is increased as the capacitor charges to maintain peak current. A digital ripple counter counts pulses, and after the desired number is reached, an up-counter is clocked. The up-counter output is decoded to choose among different resistors used to discharge a timing capacitor, thereby determining the pulse width. A current latch shuts down the supply on overcurrent due to either excessive pulse width causing transformer saturation or a major bridge fault, i.e., FET or transformer failure, or failure of the drive circuitry.

  1. A digital divider with extension bits for position-sensitive detectors

    International Nuclear Information System (INIS)

    Koike, Masaki; Hasegawa, Ken-ichi

    1988-01-01

    Digitizing errors produced in a digital divider for position-sensitive detectors have been reduced by adding extension bits to data bits. A relation between the extension bits and the data bits to obtain perfect position uniformity is also given. A digital divider employing 10 bit ADCs and 6 bit extension circuits has been constructed. (orig.)

  2. Compact FPGA-based beamformer using oversampled 1-bit A/D converters

    DEFF Research Database (Denmark)

    Tomov, Borislav Gueorguiev; Jensen, Jørgen Arendt

    2005-01-01

    A compact medical ultrasound beamformer architecture that uses oversampled 1-bit analog-to-digital (A/D) converters is presented. Sparse sample processing is used, as the echo signal for the image lines is reconstructed in 512 equidistant focal points along the line through its in-phase and quadr......% of the available logic resources in a commercially available midrange FPGA, and to be able to operate at 129 MHz. Simulation of the architecture at 140 MHz provides images with a dynamic range approaching 60 dB for an excitation frequency of 3 MHz.......A compact medical ultrasound beamformer architecture that uses oversampled 1-bit analog-to-digital (A/D) converters is presented. Sparse sample processing is used, as the echo signal for the image lines is reconstructed in 512 equidistant focal points along the line through its in......-phase and quadrature components. That information is sufficient for presenting a B-mode image and creating a color flow map. The high sampling rate provides the necessary delay resolution for the focusing. The low channel data width (1-bit) makes it possible to construct a compact beamformer logic. The signal...

  3. Cross Institutional Cooperation on a Shared Bit Repository

    DEFF Research Database (Denmark)

    Zierau, Eld; Kejser, Ulla Bøgvad

    2013-01-01

    This paper explores how independent institutions, such as archives and libraries, can cooperate on managing a shared bit repository with bit preservation, in order to use their resources for preservation in a more cost-effective way. It uses the OAIS Reference Model to provide a framework...... for systematically analysing institutions technical and organisational requirements for a remote bit repository. Instead of viewing a bit repository simply as Archival Storage for the institutions repositories, we argue for viewing it as consisting of a subset of functions from all entities defined by the OAIS...... Reference Model. The work is motivated by and used in a current Danish feasibility study for establishing a national bit repository. The study revealed that depending on their missions and the collections they hold, the institutions have varying requirements e.g. for bit safety, accessibility...

  4. Cross Institutional Cooperation on a Shared Bit Repository

    DEFF Research Database (Denmark)

    Zierau, Eld; Kejser, Ulla Bøgvad

    2010-01-01

    This paper explores how independent institutions, such as archives and libraries, can cooperate on managing a shared bit repository with bit preservation in order to use their resources for preservation n in a more cost-effective way. It uses the OAIS Reference Model to provide a framework...... for systematically analysing the technical and organizational requirements of institutions for a remote bit repository. Instead of viewing a bit repository simply as Archival Storage for the institutions’ repositories, we argue for viewing it as consisting of a subset of functions from all entities defined...... by the OAIS Reference Model. The work is motivated by and used in a current Danish feasibility study for establishing a national bit repository. The study revealed that depending on their missions and the collections they hold, the institutions have varying requirements, such as for bit safety, accessibility...

  5. Bit-commitment-based quantum coin flipping

    International Nuclear Information System (INIS)

    Nayak, Ashwin; Shor, Peter

    2003-01-01

    In this paper we focus on a special framework for quantum coin-flipping protocols, bit-commitment-based protocols, within which almost all known protocols fit. We show a lower bound of 1/16 for the bias in any such protocol. We also analyze a sequence of multiround protocols that tries to overcome the drawbacks of the previously proposed protocols in order to lower the bias. We show an intricate cheating strategy for this sequence, which leads to a bias of 1/4. This indicates that a bias of 1/4 might be optimal in such protocols, and also demonstrates that a more clever proof technique may be required to show this optimality

  6. Cost of remembering a bit of information

    Science.gov (United States)

    Chiuchiù; , D.; López-Suárez, M.; Neri, I.; Diamantini, M. C.; Gammaitoni, L.

    2018-05-01

    In 1961, Landauer [R. Landauer, IBM J. Res. Develop. 5, 183 (1961), 10.1147/rd.53.0183] pointed out that resetting a binary memory requires a minimum energy of kBT ln(2 ) . However, once written, any memory is doomed to lose its content if no action is taken. To avoid memory losses, a refresh procedure is periodically performed. We present a theoretical model and an experiment on a microelectromechanical system to evaluate the minimum energy required to preserve one bit of information over time. Two main conclusions are drawn: (i) in principle, the energetic cost to preserve information for a fixed time duration with a given error probability can be arbitrarily reduced if the refresh procedure is performed often enough, and (ii) the Heisenberg uncertainty principle sets an upper bound on the memory lifetime.

  7. Second quantization in bit-string physics

    International Nuclear Information System (INIS)

    Noyes, H.P.

    1992-08-01

    Using a new fundamental theory based on bit-strings we derived a finite and discrete version of the solutions of the free one particle Dirac equation as segmented trajectories with steps of length h/mc along the forward and backward light cones executed at velocity ±c. Interpreting the statistical fluctuations which cause the bends in these segmented trajectories as emission and absorption of radiation, these solutions are analagous to a fermion propagator in a second quantized theory. This allows us to interpret the mass parameter in the step length as the physical mass of the free particle. The radiation in interaction with it has the usual harmonic oscillator structure of a second quantized theory. We sketch on these free particle masses can be generated gravitationally using the combinatorial hierarchy sequence (3,10,137,2 127 +136), and some of the predictive consequences

  8. Balance, Sustainable Development, and Integration: Innovative Path for BIT Practice

    OpenAIRE

    Zeng Huaqun

    2014-01-01

    Bilateral investment treaties (BITs) have emerged as one of the most remarkable recent developments in international law and the hot topic of international lawyers. The author indicates that in the history of BIT practice, there is an issue on imbalance and/or un-equality between developed states and developing states due to historical and practical reasons. Under the economic globalization the main clauses of BITs have been further developed to the traditional track elaborately designed by d...

  9. Development and testing of a Mudjet-augmented PDC bit.

    Energy Technology Data Exchange (ETDEWEB)

    Black, Alan (TerraTek, Inc.); Chahine, Georges (DynaFlow, Inc.); Raymond, David Wayne; Matthews, Oliver (Security DBS); Grossman, James W.; Bertagnolli, Ken (US Synthetic); Vail, Michael (US Synthetic)

    2006-01-01

    This report describes a project to develop technology to integrate passively pulsating, cavitating nozzles within Polycrystalline Diamond Compact (PDC) bits for use with conventional rig pressures to improve the rock-cutting process in geothermal formations. The hydraulic horsepower on a conventional drill rig is significantly greater than that delivered to the rock through bit rotation. This project seeks to leverage this hydraulic resource to extend PDC bits to geothermal drilling.

  10. Quantum bit commitment with cheat sensitive binding and approximate sealing

    Science.gov (United States)

    Li, Yan-Bing; Xu, Sheng-Wei; Huang, Wei; Wan, Zong-Jie

    2015-04-01

    This paper proposes a cheat-sensitive quantum bit commitment scheme based on single photons, in which Alice commits a bit to Bob. Here, Bob’s probability of success at cheating as obtains the committed bit before the opening phase becomes close to \\frac{1}{2} (just like performing a guess) as the number of single photons used is increased. And if Alice alters her committed bit after the commitment phase, her cheating will be detected with a probability that becomes close to 1 as the number of single photons used is increased. The scheme is easy to realize with present day technology.

  11. Improved Bit Rate Control for Real-Time MPEG Watermarking

    Directory of Open Access Journals (Sweden)

    Pranata Sugiri

    2004-01-01

    Full Text Available The alteration of compressed video bitstream due to embedding of digital watermark tends to produce unpredictable video bit rate variations which may in turn lead to video playback buffer overflow/underflow or transmission bandwidth violation problems. This paper presents a novel bit rate control technique for real-time MPEG watermarking applications. In our experiments, spread spectrum watermarks are embedded in the quantized DCT domain without requantization and motion reestimation to achieve fast watermarking. The proposed bit rate control scheme evaluates the combined bit lengths of a set of multiple watermarked VLC codewords, and successively replaces watermarked VLC codewords having the largest increase in bit length with their corresponding unmarked VLC codewords until a target bit length is achieved. The proposed method offers flexibility and scalability, which are neglected by similar works reported in the literature. Experimental results show that the proposed bit rate control scheme is effective in meeting the bit rate targets and capable of improving the watermark detection robustness for different video contents compressed at different bit rates.

  12. FPGA implementation of bit controller in double-tick architecture

    Science.gov (United States)

    Kobylecki, Michał; Kania, Dariusz

    2017-11-01

    This paper presents a comparison of the two original architectures of programmable bit controllers built on FPGAs. Programmable Logic Controllers (which include, among other things programmable bit controllers) built on FPGAs provide a efficient alternative to the controllers based on microprocessors which are expensive and often too slow. The presented and compared methods allow for the efficient implementation of any bit control algorithm written in Ladder Diagram language into the programmable logic system in accordance with IEC61131-3. In both cases, we have compared the effect of the applied architecture on the performance of executing the same bit control program in relation to its own size.

  13. Constant Width Planar Computation Characterizes ACC0

    DEFF Research Database (Denmark)

    Hansen, Kristoffer Arnsfelt

    2006-01-01

    We obtain a characterization of ACC0 in terms of a natural class of constant width circuits, namely in terms of constant width polynomial size planar circuits. This is shown via a characterization of the class of acyclic digraphs which can be embedded on a cylinder surface in such a way that all...

  14. Palindromic widths of nilpotent and wreath products

    Indian Academy of Sciences (India)

    Palindromic width; commutator width; wreath products; nilpotent product. 2000 Mathematics ... An algorithm of the computation of the commutator length in free non-abelian .... It is clear that A(1)B = A × B is the direct sum. Let us list some ...

  15. Multiple Memory Structure Bit Reversal Algorithm Based on Recursive Patterns of Bit Reversal Permutation

    Directory of Open Access Journals (Sweden)

    K. K. L. B. Adikaram

    2014-01-01

    Full Text Available With the increasing demand for online/inline data processing efficient Fourier analysis becomes more and more relevant. Due to the fact that the bit reversal process requires considerable processing time of the Fast Fourier Transform (FFT algorithm, it is vital to optimize the bit reversal algorithm (BRA. This paper is to introduce an efficient BRA with multiple memory structures. In 2009, Elster showed the relation between the first and the second halves of the bit reversal permutation (BRP and stated that it may cause serious impact on cache performance of the computer, if implemented. We found exceptions, especially when the said index mapping was implemented with multiple one-dimensional memory structures instead of multidimensional or one-dimensional memory structure. Also we found a new index mapping, even after the recursive splitting of BRP into equal sized slots. The four-array and the four-vector versions of BRA with new index mapping reported 34% and 16% improvement in performance in relation to similar versions of Linear BRA of Elster which uses single one-dimensional memory structure.

  16. Computing in the presence of soft bit errors. [caused by single event upset on spacecraft

    Science.gov (United States)

    Rasmussen, R. D.

    1984-01-01

    It is shown that single-event-upsets (SEUs) due to cosmic rays are a significant source of single bit error in spacecraft computers. The physical mechanism of SEU, electron hole generation by means of Linear Energy Transfer (LET), it discussed with reference made to the results of a study of the environmental effects on computer systems of the Galileo spacecraft. Techniques for making software more tolerant of cosmic ray effects are considered, including: reducing the number of registers used by the software; continuity testing of variables; redundant execution of major procedures for error detection; and encoding state variables to detect single-bit changes. Attention is also given to design modifications which may reduce the cosmic ray exposure of on-board hardware. These modifications include: shielding components operating in LEO; removing low-power Schottky parts; and the use of CMOS diodes. The SEU parameters of different electronic components are listed in a table.

  17. Bit-Wise Arithmetic Coding For Compression Of Data

    Science.gov (United States)

    Kiely, Aaron

    1996-01-01

    Bit-wise arithmetic coding is data-compression scheme intended especially for use with uniformly quantized data from source with Gaussian, Laplacian, or similar probability distribution function. Code words of fixed length, and bits treated as being independent. Scheme serves as means of progressive transmission or of overcoming buffer-overflow or rate constraint limitations sometimes arising when data compression used.

  18. Report on ignitability testing of ''no-flow'' push bit

    International Nuclear Information System (INIS)

    Witwer, K.S.

    1997-01-01

    Testing was done to determine if an ignition occurs during a sixty foot drop of a Universal Sampler onto a push-mode bit in a flammable gas environment. Ten drops each of the sampler using both a push-mode and rotary mode insert onto a push-mode bit were completed. No ignition occurred during any of the drops

  19. Circuit and interconnect design for high bit-rate applications

    NARCIS (Netherlands)

    Veenstra, H.

    2006-01-01

    This thesis presents circuit and interconnect design techniques and design flows that address the most difficult and ill-defined aspects of the design of ICs for high bit-rate applications. Bottlenecks in interconnect design, circuit design and on-chip signal distribution for high bit-rate

  20. Morphodynamics structures induced by variations of the channel width

    Science.gov (United States)

    Duro, Gonzalo; Crosato, Alessandra; Tassi, Pablo

    2014-05-01

    alluvial rivers. References Crosato A. and Mosselman E., 2009. Simple physics-based predictor for the number of river bars and the transition between meandering and braiding. Water Resources Research, 45, W03424, doi: 10.1029/2008WR007242. Crosato A., Mosselman E., Desta F.B. and Uijttewaal W.S.J., 2011. Experimental and numerical evidence for intrinsic nonmigrating bars in alluvial channels. Water Resources Research, AGU, 47(3), W03511, doi 10.1029/2010WR009714. Frascati A. and Lanzoni S., 2013. A mathematical model for meandering rivers with varying width. J. Geophys. Res.Earth Surf., 118, doi:10.1002/jgrf.20084. Olesen K.W., 1984. Alternate bars in and meandering of alluvial rivers. In: River Meandering, Proc. of the Conf. Rivers '83, 24-26 Oct. 1983, New Orleans, Louisiana, U.S.A., ed. Elliott C.M., pp. 873-884, ASCE, New York. ISBN 0-87262-393-9. Repetto R., Tubino, M. and Paola C., 2002. Planimetric instability of channels with variable width. J. Fluid Mech., 457, 79-109. Struiksma N., Olesen K.W., Flokstra C. and De Vriend H.J., 1985. Bed deformation in curved alluvial channels. J. Hydraul. Res., 23(1), 57- 79. Wu F.-C. and Yeh T.-H., 2005. Forced bars induced by variations of channel width: Implications for incipient bifurcation. J. Geophys. Res., 110, F02009, doi:10.1029/2004JF000160. Zolezzi, G., R. Luchi, and M. Tubino (2012), Modeling morphodynamic processes in meandering rivers with spatial width variations, Rev. Geophys., 50, RG4005, doi:10.1029/2012RG000392.

  1. The bit's the thing : PDC bits are the sparkly new best friend of drillers everywhere

    Energy Technology Data Exchange (ETDEWEB)

    Cook, D.

    2008-09-15

    Polycrystalline diamond compact (PDC) cutters were introduced to the oil and gas industry in 1972. The drill bit technology has made significant advances since its introduction, and the PDC bits are now more widely used than conventional roller cone bits. This article discussed new PDC drill bits designed to have rates of penetration (ROP) of over 1000 feet an hour, run distances of up to 22,000 feet, and have cumulative depths of 180,000 feet. A diamond volume management (DVM) system is used to place the diamond where it is needed for specific applications. Designed by Precise Drilling Component Ltd, the bits are accompanied by thermo stable cutters developed to increase the stability of the PDC bits. Precise Drilling Component is now supplying the drilling equipment to major international oil companies. The company has also developed new abrasion-resistant cutters and improved hydraulics that have increased durability and stability, as well as lower drilling costs. The PDC cutters are able to remove rock more efficiently than the grinding and gouging actions of roller bits, which translates into faster penetration rates and longer bit lives. PDC bits are increasingly being used in steam assisted gravity drainage (SAGD) operations as the tungsten carbide matrix used for the PDC bits is able to withstand the abrasive sands encountered in oil sands wellbores. It was concluded that the PDC drill bits will continue to be optimized for use in harsh oil sands conditions. New optimization features and analytical models for improving drilling efficiency were also outlined. 4 figs.

  2. Uniqueness: skews bit occurrence frequencies in randomly generated fingerprint libraries.

    Science.gov (United States)

    Chen, Nelson G

    2016-08-01

    Requiring that randomly generated chemical fingerprint libraries have unique fingerprints such that no two fingerprints are identical causes a systematic skew in bit occurrence frequencies, the proportion at which specified bits are set. Observed frequencies (O) at which each bit is set within the resulting libraries systematically differ from frequencies at which bits are set at fingerprint generation (E). Observed frequencies systematically skew toward 0.5, with the effect being more pronounced as library size approaches the compound space, which is the total number of unique possible fingerprints given the number of bit positions each fingerprint contains. The effect is quantified for varying library sizes as a fraction of the overall compound space, and for changes in the specified frequency E. The cause and implications for this systematic skew are subsequently discussed. When generating random libraries of chemical fingerprints, the imposition of a uniqueness requirement should either be avoided or taken into account.

  3. Individual Drilling Bit Design and Optimization in Mahu Area

    Directory of Open Access Journals (Sweden)

    Zhang Wenbo

    2017-01-01

    Full Text Available There are three sets of gravels in Mahu region. The gravels formation is characterized by high heterogeneity, high abrasiveness and poor drillability. It is so difficult to optimize bit that restrict seriously the overall exploration and development process. The compressive strength, internal friction angle, and drillability of the formation are tested to check the rock mechanical characteristic profile established by logging data. The individual bit design is carried out by the 3D simulation technology. A new PDC bit type is designed to form the drill bit series for Mahu area. Single PDC bit increases 90% of the drilling footage. The trip average footage is improved 3.45 times, the horizontal section average penetration increased 34.8%. The technical achievements have greatly improved economic development benefits of Mahu region by improving drilling speed and saving drilling costs.

  4. IMAGE STEGANOGRAPHY DENGAN METODE LEAST SIGNIFICANT BIT (LSB

    Directory of Open Access Journals (Sweden)

    M. Miftakul Amin

    2014-02-01

    Full Text Available Security in delivering a secret message is an important factor in the spread of information in cyberspace. Protecting that message to be delivered to the party entitled to, should be made a message concealment mechanism. The purpose of this study was to hide a secret text message into digital images in true color 24 bit RGB format. The method used to insert a secret message using the LSB (Least Significant Bit by replacing the last bit or 8th bit in each RGB color component. RGB image file types option considering that messages can be inserted capacity greater than if use a grayscale image, this is because in one pixel can be inserted 3 bits message. Tests provide results that are hidden messages into a digital image does not reduce significantly the quality of the digital image, and the message has been hidden can be extracted again, so that messages can be delivered to the recipient safely.

  5. A Novel Least Significant Bit First Processing Parallel CRC Circuit

    Directory of Open Access Journals (Sweden)

    Xiujie Qu

    2013-01-01

    Full Text Available In HDLC serial communication protocol, CRC calculation can first process the most or least significant bit of data. Nowadays most CRC calculation is based on the most significant bit (MSB first processing. An algorithm of the least significant bit (LSB first processing parallel CRC is proposed in this paper. Based on the general expression of the least significant bit first processing serial CRC, using state equation method of linear system, we derive a recursive formula by the mathematical deduction. The recursive formula is applicable to any number of bits processed in parallel and any series of generator polynomial. According to the formula, we present the parallel circuit of CRC calculation and implement it with VHDL on FPGA. The results verify the accuracy and effectiveness of this method.

  6. Use break-even analysis to optimize bit runs

    International Nuclear Information System (INIS)

    Kelly, J. Jr.

    1992-01-01

    Applying a technique known as break-even analysis during the bit selection process enables the operator to more definitively estimate drilling costs. The break-even chart can be used in a variety of ways to evaluate bit and operating parameter alternatives. Frequent application of this technique significantly improves the user's understanding of drilling economics and their ability to plan more effective drilling programs. This paper reports on several examples of drilling cost estimates obtained through application of the break-even analysis, which determines the bit performance required to match established drilling cost records in similar applications. It is especially helpful when new bit features are being considered for the first time. Two common examples with today's rolling cutter bits are changes from steel teeth to tungsten carbide inserts (TCI) and O-ring to metal bearing seals

  7. A Memristor as Multi-Bit Memory: Feasibility Analysis

    Directory of Open Access Journals (Sweden)

    O. Bass

    2015-06-01

    Full Text Available The use of emerging memristor materials for advanced electrical devices such as multi-valued logic is expected to outperform today's binary logic digital technologies. We show here an example for such non-binary device with the design of a multi-bit memory. While conventional memory cells can store only 1 bit, memristors-based multi-bit cells can store more information within single device thus increasing the information storage density. Such devices can potentially utilize the non-linear resistance of memristor materials for efficient information storage. We analyze the performance of such memory devices based on their expected variations in order to determine the viability of memristor-based multi-bit memory. A design of read/write scheme and a simple model for this cell, lay grounds for full integration of memristor multi-bit memory cell.

  8. Installation of MCNP on 64-bit parallel computers

    International Nuclear Information System (INIS)

    Meginnis, A.B.; Hendricks, J.S.; McKinney, G.W.

    1995-01-01

    The Monte Carlo radiation transport code MCNP has been successfully ported to two 64-bit workstations, the SGI and DEC Alpha. We found the biggest problem for installation on these machines to be Fortran and C mismatches in argument passing. Correction of these mismatches enabled, for the first time, dynamic memory allocation on 64-bit workstations. Although the 64-bit hardware is faster because 8-bytes are processed at a time rather than 4-bytes, we found no speed advantage in true 64-bit coding versus implicit double precision when porting an existing code to the 64-bit workstation architecture. We did find that PVM multiasking is very successful and represents a significant performance enhancement for scientific workstations

  9. A little bit of legal history

    CERN Multimedia

    2010-01-01

    On Monday 18 October, a little bit of legal history will be made when the first international tripartite agreement between CERN and its two Host States is signed. This agreement, which has been under negotiation since 2004, clarifies the working conditions of people employed by companies contracted to CERN. It will facilitate the management of service contracts both for CERN and its contractors.   Ever since 1965, when CERN first crossed the border into France, the rule of territoriality has applied. This means that anyone working for a company contracted to CERN whose job involves crossing the border is subject to the employment legislation of both states. The new agreement simplifies matters by making only one legislation apply per contract, that of the country in which most of the work is carried out. This is good for CERN, it’s good for the companies, and it’s good for their employees. It is something that all three parties to the agreement have wanted for some time, and I...

  10. A bit faster : ReedHycalog focuses new drill bit technology on the needs of western Canadian drillers

    Energy Technology Data Exchange (ETDEWEB)

    Wells, P.

    2009-06-15

    ReedHycalog, a division of National Oilwell Varco Inc., is advancing its drill bit technology and is setting performance records in an effort to meet the needs of drillers in western Canada. This article described the company's new drill bit technology. Through its motor series polycrystalline diamond cutter (PDC) bits, ReedHycalog developed and commercialized several unique and proprietary drill bit features that reduced variations in torque. This lowered the risk of stick-slip while improving lateral stability, directional control and drilling efficiency. The design of the motor series bits was reviewed along with laboratory and field testing. Smooth torque was identified as one of the greatest challenges when drilling with a drill bit on a directional assembly. Test results revealed that there are 4 distinct characteristics for optimal steerable motor performance, such as smooth torque control components (TCC) that were specifically positioned in the cone of the bit to prevent cutter over engagement reducing in torque fluctuations for optimal tool face control; optimized cutter backrakes that provided high penetration rates in rotating mode, while TCCs were optimized to control torque when sliding; gauge inserts for lateral control that provided a low-friction bearing surface; and laterally exposed gauge cutters that cleaned up the hole in rotating mode, and a tapered upper section that reduced gauge pad interference while in sliding mode. The motor series bits performed extremely well in the vertical, build and horizontal intervals with multiple operators. 1 ref., 3 figs.

  11. Modern X86 assembly language programming 32-bit, 64-bit, SSE, and AVX

    CERN Document Server

    Kusswurm, Daniel

    2014-01-01

    Modern X86 Assembly Language Programming shows the fundamentals of x86 assembly language programming. It focuses on the aspects of the x86 instruction set that are most relevant to application software development. The book's structure and sample code are designed to help the reader quickly understand x86 assembly language programming and the computational capabilities of the x86 platform. Major topics of the book include the following: 32-bit core architecture, data types, internal registers, memory addressing modes, and the basic instruction setX87 core architecture, register stack, special

  12. Integer Representations towards Efficient Counting in the Bit Probe Model

    DEFF Research Database (Denmark)

    Brodal, Gerth Stølting; Greve, Mark; Pandey, Vineet

    2011-01-01

    Abstract We consider the problem of representing numbers in close to optimal space and supporting increment, decrement, addition and subtraction operations efficiently. We study the problem in the bit probe model and analyse the number of bits read and written to perform the operations, both...... in the worst-case and in the average-case. A counter is space-optimal if it represents any number in the range [0,...,2 n  − 1] using exactly n bits. We provide a space-optimal counter which supports increment and decrement operations by reading at most n − 1 bits and writing at most 3 bits in the worst......-case. To the best of our knowledge, this is the first such representation which supports these operations by always reading strictly less than n bits. For redundant counters where we only need to represent numbers in the range [0,...,L] for some integer L bits, we define the efficiency...

  13. Video Synchronization With Bit-Rate Signals and Correntropy Function

    Directory of Open Access Journals (Sweden)

    Igor Pereira

    2017-09-01

    Full Text Available We propose an approach for the synchronization of video streams using correntropy. Essentially, the time offset is calculated on the basis of the instantaneous transfer rates of the video streams that are extracted in the form of a univariate signal known as variable bit-rate (VBR. The state-of-the-art approach uses a window segmentation strategy that is based on consensual zero-mean normalized cross-correlation (ZNCC. This strategy has an elevated computational complexity, making its application to synchronizing online data streaming difficult. Hence, our proposal uses a different window strategy that, together with the correntropy function, allows the synchronization to be performed for online applications. This provides equivalent synchronization scores with a rapid offset determination as the streams come into the system. The efficiency of our approach has been verified through experiments that demonstrate its viability with values that are as precise as those obtained by ZNCC. The proposed approach scored 81 % in time reference classification against the equivalent 81 % of the state-of-the-art approach, requiring much less computational power.

  14. Fitness Probability Distribution of Bit-Flip Mutation.

    Science.gov (United States)

    Chicano, Francisco; Sutton, Andrew M; Whitley, L Darrell; Alba, Enrique

    2015-01-01

    Bit-flip mutation is a common mutation operator for evolutionary algorithms applied to optimize functions over binary strings. In this paper, we develop results from the theory of landscapes and Krawtchouk polynomials to exactly compute the probability distribution of fitness values of a binary string undergoing uniform bit-flip mutation. We prove that this probability distribution can be expressed as a polynomial in p, the probability of flipping each bit. We analyze these polynomials and provide closed-form expressions for an easy linear problem (Onemax), and an NP-hard problem, MAX-SAT. We also discuss a connection of the results with runtime analysis.

  15. An Image Encryption Method Based on Bit Plane Hiding Technology

    Institute of Scientific and Technical Information of China (English)

    LIU Bin; LI Zhitang; TU Hao

    2006-01-01

    A novel image hiding method based on the correlation analysis of bit plane is described in this paper. Firstly, based on the correlation analysis, different bit plane of a secret image is hided in different bit plane of several different open images. And then a new hiding image is acquired by a nesting "Exclusive-OR" operation on those images obtained from the first step. At last, by employing image fusion technique, the final hiding result is achieved. The experimental result shows that the method proposed in this paper is effective.

  16. The Economics of BitCoin Price Formation

    OpenAIRE

    Pavel Ciaian; Miroslava Rajcaniova; d'Artis Kancs

    2014-01-01

    This is the first article that studies BitCoin price formation by considering both the traditional determinants of currency price, e.g., market forces of supply and demand, and digital currencies specific factors, e.g., BitCoin attractiveness for investors and users. The conceptual framework is based on the Barro (1979) model, from which we derive testable hypotheses. Using daily data for five years (2009–2015) and applying time-series analytical mechanisms, we find that market forces and Bit...

  17. A quantitative analysis of transtensional margin width

    Science.gov (United States)

    Jeanniot, Ludovic; Buiter, Susanne J. H.

    2018-06-01

    Continental rifted margins show variations between a few hundred to almost a thousand kilometres in their conjugated widths from the relatively undisturbed continent to the oceanic crust. Analogue and numerical modelling results suggest that the conjugated width of rifted margins may have a relationship to their obliquity of divergence, with narrower margins occurring for higher obliquity. We here test this prediction by analysing the obliquity and rift width for 26 segments of transtensional conjugate rifted margins in the Atlantic and Indian Oceans. We use the plate reconstruction software GPlates (http://www.gplates.org) for different plate rotation models to estimate the direction and magnitude of rifting from the initial phases of continental rifting until breakup. Our rift width corresponds to the distance between the onshore maximum topography and the last identified continental crust. We find a weak positive correlation between the obliquity of rifting and rift width. Highly oblique margins are narrower than orthogonal margins, as expected from analogue and numerical models. We find no relationships between rift obliquities and rift duration nor the presence or absence of Large Igneous Provinces (LIPs).

  18. Comparison of tibiofemoral joint space width measurements from standing CT and fixed flexion radiography.

    Science.gov (United States)

    Segal, Neil A; Frick, Eric; Duryea, Jeffrey; Nevitt, Michael C; Niu, Jingbo; Torner, James C; Felson, David T; Anderson, Donald D

    2017-07-01

    The objective of this project was to determine the relationship between medial tibiofemoral joint space width measured on fixed-flexion radiographs and the three-dimensional joint space width distribution on low-dose, standing CT (SCT) imaging. At the 84-month visit of the Multicenter Osteoarthritis Study, 20 participants were recruited. A commercial SCT scanner for the foot and ankle was modified to image knees while standing. Medial tibiofemoral joint space width was assessed on radiographs at fixed locations from 15% to 30% of compartment width using validated software and on SCT by mapping the distances between three-dimensional subchondral bone surfaces. Individual joint space width values from radiographs were compared with three-dimensional joint space width values from corresponding sagittal plane locations using paired t-tests and correlation coefficients. For the four medial-most tibiofemoral locations, radiographic joint space width values exceeded the minimal joint space width on SCT by a mean of 2.0 mm and were approximately equal to the 61st percentile value of the joint space width distribution at each respective sagittal-plane location. Correlation coefficients at these locations were 0.91-0.97 and the offsets between joint space width values from radiographs and SCT measurements were consistent. There were greater offsets and variability in the offsets between modalities closer to the tibial spine. Joint space width measurements on fixed-flexion radiographs are highly correlated with three-dimensional joint space width from SCT. In addition to avoiding bony overlap obscuring the joint, a limitation of radiographs, the current study supports a role for SCT in the evaluation of tibiofemoral OA. © 2017 Orthopaedic Research Society. Published by Wiley Periodicals, Inc. J Orthop Res 35:1388-1395, 2017. © 2017 Orthopaedic Research Society. Published by Wiley Periodicals, Inc.

  19. A hybrid bit-encoding for SAT planning based on clique-partitioning

    Science.gov (United States)

    Tapia, Cristóbal; San Segundo, Pablo; Galán, Ramón

    2017-09-01

    Planning as satisfiability is one of the most efficient ways to solve classic automated planning problems. In SAT planning, the encoding used to convert the problem to a SAT formula is critical for the performance of the SAT solver. This paper presents a novel bit-encoding that reduces the number of bits required to represent actions in a SAT-based automated planning problem. To obtain such encoding we first build a conflict graph, which represents incompatibilities of pairs of actions, and bitwise encode the subsets of actions determined by a clique partition. This reduces the number of Boolean variables and clauses of the SAT encoding, while preserving the possibility of parallel execution of compatible (non-neighbor) actions. The article also describes an appropriate algorithm for selecting the clique partition for this application and compares the new encodings obtained over some standard planning problems.

  20. 3.56-bits/cm Compact Inkjet Printed and Application Specific Chipless RFID Tag

    KAUST Repository

    Khan, Munawar M.

    2015-10-26

    © 2002-2011 IEEE. In this letter, a 28.5-bit chipless RFID tag, based on paper substrate and realized using inkjet printing technique is presented. Operating within ultrawideband, the tag occupies a compact size of 2 × 4 cm2. Focusing on applications requiring time and date identification, a novel encoding technique is presented that allows efficient frequency band allocation based on the number of required instances of time and date variables. A figure of merit (FOM) relating coding capacity and tag dimensions coined as code density is also introduced. A systematic design process followed by simulations and verified through measurements reveal a high code density of 3.56 bits/cm2 for the presented chipless tag.

  1. Surface Modification of AISI 440B Stainless Steel and its Influence on Surgical Drill Bits Performance

    Directory of Open Access Journals (Sweden)

    Łępicka M.

    2016-09-01

    Full Text Available The development of modern invasive surgery is highly dependent on the performance of surgical instruments, understood as long-term efficiency arising from high resistance to wear and corrosion. In order to maintain sufficient reliability, surgical cutting instruments are often made of martensitic stainless steels. Nevertheless, the use of ferrous alloys in medical applications is still a concern due to their questionable corrosion and wear resistance. To extend their biocompatibility, improve stability in variable environmental conditions, improve ease of handling, and maximize their performance, diffusion layers and coatings are applied to the surface. The aim of this work was to evaluate the effect of TiN and diamond-like carbon (DLC surface modification on the performance of surgical drill bits, that is, wear and corrosion resistance, measured in model and field tests. Based on the findings presented, DLC layers can be recommended as anti-wear and anti-corrosion coatings for surgical drill bits.

  2. Bit Error Rate Minimizing Channel Shortening Equalizers for Single Carrier Cyclic Prefixed Systems

    National Research Council Canada - National Science Library

    Martin, Richard K; Vanbleu, Koen; Ysebaert, Geert

    2007-01-01

    .... Previous work on channel shortening has largely been in the context of digital subscriber lines, a wireline system that allows bit allocation, thus it has focused on maximizing the bit rate for a given bit error rate (BER...

  3. The decay width of stringy hadrons

    Directory of Open Access Journals (Sweden)

    Jacob Sonnenschein

    2018-02-01

    We fit the theoretical decay width to experimental data for mesons on the trajectories of ρ, ω, π, η, K⁎, ϕ, D, and Ds⁎, and of the baryons N, Δ, Λ, and Σ. We examine both the linearity in L and the exponential suppression factor. The linearity was found to agree with the data well for mesons but less for baryons. The extracted coefficient for mesons A=0.095±0.015 is indeed quite universal. The exponential suppression was applied to both strong and radiative decays. We discuss the relation with string fragmentation and jet formation. We extract the quark–diquark structure of baryons from their decays. A stringy mechanism for Zweig suppressed decays of quarkonia is proposed and is shown to reproduce the decay width of ϒ states. The dependence of the width on spin and flavor symmetry is discussed. We further apply this model to the decays of glueballs and exotic hadrons.

  4. The decay width of stringy hadrons

    Science.gov (United States)

    Sonnenschein, Jacob; Weissman, Dorin

    2018-02-01

    In this paper we further develop a string model of hadrons by computing their strong decay widths and comparing them to experiment. The main decay mechanism is that of a string splitting into two strings. The corresponding total decay width behaves as Γ = π/2 ATL where T and L are the tension and length of the string and A is a dimensionless universal constant. We show that this result holds for a bosonic string not only in the critical dimension. The partial width of a given decay mode is given by Γi / Γ =Φi exp ⁡ (- 2 πCmsep2 / T) where Φi is a phase space factor, msep is the mass of the "quark" and "antiquark" created at the splitting point, and C is a dimensionless coefficient close to unity. Based on the spectra of hadrons we observe that their (modified) Regge trajectories are characterized by a negative intercept. This implies a repulsive Casimir force that gives the string a "zero point length". We fit the theoretical decay width to experimental data for mesons on the trajectories of ρ, ω, π, η, K*, ϕ, D, and Ds*, and of the baryons N, Δ, Λ, and Σ. We examine both the linearity in L and the exponential suppression factor. The linearity was found to agree with the data well for mesons but less for baryons. The extracted coefficient for mesons A = 0.095 ± 0.015 is indeed quite universal. The exponential suppression was applied to both strong and radiative decays. We discuss the relation with string fragmentation and jet formation. We extract the quark-diquark structure of baryons from their decays. A stringy mechanism for Zweig suppressed decays of quarkonia is proposed and is shown to reproduce the decay width of ϒ states. The dependence of the width on spin and flavor symmetry is discussed. We further apply this model to the decays of glueballs and exotic hadrons.

  5. 2014 Metro, Oregon 4-Band 8 Bit Imagery

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — These data are LiDAR orthorectified aerial photographs (8-bit GeoTIFF format) within the Oregon Lidar Consortium Portland project area. The imagery coverage is...

  6. Pseudo-random bit generator based on Chebyshev map

    Science.gov (United States)

    Stoyanov, B. P.

    2013-10-01

    In this paper, we study a pseudo-random bit generator based on two Chebyshev polynomial maps. The novel derivative algorithm shows perfect statistical properties established by number of statistical tests.

  7. Fast physical random bit generation with chaotic semiconductor lasers

    Science.gov (United States)

    Uchida, Atsushi; Amano, Kazuya; Inoue, Masaki; Hirano, Kunihito; Naito, Sunao; Someya, Hiroyuki; Oowada, Isao; Kurashige, Takayuki; Shiki, Masaru; Yoshimori, Shigeru; Yoshimura, Kazuyuki; Davis, Peter

    2008-12-01

    Random number generators in digital information systems make use of physical entropy sources such as electronic and photonic noise to add unpredictability to deterministically generated pseudo-random sequences. However, there is a large gap between the generation rates achieved with existing physical sources and the high data rates of many computation and communication systems; this is a fundamental weakness of these systems. Here we show that good quality random bit sequences can be generated at very fast bit rates using physical chaos in semiconductor lasers. Streams of bits that pass standard statistical tests for randomness have been generated at rates of up to 1.7 Gbps by sampling the fluctuating optical output of two chaotic lasers. This rate is an order of magnitude faster than that of previously reported devices for physical random bit generators with verified randomness. This means that the performance of random number generators can be greatly improved by using chaotic laser devices as physical entropy sources.

  8. 2015 Big Windy, Oregon 4-Band 8 Bit Imagery

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — These data are LiDAR orthorectified aerial photographs (8-bit GeoTIFF format) within the Oregon Lidar Consortium Big Windy project area. The imagery coverage is...

  9. Secure self-calibrating quantum random-bit generator

    International Nuclear Information System (INIS)

    Fiorentino, M.; Santori, C.; Spillane, S. M.; Beausoleil, R. G.; Munro, W. J.

    2007-01-01

    Random-bit generators (RBGs) are key components of a variety of information processing applications ranging from simulations to cryptography. In particular, cryptographic systems require 'strong' RBGs that produce high-entropy bit sequences, but traditional software pseudo-RBGs have very low entropy content and therefore are relatively weak for cryptography. Hardware RBGs yield entropy from chaotic or quantum physical systems and therefore are expected to exhibit high entropy, but in current implementations their exact entropy content is unknown. Here we report a quantum random-bit generator (QRBG) that harvests entropy by measuring single-photon and entangled two-photon polarization states. We introduce and implement a quantum tomographic method to measure a lower bound on the 'min-entropy' of the system, and we employ this value to distill a truly random-bit sequence. This approach is secure: even if an attacker takes control of the source of optical states, a secure random sequence can be distilled

  10. Experimental bit commitment based on quantum communication and special relativity.

    Science.gov (United States)

    Lunghi, T; Kaniewski, J; Bussières, F; Houlmann, R; Tomamichel, M; Kent, A; Gisin, N; Wehner, S; Zbinden, H

    2013-11-01

    Bit commitment is a fundamental cryptographic primitive in which Bob wishes to commit a secret bit to Alice. Perfectly secure bit commitment between two mistrustful parties is impossible through asynchronous exchange of quantum information. Perfect security is however possible when Alice and Bob split into several agents exchanging classical and quantum information at times and locations suitably chosen to satisfy specific relativistic constraints. Here we report on an implementation of a bit commitment protocol using quantum communication and special relativity. Our protocol is based on [A. Kent, Phys. Rev. Lett. 109, 130501 (2012)] and has the advantage that it is practically feasible with arbitrary large separations between the agents in order to maximize the commitment time. By positioning agents in Geneva and Singapore, we obtain a commitment time of 15 ms. A security analysis considering experimental imperfections and finite statistics is presented.

  11. Effective spectrum width of the synchrotron radiation

    Energy Technology Data Exchange (ETDEWEB)

    Bagrov, V. G., E-mail: bagrov@phys.tsu.ru [Department of Physics, Tomsk State University, Tomsk (Russian Federation); Institute of High Current Electronics, SB RAS, Tomsk (Russian Federation); Gitman, D. M., E-mail: gitman@if.usp.br [Department of Physics, Tomsk State University, Tomsk (Russian Federation); Institute of Physics, University of São Paulo, São Paulo (Brazil); P.N.Lebedev Physical Institute, Moscow (Russian Federation); Levin, A. D., E-mail: alevin@if.usp.br [Institute of Physics, University of São Paulo, São Paulo (Brazil); Loginov, A. S.; Saprykin, A. D. [Department of Physics, Tomsk State University, Tomsk (Russian Federation)

    2015-11-25

    For an exact quantitative description of spectral properties of synchrotron radiation (SR), the concept of effective width of the spectrum is introduced. In the most interesting case, which corresponds to the ultrarelativistic limit of SR, the effective width of the spectrum is calculated for the polarization components, and new physically important quantitative information on the structure of spectral distributions is obtained. For the first time, the spectral distribution for the circular polarization component of the SR for the upper half-space is obtained within classical theory.

  12. Effective spectrum width of the synchrotron radiation

    International Nuclear Information System (INIS)

    Bagrov, V. G.; Gitman, D. M.; Levin, A. D.; Loginov, A. S.; Saprykin, A. D.

    2015-01-01

    For an exact quantitative description of spectral properties of synchrotron radiation (SR), the concept of effective width of the spectrum is introduced. In the most interesting case, which corresponds to the ultrarelativistic limit of SR, the effective width of the spectrum is calculated for the polarization components, and new physically important quantitative information on the structure of spectral distributions is obtained. For the first time, the spectral distribution for the circular polarization component of the SR for the upper half-space is obtained within classical theory

  13. Effective spectrum width of the synchrotron radiation

    Energy Technology Data Exchange (ETDEWEB)

    Bagrov, V.G. [Tomsk State University, Department of Physics, Tomsk (Russian Federation); SB RAS, Institute of High Current Electronics, Tomsk (Russian Federation); Gitman, D.M. [Tomsk State University, Department of Physics, Tomsk (Russian Federation); University of Sao Paulo, Institute of Physics, Sao Paulo (Brazil); P.N. Lebedev Physical Institute, Moscow (Russian Federation); Levin, A.D. [University of Sao Paulo, Institute of Physics, Sao Paulo (Brazil); Loginov, A.S.; Saprykin, A.D. [Tomsk State University, Department of Physics, Tomsk (Russian Federation)

    2015-11-15

    For an exact quantitative description of spectral properties of synchrotron radiation (SR), the concept of effective width of the spectrum is introduced. In the most interesting case, which corresponds to the ultrarelativistic limit of SR, the effective width of the spectrum is calculated for the polarization components, and new physically important quantitative information on the structure of spectral distributions is obtained. For the first time, the spectral distribution for the circular polarization component of the SR for the upper half-space is obtained within classical theory. (orig.)

  14. Temperature dependence of giant dipole resonance width

    International Nuclear Information System (INIS)

    Vdovin, A.I.; Storozhenko, A.N.

    2005-01-01

    The quasiparticle-phonon nuclear model extended to finite temperature within the framework of the thermo field dynamics is applied to calculate a temperature dependence of the spreading width Γ d own of a giant dipole resonance. Numerical calculations are made for 12S n and 208 Pb nuclei. It is found that the width Γ d own increases with T. The reason of this effect is discussed as well as a relation of the present approach to other ones existing in the literature

  15. Line width of Josephson flux flow oscillators

    DEFF Research Database (Denmark)

    Koshelets, V.P.; Dmitriev, P.N.; Sobolev, A.S.

    2002-01-01

    to be proven before one initiates real FFO applications. To achieve this goal a comprehensive set of line width measurements of the FFO operating in different regimes has been performed. FFOs with tapered shape have been successfully implemented in order to avoid the superfine resonant structure with voltage...... spacing of about 20 nV and extremely low differential resistance, recently observed in the IVC of the standard rectangular geometry. The obtained results have been compared with existing theories and FFO models in order to understand and possibly eliminate excess noise in the FFO. The intrinsic line width...

  16. Content Progressive Coding of Limited Bits/pixel Images

    DEFF Research Database (Denmark)

    Jensen, Ole Riis; Forchhammer, Søren

    1999-01-01

    A new lossless context based method for content progressive coding of limited bits/pixel images is proposed. Progressive coding is achieved by separating the image into contelnt layers. Digital maps are compressed up to 3 times better than GIF.......A new lossless context based method for content progressive coding of limited bits/pixel images is proposed. Progressive coding is achieved by separating the image into contelnt layers. Digital maps are compressed up to 3 times better than GIF....

  17. Comparison and status of 32 bit backplane bus architectures

    International Nuclear Information System (INIS)

    Muller, K.D.

    1985-01-01

    With the introduction of 32 bit microprocessors several new 32 bit backplane bus architectures have been developed and are in the process for standardization. Among these are Future Bus (IEEE P896.1), VME-Bus (IEEE 1014), MULTIBUS II, Nu-Bus and Fastbus (IEEE 960). The paper describes and compares the main features of these bus architectures and mentions the status of national and international standardization efforts

  18. Radiative width of molecular-cluster states

    International Nuclear Information System (INIS)

    Alhassid, Y.; Gai, M.; Bertsch, G.F.

    1982-01-01

    Molecular states are characterized by enhanced electromagnetic deexcitations of many different multipolarities. The expected enhancement of E1, E2, and E3 transitions is examined by deriving molecular sum rules for radiative deexcitation widths and via a dimensionality approach. The enhancement of the E1 transitions is the most striking

  19. Bounding the Higgs boson width through interferometry.

    Science.gov (United States)

    Dixon, Lance J; Li, Ye

    2013-09-13

    We study the change in the diphoton-invariant-mass distribution for Higgs boson decays to two photons, due to interference between the Higgs resonance in gluon fusion and the continuum background amplitude for gg→γγ. Previously, the apparent Higgs mass was found to shift by around 100 MeV in the standard model in the leading-order approximation, which may potentially be experimentally observable. We compute the next-to-leading-order QCD corrections to the apparent mass shift, which reduce it by about 40%. The apparent mass shift may provide a way to measure, or at least bound, the Higgs boson width at the Large Hadron Collider through "interferometry." We investigate how the shift depends on the Higgs width, in a model that maintains constant Higgs boson signal yields. At Higgs widths above 30 MeV, the mass shift is over 200 MeV and increases with the square root of the width. The apparent mass shift could be measured by comparing with the ZZ* channel, where the shift is much smaller. It might be possible to measure the shift more accurately by exploiting its strong dependence on the Higgs transverse momentum.

  20. Practical algorithms for linear boolean-width

    NARCIS (Netherlands)

    ten Brinke, C.B.; van Houten, F.J.P.; Bodlaender, H.L.

    2015-01-01

    In this paper, we give a number of new exact algorithms and heuristics to compute linear boolean decompositions, and experimentally evaluate these algorithms. The experimental evaluation shows that significant improvements can be made with respect to running time without increasing the width of the

  1. Practical algorithms for linear Boolean-width

    NARCIS (Netherlands)

    ten Brinke, C.B.; van Houten, F.J.P.; Bodlaender, H.L.

    2015-01-01

    In this paper, we give a number of new exact algorithms and heuristics to compute linear boolean decompositions, and experimentally evaluate these algorithms. The experimental evaluation shows that significant improvements can be made with respect to running time without increasing the width of the

  2. Quercus macrocarpa annual, early- and latewood widths as hydroclimatic proxies, southeastern Saskatchewan, Canada

    International Nuclear Information System (INIS)

    Vanstone, Jessica R; Sauchyn, David J

    2010-01-01

    Fluctuations in size of annual ring-widths of Quercus species suggest that environmental factors influence the size and density of vessels within the ring, either by acting as a limiting factor for growth or through fine tuning of the wood structure to environmental factors. The purpose of this study is to assess the potential of Q. macrocarpa to provide multiple dendroclimatic proxies for the Canadian Prairies, by investigating growth responses of annual, early- and latewood widths to regional climate variability. Results indicate that ring width chronologies, from southeastern Saskatchewan capture regional signals related to moisture and drought conditions. Correlations suggest that late-wood widths are more representative of annual ring-widths, than are early-wood widths, and are the best proxy of seasonal fluctuations in climate. Thus regression models that include latewood widths were able to account for more variance in the Palmer Drought Severity Index (PDSI) than when annual ring-widths are used as the only proxy. This study demonstrates that Q. macrocarpa can provide multiple dendroclimatic proxies for investigating large scale climatic fluctuations at annual and sub-annual time scales. It is novel in terms of sub-annual analysis of tree-rings in a region that previously lacked dendrochronological research.

  3. SpecBit, DecayBit and PrecisionBit. GAMBIT modules for computing mass spectra, particle decay rates and precision observables

    Energy Technology Data Exchange (ETDEWEB)

    Athron, Peter; Balazs, Csaba [Monash University, School of Physics and Astronomy, Melbourne, VIC (Australia); Australian Research Council Centre of Excellence for Particle Physics at the Tera-scale (Australia); Dal, Lars A.; Gonzalo, Tomas E. [University of Oslo, Department of Physics, Oslo (Norway); Edsjoe, Joakim; Farmer, Ben [AlbaNova University Centre, Oskar Klein Centre for Cosmoparticle Physics, Stockholm (Sweden); Stockholm University, Department of Physics, Stockholm (Sweden); Kvellestad, Anders [NORDITA, Stockholm (Sweden); McKay, James; Scott, Pat [Imperial College London, Department of Physics, Blackett Laboratory, London (United Kingdom); Putze, Antje [Universite de Savoie, CNRS, LAPTh, Annecy-le-Vieux (France); Rogan, Chris [Harvard University, Department of Physics, Cambridge, MA (United States); Weniger, Christoph [University of Amsterdam, GRAPPA, Institute of Physics, Amsterdam (Netherlands); White, Martin [Australian Research Council Centre of Excellence for Particle Physics at the Tera-scale (Australia); University of Adelaide, Department of Physics, Adelaide, SA (Australia); Collaboration: The GAMBIT Models Workgroup

    2018-01-15

    We present the GAMBIT modules SpecBit, DecayBit and PrecisionBit. Together they provide a new framework for linking publicly available spectrum generators, decay codes and other precision observable calculations in a physically and statistically consistent manner. This allows users to automatically run various combinations of existing codes as if they are a single package. The modular design allows software packages fulfilling the same role to be exchanged freely at runtime, with the results presented in a common format that can easily be passed to downstream dark matter, collider and flavour codes. These modules constitute an essential part of the broader GAMBIT framework, a major new software package for performing global fits. In this paper we present the observable calculations, data, and likelihood functions implemented in the three modules, as well as the conventions and assumptions used in interfacing them with external codes. We also present 3-BIT-HIT, a command-line utility for computing mass spectra, couplings, decays and precision observables in the MSSM, which shows how the three modules can easily be used independently of GAMBIT. (orig.)

  4. SpecBit, DecayBit and PrecisionBit: GAMBIT modules for computing mass spectra, particle decay rates and precision observables

    Science.gov (United States)

    Athron, Peter; Balázs, Csaba; Dal, Lars A.; Edsjö, Joakim; Farmer, Ben; Gonzalo, Tomás E.; Kvellestad, Anders; McKay, James; Putze, Antje; Rogan, Chris; Scott, Pat; Weniger, Christoph; White, Martin

    2018-01-01

    We present the GAMBIT modules SpecBit, DecayBit and PrecisionBit. Together they provide a new framework for linking publicly available spectrum generators, decay codes and other precision observable calculations in a physically and statistically consistent manner. This allows users to automatically run various combinations of existing codes as if they are a single package. The modular design allows software packages fulfilling the same role to be exchanged freely at runtime, with the results presented in a common format that can easily be passed to downstream dark matter, collider and flavour codes. These modules constitute an essential part of the broader GAMBIT framework, a major new software package for performing global fits. In this paper we present the observable calculations, data, and likelihood functions implemented in the three modules, as well as the conventions and assumptions used in interfacing them with external codes. We also present 3-BIT-HIT, a command-line utility for computing mass spectra, couplings, decays and precision observables in the MSSM, which shows how the three modules can easily be used independently of GAMBIT.

  5. MEKANISME SEGMENTASI LAJU BIT PADA DYNAMIC ADAPTIVE STREAMING OVER HTTP (DASH UNTUK APLIKASI VIDEO STREAMING

    Directory of Open Access Journals (Sweden)

    Muhammad Audy Bazly

    2015-12-01

    Full Text Available This paper aims to analyze Internet-based streaming video service in the communication media with variable bit rates. The proposed scheme on Dynamic Adaptive Streaming over HTTP (DASH using the internet network that adapts to the protocol Hyper Text Transfer Protocol (HTTP. DASH technology allows a video in the video segmentation into several packages that will distreamingkan. DASH initial stage is to compress the video source to lower the bit rate video codec uses H.26. Video compressed further in the segmentation using MP4Box generates streaming packets with the specified duration. These packages are assembled into packets in a streaming media format Presentation Description (MPD or known as MPEG-DASH. Streaming video format MPEG-DASH run on a platform with the player bitdash teritegrasi bitcoin. With this scheme, the video will have several variants of the bit rates that gave rise to the concept of scalability of streaming video services on the client side. The main target of the mechanism is smooth the MPEG-DASH streaming video display on the client. The simulation results show that the scheme based scalable video streaming MPEG- DASH able to improve the quality of image display on the client side, where the procedure bufering videos can be made constant and fine for the duration of video views

  6. Sleep stage classification with low complexity and low bit rate.

    Science.gov (United States)

    Virkkala, Jussi; Värri, Alpo; Hasan, Joel; Himanen, Sari-Leena; Müller, Kiti

    2009-01-01

    Standard sleep stage classification is based on visual analysis of central (usually also frontal and occipital) EEG, two-channel EOG, and submental EMG signals. The process is complex, using multiple electrodes, and is usually based on relatively high (200-500 Hz) sampling rates. Also at least 12 bit analog to digital conversion is recommended (with 16 bit storage) resulting in total bit rate of at least 12.8 kbit/s. This is not a problem for in-house laboratory sleep studies, but in the case of online wireless self-applicable ambulatory sleep studies, lower complexity and lower bit rates are preferred. In this study we further developed earlier single channel facial EMG/EOG/EEG-based automatic sleep stage classification. An algorithm with a simple decision tree separated 30 s epochs into wakefulness, SREM, S1/S2 and SWS using 18-45 Hz beta power and 0.5-6 Hz amplitude. Improvements included low complexity recursive digital filtering. We also evaluated the effects of a reduced sampling rate, reduced number of quantization steps and reduced dynamic range on the sleep data of 132 training and 131 testing subjects. With the studied algorithm, it was possible to reduce the sampling rate to 50 Hz (having a low pass filter at 90 Hz), and the dynamic range to 244 microV, with an 8 bit resolution resulting in a bit rate of 0.4 kbit/s. Facial electrodes and a low bit rate enables the use of smaller devices for sleep stage classification in home environments.

  7. Test plan for core sampling drill bit temperature monitor

    International Nuclear Information System (INIS)

    Francis, P.M.

    1994-01-01

    At WHC, one of the functions of the Tank Waste Remediation System division is sampling waste tanks to characterize their contents. The push-mode core sampling truck is currently used to take samples of liquid and sludge. Sampling of tanks containing hard salt cake is to be performed with the rotary-mode core sampling system, consisting of the core sample truck, mobile exhauster unit, and ancillary subsystems. When drilling through the salt cake material, friction and heat can be generated in the drill bit. Based upon tank safety reviews, it has been determined that the drill bit temperature must not exceed 180 C, due to the potential reactivity of tank contents at this temperature. Consequently, a drill bit temperature limit of 150 C was established for operation of the core sample truck to have an adequate margin of safety. Unpredictable factors, such as localized heating, cause this buffer to be so great. The most desirable safeguard against exceeding this threshold is bit temperature monitoring . This document describes the recommended plan for testing the prototype of a drill bit temperature monitor developed for core sampling by Sandia National Labs. The device will be tested at their facilities. This test plan documents the tests that Westinghouse Hanford Company considers necessary for effective testing of the system

  8. Narrow widths of old and new resonances

    International Nuclear Information System (INIS)

    Pasupathy, J.

    1977-01-01

    A quantitative measure of the suppression factors involved in the pionic decays of mesons phi(1019) and f'(1514) as compared to their kaonic psi(3100) and psi(3700) decays are explained using the two different approaches, viz., the phenomenological S matrix approach and the field theoretical approach. The importance of the O-Z-I rule is brought out. The partial width GAMMA(phi → 3π) has been calculated using the dual model for the scattering kappa kappa(bar) → rhoπ. The effective coupling psi rho π is evaluated. The partial widths for psi → e + e - and psi → hadrons is calculated on a field theoretical approach. In conclusion, it appears that there are no serious objections to interpreting psi and psi' as cc - states. Most of their properties can be understood in a qualitative and in semi-quantitative way. (A.K.)

  9. Numerical simulation of distorted crystal Darwin width

    International Nuclear Information System (INIS)

    Wang Li; Xu Zhongmin; Wang Naxiu

    2012-01-01

    A new numerical simulation method according to distorted crystal optical theory was used to predict the direct-cooling crystal monochromator optical properties(crystal Darwin width) in this study. The finite element analysis software was used to calculate the deformed displacements of DCM crystal and to get the local reciprocal lattice vector of distorted crystal. The broadening of direct-cooling crystal Darwin width in meridional direction was estimated at 4.12 μrad. The result agrees well with the experimental data of 5 μrad, while it was 3.89 μrad by traditional calculation method of root mean square (RMS) of the slope error in the center line of footprint. The new method provides important theoretical support for designing and processing of monochromator crystal for synchrotron radiation beamline. (authors)

  10. Exotic meson decay widths using lattice QCD

    International Nuclear Information System (INIS)

    Cook, M. S.; Fiebig, H. R.

    2006-01-01

    A decay width calculation for a hybrid exotic meson h, with J PC =1 -+ , is presented for the channel h→πa 1 . This quenched lattice QCD simulation employs Luescher's finite box method. Operators coupling to the h and πa 1 states are used at various levels of smearing and fuzzing, and at four quark masses. Eigenvalues of the corresponding correlation matrices yield energy spectra that determine scattering phase shifts for a discrete set of relative πa 1 momenta. Although the phase shift data is sparse, fits to a Breit-Wigner model are attempted, resulting in a decay width of about 60 MeV when averaged over two lattice sizes having a lattice spacing of 0.07 fm

  11. Analysis of reduced widths and size

    International Nuclear Information System (INIS)

    Sharma, H.C.; Ram Raj; Nath, N.

    1977-01-01

    Recent data on S-wave neutron reduced widths for a large number of nuclei have been analysed nucleus-wise and the calculations for the degree of freedom of the associated (chi) 2 -distribution have been made using the Porter and Thomas procedure. It is noted that a number of nuclei can be fitted by a (chi) 2 -distribution with degree of freedom one, while there are few which are identified to follow a (chi) 2 -distribution with degree of freedom two and even more than two. The present analysis thus contradicts the usual presumption according to which the degree of freedom is taken to be always unity. An analytical attempt has also been made to ascertain the suitability of the data on reduced widths to be used for the analysis. These considerations are likely to modify the neutron cross-section evaluations. (author)

  12. Diamond bits for directional drilling of wells and technology of using them

    Energy Technology Data Exchange (ETDEWEB)

    Romanov, V P; Steblev, B Ye; Sumaneyev, N N

    1979-01-01

    Characteristics are presented for a diamond bit for directional drilling ADN-08. Technology of using it is described, as well as cutter bits for directional drilling. Based on specially developed technique, the economic effect of using the diamond bits is calculated. This indicates that the use of the diamond bits in rocks of the VIII category significantly improves the quality of directional drilling.

  13. Meson widths from string worldsheet instantons

    International Nuclear Information System (INIS)

    Faulkner, Thomas; Liu, Hong

    2009-01-01

    We show that open strings living on a D-brane which lies outside an AdS black hole can tunnel into the black hole through worldsheet instantons. These instantons have a simple interpretation in terms of thermal quarks in the dual Yang-Mills (YM) theory. As an application we calculate the width of a meson in a strongly coupled quark-gluon plasma which is described holographically as a massless mode on a D7 brane in AdS 5 xS 5 . While the width of the meson is zero to all orders in the 1/√(λ) expansion with λ the 't Hooft coupling, it receives non-perturbative contributions in 1/√(λ) from worldsheet instantons. We find that the width increases quadratically with momentum at large momentum and comment on potential phenomenological implications of this enhancement for heavy ion collisions. We also comment on how this non-perturbative effect has important consequences for the phase structure of the YM theory obtained in the classical gravity limit

  14. Width and partial widths of unstable particles in the light of the Nielsen identities

    International Nuclear Information System (INIS)

    Grassi, P.A.; Sirlin, A.; Kniehl, B.A.; Hamburg Univ.

    2001-09-01

    Fundamental properties of unstable particles, including mass, width, and partial widths, are examined on the basis of the Nielsen identities (NI) that describe the gauge dependence of Green functions. In particular, we prove that the pole residues and associated definitions of branching ratios and partial widths are gauge independent to all orders. A simpler, previously discussed definition of branching ratios and partial widths is found to be gauge independent through next-to-next-to-leading order. It is then explained how it may be modified in order to extend the gauge independence to all orders. We also show that the physical scattering amplitude is the most general combination of self-energy, vertex, and box contributions that is gauge independent for arbitrary s, discuss the analytical properties of the NI functions, and exhibit explicitly their one-loop expressions in the Z-γ sector of the Standard Model. (orig.)

  15. Width and partial widths of unstable particles in the light of the Nielsen identities

    International Nuclear Information System (INIS)

    Grassi, Pietro A.; Kniehl, Bernd A.; Sirlin, Alberto

    2002-01-01

    Fundamental properties of unstable particles, including mass, width, and partial widths, are examined on the basis of the Nielsen identities (NI) that describe the gauge dependence of Green functions. In particular, we prove that the pole residues and associated definitions of branching ratios and partial widths are gauge independent to all orders. A simpler, previously discussed definition of branching ratios and partial widths is found to be gauge independent through next-to-next-to-leading order. It is then explained how it may be modified in order to extend the gauge independence to all orders. We also show that the physical scattering amplitude is the most general combination of self-energy, vertex, and box contributions that is gauge independent for arbitrary s, discuss the analytical properties of the NI functions, and exhibit explicitly their one-loop expressions in the Z-γ sector of the standard model

  16. Security bound of cheat sensitive quantum bit commitment.

    Science.gov (United States)

    He, Guang Ping

    2015-03-23

    Cheat sensitive quantum bit commitment (CSQBC) loosens the security requirement of quantum bit commitment (QBC), so that the existing impossibility proofs of unconditionally secure QBC can be evaded. But here we analyze the common features in all existing CSQBC protocols, and show that in any CSQBC having these features, the receiver can always learn a non-trivial amount of information on the sender's committed bit before it is unveiled, while his cheating can pass the security check with a probability not less than 50%. The sender's cheating is also studied. The optimal CSQBC protocols that can minimize the sum of the cheating probabilities of both parties are found to be trivial, as they are practically useless. We also discuss the possibility of building a fair protocol in which both parties can cheat with equal probabilities.

  17. Security bound of cheat sensitive quantum bit commitment

    Science.gov (United States)

    He, Guang Ping

    2015-03-01

    Cheat sensitive quantum bit commitment (CSQBC) loosens the security requirement of quantum bit commitment (QBC), so that the existing impossibility proofs of unconditionally secure QBC can be evaded. But here we analyze the common features in all existing CSQBC protocols, and show that in any CSQBC having these features, the receiver can always learn a non-trivial amount of information on the sender's committed bit before it is unveiled, while his cheating can pass the security check with a probability not less than 50%. The sender's cheating is also studied. The optimal CSQBC protocols that can minimize the sum of the cheating probabilities of both parties are found to be trivial, as they are practically useless. We also discuss the possibility of building a fair protocol in which both parties can cheat with equal probabilities.

  18. Modified model of neutron resonance widths distribution. Results of total gamma-widths approximation

    International Nuclear Information System (INIS)

    Sukhovoj, A.M.; Khitrov, V.A.

    2011-01-01

    Functional dependences of probability to observe given Γ n 0 value and algorithms for determination of the most probable magnitudes of the modified model of resonance parameter distributions were used for analysis of the experimental data on the total radiative widths of neutron resonances. As in the case of neutron widths, precise description of the Γ γ spectra requires a superposition of three and more probability distributions for squares of the random normally distributed values with different nonzero average and nonunit dispersion. This result confirms the preliminary conclusion obtained earlier at analysis of Γ n 0 that practically in all 56 tested sets of total gamma widths there are several groups noticeably differing from each other by the structure of their wave functions. In addition, it was determined that radiative widths are much more sensitive than the neutron ones to resonance wave functions structure. Analysis of early obtained neutron reduced widths distribution parameters for 157 resonance sets in the mass region of nuclei 35 ≤ A ≤ 249 was also performed. It was shown that the experimental values of widths can correspond with high probability to superposition of several expected independent distributions with their nonzero mean values and nonunit dispersion

  19. Hanford coring bit temperature monitor development testing results report

    International Nuclear Information System (INIS)

    Rey, D.

    1995-05-01

    Instrumentation which directly monitors the temperature of a coring bit used to retrieve core samples of high level nuclear waste stored in tanks at Hanford was developed at Sandia National Laboratories. Monitoring the temperature of the coring bit is desired to enhance the safety of the coring operations. A unique application of mature technologies was used to accomplish the measurement. This report documents the results of development testing performed at Sandia to assure the instrumentation will withstand the severe environments present in the waste tanks

  20. How to Convert a Flavor of Quantum Bit Commitment

    DEFF Research Database (Denmark)

    Crepeau, Claude; Legare, Frédéric; Salvail, Louis

    2001-01-01

    In this paper we show how to convert a statistically binding but computationally concealing quantum bit commitment scheme into a computationally binding but statistically concealing QBC scheme. For a security parameter n, the construction of the statistically concealing scheme requires O(n2......) executions of the statistically binding scheme. As a consequence, statistically concealing but computationally binding quantum bit commitments can be based upon any family of quantum one-way functions. Such a construction is not known to exist in the classical world....

  1. Bit-wise arithmetic coding for data compression

    Science.gov (United States)

    Kiely, A. B.

    1994-01-01

    This article examines the problem of compressing a uniformly quantized independent and identically distributed (IID) source. We present a new compression technique, bit-wise arithmetic coding, that assigns fixed-length codewords to the quantizer output and uses arithmetic coding to compress the codewords, treating the codeword bits as independent. We examine the performance of this method and evaluate the overhead required when used block-adaptively. Simulation results are presented for Gaussian and Laplacian sources. This new technique could be used as the entropy coder in a transform or subband coding system.

  2. Cloning the entanglement of a pair of quantum bits

    International Nuclear Information System (INIS)

    Lamoureux, Louis-Philippe; Navez, Patrick; Cerf, Nicolas J.; Fiurasek, Jaromir

    2004-01-01

    It is shown that any quantum operation that perfectly clones the entanglement of all maximally entangled qubit pairs cannot preserve separability. This 'entanglement no-cloning' principle naturally suggests that some approximate cloning of entanglement is nevertheless allowed by quantum mechanics. We investigate a separability-preserving optimal cloning machine that duplicates all maximally entangled states of two qubits, resulting in 0.285 bits of entanglement per clone, while a local cloning machine only yields 0.060 bits of entanglement per clone

  3. Radioactive tracer system to indicate drill bit wear or failure

    International Nuclear Information System (INIS)

    Fries, B.A.

    1975-01-01

    A radioactive tracer system for indicating drill bit wear or failure utilizing radioactive krypton 85 in clathrate form, in the form of water-soluble kryptonates, or dissolved grease, is described. Preferably the radioactive krypton is placed so that when drill bit wear or failure occurs, the radioactive krypton 85 is relased and effectively becomes diffused in the circulating drilling fluid. At the surface, the radioactive krypton 85 gas is separated from the circulating drilling fluid by gas-mud separating means and is transported as a gas to a counting chamber where an accurate radioactivity count of beta rays released from the krypton is obtained. (Patent Office Record)

  4. How to deal with malleability of BitCoin transactions

    OpenAIRE

    Andrychowicz, Marcin; Dziembowski, Stefan; Malinowski, Daniel; Mazurek, Łukasz

    2013-01-01

    BitCoin transactions are malleable in a sense that given a transaction an adversary can easily construct an equivalent transaction which has a different hash. This can pose a serious problem in some BitCoin distributed contracts in which changing a transaction's hash may result in the protocol disruption and a financial loss. The problem mostly concerns protocols, which use a "refund" transaction to withdraw a deposit in a case of the protocol interruption. In this short note, we show a gener...

  5. Generating bit reversed numbers for calculating fast fourier transform

    Digital Repository Service at National Institute of Oceanography (India)

    Suresh, T.

    prerequisite of these methods are that data elements be available for shuffling in an array. Thus in a software environment, if the input data values are to be read from a file, reordering can be done only after al1 the values have been read into the array.... Alternately, data values can be read and placed directly at respective bit reversed positions by generating bit reversed addresses. Such a method can help in real-time data acquisition and FFT calculation. Thus, an efficient method of generating sequence...

  6. Development of a jet-assisted polycrystalline diamond drill bit

    Energy Technology Data Exchange (ETDEWEB)

    Pixton, D.S.; Hall, D.R.; Summers, D.A.; Gertsch, R.E.

    1997-12-31

    A preliminary investigation has been conducted to evaluate the technical feasibility and potential economic benefits of a new type of drill bit. This bit transmits both rotary and percussive drilling forces to the rock face, and augments this cutting action with high-pressure mud jets. Both the percussive drilling forces and the mud jets are generated down-hole by a mud-actuated hammer. Initial laboratory studies show that rate of penetration increases on the order of a factor of two over unaugmented rotary and/or percussive drilling rates are possible with jet-assistance.

  7. Rapidly Mixing Gibbs Sampling for a Class of Factor Graphs Using Hierarchy Width.

    Science.gov (United States)

    De Sa, Christopher; Zhang, Ce; Olukotun, Kunle; Ré, Christopher

    2015-12-01

    Gibbs sampling on factor graphs is a widely used inference technique, which often produces good empirical results. Theoretical guarantees for its performance are weak: even for tree structured graphs, the mixing time of Gibbs may be exponential in the number of variables. To help understand the behavior of Gibbs sampling, we introduce a new (hyper)graph property, called hierarchy width . We show that under suitable conditions on the weights, bounded hierarchy width ensures polynomial mixing time. Our study of hierarchy width is in part motivated by a class of factor graph templates, hierarchical templates , which have bounded hierarchy width-regardless of the data used to instantiate them. We demonstrate a rich application from natural language processing in which Gibbs sampling provably mixes rapidly and achieves accuracy that exceeds human volunteers.

  8. Nuclear structure effects on alpha reduced widths

    International Nuclear Information System (INIS)

    Toth, K.S.; Ellis-Akovali, Y.A.; Kim, H.J.; McConnell, J.W.

    1987-01-01

    A review of α widths for s-wave transitions is presented together with a discussion of the following topics: (1) a new determination of the 218 Ra half-life and its relation to reflection asymmetry in nuclei near N = 130, (2) a measurement of the 194 Pb α-decay rate and the influence of the Z = 82 gap on neutron-deficient Pb nuclei, and (3) an up-date of α-decay-rate systematics for isotopes in the rare earth and medium-weight mass regions. 16 refs., 6 figs

  9. Statistical analysis of partial reduced width distributions

    International Nuclear Information System (INIS)

    Tran Quoc Thuong.

    1973-01-01

    The aim of this study was to develop rigorous methods for analysing experimental event distributions according to a law in chi 2 and to check if the number of degrees of freedom ν is compatible with the value 1 for the reduced neutron width distribution. Two statistical methods were used (the maximum-likelihood method and the method of moments); it was shown, in a few particular cases, that ν is compatible with 1. The difference between ν and 1, if it exists, should not exceed 3%. These results confirm the validity of the compound nucleus model [fr

  10. Simple method for calculating island widths

    International Nuclear Information System (INIS)

    Cary, J.R.; Hanson, J.D.; Carreras, B.A.; Lynch, V.E.

    1989-01-01

    A simple method for calculating magnetic island widths has been developed. This method uses only information obtained from integrating along the closed field line at the island center. Thus, this method is computationally less intensive than the usual method of producing surfaces of section of sufficient detail to locate and resolve the island separatrix. This method has been implemented numerically and used to analyze the buss work islands of ATF. In this case the method proves to be accurate to at least within 30%. 7 refs

  11. Resolving single bubble sonoluminescence flask width

    OpenAIRE

    Arakeri, Vijay H

    1998-01-01

    Single bubble sonoluminescence (SBSL), first studied and observed by Gaitan et al., is the of light emission from a single gas bubble trapped at the pressure maximum of a resonant sound field in a liquid medium, generally water. One of the most striking aspects of SBSL was the estimated optical flash width being less than 50 picoseconds (ps)3; this upper estimate was based on the relative response of a SBSL flash in comparison to a 34 ps laser pulse using a microchannel platephotomultiplier ...

  12. Influence of inhomogeneous broadening and deliberately introduced disorder on the width of the lasing spectrum of a quantum dot laser

    International Nuclear Information System (INIS)

    Korenev, V. V.; Savelyev, A. V.; Zhukov, A. E.; Omelchenko, A. V.; Maximov, M. V.

    2012-01-01

    Analytical expressions for the shape and width of the lasing spectra of a quantum-dot (QD) laser in the case of a small (in comparison with the spectrum width) homogeneous broadening of the QD energy levels have been obtained. It is shown that the dependence of the lasing spectrum width on the output power at room temperature is determined by two dimensionless parameters: the width of QD distribution over the optical-transition energy, normalized to temperature, and the ratio of the optical loss to the maximum gain. The optimal dimensions of the laser active region have been found to obtain a specified width of the emission spectrum at a minimum pump current. The possibility of using multilayer structures with QDs to increase the lasing spectrum’s width has been analyzed. It is shown that the use of several arrays of QDs with deliberately variable optical-transition energies leads to broadening of the lasing spectra; some numerical estimates are presented.

  13. Refinements of multi-track Viterbi bit-detection

    NARCIS (Netherlands)

    Hekstra, A.P.; Coene, W.M.J.; Immink, A.H.J.

    2006-01-01

    In optical storage, data can be arranged on the disc in a meta-spiral consisting of a large number of bit-rows with a small track-pitch. Successive revolutions of the meta-spiral are separated by a narrow guard band. For high storage densities, such a system results in severe 2-D inter-symbol

  14. Parity Bit Replenishment for JPEG 2000-Based Video Streaming

    Directory of Open Access Journals (Sweden)

    François-Olivier Devaux

    2009-01-01

    Full Text Available This paper envisions coding with side information to design a highly scalable video codec. To achieve fine-grained scalability in terms of resolution, quality, and spatial access as well as temporal access to individual frames, the JPEG 2000 coding algorithm has been considered as the reference algorithm to encode INTRA information, and coding with side information has been envisioned to refresh the blocks that change between two consecutive images of a video sequence. One advantage of coding with side information compared to conventional closed-loop hybrid video coding schemes lies in the fact that parity bits are designed to correct stochastic errors and not to encode deterministic prediction errors. This enables the codec to support some desynchronization between the encoder and the decoder, which is particularly helpful to adapt on the fly pre-encoded content to fluctuating network resources and/or user preferences in terms of regions of interest. Regarding the coding scheme itself, to preserve both quality scalability and compliance to the JPEG 2000 wavelet representation, a particular attention has been devoted to the definition of a practical coding framework able to exploit not only the temporal but also spatial correlation among wavelet subbands coefficients, while computing the parity bits on subsets of wavelet bit-planes. Simulations have shown that compared to pure INTRA-based conditional replenishment solutions, the addition of the parity bits option decreases the transmission cost in terms of bandwidth, while preserving access flexibility.

  15. Bitlis Bibliophil Association and One-Book Project

    Directory of Open Access Journals (Sweden)

    Hakan Yücel

    2014-03-01

    Full Text Available The article deals with Bitlis Bibliophil Association and One-Book Project which was established in January of the current year by a group of volunteer including several professions such as students, librarians, sociologists, engineers, civil cervants, teachers, bankers, poets, jorunalists, accountants.

  16. 2015 Southwest Florida RCD30 4-Band 8 Bit Imagery

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — These files contain imagery data collected with an RCD30 camera as 8-bit RGBN TIFF images. Imagery was required 1000m seaward of the land/water interface or to laser...

  17. Architecture of 32 bit CISC (Complex Instruction Set Computer) microprocessors

    International Nuclear Information System (INIS)

    Jove, T.M.; Ayguade, E.; Valero, M.

    1988-01-01

    In this paper we describe the main topics about the architecture of the best known 32-bit CISC microprocessors; i80386, MC68000 family, NS32000 series and Z80000. We focus on the high level languages support, operating system design facilities, memory management, techniques to speed up the overall performance and program debugging facilities. (Author)

  18. 2015 Florida Panhandle RCD30 4-Band 8 Bit Imagery

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — These files contain imagery data collected with an RCD30 camera as 8-bit RGBN TIFF images. Imagery was required 1000m seaward of the land/water interface or to laser...

  19. Quantum measurement and entanglement of spin quantum bits in diamond

    NARCIS (Netherlands)

    Pfaff, W.

    2013-01-01

    This thesis presents a set of experiments that explore the possible realisation of a macroscopic quantum network based on solid-state quantum bits. Such a quantum network would allow for studying quantum mechanics on large scales (meters, or even kilometers), and can open new possibilities for

  20. "Material interactions": from atoms & bits to entangled practices

    DEFF Research Database (Denmark)

    Vallgårda, Anna

    and intellectually stimulating panel moderated by Prof. Mikael Wiberg consisting of a number of scholars with a well-developed view on digital materialities to fuel a discussion on material interactions - from atoms & bits to entangled practices. These scholars include: Prof. Hiroshi Ishii, Prof. Paul Dourish...

  1. BIT/External Test Figures of Merit and Demonstration Techniques

    Science.gov (United States)

    1979-12-01

    111111 II * 0 IJ! E ii 6 A L 5.2.3 BIT caaiij.-The built-ln~tost I81T) capability $hall be Incorporated as required by the contrato assure...ETE physical characteristics arc straight forward and require no unique methodology for analysis or demonstration. 24 iU, VI T 3.2 DEFINITION OF

  2. Presettable up-down CAMAC counter for 24 bit

    International Nuclear Information System (INIS)

    Kuhn, K.; Meyer, U.; Weidhase, F.

    1976-01-01

    A module containing a presettable binary up-down CAMAC counter for 24 bit is described. The use of dataway is discussed. As an example for application in nuclear physics, control of beam position by the up-down counter is illustrated

  3. Factoring estimates for a 1024-bit RSA modulus

    NARCIS (Netherlands)

    Lenstra, A.K.; Tromer, E.; Shamir, A.; Kortsmit, W.J.P.M.; Dodson, B.; Hughes, J.; Leyland, P.; Laih, Chi Sung

    2003-01-01

    We estimate the yield of the number field sieve factoring algorithm when applied to the 1024-bit composite integer RSA-1024 and the parameters as proposed in the draft version [17] of the TWIRL hardware factoring device [18]. We present the details behind the resulting improved parameter choices

  4. BitTorrent's dilemma: Enhancing reciprocity or reducing inequity

    NARCIS (Netherlands)

    Jia, A.L.; D'Acunto, L.; Meulpolder, M.; Pouwelse, J.A.; Epema, D.H.J.

    2011-01-01

    Enhancing reciprocity has been one of the primary motivations for the design of incentive policies in BitTorrent-like P2P systems. Reciprocity implies that peers need to contribute their bandwidth to other peers if they want to receive bandwidth in return. However, the over-provisioning that

  5. Radiation hardened COTS-based 32-bit microprocessor

    International Nuclear Information System (INIS)

    Haddad, N.; Brown, R.; Cronauer, T.; Phan, H.

    1999-01-01

    A high performance radiation hardened 32-bit RISC microprocessor based upon a commercial single chip CPU has been developed. This paper presents the features of radiation hardened microprocessor, the methods used to radiation harden this device, the results of radiation testing, and shows that the RAD6000 is well-suited for the vast majority of space applications. (authors)

  6. KEAMANAN CITRA DENGAN WATERMARKING MENGGUNAKAN PENGEMBANGAN ALGORITMA LEAST SIGNIFICANT BIT

    Directory of Open Access Journals (Sweden)

    Kurniawan Kurniawan

    2015-01-01

    Full Text Available Image security is a process to save digital. One method of securing image digital is watermarking using Least Significant Bit algorithm. Main concept of image security using LSB algorithm is to replace bit value of image at specific location so that created pattern. The pattern result of replacing the bit value of image is called by watermark. Giving watermark at image digital using LSB algorithm has simple concept so that the information which is embedded will lost easily when attacked such as noise attack or compression. So need modification like development of LSB algorithm. This is done to decrease distortion of watermark information against those attacks. In this research is divided by 6 process which are color extraction of cover image, busy area search, watermark embed, count the accuracy of watermark embed, watermark extraction, and count the accuracy of watermark extraction. Color extraction of cover image is process to get blue color component from cover image. Watermark information will embed at busy area by search the area which has the greatest number of unsure from cover image. Then watermark image is embedded into cover image so that produce watermarked image using some development of LSB algorithm and search the accuracy by count the Peak Signal to Noise Ratio value. Before the watermarked image is extracted, need to test by giving noise and doing compression into jpg format. The accuracy of extraction result is searched by count the Bit Error Rate value.

  7. Designing the optimal bit: balancing energetic cost, speed and reliability.

    Science.gov (United States)

    Deshpande, Abhishek; Gopalkrishnan, Manoj; Ouldridge, Thomas E; Jones, Nick S

    2017-08-01

    We consider the challenge of operating a reliable bit that can be rapidly erased. We find that both erasing and reliability times are non-monotonic in the underlying friction, leading to a trade-off between erasing speed and bit reliability. Fast erasure is possible at the expense of low reliability at moderate friction, and high reliability comes at the expense of slow erasure in the underdamped and overdamped limits. Within a given class of bit parameters and control strategies, we define 'optimal' designs of bits that meet the desired reliability and erasing time requirements with the lowest operational work cost. We find that optimal designs always saturate the bound on the erasing time requirement, but can exceed the required reliability time if critically damped. The non-trivial geometry of the reliability and erasing time scales allows us to exclude large regions of parameter space as suboptimal. We find that optimal designs are either critically damped or close to critical damping under the erasing procedure.

  8. Different Mass Processing Services in a Bit Repository

    DEFF Research Database (Denmark)

    Jurik, Bolette; Zierau, Eld

    2011-01-01

    This paper investigates how a general bit repository mass processing service using different programming models and platforms can be specified. Such a service is needed in large data archives, especially libraries, where different ways of doing mass processing is needed for different digital...

  9. Influence of diffuse goiter on tracheal width

    International Nuclear Information System (INIS)

    Baik, Sung Mo; Shon, Hyung Sun; Kim, Choon Yul; Bahk, Yong Whee

    1980-01-01

    The radioisotopic scanning of the thyroid gland is well established method of demonstrating morphology of the thyroid gland and is used to measure the size, area and weight of thyroid gland. The purpose of this investigation is to observe the various effects of goiter to the regional trachea. Both radioisotopic scanning and roentgenogram were taken at the same time to evaluate size, area and weight of the thyroid glands, as well as to measure the width of soft tissue structure of the neck and the regional trachea in normal and goitrous patients. The clinical materials consisted of normal thyroid group for control (46 cases), diffuse simple goiter group (76 cases) and Graves' disease group (59 cases). The results were as follows; 1. The goiter causes some narrowing of the regional trachea to various degree which is not necessarily reflective of the size of goiter. 2. The goiter may increase the width of retrotracheal soft tissue space. 3. The lateral roentgenogram of the neck appear very useful in estimating the thyroid gland three dimensionally and the effect of goiter to the regional trachea

  10. Tooth width predictions in a sample of Black South Africans.

    Science.gov (United States)

    Khan, M I; Seedat, A K; Hlongwa, P

    2007-07-01

    Space analysis during the mixed dentition requires prediction of the mesiodistal widths of the unerupted permanent canines and premolars and prediction tables and equations may be used for this purpose. The Tanaka and Johnston prediction equations, which were derived from a North American White sample, is one example which is widely used. This prediction equation may be inapplicable to other race groups due to racial tooth size variability. Therefore the purpose of this study was to derive prediction equations that would be applicable to Black South African subjects. One hundred and ten pre-treatment study casts of Black South African subjects were analysed from the Department of Orthodontics' records at the University of Limpopo. The sample was equally divided by gender with all subjects having Class I molar relationship and relatively well aligned teeth. The mesiodistal widths of the maxillary and mandibular canines and premolars were measured with a digital vernier calliper and compared with the measurements predicted with the Tanaka and Johnston equations. The relationship between the measured and predicted values were analysed by correlation and regression analyses. The results indicated that the Tanaka and Johnston prediction equations were not fully applicable to the Black South African sample. The equations tended to underpredict the male sample, while slight overprediction was observed in the female sample. Therefore, new equations were formulated and proposed that would be accurate for Black subjects.

  11. Analysis of bit-rock interaction during stick-slip vibrations using PDC cutting force model

    Energy Technology Data Exchange (ETDEWEB)

    Patil, P.A.; Teodoriu, C. [Technische Univ. Clausthal, Clausthal-Zellerfeld (Germany). ITE

    2013-08-01

    Drillstring vibration is one of the limiting factors maximizing the drilling performance and also causes premature failure of drillstring components. Polycrystalline diamond compact (PDC) bit enhances the overall drilling performance giving the best rate of penetrations with less cost per foot but the PDC bits are more susceptible to the stick slip phenomena which results in high fluctuations of bit rotational speed. Based on the torsional drillstring model developed using Matlab/Simulink for analyzing the parametric influence on stick-slip vibrations due to drilling parameters and drillstring properties, the study of relations between weight on bit, torque on bit, bit speed, rate of penetration and friction coefficient have been analyzed. While drilling with the PDC bits, the bit-rock interaction has been characterized by cutting forces and the frictional forces. The torque on bit and the weight on bit have both the cutting component and the frictional component when resolved in horizontal and vertical direction. The paper considers that the bit is undergoing stick-slip vibrations while analyzing the bit-rock interaction of the PDC bit. The Matlab/Simulink bit-rock interaction model has been developed which gives the average cutting torque, T{sub c}, and friction torque, T{sub f}, values on cutters as well as corresponding average weight transferred by the cutting face, W{sub c}, and the wear flat face, W{sub f}, of the cutters value due to friction.

  12. Direct measurement of the W boson width

    Energy Technology Data Exchange (ETDEWEB)

    Abazov, V.M.; /Dubna, JINR; Abbott, B.; /Oklahoma U.; Abolins, M.; /Michigan State U.; Acharya, B.S.; /Tata Inst.; Adams, M.; /Illinois U., Chicago; Adams, T.; /Florida State U.; Aguilo, E.; /Alberta U. /Simon Fraser U. /McGill U.; Ahsan, M.; /Kansas State U.; Alexeev, G.D.; /Dubna, JINR; Alkhazov, G.; /St. Petersburg, INP; Alton, A.; /Michigan U. /Northeastern U.

    2009-09-01

    We present a direct measurement of the width of the W boson using the shape of the transverse mass distribution of W {yields} e{nu} candidates selected in 1 fb{sup -1} of data collected with the D0 detector at the Fermilab Tevatron collider in p{bar p} collisions at {radical}s = 1.96 TeV. We use the same methods and data sample that were used for our recently published W boson mass measurement, except for the modeling of the recoil, which is done with a new method based on a recoil library. Our result, 2.028 {+-} 0.072 GeV, is in agreement with the predictions of the standard model and is the most precise direct measurement result from a single experiment to date.

  13. Width lines of non hydrogenoid ions

    International Nuclear Information System (INIS)

    Bertuccelli, D.; Bertuccelli, G.; Di Rocco, H.O.

    1990-01-01

    An extensive theoretical and experimental work was carried out on the ns-np and np-nd line widths (w) of noble gases after ionization (n=n 0 +1, were n 0 is the principal quantum number of the fundamental configuration). A high current 'pinch' discharge was used as source. Electron density and temperature were estimated to be N e =2.65x10 16 cm -3 and T=1.45x10 4 K respectively. Calculations were based on a semi-empirical approximation and the matrix elements (or transition probabilities) were evaluated in different approximation. Comparing our measurements with those of other authors, a systematic tendency, with a dependence on atomic number Z and ionization energy of the higher level L, was established. Finally, it has been established that for N e >10 17 cm -3 , w ∝ N e γ , where γ=5/6. (Author). 8 refs., 1 fig., 1 tab

  14. Lake Basin Fetch and Maximum Length/Width

    Data.gov (United States)

    Minnesota Department of Natural Resources — Linear features representing the Fetch, Maximum Length and Maximum Width of a lake basin. Fetch, maximum length and average width are calcuated from the lake polygon...

  15. Half-width at half-maximum, full-width at half-maximum analysis

    Indian Academy of Sciences (India)

    addition to the well-defined parameter full-width at half-maximum (FWHM). The distribution of ... optical side-lobes in the diffraction pattern resulting in steep central maxima [6], reduc- tion of effects of ... and broad central peak. The idea of.

  16. Gap Width Study and Fixture Design in Laser Butt-Welding

    DEFF Research Database (Denmark)

    Gong, Hui; Olsen, Flemming Ove

    .5-2.0 m/min, the laser power : 2 and 2.6 kW and the focal point position : 0 and -1.2 mm. Quality of all the butt welds are destructively tested according to ISO 13919-1.Influences of the variable process parameters to the maximum allowable gap width are observed as (1) the maximum gap width is inversely......This paper discusses some practical consideration for design of a mechanical fixture, which enables to accurately measure the width of a gap between two stainless steel workpieces and to steadfastly clamp the workpieces for butt-welding with a high power CO2 laser.With such a fixture, a series...... of butt-welding experiment is successfully carried out in order to find the maximum allowable gap width in laser butt-welding. The gap width study (GWS) is performed on the material of SST of W1.4401 (AISI 316) under various welding conditions, which are the gap width : 0.00-0.50 mm, the welding speed : 0...

  17. Attentional Focus and Grip Width Influences on Bench Press Resistance Training.

    Science.gov (United States)

    Calatayud, Joaquin; Vinstrup, Jonas; Jakobsen, Markus D; Sundstrup, Emil; Colado, JuanCarlos; Andersen, Lars L

    2018-04-01

    This study evaluated the influence of different attentional foci for varied grip widths in the bench press. Eighteen resistance-trained men were familiarized with the procedure and performed a one-repetition maximum (1RM) test during Session 1. In Session 2, they used three different standardized grip widths (100%, 150%, and 200% of biacromial width distance) in random order at 50% of 1RM while also engaged in three different attention focus conditions (external focus on the bench press, internal focus on pectoralis major muscles, and internal focus on triceps brachii muscles). Surface electromyography (EMG) signals were recorded from the triceps brachii and pectoralis major, and peak EMG of the filtered signals were normalized to maximum EMG of each muscle. Both grip width and focus influenced the muscle activity level, but there were no significant interactions between these variables. Exploratory analyses suggested that an internal focus may slightly (4%-6%) increase pectoralis major activity at wider grip widths and triceps brachii activity at narrower grip widths, but this should be confirmed or rejected in a study with a larger sample size or through a meta-analysis of research to date.

  18. Characterizing graphs of maximum matching width at most 2

    DEFF Research Database (Denmark)

    Jeong, Jisu; Ok, Seongmin; Suh, Geewon

    2017-01-01

    The maximum matching width is a width-parameter that is de ned on a branch-decomposition over the vertex set of a graph. The size of a maximum matching in the bipartite graph is used as a cut-function. In this paper, we characterize the graphs of maximum matching width at most 2 using the minor o...

  19. Modular trigger processing The GCT muon and quiet bit system

    CERN Document Server

    Stettler, Matthew; Hansen, Magnus; Iles, Gregory; Jones, John; PH-EP

    2007-01-01

    The CMS Global Calorimeter Trigger system's HCAL Muon and Quiet bit reformatting function is being implemented with a novel processing architecture. This architecture utilizes micro TCA, a modern modular communications standard based on high speed serial links, to implement a processing matrix. This matrix is configurable in both logical functionality and data flow, allowing far greater flexibility than current trigger processing systems. In addition, the modular nature of this architecture allows flexibility in scale unmatched by traditional approaches. The Muon and Quiet bit system consists of two major components, a custom micro TCA backplane and processing module. These components are based on Xilinx Virtex5 and Mindspeed crosspoint switch devices, bringing together state of the art FPGA based processing and Telcom switching technologies.

  20. Finger Vein Recognition Based on a Personalized Best Bit Map

    Science.gov (United States)

    Yang, Gongping; Xi, Xiaoming; Yin, Yilong

    2012-01-01

    Finger vein patterns have recently been recognized as an effective biometric identifier. In this paper, we propose a finger vein recognition method based on a personalized best bit map (PBBM). Our method is rooted in a local binary pattern based method and then inclined to use the best bits only for matching. We first present the concept of PBBM and the generating algorithm. Then we propose the finger vein recognition framework, which consists of preprocessing, feature extraction, and matching. Finally, we design extensive experiments to evaluate the effectiveness of our proposal. Experimental results show that PBBM achieves not only better performance, but also high robustness and reliability. In addition, PBBM can be used as a general framework for binary pattern based recognition. PMID:22438735

  1. Wear Detection of Drill Bit by Image-based Technique

    Science.gov (United States)

    Sukeri, Maziyah; Zulhilmi Paiz Ismadi, Mohd; Rahim Othman, Abdul; Kamaruddin, Shahrul

    2018-03-01

    Image processing for computer vision function plays an essential aspect in the manufacturing industries for the tool condition monitoring. This study proposes a dependable direct measurement method to measure the tool wear using image-based analysis. Segmentation and thresholding technique were used as the means to filter and convert the colour image to binary datasets. Then, the edge detection method was applied to characterize the edge of the drill bit. By using cross-correlation method, the edges of original and worn drill bits were correlated to each other. Cross-correlation graphs were able to detect the difference of the worn edge despite small difference between the graphs. Future development will focus on quantifying the worn profile as well as enhancing the sensitivity of the technique.

  2. The 40 Gbps cascaded bit-interleaving PON

    Science.gov (United States)

    Vyncke, A.; Torfs, G.; Van Praet, C.; Verbeke, M.; Duque, A.; Suvakovic, D.; Chow, H. K.; Yin, X.

    2015-12-01

    In this paper, a 40 Gbps cascaded bit-interleaving passive optical network (CBI-PON) is proposed to achieve power reduction in the network. The massive number of devices in the access network makes that power consumption reduction in this part of the network has a major impact on the total network power consumption. Starting from the proven BiPON technology, an extension to this concept is proposed to introduce multiple levels of bit-interleaving. The paper discusses the CBI protocol in detail, as well as an ASIC implementation of the required custom CBI Repeater and End-ONT. From the measurements of this first 40 Gbps ASIC prototype, power consumption reduction estimates are presented.

  3. Very low bit rate voice for packetized mobile applications

    International Nuclear Information System (INIS)

    Knittle, C.D.; Malone, K.T.

    1991-01-01

    This paper reports that transmitting digital voice via packetized mobile communications systems that employ relatively short packet lengths and narrow bandwidths often necessitates very low bit rate coding of the voice data. Sandia National Laboratories is currently developing an efficient voice coding system operating at 800 bits per second (bps). The coding scheme is a modified version of the 2400 bps NSA LPC-10e standard. The most significant modification to the LPC-10e scheme is the vector quantization of the line spectrum frequencies associated with the synthesis filters. An outline of a hardware implementation for the 800 bps coder is presented. The speech quality of the coder is generally good, although speaker recognition is not possible. Further research is being conducted to reduce the memory requirements and complexity of the vector quantizer, and to increase the quality of the reconstructed speech. This work may be of use dealing with nuclear materials

  4. Comodulation masking release in bit-rate reduction systems

    DEFF Research Database (Denmark)

    Vestergaard, Martin David; Rasmussen, Karsten Bo; Poulsen, Torben

    1999-01-01

    It has been suggested that the level dependence of the upper masking slope be utilized in perceptual models in bit-rate reduction systems. However, comodulation masking release (CMR) phenomena lead to a reduction of the masking effect when a masker and a probe signal are amplitude modulated...... with the same frequency. In bit-rate reduction systems the masker would be the audio signal and the probe signal would represent the quantization noise. Masking curves have been determined for sinusoids and 1-Bark-wide noise maskers in order to investigate the risk of CMR, when quantizing depths are fixed...... in accordance with psycho-acoustical principles. Masker frequencies of 500 Hz, 1 kHz, and 2 kHz have been investigated, and the masking of pure tone probes has been determined in the first four 1/3 octaves above the masker. Modulation frequencies between 6 and 20 Hz were used with a modulation depth of 0...

  5. b.i.t. Bremerhaven: Thin Clients entlasten Schulen

    Science.gov (United States)

    Das Schulamt Bremerhaven zentralisiert die Verwaltungs-IT und schafft dadurch Freiräume für pädagogische und organisatorische Herausforderungen. Pflege und Support der neuen Infrastruktur übernimmt der Dienstleister b.i.t. Bremerhaven, die Thin Clients kommen vom Bremer Hersteller IGEL Technology. Ganztagsschulen, das 12-jährige Abitur, PISA, der Wegfall der Orientierungsstufe - deutsche Schulen müssen derzeit zahlreiche organisatorische und pädagogische Herausforderungen bewältigen. Um die neuen Strukturen umsetzen zu können, werden zusätzliche Ressourcen benötigt. Das Schulamt Bremerhaven hat gemeinsam mit dem Dienstleister b.i.t. Bremerhaven (Betrieb für Informationstechnologie) eine intelligente Lösung gefunden, wie sich die benötigten finanziellen Freiräume schaffen lassen.

  6. Analysis of Button Bit Wear and Performance of Down-The-Hole ...

    African Journals Online (AJOL)

    Michael O. Mensah

    2015-12-02

    Dec 2, 2015 ... revealed that wear of rock drill bit is influenced by rock properties. ... equivalent quartz content and silica content are dominant rock properties affecting wear rate of bit button of DTH drill. ..... Cutting, Drilling and Blasting: Rock.

  7. Optical Switching and Bit Rates of 40 Gbit/s and above

    DEFF Research Database (Denmark)

    Ackaert, A.; Demester, P.; O'Mahony, M.

    2003-01-01

    Optical switching in WDM networks introduces additional aspects to the choice of single channel bit rates compared to WDM transmission systems. The mutual impact of optical switching and bit rates of 40 Gbps and above is discussed....

  8. VCSEL Scaling, Laser Integration on Silicon, and Bit Energy

    Science.gov (United States)

    2017-03-01

    especially the laser. Highly compact directly modulated lasers ( DMLs ) have been researched to meet this goal. The most favored technology will likely be...question of which achieves lower bit energy, a DML or a continuous-wave (CW) laser coupled to an integrated modulator. Transceiver suppliers are also...development that can utilize high efficiency DMLs that reach very high modulation speed. Oxide-VCSELs [1] do not yet take full advantage of the

  9. Purely Functional Compressed Bit Vectors with Applications and Implementations

    OpenAIRE

    Kaasinen, Joel

    2011-01-01

    The study of compressed data structures strives to represent information on a computer concisely — using as little space as possible. Compressed bit vectors are the simplest compressed data structure. They are used as a basis for more complex data structures with applications in, for example, computational biology. Functional programming is a programming paradigm that represents computation using functions without side-effects (such as mutation). Data structures that are representable in...

  10. Parallel-Bit Stream for Securing Iris Recognition

    OpenAIRE

    Elsayed Mostafa; Maher Mansour; Heba Saad

    2012-01-01

    Biometrics-based authentication schemes have usability advantages over traditional password-based authentication schemes. However, biometrics raises several privacy concerns, it has disadvantages comparing to traditional password in which it is not secured and non revocable. In this paper, we propose a fast method for securing revocable iris template using parallel-bit stream watermarking to overcome these problems. Experimental results prove that the proposed method has low computation time ...

  11. A Note on 5-bit Quadratic Permutations’ Classification

    OpenAIRE

    Božilov, Dušan; Bilgin, Begül; Sahin, Hacı Ali

    2017-01-01

    Classification of vectorial Boolean functions up to affine equivalence is used widely to analyze various cryptographic and implementation properties of symmetric-key algorithms. We show that there exist 75 affine equivalence classes of 5-bit quadratic permutations. Furthermore, we explore important cryptographic properties of these classes, such as linear and differential properties and degrees of their inverses, together with multiplicative complexity and existence of uniform threshold reali...

  12. 16-Bit RISC Processor Design for Convolution Application

    OpenAIRE

    Anand Nandakumar Shardul

    2013-01-01

    In this project, we propose a 16-bit non-pipelined RISC processor, which is used for signal processing applications. The processor consists of the blocks, namely, program counter, clock control unit, ALU, IDU and registers. Advantageous architectural modifications have been made in the incremented circuit used in program counter and carry select adder unit of the ALU in the RISC CPU core. Furthermore, a high speed and low power modified modifies multiplier has been designed and introduced in ...

  13. A short introduction to bit-string physics

    International Nuclear Information System (INIS)

    Noyes, H.P.

    1997-06-01

    This paper starts with a personal memoir of how some significant ideas arose and events took place during the period from 1972, when the author first encountered Ted Bastin, to 1979, when the author proposed the foundation of ANPA. He then discusses program universe, the fine structure paper and its rejection, the quantitative results up to ANPA 17 and take a new look at the handy-dandy formula. Following the historical material is a first pass at establishing new foundations for bit-string physics. An abstract model for a laboratory notebook and a historical record are developed, culminating in the bit-string representation. The author set up a tic-toc laboratory with two synchronized clocks and shows how this can be used to analyze arbitrary incoming data. This allows him to discuss (briefly) finite and discrete Lorentz transformations, commutation relations, and scattering theory. Earlier work on conservation laws in 3- and 4-events and the free space Dirac and Maxwell equations is cited. The paper concludes with a discussion of the quantum gravity problem from his point of view and speculations about how a bit-string theory of strong, electromagnetic, weak and gravitational unification could take shape

  14. Digital Signal Processing For Low Bit Rate TV Image Codecs

    Science.gov (United States)

    Rao, K. R.

    1987-06-01

    In view of the 56 KBPS digital switched network services and the ISDN, low bit rate codecs for providing real time full motion color video are under various stages of development. Some companies have already brought the codecs into the market. They are being used by industry and some Federal Agencies for video teleconferencing. In general, these codecs have various features such as multiplexing audio and data, high resolution graphics, encryption, error detection and correction, self diagnostics, freezeframe, split video, text overlay etc. To transmit the original color video on a 56 KBPS network requires bit rate reduction of the order of 1400:1. Such a large scale bandwidth compression can be realized only by implementing a number of sophisticated,digital signal processing techniques. This paper provides an overview of such techniques and outlines the newer concepts that are being investigated. Before resorting to the data compression techniques, various preprocessing operations such as noise filtering, composite-component transformation and horizontal and vertical blanking interval removal are to be implemented. Invariably spatio-temporal subsampling is achieved by appropriate filtering. Transform and/or prediction coupled with motion estimation and strengthened by adaptive features are some of the tools in the arsenal of the data reduction methods. Other essential blocks in the system are quantizer, bit allocation, buffer, multiplexer, channel coding etc.

  15. On the Lorentz invariance of bit-string geometry

    International Nuclear Information System (INIS)

    Noyes, H.P.

    1995-09-01

    We construct the class of integer-sided triangles and tetrahedra that respectively correspond to two or three discriminately independent bit-strings. In order to specify integer coordinates in this space, we take one vertex of a regular tetrahedron whose common edge length is an even integer as the origin of a line of integer length to the open-quotes pointclose quotes and three integer distances to this open-quotes pointclose quotes from the three remaining vertices of the reference tetrahedron. This - usually chiral - integer coordinate description of bit-string geometry is possible because three discriminately independent bit-strings generate four more; the Hamming measures of these seven strings always allow this geometrical interpretation. On another occasion we intend to prove the rotational invariance of this coordinate description. By identifying the corners of these figures with the positions of recording counters whose clocks are synchronized using the Einstein convention, we define velocities in this space. This suggests that it may be possible to define boosts and discrete Lorentz transformations in a space of integer coordinates. We relate this description to our previous work on measurement accuracy and the discrete ordered calculus of Etter and Kauffman (DOC)

  16. High performance 14-bit pipelined redundant signed digit ADC

    International Nuclear Information System (INIS)

    Narula, Swina; Pandey, Sujata

    2016-01-01

    A novel architecture of a pipelined redundant-signed-digit analog to digital converter (RSD-ADC) is presented featuring a high signal to noise ratio (SNR), spurious free dynamic range (SFDR) and signal to noise plus distortion (SNDR) with efficient background correction logic. The proposed ADC architecture shows high accuracy with a high speed circuit and efficient utilization of the hardware. This paper demonstrates the functionality of the digital correction logic of 14-bit pipelined ADC at each 1.5 bit/stage. This prototype of ADC architecture accounts for capacitor mismatch, comparator offset and finite Op-Amp gain error in the MDAC (residue amplification circuit) stages. With the proposed architecture of ADC, SNDR obtained is 85.89 dB, SNR is 85.9 dB and SFDR obtained is 102.8 dB at the sample rate of 100 MHz. This novel architecture of digital correction logic is transparent to the overall system, which is demonstrated by using 14-bit pipelined ADC. After a latency of 14 clocks, digital output will be available at every clock pulse. To describe the circuit behavior of the ADC, VHDL and MATLAB programs are used. The proposed architecture is also capable of reducing the digital hardware. Silicon area is also the complexity of the design. (paper)

  17. Tit-Bits, New Journalism, and early Sherlock Holmes fandom

    Directory of Open Access Journals (Sweden)

    Ann K. McClellan

    2017-03-01

    Full Text Available The Strand's more popular sister magazine, Tit-Bits, played a significant role in establishing Sherlock Holmes as a literary and cultural icon, particularly through its use of participatory practices, cross-promotion, and transmedia storytelling. I argue that Tit-Bits' late 19th-century New Journalism techniques like contests and prizes, inquiry columns, correspondence, and internal advertising fostered a corporately devised participatory fandom that directly contributed to Sherlock Holmes's popularity. Tit-Bits audiences were invited and encouraged to imagine new scenarios for their favorite character that were validated through publication. Such practices not only created a unique identity for Sherlock Holmes fandom but also directly contributed to the creation and maintenance of Holmes's fictional world. With fandom studies reaching more and more audiences—both academic and popular—historicizing early fan practices like the early publication and reception of the Sherlock Holmes stories provides important insight into how audiences have historically responded to, and interacted with, fictional characters, and how they helped sustain and expand those characters' fictional worlds.

  18. Application of morphological bit planes in retinal blood vessel extraction.

    Science.gov (United States)

    Fraz, M M; Basit, A; Barman, S A

    2013-04-01

    The appearance of the retinal blood vessels is an important diagnostic indicator of various clinical disorders of the eye and the body. Retinal blood vessels have been shown to provide evidence in terms of change in diameter, branching angles, or tortuosity, as a result of ophthalmic disease. This paper reports the development for an automated method for segmentation of blood vessels in retinal images. A unique combination of methods for retinal blood vessel skeleton detection and multidirectional morphological bit plane slicing is presented to extract the blood vessels from the color retinal images. The skeleton of main vessels is extracted by the application of directional differential operators and then evaluation of combination of derivative signs and average derivative values. Mathematical morphology has been materialized as a proficient technique for quantifying the retinal vasculature in ocular fundus images. A multidirectional top-hat operator with rotating structuring elements is used to emphasize the vessels in a particular direction, and information is extracted using bit plane slicing. An iterative region growing method is applied to integrate the main skeleton and the images resulting from bit plane slicing of vessel direction-dependent morphological filters. The approach is tested on two publicly available databases DRIVE and STARE. Average accuracy achieved by the proposed method is 0.9423 for both the databases with significant values of sensitivity and specificity also; the algorithm outperforms the second human observer in terms of precision of segmented vessel tree.

  19. Biometric Quantization through Detection Rate Optimized Bit Allocation

    Directory of Open Access Journals (Sweden)

    C. Chen

    2009-01-01

    Full Text Available Extracting binary strings from real-valued biometric templates is a fundamental step in many biometric template protection systems, such as fuzzy commitment, fuzzy extractor, secure sketch, and helper data systems. Previous work has been focusing on the design of optimal quantization and coding for each single feature component, yet the binary string—concatenation of all coded feature components—is not optimal. In this paper, we present a detection rate optimized bit allocation (DROBA principle, which assigns more bits to discriminative features and fewer bits to nondiscriminative features. We further propose a dynamic programming (DP approach and a greedy search (GS approach to achieve DROBA. Experiments of DROBA on the FVC2000 fingerprint database and the FRGC face database show good performances. As a universal method, DROBA is applicable to arbitrary biometric modalities, such as fingerprint texture, iris, signature, and face. DROBA will bring significant benefits not only to the template protection systems but also to the systems with fast matching requirements or constrained storage capability.

  20. Global synchronization of parallel processors using clock pulse width modulation

    Science.gov (United States)

    Chen, Dong; Ellavsky, Matthew R.; Franke, Ross L.; Gara, Alan; Gooding, Thomas M.; Haring, Rudolf A.; Jeanson, Mark J.; Kopcsay, Gerard V.; Liebsch, Thomas A.; Littrell, Daniel; Ohmacht, Martin; Reed, Don D.; Schenck, Brandon E.; Swetz, Richard A.

    2013-04-02

    A circuit generates a global clock signal with a pulse width modification to synchronize processors in a parallel computing system. The circuit may include a hardware module and a clock splitter. The hardware module may generate a clock signal and performs a pulse width modification on the clock signal. The pulse width modification changes a pulse width within a clock period in the clock signal. The clock splitter may distribute the pulse width modified clock signal to a plurality of processors in the parallel computing system.

  1. Beam-width spreading of vortex beams in free space

    Science.gov (United States)

    Wang, Weiwei; Li, Jinhong; Duan, Meiling

    2018-01-01

    Based on the extended Huygens-Fresnel principle and the definition of second-order moments of the Wigner distribution function, the analytical expression for the beam-width spreading of Gaussian Schell-model (GSM) vortex beams in free space are derived, and used to study the influence of beam parameters on the beam-width spreading of GSM vortex beams. With the increment of the propagation distance, the beam-width spreading of GSM vortex beams will increase; the bigger the topological charge, spatial correlation length, wavelength and waist width are, the smaller the beam-width spreading is.

  2. Narrow-width mechanism of a=5 Ξ-state

    International Nuclear Information System (INIS)

    Kumagai-Fuse, I.; Akaishi, Y.

    1995-04-01

    Narrow-width mechanism of ≡ 5 H is discussed by calculating conversion widths to all its possible decay channels. Since the conversion processes have small reaction Q values, the three- and four- body decays are strongly suppressed owing to small phase volumes available. Decay widths to the two-body channels are significantly reduced by the distortion of emitted-particle waves. This mechanism brings about a narrow width of ≡ 5 H. The total width is estimated to be 0.87 MeV, in which the largest contribution comes from the decay into the Λ 4 H * +Λ channel. (author)

  3. SOLAR TRACKER CERDAS DAN MURAH BERBASIS MIKROKONTROLER 8 BIT ATMega8535

    OpenAIRE

    I Wayan Sutaya; Ketut Udy Ariawan

    2016-01-01

    prototipe produk solar tracker cerdas berbasis mikrokontroler AVR 8 bit. Solar tracker ini memasukkan filter digital IIR (Infinite Impulse Response) pada bagian program. Memprogram filter ini membutuhkan perkalian 32 bit sedangkan prosesor yang tersedia pada mikrokontroler yang dipakai adalah 8 bit. Proses perkalian ini hanya bisa dilakukan pada mikrokontroler 8 bit dengan menggunakan bahasa assembly yang merupakan bahasa level hardware. Solar tracker cerdas yang menggunakan mikrokontroler 8 ...

  4. Effects of plastic bits on the condition and behaviour of captive-reared pheasants.

    Science.gov (United States)

    Butler, D A; Davis, C

    2010-03-27

    Between 2005 and 2007, data were collected from game farms across England and Wales to examine the effects of the use of bits on the physiological condition and behaviour of pheasants. On each site, two pheasant pens kept in the same conditions were randomly allocated to either use bits or not. The behaviour and physiological conditions of pheasants in each treatment pen were assessed on the day of bitting and weekly thereafter until release. Detailed records of feed usage, medications and mortality were also kept. Bits halved the number of acts of bird-on-bird pecking, but they doubled the incidence of headshaking and scratching. Bits caused nostril inflammation and bill deformities in some birds, particularly after seven weeks of age. In all weeks after bitting, feather condition was poorer in non-bitted pheasants than in those fitted with bits. Less than 3 per cent of bitted birds had damaged skin, but in the non-bitted pens this figure increased over time to 23 per cent four weeks later. Feed use and mortality did not differ between bitted and non-bitted birds.

  5. Surgical drill system and surgical drill bit to be used therein

    NARCIS (Netherlands)

    Margallo Balbas, E.; Wieringa, P.A.; French, P.J.; Lee, R.A.; Breedveld, P.

    2007-01-01

    Surgical drill system comprising a mechanical drill bit and means for imaging the vicinity of the drill bit tip, said means comprising: at least one optical fiber having a distal end and a proximal end, said distal end being located adjacent said drill bit tip, an optical processing unit, said

  6. Body sway at sea for two visual tasks and three stance widths.

    Science.gov (United States)

    Stoffregen, Thomas A; Villard, Sebastien; Yu, Yawen

    2009-12-01

    On land, body sway is influenced by stance width (the distance between the feet) and by visual tasks engaged in during stance. While wider stance can be used to stabilize the body against ship motion and crewmembers are obliged to carry out many visual tasks while standing, the influence of these factors on the kinematics of body sway has not been studied at sea. Crewmembers of the RN Atlantis stood on a force plate from which we obtained data on the positional variability of the center of pressure (COP). The sea state was 2 on the Beaufort scale. We varied stance width (5 cm, 17 cm, and 30 cm) and the nature of the visual tasks. In the Inspection task, participants viewed a plain piece of white paper, while in the Search task they counted the number of target letters that appeared in a block of text. Search task performance was similar to reports from terrestrial studies. Variability of the COP position was reduced during the Search task relative to the Inspection task. Variability was also reduced during wide stance relative to narrow stance. The influence of stance width was greater than has been observed in terrestrial studies. These results suggest that two factors that influence postural sway on land (variations in stance width and in the nature of visual tasks) also influence sway at sea. We conclude that--in mild sea states--the influence of these factors is not suppressed by ship motion.

  7. Bit Error-Rate Minimizing Detector for Amplify-and-Forward Relaying Systems Using Generalized Gaussian Kernel

    KAUST Repository

    Ahmed, Qasim Zeeshan

    2013-01-01

    In this letter, a new detector is proposed for amplifyand- forward (AF) relaying system when communicating with the assistance of relays. The major goal of this detector is to improve the bit error rate (BER) performance of the receiver. The probability density function is estimated with the help of kernel density technique. A generalized Gaussian kernel is proposed. This new kernel provides more flexibility and encompasses Gaussian and uniform kernels as special cases. The optimal window width of the kernel is calculated. Simulations results show that a gain of more than 1 dB can be achieved in terms of BER performance as compared to the minimum mean square error (MMSE) receiver when communicating over Rayleigh fading channels.

  8. The Sound of 1-bit: Technical constraint and musical creativity on the 48k Sinclair ZX Spectrum

    Directory of Open Access Journals (Sweden)

    Kenneth B. McAlpine

    2017-12-01

    Full Text Available This article explores constraint as a driver of creativity and innovation in early video game soundtracks. Using what was, perhaps, the most constrained platform of all, the 48k Sinclair ZX Spectrum, as a prism through which to examine the development of an early branch of video game music, the paper explores the creative approaches adopted by programmers to circumvent the Spectrum’s technical limitations so as to coax the hardware into performing feats of musicality that it had never been designed to achieve. These solutions were not without computational or aural cost, however, and their application often imparted a unique characteristic to the sound, which over time came to define the aesthetic of the 8-bit computer soundtrack, a sound which has been developed since as part of the emerging chiptune scene. By discussing pivotal moments in the development of ZX Spectrum music, this article will show how the application of binary impulse trains, granular synthesis, and pulse-width modulation came to shape the sound of 1-bit music.

  9. The digital agenda of virtual currencies: Can BitCoin become a global currency?

    OpenAIRE

    CIAIAN PAVEL; RAJCANIOVA MIROSLAVA; KANCS D'ARTIS

    2015-01-01

    This paper identifies and analyzes BitCoin features which may facilitate BitCoin to become a global currency, as well as characteristics which may impede the use of BitCoin as a medium of exchange, a unit of account and a store of value, and compares BitCoin with standard currencies with respect to the main functions of money. Among all analyzed BitCoin features, the extreme price volatility stands out most clearly compared to standard currencies. In order to understand the reasons for such e...

  10. Universality and clustering in 1 + 1 dimensional superstring-bit models

    International Nuclear Information System (INIS)

    Bergman, O.; Thorn, C.B.

    1996-01-01

    We construct a 1+1 dimensional superstring-bit model for D=3 Type IIB superstring. This low dimension model escapes the problem encountered in higher dimension models: (1) It possesses full Galilean supersymmetry; (2) For noninteracting Polymers of bits, the exactly soluble linear superpotential describing bit interactions is in a large universality class of superpotentials which includes ones bounded at spatial infinity; (3) The latter are used to construct a superstring-bit model with the clustering properties needed to define an S-matrix for closed polymers of superstring-bits

  11. A preliminary study on the containment building integrity following BIT removal for nuclear power plant

    International Nuclear Information System (INIS)

    Jo, Jong Young; Song, Dong Soo; Byun, Choong Sub

    2008-01-01

    Boron Injection Tank(BIT) is a component of the Safety Injection System, which its sole function is to provide concentrated boric acid to the reactor coolant in order to mitigate the consequences of postulated main steamline break accidents. Although BIT plays an important role in mitigating the accident, high concentration of 20,000ppm causes valve leakage, clog of precipitation and continuous heat tracing have to be provided. For the removal of BIT, benchmarking analysis is performed between COPATTA code used in final safety analysis report and CONTEMPT code to be used this study. CONTEMPT is well compatible with COPATTA. The sensitivity study for integrity is performed for the three cases of full double ended rupture at 102% power with diesel generator failure, 3.4m 3 and 2400ppm BIT, 3.4m 3 and 0ppm BIT and no volume of BIT. The results show that the deactivation of BIT is plausible for success

  12. Mathematical modelling of Bit-Level Architecture using Reciprocal Quantum Logic

    Science.gov (United States)

    Narendran, S.; Selvakumar, J.

    2018-04-01

    Efficiency of high-performance computing is on high demand with both speed and energy efficiency. Reciprocal Quantum Logic (RQL) is one of the technology which will produce high speed and zero static power dissipation. RQL uses AC power supply as input rather than DC input. RQL has three set of basic gates. Series of reciprocal transmission lines are placed in between each gate to avoid loss of power and to achieve high speed. Analytical model of Bit-Level Architecture are done through RQL. Major drawback of reciprocal Quantum Logic is area, because of lack in proper power supply. To achieve proper power supply we need to use splitters which will occupy large area. Distributed arithmetic uses vector- vector multiplication one is constant and other is signed variable and each word performs as a binary number, they rearranged and mixed to form distributed system. Distributed arithmetic is widely used in convolution and high performance computational devices.

  13. Weighted-Bit-Flipping-Based Sequential Scheduling Decoding Algorithms for LDPC Codes

    Directory of Open Access Journals (Sweden)

    Qing Zhu

    2013-01-01

    Full Text Available Low-density parity-check (LDPC codes can be applied in a lot of different scenarios such as video broadcasting and satellite communications. LDPC codes are commonly decoded by an iterative algorithm called belief propagation (BP over the corresponding Tanner graph. The original BP updates all the variable-nodes simultaneously, followed by all the check-nodes simultaneously as well. We propose a sequential scheduling algorithm based on weighted bit-flipping (WBF algorithm for the sake of improving the convergence speed. Notoriously, WBF is a low-complexity and simple algorithm. We combine it with BP to obtain advantages of these two algorithms. Flipping function used in WBF is borrowed to determine the priority of scheduling. Simulation results show that it can provide a good tradeoff between FER performance and computation complexity for short-length LDPC codes.

  14. Quantum random bit generation using energy fluctuations in stimulated Raman scattering.

    Science.gov (United States)

    Bustard, Philip J; England, Duncan G; Nunn, Josh; Moffatt, Doug; Spanner, Michael; Lausten, Rune; Sussman, Benjamin J

    2013-12-02

    Random number sequences are a critical resource in modern information processing systems, with applications in cryptography, numerical simulation, and data sampling. We introduce a quantum random number generator based on the measurement of pulse energy quantum fluctuations in Stokes light generated by spontaneously-initiated stimulated Raman scattering. Bright Stokes pulse energy fluctuations up to five times the mean energy are measured with fast photodiodes and converted to unbiased random binary strings. Since the pulse energy is a continuous variable, multiple bits can be extracted from a single measurement. Our approach can be generalized to a wide range of Raman active materials; here we demonstrate a prototype using the optical phonon line in bulk diamond.

  15. An Alternative Method to Compute the Bit Error Probability of Modulation Schemes Subject to Nakagami- Fading

    Directory of Open Access Journals (Sweden)

    Madeiro Francisco

    2010-01-01

    Full Text Available Abstract This paper presents an alternative method for determining exact expressions for the bit error probability (BEP of modulation schemes subject to Nakagami- fading. In this method, the Nakagami- fading channel is seen as an additive noise channel whose noise is modeled as the ratio between Gaussian and Nakagami- random variables. The method consists of using the cumulative density function of the resulting noise to obtain closed-form expressions for the BEP of modulation schemes subject to Nakagami- fading. In particular, the proposed method is used to obtain closed-form expressions for the BEP of -ary quadrature amplitude modulation ( -QAM, -ary pulse amplitude modulation ( -PAM, and rectangular quadrature amplitude modulation ( -QAM under Nakagami- fading. The main contribution of this paper is to show that this alternative method can be used to reduce the computational complexity for detecting signals in the presence of fading.

  16. Modeling of Bit Error Rate in Cascaded 2R Regenerators

    DEFF Research Database (Denmark)

    Öhman, Filip; Mørk, Jesper

    2006-01-01

    and the regenerating nonlinearity is investigated. It is shown that an increase in nonlinearity can compensate for an increase in noise figure or decrease in signal power. Furthermore, the influence of the improvement in signal extinction ratio along the cascade and the importance of choosing the proper threshold......This paper presents a simple and efficient model for estimating the bit error rate in a cascade of optical 2R-regenerators. The model includes the influences of of amplifier noise, finite extinction ratio and nonlinear reshaping. The interplay between the different signal impairments...

  17. Pseudo-random bit generator based on lag time series

    Science.gov (United States)

    García-Martínez, M.; Campos-Cantón, E.

    2014-12-01

    In this paper, we present a pseudo-random bit generator (PRBG) based on two lag time series of the logistic map using positive and negative values in the bifurcation parameter. In order to hidden the map used to build the pseudo-random series we have used a delay in the generation of time series. These new series when they are mapped xn against xn+1 present a cloud of points unrelated to the logistic map. Finally, the pseudo-random sequences have been tested with the suite of NIST giving satisfactory results for use in stream ciphers.

  18. Extending Landauer's bound from bit erasure to arbitrary computation

    Science.gov (United States)

    Wolpert, David

    The minimal thermodynamic work required to erase a bit, known as Landauer's bound, has been extensively investigated both theoretically and experimentally. However, when viewed as a computation that maps inputs to outputs, bit erasure has a very special property: the output does not depend on the input. Existing analyses of thermodynamics of bit erasure implicitly exploit this property, and thus cannot be directly extended to analyze the computation of arbitrary input-output maps. Here we show how to extend these earlier analyses of bit erasure to analyze the thermodynamics of arbitrary computations. Doing this establishes a formal connection between the thermodynamics of computers and much of theoretical computer science. We use this extension to analyze the thermodynamics of the canonical ``general purpose computer'' considered in computer science theory: a universal Turing machine (UTM). We consider a UTM which maps input programs to output strings, where inputs are drawn from an ensemble of random binary sequences, and prove: i) The minimal work needed by a UTM to run some particular input program X and produce output Y is the Kolmogorov complexity of Y minus the log of the ``algorithmic probability'' of Y. This minimal amount of thermodynamic work has a finite upper bound, which is independent of the output Y, depending only on the details of the UTM. ii) The expected work needed by a UTM to compute some given output Y is infinite. As a corollary, the overall expected work to run a UTM is infinite. iii) The expected work needed by an arbitrary Turing machine T (not necessarily universal) to compute some given output Y can either be infinite or finite, depending on Y and the details of T. To derive these results we must combine ideas from nonequilibrium statistical physics with fundamental results from computer science, such as Levin's coding theorem and other theorems about universal computation. I would like to ackowledge the Santa Fe Institute, Grant No

  19. 32 bit digital optical computer - A hardware update

    Science.gov (United States)

    Guilfoyle, Peter S.; Carter, James A., III; Stone, Richard V.; Pape, Dennis R.

    1990-01-01

    Such state-of-the-art devices as multielement linear laser diode arrays, multichannel acoustooptic modulators, optical relays, and avalanche photodiode arrays, are presently applied to the implementation of a 32-bit supercomputer's general-purpose optical central processing architecture. Shannon's theorem, Morozov's control operator method (in conjunction with combinatorial arithmetic), and DeMorgan's law have been used to design an architecture whose 100 MHz clock renders it fully competitive with emerging planar-semiconductor technology. Attention is given to the architecture's multichannel Bragg cells, thermal design and RF crosstalk considerations, and the first and second anamorphic relay legs.

  20. Quantum Bit Commitment and the Reality of the Quantum State

    Science.gov (United States)

    Srikanth, R.

    2018-01-01

    Quantum bit commitment is insecure in the standard non-relativistic quantum cryptographic framework, essentially because Alice can exploit quantum steering to defer making her commitment. Two assumptions in this framework are that: (a) Alice knows the ensembles of evidence E corresponding to either commitment; and (b) system E is quantum rather than classical. Here, we show how relaxing assumption (a) or (b) can render her malicious steering operation indeterminable or inexistent, respectively. Finally, we present a secure protocol that relaxes both assumptions in a quantum teleportation setting. Without appeal to an ontological framework, we argue that the protocol's security entails the reality of the quantum state, provided retrocausality is excluded.

  1. Single-board 32-bit computer for the FASTBUS

    International Nuclear Information System (INIS)

    Kellner, R.; Blossom, J.M.; Hong, J.P.

    1985-01-01

    The Los Alamos National Laboratory is building a 32bit computer on a FASTBUS board. It will use the National Semiconductor 32032 chip set, including the demand-paged memory management, floating point slave processor and interrupt control chips. The board will support 4 megabytes of memory which can be accessed by the processor over an on-board execution bus at processor speeds and which can be accessed by the FASTBUS at 80 megabytes per second. A windowed, direct memory access mechanism allows transfers of up to all of the memory

  2. Distribution of digital games via BitTorrent

    DEFF Research Database (Denmark)

    Drachen, Anders; Bauer, Kevin; Veitch, Robert W. D.

    2011-01-01

    distribution across game titles and game genres. This paper presents the first large-scale, open-method analysis of the distribution of digital game titles, which was conducted by monitoring the BitTorrent peer-to-peer (P2P) file-sharing protocol. The sample includes 173 games and a collection period of three...... months from late 2010 to early 2011. With a total of 12.6 million unique peers identified, it is the largest examination of game piracy via P2P networks to date. The study provides findings that reveal the magnitude of game piracy, the time-frequency of game torrents, which genres that get pirated...

  3. A 32-bit NMOS microprocessor with a large register file

    Science.gov (United States)

    Sherburne, R. W., Jr.; Katevenis, M. G. H.; Patterson, D. A.; Sequin, C. H.

    1984-10-01

    Two scaled versions of a 32-bit NMOS reduced instruction set computer CPU, called RISC II, have been implemented on two different processing lines using the simple Mead and Conway layout rules with lambda values of 2 and 1.5 microns (corresponding to drawn gate lengths of 4 and 3 microns), respectively. The design utilizes a small set of simple instructions in conjunction with a large register file in order to provide high performance. This approach has resulted in two surprisingly powerful single-chip processors.

  4. The significance of biometric parameters in determining anterior teeth width

    Directory of Open Access Journals (Sweden)

    Strajnić Ljiljana

    2013-01-01

    Full Text Available Background/Aim. An important element of prosthetic treatment of edentulous patients is selecting the size of anterior artificial teeth that will restore the natural harmony of one’s dentolabial structure as well as the whole face. The main objective of this study was to determine the correlation between the inner canthal distance (ICD and interalar width (IAW on one side and the width of both central incisors (CIW, the width of central and lateral incisors (CLIW, the width of anterior teeth (ATW, the width between the canine cusps (CCW, which may be useful in clinical practice. Methods. A total of 89 subjects comprising 23 male and 66 female were studied. Their age ranged from 19 to 34 years with the mean of 25 years. Only the subjects with the preserved natural dentition were included in the sample. All facial and intraoral tooth measurements were made with a Boley Gauge (Buffalo Dental Manufacturing Co., Brooklyn NY, USA having a resolution of 0.1mm. Results. A moderate correlation was established between the interalar width and combined width of anterior teeth and canine cusp width (r = 0.439, r = 0.374. A low correlation was established between the inner canthal distance and the width of anterior teeth and canine cusp width (r = 0.335, r = 0.303. The differences between the two genders were highly significant for all the parameters (p < 0.01. The measured facial distances and width of anterior teeth were higher in men than in women. Conclusion. The results of this study suggest that the examined interalar width and inner canthal distance cannot be considered reliable guidelines in the selection of artificial upper anterior teeth. However, they may be used as a useful additional factor combined with other methods for objective tooth selection. The final decision should be made while working on dentures fitting models with the patient’s consent.

  5. Step width alters iliotibial band strain during running.

    Science.gov (United States)

    Meardon, Stacey A; Campbell, Samuel; Derrick, Timothy R

    2012-11-01

    This study assessed the effect of step width during running on factors related to iliotibial band (ITB) syndrome. Three-dimensional (3D) kinematics and kinetics were recorded from 15 healthy recreational runners during overground running under various step width conditions (preferred and at least +/- 5% of their leg length). Strain and strain rate were estimated from a musculoskeletal model of the lower extremity. Greater ITB strain and strain rate were found in the narrower step width condition (p running, especially in persons whose running style is characterized by a narrow step width, may be beneficial in the treatment and prevention of running-related ITB syndrome.

  6. Bayesian signal reconstruction for 1-bit compressed sensing

    International Nuclear Information System (INIS)

    Xu, Yingying; Kabashima, Yoshiyuki; Zdeborová, Lenka

    2014-01-01

    The 1-bit compressed sensing framework enables the recovery of a sparse vector x from the sign information of each entry of its linear transformation. Discarding the amplitude information can significantly reduce the amount of data, which is highly beneficial in practical applications. In this paper, we present a Bayesian approach to signal reconstruction for 1-bit compressed sensing and analyze its typical performance using statistical mechanics. As a basic setup, we consider the case that the measuring matrix Φ has i.i.d entries and the measurements y are noiseless. Utilizing the replica method, we show that the Bayesian approach enables better reconstruction than the l 1 -norm minimization approach, asymptotically saturating the performance obtained when the non-zero entry positions of the signal are known, for signals whose non-zero entries follow zero mean Gaussian distributions. We also test a message passing algorithm for signal reconstruction on the basis of belief propagation. The results of numerical experiments are consistent with those of the theoretical analysis. (paper)

  7. Device-independent bit commitment based on the CHSH inequality

    International Nuclear Information System (INIS)

    Aharon, N; Massar, S; Pironio, S; Silman, J

    2016-01-01

    Bit commitment and coin flipping occupy a unique place in the device-independent landscape, as the only device-independent protocols thus far suggested for these tasks are reliant on tripartite GHZ correlations. Indeed, we know of no other bipartite tasks, which admit a device-independent formulation, but which are not known to be implementable using only bipartite nonlocality. Another interesting feature of these protocols is that the pseudo-telepathic nature of GHZ correlations—in contrast to the generally statistical character of nonlocal correlations, such as those arising in the violation of the CHSH inequality—is essential to their formulation and analysis. In this work, we present a device-independent bit commitment protocol based on CHSH testing, which achieves the same security as the optimal GHZ-based protocol, albeit at the price of fixing the time at which Alice reveals her commitment. The protocol is analyzed in the most general settings, where the devices are used repeatedly and may have long-term quantum memory. We also recast the protocol in a post-quantum setting where both honest and dishonest parties are restricted only by the impossibility of signaling, and find that overall the supra-quantum structure allows for greater security. (paper)

  8. Giga-bit optical data transmission module for Beam Instrumentation

    CERN Document Server

    Roedne, L T; Cenkeramaddi, L R; Jiao, L

    Particle accelerators require electronic instrumentation for diagnostic, assessment and monitoring during operation of the transferring and circulating beams. A sensor located near the beam provides an electrical signal related to the observable quantity of interest. The front-end electronics provides analog-to-digital conversion of the quantity being observed and the generated data are to be transferred to the external digital back-end for data processing, and to display to the operators and logging. This research project investigates the feasibility of radiation-tolerant giga-bit data transmission over optic fibre for beam instrumentation applications, starting from the assessment of the state of the art technology, identification of challenges and proposal of a system level solution, which should be validated with a PCB design in an experimental setup. Radiation tolerance of 10 kGy (Si) Total Ionizing Dose (TID) over 10 years of operation, Bit Error Rate (BER) 10-6 or better. The findings and results of th...

  9. Reexamination of quantum bit commitment: The possible and the impossible

    International Nuclear Information System (INIS)

    D'Ariano, Giacomo Mauro; Kretschmann, Dennis; Schlingemann, Dirk; Werner, Reinhard F.

    2007-01-01

    Bit commitment protocols whose security is based on the laws of quantum mechanics alone are generally held to be impossible. We give a strengthened and explicit proof of this result. We extend its scope to a much larger variety of protocols, which may have an arbitrary number of rounds, in which both classical and quantum information is exchanged, and which may include aborts and resets. Moreover, we do not consider the receiver to be bound to a fixed 'honest' strategy, so that 'anonymous state protocols', which were recently suggested as a possible way to beat the known no-go results, are also covered. We show that any concealing protocol allows the sender to find a cheating strategy, which is universal in the sense that it works against any strategy of the receiver. Moreover, if the concealing property holds only approximately, the cheat goes undetected with a high probability, which we explicitly estimate. The proof uses an explicit formalization of general two-party protocols, which is applicable to more general situations, and an estimate about the continuity of the Stinespring dilation of a general quantum channel. The result also provides a natural characterization of protocols that fall outside the standard setting of unlimited available technology and thus may allow secure bit commitment. We present such a protocol whose security, perhaps surprisingly, relies on decoherence in the receiver's laboratory

  10. Reexamination of quantum bit commitment: The possible and the impossible

    Science.gov (United States)

    D'Ariano, Giacomo Mauro; Kretschmann, Dennis; Schlingemann, Dirk; Werner, Reinhard F.

    2007-09-01

    Bit commitment protocols whose security is based on the laws of quantum mechanics alone are generally held to be impossible. We give a strengthened and explicit proof of this result. We extend its scope to a much larger variety of protocols, which may have an arbitrary number of rounds, in which both classical and quantum information is exchanged, and which may include aborts and resets. Moreover, we do not consider the receiver to be bound to a fixed “honest” strategy, so that “anonymous state protocols,” which were recently suggested as a possible way to beat the known no-go results, are also covered. We show that any concealing protocol allows the sender to find a cheating strategy, which is universal in the sense that it works against any strategy of the receiver. Moreover, if the concealing property holds only approximately, the cheat goes undetected with a high probability, which we explicitly estimate. The proof uses an explicit formalization of general two-party protocols, which is applicable to more general situations, and an estimate about the continuity of the Stinespring dilation of a general quantum channel. The result also provides a natural characterization of protocols that fall outside the standard setting of unlimited available technology and thus may allow secure bit commitment. We present such a protocol whose security, perhaps surprisingly, relies on decoherence in the receiver’s laboratory.

  11. Data acquisition electronics for gamma ray emission tomography using width-modulated leading-edge discriminators

    Energy Technology Data Exchange (ETDEWEB)

    Lage, E; Tapias, G; Villena, J; Desco, M; Vaquero, J J, E-mail: desco@mce.hggm.e [Unidad de Medicina y CirugIa Experimental, Hospital General Universitario Gregorio Maranon, Madrid (Spain)

    2010-08-07

    We present a new high-performance and low-cost approach for implementing radiation detection acquisition systems. The basic elements used are charge-integrating ADCs and a set of components encapsulated in an HDL (hardware definition language) library which makes it possible to implement several acquisition tasks such as time pickoff and coincidence detection using a new and simple trigger technique that we name WMLET (width-modulated leading-edge timing). As proof of concept, a 32-channel hybrid PET/SPECT acquisition system based on these elements was developed and tested. This demonstrator consists of a master module responsible for the generation and distribution of trigger signals, 2 x 16-channel ADC cards (12-bit resolution) for data digitization and a 32-bit digital I/O PCI card for handling data transmission to a personal computer. System characteristics such as linearity, maximum transmission rates or timing resolution in coincidence mode were evaluated with test and real detector signals. Imaging capabilities of the prototype were also evaluated using different detector configurations. The performance tests showed that this implementation is able to handle data rates in excess of 600k events s{sup -1} when acquiring simultaneously 32 channels (96-byte events). ADC channel linearity is >98.5% in energy quantification. Time resolution in PET mode for the tested configurations ranges from 3.64 ns FWHM to 7.88 ns FWHM when signals from LYSO-based detectors are used. The measured energy resolution matched the expected values for the detectors evaluated and single elements of crystal matrices can be neatly separated in the acquired flood histograms.

  12. Data acquisition electronics for gamma ray emission tomography using width-modulated leading-edge discriminators

    Science.gov (United States)

    Lage, E.; Tapias, G.; Villena, J.; Desco, M.; Vaquero, J. J.

    2010-08-01

    We present a new high-performance and low-cost approach for implementing radiation detection acquisition systems. The basic elements used are charge-integrating ADCs and a set of components encapsulated in an HDL (hardware definition language) library which makes it possible to implement several acquisition tasks such as time pickoff and coincidence detection using a new and simple trigger technique that we name WMLET (width-modulated leading-edge timing). As proof of concept, a 32-channel hybrid PET/SPECT acquisition system based on these elements was developed and tested. This demonstrator consists of a master module responsible for the generation and distribution of trigger signals, 2 × 16-channel ADC cards (12-bit resolution) for data digitization and a 32-bit digital I/O PCI card for handling data transmission to a personal computer. System characteristics such as linearity, maximum transmission rates or timing resolution in coincidence mode were evaluated with test and real detector signals. Imaging capabilities of the prototype were also evaluated using different detector configurations. The performance tests showed that this implementation is able to handle data rates in excess of 600k events s-1 when acquiring simultaneously 32 channels (96-byte events). ADC channel linearity is >98.5% in energy quantification. Time resolution in PET mode for the tested configurations ranges from 3.64 ns FWHM to 7.88 ns FWHM when signals from LYSO-based detectors are used. The measured energy resolution matched the expected values for the detectors evaluated and single elements of crystal matrices can be neatly separated in the acquired flood histograms.

  13. Improved Iris Recognition through Fusion of Hamming Distance and Fragile Bit Distance.

    Science.gov (United States)

    Hollingsworth, Karen P; Bowyer, Kevin W; Flynn, Patrick J

    2011-12-01

    The most common iris biometric algorithm represents the texture of an iris using a binary iris code. Not all bits in an iris code are equally consistent. A bit is deemed fragile if its value changes across iris codes created from different images of the same iris. Previous research has shown that iris recognition performance can be improved by masking these fragile bits. Rather than ignoring fragile bits completely, we consider what beneficial information can be obtained from the fragile bits. We find that the locations of fragile bits tend to be consistent across different iris codes of the same eye. We present a metric, called the fragile bit distance, which quantitatively measures the coincidence of the fragile bit patterns in two iris codes. We find that score fusion of fragile bit distance and Hamming distance works better for recognition than Hamming distance alone. To our knowledge, this is the first and only work to use the coincidence of fragile bit locations to improve the accuracy of matches.

  14. Hardware Design and Implementation of Fixed-Width Standard and Truncated 4×4, 6×6, 8×8 and 12×12-BIT Multipliers Using Fpga

    Science.gov (United States)

    Rais, Muhammad H.

    2010-06-01

    This paper presents Field Programmable Gate Array (FPGA) implementation of standard and truncated multipliers using Very High Speed Integrated Circuit Hardware Description Language (VHDL). Truncated multiplier is a good candidate for digital signal processing (DSP) applications such as finite impulse response (FIR) and discrete cosine transform (DCT). Remarkable reduction in FPGA resources, delay, and power can be achieved using truncated multipliers instead of standard parallel multipliers when the full precision of the standard multiplier is not required. The truncated multipliers show significant improvement as compared to standard multipliers. Results show that the anomaly in Spartan-3 AN average connection and maximum pin delay have been efficiently reduced in Virtex-4 device.

  15. Variable-Period Undulators for Synchrotron Radiation

    Energy Technology Data Exchange (ETDEWEB)

    Shenoy, Gopal; Lewellen, John; Shu, Deming; Vinokurov, Nikolai

    2005-02-22

    A new and improved undulator design is provided that enables a variable period length for the production of synchrotron radiation from both medium-energy and high energy storage rings. The variable period length is achieved using a staggered array of pole pieces made up of high permeability material, permanent magnet material, or an electromagnetic structure. The pole pieces are separated by a variable width space. The sum of the variable width space and the pole width would therefore define the period of the undulator. Features and advantages of the invention include broad photon energy tunability, constant power operation and constant brilliance operation.

  16. Variable-Period Undulators For Synchrotron Radiation

    Science.gov (United States)

    Shenoy, Gopal; Lewellen, John; Shu, Deming; Vinokurov, Nikolai

    2005-02-22

    A new and improved undulator design is provided that enables a variable period length for the production of synchrotron radiation from both medium-energy and high-energy storage rings. The variable period length is achieved using a staggered array of pole pieces made up of high permeability material, permanent magnet material, or an electromagnetic structure. The pole pieces are separated by a variable width space. The sum of the variable width space and the pole width would therefore define the period of the undulator. Features and advantages of the invention include broad photon energy tunability, constant power operation and constant brilliance operation.

  17. Hong's grading for evaluating anterior chamber angle width.

    Science.gov (United States)

    Kim, Seok Hwan; Kang, Ja Heon; Park, Ki Ho; Hong, Chul

    2012-11-01

    To compare Hong's grading method with anterior segment optical coherence tomography (AS-OCT), gonioscopy, and the dark-room prone-position test (DRPT) for evaluating anterior chamber width. The anterior chamber angle was graded using Hong's grading method, and Hong's angle width was calculated from the arctangent of Hong's grades. The correlation between Hong's angle width and AS-OCT parameters was analyzed. The area under the receiver operating characteristic curve (AUC) for Hong's grading method when discriminating between narrow and open angles as determined by gonioscopy was calculated. Correlation analysis was performed between Hong's angle width and intraocular pressure (IOP) changes determined by DRPT. A total of 60 subjects were enrolled. Of these subjects, 53.5 % had a narrow angle. Hong's angle width correlated significantly with the AS-OCT parameters (r = 0.562-0.719, P < 0.01). A Bland-Altman plot showed relatively good agreement between Hong's angle width and the angle width obtained by AS-OCT. The ability of Hong's grading method to discriminate between open and narrow angles was good (AUC = 0.868, 95 % CI 0.756-0.942). A significant linear correlation was found between Hong's angle width and IOP change determined by DRPT (r = -0.761, P < 0.01). Hong's grading method is useful for detecting narrow angles. Hong's grading correlated well with AS-OCT parameters and DRPT.

  18. Constant Width Planar Computation Characterizes ACC0

    DEFF Research Database (Denmark)

    Hansen, K.A.

    2004-01-01

    We obtain a characterization of ACC 0 in terms of a natural class of constant width circuits, namely in terms of constant width polynomial size planar circuits. This is shown via a characterization of the class of acyclic digraphs which can be embedded on a cylinder surface in such a way that all...

  19. Stream water responses to timber harvest: Riparian buffer width effectiveness

    Science.gov (United States)

    Barton D. Clinton

    2011-01-01

    Vegetated riparian buffers are critical for protecting aquatic and terrestrial processes and habitats in southern Appalachian ecosystems. In this case study, we examined the effect of riparian buffer width on stream water quality following upland forest management activities in four headwater catchments. Three riparian buffer widths were delineated prior to cutting; 0m...

  20. Implementation of RSA 2048-bit and AES 256-bit with Digital Signature for Secure Electronic Health Record Application

    Directory of Open Access Journals (Sweden)

    Mohamad Ali Sadikin

    2016-10-01

    Full Text Available This research addresses the implementation of encryption and digital signature technique for electronic health record to prevent cybercrime such as robbery, modification and unauthorised access. In this research, RSA 2048-bit algorithm, AES 256-bit and SHA 256 will be implemented in Java programming language. Secure Electronic Health Record Information (SEHR application design is intended to combine given services, such as confidentiality, integrity, authentication, and nonrepudiation. Cryptography is used to ensure the file records and electronic documents for detailed information on the medical past, present and future forecasts that have been given only to the intended patients. The document will be encrypted using an encryption algorithm based on NIST Standard. In the application, there are two schemes, namely the protection and verification scheme. This research uses black-box testing and whitebox testing to test the software input, output, and code without testing the process and design that occurs in the system.We demonstrated the implementation of cryptography in SEHR. The implementation of encryption and digital signature in this research can prevent archive thievery.

  1. Intraflow width variations in Martian and terrestrial lava flows

    Science.gov (United States)

    Peitersen, Matthew N.; Crown, David A.

    1997-03-01

    Flow morphology is used to interpret emplacement processes for lava flows on Earth and Mars. Accurate measurements of flow geometry are essential, particularly for planetary flows where neither compositional sampling nor direct observations of active flows may be possible. Width behavior may indicate a flow's response to topography, its emplacement regime, and its physical properties. Variations in width with downflow distance from the vent may therefore provide critical clues to flow emplacement processes. Flow width is also one of the few characteristics that can be readily measured from planetary mission data with accuracy. Recent analyses of individual flows at two terrestrial and four Martian sites show that widths within an individual flow vary by up to an order of magnitude. Width is generally thought to be correlated to topography; however, recent studies show that this relationship is neither straightforward nor easily quantifiable.

  2. Crack widths in concrete with fibers and main reinforcement

    DEFF Research Database (Denmark)

    Christensen, Frede; Ulfkjær, Jens Peder; Brincker, Rune

    2015-01-01

    The main object of the research work presented in this paper is to establish design tools for concrete structures where main reinforcement is combined with addition of short discrete steel fibers. The work is concerned with calculating and measuring crack widths in structural elements subjected...... to bending load. Thus, the aim of the work is to enable engineers to calculate crack widths for flexural concrete members and analyze how different combinations of amounts of fibers and amounts of main reinforcement can meet a given maximum crack width requirement. A mathematical model including...... the ductility of the fiber reinforced concrete (FRC) is set up and experimental work is conducted in order to verify the crack width model. The ductility of the FRC is taken into account by using the stress crack width relation. The constitutive model for the FRC is based on the idea that the initial part...

  3. Scaling vectors of attoJoule per bit modulators

    Science.gov (United States)

    Sorger, Volker J.; Amin, Rubab; Khurgin, Jacob B.; Ma, Zhizhen; Dalir, Hamed; Khan, Sikandar

    2018-01-01

    Electro-optic modulation performs the conversion between the electrical and optical domain with applications in data communication for optical interconnects, but also for novel optical computing algorithms such as providing nonlinearity at the output stage of optical perceptrons in neuromorphic analog optical computing. While resembling an optical transistor, the weak light-matter-interaction makes modulators 105 times larger compared to their electronic counterparts. Since the clock frequency for photonics on-chip has a power-overhead sweet-spot around tens of GHz, ultrafast modulation may only be required in long-distance communication, not for short on-chip links. Hence, the search is open for power-efficient on-chip modulators beyond the solutions offered by foundries to date. Here, we show scaling vectors towards atto-Joule per bit efficient modulators on-chip as well as some experimental demonstrations of novel plasmonic modulators with sub-fJ/bit efficiencies. Our parametric study of placing different actively modulated materials into plasmonic versus photonic optical modes shows that 2D materials overcompensate their miniscule modal overlap by their unity-high index change. Furthermore, we reveal that the metal used in plasmonic-based modulators not only serves as an electrical contact, but also enables low electrical series resistances leading to near-ideal capacitors. We then discuss the first experimental demonstration of a photon-plasmon-hybrid graphene-based electro-absorption modulator on silicon. The device shows a sub-1 V steep switching enabled by near-ideal electrostatics delivering a high 0.05 dB V-1 μm-1 performance requiring only 110 aJ/bit. Improving on this demonstration, we discuss a plasmonic slot-based graphene modulator design, where the polarization of the plasmonic mode aligns with graphene’s in-plane dimension; where a push-pull dual-gating scheme enables 2 dB V-1 μm-1 efficient modulation allowing the device to be just 770 nm

  4. Regression methods to investigate the relationship between facial measurements and widths of the maxillary anterior teeth.

    Science.gov (United States)

    Isa, Zakiah Mohd; Tawfiq, Omar Farouq; Noor, Norliza Mohd; Shamsudheen, Mohd Iqbal; Rijal, Omar Mohd

    2010-03-01

    In rehabilitating edentulous patients, selecting appropriately sized teeth in the absence of preextraction records is problematic. The purpose of this study was to investigate the relationships between some facial dimensions and widths of the maxillary anterior teeth to potentially provide a guide for tooth selection. Sixty full dentate Malaysian adults (18-36 years) representing 2 ethnic groups (Malay and Chinese), with well aligned maxillary anterior teeth and minimal attrition, participated in this study. Standardized digital images of the face, viewed frontally, were recorded. Using image analyzing software, the images were used to determine the interpupillary distance (IPD), inner canthal distance (ICD), and interalar width (IA). Widths of the 6 maxillary anterior teeth were measured directly from casts of the subjects using digital calipers. Regression analyses were conducted to measure the strength of the associations between the variables (alpha=.10). The means (standard deviations) of IPD, IA, and ICD of the subjects were 62.28 (2.47), 39.36 (3.12), and 34.36 (2.15) mm, respectively. The mesiodistal diameters of the maxillary central incisors, lateral incisors, and canines were 8.54 (0.50), 7.09 (0.48), and 7.94 (0.40) mm, respectively. The width of the central incisors was highly correlated to the IPD (r=0.99), while the widths of the lateral incisors and canines were highly correlated to a combination of IPD and IA (r=0.99 and 0.94, respectively). Using regression methods, the widths of the anterior teeth within the population tested may be predicted by a combination of the facial dimensions studied. (c) 2010 The Editorial Council of the Journal of Prosthetic Dentistry. Published by Mosby, Inc. All rights reserved.

  5. Brownian motion properties of optoelectronic random bit generators based on laser chaos.

    Science.gov (United States)

    Li, Pu; Yi, Xiaogang; Liu, Xianglian; Wang, Yuncai; Wang, Yongge

    2016-07-11

    The nondeterministic property of the optoelectronic random bit generator (RBG) based on laser chaos are experimentally analyzed from two aspects of the central limit theorem and law of iterated logarithm. The random bits are extracted from an optical feedback chaotic laser diode using a multi-bit extraction technique in the electrical domain. Our experimental results demonstrate that the generated random bits have no statistical distance from the Brownian motion, besides that they can pass the state-of-the-art industry-benchmark statistical test suite (NIST SP800-22). All of them give a mathematically provable evidence that the ultrafast random bit generator based on laser chaos can be used as a nondeterministic random bit source.

  6. Shuttle bit rate synchronizer. [signal to noise ratios and error analysis

    Science.gov (United States)

    Huey, D. C.; Fultz, G. L.

    1974-01-01

    A shuttle bit rate synchronizer brassboard unit was designed, fabricated, and tested, which meets or exceeds the contractual specifications. The bit rate synchronizer operates at signal-to-noise ratios (in a bit rate bandwidth) down to -5 dB while exhibiting less than 0.6 dB bit error rate degradation. The mean acquisition time was measured to be less than 2 seconds. The synchronizer is designed around a digital data transition tracking loop whose phase and data detectors are integrate-and-dump filters matched to the Manchester encoded bits specified. It meets the reliability (no adjustments or tweaking) and versatility (multiple bit rates) of the shuttle S-band communication system through an implementation which is all digital after the initial stage of analog AGC and A/D conversion.

  7. Fatigue life of drilling bit bearings under arbitrary random loads

    Energy Technology Data Exchange (ETDEWEB)

    Talimi, M.; Farshidi, R. [Calgary Univ., AB (Canada)

    2009-07-01

    A fatigue analysis was conducted in order to estimate the bearing life of a roller cone rock bit under arbitrary random loads. The aim of the study was to reduce bearing failures that can interrupt well operations. Fatigue was considered as the main reason for bearing failure. The expected value of cumulative fatigue damage was used to estimate bearing life. An equation was used to express the relation between bearing life and bearing load when the bearing was subjected to a steady load and constant speed. The Palmgren-Miner hypothesis was used to determine the ultimate tensile strength of the material. The rain flow counting principle was used to determine distinct amplitude cycles. Hertzian equations were used to determine maximum stress loads. Fourier series were used to obtain simple harmonic functions for estimating stress-life relations. It was concluded that the method can be used during the well planning phase to prevent bearing failures. 6 refs.

  8. ALAT SOLAR TRACKER BERBASIS MIKROKONTROLER 8 BIT ATMega8535

    Directory of Open Access Journals (Sweden)

    I Wayan Sutaya

    2015-07-01

    Full Text Available Penelitian yang telah dilakukan ini adalah membuat prototipe alat solar tracker. Alat ini berfungsi untuk menggerakkan modul sel surya sehingga permukaan sel surya bisa terkena sinar matahari secara maksimal. Saat ini sel surya di Indonesia banyak terpasang secara statis atau tidak dilengkapi alat solar tracker sehingga energi matahari tidak diterima secara maksimal. Hal ini menyebabkan sel surya yang terpasang di beberapa daerah di Indonesia tidak memberikan manfaat yang optimal. Alat solar tracker yang dihasilkan pada penelitian ini diharapkan sebagai solusi dari permasalahan yang ada saat ini. Mikrokontroler 8 bit ATMega8535 yang digunakan sebagai otak utama dari alat solar tracker menjadikan alat ini menjadi berbiaya murah. Serta teknik memprogram dengan bahasa assembly menjadikan alat ini tahan terhadap kegagalan sistem. Solar tracker ini sudah bisa beroperasi dengan baik dan cocok digunakan pada modul sel surya berukuran kecil.

  9. Bitlis Etnografya Müzesi'nde Bulunan Geleneksel Giysiler

    OpenAIRE

    Sökmen, Sultan

    2016-01-01

    Bu çalışmada, Bitlis Etnografya Müzesi'nde sergilenmekte olan geleneksel giysilerin kumaş, renk, süsleme ve teknik özelliklerinin tanıtımı amaçlanmıştır. Bu amaç doğrultusunda ilgili makamlardan yazılı izin alınarak müze vitrinlerinde sergilenmekte olan ve depolarda koruma altına alınan giysilerin fotoğrafları çekilmiş, gerekli ölçümleri yapılarak teknik özellikleri belirlenmiş, hammadde ve süsleme özellikleri incelenmiştir. Müzede bulunan geleneksel giysi örnekleri yeterince zengin olma...

  10. A low power 12-bit ADC for nuclear instrumentation

    International Nuclear Information System (INIS)

    Adachi, R.; Landis, D.; Madden, N.; Silver, E.; LeGros, M.

    1992-10-01

    A low power, successive approximation, analog-to-digital converter (ADC) for low rate, low cost, battery powered applications is described. The ADC is based on a commercial 50 mW successive approximation CMOS device (CS5102). An on-chip self-calibration circuit reduces the inherent differential nonlinearity to 7%. A further reduction of the differential nonlinearity to 0.5% is attained with a four bit Gatti function. The Gatti function is distributed to minimize battery power consumption. All analog functions reside with the ADC while the noisy digital functions reside in the personal computer based histogramming memory. Fiber optic cables carry afl digital information between the ADC and the personal computer based histogramming memory

  11. Measurement accuracy, bit-strings, Manthey's quaternions, and RRQM

    International Nuclear Information System (INIS)

    Noyes, H.P.

    1995-01-01

    The author continues the discussion started last year. By now three potentially divergent research programs have surfaced in ANPA: (1) the Bastin-Kilmister understanding of the combinatorial hierarchy (Clive's open-quotes Menshevikclose quotes position); (2) the author's bit-string open-quotes Theory of Everythingclose quotes (which Clive has dubbed open-quotes Bolshevikclose quotes); (3) Manthey's cycle hierarchy based on co-occurrence and mutual exclusion that Clive helped him map onto quaternions (as an yet unnamed heresy?). Unless a common objective can be found, these three points of view will continue to diverge. The authors suggests the reconstruction of relativistic quantum mechanism (RRQM) as a reasonable, and attainable, goal that might aid convergence rather than divergence

  12. Bit-string physics: A novel theory of everything

    International Nuclear Information System (INIS)

    Noyes, H.P.

    1994-08-01

    We encode the quantum numbers of the standard model of quarks and leptons using constructed bitstrings of length 256. These label a grouting universe of bit-strings of growing length that eventually construct a finite and discrete space-time with reasonable cosmological properties. Coupling constants and mass ratios, computed from closure under XOR and a statistical hypothesis, using only ℎ, c and m p to fix our units of mass, length and time in terms of standard (meterkilogram-second) metrology, agree with the first four to seven significant figures of accepted experimental results. Finite and discrete conservation laws and commutation relations insure the essential characteristics of relativistic quantum mechanics, including particle-antiparticle pair creation. The correspondence limit in (free space) Maxwell electromagnetism and Einstein gravitation is consistent with the Feynman-Dyson-Tanimura ''proof.''

  13. Bit-string physics: A novel theory of everything

    Energy Technology Data Exchange (ETDEWEB)

    Noyes, H.P.

    1994-08-01

    We encode the quantum numbers of the standard model of quarks and leptons using constructed bitstrings of length 256. These label a grouting universe of bit-strings of growing length that eventually construct a finite and discrete space-time with reasonable cosmological properties. Coupling constants and mass ratios, computed from closure under XOR and a statistical hypothesis, using only {h_bar}, c and m{sub p} to fix our units of mass, length and time in terms of standard (meterkilogram-second) metrology, agree with the first four to seven significant figures of accepted experimental results. Finite and discrete conservation laws and commutation relations insure the essential characteristics of relativistic quantum mechanics, including particle-antiparticle pair creation. The correspondence limit in (free space) Maxwell electromagnetism and Einstein gravitation is consistent with the Feynman-Dyson-Tanimura ``proof.``

  14. A Fast Dynamic 64-bit Comparator with Small Transistor Count

    Directory of Open Access Journals (Sweden)

    Chua-Chin Wang

    2002-01-01

    Full Text Available In this paper, we propose a 64-bit fast dynamic CMOS comparator with small transistor count. Major features of the proposed comparator are the rearrangement and re-ordering of transistors in the evaluation block of a dynamic cell, and the insertion of a weak n feedback inverter, which helps the pull-down operation to ground. The simulation results given by pre-layout tools, e.g. HSPICE, and post-layout tools, e.g. TimeMill, reveal that the delay is around 2.5 ns while the operating clock rate reaches 100 MHz. A physical chip is fabricated to verify the correctness of our design by using UMC (United Microelectronics Company 0.5 μm (2P2M technology.

  15. Bit-Serial Adder Based on Quantum Dots

    Science.gov (United States)

    Fijany, Amir; Toomarian, Nikzad; Modarress, Katayoon; Spotnitz, Mathew

    2003-01-01

    A proposed integrated circuit based on quantum-dot cellular automata (QCA) would function as a bit-serial adder. This circuit would serve as a prototype building block for demonstrating the feasibility of quantum-dots computing and for the further development of increasingly complex and increasingly capable quantum-dots computing circuits. QCA-based bit-serial adders would be especially useful in that they would enable the development of highly parallel and systolic processors for implementing fast Fourier, cosine, Hartley, and wavelet transforms. The proposed circuit would complement the QCA-based circuits described in "Implementing Permutation Matrices by Use of Quantum Dots" (NPO-20801), NASA Tech Briefs, Vol. 25, No. 10 (October 2001), page 42 and "Compact Interconnection Networks Based on Quantum Dots" (NPO-20855), which appears elsewhere in this issue. Those articles described the limitations of very-large-scale-integrated (VLSI) circuitry and the major potential advantage afforded by QCA. To recapitulate: In a VLSI circuit, signal paths that are required not to interact with each other must not cross in the same plane. In contrast, for reasons too complex to describe in the limited space available for this article, suitably designed and operated QCA-based signal paths that are required not to interact with each other can nevertheless be allowed to cross each other in the same plane without adverse effect. In principle, this characteristic could be exploited to design compact, coplanar, simple (relative to VLSI) QCA-based networks to implement complex, advanced interconnection schemes. To enable a meaningful description of the proposed bit-serial adder, it is necessary to further recapitulate the description of a quantum-dot cellular automation from the first-mentioned prior article: A quantum-dot cellular automaton contains four quantum dots positioned at the corners of a square cell. The cell contains two extra mobile electrons that can tunnel (in the

  16. "Push back" technique: A simple method to remove broken drill bit from the proximal femur.

    Science.gov (United States)

    Chouhan, Devendra K; Sharma, Siddhartha

    2015-11-18

    Broken drill bits can be difficult to remove from the proximal femur and may necessitate additional surgical exploration or special instrumentation. We present a simple technique to remove a broken drill bit that does not require any special instrumentation and can be accomplished through the existing incision. This technique is useful for those cases where the length of the broken drill bit is greater than the diameter of the bone.

  17. Computer-Aided Design for Built-In-Test (CADBIT) - BIT Library. Volume 2

    Science.gov (United States)

    1989-10-01

    TECHNIQUE: ON-BOARD RONI CATEGORY: LONG TUTORIA \\L PAG E 5 of 14I SUBCATEGORY: BIT TECHNIQUE ATTRIBUTES DATA TYPE: TEXT El LIST E] TABLE [ GRAPHIC E...SHIFT REGISTER (MISR) CATEGORY: LONG TUTORIA -L PAGE i Of 13 SUBCATEGORY: BIT TECH-{MQUE ATTRIBUTES DATA TYPE: TEXT LIST El TABLE GRAPHIC E EQUATIONS...ELEMENT DATA SHEET BIT TECHNIQUE: UTILIZING REDUNDANCY CATEGORY: LONG TUTORIA L PAGE 9 of 10 SUBCATEGORY: PARTS DATA TABLE DATA TYPE: TEXT F1 UST C3

  18. The Digital Agenda of Virtual Currencies. Can BitCoin Become a Global Currency?

    OpenAIRE

    KANCS D'ARTIS; CIAIAN PAVEL; MIROSLAVA RAJCANIOVA

    2015-01-01

    This paper identifies and analyzes BitCoin features which may facilitate Bitcoin to become a global currency, as well as characteristics which may impede the use of BitCoin as a medium of exchange, a unit of account and a store of value, and compares BitCoin with standard currencies with respect to the main functions of money. Among all analyzed BitCoin features, the extreme price volatility stands out most clearly compared to standard currencies. In order to understand the reasons for such e...

  19. Bit-depth scalable video coding with new inter-layer prediction

    Directory of Open Access Journals (Sweden)

    Chiang Jui-Chiu

    2011-01-01

    Full Text Available Abstract The rapid advances in the capture and display of high-dynamic range (HDR image/video content make it imperative to develop efficient compression techniques to deal with the huge amounts of HDR data. Since HDR device is not yet popular for the moment, the compatibility problems should be considered when rendering HDR content on conventional display devices. To this end, in this study, we propose three H.264/AVC-based bit-depth scalable video-coding schemes, called the LH scheme (low bit-depth to high bit-depth, the HL scheme (high bit-depth to low bit-depth, and the combined LH-HL scheme, respectively. The schemes efficiently exploit the high correlation between the high and the low bit-depth layers on the macroblock (MB level. Experimental results demonstrate that the HL scheme outperforms the other two schemes in some scenarios. Moreover, it achieves up to 7 dB improvement over the simulcast approach when the high and low bit-depth representations are 12 bits and 8 bits, respectively.

  20. Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

    OpenAIRE

    Kamaldeep Joshi; Rajkumar Yadav; Sachin Allwadhi

    2016-01-01

    Image steganography is the best aspect of information hiding. In this, the information is hidden within an image and the image travels openly on the Internet. The Least Significant Bit (LSB) is one of the most popular methods of image steganography. In this method, the information bit is hidden at the LSB of the image pixel. In one bit LSB steganography method, the total numbers of the pixels and the total number of message bits are equal to each other. In this paper, the LSB method of image ...

  1. Designing embedded systems with 32-bit PIC microcontrollers and MikroC

    CERN Document Server

    Ibrahim, Dogan

    2013-01-01

    The new generation of 32-bit PIC microcontrollers can be used to solve the increasingly complex embedded system design challenges faced by engineers today. This book teaches the basics of 32-bit C programming, including an introduction to the PIC 32-bit C compiler. It includes a full description of the architecture of 32-bit PICs and their applications, along with coverage of the relevant development and debugging tools. Through a series of fully realized example projects, Dogan Ibrahim demonstrates how engineers can harness the power of this new technology to optimize their embedded design

  2. The effect of scattering interference term on the practical width

    International Nuclear Information System (INIS)

    Martins do Amaral, C.; Martinez, A.S.

    2001-01-01

    The practical width Γ p has an important application in the characterization of the resonance type for the calculation of neutron average cross sections. Previous treatments ignore the interference term χζ,x for the Doppler broadening function in the practical width calculation. In the present paper, a rational approximation for the χζ,x function is derived, using a modified asymptotic Pade method. A new approximation for Γ p is obtained. The results which are presented here provide evidence that the practical width as a function of temperature varies considerably with the inclusion of the interference term χζ,x

  3. Nightside studies of coherent HF Radar spectral width behaviour

    Directory of Open Access Journals (Sweden)

    E. E. Woodfield

    2002-09-01

    Full Text Available A previous case study found a relationship between high spectral width measured by the CUTLASS Finland HF radar and elevated electron temperatures observed by the EISCAT and ESR incoherent scatter radars in the post-midnight sector of magnetic local time. This paper expands that work by briefly re-examining that interval and looking in depth at two further case studies. In all three cases a region of high HF spectral width (>200 ms-1 exists poleward of a region of low HF spectral width (<200 ms-1. Each case, however, occurs under quite different geomagnetic conditions. The original case study occurred during an interval with no observed electrojet activity, the second study during a transition from quiet to active conditions with a clear band of ion frictional heating indicating the location of the flow reversal boundary, and the third during an isolated sub-storm. These case studies indicate that the relationship between elevated electron temperature and high HF radar spectral width appears on closed field lines after 03:00 magnetic local time (MLT on the nightside. It is not clear whether the same relationship would hold on open field lines, since our analysis of this relationship is restricted in latitude. We find two important properties of high spectral width data on the nightside. Firstly the high spectral width values occur on both open and closed field lines, and secondly that the power spectra which exhibit high widths are both single-peak and multiple-peak. In general the regions of high spectral width (>200 ms-1 have more multiple-peak spectra than the regions of low spectral widths whilst still maintaining a majority of single-peak spectra. We also find that the region of ion frictional heating is collocated with many multiple-peak HF spectra. Several mechanisms for the generation of high spectral width have been proposed which would produce multiple-peak spectra, these are discussed in relation to the data presented here. Since the

  4. Influence of electrical sheet width on dynamic magnetic properties

    CERN Document Server

    Chevalier, T; Cornut, B

    2000-01-01

    Effects of the width of electrical steel sheets on dynamic magnetic properties are investigated by solving diffusion equation on the cross-section of the sheet. Linear and non-linear cases are studied, and are compared with measurement on Epstein frame. For the first one an analytical solution is found, while for the second, a 2D finite element simulation is achieved. The influence of width is highlighted for a width thickness ratio lower than 10. It is shown that the behaviour modification in such cases is conditioned by the excitation signal waveform, amplitude and also frequency.

  5. Nightside studies of coherent HF Radar spectral width behaviour

    Directory of Open Access Journals (Sweden)

    E. E. Woodfield

    Full Text Available A previous case study found a relationship between high spectral width measured by the CUTLASS Finland HF radar and elevated electron temperatures observed by the EISCAT and ESR incoherent scatter radars in the post-midnight sector of magnetic local time. This paper expands that work by briefly re-examining that interval and looking in depth at two further case studies. In all three cases a region of high HF spectral width (>200 ms-1 exists poleward of a region of low HF spectral width (<200 ms-1. Each case, however, occurs under quite different geomagnetic conditions. The original case study occurred during an interval with no observed electrojet activity, the second study during a transition from quiet to active conditions with a clear band of ion frictional heating indicating the location of the flow reversal boundary, and the third during an isolated sub-storm. These case studies indicate that the relationship between elevated electron temperature and high HF radar spectral width appears on closed field lines after 03:00 magnetic local time (MLT on the nightside. It is not clear whether the same relationship would hold on open field lines, since our analysis of this relationship is restricted in latitude. We find two important properties of high spectral width data on the nightside. Firstly the high spectral width values occur on both open and closed field lines, and secondly that the power spectra which exhibit high widths are both single-peak and multiple-peak. In general the regions of high spectral width (>200 ms-1 have more multiple-peak spectra than the regions of low spectral widths whilst still maintaining a majority of single-peak spectra. We also find that the region of ion frictional heating is collocated with many multiple-peak HF spectra. Several mechanisms for the generation of high spectral width have been proposed which would produce multiple-peak spectra, these are discussed in relation to

  6. EnhancedBit: Unleashing the potential of the unchoking policy in the BitTorrent  protocol

    CERN Document Server

    Atlidakis, V; Delis, A

    2014-01-01

    In this paper, we propose a modification to the BitTorrent protocol related to its peer unchoking policy. In particular, we apply a novel optimistic unchoking approach that improves the quality of inter-connections amongst peers, i.e., increases the number of directly-connected and interested-in-cooperation peers without penalizing underutilized and/or idle peers. Our optimistic unchoking policy takes into consideration the number of clients currently interested in downloading from a peer that is to be unchoked. Our conjecture is that peers having few clients interested in downloading data from them, should be favored with optimistic unchoke intervals. This enables the peers in question to receive data since they become unchoked faster and in turn, they will trigger the interest of additional clients. In contrast, peers with plenty of "interested" clients should enjoy a lower priority to be selected as planned optimistic unchoked, since these peers likely have enough data to forward; nevertheless, they receiv...

  7. Variable collimator

    International Nuclear Information System (INIS)

    Richey, J.B.; McBride, T.R.; Covic, J.

    1979-01-01

    This invention describes an automatic variable collimator which controls the width and thickness of X-ray beams in X-ray diagnostic medical equipment, and which is particularly adapted for use with computerized axial tomographic scanners. A two-part collimator is provided which shapes an X-ray beam both prior to its entering an object subject to radiographic analysis and after the attenuated beam has passed through the object. Interposed between a source of radiation and the object subject to radiographic analysis is a first or source collimator. The source collimator causes the X-ray beam emitted by the source of radiation to be split into a plurality of generally rectangular shaped beams. Disposed within the source collimator is a movable aperture plate which may be used to selectively vary the thickness of the plurality of generally rectangular shaped beams transmitted through the source collimator. A second or receiver collimator is interposed between the object subject to radiographic analysis and a series of radiation detectors. The receiver collimator is disposed to receive the attenuated X-ray beams passing through the object subject to radiographic analysis. Located within the receiver collimator are a plurality of movable aperture plates adapted to be displaced relative to a plurality of fixed aperture plates for the purpose of varying the width and thickness of the attenuated X-ray beams transmitted through the object subject to radiographic analysis. The movable aperture plates of the source and receiver collimators are automatically controlled by circuitry which is provided to allow remote operation of the movable aperture plates

  8. Effect of second harmonic in pulse-width-modulation-based DAC for feedback of digital fluxgate magnetometer

    Science.gov (United States)

    Belyayev, Serhiy; Ivchenko, Nickolay

    2018-04-01

    Digital fluxgate magnetometers employ processing of the measured pickup signal to produce the value of the compensation current. Using pulse-width modulation with filtering for digital to analog conversion is a convenient approach, but it can introduce an intrinsic source of nonlinearity, which we discuss in this design note. A code shift of one least significant bit changes the second harmonic content of the pulse train, which feeds into the pick-up signal chain despite the heavy filtering. This effect produces a code-dependent nonlinearity. This nonlinearity can be overcome by the specific design of the timing of the pulse train signal. The second harmonic is suppressed if the first and third quarters of the excitation period pulse train are repeated in the second and fourth quarters. We demonstrate this principle on a digital magnetometer, achieving a magnetometer noise level corresponding to that of the sensor itself.

  9. Preparation and comparitive analysis of MCNP thermal libraries for liquid hydrogen and deuterium using NJOY97 on 32 bit and 64 bit computers

    International Nuclear Information System (INIS)

    Jo, Y. S.; Kim, J. D.; Kil, C. S.; Jang, J. H.

    1999-01-01

    The scattering laws and MCNP thermal libraries for liquid hydrogen and deuterium are comparatively calculated on HP715 (32-bit computer) and SGI IP27 (64-bit computer) using NJOY97. The results are also compared with the experimental data. In addition, MCNP calculations for the nuclear design of a cold neutron source at HANARO are performed with the newly generated MCNP thermal libraries from two different computers and the results are compared

  10. Relationship between width of greater trochanters and width of iliac wings in tronchanteric bursitis.

    Science.gov (United States)

    Viradia, Neal K; Berger, Alex A; Dahners, Laurence E

    2011-09-01

    Trochanteric bursitis is a common disorder that is characterized by inflammation of the bursa, superficial to the greater trochanter of the femur, leading to pain in the lateral hip, and often occurs because of acute trauma or repetitive friction involving the iliotibial band, the greater trochanter, and the bursa. In the study reported here, we hypothesized that the increased incidence of bursitis may be the result of the increased prominence of the trochanter in relation to the wings of the iliac crest. Distances between the outermost edges of trochanters and iliac wings were measured in 202 patients from the University of North Carolina Health Care System-101 without a known diagnosis and 101 with a clinical diagnosis of trochanteric bursitis. To determine significance, t tests for nonpaired data were used. Mean (SD) difference between trochanter and iliac wing widths was 28 (20) mm in the group diagnosed with trochanteric bursitis and 17 (18) mm in the control group. The difference between the groups in this regard was significant (Pbursitis group and 1.05 (.06) in the control group. The difference between these groups was significant (Pbursitis.

  11. Enhancement of heat transfer using varying width twisted tape inserts

    African Journals Online (AJOL)

    International Journal of Engineering, Science and Technology ... experimental investigations of the augmentation of turbulent flow heat transfer in a horizontal tube by means of varying width twisted tape inserts with air as the working fluid.

  12. Estimates for the widths of weighted Sobolev classes

    International Nuclear Information System (INIS)

    Vasil'eva, Anastasia A

    2010-01-01

    Estimates for the Kolmogorov widths in the L q,v -metric of weighted Sobolev classes as well as for the approximation numbers of the corresponding embedding operators are found. Bibliography: 33 titles.

  13. Using Pulse Width Modulation for Wireless Transmission of Neural Signals in Multichannel Neural Recording Systems

    Science.gov (United States)

    Yin, Ming; Ghovanloo, Maysam

    2013-01-01

    We have used a well-known technique in wireless communication, pulse width modulation (PWM) of time division multiplexed (TDM) signals, within the architecture of a novel wireless integrated neural recording (WINeR) system. We have evaluated the performance of the PWM-based architecture and indicated its accuracy and potential sources of error through detailed theoretical analysis, simulations, and measurements on a setup consisting of a 15-channel WINeR prototype as the transmitter and two types of receivers; an Agilent 89600 vector signal analyzer and a custom wideband receiver, with 36 and 75 MHz of maximum bandwidth, respectively. Furthermore, we present simulation results from a realistic MATLAB-Simulink model of the entire WINeR system to observe the system behavior in response to changes in various parameters. We have concluded that the 15-ch WINeR prototype, which is fabricated in a 0.5-μm standard CMOS process and consumes 4.5 mW from ±1.5 V supplies, can acquire and wirelessly transmit up to 320 k-samples/s to a 75-MHz receiver with 8.4 bits of resolution, which is equivalent to a wireless data rate of ~ 2.26 Mb/s. PMID:19497823

  14. The width of the giant dipole resonance at finite temperature

    International Nuclear Information System (INIS)

    Mau, N.V.

    1992-01-01

    A method is proposed to evaluate the effect of the change of the Fermi sea on the width of the giant dipole resonance at finite temperature. In a schematic model it is found that, indeed, in 208 Pb the width increases very sharply up to about T=4 MeV but shows a much weaker variation for higher temperature. (author) 26 refs., 7 figs., 2 tabs

  15. SM Higgs decay branching ratios and total Higgs width

    CERN Multimedia

    Daniel Denegri

    2001-01-01

    Upper: Higgs decay ratios as a function of Higgs mass. The largest branching ratio is not necessarily the most usefull one. The most usefull ones are gamma gamma bbar ZZ and WW as in those modes latter signal to background ratios can be achieved. Lower: Total Higgs decay width versus Higgs mass. At low masses the natural width is extremely small, thus observability depends on instrumental resolution primarily.

  16. Estimating the Spectral Width of a Narrowband Optical Signal

    DEFF Research Database (Denmark)

    Lading, Lars; Skov Jensen, A.

    1980-01-01

    Methods for estimating the spectral width of a narrowband optical signal are investigated. Spectral analysis and Fourier spectroscopy are compared. Optimum and close-to-optimum estimators are developed under the constraint of having only one photodetector.......Methods for estimating the spectral width of a narrowband optical signal are investigated. Spectral analysis and Fourier spectroscopy are compared. Optimum and close-to-optimum estimators are developed under the constraint of having only one photodetector....

  17. Width of electromagnetic wave instability spectrum in tungsten plate

    International Nuclear Information System (INIS)

    Rinkevich, A.B.

    1995-01-01

    Based on the study of high-frequency signal modulation and spectrum analysis of the envelope a measurement of spectrum width for electromagnetic wave instability was carried out under conditions of current pulse action on tungsten plate in magnetic field. The existence of amplitude-frequency wave modulation was revealed. The width of current disturbance spectrum in a specimen was evaluated. Current disturbances are shown to cause the instability of electromagnetic wave. 11 refs.; 6 figs

  18. Correlations for reduced-width amplitudes in 49V

    International Nuclear Information System (INIS)

    Chou, B.H.; Mitchell, G.E.; Bilpuch, E.G.; Westerfeldt, C.R.

    1980-01-01

    Measurement of the relative sign of inelastic proton-channel amplitudes permits the determination of amplitude correlations. Data were obtained for 45 5/2 + resonances in 49 V. Although the reduced widths in each channel followed a Porter-Thomas distribution, large amplitude correlations were observed. The results are compared with the reduced-width--amplitude distribution of Krieger and Porter. This is the first direct test of the Krieger-Porter distribution

  19. Quantum numbers and decay widths of the psi (3684)

    International Nuclear Information System (INIS)

    Luth, V.; Boyarski, A.M.; Lynch, H.L.; Breidenbach, M.; Bulos, F.; Feldman, G.J.; Fryberger, D.; Hanson, G.; Hartill, D.L.; Jean-Marie, B.; Larsen, R.R.; Luke, D.; Morehouse, C.C.; Paterson, J.M.; Perl, M.L.; Pun, T.P.; Rapidis, P.; Richter, B.; Schwitters, R.F.; Tanenbaum, W.; Vannucci, F.; Abrams, G.S.; Chinowsky, W.; Friedberg, C.E.; Goldhaber, G.; Kadyk, J.A.; Litke, A.M.; Lulu, B.A.; Pierre, F.M.; Sadoulet, B.; Trilling, G.H.; Whitaker, J.S.; Winkelmann, F.C.; Wiss, J.E.

    1975-01-01

    Cross sections for e + e - →hadrons, e + e - , and μ + μ - near 3684 MeV are presented. The psi(3684) resonance is established as having the assignment J/sup PC/=1 -- . The mass is 3684+-5 MeV. The partial width for decay to electrons is GAMMA/sube/=2.1+-0.3 keV and the total width is GAMMA=228+-56 keV

  20. Stieltjes-moment-theory technique for calculating resonance width's

    International Nuclear Information System (INIS)

    Hazi, A.U.

    1978-12-01

    A recently developed method for calculating the widths of atomic and molecular resonances is reviewed. The method is based on the golden-rule definition of the resonance width, GAMMA(E). The method uses only square-integrable, L 2 , basis functions to describe both the resonant and the non-resonant parts of the scattering wave function. It employs Stieltjes-moment-theory techniques to extract a continuous approximation for the width discrete representation of the background continuum. Its implementation requires only existing atomic and molecular structure codes. Many-electron effects, such as correlation and polarization, are easily incorporated into the calculation of the width via configuration interaction techniques. Once the width, GAMMA(E), has been determined, the energy shift can be computed by a straightforward evaluation of the required principal-value integral. The main disadvantage of the method is that it provides only the total width of a resonance which decays into more than one channel in a multichannel problem. A review of the various aspects of the theory is given first, and then representative results that have been obtained with this method for several atomic and molecular resonances are discussed. 28 references, 3 figures, 4 tables

  1. Crack width monitoring of concrete structures based on smart film

    International Nuclear Information System (INIS)

    Zhang, Benniu; Wang, Shuliang; Li, Xingxing; Zhang, Xu; Yang, Guang; Qiu, Minfeng

    2014-01-01

    Due to its direct link to structural security, crack width is thought to be one of the most important parameters reflecting damage conditions of concrete structures. However, the width problem is difficult to solve with the existing structural health monitoring methods. In this paper, crack width monitoring by means of adhering enameled copper wires with different ultimate strains on the surface of structures is proposed, based on smart film crack monitoring put forward by the present authors. The basic idea of the proposed method is related to a proportional relationship between the crack width and ultimate strain of the broken wire. Namely, when a certain width of crack passes through the wire, some low ultimate strain wires will be broken and higher ultimate strain wires may stay non-broken until the crack extends to a larger scale. Detection of the copper wire condition as broken or non-broken may indicate the width of the structural crack. Thereafter, a multi-layered stress transfer model and specimen experiment are performed to quantify the relationship. A practical smart film is then redesigned with this idea and applied to Chongqing Jiangjin Yangtze River Bridge. (paper)

  2. Crack width monitoring of concrete structures based on smart film

    Science.gov (United States)

    Zhang, Benniu; Wang, Shuliang; Li, Xingxing; Zhang, Xu; Yang, Guang; Qiu, Minfeng

    2014-04-01

    Due to its direct link to structural security, crack width is thought to be one of the most important parameters reflecting damage conditions of concrete structures. However, the width problem is difficult to solve with the existing structural health monitoring methods. In this paper, crack width monitoring by means of adhering enameled copper wires with different ultimate strains on the surface of structures is proposed, based on smart film crack monitoring put forward by the present authors. The basic idea of the proposed method is related to a proportional relationship between the crack width and ultimate strain of the broken wire. Namely, when a certain width of crack passes through the wire, some low ultimate strain wires will be broken and higher ultimate strain wires may stay non-broken until the crack extends to a larger scale. Detection of the copper wire condition as broken or non-broken may indicate the width of the structural crack. Thereafter, a multi-layered stress transfer model and specimen experiment are performed to quantify the relationship. A practical smart film is then redesigned with this idea and applied to Chongqing Jiangjin Yangtze River Bridge.

  3. A Novel Nondestructive Bit-Line Discharging Scheme for Deep Submicrometer STT-RAM

    DEFF Research Database (Denmark)

    Zeinali, Behzad; Madsen, Jens Kargaard; Raghavan, Praveen

    . In this paper, we propose a novel non-destructive self-reference sensing scheme for STT-RAM. The proposed technique overcomes the large bit-to-bit variation of MTJ resistance. In the proposed scheme, the stored value in the STTRAM cell preserves, hence, the long write-back operation is eliminated. Besides...

  4. Towards the generation of random bits at terahertz rates based on a chaotic semiconductor laser

    International Nuclear Information System (INIS)

    Kanter, Ido; Aviad, Yaara; Reidler, Igor; Cohen, Elad; Rosenbluh, Michael

    2010-01-01

    Random bit generators (RBGs) are important in many aspects of statistical physics and crucial in Monte-Carlo simulations, stochastic modeling and quantum cryptography. The quality of a RBG is measured by the unpredictability of the bit string it produces and the speed at which the truly random bits can be generated. Deterministic algorithms generate pseudo-random numbers at high data rates as they are only limited by electronic hardware speed, but their unpredictability is limited by the very nature of their deterministic origin. It is widely accepted that the core of any true RBG must be an intrinsically non-deterministic physical process, e.g. measuring thermal noise from a resistor. Owing to low signal levels, such systems are highly susceptible to bias, introduced by amplification, and to small nonrandom external perturbations resulting in a limited generation rate, typically less than 100M bit/s. We present a physical random bit generator, based on a chaotic semiconductor laser, having delayed optical feedback, which operates reliably at rates up to 300Gbit/s. The method uses a high derivative of the digitized chaotic laser intensity and generates the random sequence by retaining a number of the least significant bits of the high derivative value. The method is insensitive to laser operational parameters and eliminates the necessity for all external constraints such as incommensurate sampling rates and laser external cavity round trip time. The randomness of long bit strings is verified by standard statistical tests.

  5. Towards the generation of random bits at terahertz rates based on a chaotic semiconductor laser

    Science.gov (United States)

    Kanter, Ido; Aviad, Yaara; Reidler, Igor; Cohen, Elad; Rosenbluh, Michael

    2010-06-01

    Random bit generators (RBGs) are important in many aspects of statistical physics and crucial in Monte-Carlo simulations, stochastic modeling and quantum cryptography. The quality of a RBG is measured by the unpredictability of the bit string it produces and the speed at which the truly random bits can be generated. Deterministic algorithms generate pseudo-random numbers at high data rates as they are only limited by electronic hardware speed, but their unpredictability is limited by the very nature of their deterministic origin. It is widely accepted that the core of any true RBG must be an intrinsically non-deterministic physical process, e.g. measuring thermal noise from a resistor. Owing to low signal levels, such systems are highly susceptible to bias, introduced by amplification, and to small nonrandom external perturbations resulting in a limited generation rate, typically less than 100M bit/s. We present a physical random bit generator, based on a chaotic semiconductor laser, having delayed optical feedback, which operates reliably at rates up to 300Gbit/s. The method uses a high derivative of the digitized chaotic laser intensity and generates the random sequence by retaining a number of the least significant bits of the high derivative value. The method is insensitive to laser operational parameters and eliminates the necessity for all external constraints such as incommensurate sampling rates and laser external cavity round trip time. The randomness of long bit strings is verified by standard statistical tests.

  6. Enhanced bit rate-distance product impulse radio ultra-wideband over fiber link

    DEFF Research Database (Denmark)

    Rodes Lopez, Roberto; Jensen, Jesper Bevensee; Caballero Jambrina, Antonio

    2010-01-01

    We report on a record distance and bit rate-wireless impulse radio (IR) ultra-wideband (UWB) link with combined transmission over a 20 km long fiber link. We are able to improve the compliance with the regulated frequency emission mask and achieve bit rate-distance products as high as 16 Gbit/s·m....

  7. On algorithmic equivalence of instruction sequences for computing bit string functions

    NARCIS (Netherlands)

    Bergstra, J.A.; Middelburg, C.A.

    2015-01-01

    Every partial function from bit strings of a given length to bit strings of a possibly different given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction. We

  8. On algorithmic equivalence of instruction sequences for computing bit string functions

    NARCIS (Netherlands)

    Bergstra, J.A.; Middelburg, C.A.

    2014-01-01

    Every partial function from bit strings of a given length to bit strings of a possibly different given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction. We

  9. Dispersion Tolerance of 40 Gbaud Multilevel Modulation Formats with up to 3 bits per Symbol

    DEFF Research Database (Denmark)

    Jensen, Jesper Bevensee; Tokle, Torger; Geng, Yan

    2006-01-01

    We present numerical and experimental investigations of dispersion tolerance for multilevel phase- and amplitude modulation with up to 3 bits per symbol at a symbol rate of 40 Gbaud......We present numerical and experimental investigations of dispersion tolerance for multilevel phase- and amplitude modulation with up to 3 bits per symbol at a symbol rate of 40 Gbaud...

  10. Possibility, impossibility, and cheat sensitivity of quantum-bit string commitment

    NARCIS (Netherlands)

    Buhrman, H.; Christandl, M.; Hayden, P.; Lo, H.-K.; Wehner, S.

    2008-01-01

    Unconditionally secure nonrelativistic bit commitment is known to be impossible in both the classical and the quantum worlds. But when committing to a string of n bits at once, how far can we stretch the quantum limits? In this paper, we introduce a framework for quantum schemes where Alice commits

  11. Up to 20 Gbit/s bit-rate transparent integrated interferometric wavelength converter

    DEFF Research Database (Denmark)

    Jørgensen, Carsten; Danielsen, Søren Lykke; Hansen, Peter Bukhave

    1996-01-01

    We present a compact and optimised multiquantum-well based, integrated all-active Michelson interferometer for 26 Gbit/s optical wavelength conversion. Bit-rate transparent operation is demonstrated with a conversion penalty well below 0.5 dB at bit-rates ranging from 622 Mbit/s to 20 Gbit/s....

  12. Warped Discrete Cosine Transform-Based Low Bit-Rate Block Coding Using Image Downsampling

    Directory of Open Access Journals (Sweden)

    Ertürk Sarp

    2007-01-01

    Full Text Available This paper presents warped discrete cosine transform (WDCT-based low bit-rate block coding using image downsampling. While WDCT aims to improve the performance of conventional DCT by frequency warping, the WDCT has only been applicable to high bit-rate coding applications because of the overhead required to define the parameters of the warping filter. Recently, low bit-rate block coding based on image downsampling prior to block coding followed by upsampling after the decoding process is proposed to improve the compression performance for low bit-rate block coders. This paper demonstrates that a superior performance can be achieved if WDCT is used in conjunction with image downsampling-based block coding for low bit-rate applications.

  13. Changes realized from extended bit-depth and metal artifact reduction in CT

    Energy Technology Data Exchange (ETDEWEB)

    Glide-Hurst, C.; Chen, D.; Zhong, H.; Chetty, I. J. [Department of Radiation Oncology, Henry Ford Health Systems, Detroit, Michigan 48202 (United States)

    2013-06-15

    Purpose: High-Z material in computed tomography (CT) yields metal artifacts that degrade image quality and may cause substantial errors in dose calculation. This study couples a metal artifact reduction (MAR) algorithm with enhanced 16-bit depth (vs standard 12-bit) to quantify potential gains in image quality and dosimetry. Methods: Extended CT to electron density (CT-ED) curves were derived from a tissue characterization phantom with titanium and stainless steel inserts scanned at 90-140 kVp for 12- and 16-bit reconstructions. MAR was applied to sinogram data (Brilliance BigBore CT scanner, Philips Healthcare, v.3.5). Monte Carlo simulation (MC-SIM) was performed on a simulated double hip prostheses case (Cerrobend rods embedded in a pelvic phantom) using BEAMnrc/Dosxyz (400 000 0000 histories, 6X, 10 Multiplication-Sign 10 cm{sup 2} beam traversing Cerrobend rod). A phantom study was also conducted using a stainless steel rod embedded in solid water, and dosimetric verification was performed with Gafchromic film analysis (absolute difference and gamma analysis, 2% dose and 2 mm distance to agreement) for plans calculated with Anisotropic Analytic Algorithm (AAA, Eclipse v11.0) to elucidate changes between 12- and 16-bit data. Three patients (bony metastases to the femur and humerus, and a prostate cancer case) with metal implants were reconstructed using both bit depths, with dose calculated using AAA and derived CT-ED curves. Planar dose distributions were assessed via matrix analyses and using gamma criteria of 2%/2 mm. Results: For 12-bit images, CT numbers for titanium and stainless steel saturated at 3071 Hounsfield units (HU), whereas for 16-bit depth, mean CT numbers were much larger (e.g., titanium and stainless steel yielded HU of 8066.5 {+-} 56.6 and 13 588.5 {+-} 198.8 for 16-bit uncorrected scans at 120 kVp, respectively). MC-SIM was well-matched between 12- and 16-bit images except downstream of the Cerrobend rod, where 16-bit dose was {approx}6

  14. Case histories of roller cone core bit application in crystalline rock

    International Nuclear Information System (INIS)

    Dahlem, J.S.

    1988-01-01

    The increased interest in deep crystalline rock drilling projects has resulted in a requirement for premium coring bits which are effective in such a harsh and abrasive environment. Hard formation roller cone insert bits have traditionally and constantly performed well in crystalline rock. As a result, the application of state of the art roller cone rock bit technology to the design and development of core bits has made crystalline coring projects more viable than ever before. This paper follows the development of roller cone core bits by examining their use on project such as HDR (Hot Dry Rock, Los Alamos); NAGRA (Nuclear Waste Disposal Wells in Switzerland); Camborne School of Mines Geothermal Project in Cornwall, UK; Deep Gas Project in Sweden; and the KTB Deep Drilling Project in West Germany

  15. New roller cone bits with unique nozzle designs reduce drilling costs

    International Nuclear Information System (INIS)

    Moffitt, S.R.; Pearce, D.E.; Ivie, C.R.

    1992-01-01

    This paper reports that selection of the optimum rock bit design to achieve the lowest drilling cost in a given application is often difficult due to a large number of rock bit performance considerations. However, in a majority of applications increased penetration rate is the key consideration in reducing drilling costs. Discovery of a new bit design concept has led to the development of roller cone bits that achieve significant penetration rate increases using superior hydraulic nozzle designs. Prototype designs have achieved 20 to 40% increases in penetration rate with comparable footage drilled when tested in 6 1/2, 8 1/2, 8-3/4, 9-7/8 and 12 1/4 IADC 437, 517 and 537 type bits in the U.S., North Sea, Italy, and Oman. Second-generation designs tested in a full-scale drilling laboratory have delivered 70% increases in penetration rates

  16. Simple proof of the impossibility of bit commitment in generalized probabilistic theories using cone programming

    Science.gov (United States)

    Sikora, Jamie; Selby, John

    2018-04-01

    Bit commitment is a fundamental cryptographic task, in which Alice commits a bit to Bob such that she cannot later change the value of the bit, while, simultaneously, the bit is hidden from Bob. It is known that ideal bit commitment is impossible within quantum theory. In this work, we show that it is also impossible in generalized probabilistic theories (under a small set of assumptions) by presenting a quantitative trade-off between Alice's and Bob's cheating probabilities. Our proof relies crucially on a formulation of cheating strategies as cone programs, a natural generalization of semidefinite programs. In fact, using the generality of this technique, we prove that this result holds for the more general task of integer commitment.

  17. Bit Level Synchronized MAC Protocol for Multireader RFID Networks

    Directory of Open Access Journals (Sweden)

    Namboodiri Vinod

    2010-01-01

    Full Text Available The operation of multiple RFID readers in close proximity results in interference between the readers. This issue is termed the reader collision problem and cannot always be solved by assigning them to different frequency channels due to technical and regulatory limitations. The typical solution is to separate the operation of such readers across time. This sequential operation, however, results in a long delay to identify all tags. We present a bit level synchronized (BLSync MAC protocol for multi-reader RFID networks that allows multiple readers to operate simultaneously on the same frequency channel. The BLSync protocol solves the reader collision problem by allowing all readers to transmit the same query at the same time. We analyze the performance of using the BLSync protocol and demonstrate benefits of 40%–50% in terms of tag reading delay for most settings. The benefits of BLSync, first demonstrated through analysis, are then validated and quantified through simulations on realistic reader-tag layouts.

  18. Constellation labeling optimization for bit-interleaved coded APSK

    Science.gov (United States)

    Xiang, Xingyu; Mo, Zijian; Wang, Zhonghai; Pham, Khanh; Blasch, Erik; Chen, Genshe

    2016-05-01

    This paper investigates the constellation and mapping optimization for amplitude phase shift keying (APSK) modulation, which is deployed in Digital Video Broadcasting Satellite - Second Generation (DVB-S2) and Digital Video Broadcasting - Satellite services to Handhelds (DVB-SH) broadcasting standards due to its merits of power and spectral efficiency together with the robustness against nonlinear distortion. The mapping optimization is performed for 32-APSK according to combined cost functions related to Euclidean distance and mutual information. A Binary switching algorithm and its modified version are used to minimize the cost function and the estimated error between the original and received data. The optimized constellation mapping is tested by combining DVB-S2 standard Low-Density Parity-Check (LDPC) codes in both Bit-Interleaved Coded Modulation (BICM) and BICM with iterative decoding (BICM-ID) systems. The simulated results validate the proposed constellation labeling optimization scheme which yields better performance against conventional 32-APSK constellation defined in DVB-S2 standard.

  19. Hill Cipher and Least Significant Bit for Image Messaging Security

    Directory of Open Access Journals (Sweden)

    Muhammad Husnul Arif

    2016-02-01

    Full Text Available Exchange of information through cyberspace has many benefits as an example fast estimated time, unlimited physical distance and space limits, etc. But in these activities can also pose a security risk for confidential information. It is necessary for the safety that can be used to protect data transmitted through the Internet. Encryption algorithm that used to encrypt message to be sent (plaintext into messages that have been randomized (ciphertext is cryptography and steganography algorithms. In application of cryptographic techniques that will be used is Hill Cipher. The technique is combined with steganography techniques Least Significant Bit. The result of merging techniques can maintain the confidentiality of messages because people who do not know the secret key used will be difficult to get the message contained in the stego-image and the image that has been inserted can not be used as a cover image. Message successfully inserted and extracted back on all samples with a good image formats * .bmp, * .png , * .jpg at a resolution of 512 x 512 pixels , 256 x 256 pixels. MSE and PSNR results are not influenced file format or file size, but influenced by dimensions of image. The larger dimensions of the image, then the smaller MSE that means error of image gets smaller.

  20. Transforming networking within the ESIP Federation using ResearchBit

    Science.gov (United States)

    Robinson, E.

    2015-12-01

    Geoscientists increasingly need interdisciplinary teams to solve their research problems. Currently, geoscientists use Research Networking (RN) systems to connect with each other and find people of similar and dissimilar interests. As we shift to digitally mediated scholarship, we need innovative methods for scholarly communication. Formal methods for scholarly communication are undergoing vast transformation owing to the open-access movement and reproducible research. However, informal scholarly communication that takes place at professional society meetings and conferences, like AGU, has received limited research attention relying primarily on serendipitous interaction. The ResearchBit project aims to fundamentally improve informal methods of scholarly communication by leveraging the serendipitous interactions of researchers and making them more aware of co-located potential collaborators with mutual interests. This presentation will describe our preliminary hardware testing done at the Federation for Earth Science Information Partners (ESIP) Summer meeting this past July and the initial recommendation system design. The presentation will also cover the cultural shifts and hurdles to introducing new technology, the privacy concerns of tracking technology and how we are addressing those new issues.

  1. A short impossibility proof of quantum bit commitment

    Energy Technology Data Exchange (ETDEWEB)

    Chiribella, Giulio, E-mail: gchiribella@mail.tsinghua.edu.cn [Center for Quantum Information, Institute for Interdisciplinary Information Sciences, Tsinghua University (China); D' Ariano, Giacomo Mauro, E-mail: dariano@unipv.it [QUIT group, Dipartimento di Fisica, via Bassi 6, 27100 Pavia (Italy); INFN Gruppo IV, Sezione di Pavia, via Bassi, 6, 27100 Pavia (Italy); Perinotti, Paolo, E-mail: paolo.perinotti@unipv.it [QUIT group, Dipartimento di Fisica, via Bassi 6, 27100 Pavia (Italy); INFN Gruppo IV, Sezione di Pavia, via Bassi, 6, 27100 Pavia (Italy); Schlingemann, Dirk, E-mail: d.schlingemann@tu-bs.de [ISI Foundation, Quantum Information Theory Unit, Viale S. Severo 65, 10133 Torino (Italy); Werner, Reinhard, E-mail: Reinhard.Werner@itp.uni-hannover.de [Institut für Theoretische Physik, Leibniz Universität Hannover, Appelstrasse 2, 30167 Hannover (Germany)

    2013-06-17

    Bit commitment protocols, whose security is based on the laws of quantum mechanics alone, are generally held to be impossible on the basis of a concealment–bindingness tradeoff (Lo and Chau, 1997 [1], Mayers, 1997 [2]). A strengthened and explicit impossibility proof has been given in D'Ariano et al. (2007) [3] in the Heisenberg picture and in a C{sup ⁎}-algebraic framework, considering all conceivable protocols in which both classical and quantum information is exchanged. In the present Letter we provide a new impossibility proof in the Schrödinger picture, greatly simplifying the classification of protocols and strategies using the mathematical formulation in terms of quantum combs (Chiribella et al., 2008 [4]), with each single-party strategy represented by a conditioned comb. We prove that assuming a stronger notion of concealment—for each classical communication history, not in average—allows Alice's cheat to pass also the worst-case Bob's test. The present approach allows us to restate the concealment–bindingness tradeoff in terms of the continuity of dilations of probabilistic quantum combs with the metric given by the comb discriminability-distance.

  2. A short impossibility proof of quantum bit commitment

    International Nuclear Information System (INIS)

    Chiribella, Giulio; D'Ariano, Giacomo Mauro; Perinotti, Paolo; Schlingemann, Dirk; Werner, Reinhard

    2013-01-01

    Bit commitment protocols, whose security is based on the laws of quantum mechanics alone, are generally held to be impossible on the basis of a concealment–bindingness tradeoff (Lo and Chau, 1997 [1], Mayers, 1997 [2]). A strengthened and explicit impossibility proof has been given in D'Ariano et al. (2007) [3] in the Heisenberg picture and in a C ⁎ -algebraic framework, considering all conceivable protocols in which both classical and quantum information is exchanged. In the present Letter we provide a new impossibility proof in the Schrödinger picture, greatly simplifying the classification of protocols and strategies using the mathematical formulation in terms of quantum combs (Chiribella et al., 2008 [4]), with each single-party strategy represented by a conditioned comb. We prove that assuming a stronger notion of concealment—for each classical communication history, not in average—allows Alice's cheat to pass also the worst-case Bob's test. The present approach allows us to restate the concealment–bindingness tradeoff in terms of the continuity of dilations of probabilistic quantum combs with the metric given by the comb discriminability-distance.

  3. Statistical mechanics approach to 1-bit compressed sensing

    International Nuclear Information System (INIS)

    Xu, Yingying; Kabashima, Yoshiyuki

    2013-01-01

    Compressed sensing is a framework that makes it possible to recover an N-dimensional sparse vector x∈R N from its linear transformation y∈R M of lower dimensionality M 1 -norm-based signal recovery scheme for 1-bit compressed sensing using statistical mechanics methods. We show that the signal recovery performance predicted by the replica method under the replica symmetric ansatz, which turns out to be locally unstable for modes breaking the replica symmetry, is in good consistency with experimental results of an approximate recovery algorithm developed earlier. This suggests that the l 1 -based recovery problem typically has many local optima of a similar recovery accuracy, which can be achieved by the approximate algorithm. We also develop another approximate recovery algorithm inspired by the cavity method. Numerical experiments show that when the density of nonzero entries in the original signal is relatively large the new algorithm offers better performance than the abovementioned scheme and does so with a lower computational cost. (paper)

  4. High Bit-Depth Medical Image Compression With HEVC.

    Science.gov (United States)

    Parikh, Saurin S; Ruiz, Damian; Kalva, Hari; Fernandez-Escribano, Gerardo; Adzic, Velibor

    2018-03-01

    Efficient storing and retrieval of medical images has direct impact on reducing costs and improving access in cloud-based health care services. JPEG 2000 is currently the commonly used compression format for medical images shared using the DICOM standard. However, new formats such as high efficiency video coding (HEVC) can provide better compression efficiency compared to JPEG 2000. Furthermore, JPEG 2000 is not suitable for efficiently storing image series and 3-D imagery. Using HEVC, a single format can support all forms of medical images. This paper presents the use of HEVC for diagnostically acceptable medical image compression, focusing on compression efficiency compared to JPEG 2000. Diagnostically acceptable lossy compression and complexity of high bit-depth medical image compression are studied. Based on an established medically acceptable compression range for JPEG 2000, this paper establishes acceptable HEVC compression range for medical imaging applications. Experimental results show that using HEVC can increase the compression performance, compared to JPEG 2000, by over 54%. Along with this, a new method for reducing computational complexity of HEVC encoding for medical images is proposed. Results show that HEVC intra encoding complexity can be reduced by over 55% with negligible increase in file size.

  5. A Fast Soft Bit Error Rate Estimation Method

    Directory of Open Access Journals (Sweden)

    Ait-Idir Tarik

    2010-01-01

    Full Text Available We have suggested in a previous publication a method to estimate the Bit Error Rate (BER of a digital communications system instead of using the famous Monte Carlo (MC simulation. This method was based on the estimation of the probability density function (pdf of soft observed samples. The kernel method was used for the pdf estimation. In this paper, we suggest to use a Gaussian Mixture (GM model. The Expectation Maximisation algorithm is used to estimate the parameters of this mixture. The optimal number of Gaussians is computed by using Mutual Information Theory. The analytical expression of the BER is therefore simply given by using the different estimated parameters of the Gaussian Mixture. Simulation results are presented to compare the three mentioned methods: Monte Carlo, Kernel and Gaussian Mixture. We analyze the performance of the proposed BER estimator in the framework of a multiuser code division multiple access system and show that attractive performance is achieved compared with conventional MC or Kernel aided techniques. The results show that the GM method can drastically reduce the needed number of samples to estimate the BER in order to reduce the required simulation run-time, even at very low BER.

  6. Feasibility Study of 8-Bit Microcontroller Applications for Ethernet

    Directory of Open Access Journals (Sweden)

    Lech Gulbinovič

    2011-08-01

    Full Text Available Feasibility study of 8-bit microcontroller applications for Ethernet is presented. Designed device is based on ATmega32 microcontroller and 10 Mbps Ethernet controller ENC28J60. Device is simulated as mass queuing theoretical model with ticket booking counter. Practical explorations are accomplished and characteristics are determined. Practical results are compared to theoretical ones. Program code and device packet processing speed optimization are discussed. Microcontroller packet processing speed and packet latency depend on packet size. For ICMP protocol packet processing speed varies 1.4–2.1 Mbps, latency – 0.8–8.4 ms. UDP protocol packet processing speed varies 1.3–1.8 Mbps, latency – 1.1–9.6 ms. Packet processing speed depends on compilation settings and program code compression level. Best results are reached on optimization le­vel ‑O3, then speed increased ~3% but program code size increased 68% comparing to –Os optimization level.Article in Lithuanian

  7. Influence of inhomogeneous broadening and deliberately introduced disorder on the width of the lasing spectrum of a quantum dot laser

    Energy Technology Data Exchange (ETDEWEB)

    Korenev, V. V.; Savelyev, A. V., E-mail: savelev@mail.ioffe.ru; Zhukov, A. E.; Omelchenko, A. V.; Maximov, M. V. [Russian Academy of Sciences, Nanotechnology Research and Education Center, St. Petersburg Academic University (Russian Federation)

    2012-05-15

    Analytical expressions for the shape and width of the lasing spectra of a quantum-dot (QD) laser in the case of a small (in comparison with the spectrum width) homogeneous broadening of the QD energy levels have been obtained. It is shown that the dependence of the lasing spectrum width on the output power at room temperature is determined by two dimensionless parameters: the width of QD distribution over the optical-transition energy, normalized to temperature, and the ratio of the optical loss to the maximum gain. The optimal dimensions of the laser active region have been found to obtain a specified width of the emission spectrum at a minimum pump current. The possibility of using multilayer structures with QDs to increase the lasing spectrum's width has been analyzed. It is shown that the use of several arrays of QDs with deliberately variable optical-transition energies leads to broadening of the lasing spectra; some numerical estimates are presented.

  8. Boundary plasma heat flux width measurements for poloidal magnetic fields above 1 Tesla in the Alcator C-Mod tokamak

    Science.gov (United States)

    Brunner, Dan; Labombard, Brian; Kuang, Adam; Terry, Jim; Alcator C-Mod Team

    2017-10-01

    The boundary heat flux width, along with the total power flowing into the boundary, sets the power exhaust challenge for tokamaks. A multi-machine boundary heat flux width database found that the heat flux width in H-modes scaled inversely with poloidal magnetic field (Bp) and was independent of machine size. The maximum Bp in the database was 0.8 T, whereas the ITER 15 MA, Q =10 scenario will be 1.2 T. New measurements of the boundary heat flux width in Alcator C-Mod extend the international database to plasmas with Bp up to 1.3 T. C-Mod was the only experiment able to operate at ITER-level Bp. These new measurements are from over 300 plasma shots in L-, I-, and EDA H-modes spanning essentially the whole operating space in C-Mod. We find that the inverse-Bp dependence of the heat flux width in H-modes continues to ITER-level Bp, further reinforcing the empirical projection of 500 μm heat flux width for ITER. We find 50% scatter around the inverse-Bp scaling and are searching for the `hidden variables' causing this scatter. Supported by USDoE award DE-FC02-99ER54512.

  9. Pulse Width Affects Scalp Sensation of Transcranial Magnetic Stimulation.

    Science.gov (United States)

    Peterchev, Angel V; Luber, Bruce; Westin, Gregory G; Lisanby, Sarah H

    Scalp sensation and pain comprise the most common side effect of transcranial magnetic stimulation (TMS), which can reduce tolerability and complicate experimental blinding. We explored whether changing the width of single TMS pulses affects the quality and tolerability of the resultant somatic sensation. Using a controllable pulse parameter TMS device with a figure-8 coil, single monophasic magnetic pulses inducing electric field with initial phase width of 30, 60, and 120 µs were delivered in 23 healthy volunteers. Resting motor threshold of the right first dorsal interosseus was determined for each pulse width, as reported previously. Subsequently, pulses were delivered over the left dorsolateral prefrontal cortex at each of the three pulse widths at two amplitudes (100% and 120% of the pulse-width-specific motor threshold), with 20 repetitions per condition delivered in random order. After each pulse, subjects rated 0-to-10 visual analog scales for Discomfort, Sharpness, and Strength of the sensation. Briefer TMS pulses with amplitude normalized to the motor threshold were perceived as slightly more uncomfortable than longer pulses (with an average 0.89 point increase on the Discomfort scale for pulse width of 30 µs compared to 120 µs). The sensation of the briefer pulses was felt to be substantially sharper (2.95 points increase for 30 µs compared to 120 µs pulse width), but not stronger than longer pulses. As expected, higher amplitude pulses increased the perceived discomfort and strength, and, to a lesser degree the perceived sharpness. Our findings contradict a previously published hypothesis that briefer TMS pulses are more tolerable. We discovered that the opposite is true, which merits further study as a means of enhancing tolerability in the context of repetitive TMS. Copyright © 2016 Elsevier Inc. All rights reserved.

  10. Changes in step-width during dual-task walking predicts falls.

    Science.gov (United States)

    Nordin, E; Moe-Nilssen, R; Ramnemark, A; Lundin-Olsson, L

    2010-05-01

    The aim was to evaluate whether gait pattern changes between single- and dual-task conditions were associated with risk of falling in older people. Dual-task cost (DTC) of 230 community living, physically independent people, 75 years or older, was determined with an electronic walkway. Participants were followed up each month for 1 year to record falls. Mean and variability measures of gait characteristics for 5 dual-task conditions were compared to single-task walking for each participant. Almost half (48%) of the participants fell at least once during follow-up. Risk of falling increased in individuals where DTC for performing a subtraction task demonstrated change in mean step-width compared to single-task walking. Risk of falling decreased in individuals where DTC for carrying a cup and saucer demonstrated change compared to single-task walking in mean step-width, mean step-time, and step-length variability. Degree of change in gait characteristics related to a change in risk of falling differed between measures. Prognostic guidance for fall risk was found for the above DTCs in mean step-width with a negative likelihood ratio of 0.5 and a positive likelihood ratio of 2.3, respectively. Findings suggest that changes in step-width, step-time, and step-length with dual tasking may be related to future risk of falling. Depending on the nature of the second task, DTC may indicate either an increased risk of falling, or a protective strategy to avoid falling. Copyright 2010. Published by Elsevier B.V.

  11. The effects of lane width, shoulder width, and road cross-sectional reallocation on drivers' behavioral adaptations.

    Science.gov (United States)

    Mecheri, Sami; Rosey, Florence; Lobjois, Régis

    2017-07-01

    Previous research has shown that lane-width reduction makes drivers operate vehicles closer to the center of the road whereas hard-shoulder widening induces a position farther away from the road's center. The goal of the present driving-simulator study was twofold. First, it was aimed at further investigating the respective effects of lane and shoulder width on in-lane positioning strategies, by examining vehicle distance from the center of the lane. The second aim was to assess the impact on safety of three possible cross-sectional reallocations of the width of the road (i.e., three lane-width reductions with concomitant shoulder widening at a fixed cross-sectional width) as compared to a control road. The results confirmed that lane-width reduction made participants drive closer to the road's center. However, in-lane position was affected differently by lane narrowing, depending on the traffic situation. In the absence of oncoming traffic, lane narrowing gave rise to significant shifts in the car's distance from the lane's center toward the edge line, whereas this distance remained similar across lane widths during traffic periods. When the shoulders were at least 0.50m wide, participants drove farther away from both the road center and the lane center. Road reallocation operations resulted in vehicles positioned farther away from the edge of the road and less swerving behavior, without generating higher driving speeds. Finally, it is argued that road-space reallocation may serve as a good low-cost tool for providing a recovery area for steering errors, without impairing drivers' behavior. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Variable Kernel Density Estimation

    OpenAIRE

    Terrell, George R.; Scott, David W.

    1992-01-01

    We investigate some of the possibilities for improvement of univariate and multivariate kernel density estimates by varying the window over the domain of estimation, pointwise and globally. Two general approaches are to vary the window width by the point of estimation and by point of the sample observation. The first possibility is shown to be of little efficacy in one variable. In particular, nearest-neighbor estimators in all versions perform poorly in one and two dimensions, but begin to b...

  13. The Virtual Solar Observatory at Eight and a Bit!

    Science.gov (United States)

    Davey, Alisdair R.; VSO Team

    2011-05-01

    The Virtual Solar Observatory (VSO) was the first virtual observatory in the solar and heliophysics data space. It first saw the light of day in 2003 with a mission to serve the solar physics community by enabling homogenous access to heterogeneous data, and hiding the gory details of doing so from the user. The VSO pioneered what was to become the "Small Box" methodology, setting out to provide only the services required to navigate the user to the data and then letting them directly transferred the data from the data providers. After eight and a bit years the VSO now serves data from 72 different instruments covering a multitude of space and ground based observatories, including data from SDO. Dealing with the volume of data from SDO has proved to be our most difficult challenge, forcing us from the small box approach to one where the various VSO sites not only serve SDO data, but are central to the distribution of the data within the US and to Europe and other parts of the world. With SDO data serving mostly in place we are now working on integration with the Heliophysics Event Knowledgebase (HEK) and including a number of new solar data sets in the VSO family. We have a complete VSO search interface in IDL now, enabling searching, downloading and processing solar data, all be done without leaving the IDL command line, and will be releasing a brand new web interface providing users and data providers, with the ability to create far more detailed and instrument specific searches. Eight years on and the VSO has plenty of work in front of it.

  14. Form factors and radiation widths of the giant multipole resonances

    International Nuclear Information System (INIS)

    Denisov, V.Yu.

    1990-01-01

    Simple analytic relations for the form factors of inelastic electron scattering in the Born approximation and radiation widths of the isovector and isoscalar giant multipole resonances are derived. The dynamic relationship between the volume and surface density vibrations were taken into account in this calculation. The form factors in the Born approximation were found to be in satisfactory agreement with experimental data in the region of small transferred momenta. The radiation widths of isoscalar multipole resonances increase when the number of nucleons increase as A 1/3 , and for isovector resonances this dependence has the form f(A)A 1/3 , where f(A) is a slowly increasing function of A. Radiation widths well fit the experimental data

  15. Modelling the widths of fission observables in GEF

    Directory of Open Access Journals (Sweden)

    Schmidt K.-H.

    2013-03-01

    Full Text Available The widths of the mass distributions of the different fission channels are traced back to the probability distributions of the corresponding quantum oscillators that are coupled to the heat bath, which is formed by the intrinsic degrees of freedom of the fissioning system under the influence of pairing correlations and shell effects. Following conclusion from stochastic calculations of Adeev and Pashkevich, an early freezing due to dynamical effects is assumed. It is shown that the mass width of the fission channels in low-energy fission is strongly influenced by the zero-point motion of the corresponding quantum oscillator. The observed variation of the mass widths of the asymmetric fission channels with excitation energy is attributed to the energy-dependent properties of the heat bath and not to the population of excited states of the corresponding quantum oscillator.

  16. Fast and Robust Nanocellulose Width Estimation Using Turbidimetry.

    Science.gov (United States)

    Shimizu, Michiko; Saito, Tsuguyuki; Nishiyama, Yoshiharu; Iwamoto, Shinichiro; Yano, Hiroyuki; Isogai, Akira; Endo, Takashi

    2016-10-01

    The dimensions of nanocelluloses are important factors in controlling their material properties. The present study reports a fast and robust method for estimating the widths of individual nanocellulose particles based on the turbidities of their water dispersions. Seven types of nanocellulose, including short and rigid cellulose nanocrystals and long and flexible cellulose nanofibers, are prepared via different processes. Their widths are calculated from the respective turbidity plots of their water dispersions, based on the theory of light scattering by thin and long particles. The turbidity-derived widths of the seven nanocelluloses range from 2 to 10 nm, and show good correlations with the thicknesses of nanocellulose particles spread on flat mica surfaces determined using atomic force microscopy. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  17. A preliminary study on the containment building integrity following BIT removal for nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Jo, Jong Young; Song, Dong Soo; Byun, Choong Sub [Korea Electric Power Research Institute, Daejeon (Korea, Republic of)

    2008-07-01

    Boron Injection Tank(BIT) is a component of the Safety Injection System, which its sole function is to provide concentrated boric acid to the reactor coolant in order to mitigate the consequences of postulated main steamline break accidents. Although BIT plays an important role in mitigating the accident, high concentration of 20,000ppm causes valve leakage, clog of precipitation and continuous heat tracing have to be provided. For the removal of BIT, benchmarking analysis is performed between COPATTA code used in final safety analysis report and CONTEMPT code to be used this study. CONTEMPT is well compatible with COPATTA. The sensitivity study for integrity is performed for the three cases of full double ended rupture at 102% power with diesel generator failure, 3.4m{sup 3} and 2400ppm BIT, 3.4m{sup 3} and 0ppm BIT and no volume of BIT. The results show that the deactivation of BIT is plausible for success.

  18. Minimal-post-processing 320-Gbps true random bit generation using physical white chaos.

    Science.gov (United States)

    Wang, Anbang; Wang, Longsheng; Li, Pu; Wang, Yuncai

    2017-02-20

    Chaotic external-cavity semiconductor laser (ECL) is a promising entropy source for generation of high-speed physical random bits or digital keys. The rate and randomness is unfortunately limited by laser relaxation oscillation and external-cavity resonance, and is usually improved by complicated post processing. Here, we propose using a physical broadband white chaos generated by optical heterodyning of two ECLs as entropy source to construct high-speed random bit generation (RBG) with minimal post processing. The optical heterodyne chaos not only has a white spectrum without signature of relaxation oscillation and external-cavity resonance but also has a symmetric amplitude distribution. Thus, after quantization with a multi-bit analog-digital-convertor (ADC), random bits can be obtained by extracting several least significant bits (LSBs) without any other processing. In experiments, a white chaos with a 3-dB bandwidth of 16.7 GHz is generated. Its entropy rate is estimated as 16 Gbps by single-bit quantization which means a spectrum efficiency of 96%. With quantization using an 8-bit ADC, 320-Gbps physical RBG is achieved by directly extracting 4 LSBs at 80-GHz sampling rate.

  19. A Novel Digital Background Calibration Technique for 16 bit SHA-less Multibit Pipelined ADC

    Directory of Open Access Journals (Sweden)

    Swina Narula

    2016-01-01

    Full Text Available In this paper, a high resolution of 16 bit and high speed of 125MS/s, multibit Pipelined ADC with digital background calibration is presented. In order to achieve low power, SHA-less front end is used with multibit stages. The first and second stages are used here as a 3.5 bit and the stages from third to seventh are of 2.5 bit and last stage is of 3-bit flash ADC. After bit alignment and truncation of total 19 bits, 16 bits are used as final digital output. To precise the remove linear gain error of the residue amplifier and capacitor mismatching error, a digital background calibration technique is used, which is a combination of signal dependent dithering (SDD and butterfly shuffler. To improve settling time of residue amplifier, a special circuit of voltage separation is used. With the proposed digital background calibration technique, the spurious-free dynamic range (SFDR has been improved to 97.74 dB @30 MHz and 88.9 dB @150 MHz, and the signal-to-noise and distortion ratio (SNDR has been improved to 79.77 dB @ 30 MHz, and 73.5 dB @ 150 MHz. The implementation of the Pipelined ADC has been completed with technology parameters of 0.18μm CMOS process with 1.8 V supply. Total power consumption is 300 mW by the proposed ADC.

  20. Diamonds are forever: drill bit advances may offer cheaper and stronger alternatives

    Energy Technology Data Exchange (ETDEWEB)

    Mahoney, J.

    2001-02-01

    The rise to prominence of polycrystalline diamond compact (PDC) and diamond-impregnated drill bits, slowly providing stiff competition to the roller-cone type bits that for many years was the standard in the drilling industry, is discussed. A roller-cone drill bit, although much improved by heat treatment of the metal and the addition of tungsten carbide, is still mostly steel. It works by crushing the rock by overcoming its compressive strength, whereas PDC drill bits shear the rock away in a manner similar to scraping ice from a car windshield. PDC bits typically have three to six cutting surfaces, each one edged with a row of polycrystalline diamond cutters, bonded to a tungsten carbide base by a process called microwave sintering. Compared to roller cones, PDCs drill at least twice as fast, especially in the soft rock and clay where they have been used principally. In addition to saving rig time, PDC bits can handle longer runs; in the right application it is possible to drill the total depth of a well with only one bit. The microwave-sintered tungsten carbide also has higher corrosion resistance than the same material bonded under high pressure; PDCs are also less subject to mechanical failure than roller cones which use moveable bearings, seals and rotating cones. 1 photo.

  1. Improved Variable Window Kernel Estimates of Probability Densities

    OpenAIRE

    Hall, Peter; Hu, Tien Chung; Marron, J. S.

    1995-01-01

    Variable window width kernel density estimators, with the width varying proportionally to the square root of the density, have been thought to have superior asymptotic properties. The rate of convergence has been claimed to be as good as those typical for higher-order kernels, which makes the variable width estimators more attractive because no adjustment is needed to handle the negativity usually entailed by the latter. However, in a recent paper, Terrell and Scott show that these results ca...

  2. Analysis on Longitudinal Dose according to Change of Field Width

    International Nuclear Information System (INIS)

    Jung, Won Seok; Shin, Ryung Mi; Oh, Byung Cheon; Jo, Jun Young; Kim, Gi Chul; Choi, Tae Gu; Back, Jong Geal

    2011-01-01

    To analyze the accuracy of tumor volume dose following field width change, to check the difference of dose change by using self-made moving car, and to evaluate practical delivery tumor dose when tomotherapy in the treatment of organ influenced by breathing. By using self-made moving car, the difference of longitudinal movement (0.0 cm, 1.0 cm, 1.5 cm, 2.0 cm) was applied and compared calculated dose with measured dose according to change of field width (1.05 cm, 2.50 cm, 5.02 cm) and apprehended margin of error. Then done comparative analysis in degree of photosensitivity of DQA film measured by using Gafchromic EBT film. Dose profile and Gamma histogram were used to measure degree of photosensitivity of DQA film. When field width were 1.05 cm, 2.50 cm, 5.02 cm, margin of error of dose delivery coefficient was -2.00%, -0.39%, -2.55%. In dose profile of Gafchromic EBT film's analysis, the movement of moving car had greater motion toward longitudinal direction and as field width was narrower, big error increased considerably at high dose part compared to calculated dose. The more field width was narrowed, gamma index had a large considerable influence of moving at gamma histogram. We could check the difference of longitudinal dose of moving organ. In order to small field width and minimize organ moving due to breathing, it is thought to be needed to develop breathing control unit and fixation tool.

  3. Effects of injection nozzle exit width on rotating detonation engine

    Science.gov (United States)

    Sun, Jian; Zhou, Jin; Liu, Shijie; Lin, Zhiyong; Cai, Jianhua

    2017-11-01

    A series of numerical simulations of RDE modeling real injection nozzles with different exit widths are performed in this paper. The effects of nozzle exit width on chamber inlet state, plenum flowfield and detonation propagation are analyzed. The results are compared with that using an ideal injection model. Although the ideal injection model is a good approximation method to model RDE inlet, the two-dimensional effects of real nozzles are ignored in the ideal injection model so that some complicated phenomena such as the reflected waves caused by the nozzle walls and the reversed flow into the nozzles can not be modeled accurately. Additionally, the ideal injection model overpredicts the block ratio. In all the cases that stabilize at one-wave mode, the block ratio increases as the nozzle exit width gets smaller. The dual-wave mode case also has a relatively high block ratio. A pressure oscillation in the plenum with the same main frequency with the rotating detonation wave is observed. A parameter σ is applied to describe the non-uniformity in the plenum. σ increases as the nozzle exit width gets larger. Under some condition, the heat release on the interface of fresh premixed gas layer and detonation products can be strong enough to induce a new detonation wave. A spontaneous mode-transition process is observed for the smallest exit width case. Due to the detonation products existing in the premixed gas layer before the detonation wave, the detonation wave will propagate through reactants and products alternately, and therefore its strength will vary with time, especially near the chamber inlet. This tendency gets weaker as the injection nozzle exit width increases.

  4. The Design of a Single-Bit CMOS Image Sensor for Iris Recognition Applications

    Directory of Open Access Journals (Sweden)

    Keunyeol Park

    2018-02-01

    Full Text Available This paper presents a single-bit CMOS image sensor (CIS that uses a data processing technique with an edge detection block for simple iris segmentation. In order to recognize the iris image, the image sensor conventionally captures high-resolution image data in digital code, extracts the iris data, and then compares it with a reference image through a recognition algorithm. However, in this case, the frame rate decreases by the time required for digital signal conversion of multi-bit digital data through the analog-to-digital converter (ADC in the CIS. In order to reduce the overall processing time as well as the power consumption, we propose a data processing technique with an exclusive OR (XOR logic gate to obtain single-bit and edge detection image data instead of multi-bit image data through the ADC. In addition, we propose a logarithmic counter to efficiently measure single-bit image data that can be applied to the iris recognition algorithm. The effective area of the proposed single-bit image sensor (174 × 144 pixel is 2.84 mm2 with a 0.18 μm 1-poly 4-metal CMOS image sensor process. The power consumption of the proposed single-bit CIS is 2.8 mW with a 3.3 V of supply voltage and 520 frame/s of the maximum frame rates. The error rate of the ADC is 0.24 least significant bit (LSB on an 8-bit ADC basis at a 50 MHz sampling frequency.

  5. A Model of Computation for Bit-Level Concurrent Computing and Programming: APEC

    Science.gov (United States)

    Ajiro, Takashi; Tsuchida, Kensei

    A concurrent model of computation and a language based on the model for bit-level operation are useful for developing asynchronous and concurrent programs compositionally, which frequently use bit-level operations. Some examples are programs for video games, hardware emulation (including virtual machines), and signal processing. However, few models and languages are optimized and oriented to bit-level concurrent computation. We previously developed a visual programming language called A-BITS for bit-level concurrent programming. The language is based on a dataflow-like model that computes using processes that provide serial bit-level operations and FIFO buffers connected to them. It can express bit-level computation naturally and develop compositionally. We then devised a concurrent computation model called APEC (Asynchronous Program Elements Connection) for bit-level concurrent computation. This model enables precise and formal expression of the process of computation, and a notion of primitive program elements for controlling and operating can be expressed synthetically. Specifically, the model is based on a notion of uniform primitive processes, called primitives, that have three terminals and four ordered rules at most, as well as on bidirectional communication using vehicles called carriers. A new notion is that a carrier moving between two terminals can briefly express some kinds of computation such as synchronization and bidirectional communication. The model's properties make it most applicable to bit-level computation compositionally, since the uniform computation elements are enough to develop components that have practical functionality. Through future application of the model, our research may enable further research on a base model of fine-grain parallel computer architecture, since the model is suitable for expressing massive concurrency by a network of primitives.

  6. The Design of a Single-Bit CMOS Image Sensor for Iris Recognition Applications.

    Science.gov (United States)

    Park, Keunyeol; Song, Minkyu; Kim, Soo Youn

    2018-02-24

    This paper presents a single-bit CMOS image sensor (CIS) that uses a data processing technique with an edge detection block for simple iris segmentation. In order to recognize the iris image, the image sensor conventionally captures high-resolution image data in digital code, extracts the iris data, and then compares it with a reference image through a recognition algorithm. However, in this case, the frame rate decreases by the time required for digital signal conversion of multi-bit digital data through the analog-to-digital converter (ADC) in the CIS. In order to reduce the overall processing time as well as the power consumption, we propose a data processing technique with an exclusive OR (XOR) logic gate to obtain single-bit and edge detection image data instead of multi-bit image data through the ADC. In addition, we propose a logarithmic counter to efficiently measure single-bit image data that can be applied to the iris recognition algorithm. The effective area of the proposed single-bit image sensor (174 × 144 pixel) is 2.84 mm² with a 0.18 μm 1-poly 4-metal CMOS image sensor process. The power consumption of the proposed single-bit CIS is 2.8 mW with a 3.3 V of supply voltage and 520 frame/s of the maximum frame rates. The error rate of the ADC is 0.24 least significant bit (LSB) on an 8-bit ADC basis at a 50 MHz sampling frequency.

  7. Thermal Width for Heavy Quarkonium in the Static Limit

    International Nuclear Information System (INIS)

    Shi Chao-Yi; Zhu Jia-Qing; Ma Zhi-Lei; Li Yun-De

    2015-01-01

    The thermal widths for heavy quarkonia are calculated for both Coulomb gauge (CG) and Feynman gauge (FG), and the comparisons between these results with the hard thermal loop (HTL) approximation ones are illustrated. The dissociation temperatures of heavy quarkonia in thermal medium are also discussed for CG, FG and HTL cases. It is shown that the thermal widths, derived from the HTL approximation and used in many research studies, cause some errors in the practical calculations at the temperature range accessible in the present experiment, and the problem of gauge dependence cannot be avoided when the complete self energy is used in the derivation of potential. (paper)

  8. Statistical analysis of s-wave neutron reduced widths

    International Nuclear Information System (INIS)

    Pandita Anita; Agrawal, H.M.

    1992-01-01

    The fluctuations of the s-wave neutron reduced widths for many nuclei have been analyzed with emphasis on recent measurements by a statistical procedure which is based on the method of maximum likelihood. It is shown that the s-wave neutron reduced widths of nuclei follow single channel Porter Thomas distribution (x 2 -distribution with degree of freedom ν = 1) for most of the cases. However there are apparent deviations from ν = 1 and possible explanation and significance of this deviation is given. These considerations are likely to modify the evaluation of neutron cross section. (author)

  9. Domain wall width of lithium niobate poled during growth

    CERN Document Server

    Brooks, R; Hole, D E; Callejo, D; Bermudez, V; Diéguez, E

    2003-01-01

    Good quality crystals of periodically poled lithium niobate can be generated directly during growth. However, the temperature gradients at the zone boundaries define the width of the regions where the polarity is reversed. Hence, the region influenced the domain transition may be a significant fraction of the overall poling period for material poled during growth. Evidence for the scale of this feature is reported both by chemical etching and by the less common method of ion beam luminescence and the 'domain wall' width approximately 1 mu m for these analyses. The influence of the reversal region may differ for alternative techniques but the relevance to device design for second harmonic generation is noted.

  10. Level and width statistics for a decaying chaotic system

    International Nuclear Information System (INIS)

    Mizutori, S.; Zelevinsky, V.G.

    1993-01-01

    The random matrix ensemble of discretized effective non-hermitian hamiltonians is used for studying local correlations and fluctuations of energies and widths in a quantum system where intrinsic levels are coupled to the continuum via a common decay channel. With the use of analytical estimates and numerical simulations, generic properties of statistical observables are obtained for the regimes of weak and strong continuum coupling as well as for the transitional region. Typical signals of the transition (width collectivization, disappearance of level repulsion at small spacings and violation of uniformity along the energy axis) are discussed quantitatively. (orig.)

  11. High-Latitude Stratospheric Sensitivity to QBO Width in a Chemistry-Climate Model with Parameterized Ozone Chemistry

    Science.gov (United States)

    Hurwitz, M. M.; Braesicke, P.; Pyle, J. A.

    2010-01-01

    In a pair of idealized simulations with a simplified chemistry-climate model, the sensitivity of the wintertime Arctic stratosphere to variability in the width of the quasi-biennial oscillation (QBO) is assessed. The width of the QBO appears to have equal influence on the Arctic stratosphere as does the phase (i.e. the Holton-Tan mechanism). In the model, a wider QBO acts like a preferential shift toward the easterly phase of the QBO, where zonal winds at 60 N tend to be relatively weaker, while 50 hPa geopotential heights and polar ozone values tend to be higher.

  12. Variable-bias coin tossing

    International Nuclear Information System (INIS)

    Colbeck, Roger; Kent, Adrian

    2006-01-01

    Alice is a charismatic quantum cryptographer who believes her parties are unmissable; Bob is a (relatively) glamorous string theorist who believes he is an indispensable guest. To prevent possibly traumatic collisions of self-perception and reality, their social code requires that decisions about invitation or acceptance be made via a cryptographically secure variable-bias coin toss (VBCT). This generates a shared random bit by the toss of a coin whose bias is secretly chosen, within a stipulated range, by one of the parties; the other party learns only the random bit. Thus one party can secretly influence the outcome, while both can save face by blaming any negative decisions on bad luck. We describe here some cryptographic VBCT protocols whose security is guaranteed by quantum theory and the impossibility of superluminal signaling, setting our results in the context of a general discussion of secure two-party computation. We also briefly discuss other cryptographic applications of VBCT

  13. Variable-bias coin tossing

    Science.gov (United States)

    Colbeck, Roger; Kent, Adrian

    2006-03-01

    Alice is a charismatic quantum cryptographer who believes her parties are unmissable; Bob is a (relatively) glamorous string theorist who believes he is an indispensable guest. To prevent possibly traumatic collisions of self-perception and reality, their social code requires that decisions about invitation or acceptance be made via a cryptographically secure variable-bias coin toss (VBCT). This generates a shared random bit by the toss of a coin whose bias is secretly chosen, within a stipulated range, by one of the parties; the other party learns only the random bit. Thus one party can secretly influence the outcome, while both can save face by blaming any negative decisions on bad luck. We describe here some cryptographic VBCT protocols whose security is guaranteed by quantum theory and the impossibility of superluminal signaling, setting our results in the context of a general discussion of secure two-party computation. We also briefly discuss other cryptographic applications of VBCT.

  14. Inadvertently programmed bits in Samsung 128 Mbit flash devices: a flaky investigation

    Science.gov (United States)

    Swift, G.

    2002-01-01

    JPL's X2000 avionics design pioneers new territory by specifying a non-volatile memory (NVM) board based on flash memories. The Samsung 128Mb device chosen was found to demonstrate bit errors (mostly program disturbs) and block-erase failures that increase with cycling. Low temperature, certain pseudo- random patterns, and, probably, higher bias increase the observable bit errors. An experiment was conducted to determine the wearout dependence of the bit errors to 100k cycles at cold temperature using flight-lot devices (some pre-irradiated). The results show an exponential growth rate, a wide part-to-part variation, and some annealing behavior.

  15. Cheat sensitive quantum bit commitment via pre- and post-selected quantum states

    Science.gov (United States)

    Li, Yan-Bing; Wen, Qiao-Yan; Li, Zi-Chen; Qin, Su-Juan; Yang, Ya-Tao

    2014-01-01

    Cheat sensitive quantum bit commitment is a most important and realizable quantum bit commitment (QBC) protocol. By taking advantage of quantum mechanism, it can achieve higher security than classical bit commitment. In this paper, we propose a QBC schemes based on pre- and post-selected quantum states. The analysis indicates that both of the two participants' cheat strategies will be detected with non-zero probability. And the protocol can be implemented with today's technology as a long-term quantum memory is not needed.

  16. Optimization of rock-bit life based on bearing failure criteria

    International Nuclear Information System (INIS)

    Feav, M.J.; Thorogood, J.L.; Whelehan, O.P.; Williamson, H.S.

    1992-01-01

    This paper reports that recent advances in rock-bit seal technology have allowed greater predictability of bearing life. Cone loss following bearing failure incurs costs related to remedial activities. A risk analysis approach, incorporating bearing-life relationships and the inter-dependence of drilling events, is used to formulate a bit-run cost-optimization method. The procedure enables a choice to be made between elastomeric and metal seals on a lowest-replacement-cost basis. The technique also provides a formal method for assessing the opportunity cost for using a device to detect bit-bearing failures downhole

  17. Bit Error Rate Performance of a MIMO-CDMA System Employing Parity-Bit-Selected Spreading in Frequency Nonselective Rayleigh Fading

    Directory of Open Access Journals (Sweden)

    Claude D'Amours

    2011-01-01

    Full Text Available We analytically derive the upper bound for the bit error rate (BER performance of a single user multiple input multiple output code division multiple access (MIMO-CDMA system employing parity-bit-selected spreading in slowly varying, flat Rayleigh fading. The analysis is done for spatially uncorrelated links. The analysis presented demonstrates that parity-bit-selected spreading provides an asymptotic gain of 10log(Nt dB over conventional MIMO-CDMA when the receiver has perfect channel estimates. This analytical result concurs with previous works where the (BER is determined by simulation methods and provides insight into why the different techniques provide improvement over conventional MIMO-CDMA systems.

  18. The Effect of Crack Width on Chloride-Induced Corrosion of Steel in Concrete

    Directory of Open Access Journals (Sweden)

    Weiwei Li

    2017-01-01

    Full Text Available When subjected to loading or thermal shrinkage, reinforced concrete structures usually behave in a cracking state, which raises the risk of bar corrosion from the working environment. The influence of cover cracking on chloride-induced corrosion was experimentally investigated through a 654-day laboratory test on cracked reinforced concrete specimens exposed to chloride solution. The concrete specimens have a dimension of 100 mm × 100 mm × 400 mm and a single prefabricated crack at the midspan. When the percentage concentration of chloride ion (0.6%, 1.2%, 2.1%, 3.0%, and 6.0% and crack width (uncracked, 0.2, 0.3, 0.4, and 0.5 mm are taken as variables, the experimental results showed that the corrosion rates for cracked specimens increased with increasing percentage concentration of chloride and increasing crack width. This study also showed the interrelationship between crack width and percentage concentration of chloride on the corrosion rate. In addition, an empirical model, incorporating the influence of the cover cracking and chloride concentration, was developed to predict the corrosion rate. This model allows the prediction of the maximum allowable wcr based on the given percentage concentration of chloride in the exposure condition.

  19. Safe Operation and Alignment of the Variable Pulse Width Laser at the US Army Research Laboratory

    Science.gov (United States)

    2016-02-01

    that the stored lamp parameters match the desired flashlamp operating parameters. Then go back to the main menu and press “B” to select the desired...operating the laser at a high voltage, either press “STOP” on the flashlamp controller to discharge the capacitors or fire the laser a few times at

  20. Response of the leaf phenology and tree-ring width of European beech to climate variability

    Czech Academy of Sciences Publication Activity Database

    Kolář, Tomáš; Giagli, K.; Trnka, Miroslav; Bednářová, E.; Vavrčík, H.; Rybníček, Michal

    2016-01-01

    Roč. 50, č. 2 (2016), č. článku 1520. ISSN 0037-5330 R&D Projects: GA MŠk(CZ) LO1415; GA ČR GA13-04291S Grant - others:EHP(CZ) EHP-CZ02-OV-1-014-2014 Program:CZ02 Institutional support: RVO:67179843 Keywords : dendroclimatology * Fagus sylvatica * temperature * radial increment * soil moisture Subject RIV: EH - Ecology, Behaviour Impact factor: 1.495, year: 2016

  1. Variable-Width Datapath for On-Chip Network Static Power Reduction

    Energy Technology Data Exchange (ETDEWEB)

    Michelogiannakis, George; Shalf, John

    2013-11-13

    With the tight power budgets in modern large-scale chips and the unpredictability of application traffic, on-chip network designers are faced with the dilemma of designing for worst- case bandwidth demands and incurring high static power overheads, or designing for an average traffic pattern and risk degrading performance. This paper proposes adaptive bandwidth networks (ABNs) which divide channels and switches into lanes such that the network provides just the bandwidth necessary in each hop. ABNs also activate input virtual channels (VCs) individually and take advantage of drowsy SRAM cells to eliminate false VC activations. In addition, ABNs readily apply to silicon defect tolerance with just the extra cost for detecting faults. For application traffic, ABNs reduce total power consumption by an average of 45percent with comparable performance compared to single-lane power-gated networks, and 33percent compared to multi-network designs.

  2. Analysis of 100-lb(sub f) (445-N) LO2-LCH4 Reaction Control Engine Impulse Bit Performance

    Science.gov (United States)

    Marshall, William M.; Klenhenz, Julie E.

    2012-01-01

    Recently, liquid oxygen-liquid methane (LO2-LCH4) has been considered as a potential green propellant alternative for future exploration missions. The Propulsion and Cryogenic Advanced Development (PCAD) project was tasked by NASA to develop this propulsion combination to enable safe and cost-effective exploration missions. To date, limited experience with such combinations exist, and as a result a comprehensive test program is critical to demonstrating with the viability of implementing such a system. The NASA Glenn Research Center conducted a test program of a 100-lbf (445-N) reaction control engine (RCE) at the Center s Altitude Combustion Stand (ACS), focusing on altitude testing over a wide variety of operational conditions. The ACS facility includes unique propellant conditioning feed systems (PCFS), which allow precise control of propellant inlet conditions to the engine. Engine performance as a result of these inlet conditions was examined extensively during the test program. This paper is a companion to the previous specific impulse testing paper, and discusses the pulsed-mode operation portion of testing, with a focus on minimum impulse bit (MIB) and repeatable pulse performance. The engine successfully demonstrated target MIB performance at all conditions, as well as successful demonstration of repeatable pulse widths. Some anomalous conditions experienced during testing are also discussed, including a double pulse phenomenon, which was not noted in previous test programs for this engine.

  3. Writer identification using directional ink-trace width measurements

    NARCIS (Netherlands)

    Brink, A. A.; Smit, J.; Bulacu, M. L.; Schomaker, L. R. B.

    As suggested by modern paleography, the width of ink traces is a powerful source of information for off-line writer identification, particularly if combined with its direction. Such measurements can be computed using simple, fast and accurate methods based on pixel contours, the combination of which

  4. Utility Interfaced Pulse-Width Modulation of Solar Fed Voltage ...

    African Journals Online (AJOL)

    Utility Interfaced Pulse-Width Modulation of Solar Fed Voltage Source Inverter Using Fixed-Band Hysteresis Current Controller Method. ... with the conversion of solar energy into electrical energy; boosting the dc power; inversion of the dc to ac and then synchronization of the inverter output with the utility, and consequently, ...

  5. Turbulent transport regimes and the SOL heat flux width

    Science.gov (United States)

    Myra, J. R.; D'Ippolito, D. A.; Russell, D. A.

    2014-10-01

    Understanding the responsible mechanisms and resulting scaling of the scrape-off layer (SOL) heat flux width is important for predicting viable operating regimes in future tokamaks, and for seeking possible mitigation schemes. Simulation and theory results using reduced edge/SOL turbulence models have produced SOL widths and scalings in reasonable accord with experiments in many cases. In this work, we attempt to qualitatively and conceptually understand various regimes of edge/SOL turbulence and the role of turbulent transport in establishing the SOL heat flux width. Relevant considerations include the type and spectral characteristics of underlying instabilities, the location of the gradient drive relative to the SOL, the nonlinear saturation mechanism, and the parallel heat transport regime. Recent SOLT turbulence code results are employed to understand the roles of these considerations and to develop analytical scalings. We find a heat flux width scaling with major radius R that is generally positive, consistent with older results reviewed in. The possible relationship of turbulence mechanisms to the heuristic drift mechanism is considered, together with implications for future experiments. Work supported by US DOE grant DE-FG02-97ER54392.

  6. The effect of buffer zone width on biodiversity

    DEFF Research Database (Denmark)

    Navntoft, Søren; Sigsgaard, Lene; Kristensen, Kristian Morten

    2012-01-01

    Field margin management for conservation purposes is a way to protect both functional biodiversity and biodiversity per se without considerable economical loss as field margins are less productive. However, the effect of width of the buffer zone on achievable biodiversity gains has received littl...

  7. Joint space width in dysplasia of the hip

    DEFF Research Database (Denmark)

    Jacobsen, Steffen; Sonne-Holm, Stig; Søballe, K

    2005-01-01

    . Neither subjects with dysplasia nor controls had radiological signs of ongoing degenerative disease at admission. The primary radiological discriminator of degeneration of the hip was a change in the minimum joint space width over time. There were no significant differences between these with dysplasia...

  8. Widths of the atomic K-N7 levels

    International Nuclear Information System (INIS)

    Campbell, J.L.; Papp, Tibor

    2001-01-01

    Atomic level widths obtained from experimental measurements are collected in Table I, along with the corresponding theoretical widths derived from the Evaluated Atomic Data Library (EADL) of Lawrence Livermore National Laboratory; these EADL values are based upon the Dirac-Hartree-Slater version of the independent-particle model. In a minority of cases, many-body theory predictions are also provided. A brief discussion of the manner in which the experimental widths were deduced from spectroscopic data is included. The bulk of the data are for elements in the solid state, but a few data for gases and simple compounds are included. For the K, L2, L3, and M5 levels, where Coster-Kronig contributions do not contribute or contribute only to a small extent to the overall widths, the EADL predictions appear satisfactory for elements in the solid state. For other levels, where Coster-Kronig and super-Coster-Kronig transitions have large probabilities within the independent-particle model, this model is not satisfactory. Table II provides a complete set of recommended elemental values based upon consideration of the available experimental data

  9. Partial Widths of Nonmesonic Weak Decays of Lambda-Hypernuclei

    CERN Document Server

    Kuzmin, V A

    2002-01-01

    It is shown that the phenomenological matrix elements completely describing \\Lambda N \\to NN weak interaction in the 1p-shell nuclei can be obtained from the partial widths of nonmesonic decays of ^{10}_{\\Lambda}Be and ^{10}_{\\Lambda}B hypernuclei. It is shown that the uncertainties related to the description of nuclear structure are not essential for this task.

  10. Downstream flow top width prediction in a river system | Choudhury ...

    African Journals Online (AJOL)

    ANFIS, ARIMA and Hybrid Multiple Inflows Muskingum models (HMIM) were applied to simulate and forecast downstream discharge and flow top widths in a river system. The ANFIS model works on a set of linguistic rules while the ARIMA model uses a set of past values to predict the next value in a time series. The HMIM ...

  11. Measurement of joint space width and erosion size

    NARCIS (Netherlands)

    Sharp, JI; van der Heijde, D; Angwin, J; Duryea, J; Moens, HJB; Jacobs, JWG; Maillefert, JF; Strand, CV

    2005-01-01

    Measurement of radiographic abnormalities in metric units has been reported by several investigators during the last 15 years. Measurement of joint space in large joints has been employed in a few trials to evaluate therapy in osteoarthritis. Measurement of joint space width in small joints has been

  12. High bit rate germanium single photon detectors for 1310nm

    Science.gov (United States)

    Seamons, J. A.; Carroll, M. S.

    2008-04-01

    There is increasing interest in development of high speed, low noise and readily fieldable near infrared (NIR) single photon detectors. InGaAs/InP Avalanche photodiodes (APD) operated in Geiger mode (GM) are a leading choice for NIR due to their preeminence in optical networking. After-pulsing is, however, a primary challenge to operating InGaAs/InP single photon detectors at high frequencies1. After-pulsing is the effect of charge being released from traps that trigger false ("dark") counts. To overcome this problem, hold-off times between detection windows are used to allow the traps to discharge to suppress after-pulsing. The hold-off time represents, however, an upper limit on detection frequency that shows degradation beginning at frequencies of ~100 kHz in InGaAs/InP. Alternatively, germanium (Ge) single photon avalanche photodiodes (SPAD) have been reported to have more than an order of magnitude smaller charge trap densities than InGaAs/InP SPADs2, which allowed them to be successfully operated with passive quenching2 (i.e., no gated hold off times necessary), which is not possible with InGaAs/InP SPADs, indicating a much weaker dark count dependence on hold-off time consistent with fewer charge traps. Despite these encouraging results suggesting a possible higher operating frequency limit for Ge SPADs, little has been reported on Ge SPAD performance at high frequencies presumably because previous work with Ge SPADs has been discouraged by a strong demand to work at 1550 nm. NIR SPADs require cooling, which in the case of Ge SPADs dramatically reduces the quantum efficiency of the Ge at 1550 nm. Recently, however, advantages to working at 1310 nm have been suggested which combined with a need to increase quantum bit rates for quantum key distribution (QKD) motivates examination of Ge detectors performance at very high detection rates where InGaAs/InP does not perform as well. Presented in this paper are measurements of a commercially available Ge APD

  13. Is glans penis width a risk factor for complications after hypospadias repair?

    Science.gov (United States)

    Faasse, M A; Johnson, E K; Bowen, D K; Lindgren, B W; Maizels, M; Marcus, C R; Jovanovic, B D; Yerkes, E B

    2016-08-01

    Recent studies have suggested that a smaller glans penis size may be associated with a higher likelihood of complications after hypospadias repair. Accurate identification of risk factors other than the well-understood variable of meatal location would allow development of better prognostic models and individualized risk stratification. To test the hypothesis that a smaller width of the glans penis predicts adverse outcomes after hypospadias surgery. Prospectively recorded clinical data were reviewed from a single-institution registry of primary hypospadias repairs performed between 2011 and 2014. Follow-up records were examined for occurrence of complications. Urethroplasty complications were defined to include meatal stenosis, dehiscence, urethrocutaneous fistula, urethral stricture, and/or urethral diverticulum. The subset of meatal stenosis and dehiscence were regarded as glanular complications. Regression analyses were performed to determine association between glans width and occurrence of complications. Because pre-operative androgen stimulation is known to increase glans penis size, separate subgroup analyses were included of patients with and without pre-operative use of testosterone cream. A total of 159 patients met criteria for inclusion in the study cohort: 140 patients underwent a single-stage repair, while 19 patients had a two-stage repair. The median glans penis width was 15 mm (range 10-22). Eighty-four patients (53%) received testosterone cream pre-operatively and had a significantly wider glans penis than the 75 patients who did not (median 15.5 vs 14 mm; P penis width was not a risk factor for complications after hypospadias repair. This finding differs from the results of other recent studies and encourages further research into the value of measuring penile parameters in patients undergoing hypospadias repair. Copyright © 2016 Journal of Pediatric Urology Company. Published by Elsevier Ltd. All rights reserved.

  14. Modeling of dislocation channel width evolution in irradiated metals

    Science.gov (United States)

    Doyle, Peter J.; Benensky, Kelsa M.; Zinkle, Steven J.

    2018-02-01

    Defect-free dislocation channel formation has been reported to promote plastic instability during tensile testing via localized plastic flow, leading to a distinct loss of ductility and strain hardening in many low-temperature irradiated materials. In order to study the underlying mechanisms governing dislocation channel width and formation, the channel formation process is modeled via a simple stochastic dislocation-jog process dependent upon grain size, defect cluster density, and defect size. Dislocations traverse a field of defect clusters and jog stochastically upon defect interaction, forming channels of low defect-density. Based upon prior molecular dynamics (MD) simulations and in-situ experimental transmission electron microscopy (TEM) observations, each dislocation encounter with a dislocation loop or stacking fault tetrahedron (SFT) is assumed to cause complete absorption of the defect cluster, prompting the dislocation to jog up or down by a distance equal to half the defect cluster diameter. Channels are predicted to form rapidly and are comparable to reported TEM measurements for many materials. Predicted channel widths are found to be most strongly dependent on mean defect size and correlated well with a power law dependence on defect diameter and density, and distance from the dislocation source. Due to the dependence of modeled channel width on defect diameter and density, maximum channel width is predicted to slowly increase as accumulated dose increases. The relatively weak predicted dependence of channel formation width with distance, in accordance with a diffusion analogy, implies that after only a few microns from the source, most channels observed via TEM analyses may not appear to vary with distance because of limitations in the field-of-view to a few microns. Further, examinations of the effect of the so-called "source-broadening" mechanism of channel formation showed that its effect is simply to add a minimum thickness to the channel

  15. Influence of MLC leaf width on biologically adapted IMRT plans

    Energy Technology Data Exchange (ETDEWEB)

    Roedal, Jan; Soevik, Aaste; Malinen, Eirik (Dept. of Medical Physics, The Norwegian Radium Hospital, Oslo Univ. Hospital, Oslo (Norway)), E-mail: jan.rodal@radiumhospitalet.no

    2010-10-15

    Introduction. High resolution beam delivery may be required for optimal biology-guided adaptive therapy. In this work, we have studied the influence of multi leaf collimator (MLC) leaf widths on the treatment outcome following adapted IMRT of a hypoxic tumour. Material and methods. Dynamic contrast enhanced MR images of a dog with a spontaneous tumour in the nasal region were used to create a tentative hypoxia map following a previously published procedure. The hypoxia map was used as a basis for generating compartmental gross tumour volumes, which were utilised as planning structures in biologically adapted IMRT. Three different MLCs were employed in inverse treatment planning, with leaf widths of 2.5 mm, 5 mm and 10 mm. The number of treatment beams and the degree of step-and-shoot beam modulation were varied. By optimising the tumour control probability (TCP) function, optimal compartmental doses were derived and used as target doses in the inverse planning. Resulting IMRT dose distributions and dose volume histograms (DVHs) were exported and analysed, giving estimates of TCP and compartmental equivalent uniform doses (EUDs). The impact of patient setup accuracy was simulated. Results. The MLC with the smallest leaf width (2.5 mm) consistently gave the highest TCPs and compartmental EUDs, assuming no setup error. The difference between this MLC and the 5 mm MLC was rather small, while the MLC with 10 mm leaf width gave considerably lower TCPs. When including random and systematic setup errors, errors larger than 5 mm gave only small differences between the MLC types. For setup errors larger than 7 mm no differences were found between non-uniform and uniform dose distributions. Conclusions. Biologically adapted radiotherapy may require MLCs with leaf widths smaller than 10 mm. However, for a high probability of cure it is crucial that accurate patient setup is ensured.

  16. Clinical Utility of Ultrasound Measurements of Plantar Fascia Width and Cross-Sectional AreaA Novel Technique.

    Science.gov (United States)

    Bisi-Balogun, Adebisi; Rector, Michael

    2017-09-01

    We sought to develop a standardized protocol for ultrasound (US) measurements of plantar fascia (PF) width and cross-sectional area (CSA), which may serve as additional outcome variables during US examinations of both healthy asymptomatic PF and in plantar fasciopathy and determine its interrater and intrarater reliability. Ten healthy individuals (20 feet) were enrolled. Participants were assessed twice by two raters each to determine intrarater and interrater reliability. For each foot, three transverse scans of the central bundle of the PF were taken at its insertion at the medial calcaneal tubercle, identified in real time on the plantar surface of the foot, using a fine wire technique. Reliability was determined using intraclass correlation coefficients (ICC), standard errors of measurement (SEM), and limits of agreement (LOA) expressed as percentages of the mean. Reliability of PF width and CSA measurements was determined using PF width and CSA measurements from one sonogram measured once and the mean of three measurements from three sonograms each measured once. Ultrasound measurements of PF width and CSA showed a mean of 18.6 ± 2.0 mm and 69.20 ± 13.6 mm 2 respectively. Intra-reliability within both raters showed an ICC > 0.84 for width and ICC > 0.92 for CSA as well as a SEM% and LOA% < 10% for both width and CSA. Inter-rater reliability showed an ICC of 0.82 for width and 0.87 for CSA as well as a SEM% and LOA% < 10% for width and a SEM% < 10% and LOA% < 20% for CSA. Relative and absolute reliability within and between raters were higher when using the mean of three sonographs compared to one sonograph. Using this novel technique, PF CSA and width may be determined reliably using measurements from one sonogram or the mean of three sonograms. Measurement of PF CSA and width in addition to already established thickness and echogenicity measurements provides additional information on structural properties of the PF for clinicians and researchers in healthy

  17. An electrically reprogrammable 1024 bits MNOS ROM using MNOS-SOS e/d technology

    International Nuclear Information System (INIS)

    Mackowiak, E.; Le Goascoz, V.

    1976-01-01

    A 1024 bits fully decoded electrically writable and erasable non volatile ROM is described. Memory cells and peripheral circuits are made using P channel silicon on sapphire enhancement depletion technology [fr

  18. A Methodology and Tool for Investigation of Artifacts Left by the BitTorrent Client

    Directory of Open Access Journals (Sweden)

    Algimantas Venčkauskas

    2016-05-01

    Full Text Available The BitTorrent client application is a popular utility for sharing large files over the Internet. Sometimes, this powerful utility is used to commit cybercrimes, like sharing of illegal material or illegal sharing of legal material. In order to help forensics investigators to fight against these cybercrimes, we carried out an investigation of the artifacts left by the BitTorrent client. We proposed a methodology to locate the artifacts that indicate the BitTorrent client activity performed. Additionally, we designed and implemented a tool that searches for the evidence left by the BitTorrent client application in a local computer running Windows. The tool looks for the four files holding the evidence. The files are as follows: *.torrent, dht.dat, resume.dat, and settings.dat. The tool decodes the files, extracts important information for the forensic investigator and converts it into XML format. The results are combined into a single result file.

  19. Quantum bit string commitment protocol using polarization of mesoscopic coherent states

    International Nuclear Information System (INIS)

    Mendonca, Fabio Alencar; Ramos, Rubens Viana

    2008-01-01

    In this work, we propose a quantum bit string commitment protocol using polarization of mesoscopic coherent states. The protocol is described and its security against brute force and quantum cloning machine attack is analyzed

  20. Quantum bit string commitment protocol using polarization of mesoscopic coherent states

    Science.gov (United States)

    Mendonça, Fábio Alencar; Ramos, Rubens Viana

    2008-02-01

    In this work, we propose a quantum bit string commitment protocol using polarization of mesoscopic coherent states. The protocol is described and its security against brute force and quantum cloning machine attack is analyzed.

  1. Semifragile Speech Watermarking Based on Least Significant Bit Replacement of Line Spectral Frequencies

    Directory of Open Access Journals (Sweden)

    Mohammad Ali Nematollahi

    2017-01-01

    Full Text Available There are various techniques for speech watermarking based on modifying the linear prediction coefficients (LPCs; however, the estimated and modified LPCs vary from each other even without attacks. Because line spectral frequency (LSF has less sensitivity to watermarking than LPC, watermark bits are embedded into the maximum number of LSFs by applying the least significant bit replacement (LSBR method. To reduce the differences between estimated and modified LPCs, a checking loop is added to minimize the watermark extraction error. Experimental results show that the proposed semifragile speech watermarking method can provide high imperceptibility and that any manipulation of the watermark signal destroys the watermark bits since manipulation changes it to a random stream of bits.

  2. Accurate Bit Error Rate Calculation for Asynchronous Chaos-Based DS-CDMA over Multipath Channel

    Science.gov (United States)

    Kaddoum, Georges; Roviras, Daniel; Chargé, Pascal; Fournier-Prunaret, Daniele

    2009-12-01

    An accurate approach to compute the bit error rate expression for multiuser chaosbased DS-CDMA system is presented in this paper. For more realistic communication system a slow fading multipath channel is considered. A simple RAKE receiver structure is considered. Based on the bit energy distribution, this approach compared to others computation methods existing in literature gives accurate results with low computation charge. Perfect estimation of the channel coefficients with the associated delays and chaos synchronization is assumed. The bit error rate is derived in terms of the bit energy distribution, the number of paths, the noise variance, and the number of users. Results are illustrated by theoretical calculations and numerical simulations which point out the accuracy of our approach.

  3. Improved method of generating bit reversed numbers for calculating fast fourier transform

    Digital Repository Service at National Institute of Oceanography (India)

    Suresh, T.

    Fast Fourier Transform (FFT) is an important tool required for signal processing in defence applications. This paper reports an improved method for generating bit reversed numbers needed in calculating FFT using radix-2. The refined algorithm takes...

  4. FastBit: an efficient indexing technology for accelerating data-intensive science

    International Nuclear Information System (INIS)

    Wu Kesheng

    2005-01-01

    FastBit is a software tool for searching large read-only datasets. It organizes user data in a column-oriented structure which is efficient for on-line analytical processing (OLAP), and utilizes compressed bitmap indices to further speed up query processing. Analyses have proven the compressed bitmap index used in FastBit to be theoretically optimal for onedimensional queries. Compared with other optimal indexing methods, bitmap indices are superior because they can be efficiently combined to answer multi-dimensional queries whereas other optimal methods can not. In this paper, we first describe the searching capability of FastBit, then briefly highlight two applications that make extensive use of FastBit, namely Grid Collector and DEX

  5. FastBit: An Efficient Indexing Technology For AcceleratingData-Intensive Science

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Kesheng

    2005-06-27

    FastBit is a software tool for searching large read-only data sets. It organizes user data in a column-oriented structure which is efficient for on-line analytical processing (OLAP), and utilizes compressed bitmap indices to further speed up query processing. Analyses have proven the compressed bitmap index used in FastBit to be theoretically optimal for one-dimensional queries. Compared with other optimal indexing methods, bitmap indices are superior because they can be efficiently combined to answer multi-dimensional queries whereas other optimal methods cannot. In this paper, we first describe the searching capability of FastBit, then briefly highlight two applications that make extensive use of FastBit, namely Grid Collector and DEX.

  6. FastBit: an efficient indexing technology for accelerating data-intensive science

    Science.gov (United States)

    Wu, Kesheng

    2005-01-01

    FastBit is a software tool for searching large read-only datasets. It organizes user data in a column-oriented structure which is efficient for on-line analytical processing (OLAP), and utilizes compressed bitmap indices to further speed up query processing. Analyses have proven the compressed bitmap index used in FastBit to be theoretically optimal for onedimensional queries. Compared with other optimal indexing methods, bitmap indices are superior because they can be efficiently combined to answer multi-dimensional queries whereas other optimal methods can not. In this paper, we first describe the searching capability of FastBit, then briefly highlight two applications that make extensive use of FastBit, namely Grid Collector and DEX.

  7. On the relationships between higher and lower bit-depth system measurements

    Science.gov (United States)

    Burks, Stephen D.; Haefner, David P.; Doe, Joshua M.

    2018-04-01

    The quality of an imaging system can be assessed through controlled laboratory objective measurements. Currently, all imaging measurements require some form of digitization in order to evaluate a metric. Depending on the device, the amount of bits available, relative to a fixed dynamic range, will exhibit quantization artifacts. From a measurement standpoint, measurements are desired to be performed at the highest possible bit-depth available. In this correspondence, we described the relationship between higher and lower bit-depth measurements. The limits to which quantization alters the observed measurements will be presented. Specifically, we address dynamic range, MTF, SiTF, and noise. Our results provide guidelines to how systems of lower bit-depth should be characterized and the corresponding experimental methods.

  8. Single-chip pulse programmer for magnetic resonance imaging using a 32-bit microcontroller.

    Science.gov (United States)

    Handa, Shinya; Domalain, Thierry; Kose, Katsumi

    2007-08-01

    A magnetic resonance imaging (MRI) pulse programmer has been developed using a single-chip microcontroller (ADmicroC7026). The microcontroller includes all the components required for the MRI pulse programmer: a 32-bit RISC CPU core, 62 kbytes of flash memory, 8 kbytes of SRAM, two 32-bit timers, four 12-bit DA converters, and 40 bits of general purpose I/O. An evaluation board for the microcontroller was connected to a host personal computer (PC), an MRI transceiver, and a gradient driver using interface circuitry. Target (embedded) and host PC programs were developed to enable MRI pulse sequence generation by the microcontroller. The pulse programmer achieved a (nominal) time resolution of approximately 100 ns and a minimum time delay between successive events of approximately 9 micros. Imaging experiments using the pulse programmer demonstrated the effectiveness of our approach.

  9. Atmospheric influence on Arctic marginal ice zone position and width in the Atlantic sector, February-April 1979-2010

    Energy Technology Data Exchange (ETDEWEB)

    Strong, Courtenay [University of Utah, Salt Lake City, UT (United States)

    2012-12-15

    Arctic marginal ice zone (MIZ) widths in the Atlantic sector were measured during the months of maximum sea ice extent (February-April) for years 1979-2010 using a novel method based on objective curves through idealized sea ice concentration fields that satisfied Laplace's equation. Over the record, the Labrador Sea MIZ (MIZ{sub L}) had an average width of 122 km and narrowed by 28 % while moving 254 km poleward, the Greenland Sea MIZ (MIZ{sub G}) had an average width of 98 km and narrowed by 43 % while moving 158 km west toward the Greenland coast, and the Barents Sea MIZ (MIZ{sub B}) had an average width of 136 km and moved 259 km east toward the Eurasian coast without a trend in width. Trends in MIZ position and width were consistent with a warming Arctic and decreasing sea ice concentrations over the record. Beyond the trends, NAO-like atmospheric patterns influenced interannual variability in MIZ position and width: MIZ{sub L} widened and moved southeast under anomalously strong northerly flow conducive to advection of sea ice into the Labrador Sea, MIZ{sub G} widened and moved northeast under anomalously weak northerly flow conducive to diminishing the westward component of sea ice drift, and MIZ{sub B} widened and moved poleward at the expense of pack ice under anomalously strong southwesterly flow conducive to enhancing oceanic heat flux into the Barents Sea. In addition, meridional flow anomalies associated with the NAO per se moved MIZ{sub B} east and west by modulating sea ice concentration over the Barents Sea. (orig.)

  10. Klasifikasi Bit-Plane Noise untuk Penyisipan Pesan pada Teknik Steganography BPCS Menggunakan Fuzzy Inference Sistem Mamdani

    Directory of Open Access Journals (Sweden)

    Rahmad Hidayat

    2015-04-01

    Full Text Available Bit-Plane Complexity Segmentation (BPCS is a fairly new steganography technique. The most important process in BPCS is the calculation of complexity value of a bit-plane. The bit-plane complexity is calculated by looking at the amount of bit changes contained in a bit-plane. If a bit-plane has a high complexity, the bi-plane is categorized as a noise bit-plane that does not contain valuable information on the image. Classification of the bit-plane using the set cripst set (noise/not is not fair, where a little difference of the value will significantly change the status of the bit-plane. The purpose of this study is to apply the principles of fuzzy sets to classify the bit-plane into three sets that are informative, partly informative, and the noise region. Classification of the bit-plane into a fuzzy set is expected to classify the bit-plane in a more objective approach and ultimately message capacity of the images can be improved by using the Mamdani fuzzy inference to take decisions which bit-plane will be replaced with a message based on the classification of bit-plane and the size of the message that will be inserted. This research is able to increase the capability of BPCS steganography techniques to insert a message in bit-pane with more precise so that the container image quality would be better. It can be seen that the PSNR value of original image and stego-image is only slightly different.

  11. SOLAR TRACKER CERDAS DAN MURAH BERBASIS MIKROKONTROLER 8 BIT ATMega8535

    Directory of Open Access Journals (Sweden)

    I Wayan Sutaya

    2016-08-01

    Full Text Available prototipe produk solar tracker cerdas berbasis mikrokontroler AVR 8 bit. Solar tracker ini memasukkan filter digital IIR (Infinite Impulse Response pada bagian program. Memprogram filter ini membutuhkan perkalian 32 bit sedangkan prosesor yang tersedia pada mikrokontroler yang dipakai adalah 8 bit. Proses perkalian ini hanya bisa dilakukan pada mikrokontroler 8 bit dengan menggunakan bahasa assembly yang merupakan bahasa level hardware. Solar tracker cerdas yang menggunakan mikrokontroler 8 bit sebagai otak utama pada penelitian ini menjadikan produk ini berbiaya rendah. Pengujian yang dilakukan menunjukkan bahwa solar tracker cerdas dibandingkan dengan solar tracker biasa mempunyai perbedaan konsumsi daya baterai yang sangat signifikan yaitu terjadi penghematan sebesar 85 %. Besar penghematan konsumsi daya ini tentunya bukan sebuah angka konstan melainkan tergantung seberapa besar noise yang dikenakan pada alat solar tracker. Untuk sebuah perlakuan yang sama, maka semakin besar noise semakin besar pula perbedaan penghematan konsumsi daya pada solar tracker yang cerdas. Kata-kata kunci: solar tracker, filter digital, mikrokontroler 8 bit, konsumsi daya Abstract This research had made a prototype of smart solar tracker product based on microcontroller AVR 8 bit. The solar tracker used digital filter IIR (Infinite Impulse Response on its software. Filter programming needs 32 bit multiplication but the processor inside of the microcontroller that used in this research is 8 bit. This multiplication is only can be solved on microcontroller 8 bit by using assembly language in programming. The language is a hardware level language. The smart solar tracker using the microcontroller 8 bit as a main brain in this research made the product had a low cost. The test results show that the comparison in saving of baterai power consumption between the smart solar tracker and the normal one is 85 %. The percentage of the saving indubitably is not a constant

  12. HIGH-POWER TURBODRILL AND DRILL BIT FOR DRILLING WITH COILED TUBING

    Energy Technology Data Exchange (ETDEWEB)

    Robert Radtke; David Glowka; Man Mohan Rai; David Conroy; Tim Beaton; Rocky Seale; Joseph Hanna; Smith Neyrfor; Homer Robertson

    2008-03-31

    Commercial introduction of Microhole Technology to the gas and oil drilling industry requires an effective downhole drive mechanism which operates efficiently at relatively high RPM and low bit weight for delivering efficient power to the special high RPM drill bit for ensuring both high penetration rate and long bit life. This project entails developing and testing a more efficient 2-7/8 in. diameter Turbodrill and a novel 4-1/8 in. diameter drill bit for drilling with coiled tubing. The high-power Turbodrill were developed to deliver efficient power, and the more durable drill bit employed high-temperature cutters that can more effectively drill hard and abrasive rock. This project teams Schlumberger Smith Neyrfor and Smith Bits, and NASA AMES Research Center with Technology International, Inc (TII), to deliver a downhole, hydraulically-driven power unit, matched with a custom drill bit designed to drill 4-1/8 in. boreholes with a purpose-built coiled tubing rig. The U.S. Department of Energy National Energy Technology Laboratory has funded Technology International Inc. Houston, Texas to develop a higher power Turbodrill and drill bit for use in drilling with a coiled tubing unit. This project entails developing and testing an effective downhole drive mechanism and a novel drill bit for drilling 'microholes' with coiled tubing. The new higher power Turbodrill is shorter, delivers power more efficiently, operates at relatively high revolutions per minute, and requires low weight on bit. The more durable thermally stable diamond drill bit employs high-temperature TSP (thermally stable) diamond cutters that can more effectively drill hard and abrasive rock. Expectations are that widespread adoption of microhole technology could spawn a wave of 'infill development' drilling of wells spaced between existing wells, which could tap potentially billions of barrels of bypassed oil at shallow depths in mature producing areas. At the same time, microhole

  13. Traffic management mechanism for intranets with available-bit-rate access to the Internet

    Science.gov (United States)

    Hassan, Mahbub; Sirisena, Harsha R.; Atiquzzaman, Mohammed

    1997-10-01

    The design of a traffic management mechanism for intranets connected to the Internet via an available bit rate access- link is presented. Selection of control parameters for this mechanism for optimum performance is shown through analysis. An estimate for packet loss probability at the access- gateway is derived for random fluctuation of available bit rate of the access-link. Some implementation strategies of this mechanism in the standard intranet protocol stack are also suggested.

  14. Euclidean Geometry Codes, minimum weight words and decodable error-patterns using bit-flipping

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn; Jonsson, Bergtor

    2005-01-01

    We determine the number of minimum wigth words in a class of Euclidean Geometry codes and link the performance of the bit-flipping decoding algorithm to the geometry of the error patterns.......We determine the number of minimum wigth words in a class of Euclidean Geometry codes and link the performance of the bit-flipping decoding algorithm to the geometry of the error patterns....

  15. Two-bit trinary full adder design based on restricted signed-digit numbers

    Science.gov (United States)

    Ahmed, J. U.; Awwal, A. A. S.; Karim, M. A.

    1994-08-01

    A 2-bit trinary full adder using a restricted set of a modified signed-digit trinary numeric system is designed. When cascaded together to design a multi-bit adder machine, the resulting system is able to operate at a speed independent of the size of the operands. An optical non-holographic content addressable memory based on binary coded arithmetic is considered for implementing the proposed adder.

  16. Area-efficient readout with 14-bit SAR-ADC for CMOS image sensors

    Directory of Open Access Journals (Sweden)

    Aziza Sassi Ben

    2016-01-01

    Full Text Available This paper proposes a readout design for CMOS image sensors. It has been squeezed into a 7.5um pitch under a 0.28um 1P3M technology. The ADC performs one 14-bit conversion in only 1.5us and targets a theoretical DNL feature about +1.3/-1 at 14-bit accuracy. Correlated Double Sampling (CDS is performed both in the analog and digital domains to preserve the image quality.

  17. 16QAM transmission with 5.2 bits/s/Hz spectral efficiency over transoceanic distance.

    Science.gov (United States)

    Zhang, H; Cai, J-X; Batshon, H G; Davidson, C R; Sun, Y; Mazurczyk, M; Foursa, D G; Pilipetskii, A; Mohs, G; Bergano, Neal S

    2012-05-21

    We transmit 160 x 100 G PDM RZ 16 QAM channels with 5.2 bits/s/Hz spectral efficiency over 6,860 km. There are more than 3 billion 16 QAM symbols, i.e., 12 billion bits, processed in total. Using coded modulation and iterative decoding between a MAP decoder and an LDPC based FEC all channels are decoded with no remaining errors.

  18. Re-use of Low Bandwidth Equipment for High Bit Rate Transmission Using Signal Slicing Technique

    DEFF Research Database (Denmark)

    Wagner, Christoph; Spolitis, S.; Vegas Olmos, Juan José

    : Massive fiber-to-the-home network deployment requires never ending equipment upgrades operating at higher bandwidth. We show effective signal slicing method, which can reuse low bandwidth opto-electronical components for optical communications at higher bit rates.......: Massive fiber-to-the-home network deployment requires never ending equipment upgrades operating at higher bandwidth. We show effective signal slicing method, which can reuse low bandwidth opto-electronical components for optical communications at higher bit rates....

  19. Quantifying the Impact of Single Bit Flips on Floating Point Arithmetic

    Energy Technology Data Exchange (ETDEWEB)

    Elliott, James J [ORNL; Mueller, Frank [North Carolina State University; Stoyanov, Miroslav K [ORNL; Webster, Clayton G [ORNL

    2013-08-01

    In high-end computing, the collective surface area, smaller fabrication sizes, and increasing density of components have led to an increase in the number of observed bit flips. If mechanisms are not in place to detect them, such flips produce silent errors, i.e. the code returns a result that deviates from the desired solution by more than the allowed tolerance and the discrepancy cannot be distinguished from the standard numerical error associated with the algorithm. These phenomena are believed to occur more frequently in DRAM, but logic gates, arithmetic units, and other circuits are also susceptible to bit flips. Previous work has focused on algorithmic techniques for detecting and correcting bit flips in specific data structures, however, they suffer from lack of generality and often times cannot be implemented in heterogeneous computing environment. Our work takes a novel approach to this problem. We focus on quantifying the impact of a single bit flip on specific floating-point operations. We analyze the error induced by flipping specific bits in the most widely used IEEE floating-point representation in an architecture-agnostic manner, i.e., without requiring proprietary information such as bit flip rates and the vendor-specific circuit designs. We initially study dot products of vectors and demonstrate that not all bit flips create a large error and, more importantly, expected value of the relative magnitude of the error is very sensitive on the bit pattern of the binary representation of the exponent, which strongly depends on scaling. Our results are derived analytically and then verified experimentally with Monte Carlo sampling of random vectors. Furthermore, we consider the natural resilience properties of solvers based on the fixed point iteration and we demonstrate how the resilience of the Jacobi method for linear equations can be significantly improved by rescaling the associated matrix.

  20. Bit Bang 4: Future of internet - Societal, business, governance and technological aspects

    OpenAIRE

    Neuvo, Yrjö (ed.); Karvonen, Elina (ed.)

    2012-01-01

    Bit Bang – Future of the Internet: Societal, business, governance and technological aspects was the fourth multidisciplinary post-graduate course for doctoral students at Aalto University. Altogether 24 students were selected from five Aalto University Schools: School of Arts, Design and Architecture; School of Economics; School of Electrical Engineering; School of Engineering; and School of Science. Bit Bang is part of the MIDE (Multidisciplinary Institute of Digitalisation and Energy) resea...

  1. Poincaré plot width, morning urine norepinephrine levels, and autonomic imbalance in children with obstructive sleep apnea.

    Science.gov (United States)

    Chaidas, Konstantinos; Tsaoussoglou, Marina; Theodorou, Emmanouel; Lianou, Loukia; Chrousos, George; Kaditis, Athanasios G

    2014-08-01

    Obstructive sleep apnea (OSA) in childhood is accompanied by sympathetic overflow unopposed by the parasympathetic tone. Complex methods like power spectral analysis of heart rate variability have been applied to study this imbalance. In this report, width of Poincaré scattergram of the R-R interval (parasympathetic tone) and morning urine norepinephrine concentration (sympathetic activity) were used to assess autonomic imbalance. Poincaré plot was obtained from the electrocardiographic channel of nocturnal polysomnography and its width was measured, and norepinephrine-to-creatinine concentration ratio was calculated in morning urine specimen. Twenty children with obstructive sleep apnea and moderate-to-severe nocturnal hypoxemia (oxygen saturation of hemoglobin [SpO(2)] nadir plot width (318.7 ± 139.3 ms) and higher ln-transformed urine norepinephrine-to-creatinine ratio (4.5 ± 0.6) than control subjects (484.2 ± 104.4 ms and 3.8 ± 0.4, respectively; P plot width (P = 0.02). Subjects with obstructive sleep apnea and moderate-to-severe nocturnal hypoxemia have enhanced sympathetic activity and reduced parasympathetic drive. Poincaré plot width and urine norepinephrine levels are simple measures of autonomic imbalance in pediatric obstructive sleep apnea. Copyright © 2014 Elsevier Inc. All rights reserved.

  2. A Symmetric Chaos-Based Image Cipher with an Improved Bit-Level Permutation Strategy

    Directory of Open Access Journals (Sweden)

    Chong Fu

    2014-02-01

    Full Text Available Very recently, several chaos-based image ciphers using a bit-level permutation have been suggested and shown promising results. Due to the diffusion effect introduced in the permutation stage, the workload of the time-consuming diffusion stage is reduced, and hence the performance of the cryptosystem is improved. In this paper, a symmetric chaos-based image cipher with a 3D cat map-based spatial bit-level permutation strategy is proposed. Compared with those recently proposed bit-level permutation methods, the diffusion effect of the new method is superior as the bits are shuffled among different bit-planes rather than within the same bit-plane. Moreover, the diffusion key stream extracted from hyperchaotic system is related to both the secret key and the plain image, which enhances the security against known/chosen plaintext attack. Extensive security analysis has been performed on the proposed scheme, including the most important ones like key space analysis, key sensitivity analysis, plaintext sensitivity analysis and various statistical analyses, which has demonstrated the satisfactory security of the proposed scheme

  3. Stereoscopic Visual Attention-Based Regional Bit Allocation Optimization for Multiview Video Coding

    Directory of Open Access Journals (Sweden)

    Dai Qionghai

    2010-01-01

    Full Text Available We propose a Stereoscopic Visual Attention- (SVA- based regional bit allocation optimization for Multiview Video Coding (MVC by the exploiting visual redundancies from human perceptions. We propose a novel SVA model, where multiple perceptual stimuli including depth, motion, intensity, color, and orientation contrast are utilized, to simulate the visual attention mechanisms of human visual system with stereoscopic perception. Then, a semantic region-of-interest (ROI is extracted based on the saliency maps of SVA. Both objective and subjective evaluations of extracted ROIs indicated that the proposed SVA model based on ROI extraction scheme outperforms the schemes only using spatial or/and temporal visual attention clues. Finally, by using the extracted SVA-based ROIs, a regional bit allocation optimization scheme is presented to allocate more bits on SVA-based ROIs for high image quality and fewer bits on background regions for efficient compression purpose. Experimental results on MVC show that the proposed regional bit allocation algorithm can achieve over % bit-rate saving while maintaining the subjective image quality. Meanwhile, the image quality of ROIs is improved by  dB at the cost of insensitive image quality degradation of the background image.

  4. The SOL width and the MHD interchange instability in tokamaks

    Energy Technology Data Exchange (ETDEWEB)

    Kerner, W [Commission of the European Communities, Abingdon (United Kingdom). JET Joint Undertaking; Pogutse, O [Kurchatov institute, Moscow (Russian Federation)

    1994-07-01

    Instabilities in the SOL plasma can strongly influence the SOL plasma behaviour and in particular the SOL width. The SOL stability analysis shows that there exists a critical ratio of the thermal energy and the magnetic energy. If the SOL beta is greater than this critical value, the magnetic field cannot prevent the plasma displacement and a strong MHD instability in the SOL occurs. In the opposite case only slower resistive instabilities can develop. A theoretical investigation of the SOL plasma stability is presented for JET single-null and double-null divertor configurations. The dependence of the stability threshold on the SOL beta and on the sheath resistance is established. Applying a simple mixing length argument gives the scaling of the SOL width. 5 refs., 2 figs.

  5. Simple discretization method for autoionization widths. III. Molecules

    International Nuclear Information System (INIS)

    Macas, A.; Martn, F.; Riera, A.; Yanez, M.

    1987-01-01

    We apply a new method to calculate widths of two-electron Feshbach resonances, which was described in detail and applied to atomic systems in preceding articles (this issue), to molecular and quasimolecular autoionizing states. For simplicity in the programming effort, we restrict our calculations to the small-R region where one-centered expansions are sufficiently accurate to describe the wave functions. As test cases, positions and widths for the H 2 , He 2 /sup 2+/, HeH + , and LiHe/sup 3+/ resonances of lowest energy are computed for R<0.6 a.u. The advantage of using block-diagonalization techniques to define diabatic resonant states instead of generalizing the Feshbach formalism is pointed out

  6. Joint space width in dysplasia of the hip

    DEFF Research Database (Denmark)

    Jacobsen, Steffen; Sonne-Holm, Stig; Søballe, K

    2005-01-01

    In a longitudinal case-control study, we followed 81 subjects with dysplasia of the hip and 136 control subjects without dysplasia for ten years assessing radiological evidence of degeneration of the hip at admission and follow-up. There were no cases of subluxation in the group with dysplasia....... Neither subjects with dysplasia nor controls had radiological signs of ongoing degenerative disease at admission. The primary radiological discriminator of degeneration of the hip was a change in the minimum joint space width over time. There were no significant differences between these with dysplasia...... and controls in regard to age, body mass index or occupational exposure to daily repeated lifting at admission.We found no significant differences in the reduction of the joint space width at follow-up between subjects with dysplasia and the control subjects nor in self-reported pain in the hip...

  7. Histogram bin width selection for time-dependent Poisson processes

    International Nuclear Information System (INIS)

    Koyama, Shinsuke; Shinomoto, Shigeru

    2004-01-01

    In constructing a time histogram of the event sequences derived from a nonstationary point process, we wish to determine the bin width such that the mean squared error of the histogram from the underlying rate of occurrence is minimized. We find that the optimal bin widths obtained for a doubly stochastic Poisson process and a sinusoidally regulated Poisson process exhibit different scaling relations with respect to the number of sequences, time scale and amplitude of rate modulation, but both diverge under similar parametric conditions. This implies that under these conditions, no determination of the time-dependent rate can be made. We also apply the kernel method to these point processes, and find that the optimal kernels do not exhibit any critical phenomena, unlike the time histogram method

  8. Histogram bin width selection for time-dependent Poisson processes

    Energy Technology Data Exchange (ETDEWEB)

    Koyama, Shinsuke; Shinomoto, Shigeru [Department of Physics, Graduate School of Science, Kyoto University, Sakyo-ku, Kyoto 606-8502 (Japan)

    2004-07-23

    In constructing a time histogram of the event sequences derived from a nonstationary point process, we wish to determine the bin width such that the mean squared error of the histogram from the underlying rate of occurrence is minimized. We find that the optimal bin widths obtained for a doubly stochastic Poisson process and a sinusoidally regulated Poisson process exhibit different scaling relations with respect to the number of sequences, time scale and amplitude of rate modulation, but both diverge under similar parametric conditions. This implies that under these conditions, no determination of the time-dependent rate can be made. We also apply the kernel method to these point processes, and find that the optimal kernels do not exhibit any critical phenomena, unlike the time histogram method.

  9. Statistical analysis of P-wave neutron reduced widths

    International Nuclear Information System (INIS)

    Joshi, G.C.; Agrawal, H.M.

    2000-01-01

    The fluctuations of the p-wave neutron reduced widths for fifty one nuclei have been analyzed with emphasis on recent measurements by a statistical procedure which is based on the method of maximum likelihood. It is shown that the p-wave neutron reduced widths of even-even nuclei fallow single channel Porter Thomas distribution (χ 2 -distribution with degree of freedom ν=1) for most of the cases where there are no intermediate structure. It is emphasized that the distribution in nuclei other than even-even may differ from a χ 2 -distribution with one degree of freedom. Possible explanation and significance of this deviation from ν=1 is given. (author)

  10. Explicit and implicit processes in behavioural adaptation to road width.

    Science.gov (United States)

    Lewis-Evans, Ben; Charlton, Samuel G

    2006-05-01

    The finding that drivers may react to safety interventions in a way that is contrary to what was intended is the phenomenon of behavioural adaptation. This phenomenon has been demonstrated across various safety interventions and has serious implications for road safety programs the world over. The present research used a driving simulator to assess behavioural adaptation in drivers' speed and lateral displacement in response to manipulations of road width. Of interest was whether behavioural adaptation would occur and whether we could determine whether it was the result of explicit, conscious decisions or implicit perceptual processes. The results supported an implicit, zero perceived risk model of behavioural adaptation with reduced speeds on a narrowed road accompanied by increased ratings of risk and a marked inability of the participants to identify that any change in road width had occurred.

  11. A Direct Measurement of the $W$ Decay Width

    Energy Technology Data Exchange (ETDEWEB)

    Vine, Troy [Univ. of College, London (United Kingdom)

    2008-08-01

    A direct measurement of the W boson total decay width is presented in proton-antiproton collisions at √s = 1.96 TeV using data collected by the CDF II detector. The measurement is made by fitting a simulated signal to the tail of the transverse mass distribution in the electron and muon decay channels. An integrated luminosity of 350 pb-1 is used, collected between February 2002 and August 2004. Combining the results from the separate decay channels gives the decay width as 2.038 ± 0.072 GeV in agreement with the theoretical prediction of 2.093 ± 0.002 GeV. A system is presented for the management of detector calibrations using a relational database schema. A description of the implementation and monitoring of a procedure to provide general users with a simple interface to the complete set of calibrations is also given.

  12. Generation of ozone by Ns-width pulsed power

    International Nuclear Information System (INIS)

    Shimomura, Naoyuki; Wakimoto, Masaya; Shinke, Yosuke; Nagata, Masayoshi; Namihira, Takao; Akiyama, Hidenori

    2002-01-01

    The demand of ozone will be increasing for wholesome and environment-conscious sterilizations. The generation of ozone using the pulsed power discharge will apply electron accelerations around the head of streamer discharge principally. The breakdown in reactor often limits the efficient generation. Therefore, the pulse shape should be controlled for dimension of the reactor. It is clear that a pulse shortening is one of effective approaches. Pulsed power voltage with ns-width applies for ozone generation. The effects, on concentration and efficiency of generation, of pulse shape, repetition rate of pulse, flow rate of oxygen gas, and dimension and configuration of reactor, are discussed. The dimension and configuration of the reactor are optimized for the pulse width

  13. DIFFUSE DBD IN ATMOSPHERIC AIR AT DIFFERENT APPLIED PULSE WIDTHS

    Directory of Open Access Journals (Sweden)

    Ekaterina Alexandrovna Shershunova

    2015-02-01

    Full Text Available The paper deals with the realization and the diagnostics of the volume diffuse dielectric barrier discharge in 1-mm air gap when applying high voltage rectangular pulses to the electrodes. The effect of the applied pulse width on the discharge dissipated energy was studied in detail. It was found experimentally, the energy stayed nearly constant with the pulse elongation from 600 ns to 1 ms.

  14. Temperature dependence of spreading width of giant dipole resonance

    International Nuclear Information System (INIS)

    Storozhenko, A.N.; Vdovin, A.I.; Ventura, A.; Blokhin, A.I.

    2002-01-01

    The Quasiparticle-Phonon Nuclear Model extended to finite temperature within the framework of Thermo Field Dynamics is applied to calculate a temperature dependence of the spreading width Γ ↓ of a giant dipole resonance. Numerical calculations are made for 120 Sn and 208 Pb nuclei. It is found that Γ ↓ increases with T. The reason of this effect is discussed as well as a relation of the present approach to other ones, existing in the literature

  15. Pole mass, width, and propagators of unstable fermions

    International Nuclear Information System (INIS)

    Kniehl, B.A.; Sirlin, A.

    2008-01-01

    The concepts of pole mass and width are extended to unstable fermions in the general framework of parity-nonconserving gauge theories, such as the Standard Model. In contrast with the conventional on-shell definitions, these concepts are gauge independent and avoid severe unphysical singularities, properties of great importance since most fundamental fermions in nature are unstable particles. General expressions for the unrenormalized and renormalized dressed propagators of unstable fermions and their field-renormalization constants are presented. (orig.)

  16. Pulse-Width-Modulating Driver for Brushless dc Motor

    Science.gov (United States)

    Salomon, Phil M.

    1991-01-01

    High-current pulse-width-modulating driver for brushless dc motor features optical coupling of timing signals from low-current control circuitry to high-current motor-driving circuitry. Provides high electrical isolation of motor-power supply, helping to prevent fast, high-current motor-driving pulses from being coupled through power supplies into control circuitry, where they interfere with low-current control signals.

  17. Porous Alumina Films with Width-Controllable Alumina Stripes

    Directory of Open Access Journals (Sweden)

    Huang Shi-Ming

    2010-01-01

    Full Text Available Abstract Porous alumina films had been fabricated by anodizing from aluminum films after an electropolishing procedure. Alumina stripes without pores can be distinguished on the surface of the porous alumina films. The width of the alumina stripes increases proportionally with the anodizing voltage. And the pores tend to be initiated close to the alumina stripes. These phenomena can be ascribed to the electric field distribution in the alumina barrier layer caused by the geometric structure of the aluminum surface.

  18. Porous Alumina Films with Width-Controllable Alumina Stripes

    Science.gov (United States)

    2010-01-01

    Porous alumina films had been fabricated by anodizing from aluminum films after an electropolishing procedure. Alumina stripes without pores can be distinguished on the surface of the porous alumina films. The width of the alumina stripes increases proportionally with the anodizing voltage. And the pores tend to be initiated close to the alumina stripes. These phenomena can be ascribed to the electric field distribution in the alumina barrier layer caused by the geometric structure of the aluminum surface. PMID:21170406

  19. Single event effects in pulse width modulation controllers

    International Nuclear Information System (INIS)

    Penzin, S.H.; Crain, W.R.; Crawford, K.B.; Hansel, S.J.; Kirshman, J.F.; Koga, R.

    1996-01-01

    SEE testing was performed on pulse width modulation (PWM) controllers which are commonly used in switching mode power supply systems. The devices are designed using both Set-Reset (SR) flip-flops and Toggle (T) flip-flops which are vulnerable to single event upset (SEU) in a radiation environment. Depending on the implementation of the different devices the effect can be significant in spaceflight hardware

  20. Characterizing the width of amphibian movements during postbreeding migration.

    Science.gov (United States)

    Coster, Stephanie S; Veysey Powell, Jessica S; Babbitt, Kimberly J

    2014-06-01

    Habitat linkages can help maintain connectivity of animal populations in developed landscapes. However, the lack of empirical data on the width of lateral movements (i.e., the zigzagging of individuals as they move from one point to point another) makes determining the width of such linkages challenging. We used radiotracking data from wood frogs (Lithobates sylvaticus) and spotted salamanders (Ambystoma maculatum) in a managed forest in Maine (U.S.A.) to characterize movement patterns of populations and thus inform planning for the width of wildlife corridors. For each individual, we calculated the polar coordinates of all locations, estimated the vector sum of the polar coordinates, and measured the distance from each location to the vector sum. By fitting a Gaussian distribution over a histogram of these distances, we created a population-level probability density function and estimated the 50th and 95th percentiles to determine the width of lateral movement as individuals progressed from the pond to upland habitat. For spotted salamanders 50% of lateral movements were ≤13 m wide and 95% of movements were ≤39 m wide. For wood frogs, 50% of lateral movements were ≤17 m wide and 95% of movements were ≤ 51 m wide. For both species, those individuals that traveled the farthest from the pond also displayed the greatest lateral movement. Our results serve as a foundation for spatially explicit conservation planning for pond-breeding amphibians in areas undergoing development. Our technique can also be applied to movement data from other taxa to aid in designing habitat linkages. © 2014 Society for Conservation Biology.

  1. Conversion width of Σ-hyperon in nuclear matter

    International Nuclear Information System (INIS)

    Filimonov, V.A.

    1983-01-01

    Width G of ΣN→ΛN conversion for Σ - hyperon in nuclear matter on the base of one-boson exchange model is calculated. Essential compensation of contributions of diffe-- rent mesons to amplitude of the conversiop is shown to take place. As a result G decreases approximately twice as compaped with the value from exchange only by π-meson. Without accout of Pauli principle it is obtained G=15-25 MeV

  2. Technique for estimating relocated gap width for gap conductance calculations

    International Nuclear Information System (INIS)

    Klink, P.H.

    1978-01-01

    Thermally induced fuel fragmentation and relocation has been demonstrated to influence the thermal behavior of a fuel rod in two ways. The effective fuel pellet conductivity is decreased and pellet-to-cladding heat transfer is improved. This paper presents a correlation between as-built and relocated gap width which, used with the Ross and Stoute Gap Conductance Correlation and an appropriate fuel thermal expansion model, closely predicts the measured gap conductances

  3. Performance of an attention-demanding task during treadmill walking shifts the noise qualities of step-to-step variation in step width.

    Science.gov (United States)

    Grabiner, Mark D; Marone, Jane R; Wyatt, Marilynn; Sessoms, Pinata; Kaufman, Kenton R

    2018-06-01

    The fractal scaling evident in the step-to-step fluctuations of stepping-related time series reflects, to some degree, neuromotor noise. The primary purpose of this study was to determine the extent to which the fractal scaling of step width, step width and step width variability are affected by performance of an attention-demanding task. We hypothesized that the attention-demanding task would shift the structure of the step width time series toward white, uncorrelated noise. Subjects performed two 10-min treadmill walking trials, a control trial of undisturbed walking and a trial during which they performed a mental arithmetic/texting task. Motion capture data was converted to step width time series, the fractal scaling of which were determined from their power spectra. Fractal scaling decreased by 22% during the texting condition (p Step width and step width variability increased 19% and five percent, respectively (p step width fractal scaling. The change of the fractal scaling of step width is consistent with increased cognitive demand and suggests a transition in the characteristics of the signal noise. This may reflect an important advance toward the understanding of the manner in which neuromotor noise contributes to some types of falls. However, further investigation of the repeatability of the results, the sensitivity of the results to progressive increases in cognitive load imposed by attention-demanding tasks, and the extent to which the results can be generalized to the gait of older adults seems warranted. Copyright © 2018 Elsevier B.V. All rights reserved.

  4. Stark widths regularities within spectral series of sodium isoelectronic sequence

    Science.gov (United States)

    Trklja, Nora; Tapalaga, Irinel; Dojčinović, Ivan P.; Purić, Jagoš

    2018-02-01

    Stark widths within spectral series of sodium isoelectronic sequence have been studied. This is a unique approach that includes both neutrals and ions. Two levels of problem are considered: if the required atomic parameters are known, Stark widths can be calculated by some of the known methods (in present paper modified semiempirical formula has been used), but if there is a lack of parameters, regularities enable determination of Stark broadening data. In the framework of regularity research, Stark broadening dependence on environmental conditions and certain atomic parameters has been investigated. The aim of this work is to give a simple model, with minimum of required parameters, which can be used for calculation of Stark broadening data for any chosen transitions within sodium like emitters. Obtained relations were used for predictions of Stark widths for transitions that have not been measured or calculated yet. This system enables fast data processing by using of proposed theoretical model and it provides quality control and verification of obtained results.

  5. Measurement of the mass and width of the W boson

    CERN Document Server

    Abbiendi, G.; Akesson, P.F.; Alexander, G.; Anagnostou, G.; Anderson, K.J.; Asai, S.; Axen, D.; Bailey, I.; Barberio, E.; Barillari, T.; Barlow, R.J.; Batley, R.J.; Bechtle, P.; Behnke, T.; Bell, Kenneth Watson; Bell, P.J.; Bella, G.; Bellerive, A.; Benelli, G.; Bethke, S.; Biebel, O.; Boeriu, O.; Bock, P.; Boutemeur, M.; Braibant, S.; Brown, Robert M.; Burckhart, H.J.; Campana, S.; Capiluppi, P.; Carnegie, R.K.; Carter, A.A.; Carter, J.R.; Chang, C.Y.; Charlton, D.G.; Ciocca, C.; Csilling, A.; Cuffiani, M.; Dado, S.; De Roeck, A.; De Wolf, E.A.; Desch, K.; Dienes, B.; Dubbert, J.; Duchovni, E.; Duckeck, G.; Duerdoth, I.P.; Etzion, E.; Fabbri, F.; Ferrari, P.; Fiedler, F.; Fleck, I.; Ford, M.; Frey, A.; Gagnon, P.; Gary, John William; Geich-Gimbel, C.; Giacomelli, G.; Giacomelli, P.; Giunta, Marina; Goldberg, J.; Gross, E.; Grunhaus, J.; Gruwe, M.; Gunther, P.O.; Gupta, A.; Hajdu, C.; Hamann, M.; Hanson, G.G.; Harel, A.; Hauschild, M.; Hawkes, C.M.; Hawkings, R.; Hemingway, R.J.; Herten, G.; Heuer, R.D.; Hill, J.C.; Horvath, D.; Igo-Kemenes, P.; Ishii, K.; Jeremie, H.; Jovanovic, P.; Junk, T.R.; Kanzaki, J.; Karlen, D.; Kawagoe, K.; Kawamoto, T.; Keeler, R.K.; Kellogg, R.G.; Kennedy, B.W.; Kluth, S.; Kobayashi, T.; Kobel, M.; Komamiya, S.; Kramer, T.; Krasznahorkay, A.; Krieger, P.; von Krogh, J.; Kuhl, T.; Kupper, M.; Lafferty, G.D.; Landsman, H.; Lanske, D.; Lellouch, D.; Letts, J.; Levinson, L.; Lillich, J.; Lloyd, S.L.; Loebinger, F.K.; Lu, J.; Ludwig, A.; Ludwig, J.; Mader, W.; Marcellini, S.; Martin, A.J.; Mashimo, T.; Mattig, Peter; McKenna, J.; McPherson, R.A.; Meijers, F.; Menges, W.; Merritt, F.S.; Mes, H.; Meyer, Niels T.; Michelini, A.; Mihara, S.; Mikenberg, G.; Miller, D.J.; Mohr, W.; Mori, T.; Mutter, A.; Nagai, K.; Nakamura, I.; Nanjo, H.; Neal, H.A.; Nisius, R.; O'Neale, S.W.; Oh, A.; Oreglia, M.J.; Orito, S.; Pahl, C.; Pasztor, G.; Pater, J.R.; Pilcher, J.E.; Pinfold, J.; Plane, David E.; Pooth, O.; Przybycien, M.; Quadt, A.; Rabbertz, K.; Rembser, C.; Renkel, P.; Roney, J.M.; Rossi, A.M.; Rozen, Y.; Runge, K.; Sachs, K.; Saeki, T.; Sarkisyan, E.K.G.; Schaile, A.D.; Schaile, O.; Scharff-Hansen, P.; Schieck, J.; Schorner-Sadenius, T.; Schroder, Matthias; Schumacher, M.; Seuster, R.; Shears, T.G.; Shen, B.C.; Sherwood, P.; Skuja, A.; Smith, A.M.; Sobie, R.; Soldner-Rembold, S.; Spano, F.; Stahl, A.; Strom, David M.; Strohmer, R.; Tarem, S.; Tasevsky, M.; Teuscher, R.; Thomson, M.A.; Torrence, E.; Toya, D.; Tran, P.; Trigger, I.; Trocsanyi, Z.; Tsur, E.; Turner-Watson, M.F.; Ueda, I.; Ujvari, B.; Vollmer, C.F.; Vannerem, P.; Vertesi, R.; Verzocchi, M.; Voss, H.; Vossebeld, J.; Ward, C.P.; Ward, D.R.; Watkins, P.M.; Watson, A.T.; Watson, N.K.; Wells, P.S.; Wengler, T.; Wermes, N.; Wilson, G.W.; Wilson, J.A.; Wolf, G.; Wyatt, T.R.; Yamashita, S.; Zer-Zion, D.; Zivkovic, Lidija

    2006-01-01

    The mass and width of the W boson are measured using e+e- -> W+W- events from the data sample collected by the OPAL experiment at LEP at centre-of-mass energies between 170 GeV and 209 GeV. The mass (mw) and width (gw) are determined using direct reconstruction of the kinematics of W+W- -> qqbarlv and W+W- -> qqbarqqbar events. When combined with previous OPAL measurements using W+W- -> lvlv events and the dependence on mw of the WW production cross-section at threshold, the results are determined to be mw = 80.415 +- 0.042 +- 0.030 +- 0.009 GeV gw = 1.996 +- 0.096 +- 0.102 +- 0.003 GeV where the first error is statistical, the second systematic and the third due to uncertainties in the value of the LEP beam energy. By measuring mw with several different jet algorithms in the qqbarqqbar channel, a limit is also obtained on possible final-state interactions due to colour reconnection effects in W+W- -> qqbarqqbar events. The consistency of the results for the W mass and width with those inferred from other ele...

  6. Balance (perceived and actual) and preferred stance width during pregnancy.

    Science.gov (United States)

    Jang, John; Hsiao, Katherine T; Hsiao-Wecksler, Elizabeth T

    2008-05-01

    Pregnant women often remark that their balance degrades during pregnancy; however, it appears that no studies have documented the gravida's perception of her balance nor measured direction-specific changes in balance throughout pregnancy or after delivery. Thirty women, fifteen pregnant and fifteen non-pregnant controls, were tested monthly and through 6-month postpartum. For each session, perceived degradation in sense of balance, laboratory-based balance measures, stance width, and the number of falls since the previous session were recorded. Laboratory-based balance measures, quantified by direction-specific measures of postural sway, were computed from ten 30s quiet-standing trials on a stationary force platform. Repeated-measures analysis of variance, paired t-tests, and Pearson correlations were use to examine group and time effects. For the pregnant group, perceived balance degradation and stance width were highly correlated (r = 0.94). Both increased during pregnancy (P r > 0.72) and also decreased significantly between the third trimester and postpartum (P pregnancy, but increased after delivery. Contrary to recent work suggesting fall rates of 25%, only 13% of our subjects (n = 2) fell during pregnancy. Perceived degradation in balance during pregnancy was strongly related to increasing postural sway instability in the anterior-posterior direction. Lateral stability was maintained during pregnancy and likely accomplished by increasing stance width.

  7. Predictors of the peak width for networks with exponential links

    Science.gov (United States)

    Troutman, B.M.; Karlinger, M.R.

    1989-01-01

    We investigate optimal predictors of the peak (S) and distance to peak (T) of the width function of drainage networks under the assumption that the networks are topologically random with independent and exponentially distributed link lengths. Analytical results are derived using the fact that, under these assumptions, the width function is a homogeneous Markov birth-death process. In particular, exact expressions are derived for the asymptotic conditional expectations of S and T given network magnitude N and given mainstream length H. In addition, a simulation study is performed to examine various predictors of S and T, including N, H, and basin morphometric properties; non-asymptotic conditional expectations and variances are estimated. The best single predictor of S is N, of T is H, and of the scaled peak (S divided by the area under the width function) is H. Finally, expressions tested on a set of drainage basins from the state of Wyoming perform reasonably well in predicting S and T despite probable violations of the original assumptions. ?? 1989 Springer-Verlag.

  8. Ridge Width Correlations between Inked Prints and Powdered Latent Fingerprints.

    Science.gov (United States)

    De Alcaraz-Fossoul, Josep; Barrot-Feixat, Carme; Zapico, Sara C; Mancenido, Michelle; Broatch, Jennifer; Roberts, Katherine A; Carreras-Marin, Clara; Tasker, Jack

    2017-10-03

    A methodology to estimate the time of latent fingerprint deposition would be of great value to law enforcement and courts. It has been observed that ridge topography changes as latent prints age, including the widths of ridges that could be measured as a function of time. Crime suspects are commonly identified using fingerprint databases that contain reference inked tenprints (flat and rolled impressions). These can be of interest in aging studies as they provide baseline information relating to the original (nonaged) ridges' widths. In practice, the age of latent fingerprints could be estimated following a comparison process between the evidentiary aged print and the corresponding reference inked print. The present article explores possible correlations between inked and fresh latent fingerprints deposited on different substrates and visualized with TiO 2 . The results indicate that the ridge width of flat inked prints is most similar to fresh latent fingerprints , and these should be used as the comparison standard for future aging studies. © 2017 American Academy of Forensic Sciences.

  9. Effect of temperature and ridge-width on the lasing characteristics of InAs/InP quantum-dash lasers: A thermal analysis view

    Science.gov (United States)

    Alkhazraji, E.; Khan, M. T. A.; Ragheb, A. M.; Fathallah, H.; Qureshi, K. K.; Alshebeili, S.; Khan, M. Z. M.

    2018-01-01

    We investigate the thermal characteristics of multi-stack chirped barrier thickness InAs/InGaAlAs/InP quantum-dash-in-a-well lasers of different ridge widths 2, 3, 4 and 15 μm. The effect of varying this geometrical parameter on the extracted thermal resistance and characteristic temperature, and their stability with temperature are examined. The results show an inverse relation of ridge-width with junction temperature with 2 μm device exhibiting the largest junction temperature buildup owing to an associated high thermal resistance of ∼45 °C/W. Under the light of this thermal analysis, lasing behavior of different ridge-width quantum-dash (Qdash) lasers with injection currents and operating temperatures, is investigated. Thermionic carrier escape and phonon-assisted tunneling are found to be the dominant carrier transport mechanisms resulting in wide thermal spread of carriers across the available transition states of the chirped active region. An emission coverage of ∼75 nm and 3 dB bandwidth of ∼55 nm is exhibited by the 2 μm device, thus possibly exploiting the inhomogeneous optical transitions to the fullest. Furthermore, successful external modulation of a single Qdash Fabry-Perot laser mode via injection locking is demonstrated with eye diagrams at bit rates of 2-12 Gbit/s incorporating various modulation schemes. These devices are being considered as potential light sources for future high-speed wavelength-division multiplexed optical communication systems.

  10. A statistical analysis of the location and width of Saturn's southern auroras

    Directory of Open Access Journals (Sweden)

    S. V. Badman

    2006-12-01

    Full Text Available A selection of twenty-two Hubble Space Telescope images of Saturn's ultraviolet auroras obtained during 1997–2004 has been analysed to determine the median location and width of the auroral oval, and their variability. Limitations of coverage restrict the analysis to the southern hemisphere, and to local times from the post-midnight sector to just past dusk, via dawn and noon. It is found that the overall median location of the poleward and equatorward boundaries of the oval with respect to the southern pole are at ~14° and ~16° co-latitude, respectively, with a median latitudinal width of ~2°. These median values vary only modestly with local time around the oval, though the poleward boundary moves closer to the pole near noon (~12.5° such that the oval is wider in that sector (median width ~3.5° than it is at both dawn and dusk (~1.5°. It is also shown that the position of the auroral boundaries at Saturn are extremely variable, the poleward boundary being located between 2° and 20° co-latitude, and the equatorward boundary between 6° and 23°, this variability contrasting sharply with the essentially fixed location of the main oval at Jupiter. Comparison with Voyager plasma angular velocity data mapped magnetically from the equatorial magnetosphere into the southern ionosphere indicates that the dayside aurora lie poleward of the main upward-directed field-aligned current region associated with corotation enforcement, which maps to ~20°–24° co-latitude, while agreeing reasonably with the position of the open-closed field line boundary based on estimates of the open flux in Saturn's tail, located between ~11° and ~15°. In this case, the variability in location can be understood in terms of changes in the open flux present in the system, the changes implied by the Saturn data then matching those observed at Earth as fractions of the total planetary flux. We infer that the broad (few degrees diffuse auroral emissions

  11. Analysis Of The Effect Of Flow Channel Width On The Performance Of PEMFC

    Directory of Open Access Journals (Sweden)

    Elif Eker

    2013-08-01

    Full Text Available In this work, it was analysed the effect of different channel width on performance of PEM fuel cell. Current density were measured on the single cells of parallel flow fields that has 25 cm² active layer, using three different kinds of channel width. The cell width and the channel height remain constant.The results show that increasing the channel width while the cell width remains constant decreases the current density.

  12. Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys

    Science.gov (United States)

    Takahashi, Junko; Fukunaga, Toshinori

    This paper describes a differential fault analysis (DFA) attack against CLEFIA. The proposed attack can be applied to CLEFIA with all supported keys: 128, 192, and 256-bit keys. DFA is a type of side-channel attack. This attack enables the recovery of secret keys by injecting faults into a secure device during its computation of the cryptographic algorithm and comparing the correct ciphertext with the faulty one. CLEFIA is a 128-bit blockcipher with 128, 192, and 256-bit keys developed by the Sony Corporation in 2007. CLEFIA employs a generalized Feistel structure with four data lines. We developed a new attack method that uses this characteristic structure of the CLEFIA algorithm. On the basis of the proposed attack, only 2 pairs of correct and faulty ciphertexts are needed to retrieve the 128-bit key, and 10.78 pairs on average are needed to retrieve the 192 and 256-bit keys. The proposed attack is more efficient than any previously reported. In order to verify the proposed attack and estimate the calculation time to recover the secret key, we conducted an attack simulation using a PC. The simulation results show that we can obtain each secret key within three minutes on average. This result shows that we can obtain the entire key within a feasible computational time.

  13. Video steganography based on bit-plane decomposition of wavelet-transformed video

    Science.gov (United States)

    Noda, Hideki; Furuta, Tomofumi; Niimi, Michiharu; Kawaguchi, Eiji

    2004-06-01

    This paper presents a steganography method using lossy compressed video which provides a natural way to send a large amount of secret data. The proposed method is based on wavelet compression for video data and bit-plane complexity segmentation (BPCS) steganography. BPCS steganography makes use of bit-plane decomposition and the characteristics of the human vision system, where noise-like regions in bit-planes of a dummy image are replaced with secret data without deteriorating image quality. In wavelet-based video compression methods such as 3-D set partitioning in hierarchical trees (SPIHT) algorithm and Motion-JPEG2000, wavelet coefficients in discrete wavelet transformed video are quantized into a bit-plane structure and therefore BPCS steganography can be applied in the wavelet domain. 3-D SPIHT-BPCS steganography and Motion-JPEG2000-BPCS steganography are presented and tested, which are the integration of 3-D SPIHT video coding and BPCS steganography, and that of Motion-JPEG2000 and BPCS, respectively. Experimental results show that 3-D SPIHT-BPCS is superior to Motion-JPEG2000-BPCS with regard to embedding performance. In 3-D SPIHT-BPCS steganography, embedding rates of around 28% of the compressed video size are achieved for twelve bit representation of wavelet coefficients with no noticeable degradation in video quality.

  14. The Random Telegraph Signal Behavior of Intermittently Stuck Bits in SDRAMs

    Science.gov (United States)

    Chugg, Andrew Michael; Burnell, Andrew J.; Duncan, Peter H.; Parker, Sarah; Ward, Jonathan J.

    2009-12-01

    This paper reports behavior analogous to the Random Telegraph Signal (RTS) seen in the leakage currents from radiation induced hot pixels in Charge Coupled Devices (CCDs), but in the context of stuck bits in Synchronous Dynamic Random Access Memories (SDRAMs). Our analysis suggests that pseudo-random sticking and unsticking of the SDRAM bits is due to thermally induced fluctuations in leakage current through displacement damage complexes in depletion regions that were created by high-energy neutron and proton interactions. It is shown that the number of observed stuck bits increases exponentially with temperature, due to the general increase in the leakage currents through the damage centers with temperature. Nevertheless, some stuck bits are seen to pseudo-randomly stick and unstick in the context of a continuously rising trend of temperature, thus demonstrating that their damage centers can exist in multiple widely spaced, discrete levels of leakage current, which is highly consistent with RTS. This implies that these intermittently stuck bits (ISBs) are a displacement damage phenomenon and are unrelated to microdose issues, which is confirmed by the observation that they also occur in unbiased irradiation. Finally, we note that observed variations in the periodicity of the sticking and unsticking behavior on several timescales is most readily explained by multiple leakage current pathways through displacement damage complexes spontaneously and independently opening and closing under the influence of thermal vibrations.

  15. The bit slice micro-processor 'GESPRO' as a project in the UA2 experiment

    CERN Document Server

    Becam, C; Delanghe, J; Fest, H M; Lecoq, J; Martin, H; Mencik, M; MerkeI, B; Meyer, J M; Perrin, M; Plothow, H; Rampazzo, J P; Schittly, A

    1981-01-01

    The bit slice micro-processor GESPRO is a CAMAC module plugged into a standard Elliot system crate via which it communicates as a slave with its host computer. It has full control of CAMAC as a master unit. GESPRO is a 24 bit machine with multi-mode memory addressing capacity of 64K words. The micro-processor structure uses 5 buses including pipe-line registers to mask access time and 16 interrupt levels. The micro-program memory capacity is 2K (RAM) words of 48 bits each. A special hardwired module allows floating point, as well as integer, multiplication of 24*24 bits, result in 48 bits, in about 200 ns. This micro-processor could be used in the UA2 data acquisition chain and trigger system for the following tasks: (a) online data reduction, i.e. to read DURANDAL, process the information resulting in accepting or rejecting the event; (b) readout and analysis of the accepted data; (c) preprocess the data. The UA2 version of GESPRO is under construction, programs and micro-programs are under development. Hard...

  16. ParBiBit: Parallel tool for binary biclustering on modern distributed-memory systems.

    Science.gov (United States)

    González-Domínguez, Jorge; Expósito, Roberto R

    2018-01-01

    Biclustering techniques are gaining attention in the analysis of large-scale datasets as they identify two-dimensional submatrices where both rows and columns are correlated. In this work we present ParBiBit, a parallel tool to accelerate the search of interesting biclusters on binary datasets, which are very popular on different fields such as genetics, marketing or text mining. It is based on the state-of-the-art sequential Java tool BiBit, which has been proved accurate by several studies, especially on scenarios that result on many large biclusters. ParBiBit uses the same methodology as BiBit (grouping the binary information into patterns) and provides the same results. Nevertheless, our tool significantly improves performance thanks to an efficient implementation based on C++11 that includes support for threads and MPI processes in order to exploit the compute capabilities of modern distributed-memory systems, which provide several multicore CPU nodes interconnected through a network. Our performance evaluation with 18 representative input datasets on two different eight-node systems shows that our tool is significantly faster than the original BiBit. Source code in C++ and MPI running on Linux systems as well as a reference manual are available at https://sourceforge.net/projects/parbibit/.

  17. The bit slice micro-processor 'GESPRO' as a project in the UA2 experiment

    International Nuclear Information System (INIS)

    Becam, C.; Bernaudin, P.; Delanghe, J.; Mencik, M.; Merkel, B.; Plothow, H.; Fest, H.M.; Lecoq, J.; Martin, H.; Meyer, J.M.

    1981-01-01

    The bit slice micro-processor GESPRO, as it is proposed for use in the UA 2 data acquisition chain and trigger system, is a CAMAC module plugged into a standard Elliott System crate via which it communicates as a slave with its host computer (ND, DEC). It has full control of CAMAC as a master unit. GESPRO is a 24 bit machine (150 ns effective cycle time) with multi-mode memory addressing capacity of 64 K words. The micro-processor structure uses 5 busses including pipe-line registers to mask access time and 16 interrupt levels. The micro-program memory capacity is 2 K (RAM) words of 48 bits each. A special hardwired module allows floating point (as well as integer) multiplication of 24 x 24 bits, result in 48 bits, in about 200 ns. This micro-processor could be used in the UA2 data acquisition chain and trigger system for the following tasks: a) online data reduction, i.e. to read DURANDAL (fast ADC's = the hardware trigger in the experiment), process the information (effective mass calculation, etc.) resulting in accepting or rejecting the event. b) read out and analysis of the accepted data (collect statistical information). c) preprocess the data (calculation of pointers, address decoding, etc.). The UA2 version of GESPRO is under construction, programs and micro-programs are under development. Hardware and software will be tested with simulated data. First results are expected in about one year from now. (orig.)

  18. Bounds on Minimum Energy per Bit for Optical Wireless Relay Channels

    Directory of Open Access Journals (Sweden)

    A. D. Raza

    2014-09-01

    Full Text Available An optical wireless relay channel (OWRC is the classical three node network consisting of source, re- lay and destination nodes with optical wireless connectivity. The channel law is assumed Gaussian. This paper studies the bounds on minimum energy per bit required for reliable communication over an OWRC. It is shown that capacity of an OWRC is concave and energy per bit is monotonically increasing in square of the peak optical signal power, and consequently the minimum energy per bit is inversely pro- portional to the square root of asymptotic capacity at low signal to noise ratio. This has been used to develop upper and lower bound on energy per bit as a function of peak signal power, mean to peak power ratio, and variance of channel noise. The upper and lower bounds on minimum energy per bit derived in this paper correspond respectively to the decode and forward lower bound and the min-max cut upper bound on OWRC capacity

  19. Corrected multiple upsets and bit reversals for improved 1-s resolution measurements

    International Nuclear Information System (INIS)

    Brucker, G.J.; Stassinopoulos, E.G.; Stauffer, C.A.

    1994-01-01

    Previous work has studied the generation of single and multiple errors in control and irradiated static RAM samples (Harris 6504RH) which were exposed to heavy ions for relatively long intervals of time (minute), and read out only after the beam was shut off. The present investigation involved storing 4k x 1 bit maps every second during 1 min ion exposures at low flux rates of 10 3 ions/cm 2 -s in order to reduce the chance of two sequential ions upsetting adjacent bits. The data were analyzed for the presence of adjacent upset bit locations in the physical memory plane, which were previously defined to constitute multiple upsets. Improvement in the time resolution of these measurements has provided more accurate estimates of multiple upsets. The results indicate that the percentage of multiples decreased from a high of 17% in the previous experiment to less than 1% for this new experimental technique. Consecutive double and triple upsets (reversals of bits) were detected. These were caused by sequential ions hitting the same bit, with one or two reversals of state occurring in a 1-min run. In addition to these results, a status review for these same parts covering 3.5 years of imprint damage recovery is also presented

  20. A 9-Bit 50 MSPS Quadrature Parallel Pipeline ADC for Communication Receiver Application

    Science.gov (United States)

    Roy, Sounak; Banerjee, Swapna

    2018-03-01

    This paper presents the design and implementation of a pipeline Analog-to-Digital Converter (ADC) for superheterodyne receiver application. Several enhancement techniques have been applied in implementing the ADC, in order to relax the target specifications of its building blocks. The concepts of time interleaving and double sampling have been used simultaneously to enhance the sampling speed and to reduce the number of amplifiers used in the ADC. Removal of a front end sample-and-hold amplifier is possible by employing dynamic comparators with switched capacitor based comparison of input signal and reference voltage. Each module of the ADC comprises two 2.5-bit stages followed by two 1.5-bit stages and a 3-bit flash stage. Four such pipeline ADC modules are time interleaved using two pairs of non-overlapping clock signals. These two pairs of clock signals are in phase quadrature with each other. Hence the term quadrature parallel pipeline ADC has been used. These configurations ensure that the entire ADC contains only eight operational-trans-conductance amplifiers. The ADC is implemented in a 0.18-μm CMOS process and supply voltage of 1.8 V. The proto-type is tested at sampling frequencies of 50 and 75 MSPS producing an Effective Number of Bits (ENOB) of 6.86- and 6.11-bits respectively. At peak sampling speed, the core ADC consumes only 65 mW of power.

  1. Λ(1520) → Λγ Radiative-Decay Width

    International Nuclear Information System (INIS)

    Vavilov, D.V.; Antipov, Yu.M.; Artamonov, A.V.; Batarin, V.A.; Victorov, V.A.; Golovkin, S.V.; Gorin, Yu.P.; Eroshin, O.V.; Kozhevnikov, A.P.; Konstantinov, A.S.; Kubarovsky, V.P.; Kurshetsov, V.F.; Landsberg, L.G.; Leontiev, V.M.; Molchanov, V.V.; Mukhin, V.A.; Patalakha, D.I.; Petrenko, S.V.; Petrukhin, A.I.; Kolganov, V.Z.

    2005-01-01

    The radiative decay Λ(1520) → Λγ was recorded in the exclusive reaction p + N → Λ(1520)K + + N at the SPHINX facility. The branching ratio for this decay and the corresponding partial width were found to be, respectively, Br[Λ(1520) → Λγ] = (1.02 ± 0.21) x 10 -2 and Γ[Λ(1520) → Λγ] = 159 ± 35 keV (the quoted errors are purely statistical, the systematic errors being within 15%)

  2. Use of artificial neural networks on optical track width measurements

    Science.gov (United States)

    Smith, Richard J.; See, Chung W.; Somekh, Mike G.; Yacoot, Andrew

    2007-08-01

    We have demonstrated recently that, by using an ultrastable optical interferometer together with artificial neural networks (ANNs), track widths down to 60 nm can be measured with a 0.3 NA objective lens. We investigate the effective conditions for training ANNs. Experimental results will be used to show the characteristics of the training samples and the data format of the ANN inputs required to produce suitably trained ANNs. Results obtained with networks measuring double tracks, and classifying different structures, will be presented to illustrate the capability of the technique. We include a discussion on expansion of the application areas of the system, allowing it to be used as a general purpose instrument.

  3. Orbit width scaling of TAE instability growth rate

    International Nuclear Information System (INIS)

    Wong, H.V.; Berk, H.L.; Breizman, B.N.

    1995-07-01

    The growth rate of Toroidal Alfven Eigenmodes (TAE) driven unstable by resonant coupling of energetic charged particles is evaluated in the ballooning limit over a wide range of parameters. All damping effects are ignored. Variations in orbit width, aspect ratio, and the ratio of alfven velocity to energetic particle birth velocity, are explored. The relative contribution of passing and trapped particles, and finite Larmor radius effects, are also examined. The phase space location of resonant particles with interact strongly with the modes is described. The accuracy of the analytic results with respect to growth rate magnitude and parametric dependence is investigated by comparison with numerical results

  4. Collisional width of giant resonances and interplay with Landau damping

    International Nuclear Information System (INIS)

    Bonasera, A.; Burgio, G.F.; Di Toro, M.; Wolter, H.H.

    1989-01-01

    We present a semiclassical method to calculate the widths of giant resonances. We solve a mean-field kinetic equation (Vlasov equation) with collision terms treated within the relaxation time approximation to construct a damped strength distribution for collective motions. The relaxation time is evaluated from the time evolution of distortions in the nucleon momentum distribution using a test-particle approach. The importance of an energy dependent nucleon-nucleon cross section is stressed. Results are shown for isoscalar giant quadrupole and octupole motions. A quite important interplay between self-consistent (Landau) and collisional damping is revealed

  5. Beam manipulating by metallic nano-slits with variant widths.

    Science.gov (United States)

    Shi, Haofei; Wang, Changtao; Du, Chunlei; Luo, Xiangang; Dong, Xiaochun; Gao, Hongtao

    2005-09-05

    A novel method is proposed to manipulate beam by modulating light phase through a metallic film with arrayed nano-slits, which have constant depth but variant widths. The slits transport electro-magnetic energy in the form of surface plasmon polaritons (SPPs) in nanometric waveguides and provide desired phase retardations of beam manipulating with variant phase propagation constant. Numerical simulation of an illustrative lens design example is performed through finite-difference time-domain (FDTD) method and shows agreement with theory analysis result. In addition, extraordinary optical transmission of SPPs through sub-wavelength metallic slits is observed in the simulation and helps to improve elements' energy using factor.

  6. Effect of Pulse Width on Oxygen-fed Ozonizer

    Science.gov (United States)

    Okada, Sho; Wang, Douyan; Namihira, Takao; Katsuki, Sunao; Akiyama, Hidenori

    Though general ozonizers based on silent discharge (barrier discharge) have been used to supply ozone at many industrial situations, there is still some problem, such as improvements of ozone yield. In this work, ozone was generated by pulsed discharge in order to improve the characteristics of ozone generation. It is known that a pulse width gives strong effect to the improvement of energy efficiency in exhaust gas processing. In this paper, the effect of pulse duration on ozone generation by pulsed discharge in oxygen would be reported.

  7. OPTIM, Minimization of Band-Width of Finite Elements Problems

    International Nuclear Information System (INIS)

    Huart, M.

    1977-01-01

    1 - Nature of the physical problem solved: To minimize the band-width of finite element problems. 2 - Method of solution: A surface is constructed from the x-y-coordinates of each node using its node number as z-value. This surface consists of triangles. Nodes are renumbered in such a way as to minimize the surface area. 3 - Restrictions on the complexity of the problem: This program is applicable to 2-D problems. It is dimensioned for a maximum of 1000 elements

  8. Manipulating the retrieved width of stored light pulses

    International Nuclear Information System (INIS)

    Chen Yongfan; Wang Shihhao; Wang Changyi; Yu, Ite A.

    2005-01-01

    We have systematically studied the method proposed by Patnaik et al. [Phys. Rev. A 69, 035803 (2004)] that manipulates the retrieval of stored light pulses. The measured probe pulse width of the retrieval is inversely proportional to the intensity of the reading field. We also show that the method does not introduce any phase shift or jump into the retrieved pulses. Our study demonstrates that the distortion at the output of the light storage can be corrected by manipulating the retrieval process and the phase information of the stored pulses can remain intact during the process

  9. Pulse-width modulated DC-DC power converters

    CERN Document Server

    Kazimierczuk, Marian K

    2008-01-01

    This book studies switch-mode power supplies (SMPS) in great detail. This type of converter changes an unregulated DC voltage into a high-frequency pulse-width modulated (PWM) voltage controlled by varying the duty cycle, then changes the PWM AC voltage to a regulated DC voltage at a high efficiency by rectification and filtering. Used to supply electronic circuits, this converter saves energy and space in the overall system. With concept-orientated explanations, this book offers state-of-the-art SMPS technology and promotes an understanding of the principle operations of PWM converters,

  10. Orbit width scaling of TAE instability growth rate

    International Nuclear Information System (INIS)

    Wong, H.V.; Berk, H.L.; Breizman, B.N.

    1995-01-01

    The growth rate of toroidal Alfven eigenmodes (TAEs) driven unstable by resonant coupling of energetic charged particles is evaluated in the 'ballooning' limit over a wide range of parameters. All damping effects are ignored. Variations in orbit width, aspect ratio and the ratio of Alfven velocity to energetic particle 'birth' velocity are explored. The relative contribution of passing and trapped particles, and finite Larmor radius effects, are also examined. The phase space location of resonant particles that interact strongly with the modes is described. The accuracy of the analytic results with respect to growth rate magnitude and parametric dependence is investigated by comparison with numerical results. (author). 16 refs, 8 figs

  11. PENINGKATAN KINERJA PERANGKAT ELEKTRONIK BERBASIS MIKROKONTROLER AVR 8 BIT DENGAN MENGGUNAKAN RTOS (REAL TIME OPERATING SYSTEM

    Directory of Open Access Journals (Sweden)

    I Wayan Sutaya

    2015-01-01

    Full Text Available Tujuan dari penelitian ini adalah untuk mengimplementasikan RTOS (Real Time Operating System pada perangkat elektronik berbasis mikrokontroler AVR 8 bit sehingga didapatkan peningkatan kinerja pada perangkat tersebut. RTOS yang digunakan adalah freeRTOS dimana RTOS ini mendukung mikrokontroler 8 bit, berukuran kecil, dan bersifat open source. Hasil penelitian ini berguna bagi praktisi-praktisi elektronika dalam hal menekan biaya produksi pembuatan perangkat elektronik berbasis mikrokontroler 8 bit karena resource yang digunakan bisa dikurangi. Metode yang digunakan adalah metode penelitian pengembangan (Research and development dengan cara membuat studi kasus perangkat elektronik yang berbasis mikrokontroler. Perangkat elektronik yang dibuat adalah unit kendali elektronik pada sepeda motor. Selanjutnya mikrokontroler pada perangkat ini diprogram dengan menggunakan dua skenario. Skenario pertama adalah tanpa menggunakan RTOS dan skenario kedua dengan menggunakan RTOS. Dari dua skenario ini dilakukan pengujian dan analisis untuk mengetahui besar peningkatan kinerja yang didapat.

  12. arXiv FlavBit: A GAMBIT module for computing flavour observables and likelihoods

    CERN Document Server

    Bernlochner, Florian U.; Dal, Lars A.; Farmer, Ben; Jackson, Paul; Kvellestad, Anders; Mahmoudi, Farvah; Putze, Antje; Rogan, Christopher; Scott, Pat; Serra, Nicola; Weniger, Christoph; White, Martin

    2017-11-21

    Flavour physics observables are excellent probes of new physics up to very high energy scales. Here we present FlavBit, the dedicated flavour physics module of the global-fitting package GAMBIT. FlavBit includes custom implementations of various likelihood routines for a wide range of flavour observables, including detailed uncertainties and correlations associated with LHCb measurements of rare, leptonic and semileptonic decays of B and D mesons, kaons and pions. It provides a generalised interface to external theory codes such as SuperIso, allowing users to calculate flavour observables in and beyond the Standard Model, and then test them in detail against all relevant experimental data. We describe FlavBit and its constituent physics in some detail, then give examples from supersymmetry and effective field theory illustrating how it can be used both as a standalone library for flavour physics, and within GAMBIT.

  13. 10-bit rapid single flux quantum digital-to-analog converter for ac voltage standard

    International Nuclear Information System (INIS)

    Maezawa, M; Hirayama, F

    2008-01-01

    Digital-to-analog (D/A) converters based on rapid single flux quantum (RSFQ) technology are under development for ac voltage standard applications. We present design and test results on a prototype 10-bit version integrated on a single chip. The 10-bit chip includes over 6000 Josephson junctions and consumes a bias current exceeding 1 A. To reduce the effects of the high bias current on circuit operation, a custom design method was employed in part and large circuit blocks were divided into smaller ones. The 10-bit chips were fabricated and tested at low speed. The test results suggested that our design approach could manage large bias currents on the order of 1 A per chip

  14. Directed self-assembly of block copolymers for use in bit patterned media fabrication

    International Nuclear Information System (INIS)

    Griffiths, Rhys Alun; Vijayaraghavan, Aravind; Thomson, Thomas; Williams, Aled; Oakland, Chloe; Roberts, Jonathan

    2013-01-01

    Reduction of the bit size in conventional magnetic recording media is becoming increasingly difficult due to the superparamagnetic limit. Bit patterned media (BPM) has been proposed as a replacement technology as it will enable hard disk areal densities to increase past 1 Tb in −2 . Block copolymer directed self-assembly (BCP DSA) is the leading candidate for forming BPM due to its ability to create uniform patterns over macroscopic areas. Here we review the latest research into two different BCP DSA techniques: graphoepitaxy and chemoepitaxy (or chemical prepatterning). In addition to assessing their potential for forming high density bit patterns, we also review current approaches using these techniques for forming servo patterns, which are required for hard disk drive (HDD) operation. Finally, we review the current state of UV nanoimprint lithography, which is the favoured technique for enabling mass production of BPM HDDs. (topical review)

  15. Design and development of CAMAC 12 bit ADC/DAC dual purpose module

    International Nuclear Information System (INIS)

    Kulkarni, S.G.; Gore, J.A.; Ramlal, V.; Matkar, U.V.; Lokare, R.N.; Yadav, M.L.; Ekambaram, M.; Gupta, A.K.; Datar, V.M.

    2013-01-01

    A dual function CAMAC module is designed for Pelletron Accelerator which can function as 12 bit 8 channels DAC or 12 bit 16 channels ADC. Spartan 2 series of FPGA is used for implementing the CAMAC interface logic as well as logic for ADC/DAC interface. The PCB has both the ADC and DAC mounted but the module can have only one function selected due to wiring constraint. Two different VHDL programs (one for the ADC and other for the DAC) reside on the EEPROM permitting selection of any one as per the functionality required. The module is working as a 12 bit DAC at BARC-TIFR Pelletron Linac Facility, successfully. (author)

  16. Least reliable bits coding (LRBC) for high data rate satellite communications

    Science.gov (United States)

    Vanderaar, Mark; Budinger, James; Wagner, Paul

    1992-01-01

    LRBC, a bandwidth efficient multilevel/multistage block-coded modulation technique, is analyzed. LRBC uses simple multilevel component codes that provide increased error protection on increasingly unreliable modulated bits in order to maintain an overall high code rate that increases spectral efficiency. Soft-decision multistage decoding is used to make decisions on unprotected bits through corrections made on more protected bits. Analytical expressions and tight performance bounds are used to show that LRBC can achieve increased spectral efficiency and maintain equivalent or better power efficiency compared to that of BPSK. The relative simplicity of Galois field algebra vs the Viterbi algorithm and the availability of high-speed commercial VLSI for block codes indicates that LRBC using block codes is a desirable method for high data rate implementations.

  17. A Bit Stream Scalable Speech/Audio Coder Combining Enhanced Regular Pulse Excitation and Parametric Coding

    Science.gov (United States)

    Riera-Palou, Felip; den Brinker, Albertus C.

    2007-12-01

    This paper introduces a new audio and speech broadband coding technique based on the combination of a pulse excitation coder and a standardized parametric coder, namely, MPEG-4 high-quality parametric coder. After presenting a series of enhancements to regular pulse excitation (RPE) to make it suitable for the modeling of broadband signals, it is shown how pulse and parametric codings complement each other and how they can be merged to yield a layered bit stream scalable coder able to operate at different points in the quality bit rate plane. The performance of the proposed coder is evaluated in a listening test. The major result is that the extra functionality of the bit stream scalability does not come at the price of a reduced performance since the coder is competitive with standardized coders (MP3, AAC, SSC).

  18. Worst-case residual clipping noise power model for bit loading in LACO-OFDM

    KAUST Repository

    Zhang, Zhenyu

    2018-03-19

    Layered ACO-OFDM enjoys better spectral efficiency than ACO-OFDM, but its performance is challenged by residual clipping noise (RCN). In this paper, the power of RCN of LACO-OFDM is analyzed and modeled. As RCN is data-dependent, the worst-case situation is considered. A worst-case indicator is defined for relating the power of RCN and the power of noise at the receiver, wherein a linear relation is shown to be a practical approximation. An LACO-OFDM bit-loading experiment is performed to examine the proposed RCN power model for data rates of 6 to 7 Gbps. The experiment\\'s results show that accounting for RCN has two advantages. First, it leads to better bit loading and achieves up to 59% lower overall bit-error rate (BER) than when the RCN is ignored. Second, it balances the BER across layers, which is a desired property from a channel coding perspective.

  19. Image Watermarking Scheme for Specifying False Positive Probability and Bit-pattern Embedding

    Science.gov (United States)

    Sayama, Kohei; Nakamoto, Masayoshi; Muneyasu, Mitsuji; Ohno, Shuichi

    This paper treats a discrete wavelet transform(DWT)-based image watermarking with considering the false positive probability and bit-pattern embedding. We propose an iterative embedding algorithm of watermarking signals which are K sets pseudo-random numbers generated by a secret key. In the detection, K correlations between the watermarked DWT coefficients and watermark signals are computed by using the secret key. L correlations are made available for the judgment of the watermark presence with specified false positive probability, and the other K-L correlations are corresponding to the bit-pattern signal. In the experiment, we show the detection results with specified false positive probability and the bit-pattern recovery, and the comparison of the proposed method against JPEG compression, scaling down and cropping.

  20. A 12-bit 40 MS/s pipelined ADC with over 80 dB SFDR

    Energy Technology Data Exchange (ETDEWEB)

    Wei Qi; Yin Xiumei; Han Dandan; Yang Huazhong, E-mail: q-wei05@mails.tsinghua.edu.c [Department of Electronic Engineering, Tsinghua University, Beijing 100084 (China)

    2010-02-15

    This paper describes a 12-bit 40 MS/s calibration-free pipelined analog-to-digital converter (ADC), which is optimized for high spurious free dynamic range (SFDR) performance and low power dissipation. With a 4.9 MHz sine wave input, the prototype ADC implemented in a 0.18-{mu}m 1P6M CMOS process shows measured differential nonlinearity and integral nonlinearity within 0.78 and 1.32 least significant bits at the 12-bit level without any trimming or calibration. The ADC, with a total die area of 3.1 x 2.1 mm{sup 2}, demonstrates a maximum signal-to-noise distortion ratio (SNDR) and SFDR of 66.32 and 83.38 dB, respectively, at a 4.9 MHz analog input and a power consumption of 102 mW from a 1.8 V supply. (semiconductor integrated circuits)