Filtry
wszystkich: 21273
wybranych: 1045
-
Katalog
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: ZERO-ERROR CODE
-
On zero-error codes produced by greedy algorithms
PublikacjaWe present two greedy algorithms that determine zero-error codes and lower bounds on the zero-error capacity. These algorithms have many advantages, e.g., they do not store a whole product graph in a computer memory and they use the so-called distributions in all dimensions to get better approximations of the zero-error capacity. We also show an additional application of our algorithms.
-
An Approximation of the Zero Error Capacity by a Greedy Algorithm
PublikacjaWe present a greedy algorithm that determines a lower bound on the zero error capacity. The algorithm has many new advantages, e.g., it does not store a whole product graph in a computer memory and it uses the so-called distributions in all dimensions to get a better approximation of the zero error capacity. We also show an additional application of our algorithm.
-
An Approximation of the Zero Error Capacity by a Greedy Algorithm.
PublikacjaWe present a greedy algorithm that determines a lower bound on the zero error capacity. The algorithm has many new advantages, e.g., it does not store a whole product graph in a computer memory and it uses the so-called distributions in all dimensions to get a better approximation of the zero error capacity. We also show an additional application of our algorithm.
-
Noise effect on parameters of quiet sonar with code modulation
PublikacjaEarlier publications of the paper authors have shown that the use of code keying mixed with the CW FM sound signal allows the significant reduction in the distance measurement error, compared to classic silent CW FM sonar. In addition to the code modulation parameters, the magnitude of this error is influenced by the received input acoustic noise. The article shows the dependence of the input signal-to-noise ratio and the sound...
-
Unity-Gain Zero-Offset CMOS Buffer with Improved Feedforward Path
PublikacjaA voltage unity-gain zero-offset CMOS amplifier with reduced gain error and increased PSRR (power supply rejection ratio) is proposed. The amplifier uses two feed mechanisms, negative feedback and supporting positive feedforward, to achieve low deviation from unit gain over the entire input range. The circuit, designed in a standard 180-nanometer 1.8-voltage CMOS process, is compared with two known buffers of similar topology,...
-
Annihilation rates of low-energy positron scattering from simple diatomic molecules
PublikacjaWe discuss the calculations of Zeff coefficients for a series of diatomic molecules over the range of energies below the positronium formation. During the development of a general code for polyatomic, nonlinear molecules colliding with positrons, it was discovered that the earlier one, employed only for diatomic molecules, had an error. The error is corrected and the corrected results are presented here. We also discuss a way of...
-
Artificial intelligence for software development — the present and the challenges for the future
PublikacjaSince the time when first CASE (Computer-Aided Software Engineering) methods and tools were developed, little has been done in the area of automated creation of code. CASE tools support a software engineer in creation the system structure, in defining interfaces and relationships between software modules and, after the code has been written, in performing testing tasks on different levels of detail. Writing code is still the task...
-
Performance analysis of data transmission in MC-CDMA radio interface with turbo codes
PublikacjaMulti-carrier code division multiple access (MC-CDMA) technique is a combination of two radio access techniques: CDMA and orthogonal frequency division multiplexing and has the advantages of both techniques. The paper presents the design of transmitter and receiver for MC-CDMA radio interface. It also presents encoders and decoders of turbo codes which were used in simulation of the MC-CDMA technique. Two turbo codes with 8-state...
-
FIR Filter Design Using Distributed Maximal Flatness Method
PublikacjaIn the paper a novel method for filter design based on the distributed maximal flatness method is presented. The proposed approach is based on the method used to design the most common FIR fractional delay filter - the maximally flat filter. The MF filter demonstrates excellent performance but only in a relatively narrow frequency range around zero frequency but its magnitude response is no greater than one. This ,,passiveness”...
-
Critical Remarks on Landauer’s principle of erasure– dissipation: Including notes on Maxwell demons and Szilard engines
PublikacjaWe briefly address Landauer’s Principle and some related issues in thermal demons. We show that an error-free Turing computer works in the zero-entropy limit, which proves Landauer’s derivation incorrect. To have a physical logic gate, memory or information-engine, a few essential components necessary for the operation of these devices are often neglected, such as various aspects of control, damping and the fluctuation–dissipation...
-
Characterizing the Performance of <span class="sc">xor</span> Games and the Shannon Capacity of Graphs
PublikacjaIn this Letter we give a set of necessary and sufficient conditions such that quantum players of a two-party xor game cannot perform any better than classical players. With any such game, we associate a graph and examine its zero-error communication capacity. This allows us to specify a broad new class of graphs for which the Shannon capacity can be calculated. The conditions also enable the parametrization of new families of games...
-
A Parallax Shift Effect Correction Based on Cloud Height for Geostationary Satellites and Radar Observations
PublikacjaThe effect of cloud parallax shift occurs in satellite imaging, particularly for high angles of satellite observations. This study demonstrates new methods of parallax effect correction for clouds observed by geostationary satellites. The analytical method that could be found in literature, namely the Vicente et al./Koenig method, is presented at the beginning. It approximates a cloud position using an ellipsoid with semi-axes...
-
Product Graph Invariants with Applications in the Theory of Information
PublikacjaThere are a large number of graph invariants. In the paper, we consider some of them, e.g. the independence and chromatic numbers. It is well know that we cannot efficiently calculate these numbers for arbitrary graphs. In the paper we present relations between these invariants and concepts from the theory of information. Concepts such as source coding and transmission over a noisy channel with zero probability of error are modeled...
-
The performance of ETFs on developed and emerging markets with consideration of regional diversity
PublikacjaThis study evaluates the performance of Exchange-Traded Funds (ETFs) by using various tracking error calculation approaches. The aim of the paper is, on the one hand, an evaluation of the performance of ETFs relative to their benchmarking indexes and, on the other, an endeavour to specify any relationship between this performance and both geographical location and the degree of market development. The research was conducted on...
-
Synthesis of a state feedback controller for an averaging tank with variable filling
PublikacjaIn paper, a nonlinear averaging tank with variable filling is considered. The main purpose of this research work was the modelling and control system synthesis of an averaging tank. The control objectives included ensuring stability and zero steady-state error of the system and achieving settling time as short as possible, while maintaining a minimal overshoot. In order to achieve the intended purpose, firstly a mathematical model...
-
Low-Power Receivers for Wireless Capacitive Coupling Transmission in 3-D-Integrated Massively Parallel CMOS Imager
PublikacjaThe paper presents pixel receivers for massively parallel transmission of video signal between capacitive coupled integrated circuits (ICs). The receivers meet the key requirements for massively parallel transmission, namely low-power consumption below a single μW, small area of less than 205 μm2, high sensitivity better than 160 mV, and good immunity to crosstalk. The receivers were implemented and measured in a 3-D IC (two face-to-face...
-
Improving Accuracy of Respiratory Rate Estimation by Restoring High Resolution Features With Transformers and Recursive Convolutional Models
PublikacjaNon-contact evaluation of vital signs has been becoming increasingly important, especially in light of the COVID- 19 pandemic, which is causing the whole world to examine people’s interactions in public places at a scale never seen before. However, evaluating one’s vital signs can be a relatively complex procedure, which requires both time and physical contact between examiner and examinee. These re- quirements limit the number...
-
An energetic analysis of a gas turbine with regenerative heating using turbine extraction at intermediate pressure - Brayton cycle advanced according to Szewalski's idea
PublikacjaIn this paper, a modification of a simple gas turbine into the Brayton cycle with regenerative heating, using turbine extraction at intermediate pressure, is presented. The main concept of the retrofitting is based on the transfer of heat from the turbine exhaust gases to the air entering the combustion chamber. The extracted gas transfers heat to air via the divided regenerative heat exchanger and after that is compressed and...
-
On Software Unit Testing For Security and Performance Gain At Unit Level
PublikacjaPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
On Software Unit Testing For Improving Security And Performance Of Distributed Applications
PublikacjaPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...