Sample records for embedded bit string

  1. A Compression Algorithm for Field Programmable Gate Arrays in the Space Environment

    DTIC Science & Technology

    2011-12-01

    Bit 1 ,Bit 0P  . (V.3) Equation (V.3) is implemented with a string of XOR gates and Bit Basher blocks, as shown in Figure 31. As discussed in...5], the string of Bit Basher blocks are used to separate each 35-bit value into 35 one-bit values, and the string of XOR gates is used to

  2. Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos

    NASA Astrophysics Data System (ADS)

    Xu, Dawen; Wang, Rangding

    2015-05-01

    A scheme of data hiding directly in a partially encrypted version of H.264/AVC videos is proposed which includes three parts, i.e., selective encryption, data embedding and data extraction. Selective encryption is performed on context adaptive binary arithmetic coding (CABAC) bin-strings via stream ciphers. By careful selection of CABAC entropy coder syntax elements for selective encryption, the encrypted bitstream is format-compliant and has exactly the same bit rate. Then a data-hider embeds the additional data into partially encrypted H.264/AVC videos using a CABAC bin-string substitution technique without accessing the plaintext of the video content. Since bin-string substitution is carried out on those residual coefficients with approximately the same magnitude, the quality of the decrypted video is satisfactory. Video file size is strictly preserved even after data embedding. In order to adapt to different application scenarios, data extraction can be done either in the encrypted domain or in the decrypted domain. Experimental results have demonstrated the feasibility and efficiency of the proposed scheme.

  3. A Real-Time High Performance Data Compression Technique For Space Applications

    NASA Technical Reports Server (NTRS)

    Yeh, Pen-Shu; Venbrux, Jack; Bhatia, Prakash; Miller, Warner H.

    2000-01-01

    A high performance lossy data compression technique is currently being developed for space science applications under the requirement of high-speed push-broom scanning. The technique is also error-resilient in that error propagation is contained within a few scan lines. The algorithm is based on block-transform combined with bit-plane encoding; this combination results in an embedded bit string with exactly the desirable compression rate. The lossy coder is described. The compression scheme performs well on a suite of test images typical of images from spacecraft instruments. Hardware implementations are in development; a functional chip set is expected by the end of 2001.

  4. A High Performance Image Data Compression Technique for Space Applications

    NASA Technical Reports Server (NTRS)

    Yeh, Pen-Shu; Venbrux, Jack

    2003-01-01

    A highly performing image data compression technique is currently being developed for space science applications under the requirement of high-speed and pushbroom scanning. The technique is also applicable to frame based imaging data. The algorithm combines a two-dimensional transform with a bitplane encoding; this results in an embedded bit string with exact desirable compression rate specified by the user. The compression scheme performs well on a suite of test images acquired from spacecraft instruments. It can also be applied to three-dimensional data cube resulting from hyper-spectral imaging instrument. Flight qualifiable hardware implementations are in development. The implementation is being designed to compress data in excess of 20 Msampledsec and support quantization from 2 to 16 bits. This paper presents the algorithm, its applications and status of development.

  5. Visually Lossless Data Compression for Real-Time Frame/Pushbroom Space Science Imagers

    NASA Technical Reports Server (NTRS)

    Yeh, Pen-Shu; Venbrux, Jack; Bhatia, Prakash; Miller, Warner H.

    2000-01-01

    A visually lossless data compression technique is currently being developed for space science applications under the requirement of high-speed push-broom scanning. The technique is also applicable to frame based imaging and is error-resilient in that error propagation is contained within a few scan lines. The algorithm is based on a block transform of a hybrid of modulated lapped transform (MLT) and discrete cosine transform (DCT), or a 2-dimensional lapped transform, followed by bit-plane encoding; this combination results in an embedded bit string with exactly the desirable compression rate as desired by the user. The approach requires no unique table to maximize its performance. The compression scheme performs well on a suite of test images typical of images from spacecraft instruments. Flight qualified hardware implementations are in development; a functional chip set is expected by the end of 2001. The chip set is being designed to compress data in excess of 20 Msamples/sec and support quantizations from 2 to 16 bits.

  6. Fitness Probability Distribution of Bit-Flip Mutation.

    PubMed

    Chicano, Francisco; Sutton, Andrew M; Whitley, L Darrell; Alba, Enrique

    2015-01-01

    Bit-flip mutation is a common mutation operator for evolutionary algorithms applied to optimize functions over binary strings. In this paper, we develop results from the theory of landscapes and Krawtchouk polynomials to exactly compute the probability distribution of fitness values of a binary string undergoing uniform bit-flip mutation. We prove that this probability distribution can be expressed as a polynomial in p, the probability of flipping each bit. We analyze these polynomials and provide closed-form expressions for an easy linear problem (Onemax), and an NP-hard problem, MAX-SAT. We also discuss a connection of the results with runtime analysis.

  7. Computer Programming Manual for the Jovial (J73) Language

    DTIC Science & Technology

    1981-06-01

    in function is: C - BYTE("ABCDEFŕ ,2,3); The built-in function extracts "BCD" from the string "ABCDEF". ( - 9 - 1: introduction ’ Two of the built...Tabl,’ Declarations Oil -fIt Chapter 8 BLOCK DECLARATIONS A block groups items, tables, and other blocks into contiguous storage. A block also gives a...substring to be extracted starts. Length specifies the number of bits in the subetring. Bits in a bit string are numbered from left to right, beginning with

  8. Quantization of Gaussian samples at very low SNR regime in continuous variable QKD applications

    NASA Astrophysics Data System (ADS)

    Daneshgaran, Fred; Mondin, Marina

    2016-09-01

    The main problem for information reconciliation in continuous variable Quantum Key Distribution (QKD) at low Signal to Noise Ratio (SNR) is quantization and assignment of labels to the samples of the Gaussian Random Variables (RVs) observed at Alice and Bob. Trouble is that most of the samples, assuming that the Gaussian variable is zero mean which is de-facto the case, tend to have small magnitudes and are easily disturbed by noise. Transmission over longer and longer distances increases the losses corresponding to a lower effective SNR exasperating the problem. This paper looks at the quantization problem of the Gaussian samples at very low SNR regime from an information theoretic point of view. We look at the problem of two bit per sample quantization of the Gaussian RVs at Alice and Bob and derive expressions for the mutual information between the bit strings as a result of this quantization. The quantization threshold for the Most Significant Bit (MSB) should be chosen based on the maximization of the mutual information between the quantized bit strings. Furthermore, while the LSB string at Alice and Bob are balanced in a sense that their entropy is close to maximum, this is not the case for the second most significant bit even under optimal threshold. We show that with two bit quantization at SNR of -3 dB we achieve 75.8% of maximal achievable mutual information between Alice and Bob, hence, as the number of quantization bits increases beyond 2-bits, the number of additional useful bits that can be extracted for secret key generation decreases rapidly. Furthermore, the error rates between the bit strings at Alice and Bob at the same significant bit level are rather high demanding very powerful error correcting codes. While our calculations and simulation shows that the mutual information between the LSB at Alice and Bob is 0.1044 bits, that at the MSB level is only 0.035 bits. Hence, it is only by looking at the bits jointly that we are able to achieve a mutual information of 0.2217 bits which is 75.8% of maximum achievable. The implication is that only by coding both MSB and LSB jointly can we hope to get close to this 75.8% limit. Hence, non-binary codes are essential to achieve acceptable performance.

  9. LSB-based Steganography Using Reflected Gray Code for Color Quantum Images

    NASA Astrophysics Data System (ADS)

    Li, Panchi; Lu, Aiping

    2018-02-01

    At present, the classical least-significant-bit (LSB) based image steganography has been extended to quantum image processing. For the existing LSB-based quantum image steganography schemes, the embedding capacity is no more than 3 bits per pixel. Therefore, it is meaningful to study how to improve the embedding capacity of quantum image steganography. This work presents a novel LSB-based steganography using reflected Gray code for colored quantum images, and the embedding capacity of this scheme is up to 4 bits per pixel. In proposed scheme, the secret qubit sequence is considered as a sequence of 4-bit segments. For the four bits in each segment, the first bit is embedded in the second LSB of B channel of the cover image, and and the remaining three bits are embedded in LSB of RGB channels of each color pixel simultaneously using reflected-Gray code to determine the embedded bit from secret information. Following the transforming rule, the LSB of stego-image are not always same as the secret bits and the differences are up to almost 50%. Experimental results confirm that the proposed scheme shows good performance and outperforms the previous ones currently found in the literature in terms of embedding capacity.

  10. Investigation of PDC bit failure base on stick-slip vibration analysis of drilling string system plus drill bit

    NASA Astrophysics Data System (ADS)

    Huang, Zhiqiang; Xie, Dou; Xie, Bing; Zhang, Wenlin; Zhang, Fuxiao; He, Lei

    2018-03-01

    The undesired stick-slip vibration is the main source of PDC bit failure, such as tooth fracture and tooth loss. So, the study of PDC bit failure base on stick-slip vibration analysis is crucial to prolonging the service life of PDC bit and improving ROP (rate of penetration). For this purpose, a piecewise-smooth torsional model with 4-DOF (degree of freedom) of drilling string system plus PDC bit is proposed to simulate non-impact drilling. In this model, both the friction and cutting behaviors of PDC bit are innovatively introduced. The results reveal that PDC bit is easier to fail than other drilling tools due to the severer stick-slip vibration. Moreover, reducing WOB (weight on bit) and improving driving torque can effectively mitigate the stick-slip vibration of PDC bit. Therefore, PDC bit failure can be alleviated by optimizing drilling parameters. In addition, a new 4-DOF torsional model is established to simulate torsional impact drilling and the effect of torsional impact on PDC bit's stick-slip vibration is analyzed by use of an engineering example. It can be concluded that torsional impact can mitigate stick-slip vibration, prolonging the service life of PDC bit and improving drilling efficiency, which is consistent with the field experiment results.

  11. Steganography based on pixel intensity value decomposition

    NASA Astrophysics Data System (ADS)

    Abdulla, Alan Anwar; Sellahewa, Harin; Jassim, Sabah A.

    2014-05-01

    This paper focuses on steganography based on pixel intensity value decomposition. A number of existing schemes such as binary, Fibonacci, Prime, Natural, Lucas, and Catalan-Fibonacci (CF) are evaluated in terms of payload capacity and stego quality. A new technique based on a specific representation is proposed to decompose pixel intensity values into 16 (virtual) bit-planes suitable for embedding purposes. The proposed decomposition has a desirable property whereby the sum of all bit-planes does not exceed the maximum pixel intensity value, i.e. 255. Experimental results demonstrate that the proposed technique offers an effective compromise between payload capacity and stego quality of existing embedding techniques based on pixel intensity value decomposition. Its capacity is equal to that of binary and Lucas, while it offers a higher capacity than Fibonacci, Prime, Natural, and CF when the secret bits are embedded in 1st Least Significant Bit (LSB). When the secret bits are embedded in higher bit-planes, i.e., 2nd LSB to 8th Most Significant Bit (MSB), the proposed scheme has more capacity than Natural numbers based embedding. However, from the 6th bit-plane onwards, the proposed scheme offers better stego quality. In general, the proposed decomposition scheme has less effect in terms of quality on pixel value when compared to most existing pixel intensity value decomposition techniques when embedding messages in higher bit-planes.

  12. Boring apparatus capable of boring straight holes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peterson, C.R.

    The invention relates to a rock boring assembly for producing a straight hole for use in a drill string above a pilot boring bit of predetermined diameter smaller than the desired final hole size. The boring assembly comprises a small conical boring bit and a larger conical boring, the conical boring bits mounted on lower and upper ends of an enlongated spacer, respectively, and the major effective cutting diameters of each of the conical boring bits being at least 10% greater than the minor effective cutting diameter of the respective bit. The spacer has a cross-section resistant bending and spacesmore » the conical boring bits apart a distance at least 5 times the major cutting diameter of the small conical boring bit, thereby spacing the pivot points provided by the two conical boring bits to limit bodily angular deflection of the assembly and providing a substantial moment arm to resist lateral forces applied to the assembly by the pilot bit and drill string. The spacing between the conical bits is less than about 20 times the major cutting diameter of the lower conical boring bit to enable the spacer to act as a bend-resistant beam to resist angular deflection of the axis of either of the conical boring bits relative to the other when it receives uneven lateral force due to non-uniformity of cutting conditions about the circumference of the bit. Advantageously the boring bits also are self-advancing and feature skewed rollers. 7 claims.« less

  13. Effect of using different cover image quality to obtain robust selective embedding in steganography

    NASA Astrophysics Data System (ADS)

    Abdullah, Karwan Asaad; Al-Jawad, Naseer; Abdulla, Alan Anwer

    2014-05-01

    One of the common types of steganography is to conceal an image as a secret message in another image which normally called a cover image; the resulting image is called a stego image. The aim of this paper is to investigate the effect of using different cover image quality, and also analyse the use of different bit-plane in term of robustness against well-known active attacks such as gamma, statistical filters, and linear spatial filters. The secret messages are embedded in higher bit-plane, i.e. in other than Least Significant Bit (LSB), in order to resist active attacks. The embedding process is performed in three major steps: First, the embedding algorithm is selectively identifying useful areas (blocks) for embedding based on its lighting condition. Second, is to nominate the most useful blocks for embedding based on their entropy and average. Third, is to select the right bit-plane for embedding. This kind of block selection made the embedding process scatters the secret message(s) randomly around the cover image. Different tests have been performed for selecting a proper block size and this is related to the nature of the used cover image. Our proposed method suggests a suitable embedding bit-plane as well as the right blocks for the embedding. Experimental results demonstrate that different image quality used for the cover images will have an effect when the stego image is attacked by different active attacks. Although the secret messages are embedded in higher bit-plane, but they cannot be recognised visually within the stegos image.

  14. Love Kills:. Simulations in Penna Ageing Model

    NASA Astrophysics Data System (ADS)

    Stauffer, Dietrich; Cebrat, Stanisław; Penna, T. J. P.; Sousa, A. O.

    The standard Penna ageing model with sexual reproduction is enlarged by adding additional bit-strings for love: Marriage happens only if the male love strings are sufficiently different from the female ones. We simulate at what level of required difference the population dies out.

  15. Characterization of binary string statistics for syntactic landmine detection

    NASA Astrophysics Data System (ADS)

    Nasif, Ahmed O.; Mark, Brian L.; Hintz, Kenneth J.

    2011-06-01

    Syntactic landmine detection has been proposed to detect and classify non-metallic landmines using ground penetrating radar (GPR). In this approach, the GPR return is processed to extract characteristic binary strings for landmine and clutter discrimination. In our previous work, we discussed the preprocessing methodology by which the amplitude information of the GPR A-scan signal can be effectively converted into binary strings, which identify the impedance discontinuities in the signal. In this work, we study the statistical properties of the binary string space. In particular, we develop a Markov chain model to characterize the observed bit sequence of the binary strings. The state is defined as the number of consecutive zeros between two ones in the binarized A-scans. Since the strings are highly sparse (the number of zeros is much greater than the number of ones), defining the state this way leads to fewer number of states compared to the case where each bit is defined as a state. The number of total states is further reduced by quantizing the number of consecutive zeros. In order to identify the correct order of the Markov model, the mean square difference (MSD) between the transition matrices of mine strings and non-mine strings is calculated up to order four using training data. The results show that order one or two maximizes this MSD. The specification of the transition probabilities of the chain can be used to compute the likelihood of any given string. Such a model can be used to identify characteristic landmine strings during the training phase. These developments on modeling and characterizing the string statistics can potentially be part of a real-time landmine detection algorithm that identifies landmine and clutter in an adaptive fashion.

  16. Cepstral domain modification of audio signals for data embedding: preliminary results

    NASA Astrophysics Data System (ADS)

    Gopalan, Kaliappan

    2004-06-01

    A method of embedding data in an audio signal using cepstral domain modification is described. Based on successful embedding in the spectral points of perceptually masked regions in each frame of speech, first the technique was extended to embedding in the log spectral domain. This extension resulted at approximately 62 bits /s of embedding with less than 2 percent of bit error rate (BER) for a clean cover speech (from the TIMIT database), and about 2.5 percent for a noisy speech (from an air traffic controller database), when all frames - including silence and transition between voiced and unvoiced segments - were used. Bit error rate increased significantly when the log spectrum in the vicinity of a formant was modified. In the next procedure, embedding by altering the mean cepstral values of two ranges of indices was studied. Tests on both a noisy utterance and a clean utterance indicated barely noticeable perceptual change in speech quality when lower range of cepstral indices - corresponding to vocal tract region - was modified in accordance with data. With an embedding capacity of approximately 62 bits/s - using one bit per each frame regardless of frame energy or type of speech - initial results showed a BER of less than 1.5 percent for a payload capacity of 208 embedded bits using the clean cover speech. BER of less than 1.3 percent resulted for the noisy host with a capacity was 316 bits. When the cepstrum was modified in the region of excitation, BER increased to over 10 percent. With quantization causing no significant problem, the technique warrants further studies with different cepstral ranges and sizes. Pitch-synchronous cepstrum modification, for example, may be more robust to attacks. In addition, cepstrum modification in regions of speech that are perceptually masked - analogous to embedding in frequency masked regions - may yield imperceptible stego audio with low BER.

  17. Compression of multispectral Landsat imagery using the Embedded Zerotree Wavelet (EZW) algorithm

    NASA Technical Reports Server (NTRS)

    Shapiro, Jerome M.; Martucci, Stephen A.; Czigler, Martin

    1994-01-01

    The Embedded Zerotree Wavelet (EZW) algorithm has proven to be an extremely efficient and flexible compression algorithm for low bit rate image coding. The embedding algorithm attempts to order the bits in the bit stream in numerical importance and thus a given code contains all lower rate encodings of the same algorithm. Therefore, precise bit rate control is achievable and a target rate or distortion metric can be met exactly. Furthermore, the technique is fully image adaptive. An algorithm for multispectral image compression which combines the spectral redundancy removal properties of the image-dependent Karhunen-Loeve Transform (KLT) with the efficiency, controllability, and adaptivity of the embedded zerotree wavelet algorithm is presented. Results are shown which illustrate the advantage of jointly encoding spectral components using the KLT and EZW.

  18. Dynamic detection-rate-based bit allocation with genuine interval concealment for binary biometric representation.

    PubMed

    Lim, Meng-Hui; Teoh, Andrew Beng Jin; Toh, Kar-Ann

    2013-06-01

    Biometric discretization is a key component in biometric cryptographic key generation. It converts an extracted biometric feature vector into a binary string via typical steps such as segmentation of each feature element into a number of labeled intervals, mapping of each interval-captured feature element onto a binary space, and concatenation of the resulted binary output of all feature elements into a binary string. Currently, the detection rate optimized bit allocation (DROBA) scheme is one of the most effective biometric discretization schemes in terms of its capability to assign binary bits dynamically to user-specific features with respect to their discriminability. However, we learn that DROBA suffers from potential discriminative feature misdetection and underdiscretization in its bit allocation process. This paper highlights such drawbacks and improves upon DROBA based on a novel two-stage algorithm: 1) a dynamic search method to efficiently recapture such misdetected features and to optimize the bit allocation of underdiscretized features and 2) a genuine interval concealment technique to alleviate crucial information leakage resulted from the dynamic search. Improvements in classification accuracy on two popular face data sets vindicate the feasibility of our approach compared with DROBA.

  19. String theory embeddings of nonrelativistic field theories and their holographic Hořava gravity duals.

    PubMed

    Janiszewski, Stefan; Karch, Andreas

    2013-02-22

    We argue that generic nonrelativistic quantum field theories with a holographic description are dual to Hořava gravity. We construct explicit examples of this duality embedded in string theory by starting with relativistic dual pairs and taking a nonrelativistic scaling limit.

  20. Fault-Tolerant Coding for State Machines

    NASA Technical Reports Server (NTRS)

    Naegle, Stephanie Taft; Burke, Gary; Newell, Michael

    2008-01-01

    Two reliable fault-tolerant coding schemes have been proposed for state machines that are used in field-programmable gate arrays and application-specific integrated circuits to implement sequential logic functions. The schemes apply to strings of bits in state registers, which are typically implemented in practice as assemblies of flip-flop circuits. If a single-event upset (SEU, a radiation-induced change in the bit in one flip-flop) occurs in a state register, the state machine that contains the register could go into an erroneous state or could hang, by which is meant that the machine could remain in undefined states indefinitely. The proposed fault-tolerant coding schemes are intended to prevent the state machine from going into an erroneous or hang state when an SEU occurs. To ensure reliability of the state machine, the coding scheme for bits in the state register must satisfy the following criteria: 1. All possible states are defined. 2. An SEU brings the state machine to a known state. 3. There is no possibility of a hang state. 4. No false state is entered. 5. An SEU exerts no effect on the state machine. Fault-tolerant coding schemes that have been commonly used include binary encoding and "one-hot" encoding. Binary encoding is the simplest state machine encoding and satisfies criteria 1 through 3 if all possible states are defined. Binary encoding is a binary count of the state machine number in sequence; the table represents an eight-state example. In one-hot encoding, N bits are used to represent N states: All except one of the bits in a string are 0, and the position of the 1 in the string represents the state. With proper circuit design, one-hot encoding can satisfy criteria 1 through 4. Unfortunately, the requirement to use N bits to represent N states makes one-hot coding inefficient.

  1. Complex networks generated by the Penna bit-string model: Emergence of small-world and assortative mixing

    NASA Astrophysics Data System (ADS)

    Li, Chunguang; Maini, Philip K.

    2005-10-01

    The Penna bit-string model successfully encompasses many phenomena of population evolution, including inheritance, mutation, evolution, and aging. If we consider social interactions among individuals in the Penna model, the population will form a complex network. In this paper, we first modify the Verhulst factor to control only the birth rate, and introduce activity-based preferential reproduction of offspring in the Penna model. The social interactions among individuals are generated by both inheritance and activity-based preferential increase. Then we study the properties of the complex network generated by the modified Penna model. We find that the resulting complex network has a small-world effect and the assortative mixing property.

  2. Thermal stabilization of superconducting sigma strings and their drum vortons

    NASA Astrophysics Data System (ADS)

    Carter, Brandon; Brandenberger, Robert H.; Davis, Anne-Christine

    2002-05-01

    We discuss various issues related to stabilized embedded strings in a thermal background. In particular, we demonstrate that such strings will generically become superconducting at moderately low temperatures, thus enhancing their stability. We then present a new class of defects-drum vortons-which arise when a small symmetry breaking term is added to the potential. We display these points within the context of the O(4) sigma model, relevant for hadrodynamics below the QCD scale. This model admits ``embedded defects'' (topological defect configurations of a simpler-in this case O(2) symmetric-model obtained by imposing an embedding constraint) that are unstable in the full model at zero temperature, but that can be stabilized (by electromagnetic coupling to photons) in a thermal gas at moderately high termperatures. It is shown here that below the embedded defect stabilization threshold, there will still be stabilized cosmic string defects. However, they will not be of the symmetric embedded vortex type, but of an ``asymmetric'' vortex type, and are automatically superconducting. In the presence of weak symmetry breaking terms, such as arise naturally when using the O(4) model for hadrodynamics, the strings become the boundary of a new kind of cosmic sigma membrane, with tension given by the pion mass. The string current would then make it possible for a loop to attain a (classically) stable equilibrium state that differs from an ``ordinary'' vorton state by the presence of a sigma membrane stretched across it in a drum-like configuration. Such defects will however be entirely destabilized if the symmetry breaking is too strong, as is found to be the case-due to the rather large value of the pion mass-in the hadronic application of the O(4) sigma model.

  3. Modular error embedding

    DOEpatents

    Sandford, II, Maxwell T.; Handel, Theodore G.; Ettinger, J. Mark

    1999-01-01

    A method of embedding auxiliary information into the digital representation of host data containing noise in the low-order bits. The method applies to digital data representing analog signals, for example digital images. The method reduces the error introduced by other methods that replace the low-order bits with auxiliary information. By a substantially reverse process, the embedded auxiliary data can be retrieved easily by an authorized user through use of a digital key. The modular error embedding method includes a process to permute the order in which the host data values are processed. The method doubles the amount of auxiliary information that can be added to host data values, in comparison with bit-replacement methods for high bit-rate coding. The invention preserves human perception of the meaning and content of the host data, permitting the addition of auxiliary data in the amount of 50% or greater of the original host data.

  4. Novel string field theory with also negative energy constituents/objects gives Veneziano amplitude

    NASA Astrophysics Data System (ADS)

    Nielsen, H. B.; Ninomiya, M.

    2018-02-01

    We have proposed a new type of string field theory. The main point of the present article is to cure some technical troubles: missing two out three terms in Veneziano amplitude. Our novel string field theory, describes a theory with many strings in terms of "objects", which are not exactly, but close to Charles Thorn's string bits. The new point is that the objects in terms of which the universe states are constructed, and which have an essentially 26-momentum variable called J μ , can have the energy J 0 be also negative as well as positive. We get a long way in deriving in this model the Veneziano model and obtain all the three terms needed for a four point amplitude. This result strongly indicates that our novel string field theory is indeed string theory.

  5. Wavelet-Bayesian inference of cosmic strings embedded in the cosmic microwave background

    NASA Astrophysics Data System (ADS)

    McEwen, J. D.; Feeney, S. M.; Peiris, H. V.; Wiaux, Y.; Ringeval, C.; Bouchet, F. R.

    2017-12-01

    Cosmic strings are a well-motivated extension to the standard cosmological model and could induce a subdominant component in the anisotropies of the cosmic microwave background (CMB), in addition to the standard inflationary component. The detection of strings, while observationally challenging, would provide a direct probe of physics at very high-energy scales. We develop a framework for cosmic string inference from observations of the CMB made over the celestial sphere, performing a Bayesian analysis in wavelet space where the string-induced CMB component has distinct statistical properties to the standard inflationary component. Our wavelet-Bayesian framework provides a principled approach to compute the posterior distribution of the string tension Gμ and the Bayesian evidence ratio comparing the string model to the standard inflationary model. Furthermore, we present a technique to recover an estimate of any string-induced CMB map embedded in observational data. Using Planck-like simulations, we demonstrate the application of our framework and evaluate its performance. The method is sensitive to Gμ ∼ 5 × 10-7 for Nambu-Goto string simulations that include an integrated Sachs-Wolfe contribution only and do not include any recombination effects, before any parameters of the analysis are optimized. The sensitivity of the method compares favourably with other techniques applied to the same simulations.

  6. Applications of Probabilistic Combiners on Linear Feedback Shift Register Sequences

    DTIC Science & Technology

    2016-12-01

    on the resulting output strings show a drastic increase in complexity, while simultaneously passing the stringent randomness tests required by the...a three-variable function. Our tests on the resulting output strings show a drastic increase in complex- ity, while simultaneously passing the...10001101 01000010 11101001 Decryption of a message that has been encrypted using bitwise XOR is quite simple. Since each bit is its own additive inverse

  7. Self-recovery fragile watermarking algorithm based on SPHIT

    NASA Astrophysics Data System (ADS)

    Xin, Li Ping

    2015-12-01

    A fragile watermark algorithm is proposed, based on SPIHT coding, which can recover the primary image itself. The novelty of the algorithm is that it can tamper location and Self-restoration. The recovery has been very good effect. The first, utilizing the zero-tree structure, the algorithm compresses and encodes the image itself, and then gained self correlative watermark data, so as to greatly reduce the quantity of embedding watermark. Then the watermark data is encoded by error correcting code, and the check bits and watermark bits are scrambled and embedded to enhance the recovery ability. At the same time, by embedding watermark into the latter two bit place of gray level image's bit-plane code, the image after embedded watermark can gain nicer visual effect. The experiment results show that the proposed algorithm may not only detect various processing such as noise adding, cropping, and filtering, but also recover tampered image and realize blind-detection. Peak signal-to-noise ratios of the watermark image were higher than other similar algorithm. The attack capability of the algorithm was enhanced.

  8. A novel quantum steganography scheme for color images

    NASA Astrophysics Data System (ADS)

    Li, Panchi; Liu, Xiande

    In quantum image steganography, embedding capacity and security are two important issues. This paper presents a novel quantum steganography scheme using color images as cover images. First, the secret information is divided into 3-bit segments, and then each 3-bit segment is embedded into the LSB of one color pixel in the cover image according to its own value and using Gray code mapping rules. Extraction is the inverse of embedding. We designed the quantum circuits that implement the embedding and extracting process. The simulation results on a classical computer show that the proposed scheme outperforms several other existing schemes in terms of embedding capacity and security.

  9. Second quantization in bit-string physics

    NASA Technical Reports Server (NTRS)

    Noyes, H. Pierre

    1993-01-01

    Using a new fundamental theory based on bit-strings, a finite and discrete version of the solutions of the free one particle Dirac equation as segmented trajectories with steps of length h/mc along the forward and backward light cones executed at velocity +/- c are derived. Interpreting the statistical fluctuations which cause the bends in these segmented trajectories as emission and absorption of radiation, these solutions are analogous to a fermion propagator in a second quantized theory. This allows us to interpret the mass parameter in the step length as the physical mass of the free particle. The radiation in interaction with it has the usual harmonic oscillator structure of a second quantized theory. How these free particle masses can be generated gravitationally using the combinatorial hierarchy sequence (3,10,137,2(sup 127) + 136), and some of the predictive consequences are sketched.

  10. Recognition of simple visual images using a sparse distributed memory: Some implementations and experiments

    NASA Technical Reports Server (NTRS)

    Jaeckel, Louis A.

    1990-01-01

    Previously, a method was described of representing a class of simple visual images so that they could be used with a Sparse Distributed Memory (SDM). Herein, two possible implementations are described of a SDM, for which these images, suitably encoded, will serve both as addresses to the memory and as data to be stored in the memory. A key feature of both implementations is that a pattern that is represented as an unordered set with a variable number of members can be used as an address to the memory. In the 1st model, an image is encoded as a 9072 bit string to be used as a read or write address; the bit string may also be used as data to be stored in the memory. Another representation, in which an image is encoded as a 256 bit string, may be used with either model as data to be stored in the memory, but not as an address. In the 2nd model, an image is not represented as a vector of fixed length to be used as an address. Instead, a rule is given for determining which memory locations are to be activated in response to an encoded image. This activation rule treats the pieces of an image as an unordered set. With this model, the memory can be simulated, based on a method of computing the approximate result of a read operation.

  11. A review on "A Novel Technique for Image Steganography Based on Block-DCT and Huffman Encoding"

    NASA Astrophysics Data System (ADS)

    Das, Rig; Tuithung, Themrichon

    2013-03-01

    This paper reviews the embedding and extraction algorithm proposed by "A. Nag, S. Biswas, D. Sarkar and P. P. Sarkar" on "A Novel Technique for Image Steganography based on Block-DCT and Huffman Encoding" in "International Journal of Computer Science and Information Technology, Volume 2, Number 3, June 2010" [3] and shows that the Extraction of Secret Image is Not Possible for the algorithm proposed in [3]. 8 bit Cover Image of size is divided into non joint blocks and a two dimensional Discrete Cosine Transformation (2-D DCT) is performed on each of the blocks. Huffman Encoding is performed on an 8 bit Secret Image of size and each bit of the Huffman Encoded Bit Stream is embedded in the frequency domain by altering the LSB of the DCT coefficients of Cover Image blocks. The Huffman Encoded Bit Stream and Huffman Table

  12. Steganography Detection Using Entropy Measures

    DTIC Science & Technology

    2012-08-19

    embedded steganography . For this research freely available software for embedding hidden messages will be used to create sample image files to... LSB ) is a simple approach to modify an image , while at the same time, making the change imperceptible to the human eye. By considering the redundant...to 00001110, we have applied the least significant bit technique. 2.4 Significant Bit Image Depiction Steganography fails to comply in its purpose, at

  13. Dynamics of a distributed drill string system: Characteristic parameters and stability maps

    NASA Astrophysics Data System (ADS)

    Aarsnes, Ulf Jakob F.; van de Wouw, Nathan

    2018-03-01

    This paper involves the dynamic (stability) analysis of distributed drill-string systems. A minimal set of parameters characterizing the linearized, axial-torsional dynamics of a distributed drill string coupled through the bit-rock interaction is derived. This is found to correspond to five parameters for a simple drill string and eight parameters for a two-sectioned drill-string (e.g., corresponding to the pipe and collar sections of a drilling system). These dynamic characterizations are used to plot the inverse gain margin of the system, parametrized in the non-dimensional parameters, effectively creating a stability map covering the full range of realistic physical parameters. This analysis reveals a complex spectrum of dynamics not evident in stability analysis with lumped models, thus indicating the importance of analysis using distributed models. Moreover, it reveals trends concerning stability properties depending on key system parameters useful in the context of system and control design aiming at the mitigation of vibrations.

  14. Finite temperature corrections and embedded strings in noncommutative geometry and the standard model with neutrino mixing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Martins, R. A.

    The recent extension of the standard model to include massive neutrinos in the framework of noncommutative geometry and the spectral action principle involves new scalar fields and their interactions with the usual complex scalar doublet. After ensuring that they bring no unphysical consequences, we address the question of how these fields affect the physics predicted in the Weinberg-Salam theory, particularly in the context of the electroweak phase transition. Applying the Dolan-Jackiw procedure, we calculate the finite temperature corrections, and find that the phase transition is first order. The new scalar interactions significantly improve the stability of the electroweak Z string,more » through the 'bag' phenomenon described by Vachaspati and Watkins ['Bound states can stabilize electroweak strings', Phys. Lett. B 318, 163-168 (1993)]. (Recently, cosmic strings have climbed back into interest due to a new evidence.) Sourced by static embedded strings, an internal space analogy of Cartan's torsion is drawn, and a possible Higgs-force-like 'gravitational' effect of this nonpropagating torsion on the fermion masses is described. We also check that the field generating the Majorana mass for the {nu}{sub R} is nonzero in the physical vacuum.« less

  15. Evolutionary model with genetics, aging, and knowledge

    NASA Astrophysics Data System (ADS)

    Bustillos, Armando Ticona; de Oliveira, Paulo Murilo

    2004-02-01

    We represent a process of learning by using bit strings, where 1 bits represent the knowledge acquired by individuals. Two ways of learning are considered: individual learning by trial and error, and social learning by copying knowledge from other individuals or from parents in the case of species with parental care. The age-structured bit string allows us to study how knowledge is accumulated during life and its influence over the genetic pool of a population after many generations. We use the Penna model to represent the genetic inheritance of each individual. In order to study how the accumulated knowledge influences the survival process, we include it to help individuals to avoid the various death situations. Modifications in the Verhulst factor do not show any special feature due to its random nature. However, by adding years to life as a function of the accumulated knowledge, we observe an improvement of the survival rates while the genetic fitness of the population becomes worse. In this latter case, knowledge becomes more important in the last years of life where individuals are threatened by diseases. Effects of offspring overprotection and differences between individual and social learning can also be observed. Sexual selection as a function of knowledge shows some effects when fidelity is imposed.

  16. Uncertain decision tree inductive inference

    NASA Astrophysics Data System (ADS)

    Zarban, L.; Jafari, S.; Fakhrahmad, S. M.

    2011-10-01

    Induction is the process of reasoning in which general rules are formulated based on limited observations of recurring phenomenal patterns. Decision tree learning is one of the most widely used and practical inductive methods, which represents the results in a tree scheme. Various decision tree algorithms have already been proposed such as CLS, ID3, Assistant C4.5, REPTree and Random Tree. These algorithms suffer from some major shortcomings. In this article, after discussing the main limitations of the existing methods, we introduce a new decision tree induction algorithm, which overcomes all the problems existing in its counterparts. The new method uses bit strings and maintains important information on them. This use of bit strings and logical operation on them causes high speed during the induction process. Therefore, it has several important features: it deals with inconsistencies in data, avoids overfitting and handles uncertainty. We also illustrate more advantages and the new features of the proposed method. The experimental results show the effectiveness of the method in comparison with other methods existing in the literature.

  17. A study of electro-osmosis as applied to drilling engineering

    NASA Astrophysics Data System (ADS)

    Hariharan, Peringandoor Raman

    In the present research project. the application of the process of electro-osmosis has been extended to a variety of rocks during the drilling operation. Electro-osmosis has been utilized extensively to examine its influence in reducing (i) bit balling, (ii) coefficient of friction between rock and metal and (iii) bit/tool wear. An attempt has been made to extend the envelope of confidence in which electro-osmosis was found to be operating satisfactorily. For all the above cases the current requirements during electro-osmosis were identified and were recorded. A novel test method providing repeatable results has been developed to study the problem of bit balling in the laboratory through the design of a special metallic bob simulating the drill bit. A numerical parameter described as the Degree-of-Balling (DOB) defined by the amount of cuttings stuck per unit volume of rock cut for the same duration of time is being proposed as a means to quantitatively describe the balling process in the laboratory. Five different types of shales (Pierre I & II, Catoosa, Mancos and Wellington) were compared and evaluated for balling characteristics and to determine the best conditions for reducing bit balling with electro-osmosis in a variety of drilling fluids including fresh water, polymer solutions and field type drilling fluids. Through the design, fabrication and performing of experiments conducted with a model Bottom Hole Assembly (BHA). the feasibility of maintaining the drill bit separately at a negative potential and causing the current to flow through the rock back into the string through a near bit stabilizer has been demonstrated. Experiments conducted with this self contained arrangement for the application of electro-osmosis have demonstrated a substantial decrease in balling and increase in the rate of penetration (ROP) while drilling with both a roller cone and PDC microbit (1-1/4" dia.) in Pierre I and Wellington shales. It is believed that the results obtained from the model BHA will aid in scaling up to a full-scale prototype BHA for possible application in the field. Experiments conducted with electro-osmosis in a simulated drill string under loaded conditions have clearly demonstrated that the coefficient of friction (mu) can be reduced at the interface of a rotating cylinder (simulating the drill-pipe) and a rock (usually a type of shale), through electro-osmosis. Studies examined the influence of many variables such as drilling fluid, rock type, and current on mu. The need for the correct estimation of mu is for reliable correlation between values obtained in the laboratory with those observed in the field. The knowledge of the coefficient of friction (mu) is an important requirement for drill string design and well trajectory planning. The use of electro-osmosis in reducing bit/tool wear through experiments in various rocks utilizing a specially designed steel bob simulating the drill bit has clearly indicated a decreased average tool wear, varying from 35% in Pierre I shale up to 57% in sandstone when used with the tool maintained at a cathodic DC potential. (Abstract shortened by UMI.)

  18. Fuel management optimization using genetic algorithms and expert knowledge

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    DeChaine, M.D.; Feltus, M.A.

    1996-09-01

    The CIGARO fuel management optimization code based on genetic algorithms is described and tested. The test problem optimized the core lifetime for a pressurized water reactor with a penalty function constraint on the peak normalized power. A bit-string genotype encoded the loading patterns, and genotype bias was reduced with additional bits. Expert knowledge about fuel management was incorporated into the genetic algorithm. Regional crossover exchanged physically adjacent fuel assemblies and improved the optimization slightly. Biasing the initial population toward a known priority table significantly improved the optimization.

  19. Transport implementation of the Bernstein-Vazirani algorithm with ion qubits

    NASA Astrophysics Data System (ADS)

    Fallek, S. D.; Herold, C. D.; McMahon, B. J.; Maller, K. M.; Brown, K. R.; Amini, J. M.

    2016-08-01

    Using trapped ion quantum bits in a scalable microfabricated surface trap, we perform the Bernstein-Vazirani algorithm. Our architecture takes advantage of the ion transport capabilities of such a trap. The algorithm is demonstrated using two- and three-ion chains. For three ions, an improvement is achieved compared to a classical system using the same number of oracle queries. For two ions and one query, we correctly determine an unknown bit string with probability 97.6(8)%. For three ions, we succeed with probability 80.9(3)%.

  20. Detection of LSB+/-1 steganography based on co-occurrence matrix and bit plane clipping

    NASA Astrophysics Data System (ADS)

    Abolghasemi, Mojtaba; Aghaeinia, Hassan; Faez, Karim; Mehrabi, Mohammad Ali

    2010-01-01

    Spatial LSB+/-1 steganography changes smooth characteristics between adjoining pixels of the raw image. We present a novel steganalysis method for LSB+/-1 steganography based on feature vectors derived from the co-occurrence matrix in the spatial domain. We investigate how LSB+/-1 steganography affects the bit planes of an image and show that it changes more least significant bit (LSB) planes of it. The co-occurrence matrix is derived from an image in which some of its most significant bit planes are clipped. By this preprocessing, in addition to reducing the dimensions of the feature vector, the effects of embedding were also preserved. We compute the co-occurrence matrix in different directions and with different dependency and use the elements of the resulting co-occurrence matrix as features. This method is sensitive to the data embedding process. We use a Fisher linear discrimination (FLD) classifier and test our algorithm on different databases and embedding rates. We compare our scheme with the current LSB+/-1 steganalysis methods. It is shown that the proposed scheme outperforms the state-of-the-art methods in detecting the LSB+/-1 steganographic method for grayscale images.

  1. Wireline system for multiple direct push tool usage

    DOEpatents

    Bratton, Wesley L.; Farrington, Stephen P.; Shinn, II, James D.; Nolet, Darren C.

    2003-11-11

    A tool latching and retrieval system allows the deployment and retrieval of a variety of direct push subsurface characterization tools through an embedded rod string during a single penetration without requiring withdrawal of the string from the ground. This enables the in situ interchange of different tools, as well as the rapid retrieval of soil core samples from multiple depths during a single direct push penetration. The system includes specialized rods that make up the rod string, a tool housing which is integral to the rod string, a lock assembly, and several tools which mate to the lock assembly.

  2. Frequent statistics of link-layer bit stream data based on AC-IM algorithm

    NASA Astrophysics Data System (ADS)

    Cao, Chenghong; Lei, Yingke; Xu, Yiming

    2017-08-01

    At present, there are many relevant researches on data processing using classical pattern matching and its improved algorithm, but few researches on statistical data of link-layer bit stream. This paper adopts a frequent statistical method of link-layer bit stream data based on AC-IM algorithm for classical multi-pattern matching algorithms such as AC algorithm has high computational complexity, low efficiency and it cannot be applied to binary bit stream data. The method's maximum jump distance of the mode tree is length of the shortest mode string plus 3 in case of no missing? In this paper, theoretical analysis is made on the principle of algorithm construction firstly, and then the experimental results show that the algorithm can adapt to the binary bit stream data environment and extract the frequent sequence more accurately, the effect is obvious. Meanwhile, comparing with the classical AC algorithm and other improved algorithms, AC-IM algorithm has a greater maximum jump distance and less time-consuming.

  3. Efficient and universal quantum key distribution based on chaos and middleware

    NASA Astrophysics Data System (ADS)

    Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun

    2017-01-01

    Quantum key distribution (QKD) promises unconditionally secure communications, however, the low bit rate of QKD cannot meet the requirements of high-speed applications. Despite the many solutions that have been proposed in recent years, they are neither efficient to generate the secret keys nor compatible with other QKD systems. This paper, based on chaotic cryptography and middleware technology, proposes an efficient and universal QKD protocol that can be directly deployed on top of any existing QKD system without modifying the underlying QKD protocol and optical platform. It initially takes the bit string generated by the QKD system as input, periodically updates the chaotic system, and efficiently outputs the bit sequences. Theoretical analysis and simulation results demonstrate that our protocol can efficiently increase the bit rate of the QKD system as well as securely generate bit sequences with perfect statistical properties. Compared with the existing methods, our protocol is more efficient and universal, it can be rapidly deployed on the QKD system to increase the bit rate when the QKD system becomes the bottleneck of its communication system.

  4. SETI-EC: SETI Encryption Code

    NASA Astrophysics Data System (ADS)

    Heller, René

    2018-03-01

    The SETI Encryption code, written in Python, creates a message for use in testing the decryptability of a simulated incoming interstellar message. The code uses images in a portable bit map (PBM) format, then writes the corresponding bits into the message, and finally returns both a PBM image and a text (TXT) file of the entire message. The natural constants (c, G, h) and the wavelength of the message are defined in the first few lines of the code, followed by the reading of the input files and their conversion into 757 strings of 359 bits to give one page. Each header of a page, i.e. the little-endian binary code translation of the tempo-spatial yardstick, is calculated and written on-the-fly for each page.

  5. High capacity reversible watermarking for audio by histogram shifting and predicted error expansion.

    PubMed

    Wang, Fei; Xie, Zhaoxin; Chen, Zuo

    2014-01-01

    Being reversible, the watermarking information embedded in audio signals can be extracted while the original audio data can achieve lossless recovery. Currently, the few reversible audio watermarking algorithms are confronted with following problems: relatively low SNR (signal-to-noise) of embedded audio; a large amount of auxiliary embedded location information; and the absence of accurate capacity control capability. In this paper, we present a novel reversible audio watermarking scheme based on improved prediction error expansion and histogram shifting. First, we use differential evolution algorithm to optimize prediction coefficients and then apply prediction error expansion to output stego data. Second, in order to reduce location map bits length, we introduced histogram shifting scheme. Meanwhile, the prediction error modification threshold according to a given embedding capacity can be computed by our proposed scheme. Experiments show that this algorithm improves the SNR of embedded audio signals and embedding capacity, drastically reduces location map bits length, and enhances capacity control capability.

  6. Digital watermarking for color images in hue-saturation-value color space

    NASA Astrophysics Data System (ADS)

    Tachaphetpiboon, Suwat; Thongkor, Kharittha; Amornraksa, Thumrongrat; Delp, Edward J.

    2014-05-01

    This paper proposes a new watermarking scheme for color images, in which all pixels of the image are used for embedding watermark bits in order to achieve the highest amount of embedding. For watermark embedding, the S component in the hue-saturation-value (HSV) color space is used to carry the watermark bits, while the V component is used in accordance with a human visual system model to determine the proper watermark strength. In the proposed scheme, the number of watermark bits equals the number of pixels in the host image. Watermark extraction is accomplished blindly based on the use of a 3×3 spatial domain Wiener filter. The efficiency of our proposed image watermarking scheme depends mainly on the accuracy of the estimate of the original S component. The experimental results show that the performance of the proposed scheme, under no attacks and against various types of attacks, was superior to the previous existing watermarking schemes.

  7. Audio Steganography with Embedded Text

    NASA Astrophysics Data System (ADS)

    Teck Jian, Chua; Chai Wen, Chuah; Rahman, Nurul Hidayah Binti Ab.; Hamid, Isredza Rahmi Binti A.

    2017-08-01

    Audio steganography is about hiding the secret message into the audio. It is a technique uses to secure the transmission of secret information or hide their existence. It also may provide confidentiality to secret message if the message is encrypted. To date most of the steganography software such as Mp3Stego and DeepSound use block cipher such as Advanced Encryption Standard or Data Encryption Standard to encrypt the secret message. It is a good practice for security. However, the encrypted message may become too long to embed in audio and cause distortion of cover audio if the secret message is too long. Hence, there is a need to encrypt the message with stream cipher before embedding the message into the audio. This is because stream cipher provides bit by bit encryption meanwhile block cipher provide a fixed length of bits encryption which result a longer output compare to stream cipher. Hence, an audio steganography with embedding text with Rivest Cipher 4 encryption cipher is design, develop and test in this project.

  8. A novel attack method about double-random-phase-encoding-based image hiding method

    NASA Astrophysics Data System (ADS)

    Xu, Hongsheng; Xiao, Zhijun; Zhu, Xianchen

    2018-03-01

    By using optical image processing techniques, a novel text encryption and hiding method applied by double-random phase-encoding technique is proposed in the paper. The first step is that the secret message is transformed into a 2-dimension array. The higher bits of the elements in the array are used to fill with the bit stream of the secret text, while the lower bits are stored specific values. Then, the transformed array is encoded by double random phase encoding technique. Last, the encoded array is embedded on a public host image to obtain the image embedded with hidden text. The performance of the proposed technique is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient.

  9. Robust High-Capacity Audio Watermarking Based on FFT Amplitude Modification

    NASA Astrophysics Data System (ADS)

    Fallahpour, Mehdi; Megías, David

    This paper proposes a novel robust audio watermarking algorithm to embed data and extract it in a bit-exact manner based on changing the magnitudes of the FFT spectrum. The key point is selecting a frequency band for embedding based on the comparison between the original and the MP3 compressed/decompressed signal and on a suitable scaling factor. The experimental results show that the method has a very high capacity (about 5kbps), without significant perceptual distortion (ODG about -0.25) and provides robustness against common audio signal processing such as added noise, filtering and MPEG compression (MP3). Furthermore, the proposed method has a larger capacity (number of embedded bits to number of host bits rate) than recent image data hiding methods.

  10. Origin of gauge invariance in string theory

    NASA Technical Reports Server (NTRS)

    Horowitz, G. T.; Strominger, A.

    1986-01-01

    A first quantization of the space-time embedding Chi exp mu and the world-sheet metric rho of the open bosonic string. The world-sheet metric rho decouples from S-matrix elements in 26 dimensions. This formulation of the theory naturally includes 26-dimensional gauge transformations. The gauge invariance of S-matrix elements is a direct consequence of the decoupling of rho. Second quantization leads to a string field Phi(Chi exp mu, rho) with a gauge-covariant equation of motion.

  11. Dynamical properties of the Penna aging model applied to the population of wolves

    NASA Astrophysics Data System (ADS)

    Makowiec, Danuta

    1997-02-01

    The parameters of th Penna bit-string model of aging of biological systems are systematically tested to better understand the model itself as well as the results arising from applying this model to studies of the development of the stationary population of Alaska wolves.

  12. Tunable Digital Metamaterial for Broadband Vibration Isolation at Low Frequency.

    PubMed

    Wang, Ziwei; Zhang, Quan; Zhang, Kai; Hu, Gengkai

    2016-11-01

    A 3D-printed digital metamaterial embedded with electromagnets is fabricated. Switching electromagnets between the attaching (1 bit) and detaching (0 bit) modes activates different waveguides in the metamaterial. The underlying mechanism is investigated theoretically and experimentally. The hierarchical assemblies of unit cells, mimicking digital bits, allow programmable broadening of the bandgap of the metamaterial. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  13. High-velocity frictional strength across the Tohoku-Oki megathrust determined from surface drilling torque

    NASA Astrophysics Data System (ADS)

    Ujiie, K.; Inoue, T.; Ishiwata, J.

    2015-12-01

    Frictional strength at seismic slip rates is a key to evaluate fault weakening and rupture propagation during earthquakes. The Japan Trench First Drilling Project (JFAST) drilled through the shallow plate-boundary thrust, where huge displacements of ~50 m occurred during the 2011 Tohoku-Oki earthquake. To determine the downhole frictional strength at drilled site (Site C0019), we analyzed surface drilling data. The equivalent slip rate estimated from the rotation rate and inner and outer radiuses of the drill bit ranges from 0.8 to 1.3 m/s. The measured torque includes the frictional torque between the drilling string and borehole wall, the viscous torque between the drilling string and seawater/drilling fluid, and the drilling torque between the drill bit and sediments. We subtracted the former two from the measured torque using the torque data during bottom-up rotating operations at several depths. Then, the shear stress was calculated from the drilling torque taking the configuration of the drill bit into consideration. The normal stress was estimated from the weight on bit data and the projected area of the drill bit. Assuming negligible cohesion, the frictional strength was obtained by dividing shear stress by normal stress. The results show a clear contrast in high-velocity frictional strength across the plate-boundary thrust: the friction coefficient of frontal prism sediments (hemipelagic mudstones) in hanging wall is 0.1-0.2, while that in subducting sediments (hemipelagic to pelagic mudstones and chert) in footwall increases to 0.2-0.4. The friction coefficient of smectite-rich pelagic clay in the plate-boundary thrust is ~0.1, which is consistent with that obtained from high-velocity (1.3 m/s) friction experiments and temperature measurements. We conclude that surface drilling torque provides useful data to obtain a continuous downhole frictional strength.

  14. How Good Is Good Enough?

    ERIC Educational Resources Information Center

    Wiggins, Grant

    2014-01-01

    Education has a long-standing practice of turning worthwhile learning goals into lists of bits. One might even say that this practice is the original sin in curriculum design: take a complex whole, divide it into small pieces, string those together in a rigid sequence of instruction and testing, and call completion of this sequence…

  15. Universal Noiseless Coding Subroutines

    NASA Technical Reports Server (NTRS)

    Schlutsmeyer, A. P.; Rice, R. F.

    1986-01-01

    Software package consists of FORTRAN subroutines that perform universal noiseless coding and decoding of integer and binary data strings. Purpose of this type of coding to achieve data compression in sense that coded data represents original data perfectly (noiselessly) while taking fewer bits to do so. Routines universal because they apply to virtually any "real-world" data source.

  16. Merging of multi-string BWTs with applications

    PubMed Central

    Holt, James; McMillan, Leonard

    2014-01-01

    Motivation: The throughput of genomic sequencing has increased to the point that is overrunning the rate of downstream analysis. This, along with the desire to revisit old data, has led to a situation where large quantities of raw, and nearly impenetrable, sequence data are rapidly filling the hard drives of modern biology labs. These datasets can be compressed via a multi-string variant of the Burrows–Wheeler Transform (BWT), which provides the side benefit of searches for arbitrary k-mers within the raw data as well as the ability to reconstitute arbitrary reads as needed. We propose a method for merging such datasets for both increased compression and downstream analysis. Results: We present a novel algorithm that merges multi-string BWTs in O(LCS×N) time where LCS is the length of their longest common substring between any of the inputs, and N is the total length of all inputs combined (number of symbols) using O(N×log2(F)) bits where F is the number of multi-string BWTs merged. This merged multi-string BWT is also shown to have a higher compressibility compared with the input multi-string BWTs separately. Additionally, we explore some uses of a merged multi-string BWT for bioinformatics applications. Availability and implementation: The MSBWT package is available through PyPI with source code located at https://code.google.com/p/msbwt/. Contact: holtjma@cs.unc.edu PMID:25172922

  17. Realisation and robustness evaluation of a blind spatial domain watermarking technique

    NASA Astrophysics Data System (ADS)

    Parah, Shabir A.; Sheikh, Javaid A.; Assad, Umer I.; Bhat, Ghulam M.

    2017-04-01

    A blind digital image watermarking scheme based on spatial domain is presented and investigated in this paper. The watermark has been embedded in intermediate significant bit planes besides the least significant bit plane at the address locations determined by pseudorandom address vector (PAV). The watermark embedding using PAV makes it difficult for an adversary to locate the watermark and hence adds to security of the system. The scheme has been evaluated to ascertain the spatial locations that are robust to various image processing and geometric attacks JPEG compression, additive white Gaussian noise, salt and pepper noise, filtering and rotation. The experimental results obtained, reveal an interesting fact, that, for all the above mentioned attacks, other than rotation, higher the bit plane in which watermark is embedded more robust the system. Further, the perceptual quality of the watermarked images obtained in the proposed system has been compared with some state-of-art watermarking techniques. The proposed technique outperforms the techniques under comparison, even if compared with the worst case peak signal-to-noise ratio obtained in our scheme.

  18. Embedding intensity image into a binary hologram with strong noise resistant capability

    NASA Astrophysics Data System (ADS)

    Zhuang, Zhaoyong; Jiao, Shuming; Zou, Wenbin; Li, Xia

    2017-11-01

    A digital hologram can be employed as a host image for image watermarking applications to protect information security. Past research demonstrates that a gray level intensity image can be embedded into a binary Fresnel hologram by error diffusion method or bit truncation coding method. However, the fidelity of the retrieved watermark image from binary hologram is generally not satisfactory, especially when the binary hologram is contaminated with noise. To address this problem, we propose a JPEG-BCH encoding method in this paper. First, we employ the JPEG standard to compress the intensity image into a binary bit stream. Next, we encode the binary bit stream with BCH code to obtain error correction capability. Finally, the JPEG-BCH code is embedded into the binary hologram. By this way, the intensity image can be retrieved with high fidelity by a BCH-JPEG decoder even if the binary hologram suffers from serious noise contamination. Numerical simulation results show that the image quality of retrieved intensity image with our proposed method is superior to the state-of-the-art work reported.

  19. System and method for damping vibration in a drill string

    DOEpatents

    Wassell, Mark Ellsworth [Kingwood, TX; Turner, William Evans [Durham, CT; Burgess, Daniel E [Middletown, CT; Perry, Carl Allison [Middletown, CT

    2007-05-22

    A system for damping vibration in a drill string can include a valve assembly having a supply of a fluid, a first member, and a second member capable of moving in relation to first member in response to vibration of the drill bit. The first and second members define a first and a second chamber for holding the fluid. Fluid can flow between the first and second chambers in response to the movement of the second member in relation to the first member. The valve assembly can also include a coil or a valve for varying a resistance of the fluid to flow between the first and second chambers.

  20. System and method for damping vibration in a drill string

    DOEpatents

    Wassell, Mark Ellsworth [Kingwood, TX; Turner, William Evans [Durham, CT; Burgess, Daniel E [Middletown, CT; Perry, Carl Allison [Middletown, CT

    2008-05-27

    A system for damping vibration in a drill string can include a valve assembly having a supply of a fluid, a first member, and a second member capable of moving in relation to first member in response to vibration of the drill bit. The first and second members define a first and a second chamber for holding the fluid. Fluid can flow between the first and second chambers in response to the movement of the second member in relation to the first member. The valve assembly can also include a coil or a valve for varying a resistance of the fluid to flow between the first and second chambers.

  1. System and method for damping vibration in a drill string

    DOEpatents

    Wassell, Mark Ellsworth; Turner, William Evans; Burgess, Daniel E.; Perry, Carl Allison

    2012-08-14

    A system for damping vibration in a drill string can include a valve assembly having a supply of a fluid, a first member, and a second member capable of moving in relation to first member in response to vibration of the drill bit. The first and second members define a first and a second chamber for holding the fluid. Fluid can flow between the first and second chambers in response to the movement of the second member in relation to the first member. The valve assembly can also include a coil or a valve for varying a resistance of the fluid to flow between the first and second chambers.

  2. System and method for damping vibration in a drill string

    DOEpatents

    Wassell, Mark Ellsworth; Turner, William Evans; Burgess, Daniel E; Perry, Carl Allison

    2014-03-04

    A system for damping vibration in a drill string can include a valve assembly having a supply of a fluid, a first member, and a second member capable of moving in relation to first member in response to vibration of the drill bit. The first and second members define a first and a second chamber for holding the fluid. Fluid can flow between the first and second chambers in response to the movement of the second member in relation to the first member. The valve assembly can also include a coil or a valve for varying a resistance of the fluid to flow between the first and second chambers.

  3. System and method for damping vibration in a drill string

    DOEpatents

    Wassell, Mark Ellsworth [Kingwood, TX; Turner, William Evans [Durham, CT; Burgess, Daniel E [Middletown, CT; Perry, Carl Allison [Middletown, CT

    2011-08-16

    A system for damping vibration in a drill string can include a valve assembly having a supply of a fluid, a first member, and a second member capable of moving in relation to first member in response to vibration of the drill bit. The first and second members define a first and a second chamber for holding the fluid. Fluid can flow between the first and second chambers in response to the movement of the second member in relation to the first member. The valve assembly can also include a coil or a valve for varying a resistance of the fluid to flow between the first and second chambers.

  4. System and method for damping vibration in a drill string

    DOEpatents

    Wassell, Mark Ellsworth; Turner, William Evans; Burgess, Daniel E; Perry, Carl Allison

    2015-02-03

    A system for damping vibration in a drill string can include a valve assembly having a supply of a fluid, a first member, and a second member capable of moving in relation to first member in response to vibration of the drill bit. The first and second members define a first and a second chamber for holding the fluid. Fluid can flow between the first and second chambers in response to the movement of the second member in relation to the first member. The valve assembly can also include a coil or a valve for varying a resistance of the fluid to flow between the first and second chambers.

  5. A Telescopic Binary Learning Machine for Training Neural Networks.

    PubMed

    Brunato, Mauro; Battiti, Roberto

    2017-03-01

    This paper proposes a new algorithm based on multiscale stochastic local search with binary representation for training neural networks [binary learning machine (BLM)]. We study the effects of neighborhood evaluation strategies, the effect of the number of bits per weight and that of the maximum weight range used for mapping binary strings to real values. Following this preliminary investigation, we propose a telescopic multiscale version of local search, where the number of bits is increased in an adaptive manner, leading to a faster search and to local minima of better quality. An analysis related to adapting the number of bits in a dynamic way is presented. The control on the number of bits, which happens in a natural manner in the proposed method, is effective to increase the generalization performance. The learning dynamics are discussed and validated on a highly nonlinear artificial problem and on real-world tasks in many application domains; BLM is finally applied to a problem requiring either feedforward or recurrent architectures for feedback control.

  6. Ultra-fast quantum randomness generation by accelerated phase diffusion in a pulsed laser diode.

    PubMed

    Abellán, C; Amaya, W; Jofre, M; Curty, M; Acín, A; Capmany, J; Pruneri, V; Mitchell, M W

    2014-01-27

    We demonstrate a high bit-rate quantum random number generator by interferometric detection of phase diffusion in a gain-switched DFB laser diode. Gain switching at few-GHz frequencies produces a train of bright pulses with nearly equal amplitudes and random phases. An unbalanced Mach-Zehnder interferometer is used to interfere subsequent pulses and thereby generate strong random-amplitude pulses, which are detected and digitized to produce a high-rate random bit string. Using established models of semiconductor laser field dynamics, we predict a regime of high visibility interference and nearly complete vacuum-fluctuation-induced phase diffusion between pulses. These are confirmed by measurement of pulse power statistics at the output of the interferometer. Using a 5.825 GHz excitation rate and 14-bit digitization, we observe 43 Gbps quantum randomness generation.

  7. Syllabic Strategy as Opposed to Coda Optimization in the Segmentation of Spanish Letter-Strings Using Word Spotting

    ERIC Educational Resources Information Center

    Álvarez, Carlos J.; Taft, Marcus; Hernández-Cabrera, Juan A.

    2017-01-01

    A word-spotting task is used in Spanish to test the way in which polysyllabic letter-strings are parsed in this language. Monosyllabic words (e.g., "bar") embedded at the beginning of a pseudoword were immediately followed by either a coda-forming consonant (e.g., "barto") or a vowel (e.g., "baros"). In the former…

  8. What's so Bad about Being "Professorial"?

    ERIC Educational Resources Information Center

    Vaidhyanathan, Siva

    2008-01-01

    CNN commentator Bill Bennett's invocation of "professorial" was the latest among a string of comments about Barack Obama, who used to teach constitutional law at the University of Chicago. On September 13, the "New York Times" columnist Thomas L. Friedman wrote, "Obama may be a bit professorial, but at least he is trying to unite the country to…

  9. Steganography -- The New Intelligence Threat

    DTIC Science & Technology

    2004-01-01

    Information can be embedded within text files, digital music and videos, and digital photographs by simply changing bits and bytes. HOW IT WORKS...International Airport could be embedded in Brittany Spears’ latest music release in MP3 format. The wide range of steganography capabilities has been

  10. Accelerating String Set Matching in FPGA Hardware for Bioinformatics Research

    PubMed Central

    Dandass, Yoginder S; Burgess, Shane C; Lawrence, Mark; Bridges, Susan M

    2008-01-01

    Background This paper describes techniques for accelerating the performance of the string set matching problem with particular emphasis on applications in computational proteomics. The process of matching peptide sequences against a genome translated in six reading frames is part of a proteogenomic mapping pipeline that is used as a case-study. The Aho-Corasick algorithm is adapted for execution in field programmable gate array (FPGA) devices in a manner that optimizes space and performance. In this approach, the traditional Aho-Corasick finite state machine (FSM) is split into smaller FSMs, operating in parallel, each of which matches up to 20 peptides in the input translated genome. Each of the smaller FSMs is further divided into five simpler FSMs such that each simple FSM operates on a single bit position in the input (five bits are sufficient for representing all amino acids and special symbols in protein sequences). Results This bit-split organization of the Aho-Corasick implementation enables efficient utilization of the limited random access memory (RAM) resources available in typical FPGAs. The use of on-chip RAM as opposed to FPGA logic resources for FSM implementation also enables rapid reconfiguration of the FPGA without the place and routing delays associated with complex digital designs. Conclusion Experimental results show storage efficiencies of over 80% for several data sets. Furthermore, the FPGA implementation executing at 100 MHz is nearly 20 times faster than an implementation of the traditional Aho-Corasick algorithm executing on a 2.67 GHz workstation. PMID:18412963

  11. SEMICONDUCTOR INTEGRATED CIRCUITS A 10-bit 200-kS/s SAR ADC IP core for a touch screen SoC

    NASA Astrophysics Data System (ADS)

    Xingyuan, Tong; Yintang, Yang; Zhangming, Zhu; Wenfang, Sheng

    2010-10-01

    Based on a 5 MSBs (most-significant-bits)-plus-5 LSBs (least-significant-bits) C-R hybrid D/A conversion and low-offset pseudo-differential comparison approach, with capacitor array axially symmetric layout topology and resistor string low gradient mismatch placement method, an 8-channel 10-bit 200-kS/s SAR ADC (successive-approximation-register analog-to-digital converter) IP core for a touch screen SoC (system-on-chip) is implemented in a 0.18 μm 1P5M CMOS logic process. Design considerations for the touch screen SAR ADC are included. With a 1.8 V power supply, the DNL (differential non-linearity) and INL (integral non-linearity) of this converter are measured to be about 0.32 LSB and 0.81 LSB respectively. With an input frequency of 91 kHz at 200-kS/s sampling rate, the spurious-free dynamic range and effective-number-of-bits are measured to be 63.2 dB and 9.15 bits respectively, and the power is about 136 μW. This converter occupies an area of about 0.08 mm2. The design results show that it is very suitable for touch screen SoC applications.

  12. Extracting hidden messages in steganographic images

    DOE PAGES

    Quach, Tu-Thach

    2014-07-17

    The eventual goal of steganalytic forensic is to extract the hidden messages embedded in steganographic images. A promising technique that addresses this problem partially is steganographic payload location, an approach to reveal the message bits, but not their logical order. It works by finding modified pixels, or residuals, as an artifact of the embedding process. This technique is successful against simple least-significant bit steganography and group-parity steganography. The actual messages, however, remain hidden as no logical order can be inferred from the located payload. This paper establishes an important result addressing this shortcoming: we show that the expected mean residualsmore » contain enough information to logically order the located payload provided that the size of the payload in each stego image is not fixed. The located payload can be ordered as prescribed by the mean residuals to obtain the hidden messages without knowledge of the embedding key, exposing the vulnerability of these embedding algorithms. We provide experimental results to support our analysis.« less

  13. Wavelet-based scalable L-infinity-oriented compression.

    PubMed

    Alecu, Alin; Munteanu, Adrian; Cornelis, Jan P H; Schelkens, Peter

    2006-09-01

    Among the different classes of coding techniques proposed in literature, predictive schemes have proven their outstanding performance in near-lossless compression. However, these schemes are incapable of providing embedded L(infinity)-oriented compression, or, at most, provide a very limited number of potential L(infinity) bit-stream truncation points. We propose a new multidimensional wavelet-based L(infinity)-constrained scalable coding framework that generates a fully embedded L(infinity)-oriented bit stream and that retains the coding performance and all the scalability options of state-of-the-art L2-oriented wavelet codecs. Moreover, our codec instantiation of the proposed framework clearly outperforms JPEG2000 in L(infinity) coding sense.

  14. On estimation of secret message length in LSB steganography in spatial domain

    NASA Astrophysics Data System (ADS)

    Fridrich, Jessica; Goljan, Miroslav

    2004-06-01

    In this paper, we present a new method for estimating the secret message length of bit-streams embedded using the Least Significant Bit embedding (LSB) at random pixel positions. We introduce the concept of a weighted stego image and then formulate the problem of determining the unknown message length as a simple optimization problem. The methodology is further refined to obtain more stable and accurate results for a wide spectrum of natural images. One of the advantages of the new method is its modular structure and a clean mathematical derivation that enables elegant estimator accuracy analysis using statistical image models.

  15. Capacity-optimized mp2 audio watermarking

    NASA Astrophysics Data System (ADS)

    Steinebach, Martin; Dittmann, Jana

    2003-06-01

    Today a number of audio watermarking algorithms have been proposed, some of them at a quality making them suitable for commercial applications. The focus of most of these algorithms is copyright protection. Therefore, transparency and robustness are the most discussed and optimised parameters. But other applications for audio watermarking can also be identified stressing other parameters like complexity or payload. In our paper, we introduce a new mp2 audio watermarking algorithm optimised for high payload. Our algorithm uses the scale factors of an mp2 file for watermark embedding. They are grouped and masked based on a pseudo-random pattern generated from a secret key. In each group, we embed one bit. Depending on the bit to embed, we change the scale factors by adding 1 where necessary until it includes either more even or uneven scale factors. An uneven group has a 1 embedded, an even group a 0. The same rule is later applied to detect the watermark. The group size can be increased or decreased for transparency/payload trade-off. We embed 160 bits or more in an mp2 file per second without reducing perceived quality. As an application example, we introduce a prototypic Karaoke system displaying song lyrics embedded as a watermark.

  16. Efficient Text Encryption and Hiding with Double-Random Phase-Encoding

    PubMed Central

    Sang, Jun; Ling, Shenggui; Alam, Mohammad S.

    2012-01-01

    In this paper, a double-random phase-encoding technique-based text encryption and hiding method is proposed. First, the secret text is transformed into a 2-dimensional array and the higher bits of the elements in the transformed array are used to store the bit stream of the secret text, while the lower bits are filled with specific values. Then, the transformed array is encoded with double-random phase-encoding technique. Finally, the encoded array is superimposed on an expanded host image to obtain the image embedded with hidden data. The performance of the proposed technique, including the hiding capacity, the recovery accuracy of the secret text, and the quality of the image embedded with hidden data, is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient. By using optical information processing techniques, the proposed method has been found to significantly improve the security of text information transmission, while ensuring hiding capacity at a prescribed level. PMID:23202003

  17. Synchronization of random bit generators based on coupled chaotic lasers and application to cryptography.

    PubMed

    Kanter, Ido; Butkovski, Maria; Peleg, Yitzhak; Zigzag, Meital; Aviad, Yaara; Reidler, Igor; Rosenbluh, Michael; Kinzel, Wolfgang

    2010-08-16

    Random bit generators (RBGs) constitute an important tool in cryptography, stochastic simulations and secure communications. The later in particular has some difficult requirements: high generation rate of unpredictable bit strings and secure key-exchange protocols over public channels. Deterministic algorithms generate pseudo-random number sequences at high rates, however, their unpredictability is limited by the very nature of their deterministic origin. Recently, physical RBGs based on chaotic semiconductor lasers were shown to exceed Gbit/s rates. Whether secure synchronization of two high rate physical RBGs is possible remains an open question. Here we propose a method, whereby two fast RBGs based on mutually coupled chaotic lasers, are synchronized. Using information theoretic analysis we demonstrate security against a powerful computational eavesdropper, capable of noiseless amplification, where all parameters are publicly known. The method is also extended to secure synchronization of a small network of three RBGs.

  18. Word Spotting and Recognition with Embedded Attributes.

    PubMed

    Almazán, Jon; Gordo, Albert; Fornés, Alicia; Valveny, Ernest

    2014-12-01

    This paper addresses the problems of word spotting and word recognition on images. In word spotting, the goal is to find all instances of a query word in a dataset of images. In recognition, the goal is to recognize the content of the word image, usually aided by a dictionary or lexicon. We describe an approach in which both word images and text strings are embedded in a common vectorial subspace. This is achieved by a combination of label embedding and attributes learning, and a common subspace regression. In this subspace, images and strings that represent the same word are close together, allowing one to cast recognition and retrieval tasks as a nearest neighbor problem. Contrary to most other existing methods, our representation has a fixed length, is low dimensional, and is very fast to compute and, especially, to compare. We test our approach on four public datasets of both handwritten documents and natural images showing results comparable or better than the state-of-the-art on spotting and recognition tasks.

  19. NAVAIR Portable Source Initiative (NPSI) Standard for Reusable Source Dataset Metadata (RSDM) V2.4

    DTIC Science & Technology

    2012-09-26

    defining a raster file format: <RasterFileFormat> <FormatName>TIFF</FormatName> <Order>BIP</Order> < DataType >8-BIT_UNSIGNED</ DataType ...interleaved by line (BIL); Band interleaved by pixel (BIP). element RasterFileFormatType/ DataType diagram type restriction of xsd:string facets

  20. Formation of large-scale structure from cosmic strings and massive neutrinos

    NASA Technical Reports Server (NTRS)

    Scherrer, Robert J.; Melott, Adrian L.; Bertschinger, Edmund

    1989-01-01

    Numerical simulations of large-scale structure formation from cosmic strings and massive neutrinos are described. The linear power spectrum in this model resembles the cold-dark-matter power spectrum. Galaxy formation begins early, and the final distribution consists of isolated density peaks embedded in a smooth background, leading to a natural bias in the distribution of luminous matter. The distribution of clustered matter has a filamentary appearance with large voids.

  1. Quantum random bit generation using energy fluctuations in stimulated Raman scattering.

    PubMed

    Bustard, Philip J; England, Duncan G; Nunn, Josh; Moffatt, Doug; Spanner, Michael; Lausten, Rune; Sussman, Benjamin J

    2013-12-02

    Random number sequences are a critical resource in modern information processing systems, with applications in cryptography, numerical simulation, and data sampling. We introduce a quantum random number generator based on the measurement of pulse energy quantum fluctuations in Stokes light generated by spontaneously-initiated stimulated Raman scattering. Bright Stokes pulse energy fluctuations up to five times the mean energy are measured with fast photodiodes and converted to unbiased random binary strings. Since the pulse energy is a continuous variable, multiple bits can be extracted from a single measurement. Our approach can be generalized to a wide range of Raman active materials; here we demonstrate a prototype using the optical phonon line in bulk diamond.

  2. Associative architecture for image processing

    NASA Astrophysics Data System (ADS)

    Adar, Rutie; Akerib, Avidan

    1997-09-01

    This article presents a new generation in parallel processing architecture for real-time image processing. The approach is implemented in a real time image processor chip, called the XiumTM-2, based on combining a fully associative array which provides the parallel engine with a serial RISC core on the same die. The architecture is fully programmable and can be programmed to implement a wide range of color image processing, computer vision and media processing functions in real time. The associative part of the chip is based on patented pending methodology of Associative Computing Ltd. (ACL), which condenses 2048 associative processors, each of 128 'intelligent' bits. Each bit can be a processing bit or a memory bit. At only 33 MHz and 0.6 micron manufacturing technology process, the chip has a computational power of 3 billion ALU operations per second and 66 billion string search operations per second. The fully programmable nature of the XiumTM-2 chip enables developers to use ACL tools to write their own proprietary algorithms combined with existing image processing and analysis functions from ACL's extended set of libraries.

  3. Global embedding of fibre inflation models

    NASA Astrophysics Data System (ADS)

    Cicoli, Michele; Muia, Francesco; Shukla, Pramod

    2016-11-01

    We present concrete embeddings of fibre inflation models in globally consistent type IIB Calabi-Yau orientifolds with closed string moduli stabilisation. After performing a systematic search through the existing list of toric Calabi-Yau manifolds, we find several examples that reproduce the minimal setup to embed fibre inflation models. This involves Calabi-Yau manifolds with h 1,1 = 3 which are K3 fibrations over a ℙ1 base with an additional shrinkable rigid divisor. We then provide different consistent choices of the underlying brane set-up which generate a non-perturbative superpotential suitable for moduli stabilisation and string loop corrections with the correct form to drive inflation. For each Calabi-Yau orientifold setting, we also compute the effect of higher derivative contributions and study their influence on the inflationary dynamics.

  4. Validation of the Complexity INdex in SARComas prognostic signature on formalin-fixed, paraffin-embedded, soft tissue sarcomas.

    PubMed

    Le Guellec, S; Lesluyes, T; Sarot, E; Valle, C; Filleron, T; Rochaix, P; Valentin, T; Pérot, G; Coindre, J-M; Chibon, F

    2018-05-31

    Prediction of metastatic outcome in sarcomas is challenging for clinical management since they are aggressive and carry a high metastatic risk. A 67-gene expression signature, the Complexity INdex in SARComas (CINSARC), has been identified as a better prognostic factor than the reference pathological grade. Since it cannot be applied easily in standard laboratory practice, we assessed its prognostic value using nanoString on formalin-fixed, paraffin-embedded (FFPE) blocks to evaluate its potential in clinical routine practice and guided therapeutic management. A code set consisting of 67 probes derived from the 67 genes of the CINSARC signature was built and named NanoCind®. To compare the performance of RNA-seq and nanoString (NanoCind®), we used expressions of various sarcomas (n=124, frozen samples) using both techniques and compared predictive values based on CINSARC risk groups and clinical annotations. We also used nanoString on FFPE blocks (n=67) and matching frozen and FFPE samples (n=45) to compare their level of agreement. Metastasis-free survival and agreement values in classification groups were evaluated. CINSARC strongly predicted metastatic outcome using nanoString on frozen samples (HR = 2.9, 95% CI 1.23-6.82) with similar risk-group classifications (86%). While more than 50% of FFPE blocks were not analyzable by RNA-seq owing to poor RNA quality, all samples were analyzable with nanoString. When similar (risk-group) classifications were measured with frozen tumors (RNA-seq) compared to FFPE blocks (84% agreement), the CINSARC signature was still a predictive factor of metastatic outcome with nanoString on FFPE samples (HR = 4.43, 95% CI 1.25-15.72). CINSARC is a material-independent prognostic signature for metastatic outcome in sarcomas and outperforms histological grade. Unlike RNA-seq, nanoString is not influenced by the poor quality of RNA extracted from FFPE blocks. The CINSARC signature can potentially be used in combination with nanoString (NanoCind®) in routine clinical practice on FFPE blocks to predict metastatic outcome.

  5. Improved LSB matching steganography with histogram characters reserved

    NASA Astrophysics Data System (ADS)

    Chen, Zhihong; Liu, Wenyao

    2008-03-01

    This letter bases on the researches of LSB (least significant bit, i.e. the last bit of a binary pixel value) matching steganographic method and the steganalytic method which aims at histograms of cover images, and proposes a modification to LSB matching. In the LSB matching, if the LSB of the next cover pixel matches the next bit of secret data, do nothing; otherwise, choose to add or subtract one from the cover pixel value at random. In our improved method, a steganographic information table is defined and records the changes which embedded secrete bits introduce in. Through the table, the next LSB which has the same pixel value will be judged to add or subtract one dynamically in order to ensure the histogram's change of cover image is minimized. Therefore, the modified method allows embedding the same payload as the LSB matching but with improved steganographic security and less vulnerability to attacks compared with LSB matching. The experimental results of the new method show that the histograms maintain their attributes, such as peak values and alternative trends, in an acceptable degree and have better performance than LSB matching in the respects of histogram distortion and resistance against existing steganalysis.

  6. Method and Apparatus for Improving the Resolution of Digitally Sampled Analog Data

    NASA Technical Reports Server (NTRS)

    Liaghati, Amir L. (Inventor)

    2017-01-01

    A system and method is described for converting an analog signal into a digital signal. The gain and offset of an ADC is dynamically adjusted so that the N-bits of input data are assigned to a narrower channel instead of the entire input range of the ADC. This provides greater resolution in the range of interest without generating longer digital data strings.

  7. Penna Bit-String Model with Constant Population

    NASA Astrophysics Data System (ADS)

    de Oliveira, P. M. C.; de Oliveira, S. Moss; Sá Martins, J. S.

    We removed from the Penna model for biological aging any random killing Verhulst factor. Deaths are due only to genetic diseases and the population size is fixed, instead of fluctuating around some constant value. We show that these modifications give qualitatively the same results obtained in an earlier paper, where the random killings (used to avoid an exponential increase of the population) were applied only to newborns.

  8. Waves on the Fly--Encouraging Inquiry in the Physics Classroom

    ERIC Educational Resources Information Center

    Cottam, Michael

    2006-01-01

    In this article, the author shares a very successful 50-minute inquiry-based physics lesson that uses only small metal cans, a bit of string, and the inquiring minds of middle schoolers. The topic of the lesson is wave motion and energy transfer. The intent of this article is to show that tests of student-generated hypotheses can be simple, quick,…

  9. Resurrecting hot dark matter - Large-scale structure from cosmic strings and massive neutrinos

    NASA Technical Reports Server (NTRS)

    Scherrer, Robert J.

    1988-01-01

    These are the results of a numerical simulation of the formation of large-scale structure from cosmic-string loops in a universe dominated by massive neutrinos (hot dark matter). This model has several desirable features. The final matter distribution contains isolated density peaks embedded in a smooth background, producing a natural bias in the distribution of luminous matter. Because baryons can accrete onto the cosmic strings before the neutrinos, the galaxies will have baryon cores and dark neutrino halos. Galaxy formation in this model begins much earlier than in random-phase models. On large scales the distribution of clustered matter visually resembles the CfA survey, with large voids and filaments.

  10. libFLASM: a software library for fixed-length approximate string matching.

    PubMed

    Ayad, Lorraine A K; Pissis, Solon P P; Retha, Ahmad

    2016-11-10

    Approximate string matching is the problem of finding all factors of a given text that are at a distance at most k from a given pattern. Fixed-length approximate string matching is the problem of finding all factors of a text of length n that are at a distance at most k from any factor of length ℓ of a pattern of length m. There exist bit-vector techniques to solve the fixed-length approximate string matching problem in time [Formula: see text] and space [Formula: see text] under the edit and Hamming distance models, where w is the size of the computer word; as such these techniques are independent of the distance threshold k or the alphabet size. Fixed-length approximate string matching is a generalisation of approximate string matching and, hence, has numerous direct applications in computational molecular biology and elsewhere. We present and make available libFLASM, a free open-source C++ software library for solving fixed-length approximate string matching under both the edit and the Hamming distance models. Moreover we describe how fixed-length approximate string matching is applied to solve real problems by incorporating libFLASM into established applications for multiple circular sequence alignment as well as single and structured motif extraction. Specifically, we describe how it can be used to improve the accuracy of multiple circular sequence alignment in terms of the inferred likelihood-based phylogenies; and we also describe how it is used to efficiently find motifs in molecular sequences representing regulatory or functional regions. The comparison of the performance of the library to other algorithms show how it is competitive, especially with increasing distance thresholds. Fixed-length approximate string matching is a generalisation of the classic approximate string matching problem. We present libFLASM, a free open-source C++ software library for solving fixed-length approximate string matching. The extensive experimental results presented here suggest that other applications could benefit from using libFLASM, and thus further maintenance and development of libFLASM is desirable.

  11. Rapid Training of Information Extraction with Local and Global Data Views

    DTIC Science & Technology

    2012-05-01

    56 xiii 4.1 An example of words and their bit string representations. Bold ones are transliterated Arabic words...Natural Language Processing ( NLP ) community faces new tasks and new domains all the time. Without enough labeled data of a new task or a new domain to...conduct supervised learning, semi-supervised learning is particularly attractive to NLP researchers since it only requires a handful of labeled examples

  12. Testing a Hypothesis for the Evolution of Sex

    NASA Astrophysics Data System (ADS)

    Örçal, Bora; Tüzel, Erkan; Sevim, Volkan; Jan, Naeem; Erzan, Ayşe.

    An asexual set of primitive bacteria is simulated with a bit-string Penna model with a Fermi function for survival. A recent hypothesis by Jan, Stauffer, and Moseley on the evolution of sex from asexual cells as a strategy for trying to escape the effects of deleterious mutations is checked. This strategy is found to provide a successful scenario for the evolution of a stable macroscopic sexual population.

  13. Seismic While Drilling Case Study in Shengli Oilfield, Eastern China

    NASA Astrophysics Data System (ADS)

    Wang, L.; Liu, H.; Tong, S.; Zou, Z.

    2015-12-01

    Seismic while drilling (SWD) is a promising borehole seismic technique with reduction of drilling risk, cost savings and increased efficiency. To evaluate the technical and economic benefits of this new technique, we carried out SWD survey at well G130 in Shengli Oilfield of Eastern China. Well G130 is an evaluation well, located in Dongying depression at depth more than 3500m. We used an array of portable seismometers to record the surface SWD-data, during the whole drilling progress. The pilot signal was being recorded continuously, by an accelerometer mounted on the top of the drill string. There were also two seismometers buried in the drill yard, one near diesel engine and another near derrick. All the data was being recorded continuously. According to mud logging data, we have processed and analyzed all the data. It demonstrates the drill yard noise is the primary noise among the whole surface wavefield and its dominant frequency is about 20Hz. Crosscorrelation of surface signal with the pilot signal shows its SNR is severely low and there is no any obvious event of drill-bit signals. Fortunately, the autocorrelation of the pilot signal shows clear BHA multiple and drill string multiple. The period of drill string multiple can be used for establishing the reference time (so-called zero time). We identified and removed different noises from the surface SWD-data, taking advantages of wavefield analysis. The drill-bit signal was retrieved from surface SWD-data, using seismic interferometry. And a reverse vertical seismic profile (RVSP) data set for the continuous drilling depth was established. The subsurface images derived from these data compare well with the corresponding images of 3D surface seismic survey cross the well.

  14. Clean Quantum and Classical Communication Protocols.

    PubMed

    Buhrman, Harry; Christandl, Matthias; Perry, Christopher; Zuiddam, Jeroen

    2016-12-02

    By how much must the communication complexity of a function increase if we demand that the parties not only correctly compute the function but also return all registers (other than the one containing the answer) to their initial states at the end of the communication protocol? Protocols that achieve this are referred to as clean and the associated cost as the clean communication complexity. Here we present clean protocols for calculating the inner product of two n-bit strings, showing that (in the absence of preshared entanglement) at most n+3 qubits or n+O(sqrt[n]) bits of communication are required. The quantum protocol provides inspiration for obtaining the optimal method to implement distributed cnot gates in parallel while minimizing the amount of quantum communication. For more general functions, we show that nearly all Boolean functions require close to 2n bits of classical communication to compute and close to n qubits if the parties have access to preshared entanglement. Both of these values are maximal for their respective paradigms.

  15. Hadronic density of states from string theory.

    PubMed

    Pando Zayas, Leopoldo A; Vaman, Diana

    2003-09-12

    We present an exact calculation of the finite temperature partition function for the hadronic states corresponding to a Penrose-Güven limit of the Maldacena-Nùñez embedding of the N=1 super Yang-Mills (SYM) into string theory. It is established that the theory exhibits a Hagedorn density of states. We propose a semiclassical string approximation to the finite temperature partition function for confining gauge theories admitting a supergravity dual, by performing an expansion around classical solutions characterized by temporal windings. This semiclassical approximation reveals a hadronic energy density of states of a Hagedorn type, with the coefficient determined by the gauge theory string tension as expected for confining theories. We argue that our proposal captures primarily information about states of pure N=1 SYM theory, given that this semiclassical approximation does not entail a projection onto states of large U(1) charge.

  16. Quon 3D language for quantum information

    PubMed Central

    Liu, Zhengwei; Wozniakowski, Alex; Jaffe, Arthur M.

    2017-01-01

    We present a 3D topological picture-language for quantum information. Our approach combines charged excitations carried by strings, with topological properties that arise from embedding the strings in the interior of a 3D manifold with boundary. A quon is a composite that acts as a particle. Specifically, a quon is a hemisphere containing a neutral pair of open strings with opposite charge. We interpret multiquons and their transformations in a natural way. We obtain a type of relation, a string–genus “joint relation,” involving both a string and the 3D manifold. We use the joint relation to obtain a topological interpretation of the C∗-Hopf algebra relations, which are widely used in tensor networks. We obtain a 3D representation of the controlled NOT (CNOT) gate that is considerably simpler than earlier work, and a 3D topological protocol for teleportation. PMID:28167790

  17. Genetics algorithm optimization of DWT-DCT based image Watermarking

    NASA Astrophysics Data System (ADS)

    Budiman, Gelar; Novamizanti, Ledya; Iwut, Iwan

    2017-01-01

    Data hiding in an image content is mandatory for setting the ownership of the image. Two dimensions discrete wavelet transform (DWT) and discrete cosine transform (DCT) are proposed as transform method in this paper. First, the host image in RGB color space is converted to selected color space. We also can select the layer where the watermark is embedded. Next, 2D-DWT transforms the selected layer obtaining 4 subband. We select only one subband. And then block-based 2D-DCT transforms the selected subband. Binary-based watermark is embedded on the AC coefficients of each block after zigzag movement and range based pixel selection. Delta parameter replacing pixels in each range represents embedded bit. +Delta represents bit “1” and -delta represents bit “0”. Several parameters to be optimized by Genetics Algorithm (GA) are selected color space, layer, selected subband of DWT decomposition, block size, embedding range, and delta. The result of simulation performs that GA is able to determine the exact parameters obtaining optimum imperceptibility and robustness, in any watermarked image condition, either it is not attacked or attacked. DWT process in DCT based image watermarking optimized by GA has improved the performance of image watermarking. By five attacks: JPEG 50%, resize 50%, histogram equalization, salt-pepper and additive noise with variance 0.01, robustness in the proposed method has reached perfect watermark quality with BER=0. And the watermarked image quality by PSNR parameter is also increased about 5 dB than the watermarked image quality from previous method.

  18. Unified random access memory (URAM) by integration of a nanocrystal floating gate for nonvolatile memory and a partially depleted floating body for capacitorless 1T-DRAM

    NASA Astrophysics Data System (ADS)

    Ryu, Seong-Wan; Han, Jin-Woo; Kim, Chung-Jin; Kim, Sungho; Choi, Yang-Kyu

    2009-03-01

    This paper describes a unified memory (URAM) that utilizes a nanocrystal SOI MOSFET for multi-functional applications of both nonvolatile memory (NVM) and capacitorless 1T-DRAM. By using a discrete storage node (Ag nanocrystal) as the floating gate of the NVM, high defect immunity and 2-bit/cell operation were achieved. The embedded nanocrystal NVM also showed 1T-DRAM operation (program/erase time = 100 ns) characteristics, which were realized by storing holes in the floating body of the SOI MOSFET, without requiring an external capacitor. Three-bit/cell operation was accomplished for different applications - 2-bits for nonvolatility and 1-bit for fast operation.

  19. Optical signal processing for a smart vehicle lighting system using a-SiCH technology

    NASA Astrophysics Data System (ADS)

    Vieira, M. A.; Vieira, M.; Vieira, P.; Louro, P.

    2017-05-01

    We propose the use of Visible Light Communication (VLC) for vehicle safety applications, creating a smart vehicle lighting system that combines the functions of illumination and signaling, communications, and positioning. The feasibility of VLC is demonstrated by employing trichromatic Red-Green-Blue (RGB) LEDs as transmitters, since they offer the possibility of Wavelength Division Multiplexing (WDM), which can greatly increase the transmission data rate, when using SiC double p-i-n receivers to encode/decode the information. Trichromatic RGB Light Emitting Diodes (LED)s (RGB-LED) are used together for illumination proposes (headlamps) and individually, each chip, to transmit the driving range distance and data information. An on-off code is used to transmit the data. Free space is the transmission medium. The receivers consist of two stacked amorphous a-H:SiC cells. They combine the simultaneous demultiplexing operation with the photodetection and self-amplification. The proposed coding is based on SiC technology. Multiple Input Multi Output (MIMO) architecture is used. For data transmission, we propose the use of two headlights based on commercially available modulated white RGB-LEDs. For data receiving and decoding we use three a-SiC:H double pin/pin optical processors symmetrically distributed at the vehicle tail Moreover, we present a way to achieve vehicular communication using the parity bits. A representation with a 4 bit original string color message and the transmitted 7 bit string, the encoding and decoding accurate positional information processes and the design of SiC navigation system are discussed and tested. A visible multilateration method estimates the drive distance range by using the decoded information received from several non-collinear transmitters.

  20. Multiplexed color-coded probe-based gene expression assessment for clinical molecular diagnostics in formalin-fixed paraffin-embedded human renal allograft tissue.

    PubMed

    Adam, Benjamin; Afzali, Bahman; Dominy, Katherine M; Chapman, Erin; Gill, Reeda; Hidalgo, Luis G; Roufosse, Candice; Sis, Banu; Mengel, Michael

    2016-03-01

    Histopathologic diagnoses in transplantation can be improved with molecular testing. Preferably, molecular diagnostics should fit into standard-of-care workflows for transplant biopsies, that is, formalin-fixed paraffin-embedded (FFPE) processing. The NanoString(®) gene expression platform has recently been shown to work with FFPE samples. We aimed to evaluate its methodological robustness and feasibility for gene expression studies in human FFPE renal allograft samples. A literature-derived antibody-mediated rejection (ABMR) 34-gene set, comprised of endothelial, NK cell, and inflammation transcripts, was analyzed in different retrospective biopsy cohorts and showed potential to molecularly discriminate ABMR cases, including FFPE samples. NanoString(®) results were reproducible across a range of RNA input quantities (r = 0.998), with different operators (r = 0.998), and between different reagent lots (r = 0.983). There was moderate correlation between NanoString(®) with FFPE tissue and quantitative reverse transcription polymerase chain reaction (qRT-PCR) with corresponding dedicated fresh-stabilized tissue (r = 0.487). Better overall correlation with histology was observed with NanoString(®) (r = 0.354) than with qRT-PCR (r = 0.146). Our results demonstrate the feasibility of multiplexed gene expression quantification from FFPE renal allograft tissue. This represents a method for prospective and retrospective validation of molecular diagnostics and its adoption in clinical transplantation pathology. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  1. Stationary black holes with stringy hair

    NASA Astrophysics Data System (ADS)

    Boos, Jens; Frolov, Valeri P.

    2018-01-01

    We discuss properties of black holes which are pierced by special configurations of cosmic strings. For static black holes, we consider radial strings in the limit when the number of strings grows to infinity while the tension of each single string tends to zero. In a properly taken limit, the stress-energy tensor of the string distribution is finite. We call such matter stringy matter. We present a solution of the Einstein equations for an electrically charged static black hole with the stringy matter, with and without a cosmological constant. This solution is a warped product of two metrics. One of them is a deformed 2-sphere, whose Gaussian curvature is determined by the energy density of the stringy matter. We discuss the embedding of a corresponding distorted sphere into a three-dimensional Euclidean space and formulate consistency conditions. We also found a relation between the square of the Weyl tensor invariant of the four-dimensional spacetime of the stringy black holes and the energy density of the stringy matter. In the second part of the paper, we discuss test stationary strings in the Kerr geometry and in its Kerr-NUT-(anti-)de Sitter generalizations. Explicit solutions for strings that are regular at the event horizon are obtained. Using these solutions, the stress-energy tensor of the stringy matter in these geometries is calculated. Extraction of the angular momentum from rotating black holes by such strings is also discussed.

  2. Open/closed string duality and relativistic fluids

    NASA Astrophysics Data System (ADS)

    Niarchos, Vasilis

    2016-07-01

    We propose an open/closed string duality in general backgrounds extending previous ideas about open string completeness by Ashoke Sen. Our proposal sets up a general version of holography that works in gravity as a tomographic principle. We argue, in particular, that previous expectations of a supergravity/Dirac-Born-Infeld (DBI) correspondence are naturally embedded in this conjecture and can be tested in a well-defined manner. As an example, we consider the correspondence between open string field theories on extremal D-brane setups in flat space in the large-N , large 't Hooft limit, and asymptotically flat solutions in ten-dimensional type II supergravity. We focus on a convenient long-wavelength regime, where specific effects of higher-spin open string modes can be traced explicitly in the dual supergravity computation. For instance, in this regime we show how the full Abelian DBI action arises from supergravity as a straightforward reformulation of relativistic hydrodynamics. In the example of a (2 +1 )-dimensional open string theory this reformulation involves an Abelian Hodge duality. We also point out how different deformations of the DBI action, related to higher-derivative corrections and non-Abelian effects, can arise in this context as deformations in corresponding relativistic hydrodynamics.

  3. Single-chip pulse programmer for magnetic resonance imaging using a 32-bit microcontroller.

    PubMed

    Handa, Shinya; Domalain, Thierry; Kose, Katsumi

    2007-08-01

    A magnetic resonance imaging (MRI) pulse programmer has been developed using a single-chip microcontroller (ADmicroC7026). The microcontroller includes all the components required for the MRI pulse programmer: a 32-bit RISC CPU core, 62 kbytes of flash memory, 8 kbytes of SRAM, two 32-bit timers, four 12-bit DA converters, and 40 bits of general purpose I/O. An evaluation board for the microcontroller was connected to a host personal computer (PC), an MRI transceiver, and a gradient driver using interface circuitry. Target (embedded) and host PC programs were developed to enable MRI pulse sequence generation by the microcontroller. The pulse programmer achieved a (nominal) time resolution of approximately 100 ns and a minimum time delay between successive events of approximately 9 micros. Imaging experiments using the pulse programmer demonstrated the effectiveness of our approach.

  4. Single-chip pulse programmer for magnetic resonance imaging using a 32-bit microcontroller

    NASA Astrophysics Data System (ADS)

    Handa, Shinya; Domalain, Thierry; Kose, Katsumi

    2007-08-01

    A magnetic resonance imaging (MRI) pulse programmer has been developed using a single-chip microcontroller (ADμC7026). The microcontroller includes all the components required for the MRI pulse programmer: a 32-bit RISC CPU core, 62kbytes of flash memory, 8kbytes of SRAM, two 32-bit timers, four 12-bit DA converters, and 40bits of general purpose I/O. An evaluation board for the microcontroller was connected to a host personal computer (PC), an MRI transceiver, and a gradient driver using interface circuitry. Target (embedded) and host PC programs were developed to enable MRI pulse sequence generation by the microcontroller. The pulse programmer achieved a (nominal) time resolution of approximately 100ns and a minimum time delay between successive events of approximately 9μs. Imaging experiments using the pulse programmer demonstrated the effectiveness of our approach.

  5. A secure and robust information hiding technique for covert communication

    NASA Astrophysics Data System (ADS)

    Parah, S. A.; Sheikh, J. A.; Hafiz, A. M.; Bhat, G. M.

    2015-08-01

    The unprecedented advancement of multimedia and growth of the internet has made it possible to reproduce and distribute digital media easier and faster. This has given birth to information security issues, especially when the information pertains to national security, e-banking transactions, etc. The disguised form of encrypted data makes an adversary suspicious and increases the chance of attack. Information hiding overcomes this inherent problem of cryptographic systems and is emerging as an effective means of securing sensitive data being transmitted over insecure channels. In this paper, a secure and robust information hiding technique referred to as Intermediate Significant Bit Plane Embedding (ISBPE) is presented. The data to be embedded is scrambled and embedding is carried out using the concept of Pseudorandom Address Vector (PAV) and Complementary Address Vector (CAV) to enhance the security of the embedded data. The proposed ISBPE technique is fully immune to Least Significant Bit (LSB) removal/replacement attack. Experimental investigations reveal that the proposed technique is more robust to various image processing attacks like JPEG compression, Additive White Gaussian Noise (AWGN), low pass filtering, etc. compared to conventional LSB techniques. The various advantages offered by ISBPE technique make it a good candidate for covert communication.

  6. Comment on "Bit-string oblivious transfer based on quantum state computational distinguishability"

    NASA Astrophysics Data System (ADS)

    He, Guang Ping

    2015-10-01

    We show that in the protocol proposed in Phys. Rev. A 91, 042306 (2015), 10.1103/PhysRevA.91.042306, a dishonest sender can always ensure with certainty that the receiver fails to get the secret message. Thus the security requirement of oblivious transfer is not met. This security problem also makes the protocol unsuitable for serving as a building block for 1-out-of-2 oblivious transfer.

  7. Few-fJ/bit data transmissions using directly modulated lambda-scale embedded active region photonic-crystal lasers

    NASA Astrophysics Data System (ADS)

    Takeda, Koji; Sato, Tomonari; Shinya, Akihiko; Nozaki, Kengo; Kobayashi, Wataru; Taniyama, Hideaki; Notomi, Masaya; Hasebe, Koichi; Kakitsuka, Takaaki; Matsuo, Shinji

    2013-07-01

    A low operating energy is needed for nanocavity lasers designed for on-chip photonic network applications. On-chip nanocavity lasers must be driven by current because they act as light sources driven by electronic circuits. Here, we report the high-speed direct modulation of a lambda-scale embedded active region photonic-crystal (LEAP) laser that holds three records for any type of laser operated at room temperature: a low threshold current of 4.8 µA, a modulation current efficiency of 2.0 GHz µA-0.5 and an operating energy of 4.4 fJ bit-1. Five major technologies make this performance possible: a compact buried heterostructure, a photonic-crystal nanocavity, a lateral p-n junction realized by ion implantation and thermal diffusion, an InAlAs sacrificial layer and current-blocking trenches. We believe that an output power of 2.17 µW and an operating energy of 4.4 fJ bit-1 will enable us to realize on-chip photonic networks in combination with the recently developed highly sensitive receivers.

  8. Secure multi-party quantum summation based on quantum Fourier transform

    NASA Astrophysics Data System (ADS)

    Yang, Hui-Yi; Ye, Tian-Yu

    2018-06-01

    In this paper, we propose a novel secure multi-party quantum summation protocol based on quantum Fourier transform, where the traveling particles are transmitted in a tree-type mode. The party who prepares the initial quantum states is assumed to be semi-honest, which means that she may misbehave on her own but will not conspire with anyone. The proposed protocol can resist both the outside attacks and the participant attacks. Especially, one party cannot obtain other parties' private integer strings; and it is secure for the colluding attack performed by at most n - 2 parties, where n is the number of parties. In addition, the proposed protocol calculates the addition of modulo d and implements the calculation of addition in a secret-by-secret way rather than a bit-by-bit way.

  9. Remote secure proof of identity using biometrics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sengupta, S. K.; Pearson, P.; Strait, R.S.

    1997-06-10

    Biometric measurements derived from finger- or voiceprints, hand geometry, retinal vessel pattern and iris texture characteristics etc. can be identifiers of individuals. In each case, the measurements can be coded into a statistically unique bit-string for each individual. While in electronic commerce and other electronic transactions the proof of identity of an individual is provided by the use of either public key cryptography or biometric data, more secure applications can be achieved by employing both. However the former requires the use of exact bit patterns. An error correction procedure allows us to successfully combine the use of both to providemore » a general procedure for remote secure proof of identity using a generic biometric device. One such procedure has been demonstrated using a device based on hand geometry.« less

  10. Robust 1-Bit Compressive Sensing via Binary Stable Embeddings of Sparse Vectors

    DTIC Science & Technology

    2011-04-15

    funded by Mitsubishi Electric Research Laboratories. †ICTEAM Institute, ELEN Department, Université catholique de Louvain (UCL), B-1348 Louvain-la-Neuve...reduced to a simple comparator that tests for values above or below zero, enabling extremely simple, efficient, and fast quantization. A 1-bit quantizer is...these two terms appears to be significantly different, according to the previously discussed experiments. To test the hypothesis that this term is the key

  11. Servo-integrated patterned media by hybrid directed self-assembly.

    PubMed

    Xiao, Shuaigang; Yang, Xiaomin; Steiner, Philip; Hsu, Yautzong; Lee, Kim; Wago, Koichi; Kuo, David

    2014-11-25

    A hybrid directed self-assembly approach is developed to fabricate unprecedented servo-integrated bit-patterned media templates, by combining sphere-forming block copolymers with 5 teradot/in.(2) resolution capability, nanoimprint and optical lithography with overlay control. Nanoimprint generates prepatterns with different dimensions in the data field and servo field, respectively, and optical lithography controls the selective self-assembly process in either field. Two distinct directed self-assembly techniques, low-topography graphoepitaxy and high-topography graphoepitaxy, are elegantly integrated to create bit-patterned templates with flexible embedded servo information. Spinstand magnetic test at 1 teradot/in.(2) shows a low bit error rate of 10(-2.43), indicating fully functioning bit-patterned media and great potential of this approach for fabricating future ultra-high-density magnetic storage media.

  12. Analog Signal Correlating Using an Analog-Based Signal Conditioning Front End

    NASA Technical Reports Server (NTRS)

    Prokop, Norman; Krasowski, Michael

    2013-01-01

    This innovation is capable of correlating two analog signals by using an analog-based signal conditioning front end to hard-limit the analog signals through adaptive thresholding into a binary bit stream, then performing the correlation using a Hamming "similarity" calculator function embedded in a one-bit digital correlator (OBDC). By converting the analog signal into a bit stream, the calculation of the correlation function is simplified, and less hardware resources are needed. This binary representation allows the hardware to move from a DSP where instructions are performed serially, into digital logic where calculations can be performed in parallel, greatly speeding up calculations.

  13. Phases of QCD3 from non-SUSY Seiberg duality and brane dynamics

    NASA Astrophysics Data System (ADS)

    Armoni, Adi; Niarchos, Vasilis

    2018-05-01

    We consider a nonsupersymmetric USp Yang-Mills Chern-Simons gauge theory coupled to fundamental flavors. The theory is realised in type-IIB string theory via an embedding in a Hanany-Witten brane configuration which includes an orientifold and antibranes. We argue that the theory admits a magnetic Seiberg dual. Using the magnetic dual we identify dynamics in field theory and brane physics that correspond to various phases, obtaining a better understanding of three-dimensional bosonization and dynamical breaking of flavor symmetry in USp QCD3 theory. In field theory both phases correspond to magnetic "squark" condensation. In string theory, they correspond to open string tachyon condensation and brane reconnection. We also discuss other phases where the magnetic `squark' is massive. Finally, we briefly comment on the case of unitary gauge groups.

  14. Five-dimensional gauge theory and compactification on a torus

    NASA Astrophysics Data System (ADS)

    Haghighat, Babak; Vandoren, Stefan

    2011-09-01

    We study five-dimensional minimally supersymmetric gauge theory compactified on a torus down to three dimensions, and its embedding into string/M-theory using geometric engineering. The moduli space on the Coulomb branch is hyperkähler equipped with a metric with modular transformation properties. We determine the one-loop corrections to the metric and show that they can be interpreted as worldsheet and D1-brane instantons in type IIB string theory. Furthermore, we analyze instanton corrections coming from the solitonic BPS magnetic string wrapped over the torus. In particular, we show how to compute the path-integral for the zero-modes from the partition function of the M5 brane, or, using a 2d/4d correspondence, from the partition function of N=4 SYM theory on a Hirzebruch surface.

  15. The special radiation-hardened processors for new highly informative experiments in space

    NASA Astrophysics Data System (ADS)

    Serdin, O. V.; Antonov, A. A.; Dubrovsky, A. G.; Novogilov, E. A.; Zuev, A. L.

    2017-01-01

    The article provides a detailed description of the series of special radiation-hardened microprocessor developed by SRISA for use in space technology. The microprocessors have 32-bit and 64-bit KOMDIV architecture with embedded SpaceWire, RapidIO, Ethernet and MIL-STD-1553B interfaces. These devices are used in space telescope GAMMA-400 data acquisition system, and may also be applied to other experiments in space (such as observatory “Millimetron” etc.).

  16. Preserving privacy of online digital physiological signals using blind and reversible steganography.

    PubMed

    Shiu, Hung-Jr; Lin, Bor-Sing; Huang, Chien-Hung; Chiang, Pei-Ying; Lei, Chin-Laung

    2017-11-01

    Physiological signals such as electrocardiograms (ECG) and electromyograms (EMG) are widely used to diagnose diseases. Presently, the Internet offers numerous cloud storage services which enable digital physiological signals to be uploaded for convenient access and use. Numerous online databases of medical signals have been built. The data in them must be processed in a manner that preserves patients' confidentiality. A reversible error-correcting-coding strategy will be adopted to transform digital physiological signals into a new bit-stream that uses a matrix in which is embedded the Hamming code to pass secret messages or private information. The shared keys are the matrix and the version of the Hamming code. An online open database, the MIT-BIH arrhythmia database, was used to test the proposed algorithms. The time-complexity, capacity and robustness are evaluated. Comparisons of several evaluations subject to related work are also proposed. This work proposes a reversible, low-payload steganographic scheme for preserving the privacy of physiological signals. An (n,  m)-hamming code is used to insert (n - m) secret bits into n bits of a cover signal. The number of embedded bits per modification is higher than in comparable methods, and the computational power is efficient and the scheme is secure. Unlike other Hamming-code based schemes, the proposed scheme is both reversible and blind. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. Modeling a space-based quantum link that includes an adaptive optics system

    NASA Astrophysics Data System (ADS)

    Duchane, Alexander W.; Hodson, Douglas D.; Mailloux, Logan O.

    2017-10-01

    Quantum Key Distribution uses optical pulses to generate shared random bit strings between two locations. If a high percentage of the optical pulses are comprised of single photons, then the statistical nature of light and information theory can be used to generate secure shared random bit strings which can then be converted to keys for encryption systems. When these keys are incorporated along with symmetric encryption techniques such as a one-time pad, then this method of key generation and encryption is resistant to future advances in quantum computing which will significantly degrade the effectiveness of current asymmetric key sharing techniques. This research first reviews the transition of Quantum Key Distribution free-space experiments from the laboratory environment to field experiments, and finally, ongoing space experiments. Next, a propagation model for an optical pulse from low-earth orbit to ground and the effects of turbulence on the transmitted optical pulse is described. An Adaptive Optics system is modeled to correct for the aberrations caused by the atmosphere. The long-term point spread function of the completed low-earth orbit to ground optical system is explored in the results section. Finally, the impact of this optical system and its point spread function on an overall quantum key distribution system as well as the future work necessary to show this impact is described.

  18. NanoString, a novel digital color-coded barcode technology: current and future applications in molecular diagnostics.

    PubMed

    Tsang, Hin-Fung; Xue, Vivian Weiwen; Koh, Su-Pin; Chiu, Ya-Ming; Ng, Lawrence Po-Wah; Wong, Sze-Chuen Cesar

    2017-01-01

    Formalin-fixed, paraffin-embedded (FFPE) tissue sample is a gold mine of resources for molecular diagnosis and retrospective clinical studies. Although molecular technologies have expanded the range of mutations identified in FFPE samples, the applications of existing technologies are limited by the low nucleic acids yield and poor extraction quality. As a result, the routine clinical applications of molecular diagnosis using FFPE samples has been associated with many practical challenges. NanoString technologies utilize a novel digital color-coded barcode technology based on direct multiplexed measurement of gene expression and offer high levels of precision and sensitivity. Each color-coded barcode is attached to a single target-specific probe corresponding to a single gene which can be individually counted without amplification. Therefore, NanoString is especially useful for measuring gene expression in degraded clinical specimens. Areas covered: This article describes the applications of NanoString technologies in molecular diagnostics and challenges associated with its applications and the future development. Expert commentary: Although NanoString technology is still in the early stages of clinical use, it is expected that NanoString-based cancer expression panels would play more important roles in the future in classifying cancer patients and in predicting the response to therapy for better personal therapeutic care.

  19. High bit depth infrared image compression via low bit depth codecs

    NASA Astrophysics Data System (ADS)

    Belyaev, Evgeny; Mantel, Claire; Forchhammer, Søren

    2017-08-01

    Future infrared remote sensing systems, such as monitoring of the Earth's environment by satellites, infrastructure inspection by unmanned airborne vehicles etc., will require 16 bit depth infrared images to be compressed and stored or transmitted for further analysis. Such systems are equipped with low power embedded platforms where image or video data is compressed by a hardware block called the video processing unit (VPU). However, in many cases using two 8-bit VPUs can provide advantages compared with using higher bit depth image compression directly. We propose to compress 16 bit depth images via 8 bit depth codecs in the following way. First, an input 16 bit depth image is mapped into 8 bit depth images, e.g., the first image contains only the most significant bytes (MSB image) and the second one contains only the least significant bytes (LSB image). Then each image is compressed by an image or video codec with 8 bits per pixel input format. We analyze how the compression parameters for both MSB and LSB images should be chosen to provide the maximum objective quality for a given compression ratio. Finally, we apply the proposed infrared image compression method utilizing JPEG and H.264/AVC codecs, which are usually available in efficient implementations, and compare their rate-distortion performance with JPEG2000, JPEG-XT and H.265/HEVC codecs supporting direct compression of infrared images in 16 bit depth format. A preliminary result shows that two 8 bit H.264/AVC codecs can achieve similar result as 16 bit HEVC codec.

  20. Two-dimensional shape recognition using sparse distributed memory

    NASA Technical Reports Server (NTRS)

    Kanerva, Pentti; Olshausen, Bruno

    1990-01-01

    Researchers propose a method for recognizing two-dimensional shapes (hand-drawn characters, for example) with an associative memory. The method consists of two stages: first, the image is preprocessed to extract tangents to the contour of the shape; second, the set of tangents is converted to a long bit string for recognition with sparse distributed memory (SDM). SDM provides a simple, massively parallel architecture for an associative memory. Long bit vectors (256 to 1000 bits, for example) serve as both data and addresses to the memory, and patterns are grouped or classified according to similarity in Hamming distance. At the moment, tangents are extracted in a simple manner by progressively blurring the image and then using a Canny-type edge detector (Canny, 1986) to find edges at each stage of blurring. This results in a grid of tangents. While the technique used for obtaining the tangents is at present rather ad hoc, researchers plan to adopt an existing framework for extracting edge orientation information over a variety of resolutions, such as suggested by Watson (1987, 1983), Marr and Hildreth (1980), or Canny (1986).

  1. N-flation with hierarchically light axions in string compactifications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cicoli, Michele; Dutta, Koushik; Maharana, Anshuman, E-mail: mcicoli@ictp.it, E-mail: koushik.dutta@saha.ac.in, E-mail: anshumanmaharana@hri.res.in

    2014-08-01

    We propose a possible embedding of axionic N-flation in type IIB string compactifications where most of the Kähler moduli are stabilised by perturbative effects, and so are hierarchically heavier than the corresponding N>> 1 axions whose collective dynamics drives inflation. This is achieved in the framework of the LARGE Volume Scenario for moduli stabilisation. Our set-up can be used to realise a model of either large field inflation or quintessence, just by varying the volume of the internal space which controls the scale of the axionic potential. Both cases predict a very high scale of supersymmetry breaking. A fully explicit stringymore » embedding of N-flation would require control over dangerous back-reaction effects due to a large number of species. A viable reheating of the Standard Model degrees of freedom can be achieved after the end of inflation due to the perturbative decay of the N light axions which drive inflation.« less

  2. Playing a 3-Stringed Violin: Innovation via the Joint Evolution of People, Process, and Knowledge Management System

    NASA Technical Reports Server (NTRS)

    Cooper, Lynne P.

    2010-01-01

    Users continuously evaluate the value and performance of their Knowledge Management Systems (KMS). As suggested by a punctuated socio-technical system process model, today's success can quickly become tomorrow's failure should the KMS fail to meet evolving needs and expectations. The more deeply a tool is embedded in the actual work process, the more vulnerable it is to emergent changes and perturbations. This paper uses the metaphor of a "3-stringed violin" to explore how differing levels of user knowledge about tools and processes can lead to system perturbations and how the active involvement of other actors can dampen the impact of perturbations, i.e., help the system survive the operational equivalent of a broken string. Recommendations suggest ways to increase system resiliency and contribute to incremental innovation.

  3. Apparatus for downhole drilling communications and method for making and using the same

    DOEpatents

    Normann, Randy A.; Lockwood, Grant J.; Gonzales, Meliton

    1998-01-01

    An apparatus for downhole drilling communications is presented. The apparatus includes a spool and end pieces for maintaining the spool at the bottom of a drill string near a drill bit during drilling operations. The apparatus provides a cable for communicating signals between a downhole electronics package and a surface receiver in order to perform measurements while drilling. A method of forming the apparatus is also set forth wherein the apparatus is formed about a central spindle and lathe.

  4. Apparatus for downhole drilling communications and method for making and using the same

    DOEpatents

    Normann, R.A.; Lockwood, G.J.; Gonzales, M.

    1998-03-03

    An apparatus for downhole drilling communications is presented. The apparatus includes a spool and end pieces for maintaining the spool at the bottom of a drill string near a drill bit during drilling operations. The apparatus provides a cable for communicating signals between a downhole electronics package and a surface receiver in order to perform measurements while drilling. A method of forming the apparatus is also set forth wherein the apparatus is formed about a central spindle and lathe. 6 figs.

  5. Online Build-Order Optimization for Real-Time Strategy Agents using Multi-Objective Evolutionary Algorithms

    DTIC Science & Technology

    2014-03-27

    Their chromosome representation is a binary string of 13 actions or 39 bits. Plans consist of a limited number of build actions for the creation of...injected via case-injection which resembles case-base reasoning. Expert actions are recorded and then transformed into chromosomes for injection into GAPs...sites supply a finite amount of a resource. For example, a gold mine in AOE will disappear after a player’s workers have extracted the finite amount of

  6. a Predator-Prey Model Based on the Fully Parallel Cellular Automata

    NASA Astrophysics Data System (ADS)

    He, Mingfeng; Ruan, Hongbo; Yu, Changliang

    We presented a predator-prey lattice model containing moveable wolves and sheep, which are characterized by Penna double bit strings. Sexual reproduction and child-care strategies are considered. To implement this model in an efficient way, we build a fully parallel Cellular Automata based on a new definition of the neighborhood. We show the roles played by the initial densities of the populations, the mutation rate and the linear size of the lattice in the evolution of this model.

  7. Network Technologies for Networked Terrorists: Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations

    DTIC Science & Technology

    2007-01-01

    signed bit string composed of a photograph or some other biometric; the identification name or number; and information about the date, time, and...Also, a person who looked sufficiently like the person in the photograph on the card could use an exact copy of a valid card (although, with other...Afghanistan in the early 1990s, al Qaeda provided instruction in using cameras and how to develop photographs without being detected (United States v

  8. A source-channel coding approach to digital image protection and self-recovery.

    PubMed

    Sarreshtedari, Saeed; Akhaee, Mohammad Ali

    2015-07-01

    Watermarking algorithms have been widely applied to the field of image forensics recently. One of these very forensic applications is the protection of images against tampering. For this purpose, we need to design a watermarking algorithm fulfilling two purposes in case of image tampering: 1) detecting the tampered area of the received image and 2) recovering the lost information in the tampered zones. State-of-the-art techniques accomplish these tasks using watermarks consisting of check bits and reference bits. Check bits are used for tampering detection, whereas reference bits carry information about the whole image. The problem of recovering the lost reference bits still stands. This paper is aimed at showing that having the tampering location known, image tampering can be modeled and dealt with as an erasure error. Therefore, an appropriate design of channel code can protect the reference bits against tampering. In the present proposed method, the total watermark bit-budget is dedicated to three groups: 1) source encoder output bits; 2) channel code parity bits; and 3) check bits. In watermark embedding phase, the original image is source coded and the output bit stream is protected using appropriate channel encoder. For image recovery, erasure locations detected by check bits help channel erasure decoder to retrieve the original source encoded image. Experimental results show that our proposed scheme significantly outperforms recent techniques in terms of image quality for both watermarked and recovered image. The watermarked image quality gain is achieved through spending less bit-budget on watermark, while image recovery quality is considerably improved as a consequence of consistent performance of designed source and channel codes.

  9. Origami mechanologic.

    PubMed

    Treml, Benjamin; Gillman, Andrew; Buskohl, Philip; Vaia, Richard

    2018-06-18

    Robots autonomously interact with their environment through a continual sense-decide-respond control loop. Most commonly, the decide step occurs in a central processing unit; however, the stiffness mismatch between rigid electronics and the compliant bodies of soft robots can impede integration of these systems. We develop a framework for programmable mechanical computation embedded into the structure of soft robots that can augment conventional digital electronic control schemes. Using an origami waterbomb as an experimental platform, we demonstrate a 1-bit mechanical storage device that writes, erases, and rewrites itself in response to a time-varying environmental signal. Further, we show that mechanical coupling between connected origami units can be used to program the behavior of a mechanical bit, produce logic gates such as AND, OR, and three input majority gates, and transmit signals between mechanologic gates. Embedded mechanologic provides a route to add autonomy and intelligence in soft robots and machines. Copyright © 2018 the Author(s). Published by PNAS.

  10. High-fidelity data embedding for image annotation.

    PubMed

    He, Shan; Kirovski, Darko; Wu, Min

    2009-02-01

    High fidelity is a demanding requirement for data hiding, especially for images with artistic or medical value. This correspondence proposes a high-fidelity image watermarking for annotation with robustness to moderate distortion. To achieve the high fidelity of the embedded image, we introduce a visual perception model that aims at quantifying the local tolerance to noise for arbitrary imagery. Based on this model, we embed two kinds of watermarks: a pilot watermark that indicates the existence of the watermark and an information watermark that conveys a payload of several dozen bits. The objective is to embed 32 bits of metadata into a single image in such a way that it is robust to JPEG compression and cropping. We demonstrate the effectiveness of the visual model and the application of the proposed annotation technology using a database of challenging photographic and medical images that contain a large amount of smooth regions.

  11. Reversible Watermarking Surviving JPEG Compression.

    PubMed

    Zain, J; Clarke, M

    2005-01-01

    This paper will discuss the properties of watermarking medical images. We will also discuss the possibility of such images being compressed by JPEG and give an overview of JPEG compression. We will then propose a watermarking scheme that is reversible and robust to JPEG compression. The purpose is to verify the integrity and authenticity of medical images. We used 800x600x8 bits ultrasound (US) images in our experiment. SHA-256 of the image is then embedded in the Least significant bits (LSB) of an 8x8 block in the Region of Non Interest (RONI). The image is then compressed using JPEG and decompressed using Photoshop 6.0. If the image has not been altered, the watermark extracted will match the hash (SHA256) of the original image. The result shown that the embedded watermark is robust to JPEG compression up to image quality 60 (~91% compressed).

  12. Coring device with a improved core sleeve and anti-gripping collar with a collective core catcher

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Story, A.L.; Filshtinsky, M.

    1986-01-28

    This patent describes an improved coring apparatus used in combination with a coring bit and drill string. This device consists of: an outer driving structure adapted to be connected at one end to the coring bit for cutting a core in a borehole, and at the other end to the lower end of the drill string in telescoping and co-rotatable manner therewith; an inner barrel disposed within the outer driving structure and including a lower end portion adjacent to the bit; first means supporting the inner barrel in spaced relationship to the outer driving structure while permitting rotation of themore » driving structure with respect to the inner barrel; a woven metal mesh sleeve mounted in surrounding relation on at least a portion of the exterior surface of the inner barrel; second means, connected to a free end of the sleeve opposite the leading portion of the sleeve, for maintaining the portion of the sleeve which surrounds the inner barrel in compression and to maintain an inside diameter greater than the outside diameter of the inner barrel of the portion of the sleeve surrounding the inner barrel while the portion of the sleeve positioned inside the inner barrel being in tension to grip and compress a core received within the sleeve and having an outside diameter less than the inside diameter of the inner barrel when in tension, wherein the second means is also for engaging the core when the means is drawn into the inner barrel, and third means positioned within the inner barrel and connected to the leading portion of the sleeve to draw the sleeve within the inner barrel and to apply tension to the portion of the sleeve within the barrel to encase and grip the core as it is cut.« less

  13. Advantages and limitations of remotely operated sea floor drill rigs

    NASA Astrophysics Data System (ADS)

    Freudenthal, T.; Smith, D. J.; Wefer, G.

    2009-04-01

    A variety of research targets in marine sciences including the investigation of gas hydrates, slope stability, alteration of oceanic crust, ore formation and palaeoclimate can be addressed by shallow drilling. However, drill ships are mostly used for deep drillings, both because the effort of building up a drill string from a drill ship to the deep sea floor is tremendous and control on drill bit pressure from a movable platform and a vibrating drill string is poor especially in the upper hundred meters. During the last decade a variety of remotely operated drill rigs have been developed, that are deployed on the sea bed and operated from standard research vessels. These developments include the BMS (Bentic Multicoring System, developed by Williamson and Associates, operated by the Japanese Mining Agency), the PROD (Portable Remotely Operated Drill, developed and operated by Benthic Geotech), the Rockdrill 2 (developed and operated by the British geological Survey) and the MeBo (German abbreviation for sea floor drill rig, developed and operated by Marum, University of Bremen). These drill rigs reach drilling depths between 15 and 100 m. For shallow drillings remotely operated drill rigs are a cost effective alternative to the services of drill ships and have the major advantage that the drilling operations are performed from a stable platform independent of any ship movements due to waves, wind or currents. Sea floor drill rigs can be deployed both in shallow waters and the deep sea. A careful site survey is required before deploying the sea floor drill rig. Slope gradient, small scale topography and soil strength are important factors when planning the deployment. The choice of drill bits and core catcher depend on the expected geology. The required drill tools are stored on one or two magazines on the drill rig. The MeBo is the only remotely operated drill rig world wide that can use wire line coring technique. This method is much faster than conventional drilling. It has the advantage that the drill string stays in the drilled hole during the entire drilling process and prevents the drilled hole from collapsing while the inner core barrels comprising the drilled core sections are hooked up inside the drill string using a wire.

  14. Variable-bias coin tossing

    NASA Astrophysics Data System (ADS)

    Colbeck, Roger; Kent, Adrian

    2006-03-01

    Alice is a charismatic quantum cryptographer who believes her parties are unmissable; Bob is a (relatively) glamorous string theorist who believes he is an indispensable guest. To prevent possibly traumatic collisions of self-perception and reality, their social code requires that decisions about invitation or acceptance be made via a cryptographically secure variable-bias coin toss (VBCT). This generates a shared random bit by the toss of a coin whose bias is secretly chosen, within a stipulated range, by one of the parties; the other party learns only the random bit. Thus one party can secretly influence the outcome, while both can save face by blaming any negative decisions on bad luck. We describe here some cryptographic VBCT protocols whose security is guaranteed by quantum theory and the impossibility of superluminal signaling, setting our results in the context of a general discussion of secure two-party computation. We also briefly discuss other cryptographic applications of VBCT.

  15. Basic Composition and Enriched Integration in Idiom Processing: An EEG Study

    ERIC Educational Resources Information Center

    Canal, Paolo; Pesciarelli, Francesca; Vespignani, Francesco; Molinaro, Nicola; Cacciari, Cristina

    2017-01-01

    We investigated the extent to which the literal meanings of the words forming literally plausible idioms (e.g., "break the ice") are semantically composed and how the idiomatic meaning is integrated in the unfolding sentence representation. Participants read ambiguous idiom strings embedded in highly predictable, literal, and idiomatic…

  16. CRTP-13: ABC-GCB Expression Signatures in Human B-cell Lymphoma on the NanoString Platform | Frederick National Laboratory for Cancer Research

    Cancer.gov

    The CLIA Molecular Diagnostics Laboratory within the Cancer Research Technology Program will perform messenger RNA isolation and expression analysis specific to a 20-gene panel on formalin-fixed paraffin-embedded (FFPE) patient samples using the Nano

  17. Simrank: Rapid and sensitive general-purpose k-mer search tool

    PubMed Central

    2011-01-01

    Background Terabyte-scale collections of string-encoded data are expected from consortia efforts such as the Human Microbiome Project http://nihroadmap.nih.gov/hmp. Intra- and inter-project data similarity searches are enabled by rapid k-mer matching strategies. Software applications for sequence database partitioning, guide tree estimation, molecular classification and alignment acceleration have benefited from embedded k-mer searches as sub-routines. However, a rapid, general-purpose, open-source, flexible, stand-alone k-mer tool has not been available. Results Here we present a stand-alone utility, Simrank, which allows users to rapidly identify database strings the most similar to query strings. Performance testing of Simrank and related tools against DNA, RNA, protein and human-languages found Simrank 10X to 928X faster depending on the dataset. Conclusions Simrank provides molecular ecologists with a high-throughput, open source choice for comparing large sequence sets to find similarity. PMID:21524302

  18. String Theory, the Crisis in Particle Physics and the Ascent of Metaphoric Arguments

    NASA Astrophysics Data System (ADS)

    Schroer, Bert

    This essay presents a critical evaluation of the concepts of string theory and its impact on particle physics. The point of departure is a historical review of four decades of string theory within the broader context of six decades of failed attempts at an autonomous S matrix approach to particle theory. The central message, contained in Secs. 5 and 6, is that string theory is not what its name suggests, namely a theory of objects in space-time whose localization is string-instead of pointlike. Contrary to popular opinion, the oscillators corresponding to the Fourier models of a quantum-mechanical string do not become embedded in space-time and neither does the "range space" of a chiral conformal QFT acquire the interpretation of stringlike-localized quantum matter. Rather, string theory represents a solution to a problem which enjoyed some popularity in the 1960s: find a principle which, similar to the SO(4,2) group in the case of the hydrogen spectrum, determines an infinite component wave function with a (realistic) mass/spin spectrum. Instead of the group theory used in the old failed attempts, it creates this mass/spin spectrum by combining an internal oscillator quantum mechanics with a pointlike-localized quantum-field-theoretic object, i.e. the mass/spin tower "sits" over one point and does not arise from a wiggling string in space-time. The widespread acceptance of a theory whose interpretation has been based on metaphoric reasoning had a corroding influence on particle theory, a point which will be illustrated in the last section with some remarks of a more sociological nature. These remarks also lend additional support to observations on connections between the discourse in particle physics and the present Zeitgeist of the post-Cold War period that are made in the introduction.

  19. Reversible watermarking for authentication of DICOM images.

    PubMed

    Zain, J M; Baldwin, L P; Clarke, M

    2004-01-01

    We propose a watermarking scheme that can recover the original image from the watermarked one. The purpose is to verify the integrity and authenticity of DICOM images. We used 800x600x8 bits ultrasound (US) images in our experiment. SHA-256 of the whole image is embedded in the least significant bits of the RONI (Region of Non-Interest). If the image has not been altered, the watermark will be extracted and the original image will be recovered. SHA-256 of the recovered image will be compared with the extracted watermark for authentication.

  20. Image steganography based on 2k correction and coherent bit length

    NASA Astrophysics Data System (ADS)

    Sun, Shuliang; Guo, Yongning

    2014-10-01

    In this paper, a novel algorithm is proposed. Firstly, the edge of cover image is detected with Canny operator and secret data is embedded in edge pixels. Sorting method is used to randomize the edge pixels in order to enhance security. Coherent bit length L is determined by relevant edge pixels. Finally, the method of 2k correction is applied to achieve better imperceptibility in stego image. The experiment shows that the proposed method is better than LSB-3 and Jae-Gil Yu's in PSNR and capacity.

  1. Nanoscale Reactive Ion Etching of Silicon Nitride Thin Films for Embedded Nanomagnetic Device Fabrication

    NASA Astrophysics Data System (ADS)

    Hibbard-Lubow, David Luke

    The demands of digital memory have increased exponentially in recent history, requiring faster, smaller and more accurate storage methods. Two promising solutions to this ever-present problem are Bit Patterned Media (BPM) and Spin-Transfer Torque Magnetic Random Access Memory (STT-MRAM). Producing these technologies requires difficult and expensive fabrication techniques. Thus, the production processes must be optimized to allow these storage methods to compete commercially while continuing to increase their information storage density and reliability. I developed a process for the production of nanomagnetic devices (which can take the form of several types of digital memory) embedded in thin silicon nitride films. My focus was on optimizing the reactive ion etching recipe required to embed the device in the film. Ultimately, I found that recipe 37 (Power: 250W, CF4 nominal/actual flow rate: 25/25.4 sccm, O2 nominal/actual flow rate: 3.1/5.2 sccm, which gave a maximum pressure around 400 mTorr) gave the most repeatable and anisotropic results. I successfully used processes described in this thesis to make embedded nanomagnets, which could be used as bit patterned media. Another promising application of this work is to make embedded magnetic tunneling junctions, which are the storage medium used in MRAM. Doing so will require still some tweaks to the fabrication methods. Techniques for making these changes and their potential effects are discussed.

  2. Hiding Electronic Patient Record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications.

    PubMed

    Loan, Nazir A; Parah, Shabir A; Sheikh, Javaid A; Akhoon, Jahangir A; Bhat, Ghulam M

    2017-09-01

    A high capacity and semi-reversible data hiding scheme based on Pixel Repetition Method (PRM) and hybrid edge detection for scalable medical images has been proposed in this paper. PRM has been used to scale up the small sized image (seed image) and hybrid edge detection ensures that no important edge information is missed. The scaled up version of seed image has been divided into 2×2 non overlapping blocks. In each block there is one seed pixel whose status decides the number of bits to be embedded in the remaining three pixels of that block. The Electronic Patient Record (EPR)/data have been embedded by using Least Significant and Intermediate Significant Bit Substitution (ISBS). The RC4 encryption has been used to add an additional security layer for embedded EPR/data. The proposed scheme has been tested for various medical and general images and compared with some state of art techniques in the field. The experimental results reveal that the proposed scheme besides being semi-reversible and computationally efficient is capable of handling high payload and as such can be used effectively for electronic healthcare applications. Copyright © 2017. Published by Elsevier Inc.

  3. An RGB colour image steganography scheme using overlapping block-based pixel-value differencing

    PubMed Central

    Pal, Arup Kumar

    2017-01-01

    This paper presents a steganographic scheme based on the RGB colour cover image. The secret message bits are embedded into each colour pixel sequentially by the pixel-value differencing (PVD) technique. PVD basically works on two consecutive non-overlapping components; as a result, the straightforward conventional PVD technique is not applicable to embed the secret message bits into a colour pixel, since a colour pixel consists of three colour components, i.e. red, green and blue. Hence, in the proposed scheme, initially the three colour components are represented into two overlapping blocks like the combination of red and green colour components, while another one is the combination of green and blue colour components, respectively. Later, the PVD technique is employed on each block independently to embed the secret data. The two overlapping blocks are readjusted to attain the modified three colour components. The notion of overlapping blocks has improved the embedding capacity of the cover image. The scheme has been tested on a set of colour images and satisfactory results have been achieved in terms of embedding capacity and upholding the acceptable visual quality of the stego-image. PMID:28484623

  4. Embedded neural recording with TinyOS-based wireless-enabled processor modules.

    PubMed

    Farshchi, Shahin; Pesterev, Aleksey; Nuyujukian, Paul; Guenterberg, Eric; Mody, Istvan; Judy, Jack W

    2010-04-01

    To create a wireless neural recording system that can benefit from the continuous advancements being made in embedded microcontroller and communications technologies, an embedded-system-based architecture for wireless neural recording has been designed, fabricated, and tested. The system consists of commercial-off-the-shelf wireless-enabled processor modules (motes) for communicating the neural signals, and a back-end database server and client application for archiving and browsing the neural signals. A neural-signal-acquisition application has been developed to enable the mote to either acquire neural signals at a rate of 4000 12-bit samples per second, or detect and transmit spike heights and widths sampled at a rate of 16670 12-bit samples per second on a single channel. The motes acquire neural signals via a custom low-noise neural-signal amplifier with adjustable gain and high-pass corner frequency that has been designed, and fabricated in a 1.5-microm CMOS process. In addition to browsing acquired neural data, the client application enables the user to remotely toggle modes of operation (real-time or spike-only), as well as amplifier gain and high-pass corner frequency.

  5. Audio steganography by amplitude or phase modification

    NASA Astrophysics Data System (ADS)

    Gopalan, Kaliappan; Wenndt, Stanley J.; Adams, Scott F.; Haddad, Darren M.

    2003-06-01

    This paper presents the results of embedding short covert message utterances on a host, or cover, utterance by modifying the phase or amplitude of perceptually masked or significant regions of the host. In the first method, the absolute phase at selected, perceptually masked frequency indices was changed to fixed, covert data-dependent values. Embedded bits were retrieved at the receiver from the phase at the selected frequency indices. Tests on embedding a GSM-coded covert utterance on clean and noisy host utterances showed no noticeable difference in the stego compared to the hosts in speech quality or spectrogram. A bit error rate of 2 out of 2800 was observed for a clean host utterance while no error occurred for a noisy host. In the second method, the absolute phase of 10 or fewer perceptually significant points in the host was set in accordance with covert data. This resulted in a stego with successful data retrieval and a slightly noticeable degradation in speech quality. Modifying the amplitude of perceptually significant points caused perceptible differences in the stego even with small changes of amplitude made at five points per frame. Finally, the stego obtained by altering the amplitude at perceptually masked points showed barely noticeable differences and excellent data recovery.

  6. Adaptive steganography

    NASA Astrophysics Data System (ADS)

    Chandramouli, Rajarathnam; Li, Grace; Memon, Nasir D.

    2002-04-01

    Steganalysis techniques attempt to differentiate between stego-objects and cover-objects. In recent work we developed an explicit analytic upper bound for the steganographic capacity of LSB based steganographic techniques for a given false probability of detection. In this paper we look at adaptive steganographic techniques. Adaptive steganographic techniques take explicit steps to escape detection. We explore different techniques that can be used to adapt message embedding to the image content or to a known steganalysis technique. We investigate the advantages of adaptive steganography within an analytical framework. We also give experimental results with a state-of-the-art steganalysis technique demonstrating that adaptive embedding results in a significant number of bits embedded without detection.

  7. Reports on work in support of NASA's tracking and communication division

    NASA Technical Reports Server (NTRS)

    Feagin, Terry; Lekkos, Anthony

    1991-01-01

    This is a report on the research conducted during the period October 1, 1991 through December 31, 1991. The research is divided into two primary areas: (1) generalization of the Fault Isolation using Bit Strings (FIBS) technique to permit fuzzy information to be used to isolate faults in the tracking and communications system of the Space Station; and (2) a study of the activity that should occur in the on board systems in order to attempt to recover from failures that are external to the Space Station.

  8. Category Induction via Distributional Analysis: Evidence from a Serial Reaction Time Task

    ERIC Educational Resources Information Center

    Hunt, Ruskin H.; Aslin, Richard N.

    2010-01-01

    Category formation lies at the heart of a number of higher-order behaviors, including language. We assessed the ability of human adults to learn, from distributional information alone, categories embedded in a sequence of input stimuli using a serial reaction time task. Artificial grammars generated corpora of input strings containing a…

  9. Lossless Data Embedding—New Paradigm in Digital Watermarking

    NASA Astrophysics Data System (ADS)

    Fridrich, Jessica; Goljan, Miroslav; Du, Rui

    2002-12-01

    One common drawback of virtually all current data embedding methods is the fact that the original image is inevitably distorted due to data embedding itself. This distortion typically cannot be removed completely due to quantization, bit-replacement, or truncation at the grayscales 0 and 255. Although the distortion is often quite small and perceptual models are used to minimize its visibility, the distortion may not be acceptable for medical imagery (for legal reasons) or for military images inspected under nonstandard viewing conditions (after enhancement or extreme zoom). In this paper, we introduce a new paradigm for data embedding in images (lossless data embedding) that has the property that the distortion due to embedding can be completely removed from the watermarked image after the embedded data has been extracted. We present lossless embedding methods for the uncompressed formats (BMP, TIFF) and for the JPEG format. We also show how the concept of lossless data embedding can be used as a powerful tool to achieve a variety of nontrivial tasks, including lossless authentication using fragile watermarks, steganalysis of LSB embedding, and distortion-free robust watermarking.

  10. Practical steganalysis of digital images: state of the art

    NASA Astrophysics Data System (ADS)

    Fridrich, Jessica; Goljan, Miroslav

    2002-04-01

    Steganography is the art of hiding the very presence of communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a great deal of attention both from law enforcement and the media. In our paper, we classify and review current stego-detection algorithms that can be used to trace popular steganographic products. We recognize several qualitatively different approaches to practical steganalysis - visual detection, detection based on first order statistics (histogram analysis), dual statistics methods that use spatial correlations in images and higher-order statistics (RS steganalysis), universal blind detection schemes, and special cases, such as JPEG compatibility steganalysis. We also present some new results regarding our previously proposed detection of LSB embedding using sensitive dual statistics. The recent steganalytic methods indicate that the most common paradigm in image steganography - the bit-replacement or bit substitution - is inherently insecure with safe capacities far smaller than previously thought.

  11. Clinical evaluation of watermarked medical images.

    PubMed

    Zain, Jasni M; Fauzi, Abdul M; Aziz, Azian A

    2006-01-01

    Digital watermarking medical images provides security to the images. The purpose of this study was to see whether digitally watermarked images changed clinical diagnoses when assessed by radiologists. We embedded 256 bits watermark to various medical images in the region of non-interest (RONI) and 480K bits in both region of interest (ROI) and RONI. Our results showed that watermarking medical images did not alter clinical diagnoses. In addition, there was no difference in image quality when visually assessed by the medical radiologists. We therefore concluded that digital watermarking medical images were safe in terms of preserving image quality for clinical purposes.

  12. Exactly solvable field theories of closed strings

    NASA Astrophysics Data System (ADS)

    Brézin, E.; Kazakov, V. A.

    1990-02-01

    Field theories of closed strings are shown to be exactly solvable for a central charge of matter fields c=1-6/m(m+1),m=1,2, 3, .... The two-point function χ(λ,N), in which λ is the cosmological constant and N-1 is the string coupling constant, obeys a scaling law χ(λ,N=N-(m+1/2)C((λc-λ)Nm/(m+1/2)) in the limit in which N-1 goes to zero and λ goes to a critical value λc we have determined the universal non-linear differential equation satisfied by the function C. From this equation it is found that a phase transition takes place for some finite value of the scaling parameter (λc-λ)Nm/(m+1/2); this transition is a ``condensation of handles'' on the world sheet, characterized by a divergence of the averaged genus of the world sheets. The cases m=2,3 are elaborated in more details, and the case m=1, which corresponds to the embedding of a bosonic string in -2 dimensions, is reduced to explicit quadratures. Permanent address: Cybernetics Council and Academy of Sciences, ul. Vavilova 40, SU-117 333 Moscow, USSR.

  13. An effective biometric discretization approach to extract highly discriminative, informative, and privacy-protective binary representation

    NASA Astrophysics Data System (ADS)

    Lim, Meng-Hui; Teoh, Andrew Beng Jin

    2011-12-01

    Biometric discretization derives a binary string for each user based on an ordered set of biometric features. This representative string ought to be discriminative, informative, and privacy protective when it is employed as a cryptographic key in various security applications upon error correction. However, it is commonly believed that satisfying the first and the second criteria simultaneously is not feasible, and a tradeoff between them is always definite. In this article, we propose an effective fixed bit allocation-based discretization approach which involves discriminative feature extraction, discriminative feature selection, unsupervised quantization (quantization that does not utilize class information), and linearly separable subcode (LSSC)-based encoding to fulfill all the ideal properties of a binary representation extracted for cryptographic applications. In addition, we examine a number of discriminative feature-selection measures for discretization and identify the proper way of setting an important feature-selection parameter. Encouraging experimental results vindicate the feasibility of our approach.

  14. Quantum Watermarking Scheme Based on INEQR

    NASA Astrophysics Data System (ADS)

    Zhou, Ri-Gui; Zhou, Yang; Zhu, Changming; Wei, Lai; Zhang, Xiafen; Ian, Hou

    2018-04-01

    Quantum watermarking technology protects copyright by embedding invisible quantum signal in quantum multimedia data. In this paper, a watermarking scheme based on INEQR was presented. Firstly, the watermark image is extended to achieve the requirement of embedding carrier image. Secondly, the swap and XOR operation is used on the processed pixels. Since there is only one bit per pixel, XOR operation can achieve the effect of simple encryption. Thirdly, both the watermark image extraction and embedding operations are described, where the key image, swap operation and LSB algorithm are used. When the embedding is made, the binary image key is changed. It means that the watermark has been embedded. Of course, if the watermark image is extracted, the key's state need detected. When key's state is |1>, this extraction operation is carried out. Finally, for validation of the proposed scheme, both the Signal-to-noise ratio (PSNR) and the security of the scheme are analyzed.

  15. A new collage steganographic algorithm using cartoon design

    NASA Astrophysics Data System (ADS)

    Yi, Shuang; Zhou, Yicong; Pun, Chi-Man; Chen, C. L. Philip

    2014-02-01

    Existing collage steganographic methods suffer from low payload of embedding messages. To improve the payload while providing a high level of security protection to messages, this paper introduces a new collage steganographic algorithm using cartoon design. It embeds messages into the least significant bits (LSBs) of color cartoon objects, applies different permutations to each object, and adds objects to a cartoon cover image to obtain the stego image. Computer simulations and comparisons demonstrate that the proposed algorithm shows significantly higher capacity of embedding messages compared with existing collage steganographic methods.

  16. Topology-changing shape optimization with the genetic algorithm

    NASA Astrophysics Data System (ADS)

    Lamberson, Steven E., Jr.

    The goal is to take a traditional shape optimization problem statement and modify it slightly to allow for prescribed changes in topology. This modification enables greater flexibility in the choice of parameters for the topology optimization problem, while improving the direct physical relevance of the results. This modification involves changing the optimization problem statement from a nonlinear programming problem into a form of mixed-discrete nonlinear programing problem. The present work demonstrates one possible way of using the Genetic Algorithm (GA) to solve such a problem, including the use of "masking bits" and a new modification to the bit-string affinity (BSA) termination criterion specifically designed for problems with "masking bits." A simple ten-bar truss problem proves the utility of the modified BSA for this type of problem. A more complicated two dimensional bracket problem is solved using both the proposed approach and a more traditional topology optimization approach (Solid Isotropic Microstructure with Penalization or SIMP) to enable comparison. The proposed approach is able to solve problems with both local and global constraints, which is something traditional methods cannot do. The proposed approach has a significantly higher computational burden --- on the order of 100 times larger than SIMP, although the proposed approach is able to offset this with parallel computing.

  17. Why Sex? — Monte Carlo Simulations of Survival after Catastrophes

    NASA Astrophysics Data System (ADS)

    Sá Martins, J. S.; de Oliveira, S. Moss

    Using the Penna bit-string model for biological ageing we compare two kinds of reproductive regimes: Sexual reproduction (SR) and meiotic parthenogenesis (MP). The last one is a common type of asexual reproduction with recombination, found in diploid organisms. We show that although both regimes present roughly the same survival rates, the diversity generated by SR is much larger, and can prevent the extinction of a population submitted to a natural disaster. The fixation of bad genes inside an MP population, after many generations, explains our results. We also study the consequences of cloning (simple copy) on population diversity.

  18. Coherent attack on oblivious transfer based on single-qubit rotations

    NASA Astrophysics Data System (ADS)

    He, Guang Ping

    2018-04-01

    Recently a bit-string quantum oblivious transfer (OT) protocol based on single-qubit rotations was proposed (Rodrigues et al 2017 J. Phys. A: Math. Theor. 50 205301) and proven secure against few-qubit measurements. However, it was left as an open question whether the protocol remains secure against general attacks. Here, we close the gap by showing that if the receiver Bob can perform collective measurements on all qubits, then he can learn Alice’s secret message with a probability close to one. Thus the protocol fails to meet the security criterion of OT.

  19. Embedded System Implementation on FPGA System With μCLinux OS

    NASA Astrophysics Data System (ADS)

    Fairuz Muhd Amin, Ahmad; Aris, Ishak; Syamsul Azmir Raja Abdullah, Raja; Kalos Zakiah Sahbudin, Ratna

    2011-02-01

    Embedded systems are taking on more complicated tasks as the processors involved become more powerful. The embedded systems have been widely used in many areas such as in industries, automotives, medical imaging, communications, speech recognition and computer vision. The complexity requirements in hardware and software nowadays need a flexibility system for further enhancement in any design without adding new hardware. Therefore, any changes in the design system will affect the processor that need to be changed. To overcome this problem, a System On Programmable Chip (SOPC) has been designed and developed using Field Programmable Gate Array (FPGA). A softcore processor, NIOS II 32-bit RISC, which is the microprocessor core was utilized in FPGA system together with the embedded operating system(OS), μClinux. In this paper, an example of web server is explained and demonstrated

  20. No-scale inflation

    NASA Astrophysics Data System (ADS)

    Ellis, John; Garcia, Marcos A. G.; Nanopoulos, Dimitri V.; Olive, Keith A.

    2016-05-01

    Supersymmetry is the most natural framework for physics above the TeV scale, and the corresponding framework for early-Universe cosmology, including inflation, is supergravity. No-scale supergravity emerges from generic string compactifications and yields a non-negative potential, and is therefore a plausible framework for constructing models of inflation. No-scale inflation yields naturally predictions similar to those of the Starobinsky model based on R+{R}2 gravity, with a tilted spectrum of scalar perturbations: {n}s∼ 0.96, and small values of the tensor-to-scalar perturbation ratio r\\lt 0.1, as favoured by Planck and other data on the cosmic microwave background (CMB). Detailed measurements of the CMB may provide insights into the embedding of inflation within string theory as well as its links to collider physics.

  1. String Technique for Anterior Orbital Fish Hook Removal.

    PubMed

    Starr, Matthew R; Choi, Michael B; Mahr, Michael A; Mettu, Pradeep; Patterson, David F

    2018-06-13

    Removing fish hooks is a common procedure performed by many emergency department providers. There are several techniques that are commonly employed to aid in successful removal. However, when a fish hook becomes embedded within the orbit, there are limited options as to avoid damaging vital surrounding structures. The authors report the removal of a fish hook within the anterior orbit using the string technique in a 25-year-old patient. The procedure was performed under general anesthesia with the aid of size 5 polyglactin suture wrapped around the hook. The procedure itself took less than 10 seconds and was successful in swiftly and safely removing the hook without damaging surrounding orbital structures. The patient recovered well without any permanent sequelae.

  2. A microprocessor based on a two-dimensional semiconductor.

    PubMed

    Wachter, Stefan; Polyushkin, Dmitry K; Bethge, Ole; Mueller, Thomas

    2017-04-11

    The advent of microcomputers in the 1970s has dramatically changed our society. Since then, microprocessors have been made almost exclusively from silicon, but the ever-increasing demand for higher integration density and speed, lower power consumption and better integrability with everyday goods has prompted the search for alternatives. Germanium and III-V compound semiconductors are being considered promising candidates for future high-performance processor generations and chips based on thin-film plastic technology or carbon nanotubes could allow for embedding electronic intelligence into arbitrary objects for the Internet-of-Things. Here, we present a 1-bit implementation of a microprocessor using a two-dimensional semiconductor-molybdenum disulfide. The device can execute user-defined programs stored in an external memory, perform logical operations and communicate with its periphery. Our 1-bit design is readily scalable to multi-bit data. The device consists of 115 transistors and constitutes the most complex circuitry so far made from a two-dimensional material.

  3. Quantum watermarking scheme through Arnold scrambling and LSB steganography

    NASA Astrophysics Data System (ADS)

    Zhou, Ri-Gui; Hu, Wenwen; Fan, Ping

    2017-09-01

    Based on the NEQR of quantum images, a new quantum gray-scale image watermarking scheme is proposed through Arnold scrambling and least significant bit (LSB) steganography. The sizes of the carrier image and the watermark image are assumed to be 2n× 2n and n× n, respectively. Firstly, a classical n× n sized watermark image with 8-bit gray scale is expanded to a 2n× 2n sized image with 2-bit gray scale. Secondly, through the module of PA-MOD N, the expanded watermark image is scrambled to a meaningless image by the Arnold transform. Then, the expanded scrambled image is embedded into the carrier image by the steganography method of LSB. Finally, the time complexity analysis is given. The simulation experiment results show that our quantum circuit has lower time complexity, and the proposed watermarking scheme is superior to others.

  4. A microprocessor based on a two-dimensional semiconductor

    NASA Astrophysics Data System (ADS)

    Wachter, Stefan; Polyushkin, Dmitry K.; Bethge, Ole; Mueller, Thomas

    2017-04-01

    The advent of microcomputers in the 1970s has dramatically changed our society. Since then, microprocessors have been made almost exclusively from silicon, but the ever-increasing demand for higher integration density and speed, lower power consumption and better integrability with everyday goods has prompted the search for alternatives. Germanium and III-V compound semiconductors are being considered promising candidates for future high-performance processor generations and chips based on thin-film plastic technology or carbon nanotubes could allow for embedding electronic intelligence into arbitrary objects for the Internet-of-Things. Here, we present a 1-bit implementation of a microprocessor using a two-dimensional semiconductor--molybdenum disulfide. The device can execute user-defined programs stored in an external memory, perform logical operations and communicate with its periphery. Our 1-bit design is readily scalable to multi-bit data. The device consists of 115 transistors and constitutes the most complex circuitry so far made from a two-dimensional material.

  5. LSB-Based Steganography Using Reflected Gray Code

    NASA Astrophysics Data System (ADS)

    Chen, Chang-Chu; Chang, Chin-Chen

    Steganography aims to hide secret data into an innocuous cover-medium for transmission and to make the attacker cannot recognize the presence of secret data easily. Even the stego-medium is captured by the eavesdropper, the slight distortion is hard to be detected. The LSB-based data hiding is one of the steganographic methods, used to embed the secret data into the least significant bits of the pixel values in a cover image. In this paper, we propose an LSB-based scheme using reflected-Gray code, which can be applied to determine the embedded bit from secret information. Following the transforming rule, the LSBs of stego-image are not always equal to the secret bits and the experiment shows that the differences are up to almost 50%. According to the mathematical deduction and experimental results, the proposed scheme has the same image quality and payload as the simple LSB substitution scheme. In fact, our proposed data hiding scheme in the case of G1 (one bit Gray code) system is equivalent to the simple LSB substitution scheme.

  6. Securing resource constraints embedded devices using elliptic curve cryptography

    NASA Astrophysics Data System (ADS)

    Tam, Tony; Alfasi, Mohamed; Mozumdar, Mohammad

    2014-06-01

    The use of smart embedded device has been growing rapidly in recent time because of miniaturization of sensors and platforms. Securing data from these embedded devices is now become one of the core challenges both in industry and research community. Being embedded, these devices have tight constraints on resources such as power, computation, memory, etc. Hence it is very difficult to implement traditional Public Key Cryptography (PKC) into these resource constrained embedded devices. Moreover, most of the public key security protocols requires both public and private key to be generated together. In contrast with this, Identity Based Encryption (IBE), a public key cryptography protocol, allows a public key to be generated from an arbitrary string and the corresponding private key to be generated later on demand. While IBE has been actively studied and widely applied in cryptography research, conventional IBE primitives are also computationally demanding and cannot be efficiently implemented on embedded system. Simplified version of the identity based encryption has proven its competence in being robust and also satisfies tight budget of the embedded platform. In this paper, we describe the choice of several parameters for implementing lightweight IBE in resource constrained embedded sensor nodes. Our implementation of IBE is built using elliptic curve cryptography (ECC).

  7. Wavelet-based audio embedding and audio/video compression

    NASA Astrophysics Data System (ADS)

    Mendenhall, Michael J.; Claypoole, Roger L., Jr.

    2001-12-01

    Watermarking, traditionally used for copyright protection, is used in a new and exciting way. An efficient wavelet-based watermarking technique embeds audio information into a video signal. Several effective compression techniques are applied to compress the resulting audio/video signal in an embedded fashion. This wavelet-based compression algorithm incorporates bit-plane coding, index coding, and Huffman coding. To demonstrate the potential of this audio embedding and audio/video compression algorithm, we embed an audio signal into a video signal and then compress. Results show that overall compression rates of 15:1 can be achieved. The video signal is reconstructed with a median PSNR of nearly 33 dB. Finally, the audio signal is extracted from the compressed audio/video signal without error.

  8. Remember to blink: Reduced attentional blink following instructions to forget.

    PubMed

    Taylor, Tracy L

    2018-04-24

    This study used rapid serial visual presentation (RSVP) to determine whether, in an item-method directed forgetting task, study word processing ends earlier for forget words than for remember words. The critical manipulation required participants to monitor an RSVP stream of black nonsense strings in which a single blue word was embedded. The next item to follow the word was a string of red fs that instructed the participant to forget the word or green rs that instructed the participant to remember the word. After the memory instruction, a probe string of black xs or os appeared at postinstruction positions 1-8. Accuracy in reporting the identity of the probe string revealed an attenuated attentional blink following instructions to forget. A yes-no recognition task that followed the study trials confirmed a directed forgetting effect, with better recognition of remember words than forget words. Considered in the context of control conditions that required participants to commit either all or none of the study words to memory, the pattern of probe identification accuracy following the directed forgetting task argues that an intention to forget releases limited-capacity attentional resources sooner than an instruction to remember-despite participants needing to maintain an ongoing rehearsal set in both cases.

  9. Analysis of correlation structures in the Synechocystis PCC6803 genome.

    PubMed

    Wu, Zuo-Bing

    2014-12-01

    Transfer of nucleotide strings in the Synechocystis sp. PCC6803 genome is investigated to exhibit periodic and non-periodic correlation structures by using the recurrence plot method and the phase space reconstruction technique. The periodic correlation structures are generated by periodic transfer of several substrings in long periodic or non-periodic nucleotide strings embedded in the coding regions of genes. The non-periodic correlation structures are generated by non-periodic transfer of several substrings covering or overlapping with the coding regions of genes. In the periodic and non-periodic transfer, some gaps divide the long nucleotide strings into the substrings and prevent their global transfer. Most of the gaps are either the replacement of one base or the insertion/reduction of one base. In the reconstructed phase space, the points generated from two or three steps for the continuous iterative transfer via the second maximal distance can be fitted by two lines. It partly reveals an intrinsic dynamics in the transfer of nucleotide strings. Due to the comparison of the relative positions and lengths, the substrings concerned with the non-periodic correlation structures are almost identical to the mobile elements annotated in the genome. The mobile elements are thus endowed with the basic results on the correlation structures. Copyright © 2014 Elsevier Ltd. All rights reserved.

  10. JPEG 2000 Encoding with Perceptual Distortion Control

    NASA Technical Reports Server (NTRS)

    Watson, Andrew B.; Liu, Zhen; Karam, Lina J.

    2008-01-01

    An alternative approach has been devised for encoding image data in compliance with JPEG 2000, the most recent still-image data-compression standard of the Joint Photographic Experts Group. Heretofore, JPEG 2000 encoding has been implemented by several related schemes classified as rate-based distortion-minimization encoding. In each of these schemes, the end user specifies a desired bit rate and the encoding algorithm strives to attain that rate while minimizing a mean squared error (MSE). While rate-based distortion minimization is appropriate for transmitting data over a limited-bandwidth channel, it is not the best approach for applications in which the perceptual quality of reconstructed images is a major consideration. A better approach for such applications is the present alternative one, denoted perceptual distortion control, in which the encoding algorithm strives to compress data to the lowest bit rate that yields at least a specified level of perceptual image quality. Some additional background information on JPEG 2000 is prerequisite to a meaningful summary of JPEG encoding with perceptual distortion control. The JPEG 2000 encoding process includes two subprocesses known as tier-1 and tier-2 coding. In order to minimize the MSE for the desired bit rate, a rate-distortion- optimization subprocess is introduced between the tier-1 and tier-2 subprocesses. In tier-1 coding, each coding block is independently bit-plane coded from the most-significant-bit (MSB) plane to the least-significant-bit (LSB) plane, using three coding passes (except for the MSB plane, which is coded using only one "clean up" coding pass). For M bit planes, this subprocess involves a total number of (3M - 2) coding passes. An embedded bit stream is then generated for each coding block. Information on the reduction in distortion and the increase in the bit rate associated with each coding pass is collected. This information is then used in a rate-control procedure to determine the contribution of each coding block to the output compressed bit stream.

  11. Watermarking of ultrasound medical images in teleradiology using compressed watermark

    PubMed Central

    Badshah, Gran; Liew, Siau-Chuin; Zain, Jasni Mohamad; Ali, Mushtaq

    2016-01-01

    Abstract. The open accessibility of Internet-based medical images in teleradialogy face security threats due to the nonsecured communication media. This paper discusses the spatial domain watermarking of ultrasound medical images for content authentication, tamper detection, and lossless recovery. For this purpose, the image is divided into two main parts, the region of interest (ROI) and region of noninterest (RONI). The defined ROI and its hash value are combined as watermark, lossless compressed, and embedded into the RONI part of images at pixel’s least significant bits (LSBs). The watermark lossless compression and embedding at pixel’s LSBs preserve image diagnostic and perceptual qualities. Different lossless compression techniques including Lempel-Ziv-Welch (LZW) were tested for watermark compression. The performances of these techniques were compared based on more bit reduction and compression ratio. LZW was found better than others and used in tamper detection and recovery watermarking of medical images (TDARWMI) scheme development to be used for ROI authentication, tamper detection, localization, and lossless recovery. TDARWMI performance was compared and found to be better than other watermarking schemes. PMID:26839914

  12. LDFT-based watermarking resilient to local desynchronization attacks.

    PubMed

    Tian, Huawei; Zhao, Yao; Ni, Rongrong; Qin, Lunming; Li, Xuelong

    2013-12-01

    Up to now, a watermarking scheme that is robust against desynchronization attacks (DAs) is still a grand challenge. Most image watermarking resynchronization schemes in literature can survive individual global DAs (e.g., rotation, scaling, translation, and other affine transforms), but few are resilient to challenging cropping and local DAs. The main reason is that robust features for watermark synchronization are only globally invariable rather than locally invariable. In this paper, we present a blind image watermarking resynchronization scheme against local transform attacks. First, we propose a new feature transform named local daisy feature transform (LDFT), which is not only globally but also locally invariable. Then, the binary space partitioning (BSP) tree is used to partition the geometrically invariant LDFT space. In the BSP tree, the location of each pixel is fixed under global transform, local transform, and cropping. Lastly, the watermarking sequence is embedded bit by bit into each leaf node of the BSP tree by using the logarithmic quantization index modulation watermarking embedding method. Simulation results show that the proposed watermarking scheme can survive numerous kinds of distortions, including common image-processing attacks, local and global DAs, and noninvertible cropping.

  13. Wavelet-based compression of M-FISH images.

    PubMed

    Hua, Jianping; Xiong, Zixiang; Wu, Qiang; Castleman, Kenneth R

    2005-05-01

    Multiplex fluorescence in situ hybridization (M-FISH) is a recently developed technology that enables multi-color chromosome karyotyping for molecular cytogenetic analysis. Each M-FISH image set consists of a number of aligned images of the same chromosome specimen captured at different optical wavelength. This paper presents embedded M-FISH image coding (EMIC), where the foreground objects/chromosomes and the background objects/images are coded separately. We first apply critically sampled integer wavelet transforms to both the foreground and the background. We then use object-based bit-plane coding to compress each object and generate separate embedded bitstreams that allow continuous lossy-to-lossless compression of the foreground and the background. For efficient arithmetic coding of bit planes, we propose a method of designing an optimal context model that specifically exploits the statistical characteristics of M-FISH images in the wavelet domain. Our experiments show that EMIC achieves nearly twice as much compression as Lempel-Ziv-Welch coding. EMIC also performs much better than JPEG-LS and JPEG-2000 for lossless coding. The lossy performance of EMIC is significantly better than that of coding each M-FISH image with JPEG-2000.

  14. Multiple Embedded Processors for Fault-Tolerant Computing

    NASA Technical Reports Server (NTRS)

    Bolotin, Gary; Watson, Robert; Katanyoutanant, Sunant; Burke, Gary; Wang, Mandy

    2005-01-01

    A fault-tolerant computer architecture has been conceived in an effort to reduce vulnerability to single-event upsets (spurious bit flips caused by impingement of energetic ionizing particles or photons). As in some prior fault-tolerant architectures, the redundancy needed for fault tolerance is obtained by use of multiple processors in one computer. Unlike prior architectures, the multiple processors are embedded in a single field-programmable gate array (FPGA). What makes this new approach practical is the recent commercial availability of FPGAs that are capable of having multiple embedded processors. A working prototype (see figure) consists of two embedded IBM PowerPC 405 processor cores and a comparator built on a Xilinx Virtex-II Pro FPGA. This relatively simple instantiation of the architecture implements an error-detection scheme. A planned future version, incorporating four processors and two comparators, would correct some errors in addition to detecting them.

  15. Flexible Peripheral Component Interconnect Input/Output Card

    NASA Technical Reports Server (NTRS)

    Bigelow, Kirk K.; Jerry, Albert L.; Baricio, Alisha G.; Cummings, Jon K.

    2010-01-01

    The Flexible Peripheral Component Interconnect (PCI) Input/Output (I/O) Card is an innovative circuit board that provides functionality to interface between a variety of devices. It supports user-defined interrupts for interface synchronization, tracks system faults and failures, and includes checksum and parity evaluation of interface data. The card supports up to 16 channels of high-speed, half-duplex, low-voltage digital signaling (LVDS) serial data, and can interface combinations of serial and parallel devices. Placement of a processor within the field programmable gate array (FPGA) controls an embedded application with links to host memory over its PCI bus. The FPGA also provides protocol stacking and quick digital signal processor (DSP) functions to improve host performance. Hardware timers, counters, state machines, and other glue logic support interface communications. The Flexible PCI I/O Card provides an interface for a variety of dissimilar computer systems, featuring direct memory access functionality. The card has the following attributes: 8/16/32-bit, 33-MHz PCI r2.2 compliance, Configurable for universal 3.3V/5V interface slots, PCI interface based on PLX Technology's PCI9056 ASIC, General-use 512K 16 SDRAM memory, General-use 1M 16 Flash memory, FPGA with 3K to 56K logical cells with embedded 27K to 198K bits RAM, I/O interface: 32-channel LVDS differential transceivers configured in eight, 4-bit banks; signaling rates to 200 MHz per channel, Common SCSI-3, 68-pin interface connector.

  16. Sensor Authentication: Embedded Processor Code

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Svoboda, John

    2012-09-25

    Described is the c code running on the embedded Microchip 32bit PIC32MX575F256H located on the INL developed noise analysis circuit board. The code performs the following functions: Controls the noise analysis circuit board preamplifier voltage gains of 1, 10, 100, 000 Initializes the analog to digital conversion hardware, input channel selection, Fast Fourier Transform (FFT) function, USB communications interface, and internal memory allocations Initiates high resolution 4096 point 200 kHz data acquisition Computes complex 2048 point FFT and FFT magnitude. Services Host command set Transfers raw data to Host Transfers FFT result to host Communication error checking

  17. Role of string-like collective atomic motion on diffusion and structural relaxation in glass forming Cu-Zr alloys

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Hao; Department of Chemical and Materials Engineering, University of Alberta, Edmonton, Alberta T6G 2V4; Zhong, Cheng

    2015-04-28

    We investigate Cu-Zr liquid alloys using molecular dynamics simulation and well-accepted embedded atom method potentials over a wide range of chemical composition and temperature as model metallic glass-forming (GF) liquids. As with other types of GF materials, the dynamics of these complex liquids are characterized by “dynamic heterogeneity” in the form of transient polymeric clusters of highly mobile atoms that are composed in turn of atomic clusters exhibiting string-like cooperative motion. In accordance with the string model of relaxation, an extension of the Adam-Gibbs (AG) model, changes in the activation free energy ΔG{sub a} with temperature of both the Cumore » and Zr diffusion coefficients D, and the alpha structural relaxation time τ{sub α} can be described to a good approximation by changes in the average string length, L. In particular, we confirm that the strings are a concrete realization of the abstract “cooperatively rearranging regions” of AG. We also find coexisting clusters of relatively “immobile” atoms that exhibit predominantly icosahedral local packing rather than the low symmetry packing of “mobile” atoms. These two distinct types of dynamic heterogeneity are then associated with different fluid structural states. Glass-forming liquids are thus analogous to polycrystalline materials where the icosahedrally packed regions correspond to crystal grains, and the strings reside in the relatively disordered grain boundary-like regions exterior to these locally well-ordered regions. A dynamic equilibrium between localized (“immobile”) and wandering (“mobile”) particles exists in the liquid so that the dynamic heterogeneity can be considered to be type of self-assembly process. We also characterize changes in the local atomic free volume in the course of string-like atomic motion to better understand the initiation and propagation of these fluid excitations.« less

  18. Non-BPS attractors in 5 d and 6 d extended supergravity

    NASA Astrophysics Data System (ADS)

    Andrianopoli, L.; Ferrara, S.; Marrani, A.; Trigiante, M.

    2008-05-01

    We connect the attractor equations of a certain class of N=2, d=5 supergravities with their (1,0), d=6 counterparts, by relating the moduli space of non-BPS d=5 black hole/black string attractors to the moduli space of extremal dyonic black string d=6 non-BPS attractors. For d=5 real special symmetric spaces and for N=4,6,8 theories, we explicitly compute the flat directions of the black object potential corresponding to vanishing eigenvalues of its Hessian matrix. In the case N=4, we study the relation to the (2,0), d=6 theory. We finally describe the embedding of the N=2, d=5 magic models in N=8, d=5 supergravity as well as the interconnection among the corresponding charge orbits.

  19. Purse-string suture technique to enable laparoscopic management of the interstitial gestation of a heterotopic pregnancy.

    PubMed

    Aust, Thomas; O'Neill, Aoife; Cario, Gregory

    2011-01-01

    To describe the laparoscopic management of an interstitial gestation of a heterotopic pregnancy. Case report and technique description. Tertiary-level private practice. Woman with a 6-week gestation spontaneous heterotopic twin pregnancy: one twin intrauterine, one interstitial. A purse-string suture was applied to the proximal portion of the interstitial heterotopic pregnancy. To enable a cornual resection to be performed with minimal bleeding and without recourse to laparotomy. At 8 weeks gestation an ultrasound scan confirmed a viable singleton intrauterine pregnancy, but a scan at 12 weeks showed a missed miscarriage. The embedding of the suture into the uterine serosa prevents slipping of the ligature that could occur with a pretied loop. Copyright © 2011 American Society for Reproductive Medicine. All rights reserved.

  20. Holographic Chern-Simons defects

    DOE PAGES

    Fujita, Mitsutoshi; Melby-Thompson, Charles M.; Meyer, René; ...

    2016-06-28

    Here, we study SU(N ) Yang-Mills-Chern-Simons theory in the presence of defects that shift the Chern-Simons level from a holographic point of view by embedding the system in string theory. The model is a D3-D7 system in Type IIB string theory, whose gravity dual is given by the AdS soliton background with probe D7 branes attaching to the AdS boundary along the defects. We holographically renormalize the free energy of the defect system with sources, from which we obtain the correlation functions for certain operators naturally associated to these defects. We find interesting phase transitions when the separation of themore » defects as well as the temperature are varied. We also discuss some implications for the Fractional Quantum Hall Effect and for 2-dimensional QCD.« less

  1. Supersymmetric string waves

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bergshoeff, E.A.; Kallosh, R.; Ortin, T.

    1993-06-15

    We present plane-wave-type solutions of the lowest-order superstring effective action which have unbroken space-time supersymmetries. They are given by a stringy generalization of the Brinkmann metric, dialton, axion, and gauge fields. Some conspiracy between the metric and the axion field is required. The [alpha][prime] stringy corrections to the effective on-shell action, to the equations of motion (and therefore to the solutions themselves), and to the supersymmetry transformations are shown to vanish for a special class of these solutions that we call supersymmetric string waves (SSW's). In the SSW solutions, there exists a conspiracy not only between the metric and themore » axion field, but also between the gauge fields and the metric, since the embedding of the spin connection in the gauge group is required.« less

  2. Intersecting flavor branes

    NASA Astrophysics Data System (ADS)

    Pomoni, Elli; Rastelli, Leonardo

    2012-10-01

    We consider an instance of the AdS/CFT duality where the bulk theory contains an open string tachyon, and study the instability from the viewpoint of the boundary field theory. We focus on the specific example of the AdS5 × S 5 background with two probe D7 branes intersecting at general angles. For generic angles supersymmetry is completely broken and there is an open string tachyon between the branes. The field theory action for this system is obtained by coupling to {N}=4 super Yang-Mills two {N}=2 hyper multiplets in the fundamental representation of the SU( N) gauge group, but with different choices of embedding of the two {N}=2 subalgebras into {N}=4 . On the field theory side we find a one-loop Coleman-Weinberg instability in the effective potential for the fundamental scalars. We identify a mesonic operator as the dual of the open string tachyon. By AdS/CFT, we predict the tachyon mass for small 't Hooft coupling (large bulk curvature) and confirm that it violates the AdS stability bound.

  3. Can one ADM quantize relativistic bosonicstrings and membranes?

    NASA Astrophysics Data System (ADS)

    Moncrief, Vincent

    2006-04-01

    The standard methods for quantizing relativistic strings diverge significantly from the Dirac-Wheeler-DeWitt program for quantization of generally covariant systems and one wonders whether the latter could be successfully implemented as an alternative to the former. As a first step in this direction, we consider the possibility of quantizing strings (and also relativistic membranes) via a partially gauge-fixed ADM (Arnowitt, Deser and Misner) formulation of the reduced field equations for these systems. By exploiting some (Euclidean signature) Hamilton-Jacobi techniques that Mike Ryan and I had developed previously for the quantization of Bianchi IX cosmological models, I show how to construct Diff( S 1)-invariant (or Diff(Σ)-invariant in the case of membranes) ground state wave functionals for the cases of co-dimension one strings and membranes embedded in Minkowski spacetime. I also show that the reduced Hamiltonian density operators for these systems weakly commute when applied to physical (i.e. Diff( S 1) or Diff(Σ)-invariant) states. While many open questions remain, these preliminary results seem to encourage further research along the same lines.

  4. A brain-machine interface to navigate a mobile robot in a planar workspace: enabling humans to fly simulated aircraft with EEG.

    PubMed

    Akce, Abdullah; Johnson, Miles; Dantsker, Or; Bretl, Timothy

    2013-03-01

    This paper presents an interface for navigating a mobile robot that moves at a fixed speed in a planar workspace, with noisy binary inputs that are obtained asynchronously at low bit-rates from a human user through an electroencephalograph (EEG). The approach is to construct an ordered symbolic language for smooth planar curves and to use these curves as desired paths for a mobile robot. The underlying problem is then to design a communication protocol by which the user can, with vanishing error probability, specify a string in this language using a sequence of inputs. Such a protocol, provided by tools from information theory, relies on a human user's ability to compare smooth curves, just like they can compare strings of text. We demonstrate our interface by performing experiments in which twenty subjects fly a simulated aircraft at a fixed speed and altitude with input only from EEG. Experimental results show that the majority of subjects are able to specify desired paths despite a wide range of errors made in decoding EEG signals.

  5. An investigation of messy genetic algorithms

    NASA Technical Reports Server (NTRS)

    Goldberg, David E.; Deb, Kalyanmoy; Korb, Bradley

    1990-01-01

    Genetic algorithms (GAs) are search procedures based on the mechanics of natural selection and natural genetics. They combine the use of string codings or artificial chromosomes and populations with the selective and juxtapositional power of reproduction and recombination to motivate a surprisingly powerful search heuristic in many problems. Despite their empirical success, there has been a long standing objection to the use of GAs in arbitrarily difficult problems. A new approach was launched. Results to a 30-bit, order-three-deception problem were obtained using a new type of genetic algorithm called a messy genetic algorithm (mGAs). Messy genetic algorithms combine the use of variable-length strings, a two-phase selection scheme, and messy genetic operators to effect a solution to the fixed-coding problem of standard simple GAs. The results of the study of mGAs in problems with nonuniform subfunction scale and size are presented. The mGA approach is summarized, both its operation and the theory of its use. Experiments on problems of varying scale, varying building-block size, and combined varying scale and size are presented.

  6. Programmable superpositions of Ising configurations

    NASA Astrophysics Data System (ADS)

    Sieberer, Lukas M.; Lechner, Wolfgang

    2018-05-01

    We present a framework to prepare superpositions of bit strings, i.e., many-body spin configurations, with deterministic programmable probabilities. The spin configurations are encoded in the degenerate ground states of the lattice-gauge representation of an all-to-all connected Ising spin glass. The ground-state manifold is invariant under variations of the gauge degrees of freedom, which take the form of four-body parity constraints. Our framework makes use of these degrees of freedom by individually tuning them to dynamically prepare programmable superpositions. The dynamics combines an adiabatic protocol with controlled diabatic transitions. We derive an effective model that allows one to determine the control parameters efficiently even for large system sizes.

  7. An agent-based computational model for tuberculosis spreading on age-structured populations

    NASA Astrophysics Data System (ADS)

    Graciani Rodrigues, C. C.; Espíndola, Aquino L.; Penna, T. J. P.

    2015-06-01

    In this work we present an agent-based computational model to study the spreading of the tuberculosis (TB) disease on age-structured populations. The model proposed is a merge of two previous models: an agent-based computational model for the spreading of tuberculosis and a bit-string model for biological aging. The combination of TB with the population aging, reproduces the coexistence of health states, as seen in real populations. In addition, the universal exponential behavior of mortalities curves is still preserved. Finally, the population distribution as function of age shows the prevalence of TB mostly in elders, for high efficacy treatments.

  8. Embedded Reasoning Supporting Aerospace IVHM

    DTIC Science & Technology

    2007-01-01

    c method (BIT or health assessment algorithm) which the monitoring diagnostic relies on input information tics and Astronautics In the diagram...viewing of the current health state of all monitored subsystems, while also providing a means to probe deeper in the event anomalous operation is...seeks to integrate detection , diagnostic, and prognostic capabilities with a hierarchical diagnostic reasoning architecture into a single

  9. Word Skipping During Sentence Reading: Effects of Lexicality on Parafoveal Processing

    PubMed Central

    Choi, Wonil; Gordon, Peter C.

    2013-01-01

    Two experiments examined how lexical status affects the targeting of saccades during reading by using the boundary technique to vary independently the content of a letter string when seen in parafoveal preview and when directly fixated. Experiment 1 measured the skipping rate for a target word embedded in a sentence under three parafoveal preview conditions: full preview (e.g. brain-brain), pseudohomophone preview (e.g. brane-brain), and orthographic nonword control preview (e.g. brant-brain); in the first condition the preview string was always an English word while in the second and third conditions it was always a nonword. Experiment 2 investigated three conditions where the preview string was always a word: full preview (e.g. beach-beach), homophone preview (e.g. beech-beach), and orthographic control preview (e.g. bench-beach). None of the letter string manipulations used to create the preview conditions in the experiments disrupted sub-lexical orthographic or phonological patterns. In Experiment 1 higher skipping rates were observed for the full (lexical) preview condition, which consisted of a word, compared to the nonword preview conditions (pseudohomophone and orthographic-control). In contrast Experiment 2 showed no difference in skipping rates across the three types of lexical preview conditions (full, homophone and orthographic control), though preview type did influence reading times. This pattern indicates that skipping depends not only on the presence of disrupted sub-lexical patterns of orthography or phonology but is also critically dependent on processes that are sensitive to the lexical status of letter strings in the parafovea. PMID:24170376

  10. Perl Modules for Constructing Iterators

    NASA Technical Reports Server (NTRS)

    Tilmes, Curt

    2009-01-01

    The Iterator Perl Module provides a general-purpose framework for constructing iterator objects within Perl, and a standard API for interacting with those objects. Iterators are an object-oriented design pattern where a description of a series of values is used in a constructor. Subsequent queries can request values in that series. These Perl modules build on the standard Iterator framework and provide iterators for some other types of values. Iterator::DateTime constructs iterators from DateTime objects or Date::Parse descriptions and ICal/RFC 2445 style re-currence descriptions. It supports a variety of input parameters, including a start to the sequence, an end to the sequence, an Ical/RFC 2445 recurrence describing the frequency of the values in the series, and a format description that can refine the presentation manner of the DateTime. Iterator::String constructs iterators from string representations. This module is useful in contexts where the API consists of supplying a string and getting back an iterator where the specific iteration desired is opaque to the caller. It is of particular value to the Iterator::Hash module which provides nested iterations. Iterator::Hash constructs iterators from Perl hashes that can include multiple iterators. The constructed iterators will return all the permutations of the iterations of the hash by nested iteration of embedded iterators. A hash simply includes a set of keys mapped to values. It is a very common data structure used throughout Perl programming. The Iterator:: Hash module allows a hash to include strings defining iterators (parsed and dispatched with Iterator::String) that are used to construct an overall series of hash values.

  11. Spin Foam Models of Quantum Gravity

    NASA Astrophysics Data System (ADS)

    Miković, A.

    2005-03-01

    We give a short review of the spin foam models of quantum gravity, with an emphasis on the Barret-Crane model. After explaining the shortcomings of the Barret-Crane model, we briefly discuss two new approaches, one based on the 3d spin foam state sum invariants for the embedded spin networks, and the other based on representing the string scattering amplitudes as 2d spin foam state sum invariants.

  12. Automatic identification and location technology of glass insulator self-shattering

    NASA Astrophysics Data System (ADS)

    Huang, Xinbo; Zhang, Huiying; Zhang, Ye

    2017-11-01

    The insulator of transmission lines is one of the most important infrastructures, which is vital to ensure the safe operation of transmission lines under complex and harsh operating conditions. The glass insulator often self-shatters but the available identification methods are inefficient and unreliable. Then, an automatic identification and localization technology of self-shattered glass insulators is proposed, which consists of the cameras installed on the tower video monitoring devices or the unmanned aerial vehicles, the 4G/OPGW network, and the monitoring center, where the identification and localization algorithm is embedded into the expert software. First, the images of insulators are captured by cameras, which are processed to identify the region of insulator string by the presented identification algorithm of insulator string. Second, according to the characteristics of the insulator string image, a mathematical model of the insulator string is established to estimate the direction and the length of the sliding blocks. Third, local binary pattern histograms of the template and the sliding block are extracted, by which the self-shattered insulator can be recognized and located. Finally, a series of experiments is fulfilled to verify the effectiveness of the algorithm. For single insulator images, Ac, Pr, and Rc of the algorithm are 94.5%, 92.38%, and 96.78%, respectively. For double insulator images, Ac, Pr, and Rc are 90.00%, 86.36%, and 93.23%, respectively.

  13. Spline-based high-accuracy piecewise-polynomial phase-to-sinusoid amplitude converters.

    PubMed

    Petrinović, Davor; Brezović, Marko

    2011-04-01

    We propose a method for direct digital frequency synthesis (DDS) using a cubic spline piecewise-polynomial model for a phase-to-sinusoid amplitude converter (PSAC). This method offers maximum smoothness of the output signal. Closed-form expressions for the cubic polynomial coefficients are derived in the spectral domain and the performance analysis of the model is given in the time and frequency domains. We derive the closed-form performance bounds of such DDS using conventional metrics: rms and maximum absolute errors (MAE) and maximum spurious free dynamic range (SFDR) measured in the discrete time domain. The main advantages of the proposed PSAC are its simplicity, analytical tractability, and inherent numerical stability for high table resolutions. Detailed guidelines for a fixed-point implementation are given, based on the algebraic analysis of all quantization effects. The results are verified on 81 PSAC configurations with the output resolutions from 5 to 41 bits by using a bit-exact simulation. The VHDL implementation of a high-accuracy DDS based on the proposed PSAC with 28-bit input phase word and 32-bit output value achieves SFDR of its digital output signal between 180 and 207 dB, with a signal-to-noise ratio of 192 dB. Its implementation requires only one 18 kB block RAM and three 18-bit embedded multipliers in a typical field-programmable gate array (FPGA) device. © 2011 IEEE

  14. Ignition propagation and heat effects of propellant chips embedded in castable inhibitor using a laser flux test bomb

    NASA Technical Reports Server (NTRS)

    Bolton, Douglas E., Jr.

    1993-01-01

    A castable inhibitor is applied to the aft face of the Space Shuttle Redesigned Solid Rocket Motor (RSRM) forward segment propellant grain to control propellant surface burn area. During fabrication, the propellant surface is trimmed prior to the inhibitor application. This produces a potential for small propellant chips to remain undetected on the propellant surface and contaminate the inhibitor during application. The concern was that undetected propellant chips in the inhibitor might provide a fuse path for premature propellant ignition underneath the inhibitor. To evaluate the fuse path potential, testing was performed on inhibitor samples with embedded propellant. The internal motor environment was simulated with a calibrated CO2 laser beam directed onto a sample which was placed in a 4100 kPa (600 psi) nitrogen pressurized bomb (laser bomb). The testing showed definitive results pertaining to fuse path formation. Embedded propellant chips did not autoignite until the receding heat affected inhibitor surface reached, or passed, the propellant chip. Samples with embedded propellant chips in alignment did not propagate ignition from one chip to another with separation distances as small as 0.010 cm(0.004 inc) and some as little as 0.0051 cm (0.002 in). Propellant chips with volumes approximately less than 0.025 cu cm (0.0015 cu in) (which did not propagate ignition) did not increase the inhibitor material decomposition depth more than the resulting void cavity of the burned out propellant chip. In addition, the depth of this void cavity did not increase until it was overtaken by the surrounding material decomposition depth. This was due, in part, to the retention of the protective inhibitor char layer. Samples with embedded propellant strings, whose thicknesses were below 0.023 cm (0.009 in), did not propagate ignition. Propellant string thicknesses above 0.038 cm (0.015 in) did propagate ignition. Test sample char and heat affected layer measurements and observations compared well with those from the Space Shuttle Solid Rocket Motor (SRM) Technical Evaluation Motor no. 9(TEM-9).

  15. A microprocessor based on a two-dimensional semiconductor

    PubMed Central

    Wachter, Stefan; Polyushkin, Dmitry K.; Bethge, Ole; Mueller, Thomas

    2017-01-01

    The advent of microcomputers in the 1970s has dramatically changed our society. Since then, microprocessors have been made almost exclusively from silicon, but the ever-increasing demand for higher integration density and speed, lower power consumption and better integrability with everyday goods has prompted the search for alternatives. Germanium and III–V compound semiconductors are being considered promising candidates for future high-performance processor generations and chips based on thin-film plastic technology or carbon nanotubes could allow for embedding electronic intelligence into arbitrary objects for the Internet-of-Things. Here, we present a 1-bit implementation of a microprocessor using a two-dimensional semiconductor—molybdenum disulfide. The device can execute user-defined programs stored in an external memory, perform logical operations and communicate with its periphery. Our 1-bit design is readily scalable to multi-bit data. The device consists of 115 transistors and constitutes the most complex circuitry so far made from a two-dimensional material. PMID:28398336

  16. Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization

    NASA Astrophysics Data System (ADS)

    Bajaj, Ruchika; Bedi, Punam; Pal, S. K.

    Steganography is an art of hiding information in such a way that prevents the detection of hidden messages. Besides security of data, the quantity of data that can be hidden in a single cover medium, is also very important. We present a secure data hiding scheme with high embedding capacity for messages of variable length based on Particle Swarm Optimization. This technique gives the best pixel positions in the cover image, which can be used to hide the secret data. In the proposed scheme, k bits of the secret message are substituted into k least significant bits of the image pixel, where k varies from 1 to 4 depending on the message length. The proposed scheme is tested and results compared with simple LSB substitution, uniform 4-bit LSB hiding (with PSO) for the test images Nature, Baboon, Lena and Kitty. The experimental study confirms that the proposed method achieves high data hiding capacity and maintains imperceptibility and minimizes the distortion between the cover image and the obtained stego image.

  17. Selectively Encrypted Pull-Up Based Watermarking of Biometric data

    NASA Astrophysics Data System (ADS)

    Shinde, S. A.; Patel, Kushal S.

    2012-10-01

    Biometric authentication systems are becoming increasingly popular due to their potential usage in information security. However, digital biometric data (e.g. thumb impression) are themselves vulnerable to security attacks. There are various methods are available to secure biometric data. In biometric watermarking the data are embedded in an image container and are only retrieved if the secrete key is available. This container image is encrypted to have more security against the attack. As wireless devices are equipped with battery as their power supply, they have limited computational capabilities; therefore to reduce energy consumption we use the method of selective encryption of container image. The bit pull-up-based biometric watermarking scheme is based on amplitude modulation and bit priority which reduces the retrieval error rate to great extent. By using selective Encryption mechanism we expect more efficiency in time at the time of encryption as well as decryption. Significant reduction in error rate is expected to be achieved by the bit pull-up method.

  18. Quantum-Assisted Learning of Hardware-Embedded Probabilistic Graphical Models

    NASA Astrophysics Data System (ADS)

    Benedetti, Marcello; Realpe-Gómez, John; Biswas, Rupak; Perdomo-Ortiz, Alejandro

    2017-10-01

    Mainstream machine-learning techniques such as deep learning and probabilistic programming rely heavily on sampling from generally intractable probability distributions. There is increasing interest in the potential advantages of using quantum computing technologies as sampling engines to speed up these tasks or to make them more effective. However, some pressing challenges in state-of-the-art quantum annealers have to be overcome before we can assess their actual performance. The sparse connectivity, resulting from the local interaction between quantum bits in physical hardware implementations, is considered the most severe limitation to the quality of constructing powerful generative unsupervised machine-learning models. Here, we use embedding techniques to add redundancy to data sets, allowing us to increase the modeling capacity of quantum annealers. We illustrate our findings by training hardware-embedded graphical models on a binarized data set of handwritten digits and two synthetic data sets in experiments with up to 940 quantum bits. Our model can be trained in quantum hardware without full knowledge of the effective parameters specifying the corresponding quantum Gibbs-like distribution; therefore, this approach avoids the need to infer the effective temperature at each iteration, speeding up learning; it also mitigates the effect of noise in the control parameters, making it robust to deviations from the reference Gibbs distribution. Our approach demonstrates the feasibility of using quantum annealers for implementing generative models, and it provides a suitable framework for benchmarking these quantum technologies on machine-learning-related tasks.

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hymel, Ross

    The Public Key (PK) FPGA software performs asymmetric authentication using the 163-bit Elliptic Curve Digital Signature Algorithm (ECDSA) on an embedded FPGA platform. A digital signature is created on user-supplied data, and communication with a host system is performed via a Serial Peripheral Interface (SPI) bus. Software includes all components necessary for signing, including custom random number generator for key creation and SHA-256 for data hashing.

  20. Steganographic optical image encryption system based on reversible data hiding and double random phase encoding

    NASA Astrophysics Data System (ADS)

    Chuang, Cheng-Hung; Chen, Yen-Lin

    2013-02-01

    This study presents a steganographic optical image encryption system based on reversible data hiding and double random phase encoding (DRPE) techniques. Conventional optical image encryption systems can securely transmit valuable images using an encryption method for possible application in optical transmission systems. The steganographic optical image encryption system based on the DRPE technique has been investigated to hide secret data in encrypted images. However, the DRPE techniques vulnerable to attacks and many of the data hiding methods in the DRPE system can distort the decrypted images. The proposed system, based on reversible data hiding, uses a JBIG2 compression scheme to achieve lossless decrypted image quality and perform a prior encryption process. Thus, the DRPE technique enables a more secured optical encryption process. The proposed method extracts and compresses the bit planes of the original image using the lossless JBIG2 technique. The secret data are embedded in the remaining storage space. The RSA algorithm can cipher the compressed binary bits and secret data for advanced security. Experimental results show that the proposed system achieves a high data embedding capacity and lossless reconstruction of the original images.

  1. A memory-efficient data structure representing exact-match overlap graphs with application for next-generation DNA assembly.

    PubMed

    Dinh, Hieu; Rajasekaran, Sanguthevar

    2011-07-15

    Exact-match overlap graphs have been broadly used in the context of DNA assembly and the shortest super string problem where the number of strings n ranges from thousands to billions. The length ℓ of the strings is from 25 to 1000, depending on the DNA sequencing technologies. However, many DNA assemblers using overlap graphs suffer from the need for too much time and space in constructing the graphs. It is nearly impossible for these DNA assemblers to handle the huge amount of data produced by the next-generation sequencing technologies where the number n of strings could be several billions. If the overlap graph is explicitly stored, it would require Ω(n(2)) memory, which could be prohibitive in practice when n is greater than a hundred million. In this article, we propose a novel data structure using which the overlap graph can be compactly stored. This data structure requires only linear time to construct and and linear memory to store. For a given set of input strings (also called reads), we can informally define an exact-match overlap graph as follows. Each read is represented as a node in the graph and there is an edge between two nodes if the corresponding reads overlap sufficiently. A formal description follows. The maximal exact-match overlap of two strings x and y, denoted by ov(max)(x, y), is the longest string which is a suffix of x and a prefix of y. The exact-match overlap graph of n given strings of length ℓ is an edge-weighted graph in which each vertex is associated with a string and there is an edge (x, y) of weight ω=ℓ-|ov(max)(x, y)| if and only if ω ≤ λ, where |ov(max)(x, y)| is the length of ov(max)(x, y) and λ is a given threshold. In this article, we show that the exact-match overlap graphs can be represented by a compact data structure that can be stored using at most (2λ-1)(2⌈logn⌉+⌈logλ⌉)n bits with a guarantee that the basic operation of accessing an edge takes O(log λ) time. We also propose two algorithms for constructing the data structure for the exact-match overlap graph. The first algorithm runs in O(λℓnlogn) worse-case time and requires O(λ) extra memory. The second one runs in O(λℓn) time and requires O(n) extra memory. Our experimental results on a huge amount of simulated data from sequence assembly show that the data structure can be constructed efficiently in time and memory. Our DNA sequence assembler that incorporates the data structure is freely available on the web at http://www.engr.uconn.edu/~htd06001/assembler/leap.zip

  2. Digital interface of electronic transformers based on embedded system

    NASA Astrophysics Data System (ADS)

    Shang, Qiufeng; Qi, Yincheng

    2008-10-01

    Benefited from digital interface of electronic transformers, information sharing and system integration in substation can be realized. An embedded system-based digital output scheme of electronic transformers is proposed. The digital interface is designed with S3C44B0X 32bit RISC microprocessor as the hardware platform. The μCLinux operation system (OS) is transplanted on ARM7 (S3C44B0X). Applying Ethernet technology as the communication mode in the substation automation system is a new trend. The network interface chip RTL8019AS is adopted. Data transmission is realized through the in-line TCP/IP protocol of uClinux embedded OS. The application result and character analysis show that the design can meet the real-time and reliability requirements of IEC60044-7/8 electronic voltage/current instrument transformer standards.

  3. Light Weight MP3 Watermarking Method for Mobile Terminals

    NASA Astrophysics Data System (ADS)

    Takagi, Koichi; Sakazawa, Shigeyuki; Takishima, Yasuhiro

    This paper proposes a novel MP3 watermarking method which is applicable to a mobile terminal with limited computational resources. Considering that in most cases the embedded information is copyright information or metadata, which should be extracted before playing back audio contents, the watermark detection process should be executed at high speed. However, when conventional methods are used with a mobile terminal, it takes a considerable amount of time to detect a digital watermark. This paper focuses on scalefactor manipulation to enable high speed watermark embedding/detection for MP3 audio and also proposes the manipulation method which minimizes audio quality degradation adaptively. Evaluation tests showed that the proposed method is capable of embedding 3 bits/frame information without degrading audio quality and detecting it at very high speed. Finally, this paper describes application examples for authentication with a digital signature.

  4. A novel edge based embedding in medical images based on unique key generated using sudoku puzzle design.

    PubMed

    Santhi, B; Dheeptha, B

    2016-01-01

    The field of telemedicine has gained immense momentum, owing to the need for transmitting patients' information securely. This paper puts forth a unique method for embedding data in medical images. It is based on edge based embedding and XOR coding. The algorithm proposes a novel key generation technique by utilizing the design of a sudoku puzzle to enhance the security of the transmitted message. The edge blocks of the cover image alone, are utilized to embed the payloads. The least significant bit of the pixel values are changed by XOR coding depending on the data to be embedded and the key generated. Hence the distortion in the stego image is minimized and the information is retrieved accurately. Data is embedded in the RGB planes of the cover image, thus increasing its embedding capacity. Several measures including peak signal noise ratio (PSNR), mean square error (MSE), universal image quality index (UIQI) and correlation coefficient (R) are the image quality measures that have been used to analyze the quality of the stego image. It is evident from the results that the proposed technique outperforms the former methodologies.

  5. Cosmological applications of singular hypersurfaces in general relativity

    NASA Astrophysics Data System (ADS)

    Laguna-Castillo, Pablo

    Three applications to cosmology of surface layers, based on Israel's formalism of singular hypersurfaces and thin shells in general relativity, are presented. Einstein's field equations are analyzed in the presence of a bubble nucleated in vacuum phase transitions within the context of the old inflationary universe scenario. The evolution of a bubble with vanishing surface energy density is studied. It is found that such bubbles lead to a worm-hole matching. Next, the observable four-dimensional universe is considered as a singular hypersurface of discontinuity embedded in a five-dimensional Kaluza-Klein cosmology. It is possible to rewrite the projected five-dimensional Einstein equations on the surface layer in a similar way to the four-dimensional Robertson-Walker cosmology equations. Next, a model is described for an infinite-length, straight U(1) cosmic string as a cylindrical, singular shell enclosing a region of false vacuum. A set of equations is introduced which are required to develop a three-dimensional computer code whose purpose is to study the process of intercommuting cosmic strings with the inclusion of gravitational effects. The outcome is evolution and constraint equations for the gravitational, scalar and gauge field of two initially separated, perpendicular, cosmic strings.

  6. SOPanG: online text searching over a pan-genome.

    PubMed

    Cislak, Aleksander; Grabowski, Szymon; Holub, Jan

    2018-06-22

    The many thousands of high-quality genomes available nowadays imply a shift from single genome to pan-genomic analyses. A basic algorithmic building brick for such a scenario is online search over a collection of similar texts, a problem with surprisingly few solutions presented so far. We present SOPanG, a simple tool for exact pattern matching over an elastic-degenerate string, a recently proposed simplified model for the pan-genome. Thanks to bit-parallelism, it achieves pattern matching speeds above 400MB/s, more than an order of magnitude higher than of other software. SOPanG is available for free from: https://github.com/MrAlexSee/sopang. Supplementary data are available at Bioinformatics online.

  7. Quantum key distribution without the wavefunction

    NASA Astrophysics Data System (ADS)

    Niestegge, Gerd

    A well-known feature of quantum mechanics is the secure exchange of secret bit strings which can then be used as keys to encrypt messages transmitted over any classical communication channel. It is demonstrated that this quantum key distribution allows a much more general and abstract access than commonly thought. The results include some generalizations of the Hilbert space version of quantum key distribution, but are based upon a general nonclassical extension of conditional probability. A special state-independent conditional probability is identified as origin of the superior security of quantum key distribution; this is a purely algebraic property of the quantum logic and represents the transition probability between the outcomes of two consecutive quantum measurements.

  8. Simple Model of Mating Preference and Extinction Risk

    NASA Astrophysics Data System (ADS)

    PȨKALSKI, Andrzej

    We present a simple model of a population of individuals characterized by their genetic structure in the form of a double string of bits and the phenotype following from it. The population is living in an unchanging habitat preferring a certain type of phenotype (optimum). Individuals are unisex, however a pair is necessary for breeding. An individual rejects a mate if the latter's phenotype contains too many bad, i.e. different from the optimum, genes in the same places as the individual's. We show that such strategy, analogous to disassortative mating based on the major histocompatibility complex, avoiding inbreeding and incest, could be beneficial for the population and could reduce considerably the extinction risk, especially in small populations.

  9. The two populations’ cellular automata model with predation based on the Penna model

    NASA Astrophysics Data System (ADS)

    He, Mingfeng; Lin, Jing; Jiang, Heng; Liu, Xin

    2002-09-01

    In Penna's single-species asexual bit-string model of biological ageing, the Verhulst factor has too strong a restraining effect on the development of the population. Danuta Makowiec gave an improved model based on the lattice, where the restraining factor of the four neighbours take the place of the Verhulst factor. Here, we discuss the two populations’ Penna model with predation on the planar lattice of two dimensions. A cellular automata model containing movable wolves and sheep has been built. The results show that both the quantity of the wolves and the sheep fluctuate in accordance with the law that one quantity increases while the other one decreases.

  10. A Unified Steganalysis Framework

    DTIC Science & Technology

    2013-04-01

    contains more than 1800 images of different scenes. In the experiments, we used four JPEG based steganography techniques: Out- guess [13], F5 [16], model...also compressed these images again since some of the steganography meth- ods are double compressing the images . Stego- images are generated by embedding...randomly chosen messages (in bits) into 1600 grayscale images using each of the four steganography techniques. A random message length was determined

  11. Fixed-Rate Compressed Floating-Point Arrays.

    PubMed

    Lindstrom, Peter

    2014-12-01

    Current compression schemes for floating-point data commonly take fixed-precision values and compress them to a variable-length bit stream, complicating memory management and random access. We present a fixed-rate, near-lossless compression scheme that maps small blocks of 4(d) values in d dimensions to a fixed, user-specified number of bits per block, thereby allowing read and write random access to compressed floating-point data at block granularity. Our approach is inspired by fixed-rate texture compression methods widely adopted in graphics hardware, but has been tailored to the high dynamic range and precision demands of scientific applications. Our compressor is based on a new, lifted, orthogonal block transform and embedded coding, allowing each per-block bit stream to be truncated at any point if desired, thus facilitating bit rate selection using a single compression scheme. To avoid compression or decompression upon every data access, we employ a software write-back cache of uncompressed blocks. Our compressor has been designed with computational simplicity and speed in mind to allow for the possibility of a hardware implementation, and uses only a small number of fixed-point arithmetic operations per compressed value. We demonstrate the viability and benefits of lossy compression in several applications, including visualization, quantitative data analysis, and numerical simulation.

  12. The MODIS reprojection tool

    USGS Publications Warehouse

    Dwyer, John L.; Schmidt, Gail L.; Qu, J.J.; Gao, W.; Kafatos, M.; Murphy , R.E.; Salomonson, V.V.

    2006-01-01

    The MODIS Reprojection Tool (MRT) is designed to help individuals work with MODIS Level-2G, Level-3, and Level-4 land data products. These products are referenced to a global tiling scheme in which each tile is approximately 10° latitude by 10° longitude and non-overlapping (Fig. 9.1). If desired, the user may reproject only selected portions of the product (spatial or parameter subsetting). The software may also be used to convert MODIS products to file formats (generic binary and GeoTIFF) that are more readily compatible with existing software packages. The MODIS land products distributed by the Land Processes Distributed Active Archive Center (LP DAAC) are in the Hierarchical Data Format - Earth Observing System (HDF-EOS), developed by the National Center for Supercomputing Applications at the University of Illinois at Urbana Champaign for the NASA EOS Program. Each HDF-EOS file is comprised of one or more science data sets (SDSs) corresponding to geophysical or biophysical parameters. Metadata are embedded in the HDF file as well as contained in a .met file that is associated with each HDF-EOS file. The MRT supports 8-bit, 16-bit, and 32-bit integer data (both signed and unsigned), as well as 32-bit float data. The data type of the output is the same as the data type of each corresponding input SDS.

  13. Brane surgery: energy conditions, traversable wormholes, and voids

    NASA Astrophysics Data System (ADS)

    Barceló1, C.; Visser, M.

    2000-09-01

    Branes are ubiquitous elements of any low-energy limit of string theory. We point out that negative tension branes violate all the standard energy conditions of the higher-dimensional spacetime they are embedded in; this opens the door to very peculiar solutions of the higher-dimensional Einstein equations. Building upon the (/3+1)-dimensional implementation of fundamental string theory, we illustrate the possibilities by considering a toy model consisting of a (/2+1)-dimensional brane propagating through our observable (/3+1)-dimensional universe. Developing a notion of ``brane surgery'', based on the Israel-Lanczos-Sen ``thin shell'' formalism of general relativity, we analyze the dynamics and find traversable wormholes, closed baby universes, voids (holes in the spacetime manifold), and an evasion (not a violation) of both the singularity theorems and the positive mass theorem. These features appear generic to any brane model that permits negative tension branes: This includes the Randall-Sundrum models and their variants.

  14. A 300MHz Embedded Flash Memory with Pipeline Architecture and Offset-Free Sense Amplifiers for Dual-Core Automotive Microcontrollers

    NASA Astrophysics Data System (ADS)

    Kajiyama, Shinya; Fujito, Masamichi; Kasai, Hideo; Mizuno, Makoto; Yamaguchi, Takanori; Shinagawa, Yutaka

    A novel 300MHz embedded flash memory for dual-core microcontrollers with a shared ROM architecture is proposed. One of its features is a three-stage pipeline read operation, which enables reduced access pitch and therefore reduces performance penalty due to conflict of shared ROM accesses. Another feature is a highly sensitive sense amplifier that achieves efficient pipeline operation with two-cycle latency one-cycle pitch as a result of a shortened sense time of 0.63ns. The combination of the pipeline architecture and proposed sense amplifiers significantly reduces access-conflict penalties with shared ROM and enhances performance of 32-bit RISC dual-core microcontrollers by 30%.

  15. Global D-brane models with stabilised moduli and light axions

    NASA Astrophysics Data System (ADS)

    Cicoli, Michele

    2014-03-01

    We review recent attempts to try to combine global issues of string compactifications, like moduli stabilisation, with local issues, like semi-realistic D-brane constructions. We list the main problems encountered, and outline a possible solution which allows globally consistent embeddings of chiral models. We also argue that this stabilisation mechanism leads to an axiverse. We finally illustrate our general claims in a concrete example where the Calabi-Yau manifold is explicitly described by toric geometry.

  16. Towards realistic string vacua from branes at singularities

    NASA Astrophysics Data System (ADS)

    Conlon, Joseph P.; Maharana, Anshuman; Quevedo, Fernando

    2009-05-01

    We report on progress towards constructing string models incorporating both realistic D-brane matter content and moduli stabilisation with dynamical low-scale supersymmetry breaking. The general framework is that of local D-brane models embedded into the LARGE volume approach to moduli stabilisation. We review quiver theories on del Pezzo n (dPn) singularities including both D3 and D7 branes. We provide supersymmetric examples with three quark/lepton families and the gauge symmetries of the Standard, Left-Right Symmetric, Pati-Salam and Trinification models, without unwanted chiral exotics. We describe how the singularity structure leads to family symmetries governing the Yukawa couplings which may give mass hierarchies among the different generations. We outline how these models can be embedded into compact Calabi-Yau compactifications with LARGE volume moduli stabilisation, and state the minimal conditions for this to be possible. We study the general structure of soft supersymmetry breaking. At the singularity all leading order contributions to the soft terms (both gravity- and anomaly-mediation) vanish. We enumerate subleading contributions and estimate their magnitude. We also describe model-independent physical implications of this scenario. These include the masses of anomalous and non-anomalous U(1)'s and the generic existence of a new hyperweak force under which leptons and/or quarks could be charged. We propose that such a gauge boson could be responsible for the ghost muon anomaly recently found at the Tevatron's CDF detector.

  17. A programmable controller based on CAN field bus embedded microprocessor and FPGA

    NASA Astrophysics Data System (ADS)

    Cai, Qizhong; Guo, Yifeng; Chen, Wenhei; Wang, Mingtao

    2008-10-01

    One kind of new programmable controller(PLC) is introduced in this paper. The advanced embedded microprocessor and Field-Programmable Gate Array (FPGA) device are applied in the PLC system. The PLC system structure was presented in this paper. It includes 32 bits Advanced RISC Machines (ARM) embedded microprocessor as control core, FPGA as control arithmetic coprocessor and CAN bus as data communication criteria protocol connected the host controller and its various extension modules. It is detailed given that the circuits and working principle, IiO interface circuit between ARM and FPGA and interface circuit between ARM and FPGA coprocessor. Furthermore the interface circuit diagrams between various modules are written. In addition, it is introduced that ladder chart program how to control the transfer info of control arithmetic part in FPGA coprocessor. The PLC, through nearly two months of operation to meet the design of the basic requirements.

  18. Estimating Hardness from the USDC Tool-Bit Temperature Rise

    NASA Technical Reports Server (NTRS)

    Bar-Cohen, Yoseph; Sherrit, Stewart

    2008-01-01

    A method of real-time quantification of the hardness of a rock or similar material involves measurement of the temperature, as a function of time, of the tool bit of an ultrasonic/sonic drill corer (USDC) that is being used to drill into the material. The method is based on the idea that, other things being about equal, the rate of rise of temperature and the maximum temperature reached during drilling increase with the hardness of the drilled material. In this method, the temperature is measured by means of a thermocouple embedded in the USDC tool bit near the drilling tip. The hardness of the drilled material can then be determined through correlation of the temperature-rise-versus-time data with time-dependent temperature rises determined in finite-element simulations of, and/or experiments on, drilling at various known rates of advance or known power levels through materials of known hardness. The figure presents an example of empirical temperature-versus-time data for a particular 3.6-mm USDC bit, driven at an average power somewhat below 40 W, drilling through materials of various hardness levels. The temperature readings from within a USDC tool bit can also be used for purposes other than estimating the hardness of the drilled material. For example, they can be especially useful as feedback to control the driving power to prevent thermal damage to the drilled material, the drill bit, or both. In the case of drilling through ice, the temperature readings could be used as a guide to maintaining sufficient drive power to prevent jamming of the drill by preventing refreezing of melted ice in contact with the drill.

  19. 10 Gb/s operation of photonic crystal silicon optical modulators.

    PubMed

    Nguyen, Hong C; Sakai, Yuya; Shinkawa, Mizuki; Ishikura, Norihiro; Baba, Toshihiko

    2011-07-04

    We report the first experimental demonstration of 10 Gb/s modulation in a photonic crystal silicon optical modulator. The device consists of a 200 μm-long SiO2-clad photonic crystal waveguide, with an embedded p-n junction, incorporated into an asymmetric Mach-Zehnder interferometer. The device is integrated on a SOI chip and fabricated by CMOS-compatible processes. With the bias voltage set at 0 V, we measure a V(π)L < 0.056 V∙cm. Optical modulation is demonstrated by electrically driving the device with a 2(31) - 1 bit non-return-to-zero pseudo-random bit sequence signal. An open eye pattern is observed at bitrates of 10 Gb/s and 2 Gb/s, with and without pre-emphasis of the drive signal, respectively.

  20. Video on phone lines: technology and applications

    NASA Astrophysics Data System (ADS)

    Hsing, T. Russell

    1996-03-01

    Recent advances in communications signal processing and VLSI technology are fostering tremendous interest in transmitting high-speed digital data over ordinary telephone lines at bit rates substantially above the ISDN Basic Access rate (144 Kbit/s). Two new technologies, high-bit-rate digital subscriber lines and asymmetric digital subscriber lines promise transmission over most of the embedded loop plant at 1.544 Mbit/s and beyond. Stimulated by these research promises and rapid advances on video coding techniques and the standards activity, information networks around the globe are now exploring possible business opportunities of offering quality video services (such as distant learning, telemedicine, and telecommuting etc.) through this high-speed digital transport capability in the copper loop plant. Visual communications for residential customers have become more feasible than ever both technically and economically.

  1. Development of the Low-cost Analog-to-Digital Converter (for nuclear physics experiments) with PC sound card

    NASA Astrophysics Data System (ADS)

    Sugihara, Kenkoh

    2009-10-01

    A low-cost ADC (Analogue-to-Digital Converter) with shaping embedded for undergraduate physics laboratory is developed using a home made circuit and a PC sound card. Even though an ADC is needed as an essential part of an experimental set up, commercially available ones are very expensive and are scarce for undergraduate laboratory experiments. The system that is developed from the present work is designed for a gamma-ray spectroscopy laboratory with NaI(Tl) counters, but not limited. For this purpose, the system performance is set to sampling rate of 1-kHz with 10-bit resolution using a typical PC sound card with 41-kHz or higher sampling rate and 16-bit resolution ADC with an addition of a shaping circuit. Details of the system and the status of development will be presented. Ping circuit and PC soundcard as typical PC sound card has 41.1kHz or heiger sampling rate and 16bit resolution ADCs. In the conference details of the system and the status of development will be presented.

  2. Lunar deep drill apparatus

    NASA Technical Reports Server (NTRS)

    Harvey, Jill (Editor)

    1989-01-01

    A self contained, mobile drilling and coring system was designed to operate on the Lunar surface and be controlled remotely from earth. The system uses SKITTER (Spatial Kinematic Inertial Translatory Tripod Extremity Robot) as its foundation and produces Lunar core samples two meters long and fifty millimeters in diameter. The drill bit used for this is composed of 30 per carat diamonds in a sintered tungsten carbide matrix. To drill up to 50 m depths, the bit assembly will be attached to a drill string made from 2 m rods which will be carried in racks on SKITTER. Rotary power for drilling will be supplied by a Curvo-Synchronous motor. SKITTER is to support this system through a hexagonal shaped structure which will contain the drill motor and the power supply. A micro-coring drill will be used to remove a preliminary sample 5 mm in diameter and 20 mm long from the side of the core. This whole system is to be controlled from earth. This is carried out by a continuously monitoring PLC onboard the drill rig. A touch screen control console allows the operator on earth to monitor the progress of the operation and intervene if necessary.

  3. Identifying synonymy between relational phrases using word embeddings.

    PubMed

    Nguyen, Nhung T H; Miwa, Makoto; Tsuruoka, Yoshimasa; Tojo, Satoshi

    2015-08-01

    Many text mining applications in the biomedical domain benefit from automatic clustering of relational phrases into synonymous groups, since it alleviates the problem of spurious mismatches caused by the diversity of natural language expressions. Most of the previous work that has addressed this task of synonymy resolution uses similarity metrics between relational phrases based on textual strings or dependency paths, which, for the most part, ignore the context around the relations. To overcome this shortcoming, we employ a word embedding technique to encode relational phrases. We then apply the k-means algorithm on top of the distributional representations to cluster the phrases. Our experimental results show that this approach outperforms state-of-the-art statistical models including latent Dirichlet allocation and Markov logic networks. Copyright © 2015 Elsevier Inc. All rights reserved.

  4. The data embedding method

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sandford, M.T. II; Bradley, J.N.; Handel, T.G.

    Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in Microsoft{reg_sign} bitmap (.BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits,more » is termed {open_quote}steganography.{close_quote} Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or {open_quote}lossy{close_quote} compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is in data an analysis algorithm.« less

  5. Data embedding method

    NASA Astrophysics Data System (ADS)

    Sandford, Maxwell T., II; Bradley, Jonathan N.; Handel, Theodore G.

    1996-01-01

    Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in MicrosoftTM bitmap (BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits, is termed `steganography.' Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or `lossy' compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is derived from the original host data by an analysis algorithm.

  6. Statistical Characterization of MP3 Encoders for Steganalysis: ’CHAMP3’

    DTIC Science & Technology

    2004-04-27

    compression exceeds those of typical stegano- graphic tools (e. g., LSB image embedding), the availability of commented source codes for MP3 encoders...developed by testing the approach on known and unknown reference data. 15. SUBJECT TERMS EOARD, Steganography , Digital Watermarking...Pages kbps Kilobits per Second LGPL Lesser General Public License LSB Least Significant Bit MB Megabyte MDCT Modified Discrete Cosine Transformation MP3

  7. Pneumatically Modulated Liquid Delivery System for Nebulizers

    DTIC Science & Technology

    2011-12-02

    VII. Acknowledgements 18 APPENDIX A: Complete Parts List 19 APPENDIX B: Source code for the Arduino Uno microcontroller (CD) 23 1 I...implemented. The Arduino Uno is a well-established hobbyist microcontroller, focused on ease-of-use and teaching non-computer programmers about embedded...circuits. The Arduino Uno uses an Atmega328 microcontroller with thirteen digital TTL control lines, six 10-bit resolution 0-5 V analog inputs, TTL

  8. Exploring the Acoustic Nonlinearity for Monitoring Complex Aerospace Structures

    DTIC Science & Technology

    2008-02-27

    nonlinear elastic waves, embedded ultrasonics, nonlinear diagnostics, aerospace structures, structural joints. 16. SECURITY CLASSIFICATION OF: 17...sampling, 100 MHz bandwidth with noise and anti- aliasing filters, general-purpose alias-protected decimation for all sample rates and quad digital down...conversion ( DDC ) with up to 40 MHz IF bandwidth. Specified resolution of NI PXI 5142 is 14-bits with the noise floor approaching -85 dB. Such a

  9. Extending Landauer's bound from bit erasure to arbitrary computation

    NASA Astrophysics Data System (ADS)

    Wolpert, David

    The minimal thermodynamic work required to erase a bit, known as Landauer's bound, has been extensively investigated both theoretically and experimentally. However, when viewed as a computation that maps inputs to outputs, bit erasure has a very special property: the output does not depend on the input. Existing analyses of thermodynamics of bit erasure implicitly exploit this property, and thus cannot be directly extended to analyze the computation of arbitrary input-output maps. Here we show how to extend these earlier analyses of bit erasure to analyze the thermodynamics of arbitrary computations. Doing this establishes a formal connection between the thermodynamics of computers and much of theoretical computer science. We use this extension to analyze the thermodynamics of the canonical ``general purpose computer'' considered in computer science theory: a universal Turing machine (UTM). We consider a UTM which maps input programs to output strings, where inputs are drawn from an ensemble of random binary sequences, and prove: i) The minimal work needed by a UTM to run some particular input program X and produce output Y is the Kolmogorov complexity of Y minus the log of the ``algorithmic probability'' of Y. This minimal amount of thermodynamic work has a finite upper bound, which is independent of the output Y, depending only on the details of the UTM. ii) The expected work needed by a UTM to compute some given output Y is infinite. As a corollary, the overall expected work to run a UTM is infinite. iii) The expected work needed by an arbitrary Turing machine T (not necessarily universal) to compute some given output Y can either be infinite or finite, depending on Y and the details of T. To derive these results we must combine ideas from nonequilibrium statistical physics with fundamental results from computer science, such as Levin's coding theorem and other theorems about universal computation. I would like to ackowledge the Santa Fe Institute, Grant No. TWCF0079/AB47 from the Templeton World Charity Foundation, Grant No. FQXi-RHl3-1349 from the FQXi foundation, and Grant No. CHE-1648973 from the U.S. National Science Foundation.

  10. Geothermal well drilling manual at Cerro Prieto

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fernandez P., A.; Flores S., M.

    The objective of the drilling manual is to solve all problems directly related to drilling during the construction of a well. In this case, the topics dealt which are drilling fluids and hydraulics to be applied in the field to improve drilling progress, eliminate risks and achieve good well-completion. There are other topics that are applicable such as drill bits and the drilling string, which are closely linked to drilling progress. On this occasion drilling fluid and hydraulics programs are presented, in addition to a computing program for a Casio FX-502P calculator to be applied in the field to optimizemore » hydraulics and in the analysis of hydraulics for development and exploration wells at their different intervals.« less

  11. Measurement problem in Program Universe. Revision

    NASA Astrophysics Data System (ADS)

    Noyes, H. P.; Gefwert, C.; Manthey, M. J.

    1985-07-01

    The measurement problem of contemporary physics is in our view an artifact of its philosophical and mathematical underpinnings. We describe a new philosophical view of theory formation, rooted in Wittgenstein, and Bishop's and Martin-Loef's constructivity, which obviates such discussions. We present an unfinished, but very encouraging, theory which is compatible with this philosophical framework. The theory is based on the concepts of counting and combinatorics in the framework provided by the combinatorial hierarchy, a unique hierarchy of bit strings which interact by an operation called discrimination. Measurement criteria incorporate c, h-bar and m/sub p/ or (not and) G. The resulting theory is discrete throughout, contains no infinities, and, as far as we have developed it, is in agreement with quantum mechanical and cosmological fact.

  12. Foldable Instrumented Bits for Ultrasonic/Sonic Penetrators

    NASA Technical Reports Server (NTRS)

    Bar-Cohen, Yoseph; Badescu, Mircea; Iskenderian, Theodore; Sherrit, Stewart; Bao, Xiaoqi; Linderman, Randel

    2010-01-01

    Long tool bits are undergoing development that can be stowed compactly until used as rock- or ground-penetrating probes actuated by ultrasonic/sonic mechanisms. These bits are designed to be folded or rolled into compact form for transport to exploration sites, where they are to be connected to their ultrasonic/ sonic actuation mechanisms and unfolded or unrolled to their full lengths for penetrating ground or rock to relatively large depths. These bits can be designed to acquire rock or soil samples and/or to be equipped with sensors for measuring properties of rock or soil in situ. These bits can also be designed to be withdrawn from the ground, restowed, and transported for reuse at different exploration sites. Apparatuses based on the concept of a probe actuated by an ultrasonic/sonic mechanism have been described in numerous prior NASA Tech Briefs articles, the most recent and relevant being "Ultrasonic/ Sonic Impacting Penetrators" (NPO-41666) NASA Tech Briefs, Vol. 32, No. 4 (April 2008), page 58. All of those apparatuses are variations on the basic theme of the earliest ones, denoted ultrasonic/sonic drill corers (USDCs). To recapitulate: An apparatus of this type includes a lightweight, low-power, piezoelectrically driven actuator in which ultrasonic and sonic vibrations are generated and coupled to a tool bit. The combination of ultrasonic and sonic vibrations gives rise to a hammering action (and a resulting chiseling action at the tip of the tool bit) that is more effective for drilling than is the microhammering action of ultrasonic vibrations alone. The hammering and chiseling actions are so effective that the size of the axial force needed to make the tool bit advance into soil, rock, or another material of interest is much smaller than in ordinary twist drilling, ordinary hammering, or ordinary steady pushing. Examples of properties that could be measured by use of an instrumented tool bit include electrical conductivity, permittivity, magnetic field, magnetic permeability, temperature, and any other properties that can be measured by fiber-optic sensors. The problem of instrumenting a probe of this type is simplified, relative to the problem of attaching electrodes in a rotating drill bit, in two ways: (1) Unlike a rotating drill bit, a bit of this type does not have flutes, which would compound the problem of ensuring contact between sensors and the side wall of a hole; and (2) there is no need for slip rings for electrical contact between sensor electronic circuitry and external circuitry because, unlike a rotating drill, a tool bit of this type is not rotated continuously during operation. One design for a tool bit of the present type is a segmented bit with a segmented, hinged support structure (see figure). The bit and its ultrasonic/sonic actuator are supported by a slider/guiding fixture, and its displacement and preload are controlled by a motor. For deployment from the folded configuration, a spring-loaded mechanism rotates the lower segment about the hinges, causing the lower segment to become axially aligned with the upper segment. A latching mechanism then locks the segments of the bit and the corresponding segments of the slider/guiding fixture. Then the entire resulting assembly is maneuvered into position for drilling into the ground. Another design provides for a bit comprising multiple tubular segments with an inner alignment string, similar to a foldable tent pole comprising multiple tubular segments with an inner elastic cable connecting the two ends. At the beginning of deployment, all segments except the first (lowermost) one remain folded, and the ultrasonic/sonic actuator is clamped to the top of the lowermost segment and used to drive this segment into the ground. When the first segment has penetrated to a specified depth, the second segment is connected to the upper end of the first segment to form a longer rigid tubular bit and the actuator is moved to the upper end of the second segnt. The process as described thus far is repeated, adding segments until the desired depth of penetration has been attained. Yet other designs provide for bits in the form of bistable circular- or rectangular- cross-section tubes that can be stowed compactly like rolls of flat tape and become rigidified upon extension to full length, in a manner partly similar to that of a common steel tape measure. Albeit not marketed for use in tool bits, a bistable reeled composite product that transforms itself from a flat coil to a rigid tube of circular cross section when unrolled, is commercially available under the trade name RolaTube(TradeMark) and serves as a model for the further development of tool bits of this subtype.

  13. Source of the Kerr-Newman solution as a gravitating bag model: 50 years of the problem of the source of the Kerr solution

    NASA Astrophysics Data System (ADS)

    Burinskii, Alexander

    2016-01-01

    It is known that gravitational and electromagnetic fields of an electron are described by the ultra-extreme Kerr-Newman (KN) black hole solution with extremely high spin/mass ratio. This solution is singular and has a topological defect, the Kerr singular ring, which may be regularized by introducing the solitonic source based on the Higgs mechanism of symmetry breaking. The source represents a domain wall bubble interpolating between the flat region inside the bubble and external KN solution. It was shown recently that the source represents a supersymmetric bag model, and its structure is unambiguously determined by Bogomolnyi equations. The Dirac equation is embedded inside the bag consistently with twistor structure of the Kerr geometry, and acquires the mass from the Yukawa coupling with Higgs field. The KN bag turns out to be flexible, and for parameters of an electron, it takes the form of very thin disk with a circular string placed along sharp boundary of the disk. Excitation of this string by a traveling wave creates a circulating singular pole, indicating that the bag-like source of KN solution unifies the dressed and point-like electron in a single bag-string-quark system.

  14. Steganalysis of recorded speech

    NASA Astrophysics Data System (ADS)

    Johnson, Micah K.; Lyu, Siwei; Farid, Hany

    2005-03-01

    Digital audio provides a suitable cover for high-throughput steganography. At 16 bits per sample and sampled at a rate of 44,100 Hz, digital audio has the bit-rate to support large messages. In addition, audio is often transient and unpredictable, facilitating the hiding of messages. Using an approach similar to our universal image steganalysis, we show that hidden messages alter the underlying statistics of audio signals. Our statistical model begins by building a linear basis that captures certain statistical properties of audio signals. A low-dimensional statistical feature vector is extracted from this basis representation and used by a non-linear support vector machine for classification. We show the efficacy of this approach on LSB embedding and Hide4PGP. While no explicit assumptions about the content of the audio are made, our technique has been developed and tested on high-quality recorded speech.

  15. Secure Oblivious Hiding, Authentication, Tamper Proofing, and Verification Techniques

    DTIC Science & Technology

    2002-08-01

    compressing the bit- planes. The algorithm always starts with inspecting the 5th LSB plane. For color images , all three color-channels are compressed...use classical encryption engines, such as IDEA or DES . These algorithms have a fixed encryption block size, and, depending on the image dimensions, we...information can be stored either in a separate file, in the image header, or embedded in the image itself utilizing the modern concepts of steganography

  16. Embedded parallel processing based ground control systems for small satellite telemetry

    NASA Technical Reports Server (NTRS)

    Forman, Michael L.; Hazra, Tushar K.; Troendly, Gregory M.; Nickum, William G.

    1994-01-01

    The use of networked terminals which utilize embedded processing techniques results in totally integrated, flexible, high speed, reliable, and scalable systems suitable for telemetry and data processing applications such as mission operations centers (MOC). Synergies of these terminals, coupled with the capability of terminal to receive incoming data, allow the viewing of any defined display by any terminal from the start of data acquisition. There is no single point of failure (other than with network input) such as exists with configurations where all input data goes through a single front end processor and then to a serial string of workstations. Missions dedicated to NASA's ozone measurements program utilize the methodologies which are discussed, and result in a multimission configuration of low cost, scalable hardware and software which can be run by one flight operations team with low risk.

  17. Continuous depth profile of the rock strength in the Nankai accretionary prism based on drilling performance parameters.

    PubMed

    Hamada, Yohei; Kitamura, Manami; Yamada, Yasuhiro; Sanada, Yoshinori; Sugihara, Takamitsu; Saito, Saneatsu; Moe, Kyaw; Hirose, Takehiro

    2018-02-14

    A new method for evaluating the in situ rock strength beneath the seafloor is proposed and applied to the Nankai Trough accretionary prism. The depth-continuous in situ rock strength is a critical parameter for numerous studies in earth science, particularly for seismology and tectonics at plate convergence zones; yet, measurements are limited owing to a lack of drilled cores. Here, we propose a new indicator of strength, the equivalent strength (EST), which is determined only by drilling performance parameters such as drill string rotational torque, bit depth, and string rotational speed. A continuous depth profile of EST was drawn from 0 to 3000 m below the seafloor (mbsf) across the forearc basin and accretionary prism in the Nankai Trough. The EST did not show a significant increase around the forearc basin-accretionary prism boundary, but it did show a clear increase within the prism, ca. below 1500 mbsf. This result may indicate that even the shallow accretionary prism has been strengthened by horizontal compression derived from plate subduction. The EST is a potential parameter to continuously evaluate the in situ rock strength during drilling, and its accuracy of the absolute value can be improved by combining with laboratory drilling experiments.

  18. System and method for damping vibration in a drill string using a magnetorheological damper

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wassell, Mark Ellsworth; Burgess, Daniel E; Barbely, Jason R

    2012-01-03

    A system for damping vibration in a drill string can include a magnetorheological fluid valve assembly having a supply of a magnetorheological fluid, a first member, and a second member capable of moving in relation to first member in response to vibration of the drill bit. The first and second members define a first and a second chamber for holding the fluid. Fluid can flow between the first and second chambers in response to the movement of the second member in relation to the first member. The valve assembly can also include a coil for inducing a magnetic field thatmore » alters the resistance of the magnetorheological fluid to flow between the first and second chambers, thereby increasing the damping provided by the valve. A remnant magnetic field is induced in one or more components of the magnetorheological fluid valve during operation that can be used to provide the magnetic field for operating the valve so as to eliminate the need to energize the coils during operation except temporarily when changing the amount of damping required, thereby eliminating the need for a turbine alternator power the magnetorheological fluid valve. A demagnetization cycle can be used to reduce the remnant magnetic field when necessary.« less

  19. Single Piezo-Actuator Rotary-Hammering Drill

    NASA Technical Reports Server (NTRS)

    Sherrit, Stewart; Bao, Xiaoqi; Badescu, Mircea; Bar-Cohen, Yoseph

    2011-01-01

    This innovation comprises a compact drill that uses low-axial preload, via vibrations, that fractures the rock under the bit kerf, and rotates the bit to remove the powdered cuttings while augmenting the rock fracture via shear forces. The vibrations fluidize the powered cuttings inside the flutes around the bit, reducing the friction with the auger surface. These combined actions reduce the consumed power and the heating of the drilled medium, helping to preserve the pristine content of the produced samples. The drill consists of an actuator that simultaneously impacts and rotates the bit by applying force and torque via a single piezoelectric stack actuator without the need for a gearbox or lever mechanism. This reduces the development/fabrication cost and complexity. The piezoelectric actuator impacts the surface and generates shear forces, fragmenting the drilled medium directly under the bit kerf by exceeding the tensile and/or shear strength of the struck surface. The percussive impact action of the actuator leads to penetration of the medium by producing a zone of finely crushed rock directly underneath the struck location. This fracturing process is highly enhanced by the shear forces from the rotation and twisting action. To remove the formed cuttings, the bit is constructed with an auger on its internal or external surface. One of the problems with pure hammering is that, as the teeth become embedded in the sample, the drilling efficiency drops unless the teeth are moved away from the specific footprint location. By rotating the teeth, they are moved to areas that were not fragmented, and thus the rock fracturing is enhanced via shear forces. The shear motion creates ripping or chiseling action to produce larger fragments to increase the drilling efficiency, and to reduce the required power. The actuator of the drill consists of a piezoelectric stack that vibrates the horn. The stack is compressed by a bolt between the backing and the horn in order to prevent it from being subjected to tensile stress that will cause it to fail. The backing is intended to transfer the generated mechanical vibrations towards the horn. In order to cause rotation, the horn is configured asymmetrically with helical segments and, upon impacting the bit, it introduces longitudinal along the axis of the actuator and tangential force causing twisting action that rotates the bit. The longitudinal component of the vibrations of the stack introduces percussion impulses between the bit and the rock to fracture it when the ultimate strain is exceeded under the bit.

  20. Counting surface-kernel epimorphisms from a co-compact Fuchsian group to a cyclic group with motivations from string theory and QFT

    NASA Astrophysics Data System (ADS)

    Bibak, Khodakhast; Kapron, Bruce M.; Srinivasan, Venkatesh

    2016-09-01

    Graphs embedded into surfaces have many important applications, in particular, in combinatorics, geometry, and physics. For example, ribbon graphs and their counting is of great interest in string theory and quantum field theory (QFT). Recently, Koch et al. (2013) [12] gave a refined formula for counting ribbon graphs and discussed its applications to several physics problems. An important factor in this formula is the number of surface-kernel epimorphisms from a co-compact Fuchsian group to a cyclic group. The aim of this paper is to give an explicit and practical formula for the number of such epimorphisms. As a consequence, we obtain an 'equivalent' form of Harvey's famous theorem on the cyclic groups of automorphisms of compact Riemann surfaces. Our main tool is an explicit formula for the number of solutions of restricted linear congruence recently proved by Bibak et al. using properties of Ramanujan sums and of the finite Fourier transform of arithmetic functions.

  1. Embedded 32-bit Differential Pulse Voltammetry (DPV) Technique for 3-electrode Cell Sensing

    NASA Astrophysics Data System (ADS)

    N, Aqmar N. Z.; Abdullah, W. F. H.; Zain, Z. M.; Rani, S.

    2018-03-01

    This paper addresses the development of differential pulse voltammetry (DPV) embedded algorithm using an ARM cortex processor with new developed potentiostat circuit design for in-situ 3-electrode cell sensing. This project is mainly to design a low cost potentiostat for the researchers in laboratories. It is required to develop an embedded algorithm for analytical technique to be used with the designed potentiostat. DPV is one of the most familiar pulse technique method used with 3-electrode cell sensing in chemical studies. Experiment was conducted on 10mM solution of Ferricyanide using the designed potentiostat and the developed DPV algorithm. As a result, the device can generate an excitation signal of DPV from 0.4V to 1.2V and produced a peaked voltammogram with relatively small error compared to the commercial potentiostat; which is only 6.25% difference in peak potential reading. The design of potentiostat device and its DPV algorithm is verified.

  2. Enhanced encrypted reversible data hiding algorithm with minimum distortion through homomorphic encryption

    NASA Astrophysics Data System (ADS)

    Bhardwaj, Rupali

    2018-03-01

    Reversible data hiding means embedding a secret message in a cover image in such a manner, to the point that in the midst of extraction of the secret message, the cover image and, furthermore, the secret message are recovered with no error. The goal of by far most of the reversible data hiding algorithms is to have improved the embedding rate and enhanced visual quality of stego image. An improved encrypted-domain-based reversible data hiding algorithm to embed two binary bits in each gray pixel of original cover image with minimum distortion of stego-pixels is employed in this paper. Highlights of the proposed algorithm are minimum distortion of pixel's value, elimination of underflow and overflow problem, and equivalence of stego image and cover image with a PSNR of ∞ (for Lena, Goldhill, and Barbara image). The experimental outcomes reveal that in terms of average PSNR and embedding rate, for natural images, the proposed algorithm performed better than other conventional ones.

  3. Covert Channels within IRC

    DTIC Science & Technology

    2011-03-24

    in the secret file in bits. Therefore, CPP is a function of the size of the secret file and amount of covert information embedded per packet, while...CPS is dependent on the size of the secret file and the rate at which the covert packets are transmitted to the IRC server. • Build a covert...and decode a secret message. • Cover. The object being used to hide the secret information; this is often in the form of pictures [FPK07], audio

  4. Military Review: The Professional Journal of the U.S. Army. January-February 2002

    DTIC Science & Technology

    2002-02-01

    Internet.”9 He accuses bin Laden of hiding maps and photos of targets and of posting instructions on sports chat rooms, porno - graphic bulletin boards...anything unusual. Messages can be hidden in audio, video , or still image files, with information stored in the least significant bits of a digitized file...steganography, embedding secret messages in other messages to prevent observers from suspecting anything unusual. Messages can be hidden in audio, video , or

  5. A Fully Integrated Sensor SoC with Digital Calibration Hardware and Wireless Transceiver at 2.4 GHz

    PubMed Central

    Kim, Dong-Sun; Jang, Sung-Joon; Hwang, Tae-Ho

    2013-01-01

    A single-chip sensor system-on-a-chip (SoC) that implements radio for 2.4 GHz, complete digital baseband physical layer (PHY), 10-bit sigma-delta analog-to-digital converter and dedicated sensor calibration hardware for industrial sensing systems has been proposed and integrated in a 0.18-μm CMOS technology. The transceiver's building block includes a low-noise amplifier, mixer, channel filter, receiver signal-strength indicator, frequency synthesizer, voltage-controlled oscillator, and power amplifier. In addition, the digital building block consists of offset quadrature phase-shift keying (OQPSK) modulation, demodulation, carrier frequency offset compensation, auto-gain control, digital MAC function, sensor calibration hardware and embedded 8-bit microcontroller. The digital MAC function supports cyclic redundancy check (CRC), inter-symbol timing check, MAC frame control, and automatic retransmission. The embedded sensor signal processing block consists of calibration coefficient calculator, sensing data calibration mapper and sigma-delta analog-to-digital converter with digital decimation filter. The sensitivity of the overall receiver and the error vector magnitude (EVM) of the overall transmitter are −99 dBm and 18.14%, respectively. The proposed calibration scheme has a reduction of errors by about 45.4% compared with the improved progressive polynomial calibration (PPC) method and the maximum current consumption of the SoC is 16 mA. PMID:23698271

  6. Implementing Bayesian networks with embedded stochastic MRAM

    NASA Astrophysics Data System (ADS)

    Faria, Rafatul; Camsari, Kerem Y.; Datta, Supriyo

    2018-04-01

    Magnetic tunnel junctions (MTJ's) with low barrier magnets have been used to implement random number generators (RNG's) and it has recently been shown that such an MTJ connected to the drain of a conventional transistor provides a three-terminal tunable RNG or a p-bit. In this letter we show how this p-bit can be used to build a p-circuit that emulates a Bayesian network (BN), such that the correlations in real world variables can be obtained from electrical measurements on the corresponding circuit nodes. The p-circuit design proceeds in two steps: the BN is first translated into a behavioral model, called Probabilistic Spin Logic (PSL), defined by dimensionless biasing (h) and interconnection (J) coefficients, which are then translated into electronic circuit elements. As a benchmark example, we mimic a family tree of three generations and show that the genetic relatedness calculated from a SPICE-compatible circuit simulator matches well-known results.

  7. A novel speech watermarking algorithm by line spectrum pair modification

    NASA Astrophysics Data System (ADS)

    Zhang, Qian; Yang, Senbin; Chen, Guang; Zhou, Jun

    2011-10-01

    To explore digital watermarking specifically suitable for the speech domain, this paper experimentally investigates the properties of line spectrum pair (LSP) parameters firstly. The results show that the differences between contiguous LSPs are robust against common signal processing operations and small modifications of LSPs are imperceptible to the human auditory system (HAS). According to these conclusions, three contiguous LSPs of a speech frame are selected to embed a watermark bit. The middle LSP is slightly altered to modify the differences of these LSPs when embedding watermark. Correspondingly, the watermark is extracted by comparing these differences. The proposed algorithm's transparency is adjustable to meet the needs of different applications. The algorithm has good robustness against additive noise, quantization, amplitude scale and MP3 compression attacks, for the bit error rate (BER) is less than 5%. In addition, the algorithm allows a relatively low capacity, which approximates to 50 bps.

  8. A Novel Quantum Image Steganography Scheme Based on LSB

    NASA Astrophysics Data System (ADS)

    Zhou, Ri-Gui; Luo, Jia; Liu, XingAo; Zhu, Changming; Wei, Lai; Zhang, Xiafen

    2018-06-01

    Based on the NEQR representation of quantum images and least significant bit (LSB) scheme, a novel quantum image steganography scheme is proposed. The sizes of the cover image and the original information image are assumed to be 4 n × 4 n and n × n, respectively. Firstly, the bit-plane scrambling method is used to scramble the original information image. Then the scrambled information image is expanded to the same size of the cover image by using the key only known to the operator. The expanded image is scrambled to be a meaningless image with the Arnold scrambling. The embedding procedure and extracting procedure are carried out by K 1 and K 2 which are under control of the operator. For validation of the presented scheme, the peak-signal-to-noise ratio (PSNR), the capacity, the security of the images and the circuit complexity are analyzed.

  9. Discrete anti-gravity

    NASA Astrophysics Data System (ADS)

    Noyes, H. Pierre; Starson, Scott

    1991-03-01

    Discrete physics, because it replaces time evolution generated by the energy operator with a global bit-string generator (program universe) and replaces fields with the relativistic Wheeler-Feynman action at a distance, allows the consistent formulation of the concept of signed gravitational charge for massive particles. The resulting prediction made by this version of the theory is that free anti-particles near the surface of the earth will fall up with the same acceleration that the corresponding particles fall down. So far as we can see, no current experimental information is in conflict with this prediction of our theory. The experiment crusis will be one of the anti-proton or anti-hydrogen experiments at CERN. Our prediction should be much easier to test than the small effects which those experiments are currently designed to detect or bound.

  10. Ejector subassembly for dual wall air drilling

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kolle, J.J.

    1996-09-01

    The dry drilling system developed for the Yucca Mountain Site Characterization Project incorporates a surface vacuum system to prevent drilling air and cuttings from contaminating the borehole wall during coring operations. As the drilling depth increases, however there is a potential for borehole contamination because of the limited volume of air which can be removed by the vacuum system. A feasibility analysis has shown that an ejector subassembly mounted in the drill string above the core barrel could significantly enhance the depth capacity of the dry drilling system. The ejector subassembly would use a portion of the air supplied tomore » the core bit to maintain a vacuum on the hole bottom. The results of a design study including performance testing of laboratory scale ejector simulator are presented here.« less

  11. Computer Simulation of Biological Ageing-A Bird's-Eye View

    NASA Astrophysics Data System (ADS)

    Dasgupta, Subinay

    For living organisms, the process of ageing consists of acquiring good and bad genetic mutations, which increase and decrease (respectively) the survival probability. When a child is born, the hereditary mutations of the parents are transmitted to the offspring. Such stochastic processes seem to be amenable to computer simulation. Over the last 10 years, simulation studies of this sort have been done in different parts of the globe to explain ageing. The objective of these studies have been to attempt an explanation of demographic data and of natural phenomena like preference of nature to the process of sexual reproduction (in comparison to the process of asexual reproduction). Here we shall attempt to discuss briefly the principles and the results of these works, with an emphasis on what is called Penna bit-string model.

  12. Content-independent embedding scheme for multi-modal medical image watermarking.

    PubMed

    Nyeem, Hussain; Boles, Wageeh; Boyd, Colin

    2015-02-04

    As the increasing adoption of information technology continues to offer better distant medical services, the distribution of, and remote access to digital medical images over public networks continues to grow significantly. Such use of medical images raises serious concerns for their continuous security protection, which digital watermarking has shown great potential to address. We present a content-independent embedding scheme for medical image watermarking. We observe that the perceptual content of medical images varies widely with their modalities. Recent medical image watermarking schemes are image-content dependent and thus they may suffer from inconsistent embedding capacity and visual artefacts. To attain the image content-independent embedding property, we generalise RONI (region of non-interest, to the medical professionals) selection process and use it for embedding by utilising RONI's least significant bit-planes. The proposed scheme thus avoids the need for RONI segmentation that incurs capacity and computational overheads. Our experimental results demonstrate that the proposed embedding scheme performs consistently over a dataset of 370 medical images including their 7 different modalities. Experimental results also verify how the state-of-the-art reversible schemes can have an inconsistent performance for different modalities of medical images. Our scheme has MSSIM (Mean Structural SIMilarity) larger than 0.999 with a deterministically adaptable embedding capacity. Our proposed image-content independent embedding scheme is modality-wise consistent, and maintains a good image quality of RONI while keeping all other pixels in the image untouched. Thus, with an appropriate watermarking framework (i.e., with the considerations of watermark generation, embedding and detection functions), our proposed scheme can be viable for the multi-modality medical image applications and distant medical services such as teleradiology and eHealth.

  13. The design of infrared information collection circuit based on embedded technology

    NASA Astrophysics Data System (ADS)

    Liu, Haoting; Zhang, Yicong

    2013-07-01

    S3C2410 processor is a 16/32 bit RISC embedded processor which based on ARM920T core and AMNA bus, and mainly for handheld devices, and high cost, low-power applications. This design introduces a design plan of the PIR sensor system, circuit and its assembling, debugging. The Application Circuit of the passive PIR alarm uses the invisibility of the infrared radiation well into the alarm system, and in order to achieve the anti-theft alarm and security purposes. When the body goes into the range of PIR sensor detection, sensors will detect heat sources and then the sensor will output a weak signal. The Signal should be amplified, compared and delayed; finally light emitting diodes emit light, playing the role of a police alarm.

  14. An Efficient Semi-fragile Watermarking Scheme for Tamper Localization and Recovery

    NASA Astrophysics Data System (ADS)

    Hou, Xiang; Yang, Hui; Min, Lianquan

    2018-03-01

    To solve the problem that remote sensing images are vulnerable to be tampered, a semi-fragile watermarking scheme was proposed. Binary random matrix was used as the authentication watermark, which was embedded by quantizing the maximum absolute value of directional sub-bands coefficients. The average gray level of every non-overlapping 4×4 block was adopted as the recovery watermark, which was embedded in the least significant bit. Watermarking detection could be done directly without resorting to the original images. Experimental results showed our method was robust against rational distortions to a certain extent. At the same time, it was fragile to malicious manipulation, and realized accurate localization and approximate recovery of the tampered regions. Therefore, this scheme can protect the security of remote sensing image effectively.

  15. Mass, angular momentum, and charge inequalities for black holes in Einstein-Maxwell-axion-dilaton gravity

    NASA Astrophysics Data System (ADS)

    Rogatko, Marek

    2014-02-01

    Mass, angular momentum, and charge inequalities for axisymmetric maximal time-symmetric initial data invariant under an action of U(1) group, in Einstein-Maxwell-axion-dilaton gravity being the low-energy limit of the heterotic string theory, is established. We assume that a data set with two asymptotically flat regions is given on a smooth simply connected manifold. We also pay attention to the area momentum charge inequalities for a closed orientable two-dimensional spacelike surface embedded in the spacetime of the considered theory.

  16. Connected word recognition using a cascaded neuro-computational model

    NASA Astrophysics Data System (ADS)

    Hoya, Tetsuya; van Leeuwen, Cees

    2016-10-01

    We propose a novel framework for processing a continuous speech stream that contains a varying number of words, as well as non-speech periods. Speech samples are segmented into word-tokens and non-speech periods. An augmented version of an earlier-proposed, cascaded neuro-computational model is used for recognising individual words within the stream. Simulation studies using both a multi-speaker-dependent and speaker-independent digit string database show that the proposed method yields a recognition performance comparable to that obtained by a benchmark approach using hidden Markov models with embedded training.

  17. Chaotic behavior of renal sympathetic nerve activity: effect of baroreceptor denervation and cardiac failure.

    PubMed

    DiBona, G F; Jones, S Y; Sawin, L L

    2000-09-01

    Nonlinear dynamic analysis was used to examine the chaotic behavior of renal sympathetic nerve activity in conscious rats subjected to either complete baroreceptor denervation (sinoaortic and cardiac baroreceptor denervation) or induction of congestive heart failure (CHF). The peak interval sequence of synchronized renal sympathetic nerve discharge was extracted and used for analysis. In control rats, this yielded a system whose correlation dimension converged to a low value over the embedding dimension range of 10-15 and whose greatest Lyapunov exponent was positive. Complete baroreceptor denervation was associated with a decrease in the correlation dimension of the system (before 2.65 +/- 0.27, after 1.64 +/- 0.17; P < 0.01) and a reduction in chaotic behavior (greatest Lyapunov exponent: 0.201 +/- 0.008 bits/data point before, 0.177 +/- 0.004 bits/data point after, P < 0.02). CHF, a state characterized by impaired sinoaortic and cardiac baroreceptor regulation of renal sympathetic nerve activity, was associated with a similar decrease in the correlation dimension (control 3.41 +/- 0.23, CHF 2.62 +/- 0.26; P < 0.01) and a reduction in chaotic behavior (greatest Lyapunov exponent: 0.205 +/- 0.048 bits/data point control, 0.136 +/- 0.033 bits/data point CHF, P < 0.02). These results indicate that removal of sinoaortic and cardiac baroreceptor regulation of renal sympathetic nerve activity, occurring either physiologically or pathophysiologically, is associated with a decrease in the correlation dimensions of the system and a reduction in chaotic behavior.

  18. Zinc oxide nanoring embedded lacey graphene nanoribbons in symmetric/asymmetric electrochemical capacitive energy storage

    NASA Astrophysics Data System (ADS)

    Sahu, Vikrant; Goel, Shubhra; Sharma, Raj Kishore; Singh, Gurmeet

    2015-12-01

    This article describes the synthesis and characterization of ZnO nanoring embedded graphene nanoribbons. Patterned holes (mesopore dia.) in graphene nanoribbons are chemically generated, leading to a high density of the edge planes. These planes carry negatively charged surface groups (like -COOH and -OH) and therefore anchor the metal ions in a cordial fashion forming a string of metal ions along the edge planes. These strings of imbibed metal ions precipitate as tiny ZnO nanorings over lacey graphene nanoribbons. The thus obtained graphene nanoribbon (GNR) based hierarchical ZnO mesoporous structures are three dimensionally accessible to the electrolyte and demonstrate high performance in capacitive energy storage. The ZnO/GNR nanocomposite electrode in an asymmetric supercapacitor device with lacey reduced graphene oxide nanoribbons (LRGONRs) as a negative electrode exhibits a 2.0 V potential window in the aqueous electrolyte and an ultra-short time constant (0.08 s). The wide potential window consequently increased the energy density from 6.8 Wh kg-1 (ZnO/GNR symmetric) to 9.4 Wh kg-1 (ZnO/GNR||LRGONR asymmetric). The relaxation time constant obtained for the asymmetric supercapacitor device was three orders of magnitude less compared to the ZnO (symmetric, 33 s) supercapacitor device. The high cycling stability of ZnO/GNR||LRGONR up to 96.7% capacitance retention, after 5000 GCD cycles at 2 mA cm-2, paves the way to a high performance aqueous electrochemical supercapacitive energy storage.This article describes the synthesis and characterization of ZnO nanoring embedded graphene nanoribbons. Patterned holes (mesopore dia.) in graphene nanoribbons are chemically generated, leading to a high density of the edge planes. These planes carry negatively charged surface groups (like -COOH and -OH) and therefore anchor the metal ions in a cordial fashion forming a string of metal ions along the edge planes. These strings of imbibed metal ions precipitate as tiny ZnO nanorings over lacey graphene nanoribbons. The thus obtained graphene nanoribbon (GNR) based hierarchical ZnO mesoporous structures are three dimensionally accessible to the electrolyte and demonstrate high performance in capacitive energy storage. The ZnO/GNR nanocomposite electrode in an asymmetric supercapacitor device with lacey reduced graphene oxide nanoribbons (LRGONRs) as a negative electrode exhibits a 2.0 V potential window in the aqueous electrolyte and an ultra-short time constant (0.08 s). The wide potential window consequently increased the energy density from 6.8 Wh kg-1 (ZnO/GNR symmetric) to 9.4 Wh kg-1 (ZnO/GNR||LRGONR asymmetric). The relaxation time constant obtained for the asymmetric supercapacitor device was three orders of magnitude less compared to the ZnO (symmetric, 33 s) supercapacitor device. The high cycling stability of ZnO/GNR||LRGONR up to 96.7% capacitance retention, after 5000 GCD cycles at 2 mA cm-2, paves the way to a high performance aqueous electrochemical supercapacitive energy storage. Electronic supplementary information (ESI) available. See DOI: 10.1039/c5nr06083d

  19. A System for Automated Extraction of Metadata from Scanned Documents using Layout Recognition and String Pattern Search Models.

    PubMed

    Misra, Dharitri; Chen, Siyuan; Thoma, George R

    2009-01-01

    One of the most expensive aspects of archiving digital documents is the manual acquisition of context-sensitive metadata useful for the subsequent discovery of, and access to, the archived items. For certain types of textual documents, such as journal articles, pamphlets, official government records, etc., where the metadata is contained within the body of the documents, a cost effective method is to identify and extract the metadata in an automated way, applying machine learning and string pattern search techniques.At the U. S. National Library of Medicine (NLM) we have developed an automated metadata extraction (AME) system that employs layout classification and recognition models with a metadata pattern search model for a text corpus with structured or semi-structured information. A combination of Support Vector Machine and Hidden Markov Model is used to create the layout recognition models from a training set of the corpus, following which a rule-based metadata search model is used to extract the embedded metadata by analyzing the string patterns within and surrounding each field in the recognized layouts.In this paper, we describe the design of our AME system, with focus on the metadata search model. We present the extraction results for a historic collection from the Food and Drug Administration, and outline how the system may be adapted for similar collections. Finally, we discuss some ongoing enhancements to our AME system.

  20. Flavour fields in steady state: stress tensor and free energy

    NASA Astrophysics Data System (ADS)

    Banerjee, Avik; Kundu, Arnab; Kundu, Sandipan

    2016-02-01

    The dynamics of a probe brane in a given gravitational background is governed by the Dirac-Born-Infeld action. The corresponding open string metric arises naturally in studying the fluctuations on the probe. In Gauge-String duality, it is known that in the presence of a constant electric field on the worldvolume of the probe, the open string metric acquires an event horizon and therefore the fluctuation modes on the probe experience an effective temperature. In this article, we bring together various properties of such a system to a formal definition and a subsequent narration of the effective thermodynamics and the stress tensor of the corresponding flavour fields, also including a non-vanishing chemical potential. In doing so, we point out a potentially infinitely-degenerate scheme-dependence of regularizing the free energy, which nevertheless yields a universal contribution in certain cases. This universal piece appears as the coefficient of a log-divergence in free energy when a space-filling probe brane is embedded in AdS d+1-background, for d = 2, 4, and is related to conformal anomaly. For the special case of d = 2, the universal factor has a striking resemblance to the well-known heat current formula in (1 + 1)-dimensional conformal field theory in steady-state, which endows a plausible physical interpretation to it. Interestingly, we observe a vanishing conformal anomaly in d = 6.

  1. Cross-cultural effect on suboptimal effort detection: an example of the Digit Span subtest of the WAIS-III in Taiwan.

    PubMed

    Yang, Cheng-Chang; Kao, Chen-Jay; Cheng, Ting-Wen; Yang, Chi-Cheng; Wang, Wei-Han; Yu, Rwei-Ling; Hsu, Yen-Hsuan; Hua, Mau-Sun

    2012-12-01

    Suppressed Digit Span performance has been proposed as an embedded indicator for suboptimal effort detection in neuropsychological evaluations in Western societies, particularly in the USA. However, its effectiveness in Chinese countries remains unexplored. The purposes of this study were first to explore normative Digit Span performance patterns between the Taiwan and American standardization samples, then to examine performances of patients with traumatic brain injury and with psychiatric diseases on the embedded measures (the Digit Span Scaled Score, Vocabulary minus Digit Span difference score, Reliable Digit Span, and the longest string of digits forward and backward) through retrospective data analysis. The normative Digit Span performance differs between the two cultural populations. Although litigating and nonlitigating participants perform differently on these measures, further prospective studies are needed to explore this issue with comprehensive external corroborating validity data.

  2. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.

    PubMed

    Al-Dmour, Hayat; Al-Ani, Ahmed

    2016-04-01

    The present work has the goal of developing a secure medical imaging information system based on a combined steganography and cryptography technique. It attempts to securely embed patient's confidential information into his/her medical images. The proposed information security scheme conceals coded Electronic Patient Records (EPRs) into medical images in order to protect the EPRs' confidentiality without affecting the image quality and particularly the Region of Interest (ROI), which is essential for diagnosis. The secret EPR data is converted into ciphertext using private symmetric encryption method. Since the Human Visual System (HVS) is less sensitive to alterations in sharp regions compared to uniform regions, a simple edge detection method has been introduced to identify and embed in edge pixels, which will lead to an improved stego image quality. In order to increase the embedding capacity, the algorithm embeds variable number of bits (up to 3) in edge pixels based on the strength of edges. Moreover, to increase the efficiency, two message coding mechanisms have been utilized to enhance the ±1 steganography. The first one, which is based on Hamming code, is simple and fast, while the other which is known as the Syndrome Trellis Code (STC), is more sophisticated as it attempts to find a stego image that is close to the cover image through minimizing the embedding impact. The proposed steganography algorithm embeds the secret data bits into the Region of Non Interest (RONI), where due to its importance; the ROI is preserved from modifications. The experimental results demonstrate that the proposed method can embed large amount of secret data without leaving a noticeable distortion in the output image. The effectiveness of the proposed algorithm is also proven using one of the efficient steganalysis techniques. The proposed medical imaging information system proved to be capable of concealing EPR data and producing imperceptible stego images with minimal embedding distortions compared to other existing methods. In order to refrain from introducing any modifications to the ROI, the proposed system only utilizes the Region of Non Interest (RONI) in embedding the EPR data. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  3. A front-end automation tool supporting design, verification and reuse of SOC.

    PubMed

    Yan, Xiao-lang; Yu, Long-li; Wang, Jie-bing

    2004-09-01

    This paper describes an in-house developed language tool called VPerl used in developing a 250 MHz 32-bit high-performance low power embedded CPU core. The authors showed that use of this tool can compress the Verilog code by more than a factor of 5, increase the efficiency of the front-end design, reduce the bug rate significantly. This tool can be used to enhance the reusability of an intellectual property model, and facilitate porting design for different platforms.

  4. Combined methods of tolerance increasing for embedded SRAM

    NASA Astrophysics Data System (ADS)

    Shchigorev, L. A.; Shagurin, I. I.

    2016-10-01

    The abilities of combined use of different methods of fault tolerance increasing for SRAM such as error detection and correction codes, parity bits, and redundant elements are considered. Area penalties due to using combinations of these methods are investigated. Estimation is made for different configurations of 4K x 128 RAM memory block for 28 nm manufacturing process. Evaluation of the effectiveness of the proposed combinations is also reported. The results of these investigations can be useful for designing fault-tolerant “system on chips”.

  5. Thermodynamics of computation and information distance

    NASA Astrophysics Data System (ADS)

    Bennett, Charles H.; Gacs, Peter; Li, Ming; Vitanyi, Paul M. R. B.; Zurek, Wojciech H.

    1993-06-01

    Intuitively, the minimal information distance between x and y is the length of the shortest program for a universal computer to transform x into y and y into x. This measure is shown to be, up to a logarithmic additive term, equal to the maximum of the conditional Kolmogorov complexities E(sub 1)(x,y) = max(K(y/x), K(x/y)). Any reasonable distance to measure similarity of pictures should be an effectively approximable, symmetric, positive function of x and y satisfying a reasonable normalization condition and obeying the triangle inequality. It turns out that E(sub 1) is minimal up to an additive constant among all such distances. Hence it is a universal 'picture distance', which accounts for any effective similarity between pictures. A third information distance, based on the ideal that the aim should be for dissipationless computations, and hence for reversible ones, is given by the length E(sub 2)(x,y) = KR(y/x) = KR(x/y) of the shortest reversible program that transforms x into y and y into x on a universal reversible computer. It is shown that also E(sub 2) = E(sub 1), up to a logarithmic additive term. It is remarkable that three so differently motivated definitions turn out to define one and the same notion. Another information distance, E(sub 3), is obtained by minimizing the total amount of information flowing in and out during a reversible computation in which the program is not retained, in other words the number of extra bits (apart from x) that must be irreversibly supplied at the beginning, plus the number of garbage bits (apart from y) that must be irreversibly erased at the end of the computation to obtain a 'clean' y. This distance is within a logarithmic additive term of the sum of the conditional complexities, E(sub 3)(x, y) = K(y/x) + K(x/y). Using the physical theory of reversible computation, the simple difference K(x) - K(y) is shown to be an appropriate (universal, antisymmetric, and transitive) measure of the amount of thermodynamic work required to transform string x into string y by the most efficient process.

  6. Ultra-low-power wireless transmitter for neural prostheses with modified pulse position modulation.

    PubMed

    Goodarzy, Farhad; Skafidas, Stan E

    2014-01-01

    An ultra-low-power wireless transmitter for embedded bionic systems is proposed, which achieves 40 pJ/b energy efficiency and delivers 500 kb/s data using the medical implant communication service frequency band (402-405 MHz). It consumes a measured peak power of 200 µW from a 1.2 V supply while occupying an active area of 0.0016 mm(2) in a 130 nm technology. A modified pulse position modulation technique called saturated amplified signal is proposed and implemented, which can reduce the overall and per bit transferred power consumption of the transmitter while reducing the complexity of the transmitter architectures, and hence potentially shrinking the size of the implemented circuitry. The design is capable of being fully integrated on single-chip solutions for surgically implanted bionic systems, wearable devices and neural embedded systems.

  7. Bennett clocking of quantum-dot cellular automata and the limits to binary logic scaling.

    PubMed

    Lent, Craig S; Liu, Mo; Lu, Yuhui

    2006-08-28

    We examine power dissipation in different clocking schemes for molecular quantum-dot cellular automata (QCA) circuits. 'Landauer clocking' involves the adiabatic transition of a molecular cell from the null state to an active state carrying data. Cell layout creates devices which allow data in cells to interact and thereby perform useful computation. We perform direct solutions of the equation of motion for the system in contact with the thermal environment and see that Landauer's Principle applies: one must dissipate an energy of at least k(B)T per bit only when the information is erased. The ideas of Bennett can be applied to keep copies of the bit information by echoing inputs to outputs, thus embedding any logically irreversible circuit in a logically reversible circuit, at the cost of added circuit complexity. A promising alternative which we term 'Bennett clocking' requires only altering the timing of the clocking signals so that bit information is simply held in place by the clock until a computational block is complete, then erased in the reverse order of computation. This approach results in ultralow power dissipation without additional circuit complexity. These results offer a concrete example in which to consider recent claims regarding the fundamental limits of binary logic scaling.

  8. Bennett clocking of quantum-dot cellular automata and the limits to binary logic scaling

    NASA Astrophysics Data System (ADS)

    Lent, Craig S.; Liu, Mo; Lu, Yuhui

    2006-08-01

    We examine power dissipation in different clocking schemes for molecular quantum-dot cellular automata (QCA) circuits. 'Landauer clocking' involves the adiabatic transition of a molecular cell from the null state to an active state carrying data. Cell layout creates devices which allow data in cells to interact and thereby perform useful computation. We perform direct solutions of the equation of motion for the system in contact with the thermal environment and see that Landauer's Principle applies: one must dissipate an energy of at least kBT per bit only when the information is erased. The ideas of Bennett can be applied to keep copies of the bit information by echoing inputs to outputs, thus embedding any logically irreversible circuit in a logically reversible circuit, at the cost of added circuit complexity. A promising alternative which we term 'Bennett clocking' requires only altering the timing of the clocking signals so that bit information is simply held in place by the clock until a computational block is complete, then erased in the reverse order of computation. This approach results in ultralow power dissipation without additional circuit complexity. These results offer a concrete example in which to consider recent claims regarding the fundamental limits of binary logic scaling.

  9. Discrete anti-gravity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Noyes, H.P.; Starson, S.

    1991-03-01

    Discrete physics, because it replaces time evolution generated by the energy operator with a global bit-string generator (program universe) and replaces fields'' with the relativistic Wheeler-Feynman action at a distance,'' allows the consistent formulation of the concept of signed gravitational charge for massive particles. The resulting prediction made by this version of the theory is that free anti-particles near the surface of the earth will fall'' up with the same acceleration that the corresponding particles fall down. So far as we can see, no current experimental information is in conflict with this prediction of our theory. The experiment crusis willmore » be one of the anti-proton or anti-hydrogen experiments at CERN. Our prediction should be much easier to test than the small effects which those experiments are currently designed to detect or bound. 23 refs.« less

  10. Study of Raster Metafile Formats.

    DTIC Science & Technology

    1985-01-01

    0, 04 0 41 a4.4 a 00 ".0 06me 0 a +1 4 a a aU 0.4 060. 41 6 41 0 6 66 4 6 £4 6 N 4041 0 ;,4 *,10*64 NO4 066 a 4140 00 .414103w 4-4 ~’ a41 06 ft406...0a.44* 5 444. 44, .4 A "a 44014 0,14 4164 00 2 44 aV Loc 4 14 4 1 54 . A s o 6 . 4a UN a 4114 A 0, 4140 50 .. a4 Ne e-C 42 0 N4 M 0.44 4 3 a 0 000...use of 8-bit characters and the SI, SO and ES. control codes within the text string, in accordance with AISI X3.41 and ISO 2022. The ALTERNATE

  11. Evolution of cellular automata with memory: The Density Classification Task.

    PubMed

    Stone, Christopher; Bull, Larry

    2009-08-01

    The Density Classification Task is a well known test problem for two-state discrete dynamical systems. For many years researchers have used a variety of evolutionary computation approaches to evolve solutions to this problem. In this paper, we investigate the evolvability of solutions when the underlying Cellular Automaton is augmented with a type of memory based on the Least Mean Square algorithm. To obtain high performance solutions using a simple non-hybrid genetic algorithm, we design a novel representation based on the ternary representation used for Learning Classifier Systems. The new representation is found able to produce superior performance to the bit string traditionally used for representing Cellular automata. Moreover, memory is shown to improve evolvability of solutions and appropriate memory settings are able to be evolved as a component part of these solutions.

  12. An Embedded Sensor Node Microcontroller with Crypto-Processors.

    PubMed

    Panić, Goran; Stecklina, Oliver; Stamenković, Zoran

    2016-04-27

    Wireless sensor network applications range from industrial automation and control, agricultural and environmental protection, to surveillance and medicine. In most applications, data are highly sensitive and must be protected from any type of attack and abuse. Security challenges in wireless sensor networks are mainly defined by the power and computing resources of sensor devices, memory size, quality of radio channels and susceptibility to physical capture. In this article, an embedded sensor node microcontroller designed to support sensor network applications with severe security demands is presented. It features a low power 16-bitprocessor core supported by a number of hardware accelerators designed to perform complex operations required by advanced crypto algorithms. The microcontroller integrates an embedded Flash and an 8-channel 12-bit analog-to-digital converter making it a good solution for low-power sensor nodes. The article discusses the most important security topics in wireless sensor networks and presents the architecture of the proposed hardware solution. Furthermore, it gives details on the chip implementation, verification and hardware evaluation. Finally, the chip power dissipation and performance figures are estimated and analyzed.

  13. Nonlinear secret image sharing scheme.

    PubMed

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  14. A Graph Theory Practice on Transformed Image: A Random Image Steganography

    PubMed Central

    Thanikaiselvan, V.; Arulmozhivarman, P.; Subashanthini, S.; Amirtharajan, Rengarajan

    2013-01-01

    Modern day information age is enriched with the advanced network communication expertise but unfortunately at the same time encounters infinite security issues when dealing with secret and/or private information. The storage and transmission of the secret information become highly essential and have led to a deluge of research in this field. In this paper, an optimistic effort has been taken to combine graceful graph along with integer wavelet transform (IWT) to implement random image steganography for secure communication. The implementation part begins with the conversion of cover image into wavelet coefficients through IWT and is followed by embedding secret image in the randomly selected coefficients through graph theory. Finally stegoimage is obtained by applying inverse IWT. This method provides a maximum of 44 dB peak signal to noise ratio (PSNR) for 266646 bits. Thus, the proposed method gives high imperceptibility through high PSNR value and high embedding capacity in the cover image due to adaptive embedding scheme and high robustness against blind attack through graph theoretic random selection of coefficients. PMID:24453857

  15. Nonlinear Secret Image Sharing Scheme

    PubMed Central

    Shin, Sang-Ho; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2⁡m⌉ bit-per-pixel (bpp), respectively. PMID:25140334

  16. An Embedded Sensor Node Microcontroller with Crypto-Processors

    PubMed Central

    Panić, Goran; Stecklina, Oliver; Stamenković, Zoran

    2016-01-01

    Wireless sensor network applications range from industrial automation and control, agricultural and environmental protection, to surveillance and medicine. In most applications, data are highly sensitive and must be protected from any type of attack and abuse. Security challenges in wireless sensor networks are mainly defined by the power and computing resources of sensor devices, memory size, quality of radio channels and susceptibility to physical capture. In this article, an embedded sensor node microcontroller designed to support sensor network applications with severe security demands is presented. It features a low power 16-bitprocessor core supported by a number of hardware accelerators designed to perform complex operations required by advanced crypto algorithms. The microcontroller integrates an embedded Flash and an 8-channel 12-bit analog-to-digital converter making it a good solution for low-power sensor nodes. The article discusses the most important security topics in wireless sensor networks and presents the architecture of the proposed hardware solution. Furthermore, it gives details on the chip implementation, verification and hardware evaluation. Finally, the chip power dissipation and performance figures are estimated and analyzed. PMID:27128925

  17. A quantum annealing approach for fault detection and diagnosis of graph-based systems

    NASA Astrophysics Data System (ADS)

    Perdomo-Ortiz, A.; Fluegemann, J.; Narasimhan, S.; Biswas, R.; Smelyanskiy, V. N.

    2015-02-01

    Diagnosing the minimal set of faults capable of explaining a set of given observations, e.g., from sensor readouts, is a hard combinatorial optimization problem usually tackled with artificial intelligence techniques. We present the mapping of this combinatorial problem to quadratic unconstrained binary optimization (QUBO), and the experimental results of instances embedded onto a quantum annealing device with 509 quantum bits. Besides being the first time a quantum approach has been proposed for problems in the advanced diagnostics community, to the best of our knowledge this work is also the first research utilizing the route Problem → QUBO → Direct embedding into quantum hardware, where we are able to implement and tackle problem instances with sizes that go beyond previously reported toy-model proof-of-principle quantum annealing implementations; this is a significant leap in the solution of problems via direct-embedding adiabatic quantum optimization. We discuss some of the programmability challenges in the current generation of the quantum device as well as a few possible ways to extend this work to more complex arbitrary network graphs.

  18. QR images: optimized image embedding in QR codes.

    PubMed

    Garateguy, Gonzalo J; Arce, Gonzalo R; Lau, Daniel L; Villarreal, Ofelia P

    2014-07-01

    This paper introduces the concept of QR images, an automatic method to embed QR codes into color images with bounded probability of detection error. These embeddings are compatible with standard decoding applications and can be applied to any color image with full area coverage. The QR information bits are encoded into the luminance values of the image, taking advantage of the immunity of QR readers against local luminance disturbances. To mitigate the visual distortion of the QR image, the algorithm utilizes halftoning masks for the selection of modified pixels and nonlinear programming techniques to locally optimize luminance levels. A tractable model for the probability of error is developed and models of the human visual system are considered in the quality metric used to optimize the luminance levels of the QR image. To minimize the processing time, the optimization techniques proposed to consider the mechanics of a common binarization method and are designed to be amenable for parallel implementations. Experimental results show the graceful degradation of the decoding rate and the perceptual quality as a function the embedding parameters. A visual comparison between the proposed and existing methods is presented.

  19. String-inspired special grand unification

    NASA Astrophysics Data System (ADS)

    Yamatsu, Naoki

    2017-10-01

    We discuss a grand unified theory (GUT) based on an SO(32) GUT gauge group broken to its subgroups including a special subgroup. In the SO(32) GUT on the six-dimensional (6D) orbifold space M^4× T^2/\\mathbb{Z}_2, one generation of the standard model fermions can be embedded into a 6D bulk Weyl fermion in the SO(32) vector representation. We show that for a three-generation model, all the 6D and 4D gauge anomalies in the bulk and on the fixed points are canceled out without exotic chiral fermions at low energies.

  20. From Planck Constant to Isomorphicity Through Justice Paradox

    NASA Astrophysics Data System (ADS)

    Hidajatullah-Maksoed, Widastra

    2015-05-01

    Robert E. Scott in his ``Chaos theory and the Justice Paradox'', William & Mary Law Review, v 35, I 1, 329 (1993) wrotes''...As we approach the 21-st Century, the signs of social disarray are everywhere. Social critics observe the breakdown of core structure - the nuclear family, schools, neighborhoods & political groups''. For completions for ``soliton'' first coined by Morikazu TODA, comparing the ``Soliton on Scott-Russell aqueduct on the Union Canal near Heriot-WATT University, July 12, 1995 to Michael Stock works: ``a Fine WATT-Balance: Determination of Planck constant & Redefinition of Kilogram'', January 2011, we can concludes the inherencies between `chaos' & `soliton'. Further through ``string theory'' from Michio KAKU sought statements from Peter Mayr: Stringy world brane & Exponential hierarchy'', JHEP 11 (2000): ``if the 5-brane is embedded in flat 10-D space time, the 6-D Planck mass on the brane is infinite'' who also describes the relation of isomorphicity & ``string theory'', from whom denotes the smart city. Replace this text with your abstract body. Incredible acknowledgments to HE. Mr. Drs. P. SWANTORO & HE. Mr. Dr-HC Jakob OETAMA.

  1. Taub-NUT Spacetime in the (A)dS/CFT and M-Theory [electronic resource

    NASA Astrophysics Data System (ADS)

    Clarkson, Richard

    In the following thesis, I will conduct a thermodynamic analysis of the Taub-NUT spacetime in various dimensions, as well as show uses for Taub-NUT and other Hyper-Kahler spacetimes. Thermodynamic analysis (by which I mean the calculation of the entropy and other thermodynamic quantities, and the analysis of these quantities) has in the past been done by use of background subtraction. The recent derivation of the (A)dS/CFT correspondences from String theory has allowed for easier and quicker analysis. I will use Taub-NUT space as a template to test these correspondences against the standard thermodynamic calculations (via the N?ether method), with (in the Taub-NUT-dS case especially) some very interesting results. There is also interest in obtaining metrics in eleven dimensions that can be reduced down to ten dimensional string theory metrics. Taub-NUT and other Hyper-Kahler metrics already possess the form to easily facilitate the Kaluza-Klein reduction, and embedding such metricsinto eleven dimensional metrics containing M2 or M5 branes produces metrics with interesting Dp-brane results.

  2. Basic composition and enriched integration in idiom processing: An EEG study.

    PubMed

    Canal, Paolo; Pesciarelli, Francesca; Vespignani, Francesco; Molinaro, Nicola; Cacciari, Cristina

    2017-06-01

    We investigated the extent to which the literal meanings of the words forming literally plausible idioms (e.g., break the ice) are semantically composed and how the idiomatic meaning is integrated in the unfolding sentence representation. Participants read ambiguous idiom strings embedded in highly predictable, literal, and idiomatic contexts while their EEG was recorded. Control sentences only contained the idiom-final word whose cloze values were as high as in literal and idiomatic contexts. Event-related potentials data showed that differences in the amplitude of a frontal positivity (PNP) emerged at the beginning and at the end of the idiom strings, with the idiomatic context condition associated with more positive voltages. The time frequency analysis of the EEG showed an increase in power of the middle gamma frequency band only in the literal context condition. These findings suggest that sentence revision mechanisms, associated with the frontal PNP, are involved in idiom meaning integration, and that the literal semantic composition of the idiomatic constituents, associated with changes in gamma frequency, is not carried out after idiom recognition. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  3. A System for Automated Extraction of Metadata from Scanned Documents using Layout Recognition and String Pattern Search Models

    PubMed Central

    Misra, Dharitri; Chen, Siyuan; Thoma, George R.

    2010-01-01

    One of the most expensive aspects of archiving digital documents is the manual acquisition of context-sensitive metadata useful for the subsequent discovery of, and access to, the archived items. For certain types of textual documents, such as journal articles, pamphlets, official government records, etc., where the metadata is contained within the body of the documents, a cost effective method is to identify and extract the metadata in an automated way, applying machine learning and string pattern search techniques. At the U. S. National Library of Medicine (NLM) we have developed an automated metadata extraction (AME) system that employs layout classification and recognition models with a metadata pattern search model for a text corpus with structured or semi-structured information. A combination of Support Vector Machine and Hidden Markov Model is used to create the layout recognition models from a training set of the corpus, following which a rule-based metadata search model is used to extract the embedded metadata by analyzing the string patterns within and surrounding each field in the recognized layouts. In this paper, we describe the design of our AME system, with focus on the metadata search model. We present the extraction results for a historic collection from the Food and Drug Administration, and outline how the system may be adapted for similar collections. Finally, we discuss some ongoing enhancements to our AME system. PMID:21179386

  4. Application of air hammer drilling technology in igneous rocks of Junggar basin

    NASA Astrophysics Data System (ADS)

    Zhao, Hongshan; Feng, Guangtong; Yu, Haiye

    2018-03-01

    There were many technical problems such as serious well deviation, low penetration rate and long drilling cycle in igneous rocks because of its hardness, strong abrasive and poor drillability, which severely influenced the exploration and development process of Junggar basin. Through analyzing the difficulties of gas drilling with roller bits in Well HS 2, conducting the mechanics experiments about igneous rock, and deeply describing the rock-breaking mechanism of air hammer drilling and its adaptability in igneous rocks, air hammer drilling can realize deviation control and fast drilling in igneous rocks of piedmont zone and avoid the wear and fatigue fracture of drilling strings due to its characteristics of low WOB, low RPM and high frequency impact. Through firstly used in igneous rocks of Well HS 201, compared with gas drilling with cone bit, the average penetration rate and one-trip footage of air hammer drilling respectively increased by more than 2.45 times and 6.42 times while the well deviation was always controlled less than 2 degrees. Two records for Block HS were set up such as the fastest penetration rate of 14.29m/h in Φ444.5mm well hole and the highest one-trip footage of 470.62m in Φ311.2mm well hole. So air hammer drilling was an effective way to realize optimal and fast drilling in the igneous rock formation of Junggar basin.

  5. Watermarking scheme based on singular value decomposition and homomorphic transform

    NASA Astrophysics Data System (ADS)

    Verma, Deval; Aggarwal, A. K.; Agarwal, Himanshu

    2017-10-01

    A semi-blind watermarking scheme based on singular-value-decomposition (SVD) and homomorphic transform is pro-posed. This scheme ensures the digital security of an eight bit gray scale image by inserting an invisible eight bit gray scale wa-termark into it. The key approach of the scheme is to apply the homomorphic transform on the host image to obtain its reflectance component. The watermark is embedded into the singular values that are obtained by applying the singular value decomposition on the reflectance component. Peak-signal-to-noise-ratio (PSNR), normalized-correlation-coefficient (NCC) and mean-structural-similarity-index-measure (MSSIM) are used to evaluate the performance of the scheme. Invisibility of watermark is ensured by visual inspection and high value of PSNR of watermarked images. Presence of watermark is ensured by visual inspection and high values of NCC and MSSIM of extracted watermarks. Robustness of the scheme is verified by high values of NCC and MSSIM for attacked watermarked images.

  6. The whole number axis integer linear transformation reversible information hiding algorithm on wavelet domain

    NASA Astrophysics Data System (ADS)

    Jiang, Zhuo; Xie, Chengjun

    2013-12-01

    This paper improved the algorithm of reversible integer linear transform on finite interval [0,255], which can realize reversible integer linear transform in whole number axis shielding data LSB (least significant bit). Firstly, this method use integer wavelet transformation based on lifting scheme to transform the original image, and select the transformed high frequency areas as information hiding area, meanwhile transform the high frequency coefficients blocks in integer linear way and embed the secret information in LSB of each coefficient, then information hiding by embedding the opposite steps. To extract data bits and recover the host image, a similar reverse procedure can be conducted, and the original host image can be lossless recovered. The simulation experimental results show that this method has good secrecy and concealment, after conducted the CDF (m, n) and DD (m, n) series of wavelet transformed. This method can be applied to information security domain, such as medicine, law and military.

  7. Advanced microprocessor based power protection system using artificial neural network techniques

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Z.; Kalam, A.; Zayegh, A.

    This paper describes an intelligent embedded microprocessor based system for fault classification in power system protection system using advanced 32-bit microprocessor technology. The paper demonstrates the development of protective relay to provide overcurrent protection schemes for fault detection. It also describes a method for power fault classification in three-phase system based on the use of neural network technology. The proposed design is implemented and tested on a single line three phase power system in power laboratory. Both the hardware and software development are described in detail.

  8. Oriented modulation for watermarking in direct binary search halftone images.

    PubMed

    Guo, Jing-Ming; Su, Chang-Cheng; Liu, Yun-Fu; Lee, Hua; Lee, Jiann-Der

    2012-09-01

    In this paper, a halftoning-based watermarking method is presented. This method enables high pixel-depth watermark embedding, while maintaining high image quality. This technique is capable of embedding watermarks with pixel depths up to 3 bits without causing prominent degradation to the image quality. To achieve high image quality, the parallel oriented high-efficient direct binary search (DBS) halftoning is selected to be integrated with the proposed orientation modulation (OM) method. The OM method utilizes different halftone texture orientations to carry different watermark data. In the decoder, the least-mean-square-trained filters are applied for feature extraction from watermarked images in the frequency domain, and the naïve Bayes classifier is used to analyze the extracted features and ultimately to decode the watermark data. Experimental results show that the DBS-based OM encoding method maintains a high degree of image quality and realizes the processing efficiency and robustness to be adapted in printing applications.

  9. Optimum decoding and detection of a multiplicative amplitude-encoded watermark

    NASA Astrophysics Data System (ADS)

    Barni, Mauro; Bartolini, Franco; De Rosa, Alessia; Piva, Alessandro

    2002-04-01

    The aim of this paper is to present a novel approach to the decoding and the detection of multibit, multiplicative, watermarks embedded in the frequency domain. Watermark payload is conveyed by amplitude modulating a pseudo-random sequence, thus resembling conventional DS spread spectrum techniques. As opposed to conventional communication systems, though, the watermark is embedded within the host DFT coefficients by using a multiplicative rule. The watermark decoding technique presented in the paper is an optimum one, in that it minimizes the bit error probability. The problem of watermark presence assessment, which is often underestimated by state-of-the-art research on multibit watermarking, is addressed too, and the optimum detection rule derived according to the Neyman-Pearson criterion. Experimental results are shown both to demonstrate the validity of the theoretical analysis and to highlight the good performance of the proposed system.

  10. Two-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran

    PubMed Central

    Khalil, Mohammed S.; Khan, Muhammad Khurram; Alginahi, Yasser M.

    2014-01-01

    This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain. The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark. A chaotic map is utilized to blur the watermark to make it secure against the local attack. The proposed method allows high watermark payloads, while preserving good image quality. Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small. PMID:25028681

  11. Two-layer fragile watermarking method secured with chaotic map for authentication of digital Holy Quran.

    PubMed

    Khalil, Mohammed S; Kurniawan, Fajri; Khan, Muhammad Khurram; Alginahi, Yasser M

    2014-01-01

    This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain. The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark. A chaotic map is utilized to blur the watermark to make it secure against the local attack. The proposed method allows high watermark payloads, while preserving good image quality. Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small.

  12. Hardware/software codesign for embedded RISC core

    NASA Astrophysics Data System (ADS)

    Liu, Peng

    2001-12-01

    This paper describes hardware/software codesign method of the extendible embedded RISC core VIRGO, which based on MIPS-I instruction set architecture. VIRGO is described by Verilog hardware description language that has five-stage pipeline with shared 32-bit cache/memory interface, and it is controlled by distributed control scheme. Every pipeline stage has one small controller, which controls the pipeline stage status and cooperation among the pipeline phase. Since description use high level language and structure is distributed, VIRGO core has highly extension that can meet the requirements of application. We take look at the high-definition television MPEG2 MPHL decoder chip, constructed the hardware/software codesign virtual prototyping machine that can research on VIRGO core instruction set architecture, and system on chip memory size requirements, and system on chip software, etc. We also can evaluate the system on chip design and RISC instruction set based on the virtual prototyping machine platform.

  13. Efficient processing of MPEG-21 metadata in the binary domain

    NASA Astrophysics Data System (ADS)

    Timmerer, Christian; Frank, Thomas; Hellwagner, Hermann; Heuer, Jörg; Hutter, Andreas

    2005-10-01

    XML-based metadata is widely adopted across the different communities and plenty of commercial and open source tools for processing and transforming are available on the market. However, all of these tools have one thing in common: they operate on plain text encoded metadata which may become a burden in constrained and streaming environments, i.e., when metadata needs to be processed together with multimedia content on the fly. In this paper we present an efficient approach for transforming such kind of metadata which are encoded using MPEG's Binary Format for Metadata (BiM) without additional en-/decoding overheads, i.e., within the binary domain. Therefore, we have developed an event-based push parser for BiM encoded metadata which transforms the metadata by a limited set of processing instructions - based on traditional XML transformation techniques - operating on bit patterns instead of cost-intensive string comparisons.

  14. Logical NAND and NOR Operations Using Algorithmic Self-assembly of DNA Molecules

    NASA Astrophysics Data System (ADS)

    Wang, Yanfeng; Cui, Guangzhao; Zhang, Xuncai; Zheng, Yan

    DNA self-assembly is the most advanced and versatile system that has been experimentally demonstrated for programmable construction of patterned systems on the molecular scale. It has been demonstrated that the simple binary arithmetic and logical operations can be computed by the process of self assembly of DNA tiles. Here we report a one-dimensional algorithmic self-assembly of DNA triple-crossover molecules that can be used to execute five steps of a logical NAND and NOR operations on a string of binary bits. To achieve this, abstract tiles were translated into DNA tiles based on triple-crossover motifs. Serving as input for the computation, long single stranded DNA molecules were used to nucleate growth of tiles into algorithmic crystals. Our method shows that engineered DNA self-assembly can be treated as a bottom-up design techniques, and can be capable of designing DNA computer organization and architecture.

  15. Passive and semi-active heave compensator: Project design methodology and control strategies.

    PubMed

    Cuellar Sanchez, William Humberto; Linhares, Tássio Melo; Neto, André Benine; Fortaleza, Eugênio Libório Feitosa

    2017-01-01

    Heave compensator is a system that mitigates transmission of heave movement from vessels to the equipment in the vessel. In drilling industry, a heave compensator enables drilling in offshore environments. Heave compensator attenuates movement transmitted from the vessel to the drill string and drill bit ensuring security and efficiency of the offshore drilling process. Common types of heave compensators are passive, active and semi-active compensators. This article presents 4 main points. First, a bulk modulus analysis obtains a simple condition to determine if the bulk modulus can be neglected in the design of hydropneumatic passive heave compensator. Second, the methodology to design passive heave compensators with the desired frequency response. Third, four control methodologies for semi-active heave compensator are tested and compared numerically. Lastly, we show experimental results obtained from a prototype with the methodology developed to design passive heave compensator.

  16. Self-replicating machines in continuous space with virtual physics.

    PubMed

    Smith, Arnold; Turney, Peter; Ewaschuk, Robert

    2003-01-01

    JohnnyVon is an implementation of self-replicating machines in continuous two-dimensional space. Two types of particles drift about in a virtual liquid. The particles are automata with discrete internal states but continuous external relationships. Their internal states are governed by finite state machines, but their external relationships are governed by a simulated physics that includes Brownian motion, viscosity, and springlike attractive and repulsive forces. The particles can be assembled into patterns that can encode arbitrary strings of bits. We demonstrate that, if an arbitrary seed pattern is put in a soup of separate individual particles, the pattern will replicate by assembling the individual particles into copies of itself. We also show that, given sufficient time, a soup of separate individual particles will eventually spontaneously form self-replicating patterns. We discuss the implications of JohnnyVon for research in nanotechnology, theoretical biology, and artificial life.

  17. Classification of EEG signals using a genetic-based machine learning classifier.

    PubMed

    Skinner, B T; Nguyen, H T; Liu, D K

    2007-01-01

    This paper investigates the efficacy of the genetic-based learning classifier system XCS, for the classification of noisy, artefact-inclusive human electroencephalogram (EEG) signals represented using large condition strings (108bits). EEG signals from three participants were recorded while they performed four mental tasks designed to elicit hemispheric responses. Autoregressive (AR) models and Fast Fourier Transform (FFT) methods were used to form feature vectors with which mental tasks can be discriminated. XCS achieved a maximum classification accuracy of 99.3% and a best average of 88.9%. The relative classification performance of XCS was then compared against four non-evolutionary classifier systems originating from different learning techniques. The experimental results will be used as part of our larger research effort investigating the feasibility of using EEG signals as an interface to allow paralysed persons to control a powered wheelchair or other devices.

  18. Strategies for the Evolution of Sex

    NASA Astrophysics Data System (ADS)

    Erzan, Ayse

    2002-03-01

    Using a bit-string model of evolution we find a successful route to diploidy and sex in simple organisms, for a step-like fitness function. Assuming that an excess of deleterious mutations triggers the conversion of haploids to diploidy and sex, we find that only one pair of sexual organisms can take over a finite population, if they engage in sexual reproduction under unfavorable conditions, and otherwise perform mitosis. Then, a haploid-diploid (HD) cycle is established, with an abbreviated haploid phase, as in present day sexual reproduction. If crossover is allowed during meiosis, HD cycles of arbitrary duration can be maintained. We find that the sexual population has a higher mortality rate than asexual diploids, but also a relaxation rate that is an order of magnitude higher. As a result, sexuals have a higher adaptability and lower mutational load on the average, since they can select out the undesirable genes much faster.

  19. Passive and semi-active heave compensator: Project design methodology and control strategies

    PubMed Central

    Cuellar Sanchez, William Humberto; Neto, André Benine; Fortaleza, Eugênio Libório Feitosa

    2017-01-01

    Heave compensator is a system that mitigates transmission of heave movement from vessels to the equipment in the vessel. In drilling industry, a heave compensator enables drilling in offshore environments. Heave compensator attenuates movement transmitted from the vessel to the drill string and drill bit ensuring security and efficiency of the offshore drilling process. Common types of heave compensators are passive, active and semi-active compensators. This article presents 4 main points. First, a bulk modulus analysis obtains a simple condition to determine if the bulk modulus can be neglected in the design of hydropneumatic passive heave compensator. Second, the methodology to design passive heave compensators with the desired frequency response. Third, four control methodologies for semi-active heave compensator are tested and compared numerically. Lastly, we show experimental results obtained from a prototype with the methodology developed to design passive heave compensator. PMID:28813494

  20. Bit-level plane image encryption based on coupled map lattice with time-varying delay

    NASA Astrophysics Data System (ADS)

    Lv, Xiupin; Liao, Xiaofeng; Yang, Bo

    2018-04-01

    Most of the existing image encryption algorithms had two basic properties: confusion and diffusion in a pixel-level plane based on various chaotic systems. Actually, permutation in a pixel-level plane could not change the statistical characteristics of an image, and many of the existing color image encryption schemes utilized the same method to encrypt R, G and B components, which means that the three color components of a color image are processed three times independently. Additionally, dynamical performance of a single chaotic system degrades greatly with finite precisions in computer simulations. In this paper, a novel coupled map lattice with time-varying delay therefore is applied in color images bit-level plane encryption to solve the above issues. Spatiotemporal chaotic system with both much longer period in digitalization and much excellent performances in cryptography is recommended. Time-varying delay embedded in coupled map lattice enhances dynamical behaviors of the system. Bit-level plane image encryption algorithm has greatly reduced the statistical characteristics of an image through the scrambling processing. The R, G and B components cross and mix with one another, which reduces the correlation among the three components. Finally, simulations are carried out and all the experimental results illustrate that the proposed image encryption algorithm is highly secure, and at the same time, also demonstrates superior performance.

  1. Romans supergravity from five-dimensional holograms

    NASA Astrophysics Data System (ADS)

    Chang, Chi-Ming; Fluder, Martin; Lin, Ying-Hsuan; Wang, Yifan

    2018-05-01

    We study five-dimensional superconformal field theories and their holographic dual, matter-coupled Romans supergravity. On the one hand, some recently derived formulae allow us to extract the central charges from deformations of the supersymmetric five-sphere partition function, whose large N expansion can be computed using matrix model techniques. On the other hand, the conformal and flavor central charges can be extracted from the six-dimensional supergravity action, by carefully analyzing its embedding into type I' string theory. The results match on the two sides of the holographic duality. Our results also provide analytic evidence for the symmetry enhancement in five-dimensional superconformal field theories.

  2. Oblivious image watermarking combined with JPEG compression

    NASA Astrophysics Data System (ADS)

    Chen, Qing; Maitre, Henri; Pesquet-Popescu, Beatrice

    2003-06-01

    For most data hiding applications, the main source of concern is the effect of lossy compression on hidden information. The objective of watermarking is fundamentally in conflict with lossy compression. The latter attempts to remove all irrelevant and redundant information from a signal, while the former uses the irrelevant information to mask the presence of hidden data. Compression on a watermarked image can significantly affect the retrieval of the watermark. Past investigations of this problem have heavily relied on simulation. It is desirable not only to measure the effect of compression on embedded watermark, but also to control the embedding process to survive lossy compression. In this paper, we focus on oblivious watermarking by assuming that the watermarked image inevitably undergoes JPEG compression prior to watermark extraction. We propose an image-adaptive watermarking scheme where the watermarking algorithm and the JPEG compression standard are jointly considered. Watermark embedding takes into consideration the JPEG compression quality factor and exploits an HVS model to adaptively attain a proper trade-off among transparency, hiding data rate, and robustness to JPEG compression. The scheme estimates the image-dependent payload under JPEG compression to achieve the watermarking bit allocation in a determinate way, while maintaining consistent watermark retrieval performance.

  3. Design of a memory-access controller with 3.71-times-enhanced energy efficiency for Internet-of-Things-oriented nonvolatile microcontroller unit

    NASA Astrophysics Data System (ADS)

    Natsui, Masanori; Hanyu, Takahiro

    2018-04-01

    In realizing a nonvolatile microcontroller unit (MCU) for sensor nodes in Internet-of-Things (IoT) applications, it is important to solve the data-transfer bottleneck between the central processing unit (CPU) and the nonvolatile memory constituting the MCU. As one circuit-oriented approach to solving this problem, we propose a memory access minimization technique for magnetoresistive-random-access-memory (MRAM)-embedded nonvolatile MCUs. In addition to multiplexing and prefetching of memory access, the proposed technique realizes efficient instruction fetch by eliminating redundant memory access while considering the code length of the instruction to be fetched and the transition of the memory address to be accessed. As a result, the performance of the MCU can be improved while relaxing the performance requirement for the embedded MRAM, and compact and low-power implementation can be performed as compared with the conventional cache-based one. Through the evaluation using a system consisting of a general purpose 32-bit CPU and embedded MRAM, it is demonstrated that the proposed technique increases the peak efficiency of the system up to 3.71 times, while a 2.29-fold area reduction is achieved compared with the cache-based one.

  4. Authenticity preservation with histogram-based reversible data hiding and quadtree concepts.

    PubMed

    Huang, Hsiang-Cheh; Fang, Wai-Chi

    2011-01-01

    With the widespread use of identification systems, establishing authenticity with sensors has become an important research issue. Among the schemes for making authenticity verification based on information security possible, reversible data hiding has attracted much attention during the past few years. With its characteristics of reversibility, the scheme is required to fulfill the goals from two aspects. On the one hand, at the encoder, the secret information needs to be embedded into the original image by some algorithms, such that the output image will resemble the input one as much as possible. On the other hand, at the decoder, both the secret information and the original image must be correctly extracted and recovered, and they should be identical to their embedding counterparts. Under the requirement of reversibility, for evaluating the performance of the data hiding algorithm, the output image quality, named imperceptibility, and the number of bits for embedding, called capacity, are the two key factors to access the effectiveness of the algorithm. Besides, the size of side information for making decoding possible should also be evaluated. Here we consider using the characteristics of original images for developing our method with better performance. In this paper, we propose an algorithm that has the ability to provide more capacity than conventional algorithms, with similar output image quality after embedding, and comparable side information produced. Simulation results demonstrate the applicability and better performance of our algorithm.

  5. Natural communities of novel archaea and bacteria growing in cold sulfurous springs with a string-of-pearls-like morphology.

    PubMed

    Rudolph, C; Wanner, G; Huber, R

    2001-05-01

    We report the identification of novel archaea living in close association with bacteria in the cold (approximately 10 degrees C) sulfurous marsh water of the Sippenauer Moor near Regensburg, Bavaria, Germany. These microorganisms form a characteristic, macroscopically visible structure, morphologically comparable to a string of pearls. Tiny, whitish globules (the pearls; diameter, about 0.5 to 3.0 mm) are connected to each other by thin, white-colored threads. Fluorescent in situ hybridization (FISH) studies have revealed that the outer part of the pearls is mainly composed of bacteria, with a filamentous bacterium predominating. Internally, archaeal cocci are the predominant microorganisms, with up to 10(7) cells estimated to be present in a single pearl. The archaea appear to be embedded in a polymer of unknown chemical composition. According to FISH and 16S rRNA gene sequence analysis, the archaea are affiliated with the euryarchaeal kingdom. The new euryarchaeal sequence represents a deep phylogenetic branch within the 16S rRNA tree and does not show extensive similarity to any cultivated archaea or to 16S rRNA gene sequences from environmental samples.

  6. Cognitive and Personality Components Underlying Spoken Idiom Comprehension in Context. An Exploratory Study.

    PubMed

    Cacciari, Cristina; Corrardini, Paola; Ferlazzo, Fabio

    2018-01-01

    In this exploratory study, we investigated whether and to what extent individual differences in cognitive and personality variables are associated with spoken idiom comprehension in context. Language unimpaired participants were enrolled in a cross-modal lexical decision study in which semantically ambiguous Italian idioms (i.e., strings with both a literal and an idiomatic interpretation as, for instance, break the ice ), predictable or unpredictable before the string offset, were embedded in idiom-biasing contexts. To explore the contributions of different cognitive and personality components, participants also completed a series of tests respectively assessing general speed, inhibitory control, short-term and working memory, cognitive flexibility, crystallized and fluid intelligence, and personality. Stepwise regression analyses revealed that online idiom comprehension was associated with the participants' working memory, inhibitory control and crystallized verbal intelligence, an association modulated by idiom type. Also personality-related variables (State Anxiety and Openness to Experience) were associated with idiom comprehension, although in marginally significant ways. These results contribute to the renewed interest on how individual variability modulates language comprehension, and for the first time document contributions of individual variability on lexicalized, high frequency multi-word expressions as idioms adding new knowledge to the existing evidence on metaphor and sarcasm.

  7. Long-term reliable physically unclonable function based on oxide tunnel barrier breakdown on two-transistors two-magnetic-tunnel-junctions cell-based embedded spin transfer torque magnetoresistive random access memory

    NASA Astrophysics Data System (ADS)

    Takaya, Satoshi; Tanamoto, Tetsufumi; Noguchi, Hiroki; Ikegami, Kazutaka; Abe, Keiko; Fujita, Shinobu

    2017-04-01

    Among the diverse applications of spintronics, security for internet-of-things (IoT) devices is one of the most important. A physically unclonable function (PUF) with a spin device (spin transfer torque magnetoresistive random access memory, STT-MRAM) is presented. Oxide tunnel barrier breakdown is used to realize long-term stability for PUFs. A secure PUF has been confirmed by evaluating the Hamming distance of a 32-bit STT-MRAM-PUF fabricated using 65 nm CMOS technology.

  8. Retained broken implants in the craniomaxillofacial skeleton.

    PubMed

    Nallathamby, Vigneswaran; Lee, Hanjing; Lin, Yap Yan; Lim, Jane; Ong, Wei Chen; Lim, Thiam-Chye

    2014-06-01

    Facial fracture patients are seen in a Level 1 trauma hospital. In our institution, we manage many patients with facial fractures and carry out more than 150 surgical procedures every year. Open reduction and internal fixation is our management of choice. All surgical procedures involve drilling of bone and implant insertion to keep the fractured bones in an anatomically reduced position to aid healing. Occasionally, drill bits used to create the pilot hole break and are embedded in the bone. We present a situation in which such an incident occurred and review the literature on retained broken implants and devices.

  9. Design and implementation of projects with Xilinx Zynq FPGA: a practical case

    NASA Astrophysics Data System (ADS)

    Travaglini, R.; D'Antone, I.; Meneghini, S.; Rignanese, L.; Zuffa, M.

    The main advantage when using FPGAs with embedded processors is the availability of additional several high-performance resources in the same physical device. Moreover, the FPGA programmability allows for connect custom peripherals. Xilinx have designed a programmable device named Zynq-7000 (simply called Zynq in the following), which integrates programmable logic (identical to the other Xilinx "serie 7" devices) with a System on Chip (SOC) based on two embedded ARM processors. Since both parts are deeply connected, the designers benefit from performance of hardware SOC and flexibility of programmability as well. In this paper a design developed by the Electronic Design Department at the Bologna Division of INFN will be presented as a practical case of project based on Zynq device. It is developed by using a commercial board called ZedBoard hosting a FMC mezzanine with a 12-bit 500 MS/s ADC. The Zynq FPGA on the ZedBoard receives digital outputs from the ADC and send them to the acquisition PC, after proper formatting, through a Gigabit Ethernet link. The major focus of the paper will be about the methodology to develop a Zynq-based design with the Xilinx Vivado software, enlightening how to configure the SOC and connect it with the programmable logic. Firmware design techniques will be presented: in particular both VHDL and IP core based strategies will be discussed. Further, the procedure to develop software for the embedded processor will be presented. Finally, some debugging tools, like the embedded Logic Analyzer, will be shown. Advantages and disadvantages with respect to adopting FPGA without embedded processors will be discussed.

  10. Meteorological Sensor Array (MSA)-Phase I. Volume 2 (Data Management Tool: Proof of Concept)

    DTIC Science & Technology

    2014-10-01

    directory of next hourly file to read *** utcString = CStr (CInt(utcString) + 1) utcString = String(2 - Len(utcString), Ŕ...hourly file to read *** utcString = CStr (CInt(utcString) + 1) utcString = String(2 - Len(utcString), Ŕ") & utcString

  11. Optically programmable electron spin memory using semiconductor quantum dots.

    PubMed

    Kroutvar, Miro; Ducommun, Yann; Heiss, Dominik; Bichler, Max; Schuh, Dieter; Abstreiter, Gerhard; Finley, Jonathan J

    2004-11-04

    The spin of a single electron subject to a static magnetic field provides a natural two-level system that is suitable for use as a quantum bit, the fundamental logical unit in a quantum computer. Semiconductor quantum dots fabricated by strain driven self-assembly are particularly attractive for the realization of spin quantum bits, as they can be controllably positioned, electronically coupled and embedded into active devices. It has been predicted that the atomic-like electronic structure of such quantum dots suppresses coupling of the spin to the solid-state quantum dot environment, thus protecting the 'spin' quantum information against decoherence. Here we demonstrate a single electron spin memory device in which the electron spin can be programmed by frequency selective optical excitation. We use the device to prepare single electron spins in semiconductor quantum dots with a well defined orientation, and directly measure the intrinsic spin flip time and its dependence on magnetic field. A very long spin lifetime is obtained, with a lower limit of about 20 milliseconds at a magnetic field of 4 tesla and at 1 kelvin.

  12. Wavelet versus DCT-based spread spectrum watermarking of image databases

    NASA Astrophysics Data System (ADS)

    Mitrea, Mihai P.; Zaharia, Titus B.; Preteux, Francoise J.; Vlad, Adriana

    2004-05-01

    This paper addresses the issue of oblivious robust watermarking, within the framework of colour still image database protection. We present an original method which complies with all the requirements nowadays imposed to watermarking applications: robustness (e.g. low-pass filtering, print & scan, StirMark), transparency (both quality and fidelity), low probability of false alarm, obliviousness and multiple bit recovering. The mark is generated from a 64 bit message (be it a logo, a serial number, etc.) by means of a Spread Spectrum technique and is embedded into DWT (Discrete Wavelet Transform) domain, into certain low frequency coefficients, selected according to the hierarchy of their absolute values. The best results were provided by the (9,7) bi-orthogonal transform. The experiments were carried out on 1200 image sequences, each of them of 32 images. Note that these sequences represented several types of images: natural, synthetic, medical, etc. and each time we obtained the same good results. These results are compared with those we already obtained for the DCT domain, the differences being pointed out and discussed.

  13. Enzyme-like replication de novo in a microcontroller environment.

    PubMed

    Tangen, Uwe

    2010-01-01

    The desire to start evolution from scratch inside a computer memory is as old as computing. Here we demonstrate how viable computer programs can be established de novo in a Precambrian environment without supplying any specific instantiation, just starting with random bit sequences. These programs are not self-replicators, but act much more like catalysts. The microcontrollers used in the end are the result of a long series of simplifications. The objective of this simplification process was to produce universal machines with a human-readable interface, allowing software and/or hardware evolution to be studied. The power of the instruction set can be modified by introducing a secondary structure-folding mechanism, which is a state machine, allowing nontrivial replication to emerge with an instruction width of only a few bits. This state-machine approach not only attenuates the problems of brittleness and encoding functionality (too few bits available for coding, and too many instructions needed); it also enables the study of hardware evolution as such. Furthermore, the instruction set is sufficiently powerful to permit external signals to be processed. This information-theoretic approach forms one vertex of a triangle alongside artificial cell research and experimental research on the creation of life. Hopefully this work helps develop an understanding of how information—in a similar sense to the account of functional information described by Hazen et al.—is created by evolution and how this information interacts with or is embedded in its physico-chemical environment.

  14. Simultaneous transmission of wired and wireless signals based on double sideband carrier suppression

    NASA Astrophysics Data System (ADS)

    Bitew, Mekuanint Agegnehu; Shiu, Run-Kai; Peng, Peng-Chun; Wang, Cheng-Hao; Chen, Yan-Ming

    2017-11-01

    In this paper, we proposed and experimentally demonstrated simultaneous transmission of wired and wireless signals based on double sideband optical carrier suppression. By properly adjusting the bias point of the dual-output mach-zehnder modulator (MZM), a central carrier in one output port and a pair of first-order sidebands in another output port are generated. The pair of first-order sidebands are fed into a second MZM to generate second-order order sidebands. A wired signal is embedded on the central carrier while a wireless signal is embedded on the second-order sidebands. Unlike other schemes, we did not use optical filter to separate the carrier from the optical sidebands. The measured bit error rate (BER) and eye-diagrams after a 25 km single-mode-fiber (SMF) transmission proved that the proposed scheme is successful for both wired and wireless signals transmission. Moreover, the power penalty at the BER of 10-9 is 0.3 and 0.7 dB for wired and wireless signals, respectively.

  15. Photonic crystal lasers using wavelength-scale embedded active region

    NASA Astrophysics Data System (ADS)

    Matsuo, Shinji; Sato, Tomonari; Takeda, Koji; Shinya, Akihiko; Nozaki, Kengo; Kuramochi, Eiichi; Taniyama, Hideaki; Notomi, Masaya; Fujii, Takuro; Hasebe, Koichi; Kakitsuka, Takaaki

    2014-01-01

    Lasers with ultra-low operating energy are desired for use in chip-to-chip and on-chip optical interconnects. If we are to reduce the operating energy, we must reduce the active volume. Therefore, a photonic crystal (PhC) laser with a wavelength-scale cavity has attracted a lot of attention because a PhC provides a large Q-factor with a small volume. To improve this device's performance, we employ an embedded active region structure in which the wavelength-scale active region is buried with an InP PhC slab. This structure enables us to achieve effective confinement of both carriers and photons, and to improve the thermal resistance of the device. Thus, we have obtained a large external differential quantum efficiency of 55% and an output power of -10 dBm by optical pumping. For electrical pumping, we use a lateral p-i-n structure that employs Zn diffusion and Si ion implantation for p-type and n-type doping, respectively. We have achieved room-temperature continuous-wave operation with a threshold current of 7.8 µA and a maximum 3 dB bandwidth of 16.2 GHz. The results of an experimental bit error rate measurement with a 10 Gbit s-1 NRZ signal reveal the minimum operating energy for transferring a single bit of 5.5 fJ. These results show the potential of this laser to be used for very short reach interconnects. We also describe the optimal design of cavity quality (Q) factor in terms of achieving a large output power with a low operating energy using a calculation based on rate equations. When we assume an internal absorption loss of 20 cm-1, the optimized coupling Q-factor is 2000.

  16. Refining the boundaries of the classical de Sitter landscape

    NASA Astrophysics Data System (ADS)

    Andriot, David; Blåbäck, Johan

    2017-03-01

    We derive highly constraining no-go theorems for classical de Sitter backgrounds of string theory, with parallel sources; this should impact the embedding of cosmological models. We study ten-dimensional vacua of type II supergravities with parallel and backreacted orientifold O p -planes and D p -branes, on four-dimensional de Sitter spacetime times a compact manifold. Vacua for p = 3, 7 or 8 are completely excluded, and we obtain tight constraints for p = 4, 5, 6. This is achieved through the derivation of an enlightening expression for the four-dimensional Ricci scalar. Further interesting expressions and no-go theorems are obtained. The paper is self-contained so technical aspects, including conventions, might be of more general interest.

  17. Coordination of Word Recognition and Oculomotor Control During Reading: The Role of Implicit Lexical Decisions

    PubMed Central

    Choi, Wonil; Gordon, Peter C.

    2013-01-01

    The coordination of word-recognition and oculomotor processes during reading was evaluated in two eye-tracking experiments that examined how word skipping, where a word is not fixated during first-pass reading, is affected by the lexical status of a letter string in the parafovea and ease of recognizing that string. Ease of lexical recognition was manipulated through target-word frequency (Experiment 1) and through repetition priming between prime-target pairs embedded in a sentence (Experiment 2). Using the gaze-contingent boundary technique the target word appeared in the parafovea either with full preview or with transposed-letter (TL) preview. The TL preview strings were nonwords in Experiment 1 (e.g., bilnk created from the target blink), but were words in Experiment 2 (e.g., sacred created from the target scared). Experiment 1 showed greater skipping for high-frequency than low-frequency target words in the full preview condition but not in the TL preview (nonword) condition. Experiment 2 showed greater skipping for target words that repeated an earlier prime word than for those that did not, with this repetition priming occurring both with preview of the full target and with preview of the target’s TL neighbor word. However, time to progress from the word after the target was greater following skips of the TL preview word, whose meaning was anomalous in the sentence context, than following skips of the full preview word whose meaning fit sensibly into the sentence context. Together, the results support the idea that coordination between word-recognition and oculomotor processes occurs at the level of implicit lexical decisions. PMID:23106372

  18. Mobile Monitoring and Embedded Control System for Factory Environment

    PubMed Central

    Lian, Kuang-Yow; Hsiao, Sung-Jung; Sung, Wen-Tsai

    2013-01-01

    This paper proposes a real-time method to carry out the monitoring of factory zone temperatures, humidity and air quality using smart phones. At the same time, the system detects possible flames, and analyzes and monitors electrical load. The monitoring also includes detecting the vibrations of operating machinery in the factory area. The research proposes using ZigBee and Wi-Fi protocol intelligent monitoring system integration within the entire plant framework. The sensors on the factory site deliver messages and real-time sensing data to an integrated embedded systems via the ZigBee protocol. The integrated embedded system is built by the open-source 32-bit ARM (Advanced RISC Machine) core Arduino Due module, where the network control codes are built in for the ARM chipset integrated controller. The intelligent integrated controller is able to instantly provide numerical analysis results according to the received data from the ZigBee sensors. The Android APP and web-based platform are used to show measurement results. The built-up system will transfer these results to a specified cloud device using the TCP/IP protocol. Finally, the Fast Fourier Transform (FFT) approach is used to analyze the power loads in the factory zones. Moreover, Near Field Communication (NFC) technology is used to carry out the actual electricity load experiments using smart phones. PMID:24351642

  19. Mobile monitoring and embedded control system for factory environment.

    PubMed

    Lian, Kuang-Yow; Hsiao, Sung-Jung; Sung, Wen-Tsai

    2013-12-17

    This paper proposes a real-time method to carry out the monitoring of factory zone temperatures, humidity and air quality using smart phones. At the same time, the system detects possible flames, and analyzes and monitors electrical load. The monitoring also includes detecting the vibrations of operating machinery in the factory area. The research proposes using ZigBee and Wi-Fi protocol intelligent monitoring system integration within the entire plant framework. The sensors on the factory site deliver messages and real-time sensing data to an integrated embedded systems via the ZigBee protocol. The integrated embedded system is built by the open-source 32-bit ARM (Advanced RISC Machine) core Arduino Due module, where the network control codes are built in for the ARM chipset integrated controller. The intelligent integrated controller is able to instantly provide numerical analysis results according to the received data from the ZigBee sensors. The Android APP and web-based platform are used to show measurement results. The built-up system will transfer these results to a specified cloud device using the TCP/IP protocol. Finally, the Fast Fourier Transform (FFT) approach is used to analyze the power loads in the factory zones. Moreover, Near Field Communication (NFC) technology is used to carry out the actual electricity load experiments using smart phones.

  20. A Data Hiding Technique to Synchronously Embed Physiological Signals in H.264/AVC Encoded Video for Medicine Healthcare.

    PubMed

    Peña, Raul; Ávila, Alfonso; Muñoz, David; Lavariega, Juan

    2015-01-01

    The recognition of clinical manifestations in both video images and physiological-signal waveforms is an important aid to improve the safety and effectiveness in medical care. Physicians can rely on video-waveform (VW) observations to recognize difficult-to-spot signs and symptoms. The VW observations can also reduce the number of false positive incidents and expand the recognition coverage to abnormal health conditions. The synchronization between the video images and the physiological-signal waveforms is fundamental for the successful recognition of the clinical manifestations. The use of conventional equipment to synchronously acquire and display the video-waveform information involves complex tasks such as the video capture/compression, the acquisition/compression of each physiological signal, and the video-waveform synchronization based on timestamps. This paper introduces a data hiding technique capable of both enabling embedding channels and synchronously hiding samples of physiological signals into encoded video sequences. Our data hiding technique offers large data capacity and simplifies the complexity of the video-waveform acquisition and reproduction. The experimental results revealed successful embedding and full restoration of signal's samples. Our results also demonstrated a small distortion in the video objective quality, a small increment in bit-rate, and embedded cost savings of -2.6196% for high and medium motion video sequences.

  1. The Human Brain Project and neuromorphic computing

    PubMed Central

    Calimera, Andrea; Macii, Enrico; Poncino, Massimo

    Summary Understanding how the brain manages billions of processing units connected via kilometers of fibers and trillions of synapses, while consuming a few tens of Watts could provide the key to a completely new category of hardware (neuromorphic computing systems). In order to achieve this, a paradigm shift for computing as a whole is needed, which will see it moving away from current “bit precise” computing models and towards new techniques that exploit the stochastic behavior of simple, reliable, very fast, low-power computing devices embedded in intensely recursive architectures. In this paper we summarize how these objectives will be pursued in the Human Brain Project. PMID:24139655

  2. Completing the Physical Representation of Quantum Algorithms Provides a Quantitative Explanation of Their Computational Speedup

    NASA Astrophysics Data System (ADS)

    Castagnoli, Giuseppe

    2018-03-01

    The usual representation of quantum algorithms, limited to the process of solving the problem, is physically incomplete. We complete it in three steps: (i) extending the representation to the process of setting the problem, (ii) relativizing the extended representation to the problem solver to whom the problem setting must be concealed, and (iii) symmetrizing the relativized representation for time reversal to represent the reversibility of the underlying physical process. The third steps projects the input state of the representation, where the problem solver is completely ignorant of the setting and thus the solution of the problem, on one where she knows half solution (half of the information specifying it when the solution is an unstructured bit string). Completing the physical representation shows that the number of computation steps (oracle queries) required to solve any oracle problem in an optimal quantum way should be that of a classical algorithm endowed with the advanced knowledge of half solution.

  3. EDULISS: a small-molecule database with data-mining and pharmacophore searching capabilities

    PubMed Central

    Hsin, Kun-Yi; Morgan, Hugh P.; Shave, Steven R.; Hinton, Andrew C.; Taylor, Paul; Walkinshaw, Malcolm D.

    2011-01-01

    We present the relational database EDULISS (EDinburgh University Ligand Selection System), which stores structural, physicochemical and pharmacophoric properties of small molecules. The database comprises a collection of over 4 million commercially available compounds from 28 different suppliers. A user-friendly web-based interface for EDULISS (available at http://eduliss.bch.ed.ac.uk/) has been established providing a number of data-mining possibilities. For each compound a single 3D conformer is stored along with over 1600 calculated descriptor values (molecular properties). A very efficient method for unique compound recognition, especially for a large scale database, is demonstrated by making use of small subgroups of the descriptors. Many of the shape and distance descriptors are held as pre-calculated bit strings permitting fast and efficient similarity and pharmacophore searches which can be used to identify families of related compounds for biological testing. Two ligand searching applications are given to demonstrate how EDULISS can be used to extract families of molecules with selected structural and biophysical features. PMID:21051336

  4. PALP: A Package for Analysing Lattice Polytopes with applications to toric geometry

    NASA Astrophysics Data System (ADS)

    Kreuzer, Maximilian; Skarke, Harald

    2004-02-01

    We describe our package PALP of C programs for calculations with lattice polytopes and applications to toric geometry, which is freely available on the internet. It contains routines for vertex and facet enumeration, computation of incidences and symmetries, as well as completion of the set of lattice points in the convex hull of a given set of points. In addition, there are procedures specialized to reflexive polytopes such as the enumeration of reflexive subpolytopes, and applications to toric geometry and string theory, like the computation of Hodge data and fibration structures for toric Calabi-Yau varieties. The package is well tested and optimized in speed as it was used for time consuming tasks such as the classification of reflexive polyhedra in 4 dimensions and the creation and manipulation of very large lists of 5-dimensional polyhedra. While originally intended for low-dimensional applications, the algorithms work in any dimension and our key routine for vertex and facet enumeration compares well with existing packages. Program summaryProgram obtainable form: CPC Program Library, Queen's University of Belfast, N. Ireland Title of program: PALP Catalogue identifier: ADSQ Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADSQ Computer for which the program is designed: Any computer featuring C Computers on which it has been tested: PCs, SGI Origin 2000, IBM RS/6000, COMPAQ GS140 Operating systems under which the program has been tested: Linux, IRIX, AIX, OSF1 Programming language used: C Memory required to execute with typical data: Negligible for most applications; highly variable for analysis of large polytopes; no minimum but strong effects on calculation time for some tasks Number of bits in a word: arbitrary Number of processors used: 1 Has the code been vectorised or parallelized?: No Number of bytes in distributed program, including test data, etc.: 138 098 Distribution format: tar gzip file Keywords: Lattice polytopes, facet enumeration, reflexive polytopes, toric geometry, Calabi-Yau manifolds, string theory, conformal field theory Nature of problem: Certain lattice polytopes called reflexive polytopes afford a combinatorial description of a very large class of Calabi-Yau manifolds in terms of toric geometry. These manifolds play an essential role for compactifications of string theory. While originally designed to handle and classify reflexive polytopes, with particular emphasis on problems relevant to string theory applications [M. Kreuzer and H. Skarke, Rev. Math. Phys. 14 (2002) 343], the package also handles standard questions (facet enumeration and similar problems) about arbitrary lattice polytopes very efficiently. Method of solution: Much of the code is straightforward programming, but certain key routines are optimized with respect to calculation time and the handling of large sets of data. A double description method (see, e.g., [D. Avis et al., Comput. Geometry 7 (1997) 265]) is used for the facet enumeration problem, lattice basis reduction for extended gcd and a binary database structure for tasks involving large numbers of polytopes, such as classification problems. Restrictions on the complexity of the program: The only hard limitation comes from the fact that fixed integer arithmetic (32 or 64 bit) is used, allowing for input data (polytope coordinates) of roughly up to 10 9. Other parameters (dimension, numbers of points and vertices, etc.) can be set before compilation. Typical running time: Most tasks (typically: analysis of a four dimensional reflexive polytope) can be perfomed interactively within milliseconds. The classification of all reflexive polytopes in four dimensions takes several processor years. The facet enumeration problem for higher (e.g., 12-20) dimensional polytopes varies strongly with the dimension and structure of the polytope; here PALP's performance is similar to that of existing packages [Avis et al., Comput. Geometry 7 (1997) 265]. Unusual features of the program: None

  5. Comparative Study of the Collective Dynamics of Proteins and Inorganic Nanoparticles

    PubMed Central

    Haddadian, Esmael J.; Zhang, Hao; Freed, Karl F.; Douglas, Jack F.

    2017-01-01

    Molecular dynamics simulations of ubiquitin in water/glycerol solutions are used to test the suggestion by Karplus and coworkers that proteins in their biologically active state should exhibit a dynamics similar to ‘surface-melted’ inorganic nanoparticles (NPs). Motivated by recent studies indicating that surface-melted inorganic NPs are in a ‘glassy’ state that is an intermediate dynamical state between a solid and liquid, we probe the validity and significance of this proposed analogy. In particular, atomistic simulations of ubiquitin in solution based on CHARMM36 force field and pre-melted Ni NPs (Voter-Chen Embedded Atom Method potential) indicate a common dynamic heterogeneity, along with other features of glass-forming (GF) liquids such as collective atomic motion in the form of string-like atomic displacements, potential energy fluctuations and particle displacements with long range correlations (‘colored’ or ‘pink’ noise), and particle displacement events having a power law scaling in magnitude, as found in earthquakes. On the other hand, we find the dynamics of ubiquitin to be even more like a polycrystalline material in which the α-helix and β-sheet regions of the protein are similar to crystal grains so that the string-like collective atomic motion is concentrated in regions between the α-helix and β-sheet domains. PMID:28176808

  6. Comparative Study of the Collective Dynamics of Proteins and Inorganic Nanoparticles

    NASA Astrophysics Data System (ADS)

    Haddadian, Esmael J.; Zhang, Hao; Freed, Karl F.; Douglas, Jack F.

    2017-02-01

    Molecular dynamics simulations of ubiquitin in water/glycerol solutions are used to test the suggestion by Karplus and coworkers that proteins in their biologically active state should exhibit a dynamics similar to ‘surface-melted’ inorganic nanoparticles (NPs). Motivated by recent studies indicating that surface-melted inorganic NPs are in a ‘glassy’ state that is an intermediate dynamical state between a solid and liquid, we probe the validity and significance of this proposed analogy. In particular, atomistic simulations of ubiquitin in solution based on CHARMM36 force field and pre-melted Ni NPs (Voter-Chen Embedded Atom Method potential) indicate a common dynamic heterogeneity, along with other features of glass-forming (GF) liquids such as collective atomic motion in the form of string-like atomic displacements, potential energy fluctuations and particle displacements with long range correlations (‘colored’ or ‘pink’ noise), and particle displacement events having a power law scaling in magnitude, as found in earthquakes. On the other hand, we find the dynamics of ubiquitin to be even more like a polycrystalline material in which the α-helix and β-sheet regions of the protein are similar to crystal grains so that the string-like collective atomic motion is concentrated in regions between the α-helix and β-sheet domains.

  7. Cognitive and Personality Components Underlying Spoken Idiom Comprehension in Context. An Exploratory Study

    PubMed Central

    Cacciari, Cristina; Corrardini, Paola; Ferlazzo, Fabio

    2018-01-01

    In this exploratory study, we investigated whether and to what extent individual differences in cognitive and personality variables are associated with spoken idiom comprehension in context. Language unimpaired participants were enrolled in a cross-modal lexical decision study in which semantically ambiguous Italian idioms (i.e., strings with both a literal and an idiomatic interpretation as, for instance, break the ice), predictable or unpredictable before the string offset, were embedded in idiom-biasing contexts. To explore the contributions of different cognitive and personality components, participants also completed a series of tests respectively assessing general speed, inhibitory control, short-term and working memory, cognitive flexibility, crystallized and fluid intelligence, and personality. Stepwise regression analyses revealed that online idiom comprehension was associated with the participants' working memory, inhibitory control and crystallized verbal intelligence, an association modulated by idiom type. Also personality-related variables (State Anxiety and Openness to Experience) were associated with idiom comprehension, although in marginally significant ways. These results contribute to the renewed interest on how individual variability modulates language comprehension, and for the first time document contributions of individual variability on lexicalized, high frequency multi-word expressions as idioms adding new knowledge to the existing evidence on metaphor and sarcasm. PMID:29765350

  8. Rapid interactions between lexical semantic and word form analysis during word recognition in context: evidence from ERPs.

    PubMed

    Kim, Albert; Lai, Vicky

    2012-05-01

    We used ERPs to investigate the time course of interactions between lexical semantic and sublexical visual word form processing during word recognition. Participants read sentence-embedded pseudowords that orthographically resembled a contextually supported real word (e.g., "She measured the flour so she could bake a ceke…") or did not (e.g., "She measured the flour so she could bake a tont…") along with nonword consonant strings (e.g., "She measured the flour so she could bake a srdt…"). Pseudowords that resembled a contextually supported real word ("ceke") elicited an enhanced positivity at 130 msec (P130), relative to real words (e.g., "She measured the flour so she could bake a cake…"). Pseudowords that did not resemble a plausible real word ("tont") enhanced the N170 component, as did nonword consonant strings ("srdt"). The effect pattern shows that the visual word recognition system is, perhaps, counterintuitively, more rapidly sensitive to minor than to flagrant deviations from contextually predicted inputs. The findings are consistent with rapid interactions between lexical and sublexical representations during word recognition, in which rapid lexical access of a contextually supported word (CAKE) provides top-down excitation of form features ("cake"), highlighting the anomaly of an unexpected word "ceke."

  9. Does sex induce a phase transition?

    NASA Astrophysics Data System (ADS)

    de Oliveira, P. M. C.; Moss de Oliveira, S.; Stauffer, D.; Cebrat, S.; Pękalski, A.

    2008-05-01

    We discovered a dynamic phase transition induced by sexual reproduction. The dynamics is a pure Darwinian rule applied to diploid bit-strings with both fundamental ingredients to drive Darwin's evolution: (1) random mutations and crossings which act in the sense of increasing the entropy (or diversity); and (2) selection which acts in the opposite sense by limiting the entropy explosion. Selection wins this competition if mutations performed at birth are few enough, and thus the wild genotype dominates the steady-state population. By slowly increasing the average number m of mutations, however, the population suddenly undergoes a mutational degradation precisely at a transition point mc. Above this point, the “bad” alleles (represented by 1-bits) spread over the genetic pool of the population, overcoming the selection pressure. Individuals become selectively alike, and evolution stops. Only below this point, m < mc, evolutionary life is possible. The finite-size-scaling behaviour of this transition is exhibited for large enough “chromosome” lengths L, through lengthy computer simulations. One important and surprising observation is the L-independence of the transition curves, for large L. They are also independent on the population size. Another is that mc is near unity, i.e. life cannot be stable with much more than one mutation per diploid genome, independent of the chromosome length, in agreement with reality. One possible consequence is that an eventual evolutionary jump towards larger L enabling the storage of more genetic information would demand an improved DNA copying machinery in order to keep the same total number of mutations per offspring.

  10. Systolic array IC for genetic computation

    NASA Technical Reports Server (NTRS)

    Anderson, D.

    1991-01-01

    Measuring similarities between large sequences of genetic information is a formidable task requiring enormous amounts of computer time. Geneticists claim that nearly two months of CRAY-2 time are required to run a single comparison of the known database against the new bases that will be found this year, and more than a CRAY-2 year for next year's genetic discoveries, and so on. The DNA IC, designed at HP-ICBD in cooperation with the California Institute of Technology and the Jet Propulsion Laboratory, is being implemented in order to move the task of genetic comparison onto workstations and personal computers, while vastly improving performance. The chip is a systolic (pumped) array comprised of 16 processors, control logic, and global RAM, totaling 400,000 FETS. At 12 MHz, each chip performs 2.7 billion 16 bit operations per second. Using 35 of these chips in series on one PC board (performing nearly 100 billion operations per second), a sequence of 560 bases can be compared against the eventual total genome of 3 billion bases, in minutes--on a personal computer. While the designed purpose of the DNA chip is for genetic research, other disciplines requiring similarity measurements between strings of 7 bit encoded data could make use of this chip as well. Cryptography and speech recognition are two examples. A mix of full custom design and standard cells, in CMOS34, were used to achieve these goals. Innovative test methods were developed to enhance controllability and observability in the array. This paper describes these techniques as well as the chip's functionality. This chip was designed in the 1989-90 timeframe.

  11. String scattering amplitudes and deformed cubic string field theory

    NASA Astrophysics Data System (ADS)

    Lai, Sheng-Hong; Lee, Jen-Chi; Lee, Taejin; Yang, Yi

    2018-01-01

    We study string scattering amplitudes by using the deformed cubic string field theory which is equivalent to the string field theory in the proper-time gauge. The four-string scattering amplitudes with three tachyons and an arbitrary string state are calculated. The string field theory yields the string scattering amplitudes evaluated on the world sheet of string scattering whereas the conventional method, based on the first quantized theory brings us the string scattering amplitudes defined on the upper half plane. For the highest spin states, generated by the primary operators, both calculations are in perfect agreement. In this case, the string scattering amplitudes are invariant under the conformal transformation, which maps the string world sheet onto the upper half plane. If the external string states are general massive states, generated by non-primary field operators, we need to take into account carefully the conformal transformation between the world sheet and the upper half plane. We show by an explicit calculation that the string scattering amplitudes calculated by using the deformed cubic string field theory transform into those of the first quantized theory on the upper half plane by the conformal transformation, generated by the Schwarz-Christoffel mapping.

  12. Covariant open bosonic string field theory on multiple D-branes in the proper-time gauge

    NASA Astrophysics Data System (ADS)

    Lee, Taejin

    2017-12-01

    We construct a covariant open bosonic string field theory on multiple D-branes, which reduces to a non-Abelian group Yang-Mills gauge theory in the zero-slope limit. Making use of the first quantized open bosonic string in the proper time gauge, we convert the string amplitudes given by the Polyakov path integrals on string world sheets into those of the second quantized theory. The world sheet diagrams generated by the constructed open string field theory are planar in contrast to those of the Witten's cubic string field theory. However, the constructed string field theory is yet equivalent to the Witten's cubic string field theory. Having obtained planar diagrams, we may adopt the light-cone string field theory technique to calculate the multi-string scattering amplitudes with an arbitrary number of external strings. We examine in detail the three-string vertex diagram and the effective four-string vertex diagrams generated perturbatively by the three-string vertex at tree level. In the zero-slope limit, the string scattering amplitudes are identified precisely as those of non-Abelian Yang-Mills gauge theory if the external states are chosen to be massless vector particles.

  13. E(lementary)-strings in six-dimensional heterotic F-theory

    NASA Astrophysics Data System (ADS)

    Choi, Kang-Sin; Rey, Soo-Jong

    2017-09-01

    Using E-strings, we can analyze not only six-dimensional superconformal field theories but also probe vacua of non-perturabative heterotic string. We study strings made of D3-branes wrapped on various two-cycles in the global F-theory setup. We claim that E-strings are elementary in the sense that various combinations of E-strings can form M-strings as well as heterotic strings and new kind of strings, called G-strings. Using them, we show that emissions and combinations of heterotic small instantons generate most of known six-dimensional superconformal theories, their affinizations and little string theories. Taking account of global structure of compact internal geometry, we also show that special combinations of E-strings play an important role in constructing six-dimensional theories of D- and E-types. We check global consistency conditions from anomaly cancellation conditions, both from five-branes and strings, and show that they are given in terms of elementary E-string combinations.

  14. Gravitational Scattering Amplitudes and Closed String Field Theory in the Proper-Time Gauge

    NASA Astrophysics Data System (ADS)

    Lee, Taejin

    2018-01-01

    We construct a covariant closed string field theory by extending recent works on the covariant open string field theory in the proper-time gauge. Rewriting the string scattering amplitudes generated by the closed string field theory in terms of the Polyakov string path integrals, we identify the Fock space representations of the closed string vertices. We show that the Fock space representations of the closed string field theory may be completely factorized into those of the open string field theory. It implies that the well known Kawai-Lewellen-Tye (KLT) relations of the first quantized string theory may be promoted to the second quantized closed string theory. We explicitly calculate the scattering amplitudes of three gravitons by using the closed string field theory in the proper-time gauge.

  15. Hot string soup: Thermodynamics of strings near the Hagedorn transition

    NASA Astrophysics Data System (ADS)

    Lowe, David A.; Thorlacius, Lárus

    1995-01-01

    Above the Hagedorn energy density closed fundamental strings form a long string phase. The dynamics of weakly interacting long strings is described by a simple Boltzmann equation which can be solved explicitly for equilibrium distributions. The averge total number of long strings grows logarithmically with total energy in the microcanonical ensemble. This is consistent with calculations of the free single string density of states provided the thermodynamic limit is carefully defined. If the theory contains open strings the long string phase is suppressed.

  16. A digital-type fluxgate magnetometer using a sigma-delta digital-to-analog converter for a sounding rocket experiment

    NASA Astrophysics Data System (ADS)

    Iguchi, Kyosuke; Matsuoka, Ayako

    2014-07-01

    One of the design challenges for future magnetospheric satellite missions is optimizing the mass, size, and power consumption of the instruments to meet the mission requirements. We have developed a digital-type fluxgate (DFG) magnetometer that is anticipated to have significantly less mass and volume than the conventional analog-type. Hitherto, the lack of a space-grade digital-to-analog converter (DAC) with good accuracy has prevented the development of a high-performance DFG. To solve this problem, we developed a high-resolution DAC using parts whose performance was equivalent to existing space-grade parts. The developed DAC consists of a 1-bit second-order sigma-delta modulator and a fourth-order analog low-pass filter. We tested the performance of the DAC experimentally and found that it had better than 17-bits resolution in 80% of the measurement range, and the linearity error was 2-13.3 of the measurement range. We built a DFG flight model (in which this DAC was embedded) for a sounding rocket experiment as an interim step in the development of a future satellite mission. The noise of this DFG was 0.79 nTrms at 0.1-10 Hz, which corresponds to a roughly 17-bit resolution. The results show that the sigma-delta DAC and the DFG had a performance that is consistent with our optimized design, and the noise was as expected from the noise simulation. Finally, we have confirmed that the DFG worked successfully during the flight of the sounding rocket.

  17. E11, brane dynamics and duality symmetries

    NASA Astrophysics Data System (ADS)

    West, Peter

    2018-05-01

    Following arXiv:hep-th/0412336 we use the nonlinear realisation of the semi-direct product of E11 and its vector representation to construct brane dynamics. The brane moves through a space-time which arises in the nonlinear realisation from the vector representation and it contains the usual embedding coordinates as well as the worldvolume fields. The resulting equations of motion are first order in derivatives and can be thought of as duality relations. Each brane carries the full E11 symmetry and so the Cremmer-Julia duality symmetries. We apply this theory to find the dynamics of the IIA and IIB strings, the M2 and M5 branes, the IIB D3 brane as well as the one and two branes in seven dimensions.

  18. Implementation of a fast 16-Bit dynamic clamp using LabVIEW-RT.

    PubMed

    Kullmann, Paul H M; Wheeler, Diek W; Beacom, Joshua; Horn, John P

    2004-01-01

    The dynamic-clamp method provides a powerful electrophysiological tool for creating virtual ionic conductances in living cells and studying their influence on membrane potential. Here we describe G-clamp, a new way to implement a dynamic clamp using the real-time version of the Lab-VIEW programming environment together with a Windows host, an embedded microprocessor that runs a real-time operating system and a multifunction data-acquisition board. The software includes descriptions of a fast voltage-dependent sodium conductance, delayed rectifier, M-type and A-type potassium conductances, and a leak conductance. The system can also read synaptic conductance waveforms from preassembled data files. These virtual conductances can be reliably implemented at speeds < or =43 kHz while simultaneously saving two channels of data with 16-bit precision. G-clamp also includes utilities for measuring current-voltage relations, synaptic strength, and synaptic gain. Taking an approach built on a commercially available software/hardware platform has resulted in a system that is easy to assemble and upgrade. In addition, the graphical programming structure of LabVIEW should make it relatively easy for others to adapt G-clamp for new experimental applications.

  19. Wavelet-based reversible watermarking for authentication

    NASA Astrophysics Data System (ADS)

    Tian, Jun

    2002-04-01

    In the digital information age, digital content (audio, image, and video) can be easily copied, manipulated, and distributed. Copyright protection and content authentication of digital content has become an urgent problem to content owners and distributors. Digital watermarking has provided a valuable solution to this problem. Based on its application scenario, most digital watermarking methods can be divided into two categories: robust watermarking and fragile watermarking. As a special subset of fragile watermark, reversible watermark (which is also called lossless watermark, invertible watermark, erasable watermark) enables the recovery of the original, unwatermarked content after the watermarked content has been detected to be authentic. Such reversibility to get back unwatermarked content is highly desired in sensitive imagery, such as military data and medical data. In this paper we present a reversible watermarking method based on an integer wavelet transform. We look into the binary representation of each wavelet coefficient and embed an extra bit to expandable wavelet coefficient. The location map of all expanded coefficients will be coded by JBIG2 compression and these coefficient values will be losslessly compressed by arithmetic coding. Besides these two compressed bit streams, an SHA-256 hash of the original image will also be embedded for authentication purpose.

  20. Experimental demonstration of robust entanglement distribution over reciprocal noisy channels assisted by a counter-propagating classical reference light.

    PubMed

    Ikuta, Rikizo; Nozaki, Shota; Yamamoto, Takashi; Koashi, Masato; Imoto, Nobuyuki

    2017-07-06

    Embedding a quantum state in a decoherence-free subspace (DFS) formed by multiple photons is one of the promising methods for robust entanglement distribution of photonic states over collective noisy channels. In practice, however, such a scheme suffers from a low efficiency proportional to transmittance of the channel to the power of the number of photons forming the DFS. The use of a counter-propagating coherent pulse can improve the efficiency to scale linearly in the channel transmission, but it achieves only protection against phase noises. Recently, it was theoretically proposed [Phys. Rev. A 87, 052325(2013)] that the protection against bit-flip noises can also be achieved if the channel has a reciprocal property. Here we experimentally demonstrate the proposed scheme to distribute polarization-entangled photon pairs against a general collective noise including the bit flip noise and the phase noise. We observed an efficient sharing rate scaling while keeping a high quality of the distributed entangled state. Furthermore, we show that the method is applicable not only to the entanglement distribution but also to the transmission of arbitrary polarization states of a single photon.

  1. A Multiple-Window Video Embedding Transcoder Based on H.264/AVC Standard

    NASA Astrophysics Data System (ADS)

    Li, Chih-Hung; Wang, Chung-Neng; Chiang, Tihao

    2007-12-01

    This paper proposes a low-complexity multiple-window video embedding transcoder (MW-VET) based on H.264/AVC standard for various applications that require video embedding services including picture-in-picture (PIP), multichannel mosaic, screen-split, pay-per-view, channel browsing, commercials and logo insertion, and other visual information embedding services. The MW-VET embeds multiple foreground pictures at macroblock-aligned positions. It improves the transcoding speed with three block level adaptive techniques including slice group based transcoding (SGT), reduced frame memory transcoder (RFMT), and syntax level bypassing (SLB). The SGT utilizes prediction from the slice-aligned data partitions in the original bitstreams such that the transcoder simply merges the bitstreams by parsing. When the prediction comes from the newly covered area without slice-group data partitions, the pixels at the affected macroblocks are transcoded with the RFMT based on the concept of partial reencoding to minimize the number of refined blocks. The RFMT employs motion vector remapping (MVR) and intra mode switching (IMS) to handle intercoded blocks and intracoded blocks, respectively. The pixels outside the macroblocks that are affected by newly covered reference frame are transcoded by the SLB. Experimental results show that, as compared to the cascaded pixel domain transcoder (CPDT) with the highest complexity, our MW-VET can significantly reduce the processing complexity by 25 times and retain the rate-distortion performance close to the CPDT. At certain bit rates, the MW-VET can achieve up to 1.5 dB quality improvement in peak signal-to-noise-ratio (PSNR).

  2. Cosmic strings and superconducting cosmic strings

    NASA Technical Reports Server (NTRS)

    Copeland, Edmund

    1988-01-01

    The possible consequences of forming cosmic strings and superconducting cosmic strings in the early universe are discussed. Lecture 1 describes the group theoretic reasons for and the field theoretic reasons why cosmic strings can form in spontaneously broken gauge theories. Lecture 2 discusses the accretion of matter onto string loops, emphasizing the scenario with a cold dark matter dominated universe. In lecture 3 superconducting cosmic strings are discussed, as is a mechanism which leads to the formation of structure from such strings.

  3. Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures.

    PubMed

    Wang, Maocai; Dai, Guangming; Choo, Kim-Kwang Raymond; Jayaraman, Prem Prakash; Ranjan, Rajiv

    2016-01-01

    Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user's public key based on the user's identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al.

  4. Linguistic steganography on Twitter: hierarchical language modeling with manual interaction

    NASA Astrophysics Data System (ADS)

    Wilson, Alex; Blunsom, Phil; Ker, Andrew D.

    2014-02-01

    This work proposes a natural language stegosystem for Twitter, modifying tweets as they are written to hide 4 bits of payload per tweet, which is a greater payload than previous systems have achieved. The system, CoverTweet, includes novel components, as well as some already developed in the literature. We believe that the task of transforming covers during embedding is equivalent to unilingual machine translation (paraphrasing), and we use this equivalence to de ne a distortion measure based on statistical machine translation methods. The system incorporates this measure of distortion to rank possible tweet paraphrases, using a hierarchical language model; we use human interaction as a second distortion measure to pick the best. The hierarchical language model is designed to model the speci c language of the covers, which in this setting is the language of the Twitter user who is embedding. This is a change from previous work, where general-purpose language models have been used. We evaluate our system by testing the output against human judges, and show that humans are unable to distinguish stego tweets from cover tweets any better than random guessing.

  5. Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures

    PubMed Central

    Dai, Guangming

    2016-01-01

    Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user’s public key based on the user’s identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al. PMID:27564373

  6. From decay to complete breaking: pulling the strings in SU(2) Yang-Mills theory.

    PubMed

    Pepe, M; Wiese, U-J

    2009-05-15

    We study {2Q+1} strings connecting two static charges Q in (2+1)D SU(2) Yang-Mills theory. While the fundamental {2} string between two charges Q=1/2 is unbreakable, the adjoint {3} string connecting two charges Q=1 can break. When a {4} string is stretched beyond a critical length, it decays into a {2} string by gluon pair creation. When a {5} string is stretched, it first decays into a {3} string, which eventually breaks completely. The energy of the screened charges at the ends of a string is well described by a phenomenological constituent gluon model.

  7. Subterranean barriers, methods, and apparatuses for forming, inspecting, selectively heating, and repairing same

    DOEpatents

    Nickelson, Reva A.; Sloan, Paul A.; Richardson, John G.; Walsh, Stephanie; Kostelnik, Kevin M.

    2009-04-07

    A subterranean barrier and method for forming same are disclosed, the barrier including a plurality of casing strings wherein at least one casing string of the plurality of casing strings may be affixed to at least another adjacent casing string of the plurality of casing strings through at least one weld, at least one adhesive joint, or both. A method and system for nondestructively inspecting a subterranean barrier is disclosed. For instance, a radiographic signal may be emitted from within a casing string toward an adjacent casing string and the radiographic signal may be detected from within the adjacent casing string. A method of repairing a barrier including removing at least a portion of a casing string and welding a repair element within the casing string is disclosed. A method of selectively heating at least one casing string forming at least a portion of a subterranean barrier is disclosed.

  8. Codestream-Based Identification of JPEG 2000 Images with Different Coding Parameters

    NASA Astrophysics Data System (ADS)

    Watanabe, Osamu; Fukuhara, Takahiro; Kiya, Hitoshi

    A method of identifying JPEG 2000 images with different coding parameters, such as code-block sizes, quantization-step sizes, and resolution levels, is presented. It does not produce false-negative matches regardless of different coding parameters (compression rate, code-block size, and discrete wavelet transform (DWT) resolutions levels) or quantization step sizes. This feature is not provided by conventional methods. Moreover, the proposed approach is fast because it uses the number of zero-bit-planes that can be extracted from the JPEG 2000 codestream by only parsing the header information without embedded block coding with optimized truncation (EBCOT) decoding. The experimental results revealed the effectiveness of image identification based on the new method.

  9. Informing New String Programmes: Lessons Learned from an Australian Experience

    ERIC Educational Resources Information Center

    Murphy, Fintan; Rickard, Nikki; Gill, Anneliese; Grimmett, Helen

    2011-01-01

    Although there are many examples of notable string programmes there has been relatively little comparative analysis of these programmes. This paper examines three benchmark string programmes (The University of Illinois String Project, The Tower Hamlets String Teaching Project and Colourstrings) alongside Music4All, an innovative string programme…

  10. [ital N]-string vertices in string field theory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bordes, J.; Abdurrahman, A.; Anton, F.

    1994-03-15

    We give the general form of the vertex corresponding to the interaction of an arbitrary number of strings. The technique employed relies on the comma'' representation of string field theory where string fields and interactions are represented as matrices and operations between them such as multiplication and trace. The general formulation presented here shows that the interaction vertex of [ital N] strings, for any arbitrary [ital N], is given as a function of particular combinations of matrices corresponding to the change of representation between the full string and the half string degrees of freedom.

  11. The Birth of String Theory

    NASA Astrophysics Data System (ADS)

    Cappelli, Andrea; Castellani, Elena; Colomo, Filippo; Di Vecchia, Paolo

    2012-04-01

    Part I. Overview: 1. Introduction and synopsis; 2. Rise and fall of the hadronic string G. Veneziano; 3. Gravity, unification, and the superstring J. H. Schwarz; 4. Early string theory as a challenging case study for philosophers E. Castellani; Part II. The Prehistory: The Analytic S-Matrix: 5. Introduction to Part II; 6. Particle theory in the sixties: from current algebra to the Veneziano amplitude M. Ademollo; 7. The path to the Veneziano model H. R. Rubinstein; 8. Two-component duality and strings P. G. O. Freund; 9. Note on the prehistory of string theory M. Gell-Mann; Part III. The Dual Resonance Model: 10. Introduction to Part III; 11. From the S-matrix to string theory P. Di Vecchia; 12. Reminiscence on the birth of string theory J. A. Shapiro; 13. Personal recollections D. Amati; 14. Early string theory at Fermilab and Rutgers L. Clavelli; 15. Dual amplitudes in higher dimensions: a personal view C. Lovelace; 16. Personal recollections on dual models R. Musto; 17. Remembering the 'supergroup' collaboration F. Nicodemi; 18. The '3-Reggeon vertex' S. Sciuto; Part IV. The String: 19. Introduction to Part IV; 20. From dual models to relativistic strings P. Goddard; 21. The first string theory: personal recollections L. Susskind; 22. The string picture of the Veneziano model H. B. Nielsen; 23. From the S-matrix to string theory Y. Nambu; 24. The analogue model for string amplitudes D. B. Fairlie; 25. Factorization in dual models and functional integration in string theory S. Mandelstam; 26. The hadronic origins of string theory R. C. Brower; Part V. Beyond the Bosonic String: 27. Introduction to Part V; 28. From dual fermion to superstring D. I. Olive; 29. Dual models with fermions: memoirs of an early string theorist P. Ramond; 30. Personal recollections A. Neveu; 31. Aspects of fermionic dual models E. Corrigan; 32. The dual quark models K. Bardakci and M. B. Halpern; 33. Remembering the dawn of relativistic strings J.-L. Gervais; 34. Early string theory in Cambridge: personal recollections C. Montonen; Part VI. The Superstring: 35. Introduction to Part VI; 36. Supersymmetry in string theory F. Gliozzi; 37. Gravity from strings: personal reminiscences of early developments T. Yoneya; 38. From the Nambu-Goto to the σ-model action L. Brink; 39. Locally supersymmetric action for superstring P. Di Vecchia; 40. Personal recollections E. Cremmer; 41. The scientific contributions of Joël Scherk J. H. Schwarz; Part VII. Preparing the String Renaissance: 42. Introduction to Part VII; 43. From strings to superstrings: a personal perspective M. B. Green; 44. Quarks, strings and beyond A. M. Polyakov; 45. The rise of the superstring theory A. Cappelli and F. Colomo; Appendices; Index.

  12. String resistance detector

    NASA Technical Reports Server (NTRS)

    Hall, A. Daniel (Inventor); Davies, Francis J. (Inventor)

    2007-01-01

    Method and system are disclosed for determining individual string resistance in a network of strings when the current through a parallel connected string is unknown and when the voltage across a series connected string is unknown. The method/system of the invention involves connecting one or more frequency-varying impedance components with known electrical characteristics to each string and applying a frequency-varying input signal to the network of strings. The frequency-varying impedance components may be one or more capacitors, inductors, or both, and are selected so that each string is uniquely identifiable in the output signal resulting from the frequency-varying input signal. Numerical methods, such as non-linear regression, may then be used to resolve the resistance associated with each string.

  13. String mediated phase transitions

    NASA Technical Reports Server (NTRS)

    Copeland, ED; Haws, D.; Rivers, R.; Holbraad, S.

    1988-01-01

    It is demonstrated from first principles how the existence of string-like structures can cause a system to undergo a phase transition. In particular, the role of topologically stable cosmic string in the restoration of spontaneously broken symmetries is emphasized. How the thermodynamic properties of strings alter when stiffness and nearest neighbor string-string interactions are included is discussed.

  14. Black string in dRGT massive gravity

    NASA Astrophysics Data System (ADS)

    Tannukij, Lunchakorn; Wongjun, Pitayuth; Ghosh, Suchant G.

    2017-12-01

    We present a cylindrically symmetric solution, both charged and uncharged, which is known as a black string solution to the nonlinear ghost-free massive gravity found by de Rham, Gabadadze, and Tolley (dRGT). This "dRGT black string" can be thought of as a generalization of the black string solution found by Lemos. Moreover, the dRGT black string solution includes other classes of black string solution such as the monopole-black string ones since the graviton mass contributes to the global monopole term as well as the cosmological-constant term. To investigate the solution, we compute mass, temperature, and entropy of the dRGT black string. We found that the existence of the graviton mass drastically affects the thermodynamics of the black string. Furthermore, the Hawking-Page phase transition is found to be possible for the dRGT black string as well as the charged dRGT black string. The dRGT black string solution is thermodynamically stable for r>r_c with negative thermodynamical potential and positive heat capacity while it is unstable for r

  15. Applying the seismic interferometry method to vertical seismic profile data using tunnel excavation noise as source

    NASA Astrophysics Data System (ADS)

    Jurado, Maria Jose; Teixido, Teresa; Martin, Elena; Segarra, Miguel; Segura, Carlos

    2013-04-01

    In the frame of the research conducted to develop efficient strategies for investigation of rock properties and fluids ahead of tunnel excavations the seismic interferometry method was applied to analyze the data acquired in boreholes instrumented with geophone strings. The results obtained confirmed that seismic interferometry provided an improved resolution of petrophysical properties to identify heterogeneities and geological structures ahead of the excavation. These features are beyond the resolution of other conventional geophysical methods but can be the cause severe problems in the excavation of tunnels. Geophone strings were used to record different types of seismic noise generated at the tunnel head during excavation with a tunnelling machine and also during the placement of the rings covering the tunnel excavation. In this study we show how tunnel construction activities have been characterized as source of seismic signal and used in our research as the seismic source signal for generating a 3D reflection seismic survey. The data was recorded in vertical water filled borehole with a borehole seismic string at a distance of 60 m from the tunnel trace. A reference pilot signal was obtained from seismograms acquired close the tunnel face excavation in order to obtain best signal-to-noise ratio to be used in the interferometry processing (Poletto et al., 2010). The seismic interferometry method (Claerbout 1968) was successfully applied to image the subsurface geological structure using the seismic wave field generated by tunneling (tunnelling machine and construction activities) recorded with geophone strings. This technique was applied simulating virtual shot records related to the number of receivers in the borehole with the seismic transmitted events, and processing the data as a reflection seismic survey. The pseudo reflective wave field was obtained by cross-correlation of the transmitted wave data. We applied the relationship between the transmission response and the reflection response for a 1D multilayer structure, and next 3D approach (Wapenaar 2004). As a result of this seismic interferometry experiment the 3D reflectivity model (frequencies and resolution ranges) was obtained. We proved also that the seismic interferometry approach can be applied in asynchronous seismic auscultation. The reflections detected in the virtual seismic sections are in agreement with the geological features encountered during the excavation of the tunnel and also with the petrophysical properties and parameters measured in previous geophysical borehole logging. References Claerbout J.F., 1968. Synthesis of a layered medium from its acoustic transmision response. Geophysics, 33, 264-269 Flavio Poletto, Piero Corubolo and Paolo Comeli.2010. Drill-bit seismic interferometry whith and whitout pilot signals. Geophysical Prospecting, 2010, 58, 257-265. Wapenaar, K., J. Thorbecke, and D. Draganov, 2004, Relations between reflection and transmission responses of three-dimensional inhomogeneous media: Geophysical Journal International, 156, 179-194.

  16. The "Magic" String

    ERIC Educational Resources Information Center

    Hoover, Todd F.

    2010-01-01

    The "Magic" String is a discrepant event that includes a canister with what appears to be the end of two strings protruding from opposite sides of it. Due to the way the strings are attached inside the canister, it appears as if the strings can magically switch the way they are connected. When one string end is pulled, the observer's expectation…

  17. Automatic generation and analysis of solar cell IV curves

    DOEpatents

    Kraft, Steven M.; Jones, Jason C.

    2014-06-03

    A photovoltaic system includes multiple strings of solar panels and a device presenting a DC load to the strings of solar panels. Output currents of the strings of solar panels may be sensed and provided to a computer that generates current-voltage (IV) curves of the strings of solar panels. Output voltages of the string of solar panels may be sensed at the string or at the device presenting the DC load. The DC load may be varied. Output currents of the strings of solar panels responsive to the variation of the DC load are sensed to generate IV curves of the strings of solar panels. IV curves may be compared and analyzed to evaluate performance of and detect problems with a string of solar panels.

  18. High Energy Theory Workshops and Visitors at the Michigan Center for Theoretical Physics FY15

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pierce, Aaron T.

    The String theory workshop was held from March 4-7, 2015 on the University of Michigan campus. Local organizers were Gordon Kane and Aaron Pierce. Piyush Kumar (Yale), Jim Halverson (KITP), Bobby Acharya (ICTP) and Sven Krippendorf (Oxford) served as external organizers.The meeting focused on the status of work to project 10 or 11 dimensional string/M theories onto our 4 spacetime dimensions (compactification). The workshop had 31 participants, half from outside the U.S. Participants were encouraged to focus on predictions for recent and forthcoming data, particularly for Higgs physics and LHC and dark matter, rather than on the traditional approach ofmore » embedding the Standard Model particles and forces. The Higgs boson sympoosium was locally organized by James Wells (chair), Aaron Pierce and Jianming Qian. Additional input in the early stages by Stefan Pokorski (Warsaw) who was unable to attend in the end. The workshop consistent of 22 talks from experts around the world, both theoretical and experimental. Experimentalists summarized the current state of knowledge of the Higgs boson and its varients. The theory talks ranged from technical calculations of Standard Model processes to speculative novel ideas. The YHET visitor program invited weekly young visitors to the University of Michigan campus to present their work. This year 24 participants came under the program, with 17 of them receiving at least partial support for their visits.« less

  19. Wireline Deep Drill for the Exploration of Icy Bodies

    NASA Technical Reports Server (NTRS)

    Paulsen, G.; Zacny, K.; Mellerowicz, B.; Craft, J.; Bar-Cohen, Y.; Beegle, L.; Sherrit, S.; Badescu, M.; Corsetti, F.; Ibarra, Y.

    2013-01-01

    One of the most pressing current questions in space science is whether life has ever arisen anywhere else in the universe. Water is a critical prerequisite for all life-as-we-know-it, thus the possible exploration targets for extraterrestrial life are bodies that have or had copious liquid: Mars, Europa, and Enceladus. Due to the oxidizing nature of Mars' surface, as well as subsurface liquid water reservoirs present on Europa and Enceladus, the search for evidence of existing life must likely focus on subsurface locations, at depths sufficient to support liquid water or retain biologic signatures. To address these questions, an Auto-Gopher sampler has been developed that is a wireline type drill. This drill is suspended on a tether and its motors and mechanisms are built into a tube that ends with a coring bit. The tether provides the mechanical connection to a rover/lander on a surface as well as power and data communication. Upon penetrating to a target depth, the drill is retracted from the borehole, the core is deposited into a sample transfer system, and the drill is lowered back into the hole. Wireline operation sidesteps one of the major drawbacks of traditional continuous drill string systems by obviating the need for multiple drill sections, which add significantly to the mass and the complexity of the system (i.e. penetration rate was 40 cm per hour). Drilling to 2 meter depth and recovering of cores every 10 cm took a total time of 15 hours (a single step of drilling 10 cm and retrieving the core was 45 minutes). Total energy to reach the 2 m depth was 500 Whr. The Weight on Bit was limited to less than 70 Newton. The core recovery was 100%.

  20. Hierarchies in Quantum Gravity: Large Numbers, Small Numbers, and Axions

    NASA Astrophysics Data System (ADS)

    Stout, John Eldon

    Our knowledge of the physical world is mediated by relatively simple, effective descriptions of complex processes. By their very nature, these effective theories obscure any phenomena outside their finite range of validity, discarding information crucial to understanding the full, quantum gravitational theory. However, we may gain enormous insight into the full theory by understanding how effective theories with extreme characteristics--for example, those which realize large-field inflation or have disparate hierarchies of scales--can be naturally realized in consistent theories of quantum gravity. The work in this dissertation focuses on understanding the quantum gravitational constraints on these "extreme" theories in well-controlled corners of string theory. Axion monodromy provides one mechanism for realizing large-field inflation in quantum gravity. These models spontaneously break an axion's discrete shift symmetry and, assuming that the corrections induced by this breaking remain small throughout the excursion, create a long, quasi-flat direction in field space. This weakly-broken shift symmetry has been used to construct a dynamical solution to the Higgs hierarchy problem, dubbed the "relaxion." We study this relaxion mechanism and show that--without major modifications--it can not be naturally embedded within string theory. In particular, we find corrections to the relaxion potential--due to the ten-dimensional backreaction of monodromy charge--that conflict with naive notions of technical naturalness and render the mechanism ineffective. The super-Planckian field displacements necessary for large-field inflation may also be realized via the collective motion of many aligned axions. However, it is not clear that string theory provides the structures necessary for this to occur. We search for these structures by explicitly constructing the leading order potential for C4 axions and computing the maximum possible field displacement in all compactifications of type IIB string theory on toric Calabi-Yau hypersurfaces with h1,1 ≤ 4 in the Kreuzer-Skarke database. While none of these examples can sustain a super-Planckian displacement--the largest possible is 0.3 Mpl--we find an alignment mechanism responsible for large displacements in random matrix models at large h 1,1 >> 1, indicating that large-field inflation may be feasible in compactifications with tens or hundreds of axions. These results represent a modest step toward a complete understanding of large hierarchies and naturalness in quantum gravity.

  1. Charged string loops in Reissner-Nordström black hole background

    NASA Astrophysics Data System (ADS)

    Oteev, Tursinbay; Kološ, Martin; Stuchlík, Zdeněk

    2018-03-01

    We study the motion of current carrying charged string loops in the Reissner-Nordström black hole background combining the gravitational and electromagnetic field. Introducing new electromagnetic interaction between central charge and charged string loop makes the string loop equations of motion to be non-integrable even in the flat spacetime limit, but it can be governed by an effective potential even in the black hole background. We classify different types of the string loop trajectories using effective potential approach, and we compare the innermost stable string loop positions with loci of the charged particle innermost stable orbits. We examine string loop small oscillations around minima of the string loop effective potential, and we plot radial profiles of the string loop oscillation frequencies for both the radial and vertical modes. We construct charged string loop quasi-periodic oscillations model and we compare it with observed data from microquasars GRO 1655-40, XTE 1550-564, and GRS 1915+105. We also study the acceleration of current carrying string loops along the vertical axis and the string loop ejection from RN black hole neighbourhood, taking also into account the electromagnetic interaction.

  2. Asymmetric thin-shell wormholes

    NASA Astrophysics Data System (ADS)

    Forghani, S. Danial; Mazharimousavi, S. Habib; Halilsoy, Mustafa

    2018-06-01

    Spacetime wormholes in isotropic spacetimes are represented traditionally by embedding diagrams which were symmetric paraboloids. This mirror symmetry, however, can be broken by considering different sources on different sides of the throat. This gives rise to an asymmetric thin-shell wormhole, whose stability is studied here in the framework of the linear stability analysis. Having constructed a general formulation, using a variable equation of state and related junction conditions, the results are tested for some examples of diverse geometries such as the cosmic string, Schwarzschild, Reissner-Nordström and Minkowski spacetimes. Based on our chosen spacetimes as examples, our finding suggests that symmetry is an important factor to make a wormhole more stable. Furthermore, the parameter γ , which corresponds to the radius dependency of the pressure on the wormholes's throat, can affect the stability in a great extent.

  3. Logarithmic corrections to black hole entropy: the non-BPS branch

    NASA Astrophysics Data System (ADS)

    Castro, Alejandra; Godet, Victor; Larsen, Finn; Zeng, Yangwenxiao

    2018-05-01

    We compute the leading logarithmic correction to black hole entropy on the non-BPS branch of 4D N≥2 supergravity theories. This branch corresponds to finite temperature black holes whose extremal limit does not preserve supersymmetry, such as the D0 - D6 system in string theory. Starting from a black hole in minimal Kaluza-Klein theory, we discuss in detail its embedding into N=8 , 6, 4, 2 supergravity, its spectrum of quadratic fluctuations in all these environments, and the resulting quantum corrections. We find that the c-anomaly vanishes only when N≥6 , in contrast to the BPS branch where c vanishes for all N≥2 . We briefly discuss potential repercussions this feature could have in a microscopic description of these black holes.

  4. Natural-color and color-infrared image mosaics of the Colorado River corridor in Arizona derived from the May 2009 airborne image collection

    USGS Publications Warehouse

    Davis, Philip A.

    2013-01-01

    The Grand Canyon Monitoring and Research Center (GCMRC) of the U.S. Geological Survey (USGS) periodically collects airborne image data for the Colorado River corridor within Arizona (fig. 1) to allow scientists to study the impacts of Glen Canyon Dam water release on the corridor’s natural and cultural resources. These data are collected from just above Glen Canyon Dam (in Lake Powell) down to the entrance of Lake Mead, for a total distance of 450 kilometers (km) and within a 500-meter (m) swath centered on the river’s mainstem and its seven main tributaries (fig. 1). The most recent airborne data collection in 2009 acquired image data in four wavelength bands (blue, green, red, and near infrared) at a spatial resolution of 20 centimeters (cm). The image collection used the latest model of the Leica ADS40 airborne digital sensor (the SH52), which uses a single optic for all four bands and collects and stores band radiance in 12-bits. Davis (2012) reported on the performance of the SH52 sensor and on the processing steps required to produce the nearly flawless four-band image mosaic (sectioned into map tiles) for the river corridor. The final image mosaic has a total of only 3 km of surface defects in addition to some areas of cloud shadow because of persistent inclement weather during data collection. The 2009 four-band image mosaic is perhaps the best image dataset that exists for the entire Arizona part of the Colorado River. Some analyses of these image mosaics do not require the full 12-bit dynamic range or all four bands of the calibrated image database, in which atmospheric scattering (or haze) had not been removed from the four bands. To provide scientists and the general public with image products that are more useful for visual interpretation, the 12-bit image data were converted to 8-bit natural-color and color-infrared images, which also removed atmospheric scattering within each wavelength-band image. The conversion required an evaluation of the histograms of each band’s digital-number population within each map tile throughout the corridor and the determination of the digital numbers corresponding to the lower and upper one percent of the picture-element population within each map tile. Visual examination of the image tiles that were given a 1-percent stretch (whereby the lower 1- percent 12-bit digital number is assigned an 8-bit value of zero and the upper 1-percent 12-bit digital number is assigned an 8-bit value of 255) indicated that this stretch sufficiently removed atmospheric scattering, which provided improved image clarity and true natural colors for all surface materials. The lower and upper 1-percent, 12-bit digital numbers for each wavelength-band image in the image tiles exhibit erratic variations along the river corridor; the variations exhibited similar trends in both the lower and upper 1-percent digital numbers for all four wavelength-band images (figs. 2–5). The erratic variations are attributed to (1) daily variations in atmospheric water-vapor content due to monsoonal storms, (2) variations in channel water color due to variable sediment input from tributaries, and (3) variations in the amount of topographic shadows within each image tile, in which reflectance is dominated by atmospheric scattering. To make the surface colors of the stretched, 8-bit images consistent among adjacent image tiles, it was necessary to average both the lower and upper 1-percent digital values for each wavelength-band image over 20 river miles to subdue the erratic variations. The average lower and upper 1-percent digital numbers for each image tile (figs. 2–5) were used to convert the 12-bit image values to 8-bit values and the resulting 8-bit four-band images were stored as natural-color (red, green, and blue wavelength bands) and color-infrared (near-infrared, red, and green wavelength bands) images in embedded geotiff format, which can be read and used by most geographic information system (GIS) and image-processing software. The tiff world files (tfw) are provided, even though they are generally not needed for most software to read an embedded geotiff image. All image data are projected in the State Plane (SP) map projection using the central Arizona zone (202) and the North American Datum of 1983 (NAD83). The map-tile scheme used to segment the corridor image mosaic followed the standard USGS quarter-quadrangle (QQ) map borders, but the high resolution (20 cm) of the images required further quarter segmentation (QQQ) of the standard QQ tiles, where the image mosaic covered a large fraction of a QQ map tile (segmentation shown in (figure 6), where QQ_1 to QQ_4 shows the number convention used to designate a quarter of a QQ tile). To minimize the size of each image tile, each image or map tile was subset to only include that part of the tile that had image data. In addition, some QQQ image tiles within a QQ tile were combined when adjacent QQQ map tiles were small. Thus, some image tiles consist of combinations of QQQ map tiles, some consist of an entire QQ map tile, and some consist of two adjoining QQ map tiles. The final image tiles number 143, which is a large number of files to list on the Internet for both the natural-color and color-infrared images. Thus, the image tiles were placed in seven file folders based on the one-half-degree geographic boundaries within the study area (fig. 7). The map tiles in each file folder were compressed to minimize folder size for more efficient downloading. The file folders are sequentially referred to as zone 1 through zone 7, proceeding down river (fig. 7). The QQ designations of the image tiles contained within each folder or zone are shown on the index map for each respective zone (figs. 8–14).

  5. Effect of Notched Strings on Tennis Racket Spin Performance: Ultrahigh-Speed Video Analysis of Spin Rate, Contact Time, and Post-Impact Ball Velocity

    NASA Astrophysics Data System (ADS)

    Kawazoe, Yoshihiko; Takeda, Yukihiro; Nakagawa, Masamichi

    While some tennis racket strings have more grip than others do, this does not guarantee that they will impart more spin to a tennis ball. Experiments with hand-held rackets are required to determine the longstanding question of how players can discern that different strings behave differently when laboratory tests indicate that they should play the same. In a previous study, we clarified the top-spin mechanism of a tennis racket by using high-speed video analysis on a tennis court for the first time. Furthermore, we improved it by using lubricated notched nylon strings. These experiments revealed that the more the main strings stretch and bend laterally, the more spin is imparted to the ball. This is due to the restoring force being parallel to the string face when the main strings spring back and the ball is released from the strings. Notched strings reduce the spin rate, but this can be effectively counteracted by employing lubricants. Furthermore, we found that imparting more spin reduces shock vibrations on the wrist during impact. The present study revealed that a ball has a 40% lower spin rate when hit with a racket with notched strings than with one with unnotched strings in the case of nylon (it had to be determined whether new strings or lubricated used strings give more spin). The experiments also showed that 30% more spin is imparted to a ball when the string intersections are lubricated by oil than when notched used nylon strings are used. Furthermore, we found that used natural gut notched strings reduced the spin rate by 70% compared to when new natural gut unnotched strings are used. We also investigated different top-spin behaviors obtained when professional and amateur tennis players hit a ball.

  6. Syntactic transfer in artificial grammar learning.

    PubMed

    Beesley, T; Wills, A J; Le Pelley, M E

    2010-02-01

    In an artificial grammar learning (AGL) experiment, participants were trained with instances of one grammatical structure before completing a test phase in which they were required to discriminate grammatical from randomly created strings. Importantly, the underlying structure used to generate test strings was different from that used to generate the training strings. Despite the fact that grammatical training strings were more similar to nongrammatical test strings than they were to grammatical test strings, this manipulation resulted in a positive transfer effect, as compared with controls trained with nongrammatical strings. It is suggested that training with grammatical strings leads to an appreciation of set variance that aids the detection of grammatical test strings in AGL tasks. The analysis presented demonstrates that it is useful to conceptualize test performance in AGL as a form of unsupervised category learning.

  7. An Ada/SQL (Structured Query Language) Application Scanner.

    DTIC Science & Technology

    1988-03-01

    Digital ...8217 (" DIGITS "), 46 new STRING’ ("DO"), new STRING’ ("ELSE"), new STRING’ ("ELSIF"), new STRING’ ("END"), new STRING’ ("ENTRY"), new STRING’ ("EXCEPTION...INTEGERPRINT; generic type NUM is digits <>; package FLOATPRINT is package txtprts.ada 18 prcdr PR (FL inFL %YE LINE n LINTYPE UNCLASSIFIED procedure

  8. Pitch glide effect induced by a nonlinear string-barrier interaction

    NASA Astrophysics Data System (ADS)

    Kartofelev, Dmitri; Stulov, Anatoli; Välimäki, Vesa

    2015-10-01

    Interactions of a vibrating string with its supports and other spatially distributed barriers play a significant role in the physics of many stringed musical instruments. It is well known that the tone of the string vibrations is determined by the string supports, and that the boundary conditions of the string termination may cause a short-lasting initial fundamental frequency shifting. Generally, this phenomenon is associated with the nonlinear modulation of the stiff string tension. The aim of this paper is to study the initial frequency glide phenomenon that is induced only by the string-barrier interaction, apart from other possible physical causes, and without the interfering effects of dissipation and dispersion. From a numerical simulation perspective, this highly nonlinear problem may present various difficulties, not the least of which is the risk of numerical instability. We propose a numerically stable and a purely kinematic model of the string-barrier interaction, which is based on the travelling wave solution of the ideal string vibration. The model is capable of reproducing the motion of the vibrating string exhibiting the initial fundamental frequency glide, which is caused solely by the complex nonlinear interaction of the string with its termination. The results presented in this paper can expand our knowledge and understanding of the timbre evolution and the physical principles of sound generation of numerous stringed instruments, such as lutes called the tambura, sitar and biwa.

  9. Constraint Reasoning Over Strings

    NASA Technical Reports Server (NTRS)

    Koga, Dennis (Technical Monitor); Golden, Keith; Pang, Wanlin

    2003-01-01

    This paper discusses an approach to representing and reasoning about constraints over strings. We discuss how many string domains can often be concisely represented using regular languages, and how constraints over strings, and domain operations on sets of strings, can be carried out using this representation.

  10. The physics of unwound and wound strings on the electric guitar applied to the pitch intervals produced by tremolo/vibrato arm systems.

    PubMed

    Kemp, Jonathan A

    2017-01-01

    The physics of wound and unwound strings on the electric guitar are presented here, and the pitch intervals produced by the movements of a Fender Stratocaster tremolo unit are explained. Predicted changes in pitch sensitivity of different strings are given, and experimentally verified, for changes in saddle height, the distance of string free to move behind the nut and ratio of diameters/masses of the core and windings of wound strings. Also, it is shown that changes to the gauge of strings (assuming the string tension is sufficient for linear behaviour and in absence of changes to other construction details) don't alter the pitch intervals produced by a given angle of tremolo arm use assuming the instrument is set up with the same sounding pitches and starting bridge angle. It is demonstrated that it not possible to equalise the relative sensitivity of unwound steel stings on a Fender Stratocaster type tremolo unit through string construction techniques. The ratio of core to winding mass in the string, on the other hand, was found to be a very powerful design parameter for choosing the sensitivity of the string to tremolo arm use and standard pitch bends. For instance, the pitch intervals produced by operation of tremolo arm for wound strings may be made to approximately match that for one of the unwound strings if they share very similar core gauges (assuming the winding masses are chosen to give approximately the same tension at their sounding pitches). Such a design, only available currently by custom order, also delivers the optimum equalisation in sensitivity of strings for standard string bends (due to these also being produced by altering the length of the string to generate changes in tension and therefore pitch).

  11. Entanglement branes in a two-dimensional string theory

    DOE PAGES

    Donnelly, William; Wong, Gabriel

    2017-09-20

    What is the meaning of entanglement in a theory of extended objects such as strings? To address this question we consider the spatial entanglement between two intervals in the Gross-Taylor model, the string theory dual to two-dimensional Yang-Mills theory at large N. The string diagrams that contribute to the entanglement entropy describe open strings with endpoints anchored to the entangling surface, as first argued by Susskind. We develop a canonical theory of these open strings, and describe how closed strings are divided into open strings at the level of the Hilbert space. Here, we derive the modular Hamiltonian for themore » Hartle-Hawking state and show that the corresponding reduced density matrix describes a thermal ensemble of open strings ending on an object at the entangling surface that we call an entanglement brane, or E-brane.« less

  12. String-driven inflation

    NASA Technical Reports Server (NTRS)

    Turok, Neil

    1988-01-01

    It is argued that, in fundamental string theories, as one traces the universe back in time a point is reached when the expansion rate is so fast that the rate of string creation due to quantum effects balances the dilution of the string density due to the expansion. One is therefore led into a phase of constant string density and an exponentially expanding universe. Fundamental strings therefore seem to lead naturally to inflation.

  13. p-adic string theories provide lattice Discretization to the ordinary string worldsheet.

    PubMed

    Ghoshal, Debashis

    2006-10-13

    A class of models called p-adic strings is useful in understanding the tachyonic instability of string theory. These are found to be empirically related to the ordinary strings in the p-->1 limit. We propose that these models provide discretization for the string worldsheet and argue that the limit is naturally thought of as a continuum limit in the sense of the renormalization group.

  14. Self-organization in a system of binary strings with spatial interactions

    NASA Astrophysics Data System (ADS)

    Banzhaf, W.; Dittrich, P.; Eller, B.

    1999-01-01

    We consider an artificial reaction system whose components are binary strings. Upon encounter, two binary strings produce a third string which competes for storage space with the originators. String types or species can only survive when produced in sufficient numbers. Spatial interactions through introduction of a topology and rules for distance-dependent reactions are discussed. We observe various kinds of survival strategies of binary strings.

  15. p-adic String Theories Provide Lattice Discretization to the Ordinary String Worldsheet

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ghoshal, Debashis

    2006-10-13

    A class of models called p-adic strings is useful in understanding the tachyonic instability of string theory. These are found to be empirically related to the ordinary strings in the p{yields}1 limit. We propose that these models provide discretization for the string worldsheet and argue that the limit is naturally thought of as a continuum limit in the sense of the renormalization group.

  16. Progress report for a research program in theoretical high energy physics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Feldman, D.; Fried, H.M.; Jevicki, A.

    This year's research has dealt with: superstrings in the early universe; the invisible axion emissions from SN1987A; quartic interaction in Witten's superstring field theory; W-boson associated multiplicity and the dual parton model; cosmic strings and galaxy formation; cosmic strings and baryogenesis; quark flavor mixing; p -- /bar p/ scattering at TeV energies; random surfaces; ordered exponentials and differential equations; initial value and back-reaction problems in quantum field theory; string field theory and Weyl invariance; the renormalization group and string field theory; the evolution of scalar fields in an inflationary universe, with and without the effects of gravitational perturbations; cosmic stringmore » catalysis of skyrmion decay; inflation and cosmic strings from dynamical symmetry breaking; the physic of flavor mixing; string-inspired cosmology; strings at high-energy densities and complex temperatures; the problem of non-locality in string theory; string statistical mechanics; large-scale structures with cosmic strings and neutrinos; the delta expansion for stochastic quantization; high-energy neutrino flux from ordinary cosmic strings; a physical picture of loop bremsstrahlung; cylindrically-symmetric solutions of four-dimensional sigma models; large-scale structure with hot dark matter and cosmic strings; the unitarization of the odderon; string thermodynamics and conservation laws; the dependence of inflationary-universe models on initial conditions; the delta expansion and local gauge invariance; particle physics and galaxy formation; chaotic inflation with metric and matter perturbations; grand-unified theories, galaxy formation, and large-scale structure; neutrino clustering in cosmic-string-induced wakes; and infrared approximations to nonlinear differential equations. 17 refs.« less

  17. Development of a Piezoelectric Rotary Hammer Drill

    NASA Technical Reports Server (NTRS)

    Domm, Lukas N.

    2011-01-01

    The Piezoelectric Rotary Hammer Drill is designed to core through rock using a combination of rotation and high frequency hammering powered by a single piezoelectric actuator. It is designed as a low axial preload, low mass, and low power device for sample acquisition on future missions to extraterrestrial bodies. The purpose of this internship is to develop and test a prototype of the Piezoelectric Rotary Hammer Drill in order to verify the use of a horn with helical or angled cuts as a hammering and torque inducing mechanism. Through an iterative design process using models in ANSYS Finite Element software and a Mason's Equivalent Circuit model in MATLAB, a horn design was chosen for fabrication based on the predicted horn tip motion, electromechanical coupling, and neutral plane location. The design was then machined and a test bed assembled. The completed prototype has proven that a single piezoelectric actuator can be used to produce both rotation and hammering in a drill string through the use of a torque inducing horn. Final data results include bit rotation produced versus input power, and best drilling rate achieved with the prototype.

  18. Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing

    NASA Astrophysics Data System (ADS)

    Jin, Zhe; Jin Teoh, Andrew Beng; Ong, Thian Song; Tee, Connie

    Due to privacy concern on the widespread use of biometric authentication systems, biometric template protection has gained great attention in the biometric research recently. It is a challenging task to design a biometric template protection scheme which is anonymous, revocable and noninvertible while maintaining acceptable performance. Many methods have been proposed to resolve this problem, and cancelable biometrics is one of them. In this paper, we propose a scheme coined as Random Triangle Hashing which follows the concept of cancelable biometrics in the fingerprint domain. In this method, re-alignment of fingerprints is not required as all the minutiae are translated into a pre-defined 2 dimensional space based on a reference minutia. After that, the proposed Random Triangle hashing method is used to enforce the one-way property (non-invertibility) of the biometric template. The proposed method is resistant to minor translation error and rotation distortion. Finally, the hash vectors are converted into bit-strings to be stored in the database. The proposed method is evaluated using the public database FVC2004 DB1. An EER of less than 1% is achieved by using the proposed method.

  19. Predicting the performance of fingerprint similarity searching.

    PubMed

    Vogt, Martin; Bajorath, Jürgen

    2011-01-01

    Fingerprints are bit string representations of molecular structure that typically encode structural fragments, topological features, or pharmacophore patterns. Various fingerprint designs are utilized in virtual screening and their search performance essentially depends on three parameters: the nature of the fingerprint, the active compounds serving as reference molecules, and the composition of the screening database. It is of considerable interest and practical relevance to predict the performance of fingerprint similarity searching. A quantitative assessment of the potential that a fingerprint search might successfully retrieve active compounds, if available in the screening database, would substantially help to select the type of fingerprint most suitable for a given search problem. The method presented herein utilizes concepts from information theory to relate the fingerprint feature distributions of reference compounds to screening libraries. If these feature distributions do not sufficiently differ, active database compounds that are similar to reference molecules cannot be retrieved because they disappear in the "background." By quantifying the difference in feature distribution using the Kullback-Leibler divergence and relating the divergence to compound recovery rates obtained for different benchmark classes, fingerprint search performance can be quantitatively predicted.

  20. Some methods of encoding simple visual images for use with a sparse distributed memory, with applications to character recognition

    NASA Technical Reports Server (NTRS)

    Jaeckel, Louis A.

    1989-01-01

    To study the problems of encoding visual images for use with a Sparse Distributed Memory (SDM), I consider a specific class of images- those that consist of several pieces, each of which is a line segment or an arc of a circle. This class includes line drawings of characters such as letters of the alphabet. I give a method of representing a segment of an arc by five numbers in a continuous way; that is, similar arcs have similar representations. I also give methods for encoding these numbers as bit strings in an approximately continuous way. The set of possible segments and arcs may be viewed as a five-dimensional manifold M, whose structure is like a Mobious strip. An image, considered to be an unordered set of segments and arcs, is therefore represented by a set of points in M - one for each piece. I then discuss the problem of constructing a preprocessor to find the segments and arcs in these images, although a preprocessor has not been developed. I also describe a possible extension of the representation.

  1. An integrated system for multichannel neuronal recording with spike/LFP separation, integrated A/D conversion and threshold detection.

    PubMed

    Perelman, Yevgeny; Ginosar, Ran

    2007-01-01

    A mixed-signal front-end processor for multichannel neuronal recording is described. It receives 12 differential-input channels of implanted recording electrodes. A programmable cutoff High Pass Filter (HPF) blocks dc and low-frequency input drift at about 1 Hz. The signals are band-split at about 200 Hz to low-frequency Local Field Potential (LFP) and high-frequency spike data (SPK), which is band limited by a programmable-cutoff LPF, in a range of 8-13 kHz. Amplifier offsets are compensated by 5-bit calibration digital-to-analog converters (DACs). The SPK and LFP channels provide variable amplification rates of up to 5000 and 500, respectively. The analog signals are converted into 10-bit digital form, and streamed out over a serial digital bus at up to 8 Mbps. A threshold filter suppresses inactive portions of the signal and emits only spike segments of programmable length. A prototype has been fabricated on a 0.35-microm CMOS process and tested successfully, demonstrating a 3-microV noise level. Special interface system incorporating an embedded CPU core in a programmable logic device accompanied by real-time software has been developed to allow connectivity to a computer host.

  2. SEMICONDUCTOR INTEGRATED CIRCUITS: A high performance 90 nm CMOS SAR ADC with hybrid architecture

    NASA Astrophysics Data System (ADS)

    Xingyuan, Tong; Jianming, Chen; Zhangming, Zhu; Yintang, Yang

    2010-01-01

    A 10-bit 2.5 MS/s SAR A/D converter is presented. In the circuit design, an R-C hybrid architecture D/A converter, pseudo-differential comparison architecture and low power voltage level shifters are utilized. Design challenges and considerations are also discussed. In the layout design, each unit resistor is sided by dummies for good matching performance, and the capacitors are routed with a common-central symmetry method to reduce the nonlin-earity error. This proposed converter is implemented based on 90 nm CMOS logic process. With a 3.3 V analog supply and a 1.0 V digital supply, the differential and integral nonlinearity are measured to be less than 0.36 LSB and 0.69 LSB respectively. With an input frequency of 1.2 MHz at 2.5 MS/s sampling rate, the SFDR and ENOB are measured to be 72.86 dB and 9.43 bits respectively, and the power dissipation is measured to be 6.62 mW including the output drivers. This SAR A/D converter occupies an area of 238 × 214 μm2. The design results of this converter show that it is suitable for multi-supply embedded SoC applications.

  3. Error control techniques for satellite and space communications

    NASA Technical Reports Server (NTRS)

    Costello, Daniel J., Jr.

    1994-01-01

    The unequal error protection capabilities of convolutional and trellis codes are studied. In certain environments, a discrepancy in the amount of error protection placed on different information bits is desirable. Examples of environments which have data of varying importance are a number of speech coding algorithms, packet switched networks, multi-user systems, embedded coding systems, and high definition television. Encoders which provide more than one level of error protection to information bits are called unequal error protection (UEP) codes. In this work, the effective free distance vector, d, is defined as an alternative to the free distance as a primary performance parameter for UEP convolutional and trellis encoders. For a given (n, k), convolutional encoder, G, the effective free distance vector is defined as the k-dimensional vector d = (d(sub 0), d(sub 1), ..., d(sub k-1)), where d(sub j), the j(exp th) effective free distance, is the lowest Hamming weight among all code sequences that are generated by input sequences with at least one '1' in the j(exp th) position. It is shown that, although the free distance for a code is unique to the code and independent of the encoder realization, the effective distance vector is dependent on the encoder realization.

  4. Time-Shift Correlation Algorithm for P300 Event Related Potential Brain-Computer Interface Implementation

    PubMed Central

    Liu, Ju-Chi; Chou, Hung-Chyun; Chen, Chien-Hsiu; Lin, Yi-Tseng

    2016-01-01

    A high efficient time-shift correlation algorithm was proposed to deal with the peak time uncertainty of P300 evoked potential for a P300-based brain-computer interface (BCI). The time-shift correlation series data were collected as the input nodes of an artificial neural network (ANN), and the classification of four LED visual stimuli was selected as the output node. Two operating modes, including fast-recognition mode (FM) and accuracy-recognition mode (AM), were realized. The proposed BCI system was implemented on an embedded system for commanding an adult-size humanoid robot to evaluate the performance from investigating the ground truth trajectories of the humanoid robot. When the humanoid robot walked in a spacious area, the FM was used to control the robot with a higher information transfer rate (ITR). When the robot walked in a crowded area, the AM was used for high accuracy of recognition to reduce the risk of collision. The experimental results showed that, in 100 trials, the accuracy rate of FM was 87.8% and the average ITR was 52.73 bits/min. In addition, the accuracy rate was improved to 92% for the AM, and the average ITR decreased to 31.27 bits/min. due to strict recognition constraints. PMID:27579033

  5. Geometrically robust image watermarking by sector-shaped partitioning of geometric-invariant regions.

    PubMed

    Tian, Huawei; Zhao, Yao; Ni, Rongrong; Cao, Gang

    2009-11-23

    In a feature-based geometrically robust watermarking system, it is a challenging task to detect geometric-invariant regions (GIRs) which can survive a broad range of image processing operations. Instead of commonly used Harris detector or Mexican hat wavelet method, a more robust corner detector named multi-scale curvature product (MSCP) is adopted to extract salient features in this paper. Based on such features, disk-like GIRs are found, which consists of three steps. First, robust edge contours are extracted. Then, MSCP is utilized to detect the centers for GIRs. Third, the characteristic scale selection is performed to calculate the radius of each GIR. A novel sector-shaped partitioning method for the GIRs is designed, which can divide a GIR into several sector discs with the help of the most important corner (MIC). The watermark message is then embedded bit by bit in each sector by using Quantization Index Modulation (QIM). The GIRs and the divided sector discs are invariant to geometric transforms, so the watermarking method inherently has high robustness against geometric attacks. Experimental results show that the scheme has a better robustness against various image processing operations including common processing attacks, affine transforms, cropping, and random bending attack (RBA) than the previous approaches.

  6. Fracto-mechanoluminescent light emission of EuD4TEA-PDMS composites subjected to high strain-rate compressive loading

    NASA Astrophysics Data System (ADS)

    Ryu, Donghyeon; Castaño, Nicolas; Bhakta, Raj; Kimberley, Jamie

    2017-08-01

    The objective of this study is to understand light emission characteristics of fracto-mechanoluminescent (FML) europium tetrakis(dibenzoylmethide)-triethylammonium (EuD4TEA) crystals under high strain-rate compressive loading. As a sensing material that can play a pivotal role for the self-powered impact sensor technology, it is important to understand transformative light emission characteristics of the FML EuD4TEA crystals under high strain-rate compressive loading. First, EuD4TEA crystals were synthesized and embedded into polydimethylsiloxane (PDMS) elastomer to fabricate EuD4TEA-PDMS composite test specimens. Second, the prepared EuD4TEA-PDMS composites were tested using the modified Kolsky bar setup equipped with a high-speed camera. Third, FML light emission was captured to yield 12 bit grayscale video footage, which was processed to quantify the FML light emission. Finally, quantitative parameters were generated by taking into account pixel values and population of pixels of the 12 bit grayscale images to represent FML light intensity. The FML light intensity was correlated with high strain-rate compressive strain and strain rate to understand the FML light emission characteristics under high strain-rate compressive loading that can result from impact occurrences.

  7. Time-Shift Correlation Algorithm for P300 Event Related Potential Brain-Computer Interface Implementation.

    PubMed

    Liu, Ju-Chi; Chou, Hung-Chyun; Chen, Chien-Hsiu; Lin, Yi-Tseng; Kuo, Chung-Hsien

    2016-01-01

    A high efficient time-shift correlation algorithm was proposed to deal with the peak time uncertainty of P300 evoked potential for a P300-based brain-computer interface (BCI). The time-shift correlation series data were collected as the input nodes of an artificial neural network (ANN), and the classification of four LED visual stimuli was selected as the output node. Two operating modes, including fast-recognition mode (FM) and accuracy-recognition mode (AM), were realized. The proposed BCI system was implemented on an embedded system for commanding an adult-size humanoid robot to evaluate the performance from investigating the ground truth trajectories of the humanoid robot. When the humanoid robot walked in a spacious area, the FM was used to control the robot with a higher information transfer rate (ITR). When the robot walked in a crowded area, the AM was used for high accuracy of recognition to reduce the risk of collision. The experimental results showed that, in 100 trials, the accuracy rate of FM was 87.8% and the average ITR was 52.73 bits/min. In addition, the accuracy rate was improved to 92% for the AM, and the average ITR decreased to 31.27 bits/min. due to strict recognition constraints.

  8. A customizable system for real-time image processing using the Blackfin DSProcessor and the MicroC/OS-II real-time kernel

    NASA Astrophysics Data System (ADS)

    Coffey, Stephen; Connell, Joseph

    2005-06-01

    This paper presents a development platform for real-time image processing based on the ADSP-BF533 Blackfin processor and the MicroC/OS-II real-time operating system (RTOS). MicroC/OS-II is a completely portable, ROMable, pre-emptive, real-time kernel. The Blackfin Digital Signal Processors (DSPs), incorporating the Analog Devices/Intel Micro Signal Architecture (MSA), are a broad family of 16-bit fixed-point products with a dual Multiply Accumulate (MAC) core. In addition, they have a rich instruction set with variable instruction length and both DSP and MCU functionality thus making them ideal for media based applications. Using the MicroC/OS-II for task scheduling and management, the proposed system can capture and process raw RGB data from any standard 8-bit greyscale image sensor in soft real-time and then display the processed result using a simple PC graphical user interface (GUI). Additionally, the GUI allows configuration of the image capture rate and the system and core DSP clock rates thereby allowing connectivity to a selection of image sensors and memory devices. The GUI also allows selection from a set of image processing algorithms based in the embedded operating system.

  9. String Formatting Considered Harmful for Novice Programmers

    ERIC Educational Resources Information Center

    Hughes, Michael C.; Jadud, Matthew C.; Rodrigo, Ma. Mercedes T.

    2010-01-01

    In Java, "System.out.printf" and "String.format" consume a specialised kind of string commonly known as a format string. In our study of first-year students at the Ateneo de Manila University, we discovered that format strings present a substantial challenge for novice programmers. Focusing on their first laboratory we found…

  10. Charting the landscape of supercritical string theory.

    PubMed

    Hellerman, Simeon; Swanson, Ian

    2007-10-26

    Special solutions of string theory in supercritical dimensions can interpolate in time between theories with different numbers of spacetime dimensions and different amounts of world sheet supersymmetry. These solutions connect supercritical string theories to the more familiar string duality web in ten dimensions and provide a precise link between supersymmetric and purely bosonic string theories. Dimension quenching and c duality appear to be natural concepts in string theory, giving rise to large networks of interconnected theories.

  11. String solutions in spherically-symmetric f(R) gravity vacuum

    NASA Astrophysics Data System (ADS)

    Dil, Emre

    Dynamical evolution of the cosmic string in a spherically symmetric f(R) gravity vacuum is studied for a closed and straight string. We first set the background spacetime metric for a constant curvature scalar R = R0, and obtain the Killing fields for it. Using the standard gauge coordinates and constraints for both closed and straight strings, we present the equation of motions and find the solutions of them. We then analyze the dynamics of the string by studying the behavior of the string radius and periastron radius, with respect to both proper time and azimuthal angle, for various values of f(R) functions. Consequently, we conclude that the value of f(R) dramatically affects the closed string collapse time and the straight string angular deviation.

  12. Diffusion of massive particles around an Abelian-Higgs string

    NASA Astrophysics Data System (ADS)

    Saha, Abhisek; Sanyal, Soma

    2018-03-01

    We study the diffusion of massive particles in the space time of an Abelian Higgs string. The particles in the early universe plasma execute Brownian motion. This motion of the particles is modeled as a two dimensional random walk in the plane of the Abelian Higgs string. The particles move randomly in the space time of the string according to their geodesic equations. We observe that for certain values of their energy and angular momentum, an overdensity of particles is observed close to the string. We find that the string parameters determine the distribution of the particles. We make an estimate of the density fluctuation generated around the string as a function of the deficit angle. Though the thickness of the string is small, the length is large and the overdensity close to the string may have cosmological consequences in the early universe.

  13. Remarks on entanglement entropy in string theory

    NASA Astrophysics Data System (ADS)

    Balasubramanian, Vijay; Parrikar, Onkar

    2018-03-01

    Entanglement entropy for spatial subregions is difficult to define in string theory because of the extended nature of strings. Here we propose a definition for bosonic open strings using the framework of string field theory. The key difference (compared to ordinary quantum field theory) is that the subregion is chosen inside a Cauchy surface in the "space of open string configurations." We first present a simple calculation of this entanglement entropy in free light-cone string field theory, ignoring subtleties related to the factorization of the Hilbert space. We reproduce the answer expected from an effective field theory point of view, namely a sum over the one-loop entanglement entropies corresponding to all the particle-excitations of the string, and further show that the full string theory regulates ultraviolet divergences in the entanglement entropy. We then revisit the question of factorization of the Hilbert space by analyzing the covariant phase-space associated with a subregion in Witten's covariant string field theory. We show that the pure gauge (i.e., BRST exact) modes in the string field become dynamical at the entanglement cut. Thus, a proper definition of the entropy must involve an extended Hilbert space, with new stringy edge modes localized at the entanglement cut.

  14. Protection of Health Imagery by Region Based Lossless Reversible Watermarking Scheme

    PubMed Central

    Priya, R. Lakshmi; Sadasivam, V.

    2015-01-01

    Providing authentication and integrity in medical images is a problem and this work proposes a new blind fragile region based lossless reversible watermarking technique to improve trustworthiness of medical images. The proposed technique embeds the watermark using a reversible least significant bit embedding scheme. The scheme combines hashing, compression, and digital signature techniques to create a content dependent watermark making use of compressed region of interest (ROI) for recovery of ROI as reported in literature. The experiments were carried out to prove the performance of the scheme and its assessment reveals that ROI is extracted in an intact manner and PSNR values obtained lead to realization that the presented scheme offers greater protection for health imageries. PMID:26649328

  15. Limited distortion in LSB steganography

    NASA Astrophysics Data System (ADS)

    Kim, Younhee; Duric, Zoran; Richards, Dana

    2006-02-01

    It is well known that all information hiding methods that modify the least significant bits introduce distortions into the cover objects. Those distortions have been utilized by steganalysis algorithms to detect that the objects had been modified. It has been proposed that only coefficients whose modification does not introduce large distortions should be used for embedding. In this paper we propose an effcient algorithm for information hiding in the LSBs of JPEG coefficients. Our algorithm uses parity coding to choose the coefficients whose modifications introduce minimal additional distortion. We derive the expected value of the additional distortion as a function of the message length and the probability distribution of the JPEG quantization errors of cover images. Our experiments show close agreement between the theoretical prediction and the actual additional distortion.

  16. Cover estimation and payload location using Markov random fields

    NASA Astrophysics Data System (ADS)

    Quach, Tu-Thach

    2014-02-01

    Payload location is an approach to find the message bits hidden in steganographic images, but not necessarily their logical order. Its success relies primarily on the accuracy of the underlying cover estimators and can be improved if more estimators are used. This paper presents an approach based on Markov random field to estimate the cover image given a stego image. It uses pairwise constraints to capture the natural two-dimensional statistics of cover images and forms a basis for more sophisticated models. Experimental results show that it is competitive against current state-of-the-art estimators and can locate payload embedded by simple LSB steganography and group-parity steganography. Furthermore, when combined with existing estimators, payload location accuracy improves significantly.

  17. Ultrasonic/Sonic Jackhammer

    NASA Technical Reports Server (NTRS)

    Bar-Cohen, Yoseph (Inventor); Herz, Jack L. (Inventor); Sherrit, Stewart (Inventor)

    2014-01-01

    The invention provides a novel jackhammer that utilizes ultrasonic and/or sonic vibrations as source of power. It is easy to operate and does not require extensive training, requiring substantially less physical capabilities from the user and thereby increasing the pool of potential operators. An important safety benefit is that it does not fracture resilient or compliant materials such as cable channels and conduits, tubing, plumbing, cabling and other embedded fixtures that may be encountered along the impact path. While the ultrasonic/sonic jackhammer of the invention is able to cut concrete and asphalt, it generates little back-propagated shocks or vibrations onto the mounting fixture, and can be operated from an automatic platform or robotic system. PNEUMATICS; ULTRASONICS; IMPACTORS; DRILLING; HAMMERS BRITTLE MATERIALS; DRILL BITS; PROTOTYPES; VIBRATION

  18. Cosmic string catalysis of skyrmion decay

    NASA Technical Reports Server (NTRS)

    Gregory, Ruth; Davis, Anne-Christine; Brandenberger, Robert

    1988-01-01

    The Callan-Witten picture is developed for monopole catalyzed skyrmion decay in order to analyze the corresponding cosmic string scenario. It is discovered that cosmic strings (both ordinary and superconducting) can catalyze proton decay, but that this catalysis only occurs on the scale of the core of the string. In order to do this we have to develop a vortex model for the superconducting string. An argument is also given for the difference in the enhancement factors for monopoles and strings.

  19. Hydraulics Graphics Package. Users Manual

    DTIC Science & Technology

    1985-11-01

    ENTER: VARIABLE/SEPARATOR/VALUE OR STRING GLBL, TETON DAM FAILURE ENTER: VARIABLE/SEPARATOR/VALUE OR STRING SLOC ,DISCHARGE HISTOGRAM ENTER: VARIABLE...ENTER: VARIABLE/SEPARATOR/VALUE OR STRING YLBL,FLOW IN 1000 CFS ENTER: VARIABLE/SEPARATORVA LUE OR STRING GLBL, TETON DAM FAILURE ENTER: VARIABLE...SEPARATOR/VALUE OR STRING SECNO, 0 ENTER: VARIABLE/SEPARATOR/VALUE OR STRING GO 1ee0. F go L 0 U I Goo. 200. TETON DAM FAILUPE N\\ rLOIJ Alr 4wi. fiNT. I .I

  20. Impaired letter-string processing in developmental dyslexia: what visual-to-phonology code mapping disorder?

    PubMed

    Valdois, Sylviane; Lassus-Sangosse, Delphine; Lobier, Muriel

    2012-05-01

    Poor parallel letter-string processing in developmental dyslexia was taken as evidence of poor visual attention (VA) span, that is, a limitation of visual attentional resources that affects multi-character processing. However, the use of letter stimuli in oral report tasks was challenged on its capacity to highlight a VA span disorder. In particular, report of poor letter/digit-string processing but preserved symbol-string processing was viewed as evidence of poor visual-to-phonology code mapping, in line with the phonological theory of developmental dyslexia. We assessed here the visual-to-phonological-code mapping disorder hypothesis. In Experiment 1, letter-string, digit-string and colour-string processing was assessed to disentangle a phonological versus visual familiarity account of the letter/digit versus symbol dissociation. Against a visual-to-phonological-code mapping disorder but in support of a familiarity account, results showed poor letter/digit-string processing but preserved colour-string processing in dyslexic children. In Experiment 2, two tasks of letter-string report were used, one of which was performed simultaneously to a high-taxing phonological task. Results show that dyslexic children are similarly impaired in letter-string report whether a concurrent phonological task is simultaneously performed or not. Taken together, these results provide strong evidence against a phonological account of poor letter-string processing in developmental dyslexia. Copyright © 2012 John Wiley & Sons, Ltd.

  1. Multiflavor string-net models

    NASA Astrophysics Data System (ADS)

    Lin, Chien-Hung

    2017-05-01

    We generalize the string-net construction to multiple flavors of strings, each of which is labeled by the elements of an Abelian group Gi. The same flavor of strings can branch, while different flavors of strings can cross one another and thus they form intersecting string nets. We systematically construct the exactly soluble lattice Hamiltonians and the ground-state wave functions for the intersecting string-net condensed phases. We analyze the braiding statistics of the low-energy quasiparticle excitations and find that our model can realize all the topological phases as the string-net model with group G =∏iGi . In this respect, our construction provides various ways of building lattice models which realize topological order G , corresponding to different partitions of G and thus different flavors of string nets. In fact, our construction concretely demonstrates the Künneth formula by constructing various lattice models with the same topological order. As an example, we construct the G =Z2×Z2×Z2 string-net model which realizes a non-Abelian topological phase by properly intersecting three copies of toric codes.

  2. Photovoltaic power generation system with photovoltaic cells as bypass diodes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lentine, Anthony L.; Nielson, Gregory N.; Tauke-Pedretti, Anna

    A photovoltaic power generation system that includes a solar panel is described herein. The solar panel includes a photovoltaic sub-module, which includes a group of microsystem enabled photovoltaic cells. The group includes a first string of photovoltaic cells, a second string of photovoltaic cells, and a differing photovoltaic cell. Photovoltaic cells in the first string are electrically connected in series, and photovoltaic cells in the second string are electrically connected in series. Further, the first string of photovoltaic cells, the second string of photovoltaic cells, and the differing photovoltaic cell are electrically connected in parallel. Moreover, the differing photovoltaic cellmore » is used as a bypass diode for the first string of photovoltaic cells and the second string of photovoltaic cells.« less

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Donnelly, William; Wong, Gabriel

    What is the meaning of entanglement in a theory of extended objects such as strings? To address this question we consider the spatial entanglement between two intervals in the Gross-Taylor model, the string theory dual to two-dimensional Yang-Mills theory at large N. The string diagrams that contribute to the entanglement entropy describe open strings with endpoints anchored to the entangling surface, as first argued by Susskind. We develop a canonical theory of these open strings, and describe how closed strings are divided into open strings at the level of the Hilbert space. Here, we derive the modular Hamiltonian for themore » Hartle-Hawking state and show that the corresponding reduced density matrix describes a thermal ensemble of open strings ending on an object at the entangling surface that we call an entanglement brane, or E-brane.« less

  4. Device for balancing parallel strings

    DOEpatents

    Mashikian, Matthew S.

    1985-01-01

    A battery plant is described which features magnetic circuit means in association with each of the battery strings in the battery plant for balancing the electrical current flow through the battery strings by equalizing the voltage across each of the battery strings. Each of the magnetic circuit means generally comprises means for sensing the electrical current flow through one of the battery strings, and a saturable reactor having a main winding connected electrically in series with the battery string, a bias winding connected to a source of alternating current and a control winding connected to a variable source of direct current controlled by the sensing means. Each of the battery strings is formed by a plurality of batteries connected electrically in series, and these battery strings are connected electrically in parallel across common bus conductors.

  5. Aspects of some dualities in string theory

    NASA Astrophysics Data System (ADS)

    Kim, Bom Soo

    AdS/CFT correspondence in string theory has changed landscape of the theoretical physics. Through this celebrated duality between gravity theory and field theory, one can investigate analytically strongly coupled gauge theories such as Quantum Chromodynamics (QCD) in terms of weakly coupled string theory such as supergravity theory and vice versa. In the first part of this thesis we used this duality to construct a new type of nonlocal field theory, called Puff Field Theory, in terms of D3 branes in type IIB string theory with a geometric twist. In addition to the strong-weak duality of AdS/CFT, there also exists a weak-weak duality, called Twistor String Theory. Twistor technique is successfully used to calculate the SYM scattering amplitude in an elegant fashion. Yet, the progress in the string theory side was hindered by a non-unitary conformal gravity. We extend the Twistor string theory by introducing mass terms, in the second part of the thesis. A chiral mass term is identified as a vacuum expectation value of a conformal supergravity field and is tied with the breaking of the conformal symmetry of gravity. As a prime candidate for a quantum theory of gravity, string theory revealed many promising successes such as counting the number of microstates in supersymmetric Black Holes thermodynamics and resolution of timelike and null singularities, to name a few. Yet, the fundamental string and M-theroy formulations are not yet available. Various string theories without gravity, such as Non-Commutative Open String (NCOS) and Open Membrane (OM) theories, are very nice playground to investigate the fundamental structure of string and M-theory without the complication of gravity. In the last part of the thesis, simpler Non-Relativistic String Theories are constructed and investigated. One important motivation for those theories is related to the connection between Non-Relativistic String Theories and Non-critical String Theories through the bosonization of betagamma CFT.

  6. The physics of unwound and wound strings on the electric guitar applied to the pitch intervals produced by tremolo/vibrato arm systems

    PubMed Central

    2017-01-01

    The physics of wound and unwound strings on the electric guitar are presented here, and the pitch intervals produced by the movements of a Fender Stratocaster tremolo unit are explained. Predicted changes in pitch sensitivity of different strings are given, and experimentally verified, for changes in saddle height, the distance of string free to move behind the nut and ratio of diameters/masses of the core and windings of wound strings. Also, it is shown that changes to the gauge of strings (assuming the string tension is sufficient for linear behaviour and in absence of changes to other construction details) don’t alter the pitch intervals produced by a given angle of tremolo arm use assuming the instrument is set up with the same sounding pitches and starting bridge angle. It is demonstrated that it not possible to equalise the relative sensitivity of unwound steel stings on a Fender Stratocaster type tremolo unit through string construction techniques. The ratio of core to winding mass in the string, on the other hand, was found to be a very powerful design parameter for choosing the sensitivity of the string to tremolo arm use and standard pitch bends. For instance, the pitch intervals produced by operation of tremolo arm for wound strings may be made to approximately match that for one of the unwound strings if they share very similar core gauges (assuming the winding masses are chosen to give approximately the same tension at their sounding pitches). Such a design, only available currently by custom order, also delivers the optimum equalisation in sensitivity of strings for standard string bends (due to these also being produced by altering the length of the string to generate changes in tension and therefore pitch). PMID:28934268

  7. Formation of Electron Strings in Narrow Band Polar Semiconductors

    NASA Astrophysics Data System (ADS)

    Kusmartsev, F. V.

    2000-01-01

    We show that linear electron strings may arise in polar semiconductors. A single string consists of M spinless fermions trapped by an extended polarization well of a cigar shape. Inside the string the particles are free although they interact with each other via Coulomb forces. The strings arise as a result of an electronic phase separation associated with an instability of small adiabatic polarons. We have found the length of the string which depends on dielectric constants of semiconductors. The appearance of these electron strings may have an impact on the effect of stripe formation observed in a variety of high- Tc experiments.

  8. Optimal management of batteries in electric systems

    DOEpatents

    Atcitty, Stanley; Butler, Paul C.; Corey, Garth P.; Symons, Philip C.

    2002-01-01

    An electric system including at least a pair of battery strings and an AC source minimizes the use and maximizes the efficiency of the AC source by using the AC source only to charge all battery strings at the same time. Then one or more battery strings is used to power the load while management, such as application of a finish charge, is provided to one battery string. After another charge cycle, the roles of the battery strings are reversed so that each battery string receives regular management.

  9. Content-based audio authentication using a hierarchical patchwork watermark embedding

    NASA Astrophysics Data System (ADS)

    Gulbis, Michael; Müller, Erika

    2010-05-01

    Content-based audio authentication watermarking techniques extract perceptual relevant audio features, which are robustly embedded into the audio file to protect. Manipulations of the audio file are detected on the basis of changes between the original embedded feature information and the anew extracted features during verification. The main challenges of content-based watermarking are on the one hand the identification of a suitable audio feature to distinguish between content preserving and malicious manipulations. On the other hand the development of a watermark, which is robust against content preserving modifications and able to carry the whole authentication information. The payload requirements are significantly higher compared to transaction watermarking or copyright protection. Finally, the watermark embedding should not influence the feature extraction to avoid false alarms. Current systems still lack a sufficient alignment of watermarking algorithm and feature extraction. In previous work we developed a content-based audio authentication watermarking approach. The feature is based on changes in DCT domain over time. A patchwork algorithm based watermark was used to embed multiple one bit watermarks. The embedding process uses the feature domain without inflicting distortions to the feature. The watermark payload is limited by the feature extraction, more precisely the critical bands. The payload is inverse proportional to segment duration of the audio file segmentation. Transparency behavior was analyzed in dependence of segment size and thus the watermark payload. At a segment duration of about 20 ms the transparency shows an optimum (measured in units of Objective Difference Grade). Transparency and/or robustness are fast decreased for working points beyond this area. Therefore, these working points are unsuitable to gain further payload, needed for the embedding of the whole authentication information. In this paper we present a hierarchical extension of the watermark method to overcome the limitations given by the feature extraction. The approach is a recursive application of the patchwork algorithm onto its own patches, with a modified patch selection to ensure a better signal to noise ratio for the watermark embedding. The robustness evaluation was done by compression (mp3, ogg, aac), normalization, and several attacks of the stirmark benchmark for audio suite. Compared on the base of same payload and transparency the hierarchical approach shows improved robustness.

  10. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy.

    PubMed

    Muhammad, Khan; Sajjad, Muhammad; Baik, Sung Wook

    2016-05-01

    In this paper, the problem of secure transmission of sensitive contents over the public network Internet is addressed by proposing a novel data hiding method in encrypted images with dual-level security. The secret information is divided into three blocks using a specific pattern, followed by an encryption mechanism based on the three-level encryption algorithm (TLEA). The input image is scrambled using a secret key, and the encrypted sub-message blocks are then embedded in the scrambled image by cyclic18 least significant bit (LSB) substitution method, utilizing LSBs and intermediate LSB planes. Furthermore, the cover image and its planes are rotated at different angles using a secret key prior to embedding, deceiving the attacker during data extraction. The usage of message blocks division, TLEA, image scrambling, and the cyclic18 LSB method results in an advanced security system, maintaining the visual transparency of resultant images and increasing the security of embedded data. In addition, employing various secret keys for image scrambling, data encryption, and data hiding using the cyclic18 LSB method makes the data recovery comparatively more challenging for attackers. Experimental results not only validate the effectiveness of the proposed framework in terms of visual quality and security compared to other state-of-the-art methods, but also suggest its feasibility for secure transmission of diagnostically important keyframes to healthcare centers and gastroenterologists during wireless capsule endoscopy.

  11. The waiting time problem in a model hominin population.

    PubMed

    Sanford, John; Brewer, Wesley; Smith, Franzine; Baumgardner, John

    2015-09-17

    Functional information is normally communicated using specific, context-dependent strings of symbolic characters. This is true within the human realm (texts and computer programs), and also within the biological realm (nucleic acids and proteins). In biology, strings of nucleotides encode much of the information within living cells. How do such information-bearing nucleotide strings arise and become established? This paper uses comprehensive numerical simulation to understand what types of nucleotide strings can realistically be established via the mutation/selection process, given a reasonable timeframe. The program Mendel's Accountant realistically simulates the mutation/selection process, and was modified so that a starting string of nucleotides could be specified, and a corresponding target string of nucleotides could be specified. We simulated a classic pre-human hominin population of at least 10,000 individuals, with a generation time of 20 years, and with very strong selection (50% selective elimination). Random point mutations were generated within the starting string. Whenever an instance of the target string arose, all individuals carrying the target string were assigned a specified reproductive advantage. When natural selection had successfully amplified an instance of the target string to the point of fixation, the experiment was halted, and the waiting time statistics were tabulated. Using this methodology we tested the effect of mutation rate, string length, fitness benefit, and population size on waiting time to fixation. Biologically realistic numerical simulations revealed that a population of this type required inordinately long waiting times to establish even the shortest nucleotide strings. To establish a string of two nucleotides required on average 84 million years. To establish a string of five nucleotides required on average 2 billion years. We found that waiting times were reduced by higher mutation rates, stronger fitness benefits, and larger population sizes. However, even using the most generous feasible parameters settings, the waiting time required to establish any specific nucleotide string within this type of population was consistently prohibitive. We show that the waiting time problem is a significant constraint on the macroevolution of the classic hominin population. Routine establishment of specific beneficial strings of two or more nucleotides becomes very problematic.

  12. The IMS Software Integration Platform

    DTIC Science & Technology

    1993-04-12

    products to incorporate all data shared by the IMS applications. Some entities (time-series, images, a algorithm -specific parameters) must be managed...dbwhoanii, dbcancel Transaction Management: dbcommit, dbrollback Key Counter Assignment: dbgetcounter String Handling: cstr ~to~pad, pad-to- cstr Error...increment *value; String Maniputation: int cstr topad (array, string, arraylength) char *array, *string; int arrayjlength; int pad tocstr (string

  13. Cosmic superstrings: Observable remnants of brane inflation

    NASA Astrophysics Data System (ADS)

    Wyman, Mark Charles

    Brane inflation provides a natural dynamical model for the physics which underlie the inflationary paradigm. Besides their inflationary predictions, brane models imply another observable consequence: cosmic strings. In this dissertation I outline the background of how cosmic strings arise in brane inflationary models and how the properties of the strings and the models are mutually tied (Chapter 2). I then use cosmological observations to put limits on the properties of any actually-existing cosmic string network (Chapter 3). Next, I study the question of how cosmic superstrings, as the cosmic strings arising from string theory are known, could be distinct from classical gauge- theory cosmic strings. In particular, I propose an analytical model for the cosmological evolution of a network of binding cosmic strings (Chapter 4); I also describe the distinctive gravitational lensing phenomena that are caused by binding strings (Chapter 5). Finally, I lay out the background for the numerical study of a gauge theory model for the dynamics of cosmic superstring binding (Chapter 6).

  14. String theory--the physics of string-bending and other electric guitar techniques.

    PubMed

    Grimes, David Robert

    2014-01-01

    Electric guitar playing is ubiquitous in practically all modern music genres. In the hands of an experienced player, electric guitars can sound as expressive and distinct as a human voice. Unlike other more quantised instruments where pitch is a discrete function, guitarists can incorporate micro-tonality and, as a result, vibrato and sting-bending are idiosyncratic hallmarks of a player. Similarly, a wide variety of techniques unique to the electric guitar have emerged. While the mechano-acoustics of stringed instruments and vibrating strings are well studied, there has been comparatively little work dedicated to the underlying physics of unique electric guitar techniques and strings, nor the mechanical factors influencing vibrato, string-bending, fretting force and whammy-bar dynamics. In this work, models for these processes are derived and the implications for guitar and string design discussed. The string-bending model is experimentally validated using a variety of strings and vibrato dynamics are simulated. The implications of these findings on the configuration and design of guitars is also discussed.

  15. PhD Thesis: String theory in the early universe

    NASA Astrophysics Data System (ADS)

    Gwyn, Rhiannon

    2009-11-01

    The intersection of string theory with cosmology is unavoidable in the early universe, and its exploration may shine light on both fields. In this thesis, three papers at this intersection are presented and reviewed, with the aim of providing a thorough and pedagogical guide to their results. First, we address the longstanding problem of finding a string theory realisation of the axion. Using warped compactifications in heterotic string theory, we show that the axion decay constant can be lowered to acceptable values by the warp factor. Next, we move to the subject of cosmic strings, whose network evolution could have important consequences for astrophysics and cosmology. In particular, there are quantitative differences between cosmic superstring networks and GUT cosmic string networks. We investigate the properties of cosmic superstring networks in warped backgrounds, giving the tension and properties of three-string junctions in these backgrounds. Finally, we examine the possibility that cosmic strings in heterotic string theory could be responsible for generating the galactic magnetic fields that seeded those observed today.

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ciuca, Razvan; Hernández, Oscar F., E-mail: razvan.ciuca@mail.mcgill.ca, E-mail: oscarh@physics.mcgill.ca

    There exists various proposals to detect cosmic strings from Cosmic Microwave Background (CMB) or 21 cm temperature maps. Current proposals do not aim to find the location of strings on sky maps, all of these approaches can be thought of as a statistic on a sky map. We propose a Bayesian interpretation of cosmic string detection and within that framework, we derive a connection between estimates of cosmic string locations and cosmic string tension G μ. We use this Bayesian framework to develop a machine learning framework for detecting strings from sky maps and outline how to implement this frameworkmore » with neural networks. The neural network we trained was able to detect and locate cosmic strings on noiseless CMB temperature map down to a string tension of G μ=5 ×10{sup −9} and when analyzing a CMB temperature map that does not contain strings, the neural network gives a 0.95 probability that G μ≤2.3×10{sup −9}.« less

  17. String Theory - The Physics of String-Bending and Other Electric Guitar Techniques

    PubMed Central

    Grimes, David Robert

    2014-01-01

    Electric guitar playing is ubiquitous in practically all modern music genres. In the hands of an experienced player, electric guitars can sound as expressive and distinct as a human voice. Unlike other more quantised instruments where pitch is a discrete function, guitarists can incorporate micro-tonality and, as a result, vibrato and sting-bending are idiosyncratic hallmarks of a player. Similarly, a wide variety of techniques unique to the electric guitar have emerged. While the mechano-acoustics of stringed instruments and vibrating strings are well studied, there has been comparatively little work dedicated to the underlying physics of unique electric guitar techniques and strings, nor the mechanical factors influencing vibrato, string-bending, fretting force and whammy-bar dynamics. In this work, models for these processes are derived and the implications for guitar and string design discussed. The string-bending model is experimentally validated using a variety of strings and vibrato dynamics are simulated. The implications of these findings on the configuration and design of guitars is also discussed. PMID:25054880

  18. Minimal string theories and integrable hierarchies

    NASA Astrophysics Data System (ADS)

    Iyer, Ramakrishnan

    Well-defined, non-perturbative formulations of the physics of string theories in specific minimal or superminimal model backgrounds can be obtained by solving matrix models in the double scaling limit. They provide us with the first examples of completely solvable string theories. Despite being relatively simple compared to higher dimensional critical string theories, they furnish non-perturbative descriptions of interesting physical phenomena such as geometrical transitions between D-branes and fluxes, tachyon condensation and holography. The physics of these theories in the minimal model backgrounds is succinctly encoded in a non-linear differential equation known as the string equation, along with an associated hierarchy of integrable partial differential equations (PDEs). The bosonic string in (2,2m-1) conformal minimal model backgrounds and the type 0A string in (2,4 m) superconformal minimal model backgrounds have the Korteweg-de Vries system, while type 0B in (2,4m) backgrounds has the Zakharov-Shabat system. The integrable PDE hierarchy governs flows between backgrounds with different m. In this thesis, we explore this interesting connection between minimal string theories and integrable hierarchies further. We uncover the remarkable role that an infinite hierarchy of non-linear differential equations plays in organizing and connecting certain minimal string theories non-perturbatively. We are able to embed the type 0A and 0B (A,A) minimal string theories into this single framework. The string theories arise as special limits of a rich system of equations underpinned by an integrable system known as the dispersive water wave hierarchy. We find that there are several other string-like limits of the system, and conjecture that some of them are type IIA and IIB (A,D) minimal string backgrounds. We explain how these and several other string-like special points arise and are connected. In some cases, the framework endows the theories with a non-perturbative definition for the first time. Notably, we discover that the Painleve IV equation plays a key role in organizing the string theory physics, joining its siblings, Painleve I and II, whose roles have previously been identified in this minimal string context. We then present evidence that the conjectured type II theories have smooth non-perturbative solutions, connecting two perturbative asymptotic regimes, in a 't Hooft limit. Our technique also demonstrates evidence for new minimal string theories that are not apparent in a perturbative analysis.

  19. Dynamical AdS strings across horizons

    DOE PAGES

    Ishii, Takaaki; Murata, Keiju

    2016-03-01

    We examine the nonlinear classical dynamics of a fundamental string in anti-deSitter spacetime. The string is dual to the flux tube between an external quark-antiquark pair in $N = 4$ super Yang-Mills theory. We perturb the string by shaking the endpoints and compute its time evolution numerically. We find that with sufficiently strong perturbations the string continues extending and plunges into the Poincare´ horizon. In the evolution, effective horizons are also dynamically created on the string worldsheet. The quark and antiquark are thus causally disconnected, and the string transitions to two straight strings. The forces acting on the endpoints vanishmore » with a power law whose slope depends on the perturbations. Lastly, the condition for this transition to occur is that energy injection exceeds the static energy between the quark-antiquark pair.« less

  20. Cosmic strings and the microwave sky. I - Anisotropy from moving strings

    NASA Technical Reports Server (NTRS)

    Stebbins, Albert

    1988-01-01

    A method is developed for calculating the component of the microwave anisotropy around cosmic string loops due to their rapidly changing gravitational fields. The method is only valid for impact parameters from the string much smaller than the horizon size at the time the photon passes the string. The method makes it possible to calculate the temperature pattern around arbitrary string configurations numerically in terms of one-dimensional integrals. This method is applied to temperature jump across a string, confirming and extending previous work. It is also applied to cusps and kinks on strings, and to determining the temperature pattern far from a strong loop. The temperature pattern around a few loop configurations is explicitly calculated. Comparisons with the work of Brandenberger et al. (1986) indicates that they have overestimated the MBR anisotropy from gravitational radiation emitted from loops.

  1. A Robust Blind Quantum Copyright Protection Method for Colored Images Based on Owner's Signature

    NASA Astrophysics Data System (ADS)

    Heidari, Shahrokh; Gheibi, Reza; Houshmand, Monireh; Nagata, Koji

    2017-08-01

    Watermarking is the imperceptible embedding of watermark bits into multimedia data in order to use for different applications. Among all its applications, copyright protection is the most prominent usage which conceals information about the owner in the carrier, so as to prohibit others from assertion copyright. This application requires high level of robustness. In this paper, a new blind quantum copyright protection method based on owners's signature in RGB images is proposed. The method utilizes one of the RGB channels as indicator and two remained channels are used for embedding information about the owner. In our contribution the owner's signature is considered as a text. Therefore, in order to embed in colored image as watermark, a new quantum representation of text based on ASCII character set is offered. Experimental results which are analyzed in MATLAB environment, exhibit that the presented scheme shows good performance against attacks and can be used to find out who the real owner is. Finally, the discussed quantum copyright protection method is compared with a related work that our analysis confirm that the presented scheme is more secure and applicable than the previous ones currently found in the literature.

  2. The Development of a String Sight-Reading Pitch Skill Hierarchy

    ERIC Educational Resources Information Center

    Alexander, Michael L.; Henry, Michele L.

    2012-01-01

    This study was designed to determine a pitch skill hierarchy for string sight-reading, to determine the effects of key on string sight-reading achievement, and to determine the validity of a tonal pattern system as a measurement of melodic sight-reading skill for string players. High school string students (n = 94) obtained a mean score of 27.28…

  3. Actomyosin purse strings: renewable resources that make morphogenesis robust and resilient

    PubMed Central

    Rodriguez-Diaz, Alice; Toyama, Yusuke; Abravanel, Daniel L.; Wiemann, John M.; Wells, Adrienne R.; Tulu, U. Serdar; Edwards, Glenn S.; Kiehart, Daniel P.

    2008-01-01

    Dorsal closure in Drosophila is a model system for cell sheet morphogenesis and wound healing. During closure two sheets of lateral epidermis move dorsally to close over the amnioserosa and form a continuous epidermis. Forces from the amnioserosa and actomyosin-rich, supracellular purse strings at the leading edges of these lateral epidermal sheets drive closure. Purse strings generate the largest force for closure and occur during development and wound healing throughout phylogeny. We use laser microsurgery to remove some or all of the purse strings from developing embryos. Free edges produced by surgery undergo characteristic responses as follows. Intact cells in the free edges, which previously had no purse string, recoil away from the incision and rapidly assemble new, secondary purse strings. Next, recoil slows, then pauses at a turning point. Following a brief delay, closure resumes and is powered to completion by the secondary purse strings. We confirm that the assembly of the secondary purse strings requires RhoA. We show that α-actinin alternates with nonmuscle myosin II along purse strings and requires nonmuscle myosin II for its localization. Together our data demonstrate that purse strings are renewable resources that contribute to the robust and resilient nature of closure. PMID:19404432

  4. Physical cognition: birds learn the structural efficacy of nest material

    PubMed Central

    Bailey, Ida E.; Morgan, Kate V.; Bertin, Marion; Meddle, Simone L.; Healy, Susan D.

    2014-01-01

    It is generally assumed that birds’ choice of structurally suitable materials for nest building is genetically predetermined. Here, we tested that assumption by investigating whether experience affected male zebra finches’ (Taeniopygia guttata) choice of nest material. After a short period of building with relatively flexible string, birds preferred to build with stiffer string while those that had experienced a stiffer string were indifferent to string type. After building a complete nest with either string type, however, all birds increased their preference for stiff string. The stiffer string appeared to be the more effective building material as birds required fewer pieces of stiffer than flexible string to build a roofed nest. For birds that raised chicks successfully, there was no association between the material they used to build their nest and the type they subsequently preferred. Birds’ material preference reflected neither the preference of their father nor of their siblings but juvenile experience of either string type increased their preference for stiffer string. Our results represent two important advances: (i) birds choose nest material based on the structural properties of the material; (ii) nest material preference is not entirely genetically predetermined as both the type and amount of experience influences birds’ choices. PMID:24741011

  5. Physical cognition: birds learn the structural efficacy of nest material.

    PubMed

    Bailey, Ida E; Morgan, Kate V; Bertin, Marion; Meddle, Simone L; Healy, Susan D

    2014-06-07

    It is generally assumed that birds' choice of structurally suitable materials for nest building is genetically predetermined. Here, we tested that assumption by investigating whether experience affected male zebra finches' (Taeniopygia guttata) choice of nest material. After a short period of building with relatively flexible string, birds preferred to build with stiffer string while those that had experienced a stiffer string were indifferent to string type. After building a complete nest with either string type, however, all birds increased their preference for stiff string. The stiffer string appeared to be the more effective building material as birds required fewer pieces of stiffer than flexible string to build a roofed nest. For birds that raised chicks successfully, there was no association between the material they used to build their nest and the type they subsequently preferred. Birds' material preference reflected neither the preference of their father nor of their siblings but juvenile experience of either string type increased their preference for stiffer string. Our results represent two important advances: (i) birds choose nest material based on the structural properties of the material; (ii) nest material preference is not entirely genetically predetermined as both the type and amount of experience influences birds' choices.

  6. Text String Detection from Natural Scenes by Structure-based Partition and Grouping

    PubMed Central

    Yi, Chucai; Tian, YingLi

    2012-01-01

    Text information in natural scene images serves as important clues for many image-based applications such as scene understanding, content-based image retrieval, assistive navigation, and automatic geocoding. However, locating text from complex background with multiple colors is a challenging task. In this paper, we explore a new framework to detect text strings with arbitrary orientations in complex natural scene images. Our proposed framework of text string detection consists of two steps: 1) Image partition to find text character candidates based on local gradient features and color uniformity of character components. 2) Character candidate grouping to detect text strings based on joint structural features of text characters in each text string such as character size differences, distances between neighboring characters, and character alignment. By assuming that a text string has at least three characters, we propose two algorithms of text string detection: 1) adjacent character grouping method, and 2) text line grouping method. The adjacent character grouping method calculates the sibling groups of each character candidate as string segments and then merges the intersecting sibling groups into text string. The text line grouping method performs Hough transform to fit text line among the centroids of text candidates. Each fitted text line describes the orientation of a potential text string. The detected text string is presented by a rectangle region covering all characters whose centroids are cascaded in its text line. To improve efficiency and accuracy, our algorithms are carried out in multi-scales. The proposed methods outperform the state-of-the-art results on the public Robust Reading Dataset which contains text only in horizontal orientation. Furthermore, the effectiveness of our methods to detect text strings with arbitrary orientations is evaluated on the Oriented Scene Text Dataset collected by ourselves containing text strings in non-horizontal orientations. PMID:21411405

  7. Text string detection from natural scenes by structure-based partition and grouping.

    PubMed

    Yi, Chucai; Tian, YingLi

    2011-09-01

    Text information in natural scene images serves as important clues for many image-based applications such as scene understanding, content-based image retrieval, assistive navigation, and automatic geocoding. However, locating text from a complex background with multiple colors is a challenging task. In this paper, we explore a new framework to detect text strings with arbitrary orientations in complex natural scene images. Our proposed framework of text string detection consists of two steps: 1) image partition to find text character candidates based on local gradient features and color uniformity of character components and 2) character candidate grouping to detect text strings based on joint structural features of text characters in each text string such as character size differences, distances between neighboring characters, and character alignment. By assuming that a text string has at least three characters, we propose two algorithms of text string detection: 1) adjacent character grouping method and 2) text line grouping method. The adjacent character grouping method calculates the sibling groups of each character candidate as string segments and then merges the intersecting sibling groups into text string. The text line grouping method performs Hough transform to fit text line among the centroids of text candidates. Each fitted text line describes the orientation of a potential text string. The detected text string is presented by a rectangle region covering all characters whose centroids are cascaded in its text line. To improve efficiency and accuracy, our algorithms are carried out in multi-scales. The proposed methods outperform the state-of-the-art results on the public Robust Reading Dataset, which contains text only in horizontal orientation. Furthermore, the effectiveness of our methods to detect text strings with arbitrary orientations is evaluated on the Oriented Scene Text Dataset collected by ourselves containing text strings in nonhorizontal orientations.

  8. Bladder stone in a human female: The case of an abnormally located intrauterine contraceptive device

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Khan, S.R.; Wilkinson, E.J.

    A single 4.7 x 3.3 x 1.5 cm solid nodule was removed from the bladder of a 24 years old white female who had lost an intrauterine contraceptive device (IUD) installed approximately four years ago. The nodule showed no external evidence of an IUD or its string. An examination of the nodular surface by scanning electron microscopy (SEM) showed mostly amorphous material with some adherent filamentous structures. Its energy dispersive x-ray microanalysis revealed the presence of calcium and phosphorus suggesting that the nodule was actually a urolith. Fracturing the nodule exposed an embedded entity consistent with being a copper IUD.more » Apparently, the lost IUD had migrated from the uterus into the bladder where it became mineralized. Thus the solid nodule was actually a foreign body stone.« less

  9. (0,2) elephants

    NASA Astrophysics Data System (ADS)

    Aspinwall, Paul S.; Melnikov, Ilarion V.; Plesser, M. Ronen

    2012-01-01

    We enumerate massless E6 singlets for (0,2)-compactifications of the heterotic string on a Calabi-Yau threefold with the "standard embedding" in three distinct ways. In the large radius limit of the threefold, these singlets count deformations of the Calabi-Yau together with its tangent bundle. In the "small-radius" limit we apply Landau-Ginzburg methods. In the orbifold limit we use a combination of geometry and free field methods. In general these counts differ. We show how to identify states between these phases and how certain states vanish from the massless spectrum as one deforms the complex structure or Kähler form away from the Gepner point. The appearance of extra singlets for particular values of complex structure is explored in all three pictures, and our results suggest that this does not depend on the Kähler moduli.

  10. A modal approach to piano soundboard vibroacoustic behavior.

    PubMed

    Trévisan, Benjamin; Ege, Kerem; Laulagnet, Bernard

    2017-02-01

    This paper presents an analytical method for modeling the vibro-acoustic behavior of ribbed non-rectangular orthotropic clamped plates. To do this, the non-rectangular plate is embedded in an extended rectangular simply supported plate on which a spring distribution is added, blocking the extended part of the surface, and allowing the description of any inner surface shapes. The acoustical radiation of the embedded plate is ensured using the radiation impedances of the extended rectangular simply supported plate. This method is applied to an upright piano soundboard: a non-rectangular orthotropic plate ribbed in both directions by several straight stiffeners. A modal decomposition is adopted on the basis of the rectangular extended simply supported plate modes, making it possible to calculate the modes of a piano soundboard in the frequency range [0;3000] Hz, showing the different associated mode families. Likewise, the acoustical radiation is calculated using the radiation impedances of a simply supported baffled plate, demonstrating the influence of the string coupling point positions on the acoustic radiated power. The paper ends with the introduction of indicators taking into account spatial and spectral variations of the excitation depending on the notes, which add to the accuracy of the study from the musical standpoint. A parametrical study, which includes several variations of soundboard design, highlights the complexity of rendering high-pitched notes homogeneous.

  11. How to simulate global cosmic strings with large string tension

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Klaer, Vincent B.; Moore, Guy D., E-mail: vklaer@theorie.ikp.physik.tu-darmstadt.de, E-mail: guy.moore@physik.tu-darmstadt.de

    Global string networks may be relevant in axion production in the early Universe, as well as other cosmological scenarios. Such networks contain a large hierarchy of scales between the string core scale and the Hubble scale, ln( f {sub a} / H ) ∼ 70, which influences the network dynamics by giving the strings large tensions T ≅ π f {sub a} {sup 2} ln( f {sub a} / H ). We present a new numerical approach to simulate such global string networks, capturing the tension without an exponentially large lattice.

  12. Closed timelike curves produced by pairs of moving cosmic strings - Exact solutions

    NASA Technical Reports Server (NTRS)

    Gott, J. Richard, III

    1991-01-01

    Exact solutions of Einstein's field equations are presented for the general case of two moving straight cosmic strings that do not intersect. The solutions for parallel cosmic strings moving in opposite directions show closed timelike curves (CTCs) that circle the two strings as they pass, allowing observers to visit their own past. Similar results occur for nonparallel strings, and for masses in (2+1)-dimensional spacetime. For finite string loops the possibility that black-hole formation may prevent the formation of CTCs is discussed.

  13. Coulomb string tension, asymptotic string tension, and the gluon chain

    DOE PAGES

    Greensite, Jeff; Szczepaniak, Adam P.

    2015-02-01

    We compute, via numerical simulations, the non-perturbative Coulomb potential and position-space ghost propagator in pure SU(3) gauge theory in Coulomb gauge. We find that that the Coulomb potential scales nicely in accordance with asymptotic freedom, that the Coulomb potential is linear in the infrared, and that the Coulomb string tension is about four times larger than the asymptotic string tension. We explain how it is possible that the asymptotic string tension can be lower than the Coulomb string tension by a factor of four.

  14. Simulation of swimming strings immersed in a viscous fluid flow

    NASA Astrophysics Data System (ADS)

    Huang, Wei-Xi; Sung, Hyung Jin

    2006-11-01

    In nature, many phenomena involve interactions between flexible bodies and their surrounding viscous fluid, such as a swimming fish or a flapping flag. The intrinsic dynamics is complicate and not well understood. A flexible string can be regarded as a one-dimensional flag model. Many similarities can be found between the flapping string and swimming fish, although different wake speed results in a drag force for the flapping string and a propulsion force for the swimming fish. In the present study, we propose a mathematical formulation for swimming strings immersed in a viscous fluid flow. Fluid motion is governed by the Navier-Stokes equations and a momentum forcing is added in order to bring the fluid to move at the same velocity with the immersed surface. A flexible inextensible string model is described by another set of equations with an additional momentum forcing which is a result of the fluid viscosity and the pressure difference across the string. The momentum forcing is calculated by a feedback loop. Simulations of several numerical examples are carried out, including a hanging string which starts moving under gravity without ambient fluid, a swinging string immersed in a quiescent viscous fluid, a string swimming within a uniform surrounding flow, and flow over two side-by-side strings. The numerical results agree well with the theoretical analysis and previous experimental observations. Further simulation of a swimming fish is under consideration.

  15. Noncommutative Field Theories and (super)string Field Theories

    NASA Astrophysics Data System (ADS)

    Aref'eva, I. Ya.; Belov, D. M.; Giryavets, A. A.; Koshelev, A. S.; Medvedev, P. B.

    2002-11-01

    In this lecture notes we explain and discuss some ideas concerning noncommutative geometry in general, as well as noncommutative field theories and string field theories. We consider noncommutative quantum field theories emphasizing an issue of their renormalizability and the UV/IR mixing. Sen's conjectures on open string tachyon condensation and their application to the D-brane physics have led to wide investigations of the covariant string field theory proposed by Witten about 15 years ago. We review main ingredients of cubic (super)string field theories using various formulations: functional, operator, conformal and the half string formalisms. The main technical tools that are used to study conjectured D-brane decay into closed string vacuum through the tachyon condensation are presented. We describe also methods which are used to study the cubic open string field theory around the tachyon vacuum: construction of the sliver state, "comma" and matrix representations of vertices.

  16. Gravitational lensing effects of vacuum strings - Exact solutions

    NASA Technical Reports Server (NTRS)

    Gott, J. R., III

    1985-01-01

    Exact interior and exterior solutions to Einstein's field equations are derived for vacuum strings. The exterior solution for a uniform density vacuum string corresponds to a conical space while the interior solution is that of a spherical cap. For Mu equals 0-1/4 the external metric is ds-squared = -dt-squared + dr-squared + (1-4 Mu)-squared r-squared dphi-squared + dz-squared, where Mu is the mass per unit length in the string in Planck masses per Planck length. A maximum mass per unit length for a string is 6.73 x 10 to the 27th g/cm. It is shown that strings cause temperature fluctuations in the cosmic microwave background and produce equal brightness double QSO images separated by up to several minutes of arc. Formulae for lensing probabilities, image splittings, and time delays are derived for strings in a realistic cosmological setting. String searches using ST, the VLA, and the COBE satellite are discussed.

  17. Fitting cosmic microwave background data with cosmic strings and inflation.

    PubMed

    Bevis, Neil; Hindmarsh, Mark; Kunz, Martin; Urrestilla, Jon

    2008-01-18

    We perform a multiparameter likelihood analysis to compare measurements of the cosmic microwave background (CMB) power spectra with predictions from models involving cosmic strings. Adding strings to the standard case of a primordial spectrum with power-law tilt ns, we find a 2sigma detection of strings: f10=0.11+/-0.05, where f10 is the fractional contribution made by strings in the temperature power spectrum (at l=10). CMB data give moderate preference to the model ns=1 with cosmic strings over the standard zero-strings model with variable tilt. When additional non-CMB data are incorporated, the two models become on a par. With variable ns and these extra data, we find that f10<0.11, which corresponds to Gmicro<0.7x10(-6) (where micro is the string tension and G is the gravitational constant).

  18. Modal analysis of a nonuniform string with end mass and variable tension

    NASA Technical Reports Server (NTRS)

    Rheinfurth, M. H.; Galaboff, Z. J.

    1983-01-01

    Modal synthesis techniques for dynamic systems containing strings describe the lateral displacements of these strings by properly chosen shape functions. An iterative algorithm is provided to calculate the natural modes of a nonuniform string and variable tension for some typical boundary conditions including one end mass. Numerical examples are given for a string in a constant and a gravity gradient force field.

  19. Self-energy and self-force in the space-time of a thick cosmic string

    NASA Astrophysics Data System (ADS)

    Khusnutdinov, N. R.; Bezerra, V. B.

    2001-10-01

    We calculate the self-energy and self-force for an electrically charged particle at rest in the background of Gott-Hiscock cosmic string space-time. We find the general expression for the self-energy which is expressed in terms of the S matrix of the scattering problem. The self-energy continuously falls down outward from the string's center with the maximum at the origin of the string. The self-force is repulsive for an arbitrary position of the particle. It tends to zero in the string's center and also far from the string and it has a maximum value at the string's surface. The plots of the numerical calculations of the self-energy and self-force are shown.

  20. The implications of the COBE diffuse microwave radiation results for cosmic strings

    NASA Technical Reports Server (NTRS)

    Bennett, David P.; Stebbins, Albert; Bouchet, Francois R.

    1992-01-01

    We compare the anisotropies in the cosmic microwave background radiation measured by the COBE experiment to those predicted by cosmic string theories. We use an analytic model for the Delta T/T power spectrum that is based on our previous numerical simulations of strings, under the assumption that cosmic strings are the sole source of the measured anisotropy. This implies a value for the string mass per unit length of 1.5 +/- 0.5 x 10 exp -6 C-squared/G. This is within the range of values required for cosmic strings to successfully seed the formation of large-scale structures in the universe. These results clearly encourage further studies of Delta T/T and large-scale structure in the cosmic string model.

  1. Identification of market trends with string and D2-brane maps

    NASA Astrophysics Data System (ADS)

    Bartoš, Erik; Pinčák, Richard

    2017-08-01

    The multidimensional string objects are introduced as a new alternative for an application of string models for time series forecasting in trading on financial markets. The objects are represented by open string with 2-endpoints and D2-brane, which are continuous enhancement of 1-endpoint open string model. We show how new object properties can change the statistics of the predictors, which makes them the candidates for modeling a wide range of time series systems. String angular momentum is proposed as another tool to analyze the stability of currency rates except the historical volatility. To show the reliability of our approach with application of string models for time series forecasting we present the results of real demo simulations for four currency exchange pairs.

  2. Mechanism of Tennis Racket Spin Performance

    NASA Astrophysics Data System (ADS)

    Kawazoe, Yoshihiko; Okimoto, Kenji; Okimoto, Keiko

    Players often say that some strings provide a better grip and more spin than others, but ball spin did not depend on string type, gauge, or tension in pervious laboratory experiments. There was no research work on spin to uncover what is really happening during an actual tennis impact because of the difficulty of performing the appropriate experiments. The present paper clarified the mechanism of top spin and its improvement by lubrication of strings through the use of high-speed video analysis. It also provided a more detailed explanation of spin behavior by comparing a racket with lubricated strings with the famous “spaghetti” strung racket, which was banned in 1978 by the International Tennis Federation because it used plastic spaghetti tubing over the strings to reduce friction, resulting in excessive ball spin. As the main strings stretch and slide sideways more, the ball is given additional spin due to the restoring force parallel to the string face when the main strings spring back and the ball is released from the strings. Herein, we also showed that the additional spin results in a reduction of shock vibrations of the wrist joint during impact.

  3. N250r and N400 ERP correlates of immediate famous face repetition are independent of perceptual load.

    PubMed

    Neumann, Markus F; Schweinberger, Stefan R

    2008-11-06

    It is a matter of considerable debate whether attention to initial stimulus presentations is required for repetition-related neural modulations to occur. Recently, it has been assumed that faces are particularly hard to ignore, and can capture attention in a reflexive manner. In line with this idea, electrophysiological evidence for long-term repetition effects of unattended famous faces has been reported. The present study investigated influences of attention to prime faces on short-term repetition effects in event-related potentials (ERPs). We manipulated attention to short (200 ms) prime presentations (S1) of task-irrelevant famous faces according to Lavie's Perceptual Load Theory. Participants attended to letter strings superimposed on face images, and identified target letters "X" vs. "N" embedded in strings of either 6 different (high load) or 6 identical (low load) letters. Letter identification was followed by probe presentations (S2), which were either repetitions of S1 faces, new famous faces, or infrequent butterflies, to which participants responded. Our ERP data revealed repetition effects in terms of an N250r at occipito-temporal regions, suggesting priming of face identification processes, and in terms of an N400 at the vertex, suggesting semantic priming. Crucially, the magnitude of these effects was unaffected by perceptual load at S1 presentation. This indicates that task-irrelevant face processing is remarkably preserved even in a demanding letter detection task, supporting recent notions of face-specific attentional resources.

  4. Two Studies of Pitch in String Instrument Vibrato: Perception and Pitch Matching Responses of University and High School String Players

    ERIC Educational Resources Information Center

    Geringer, John M.; MacLeod, Rebecca B.; Ellis, Julia C.

    2014-01-01

    We investigated pitch perception of string vibrato tones among string players in two separate studies. In both studies we used tones of acoustic instruments (violin and cello) as stimuli. In the first, we asked 192 high school and university string players to listen to a series of tonal pairs: one tone of each pair was performed with vibrato and…

  5. Geometric phase for a static two-level atom in cosmic string spacetime

    NASA Astrophysics Data System (ADS)

    Cai, Huabing; Ren, Zhongzhou

    2018-05-01

    We investigate the geometric phase of a static two-level atom immersed in a bath of fluctuating vacuum electromagnetic field in the background of a cosmic string. Our results indicate that due to the existence of the string, the geometric phase depends crucially on the position and the polarizability of the atom relative to the string. This can be ascribed to the fact that the presence of the string profoundly modify the distribution of electric field in Minkowski spacetime. So in principle, we can detect the cosmic string by experiments involving geometric phase.

  6. Current balancing for battery strings

    DOEpatents

    Galloway, James H.

    1985-01-01

    A battery plant is described which features magnetic circuit means for balancing the electrical current flow through a pluraliircuitbattery strings which are connected electrically in parallel. The magnetic circuit means is associated with the battery strings such that the conductors carrying the electrical current flow through each of the battery strings pass through the magnetic circuit means in directions which cause the electromagnetic fields of at least one predetermined pair of the conductors to oppose each other. In an alternative embodiment, a low voltage converter is associated with each of the battery strings for balancing the electrical current flow through the battery strings.

  7. Constraints on cosmic strings due to black holes formed from collapsed cosmic string loops

    NASA Technical Reports Server (NTRS)

    Caldwell, R. R.; Gates, Evalyn

    1993-01-01

    The cosmological features of primordial black holes formed from collapsed cosmic string loops are studied. Observational restrictions on a population of primordial black holes are used to restrict f, the fraction of cosmic string loops which collapse to form black holes, and mu, the cosmic string mass-per-unit length. Using a realistic model of cosmic strings, we find the strongest restriction on the parameters f and mu is due to the energy density in 100MeV photons radiated by the black holes. We also find that inert black hole remnants cannot serve as the dark matter. If earlier, crude estimates of f are reliable, our results severely restrict mu, and therefore limit the viability of the cosmic string large-scale structure scenario.

  8. Stochastic gravitational wave background from light cosmic strings

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    DePies, Matthew R.; Hogan, Craig J.

    2007-06-15

    Spectra of the stochastic gravitational wave backgrounds from cosmic strings are calculated and compared with present and future experimental limits. Motivated by theoretical expectations of light cosmic strings in superstring cosmology, improvements in experimental sensitivity, and recent demonstrations of large, stable loop formation from a primordial network, this study explores a new range of string parameters with masses lighter than previously investigated. A standard 'one-scale' model for string loop formation is assumed. Background spectra are calculated numerically for dimensionless string tensions G{mu}/c{sup 2} between 10{sup -7} and 10{sup -18}, and initial loop sizes as a fraction of the Hubble radiusmore » {alpha} from 0.1 to 10{sup -6}. The spectra show a low frequency power-law tail, a broad spectral peak due to loops decaying at the present epoch (including frequencies higher than their fundamental mode, and radiation associated with cusps), and a flat (constant energy density) spectrum at high frequencies due to radiation from loops that decayed during the radiation-dominated era. The string spectrum is distinctive and unlike any other known source. The peak of the spectrum for light strings appears at high frequencies, significantly affecting predicted signals. The spectra of the cosmic string backgrounds are compared with current millisecond pulsar limits and Laser Interferometer Space Antenna (LISA) sensitivity curves. For models with large stable loops ({alpha}=0.1), current pulsar-timing limits exclude G{mu}/c{sup 2}>10{sup -9}, a much tighter limit on string tension than achievable with other techniques, and within the range of current models based on brane inflation. LISA may detect a background from strings as light as G{mu}/c{sup 2}{approx_equal}10{sup -16}, corresponding to field theory strings formed at roughly 10{sup 11} GeV.« less

  9. CMB ISW-lensing bispectrum from cosmic strings

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yamauchi, Daisuke; Sendouda, Yuuiti; Takahashi, Keitaro, E-mail: yamauchi@resceu.s.u-tokyo.ac.jp, E-mail: sendouda@cc.hirosaki-u.ac.jp, E-mail: keitaro@sci.kumamoto-u.ac.jp

    2014-02-01

    We study the effect of weak lensing by cosmic (super-)strings on the higher-order statistics of the cosmic microwave background (CMB). A cosmic string segment is expected to cause weak lensing as well as an integrated Sachs-Wolfe (ISW) effect, the so-called Gott-Kaiser-Stebbins (GKS) effect, to the CMB temperature fluctuation, which are thus naturally cross-correlated. We point out that, in the presence of such a correlation, yet another kind of the post-recombination CMB temperature bispectra, the ISW-lensing bispectra, will arise in the form of products of the auto- and cross-power spectra. We first present an analytic method to calculate the autocorrelation ofmore » the temperature fluctuations induced by the strings, and the cross-correlation between the temperature fluctuation and the lensing potential both due to the string network. In our formulation, the evolution of the string network is assumed to be characterized by the simple analytic model, the velocity-dependent one scale model, and the intercommutation probability is properly incorporated in order to characterize the possible superstringy nature. Furthermore, the obtained power spectra are dominated by the Poisson-distributed string segments, whose correlations are assumed to satisfy the simple relations. We then estimate the signal-to-noise ratios of the string-induced ISW-lensing bispectra and discuss the detectability of such CMB signals from the cosmic string network. It is found that in the case of the smaller string tension, Gμ << 10{sup -7}, the ISW-lensing bispectrum induced by a cosmic string network can constrain the string-model parameters even more tightly than the purely GKS-induced bispectrum in the ongoing and future CMB observations on small scales.« less

  10. CMB ISW-lensing bispectrum from cosmic strings

    NASA Astrophysics Data System (ADS)

    Yamauchi, Daisuke; Sendouda, Yuuiti; Takahashi, Keitaro

    2014-02-01

    We study the effect of weak lensing by cosmic (super-)strings on the higher-order statistics of the cosmic microwave background (CMB). A cosmic string segment is expected to cause weak lensing as well as an integrated Sachs-Wolfe (ISW) effect, the so-called Gott-Kaiser-Stebbins (GKS) effect, to the CMB temperature fluctuation, which are thus naturally cross-correlated. We point out that, in the presence of such a correlation, yet another kind of the post-recombination CMB temperature bispectra, the ISW-lensing bispectra, will arise in the form of products of the auto- and cross-power spectra. We first present an analytic method to calculate the autocorrelation of the temperature fluctuations induced by the strings, and the cross-correlation between the temperature fluctuation and the lensing potential both due to the string network. In our formulation, the evolution of the string network is assumed to be characterized by the simple analytic model, the velocity-dependent one scale model, and the intercommutation probability is properly incorporated in order to characterize the possible superstringy nature. Furthermore, the obtained power spectra are dominated by the Poisson-distributed string segments, whose correlations are assumed to satisfy the simple relations. We then estimate the signal-to-noise ratios of the string-induced ISW-lensing bispectra and discuss the detectability of such CMB signals from the cosmic string network. It is found that in the case of the smaller string tension, Gμ << 10-7, the ISW-lensing bispectrum induced by a cosmic string network can constrain the string-model parameters even more tightly than the purely GKS-induced bispectrum in the ongoing and future CMB observations on small scales.

  11. Ghost vertices for the bosonic string using the group-theoretic approach to string theory

    NASA Astrophysics Data System (ADS)

    Freeman, M. D.; West, P.

    1988-04-01

    The N-string tree-level scattering vertices for the bosonic string are extended to include anticommuting (ghost) oscillators. These vertices behave correctly under the action of the BRST charge Q and reproduce the known results for the scattering of physical states. This work is an application of the group-theoretic approach to string theory. Permanent address: Mathematics Department, King's College, Strand, London WC2R 2LS, UK.

  12. Cosmic strings and galaxy formation

    NASA Technical Reports Server (NTRS)

    Bertschinger, Edmund

    1989-01-01

    The cosmogonical model proposed by Zel'dovich and Vilenkin (1981), in which superconducting cosmic strings act as seeds for the origin of structure in the universe, is discussed, summarizing the results of recent theoretical investigations. Consideration is given to the formation of cosmic strings, the microscopic structure of strings, gravitational effects, cosmic string evolution, and the formation of galaxies and large-scale structure. Simulation results are presented in graphs, and several outstanding issues are listed and briefly characterized.

  13. String Things.

    ERIC Educational Resources Information Center

    Mesa Public Schools, AZ.

    Designed for music educators instructing grades 4 through 8 in string instruments, this Mesa (Arizona) public schools guide presents information on the string curriculum, orchestras, and practicing. The goals and objectives for string instruments delineate grade levels and how student skills will be verified. Following 17 curriculum goal tests,…

  14. Embellished String Prints. Cover Story.

    ERIC Educational Resources Information Center

    Smith, Mary Ruth

    1999-01-01

    Focuses on a printmaking activity in which students create embellished string prints using the relief process of string glued to chip board. Explains that string prints can easily be embellished with oil pastels. Provides a description of the procedure and a list of materials and methods. (CMK)

  15. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marolf, Donald; Palmer, Belkis Cabrera; Physics Department, Syracuse University, Syracuse, New York 13244

    A thermodynamic argument is presented suggesting that near-extremal spinning D1-D5-P black strings become unstable when their angular momentum exceeds J{sub crit}=3Q{sub 1}Q{sub 5}/2{radical}(2). In contrast, the dimensionally reduced black holes are thermodynamically stable. The proposed instability involves a phase in which the spin angular momentum above J{sub crit} is transferred to gyration of the string in space, i.e., to orbital angular momentum of parts of the string about the mean location in space. Thus the string becomes a rotating helical coil. We note that an instability of this form would yield a counter-example to the Gubser-Mitra conjecture, which proposes amore » particular link between dynamic black string instabilities and the thermodynamics of black strings. There may also be other instabilities associated with radiation modes of various fields. Our arguments also apply to the D-brane bound states associated with these black strings in weakly coupled string theory.« less

  16. 32-Bit-Wide Memory Tolerates Failures

    NASA Technical Reports Server (NTRS)

    Buskirk, Glenn A.

    1990-01-01

    Electronic memory system of 32-bit words corrects bit errors caused by some common type of failures - even failure of entire 4-bit-wide random-access-memory (RAM) chip. Detects failure of two such chips, so user warned that ouput of memory may contain errors. Includes eight 4-bit-wide DRAM's configured so each bit of each DRAM assigned to different one of four parallel 8-bit words. Each DRAM contributes only 1 bit to each 8-bit word.

  17. Semiclassical (qft) and Quantum (string) Rotating Black Holes and Their Evaporation:. New Results

    NASA Astrophysics Data System (ADS)

    Bouchareb, A.; Ramón Medrano, M.; Sánchez, N. G.

    Combination of both quantum field theory (QFT) and string theory in curved backgrounds in a consistent framework, the string analogue model, allows us to provide a full picture of the Kerr-Newman black hole and its evaporation going beyond the current picture. We compute the quantum emission cross-section of strings by a Kerr-Newman black hole (KNbh). It shows the black hole emission at the Hawking temperature Tsem in the early stage of evaporation and the new string emission featuring a Hagedorn transition into a string state of temperature Ts at the last stages. New bounds on J and Q emerge in the quantum string regime (besides the known ones of the classical/semiclassical QFT regime). The last state of evaporation of a semiclassical Kerr-Newman black hole with mass M > mPl, angular momentum J and charge Q is a string state of temperature Ts, string mass Ms, J = 0 and Q = 0, decaying as usual quantum strings do into all kinds of particles. (Naturally, in this framework, there is no loss of information, (there is no paradox at all).) We compute the string entropy Ss(m, j) from the microscopic string density of states of mass m and spin mode j, ρ(m, j). (Besides the Hagedorn transition at Ts) we find for high j (extremal string states j → m2α‧c), a new phase transition at a temperature Tsj = √ {j/hbar }Ts, higher than Ts. By precisely identifying the semiclassical and quantum (string) gravity regimes, we find a new formula for the Kerr black hole entropy Ssem(M, J), as a function of the usual Bekenstein-Hawking entropy S sem(0). For M ≫ mPl and J < GM2/c, S sem(0) is the leading term, but for high angular momentum, (nearly extremal case J = GM2/c), a gravitational phase transition operates and the whole entropy Ssem is drastically different from the Bekenstein-Hawking entropy S sem(0). This new extremal black hole transition occurs at a temperature Tsem J = (J/ℏ)Tsem, higher than the Hawking temperature Tsem.

  18. A High-Throughput Processor for Flight Control Research Using Small UAVs

    NASA Technical Reports Server (NTRS)

    Klenke, Robert H.; Sleeman, W. C., IV; Motter, Mark A.

    2006-01-01

    There are numerous autopilot systems that are commercially available for small (<100 lbs) UAVs. However, they all share several key disadvantages for conducting aerodynamic research, chief amongst which is the fact that most utilize older, slower, 8- or 16-bit microcontroller technologies. This paper describes the development and testing of a flight control system (FCS) for small UAV s based on a modern, high throughput, embedded processor. In addition, this FCS platform contains user-configurable hardware resources in the form of a Field Programmable Gate Array (FPGA) that can be used to implement custom, application-specific hardware. This hardware can be used to off-load routine tasks such as sensor data collection, from the FCS processor thereby further increasing the computational throughput of the system.

  19. Visualizing a silicon quantum computer

    NASA Astrophysics Data System (ADS)

    Sanders, Barry C.; Hollenberg, Lloyd C. L.; Edmundson, Darran; Edmundson, Andrew

    2008-12-01

    Quantum computation is a fast-growing, multi-disciplinary research field. The purpose of a quantum computer is to execute quantum algorithms that efficiently solve computational problems intractable within the existing paradigm of 'classical' computing built on bits and Boolean gates. While collaboration between computer scientists, physicists, chemists, engineers, mathematicians and others is essential to the project's success, traditional disciplinary boundaries can hinder progress and make communicating the aims of quantum computing and future technologies difficult. We have developed a four minute animation as a tool for representing, understanding and communicating a silicon-based solid-state quantum computer to a variety of audiences, either as a stand-alone animation to be used by expert presenters or embedded into a longer movie as short animated sequences. The paper includes a generally applicable recipe for successful scientific animation production.

  20. Light Z' in heterotic string standardlike models

    NASA Astrophysics Data System (ADS)

    Athanasopoulos, P.; Faraggi, A. E.; Mehta, V. M.

    2014-05-01

    The discovery of the Higgs boson at the LHC supports the hypothesis that the Standard Model provides an effective parametrization of all subatomic experimental data up to the Planck scale. String theory, which provides a viable perturbative approach to quantum gravity, requires for its consistency the existence of additional gauge symmetries beyond the Standard Model. The construction of heterotic string models with a viable light Z' is, however, highly constrained. We outline the construction of standardlike heterotic string models that allow for an additional Abelian gauge symmetry that may remain unbroken down to low scales. We present a string inspired model, consistent with the string constraints.

  1. Scaling properties of cosmic (super)string networks

    NASA Astrophysics Data System (ADS)

    Martins, C. J. A. P.

    2014-10-01

    I use a combination of state-of-the-art numerical simulations and analytic modelling to discuss the scaling properties of cosmic defect networks, including superstrings. Particular attention is given to the role of extra degrees of freedom in the evolution of these networks. Compared to the 'plain vanilla' case of Goto-Nambu strings, three such extensions play important but distinct roles in the network dynamics: the presence of charges/currents on the string worldsheet, the existence of junctions, and the possibility of a hierarchy of string tensions. I also comment on insights gained from studying simpler defect networks, including Goto-Nambu strings themselves, domain walls and semilocal strings.

  2. Evolution of cosmic string networks

    NASA Technical Reports Server (NTRS)

    Albrecht, Andreas; Turok, Neil

    1989-01-01

    A discussion of the evolution and observable consequences of a network of cosmic strings is given. A simple model for the evolution of the string network is presented, and related to the statistical mechanics of string networks. The model predicts the long string density throughout the history of the universe from a single parameter, which researchers calculate in radiation era simulations. The statistical mechanics arguments indicate a particular thermal form for the spectrum of loops chopped off the network. Detailed numerical simulations of string networks in expanding backgrounds are performed to test the model. Consequences for large scale structure, the microwave and gravity wave backgrounds, nucleosynthesis and gravitational lensing are calculated.

  3. Gödel universes in string theory

    NASA Astrophysics Data System (ADS)

    Barrow, John D.; Dabrowski, Mariusz P.

    1998-11-01

    We show that homogeneous Gödel spacetimes need not contain closed timelike curves in low-energy-effective string theories. We find exact solutions for the Gödel metric in string theory for the full O(α') action including both dilaton and axion fields. The results are valid for bosonic, heterotic and super-strings. To first order in the inverse string tension α', these solutions display a simple relation between the angular velocity of the Gödel universe, Ω, and the inverse string tension of the form α'=1/Ω2 in the absence of the axion field. The generalization of this relationship is also found when the axion field is present.

  4. A note on closed-string interactions a la witten

    NASA Astrophysics Data System (ADS)

    Romans, L. J.

    1987-08-01

    We consider the problem of formulating a field theory of interacting closed strings analogous to Witten's open-string field theory. Two natural candidates have been suggested for an off-shell three-string interaction vertex: one scheme involves a cyclic geometric overlap in spacetime, while the other is obtained by ``stuttering'' the Fock-space realization of the open-string vertex. We demonstrate that these two approaches are in fact equivalent, utilizing the operator formalism as developed to describe Witten's theory. Implications of this result for the construction of closed-string theories are briefly discussed. Address after August 1, 1987: Department of Physics, University of Southern California, Los Angeles, CA 90089, USA.

  5. Reconstruction of piano hammer force from string velocity.

    PubMed

    Chaigne, Antoine

    2016-11-01

    A method is presented for reconstructing piano hammer forces through appropriate filtering of the measured string velocity. The filter design is based on the analysis of the pulses generated by the hammer blow and propagating along the string. In the five lowest octaves, the hammer force is reconstructed by considering two waves only: the incoming wave from the hammer and its first reflection at the front end. For the higher notes, four- or eight-wave schemes must be considered. The theory is validated on simulated string velocities by comparing imposed and reconstructed forces. The simulations are based on a nonlinear damped stiff string model previously developed by Chabassier, Chaigne, and Joly [J. Acoust. Soc. Am. 134(1), 648-665 (2013)]. The influence of absorption, dispersion, and amplitude of the string waves on the quality of the reconstruction is discussed. Finally, the method is applied to real piano strings. The measured string velocity is compared to the simulated velocity excited by the reconstructed force, showing a high degree of accuracy. A number of simulations are compared to simulated strings excited by a force derived from measurements of mass and acceleration of the hammer head. One application to an historic piano is also presented.

  6. Improving Upon String Methods for Transition State Discovery.

    PubMed

    Chaffey-Millar, Hugh; Nikodem, Astrid; Matveev, Alexei V; Krüger, Sven; Rösch, Notker

    2012-02-14

    Transition state discovery via application of string methods has been researched on two fronts. The first front involves development of a new string method, named the Searching String method, while the second one aims at estimating transition states from a discretized reaction path. The Searching String method has been benchmarked against a number of previously existing string methods and the Nudged Elastic Band method. The developed methods have led to a reduction in the number of gradient calls required to optimize a transition state, as compared to existing methods. The Searching String method reported here places new beads on a reaction pathway at the midpoint between existing beads, such that the resolution of the path discretization in the region containing the transition state grows exponentially with the number of beads. This approach leads to favorable convergence behavior and generates more accurate estimates of transition states from which convergence to the final transition states occurs more readily. Several techniques for generating improved estimates of transition states from a converged string or nudged elastic band have been developed and benchmarked on 13 chemical test cases. Optimization approaches for string methods, and pitfalls therein, are discussed.

  7. Adaptation of a RAS pathway activation signature from FF to FFPE tissues in colorectal cancer.

    PubMed

    Omolo, Bernard; Yang, Mingli; Lo, Fang Yin; Schell, Michael J; Austin, Sharon; Howard, Kellie; Madan, Anup; Yeatman, Timothy J

    2016-10-19

    The KRAS gene is mutated in about 40 % of colorectal cancer (CRC) cases, which has been clinically validated as a predictive mutational marker of intrinsic resistance to anti-EGFR inhibitor (EGFRi) therapy. Since nearly 60 % of patients with a wild type KRAS fail to respond to EGFRi combination therapies, there is a need to develop more reliable molecular signatures to better predict response. Here we address the challenge of adapting a gene expression signature predictive of RAS pathway activation, created using fresh frozen (FF) tissues, for use with more widely available formalin fixed paraffin-embedded (FFPE) tissues. In this study, we evaluated the translation of an 18-gene RAS pathway signature score from FF to FFPE in 54 CRC cases, using a head-to-head comparison of five technology platforms. FFPE-based technologies included the Affymetrix GeneChip (Affy), NanoString nCounter™ (NanoS), Illumina whole genome RNASeq (RNA-Acc), Illumina targeted RNASeq (t-RNA), and Illumina stranded Total RNA-rRNA-depletion (rRNA). Using Affy_FF as the "gold" standard, initial analysis of the 18-gene RAS scores on all 54 samples shows varying pairwise Spearman correlations, with (1) Affy_FFPE (r = 0.233, p = 0.090); (2) NanoS_FFPE (r = 0.608, p < 0.0001); (3) RNA-Acc_FFPE (r = 0.175, p = 0.21); (4) t-RNA_FFPE (r = -0.237, p = 0.085); (5) and t-RNA (r = -0.012, p = 0.93). These results suggest that only NanoString has successful FF to FFPE translation. The subsequent removal of identified "problematic" samples (n = 15) and genes (n = 2) further improves the correlations of Affy_FF with three of the five technologies: Affy_FFPE (r = 0.672, p < 0.0001); NanoS_FFPE (r = 0.738, p < 0.0001); and RNA-Acc_FFPE (r = 0.483, p = 0.002). Of the five technology platforms tested, NanoString technology provides a more faithful translation of the RAS pathway gene expression signature from FF to FFPE than the Affymetrix GeneChip and multiple RNASeq technologies. Moreover, NanoString was the most forgiving technology in the analysis of samples with presumably poor RNA quality. Using this approach, the RAS signature score may now be reasonably applied to FFPE clinical samples.

  8. Social Impacts Module (SIM) Transition

    DTIC Science & Technology

    2012-09-28

    User String The authorized user’s name to access the PAVE database. Applies only to Microsoft SQL Server; leave blank, otherwise. passwd String The...otherwise. passwd String The password if an authorized user’s name is required; otherwise, leave blank driver String The class name for the driver to

  9. Axion string dynamics I: 2+1D

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fleury, Leesa M.; Moore, Guy D.

    2016-05-03

    If the axion exists and if the initial axion field value is uncorrelated at causally disconnected points, then it should be possible to predict the efficiency of cosmological axion production, relating the axionic dark matter density to the axion mass. The main obstacle to making this prediction is correctly treating the axion string cores. We develop a new algorithm for treating the axionic string cores correctly in 2+1 dimensions. When the axionic string cores are given their full physical string tension, axion production is about twice as efficient as in previous simulations. We argue that the string network in 2+1more » dimensions should behave very differently than in 3+1 dimensions, so this result cannot be simply carried over to the physical case. We outline how to extend our method to 3+1D axion string dynamics.« less

  10. A numerical study of the string function using a primitive equation ocean model

    NASA Astrophysics Data System (ADS)

    Tyler, R. H.; Käse, R.

    We use results from a primitive-equation ocean numerical model (SCRUM) to test a theoretical 'string function' formulation put forward by Tyler and Käse in another article in this issue. The string function acts as a stream function for the large-scale potential energy flow under the combined beta and topographic effects. The model results verify that large-scale anomalies propagate along the string function contours with a speed correctly given by the cross-string gradient. For anomalies having a scale similar to the Rossby radius, material rates of change in the layer mass following the string velocity are balanced by material rates of change in relative vorticity following the flow velocity. It is shown that large-amplitude anomalies can be generated when wind stress is resonant with the string function configuration.

  11. Scattering of Cosmic Strings by Black Holes:. Loop Formation

    NASA Astrophysics Data System (ADS)

    Dubath, Florian; Sakellariadou, Mairi; Viallet, Claude Michel

    We study the deformation of a long cosmic string by a nearby rotating black hole. We examine whether the deformation of a cosmic string, induced by the gravitational field of a Kerr black hole, may lead to the formation of a string loop. The segment of the string which enters the ergo-sphere of a rotating black hole gets deformed and, if it is sufficiently twisted, it can self-intersect, chopping off a loop. We find that the formation of a loop, via such a mechanism, is a rare event. It will only arise in a small region of the collision phase space, which depends on the string velocity, the impact parameter and the black hole angular momentum. We conclude that, generically, a long cosmic string is simply scattered, or captured, by a nearby rotating black hole.

  12. Factorization of chiral string amplitudes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Huang, Yu-tin; Siegel, Warren; Yuan, Ellis Ye

    We re-examine a closed-string model defined by altering the boundary conditions for one handedness of two-dimensional propagators in otherwise-standard string theory. We evaluate the amplitudes using Kawai-Lewellen-Tye factorization into open-string amplitudes. The only modification to standard string theory is effectively that the spacetime Minkowski metric changes overall sign in one open-string factor. This cancels all but a finite number of states: as found in earlier approaches, with enough supersymmetry (e.g., type II) the tree amplitudes reproduce those of the massless truncation of ordinary string theory. However, we now find for the other cases that additional fields, formerly thought to bemore » auxiliary, describe new spin-2 states at the two adjacent mass levels (tachyonic and tardyonic). The tachyon is always a ghost, but can be avoided in the heterotic case.« less

  13. Factorization of chiral string amplitudes

    DOE PAGES

    Huang, Yu-tin; Siegel, Warren; Yuan, Ellis Ye

    2016-09-16

    We re-examine a closed-string model defined by altering the boundary conditions for one handedness of two-dimensional propagators in otherwise-standard string theory. We evaluate the amplitudes using Kawai-Lewellen-Tye factorization into open-string amplitudes. The only modification to standard string theory is effectively that the spacetime Minkowski metric changes overall sign in one open-string factor. This cancels all but a finite number of states: as found in earlier approaches, with enough supersymmetry (e.g., type II) the tree amplitudes reproduce those of the massless truncation of ordinary string theory. However, we now find for the other cases that additional fields, formerly thought to bemore » auxiliary, describe new spin-2 states at the two adjacent mass levels (tachyonic and tardyonic). The tachyon is always a ghost, but can be avoided in the heterotic case.« less

  14. Pauses enhance chunk recognition in song element strings by zebra finches.

    PubMed

    Spierings, Michelle; de Weger, Anouk; Ten Cate, Carel

    2015-07-01

    When learning a language, it is crucial to know which syllables of a continuous sound string belong together as words. Human infants achieve this by attending to pauses between words or to the co-occurrence of syllables. It is not only humans that can segment a continuous string. Songbirds learning their song tend to copy 'chunks' from one or more tutors' songs and combine these into their own song. In the tutor songs, these chunks are often separated by pauses and a high co-occurrence of elements, suggesting that these features affect chunking and song learning. We examined experimentally whether the presence of pauses and element co-occurrence affect the ability of adult zebra finches to discriminate strings of song elements. Using a go/no-go design, two groups of birds were trained to discriminate between two strings. In one group (Pause-group), pauses were inserted between co-occurring element triplets in the strings, and in the other group (No-pause group), both strings were continuous. After making a correct discrimination, an individual proceeded to a reversal training using string segments. Segments were element triplets consistent in co-occurrence, triplets that were partly consistent in composition and triplets consisting of elements that did not co-occur in the strings. The Pause-group was faster in discriminating between the two strings. This group also responded differently to consistent triplets in the reversal training, compared to inconsistent triplets. The No-pause group did not differentiate among the triplet types. These results indicate that pauses in strings of song elements aid song discrimination and memorization of co-occurring element groups.

  15. From the currency rate quotations onto strings and brane world scenarios

    NASA Astrophysics Data System (ADS)

    Horváth, D.; Pincak, R.

    2012-11-01

    In the paper, we study the projections of the real exchange rate dynamics onto the string-like topology. Our approach is inspired by the contemporary movements in the string theory. The string map of data is defined here by the boundary conditions, characteristic length, real valued and the method of redistribution of information. As a practical matter, this map represents the detrending and data standardization procedure. We introduced maps onto 1-end-point and 2-end-point open strings that satisfy the Dirichlet and Neumann boundary conditions. The questions of the choice of extra-dimensions, symmetries, duality and ways to the partial compactification are discussed. Subsequently, we pass to higher dimensional and more complex objects. The 2D-Brane was suggested which incorporated bid-ask spreads. Polarization by the spread was considered which admitted analyzing arbitrage opportunities on the market where transaction costs are taken into account. The model of the rotating string which naturally yields calculation of angular momentum is suitable for tracking of several currency pairs. The systematic way which allows one suggest more structured maps suitable for a simultaneous study of several currency pairs was analyzed by means of the Gâteaux generalized differential calculus. The effect of the string and brane maps on test data was studied by comparing their mean statistical characteristics. The study revealed notable differences between topologies. We review the dependence on the characteristic string length, mean fluctuations and properties of the intra-string statistics. The study explores the coupling of the string amplitude and volatility. The possible utilizations of the string theory approach in financial markets are slight.

  16. Haptic Distal Spatial Perception Mediated by Strings: Haptic "Looming"

    ERIC Educational Resources Information Center

    Cabe, Patrick A.

    2011-01-01

    Five experiments tested a haptic analog of optical looming, demonstrating string-mediated haptic distal spatial perception. Horizontally collinear hooks supported a weighted string held taut by a blindfolded participant's finger midway between the hooks. At the finger, the angle between string segments increased as the finger approached…

  17. Effect of PDC bit design and confining pressure on bit-balling tendencies while drilling shale using water base mud

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hariharan, P.R.; Azar, J.J.

    1996-09-01

    A good majority of all oilwell drilling occurs in shale and other clay-bearing rocks. In the light of relatively fewer studies conducted, the problem of bit-balling in PDC bits while drilling shale has been addressed with the primary intention of attempting to quantify the degree of balling, as well as to investigate the influence of bit design and confining pressures. A series of full-scale laboratory drilling tests under simulated down hole conditions were conducted utilizing seven different PDC bits in Catoosa shale. Test results have indicated that the non-dimensional parameter R{sub d} [(bit torque).(weight-on-bit)/(bit diameter)] is a good indicator ofmore » the degree of bit-balling and that it correlated well with Specific-Energy. Furthermore, test results have shown bit-profile and bit-hydraulic design to be key parameters of bit design that dictate the tendency of balling in shales under a given set of operating conditions. A bladed bit was noticed to ball less compared to a ribbed or open-faced bit. Likewise, related to bit profile, test results have indicated that the parabolic profile has a lesser tendency to ball compared to round and flat profiles. The tendency of PDC bits to ball was noticed to increase with increasing confining pressures for the set of drilling conditions used.« less

  18. Wireless recording systems: from noninvasive EEG-NIRS to invasive EEG devices.

    PubMed

    Sawan, Mohamad; Salam, Muhammad T; Le Lan, Jérôme; Kassab, Amal; Gelinas, Sébastien; Vannasing, Phetsamone; Lesage, Frédéric; Lassonde, Maryse; Nguyen, Dang K

    2013-04-01

    In this paper, we present the design and implementation of a wireless wearable electronic system dedicated to remote data recording for brain monitoring. The reported wireless recording system is used for a) simultaneous near-infrared spectrometry (NIRS) and scalp electro-encephalography (EEG) for noninvasive monitoring and b) intracerebral EEG (icEEG) for invasive monitoring. Bluetooth and dual radio links were introduced for these recordings. The Bluetooth-based device was embedded in a noninvasive multichannel EEG-NIRS system for easy portability and long-term monitoring. On the other hand, the 32-channel implantable recording device offers 24-bit resolution, tunable features, and a sampling frequency up to 2 kHz per channel. The analog front-end preamplifier presents low input-referred noise of 5 μ VRMS and a signal-to-noise ratio of 112 dB. The communication link is implemented using a dual-band radio frequency transceiver offering a half-duplex 800 kb/s data rate, 16.5 mW power consumption and less than 10(-10) post-correction Bit-Error Rate (BER). The designed system can be accessed and controlled by a computer with a user-friendly graphical interface. The proposed wireless implantable recording device was tested in vitro using real icEEG signals from two patients with refractory epilepsy. The wirelessly recorded signals were compared to the original signals recorded using wired-connection, and measured normalized root-mean square deviation was under 2%.

  19. Form cues and content difficulty as determinants of children's cognitive processing of televised educational messages.

    PubMed

    Campbell, T A; Wright, J C; Huston, A C

    1987-06-01

    An experiment was designed to assess the effects of formal production features and content difficulty on children's processing of televised messages about nutrition. Messages with identical content (the same script and visual shot sequence) were made in two forms: child program forms (animated film, second-person address, and character voice narration with sprightly music) and adult program forms (live photography, third-person address, and adult male narration with sedate background music). For each form, messages were made at three levels of content difficulty. Easier versions were longer, more redundant, and used simpler language; difficult versions presented information more quickly with less redundancy and more abstract language. Regardless of form or difficulty level, each set of bits presented the same basic information. Kindergarten children (N = 120) were assigned to view three different bits of the same form type and difficulty embedded in a miniprogram. Visual attention to child forms was significantly greater than to adult forms; free and cued recall scores were also higher for child than for adult forms. Although all recall and recognition scores were best for easy versions and worst for difficult versions, attention showed only minor variation as a function of content difficulty. Results are interpreted to indicate that formal production features, independently of content, influence the effort and level of processing that children use to understand televised educational messages.

  20. Tilted string cosmologies

    NASA Astrophysics Data System (ADS)

    Clancy, Dominic; Feinstein, Alexander; Lidsey, James E.; Tavakol, Reza

    1999-04-01

    Global symmetries of the string effective action are employed to generate tilted, homogeneous Bianchi type VIh string cosmologies from a previously known stiff perfect fluid solution to Einstein gravity. The dilaton field is not constant on the surfaces of homogeneity. The future asymptotic state of the models is interpreted as a plane wave and is itself an exact solution to the string equations of motion to all orders in the inverse string tension. An inhomogeneous generalization of the Bianchi type III model is also found.

  1. Oriented matroids—combinatorial structures underlying loop quantum gravity

    NASA Astrophysics Data System (ADS)

    Brunnemann, Johannes; Rideout, David

    2010-10-01

    We analyze combinatorial structures which play a central role in determining spectral properties of the volume operator (Ashtekar A and Lewandowski J 1998 Adv. Theor. Math. Phys. 1 388) in loop quantum gravity (LQG). These structures encode geometrical information of the embedding of arbitrary valence vertices of a graph in three-dimensional Riemannian space and can be represented by sign strings containing relative orientations of embedded edges. We demonstrate that these signature factors are a special representation of the general mathematical concept of an oriented matroid (Ziegler G M 1998 Electron. J. Comb.; Björner A et al 1999 Oriented Matroids (Cambridge: Cambridge University Press)). Moreover, we show that oriented matroids can also be used to describe the topology (connectedness) of directed graphs. Hence, the mathematical methods developed for oriented matroids can be applied to the difficult combinatorics of embedded graphs underlying the construction of LQG. As a first application we revisit the analysis of Brunnemann and Rideout (2008 Class. Quantum Grav. 25 065001 and 065002), and find that enumeration of all possible sign configurations used there is equivalent to enumerating all realizable oriented matroids of rank 3 (Ziegler G M 1998 Electron. J. Comb.; Björner A et al 1999 Oriented Matroids (Cambridge: Cambridge University Press)), and thus can be greatly simplified. We find that for 7-valent vertices having no coplanar triples of edge tangents, the smallest non-zero eigenvalue of the volume spectrum does not grow as one increases the maximum spin jmax at the vertex, for any orientation of the edge tangents. This indicates that, in contrast to the area operator, considering large jmax does not necessarily imply large volume eigenvalues. In addition we give an outlook to possible starting points for rewriting the combinatorics of LQG in terms of oriented matroids.

  2. Propagating stress-pulses and wiggling transition revealed in string dynamics

    NASA Astrophysics Data System (ADS)

    Yao, Zhenwei

    2018-02-01

    Understanding string dynamics yields insights into the intricate dynamic behaviors of various filamentary thin structures in nature and industry covering multiple length scales. In this work, we investigate the planar dynamics of a flexible string where one end is free and the other end is subject to transverse and longitudinal motions. Under transverse harmonic motion, we reveal the propagating pulse structure in the stress profile over the string, and analyze its role in bringing the system into a chaotic state. For a string where one end is under longitudinal uniform acceleration, we identify the wiggling transition, derive the analytical wiggling solution from the string equations, and present the phase diagram.

  3. Noncommutative-geometry model for closed bosonic strings

    NASA Technical Reports Server (NTRS)

    Sen, Siddhartha; Holman, R.

    1987-01-01

    It is shown how Witten's (1986) noncommutative geometry may be extended to describe the closed bosonic string. For closed strings, an explicit representation is provided of the integral operator needed to construct an action and of an associative product on string fields. The proper choice of the action of the integral operator and the associative product in order to give rise to a reasonable theory is explained, and the consequences of such a choice are discussed. It is shown that the ghost numbers of the operator and associative product can be chosen arbitrarily for both open and closed strings, and that this construct can be used as an action for interacting closed bosonic strings.

  4. Surface operators from M -strings

    NASA Astrophysics Data System (ADS)

    Mori, Hironori; Sugimoto, Yuji

    2017-01-01

    It has been found that surface operators have a significant role in Alday-Gaiotto-Tachikawa (AGT) relation. This duality is an outstanding consequence of M -theory, but it is actually encoded into the brane web for which the topological string can work. From this viewpoint, the surface defect in AGT relation is geometrically engineered as a toric brane realization. Also, there is a class of the brane configuration in M -theory called M -strings which can be translated into the language of the topological string. In this work, we propose a new M -string configuration which can realize AGT relation in the presence of the surface defect by utilizing the geometric transition in the refined topological string.

  5. Voltage-Matched, Monolithic, Multi-Band-Gap Devices

    DOEpatents

    Wanlass, M. W.; Mascarenhas, A.

    2006-08-22

    Monolithic, tandem, photonic cells include at least a first semiconductor layer and a second semiconductor layer, wherein each semiconductor layer includes an n-type region, a p-type region, and a given band-gap energy. Formed within each semiconductor layer is a string of electrically connected photonic sub-cells. By carefully selecting the numbers of photonic sub-cells in the first and second layer photonic sub-cell string(s), and by carefully selecting the manner in which the sub-cells in a first and second layer photonic sub-cell string(s) are electrically connected, each of the first and second layer sub-cell strings may be made to achieve one or more substantially identical electrical characteristics.

  6. Theoretical prediction and impact of fundamental electric dipole moments

    DOE PAGES

    Ellis, Sebastian A. R.; Kane, Gordon L.

    2016-01-13

    The predicted Standard Model (SM) electric dipole moments (EDMs) of electrons and quarks are tiny, providing an important window to observe new physics. Theories beyond the SM typically allow relatively large EDMs. The EDMs depend on the relative phases of terms in the effective Lagrangian of the extended theory, which are generally unknown. Underlying theories, such as string/M-theories compactified to four dimensions, could predict the phases and thus EDMs in the resulting supersymmetric (SUSY) theory. Earlier one of us, with collaborators, made such a prediction and found, unexpectedly, that the phases were predicted to be zero at tree level inmore » the theory at the unification or string scale ~O(10 16 GeV). Electroweak (EW) scale EDMs still arise via running from the high scale, and depend only on the SM Yukawa couplings that also give the CKM phase. Here we extend the earlier work by studying the dependence of the low scale EDMs on the constrained but not fully known fundamental Yukawa couplings. The dominant contribution is from two loop diagrams and is not sensitive to the choice of Yukawa texture. The electron EDM should not be found to be larger than about 5 × 10 –30e cm, and the neutron EDM should not be larger than about 5 × 10 –29e cm. These values are quite a bit smaller than the reported predictions from Split SUSY and typical effective theories, but much larger than the Standard Model prediction. Also, since models with random phases typically give much larger EDMs, it is a significant testable prediction of compactified M-theory that the EDMs should not be above these upper limits. The actual EDMs can be below the limits, so once they are measured they could provide new insight into the fundamental Yukawa couplings of leptons and quarks. As a result, we comment also on the role of strong CP violation. EDMs probe fundamental physics near the Planck scale.« less

  7. Theoretical prediction and impact of fundamental electric dipole moments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ellis, Sebastian A. R.; Kane, Gordon L.

    The predicted Standard Model (SM) electric dipole moments (EDMs) of electrons and quarks are tiny, providing an important window to observe new physics. Theories beyond the SM typically allow relatively large EDMs. The EDMs depend on the relative phases of terms in the effective Lagrangian of the extended theory, which are generally unknown. Underlying theories, such as string/M-theories compactified to four dimensions, could predict the phases and thus EDMs in the resulting supersymmetric (SUSY) theory. Earlier one of us, with collaborators, made such a prediction and found, unexpectedly, that the phases were predicted to be zero at tree level inmore » the theory at the unification or string scale ~O(10 16 GeV). Electroweak (EW) scale EDMs still arise via running from the high scale, and depend only on the SM Yukawa couplings that also give the CKM phase. Here we extend the earlier work by studying the dependence of the low scale EDMs on the constrained but not fully known fundamental Yukawa couplings. The dominant contribution is from two loop diagrams and is not sensitive to the choice of Yukawa texture. The electron EDM should not be found to be larger than about 5 × 10 –30e cm, and the neutron EDM should not be larger than about 5 × 10 –29e cm. These values are quite a bit smaller than the reported predictions from Split SUSY and typical effective theories, but much larger than the Standard Model prediction. Also, since models with random phases typically give much larger EDMs, it is a significant testable prediction of compactified M-theory that the EDMs should not be above these upper limits. The actual EDMs can be below the limits, so once they are measured they could provide new insight into the fundamental Yukawa couplings of leptons and quarks. As a result, we comment also on the role of strong CP violation. EDMs probe fundamental physics near the Planck scale.« less

  8. Identifying uniformly mutated segments within repeats.

    PubMed

    Sahinalp, S Cenk; Eichler, Evan; Goldberg, Paul; Berenbrink, Petra; Friedetzky, Tom; Ergun, Funda

    2004-12-01

    Given a long string of characters from a constant size alphabet we present an algorithm to determine whether its characters have been generated by a single i.i.d. random source. More specifically, consider all possible n-coin models for generating a binary string S, where each bit of S is generated via an independent toss of one of the n coins in the model. The choice of which coin to toss is decided by a random walk on the set of coins where the probability of a coin change is much lower than the probability of using the same coin repeatedly. We present a procedure to evaluate the likelihood of a n-coin model for given S, subject a uniform prior distribution over the parameters of the model (that represent mutation rates and probabilities of copying events). In the absence of detailed prior knowledge of these parameters, the algorithm can be used to determine whether the a posteriori probability for n=1 is higher than for any other n>1. Our algorithm runs in time O(l4logl), where l is the length of S, through a dynamic programming approach which exploits the assumed convexity of the a posteriori probability for n. Our test can be used in the analysis of long alignments between pairs of genomic sequences in a number of ways. For example, functional regions in genome sequences exhibit much lower mutation rates than non-functional regions. Because our test provides means for determining variations in the mutation rate, it may be used to distinguish functional regions from non-functional ones. Another application is in determining whether two highly similar, thus evolutionarily related, genome segments are the result of a single copy event or of a complex series of copy events. This is particularly an issue in evolutionary studies of genome regions rich with repeat segments (especially tandemly repeated segments).

  9. Proper nozzle location, bit profile, and cutter arrangement affect PDC-bit performance significantly

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Garcia-Gavito, D.; Azar, J.J.

    1994-09-01

    During the past 20 years, the drilling industry has looked to new technology to halt the exponentially increasing costs of drilling oil, gas, and geothermal wells. This technology includes bit design innovations to improve overall drilling performance and reduce drilling costs. These innovations include development of drag bits that use PDC cutters, also called PDC bits, to drill long, continuous intervals of soft to medium-hard formations more economically than conventional three-cone roller-cone bits. The cost advantage is the result of higher rates of penetration (ROP's) and longer bit life obtained with the PDC bits. An experimental study comparing the effectsmore » of polycrystalline-diamond-compact (PDC)-bit design features on the dynamic pressure distribution at the bit/rock interface was conducted on a full-scale drilling rig. Results showed that nozzle location, bit profile, and cutter arrangement are significant factors in PDC-bit performance.« less

  10. Non-perturbative String Theory from Water Waves

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Iyer, Ramakrishnan; Johnson, Clifford V.; /Southern California U.

    2012-06-14

    We use a combination of a 't Hooft limit and numerical methods to find non-perturbative solutions of exactly solvable string theories, showing that perturbative solutions in different asymptotic regimes are connected by smooth interpolating functions. Our earlier perturbative work showed that a large class of minimal string theories arise as special limits of a Painleve IV hierarchy of string equations that can be derived by a similarity reduction of the dispersive water wave hierarchy of differential equations. The hierarchy of string equations contains new perturbative solutions, some of which were conjectured to be the type IIA and IIB string theoriesmore » coupled to (4, 4k ? 2) superconformal minimal models of type (A, D). Our present paper shows that these new theories have smooth non-perturbative extensions. We also find evidence for putative new string theories that were not apparent in the perturbative analysis.« less

  11. The Neural Substrates for Letter String Readings in The Normal and Reverse Directions: An fMRI Study

    NASA Astrophysics Data System (ADS)

    Ge, Sheng; Saito, Takashi; Wu, Jing-Long; Ogasawara, Jun-Ichi; Yamauchi, Shuichi; Matsunaga, Naofumi; Iramina, Keiji

    In order to investigate the difference in cortical activations between reading letter strings in the normal direction and the reverse direction, an fMRI study was conducted. In this study, the cortical activations elicited by Japanese letter string reading and Chinese letter string reading were investigated. The subjects performed the normal direction reading task (read letter strings from left to right), and the reverse direction reading task (read letter strings from right to left). According to the experimental results, the activated brain regions during the normal and the reverse direction reading tasks were compared. It was found that visuospatial transformation was involved in the reverse direction reading task, while this function was not significant during the normal direction reading task. Furthermore, we found that there was no significant difference in cortical activation between Japanese and Chinese letter string readings.

  12. Constraints on Cosmic Strings from the LIGO-Virgo Gravitational-Wave Detectors

    NASA Astrophysics Data System (ADS)

    Aasi, J.; Abadie, J.; Abbott, B. P.; Abbott, R.; Abbott, T.; Abernathy, M. R.; Accadia, T.; Acernese, F.; Adams, C.; Adams, T.; Adhikari, R. X.; Affeldt, C.; Agathos, M.; Aggarwal, N.; Aguiar, O. D.; Ajith, P.; Allen, B.; Allocca, A.; Amador Ceron, E.; Amariutei, D.; Anderson, R. A.; Anderson, S. B.; Anderson, W. G.; Arai, K.; Araya, M. C.; Arceneaux, C.; Areeda, J.; Ast, S.; Aston, S. M.; Astone, P.; Aufmuth, P.; Aulbert, C.; Austin, L.; Aylott, B. E.; Babak, S.; Baker, P. T.; Ballardin, G.; Ballmer, S. W.; Barayoga, J. C.; Barker, D.; Barnum, S. H.; Barone, F.; Barr, B.; Barsotti, L.; Barsuglia, M.; Barton, M. A.; Bartos, I.; Bassiri, R.; Basti, A.; Batch, J.; Bauchrowitz, J.; Bauer, Th. S.; Bebronne, M.; Behnke, B.; Bejger, M.; Beker, M. G.; Bell, A. S.; Bell, C.; Belopolski, I.; Bergmann, G.; Berliner, J. M.; Bersanetti, D.; Bertolini, A.; Bessis, D.; Betzwieser, J.; Beyersdorf, P. T.; Bhadbhade, T.; Bilenko, I. A.; Billingsley, G.; Birch, J.; Bitossi, M.; Bizouard, M. A.; Black, E.; Blackburn, J. K.; Blackburn, L.; Blair, D.; Blom, M.; Bock, O.; Bodiya, T. P.; Boer, M.; Bogan, C.; Bond, C.; Bondu, F.; Bonelli, L.; Bonnand, R.; Bork, R.; Born, M.; Boschi, V.; Bose, S.; Bosi, L.; Bowers, J.; Bradaschia, C.; Brady, P. R.; Braginsky, V. B.; Branchesi, M.; Brannen, C. A.; Brau, J. E.; Breyer, J.; Briant, T.; Bridges, D. O.; Brillet, A.; Brinkmann, M.; Brisson, V.; Britzger, M.; Brooks, A. F.; Brown, D. A.; Brown, D. D.; Brückner, F.; Bulik, T.; Bulten, H. J.; Buonanno, A.; Buskulic, D.; Buy, C.; Byer, R. L.; Cadonati, L.; Cagnoli, G.; Calderón Bustillo, J.; Calloni, E.; Camp, J. B.; Campsie, P.; Cannon, K. C.; Canuel, B.; Cao, J.; Capano, C. D.; Carbognani, F.; Carbone, L.; Caride, S.; Castiglia, A.; Caudill, S.; Cavaglià, M.; Cavalier, F.; Cavalieri, R.; Cella, G.; Cepeda, C.; Cesarini, E.; Chakraborty, R.; Chalermsongsak, T.; Chao, S.; Charlton, P.; Chassande-Mottin, E.; Chen, X.; Chen, Y.; Chincarini, A.; Chiummo, A.; Cho, H. S.; Chow, J.; Christensen, N.; Chu, Q.; Chua, S. S. Y.; Chung, S.; Ciani, G.; Clara, F.; Clark, D. E.; Clark, J. A.; Cleva, F.; Coccia, E.; Cohadon, P.-F.; Colla, A.; Colombini, M.; Constancio, M.; Conte, A.; Conte, R.; Cook, D.; Corbitt, T. R.; Cordier, M.; Cornish, N.; Corsi, A.; Costa, C. A.; Coughlin, M. W.; Coulon, J.-P.; Countryman, S.; Couvares, P.; Coward, D. M.; Cowart, M.; Coyne, D. C.; Craig, K.; Creighton, J. D. E.; Creighton, T. D.; Crowder, S. G.; Cumming, A.; Cunningham, L.; Cuoco, E.; Dahl, K.; Canton, T. Dal; Damjanic, M.; Danilishin, S. L.; D'Antonio, S.; Danzmann, K.; Dattilo, V.; Daudert, B.; Daveloza, H.; Davier, M.; Davies, G. S.; Daw, E. J.; Day, R.; Dayanga, T.; De Rosa, R.; Debreczeni, G.; Degallaix, J.; Del Pozzo, W.; Deleeuw, E.; Deléglise, S.; Denker, T.; Dent, T.; Dereli, H.; Dergachev, V.; DeRosa, R.; DeSalvo, R.; Dhurandhar, S.; Di Fiore, L.; Di Lieto, A.; Di Palma, I.; Di Virgilio, A.; Díaz, M.; Dietz, A.; Dmitry, K.; Donovan, F.; Dooley, K. L.; Doravari, S.; Drago, M.; Drever, R. W. P.; Driggers, J. C.; Du, Z.; Dumas, J.-C.; Dwyer, S.; Eberle, T.; Edwards, M.; Effler, A.; Ehrens, P.; Eichholz, J.; Eikenberry, S. S.; Endrőczi, G.; Essick, R.; Etzel, T.; Evans, K.; Evans, M.; Evans, T.; Factourovich, M.; Fafone, V.; Fairhurst, S.; Fang, Q.; Farinon, S.; Farr, B.; Farr, W.; Favata, M.; Fazi, D.; Fehrmann, H.; Feldbaum, D.; Ferrante, I.; Ferrini, F.; Fidecaro, F.; Finn, L. S.; Fiori, I.; Fisher, R.; Flaminio, R.; Foley, E.; Foley, S.; Forsi, E.; Fotopoulos, N.; Fournier, J.-D.; Franco, S.; Frasca, S.; Frasconi, F.; Frede, M.; Frei, M.; Frei, Z.; Freise, A.; Frey, R.; Fricke, T. T.; Fritschel, P.; Frolov, V. V.; Fujimoto, M.-K.; Fulda, P.; Fyffe, M.; Gair, J.; Gammaitoni, L.; Garcia, J.; Garufi, F.; Gehrels, N.; Gemme, G.; Genin, E.; Gennai, A.; Gergely, L.; Ghosh, S.; Giaime, J. A.; Giampanis, S.; Giardina, K. D.; Giazotto, A.; Gil-Casanova, S.; Gill, C.; Gleason, J.; Goetz, E.; Goetz, R.; Gondan, L.; González, G.; Gordon, N.; Gorodetsky, M. L.; Gossan, S.; Goßler, S.; Gouaty, R.; Graef, C.; Graff, P. B.; Granata, M.; Grant, A.; Gras, S.; Gray, C.; Greenhalgh, R. J. S.; Gretarsson, A. M.; Griffo, C.; Groot, P.; Grote, H.; Grover, K.; Grunewald, S.; Guidi, G. M.; Guido, C.; Gushwa, K. E.; Gustafson, E. K.; Gustafson, R.; Hall, B.; Hall, E.; Hammer, D.; Hammond, G.; Hanke, M.; Hanks, J.; Hanna, C.; Hanson, J.; Harms, J.; Harry, G. M.; Harry, I. W.; Harstad, E. D.; Hartman, M. T.; Haughian, K.; Hayama, K.; Heefner, J.; Heidmann, A.; Heintze, M.; Heitmann, H.; Hello, P.; Hemming, G.; Hendry, M.; Heng, I. S.; Heptonstall, A. W.; Heurs, M.; Hild, S.; Hoak, D.; Hodge, K. A.; Holt, K.; Holtrop, M.; Hong, T.; Hooper, S.; Horrom, T.; Hosken, D. J.; Hough, J.; Howell, E. J.; Hu, Y.; Hua, Z.; Huang, V.; Huerta, E. A.; Hughey, B.; Husa, S.; Huttner, S. H.; Huynh, M.; Huynh-Dinh, T.; Iafrate, J.; Ingram, D. R.; Inta, R.; Isogai, T.; Ivanov, A.; Iyer, B. R.; Izumi, K.; Jacobson, M.; James, E.; Jang, H.; Jang, Y. J.; Jaranowski, P.; Jiménez-Forteza, F.; Johnson, W. W.; Jones, D.; Jones, D. I.; Jones, R.; Jonker, R. J. G.; Ju, L.; Haris, K.; Kalmus, P.; Kalogera, V.; Kandhasamy, S.; Kang, G.; Kanner, J. B.; Kasprzack, M.; Kasturi, R.; Katsavounidis, E.; Katzman, W.; Kaufer, H.; Kaufman, K.; Kawabe, K.; Kawamura, S.; Kawazoe, F.; Kéfélian, F.; Keitel, D.; Kelley, D. B.; Kells, W.; Keppel, D. G.; Khalaidovski, A.; Khalili, F. Y.; Khazanov, E. A.; Kim, B. K.; Kim, C.; Kim, K.; Kim, N.; Kim, W.; Kim, Y.-M.; King, E. J.; King, P. J.; Kinzel, D. L.; Kissel, J. S.; Klimenko, S.; Kline, J.; Koehlenbeck, S.; Kokeyama, K.; Kondrashov, V.; Koranda, S.; Korth, W. Z.; Kowalska, I.; Kozak, D.; Kremin, A.; Kringel, V.; Królak, A.; Kucharczyk, C.; Kudla, S.; Kuehn, G.; Kumar, A.; Kumar, P.; Kumar, R.; Kurdyumov, R.; Kwee, P.; Landry, M.; Lantz, B.; Larson, S.; Lasky, P. D.; Lawrie, C.; Lazzarini, A.; Le Roux, A.; Leaci, P.; Lebigot, E. O.; Lee, C.-H.; Lee, H. K.; Lee, H. M.; Lee, J.; Lee, J.; Leonardi, M.; Leong, J. R.; Leroy, N.; Letendre, N.; Levine, B.; Lewis, J. B.; Lhuillier, V.; Li, T. G. F.; Lin, A. C.; Littenberg, T. B.; Litvine, V.; Liu, F.; Liu, H.; Liu, Y.; Liu, Z.; Lloyd, D.; Lockerbie, N. A.; Lockett, V.; Lodhia, D.; Loew, K.; Logue, J.; Lombardi, A. L.; Lorenzini, M.; Loriette, V.; Lormand, M.; Losurdo, G.; Lough, J.; Luan, J.; Lubinski, M. J.; Lück, H.; Lundgren, A. P.; Macarthur, J.; Macdonald, E.; Machenschalk, B.; MacInnis, M.; Macleod, D. M.; Magana-Sandoval, F.; Mageswaran, M.; Mailand, K.; Majorana, E.; Maksimovic, I.; Malvezzi, V.; Man, N.; Manca, G. M.; Mandel, I.; Mandic, V.; Mangano, V.; Mantovani, M.; Marchesoni, F.; Marion, F.; Márka, S.; Márka, Z.; Markosyan, A.; Maros, E.; Marque, J.; Martelli, F.; Martin, I. W.; Martin, R. M.; Martinelli, L.; Martynov, D.; Marx, J. N.; Mason, K.; Masserot, A.; Massinger, T. J.; Matichard, F.; Matone, L.; Matzner, R. A.; Mavalvala, N.; May, G.; Mazumder, N.; Mazzolo, G.; McCarthy, R.; McClelland, D. E.; McGuire, S. C.; McIntyre, G.; McIver, J.; Meacher, D.; Meadors, G. D.; Mehmet, M.; Meidam, J.; Meier, T.; Melatos, A.; Mendell, G.; Mercer, R. A.; Meshkov, S.; Messenger, C.; Meyer, M. S.; Miao, H.; Michel, C.; Mikhailov, E. E.; Milano, L.; Miller, J.; Minenkov, Y.; Mingarelli, C. M. F.; Mitra, S.; Mitrofanov, V. P.; Mitselmakher, G.; Mittleman, R.; Moe, B.; Mohan, M.; Mohapatra, S. R. P.; Mokler, F.; Moraru, D.; Moreno, G.; Morgado, N.; Mori, T.; Morriss, S. R.; Mossavi, K.; Mours, B.; Mow-Lowry, C. M.; Mueller, C. L.; Mueller, G.; Mukherjee, S.; Mullavey, A.; Munch, J.; Murphy, D.; Murray, P. G.; Mytidis, A.; Nagy, M. F.; Nanda Kumar, D.; Nardecchia, I.; Nash, T.; Naticchioni, L.; Nayak, R.; Necula, V.; Nelemans, G.; Neri, I.; Neri, M.; Newton, G.; Nguyen, T.; Nishida, E.; Nishizawa, A.; Nitz, A.; Nocera, F.; Nolting, D.; Normandin, M. E.; Nuttall, L. K.; Ochsner, E.; O'Dell, J.; Oelker, E.; Ogin, G. H.; Oh, J. J.; Oh, S. H.; Ohme, F.; Oppermann, P.; O'Reilly, B.; Ortega Larcher, W.; O'Shaughnessy, R.; Osthelder, C.; Ott, C. D.; Ottaway, D. J.; Ottens, R. S.; Ou, J.; Overmier, H.; Owen, B. J.; Padilla, C.; Pai, A.; Palomba, C.; Pan, Y.; Pankow, C.; Paoletti, F.; Paoletti, R.; Papa, M. A.; Paris, H.; Pasqualetti, A.; Passaquieti, R.; Passuello, D.; Pedraza, M.; Peiris, P.; Penn, S.; Perreca, A.; Phelps, M.; Pichot, M.; Pickenpack, M.; Piergiovanni, F.; Pierro, V.; Pinard, L.; Pindor, B.; Pinto, I. M.; Pitkin, M.; Poeld, J.; Poggiani, R.; Poole, V.; Poux, C.; Predoi, V.; Prestegard, T.; Price, L. R.; Prijatelj, M.; Principe, M.; Privitera, S.; Prix, R.; Prodi, G. A.; Prokhorov, L.; Puncken, O.; Punturo, M.; Puppo, P.; Quetschke, V.; Quintero, E.; Quitzow-James, R.; Raab, F. J.; Rabeling, D. S.; Rácz, I.; Radkins, H.; Raffai, P.; Raja, S.; Rajalakshmi, G.; Rakhmanov, M.; Ramet, C.; Rapagnani, P.; Raymond, V.; Re, V.; Reed, C. M.; Reed, T.; Regimbau, T.; Reid, S.; Reitze, D. H.; Ricci, F.; Riesen, R.; Riles, K.; Robertson, N. A.; Robinet, F.; Rocchi, A.; Roddy, S.; Rodriguez, C.; Rodruck, M.; Roever, C.; Rolland, L.; Rollins, J. G.; Romano, R.; Romanov, G.; Romie, J. H.; Rosińska, D.; Rowan, S.; Rüdiger, A.; Ruggi, P.; Ryan, K.; Salemi, F.; Sammut, L.; Sandberg, V.; Sanders, J.; Sannibale, V.; Santiago-Prieto, I.; Saracco, E.; Sassolas, B.; Sathyaprakash, B. S.; Saulson, P. R.; Savage, R.; Schilling, R.; Schnabel, R.; Schofield, R. M. S.; Schreiber, E.; Schuette, D.; Schulz, B.; Schutz, B. F.; Schwinberg, P.; Scott, J.; Scott, S. M.; Seifert, F.; Sellers, D.; Sengupta, A. S.; Sentenac, D.; Sergeev, A.; Shaddock, D.; Shah, S.; Shahriar, M. S.; Shaltev, M.; Shapiro, B.; Shawhan, P.; Shoemaker, D. H.; Sidery, T. L.; Siellez, K.; Siemens, X.; Sigg, D.; Simakov, D.; Singer, A.; Singer, L.; Sintes, A. M.; Skelton, G. R.; Slagmolen, B. J. J.; Slutsky, J.; Smith, J. R.; Smith, M. R.; Smith, R. J. E.; Smith-Lefebvre, N. D.; Soden, K.; Son, E. J.; Sorazu, B.; Souradeep, T.; Sperandio, L.; Staley, A.; Steinert, E.; Steinlechner, J.; Steinlechner, S.; Steplewski, S.; Stevens, D.; Stochino, A.; Stone, R.; Strain, K. A.; Straniero, N.; Strigin, S.; Stroeer, A. S.; Sturani, R.; Stuver, A. L.; Summerscales, T. Z.; Susmithan, S.; Sutton, P. J.; Swinkels, B.; Szeifert, G.; Tacca, M.; Talukder, D.; Tang, L.; Tanner, D. B.; Tarabrin, S. P.; Taylor, R.; ter Braack, A. P. M.; Thirugnanasambandam, M. P.; Thomas, M.; Thomas, P.; Thorne, K. A.; Thorne, K. S.; Thrane, E.; Tiwari, V.; Tokmakov, K. V.; Tomlinson, C.; Toncelli, A.; Tonelli, M.; Torre, O.; Torres, C. V.; Torrie, C. I.; Travasso, F.; Traylor, G.; Tse, M.; Ugolini, D.; Unnikrishnan, C. S.; Vahlbruch, H.; Vajente, G.; Vallisneri, M.; van den Brand, J. F. J.; Van Den Broeck, C.; van der Putten, S.; van der Sluys, M. V.; van Heijningen, J.; van Veggel, A. A.; Vass, S.; Vasúth, M.; Vaulin, R.; Vecchio, A.; Vedovato, G.; Veitch, J.; Veitch, P. J.; Venkateswara, K.; Verkindt, D.; Verma, S.; Vetrano, F.; Viceré, A.; Vincent-Finley, R.; Vinet, J.-Y.; Vitale, S.; Vlcek, B.; Vo, T.; Vocca, H.; Vorvick, C.; Vousden, W. D.; Vrinceanu, D.; Vyachanin, S. P.; Wade, A.; Wade, L.; Wade, M.; Waldman, S. J.; Walker, M.; Wallace, L.; Wan, Y.; Wang, J.; Wang, M.; Wang, X.; Wanner, A.; Ward, R. L.; Was, M.; Weaver, B.; Wei, L.-W.; Weinert, M.; Weinstein, A. J.; Weiss, R.; Welborn, T.; Wen, L.; Wessels, P.; West, M.; Westphal, T.; Wette, K.; Whelan, J. T.; Whitcomb, S. E.; White, D. J.; Whiting, B. F.; Wibowo, S.; Wiesner, K.; Wilkinson, C.; Williams, L.; Williams, R.; Williams, T.; Willis, J. L.; Willke, B.; Wimmer, M.; Winkelmann, L.; Winkler, W.; Wipf, C. C.; Wittel, H.; Woan, G.; Worden, J.; Yablon, J.; Yakushin, I.; Yamamoto, H.; Yancey, C. C.; Yang, H.; Yeaton-Massey, D.; Yoshida, S.; Yum, H.; Yvert, M.; ZadroŻny, A.; Zanolin, M.; Zendri, J.-P.; Zhang, F.; Zhang, L.; Zhao, C.; Zhu, H.; Zhu, X. J.; Zotov, N.; Zucker, M. E.; Zweizig, J.; LIGO Scientific Collaboration; Virgo Collaboration

    2014-04-01

    Cosmic strings can give rise to a large variety of interesting astrophysical phenomena. Among them, powerful bursts of gravitational waves (GWs) produced by cusps are a promising observational signature. In this Letter we present a search for GWs from cosmic string cusps in data collected by the LIGO and Virgo gravitational wave detectors between 2005 and 2010, with over 625 days of live time. We find no evidence of GW signals from cosmic strings. From this result, we derive new constraints on cosmic string parameters, which complement and improve existing limits from previous searches for a stochastic background of GWs from cosmic microwave background measurements and pulsar timing data. In particular, if the size of loops is given by the gravitational backreaction scale, we place upper limits on the string tension Gμ below 10-8 in some regions of the cosmic string parameter space.

  13. Constraints on Cosmic Strings from the LIGO-Virgo Gravitational-Wave Detectors

    NASA Technical Reports Server (NTRS)

    Aasi, J.; Abadie, J.; Abbott, B.P.; Abbott, R.; Abbott, T.; Abernathy, M.R.; Accadia, T.; Adams, C.; Adams, T.; Adhikari, R.X.; hide

    2014-01-01

    Cosmic strings can give rise to a large variety of interesting astrophysical phenomena. Among them, powerful bursts of gravitational waves (GWs) produced by cusps are a promising observational signature. In this Letter we present a search for GWs from cosmic string cusps in data collected by the LIGO and Virgo gravitational wave detectors between 2005 and 2010, with over 625 days of live time. We find no evidence of GW signals from cosmic strings. From this result, we derive new constraints on cosmic string parameters, which complement and improve existing limits from previous searches for a stochastic background of GWs from cosmic microwave background measurements and pulsar timing data. In particular, if the size of loops is given by the gravitational backreaction scale, we place upper limits on the string tension (Newton's Constant x mass per unit length) below 10(exp -8) in some regions of the cosmic string parameter space.

  14. Constraints on cosmic strings from the LIGO-Virgo gravitational-wave detectors.

    PubMed

    Aasi, J; Abadie, J; Abbott, B P; Abbott, R; Abbott, T; Abernathy, M R; Accadia, T; Acernese, F; Adams, C; Adams, T; Adhikari, R X; Affeldt, C; Agathos, M; Aggarwal, N; Aguiar, O D; Ajith, P; Allen, B; Allocca, A; Amador Ceron, E; Amariutei, D; Anderson, R A; Anderson, S B; Anderson, W G; Arai, K; Araya, M C; Arceneaux, C; Areeda, J; Ast, S; Aston, S M; Astone, P; Aufmuth, P; Aulbert, C; Austin, L; Aylott, B E; Babak, S; Baker, P T; Ballardin, G; Ballmer, S W; Barayoga, J C; Barker, D; Barnum, S H; Barone, F; Barr, B; Barsotti, L; Barsuglia, M; Barton, M A; Bartos, I; Bassiri, R; Basti, A; Batch, J; Bauchrowitz, J; Bauer, Th S; Bebronne, M; Behnke, B; Bejger, M; Beker, M G; Bell, A S; Bell, C; Belopolski, I; Bergmann, G; Berliner, J M; Bersanetti, D; Bertolini, A; Bessis, D; Betzwieser, J; Beyersdorf, P T; Bhadbhade, T; Bilenko, I A; Billingsley, G; Birch, J; Bitossi, M; Bizouard, M A; Black, E; Blackburn, J K; Blackburn, L; Blair, D; Blom, M; Bock, O; Bodiya, T P; Boer, M; Bogan, C; Bond, C; Bondu, F; Bonelli, L; Bonnand, R; Bork, R; Born, M; Boschi, V; Bose, S; Bosi, L; Bowers, J; Bradaschia, C; Brady, P R; Braginsky, V B; Branchesi, M; Brannen, C A; Brau, J E; Breyer, J; Briant, T; Bridges, D O; Brillet, A; Brinkmann, M; Brisson, V; Britzger, M; Brooks, A F; Brown, D A; Brown, D D; Brückner, F; Bulik, T; Bulten, H J; Buonanno, A; Buskulic, D; Buy, C; Byer, R L; Cadonati, L; Cagnoli, G; Calderón Bustillo, J; Calloni, E; Camp, J B; Campsie, P; Cannon, K C; Canuel, B; Cao, J; Capano, C D; Carbognani, F; Carbone, L; Caride, S; Castiglia, A; Caudill, S; Cavaglià, M; Cavalier, F; Cavalieri, R; Cella, G; Cepeda, C; Cesarini, E; Chakraborty, R; Chalermsongsak, T; Chao, S; Charlton, P; Chassande-Mottin, E; Chen, X; Chen, Y; Chincarini, A; Chiummo, A; Cho, H S; Chow, J; Christensen, N; Chu, Q; Chua, S S Y; Chung, S; Ciani, G; Clara, F; Clark, D E; Clark, J A; Cleva, F; Coccia, E; Cohadon, P-F; Colla, A; Colombini, M; Constancio, M; Conte, A; Conte, R; Cook, D; Corbitt, T R; Cordier, M; Cornish, N; Corsi, A; Costa, C A; Coughlin, M W; Coulon, J-P; Countryman, S; Couvares, P; Coward, D M; Cowart, M; Coyne, D C; Craig, K; Creighton, J D E; Creighton, T D; Crowder, S G; Cumming, A; Cunningham, L; Cuoco, E; Dahl, K; Dal Canton, T; Damjanic, M; Danilishin, S L; D'Antonio, S; Danzmann, K; Dattilo, V; Daudert, B; Daveloza, H; Davier, M; Davies, G S; Daw, E J; Day, R; Dayanga, T; De Rosa, R; Debreczeni, G; Degallaix, J; Del Pozzo, W; Deleeuw, E; Deléglise, S; Denker, T; Dent, T; Dereli, H; Dergachev, V; DeRosa, R; DeSalvo, R; Dhurandhar, S; Di Fiore, L; Di Lieto, A; Di Palma, I; Di Virgilio, A; Díaz, M; Dietz, A; Dmitry, K; Donovan, F; Dooley, K L; Doravari, S; Drago, M; Drever, R W P; Driggers, J C; Du, Z; Dumas, J-C; Dwyer, S; Eberle, T; Edwards, M; Effler, A; Ehrens, P; Eichholz, J; Eikenberry, S S; Endrőczi, G; Essick, R; Etzel, T; Evans, K; Evans, M; Evans, T; Factourovich, M; Fafone, V; Fairhurst, S; Fang, Q; Farinon, S; Farr, B; Farr, W; Favata, M; Fazi, D; Fehrmann, H; Feldbaum, D; Ferrante, I; Ferrini, F; Fidecaro, F; Finn, L S; Fiori, I; Fisher, R; Flaminio, R; Foley, E; Foley, S; Forsi, E; Fotopoulos, N; Fournier, J-D; Franco, S; Frasca, S; Frasconi, F; Frede, M; Frei, M; Frei, Z; Freise, A; Frey, R; Fricke, T T; Fritschel, P; Frolov, V V; Fujimoto, M-K; Fulda, P; Fyffe, M; Gair, J; Gammaitoni, L; Garcia, J; Garufi, F; Gehrels, N; Gemme, G; Genin, E; Gennai, A; Gergely, L; Ghosh, S; Giaime, J A; Giampanis, S; Giardina, K D; Giazotto, A; Gil-Casanova, S; Gill, C; Gleason, J; Goetz, E; Goetz, R; Gondan, L; González, G; Gordon, N; Gorodetsky, M L; Gossan, S; Goßler, S; Gouaty, R; Graef, C; Graff, P B; Granata, M; Grant, A; Gras, S; Gray, C; Greenhalgh, R J S; Gretarsson, A M; Griffo, C; Groot, P; Grote, H; Grover, K; Grunewald, S; Guidi, G M; Guido, C; Gushwa, K E; Gustafson, E K; Gustafson, R; Hall, B; Hall, E; Hammer, D; Hammond, G; Hanke, M; Hanks, J; Hanna, C; Hanson, J; Harms, J; Harry, G M; Harry, I W; Harstad, E D; Hartman, M T; Haughian, K; Hayama, K; Heefner, J; Heidmann, A; Heintze, M; Heitmann, H; Hello, P; Hemming, G; Hendry, M; Heng, I S; Heptonstall, A W; Heurs, M; Hild, S; Hoak, D; Hodge, K A; Holt, K; Holtrop, M; Hong, T; Hooper, S; Horrom, T; Hosken, D J; Hough, J; Howell, E J; Hu, Y; Hua, Z; Huang, V; Huerta, E A; Hughey, B; Husa, S; Huttner, S H; Huynh, M; Huynh-Dinh, T; Iafrate, J; Ingram, D R; Inta, R; Isogai, T; Ivanov, A; Iyer, B R; Izumi, K; Jacobson, M; James, E; Jang, H; Jang, Y J; Jaranowski, P; Jiménez-Forteza, F; Johnson, W W; Jones, D; Jones, D I; Jones, R; Jonker, R J G; Ju, L; K, Haris; Kalmus, P; Kalogera, V; Kandhasamy, S; Kang, G; Kanner, J B; Kasprzack, M; Kasturi, R; Katsavounidis, E; Katzman, W; Kaufer, H; Kaufman, K; Kawabe, K; Kawamura, S; Kawazoe, F; Kéfélian, F; Keitel, D; Kelley, D B; Kells, W; Keppel, D G; Khalaidovski, A; Khalili, F Y; Khazanov, E A; Kim, B K; Kim, C; Kim, K; Kim, N; Kim, W; Kim, Y-M; King, E J; King, P J; Kinzel, D L; Kissel, J S; Klimenko, S; Kline, J; Koehlenbeck, S; Kokeyama, K; Kondrashov, V; Koranda, S; Korth, W Z; Kowalska, I; Kozak, D; Kremin, A; Kringel, V; Królak, A; Kucharczyk, C; Kudla, S; Kuehn, G; Kumar, A; Kumar, P; Kumar, R; Kurdyumov, R; Kwee, P; Landry, M; Lantz, B; Larson, S; Lasky, P D; Lawrie, C; Lazzarini, A; Le Roux, A; Leaci, P; Lebigot, E O; Lee, C-H; Lee, H K; Lee, H M; Lee, J; Lee, J; Leonardi, M; Leong, J R; Leroy, N; Letendre, N; Levine, B; Lewis, J B; Lhuillier, V; Li, T G F; Lin, A C; Littenberg, T B; Litvine, V; Liu, F; Liu, H; Liu, Y; Liu, Z; Lloyd, D; Lockerbie, N A; Lockett, V; Lodhia, D; Loew, K; Logue, J; Lombardi, A L; Lorenzini, M; Loriette, V; Lormand, M; Losurdo, G; Lough, J; Luan, J; Lubinski, M J; Lück, H; Lundgren, A P; Macarthur, J; Macdonald, E; Machenschalk, B; MacInnis, M; Macleod, D M; Magana-Sandoval, F; Mageswaran, M; Mailand, K; Majorana, E; Maksimovic, I; Malvezzi, V; Man, N; Manca, G M; Mandel, I; Mandic, V; Mangano, V; Mantovani, M; Marchesoni, F; Marion, F; Márka, S; Márka, Z; Markosyan, A; Maros, E; Marque, J; Martelli, F; Martin, I W; Martin, R M; Martinelli, L; Martynov, D; Marx, J N; Mason, K; Masserot, A; Massinger, T J; Matichard, F; Matone, L; Matzner, R A; Mavalvala, N; May, G; Mazumder, N; Mazzolo, G; McCarthy, R; McClelland, D E; McGuire, S C; McIntyre, G; McIver, J; Meacher, D; Meadors, G D; Mehmet, M; Meidam, J; Meier, T; Melatos, A; Mendell, G; Mercer, R A; Meshkov, S; Messenger, C; Meyer, M S; Miao, H; Michel, C; Mikhailov, E E; Milano, L; Miller, J; Minenkov, Y; Mingarelli, C M F; Mitra, S; Mitrofanov, V P; Mitselmakher, G; Mittleman, R; Moe, B; Mohan, M; Mohapatra, S R P; Mokler, F; Moraru, D; Moreno, G; Morgado, N; Mori, T; Morriss, S R; Mossavi, K; Mours, B; Mow-Lowry, C M; Mueller, C L; Mueller, G; Mukherjee, S; Mullavey, A; Munch, J; Murphy, D; Murray, P G; Mytidis, A; Nagy, M F; Nanda Kumar, D; Nardecchia, I; Nash, T; Naticchioni, L; Nayak, R; Necula, V; Nelemans, G; Neri, I; Neri, M; Newton, G; Nguyen, T; Nishida, E; Nishizawa, A; Nitz, A; Nocera, F; Nolting, D; Normandin, M E; Nuttall, L K; Ochsner, E; O'Dell, J; Oelker, E; Ogin, G H; Oh, J J; Oh, S H; Ohme, F; Oppermann, P; O'Reilly, B; Ortega Larcher, W; O'Shaughnessy, R; Osthelder, C; Ott, C D; Ottaway, D J; Ottens, R S; Ou, J; Overmier, H; Owen, B J; Padilla, C; Pai, A; Palomba, C; Pan, Y; Pankow, C; Paoletti, F; Paoletti, R; Papa, M A; Paris, H; Pasqualetti, A; Passaquieti, R; Passuello, D; Pedraza, M; Peiris, P; Penn, S; Perreca, A; Phelps, M; Pichot, M; Pickenpack, M; Piergiovanni, F; Pierro, V; Pinard, L; Pindor, B; Pinto, I M; Pitkin, M; Poeld, J; Poggiani, R; Poole, V; Poux, C; Predoi, V; Prestegard, T; Price, L R; Prijatelj, M; Principe, M; Privitera, S; Prix, R; Prodi, G A; Prokhorov, L; Puncken, O; Punturo, M; Puppo, P; Quetschke, V; Quintero, E; Quitzow-James, R; Raab, F J; Rabeling, D S; Rácz, I; Radkins, H; Raffai, P; Raja, S; Rajalakshmi, G; Rakhmanov, M; Ramet, C; Rapagnani, P; Raymond, V; Re, V; Reed, C M; Reed, T; Regimbau, T; Reid, S; Reitze, D H; Ricci, F; Riesen, R; Riles, K; Robertson, N A; Robinet, F; Rocchi, A; Roddy, S; Rodriguez, C; Rodruck, M; Roever, C; Rolland, L; Rollins, J G; Romano, R; Romanov, G; Romie, J H; Rosińska, D; Rowan, S; Rüdiger, A; Ruggi, P; Ryan, K; Salemi, F; Sammut, L; Sandberg, V; Sanders, J; Sannibale, V; Santiago-Prieto, I; Saracco, E; Sassolas, B; Sathyaprakash, B S; Saulson, P R; Savage, R; Schilling, R; Schnabel, R; Schofield, R M S; Schreiber, E; Schuette, D; Schulz, B; Schutz, B F; Schwinberg, P; Scott, J; Scott, S M; Seifert, F; Sellers, D; Sengupta, A S; Sentenac, D; Sergeev, A; Shaddock, D; Shah, S; Shahriar, M S; Shaltev, M; Shapiro, B; Shawhan, P; Shoemaker, D H; Sidery, T L; Siellez, K; Siemens, X; Sigg, D; Simakov, D; Singer, A; Singer, L; Sintes, A M; Skelton, G R; Slagmolen, B J J; Slutsky, J; Smith, J R; Smith, M R; Smith, R J E; Smith-Lefebvre, N D; Soden, K; Son, E J; Sorazu, B; Souradeep, T; Sperandio, L; Staley, A; Steinert, E; Steinlechner, J; Steinlechner, S; Steplewski, S; Stevens, D; Stochino, A; Stone, R; Strain, K A; Straniero, N; Strigin, S; Stroeer, A S; Sturani, R; Stuver, A L; Summerscales, T Z; Susmithan, S; Sutton, P J; Swinkels, B; Szeifert, G; Tacca, M; Talukder, D; Tang, L; Tanner, D B; Tarabrin, S P; Taylor, R; ter Braack, A P M; Thirugnanasambandam, M P; Thomas, M; Thomas, P; Thorne, K A; Thorne, K S; Thrane, E; Tiwari, V; Tokmakov, K V; Tomlinson, C; Toncelli, A; Tonelli, M; Torre, O; Torres, C V; Torrie, C I; Travasso, F; Traylor, G; Tse, M; Ugolini, D; Unnikrishnan, C S; Vahlbruch, H; Vajente, G; Vallisneri, M; van den Brand, J F J; Van Den Broeck, C; van der Putten, S; van der Sluys, M V; van Heijningen, J; van Veggel, A A; Vass, S; Vasúth, M; Vaulin, R; Vecchio, A; Vedovato, G; Veitch, J; Veitch, P J; Venkateswara, K; Verkindt, D; Verma, S; Vetrano, F; Viceré, A; Vincent-Finley, R; Vinet, J-Y; Vitale, S; Vlcek, B; Vo, T; Vocca, H; Vorvick, C; Vousden, W D; Vrinceanu, D; Vyachanin, S P; Wade, A; Wade, L; Wade, M; Waldman, S J; Walker, M; Wallace, L; Wan, Y; Wang, J; Wang, M; Wang, X; Wanner, A; Ward, R L; Was, M; Weaver, B; Wei, L-W; Weinert, M; Weinstein, A J; Weiss, R; Welborn, T; Wen, L; Wessels, P; West, M; Westphal, T; Wette, K; Whelan, J T; Whitcomb, S E; White, D J; Whiting, B F; Wibowo, S; Wiesner, K; Wilkinson, C; Williams, L; Williams, R; Williams, T; Willis, J L; Willke, B; Wimmer, M; Winkelmann, L; Winkler, W; Wipf, C C; Wittel, H; Woan, G; Worden, J; Yablon, J; Yakushin, I; Yamamoto, H; Yancey, C C; Yang, H; Yeaton-Massey, D; Yoshida, S; Yum, H; Yvert, M; Zadrożny, A; Zanolin, M; Zendri, J-P; Zhang, F; Zhang, L; Zhao, C; Zhu, H; Zhu, X J; Zotov, N; Zucker, M E; Zweizig, J

    2014-04-04

    Cosmic strings can give rise to a large variety of interesting astrophysical phenomena. Among them, powerful bursts of gravitational waves (GWs) produced by cusps are a promising observational signature. In this Letter we present a search for GWs from cosmic string cusps in data collected by the LIGO and Virgo gravitational wave detectors between 2005 and 2010, with over 625 days of live time. We find no evidence of GW signals from cosmic strings. From this result, we derive new constraints on cosmic string parameters, which complement and improve existing limits from previous searches for a stochastic background of GWs from cosmic microwave background measurements and pulsar timing data. In particular, if the size of loops is given by the gravitational backreaction scale, we place upper limits on the string tension Gμ below 10(-8) in some regions of the cosmic string parameter space.

  15. Fully optical backplane system using novel optical plug and slot

    NASA Astrophysics Data System (ADS)

    Cho, In-Kui; Ahn, Seung-Ho; Lee, Woo-Jin; Han, Sang-Pil; Kim, Jin-Tae; Choi, Chun-Ki; Shin, Kyung-Up; Yoon, Keun Byoung; Jeong, Myung-Yung; Park, Hyo Hoon

    2005-10-01

    A fully optical PCB with transmitter/receiver system boards and optical bakcplane was prepared, which is board-to-board interconnection by an optical slot. We report a 10 Gb/s PRBS NRZ data transmission between transmitter system board and optical backplane embedded multimode polymeric waveguide arrays. The basic concept of the optical PCB is as follows; 1) Metal optical bench is integrated with optoelectronic devices, driver and receiver circuits, polymeric waveguide and access line PCB module. 2) Multimode polymeric waveguide inside an optical backplane, which is embedded into PCB, 3) Optical slot and plug for high-density (channel pitch : 500 um) board-to-board interconnection. The polymeric waveguide technology can be used for transmission of data between transmitter/receiver processing boards and backplane boards. The main components are low-loss tapered polymeric waveguides and a novel optical plug and slot for board-to-board interconnections, respectively. The transmitter/receiver processing boards are designed as plug types, and can be easily plugged-in and -out at an optical backplane board. The optical backplane boards are prepared by employing the lamination processes for conventional electrical PCBs. A practical optical backplane system was implemented with two processing boards and an optical backplane. As connection components between the transmitter/receiver processing boards and backplane board, optical slots made of a 90°-bending structure-embedded optical plug was used. A 10 Gb/s data link was successfully demonstrated. The bit error rate (BER) was determined and is 5.6×10 -9(@10Gb/s) and the BER of 8 Gb/s is < 10 -12.

  16. Acquisition and Retaining Granular Samples via a Rotating Coring Bit

    NASA Technical Reports Server (NTRS)

    Bar-Cohen, Yoseph; Badescu, Mircea; Sherrit, Stewart

    2013-01-01

    This device takes advantage of the centrifugal forces that are generated when a coring bit is rotated, and a granular sample is entered into the bit while it is spinning, making it adhere to the internal wall of the bit, where it compacts itself into the wall of the bit. The bit can be specially designed to increase the effectiveness of regolith capturing while turning and penetrating the subsurface. The bit teeth can be oriented such that they direct the regolith toward the bit axis during the rotation of the bit. The bit can be designed with an internal flute that directs the regolith upward inside the bit. The use of both the teeth and flute can be implemented in the same bit. The bit can also be designed with an internal spiral into which the various particles wedge. In another implementation, the bit can be designed to collect regolith primarily from a specific depth. For that implementation, the bit can be designed such that when turning one way, the teeth guide the regolith outward of the bit and when turning in the opposite direction, the teeth will guide the regolith inward into the bit internal section. This mechanism can be implemented with or without an internal flute. The device is based on the use of a spinning coring bit (hollow interior) as a means of retaining granular sample, and the acquisition is done by inserting the bit into the subsurface of a regolith, soil, or powder. To demonstrate the concept, a commercial drill and a coring bit were used. The bit was turned and inserted into the soil that was contained in a bucket. While spinning the bit (at speeds of 600 to 700 RPM), the drill was lifted and the soil was retained inside the bit. To prove this point, the drill was turned horizontally, and the acquired soil was still inside the bit. The basic theory behind the process of retaining unconsolidated mass that can be acquired by the centrifugal forces of the bit is determined by noting that in order to stay inside the interior of the bit, the frictional force must be greater than the weight of the sample. The bit can be designed with an internal sleeve to serve as a container for granular samples. This tube-shaped component can be extracted upon completion of the sampling, and the bottom can be capped by placing the bit onto a corklike component. Then, upon removal of the internal tube, the top section can be sealed. The novel features of this device are: center dot A mechanism of acquiring and retaining granular samples using a coring bit without a closed door. center dot An acquisition bit that has internal structure such as a waffle pattern for compartmentalizing or helical internal flute to propel the sample inside the bit and help in acquiring and retaining granular samples. center dot A bit with an internal spiral into which the various particles wedge. center dot A design that provides a method of testing frictional properties of the granular samples and potentially segregating particles based on size and density. A controlled acceleration or deceleration may be used to drop the least-frictional particles or to eventually shear the unconsolidated material near the bit center.

  17. Dualities in String Cosmology

    NASA Astrophysics Data System (ADS)

    Meissner, K. A.

    We describe in this chapter a set of duality symmetries present in the string-inspired theory of gravity coupled to the dilaton. These dualities are the cornerstones of String Cosmology, which provides alternatives to the usual inflation scenario. The crucial role of Prof. Gabriele Veneziano in the discovery and the development of string dualities is described and emphasized.

  18. Effects of overlapping strings in pp collisions

    DOE PAGES

    Bierlich, Christian; Gustafson, Gösta; Lönnblad, Leif; ...

    2015-03-26

    In models for hadron collisions based on string hadronization, the strings are usually treated as independent, allowing no interaction between the confined colour fields. In studies of nucleus collisions it has been suggested that strings close in space can fuse to form "colour ropes." Such ropes are expected to give more strange particles and baryons, which also has been suggested as a signal for plasma formation. Overlapping strings can also be expected in pp collisions, where usually no phase transition is expected. In particular at the high LHC energies the expected density of strings is quite high. To investigate possiblemore » effects of rope formation, we present a model in which strings are allowed to combine into higher multiplets, giving rise to increased production of baryons and strangeness, or recombine into singlet structures and vanish. Also a crude model for strings recombining into junction structures is considered, again giving rise to increased baryon production. The models are implemented in the DIPSY MC event generator, using PYTHIA8 for hadronization, and comparison to pp minimum bias data, reveals improvement in the description of identified particle spectra.« less

  19. Hydraulic drill string breakdown and bleed off unit

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zeringue, F.J. Jr.

    1987-02-17

    An apparatus is described for use within an oil well rig for decoupling a tubing string into pipe segments comprising, in combination: rotary tong means for applying an unthreading torque to a first, upper pipe segment within the tubing string; torque resisting means for securing a second, lower pipe segment within the tubing string against the unthreading torque; containing means, intermediate the rotary tong means and the torque resisting means, enclosing a threaded joint of the tubing string, adapted for containing pressurized gases, liquids, and particulates, released from the threaded joint upon the decoupling; fluid communicating means for allowing fluidmore » communication between the containing means and a receiving point adapted for receiving the pressurized gases, liquids, and particulates; means for moving the rotary tong means, the torque resisting means and the containing means between a closed, engaging position with the tubing string and an open position; and means for horizontally moving the rotary tong means, the torque resisting means and the containing means between a position adjacent the tubing string and a position away from the tubing string.« less

  20. Perceiving the affordance of string tension for power strokes in badminton: expertise allows effective use of all string tensions.

    PubMed

    Zhu, Qin

    2013-01-01

    Affordances mean opportunities for action. These affordances are important for sports performance and relevant to the abilities developed by skilled athletes. In racquet sports such as badminton, different players prefer widely different string tension because it is believed to provide opportunities for effective strokes. The current study examined whether badminton players can perceive the affordance of string tension for power strokes and whether the perception of affordance itself changed as a function of skill level. The results showed that string tension constrained the striking performance of both novice and recreational players, but not of expert players. When perceptual capability was assessed, perceptual mode did not affect perception of the optimal string tension. Skilled players successfully perceived the affordance of string tension, but only experts were concerned about saving energy. Our findings demonstrated that perception of the affordance of string tension in badminton was determined by action abilities. Furthermore, experts could adjust the action to maintain a superior level of performance based on the perception of affordance.

Top