COMPARATIVE ANALYSIS OF DECODING CASADE RED-SOLOMON SHORTENED CODES IN ADAPTIVE SYSTEMS OF DATA EXCHANGE WITH CONVENTIONAL DECODING

2019 ◽  
Vol 42 ◽  
pp. 60-68
Author(s):  
V. A. Maystrenko ◽  
◽  
D. P. Sedunov ◽  
Author(s):  
V. G. Bartenev ◽  
M. V. Bartenev ◽  
V. K. Bityukov

The comparative analysis of the effectiveness of methods for implementing adaptive systems moving target based on autoregression approach. AR model correlated noise can effectively deal with clutter, without resorting to the algorithm based on the correlation matrix inversion. Considered several methods of weight factor of adaptive systems moving target, which is used as the coefficients of the autoregression. One of the main parameters that determine the effectiveness of the systems being compared, is the improvement factor, which was used in this study.


2021 ◽  
Vol 2 (1) ◽  
pp. 31-39
Author(s):  
Zbigniew Łukasik ◽  
Anton Ushakov

This article provides a comparative analysis of modern data transmission technologies that can be used in modern automation and telemechanics systems for data exchange with various sensors and other security and access control systems. The authors describe the most common types of transmission networks and offer options for their application in relation to the requirements of specific customers. The main emphasis is on open source solutions that can be used in research projects on an unlicensed basis.


Author(s):  
Denis Matha ◽  
Germán Pérez Morán ◽  
Kolja Müller ◽  
Frank Lemmer

The floating offshore wind turbine (FOWT) market is currently dominated by single unit demonstration projects and first pre-commercial wind farms such as the Hywind Scotland wind farm. Today’s FOWT substructure design process is therefore not yet at a level of industrialization comparable to fixed-bottom substructure design methodologies, where standardized design and realization procedures are well established throughout the industry. Aligned with work performed in the Ramboll and University of Stuttgart-led work packages “Concept Industrialization” and “Design practice” of the European H2020 LIFES50+ project, the ambition of this paper is to define state-of-the-art fixed-bottom and floating design methods and based on these identify key differences through comparative analysis. In the first part of the paper the scope and selected details of today’s industrialized design process for fixed-bottom substructure design is presented, including e.g. load iteration schemes and applied numerical methods, risk assessment incorporation, optimization, and cost modelling. In the second part, the key elements of this industrialized procedure which are different to FOWT design are identified and described: This is done based on a review of the current FOWT common design practice, where elements are identified that are unique and/or different for FOWTs — this includes e.g. the requirement to adapt the controller to the specific platform behaviour, as well as a tower and/or selected rotor-nacelle assembly (RNA) component redesign, and also includes differences in terms of defining and performing load case simulations. Another observation that is described relates to the floating specific required numerical methodologies applied for the detailed structural and mooring design, where challenges exist regarding the interface between coupled global loads analyses tools and detailed structural, mooring, and geotechnical tools. A further key item discussed in this respect is the industry-common load exchange practice for fixed-bottom design, where only a limited data exchange between WT manufacturers and platform designers is done; a procedure that is challenging to be applied for FOWTs. Compared with fixed-bottom design, the consideration of manufacturability, fabrication constraints, serial production, design complexity reduction, assembly, supply chain, installation, geotechnics, O&M and risk is often limited and these items will also be briefly discussed. Overall the paper is intended as a technical review of existing fixed-bottom design procedures and, facilitated through the comparative analysis with these established design methodologies, identifies and presents the key differentiating design elements and challenges for an industrialized FOWT design. The content of the paper will provide input for the focused development of design processes for industrialized detailed design of FOWTs to guarantee the demanded technology-readiness and manufacturing-readiness levels (TRL and MRL) and ultimately improve their CAPEX and OPEX by applying industrial design procedures. This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 640741 (LIFES50+ project, www.lifes50plus.eu).


2022 ◽  
Vol 24 (2) ◽  
pp. 0-0

When data exchange advances through the electronic system, the need for information security has become a must. Protection of images and videos is important in today's visual communication system. Confidential image / video data must be shielded from unauthorized uses. Detecting and identifying unauthorized users is a challenging task. Various researchers have suggested different techniques for securing the transfer of images. In this research, the comparative study of these current technologies also addressed the types of images / videos and the different techniques of image / video processing with the steps used to process the image or video. This research classifies the two types of Encryption Algorithm, Symmetric and Encryption Algorithm, and provides a comparative analysis of its types, such as AES, MAES, RSA, DES, 3DES and BLOWFISH.


2022 ◽  
Vol 24 (2) ◽  
pp. 1-18
Author(s):  
Raya Basil Alothman ◽  
Imad Ibraheem Saada ◽  
Basma Salim Bazel Al-Brge

When data exchange advances through the electronic system, the need for information security has become a must. Protection of images and videos is important in today's visual communication system. Confidential image / video data must be shielded from unauthorized uses. Detecting and identifying unauthorized users is a challenging task. Various researchers have suggested different techniques for securing the transfer of images. In this research, the comparative study of these current technologies also addressed the types of images / videos and the different techniques of image / video processing with the steps used to process the image or video. This research classifies the two types of Encryption Algorithm, Symmetric and Encryption Algorithm, and provides a comparative analysis of its types, such as AES, MAES, RSA, DES, 3DES and BLOWFISH.


2020 ◽  
Vol 51 (2) ◽  
pp. 479-493
Author(s):  
Jenny A. Roberts ◽  
Evelyn P. Altenberg ◽  
Madison Hunter

Purpose The results of automatic machine scoring of the Index of Productive Syntax from the Computerized Language ANalysis (CLAN) tools of the Child Language Data Exchange System of TalkBank (MacWhinney, 2000) were compared to manual scoring to determine the accuracy of the machine-scored method. Method Twenty transcripts of 10 children from archival data of the Weismer Corpus from the Child Language Data Exchange System at 30 and 42 months were examined. Measures of absolute point difference and point-to-point accuracy were compared, as well as points erroneously given and missed. Two new measures for evaluating automatic scoring of the Index of Productive Syntax were introduced: Machine Item Accuracy (MIA) and Cascade Failure Rate— these measures further analyze points erroneously given and missed. Differences in total scores, subscale scores, and individual structures were also reported. Results Mean absolute point difference between machine and hand scoring was 3.65, point-to-point agreement was 72.6%, and MIA was 74.9%. There were large differences in subscales, with Noun Phrase and Verb Phrase subscales generally providing greater accuracy and agreement than Question/Negation and Sentence Structures subscales. There were significantly more erroneous than missed items in machine scoring, attributed to problems of mistagging of elements, imprecise search patterns, and other errors. Cascade failure resulted in an average of 4.65 points lost per transcript. Conclusions The CLAN program showed relatively inaccurate outcomes in comparison to manual scoring on both traditional and new measures of accuracy. Recommendations for improvement of the program include accounting for second exemplar violations and applying cascaded credit, among other suggestions. It was proposed that research on machine-scored syntax routinely report accuracy measures detailing erroneous and missed scores, including MIA, so that researchers and clinicians are aware of the limitations of a machine-scoring program. Supplemental Material https://doi.org/10.23641/asha.11984364


Sign in / Sign up

Export Citation Format

Share Document