code table
Recently Published Documents


TOTAL DOCUMENTS

32
(FIVE YEARS 10)

H-INDEX

4
(FIVE YEARS 2)

2021 ◽  
Vol 2074 (1) ◽  
pp. 012062
Author(s):  
Changyong Zhu ◽  
Xiaodong Zheng ◽  
Chao Zhou

Abstract Aiming at the problems of manual testing of industrial products, a measurement method of industrial products based on three-dimensional dynamic imaging technology is proposed. The products on the production line are dynamically photographed from different angles and within a certain period of time by using cameras. Then the obtained Image denoising processing and contour tracking based on chain code table and line segment table to obtain boundary information and regional information of each enclosed area of the image. Experimental tests show that the test accuracy of this method is 100%, which is suitable for real-time detection. Fully automated research on product testing provides the foundation.


2021 ◽  
Vol 83 (1) ◽  
pp. 72-79
Author(s):  
O.A. Kan ◽  
◽  
N.A. Mazhenov ◽  
K.B. Kopbalina ◽  
G.B. Turebaeva ◽  
...  

The main problem: The article deals with the issues of hiding text information in a graphic file. A formula for hiding text information in image pixels is proposed. A steganography scheme for embedding secret text in random image pixels has been developed. Random bytes are pre-embedded in each row of pixels in the source image. As a result of the operations performed, a key image is obtained. The text codes are embedded in random bytes of pixels of a given RGB channel. To form a secret message, the characters of the ASCII code table are used. Demo encryption and decryption programs have been developed in the Python 3.5.2 programming language. A graphic file is used as the decryption key. Purpose: To develop an algorithm for embedding text information in random pixels of an image. Methods: Among the methods of hiding information in graphic images, the LSB method of hiding information is widely used, in which the lower bits in the image bytes responsible for color encoding are replaced by the bits of the secret message. Analysis of methods of hiding information in graphic files and modeling of algorithms showed an increase in the level of protection of hidden information from detection. Results and their significance: Using the proposed steganography scheme and the algorithm for embedding bytes of a secret message in a graphic file, protection against detection of hidden information is significantly increased. The advantage of this steganography scheme is that for decryption, a key image is used, in which random bytes are pre-embedded. In addition, the entire pixel bits of the container image are used to display the color shades. It can also be noted that the developed steganography scheme allows not only to transmit secret information, but also to add digital fingerprints or hidden tags to the image.


2021 ◽  
Vol 22 (17) ◽  
pp. 9106
Author(s):  
Nikola Štambuk ◽  
Paško Konjevoda ◽  
Josip Pavan

Antisense peptide technology (APT) is based on a useful heuristic algorithm for rational peptide design. It was deduced from empirical observations that peptides consisting of complementary (sense and antisense) amino acids interact with higher probability and affinity than the randomly selected ones. This phenomenon is closely related to the structure of the standard genetic code table, and at the same time, is unrelated to the direction of its codon sequence translation. The concept of complementary peptide interaction is discussed, and its possible applications to diagnostic tests and bioengineering research are summarized. Problems and difficulties that may arise using APT are discussed, and possible solutions are proposed. The methodology was tested on the example of SARS-CoV-2. It is shown that the CABS-dock server accurately predicts the binding of antisense peptides to the SARS-CoV-2 receptor binding domain without requiring predefinition of the binding site. It is concluded that the benefits of APT outweigh the costs of random peptide screening and could lead to considerable savings in time and resources, especially if combined with other computational and immunochemical methods.


2021 ◽  
Author(s):  
Massimo Di Giulio ◽  
Franco Caldararo

We used the Moran's I index of global spatial autocorrelation with the aim of studying the distribution of the physicochemical or biological properties of amino acids within the genetic code table. First, using this index we are able to identify the amino acid property - among the 530 analyzed - that best correlates with the organization of the genetic code in the set of amino acid permutation codes. Considering, then, a model suggested by the coevolution theory of the genetic code origin - which in addition to the biosynthetic relationships between amino acids took into account also their physicochemical properties - we investigated the level of optimization achieved by these properties either on the entire genetic code table, or only on its columns or only on its rows. Specifically, we estimated the optimization achieved in the restricted set of amino acid permutation codes subject to the constraints derived from the biosynthetic classes of amino acids, in which we identify the most optimized amino acid property among all those present in the database. Unlike what has been claimed in the literature, it would appear that it was not the polarity of amino acids that structured the genetic code, but that it could have been their partition energy instead. In actual fact, it would seem to reach an optimization level of about 96% on the whole table of the genetic code and 98% on its columns. Given that this result has been obtained for amino acid permutation codes subject to biosynthetic constraints, that is to say, for a model of the genetic code consistent with the coevolution theory, we should consider the following conclusions reasonable. (i) The coevolution theory might be corroborated by these observations because the model used referred to the biosynthetic relationships between amino acids, which are suggested by this theory as having been fundamental in structuring the genetic code. (ii) The very high optimization on the columns of the genetic code would not only be compatible but would further corroborate the coevolution theory because this suggests that, as the genetic code was structured along its rows by the biosynthetic relationships of amino acids, on its columns strong selective pressure might have been put in place to minimize, for example, the deleterious effects of translation errors. (iii) The finding that partition energy could be the most optimized property of amino acids in the genetic code would in turn be consistent with one of the main predictions of the coevolution theory. In other words, since the partition energy is reflective of the protein structure and therefore of the enzymatic catalysis, the latter might really have been the main selective pressure that would have promoted the origin of the genetic code. Indeed, we observe that the beta-strands show an optimization percentage of 94.45%, so it is possible to hypothesize that they might have become the object of selection during the origin of the genetic code, conditioning the choice of biosynthetic relationships between amino acids. (iv) The finding that the polarity of amino acids is less optimized than their partition energy in the genetic code table might be interpreted against the physicochemical theories of the origin of the genetic code because these would suggest, for example, that a very high optimization of the polarity of amino acids in the code could be an expression of interactions between amino acids and codons or anticodons, which would have promoted their origin. This might now become less sustainable, given the very high optimization that is instead observed in favor of partition energy but not polarity. Finally, (v) the very high optimization of the partition energy of amino acids would seem to make a neutral origin of the ability of the genetic code to buffer, for example, the deleterious effects of translation errors very unlikely. Indeed, an optimization of about 100% would seem that it might not have been achieved by a simple neutral process, but this ability should probably have been generated instead by the intervention of natural selection. In actual fact, we show that the neutral hypothesis of the origin of error minimization has been falsified for the model analyzed here. Therefore, we will discuss our observations within the theories proposed to explain the origin of the organization of the genetic code, reaching the conclusion that the coevolution theory is the most strongly corroborated theory.


Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1768
Author(s):  
Changho Hyun ◽  
Yong-Un Jeong ◽  
Suhwan Kim ◽  
Joo-Hyung Chae

This paper presents a method for preventing output level distortion while matching the channel impedance in the single-ended PAM-4 transmitter for memory interfaces. ZQ codes for all four output signal levels were obtained through ZQ calibration and saved in the ZQ code table. The ZQ code generator then adaptively selected the appropriate codes depending on the data pattern and delivered them to the output driver; this can improve the level separation mismatch ratio (RLM) while matching the channel impedance. To validate the effectiveness of our approach, a prototype chip with an active area of 0.035 mm2 was fabricated in a 65 nm CMOS process. It achieved the energy efficiency of 3.09 pJ/bit/pin at 18 Gb/s/pin, and its RLM was 0.971 while matching the channel impedance.


2020 ◽  
Vol 23 (3-4) ◽  
Author(s):  
Katrien DE NIL ◽  
Marleen DE CEUKELAIRE ◽  
Marleen VAN DAMME

Table 2, Table 3 and Table 4 as the resulting dataset from 'De Nil, K., De Ceukelaire, M. & Van Damme, M., 2020. A reference dataset for the Neogene lithostratigraphy in Flanders, Belgium. Geologica Belgica, 23/3-4. https://doi.org/10.20341/gb.2020.021' Table 2. The general and different (sub)reference datasets resulting from the individual Neogene 2020 papers, with their DOV URL. Table 3. List of the individual boreholes and (temporary) outcrops of the Neogene reference set, with reference to the different individual papers of this collection, sorted by location as mentioned in the papers. *Complete ‘https://www.dov.vlaanderen.be/data/boring/’ with this unique code. **Complete http://collections.naturalsciences.be/ssh-geology-archives/arch/ with this unique code. Table 4. List of the individual CPT’s with reference to the different individual papers of this collection, sorted by DOV name.


Information ◽  
2020 ◽  
Vol 11 (3) ◽  
pp. 172 ◽  
Author(s):  
Wayit Abliz ◽  
Hao Wu ◽  
Maihemuti Maimaiti ◽  
Jiamila Wushouer ◽  
Kahaerjiang Abiderexiti ◽  
...  

To improve utilization of text storage resources and efficiency of data transmission, we proposed two syllable-based Uyghur text compression coding schemes. First, according to the statistics of syllable coverage of the corpus text, we constructed a 12-bit and 16-bit syllable code tables and added commonly used symbols—such as punctuation marks and ASCII characters—to the code tables. To enable the coding scheme to process Uyghur texts mixed with other language symbols, we introduced a flag code in the compression process to distinguish the Unicode encodings that were not in the code table. The experiments showed that the 12-bit coding scheme had an average compression ratio of 0.3 on Uyghur text less than 4 KB in size and that the 16-bit coding scheme had an average compression ratio of 0.5 on text less than 2 KB in size. Our compression schemes outperformed GZip, BZip2, and the LZW algorithm on short text and could be effectively applied to the compression of Uyghur short text for storage and applications.


Sign in / Sign up

Export Citation Format

Share Document