9 research outputs found
Simulation of Modulation Formats for Coherent Optical Communication
Import 26/06/2013Cílém této bakalářské práce je prostudovat a poté simulovat modulační formáty pro koherentní detekce, poté provést simulace ve formě Flash animací a na závěr zhodnocení jednotlivých modulačních formátů. Bakalářská práce je rozdělena do čtyř hlavních částí, které vycházejí ze zadání.
V první části jsou shnruty teoretické poznatky. Jsou zde popsány modulace z pohledu matematického. Tyto poznatky jsou zahrnuty v kapitole 1-3.
Druhá část se zabývá simulacemi modulací v softwarovém nástroji Optiwave Optisystem 11 (64 bit), popsáním rozhraní jednotlivých modulačních formátů. V této části se také zabývám popsáním prostředí Optiwave. Rovněž je zde analýza simulací a popsání rozhraní v programu Optiwave. Tato část je obsažena v kapitole 4.
V třetí části se zabývám vyhodnocením simulací. Jsou zde zhodnoceny dosavadní výsledky a je určena nejvhodnější modulace pro koherentní detekce. Tato část je obsažena v kapitole 5.
Ve čtvrté části se zabývám tvorbou animací v nástroji Macromedia Flash 8. Čtvrtá část je popsána v kapitole 6.The topic of this bachelor thesis is to make a study of and then simulate modulation formats for coherent detection, then make animation in form of Flash animation and at the end make conclusion make evaluation of modulation formats. The bachelor thesis is divide into four principal parts, which are outlined below.
In the first part deals and sums up the mathematical theory. There are described modulation formast from mathematical part. The section one is described at chapter 1-3.
Second part focus on simulation of modulation formats in the software program Optiwave Optisystem 11 (64 bit), describing layouts of modulation formats. Likewise is include analyze of modulation formats and also interface of Optiwave too. It is covered in chapter 4.
In the third part is evaluated of simulation showed grafical interface of making animation in software Adobe flash. There are show. There are described previous results and it is determine most suitable modulation for coherent detecion. This section is described at chapter 5.
In the fourt part is described making of animation in tool Macromedia Flash 8. Fourth part is described in chapter 6.440 - Katedra telekomunikační technikyvelmi dobř
Bulloch Times (Statesboro News-Statesboro Eagle)
https://digitalcommons.georgiasouthern.edu/bulloch-news-issues/2895/thumbnail.jp
Recommended from our members
Simulation of farm bargaining board policies in western late potato system
Published March 1972. Facts and recommendations in this publication may no longer be valid. Please look for up-to-date information in the OSU Extension Catalog: http://extension.oregonstate.edu/catalo
Proceedings, High-Altitude Revegetation Workshop no. 4: Colorado School of Mines, Golden, Colorado, February 26-27, 1980
June 1980.Includes bibliographies.High Altitude Revegetation Workshop (4th : 1980 : Colorado School of Mines
Computational Intelligence Algorithms for Optimisation of Wireless Sensor Networks
Recent studies have tended towards incorporating Computation Intelligence,
which is a large umbrella for all Machine Learning and Metaheuristic
approaches into wireless sensor network (WSN) applications
for enhanced and intuitive performance. Meta-heuristic optimisation
techniques are used for solving several WSN issues such as energy
minimisation, coverage, routing, scheduling and so on. This research
designs and develops highly intelligent WSNs that can provide the
core requirement of energy efficiency and reliability. To meet these
requirements, two major decisions were carried out at the sink node
or base station. The first decision involves the use of supervised and
unsupervised machine learning algorithms to achieve an accurate decision
at the sink node. This thesis presents a new hybrid approach
for event (fire) detection system using k-means clustering on aggregated
fire data to form two class labels (fire and non-fire). The resulting
data outputs are trained and tested by the Feed Forward Neural
Network, Naive Bayes, and Decision Trees classifier. This hybrid approach
was found to significantly improve fire detection performance
against the use of only the classifiers. The second decision employs
a metaheuristic approach to optimise the solution of WSNs clustering
problem. Two metaheuristic-based protocols namely the Dynamic
Local Search Algorithm for Clustering Hierarchy (DLSACH) and Heuristics
Algorithm for Clustering Hierarchy (HACH) are proposed to achieve
an evenly balanced energy and minimise the net residual energy of
each sensor nodes. This thesis proved that the two protocols outperforms
state-of-the-art protocols such as LEACH, TCAC and SEECH
in terms of network lifetime and maintains a favourable performance
even under different energy heterogeneity settings
Studies on the protective immune response to Plasmodium chabaudi in mice
Inbred strains of C5731 and NIH nice infected with the A/S
strain of Plasmodium chaubaudi usually developed high parasitaemias but
infections were rarely fatal in immunocompetent mice and in most mice
the parasites could be eradicated within 53 days or less. The immune
response of C57B1 and NTH mice to infection with the A/S strain of
P. chabaudi was studied. The principle method used in this study for
investigating the immune response of the mice was to examine the immunity
conferred on syngeneic mice, either X-irradiated or non-irradiated, by
transferring to them lymphoid cells or serum from immune or semi-immune
donors. The lymphoid cell populations examined were unfractionated spleen
cells, nylon wool column enriched subpopulations of thymus-derived
lymphocytes (T cells) and the so-called bursa-derived lymphocytes (B cells),
bone marrow cells and phagocytic cells. In the course of these experiments
observations were made on the effect of X-irradiation on the subsequent
growth and multiplication of the parasite.
In addition, an in vitro assay for antibody-dependent cell
mediated cytotoxicity was used to investigate the activity of splenic
K cells during malaria infection. K cells are lymphoid cells which may
include lymphocytes of an undefined category, but possess receptors for
the Fc portion of antibody on their surface and have the ability to non-specifically
lyse target cells coated in antibodies.
a) The adoptive transfer of immunity to P.chabaudi with immune spleen cells.
Spleen cells from mice which had previously been infected with
P.chabaudi were able to confer some immunity on syngeneic mice which had
been irradiated with 600 or 800 rads. The protection was detected as a shortened patent parasitaemia in immune cell recipients compared to
controls. The early experiments indicated the value of using irradiated
recipients rather than non-irradiated recipients. In irradiated mice, a) smaller numbers of immune cells were required to promote detectable immunity than in non-irradiated mice, b) there was an amplification of the difference in the duration of primary parasitaemias in recipients of immune cells and normal cells compared to non-irradiated mice and c) as the irradiated host is immunodepressed, the protective effect of donor cells can be examined with a reduced contribution by the hosts own immune system.
An initial non-specific resistance to P.chabaudi infection was observed in irradiated mice, although the infection in most of these mice was subsequently more severe than in non-irradiated mice. The non-specific resistance could be reduced or abolished by injecting lymphoid cells into mice shortly after irradiation or by infecting irradiated mice more than 15 days after irradiation. Other workers suggest that following irradiation, the reticulo-endothelial system is stimulated at the time that the non-specific resistance to P.chabaudi was observed.
b) the adoptive transfer of immunity in syngeneic mice with enriched
subpopulations of splenic immune T cells, B. cells, bone marrow cells
and phagocytes.
Immunity to P.chabaudi could be adoptively transferred with
enriched spleen subpopulations of immune T cells or immune B cells in
mice which had been irradiated 600 or 300 rads. The protective
effects of unfractionated immune cells was, however, usually better than
that of either immune T or F cell subpopulations. In most experiments
enriched immune T cell recipients were more likely to suffer relapsing patent parasitaemias than either enriched immune B cell recipients or unfractionated immune cell recipients. In one experiment a comparison
was made of the course of P.chabaudi infection in mice which had been
irradiated with either 600 rads or 300 rads and which received injections
of different immune cells. A dose of 600 rads permits the immune
system of mice to recover from the effects of irradiation, but a dose
of 800 rads is lethal to mice unless lymphoid cells are injected after irradiation. It was found that in recipients of enriched immune T or B cells, which had been irradiated with 600 rads, the parasitaemia became subpatent before their equivalents irradiated with 800 rads, but that there was little difference in parasitaemias between recipients of unfractionated immune cells given 600 or 800 rads. Experiments in which enriched immune T cells and B cells were recombined and injected
into syngeneic mice gave inconclusive results as to whether the immune
subpopulations acted synergistically. Similar experiments in which
immune subpopulations of lymphoid cells were recombined with normal
subpopulations of lymphoid cells demonstrated that the latter cells did
not enhance the protective effect of the former cells. Bone marrow
cells from immune mice were able to confer some protection on syngeneic
recipients, but were not as protective as enriched immune T cells or B
cells. The results obtained in adoptive transfer experiments using
phagocytic cells from the spleen of immune mice depended on the length
of time spleen cells were incubated in petri-dishes at 37° C before
harvesting the phagocytes. Using C57B1 mice, phagocytes harvested
after 15 hours incubation were as protective as unfractionated immune
cells in a cell transfer experiment, but phagocytes harvested after 16
hours incubation were not protective. Examination of NIH phagocytic
cells after 2.5 hours incubation at 37°C, which were as protective as
unfractionated immune spleen cells in a cell transfer experiment, demonstrated
that the petri-dish adherent cells may have contained B lymphocytes.
c) The passive transfer of immunity with serum from P.chabaudi infected mice.
The passive transfer of serum from C57B1 mice which had been previously infected with P.chabaudi to normal or irradiated syngeneic mice demonstrated that the serum recipients were initially protected from
infection. Irradiated mice, however, were delayed longer in the onset
of parasitaemia compared to non-irradiated mice. Using NIH mice, sera were collected from unfractionated immune spleen cell recipients, enriched immune T cell recipients and normal spleen recipients on the 11th day of a P.chabaudi infection, just after peak parasitaemia, and also on the 14th day of infection.
On day 14, all immune cells recipients and most of the enriched immune T cell recipients had become subpatent but all normal cell recipients still had patent infections.
Sera collected from the different spleen cell recipients on the 11th day
of infection and passively transferred to irradiated mice demonstrated
little protection. Sera collected on the 14th day of infect ion, however,
reflected the immune status of the donors in their protective properties
in mice infected with P.chabaudi. The serum from unfractionated immune cell
recipients was the most protective of the 3 sera when compared to normal
NIH serum and the serum from enriched immune T cell recipients was
slightly protective, but the serum from normal cell recipients produced
an enhanced infection in mice infected with P.chabaudi.
d) Antibody-dependent cell-mediated cytotoxicity of spleen cells in P.chabaudi infected mice.
In a preliminary investigation of K cell activity in the spleens of P.chabaudi infected mice, it was found that there was an increased activity of K cells collected at around peak parasitaemia compared to the activity of K cells in non-infected mice, and that this increased activity could also be found in mice which had recently become subpatent. As the target cell for antibody-dependent cell-mediated cytotoxicity employed was the thick red blood cell, it is not known whether the K cell is involved in the killing of P.chabaudi parasites.
These results suggest that both T cells and B cells and
antibody may be important in the immune response to P.chabaudi in mice.
Primed T cells may act as helper cells in the production of malarial
antibodies, but, as enriched primed T cells could confer protection on
immunodepressed mice, it is possible that a cell-mediated mechanism of
immunity may also exist
Umayyad epistolography, with special reference to the compositions ascribed to 'Abd al-Hamid al-Katib.
The object of this study, an analysis of Umayyad epistolography and chancery practice, is characterised by the more general problem of source material for the first century of Islamic history. The sources may be grouped as follows: (a) papyri; (b) insha, balaqha, and adab; (c) history, biography, and geography; (d) hadith, fiqh, and haeresiography. My approach to the problem delineated here will be set out in three chapters: (1) An examination of the Umayyad chancery: its structure, its adaptation to Arabic, and its technical development (2) A critical analysis of specimen letters reported to have been composed during the Umayyad period. (3) A study of the compositions ascribed to the dominant figure of 'Abd al-Hamid al-Katib, traditionally acknowledged as the major factor in the development of the Umayyad chancery. The conclusion of this study may be set out as follows: (1) It has been found that the Umayyad chancery format consists of (a) introductory formulae: the basmala, the inside address (al-unwan), the salam, the tahmid, and amma'd; (b) concluding formulae: dm sha Allah (if God wills), repeating the formula of salam with the definite article "al" the name of the scribe, and the date. (2) It has been noticed that the records of Kharaj in the conquered countries used to be written in Arabic, while the demand letters issued from the bureau of Kharaj were written in Persian, Greek, and Coptic until the reign of 'Abd al-Malik b. Marwan who ordered his secretaries to write them in Arabic. (3) With regard to the letters ascribed to 'Abd al-Hamid al-Katib, it has been found that they are not authentic and they could not be regarded as representative of the Umayyad chancery practice, for they involve considerable Abbasid characteristics
Прикладні системи оцінювання ризиків інформаційної безпеки
Монографія присвячена теоретико-методологічним і практичним аспектам оцінювання ризиків інформаційної безпеки. У роботі проведено аналіз базових понять, методів, моделей, засобів та міжнародних нормативних документів, пов'язаних з оцінюванням і управлінням ризиками. Значну увагу приділено розробленню методів модифікації порядку лінгвістичної змінної при перевизначенні еталонів параметрів, а також оцінювання ризиків безпеки ресурсів інформаційних систем в реальному часі з використанням CVSS метрик, які містяться у відкритих базах даних уразливостей. Докладно розглянуті питання практичного оцінювання ризиків без залучення експертів відповідної предметної галузі при нечітких і детермінованих умовах оцінювання з використанням параметрів, які можуть бути представлені як в числовій, так і лінгвістичній формі з урахуванням періоду часу, галузі промисловості, економічної та управлінської специфіки підприємства.
Книга призначена для науковців, інженерів, аспірантів і студентів вищих навчальних закладів відповідного профілю