9 research outputs found

    Simulation of Modulation Formats for Coherent Optical Communication

    Get PDF
    Import 26/06/2013Cílém této bakalářské práce je prostudovat a poté simulovat modulační formáty pro koherentní detekce, poté provést simulace ve formě Flash animací a na závěr zhodnocení jednotlivých modulačních formátů. Bakalářská práce je rozdělena do čtyř hlavních částí, které vycházejí ze zadání. V první části jsou shnruty teoretické poznatky. Jsou zde popsány modulace z pohledu matematického. Tyto poznatky jsou zahrnuty v kapitole 1-3. Druhá část se zabývá simulacemi modulací v softwarovém nástroji Optiwave Optisystem 11 (64 bit), popsáním rozhraní jednotlivých modulačních formátů. V této části se také zabývám popsáním prostředí Optiwave. Rovněž je zde analýza simulací a popsání rozhraní v programu Optiwave. Tato část je obsažena v kapitole 4. V třetí části se zabývám vyhodnocením simulací. Jsou zde zhodnoceny dosavadní výsledky a je určena nejvhodnější modulace pro koherentní detekce. Tato část je obsažena v kapitole 5. Ve čtvrté části se zabývám tvorbou animací v nástroji Macromedia Flash 8. Čtvrtá část je popsána v kapitole 6.The topic of this bachelor thesis is to make a study of and then simulate modulation formats for coherent detection, then make animation in form of Flash animation and at the end make conclusion make evaluation of modulation formats. The bachelor thesis is divide into four principal parts, which are outlined below. In the first part deals and sums up the mathematical theory. There are described modulation formast from mathematical part. The section one is described at chapter 1-3. Second part focus on simulation of modulation formats in the software program Optiwave Optisystem 11 (64 bit), describing layouts of modulation formats. Likewise is include analyze of modulation formats and also interface of Optiwave too. It is covered in chapter 4. In the third part is evaluated of simulation showed grafical interface of making animation in software Adobe flash. There are show. There are described previous results and it is determine most suitable modulation for coherent detecion. This section is described at chapter 5. In the fourt part is described making of animation in tool Macromedia Flash 8. Fourth part is described in chapter 6.440 - Katedra telekomunikační technikyvelmi dobř

    Bulloch Times (Statesboro News-Statesboro Eagle)

    Get PDF
    https://digitalcommons.georgiasouthern.edu/bulloch-news-issues/2895/thumbnail.jp

    Proceedings, High-Altitude Revegetation Workshop no. 4: Colorado School of Mines, Golden, Colorado, February 26-27, 1980

    Get PDF
    June 1980.Includes bibliographies.High Altitude Revegetation Workshop (4th : 1980 : Colorado School of Mines

    Computational Intelligence Algorithms for Optimisation of Wireless Sensor Networks

    Get PDF
    Recent studies have tended towards incorporating Computation Intelligence, which is a large umbrella for all Machine Learning and Metaheuristic approaches into wireless sensor network (WSN) applications for enhanced and intuitive performance. Meta-heuristic optimisation techniques are used for solving several WSN issues such as energy minimisation, coverage, routing, scheduling and so on. This research designs and develops highly intelligent WSNs that can provide the core requirement of energy efficiency and reliability. To meet these requirements, two major decisions were carried out at the sink node or base station. The first decision involves the use of supervised and unsupervised machine learning algorithms to achieve an accurate decision at the sink node. This thesis presents a new hybrid approach for event (fire) detection system using k-means clustering on aggregated fire data to form two class labels (fire and non-fire). The resulting data outputs are trained and tested by the Feed Forward Neural Network, Naive Bayes, and Decision Trees classifier. This hybrid approach was found to significantly improve fire detection performance against the use of only the classifiers. The second decision employs a metaheuristic approach to optimise the solution of WSNs clustering problem. Two metaheuristic-based protocols namely the Dynamic Local Search Algorithm for Clustering Hierarchy (DLSACH) and Heuristics Algorithm for Clustering Hierarchy (HACH) are proposed to achieve an evenly balanced energy and minimise the net residual energy of each sensor nodes. This thesis proved that the two protocols outperforms state-of-the-art protocols such as LEACH, TCAC and SEECH in terms of network lifetime and maintains a favourable performance even under different energy heterogeneity settings

    Studies on the protective immune response to Plasmodium chabaudi in mice

    Get PDF
    Inbred strains of C5731 and NIH nice infected with the A/S strain of Plasmodium chaubaudi usually developed high parasitaemias but infections were rarely fatal in immunocompetent mice and in most mice the parasites could be eradicated within 53 days or less. The immune response of C57B1 and NTH mice to infection with the A/S strain of P. chabaudi was studied. The principle method used in this study for investigating the immune response of the mice was to examine the immunity conferred on syngeneic mice, either X-irradiated or non-irradiated, by transferring to them lymphoid cells or serum from immune or semi-immune donors. The lymphoid cell populations examined were unfractionated spleen cells, nylon wool column enriched subpopulations of thymus-derived lymphocytes (T cells) and the so-called bursa-derived lymphocytes (B cells), bone marrow cells and phagocytic cells. In the course of these experiments observations were made on the effect of X-irradiation on the subsequent growth and multiplication of the parasite. In addition, an in vitro assay for antibody-dependent cell mediated cytotoxicity was used to investigate the activity of splenic K cells during malaria infection. K cells are lymphoid cells which may include lymphocytes of an undefined category, but possess receptors for the Fc portion of antibody on their surface and have the ability to non-specifically lyse target cells coated in antibodies. a) The adoptive transfer of immunity to P.chabaudi with immune spleen cells. Spleen cells from mice which had previously been infected with P.chabaudi were able to confer some immunity on syngeneic mice which had been irradiated with 600 or 800 rads. The protection was detected as a shortened patent parasitaemia in immune cell recipients compared to controls. The early experiments indicated the value of using irradiated recipients rather than non-irradiated recipients. In irradiated mice, a) smaller numbers of immune cells were required to promote detectable immunity than in non-irradiated mice, b) there was an amplification of the difference in the duration of primary parasitaemias in recipients of immune cells and normal cells compared to non-irradiated mice and c) as the irradiated host is immunodepressed, the protective effect of donor cells can be examined with a reduced contribution by the hosts own immune system. An initial non-specific resistance to P.chabaudi infection was observed in irradiated mice, although the infection in most of these mice was subsequently more severe than in non-irradiated mice. The non-specific resistance could be reduced or abolished by injecting lymphoid cells into mice shortly after irradiation or by infecting irradiated mice more than 15 days after irradiation. Other workers suggest that following irradiation, the reticulo-endothelial system is stimulated at the time that the non-specific resistance to P.chabaudi was observed. b) the adoptive transfer of immunity in syngeneic mice with enriched subpopulations of splenic immune T cells, B. cells, bone marrow cells and phagocytes. Immunity to P.chabaudi could be adoptively transferred with enriched spleen subpopulations of immune T cells or immune B cells in mice which had been irradiated 600 or 300 rads. The protective effects of unfractionated immune cells was, however, usually better than that of either immune T or F cell subpopulations. In most experiments enriched immune T cell recipients were more likely to suffer relapsing patent parasitaemias than either enriched immune B cell recipients or unfractionated immune cell recipients. In one experiment a comparison was made of the course of P.chabaudi infection in mice which had been irradiated with either 600 rads or 300 rads and which received injections of different immune cells. A dose of 600 rads permits the immune system of mice to recover from the effects of irradiation, but a dose of 800 rads is lethal to mice unless lymphoid cells are injected after irradiation. It was found that in recipients of enriched immune T or B cells, which had been irradiated with 600 rads, the parasitaemia became subpatent before their equivalents irradiated with 800 rads, but that there was little difference in parasitaemias between recipients of unfractionated immune cells given 600 or 800 rads. Experiments in which enriched immune T cells and B cells were recombined and injected into syngeneic mice gave inconclusive results as to whether the immune subpopulations acted synergistically. Similar experiments in which immune subpopulations of lymphoid cells were recombined with normal subpopulations of lymphoid cells demonstrated that the latter cells did not enhance the protective effect of the former cells. Bone marrow cells from immune mice were able to confer some protection on syngeneic recipients, but were not as protective as enriched immune T cells or B cells. The results obtained in adoptive transfer experiments using phagocytic cells from the spleen of immune mice depended on the length of time spleen cells were incubated in petri-dishes at 37° C before harvesting the phagocytes. Using C57B1 mice, phagocytes harvested after 15 hours incubation were as protective as unfractionated immune cells in a cell transfer experiment, but phagocytes harvested after 16 hours incubation were not protective. Examination of NIH phagocytic cells after 2.5 hours incubation at 37°C, which were as protective as unfractionated immune spleen cells in a cell transfer experiment, demonstrated that the petri-dish adherent cells may have contained B lymphocytes. c) The passive transfer of immunity with serum from P.chabaudi infected mice. The passive transfer of serum from C57B1 mice which had been previously infected with P.chabaudi to normal or irradiated syngeneic mice demonstrated that the serum recipients were initially protected from infection. Irradiated mice, however, were delayed longer in the onset of parasitaemia compared to non-irradiated mice. Using NIH mice, sera were collected from unfractionated immune spleen cell recipients, enriched immune T cell recipients and normal spleen recipients on the 11th day of a P.chabaudi infection, just after peak parasitaemia, and also on the 14th day of infection. On day 14, all immune cells recipients and most of the enriched immune T cell recipients had become subpatent but all normal cell recipients still had patent infections. Sera collected from the different spleen cell recipients on the 11th day of infection and passively transferred to irradiated mice demonstrated little protection. Sera collected on the 14th day of infect ion, however, reflected the immune status of the donors in their protective properties in mice infected with P.chabaudi. The serum from unfractionated immune cell recipients was the most protective of the 3 sera when compared to normal NIH serum and the serum from enriched immune T cell recipients was slightly protective, but the serum from normal cell recipients produced an enhanced infection in mice infected with P.chabaudi. d) Antibody-dependent cell-mediated cytotoxicity of spleen cells in P.chabaudi infected mice. In a preliminary investigation of K cell activity in the spleens of P.chabaudi infected mice, it was found that there was an increased activity of K cells collected at around peak parasitaemia compared to the activity of K cells in non-infected mice, and that this increased activity could also be found in mice which had recently become subpatent. As the target cell for antibody-dependent cell-mediated cytotoxicity employed was the thick red blood cell, it is not known whether the K cell is involved in the killing of P.chabaudi parasites. These results suggest that both T cells and B cells and antibody may be important in the immune response to P.chabaudi in mice. Primed T cells may act as helper cells in the production of malarial antibodies, but, as enriched primed T cells could confer protection on immunodepressed mice, it is possible that a cell-mediated mechanism of immunity may also exist

    Umayyad epistolography, with special reference to the compositions ascribed to 'Abd al-Hamid al-Katib.

    Get PDF
    The object of this study, an analysis of Umayyad epistolography and chancery practice, is characterised by the more general problem of source material for the first century of Islamic history. The sources may be grouped as follows: (a) papyri; (b) insha, balaqha, and adab; (c) history, biography, and geography; (d) hadith, fiqh, and haeresiography. My approach to the problem delineated here will be set out in three chapters: (1) An examination of the Umayyad chancery: its structure, its adaptation to Arabic, and its technical development (2) A critical analysis of specimen letters reported to have been composed during the Umayyad period. (3) A study of the compositions ascribed to the dominant figure of 'Abd al-Hamid al-Katib, traditionally acknowledged as the major factor in the development of the Umayyad chancery. The conclusion of this study may be set out as follows: (1) It has been found that the Umayyad chancery format consists of (a) introductory formulae: the basmala, the inside address (al-unwan), the salam, the tahmid, and amma'd; (b) concluding formulae: dm sha Allah (if God wills), repeating the formula of salam with the definite article "al" the name of the scribe, and the date. (2) It has been noticed that the records of Kharaj in the conquered countries used to be written in Arabic, while the demand letters issued from the bureau of Kharaj were written in Persian, Greek, and Coptic until the reign of 'Abd al-Malik b. Marwan who ordered his secretaries to write them in Arabic. (3) With regard to the letters ascribed to 'Abd al-Hamid al-Katib, it has been found that they are not authentic and they could not be regarded as representative of the Umayyad chancery practice, for they involve considerable Abbasid characteristics

    Прикладні системи оцінювання ризиків інформаційної безпеки

    Get PDF
    Монографія присвячена теоретико-методологічним і практичним аспектам оцінювання ризиків інформаційної безпеки. У роботі проведено аналіз базових понять, методів, моделей, засобів та міжнародних нормативних документів, пов'язаних з оцінюванням і управлінням ризиками. Значну увагу приділено розробленню методів модифікації порядку лінгвістичної змінної при перевизначенні еталонів параметрів, а також оцінювання ризиків безпеки ресурсів інформаційних систем в реальному часі з використанням CVSS метрик, які містяться у відкритих базах даних уразливостей. Докладно розглянуті питання практичного оцінювання ризиків без залучення експертів відповідної предметної галузі при нечітких і детермінованих умовах оцінювання з використанням параметрів, які можуть бути представлені як в числовій, так і лінгвістичній формі з урахуванням періоду часу, галузі промисловості, економічної та управлінської специфіки підприємства. Книга призначена для науковців, інженерів, аспірантів і студентів вищих навчальних закладів відповідного профілю
    corecore