1,234 research outputs found

    The S2 VLBI Correlator: A Correlator for Space VLBI and Geodetic Signal Processing

    Get PDF
    We describe the design of a correlator system for ground and space-based VLBI. The correlator contains unique signal processing functions: flexible LO frequency switching for bandwidth synthesis; 1 ms dump intervals, multi-rate digital signal-processing techniques to allow correlation of signals at different sample rates; and a digital filter for very high resolution cross-power spectra. It also includes autocorrelation, tone extraction, pulsar gating, signal-statistics accumulation.Comment: 44 pages, 13 figure

    Impact of random obstacles on the dynamics of a dense colloidal fluid

    Full text link
    Using molecular dynamics simulations we study the slow dynamics of a colloidal fluid annealed within a matrix of obstacles quenched from an equilibrated colloidal fluid. We choose all particles to be of the same size and to interact as hard spheres, thus retaining all features of the porous confinement while limiting the control parameters to the packing fraction of the matrix, {\Phi}m, and that of the fluid, {\Phi}f. We conduct detailed investigations on several dynamic properties, including the tagged-particle and collective intermediate scattering functions, the mean-squared displacement, and the van Hove function. We show the confining obstacles to profoundly impact the relaxation pattern of various quantifiers pertinent to the fluid. Varying the type of quantifier (tagged-particle or collective) as well as {\Phi}m and {\Phi}f, we unveil both discontinuous and continuous arrest scenarios. Furthermore, we discover subdiffusive behavior and demonstrate its close connection to the matrix structure. Our findings partly confirm the various predictions of a recent extension of mode-coupling theory to the quenched-annealed protocol.Comment: 16 pages, 20 figures, minor revision

    A Dynamically Configurable Log-based Distributed Security Event Detection Methodology using Simple Event Correlator

    Get PDF
    Log event correlation is an effective means of detecting system faults and security breaches encountered in information technology environments. Centralized, database-driven log event correlation is common, but suffers from flaws such as high network bandwidth utilization, significant requirements for system resources, and difficulty in detecting certain suspicious behaviors. This research presents a distributed event correlation system which performs security event detection, and compares it with a centralized alternative. The comparison measures the value in distributed event correlation by considering network bandwidth utilization, detection capability and database query efficiency, as well as through the implementation of remote configuration scripts and correlation of multiple log sources. These capabilities produce a configuration which allows a 99% reduction of network syslog traffic in the low-accountability case, and a significant decrease in database execution time through context-addition in the high-accountability case. In addition, the system detects every implemented malicious use case, with a low false positive rate

    A Scalable Correlator Architecture Based on Modular FPGA Hardware, Reuseable Gateware, and Data Packetization

    Full text link
    A new generation of radio telescopes is achieving unprecedented levels of sensitivity and resolution, as well as increased agility and field-of-view, by employing high-performance digital signal processing hardware to phase and correlate large numbers of antennas. The computational demands of these imaging systems scale in proportion to BMN^2, where B is the signal bandwidth, M is the number of independent beams, and N is the number of antennas. The specifications of many new arrays lead to demands in excess of tens of PetaOps per second. To meet this challenge, we have developed a general purpose correlator architecture using standard 10-Gbit Ethernet switches to pass data between flexible hardware modules containing Field Programmable Gate Array (FPGA) chips. These chips are programmed using open-source signal processing libraries we have developed to be flexible, scalable, and chip-independent. This work reduces the time and cost of implementing a wide range of signal processing systems, with correlators foremost among them,and facilitates upgrading to new generations of processing technology. We present several correlator deployments, including a 16-antenna, 200-MHz bandwidth, 4-bit, full Stokes parameter application deployed on the Precision Array for Probing the Epoch of Reionization.Comment: Accepted to Publications of the Astronomy Society of the Pacific. 31 pages. v2: corrected typo, v3: corrected Fig. 1

    Spread spectrum-based video watermarking algorithms for copyright protection

    Get PDF
    Merged with duplicate record 10026.1/2263 on 14.03.2017 by CS (TIS)Digital technologies know an unprecedented expansion in the last years. The consumer can now benefit from hardware and software which was considered state-of-the-art several years ago. The advantages offered by the digital technologies are major but the same digital technology opens the door for unlimited piracy. Copying an analogue VCR tape was certainly possible and relatively easy, in spite of various forms of protection, but due to the analogue environment, the subsequent copies had an inherent loss in quality. This was a natural way of limiting the multiple copying of a video material. With digital technology, this barrier disappears, being possible to make as many copies as desired, without any loss in quality whatsoever. Digital watermarking is one of the best available tools for fighting this threat. The aim of the present work was to develop a digital watermarking system compliant with the recommendations drawn by the EBU, for video broadcast monitoring. Since the watermark can be inserted in either spatial domain or transform domain, this aspect was investigated and led to the conclusion that wavelet transform is one of the best solutions available. Since watermarking is not an easy task, especially considering the robustness under various attacks several techniques were employed in order to increase the capacity/robustness of the system: spread-spectrum and modulation techniques to cast the watermark, powerful error correction to protect the mark, human visual models to insert a robust mark and to ensure its invisibility. The combination of these methods led to a major improvement, but yet the system wasn't robust to several important geometrical attacks. In order to achieve this last milestone, the system uses two distinct watermarks: a spatial domain reference watermark and the main watermark embedded in the wavelet domain. By using this reference watermark and techniques specific to image registration, the system is able to determine the parameters of the attack and revert it. Once the attack was reverted, the main watermark is recovered. The final result is a high capacity, blind DWr-based video watermarking system, robust to a wide range of attacks.BBC Research & Developmen

    Resonance contributions to HBT correlation radii

    Get PDF
    We study the effect of resonance decays on intensity interferometry for heavy ion collisions. Collective expansion of the source leads to a dependence of the two-particle correlation function on the pair momentum K. This opens the possibility to reconstruct the dynamics of the source from the K-dependence of the measured HBT radii. Here we address the question to what extent resonance decays can fake such a flow signal. Within a simple parametrization for the emission function we present a comprehensive analysis of the interplay of flow and resonance decays on the one- and two-particle spectra. We discuss in detail the non-Gaussian features of the correlation function introduced by long-lived resonances and the resulting problems in extracting meaningful HBT radii. We propose to define them in terms of the second order q-moments of the correlator C(q, K). We show that this yields a more reliable characterisation of the correlator in terms of its width and the correlation strength `lambda' than other commonly used fit procedures. The normalized fourth-order q-moments (kurtosis) provide a quantitative measure for the non-Gaussian features of the correlator. At least for the class of models studied here, the kurtosis helps separating effects from expansion flow and resonance decays, and provides the cleanest signal to distinguish between scenarios with and without transverse flow.Comment: 23 pages, twocolumn RevTeX, 12 eps-figures included, minor changes following referee comment

    Design and Analysis of a Dynamically Configured Log-based Distributed Security Event Detection Methodology

    Get PDF
    Military and defense organizations rely upon the security of data stored in, and communicated through, their cyber infrastructure to fulfill their mission objectives. It is essential to identify threats to the cyber infrastructure in a timely manner, so that mission risks can be recognized and mitigated. Centralized event logging and correlation is a proven method for identifying threats to cyber resources. However, centralized event logging is inflexible and does not scale well, because it consumes excessive network bandwidth and imposes significant storage and processing requirements on the central event log server. In this paper, we present a flexible, distributed event correlation system designed to overcome these limitations by distributing the event correlation workload across the network of event-producing systems. To demonstrate the utility of the methodology, we model and simulate centralized, decentralized, and hybrid log analysis environments over three accountability levels and compare their performance in terms of detection capability, network bandwidth utilization, database query efficiency, and configurability. The results show that when compared to centralized event correlation, dynamically configured distributed event correlation provides increased flexibility, a significant reduction in network traffic in low and medium accountability environments, and a decrease in database query execution time in the high-accountability case

    Hadron Correlations at Energies from GeV to TeV

    Get PDF
    One of the central issues in High Energy Physics is the close interchange between Theory and Experiment. Ever since I know Andrzej Bia{\l}as, I know him as one of the theorists most interested in experimental data. This has naturally led to continuous fruitful contacts. Even though we have been working somehow together since about 1968, we so far have only one single publication in common. This was back in 1969 and it was on means to efficiently study what we then called (exclusive) Multihadron Final States. At that time this meant 3- or at best 4-particle final states of two-hadron collisions at cms energies of some 4 GeV (not TeV!). The field of multiparticle dynamics was in fact the domain of Polish high-energy physicists. The first of a very successful (and still lasting) series of annual International Symposia on Multiparticle Dynamics was organized in Paris in 1970, but essentially by Polish physicists. Andrzej himself was not attending, but it was he who organized the third in these series in (of course) Zakopane. Since heavy ion-collisions, another field of major interest for Andrzej, will be covered by others, I here will restrict myself mainly to the collisions of two elementary particles.Comment: 32 pages, 26 figure

    Direct sequence spread spectrum techniques in local area networks

    Get PDF
    This thesis describes the application of a direct sequence spread spectrum modulation scheme to the physical layer of a local area networks subsequently named the SS-LAN. Most present day LANs employ erne form or another of time division multiplexing which performs well in many systems but which is limited by its very nature in real time, time critical and time demanding applications. The use of spread spectrum multiplexing removes these limitations by providing a simultaneous multiple user access capability to the channel which permits each and all nodes to utilise the channel independent of the activity being currently supported by that channel. The theory of spectral spreading is a consequence of the Shannon channel capacity in which the channel capacity may be maintained by the trading of signal to noise ratio for bandwidth. The increased bandwidth provides an increased signal dimensionality which can be utilised in providing noise immunity and/or a simultaneous multiple user environment: the effects of the simultaneous users can be considered as noise from the point of view of any particular constituent signal. The use of code sequences at the physical layer of a LAN permits a wide range of mapping alternatives which can be selected according to the particular application. Each of the mapping techniques possess the general spread spectrum properties but certain properties can be emphasised at the expense of others. The work has Involved the description of the properties of the SS-LAN coupled with the development of the mapping techniques for use In the distribution of the code sequences. This has been followed by an appraisal of a set of code sequences which has resulted in the definition of the ideal code properties and the selection of code families for particular types of applications. The top level design specification for the hardware required in the construction of the SS-LAN has also been presented and this has provided the basis for a simplified and idealised theoretical analysis of the performance parameters of the SS-LAN. A positive set of conclusions for the range of these parameters has been obtained and these have been further analysed by the use of a SS-LAN computer simulation program. This program can simulate any configuration of the SS-LAN and the results it has produced have been compared with those of the analysis and have been found to be in agreement. A tool for the further analysis of complex SS-LAN configurations has therefore been developed and this will form the basis for further work
    • …
    corecore