1,234 research outputs found
The S2 VLBI Correlator: A Correlator for Space VLBI and Geodetic Signal Processing
We describe the design of a correlator system for ground and space-based
VLBI. The correlator contains unique signal processing functions: flexible LO
frequency switching for bandwidth synthesis; 1 ms dump intervals, multi-rate
digital signal-processing techniques to allow correlation of signals at
different sample rates; and a digital filter for very high resolution
cross-power spectra. It also includes autocorrelation, tone extraction, pulsar
gating, signal-statistics accumulation.Comment: 44 pages, 13 figure
Impact of random obstacles on the dynamics of a dense colloidal fluid
Using molecular dynamics simulations we study the slow dynamics of a
colloidal fluid annealed within a matrix of obstacles quenched from an
equilibrated colloidal fluid. We choose all particles to be of the same size
and to interact as hard spheres, thus retaining all features of the porous
confinement while limiting the control parameters to the packing fraction of
the matrix, {\Phi}m, and that of the fluid, {\Phi}f. We conduct detailed
investigations on several dynamic properties, including the tagged-particle and
collective intermediate scattering functions, the mean-squared displacement,
and the van Hove function. We show the confining obstacles to profoundly impact
the relaxation pattern of various quantifiers pertinent to the fluid. Varying
the type of quantifier (tagged-particle or collective) as well as {\Phi}m and
{\Phi}f, we unveil both discontinuous and continuous arrest scenarios.
Furthermore, we discover subdiffusive behavior and demonstrate its close
connection to the matrix structure. Our findings partly confirm the various
predictions of a recent extension of mode-coupling theory to the
quenched-annealed protocol.Comment: 16 pages, 20 figures, minor revision
A Dynamically Configurable Log-based Distributed Security Event Detection Methodology using Simple Event Correlator
Log event correlation is an effective means of detecting system faults and security breaches encountered in information technology environments. Centralized, database-driven log event correlation is common, but suffers from flaws such as high network bandwidth utilization, significant requirements for system resources, and difficulty in detecting certain suspicious behaviors. This research presents a distributed event correlation system which performs security event detection, and compares it with a centralized alternative. The comparison measures the value in distributed event correlation by considering network bandwidth utilization, detection capability and database query efficiency, as well as through the implementation of remote configuration scripts and correlation of multiple log sources. These capabilities produce a configuration which allows a 99% reduction of network syslog traffic in the low-accountability case, and a significant decrease in database execution time through context-addition in the high-accountability case. In addition, the system detects every implemented malicious use case, with a low false positive rate
A Scalable Correlator Architecture Based on Modular FPGA Hardware, Reuseable Gateware, and Data Packetization
A new generation of radio telescopes is achieving unprecedented levels of
sensitivity and resolution, as well as increased agility and field-of-view, by
employing high-performance digital signal processing hardware to phase and
correlate large numbers of antennas. The computational demands of these imaging
systems scale in proportion to BMN^2, where B is the signal bandwidth, M is the
number of independent beams, and N is the number of antennas. The
specifications of many new arrays lead to demands in excess of tens of PetaOps
per second.
To meet this challenge, we have developed a general purpose correlator
architecture using standard 10-Gbit Ethernet switches to pass data between
flexible hardware modules containing Field Programmable Gate Array (FPGA)
chips. These chips are programmed using open-source signal processing libraries
we have developed to be flexible, scalable, and chip-independent. This work
reduces the time and cost of implementing a wide range of signal processing
systems, with correlators foremost among them,and facilitates upgrading to new
generations of processing technology. We present several correlator
deployments, including a 16-antenna, 200-MHz bandwidth, 4-bit, full Stokes
parameter application deployed on the Precision Array for Probing the Epoch of
Reionization.Comment: Accepted to Publications of the Astronomy Society of the Pacific. 31
pages. v2: corrected typo, v3: corrected Fig. 1
Spread spectrum-based video watermarking algorithms for copyright protection
Merged with duplicate record 10026.1/2263 on 14.03.2017 by CS (TIS)Digital technologies know an unprecedented expansion in the last years. The consumer can
now benefit from hardware and software which was considered state-of-the-art several years
ago. The advantages offered by the digital technologies are major but the same digital
technology opens the door for unlimited piracy. Copying an analogue VCR tape was certainly
possible and relatively easy, in spite of various forms of protection, but due to the analogue
environment, the subsequent copies had an inherent loss in quality. This was a natural way of
limiting the multiple copying of a video material. With digital technology, this barrier
disappears, being possible to make as many copies as desired, without any loss in quality
whatsoever. Digital watermarking is one of the best available tools for fighting this threat.
The aim of the present work was to develop a digital watermarking system compliant with the
recommendations drawn by the EBU, for video broadcast monitoring. Since the watermark
can be inserted in either spatial domain or transform domain, this aspect was investigated and
led to the conclusion that wavelet transform is one of the best solutions available. Since
watermarking is not an easy task, especially considering the robustness under various attacks
several techniques were employed in order to increase the capacity/robustness of the system:
spread-spectrum and modulation techniques to cast the watermark, powerful error correction
to protect the mark, human visual models to insert a robust mark and to ensure its invisibility.
The combination of these methods led to a major improvement, but yet the system wasn't
robust to several important geometrical attacks. In order to achieve this last milestone, the
system uses two distinct watermarks: a spatial domain reference watermark and the main
watermark embedded in the wavelet domain. By using this reference watermark and techniques
specific to image registration, the system is able to determine the parameters of the attack and
revert it. Once the attack was reverted, the main watermark is recovered. The final result is a
high capacity, blind DWr-based video watermarking system, robust to a wide range of attacks.BBC Research & Developmen
Resonance contributions to HBT correlation radii
We study the effect of resonance decays on intensity interferometry for heavy
ion collisions. Collective expansion of the source leads to a dependence of the
two-particle correlation function on the pair momentum K. This opens the
possibility to reconstruct the dynamics of the source from the K-dependence of
the measured HBT radii. Here we address the question to what extent resonance
decays can fake such a flow signal. Within a simple parametrization for the
emission function we present a comprehensive analysis of the interplay of flow
and resonance decays on the one- and two-particle spectra. We discuss in detail
the non-Gaussian features of the correlation function introduced by long-lived
resonances and the resulting problems in extracting meaningful HBT radii. We
propose to define them in terms of the second order q-moments of the correlator
C(q, K). We show that this yields a more reliable characterisation of the
correlator in terms of its width and the correlation strength `lambda' than
other commonly used fit procedures. The normalized fourth-order q-moments
(kurtosis) provide a quantitative measure for the non-Gaussian features of the
correlator. At least for the class of models studied here, the kurtosis helps
separating effects from expansion flow and resonance decays, and provides the
cleanest signal to distinguish between scenarios with and without transverse
flow.Comment: 23 pages, twocolumn RevTeX, 12 eps-figures included, minor changes
following referee comment
Design and Analysis of a Dynamically Configured Log-based Distributed Security Event Detection Methodology
Military and defense organizations rely upon the security of data stored in, and communicated through, their cyber infrastructure to fulfill their mission objectives. It is essential to identify threats to the cyber infrastructure in a timely manner, so that mission risks can be recognized and mitigated. Centralized event logging and correlation is a proven method for identifying threats to cyber resources. However, centralized event logging is inflexible and does not scale well, because it consumes excessive network bandwidth and imposes significant storage and processing requirements on the central event log server. In this paper, we present a flexible, distributed event correlation system designed to overcome these limitations by distributing the event correlation workload across the network of event-producing systems. To demonstrate the utility of the methodology, we model and simulate centralized, decentralized, and hybrid log analysis environments over three accountability levels and compare their performance in terms of detection capability, network bandwidth utilization, database query efficiency, and configurability. The results show that when compared to centralized event correlation, dynamically configured distributed event correlation provides increased flexibility, a significant reduction in network traffic in low and medium accountability environments, and a decrease in database query execution time in the high-accountability case
Hadron Correlations at Energies from GeV to TeV
One of the central issues in High Energy Physics is the close interchange
between Theory and Experiment. Ever since I know Andrzej Bia{\l}as, I know him
as one of the theorists most interested in experimental data. This has
naturally led to continuous fruitful contacts. Even though we have been working
somehow together since about 1968, we so far have only one single publication
in common. This was back in 1969 and it was on means to efficiently study what
we then called (exclusive) Multihadron Final States. At that time this meant 3-
or at best 4-particle final states of two-hadron collisions at cms energies of
some 4 GeV (not TeV!). The field of multiparticle dynamics was in fact the
domain of Polish high-energy physicists. The first of a very successful (and
still lasting) series of annual International Symposia on Multiparticle
Dynamics was organized in Paris in 1970, but essentially by Polish physicists.
Andrzej himself was not attending, but it was he who organized the third in
these series in (of course) Zakopane. Since heavy ion-collisions, another field
of major interest for Andrzej, will be covered by others, I here will restrict
myself mainly to the collisions of two elementary particles.Comment: 32 pages, 26 figure
Direct sequence spread spectrum techniques in local area networks
This thesis describes the application of a direct sequence spread spectrum modulation scheme to the physical layer of a local area networks subsequently named the SS-LAN. Most present day LANs employ erne form or another of time division multiplexing which performs well in many systems but which is limited by its very nature in real time, time critical and time demanding applications. The use of spread spectrum multiplexing removes these limitations by providing a simultaneous multiple user access capability to the channel which permits each and all nodes to utilise the channel independent of the activity being currently supported by that channel. The theory of spectral spreading is a consequence of the Shannon channel capacity in which the channel capacity may be maintained by the trading of signal to noise ratio for bandwidth. The increased bandwidth provides an increased signal dimensionality which can be utilised in providing noise immunity and/or a simultaneous multiple user environment: the effects of the simultaneous users can be considered as noise from the point of view of any particular constituent signal. The use of code sequences at the physical layer of a LAN permits a wide range of mapping alternatives which can be selected according to the particular application. Each of the mapping techniques possess the general spread spectrum properties but certain properties can be emphasised at the expense of others. The work has Involved the description of the properties of the SS-LAN coupled with the development of the mapping techniques for use In the distribution of the code sequences. This has been followed by an appraisal of a set of code sequences which has resulted in the definition of the ideal code properties and the selection of code families for particular types of applications. The top level design specification for the hardware required in the construction of the SS-LAN has also been presented and this has provided the basis for a simplified and idealised theoretical analysis of the performance parameters of the SS-LAN. A positive set of conclusions for the range of these parameters has been obtained and these have been further analysed by the use of a SS-LAN computer simulation program. This program can simulate any configuration of the SS-LAN and the results it has produced have been compared with those of the analysis and have been found to be in agreement. A tool for the further analysis of complex SS-LAN configurations has therefore been developed and this will form the basis for further work
- …