22 research outputs found
Recommended from our members
Error analysis of the chirp-z transform when implemented using waveform synthesizers and FFTs
This report analyzes the effects of finite-precision arithmetic on discrete Fourier transforms (DFTs) calculated using the chirp-z transform algorithm. An introduction to the chirp-z transform is given together with a description of how the chirp-z transform is implemented in hardware. Equations for the effects of chirp rate errors, starting frequency errors, and starting phase errors on the frequency spectrum of the chirp-z transform are derived. Finally, the maximum possible errors in the chirp rate, the starting frequencies, and starting phases are calculated and used to compute the worst case effects on the amplitude and phase spectrums of the chirp-z transform. 1 ref., 6 figs
External access to ALICE controls conditions data
ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead – users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data – an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA