8,065 research outputs found

    How does the pitch and pattern of a signal affect auditory arousal thresholds?

    Get PDF
    How arousal thresholds vary with different sounds is a critical issue for emergency awakenings, especially as sleepers are dying in fires despite having a working smoke alarm. Previous research shows that the current high pitched (3000+ Hz) smoke alarm signal is significantly less effective than an alternative signal, the 520 Hz square wave, in all populations tested. However, as the number of sounds tested has been small further research is needed. Here we measured auditory arousal thresholds (AATs) across signals with a range of characteristics to determine the most effective waking signal. Thirty nine young adults participated over three nights. In Part A, nine signals were presented in stage 4 sleep with ascending decibel levels. Signals were short beeps in the low to mid frequency range with different spectral complexities: square waves, pure tones, whoops and white noise. Part B manipulated temporal patterns, inserting silences of 0, 10 and 21 seconds after each 12 seconds of beeps. It was found that the low frequency (400 and 520 Hz) square waves yielded significantly lower AATs than the alternatives. A trend was found across the three temporal manipulations, with a 10 second intervening silence showing some advantage. These findings support earlier research indicating that the best sound for awakening from deep sleep is a low frequency square wave. It is argued that the signal with the lowest response threshold when awake may be the same as the most arousing signal when asleep, especially where the sleeper processes the signal as meaningful

    Cyclic Low-Density MDS Array Codes

    Get PDF
    We construct two infinite families of low density MDS array codes which are also cyclic. One of these families includes the first such sub-family with redundancy parameter r > 2. The two constructions have different algebraic formulations, though they both have the same indirect structure. First MDS codes that are not cyclic are constructed and then by applying a certain mapping to their parity check matrices, non-equivalent cyclic codes with the same distance and density properties are obtained. Using the same proof techniques, a third infinite family of quasi-cyclic codes can be constructed

    Harmonic analysis of neural networks

    Get PDF
    Neural networks models have attracted a lot of interest in recent years mainly because there were perceived as a new idea for computing. These models can be described as a network in which every node computes a linear threshold function. One of the main difficulties in analyzing the properties of these networks is the fact that they consist of nonlinear elements. I will present a novel approach, based on harmonic analysis of Boolean functions, to analyze neural networks. In particular I will show how this technique can be applied to answer the following two fundamental questions (i) what is the computational power of a polynomial threshold element with respect to linear threshold elements? (ii) Is it possible to get exponentially many spurious memories when we use the outer-product method for programming the Hopfield model

    Determinants of Rural Poverty in Post-War Mozambique: Evidence from a Household Survey and Implications for Government and Donor Policy

    Get PDF
    This research report analyses the welfare effects of rural household coping strategies in post-war Mozambique. In addition, it considers appropriate government and donor policies to assist poor, war-affected farm households. The report discusses the expected theoretical effects of war on smallholder labour, asset, and social capital endowments and thus on household welfare. In addition, it considers the effects of war on land use and market-participation decisions by households and the impact of these choices on post-war household welfare.

    Some new EC/AUED codes

    Get PDF
    A novel construction that differs from the traditional way of constructing systematic EC/AUED/(error-correcting/all unidirectional error-detecting) codes is presented. The usual method is to take a systematic t-error-correcting code and then append a tail so that the code can detect more than t errors when they are unidirectional. In the authors' construction, the t-error-correcting code is modified in such a way that the weight distribution of the original code is reduced. The authors then have to add a smaller tail. Frequently they have less redundancy than the best available systematic t-EC/AUED codes

    X-code: MDS array codes with optimal encoding

    Get PDF
    We present a new class of MDS (maximum distance separable) array codes of size n×n (n a prime number) called X-code. The X-codes are of minimum column distance 3, namely, they can correct either one column error or two column erasures. The key novelty in X-code is that it has a simple geometrical construction which achieves encoding/update optimal complexity, i.e., a change of any single information bit affects exactly two parity bits. The key idea in our constructions is that all parity symbols are placed in rows rather than columns

    An on-line algorithm for checkpoint placement

    Get PDF
    Checkpointing is a common technique for reducing the time to recover from faults in computer systems. By saving intermediate states of programs in a reliable storage, checkpointing enables to reduce the lost processing time caused by faults. The length of the intervals between checkpoints affects the execution time of programs. Long intervals lead to long re-processing time, while too frequent checkpointing leads to high checkpointing overhead. In this paper we present an on-line algorithm for placement of checkpoints. The algorithm uses on-line knowledge of the current cost of a checkpoint when it decides whether or not to place a checkpoint. We show how the execution time of a program using this algorithm can be analyzed. The total overhead of the execution time when the proposed algorithm is used is smaller than the overhead when fixed intervals are used. Although the proposed algorithm uses only on-line knowledge about the cost of checkpointing, its behavior is close to the off-line optimal algorithm that uses a complete knowledge of checkpointing cost

    Rewriting Codes for Joint Information Storage in Flash Memories

    Get PDF
    Memories whose storage cells transit irreversibly between states have been common since the start of the data storage technology. In recent years, flash memories have become a very important family of such memories. A flash memory cell has q states—state 0.1.....q-1 - and can only transit from a lower state to a higher state before the expensive erasure operation takes place. We study rewriting codes that enable the data stored in a group of cells to be rewritten by only shifting the cells to higher states. Since the considered state transitions are irreversible, the number of rewrites is bounded. Our objective is to maximize the number of times the data can be rewritten. We focus on the joint storage of data in flash memories, and study two rewriting codes for two different scenarios. The first code, called floating code, is for the joint storage of multiple variables, where every rewrite changes one variable. The second code, called buffer code, is for remembering the most recent data in a data stream. Many of the codes presented here are either optimal or asymptotically optimal. We also present bounds to the performance of general codes. The results show that rewriting codes can integrate a flash memory’s rewriting capabilities for different variables to a high degree

    Deterministic voting in distributed systems using error-correcting codes

    Get PDF
    Distributed voting is an important problem in reliable computing. In an N Modular Redundant (NMR) system, the N computational modules execute identical tasks and they need to periodically vote on their current states. In this paper, we propose a deterministic majority voting algorithm for NMR systems. Our voting algorithm uses error-correcting codes to drastically reduce the average case communication complexity. In particular, we show that the efficiency of our voting algorithm can be improved by choosing the parameters of the error-correcting code to match the probability of the computational faults. For example, consider an NMR system with 31 modules, each with a state of m bits, where each module has an independent computational error probability of 10^-3. In, this NMR system, our algorithm can reduce the average case communication complexity to approximately 1.0825 m compared with the communication complexity of 31 m of the naive algorithm in which every module broadcasts its local result to all other modules. We have also implemented the voting algorithm over a network of workstations. The experimental performance results match well the theoretical predictions
    corecore