19 research outputs found

    Unilateral aplasia of both cruciate ligaments

    Get PDF
    Aplasia of both cruciate ligaments is a rare congenital disorder. A 28-year-old male presented with pain and the feeling of instability of his right knee after trauma. The provided MRI and previous arthroscopy reports did not indicate any abnormalities except cruciate ligament tears. He was referred to us for reconstruction of both cruciate ligaments. The patient again underwent arthroscopy which revealed a hypoplasia of the medial trochlea and an extremely narrow intercondylar notch. The tibia revealed a missing anterior cruciate ligament (ACL) footprint and a single bump with a complete coverage with articular cartilage. There was no room for an ACL graft. A posterior cruciate ligament could not be identified. The procedure was ended since a ligament reconstruction did not appear reasonable. A significant notch plasty if not a partial resection of the condyles would have been necessary to implant a ligament graft. It is most likely that this would not lead to good knee stability. If the surgeon would have retrieved the contralateral hamstrings at the beginning of the planned ligament reconstruction a significant damage would have occurred to the patient. Even in seemingly clear diagnostic findings the arthroscopic surgeon should take this rare abdnormality into consideration and be familiar with the respective radiological findings. We refer the abnormal finding of only one tibial spine to as the "dromedar-sign" as opposed to the two (medial and a lateral) tibial spines in a normal knee. This may be used as a hint for aplasia of the cruciate ligaments

    The soft-output principle - reminiscences and new developments

    Get PDF
    A major breakthrough in digital communications was the provisioning of soft outputs at each processing stage, with appropriate capabilities to use this as soft inputs in the next processing stage. This allowed for much more performant receivers especially in difficult mobile radio channel conditions, and set the stage for iterative processing. This article will outline the development of soft output algorithms over the last two decades along with associated state-of-the-art applications and conclude with an outlook towards novel applications of the soft principle

    Enhanced State Estimation Based on Particle Filter and Sensor Data With Non-Gaussian and Multimodal Noise

    No full text
    This paper presents a novel approach to state estimation based on particle filter dealing with measurement data effected by non-Gaussian, multimodal noise. The implementation focusses on autonomous underwater vehicles (AUVs) utilizing data of a magnetic compass and a mechanical scanning sonar for spatial navigation. Nowadays, particle filter approaches often require complicated feature extraction methods culminating in semantic interpretation of the data. This is not suitable for low-cost and low-weight AUVs, because these steps require high computational power. Therefore, efficient CPUs and higher power delivery are required. To test the novel approach, the algorithm is simulated in different scenarios with different parameters. Additionally, the filter is applied to real environment data. Finally, the performance is tested and evaluated by several methods. We demonstrate the computational efficiency and superiority of our method over other approaches through simulations

    On the Information Rate of Single-Carrier FDMA Using Linear Frequency Domain Equalization and Its Application for 3GPP-LTE Uplink

    Get PDF
    This paper compares the information rate achieved by SC-FDMA (single-carrier frequency-division multiple access) and OFDMA (orthogonal frequency-division multiple access), where a linear frequency-domain equalizer is assumed to combat frequency selective channels in both systems. Both the single user case and the multiple user case are considered. We prove analytically that there exists a rate loss in SC-FDMA compared to OFDMA if decoding is performed independently among the received data blocks for frequency selective channels. We also provide a geometrical interpretation of the achievable information rate in SC-FDMA systems and point out explicitly the relation to the well-known waterfilling procedure in OFDMA systems. The geometrical interpretation gives an insight into the cause of the rate loss and its impact on the achievable rate performance. Furthermore, motivated by this interpretation we point out and show that such a loss can be mitigated by exploiting multiuser diversity and spatial diversity in multi-user systems with multiple receive antennas. In particular, the performance is evaluated in 3GPP-LTE uplink scenarios.</p

    Self-Aware Swarm Navigation in Autonomous Exploration Missions

    Get PDF
    A multitude of autonomous robotic platforms collectively organized as a swarm attracts increasing attention for remote sensing and exploration tasks. A navigation system is essential for the swarm to collectively localize itself as well as external sources. In this article, we propose a self-aware swarm navigation system that is conscious of the causality between its position and the localization uncertainty. This knowledge allows the swarm to move in a way to not only account for external mission objectives but also enhance position information. Position information for classical navigation systems has already been studied with the Fisher information (FI) and Bayesian information (BI) theories. We show how to extend these theories to a self-aware swarm navigation system, particularly emphasizing the collective performance. In this respect, fundamental limits and geometric interpretations of localization with generic observation models are discussed. We further propose a general concept of FI and BI based information seeking swarm control. The weighted position Cramér-Rao bound (CRB) and posterior CRB (PCRB) are employed flexibly as either a control cost function or constraints according to different mission criteria. As a result, the swarm actively adapts its position to enrich position information with different emerging collective behaviors. The proposed concept is illustrated by a case study of a swarm mission for gas exploration on Mars

    Distance Estimation from a Diffusive Process: Theoretical Limits and Experimental Results

    No full text
    Estimating the distance between the source of a diffusive process and a receiver has a variety of applications, ranging from gas source localization at the macro-scale to molecular communication at the micro-scale. Distance information can be extracted from features of the observed particle concentration, e.g. its peak. This paper derives the Cramér-Rao lower bound (CRB) for distance estimation given the advection-diffusion model for absorbing receivers, which is the fundamental limit of any distance estimator. Furthermore, CRBs are obtained for estimators using only information about the observed peak. A maximum-likelihood estimator using the entire signal and two estimators based on peak detection are deduced. The derived CRBs are used to study the effect of channel parameters on the estimation performance. Finally, the performance of the proposed estimators is verified by comparing the root mean squared errors with their theoretical bounds in a simulation, and preliminary experimental results are presented

    Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP

    No full text
    ZRTP is a protocol designed to set up a shared secret between two communication parties which is subsequently used to secure the media stream (i.e. the audio data) of a VoIP connection. It uses Diffie-Hellman (DH) key exchange to agree upon a session key, which is inherently vulnerable to active Man-in-the-Middle (MitM) attacks. Therefore ZRTP introduces some proven methods to detect such attacks. The most important measure is a so called Short Authentication String (SAS). This is a set of characters that is derived essentially from the public values of the Diffie-Hellman key exchange and displayed to the end users for reading out and comparing over the phone. If the SAS on the caller's and the callee's side match, there is a high probability that no MitM attack is going on. Furthermore, ZRTP offers a form of key continuity by caching key material from previous sessions for use in the next call. In order to prevent that a MitM can manipulate the Diffie-Hellman key exchange in such a way that both partners get the same SAS although different shared keys were negotiated, ZRTP uses hash commitment for the public DH value. Despite these measures a Relay Attack (also known as Mafia Fraud Attack or Chess Grandmaster Attack) is still possible. We present a practical implementation of such an attack and discuss its characteristics and limitations, and show that the attack works only in certain scenarios
    corecore