922 resultados para Code compression


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study establishes that for a given binary BCH code C0 n of length n generated by a polynomial g(x) ∈ F2[x] of degree r there exists a family of binary cyclic codes {Cm 2m−1(n+1)n}m≥1 such that for each m ≥ 1, the binary cyclic code Cm 2m−1(n+1)n has length 2m−1(n + 1)n and is generated by a generalized polynomial g(x 1 2m ) ∈ F2[x, 1 2m Z≥0] of degree 2mr. Furthermore, C0 n is embedded in Cm 2m−1(n+1)n and Cm 2m−1(n+1)n is embedded in Cm+1 2m(n+1)n for each m ≥ 1. By a newly proposed algorithm, codewords of the binary BCH code C0 n can be transmitted with high code rate and decoded by the decoder of any member of the family {Cm 2m−1(n+1)n}m≥1 of binary cyclic codes, having the same code rate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Corresponding to $C_{0}[n,n-r]$, a binary cyclic code generated by a primitive irreducible polynomial $p(X)\in \mathbb{F}_{2}[X]$ of degree $r=2b$, where $b\in \mathbb{Z}^{+}$, we can constitute a binary cyclic code $C[(n+1)^{3^{k}}-1,(n+1)^{3^{k}}-1-3^{k}r]$, which is generated by primitive irreducible generalized polynomial $p(X^{\frac{1}{3^{k}}})\in \mathbb{F}_{2}[X;\frac{1}{3^{k}}\mathbb{Z}_{0}]$ with degree $3^{k}r$, where $k\in \mathbb{Z}^{+}$. This new code $C$ improves the code rate and has error corrections capability higher than $C_{0}$. The purpose of this study is to establish a decoding procedure for $C_{0}$ by using $C$ in such a way that one can obtain an improved code rate and error-correcting capabilities for $C_{0}$.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many tools and techniques for addressing software maintenance problems rely on code coverage information. Often, this coverage information is gathered for a specific version of a software system, and then used to perform analyses on subsequent versions of that system without being recalculated. As a software system evolves, however, modifications to the software alter the software’s behavior on particular inputs, and code coverage information gathered on earlier versions of a program may not accurately reflect the coverage that would be obtained on later versions. This discrepancy may affect the success of analyses dependent on code coverage information. Despite the importance of coverage information in various analyses, in our search of the literature we find no studies specifically examining the impact of software evolution on code coverage information. Therefore, we conducted empirical studies to examine this impact. The results of our studies suggest that even relatively small modifications can greatly affect code coverage information, and that the degree of impact of change on coverage may be difficult to predict.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Not long ago, most software was written by professional programmers, who could be presumed to have an interest in software engineering methodologies and in tools and techniques for improving software dependability. Today, however, a great deal of software is written not by professionals but by end-users, who create applications such as multimedia simulations, dynamic web pages, and spreadsheets. Applications such as these are often used to guide important decisions or aid in important tasks, and it is important that they be sufficiently dependable, but evidence shows that they frequently are not. For example, studies have shown that a large percentage of the spreadsheets created by end-users contain faults. Despite such evidence, until recently, relatively little research had been done to help end-users create more dependable software. We have been working to address this problem by finding ways to provide at least some of the benefits of formal software engineering techniques to end-user programmers. In this talk, focusing on the spreadsheet application paradigm, I present several of our approaches, focusing on methodologies that utilize source-code-analysis techniques to help end-users build more dependable spreadsheets. Behind the scenes, our methodologies use static analyses such as dataflow analysis and slicing, together with dynamic analyses such as execution monitoring, to support user tasks such as validation and fault localization. I show how, to accommodate the user base of spreadsheet languages, an interface to these methodologies can be provided in a manner that does not require an understanding of the theory behind the analyses, yet supports the interactive, incremental process by which spreadsheets are created. Finally, I present empirical results gathered in the use of our methodologies that highlight several costs and benefits trade-offs, and many opportunities for future work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The centrifuge technique was used to investigate the influence of particle size, applied compression, and substrate material (stainless steel, glass, Teflon, and poly(vinyl chloride)) on particle-surface adhesion force. For this purpose, phosphatic rock (rho(p) = 3090 kg/m(3)) and manioc starch particles (rho(p) = 1480 kg/m(3)) were used as test particles. A microcentrifuge that reached a maximum rotation speed of 14 000 rpm and which contained specially designed centrifuge tubes was used in the adhesion force measurements. The curves showed that the adhesion force profile followed a normal log distribution. The adhesion force increased linearly with particle size and with the increase of each increment of compression force. The manioc starch particles presented greater adhesion forces than the phosphatic rock particles for all particle sizes studied. The glass substrate showed a higher adherence than the other materials, probably due to its smoother topographic surface roughness in relation to the other substrata.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we perform a thorough analysis of a spectral phase-encoded time spreading optical code division multiple access (SPECTS-OCDMA) system based on Walsh-Hadamard (W-H) codes aiming not only at finding optimal code-set selections but also at assessing its loss of security due to crosstalk. We prove that an inadequate choice of codes can make the crosstalk between active users to become large enough so as to cause the data from the user of interest to be detected by other user. The proposed algorithm for code optimization targets code sets that produce minimum bit error rate (BER) among all codes for a specific number of simultaneous users. This methodology allows us to find optimal code sets for any OCDMA system, regardless the code family used and the number of active users. This procedure is crucial for circumventing the unexpected lack of security due to crosstalk. We also show that a SPECTS-OCDMA system based on W-H 32(64) fundamentally limits the number of simultaneous users to 4(8) with no security violation due to crosstalk. More importantly, we prove that only a small fraction of the available code sets is actually immune to crosstalk with acceptable BER (<10(-9)) i.e., approximately 0.5% for W-H 32 with four simultaneous users, and about 1 x 10(-4)% for W-H 64 with eight simultaneous users.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Chyle fistulas may occur after left neck dissections that include level IV, due to injury of the thoracic duct or of 1 of its major branches. Despite being unusual, this complication carries substantial postoperative morbidity and even mortality. So far, no effective intraoperative maneuver has been reported to detect this fistula at the end of a neck dissection. In this cohort study, we sought to describe a simple new maneuver, intraoperative abdominal compression, which can effectively help to identify an open major lymphatic duct on level IV at the end of a neck dissection. Patients and Methods From March 1989 to September 2010, 206 patients underwent neck dissections involving left level IV, and underwent intraoperative abdominal compression. There were 119 men and 87 women, with ages ranging from 18 to 81 years (median, 52 years). One hundred forty-four patients had squamous cell carcinomas, 54 had thyroid carcinomas, 5 had malignant melanomas, and 3 had salivary cancers. Distribution by type of left neck dissection was: selective including levels II, III, and IV (73 cases; 35.4%), selective including levels II, III, IV, and V (55 cases; 26.6%), selective including levels I, II, III, and IV (12 cases; 5.8%), modified radical (47 cases; 22.8%), and radical (19 cases; 9.2%). In all cases, at the end of the procedure, the endotracheal tube was temporarily disconnected from the ventilator. Keeping the dissected level IV area under clear visualization, an abdominal compression was performed. At this moment, any detected lymphatic leak was carefully clamped and tied with nonabsorbable sutures. After ventilating the patient, the intraoperative abdominal compression was repeated to reassure complete occlusion of the lymphatic vessel. Results In 13 cases (6.3%), a chyle leak was detected after performing the intraoperative abdominal compression. All leaks except for 2 were successfully controlled after 1 attempt. In these 2 patients, a patch of muscle and fat tissue was applied with fibrin glue on the top. In 1 of these patients, another chyle leak in a different location was detected only at the second intraoperative abdominal compression, and was also effectively closed. Postoperatively, there were 2 (1%) chyle fistulas, both among these 13 cases, and all were successfully managed with clinical measures only. No fistulas occurred among the remaining 193 patients in whom intraoperative abdominal compression did not demonstrate lymphatic leak. Conclusion To our knowledge, this is the first description of a specific maneuver to actively detect a lymphatic fistula at the end of a left neck dissection involving level IV. In this study, intraoperative abdominal compression was able to detect an open lymphatic vessel in 6.3% of the cases, as well as to assure its effective sealing in the remaining 93.7% of the patients. Moreover, no life-threatening high-volume fistula was noted in this study. (C) 2012 Wiley Periodicals, Inc. Head Neck, 2012

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since a genome is a discrete sequence, the elements of which belong to a set of four letters, the question as to whether or not there is an error-correcting code underlying DNA sequences is unavoidable. The most common approach to answering this question is to propose a methodology to verify the existence of such a code. However, none of the methodologies proposed so far, although quite clever, has achieved that goal. In a recent work, we showed that DNA sequences can be identified as codewords in a class of cyclic error-correcting codes known as Hamming codes. In this paper, we show that a complete intron-exon gene, and even a plasmid genome, can be identified as a Hamming code codeword as well. Although this does not constitute a definitive proof that there is an error-correcting code underlying DNA sequences, it is the first evidence in this direction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

During orthodontic tooth movement (OTM), alveolar bone is resorbed by osteoclasts in compression sites (CS) and is deposited by osteoblasts in tension sites (TS). The aim of this study was to develop a standardized OTM protocol in mice and to investigate the expression of bone resorption and deposition markers in CS and TS. An orthodontic appliance was placed in C57BL6/J mice. To define the ideal orthodontic force, the molars of the mice were subjected to forces of 0.1 N, 0.25 N, 0.35 N and 0.5 N. The expression of mediators that are involved in bone remodeling at CS and TS was analyzed using a Real-Time PCR. The data revealed that a force of 0.35 N promoted optimal OTM and osteoclast recruitment without root resorption. The levels of TNF-alpha, RANKL, MMP13 and OPG were all altered in CS and TS. Whereas TNF-a and Cathepsin K exhibited elevated levels in CS. RUNX2 and OCN levels were higher in TS. Our results suggest that 0.35 N is the ideal force for OTM in mice and has no side effects. Moreover, the expression of bone remodeling markers differed between the compression and the tension areas, potentially explaining the distinct cellular migration and differentiation patterns in each of these sites. (C) 2012 Elsevier Ltd. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The hierarchy of the segmentation cascade responsible for establishing the Drosophila body plan is composed by gap, pair-rule and segment polarity genes. However, no pair-rule stripes are formed in the anterior regions of the embryo. This lack of stripe formation, as well as other evidence from the literature that is further investigated here, led us to the hypothesis that anterior gap genes might be involved in a combinatorial mechanism responsible for repressing the cis-regulatory modules (CRMs) of hairy (h), even-skipped (eve), runt (run), and fushi-tarazu (ftz) anterior-most stripes. In this study, we investigated huckebein (hkb), which has a gap expression domain at the anterior tip of the embryo. Using genetic methods we were able to detect deviations from the wild-type patterns of the anterior-most pair-rule stripes in different genetic backgrounds, which were consistent with Hkb-mediated repression. Moreover, we developed an image processing tool that, for the most part, confirmed our assumptions. Using an hkb misexpression system, we further detected specific repression on anterior stripes. Furthermore, bioinformatics analysis predicted an increased significance of binding site clusters in the CRMs of h 1, eve 1, run 1 and ftz 1 when Hkb was incorporated in the analysis, indicating that Hkb plays a direct role in these CRMs. We further discuss that Hkb and Slp1, which is the other previously identified common repressor of anterior stripes, might participate in a combinatorial repression mechanism controlling stripe CRMs in the anterior parts of the embryo and define the borders of these anterior stripes. (C) 2011 Elsevier Inc. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aim. The aim of this study was to evaluate whether an association of elastic stockings and walking for a short period in the late afternoon reduces leg edema. Methods. Volume changes of the legs of sixteen patients (32 limbs), who walked on a treadmill for 30 minutes using elastic compression stockings, were analyzed in a quantitative, cross-over randomized (in order of arrival at the clinic) study. They were submitted to volumetry using the water displacement technique and subsequently required to put on 20/30 made-to-measure compression stockings (Sigvaris). The patients walked on a treadmill for 30 minutes and after removing the stockings volumetry of the legs was again performed. Legs were assessed using the CEAP classification and divided into groups. Analysis of variance was used for statistical analysis with an alpha error of 5% being considered acceptable. Results. When participants walked wearing compression stockings, there was a reduction in leg volume. When the CEAP classification was evaluated, it was noted that there was a statistically significant difference for the CEAP C0, C1 and C2 categories of legs using stockings compared to those that did not use. Conclusion. Compression stockings have a synergistic effect with walking in the late afternoon thus reducing edema of the lower limbs. [Int Angiol 2012;31:490-3]

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aims To evaluate the ability of multifocal transient pattern electroretinography (mfPERG) to detect neural loss and assess the relationship between mfPERG and visual-field (VF) loss in eyes with chiasmal compression. Methods 23 eyes from 23 patients with temporal VF defects and band atrophy of the optic nerve and 21 controls underwent standard automated perimetry and mfPERG using a stimulus pattern of 19 rectangles, each consisting of 12 squares. The response was determined for the central rectangle, for the nasal and temporal hemifields (eight rectangles each) and for each quadrant (three rectangles) in both patients and controls. Comparisons were made using variance analysis. Correlations between VF and mfPERG measurements were verified by linear regression analysis. Results Mean +/- SD mfPERG amplitudes from the temporal hemifield (0.50 +/- 0.17 and 0.62 +/- 0.32) and temporal quadrants (superior 0.42 +/- 0.21 and 0.52 +/- 0.35, inferior 0.51 +/- 0.23 and 0.74 +/- 0.40) were significantly lower in eyes with band atrophy than in controls (0.78 +/- 0.24, 0.89 +/- 0.28, 0.73 +/- 60.26, 0.96 +/- 0.36, 0.79 +/- 0.26 and 0.91 +/- 0.31, respectively). No significant difference was observed in nasal hemifield measurements. Significant correlations (0.36-0.73) were found between VF relative sensitivity and mfPERG amplitude in different VF sectors. Conclusions mfPERG amplitude measurements clearly differentiate eyes with temporal VF defect from controls. The good correlation between mfPERG amplitudes and the severity of VF defect suggests that mfPERG may be used as an indicator of ganglion cell dysfunction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper emphasizes the influence of micro mechanisms of failure of a cellular material on its phenomenological response. Most of the applications of cellular materials comprise a compression loading. Thus, the study focuses on the influence of the anisotropy in the mechanical behavior of cellular material under cyclic compression loadings. For this study, a Digital Image Correlation (DIC) technique (named Correli) was applied, as well as SEM (Scanning Electron Microscopy) images were analyzed. The experimental results are discussed in detail for a closed-cell rigid poly (vinyl chloride) (PVC) foam, showing stress-strain curves in different directions and why the material can be assumed as transversely isotropic. Besides, the present paper shows elastic and plastic Poisson's ratios measured in different planes, explaining why the plastic Poisson's ratios approach to zero. Yield fronts created by the compression loadings in different directions and the influence of spring-back phenomenon on hardening curves are commented, also.