The undetected error probability is an important measure to assess the communication reliability provided by any error coding scheme. Two error coding schemes namely, Joint crosstalk avoidance and Triple Error Correction (JTEC) and JTEC with Simultaneous Quadruple Error Detection (JTEC-SQED), provide both crosstalk reduction and multi-bit error correction/detection features. The available undetected error probability model yields an upper bound value which does not give accurate estimation on the reliability provided. This paper presents an improved mathematical model to estimate the undetected error probability of these two joint coding schemes. According to the decoding algorithm the errors are classified into patterns and their decoding result is checked for failures. The probabilities of the failing patterns are used to build the new models. The improved models have less than 1% error
In this paper, we have employed a computation of three technique to reduce the computational complexity and bit rate for compressed image. These techniques are bit plane coding based on two absolute values, vector quantization VQ technique using Cache codebook and Weber's low condition. The experimental results show that the proposed techniques achieve reduce the storage size of bit plane and low computational complexity.
In the last few decades, growing interest has been shown in the development of new solar selective coatings based on transition metal nitride and/or oxinitride for solar absorbing applications. Solar thermal collectors are well thought out to be the most effective process of converting and harvesting solar radiation. In this investigation, Cu/TiON/CrO2 multilayered solar selective absorber coatings have been coated onto Al substrates using the dip-coating process followed by an annealing process at (400, 450, 500, 550, and 600 °C. The XRD analysis showed excellent crystalline quality for the prepared thin films along with enhanced surface features as proved by FESEM images, and the grains are in the range of (27–81) nm. The optical in
... Show MoreIn this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.
This paper is concerned with the design and implementation of an image compression method based on biorthogonal tap-9/7 discrete wavelet transform (DWT) and quadtree coding method. As a first step the color correlation is handled using YUV color representation instead of RGB. Then, the chromatic sub-bands are downsampled, and the data of each color band is transformed using wavelet transform. The produced wavelet sub-bands are quantized using hierarchal scalar quantization method. The detail quantized coefficient is coded using quadtree coding followed by Lempel-Ziv-Welch (LZW) encoding. While the approximation coefficients are coded using delta coding followed by LZW encoding. The test results indicated that the compression results are com
... Show MoreThis paper presents stochastic analysis using the perturbation method to model the structure of a container to verify the distributions of probability of maximum and minimum axial forces reactions in piles. The proposed simulation of a container port terminal under 11 scenarios of load combinations was presented. The probability distributions for live loads are assigned according to the input parameters of simulation data. Part of the load itself is implicitly combined such as vertical live load which includes the weight of equipment and containers and wind load. The structural model was simulated in the software STAAD Pro., while the statistical analyses were performed with MATLAB. The results demonstrated that, the most significant extern
... Show MoreThis research reports an error analysis of close-range measurements from a Stonex X300 laser scanner in order to address range uncertainty behavior based on indoor experiments under fixed environmental conditions. The analysis includes procedures for estimating the precision and accuracy of the observational errors estimated from the Stonex X300 observations and conducted at intervals of 5 m within a range of 5 to 30 m. The laser 3D point cloud data of the individual scans is analyzed following a roughness analysis prior to the implementation of a Levenberg–Marquardt iterative closest points (LM-ICP) registration. This leads to identifying the level of roughness that was encountered due to the range-finder’s limitations in close
... Show MoreImage compression is one of the data compression types applied to digital images in order to reduce their high cost for storage and/or transmission. Image compression algorithms may take the benefit of visual sensitivity and statistical properties of image data to deliver superior results in comparison with generic data compression schemes, which are used for other digital data. In the first approach, the input image is divided into blocks, each of which is 16 x 16, 32 x 32, or 64 x 64 pixels. The blocks are converted first into a string; then, encoded by using a lossless and dictionary-based algorithm known as arithmetic coding. The more occurrence of the pixels values is codded in few bits compare with pixel values of less occurre
... Show MoreThe goal of this paper is to expose a new numerical method for solving initial value time-lag of delay differential equations by employing a high order improving formula of Euler method known as third order Euler method. Stability condition is discussed in detail for the proposed technique. Finally some examples are illustrated to verify the validity, efficiency and accuracy of the method.