This document discusses quantization in analog-to-digital conversion. It describes how an analog signal is sampled, quantized by representing samples with discrete levels, and encoded into a digital signal. Quantization introduces noise that can be reduced by using more quantization levels or a smaller step size between levels. Non-uniform quantization allocates more levels to signal amplitudes that occur more frequently to more efficiently represent the signal.
Nyquist criterion for distortion less baseband binary channelPriyangaKR1
binary transmission system
From design point of view – frequency response of the channel and transmitted pulse shape are specified; the frequency response of the transmit and receive filters has to be determined so as to reconstruct [bk]
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Nyquist criterion for distortion less baseband binary channelPriyangaKR1
binary transmission system
From design point of view – frequency response of the channel and transmitted pulse shape are specified; the frequency response of the transmit and receive filters has to be determined so as to reconstruct [bk]
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
An Optimized Transform for ECG Signal CompressionIDES Editor
A significant feature of the coming digital era is the
exponential increase in digital data, obtained from various
signals specially the biomedical signals such as
electrocardiogram (ECG), electroencephalogram (EEG),
electromyogram (EMG) etc. How to transmit or store these
signals efficiently becomes the most important issue. A digital
compression technique is often used to solve this problem.
This paper proposed a comparative study of transform based
approach for ECG signal compression. Adaptive threshold is
used on the transformed coefficients. The algorithm is tested
for 10 different records from MIT-BIH arrhythmia database
and obtained percentage root mean difference as around
0.528 to 0.584% for compression ratio of 18.963:1 to 23.011:1
for DWT. Among DFT, DCT and DWT techniques, DWT has
been proven to be very efficient for ECG signal coding.
Further improvement in the CR is possible by efficient
entropy coding.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
An Optimized Transform for ECG Signal CompressionIDES Editor
A significant feature of the coming digital era is the
exponential increase in digital data, obtained from various
signals specially the biomedical signals such as
electrocardiogram (ECG), electroencephalogram (EEG),
electromyogram (EMG) etc. How to transmit or store these
signals efficiently becomes the most important issue. A digital
compression technique is often used to solve this problem.
This paper proposed a comparative study of transform based
approach for ECG signal compression. Adaptive threshold is
used on the transformed coefficients. The algorithm is tested
for 10 different records from MIT-BIH arrhythmia database
and obtained percentage root mean difference as around
0.528 to 0.584% for compression ratio of 18.963:1 to 23.011:1
for DWT. Among DFT, DCT and DWT techniques, DWT has
been proven to be very efficient for ECG signal coding.
Further improvement in the CR is possible by efficient
entropy coding.
Signals and Systems is an introduction to analog and digital signal processing, a topic that forms an integral part of engineering systems in many diverse areas, including seismic data processing, communications, speech processing, image processing, defense electronics, consumer electronics, and consumer products.
Signal and image processing on satellite communication using MATLABEmbedded Plus Trichy
Basic Explanations about satellite imaging and signal processing with the help of MATLAB.
Contact us: 23,Nandhi koil Street, Near Nakoda Showroom,Theppakulam,Trichy
Mb.No:9360212155.
Mail:embeddedplusproject@gmail.com,
FB:www.facebook.com/embeddedplusproject
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Tele3113 wk7wed
1. TELE3113 Analogue and Digital
Communications – Quantization
Wei Zhang
w.zhang@unsw.edu.au
School of Electrical Engineering and Telecommunications
The University of New South Wales
TELE3113 - PCM 2 Sept. 2009 p. -1
2. Analog-to-Digital Conversion
Goal: To transmit the analog signals by digital means better performance
convert the analog signal into digital format (Pulse-Code Modulation)
Analog sampler Quantizer Encoder Digital
signal signal
1111111
1111110
1111101
1111100 1111101 1111001 1111001 1111011 1111101 1111110 1111101 1111001
1111011
1111010 c8 c7 c6 c5 c4 c3 c2 c1
x(t) 1111001
1111000
time
time time
Sampling: a continuous-time signal is sampled by measuring its
amplitude at discrete time instants.
Quantizing: represents the sampled values of the amplitude by a finite set
of levels
Encoding: designates each quantized level by a digital code
TELE3113 - PCM 2 Sept. 2009 p. -2
3. Reconstruction of Sampled Signal
1111101 11110011111001 1111011 1111101 1111110 11111011111001
Received
digital signal c8 c7 c6 c5 c4 c3 c2 c1
time
decoding
Recovered signal
with discrete levels
interpolation
Recovered
analog signal
TELE3113 - PCM 2 Sept. 2009 p. -3
4. Sampling
Consider an analog signal x(t) which is bandlimited to B (Hz), that is:
X ( f ) = 0 for | f |≥ B
The sampling theorem states that x(t) can be sampled at intervals as
large as 1/(2B) such that the it is possible to reconstruct x(t) from its
samples, or the sampling rate fs=1/Ts can be as low as 2B.
x(t) 1
f s ≥ 2B or Ts ≤
2B
Sampling rate fs=1/Ts
time
Sampling period Ts
Minimum required sampling rate=2B (Nyquist rate) i.e. 2B samples per second
Sampling rate should be equal or greater than twice the highest frequency in
the baseband signal.
TELE3113 - PCM 2 Sept. 2009 p. -4
6. Quantization
After the sampling process, the sampled points will be transformed into a
set of predefined levels (quantized level) Quantization
Assume the signal amplitude of x(t) lies within [-Vmax ,+Vmax], we divide the
total peak-to-peak range (2Vmax) into L levels in which the quantized
levels mi (i=0,…,(L-1)) are defined as their respective mid-ways.
Vmax xq(t) x(t)
Output
m7 ∆7
m7= 7∆/2
m6 ∆6
uniform
m6= 5∆/2
m5 ∆5 m5= 3∆/2
m4 ∆4 m4= ∆/2
m3 ∆3 time −4∆ −3∆ −2∆ −∆ ∆ 2∆ 3∆ 4∆ Input
m2 ∆2
−3∆/2
uniform
m1 ∆1 −5∆/2
m0 ∆0 −7∆/2
-Vmax
Sampling time
Uniform quantizer
2Vmax (midrise type)
For uniform quantization, ∆ i ( i =0 ,L,( L −1)) = ∆ =
L p. -6
TELE3113 - PCM 2 Sept. 2009
7. Quantization Noise (1)
The quantized signal, xq(t) is an approximation of the original message signal, x(t).
−∆ ∆
Quantization error/noise: eq(t) ={x(t) - xq(t)} varies randomly within ≤ eq (t ) ≤
2 2
x(t)
xq(t)
eq(t) ={x(t) - xq(t)}
TELE3113 - PCM 2 Sept. 2009 p. -7
8. Quantization Noise (2)
Assume the quantization error varies uniformly within [-∆/2, ∆/2]
with a pdf of f(eq)=1/∆, then
∆ 2 ∆ 2
2
q [ ]
e (t ) = ∫ f (eq ) eq (t ) deq =
2 1
∫
∆ −∆ 2
[ 2
eq (t ) deq ] Q f (eq ) =
1
∆
−∆ 2
3 ∆ 2
1 eq ∆2 Vmax
2
2Vmax
= = = with ∆ =
∆ 3 −∆ 2
12 3L2 L
To minimize eq(t), we can use smaller ∆ or more quantized levels L.
2
In general, the average power of a signal is x (t ) or x 2 (t )
x 2 (t ) 3L2 x 2 (t )
average SNRx = 2
= 2
eq (t ) Vmax
3L2 x 2 (t ) V2
average SNRx (dB) = 10 log = 4.77 + 20 log L − 10 log 2max
Vmax
2
x (t )
TELE3113 - PCM 2 Sept. 2009 p. -8
9. Quantization Noise (3)
2
Vmax
If x(t) is a full-scale sinusoidal signal, i.e. x(t)=Vmaxcosωt , then x (t ) = x (t ) = 2 2
2
Thus,
average SNRx (dB) = 4.77 + 20 log L − 10 log(2 ) = (1.76 + 20 log L ) dB
If x(t) is uniformly distributed in the range [-Vmax,+Vmax], then pdf f(x)=1/(2Vmax),
Vmax Vmax
1 1
x (t ) = ∫ f ( x)[x(t )] dx = ∫ [x(t )]2 dx
2
2
Q f (eq ) =
−Vmax
2Vmax −Vmax
2Vmax
Vmax
1 x3 2
Vmax
= =
2Vmax 3 3
Thus, −Vmax
average SNRx (dB) = 4.77 + 20 log L − 10 log(3) = 20 log L dB
TELE3113 - PCM 2 Sept. 2009 p. -9
10. Non-uniform Quantization (1)
In some cases, uniform quantization is not efficient.
In speech communication, it is found (statistically) that smaller amplitudes
predominate in speech and that larger amplitudes are relatively rare.
many quantized levels are rarely used (wasteful !)
Non-uniform quantization is more efficient.
xmax
x(t)
Quantized
levels
time
-xmax
TELE3113 - PCM 2 Sept. 2009 p. -10
11. Non-uniform Quantization (2)
The non-uniform quantization can be achieved by first compressing the
signal samples and then performing uniform quantization.
Output
1
uniform
∆yi
∆ si 1 Input
x
s =
Non-uniform x max
Compressor
There exists more quantized levels for small x and fewer levels for larger x.
TELE3113 - PCM 2 Sept. 2009 p. -11
12. Non-uniform Quantization (3)
Input Uniform Communication
Sampler Compressor Encoder
signal Quantizer Channel
Received
Decoder Expander Interpolator
signal
Output Output
Non-uniform
uniform
∆ yi ∆si
∆si Input Input
∆ yi
Non-uniform Uniform
Compressor Expander
TELE3113 - PCM 2 Sept. 2009 p. -12
13. Non-uniform Quantization (4)
Two common compression laws Α-law : 1 + ln A x
xmax sgn( x ) for 1 ≤ x ≤ 1
µ-law : y ( x) = 1 + ln A A xmax
x
ln1 + µ
A
xmax x x x 1
y ( x) = sgn( x) for ≤1 sgn( x ) for 0 ≤ ≤
ln (1 + µ ) xmax 1 + ln A xmax
xmax A
Digital telephone system in North Digital telephone system in Europe
America and Japan (µ=255) (Α=87.6)
TELE3113 - PCM 2 Sept. 2009 p. -13