Academic literature on the topic 'Code de Gold'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Code de Gold.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Code de Gold"

1

Rouabah, Khaled, Salim Attia, Rachid Harba, Philippe Ravier, and Sabrina Boukerma. "Optimized Method for Generating and Acquiring GPS Gold Codes." International Journal of Antennas and Propagation 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/956735.

Full text
Abstract:
We propose a simpler and faster Gold codes generator, which can be efficiently initialized to any desired code, with a minimum delay. Its principle consists of generating only one sequence (code number 1) from which we can produce all the other different signal codes. This is realized by simply shifting this sequence by different delays that are judiciously determined by using the bicorrelation function characteristics. This is in contrast to the classical Linear Feedback Shift Register (LFSR) based Gold codes generator that requires, in addition to the shift process, a significant number of logic XOR gates and a phase selector to change the code. The presence of all these logic XOR gates in classical LFSR based Gold codes generator provokes the consumption of an additional time in the generation and acquisition processes. In addition to its simplicity and its rapidity, the proposed architecture, due to the total absence of XOR gates, has fewer resources than the conventional Gold generator and can thus be produced at lower cost. The Digital Signal Processing (DSP) implementations have shown that the proposed architecture presents a solution for acquiring Global Positioning System (GPS) satellites signals optimally and in a parallel way.
APA, Harvard, Vancouver, ISO, and other styles
2

Deshmukh, Sanjay, and Udhav Bhosle. "Analysis of Outage Probability for MC-CDMA Systems Using Different Spread Codes." Asian Journal of Electrical Sciences 8, no. 3 (November 5, 2019): 18–25. http://dx.doi.org/10.51983/ajes-2019.8.3.2065.

Full text
Abstract:
Modern communication systems demand proper utilisation of bandwidth, high throughput, integration of services and flexibility. To meet these requirements, spread spectrum code-division multiple access (CDMA) techniques have been proposed for various wireless communication systems. Here the individual user is assigned a unique binary code called spreading code used to increase capacity and provide higher robustness to interference. This paper investigates outage probability performance of MIMO multicarrier spread spectrum code-division multiple access (CDMA) with different robust spreading codes namely Walsh-Hadamard (WH), Gold and Kasami codes. Outage probability Poutage is significant performance measure to evaluate the effect of co-channel interference. System’s performance is initially evaluated in terms of outage probability by varying spreading factor (code length L) L= 4, 16, 64,256 for the number of subcarriers (NC) NC =4. In the second case spread factor SF is kept constant at L=64 and Poutage is analysed for varying number of subcarriers NC = 4, 16, 64. Outage probability analysis for system shows that under similar load conditions Kasami spread sequences outperforms Gold codes and WH codes in terms of outage probability for different spreading factor (SF) of codes and for varying number of subcarriers. This is because of its improved peak isolation and low cross-correlation than other.
APA, Harvard, Vancouver, ISO, and other styles
3

Błaszyński, Piotr, and Włodzimierz Bielecki. "High-Performance Computation of the Number of Nested RNA Structures with 3D Parallel Tiled Code." Eng 4, no. 1 (February 3, 2023): 507–25. http://dx.doi.org/10.3390/eng4010030.

Full text
Abstract:
Many current bioinformatics algorithms have been implemented in parallel programming code. Some of them have already reached the limits imposed by Amdahl’s law, but many can still be improved. In our paper, we present an approach allowing us to generate a high-performance code for calculating the number of RNA pairs. The approach allows us to generate parallel tiled code of the maximal dimension of tiles, which for the discussed algorithm is 3D. Experiments carried out by us on two modern multi-core computers, an Intel(R) Xeon(R) Gold 6326 (2.90 GHz, 2 physical units, 32 cores, 64 threads, 24 MB Cache) and Intel(R) i7(11700KF (3.6 GHz, 8 cores, 16 threads, 16 MB Cache), demonstrate a significant increase in performance and scalability of the generated parallel tiled code. For the Intel(R) Xeon(R) Gold 6326 and Intel(R) i7, target code speedup increases linearly with an increase in the number of threads. An approach presented in the paper to generate target code can be used by programmers to generate target parallel tiled code for other bioinformatics codes whose dependence patterns are similar to those of the code implementing the counting algorithm.
APA, Harvard, Vancouver, ISO, and other styles
4

Develi, Ibrahim, and Meryem Filiz. "Improvement of BER performance in MIMO–CDMA systems by using initial–phase optimized gold codes." Journal of Electrical Engineering 64, no. 1 (January 1, 2013): 38–43. http://dx.doi.org/10.2478/jee-2013-0005.

Full text
Abstract:
This paper describes a new approach to improve the bit error rate (BER) performance of a multiple-input multiple-output code-division multiple-access (MIMO-CDMA) system over quasi-static Rayleigh fading channels. The system considered employs robust space-time successive interference cancellation detectors and initial-phase optimized Gold codes for the improvement. The results clearly indicate that the use of initial-phase optimized Gold codes can significantly improve the BER performance of the system compared to the performance of a multiuser MIMO-CDMA system with conventional nonoptimized Gold codes. Furthermore, this performance improvement is achieved without any increase in system complexity.
APA, Harvard, Vancouver, ISO, and other styles
5

Tamura, S., S. Nakano, and K. Okazaki. "Optical code-multiplex transmission by gold sequences." Journal of Lightwave Technology 3, no. 1 (1985): 121–27. http://dx.doi.org/10.1109/jlt.1985.1074148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tirschwell, David L., Walter A. Kukull, and W. T. Longstreth. "Classification of Stroke Cases in Administrative Data using ICD-9 Codes." Stroke 32, suppl_1 (January 2001): 368. http://dx.doi.org/10.1161/str.32.suppl_1.368-b.

Full text
Abstract:
P161 Background: Using administrative data allows inexpensive evaluation of large patient datasets. An objection to such analyses is poor reliability of ICD-9 discharge codes and thus inaccurate case ascertainment. Objective: To identify reliable algorithms to classify stroke cases using ICD-9 discharge codes . Methods: From a population-based hospital discharge database with 20,803 cases, 206 medical records of probable stroke cases, from 3 community and 2 university hospitals, were randomly selected and abstracted. The gold standard was the medical record attending physician diagnosis with corroboration by a stroke neurologist (DLT). Results: Final gold standard diagnoses included 8 (4%) TIAs, 76 (37%) ischemic stroke, 47 (23%) intracerebral hemorrhage (ICH), 58 (28%) subarachnoid hemorrhage (SAH) and 17 (8%) no cerebrovascular event. Compared to algorithms that utilized either all possible or the first 2 ICD-9 discharge codes, an algorithm restricted to use of the first (principal) discharge code optimized specificity and positive predictive value (Table). Overall stroke classification based on the first discharge code showed substantial agreement with the gold standard (Kappa = 0.72, P < 0.0005). In the original 20,803 case database, the prevalence of ischemic stroke was 30%, ICH 4.6% and SAH 1.6%. Conclusions: An algorithm based on the principal ICD-9 discharge code can reliably identify and classify stroke cases. By optimizing specificity and positive predictive value, sensitivity is lost. Positive predictive value is influenced by prevalence.
APA, Harvard, Vancouver, ISO, and other styles
7

Zubarev, V. Yu, B. V. Ponomarenko, E. G. Shanin, and A. G. Vostretsov. "Formation of Minimax Ensembles of Aperiodic Gold Codes." Journal of the Russian Universities. Radioelectronics 23, no. 2 (April 28, 2020): 26–37. http://dx.doi.org/10.32603/1993-8985-2020-23-2-26-37.

Full text
Abstract:
Introduction. Signals constructed on the basis of ensembles of code sequences are widely used in digital communication systems. During development of such systems, the most attention is paid to analysis, synthesis and implementation of periodic signal ensembles. Theoretic methods for synthesis of periodic signal ensembles are developed and are in use. Considerably fewer results are received regarding construction of aperiodic signal ensembles with given properties. Theoretical methods for synthesis of such ensembles are practically nonexistent.Aim. To construct aperiodic Gold code ensembles with the best ratios of code length to ensemble volume among the most known binary codes.Materials and methods. Methods of directed search and discrete choice of the best ensemble based on unconditional preference criteria are used.Results. Full and truncated aperiodic Gold code ensembles with given length and ensemble volume were constructed. Parameters and shape of auto- and mutual correlation functions were shown for a number of constructed ensembles. Comparison of the paper results with known results for periodic Gold code ensembles has been conducted regarding growth of minimax correlation function values depending on code length and ensemble volume.Conclusion. The developed algorithms, unlike the known ones, make it possible to form both complete ensembles and ensembles taking into account the limitation of their volume. In addition, the algorithms can be extended to the tasks of forming ensembles from other families, for example, assembled from code sequences belonging to different families.
APA, Harvard, Vancouver, ISO, and other styles
8

Back, Sungyeol, Junseong Kim, Suyong Choi, and Wangrok Oh. "Mother Gold Code Family Selection Scheme for Concatenation and Truncation based Code Design." Journal of Institute of Control, Robotics and Systems 27, no. 11 (November 30, 2021): 937–41. http://dx.doi.org/10.5302/j.icros.2021.21.0077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Khairunnisa Yasmine, Arzalia, Nyoman Pramaita, and N. M. A. E. D. Wirastuti. "DESAIN SIMULASI PERFORMANSI KODE ORTHOGONAL GOLD PADA KANAL MULTIPATH FADING." Jurnal SPEKTRUM 9, no. 4 (December 19, 2022): 10. http://dx.doi.org/10.24843/spektrum.2022.v09.i04.p2.

Full text
Abstract:
Improved wireless communication system generate the various advanced technologies, one of which is spread spectrum technique. This technique working by multiplying dots bits information which have a large period with spreading code that have a smaller periode, which makes bit periode will follow the code periode. In order to maximize performance of this technique, an efficient code is required to reduce the occurrence of interference. The purpose of this study was to see how the variation of multipath components affected the work of the orthogonal gold code. This study compares BER vs. Eb/No for multipath components 10, 15, and 20 using code length 32, 8 users, and BPSK modulation. The multipath component 10 exhibits the best BER value, which is impacted by the degree of interference indicated by the size of the ACF value. and CCF on a non-zero shift.
APA, Harvard, Vancouver, ISO, and other styles
10

Krim, Mohamed, Adda Ali-Pacha, and Naima Hadj-Said. "New Binary Code Combined with New Chaotic Map and Gold Code to Ameliorate the Quality of the Transmission." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (January 1, 2017): 166. http://dx.doi.org/10.11591/ijeecs.v5.i1.pp166-180.

Full text
Abstract:
<p>While the private radio communications field has grown in recent years, the communication method known as spread spectrum name has gained much prominence. A spread spectrum method can be combined with multiple access method CDMA for dividing sequences to create multi-user communication systems with very good performance of interference between symbols.The production of the chaotic sequence in scanning system and the information system according to DS-CDMA remains a hot research problem in this study to supervise in the knowledge wireless communication. This fact is still a question in establishing the secret code random spread sequence between the transmitter and the receiver.In DS-SS’s spreading is important to embed security information.It can avoid many problems in the complex calculation of the true circle. Furthermore the pseudo chaotic is reconstructed in the conventional gold to change shape with the logical operator “XOR” the results in simulation result shows in progress.It improves also the computing speed as this can solve the new equation of the problem in the original logistic map.There certainly has a kind in design: spreading chaotic sequence, chaos with gold code; including the number of users.So these are less in number and also limit the security and to can improve the ameliorate the quality of the transmissionand performance in terms of allowable number of users.The Bit error rate (BER) performance of the system is evaluated in multi-user environment under AWGN and reveals that the DS-SS system using new binary code combined with new logistic mapand gold code to ameliorate the quality of the transmission.</p>
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Code de Gold"

1

Saito, Masato, Takaya Yamazato, Hiraku Okada, Masaaki Katayama, and Akira Ogawa. "Generation of Sets of Sequences Suitable for Multicode Transmission in Quasi-Synchronous CDMA Systems." IEICE, 2001. http://hdl.handle.net/2237/7223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lynch, Peter James. "Computer simulation of Gold code phase modulation in ocean acoustic tomography." Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/25772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

陳翠玲 and Chui-ling Chan. "Synthesis and luminescence studies of homo- and heteronuclear complexes of gold and copper." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31238178.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhengxuan, Zhang, Kou Yanhong, and Zhang Qishan. "DESIGN OF A SOFTWARE RADIO GPS RECEIVER." International Foundation for Telemetering, 2005. http://hdl.handle.net/10150/605032.

Full text
Abstract:
ITC/USA 2005 Conference Proceedings / The Forty-First Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2005 / Riviera Hotel & Convention Center, Las Vegas, Nevada
The GPS receiver based on software radio technology is a kind of general purpose GPS signal processing platform which makes use of advanced design ideas and advanced design tools nowadays. We used FPGA device and lots of necessary peripherals such as DSP and PCI controller in our design to promote flexibility and practicability effectively. Various fast acquisition means and accurate tracking algorithms could be realized, improved and validated on this platform, besides basic GPS receiver function.
APA, Harvard, Vancouver, ISO, and other styles
5

Bouvier, des Noes Mathieu. "Détection itérative des séquences pseudo-aléatoires." Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAT068/document.

Full text
Abstract:
Les séquences binaires pseudo-aléatoires sont couramment employées par les systèmes de transmissions numériques ou des mécanismes de chiffrement. On les retrouve en particulier dans les transmissions par étalement de spectre par séquence direct (e.g. 3G ou GPS)) ou pour construire des séquences d'apprentissage pour faciliter la synchronisation ou l'estimation du canal (e.g. LTE). Un point commun à toutes ces applications est la nécessité de se synchroniser avec la séquence émise. La méthode conventionnelle consiste à générer la même séquence au niveau du récepteur et la corréler avec le signal reçu. Si le résultat dépasse un seuil pré-défini, la synchronisation est déclarée acquise. On parle alors de détection par corrélation.Cette thèse aborde une autre voie : la détection des séquences binaires pseudo-aléatoire par des techniques de décodage canal. Ceci permet par exemple de détecter des séquences longues (e.g. de période 242), contrairement aux techniques par corrélation qui sont trop complexes à implémenter. Cela nécessite néanmoins que le récepteur connaisse au préalable le polynôme générateur de la séquence.Nous avons montré que le décodage d'une séquence pseudo-aléatoire est une problématique du type 'détecte et décode'. Le récepteur détecte la présence de la séquence et simultanément estime son état initial. Ceci correspond dans la théorie classique de la détection à un détecteur de type GLRT qui ne connaît pas la séquence émise, mais qui connaît sa méthode de construction. L'algorithme implémente alors un GLRT qui utilise un décodeur pour estimer la séquence reçue. Ce dernier est implémenté avec un algorithme de décodage par passage de messages qui utilise une matrice de parité particulière. Elle est construite avec des équations de parités différentes, chacune ayant un poids de Hamming valant t.Il correspond au nombre de variables participants à l'équation.Les équations de parité sont un constituant indispensable du décodeur. Nous avons donné leur nombre pour les m-séquences et les séquences de Gold. Pour le cas particulier des séquences de Gold, nous avons calculé le nombre d'équations de parité de poids t=5 lorsque le degré du polynôme générateur r est impair. Ce calcul est important car il n'y a pas d'équations de parité de poids t < 5 lorsque r est impair. Le nombre d'équations de parité est aussi utilisé pour estimer le degré minimal des équations d'un poids t donné. Nous avons montré que le modèle de prédiction estime correctement la valeur moyenne du degré minimal de l'ensemble des séquences de Gold. Nous avons néanmoins mis en évidence une grande variabilité du degré minimal des séquences autour de cette valeur moyenne.Nous avons ensuite identifié les ensembles absorbants complets de plus petite taille lorsque le décodeur emploie plusieurs polynômes de parité. Ces ensembles bloquent la convergence du décodeur lorsque celui-ci est alimenté avec du bruit. Ceci évite les fausses alarmes lors du processus de détection. Nous avons montré que des cycles 'transverses' détruisent ces ensembles absorbants, ce qui génère des fausses alarmes. Nous en avons déduit un algorithme qui minimise le nombre de cycles transverses de longueur 6 et 8, ce qui minimise la probabilité de fausse alarme lorsque le poids des équations de parité vaut t=3. Notre algorithme permet de sélectionner les équations de parité qui minimisent la probabilité de fausse alarme et ainsi réduire notablement le temps d'acquisition d'une séquence de Gold.Nous avons enfin proposé deux algorithmes de détection du code d'embrouillage pour les systèmes WCDMA et CDMA2000. Ils exploitent les propriétés des m-séquences constituant les séquences de Gold, ainsi que les mécanismes de décodage par passage de messages. Ces algorithmes montrent les vulnérabilités des transmissions par étalement de spectre
Pseudo-random binary sequences are very common in wireless transmission systems and ciphering mechanisms. More specifically, they are used in direct sequence spread spectrum transmission systems like UMTS or GPS, or to construct preamble sequences for synchronization and channel estimation purpose like in LTE. It is always required to synchronize the receiver with the transmitted sequence. The usual way consists in correlating the received signal with a replica of the sequence. If the correlation exceeds a predefined threshold, the synchronization is declared valid.This thesis addresses a different approach: the binary sequence is detected with a forward error correction decoding algorithm. This allows for instance to detect very long sequences.In this thesis, we show that decoding a pseudo-random sequence is a problematic of the kind ‘detect and decode'. The decoder detects the presence of the transmitted sequence and simultaneously estimates its initial state. In conventional detection theory, this corresponds to a GLRT detector that uses a decoder to estimate the unknown parameter which is the transmitted sequence. For pseudo-random sequences, the decoder implements an iterative message-passing algorithm. It uses a parity check matrix to define the decoding graph on which the algorithm applies. Each parity check equation has a weight t, corresponding to the number of variables in the equation.Parity check equations are thus an essential component of the decoder. The decoding procedure is known to be sensitive to the weight t of the parity check equations. For m-sequences, the number of parity check equations is already known. It is given by the number of codewords of weight t of the corresponding Hamming dual code. For Gold sequences, the number of parity check equations of weight t = 3 and 4 has already been evaluated by Kasami. In this thesis we provide an analytical expression for the number of parity check equations of weight t = 5 when the degree of the generator polynomial r is odd. Knowing this number is important because there is no parity check equation of weight t < 5 when r is odd. This enumeration is also used to provide an estimation of the least degree of parity check equations of weight t.We have then addressed the problem of selecting the parity check equations used by the decoder. We observed the probability of false alarm is very sensitive to this selection. It is explained by the presence or absence of absorbing sets which block the convergence of the decoder when it is fed only with noise. These sets are known to be responsible for error floor of LDPC codes. We give a method to identify these sets according to the parity check equations used by the decoder. The probability of false alarm can increase dramatically if these absorbing sets are destroyed. Then we propose an algorithm for selecting these parity check equations. It relies on the minimization of the number of cycles of length 6 and 8. Simulation show that the algorithm allows to improve significantly the probability of false alarm and the average acquisition time.Eventually, we propose 2 algorithms for the detection of the scrambling codes used in the uplink of UMTS-FDD and CDMA2000 systems. They highlights a new vulnerability of DSSS transmission systems. It is now conceivable to detect these transmission if the sequence's generator is known
APA, Harvard, Vancouver, ISO, and other styles
6

Tyrrell, Christina Holly. "A Lateral Flow Smart Phone Image Analysis Diagnostic." DigitalCommons@CalPoly, 2013. https://digitalcommons.calpoly.edu/theses/1083.

Full text
Abstract:
A low cost compact diagnostic has many implications in today’s society. Smart phone technology has exponentially grown and with it the imaging capabilities associated with smart phones. The goals of this research are i) to determine the feasibility of combining in the field smart phone images with color dependent assay results, ii) to develop a MatLab® image analysis code to analyze these results, and iii) compare limits of detection between the un-aided eye and MatLab® image analysis software. Orange G dye is used to create a stock solution and subsequent titers for analysis. Autocad is used to design an assay platform of 10x10 wells that are printed via a Xerox® Phaser printer with wax ink onto nitrocellulose paper. Dilutions are performed and pipetted into the wells. The image analysis code is used to determine hue, saturation, and value (HSV) values of wells. A limit of detection study using the dye is performed. HSV values are used to form calibration curves. The resulting curve fit equations are then integrated into the image analysis code to determine dye concentration. Finally, the complete capability is demonstrated by using an analogous 10x10 well experimental nitrocellulose sheet, which included a follow-up experiment via a spot check analysis. This study illustrates the feasibility of a low cost image analysis as a tool for lateral flow assay diagnostic versus the unaided eye. Future work includes using this protocol in conjunction with a lateral flow immunoassay and developing an application for the analysis.
APA, Harvard, Vancouver, ISO, and other styles
7

Rydlo, Štěpán. "Detekce dronu v prostoru." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-403154.

Full text
Abstract:
This master thesis purposes is create localization system using software defined radio. The purpose of this thesis is to create new localization system, which will be independent of existing systems. To create a localization system, we will use ADALM-PLUTO device to send and receive radio signals. This work contains a decription of serval possibilities how to create the localization system and description of their comunication.
APA, Harvard, Vancouver, ISO, and other styles
8

Shah, Julin Mukeshkumar. "Compressive Sensing Analog Front End Design in 180 nm CMOS Technology." Wright State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=wright1440381988.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dubreuil, Laurent. "Amélioration de l'étalement de spectre par l'utilisation de codes correcteurs d'erreurs." Limoges, 2005. https://aurore.unilim.fr/theses/nxfile/default/3964483f-5b1f-41dd-b862-6c3d029c0d41/blobholder:0/2005LIMO0041.pdf.

Full text
Abstract:
Dans cette thèse, nous étudions un système de communication nommé étalement de spectre. Le principe de ce système consiste à répartir l'énergie du signal à émettre sur une bande de fréquence plus large que celle réellement nécessaire à la transmission du signal utile. Le fonctionnement de l'étalement de spectre est basé sur l'utilisation de "séquences d'étalement" ayant de bonnes propriétés de corrélation. Dans cette thèse, nous introduisons des codes correcteurs d'erreurs pour améliorer l'efficacité de l'étalement du signal. L'objectif de cette thèse est de déterminer l'efficacité de cette méthode et les critères de choix des codes correcteurs d'erreurs. Le nombre maximum d'utilisateurs dépend du choix du code correcteur d'erreur utilisé mais aussi de la séquence d'étalement utilisée. Une synthèse de l'étalement de spectre et du CDMA (Code Division Multiple Access) est présentée dans une première partie. Des limites théoriques sont données et des limites physiques sont posées. Puis deux systèmes à étalement de spectre utilisant des séquences d'étalement différentes sont présentés et comparés. Le système le plus performant, aussi bien théorique que pratique, est l'étalement de spectre "à déphasage multiple". La dernière partie présente divers codes correcteurs d'erreur et détermine celui qui maximise le nombre d'utilisateurs. Toutefois, pour un taux d'erreur binaire résiduel inférieur à 10-3 et un facteur d'étalement de 31, le nombre maximum d'utilisateurs obtenu en pratique est de 23 avec l'utilisation de code correcteurs d'erreur et de 7 sans, tandis que du point de vue théorique on en espère 45
In this thesis we study a communication system named spread spectrum. The principle of this system consists in distributing the energy of the signal to transmit on a frequency band broader than what is really necessary to the transmission of the useful signal. Spread spectrum is based on using "spreading sequences" having good properties of correlation. In this thesis we introduce error correcting codes to improve the efficiency of the spreading signal. The aim of this thesis is to determine the efficiency of this method and the selection criteria of the error-correcting codes to use. The maximum number of users depends on the choice of the error-correcting code used but also on the spreading sequence used. A synthesis of the spread spectrum and CDMA (Code Division Multiple Access) are presented in a first part. Theoretical limits are given and physical limits are posed. Next two systems of spread spectrum using different spreading sequence are presented and compared. The most powerful system, theoretically as well as practically, is the spread spectrum "with multiple dephasing". The last part presents various error-correcting codes and determines which one maximizes the number of users. However, for a binary error rate residual lower than 10-3 and a spreading factor of 31 the maximum number of users obtained in practice is 23 with using error-correcting code and 7 without it, while from the theoretical point of view the expected number is 45
APA, Harvard, Vancouver, ISO, and other styles
10

Selmi, Ikhlas. "Optimisation de l'infrastructure d'un système de positionnement indoor à base de transmetteurs GNSS." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00919772.

Full text
Abstract:
Dans le but de fournir un service GNSS (Global Navigation Satellite System) de localisation continu et disponible partout, les systèmes utilisant des pseudolites et des répéteurs semblent être des solutions pertinentes pour la localisation en indoor. Le système à répélites, inspiré de ces deux méthodes (répéteurs et pseudolites), est aussi proposé pour résoudre cette problématique. Les répélites sont des transmetteurs locaux qui, installés en intérieur, formeront une constellation locale. Ils émettent tous un signal GNSS unique mais déphasé par un délai spécifique à chacun d'eux. Ces délais sont nécessaires pour distinguer les différents signaux reçus au niveau du récepteur. Les travaux de cette thèses sont réalisés dans le cadre du système à répélites et dans l'objectif d'améliorer son architecture et de réduire ses interférences inter-système. En effet, l'architecture du système (un peu encombrante) et les interférences éventuelles avec les signaux satellitaires reçus par un récepteur placé à l'extérieur font partie des inconvénients de ce système. On cherche donc à traiter ces deux difficultés de façon à minimiser leurs effets. Dans une première partie, on étudie les différents codes GNSS existants dans la littérature ainsi que les techniques de modulation employées. Ceci nous mène à proposer des codes ayant un niveau d'interférence équivalent à la référence GPS (obtenue entre deux codes GPS) pour les bandes L1 de GPS et G1 de Glonass. Dans une seconde étape, on développe la modulation IMBOC (Indoor Modified Binary Offset Carrier) pour générer de nouveaux codes caractérisés par des niveaux d'interférence réduits (comparés à la référence GPS). Parmi ces codes il y a deux catégories : ceux qui sont adaptés aux systèmes à répélites (émettant un code unique) et ceux qui sont adaptés aux systèmes pseudolites. Une étude théorique et des simulations des niveaux d'interférences pour les codes émis dans la bande GPS et Glonass sont réalisées pour déterminer les gains en termes de niveaux de bruit. Ce gain (par rapport à la référence GPS) en puissance d'interférence s'élève à 16 dB pour Glonass et 20 dB pour GPS. Pour valider les performances de ces codes, on génère les signaux IMBOC et on observe les interférences réelles qu'ils induisent sur un récepteur GPS recevant un signal satellitaire. Dans la deuxième partie, on utilise la fibre optique pour transmettre le signal du générateur jusqu'aux répélites et pour créer les délais initiaux par propagation du signal dans des bobines de fibre. Ainsi on remplace les câbles coaxiaux et les montages électroniques (de déphasage) par des bobines de fibres plus légères, facile à installer et à faible perte de puissance. Il reste cependant à évaluer avec une précision centimétrique les délais réels induits sur chaque signal dans le but de garantir une précision de localisation inférieure au mètre. Cette précision semble en effet représenter un bon compromis entre complexité globale du système de localisation et réponse à un ensemble suffisant de besoins des utilisateurs potentiels. On développe alors une technique d'estimation des délais basée sur la mesure de déphasage (entre deux signaux sinusoïdaux) et une analyse statistique des séries de mesures. Pour finir, on présente quelques résultats de localisation obtenus avec notre système à répélites déployé dans un environnement indoor typique
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Code de Gold"

1

Lynch, Peter James. Computer simulation of Gold code phase modulation in ocean acoustic tomography. Monterey, Calif: Naval Postgraduate School, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jalloh, Rugiatu. Implementing the international cyanide management code: An assessment of Canadian gold mining companies. Halifax, N.S: School for Resource and Environmental Studies, Dalhousie University, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Copyright Paperback Collection (Library of Congress), ed. Fool's gold. New York: Pocket Books, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Henham, R. D. Gold Dragon Codex. New York: Wizards of the Coast Publishing, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

ill, Lockwood Todd, ed. Gold dragon codex. Renton, WA: Wizards of the Coast, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Padura, Leonardo. Havana gold. London: Bitter Lemon Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Padura, Leonardo. Havana gold. London: Bitter Lemon, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ishinomori, Shōtarō. Kikaider code 02. La Jolla, CA: Wildstorm Productions, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Meimu and Tarbox Jonathan, eds. Kikaider code 02. La Jolla, CA: Wildstorm Productions, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ishinomori, Shōtarō. Kikaider code 02. La Jolla, CA: Wildstorm Productions, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Code de Gold"

1

Weik, Martin H. "gold code." In Computer Science and Communications Dictionary, 684. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_7998.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lopes, Cristina Videira. "Code Golf." In Exercises in Programming Style, 59–64. Second edition. | Boca Raton : CRC Press, 2020.: Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9780429343216-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhirkov, Igor. "Good Code Practices." In Low-Level Programming, 241–62. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2403-8_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sieren, Frank. "Dictatorship for the Common Good." In The China Code, 173–204. London: Palgrave Macmillan UK, 2007. http://dx.doi.org/10.1057/9780230625082_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stueben, Michael. "Self-Documenting Code." In Good Habits for Great Coding, 67–90. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3459-4_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pretty, Jules. "Coda." In The Low-Carbon Good Life, 201–4. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003346944-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

van Lint, J. H. "Some Good Codes." In Introduction to Coding Theory, 47–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-642-58575-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

van Lint, J. H. "Some Good Codes." In Introduction to Coding Theory, 42–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 1992. http://dx.doi.org/10.1007/978-3-662-00174-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cunningham, Mark. "Golf part 1: On the tee." In Game Programming with Code Angel, 139–47. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5305-2_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cunningham, Mark. "Golf part 2: On the green." In Game Programming with Code Angel, 149–59. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5305-2_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Code de Gold"

1

Maity, G. K., S. P. Maity, and J. N. Roy. "TOAD-based all-optical gold code generator." In 2012 International Conference on Devices, Circuits and Systems (ICDCS 2012). IEEE, 2012. http://dx.doi.org/10.1109/icdcsyst.2012.6188803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hafidhi, Mohamed Mourad, Emmanuel Boutillon, and Chris Winstead. "Reliable gold code generators for GPS receivers." In 2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS). IEEE, 2015. http://dx.doi.org/10.1109/mwscas.2015.7282164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yu Ling and Hu Jiandong. "An improved Gold code for MC-CDMA system." In Proceedings of APCC/OECC'99 - 5th Asia Pacific Conference on Communications/4th Optoelectronics and Communications Conference. IEEE, 1999. http://dx.doi.org/10.1109/apcc.1999.824973.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Seung Tae, and Jae Min Ahn. "Analysis of Correlation Characteristics of 10230 Period PRN Code using Concatenated Gold Code." In 2019 International Conference on Electronics, Information, and Communication (ICEIC). IEEE, 2019. http://dx.doi.org/10.23919/elinfocom.2019.8706491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ashok Kumar, K., and P. Dananjayan. "Improvement of Code Utilization CDMA for On-Chip Communication Architecture using Orthogonal Gold Code." In 2018 3rd International Conference on Inventive Computation Technologies (ICICT). IEEE, 2018. http://dx.doi.org/10.1109/icict43934.2018.9034282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Roogi, Jyoti M., Chetan H, Vinayaka R. Karanji, Roshan C. Thomas, Sagar T. H, and Praveen Yadav. "Implementation of CMOS Differential Switches for High Speed Gold Code Generator." In 2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2020. http://dx.doi.org/10.1109/iceca49313.2020.9297397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chakkedath, Sajith Mohan, Qiongjie Lin, and Mary Ann Weitnauer. "An Efficient Viterbi Algorithm for Combined MSK Demodulation and Gold Code Despreading." In 2019 13th International Conference on Signal Processing and Communication Systems (ICSPCS). IEEE, 2019. http://dx.doi.org/10.1109/icspcs47537.2019.9008735.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rahimi, Arya Alex, Leonardo Bosco Carreira, and Subhanshu Gupta. "Synchronous multi-signal acquisition for WBSNs using gold-code based joint-compressive sensing." In 2016 IEEE Biomedical Circuits and Systems Conference (BioCAS). IEEE, 2016. http://dx.doi.org/10.1109/biocas.2016.7833775.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lu, C. L., H. C. Wang, J. C. Juang, and H. R. Chuang. "10-Gb/s CMOS ultrahigh-speed gold-code generator using differential-switches feedback." In 2007 European Microwave Integrated Circuit Conference. IEEE, 2007. http://dx.doi.org/10.1109/emicc.2007.4412693.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Khadka, Grishma, Tae-yun Kim, and Suk-seung Hwang. "Anti-Collision RFID System Based on Combination of TD and Gold Code Techniques." In CIA 2015. Science & Engineering Research Support soCiety, 2015. http://dx.doi.org/10.14257/astl.2015.95.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Code de Gold"

1

Yu, Y. S. Capabilities, limitations and the use of the GEOROC computer package. Natural Resources Canada/CMSS/Information Management, 1987. http://dx.doi.org/10.4095/325534.

Full text
Abstract:
Computer codes have been used by various researchers in modelling viscoelastic formations, with a good degree of success. Serata used a complex rheological model, REM (Rheological Element Model) code, to simulate mine openings [2]. Others, in the U.S. Nuclear Waste Isolation Programme, have evaluated the capability of various codes for the design of nuclear waste repository [3]. Because of the proprietary nature of the above codes, they are not available to mine operators in Canada. Consequently, in 1984, CANMET initiated a research project to develop a numerical modelling package for use in the design of underground potash mine openings. GEOROC is the resultant computer program; it was developed by RE/SPEC Ltd., of Calgary under contract to CANMET. In recent years, computer simulation is playing an increasingly important role in evaluating the short and long term structural stability of underground mine openings, and in ground control studies related to mine design and layout. Such simulations are increasingly being used in the design of underground salt and potash mines. Because of the viscoelastic nature of salt rock formations, simulation models must take into consideration their time dependent properties if they are to correctly predict opening closures, ground stresses, and ground stability based on prescribed failure criteria. This presentation describes the capabilities, limitations and the use of computer code - GEOROC. A case history in which GEOROC is used to simulate a typical room and pillar mining section of a Western Canadian potash mine is provided. Predicted ground behaviour using the code is compared with actual behaviour as determined through field measurements. Results indicate that good correlation exits between predicted and measured ground behaviour, and is an encouragement to greater use of modelling in mine stability studies related to mine design.
APA, Harvard, Vancouver, ISO, and other styles
2

Gower, D., G. Graves, S. Walker, and D. MacInnis. Lode Gold Mineralization At Deer Cove, Point Rousse Complex, Baie Verte Peninsula. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1991. http://dx.doi.org/10.4095/132262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhou, Ruhua, Jingjing Xu, Jiaochen Luan, Weiyun Wang, Xinzhi Tang, Yanling Huang, Ziwen Su, Lei Yang, and Zejuan Gu. The Predictive Role of C-Reactive Protein on Sudden Death: A meta-analysis of prospective studies. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, November 2021. http://dx.doi.org/10.37766/inplasy2021.11.0074.

Full text
Abstract:
This study was a diagnostic research, so the content was decomposed according to PIRO : P: Patients diagnosed with sudden death; I: C-reactive protein; R: There is no gold standard for sudden death, and the definition of sudden death varies from literature to literature. The World Health Organization defines sudden death: "Patients who are normally healthy or seemingly healthy die suddenly due to natural diseases in an unexpectedly short period of time." In our study, sudden death is determined by the history, symptoms, physical examination and electrocardiogram results assesed by doctor. If death events were collected from the patients’ medical records, deaths coded using the International Classification of Diseases-9th Revision, codes 410 to 414 for non-SCD and 798.1 for SCD; or the International Classification of Diseases-10th Revision, codes I20 to I25 for non-SCD and I46 for SCD. All deaths registered as sudden deaths were confirmed in interviews with the patient’s physician or family members again. O: sudden death.
APA, Harvard, Vancouver, ISO, and other styles
4

Cox, Sadie. Building Energy Codes: Policy Overview and Good Practices. Office of Scientific and Technical Information (OSTI), February 2016. http://dx.doi.org/10.2172/1238537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Brockmann, Kolja, and Lauriane Héau. Developing Good Practices in Export Control Outreach to the NewSpace Industry. Stockholm International Peace Research Institute, March 2023. http://dx.doi.org/10.55163/bqao1685.

Full text
Abstract:
NewSpace is changing the nature of the space industry, exacerbating missile proliferation risks and posing challenges for the effective implementation of export controls. NewSpace companies develop, test, produce, use and market missile-related emerging and dual-use technologies, including small and micro launchers. One of the measures states can take is to address these developments is to step up targeted outreach to NewSpace actors, raising awareness of such risks to strengthen compliance with export controls and foreign direct investment (FDI) screening mechanisms. Key elements of an effective outreach strategy for the NewSpace sector include tailored use of established outreach tools, mapping stakeholders, incentivizing participation in outreach activities, consistently engaging with launch vehicle manufacturers, inter-agency cooperation, and raising awareness of FDI-related risks. The Missile Technology Control Regime, the Hague Code of Conduct and the Wiesbaden Process provide multilateral forums through which states can begin sharing experiences and develop good practices for outreach to the NewSpace industry.
APA, Harvard, Vancouver, ISO, and other styles
6

Mercier-Langevin, P., M. C. Lauzon, V. Bécu, K. Lauzière, and O. Côté-Mantha. Whole-rock lithogeochemistry along drill core through the gold-bearing Whale Tail zone, Amaruq deposit, Churchill Province, Nunavut. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2020. http://dx.doi.org/10.4095/322187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tóth, Z., B. Dubé, B. Lafrance, V. Bécu, K. Lauzière, and P. Mercier-Langevin. Whole-rock lithogeochemistry of the banded iron-formation-hosted gold mineralization in the Geraldton area, northwestern Ontario. Natural Resources Canada/CMSS/Information Management, 2023. http://dx.doi.org/10.4095/331919.

Full text
Abstract:
This report releases 235 runs of whole-rock geochemical and assay results of 235 samples/subsamples from the Archean banded iron formation-hosted gold mineralization in the Geraldton area, eastern Wabigoon subprovince, northwestern Ontario. The samples were collected during the 2012, 2013, 2014 and 2016 field seasons as part of a PhD study by the senior author (T�th, 2018) at Laurentian University in Sudbury. Geochemical analyses were paid in part by the GSC for the 2012, 2013 samples, while the 2014 and 2016 samples were graciously paid by the second author, Bruno Lafrance and Greenstone Gold Mines, respectively. Research on gold mineralization hosted in banded iron formation BIF was conducted under the Lode Gold project of TGI4. The geochemical data is presented in a format easily importable in a geographic information system (GIS). Samples were collected from drill core and outcrops to document host units, the alteration halo, and the mineralized zones. Preliminary interpretations about the auriferous mineralization and its geological setting are presented in Lafrance et al. (2012) and in T�th et al. (2013a, 2013b, 2014, 2015a, 2015b). The final interpretation of the geological setting of the gold mineralization was published in T�th and others (2022, 2023). Sample information and geochemical results are presented in Appendices 1 and 2 (worksheet "Results"), respectively. The results worksheet combines 5 reports produced between 2012 and 2016.
APA, Harvard, Vancouver, ISO, and other styles
8

Khan, Amir Ullah. Islam and Good Governance: A Political Economy Perspective. IIIT, October 2020. http://dx.doi.org/10.47816/01.004.20.

Full text
Abstract:
It is readily apparent to everyone that there are multiple and serious concerns that face Muslim societies today. Terrorism, civil strife, poverty, illiteracy, factionalism, gender injustices and poor healthcare are just a few of the challenges to governance across the Muslim world. These are core issues for governance and public administration in any form of government. However, before we can engage with good governance within the context of Islam, we need to be clear what mean by good governance itself. A simple definition of good governance is that of an institutionalised competency of administration and institution leading to efficient resource allocation and management[1]. Another way of looking at it is as a system which is defined by the existence of efficient and accountable institutions[2]. Civil society now tends to look at good governance by way of impact measurement and how a certain set of processes result in a set of measurable and desirable outcomes.
APA, Harvard, Vancouver, ISO, and other styles
9

Mueller, C., S. J. Piercey, M. G. Babechuk, and D. Copeland. Stratigraphy and lithogeochemistry of rocks from the Nugget Pond Deposit area, Baie Verte Peninsula, Newfoundland. Natural Resources Canada/CMSS/Information Management, 2021. http://dx.doi.org/10.4095/328989.

Full text
Abstract:
Stratigraphic and lithogeochemical data were collected from selected drill core from the Nugget Pond gold deposit in the Betts Cove area, Newfoundland. The stratigraphy consists of a lower unit of basaltic rocks that are massive to pillowed (Mount Misery Formation). This is overlain by sedimentary rocks of the Scrape Point Formation that consist of lower unit of turbiditic siltstone and hematitic cherts/iron formations (the Nugget Pond member); the unit locally has a volcaniclastic rich-unit at its base and grades upwards into finer grained volcaniclastic/turbiditic rocks. This is capped by basaltic rocks of the Scrape Point Formation that contain pillowed and massive mafic flows that are distinctively plagioclase porphyritic to glomeroporphyritic. The mafic rocks of the Mount Misery Formation have island arc tholeiitic affinities, whereas Scrape Point Formation mafic rocks have normal mid-ocean ridge (N-MORB) to backarc basin basalt (BABB) affinities. One sample of the latter formation has a calc-alkalic affinity. All of these geochemical features are consistent with results and conclusions from previous workers in the area. Clastic sedimentary rocks and Fe-rich sedimentary rocks of the Scrape Point Formation have features consistent with derivation from local, juvenile sources (i.e., intra-basinal mafic rocks). The Scrape Point Formation sedimentary rocks with the highest Fe/Al ratios, inferred to have greatest amount of hydrothermally derived Fe, have positive Ce anomalies on Post-Archean Australian Shale (PAAS)-normalized trace element plots. These features are consistent with having formed via hydrothermal venting into an anoxic/ sub-oxic water column. Further work is needed to test whether these redox features are a localized feature (i.e., restricted basin) or a widespread feature of the late Cambrian-early Ordovician Iapetus Ocean, as well as to delineate the role that these Fe-rich sedimentary rocks have played in the localization of gold mineralization within the Nugget Pond deposit.
APA, Harvard, Vancouver, ISO, and other styles
10

Dube, B., K. Lauziere, and K. H. Poulsen. The Deer Cove deposit: an example of "thrust"-related breccia-vein type gold mineralization in the Baie Verte Peninsula, Newfoundland. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1993. http://dx.doi.org/10.4095/134265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography