Auswahl der wissenschaftlichen Literatur zum Thema „Baudot code“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Baudot code" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Baudot code"

1

Malhotra, Mukesh, Neena Gupta Gupta und R. S. Prasad. „Software-based Solution for Analysis and Decoding of FSK-2 Modulated, Baudot-coded Signals“. Defence Science Journal 56, Nr. 2 (24.04.2006): 259–68. http://dx.doi.org/10.14429/dsj.56.1888.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Andruškevičius, Arvydas. „Administracinio baudimo santykiai: teisingumo ir protingumo kriterijų poveikis“. Teisė 76 (01.01.2010): 21–34. http://dx.doi.org/10.15388/teise.2010.0.227.

Der volle Inhalt der Quelle
Annotation:
Straipsnyje nagrinėjamas teisingumo ir protingumo principų reglamentavimas ir taikymas esant admi­nistracinio baudimo santykiams. Šie bendrieji teisės principai įtvirtinti Lietuvos Respublikos administra­cinių teisės pažeidimų kodekse ir kai kuriuose specialiuose įstatymuose, tačiau juose minėti principai skirti tik teismui, nagrinėjančiam ginčą dėl paskirtos ekonominės sankcijos (baudos). Kartais tai kelia sunkumų ir neleidžia viešojo administravimo subjektams vykdyti baudimo funkciją adekvačiai padary­tam teisės pažeidimui. Todėl siūloma tobulinti šių santykių teisinį reguliavimą. The article deals with legal regulation and application of the principles of justice and rationality in the ralations of admnistrative punishment. These general principles of law are established in the Code on Administrative Offences of theRrepublic of Lithuania and certain special laws, buti n the latter these principles are designeded solely for the court, hearing a dispute concerning the imposition of economic sanctions (fines). In practice, this often creates problems and does not allow entities of public administra­tion to carry out the function of administrative punishment adequately considering the offence carried out. Therefore the proposals for the improvement of legal regulation are being made.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Fruzerova, Oksana. „PIKTNAUDŽIAVIMO RINKA REGLAMENTAS – ADMINISTRACINĖS ATSAKOMYBĖS KLAUSIMAS“. Teisė 91 (01.01.2014): 100–118. http://dx.doi.org/10.15388/teise.2014.0.3370.

Der volle Inhalt der Quelle
Annotation:
Piktnaudžiavimo rinka direktyvoje 2003/6/EB numatyta, kad už draudimų piktnaudžiauti rinka pažeidimus,t. y. už manipuliavimą rinka ir pasinaudojimą viešai neatskleista informacija, valstybės narės turi numatyti proporcingas ir atgrasančias sankcijas. Už minėtų draudimų pažeidimus Lietuvoje fiziniams asmenims remiantisATPK 1735 straipsnio 4 dalimi gali būti paskirta iki 30 tūkst. litų bauda (apie 8 700 eurų). Tačiau Piktnaudžiavimo rinka reglamentas, kuris greitu laiku pakeis 2003 m. direktyvą, už draudimų manipuliuoti rinka ir naudotis viešai neatskleista informacija pažeidimus fiziniams asmenims įtvirtina iki 5 mln. eurų administracines baudas. Pagrindinis straipsnio tikslas – išanalizuoti fizinių asmenų administracinės atsakomybės taikymo klausimą Lietuvoje, atsižvelgiant į naująjį ES piktnaudžiavimo rinka reglamentą. Market abuse directive 2003/6/EC provides that member states for market abuse violations, market manipulation and insider dealing, should establish proportionate and dissuasive sanctions. According to Lithuanian administrative code (Article 1735) up to 30 000 litas (about 8 700 euros) penalty might be imposed on natural person for violation of prohibition of market manipulation and insider dealing. However, Market abuse regulation, that will soon replace directive 2003/6/EC, establishes 5 million EUR administrative pecuniary sanctions in respect of natural person for market manipulation and insider dealing. The main goal of this article is to analyze the issues of the administrative liability of natural person in Lithuania taking into consideration the upcoming EU market abuse regulation.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Skandera, D., und W. Ch Müller. „Spectral properties of magnetohydrodynamic convection with mean horizontal temperature gradient“. Proceedings of the International Astronomical Union 2, S239 (August 2006): 513. http://dx.doi.org/10.1017/s1743921307001032.

Der volle Inhalt der Quelle
Annotation:
AbstractSpectral properties of convective magnetohydrodynamic (MHD) turbulence in two and three dimensions are studied by means of direct numerical simulations (Skandera D. & Müller W.-C. 2006). The investigated system is set up with a mean horizontal temperature gradient in order to avoid a development of elevator instabilities in a fully periodic box. All simulations are performed without mean magnetic field. The applied resolution is 5123 and 20482. The MHD equation are solved by a numerical code (Müller & Biskamp 2000) that uses a standard pseudospectral scheme. For removing of aliasing errors a spherical truncation method is employed. Obtained results are compared with predictions of various existing phenomenological theories for magnetohydrodynamic and convective turbulence (Müller & Biskamp 2000). While the three-dimensional system is found to operate in a Kolmogorov-like regime where buoyant forces have a negligible impact on the turbulence dynamics (relatively low Rayleigh number achieved in the simulation; Ra ∼106), the two-dimensional system exhibits interesting irregular quasi-oscillations between a buoyancy dominated Bolgiano-Obukhov-like regime of turbulence and a standard Iroshnikov-Kraichnan-like regime of turbulence (Müller & Biskamp 2000). The most important parameter determining the turbulent regime of 2D magnetoconvection, apart from a high Rayleigh number, seems to be the mutual alignment of velocity and magnetic fields. The non-linear dynamics and the interplay between individual fields are examined with different transfer functions that confirm basic assumptions about directions of energy transfer in spectral space. Kinetic, magnetic and temperature energy are transported by a turbulent cascade from large to smaller scales. The local/nonlocal character of the transport is tested for several individual terms in the governing equations. Moreover, other statistical quantities, e.g. probability density functions, are computed as well. A passive character of the temperature field in the investigated three-dimensional magnetoconvection is supported by computations of intermittency using extended self-similarity. The intermittency of the Elsasser field z+ is in agreement with results from numerical simulations of isotropic MHD turbulence (Müller & Biskamp 2000). The intermittency of the temperature field is found to approximately agree with results of passive scalar measurements in hydrodynamic turbulence (Ruiz-Chavarria, Baudet & Ciliberto 1996).
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Baudot code"

1

Šuňal, Štefan. „Přijímací dekodér RTTY“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442375.

Der volle Inhalt der Quelle
Annotation:
This thesis deals with designing and implementing autonomous decoder for RTTY communication. Theoretical part of the thesis deals with researching the RTTY technology and FSK modulation, which it uses, focusing mainly on the methods of demodulation. Next part of the thesis compares suitability of available platforms. Practical part of the thesis describes the design and implementation of circuit board, firmware and computer application. The device is using STM32 microcontroller. Firmware was developed in C++ using Arduino. The computer application was created by using C\# and WPF. 3 methods of FSK demodulations were implmented. One is using a FFT algorithm. Other two calculate frequency based on the period of square signal.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Bensalah, Hiba [Verfasser], Aleksander [Akademischer Betreuer] Gurlo, Younssi Saad [Akademischer Betreuer] Alami, Mohamed [Akademischer Betreuer] Ouammou, Rhazi Mama [Gutachter] El, Baudry Murielle [Gutachter] Rabiller und Jason A. [Gutachter] Cody. „Natural and synthetic apatites as adsorbents for the removal of azo dyes from aqueous solutions / Hiba Bensalah ; Gutachter: Mama El Rhazi, Murielle Rabiller Baudry, Jason A. Cody ; Aleksander Gurlo, Saad Alami Younssi, Mohamed Ouammou“. Berlin : Technische Universität Berlin, 2020. http://d-nb.info/1209195941/34.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Ciomber, Isabelle, und Roland Jakel. „Systematic Analysis and Comparison of Stress Minimizing Notch Shapes : Obtaining a stress concentration factor of Kt=1 without FEM-Code“. Universitätsbibliothek Chemnitz, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-141533.

Der volle Inhalt der Quelle
Annotation:
Als Stand der Technik sind einfache, kreisförmige Verrundungen zur Reduktion von Kerbspannungen an Querschnittsübergängen bekannt, für die aus Tabellenwerken / Diagrammen in der Literatur die Formzahl einfach abgelesen werden kann. Die Effizienz der Spannungsreduktion solcher Lösungen ist jedoch sehr begrenzt. Ziel der Arbeit ist es daher, dem Konstrukteur bzw. Berechnungsingenieur ein Verfahren in die Hand zu geben, mit dem er für Standardquerschnittsübergänge und Standardlastfälle "Nicht-Kreiskerben" ohne teure und zeitaufwendige FEM-Analyse einfach durch Nutzung geeigneter Formzahldiagramme auslegen kann. Dabei sind sogar Formzahlen von nahezu eins möglich, d.h., in der "Kerbe" bleibt praktisch nur noch die Nennspannung übrig. Die Präsentation ist zweitgeteilt: Im ersten Teil werden die Arbeitsmethoden bzw. Softwarefunktionen und verwendeten Softwarewerkzeuge vorgestellt: Dies sind die Programme Creo Parametric als vollparametrisches CAD-Werkzeug und Creo Simulate als p-FEM-Programm der Parametric Technology Coprporation (PTC). Der zweite Teil der Präsentation beschreibt den Gültigkeitsbereich sowie die untersuchten Kerbgeometrien: Die einfache kreisförmige Verrundung als Stand der Technik, die Zwei-Radien-Kerbe, die Baud-Kurve, die Methode der Zugdreiecke nach Claus Mattheck, die elliptische Kerbe sowie die konische Rundung als generalisierte elliptische Kerbe. Es wird kurz eine Bibliothek vorgestellt, mit der solche Kerben einfach ausgelegt werden können, d.h. Ihre exakte Geometrie festgelegt sowie die zugehörige Formzahl αk bestimmt werden kann
Circular (one-radius) fillets are known as state-of-the-art for reducing notch stresses at cross section transitions. The stress concentration factor Kt of such geometries can be read out from diagrams/tables given in the literature. However, the efficiency of stress reduction of circular notches is very limited. The goal of the work therefor is to present a method for the designer/analyst how to design non-circular notches/fillets just by using suitable Kt-diagrams without time-consuming and expensive FEM analyses. Kt-numbers of nearly one are possible, that means in the "notch" just the nominal stress appears and no stress concentration takes place. The presentation has two parts: Part one describes the working methods and software functions as well as software tools: Creo Parametric as fully-parametric CAD program and Creo Simulate as embedded p-FEM-tool from Parametric Technology Corporation (PTC) have been used. The second part describes the range of validity and the examined notch geometries: The one-radius fillet as state-of-the-art, the two-radii filet, the Baud-curve, the method of tensile triangles from Claus Mattheck, the standard elliptical fillet and the conical round as generalized elliptical fillet. A notch layout library is shortly presented that allows to design such fillets, that means exactly determine the notch geometry and the related stress concentration factor Kt
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

詹孟勳. „Routing, Baud, Code, Modulation Level and Spectrum Assignment Problem on Elastic Optical Networks“. Thesis, 2018. http://ndltd.ncl.edu.tw/handle/339g77.

Der volle Inhalt der Quelle
Annotation:
碩士
國立彰化師範大學
資訊工程學系
106
The spectral division of the Elastic Optical Networks (EONs) is smaller than that of the traditional Wavelength Division Multiplexing (WDM). Base on optical orthogonal frequency division multiplexing, the spectral efficiency can be improved by allocated spectrum resources flexibly. As the transceiver technology advance, the parameters of the transmission can adjusted dynamically; integrated with the modulation level, baud and FEC coding scheme, the maximum transmission reach can be extended, and the use of the frequency slot can be saved. In this article, the EONs with flexible transmitters are considered the problem of the routing, baud, modulation format and spectrum assignment (RBCMLSA) is studied. Two schemes of single path method and multipath are considered. For each scheme, a heuristic algorithm is proposed to solve it. In addition, considering the failure of the single link, the RBCMLSA transmission protection problem is also studied. Two protection schemes: dedicated path protection and shared path protection are considered. Two heuristic algorithms for the two protection methods are proposed. The simulation results show that the multipath is better than the single path method in terms of blocking ratio: It saves more spectrum resources than the single path method. The shared path protection outperforms the dedicated path protection in terms of blocking ratio; shared path protection also saves spectrum resources in terms of resource usage.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Baudot code"

1

Weik, Martin H. „Baudot code“. In Computer Science and Communications Dictionary, 110. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_1420.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Hardy, Lawrence Harold. „A History of Computer Networking Technology“. In Encyclopedia of Multimedia Technology and Networking, Second Edition, 613–18. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch082.

Der volle Inhalt der Quelle
Annotation:
The computer has influenced the very fabric of modern society. As a stand-alone machine, it has proven itself a practical and highly efficient tool for education, commerce, science, and medicine. When attached to a network—the Internet for example—it becomes the nexus of opportunity, transforming our lives in ways that are both problematic and astonishing. Computer networks are the source for vast amounts of knowledge, which can predict the weather, identify organ donors and recipients, or analyze the complexity of the human genome (Shindler, 2002). The linking of ideas across an information highway satisfies a primordial hunger humans have to belong and to communicate. Early civilizations, to satisfy this desire, created information highways of carrier pigeons (Palmer, 2006). The history of computer networking begins in the 19th century with the invention of the telegraph, the telephone, and the radiotelegraph. The first communications information highway based on electricity was created with the deployment of the telegraph. The telegraph itself is no more than an electromagnet connected to a battery, connected to a switch, connected to wire (Derfler & Freed, 2002). The telegraph operates very straightforwardly. To send a message (electric current), the telegrapher rapidly opens and closes the telegraph switch. The receiving telegraph uses the electric current to create a magnetic field, which causes an observable mechanical event (Calvert, 2004). The first commercial telegraph was patented in Great Britain by Charles Wheatstone and William Cooke in 1837 (The Institution of Engineering and Technology, 2007). The Cooke-Wheatstone Telegraph required six wires and five magnetic needles. Messages were created when combinations of the needles were deflected left or right to indicate letters (Derfler & Freed, 2002). Almost simultaneous to the Cooke-Wheatstone Telegraph was the Samuel F. B. Morse Telegraph in the United States in 1837 (Calvert, 2004). In comparison, the Morse Telegraph was decidedly different from its European counterpart. First, it was much simpler than the Cooke-Wheatstone Telegraph: to transmit messages, it used one wire instead of six. Second, it used a code and a sounder to send and receive messages instead of deflected needles (Derfler & Freed, 2002). The simplicity of the Morse Telegraph made it the worldwide standard. The next major change in telegraphy occurred because of the efforts of French inventor Emile Baudot. Baudot’s first innovation replaced the telegrapher’s key with a typewriter like keyboard. His second innovation replaced the dots and dashes of Morse code with a five-unit or five-bit code—similar to American standard code for information interchange (ASCII) or extended binary coded decimal interchange code (EBCDIC)—he developed. Unlike Morse code, which relied upon a series of dots and dashes, each letter in the Baudot code contained a combination of five electrical pulses. Eventually all major telegraph companies converted to Baudot code, which eliminated the need for a skilled Morse code telegrapher (Derfler & Freed, 2002). Finally, Baudot, in 1894, invented a distributor which allowed his printing telegraph to multiplex its signals; as many as eight machines could send simultaneous messages over one telegraph circuit (Britannica Concise Encyclopedia , 2006). The Baudot printing telegraph paved the way for the Teletype and Telex (Derfler & Freed, 2002). The second forerunner of modern computer networking was the telephone. It was a significant advancement over the telegraph for it personalized telecommunications, bringing the voices and emotions of the sender to the receiver. Unlike its predecessor the telegraph, telephone networks created virtual circuit to connect telephones to one another (Shindler, 2002). Legend credits Alexander Graham Bell as the inventor of the telephone in 1876. He was not. Bell was the first to patent the telephone. Historians credit Italian- American scientist Antonio Meucci as the inventor of the telephone. Meucci began working on his design for a talking telegraph in 1849 and filed a caveat for his design in 1871 but was unable to finance commercial development. In 2002, the United States House of Representatives passed a resolution recognizing his accomplishment to telecommunications (Library of Congress, 2007).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Hardy, Lawrence Harold. „A History of Computer Networking Technology“. In Networking and Telecommunications, 26–32. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-986-1.ch003.

Der volle Inhalt der Quelle
Annotation:
The computer has influenced the very fabric of modern society. As a stand-alone machine, it has proven itself a practical and highly efficient tool for education, commerce, science, and medicine. When attached to a network—the Internet for example—it becomes the nexus of opportunity, transforming our lives in ways that are both problematic and astonishing. Computer networks are the source for vast amounts of knowledge, which can predict the weather, identify organ donors and recipients, or analyze the complexity of the human genome (Shindler, 2002). The linking of ideas across an information highway satisfies a primordial hunger humans have to belong and to communicate. Early civilizations, to satisfy this desire, created information highways of carrier pigeons (Palmer, 2006). The history of computer networking begins in the 19th century with the invention of the telegraph, the telephone, and the radiotelegraph. The first communications information highway based on electricity was created with the deployment of the telegraph. The telegraph itself is no more than an electromagnet connected to a battery, connected to a switch, connected to wire (Derfler & Freed, 2002). The telegraph operates very straightforwardly. To send a message (electric current), the telegrapher rapidly opens and closes the telegraph switch. The receiving telegraph uses the electric current to create a magnetic field, which causes an observable mechanical event (Calvert, 2004). The first commercial telegraph was patented in Great Britain by Charles Wheatstone and William Cooke in 1837 (The Institution of Engineering and Technology, 2007). The Cooke-Wheatstone Telegraph required six wires and five magnetic needles. Messages were created when combinations of the needles were deflected left or right to indicate letters (Derfler & Freed, 2002). Almost simultaneous to the Cooke-Wheatstone Telegraph was the Samuel F. B. Morse Telegraph in the United States in 1837 (Calvert, 2004). In comparison, the Morse Telegraph was decidedly different from its European counterpart. First, it was much simpler than the Cooke-Wheatstone Telegraph: to transmit messages, it used one wire instead of six. Second, it used a code and a sounder to send and receive messages instead of deflected needles (Derfler & Freed, 2002). The simplicity of the Morse Telegraph made it the worldwide standard. The next major change in telegraphy occurred because of the efforts of French inventor Emile Baudot. Baudot’s first innovation replaced the telegrapher’s key with a typewriter like keyboard. His second innovation replaced the dots and dashes of Morse code with a five-unit or five-bit code—similar to American standard code for information interchange (ASCII) or extended binary coded decimal interchange code (EBCDIC)—he developed. Unlike Morse code, which relied upon a series of dots and dashes, each letter in the Baudot code contained a combination of five electrical pulses. Eventually all major telegraph companies converted to Baudot code, which eliminated the need for a skilled Morse code telegrapher (Derfler & Freed, 2002). Finally, Baudot, in 1894, invented a distributor which allowed his printing telegraph to multiplex its signals; as many as eight machines could send simultaneous messages over one telegraph circuit (Britannica Concise Encyclopedia , 2006). The Baudot printing telegraph paved the way for the Teletype and Telex (Derfler & Freed, 2002). The second forerunner of modern computer networking was the telephone. It was a significant advancement over the telegraph for it personalized telecommunications, bringing the voices and emotions of the sender to the receiver. Unlike its predecessor the telegraph, telephone networks created virtual circuit to connect telephones to one another (Shindler, 2002). Legend credits Alexander Graham Bell as the inventor of the telephone in 1876. He was not. Bell was the first to patent the telephone. Historians credit Italian- American scientist Antonio Meucci as the inventor of the telephone. Meucci began working on his design for a talking telegraph in 1849 and filed a caveat for his design in 1871 but was unable to finance commercial development. In 2002, the United States House of Representatives passed a resolution recognizing his accomplishment to telecommunications (Library of Congress, 2007).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Li, Zhipei, Dong Guo und Ran Gao. „Coded Modulation and Impairment Compensation Techniques in Optical Fiber Communication“. In Fiber Optics [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.98811.

Der volle Inhalt der Quelle
Annotation:
This chapter deals with coded modulation and impairment compensation techniques in optical fiber communication. Probabilistic shaping is a new coded modulation technology, which can reduce transmission power by precoding, reduce bit error rate and improve communication rate. We proposed a probabilistic shaping 16QAM modulation scheme based on trellis coded modulation. Experimental results show that this scheme can achieve better optical SNR gain and BER performance. On the other hand, in order to meet the demand of transmission rate of next generation high speed optical communication systems, multi-dimensional modulation and coherent detection are sufficiently applied. The imperfect characteristics of optoelectronic devices and fiber link bring serious impairments to the high baud-rate and high order modulation format signal, causes of performance impairment are analyzed, pre-compensation and receiver side’s DSP techniques designed for coherent systems are introduced.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Baudot code"

1

Wibowo, Andreyadi, und Ari Moesriami Barmawi. „Improving NORMALS Using Modified Baudot-Murray Code“. In ICCNS '16: 6th International Conference on Communication and Network Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/3017971.3017984.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Nakamura, Masanori, Fukutaro Hamaoka, Asuka Matsushita, Hiroshi Yamazaki, Munehiko Nagatani, Akira Hirano und Yutaka Miyamoto. „High Baud Rate Signal Transmission with Coded Multi-dimensional Modulation“. In 2017 European Conference on Optical Communication (ECOC). IEEE, 2017. http://dx.doi.org/10.1109/ecoc.2017.8346049.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie