Codes Research Papers - Academia.edu (original) (raw)

In this paper we develop a discrete approach to multiple tone modulation for digital communication channels with arbitrary intersymbol interference (ISI) and additive Gaussian noise. Multiple tone modulation is achieved through the... more

In this paper we develop a discrete approach to multiple tone modulation for digital communication channels with arbitrary intersymbol interference (ISI) and additive Gaussian noise. Multiple tone modulation is achieved through the concatenation of a finite block length modulator based on discrete Fourier transform (DIT) code vectors, and well known high gain coset or trellis codes. Symbol blocks from an inverse D I T (IDIT) are cyclically extended to generate ISI-free channeloutput symbols that decompose the channel into a group of orthogonal and independent parallel subchannels. The design of the energy distribution and coded information allocation over the subchannels is optimized for the finite block length case and for the coset code concatenation, leading to an implementable coding system with optimized performance for the channel with ISI. Asymptotic performance of this system is derived, and examples of asymptotic and finite block length coding gain performance for several channels is evaluated at different values of bits per sample. Using sufficiently long blocks for a particular IS1 pattern, it can be shown that the implementable techniques presented here achieve the cut-off rate for any channel with IS1 in the presence of additive Gaussian noise. In addition, this discrete multiple tone technique is linear in both the modulation and the demodulation, and is free from the effects of error propagation that often afflict systems employing bandwidth-optimized decision feedback plus coset codes.

Following an "unwritten tradition" this paper offers a review of another decade of achievements in the area of Spectral Techniques. Topics like transforms of matrixvalued functions, transforms based on non-Abelian groups, latest... more

Following an "unwritten tradition" this paper offers a review of another decade of achievements in the area of Spectral Techniques. Topics like transforms of matrixvalued functions, transforms based on non-Abelian groups, latest advancements related to Linear Independent transforms, a space-efficient algorithm to calculate spectral transforms, will be discussed. A special mention will be given to other areas, like signal processing, and coding theory, where Spectral Techniques have been (and continue to be) used, even though with possibly different names.

Single frequency estimation is a long-studied problem with application domains including radar, sonar, telecommunications, astronomy and medicine. One method of estimation, called phase unwrapping, attempts to estimate the frequency by... more

Single frequency estimation is a long-studied problem with application domains including radar, sonar, telecommunications, astronomy and medicine. One method of estimation, called phase unwrapping, attempts to estimate the frequency by performing linear regression on the phase of the received signal. This procedure is complicated by the fact that the received phase is 'wrapped' modulo 2 and therefore must be 'unwrapped' before the regression can be performed. In this paper, we propose an estimator that performs phase unwrapping in the least squares sense. The estimator is shown to be strongly consistent and its asymptotic distribution is derived. We then show that the problem of computing the least squares phase unwrapping is related to a problem in algorithmic number theory known as the nearest lattice point problem. We derive a polynomial time algorithm that computes the least squares estimator. The results of various simulations are described for different values of sample size and SNR.

Many of the fundamental coding problems can be represented as graph problems. These problems are often intrinsically difficult and unsolved even if the code length is relatively small. With the motivation to improve lower bounds on the... more

Many of the fundamental coding problems can be represented as graph problems. These problems are often intrinsically difficult and unsolved even if the code length is relatively small. With the motivation to improve lower bounds on the sizes of constant weight codes and asymmetric codes, we suggest a few greedy algorithms and other heuristic methods, which result in new, record-breaking codes. Some of the heuristics used are based on tabu search and evolutionary algorithms. Tables of new codes are presented.

Ad hoc sensor networks are used in different hostile environments, like forests, battle fields, etc. The nature of these surroundings makes power recharging of the network devices very difficult or even impossible. Therefore, energy... more

Ad hoc sensor networks are used in different hostile environments, like forests, battle fields, etc. The nature of these surroundings makes power recharging of the network devices very difficult or even impossible. Therefore, energy conservation is one of the main concerns of such systems. As most of these systems consist of different procedures resided in sensors that communicating by means of RPC, placing related codes near each other can extremely reduce total energy utilization.

Some rights reserved 1 2 3 4 17 16 15 14 World Bank Studies are published to communicate the results of the Bank's work to the development community with the least possible delay. The manuscript of this paper therefore has not been... more

Some rights reserved 1 2 3 4 17 16 15 14 World Bank Studies are published to communicate the results of the Bank's work to the development community with the least possible delay. The manuscript of this paper therefore has not been prepared in accordance with the procedures appropriate to formally edited texts. This work is a product of the staff of The World Bank with external contributions. The findings, interpretations, and conclusions expressed in this work do not necessarily reflect the views of The World Bank, its Board of Executive Directors, or the governments they represent. The World Bank does not guarantee the accuracy of the data included in this work. The boundaries, colors, denominations, and other information shown on any map in this work do not imply any judgment on the part of The World Bank concerning the legal status of any territory or the endorsement or acceptance of such boundaries. Nothing herein shall constitute or be considered to be a limitation upon or waiver of the privileges and immunities of The World Bank, all of which are specifically reserved.

Using maps due to Ozeki and Broué-Enguehard between graded spaces of invariants for certain finite groups and the algebra of modular forms of even weight we equip these invariants spaces with a differential operator which gives them the... more

Using maps due to Ozeki and Broué-Enguehard between graded spaces of invariants for certain finite groups and the algebra of modular forms of even weight we equip these invariants spaces with a differential operator which gives them the structure of a Rankin-Cohen algebra. A direct interpretation of the Rankin-Cohen bracket in terms of transvectant for the group SL(2, C) is given.

The synthesis of linear and planar acoustical arrals of desired omnidirectional intensit) patterns is considered. B) relating the far-field sound intensity pattern to the correlation function of the used feeding sequence or code, it is... more

The synthesis of linear and planar acoustical arrals of desired omnidirectional intensit) patterns is considered. B) relating the far-field sound intensity pattern to the correlation function of the used feeding sequence or code, it is shown that an almo$t omnidirectional pattern results when a code with a sharp autocorrelation function i 5 used as the feeding sequence for the elements of the arraj. Huffman impulse-equivalent codes enjoy very sharp correlation properties, and are shown in this paper to result in good omnidirectional linear and planar acoustical arrays. The results have direct applications in underwater acoustical communication systems, public addrew $)stems, and acoustical measurements.

1. Introduction to observational methods, 2. Coding schemes and observational measurement, 3. Recording observational data, 4. Representing observational data, 5. Observer agreement and Cohen's kappa, 6. Kappas for point-by-point... more

1. Introduction to observational methods, 2. Coding schemes and observational measurement, 3. Recording observational data, 4. Representing observational data, 5. Observer agreement and Cohen's kappa, 6. Kappas for point-by-point agreement, 7. The intraclass ...

A Fortran90 program for the determination of the Wulff construction, starting solely from the directions of the bounding facets (defined by the user), is presented. SOWOS stands for solid of Wulff open source, and the program is... more

A Fortran90 program for the determination of the Wulff construction, starting solely from the directions of the bounding facets (defined by the user), is presented. SOWOS stands for solid of Wulff open source, and the program is distributed freely with no charge to the user, being readily available to the community for immediate use. Its simple algorithm (which will be explained) allows the determination of complex solids with hundreds of facets in just seconds on any machine, requiring only a small amount of memory. It is able to determine even the smallest facets and shortest edges and to distinguish almost adjacent vertices. The output files give a complete range of information about the structure: the coordinates of the vertices and the facets common to them, the extension of the facets and bounding vertices, and the length of the edges and extreme vertices. These details enable the reconstruction of the shape in any other (commercial) software for further processing. Visualization is straightfor-ward via the free program gnuplot. A feature for the creation of cubic crystal atomistic models of the resultant solids is included. The program may be a useful tool for crystallography, nanostructures and any other field where crystal facets are involved.

It has become increasingly clear that courts across the globe must do more to better organize and manage their caseload and that automation alone is not the answer. In response to this need, case flow management has emerged to become the... more

It has become increasingly clear that courts across the globe must do more to better organize and manage their caseload and that automation alone is not the answer. In response to this need, case flow management has emerged to become the central method of promoting greater court responsibility and accountability for efficient case processing. For over thirty years court case management concepts have evolved, starting in the United States (U.S.), spreading to other industrialized common law countries initially. Yet, for many judicial systems, the concept, techniques, and supporting systems of case flow management are still relatively new ideas that need to be more fully understood. This paper helps develop a basic understanding of case flow management by defining the concept, outlining the various techniques used, presenting in general the different case management information systems that support those techniques, and outlining the core steps a judicial system can take to plan for, ...

Saudi Building Code for Concrete Structures (SBC 304) focuses on guidance and guidelines for proper and safe design and construction of concrete structures in Saudi Arabia. It is also regarded as the major guard against the large... more

Saudi Building Code for Concrete Structures (SBC 304) focuses on guidance and guidelines for proper and safe design and construction of concrete structures in Saudi Arabia. It is also regarded as the major guard against the large uncertainty in the determination of modes of failure of structural concrete when subjected to some specific loading and environmental conditions. This paper will present the evolution of the first SBC 304. The first part of the paper will discuss the different parts of the code and highlight the different areas that covered by the code. The second part of the paper will focus on the steps needed to implement the concrete code. The last part of the paper will shed some lights on the advantages of enforcing SBC 304 on the quality of the local and imported materials related to buildings and the impact of that on the life cycle of our infrastructure.

The aim of this paper, is to examine the work of renowded artist-shows a critical attitude during period of Hitler, John Heartfield’s photomontage through semiotic methods. In our approach, the period will be discussed in the context of... more

The aim of this paper, is to examine the work of renowded artist-shows a critical attitude during period of Hitler, John Heartfield’s photomontage through semiotic methods. In our approach, the period will be discussed in the context of sociopolitical manner by using written and visual codes of John Heartfield, his process of semantic message to ironize the Nazi policy is intended to illuminate.

Thematic Analysis (TA) is an accessible, flexible, and increasingly popular method of qualitative data analysis. Learning to do it provides the qualitative researcher with a foundation in the basic skills needed to engage with other... more

Thematic Analysis (TA) is an accessible, flexible, and increasingly popular method of qualitative data analysis. Learning to do it provides the qualitative researcher with a foundation in the basic skills needed to engage with other approaches to qualitative data analysis. In this chapter, we first outline the basics of what TA is and explain why it is so useful. The main part of the chapter then demonstrates how to do thematic analysis, using a worked example with data from one of our own research projects—an interview-based study of lesbian, gay, bisexual, and transsexual (LGBT) students’ experiences of university life. We conclude by discussing how to conduct thematic analysis well and how to avoid doing it poorly.

Thematic analysis is a poorly demarcated, rarely acknowledged, yet widely used qualitative analytic method within psychology. In this paper, we argue that it offers an accessible and theoretically flexible approach to analysing... more

Thematic analysis is a poorly demarcated, rarely acknowledged, yet widely used qualitative analytic method within psychology. In this paper, we argue that it offers an accessible and theoretically flexible approach to analysing qualitative data. We outline what thematic analysis is, locating it in relation to other qualitative analytic methods that search for themes or patterns, and in relation to different epistemological and ontological positions. We then provide clear guidelines to those wanting to start thematic analysis, or conduct it in a more deliberate and rigorous way, and consider potential pitfalls in conducting thematic analysis. Finally, we outline the disadvantages and advantages of thematic analysis. We conclude by advocating thematic analysis as a useful and flexible method for qualitative research in and beyond psychology.

Techniques from coding theory are applied to study rigorously the capacity of the Hopfield associative memory. Such a memory storesn-tuple ofpm 1's. The components change depending on a hard-limited version of linear functions of all... more

Techniques from coding theory are applied to study rigorously the capacity of the Hopfield associative memory. Such a memory storesn-tuple ofpm 1's. The components change depending on a hard-limited version of linear functions of all other components. With symmetric connections between components, a stable state is ultimately reached. By building up the connection matrix as a sum-of-outer products ofmfundamental memories, one hopes to be able to recover a certain one of themmemories by using an initialn-tuple probe vector less than a Hamming distancen/2away from the fundamental memory. Ifmfundamental memories are chosen at random, the maximum asympotic value ofmin order that most of themoriginal memories are exactly recoverable isn/(2 log n). With the added restriction that every one of themfundamental memories be recoverable exactly,mcan be no more thann/(4 log n)asymptotically asnapproaches infinity. Extensions are also considered, in particular to capacity under quantization of the outer-product connection matrix. This quantized memory capacity problem is closely related to the capacity of the quantized Gaussian channel.

Business codes are a widely used management instrument. Research into the effectiveness of business codes has, however, produced conflicting results. The main reasons for the divergent findings are: varying definitions of key terms;... more

Business codes are a widely used management instrument. Research into the effectiveness of business codes has, however, produced conflicting results. The main reasons for the divergent findings are: varying definitions of key terms; deficiencies in the empirical data and methodologies used; and a lack of theory. In this paper, we propose an integrated research model and suggest directions for future research.

A new parallel distributed algorithm for Golomb Ruler derivation is presented. This algorithm was used to prove computationally the optimality of three rulers. Two of these were previously proven but yet unpublished, and the authors'... more

A new parallel distributed algorithm for Golomb Ruler derivation is presented. This algorithm was used to prove computationally the optimality of three rulers. Two of these were previously proven but yet unpublished, and the authors' independent derivation confirmed these results. The last ruler, of 19 marks and size 246, was known to be near-optimal and was computationally proven optimal in this work.

Saudi Building Code for Concrete Structures (SBC 304) focuses on guidance and guidelines for proper and safe design and construction of concrete structures in Saudi Arabia. It is also regarded as the major guard against the large... more

Saudi Building Code for Concrete Structures (SBC 304) focuses on guidance and guidelines for proper and safe design and construction of concrete structures in Saudi Arabia. It is also regarded as the major guard against the large uncertainty in the determination of modes of failure of structural concrete when subjected to some specific loading and environmental conditions. This paper will present the evolution of the first SBC 304. The first part of the paper will discuss the different parts of the code and highlight the different areas that covered by the code. The second part of the paper will focus on the steps needed to implement the concrete code. The last part of the paper will shed some lights on the advantages of enforcing SBC 304 on the quality of the local and imported materials related to buildings and the impact of that on the life cycle of our infrastructure.

Lotman explicitly affirms that his methodological wager is an attempt to join the formal- -structural paradigm of Roman Jacobson and the contextual-dialogical paradigm of Mikhail Bakhtin. Lotman conceives the structure of the text as... more

Lotman explicitly affirms that his methodological wager is an attempt to join the formal- -structural paradigm of Roman Jacobson and the contextual-dialogical paradigm of Mikhail Bakhtin. Lotman conceives the structure of the text as heterogenous just because it is at least dually coded, while semiosis is exactly the process of this inner hybridization, which has a creative potentiality. My paper will examine the dual coded structure of Lotman in the light of early Kristeva distinction between semiotic and symbolic function. I will examine the influence of Lotman in Kristeva’s works in the context of the 60ies.

El sector vivienda en México, en los últimos años se ha constituido como uno de los ejes más importantes de desarrollo en México, ya que el proceso de producción y adquisición de vivienda, no solo produce un efecto multiplicador sobre la... more

El sector vivienda en México, en los últimos años se ha constituido como uno de los ejes más importantes de desarrollo en México, ya que el proceso de producción y adquisición de vivienda, no solo produce un efecto multiplicador sobre la economía nacional y es un importante generador de empleos, sino también demanda una gran cantidad de bienes, insumos y servicios asociados a la producción de vivienda y es un elemento fundamental para el crecimiento de las ciudades.

As a high-speed internet infrastructure is being developed and people are informationized, the financial tasks are also engaged in internet field. However, the existing internet banking system was exposed to the danger of hacking.... more

As a high-speed internet infrastructure is being developed and people are informationized, the financial tasks are also engaged in internet field. However, the existing internet banking system was exposed to the danger of hacking. Recently, the personal information has been leaked by a high-degree method such as Phishing or Pharming beyond snatching a user's ID and Password. Seeing that most of examples which happened in the domestic financial agencies were caused by the appropriation of ID or Password belonging to others, a safe user confirmation system gets much more essential. In this paper, we propose a new Online Banking Authentication system. This authentication system used Mobile OTP with the combination of QR-code which is a variant of the 2D barcode.

This article builds on C. S. Peirce’s suggestive blueprint for an inclusive outlook that grants reality to his three categories. Moving away from the usual focus on (contentious) cosmological forces, I use a modal principle to partition... more

This article builds on C. S. Peirce’s suggestive blueprint for an inclusive outlook that grants reality to his three categories. Moving away from the usual focus on (contentious) cosmological forces, I use a modal principle to partition various ontological layers: regular sign-action (like coded language) subsumes actual sign-action (like here-and-now events) which in turn subsumes possible sign-action (like qualities related to whatever would be similar to them). Once we realize that the triadic sign’s components are each answerable to this asymmetric subsumption, we obtain the means to track at which level of complexity semiosis finds itself, in a given case. Since the bulk of such a “trinitarian” metaphysics would be devoted to countenancing un-interpreted phenomena, I argue that current misgivings about sign-based ontologies are largely misplaced.

(in german) Guidelines for the development of structural design codes: Due to the amount and complexity of the documents the situation with structural design codes is rather unsatisfactory for practitioners. On the initiative of the... more

(in german)
Guidelines for the development of structural design codes:
Due to the amount and complexity of the documents the situation with structural design codes is rather unsatisfactory for practitioners. On the initiative of the Association of Consulting Engineers (VBI) and the Federal Association of Checking Engineers for Structural Design (BVPI) a project financed by the Federal Institute for Research on Building, Urban Affairs and Spatial Development (BBSR); was carried which resulted in the report „Elaboration of Guidelines for the Development of user-friendly and practical Design Codes“; this work is aimed at contributing to more consistent codes as well as code working processes for instance in the upcoming revision of the Eurocodes. The guidelines comprise a description of the current situation with respect to technical and organizational aspects. Subsequently, general requirements are revealed and proposals for a uniform structure of the documents and simplifications of the design and combination rules are made. Furthermore, it is illustrated that efficient code working processes are possible only in a more professional environment where code drafting is scheduled and remunerated similarly to an engineering contract. Finally, some hints for optimizing the code working processes in the national and international context are given

As a high-speed internet infrastructure is being developed and people are informationized, the financial tasks are also engaged in internet field. However, the existing internet banking system was exposed to the danger of hacking.... more

As a high-speed internet infrastructure is being developed and people are informationized, the financial tasks are also engaged in internet field. However, the existing internet banking system was exposed to the danger of hacking. Recently, the personal information has been leaked by a high-degree method such as Phishing or Pharming beyond snatching a user's ID and Password. Seeing that most of examples which happened in the domestic financial agencies were caused by the appropriation of ID or Password belonging to others, a safe user confirmation system gets much more essential. In this paper, we propose a new Online Banking Authentication system. This authentication system used Mobile OTP with the combination of QR-code which is a variant of the 2D barcode.

O exercício da prostituição é ambíguo: ao mesmo tempo em que é reconhecido como uma ocupação é também uma atividade moralmente desconcertante para os valores dominantes, ao mesmo tempo em que o Estado garante a condição de ocupação para a... more

O exercício da prostituição é ambíguo: ao mesmo tempo em que é reconhecido como uma ocupação é também uma atividade moralmente desconcertante para os valores dominantes, ao mesmo tempo em que o Estado garante a condição de ocupação para a prostituta, criminaliza as demais atividades no seu entorno (cuja principal implicação é a impossibilidade de exploração de lucro sobre o trabalho de uma prostituta) e a vitimiza. Essa condição liminar da prostituição faz com que as pessoas que lidam com esse mundo acabem criando condutas e códigos internos, de ação cotidiana, para que seja possível manter suas práticas e mercados atuantes, transitando justamente entre as esferas do legal e ilegal, moral e imoral. Este trabalho tem o intuito de entender, a partir dos códigos e condutas, o funcionamento de alguns espaços de prostituição em três cidades distintas do interior de São Paulo: Íris, Girassol e Gardênia. Em cada uma dessas cidades foi possível ver vários contextos de prostituição, sobretudo em ruas, praças e casas. Nesses espaços foi realizado um trabalho de campo, com entrevistas e análises de registros midiáticos (jornais impressos e virtuais, blogs, folders etc.)

The paper explores the divergent concepts of mimesis in the works of Bulgarian orthodox Marxist philosopher Todor Pavlov and Yuri Lotman, founder of the Tartu-Moscow Semiotic School. With his Theory of Reflection, completed in Moscow in... more

The paper explores the divergent concepts of mimesis in the works of Bulgarian orthodox Marxist philosopher Todor Pavlov and Yuri Lotman, founder of the Tartu-Moscow Semiotic School. With his Theory of Reflection, completed in Moscow in 1936 as an elaboration of Lenin’s ideas of knowledge, Pavlov became one of the major proponents of the understanding of mimesis as reflection, which for decades defined the dogmatic Marxist-Leninist aesthetics in Eastern Europe. Beginning with the 1960s, Lotman’s conceptualization of dual code structures begins to work in the direction of reloading the mimetic theory beyond the official discourse. Lotman explicitly states that his methodological wager is an attempt to join the formal-structural paradigm of Roman Jacobson and the contextual-dialogical paradigm of Mikhail Bakhtin, which makes his position a synthesis of the two schools that challenged the theory of reflection dogma.

Generated by Don Hoffmann The reader should be able to understand most of the repeated VMS words if she/he uses the information shown. The information given also works for most of the single occurrence VMS words. Additional codes, mostly... more

Generated by Don Hoffmann The reader should be able to understand most of the repeated VMS words if she/he uses the information shown. The information given also works for most of the single occurrence VMS words. Additional codes, mostly Group I codes, may be required for some. My proposed solution is of the form of cryptoanalytic concept enumerated by Mary E. D'Imperio in The Voynich Manuscript: An Elegant Enigma on page 29 as: E. The Nature of the Substitution. E.7 Whole words or concepts are represented by single Voynich symbols or by mixed-length Voynich strings (as in shorthand.) My proposed solution's deconstruction ideas are a derivative of Professor Jorge Stolfi's prefix/midfix/suffix or crust/mantle/core ideas, although two of the-fixes have been further broken down into smaller component parts. These-fixes and sub-parts correspond with the six groups of codes shown and enumerated in the paper. My lists of Voynich Manuscript words found two or more times in the text or labels were gleaned from lists generated by Professor Stolfi. .

This paper attempts to identify nebuly lines (also called wolkenbänds, cloud-band patterns and wavy line patterns) in the Voynich Manuscript and from other art of the Fifteenth Century and before, categorize the results and compare those... more

This paper attempts to identify nebuly lines (also called wolkenbänds, cloud-band patterns and wavy line patterns) in the Voynich Manuscript and from other art of the Fifteenth Century and before, categorize the results and compare those from each source (VMS and other) that look similar. List III – Comprehensive list of mages containing nebuly lines in manuscripts or tapestries from AD 1438 and before (and a few additional ones from later). Page 233 List IV-Uses for nebuly lines in other manuscripts other than in border decorations or as doorways/heavenly gateways or as clouds/cloud bands Page 261 List V-Comparisons of uses of nebuly lines in images in the Voynich Manuscript (List II) with those in other period manuscripts/tapestries-circa 1438 or before (List IV). Impatient readers/viewers may read/view the General Information section, and this and the next sections and skip the supporting material that is not needed to understand the basics of my ideas. Page 304 Conclusions and other ruminations. General Information about nebuly lines On June 8th, 2014, Ellie Velinska posted a wonderfully informative blog entry about "The Voynich Manuscript: Geocentric Model" in which she revealed a congruency of forms used in an image on a page in the VMS and one from the early Fifteenth century. I didn't pay it much attention. But Richard Sale did. Mr. Sale found the term, nebuly, describing certain lines in heraldry. When he reported this name that seemed to match the line pattern to the VMS-List, I became intrigued. I decided to try to figure out where and when the use had begun and its areas of use down through time to the date of the VMS. The following images all result from those original findings of Ms. Velinska and Mr. Sale. Since we obviously didn't know the correct terminology for the artistic form found in the Voynich Manuscript that it resembles, Mr. Sale and I made it our own by co-opting the term nebule and its derivative, nebuly. We have subsequently been informed the correct titles are volkenbänd or cloud band pattern or wavy line pattern. We persist in using our terms because they are familiar, they include the sharp-cornered forms, and they are more descriptive of the different line forms found in historical illustrations/images/art than a general term like 'wavy line pattern'. A nebuly form of line is explained as sinuous, fairly regular and wavy with bulbous nodes at the peaks. Normally, it seems, nebuly lines may or may not have bumpy projections on the outsides of the nebules (bulbous nodes). The nebuly line may alternately have sharp corners at the curves as in the dovetail and potenty line versions of nebuly lines. We include these sharp-cornered forms as nebuly line forms in our identifications.

One of the main problems of biosemiotics, i.e., the distinction between code-based artifacts and (meaning-making) life itself, does not seem to be resolved yet. Semiosis requires codes but it cannot be based on a single code. I sketch a... more

One of the main problems of biosemiotics, i.e., the distinction between code-based artifacts and (meaning-making) life itself, does not seem to be resolved yet. Semiosis requires codes but it cannot be based on a single code. I sketch a model that demonstrates the role of codes in semiosis and helps to see correspondences between the models of Peirce and Saussure.

The paper investigates logics of relational thinking and connectivity, rendering particular correspondences between the elements of representation and the things represented in drawings, diagrams, maps, or notations, which either deny... more

The paper investigates logics of relational thinking and connectivity, rendering particular correspondences between the elements of representation and the things represented in drawings, diagrams, maps, or notations, which either deny notions of scale, or work at all scales without belonging to any specific one of them. They include ratios and proportions (static and dynamic, geometric, arithmetic and harmonic progressions) expressing symmetry and self-similarity principles in spatial-metric terms, but also principles of nonlinearity and complexity by symmetry-breakings within non-metric systems.
The first part explains geometric and numeric relational figures/sets as taken for “principles of beauty and primary aesthetic quality of all things” in classical philosophy, science, and architecture. These progressions are guided by certain rules or their combinations (codes and algorithms) based on principles of regularity, usually directly spatially reflected. Conversely, configurations representing the main
subject of the following sections, could be spatially independent, transformable, and unpredictable, escaping regular extensive definitions. Their forms are presented through transitions from scalable to no-scale conditions showing initial symmetry breakings and abstractions, through complex forms of dynamic modulations and variations of matter, ending with some of the relational diagrammatic and topological ways of architectural data-processing outside of the spatial constraints and parameters – all through diagrams as ultimate tools of relational thinking and inference.

Business codes are a widely used management instrument. Research into the effectiveness of business codes has, however, produced conflicting results. The main reasons for the divergent findings are: varying definitions of key terms;... more

Business codes are a widely used management instrument. Research into the effectiveness of business codes has, however, produced conflicting results. The main reasons for the divergent findings are: varying definitions of key terms; deficiencies in the empirical data and methodologies used; and a lack of theory. In this paper, we propose an integrated research model and suggest directions for future research.

Özet Devlet adamı ve diplomat kimliği ile Kıbrıs Türkleri'nin milli mücadelesinin önderliğini yıllarca yürüten Rauf Denktaş, aynı zamanda Türk Mukavemet Teşkilatı'nın kurucularındandır. TMT Rumların tedhiş hareketlerine karşı Kıbrıs'taki... more

Özet Devlet adamı ve diplomat kimliği ile Kıbrıs Türkleri'nin milli mücadelesinin önderliğini yıllarca yürüten Rauf Denktaş, aynı zamanda Türk Mukavemet Teşkilatı'nın kurucularındandır. TMT Rumların tedhiş hareketlerine karşı Kıbrıs'taki Türk varlığının nefsi müdafaasını örgütleyen bir direniş örgütüdür. 20. yüzyılın en önemli direniş örgütlerinden olan TMT'nin başarıya ulaşmasında, politik misyonu ve faaliyetlerinin yanı sıra, teşkilat içindeki haberleşme yöntemleri de etkili olmuştur. Daha başlangıçta, eğitim gören Mücahitlerin yemin töreni ile gizliliğe ve sır saklamaya özel önem veren Teşkilat; silahların, gizli faaliyetlerde kullanılan tabirlerin, hatta coğrafi mevkilerin kod isimlerini kullanmış, haberleşmelerinde değişik şifreleme yöntemlerini başarıyla uygulayarak uzun süre deşifre olmamıştır. Bu makalede, Kıbrıs Türk Mukavemet Teşkilatı'nın kullandığı haberleşme teknikleri, kodlar, şifreler ve teçhizatlar incelenmiştir.
Abstract
Statesman and diplomat of the national struggle with the identity of the leadership of the Turkish Cypriot Rauf Denktaş, who walked for years, but also one of the founders of the Turkish Resistance Organization. TMT terrorist act against the Greeks of Turkish presence in Cyprus, organized self-defense is a resistance organization. For succeeding of the Turkish Resistance Organisation (TMT), that is one of the most important resistance organisations of the 20 th century, communication methods in the organisation had also influence as well as its political mission and proceedings. Even at the beginning, the organisation which places special emphasis on confidentiality and secretion through swearing ceremony of trainee TMT members, used code names of guns, expressions that are used for secret movements, even to geographical places. They did not come to light for a long period of time by practising different encoding orders 308 Bu çalışma " 2. Uluslararası Kıbrıs Türk Milli Mücadelesi ve Bu Mücadelede TMT'nin Yeri Sempozyumu " nda sözlü olarak sunulmuştur.