MERGING+ANUBIS User Manual

Total Page:16

File Type:pdf, Size:1020Kb

MERGING+ANUBIS User Manual USER MANUAL V27.09.2021 2 Contents Thank you for purchasing MERGING+ANUBIS ........................................................................................... 6 Important Safety and Installation Instructions ........................................................................................... 7 Product Regulatory Compliance .................................................................................................................... 9 MERGING+ANUBIS Warranty Information................................................................................................ 11 INTRODUCTION .............................................................................................................................................. 12 Package Content ........................................................................................................................................ 12 OVERVIEW ................................................................................................................................................... 13 MERGING+ANUBIS VARIANTS AND KEY FEATURES ........................................................................ 13 ABOUT RAVENNA ...................................................................................................................................... 16 MISSION CONTROL - MODULAR BY SOFTWARE ............................................................................... 16 MERGING+ANUBIS panels description ..................................................................................................... 17 TOP PANEL ................................................................................................................................................. 17 BACK PANEL ............................................................................................................................................... 19 FRONT PANEL ............................................................................................................................................ 21 ANUBIS ANALOGUE I/O BLOCK DIAGRAM .......................................................................................... 22 HOW TO CONNECT MERGING+ANUBIS ................................................................................................... 23 Connecting the Ethernet cable to the Network for RAVENNA use .................................................. 23 How to connect a balanced line output to an unbalanced input ...................................................... 24 DRIVERS INSTALLATION PROCEDURE..................................................................................................... 25 Windows PC - RAVENNA ASIO Driver or Merging Audio Device (MAD) .......................................... 25 Mac OS – VAD Premium .......................................................................................................................... 26 Linux OS – ALSA Driver ............................................................................................................................ 27 POWER SUPPLY ............................................................................................................................................. 28 Using the DC power supply source ........................................................................................................ 28 Using the Power-over-Ethernet (PoE) source ....................................................................................... 28 Switching ON MERGING+ANUBIS .......................................................................................................... 29 TOUCHSCREEN AND NAVIGATION............................................................................................................ 30 ANUBIS HOME PAGE .................................................................................................................................... 31 STATUS BAR ............................................................................................................................................... 32 3 LOGS MESSAGES ...................................................................................................................................... 33 LOG MESSAGE APPENDIX ................................................................................................................... 34 PREAMPS CONTROL ................................................................................................................................ 35 DUAL GAIN 32bit CIRCUITRY .............................................................................................................. 40 SPLIT CHANNEL .................................................................................................................................... 41 Analog levels and Digital levels (after A/D conversion) .................................................................. 41 ANUBIS VIRTUAL KEYBOARD ..................................................................................................................... 42 SETTINGS ....................................................................................................................................................... 44 SETTINGS CATEGORIES DESCRIPTION ................................................................................................... 45 PRESETS Settings ..................................................................................................................................... 50 MONITORING Settings ............................................................................................................................. 51 ROOM CORRECTION with SONARWORKS SoundID REFERENCE .................................................. 59 ANUBIS EQ GUIDELINES .......................................................................................................................... 65 SUB SETTINGS (BASS MANAGEMENT) ................................................................................................ 72 Bass Management Signal flow ........................................................................................................... 74 INFO Settings .............................................................................................................................................. 88 DEBUG Settings .......................................................................................................................................... 88 EXIT Settings .............................................................................................................................................. 89 ANUBIS MONITOR MISSION CONTROL .................................................................................................... 90 Missions IO Channels Specifications ..................................................................................................... 92 Sources vs. Monitors Fundamentals ..................................................................................................... 93 Different Monitor types ............................................................................................................................. 94 MONITOR PAGE ......................................................................................................................................... 96 Downmix Table ..................................................................................................................................... 100 METERS PAGE ......................................................................................................................................... 104 ANUBIS PREMIUM DXD-DSD GUIDELINES ............................................................................................ 106 DSD Features & Restrictions: ................................................................................................................ 106 DSD MONITORING: .................................................................................................................................. 107 DSD PreAmps ........................................................................................................................................... 110 ANUBIS SPS .................................................................................................................................................. 112 PEERING ........................................................................................................................................................ 118 4 How to peer a device ............................................................................................................................... 120 Peering Rules ............................................................................................................................................ 124 ANUBIS USE CASES (MULTIPLE CASES ARE ONLINE) ....................................................................... 125 BASIC MONITORING SETUP ................................................................................................................. 125 RECORDING SETUP ................................................................................................................................ 129 MORE ANUBIS USE CASES HERE ........................................................................................................ 135 MONITORING WEB USER INTERFACE ...................................................................................................
Recommended publications
  • The Design of Rijndael: AES - the Advanced Encryption Standard/Joan Daemen, Vincent Rijmen
    Joan Daernen · Vincent Rijrnen Theof Design Rijndael AES - The Advanced Encryption Standard With 48 Figures and 17 Tables Springer Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Springer TnL-1Jn Joan Daemen Foreword Proton World International (PWI) Zweefvliegtuigstraat 10 1130 Brussels, Belgium Vincent Rijmen Cryptomathic NV Lei Sa 3000 Leuven, Belgium Rijndael was the surprise winner of the contest for the new Advanced En­ cryption Standard (AES) for the United States. This contest was organized and run by the National Institute for Standards and Technology (NIST) be­ ginning in January 1997; Rij ndael was announced as the winner in October 2000. It was the "surprise winner" because many observers (and even some participants) expressed scepticism that the U.S. government would adopt as Library of Congress Cataloging-in-Publication Data an encryption standard any algorithm that was not designed by U.S. citizens. Daemen, Joan, 1965- Yet NIST ran an open, international, selection process that should serve The design of Rijndael: AES - The Advanced Encryption Standard/Joan Daemen, Vincent Rijmen. as model for other standards organizations. For example, NIST held their p.cm. Includes bibliographical references and index. 1999 AES meeting in Rome, Italy. The five finalist algorithms were designed ISBN 3540425802 (alk. paper) . .. by teams from all over the world. 1. Computer security - Passwords. 2. Data encryption (Computer sCIence) I. RIJmen, In the end, the elegance, efficiency, security, and principled design of Vincent, 1970- II. Title Rijndael won the day for its two Belgian designers, Joan Daemen and Vincent QA76.9.A25 D32 2001 Rijmen, over the competing finalist designs from RSA, IBl\!I, Counterpane 2001049851 005.8-dc21 Systems, and an English/Israeli/Danish team.
    [Show full text]
  • Ancient Egyptian Religion I: General Concepts and the Heliopolitan Gods
    Ancient Egyptian Religion I: General Concepts and the Heliopolitan Gods Shawn C. Knight Spring 2009 (This document last revised March 18, 2009) 1 The nature of Egyptian religion (intro) The Egyptian idea of \deity" is a difficult one to pin down. The most frequently used word for deity, ' 4 ntr (or nTr), resembles the English word god in that it can be used as either a common noun, referring to one of numerous divine beings, or as a proper noun, referring to the Supreme Being. Much more problematic than the word used, however, are the details of what the gods do and even who they are. Gods become conflated with one another; most notably, there are (at least) two gods named Horus, designated \Elder" and \Younger", and they share a number of traits, often being confused (deliberately or mistakenly). The gods usurp one another's roles, or delegate their roles to others, with astounding frequency. It is Set's role to protect the sun god from the serpent of chaos|except when Horus has that function. The Supreme Being is Re-Atum, except when he is Amun-Re, except when he is simply Re or simply Atum or . Adding still further to the complication is the local character of Egyptian religion. Every nome had a patron god, and while some of the gods patronized more than one nome, there was plenty of variety. We have already considered this to some degree: we have noted Thebes, for example, as having Amun for a patron, and observed that the military rise of the Thebans in the Middle and New Kingdoms were responsible for the enrichment and empowerment of Amun's cult.
    [Show full text]
  • Ankh: Gods of Egypt Rulebook
    RULEBOOK TABLE OF CONTENTS OVERVIEW .................................................................................2 INTRODUCTION ..................................................................... 3 COMPONENTS .........................................................................4 BASIC CONCEPTS ................................................................... 7 Adjacency ...............................................................................8 Figures .....................................................................................8 Monuments ............................................................................8 Central Dashboard .............................................................9 God Dashboard .................................................................. 10 Devotion ..................................................................................11 Battle Cards ...........................................................................11 SETUP ..........................................................................................12 WINNING THE GAME ..........................................................13 GAMEPLAY ...............................................................................13 ACTIONS ....................................................................................14 OVERVIEW Move Figures ........................................................................15 Summon Figure ...................................................................16 Gain Followers .....................................................................17
    [Show full text]
  • Egyptian Religion a Handbook
    A HANDBOOK OF EGYPTIAN RELIGION A HANDBOOK OF EGYPTIAN RELIGION BY ADOLF ERMAN WITH 130 ILLUSTRATIONS Published in tile original German edition as r handbook, by the Ge:r*rm/?'~?~~ltunf of the Berlin Imperial Morcums TRANSLATED BY A. S. GRIFFITH LONDON ARCHIBALD CONSTABLE & CO. LTD. '907 Itic~mnoCLAY B 80~8,L~~II'ED BRIIO 6Tllll&I "ILL, E.C., AY" DUN,I*Y, RUFIOLP. ; ,, . ,ill . I., . 1 / / ., l I. - ' PREFACE TO THE ENGLISH EDITION THEvolume here translated appeared originally in 1904 as one of the excellent series of handbooks which, in addition to descriptive catalogues, are ~rovidedby the Berlin Museums for the guida,nce of visitors to their great collections. The haud- book of the Egyptian Religion seemed cspecially worthy of a wide circulation. It is a survey by the founder of the modern school of Egyptology in Germany, of perhaps tile most interest- ing of all the departments of this subject. The Egyptian religion appeals to some because of its endless variety of form, and the many phases of superstition and belief that it represents ; to others because of its early recognition of a high moral principle, its elaborate conceptions of a life aftcr death, and its connection with the development of Christianity; to others again no doubt because it explains pretty things dear to the collector of antiquities, and familiar objects in museums. Professor Erman is the first to present the Egyptian religion in historical perspective; and it is surely a merit in his worlc that out of his profound knowledge of the Egyptian texts, he permits them to tell their own tale almost in their own words, either by extracts or by summaries.
    [Show full text]
  • The Secret Name of Ra
    Thesecret name of Ra Ra, the SoleCreator was visible to the peopleof Eglat asthe discol the sun,but they knew him in manyother {orms. He could appearas a crownedman. a falconor'a man with a falcon'shead and, as the scarabbeetle pushes a round ball of dungin front of it, the Egyptians picturedRa asa scarabpushing the sun acrossthe sky. In caverns deepbelow the earthwere hidden another seventy-five forms ofRa; mysteriousbeings with mummiEedbodies and heads consisting of birds or snakes,feathers or flowers,The namesof Rawere as numerousas his forms; he wasthe ShiningOne, The Hidden One, The Renewerof the Earth,The lfind in the Souls,The ExaltedOne, but therewas one name ofthe SunGod which hadnot beenspoken sincetime began.To know this secretname ofRa wasto havepower overhim andover the world that he hadcreated. Isislonged for suchapower. Shehad dreamed that oneday she *.ould havea marvellousfalcon-headed son called Horus andshe wantedthe throne of Ra to giveto her child. Isis wasthe Mistressof Magic,wiser than millionsofmen, but sheLrrew that nothingin creationwas powerful enoughto harmits creator.Her only chance vr'as!o turn thepower of Ra againsthimself and atlast Isisthought of a crlel andcunning plan. Everyday the SunGod walkedthrough his kingdom, attendedby a crowd ofspirits andlesser deities, but Rawas growingold. His eyeswere dim, his stepno longerfirm andhe had evenbegun to drivel. One morning Isismingled with a group of minor goddessesand followedbehind the King of the Gods.She watched the faceofRa until shesaw his salivadrip onto a clod o{ eanh.\0hen shewas sure that no-onewas taking any noticeo{ her, shescooped up the earth andcarried it awav.Isis mixed the earthwith the salivaofRa to form clay andmodelled a wickedJookingserpent.
    [Show full text]
  • House of Eternity: Tomb of Nefertari
    - - - OUSE OF ETERNITY The Tomb of Nefertari John K. McDonald The Getty Conservation Institute and the J. Paul Getty Museum Los Angeles Cover/title page: Detail a/Queen Nefertari 0/'1 the north wall of Chamber G. All photographs are by Guillermo Aldana unless credited otherwise. The Getty Conservation Institute works internationally to further the appreciation and preservation of the world's cultural heritage for the enrichment and use of present and future generations. This is the first volume in the Conservation and Cultural Heritage series, which aims to provide in a popular format information about selected culturally significant sites throughout the world. © 1996 The J. Paul Getty Trust All rights reserved Printed in Singapore Library of Congress Cataloging-in-Publication Data McDonald. John K. House of eternity: the tomb of Nefertari I John K. McDonald. p. cm. ISBN 0-89236-415-7 1. Nefertari. Queen. consort of Rameses II. King of Egypt-Tomb. 2. Mural painting and decoration. Egyptian. 3. Tombs-Egypt. 4. Valley of the Queens (Egypt) I. Title. DT73· v34M35 1996 932-dc20 96-24123 C1P Contents Foreword 5 Introduction Dynasties of Ancient Egypt II Nefertari: Radiant Queen A Letter from Nefertari The Queen's Titles and Epithets 19 The Valley of the Queens Ernesto Schiaparelli 25 Conveyance to Eternal Life: The Royal Tombs of Egypt Tomb Paints and Materials 33 The Tomb Builders' Village 37 After Nefertari's Burial 41 Resurrection and Recurrent Risks 47 The King of the Dead and His Divine Family Divine Guidance 55 Among the Immortals: A Walk through the "House of Eternity" The Texts in the Tomb III Conclusion 116 Acknowledgments II HOUSE OF ETER ITY an honored and < > beloved queen, still in the prime of earthly existence, set off upon a voyage to the netherworld, in quest of eternal life.
    [Show full text]
  • Optimization of AES Encryption Algorithm with S- Box
    International Journal of Engineering Research and Technology. ISSN 0974-3154 Volume 6, Number 2 (2013), pp. 259-268 © International Research Publication House http://www.irphouse.com Optimization of AES Encryption Algorithm with S- Box Dr. J. Abdul Jaleel1, Anu Assis2 and Sherla A.3 Dept. Of Electrical and Electronics Engineering1,3, Dept. Of Electronics and Communication2 [email protected], [email protected] [email protected] Abstract In any wireless communication, security is crucial during data transmission. The encryption and decryption of data is the major challenge faced in the wireless communication for security of the data. These algorithms are used to ensure the security in the transmission channels. Similarly hardware utilization and power consumption are another major things to be considered since most of the mobile terminals are battery operated. In this paper, we use the Advanced Encryption Standard (AES) which works on a 128 bit data encrypting it with 128, 192 or 256 bits of keys for ensuring security. In this paper, we compare AES encryption with two different S-Boxes: S-box with 256 byte lookup table (Rijndael S-Box) and AES with 16 byte S-Box (Anubis S-Box). Optimized and synthesized VHDL code is used for AES encryption. Xilinx ISE 13.2i software is used for VHDL code implementation and Modelsim simulator is used for the simulation. Keywords: AES(Advanced Encryption Standard ), Rijndael, Cryptography, VHDL. Introduction As we move into twenty-first century, almost all information processing and telecommunication are in digital formats. In any wireless communication, security is crucial during data transmission. The encryption and decryption of data is the major challenge faced in the wireless communication for security of the data.
    [Show full text]
  • Egyptian Temples
    Originalveröffentlichung in: Christina Riggs (Hrsg.), The Oxford Handbook of Roman Egypt, Oxford 2012, S. 362-382 CHAPTER 22 EGYPTIAN TEMPLES MARTINA MINAS-NERPEL From the beginning of their rule in Egypt, the Ptolemies initiated a gigantic temple con­ struction and decoration programme, which the Roman emperors continued well into the second century ce. Temples were still decorated on a much smaller scale into the third and the beginning of the fourth centuries. The last known cartouche of a Roman emperor in a temple was inscribed under Maximinus Daia (305-13 ce) on blocks belonging to the temple of Horus at Tahta (Holbl 2000: 45 n. 177; 114, fig. 157). Otherwise, the latest evidence comes from Esna (Sauneron 1975:65-6, no. 495; 84-7, no. 503), where the temple of Khnum was still being decorated under Decius (249-51 ce). Stelae inscribed in hieroglyphs continued to be set up in Egyptian temples, for example in the Bucheum at Armant, of which the latest is dated to 340, the fifty-seventh year of the era of Diocletian (Holbl 2000:45 n. 178; Goldbrun- ner 2004:78-9,302). The temple of Isis at Philae, where hieroglyphs were carved in the tem­ ple of Harendotes as late as 394 (Winter 1982:1023), was the last to be kept open, being closed down under Justinian between 535 and 537 (Winter 1982:1026), when it was converted to a church (Dijkstra 2008). The Hellenistic and Roman periods of Egypt are often subsumed under the term ‘Graeco- Roman Egypt’. In his examination of Egyptian society under Ptolemaic and Roman rule, Naphtali Lewis (1970) correctly pointed out that this phrase should not be used to imply con­ tinuity between the two eras, since the changes in the governmental structure, social pat­ terns and politics, administration, and the economy were so fundamental in Roman times as to render the term misleading.
    [Show full text]
  • This Pdf of Your Paper in Current Research in Egyptology 2014 Belongs to the Publishers Oxbow Books and It Is Their Copyright
    This pdf of your paper in Current Research in Egyptology 2014 belongs to the publishers Oxbow Books and it is their copyright. As author you are licenced to make up to 50 offprints from it, but beyond that you may not publish it on the World Wide Web until three years from publication (April 2018), unless the site is a limited access intranet (password protected). If you have queries about this please contact the editorial department at Oxbow Books (editorial@ oxbowbooks.com). An offprint from CURRENT RESEARCH IN EGYPTOLOGY 2014 Proceedings of the Fifteenth Annual Symposium University College London and King’s College London April 9–12, 2014 edited by Massimiliano S. Pinarello, Justin Yoo, Jason Lundock and Carl Walsh Paperback Edition: ISBN 978-1-78570-046-0 Digital Edition: ISBN 978-1-78570-047-7 © Oxbow Books 2015 Oxford & Philadelphia www.oxbowbooks.com Published in the United Kingdom in 2015 by OXBOW BOOKS 10 Hythe Bridge Street, Oxford OX1 2EW and in the United States by OXBOW BOOKS 908 Darby Road, Havertown, PA 19083 © Oxbow Books and the individual contributors 2015 Paperback Edition: ISBN 978-1-78570-046-0 Digital Edition: ISBN 978-1-78570-047-7 A CIP record for this book is available from the British Library All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical including photocopying, recording or by any information storage and retrieval system, without permission from the publisher in writing. For a complete list of Oxbow titles, please contact: UNITED KINGDOM UNITED STATES OF AMERICA Oxbow Books Oxbow Books Telephone (01865) 241249, Fax (01865) 794449 Telephone (800) 791-9354, Fax (610) 853-9146 Email: [email protected] Email: [email protected] www.oxbowbooks.com www.casemateacademic.com/oxbow Oxbow Books is part of the Casemate Group Front cover: Original Artwork by Isabel Zemani, © Isabel Zemani.
    [Show full text]
  • Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1
    International Journal of Grid and Distributed Computing Vol. 10, No. 11 (2017), pp.79-98 http://dx.doi.org/10.14257/ijgdc.2017.10.11.08 Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1 Rahul Saha1, G. Geetha2, Gulshan Kumar3 and Hye-Jim Kim4 1,3School of Computer Science and Engineering, Lovely Professional University, Punjab, India 2Division of Research and Development, Lovely Professional University, Punjab, India 4Business Administration Research Institute, Sungshin W. University, 2 Bomun-ro 34da gil, Seongbuk-gu, Seoul, Republic of Korea Abstract Cryptography has always been a core component of security domain. Different security services such as confidentiality, integrity, availability, authentication, non-repudiation and access control, are provided by a number of cryptographic algorithms including block ciphers, stream ciphers and hash functions. Though the algorithms are public and cryptographic strength depends on the usage of the keys, the ciphertext analysis using different functions and operations used in the algorithms can lead to the path of revealing a key completely or partially. It is hard to find any survey till date which identifies different operations and functions used in cryptography. In this paper, we have categorized our survey of cryptographic functions and operations in the algorithms in three categories: block ciphers, stream ciphers and cryptanalysis attacks which are executable in different parts of the algorithms. This survey will help the budding researchers in the society of crypto for identifying different operations and functions in cryptographic algorithms. Keywords: cryptography; block; stream; cipher; plaintext; ciphertext; functions; research problems 1. Introduction Cryptography [1] in the previous time was analogous to encryption where the main task was to convert the readable message to an unreadable format.
    [Show full text]
  • Religion and Politics in Ancient Egypt
    AMERICAN JOURNAL OF SOCIAL AND MANAGEMENT SCIENCES ISSN Print: 2156-1540, ISSN Online: 2151-1559, doi:10.5251/ajsms.2012.3.3.93.98 © 2012, ScienceHuβ, http://www.scihub.org/AJSMS Religion and politics in ancient Egypt Etim E. Okon Ph.D. Department of Religious and Cultural Studies, University of Calabar, Calabar, Nigeria. ABSTRACT The aim of this paper is to examine the pervasive influence of religion on politics in a monarchical ancient African kingdom. After a critical reflection on the mythology and cultus of the Sun-God, the apotheosis of the Pharaoh and the cult of the dead in ancient Egyptian society, it was found that religion was indispensable in ancient Egypt. Religion and politics in ancient Egyptian society were inseparable. Ancient Egyptians were incurably religious. Social and political life was a religious phenomenon. The king of Egypt, Pharaoh was not only despotic, but comprehensively authoritarian. Ancient Egyptian society was a monarchy. The idea of democracy was unknown in ancient Egypt. Key words: Religion and Politics in Ancient Egypt; Egypt and the Sun-God; Egyptian Mythology; INTRODUCTION differences. It is also evident that even though the god – Ra, was known by seventy-five different Religion was the dominant social force in ancient names, very few of the hundreds of deities were Egypt. Religious influence was pervasive affecting worshiped nationally. The most influential pantheon almost everything. Egyptian religion developed from was made up of the trinity – Osiris, Isis (his wife), and simple polytheism to philosophic monotheism, with Horus (his son). Egyptians also worshiped the every community having a guardian deity which “cosmic” gods under the leadership of Ra, the sun- personified the powers of nature.
    [Show full text]
  • Cryptanalysis of Feistel Networks with Secret Round Functions ⋆
    Cryptanalysis of Feistel Networks with Secret Round Functions ? Alex Biryukov1, Gaëtan Leurent2, and Léo Perrin3 1 [email protected], University of Luxembourg 2 [email protected], Inria, France 3 [email protected], SnT,University of Luxembourg Abstract. Generic distinguishers against Feistel Network with up to 5 rounds exist in the regular setting and up to 6 rounds in a multi-key setting. We present new cryptanalyses against Feistel Networks with 5, 6 and 7 rounds which are not simply distinguishers but actually recover completely the unknown Feistel functions. When an exclusive-or is used to combine the output of the round function with the other branch, we use the so-called yoyo game which we improved using a heuristic based on particular cycle structures. The complexity of a complete recovery is equivalent to O(22n) encryptions where n is the branch size. This attack can be used against 6- and 7-round Feistel n−1 n Networks in time respectively O(2n2 +2n) and O(2n2 +2n). However when modular addition is used, this attack does not work. In this case, we use an optimized guess-and-determine strategy to attack 5 rounds 3n=4 with complexity O(2n2 ). Our results are, to the best of our knowledge, the first recovery attacks against generic 5-, 6- and 7-round Feistel Networks. Keywords: Feistel Network, Yoyo, Generic Attack, Guess-and-determine 1 Introduction The design of block ciphers is a well researched area. An overwhelming majority of modern block ciphers fall in one of two categories: Substitution-Permutation Networks (SPN) and Feistel Networks (FN).
    [Show full text]