首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
An exact series representation is presented for integrals whose integrands are products of cosine and spherical wave functions, where the argument of the cosine term can be any integral multiple n of the azimuth angle φ. This series expansion is shown to have the following form: I(n)=e-jkR0/R0 δno-jk Σm=1 C(m,n)(k 2ρρ0)/m! hm(2)(kR0)/(kR0)m . It is demonstrated that in the special cases n=0 and n=1, this series representation corresponds to existing expressions for the cylindrical wire kernel and the uniform current circular loop vector potential, respectively. A new series representation for spherical waves in terms of cylindrical harmonics is then derived using this general series representation. Finally, a closed-form far-field approximation is developed and is shown to reduce to existing expressions for the cylindrical wire kernel and the uniform current loop vector potential as special cases  相似文献   

2.
This paper presents a novel analytical approach to compute the switching activity in digital circuits at the word level in the presence of glitching and correlation. The proposed approach makes use of signal statistics such as mean, variance, and autocorrelation. It is shown that the switching activity αf at the output node f of any arbitrary circuit in the presence of glitching and correlation is computed as αfi=1S-1α(f i,i+1)=Σi=1S- 1p(fi+1)(1-p(fi))(1-ρ(fi,i+1 )) (1) where ρ(fi,i+1)=ρ(fi,i+1)=(E[fi(Sn)f i+1(Sn)]- p(fi)p(fi+1))/(√(p(f i)-p(fi)2)(p(fi+1)- p(fi+12))) (2). S number of time slots in a cycle; ρ(fi,+1) time-slot autocorrelation coefficient; E[x]=expected value of x; px=probability of the signal x being “one”. The switching activity analysis of a signal at the word level is computed by summing the activities of all the individual bits constituting the signal. It is also shown that if the correlation coefficient of the higher order bits of a normally distributed signal x is ρ(xc), then the bit P0 where the correlation begins and the correlation coefficient is related hy ρ(xc)=erfc{(2(P0-1)-1)/(√2σx )} where erfc(x)=complementary error function; σx=variance of x. The proposed approach can estimate the switching activity in less than a second which is orders of magnitude faster than simulation-based approaches. Simulation results show that the errors using the proposed approach are about 6.1% on an average and that the approach is well suited even for highly correlated speech and music signals  相似文献   

3.
The minimum-redundancy prefix code problem is to determine, for a given list W=[ω1,..., ωn] of n positive symbol weights, a list L=[l1,...,ln] of n corresponding integer codeword lengths such that Σi=1 n 2-li⩽1 and Σi=1n ωili is minimized. Let us consider the case where W is already sorted. In this case, the output list L can be represented by a list M=[m1,..., mH], where ml, for l=1,...,H, denotes the multiplicity of the codeword length l in L and H is the length of the greatest codeword. Fortunately, H is proved to be O(min(log(1/p1),n)), where p1 is the smallest symbol probability, given by ω1i=1n ωi. We present the Fast LazyHuff (F-LazyHuff), the Economical LazyHuff (E-LazyHuff), and the Best LazyHuff (B-LazyHuff) algorithms. F-LazyHuff runs in O(n) time but requires O(min(H2, n)) additional space. On the other hand, E-LazyHuff runs in O(n+nlog(n/H)) time, requiring only O(H) additional space. Finally, B-LazyHuff asymptotically overcomes, the previous algorithms, requiring only O(n) time and O(H) additional space. Moreover, our three algorithms have the advantage of not writing over the input buffer during code calculation, a feature that is very useful in some applications  相似文献   

4.
In this work, we examine the existence and the computation of the Renyi divergence rate, limn→∞ 1/n Dα (p(n)∥q(n)), between two time-invariant finite-alphabet Markov sources of arbitrary order and arbitrary initial distributions described by the probability distributions p(n) and q(n), respectively. This yields a generalization of a result of Nemetz (1974) where he assumed that the initial probabilities under p(n) and q(n) are strictly positive. The main tools used to obtain the Renyi divergence rate are the theory of nonnegative matrices and Perron-Frobenius theory. We also provide numerical examples and investigate the limits of the Renyi divergence rate as α→1 and as α↓0. Similarly, we provide a formula for the Renyi entropy rate limn→∞ 1/n H α(p(n)) of Markov sources and examine its limits as α→1 and as α↓0. Finally, we briefly provide an application to source coding  相似文献   

5.
If pi(i=1,···, N) is the probability of the ith letter of a memoryless source, the length li of the corresponding binary Huffman codeword can be very different from the value -log pi. For a typical letter, however, li≈-logpi. More precisely, Pm -=Σ/sub j∈{i|l<-logpj-m}/pj<2-m and Pm +=Σ/sub j∈{i|li>-logpi+m/}pj<2-c(m-2)+2, where c≈2.27  相似文献   

6.
On the capacity of two-dimensional run-length constrained channels   总被引:2,自引:0,他引:2  
Two-dimensional binary patterns that satisfy one-dimensional (d, k) run-length constraints both horizontally and vertically are considered. For a given d and k, the capacity Cd,k is defined as Cd,k=limm,n→∞log2Nm,n d,k/mn, where Nm,nd,k denotes the number of m×n rectangular patterns that satisfy the two-dimensional (d,k) run-length constraint. Bounds on Cd,k are given and it is proven for every d⩾1 and every k>d that Cd,k=0 if and only if k=d+1. Encoding algorithms are also discussed  相似文献   

7.
This paper is about the eigenvalues and eigenvectors of (↓2)H. The ordinary FIR filter H is a convolution with a vector h=(h(O),...,h(N)), which is the impulse response. The operator (↓2) downsamples the output y=h*x, keeping the even-numbered components y(2n). Where H is represented by a constant-diagonal matrix, this is a Toeplitz matrix with h(k) on its kth diagonal, the odd-numbered rows are removed in (↓2)H. The result is a double shift between rows, yielding a block Toeplitz matrix with 1×2 blocks. Iteration of the filter is governed by the eigenvalues. If the transfer function H(z)=Σh(k)z-k has a zero of order p at z=-1, corresponding to ω=π, then (↓2)H has p special eigenvalues ½,¼...,(½)p. We show how each additional “zero at π” divides all eigenvalues by 2 and creates a new eigenvector for λ=½. This eigenvector solves the dilation equation φ(t)=2Σh(k)φ(2t-k) at the integers t=n. The left eigenvectors show how 1,t,...,tp-1 can be produced as combinations of φ(t-k). The dilation equation is solved by the cascade algorithm, which is an infinite iteration of M=(↓2)2H. Convergence in L2 is governed by the eigenvalues of T=(↓2)2HHT corresponding to the response 2H(z)H(z-1 ). We find a simple proof of the necessary and sufficient condition for convergence  相似文献   

8.
A function h(w) is said to be useful for the coding theorem if the coding theorem remains to be true when the lengths |w| of codewords w in it are replaced with h(w). For a codeword w=a0a1...am-1 of length m and an infinite sequence Q=(q0, q1, q2, ...) of real numbers such that 0n⩽½, let |w|Q denote the value Σn=0m-1 (if an =0 then -log2qn, else -log2(1-q n)), that is, -log2, (the probability that flippings of coins generate x) assuming that the (i+1)th coin generates a tail (or 0) with probability qi. It is known that if 0n→∞ qn then |w|Q is useful for the coding theorem and if limn→∞ q n/(1/(2n))=0 then |w|Q is not useful. We introduce several variations of the coding theorem and show sufficient conditions for h(w) not to be useful for these variations. The usefulness is also defined for the expressions that define the Kolmogorov complexity and the universal distribution. We consider the relation among the usefulness for the coding theorem, that for the Kolmogorov complexity, and that for the universal distribution  相似文献   

9.
The evaluation of the quantization error in two-dimensional (2-D) digital filters involves the computation of the infinite square sum Jm=φΣ ny2 (m, n). A simple method is presented for evaluating J based on partial fraction expansion and using the residue method provided the Z-transform Y(Z1, Z2) of the sequence y(m, n) having quadrant support is a causal bounded input, bounded output (BIBO) stable denominator-separable rational function. The value of J is expressed as a sum of simple integrals which can easily be evaluated. The simple integrals are tabulated for ready reference. The proposed method is suitable for analytical as well as numerical computation and can easily be programmed  相似文献   

10.
This paper presents a unified analytical method for computing the average E[g(x/(Sigmak=1 K yk + b))] of some arbitrary function g(.) when x is a gamma random variable and independent of the arbitrary random variables y1, y2, ..., yk. This leads to new explicit expressions for the averages of some specific functions including, erfc(radicz), exp(-z), zn, and In(1 + z), in terms of the moment generating functions of y1, y2, ..., yK.  相似文献   

11.
On ternary complementary sequences   总被引:1,自引:0,他引:1  
A pair of real-valued sequences A=(a1,a2,...,aN) and B=(b1,b 2,...,bN) is called complementary if the sum R(·) of their autocorrelation functions RA(·) and RB(·) satisfies R(τ)=RA(τ)+R B(τ)=Σi=1N$ -τaiai+τj=1 N-τbjbj+τ=0, ∀τ≠0. In this paper we introduce a new family of complementary pairs of sequences over the alphabet α3=+{1,-1,0}. The inclusion of zero in the alphabet, which may correspond to a pause in transmission, leads both to a better understanding of the conventional binary case, where the alphabet is α2={+1,-1}, and to new nontrivial constructions over the ternary alphabet α3. For every length N, we derive restrictions on the location of the zero elements and on the form of the member sequences of the pair. We also derive a bound on the minimum number of zeros necessary for the existence of a complementary pair of length N over α3. The bound is tight, as it is met by some of the proposed constructions, for infinitely many lengths  相似文献   

12.
For (n, q)=1 V a qm-ary cyclic code of length n and with generator polynomial g(x), we show that there exists a basis for F(qm) over Fq with respect to which the q-ary image of V is cyclic, if and only if: (i) g(x) is over Fq; or (ii) g(x)=g0(x)(x-γ-q(μ)), g0(x) is over Fq, Fq≠F(qk)=Fq(γ)⊂F(qm ), μ an integer modulo k, and wm-γ has a divisor over F(qk) of degree e=m/k; or (iii) g(x)=g0 (x) Πμϵs(x-γ(-qμ)), g 0(x) is over Fq, Fq≠F(qk)=Fq(γ)⊂F(qm ), S a set of integers module k of cardinality k-1 and wm -μ has a divisor over F(qk) of degree e=m/k. In all of the above cases, we determine all of the bases with respect to which the q-ary image of V is cyclic  相似文献   

13.
The Gaussian arbitrarily varying channel with input constraint Γ and state constraint Λ admits input sequences x=(x1,---,Xn) of real numbers with Σxi2nΓ and state sequences s=(S1,---,sn ) of real numbers with Σsi2nΛ; the output sequence x+s+V, where V=(V1,---,Vn) is a sequence of independent and identically distributed Gaussian random variables with mean 0 and variance σ2. It is proved that the capacity of this arbitrarily varying channel for deterministic codes and the average probability of error criterion equals 1/2 log (1+Γ/(Λ+σ2)) if Λ<Γ and is 0 otherwise  相似文献   

14.
The redundancy problem of universal lossy source coding at a fixed rate level is considered. Under some condition on the single-letter distortion measure, which implies that the cardinality K of the reproduction alphabet is not greater than the cardinality J of the source alphabet, it is shown that the redundancy of universally coding memoryless sources p by nth-order block codes of rate R goes like |(∂/∂R)d(p,R)|Kln n/2n+o(ln n/n) for all memoryless sources p except a set whose volume goes to 0 as the block length n goes to infinity, where d(p,R) denotes the distortion rate function of p. Specifically, for any sequence {Cn}n=1 of block codes, where Cn is an nth-order block code at the fixed rate R, and any ϵ>0, the redundancy Dn(C n,p) of Cn for p is greater than or equal to |(∂/∂R)d(p,R)|(K-ϵ)ln n/2n for all p satisfying some regular conditions except a set whose volume goes to 0 as n→∞. On the other hand, there exists a sequence {Cn}n=1 of block codes at the rate R such that for any p satisfying some regular conditions, the super limit of Dn(Cn,p)|(ln n/n) is less than or equal to |(∂/∂R)d(p,R)|K/2  相似文献   

15.
Simple nonlinear filters are often used to enforce “hard” syntactic constraints while remaining close to the observation data, e.g., in the binary case, it is common practice to employ iterations of a suitable median, or a one-pass recursive median, openclose, or closeopen filter to impose a minimum symbol runlength constraint while remaining “faithful” to the observation. Unfortunately, these filters are-in general-suboptimal. Motivated by this observation, we pose the following optimization: given a finite-alphabet sequence of finite extent y={y(n)}n=0N-1 , find a sequence x={x(n)}n=0N-1 that minimizes d(x,y)=Σn=0N-1dn(y(n), x(n)) subject to the following: x is piecewise constant of plateau run-length ⩾M. We show how a suitable reformulation of the problem naturally leads to a simple and efficient Viterbi-type optimal algorithmic solution. We call the resulting nonlinear input-output operator the Viterbi optimal runlength-constrained approximation (VORCA) filter. The method can be easily generalized to handle a variety of local syntactic constraints. The VORCA is optimal, computationally efficient, and possesses several desirable properties (e.g., idempotence); we therefore propose it as an attractive alternative to standard median, stack, and morphological filtering. We also discuss some applications  相似文献   

16.
17.
丁健  李红菊 《电子学报》2015,43(8):1662-1667
基于域Fpm上一类特殊的矩阵,定义了环R(pm,k)=Fpm[u]/k>到Fppmj的一个新的Gray映射,其中uk=0、p为素数、j为正整数且pj-1+1≤k≤pj.得到了环R(pm,k)上码长为任意长度N的(1+u)常循环码的Gray象是Fpm上长为pjN的保距线性循环码,并给出了Gray象的生成多项式,构造了F3,F5和F7上的一些最优线性循环码.  相似文献   

18.
It is pointed out that the Q of n identical cascaded resonators, Qn, is related to that of each resonator Q0, by the exact relation Qn/Q0= (21/n- 1)-1/2, which is no more complicated than the approximations developed by Mitra and Huey.  相似文献   

19.
We introduce a new approach for the least squared optimization of a weighted FIR filter of arbitrary order N under the constraint that its magnitude squared response be Nyquist(M). Although the new formulation is general enough to cover a wide variety of applications, the focus of the paper is on optimal energy compaction filters. The optimization of such filters has received considerable attention in the past due to the fact that they are the main building blocks in the design of principal component filter banks (PCFBs). The newly proposed method finds the optimum product filter Fopt(z)=Hopt(Z)Hopt (z-1) corresponding to the compaction filter Hopt (z). By expressing F(z) in the form D(z)+D(z-1), we show that the compaction problem can be completely parameterized in terms of the state-space realization of the causal function D(z). For a given input power spectrum, the resulting filter Fopt(z) is guaranteed to be a global optimum solution due to the convexity of the new formulation. The new algorithm is universal in the sense that it works for any M, arbitrary filter length N, and any given input power spectrum. Furthermore, additional linear constraints such as wavelets regularity constraints can be incorporated into the design problem. Finally, obtaining Hopt(z) from Fopt(z) does not require an additional spectral factorization step. The minimum-phase spectral factor Hmin(z) can be obtained automatically by relating the state space realization of Dopt(z) to that of H opt(z)  相似文献   

20.
A neural network that retrieves stored binary vectors, when probed by possibly corrupted versions of them, is presented. It employs sparse ternary internal coding and autocorrelation (Hebbian) storage. It is symmetrically structured and, consequently, can be folded into a feedback configuration. Bounds on the network parameters are derived from probabilistic considerations. It is shown that when the input dimension is n, the proportional activation radius is ρ and the network size is 2νn with ν>1-h2(ρ), the equilibrium capacity is at least 2αn/8nρ(1-ρ) for any α<1-h2(ρ), where h2(·) is the binary entropy. A similar capacity bound is derived for the correction of errors of proportional size ρ or less, when ρ⩽0.3. The performance of a finite-size symmetric network is examined by simulation and found to exceed, at the cost of higher connectivity, that of the Kanerva (1988) model, operating as a content addressable memory  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号