共查询到20条相似文献,搜索用时 11 毫秒
1.
2.
An upper bound on the reliability of a coherent system of positively correlated components is obtained via an improved Bonferroni inequality. An example is given. The bound is sharper if the joint survival probability is known for each pair of components. 相似文献
3.
4.
研究存储器数据保持时间的温度加速效应,建立数据保持时间寿命预测方法和温度加速模型,实现应用温度数据保持时间的准确预测.通过研究和分析存储器在不同温度下的阈值电压随时间加速衰减测试数据,采用阿列纽斯模型即温度倒数(1/T)模型和温度(T)模型,推导出了温度加速参数,分别进行了应用温度下数据保持时间预测外推,并和应用温度下... 相似文献
5.
Bounds on information combining 总被引:1,自引:0,他引:1
Land I. Huettinger S. Hoeher P.A. Huber J.B. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2005,51(2):612-619
When the same data sequence is transmitted over two independent channels, or when a data sequence is transmitted twice but independently over the same channel, the independent observations can be combined at the receiver side. From an information-theory point of view, the overall mutual information between the data sequence and the received sequences represents a combination of the mutual information of the two channels. This concept is termed information combining. A lower bound and an upper bound on the combined information is presented, and it is proved that these bounds are tight. Furthermore, this principle is extended to the computation of extrinsic information on single code bits for a repetition code and for a single parity-check code of length three, respectively. For illustration of the concept and the bounds on information combining, two applications are considered. First, bounds on the information processing characteristic (IPC) of a parallel concatenated code are derived from its extrinsic information transfer (EXIT) chart. Second, bounds on the EXIT chart for an outer repetition code and for an outer single parity-check code of a serially concatenated coding scheme are computed. 相似文献
6.
A new kind of bounds on the reliability of s-noncoherent systems increases the variety of methods for probabilistic analysis of s-noncoherent systems. To compute the bounds, only a) the length and width of the system, and b) component reliabilities must be known. The weak and strong points of the bounds are illustrated by examples. The first example demonstrates the manifold applicability of s-noncoherent systems and compares the new bounds with those of Chu & Apostolakis. 相似文献
7.
关于BCH码的广义Hamming重量上,下限 总被引:2,自引:0,他引:2
一个线性码的第r广义Hamming重量是它任意r维子码的最小支集大小。本文给出了一般(本原、狭义)BCH码的广义Hamming重量下限和一类BCH码的广义Hamming重量上限 相似文献
8.
Capocelli R.M. De Santis A. Taneja I.J. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1988,34(1):134-138
Upper bounds on the entropy of a countable integer-valued random variable are furnished in terms of the expectation of the logarithm function. In particular, an upper bound is derived that is sharper than that of P. Elias (ibid., vol.IT-21, no.2, p.194-203, 1975), for all values of E p(log). Bounds that are better only for large values of E p than the previous known upper bounds are also provided 相似文献
9.
Srinivasan R. Gupta S.K. Breuer M.A. 《Very Large Scale Integration (VLSI) Systems, IEEE Transactions on》1998,6(3):420-431
Pseudoexhaustive testing involves applying all possible input patterns to the individual output cones of a combinational circuit. Based on our new algebraic results, we have derived both generic (cone-independent) and circuit-specific (cone-dependent) bounds on the minimal length of a test required so that each cone in a circuit is exhaustively tested. For any circuit with five or fewer outputs, and where each output has k or fewer inputs, we show that the circuit can always be pseudoexhaustively tested with just 2k patterns. We derive a tight upper bound on pseudoexhaustive test length for a given circuit by utilizing the knowledge of the structure of the circuit output cones. Since our circuit-specific bound is sensitive to the ordering of the circuit inputs, we show how the bound can be improved by permuting these inputs 相似文献
10.
Four types of two-element-kind networks are considered: R, ±C; R, ±L; ±R, C; and ±R,L networks. Regions in the Zplane are found within which the impedance function Z(j?) must lie. 相似文献
11.
Eleftheria Athanasopoulou Christoforos N. Hadjicostis 《Journal of Signal Processing Systems》2008,53(3):411-418
This paper obtains lower and upper bounds for the switching activity on the state lines of a finite state machine (FSM) that
is driven by typical input sequences. More specifically, the paper provides bounds on the average Hamming distance which is
in turn proportional to the switching activity and the overall power dissipation in the system. By introducing the concepts
of a distance matrix and a weight matrix, and by exploiting the symmetry of the distance matrix, we are able to obtain bounds
that are provably tighter than existing bounds and, as demonstrated by our experimental results, they can offer significant
improvements in many cases of interest. Since our bounds are independent of the state assignment and the actual implementation,
they can be used at an early stage of the FSM design to indicate the largest/smallest possible power consumption.
Eleftheria Athanasopoulou received the Diploma degree in Electrical and Computer Engineering from the University of Patras in 2000, the M.S. degree in Electrical Engineering from the University of Illinois at Urbana-Champaign in 2002, and the Ph.D. degree in Electrical and Computer Engineering from the University of Illinois at Urbana-Champaign in 2007. She is currently a postdoctoral research associate in the Coordinated Science Laboratory at the University of Illinois at Urbana-Champaign. Her research interests include discrete event systems, monitoring and supervisory control, statistical model classification under noisy observations, hidden Markov models, graphical models, and stochastic processes with applications to failure diagnosis, security, wireless networks, and probabilistic computational biology. Christoforos N. Hadjicostis received S.B. degrees in Electrical Engineering, in Computer Science and Engineering, and in Mathematics, the M.Eng. degree in Electrical Engineering and Computer Science in 1995, and the Ph.D. degree in Electrical Engineering and Computer Science in 1999, all from the Massachusetts Institute of Technology, Cambridge, MA. In August 1999 he joined the Faculty at the University of Illinois at Urbana-Champaign where he is currently an Associate Professor with the Department of Electrical and Computer Engineering and a Research Associate Professor with the Coordinated Science Laboratory. His research interests include systems and control, fault-tolerant combinational and dynamic systems, and fault diagnosis and management in large-scale systems and networks. 相似文献
Christoforos N. Hadjicostis (Corresponding author)Email: |
Eleftheria Athanasopoulou received the Diploma degree in Electrical and Computer Engineering from the University of Patras in 2000, the M.S. degree in Electrical Engineering from the University of Illinois at Urbana-Champaign in 2002, and the Ph.D. degree in Electrical and Computer Engineering from the University of Illinois at Urbana-Champaign in 2007. She is currently a postdoctoral research associate in the Coordinated Science Laboratory at the University of Illinois at Urbana-Champaign. Her research interests include discrete event systems, monitoring and supervisory control, statistical model classification under noisy observations, hidden Markov models, graphical models, and stochastic processes with applications to failure diagnosis, security, wireless networks, and probabilistic computational biology. Christoforos N. Hadjicostis received S.B. degrees in Electrical Engineering, in Computer Science and Engineering, and in Mathematics, the M.Eng. degree in Electrical Engineering and Computer Science in 1995, and the Ph.D. degree in Electrical Engineering and Computer Science in 1999, all from the Massachusetts Institute of Technology, Cambridge, MA. In August 1999 he joined the Faculty at the University of Illinois at Urbana-Champaign where he is currently an Associate Professor with the Department of Electrical and Computer Engineering and a Research Associate Professor with the Coordinated Science Laboratory. His research interests include systems and control, fault-tolerant combinational and dynamic systems, and fault diagnosis and management in large-scale systems and networks. 相似文献
12.
A finite number of users communicating through a broadcast channel is considered. Each user has a buffer of infinite capacity, and a user randomly accesses the channel (ALOHA-type protocol). Moreover, only one packet per user might be sent in an access time. Both symmetric and asymmetric models are considered; that is, we assume either indistinguishable or distinguishable users. An exact analysis of the queue lengths in that type of system is not now available, and therefore, based on some algebraic studies, we shall present some lower and some upper bounds for the average queue lengths. These bounds are quite tight for a small number of users and acceptable for a wide range of input parameters in the symmetric case. In the asymmetric case the bounds are acceptable only for light input traffic and a small number of users. 相似文献
13.
利用基于扫描相机的荧光寿命成像显微技术研究细胞周期 总被引:2,自引:1,他引:1
利用基于扫描相机的荧光寿命成像显微系统,以细胞周期为模型,研究转染绿色荧光蛋白的HeLa细胞的荧光寿命。结果表明,处于周期内不同进程的细胞的荧光寿命为2.50~3.00 ns。处于分裂期的细胞的荧光寿命在1 h内从2.86 ns下降到2.82 ns;在DNA合成前期的8 h内,荧光寿命从2.82 ns下降到2.78 ns。荧光寿命的差异反映了细胞周期中核浆内大分子浓度的变化,对了解细胞周期的分子机制有一定的意义。 相似文献
14.
15.
电子元器件的寿命预测对于制订寿命试验的规划,确定所需的试验时间及试验经费,都有十分重要的指导作用.基于BP神经网络提出了一种电子元器件寿命预测的方法,该方法可对当前样本的未来观测值或未来样本的观测值进行预测.对MOS电容的加速寿命试验数据进行了仿真试验,结果表明该方法可较好地预测MOS电容在相应的应力条件下的失效时间,且精度较高. 相似文献
16.
Macris N. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2007,53(7):2365-2375
We consider communication over binary-input memoryless symmetric channels with low-density parity-check (LDPC) codes. The relationship between maximum a posteriori and belief propagation decoding is investigated using a set of correlation inequalities that first appeared in statistical mechanics of Gaussian spin glasses. We prove bounds on generalized extrinsic information transfer (EXIT) functions, that are believed to be tight, and discuss their relationship with the ones obtained by the interpolation method. 相似文献
17.
A Boolean function b is a hard-core predicate for a one-way function f if b is polynomial-time computable but b(x) is difficult to predict from f(x) . A general family of hard-core predicates is a family of functions containing a hard-core predicate for any one-way function.
A seminal result of Goldreich and Levin asserts that the family of parity functions is a general family of hard-core predicates.
We show that no general family of hard-core predicates can consist of functions with O(n
1-ε
) average sensitivity, for any ε > 0 . As a result, such families cannot consist of
• functions in AC
0
,
• monotone functions,
• functions computed by generalized threshold gates, or
• symmetric d -threshold functions, for d = O(n
1/2 - ε
) and ε > 0 .
Received April 2000 and revised September 2000 Online publication 9 April 2001 相似文献
18.
This paper presents criteria for acceptable schemes to approximate system reliability and Investigates such schemes for a special clas of network reliability problems. In this framework, we are able to use powerful combinatorial theory to obtain strong bounds for network reliability which can be computed by efficient algorithms. We demonstrate these bounds on a small example, and give some computational experience. 相似文献
19.
Bounds on partial correlations of sequences 总被引:2,自引:0,他引:2
Paterson K.G. Lothian P.J.G. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1998,44(3):1164-1175
Two approaches to bounding the partial auto- and crosscorrelations of binary sequences are considered. The first approach uses the discrete Fourier transform and bounds for character sums to obtain bounds on partial autocorrelations of m-sequences and on the partial auto- and crosscorrelations for the small Kasami sets and dual-BCH families of sequences. The second approach applies to binary sequences obtained by interleaving m-sequences. A bound on the peak partial correlation of such sequences is derived in terms of the peak partial autocorrelation of the underlying m-sequences. The bound is applied to GMW, No (1987), and other families of sequences for particular parameters. A comparison of the two approaches shows that the elementary method gives generally weaker results but is more widely applicable. On the other hand, both methods show that well-known sequence families can have favorable partial correlation characteristics, making them useful in certain spread-spectrum applications 相似文献
20.
Bounds on the minimum support weights 总被引:6,自引:0,他引:6
Helleseth T. Klove T. Levenshtein V.I. Ytrehus O. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1995,41(2):432-440
The minimum support weight, dr(C), of a linear code C over GF(q) is the minimal size of the support of an r-dimensional subcode of C. A number of bounds on dr(C) are derived, generalizing the Plotkin bound and the Griesmer bound, as well as giving two new existential bounds. As the main result, it is shown that there exist codes of any given rate R whose ratio dr/d1 is lower bounded by a number ranging from (qr-1)/(qr -qr-1) to r, depending on R 相似文献