首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Time-hopping patterns can be constructed from simple difference sets. By studying such constructions, it has been proven that whenever n-2, n-1, or n+1 is a prime power, then time-hopping patterns that have n terms can be constructed and are of length less than n2. By computation it is shown that such patterns can have length less than n2-n1.44 for all n⩽150. It is also shown that time-hopping patterns for n terms can have length less than n2+O(n1.55) for all n  相似文献   

2.
Fast decoding of codes from algebraic plane curves   总被引:2,自引:0,他引:2  
Improvement to an earlier decoding algorithm for codes from algebraic geometry is presented. For codes from an arbitrary regular plane curve the authors correct up to d*/2-m2 /8+m/4-9/8 errors, where d* is the designed distance of the code and m is the degree of the curve. The complexity of finding the error locator is O(n7/3 ), where n is the length of the code. For codes from Hermitian curves the complexity of finding the error values, given the error locator, is O(n2), and the same complexity can be obtained in the general case if only d*/2-m2/2 errors are corrected  相似文献   

3.
A system with n components in sequence is a consecutive- k-out-of-n:F system if it fails whenever k consecutive components are failed. Under the supposition that component failures need not be independent and that component failure probabilities need not be equal, a topological formula is presented for the exact system reliability of linear and circular consecutive-k -out-of-n:F networks. The number of terms in the reliability formula is O(n4) in the linear case and O(n5) in the circular case  相似文献   

4.
The time complexities of previously published algorithms for circular consecutive-k-out-of-n:F systems are O (nk2) and O(nk). The authors propose a method to improve the original O(nk2 ) algorithm, and hence derive an O(nk) algorithm  相似文献   

5.
J.G. Shanthikumar (IEEE Trans. Reliability, vol.R-36, p.546-50, Dec. 1987) proposed a new system structure called the consecutively connected system, which is a generalization of the well-studied consecutive-k-out-of-n:F system. An O(n 2) algorithm was developed for its reliability evaluation. This work studies the structure of the consecutively connected system and provides more efficient algorithms for its reliability evaluation. The complexities of the algorithms are of order O(kn) for linear systems and O(k3n) for circular systems (k <n). The concepts of transmitting capability and receiving capability are introduced  相似文献   

6.
G. Shanthikumar (ibid., vol.R-36, p.546-550, Dec. 1987) has proposed a system called the consecutively connected system, which is a generalization of the consecutive-k-out-of-n:F system. He gave an O(n2) algorithm for computing the reliability of the consecutively connected system. In the present work, the authors further generalize it by assuming that the components are multistate. They give an O(Kn) algorithm for computing the reliability of the multistate system where K(K<n) is the maximum number of states for a component. They discuss the difficulties of obtaining corresponding algorithms for circular systems and two-way communication, although for two-state components they are able to extend the Shanthikumar algorithm to circular systems  相似文献   

7.
A generalized recursive algorithm valid for both the E z and Hz wave scattering of densely packed scatterers in two dimensions is derived. This is unlike previously derived recursive algorithms which have been found to be valid only for Ez polarized waves. In this generalized recursive algorithm, a scatterer is first divided into N subscatterers. The n-subscatterer solution is then used to solve the (n+n')-subscatterer solution. The computational complexity of such an algorithm is found to be of O (N2) in two dimensions while providing a solution valid for all angles of incidence. This is better than the method of moments with Gaussian elimination, which has an O(N3) complexity  相似文献   

8.
A recursive algorithm for calculating the exact solution of a random assortment of spheres is described. In this algorithm, the scattering from a single sphere is expressed in a one-sphere T matrix. The scattering from two spheres is expressed in terms of two-sphere T matrices, which are related to the one-sphere T matrix. A recursive algorithm to deduce the (n+1)-sphere T matrix from the n-sphere T matrix is derived. With this recursive algorithm, the multiple scattering from a random assortment of N spheres can be obtained. This results in an N2 algorithm rather than the normal N3 algorithm. As an example, the algorithm is used to calculate the low-frequency effective permittivity of a random assortment of 18 dielectric spheres. The effective permittivity deviates from the Maxwell-Garnett result for high contrast and high packing fraction. With a high packing fraction, dielectric enhancement at low frequency is possible  相似文献   

9.
The fast multipole method (FMM) developed by V. Rokhlin (1990) to efficiently solve acoustic scattering problems is modified and adapted to the second-kind-integral-equation formulation of electromagnetic scattering problems in two dimensions. The present implementation treats the exterior Dirichlet problem for two-dimensional, closed, conducting objects of arbitrary geometry. The FMM reduces the operation count for solving the second-kind integral equation from O(n3) for Gaussian elimination to O(n4/3) per conjugate-gradient iteration, where n is the number of sample points on the boundary of the scatterer. A sample technique for accelerating convergence of the iterative method, termed complexifying k, the wavenumber, is also presented. This has the effect of bounding the condition number of the discrete system; consequently, the operation count of the entire FMM (all iterations) becomes O(n4/3). Computational results for moderate values of ka, where a is the characteristic size of the scatterer, are given  相似文献   

10.
An efficient implementation of auxiliary constraints for a concurrent-block least-squares adaptive side-lobe canceler is described. A QR decomposition of the auxiliary data matrix is computed, and this information is sent to one or more main beam processors, where the constraints are applied using blocking matrices and the individual residuals are computed. Structured blocking matrices are used to derive a fast algorithm and architecture for constrained main beam processing. This approach reduces the operation count of this phase of the processing from O(n3) to O(n 2), where n is the number of auxiliary sensors  相似文献   

11.
A mathematical model is developed for the reliability of a system made up of m unreliable nodes arranged in a ring. The model can be used to calculate the reliability of single-ring networks in which the network recovery mechanism depends on bypassing failed stations, but link signal power margins are inadequate to overcome losses due to more than n bypass switches in series. Computational complexity is 0(n2m+nm2/2) in time, and 0(m2/2) in memory requirements  相似文献   

12.
The noise current spectral density in n+-n -n+ GaAs diodes is computed by the Monte Carlo particle technique employing a three-valley model. The normalised spectral density is found to decrease with field for a short sample length  相似文献   

13.
A conjecture is proven on the number of points on shells for the shifted Z4 and the shifted Z8 lattices. Furthermore, the results are extended to any shifted Z4n lattice (n=0, 1, . . .). These results provide an easy way to compute the number of points on shells for the type of lattices used in the design of multidimensional signal sets or in vector coding  相似文献   

14.
The authors study a discrete-time, infinite-horizon, dynamic programming model for the replacement of components in a binary k -out-of-n:F system. The goal is to trade off the component replacement and system failure costs. Under the criterion of minimizing the long-run average cost per period, it is optimal to follow a critical component policy (CCP), viz., a policy specified by a critical component set and the rule: replace a component if and only if it is failed and is in the critical component set. Computing an optimal CCP is a binary nonlinear programming problem, which can be solved by searching through a set with O(nk-1) points. This approach to finding an optimal CCP is practical when k is small. In particular, assuming s-independent components, it requires O(n2k-1) calculations. The authors analyze in detail the two most important cases with small k: the series (1-out-of-n:F) system and the 2-out-of-n:F system  相似文献   

15.
The authors have recently shown that specific and stable n or p doping may be obtained on poly(paraphenylene), providing moderate implantation conditions with appropriate ions are used. Here they describe a pn+-junction made in intrinsic insulating poly(paraphenylene) (α<10-12 Ω-1 cm-1) by implantation (E≃50 keV) of alkali metal ions (essentially caesium for n doping) and halogen (iodine for p doping)  相似文献   

16.
Petkov  N. 《Electronics letters》1988,24(13):781-782
New 1-slow and 2-slow systolic arrays for row-to-diagonal and diagonal-to-row input/output format conversion of matrices are given. For n×n matrices, the arrays consist of n 2 cells. A 1-slow systolic array performs the conversion in 2n-1 periods. The arrays can be used also for column-to-diagonal, diagonal-to-column, row-to-column and column-to-row input/output format conversions. The 1-slow array performs these operations in 2 n-1, 2 n-1, and 3 n-1 periods, respectively  相似文献   

17.
On updating signal subspaces   总被引:1,自引:0,他引:1  
The authors develop an algorithm for adaptively estimating the noise subspace of a data matrix, as is required in signal processing applications employing the `signal subspace' approach. The noise subspace is estimated using a rank-revealing QR factorization instead of the more expensive singular value or eigenvalue decompositions. Using incremental condition estimation to monitor the smallest singular values of triangular matrices, the authors can update the rank-revealing triangular factorization inexpensively when new rows are added and old rows are deleted. Experiments demonstrate that the new approach usually requires O(n2) work to update an n×n matrix, and that it accurately tracks the noise subspace  相似文献   

18.
A testable design of dynamic random-access memory (DRAM) architecture which allows one to access multiple cells in a word line simultaneously is presented. The technique utilizes the two-dimensional (2-D) organization of the DRAM and the resulting speedup of the conventional algorithm is considerable. The failure mechanism in the three-dimensional (3-D) DRAM with trench-type capacitor is specifically investigated. As opposed to the earlier approaches for testing parametric faults that used sliding diagonal-type tests with O(n3/2) complexity, the algorithms discussed here are different and have O(√n/p) complexity, where p is the number of subarrays within the DRAM chip. These algorithms can be applied externally from the chip and also they can be easily generated for built-in self-test applications  相似文献   

19.
Let {wij} be the weights of the connections of a neural network with n nodes, calculated from m data vectors v1, ···, vm in {1,-1}n, according to the Hebb rule. The author proves that if m is not too large relative to n and the vk are random, then the wij constitute, with high probability, a perfect representation of the vk in the sense that the v k are completely determined by the wij up to their sign. The conditions under which this is established turn out to be less restrictive than those under which it has been shown that the vk can actually be recovered by letting the network evolve until equilibrium is attained. In the specific case where the entries of the vk are independent and equal to 1 or -1 with probability 1/2, the condition on m is that m should not exceed n/0.7 log n  相似文献   

20.
The Fourier transform over finite fields is mainly required in the encoding and decoding of Reed-Solomon and BCH codes. An algorithm for computing the Fourier transform over any finite field GF(pm) is introduced. It requires only O(n(log n)2/4) additions and the same number of multiplications for an n-point transform and allows in some fields a further reduction of the number of multiplications to O(n log n). Because of its highly regular structure, this algorithm can be easily implementation by VLSI technology  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号