首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
For each N, and each fixed time T, a signal XN and a `noisy' observation YN are defined by a pair of stochastic difference equations. Under certain conditions (XN, YN) converges in distribution to (X, Y, where dX(t)= f(t, X(t))dt+dV( t), dY(t)=g(t, X( t))dt+dW(t). Conditions are found under which convergence in distribution of the conditional expectations E{F(XN)|YN} to E{F(X)|Y} follows, for every bounded continuous function F. The case in which the conditional expectations still converge but the limit is not E{ F(X)|Y} is also studied. In the situation where f and g are linear functions of X, an examination of this limit leads to a Kalman-Bucy-type estimate of X N which is asymptotically optimal and is an improvement on the usual Kalman-Bucy estimate  相似文献   

2.
It is shown how the Zak transform can be used to find nontrivial examples of functions f, gL2(R) with f×g≡0≡F×G, where F, G are the Fourier transforms of f, g, respectively. This is then used to exhibit a nontrivial pair of functions h, k∈L2(R), hk, such that |h|=|k|, |H |=|K|. A similar construction is used to find an abundance of nontrivial pairs of functions h, k∈L2 (R), hk, with |Ah |=|Ak| or with |Wh|=|W k| where Ah, Ak and Wh, Wk are the ambiguity functions and Wigner distributions of h, k, respectively. One of the examples of a pair of h, kL2(R), hk , with |Ah|=|Ak| is F.A. Grunbaum's (1981) example. In addition, nontrivial examples of functions g and signals f1f2 such that f1 and f2 have the same spectrogram when using g as window have been found  相似文献   

3.
For n>0, d⩾0, nd (mod 2), let K(n, d) denote the minimal cardinality of a family V of ±1 vectors of dimension n, such that for any ±1 vector w of dimension n there is a vV such that |v- w|⩽d, where v-w is the usual scalar product of v and w. A generalization of a simple construction due to D.E. Knuth (1986) shows that K(n , d)⩽[n/(d+1)]. A linear algebra proof is given here that this construction is optimal, so that K(n, d)-[n/(d+1)] for all nd (mod 2). This construction and its extensions have applications to communication theory, especially to the construction of signal sets for optical data links  相似文献   

4.
Expressions are obtained for specifying the optimal error probability (minimum Pe) thresholds λ01 and λ02 for the traditional and modified sign detectors, respectively. These thresholds are shown to depend on the parameters p, P1, and M where: M is the number of observations zi used in the test statistic; P1=P(H1 ) is the prior probability for hypothesis H1 that signal s1 is present and 1-P1 =P(H0) corresponds to the hypothesis H0 that signal s0 is present; and p=Pr{zi⩾0|H1} with s0=0 for the traditional sign detector and p=Pr{zi⩾λ|H1 }=Pr{zi<λ|H0} with λ =(s0+s1)/2 for the modified sign detector. The expressions for λ01 and λ02, are given explicitly, and shown to be independent of P1 for sufficiently large M. Optimal Pe versus M performance curves, corresponding to both versions of the sign detector, are obtained for a representative range of values for p and P1  相似文献   

5.
The author evaluates the limiting efficiencies e(-S ) of burst-correcting array codes A(n1,n2, -s) for all negative readouts -s as n2 tends to infinity and n1 is properly chosen to maximize the efficiency. Specializing the result to the products of the first i primes donated by si (1⩽i<∞), which are optimal choices for readouts, gives the expression e(-si)=(2pi+1 -2)/(2pi+1-1) where pi+1 is the next prime. Previously, it was known only that e(-2)⩾4/5 and e(-1)⩾2/3. This result reveals the existence of burst-correcting array codes with efficiencies arbitrarily close to 1 and with rates also arbitrarily close to 1  相似文献   

6.
Accelerated life tests with high-temperature storage and electric aging for n+-p-n silicon planar transistors were carried out. Current gain hFE increases monotonously with time during the tests, and the hFE drift is correlated with initial measured 1/f noise in the transistors, i.e. the drift amount significantly increases with the increase of noise level. The correlation coefficient of relative drift ΔhFE /hFE and 1/f noise spectral density SiB(f) is far larger than that of Δ hFE/hFE and initial DC parameters of the transistors. A quantitative theory model for the h FE drift has been developed and explains the h FE drift behavior in the tests, which suggests that the h FE drift and 1/f noise can be attributed to the same physical origin, and both are caused by the modulation of the oxide traps near the Si-SiO2 interface to Si surface recombination. 1/f noise measurement, therefore, may be used as a fast and nondestructive means to predict the long-term instability in bipolar transistors  相似文献   

7.
On the Hamming distance properties of group codes   总被引:1,自引:0,他引:1  
Under certain mild conditions, the minimum Hamming distance D of an (N, K, D) group code C over a non-abelian group G is bounded by DN -2K+2 if KN/2, and is equal to 1 if K>N/2. Consequently, there exists no (N, K, N-K+1) group code C over an non-abelian group G if 1<K<N. Moreover, any normal code C with a non-abelian output space has minimum Hamming distance equal to D=1. These results follow from the fact that non-abelian groups have nontrivial commutator subgroups. Finally, if C is an (N, K, D) group code over an abelian group G that is not elementary abelian, then there exists an (N, K, D) group code over a smaller elementary abelian group G'. Thus, a group code over a general group G cannot have better parameters than a conventional linear code over a field of the same size as G  相似文献   

8.
Energy transfer from selectively formed metastable states of SiO is used to pump sodium-atom laser amplifiers at λ≈569 nm (4d2D-3p2P), λ≈616 nm (5s2S-3p2 P), and λ≈819 nm (3d2D -3p2P). The a3Σ+ and b3Π states of SiO are generated in high yield from the Si+N2O→SiO+N2 reaction. The energy stored in the triplet states is transferred in a highly efficient collisional process to pump sodium atoms to their lowest excited 3d2 D, 4d2D, and 5s2S states. Adopting a sequence in which high concentrations of silicon and sodium atoms are mixed and oxidized, a continuous amplification (gain condition) is monitored which suggests the creation of a population inversion among the receptor sodium-atom energy levels and forms the basis for full cavity oscillation on the Na4 d2D-3p2P transition at 569 nm  相似文献   

9.
A method is presented for calculating the binomial SF (cumulative binomial distribution), binfc(k;p,n), especially for a large n, beyond the range of existing tables, where conventional computer programs fail because of underflow and overflow, and Gaussian or Poisson approximations yield insufficient accuracy for the purpose at hand. This method is used to calculate and sum the individual binomial terms while using multiplication factors to avoid underflow; the factors are then divided out of the partial sum whenever it has the potential to overflow. A computer program uses this technique to calculate the binomial SF for arbitrary inputs of k, p, and n. Two other algorithms are presented to determine the value of p needed to yield a specified SF for given values of k and n and calculate the value where p=SF for a given k and n. Reliability applications of each algorithm/program are given, e.g. the value of p needed to achieve a stated k-out-of-n :G system reliability and the value of p for which k -out-of-n:G system reliability equals p  相似文献   

10.
The author presents a simple time-domain model which makes it possible to predict the order of magnitude of the highest di/ dt values generated by closing switches in electrical power systems. The model is based on traveling-wave analysis. It is demonstrated that two different approaches must be applied, according to whether (a) the closing time, Ts, of the switch is faster than twice the traveling time to the first reflection point or (b) Ts is much slower. Under condition (b) the well-known quasistationary approach di/dtmax=U0/L can be used, where U0 is the switched voltage and L is the self-inductance of the line between the stray capacitances located to the left and the right of the switching device. Under condition (a) a new formula must be applied: di/dt max≈2 U0/ZTs, where Z is the line impedance of the line in which the switching device is installed and Ts is the time during which the voltage across the switch collapses from U0 to zero. Experimental results are given from both fast and slow closing switches  相似文献   

11.
The asymptotic (M→∞) probability of symbol error Pe,m for M-ary orthogonal modulation in a Nakagami-m fading channel is given by the incomplete gamma function P(m, mx) where x=In 2/(Eb/N0) and Eb is the average energy per bit. For large signal-to-noise ratio this leads to a channel where the probability of symbol error varies as the inverse mth power of Eb/N0. These channels exist for all m⩾1/2. The special case of m=1 corresponds to Rayleigh fading, an inverse linear channel  相似文献   

12.
Let X be a discrete random variable drawn according to a probability mass function p(x), and suppose p(x), is dyadic, i.e., log(1/p(x)) is an integer for each x. It is shown that the binary code length assignment l(x)=log(1/p(x)) dominates any other uniquely decodable assignment l'(x) in expected length in the sense that El(X)<El'(X), indicating optimality in long run performance (which is well known), and competitively dominates l'(x), in the sense that Pr{ l (X)<l'(X)}>Pr{l ( X)>l'(X)}, which indicates l is also optimal in the short run. In general, if p is not dyadic then l=[log 1/p] dominates l'+1 in expected length and competitivity dominates l'+1, where l' is any other uniquely decodable code  相似文献   

13.
A number system is developed for the conversion of natural numbers to the codewords of the Gray code G(n,k) of length n and weight k, and vice versa. The focus is on the subcode G(n,k) of G(n) consisting of those words of G(n) with precisely k 1-bits, 0<k<n. This code is called the constant weight Gray code of length n and weight k. As an application sharp lower and upper bounds are derived for the value of |i-j|, where i and j are indices of codewords gi and gj of G(n,k) such that they differ in precisely 2 m bits  相似文献   

14.
Error-correcting codes for list decoding   总被引:2,自引:0,他引:2  
In the list-of-L decoding of a block code the receiver of a noisy sequence lists L possible transmitted messages, and is in error only if the correct message is not on the list. Consideration is given to (n,e,L) codes, which correct all sets of e or fewer errors in a block of n bits under list-of-L decoding. New geometric relations between the number of errors corrected under list-of-1 decoding and the (larger) number corrected under list-of-L decoding of the same code lead to new lower bounds on the maximum rate of (n,e,L) codes. They show that a jammer who can change a fixed fraction p<1/2 of the bits in an n-bit linear block code cannot prevent reliable communication at a positive rate using list-of- L decoding for sufficiently large n and an Ln. The new bounds are stronger for small n , but weaker for fixed e/n in the limit of large n and L than known random coding bounds  相似文献   

15.
The application of a combined test-error-correcting procedure is studied to improve the mean time to failure (MTTF) for degrading memory systems with defects. The degradation is characterized by the probability p that within a unit of time a memory cell changes from the operational state to the permanent defect state. Bounds are given on the MTTF and it is shown that, for memories with N words of k information bits, coding gives an improvement in MTTF proportional to (k/n) N(dmin-2)/(dmin -1), where dmin and (k/n) are the minimum distance and the efficiency of the code used, respectively. Thus the time gain for a simple minimum-distance-3 is proportional to N-1. A memory word test is combined with a simple defect-matching code. This yields reliable operation with one defect in a word of length k+2 at a code efficiency k/(k+2)  相似文献   

16.
Secret key agreement by public discussion from common information   总被引:15,自引:0,他引:15  
The problem of generating a shared secret key S by two parties knowing dependent random variables X and Y, respectively, but not sharing a secret key initially, is considered. An enemy who knows the random variable Z, jointly distributed with X and Y according to some probability distribution PXYZ, can also receive all messages exchanged by the two parties over a public channel. The goal of a protocol is that the enemy obtains at most a negligible amount of information about S. Upper bounds on H(S) as a function of PXYZ are presented. Lower bounds on the rate H (S)/N (as N→∞) are derived for the case in which X=[X1, . . ., X N], Y=[Y1, . . ., YN] and Z=[Z1, . . ., ZN] result from N independent executions of a random experiment generating Xi, Yi and Zi for i=1, . . ., N. It is shown that such a secret key agreement is possible for a scenario in which all three parties receive the output of a binary symmetric source over independent binary symmetric channels, even when the enemy's channel is superior to the other two channels  相似文献   

17.
18.
A modified Hebbian rule using the matrix G=sgn(X TX) to induce a certain mapping is discussed. This mapping g is specified as soon as one has chosen the m×n matrix X over U to construct G by use of the above expression. The analysis of g relies on simple counting arguments and on the use of Stirling's approximation to obtain asymptotic results  相似文献   

19.
The vector potential and elastic field generated by the current in a center-driven or parasitic dipole antenna that extends from z=-h to z=h are investigated for each of the several components of the current. These include sin k (h-|z|), sin k|z|-sin kh , cos kz-cos kh, and cos kz/2-cos kh /2. Of special interest are the interactions among the variously spaced elements in parallel, nonstaggered arrays. These depend on the mutual vector potentials. It is shown that at a radial distance ρ~ h and in the range -hzh, the vector potentials due to all four components become alike and have an approximately plane-wave form. Simple approximate formulas for the electric fields and vector potentials generated by each of the four distributions are derived and compared with the exact results. The application of the new formulas to large arrays is discussed  相似文献   

20.
Let {wij} be the weights of the connections of a neural network with n nodes, calculated from m data vectors v1, ···, vm in {1,-1}n, according to the Hebb rule. The author proves that if m is not too large relative to n and the vk are random, then the wij constitute, with high probability, a perfect representation of the vk in the sense that the v k are completely determined by the wij up to their sign. The conditions under which this is established turn out to be less restrictive than those under which it has been shown that the vk can actually be recovered by letting the network evolve until equilibrium is attained. In the specific case where the entries of the vk are independent and equal to 1 or -1 with probability 1/2, the condition on m is that m should not exceed n/0.7 log n  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号