首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Some fundamental contributions to the theory and applicability of optimal bounding ellipsoid (OBE) algorithms for signal processing are described. All reported OBE algorithms are placed in a general framework that demonstrates the relationship between the set-membership principles and least square error identification. Within this framework, flexible measures for adding explicit adaptation capability are formulated and demonstrated through simulation. Computational complexity analysis of OBE algorithms reveals that they are of O(m2) complexity per data sample with m the number of parameters identified. Two very different approaches are described for rendering a specific OBE algorithm, the set-membership weighted recursive least squares algorithm, of O(m) complexity. The first approach involves an algorithmic solution in which a suboptimal test for innovation is employed. The performance is demonstrated through simulation. The second method is an architectural approach in which complexity is reduced through parallel competition  相似文献   

2.
The time complexities of previously published algorithms for circular consecutive-k-out-of-n:F systems are O (nk2) and O(nk). The authors propose a method to improve the original O(nk2 ) algorithm, and hence derive an O(nk) algorithm  相似文献   

3.
An O(k×n) algorithm is described for evaluating the reliability of a circular consecutive-k-out- n:F system  相似文献   

4.
J.G. Shanthikumar (IEEE Trans. Reliability, vol.R-36, p.546-50, Dec. 1987) proposed a new system structure called the consecutively connected system, which is a generalization of the well-studied consecutive-k-out-of-n:F system. An O(n 2) algorithm was developed for its reliability evaluation. This work studies the structure of the consecutively connected system and provides more efficient algorithms for its reliability evaluation. The complexities of the algorithms are of order O(kn) for linear systems and O(k3n) for circular systems (k <n). The concepts of transmitting capability and receiving capability are introduced  相似文献   

5.
Optimum energy extraction from an electron-beam-pumped XeF(C A) laser is achieved with a five-component rare gas halide mixture. The characterization and modeling of laser action in such a gas mixture requires a knowledge of small-signal gain and absorption coefficients not only on the blue-green XeF(CA) transition, but also in the ultraviolet (UV) region for the competing XeF(BX) and KrF(BX ) transitions. The authors report gain measurements on the XeF(CA) transition and small-signal gain and absorption coefficients at or near both the XeF(BX ) (351 and 353 nm) and KrF(BX) (248 nm) transitions. A study of the gain for the UV and visible transitions as a function of Kr and Xe partial pressure is reported, and its impact on the XeF(CA) kinetics is discussed  相似文献   

6.
Two recursive T-matrix algorithms are presented and their reduced computational complexities and reduced memory requirements are demonstrated. These algorithms are applied to the problem of electromagnetic scattering from conducting strips and patches with canonical geometries. The geometries are reminiscent of finite-sized frequency selective surfaces. Computational complexities of O( N2) and O(N7/3) and memory requirements of O(N) and O(N 4/3) are shown to be feasible for two-dimensional and three-dimensional geometries, respectively. The formulation uses only two components of the electric field. Therefore, the vector electromagnetic problem of scattering from three-dimensional patch geometries can be solved using scalar addition theorems for spherical harmonic wave functions. For a two-dimensional strip problem, both TM and TE polarizations can be solved simultaneously using this formulation. Numerical scattering results in the form of radar cross sections (RCS) are validated by comparison with the method of moments  相似文献   

7.
A nonsorting structure for implementing the (M, L) algorithm is presented. The processing is based on a survivor selection operation that incorporates parallelism and has an execution time proportional to the product of the logarithm of bM (the number of contender paths), and k (the number of bits used for path metrics). Aside from the path extender(s), the processor area is only a small fraction of the total chip area; most is simply for required storage of path histories and metrics. This means that the structure can support a large M on a single chip. In addition, the structure can be extended to larger M by stacking rows of a few different types of custom chips  相似文献   

8.
It is shown that m-sequences over GF(qm ) of length qnm-1 corresponding to primitive polynomials in GF[qm,x] of degree n can be generated from known m-sequences over GF(q) of length qnm-1 obtained from primitive polynomials in GF[q,x] of degree mn. A procedure for generating the m-sequences over GF(q2) from m-sequences over GF(q) was given which enables the generation of m-sequences over GF( p2n). In addition it was shown that all of the primitive polynomials in GF[q,m,x] can be obtained from a complete set of the primitive polynomials in GF[q ,x]  相似文献   

9.
Itoh  T. Tsujii  S. 《Electronics letters》1988,24(6):334-335
Presents an effective recursive algorithm for computing multiplicative inverses in GF(2m), where m=2k, employing normal bases. The proposed algorithm requires m-1 cyclic shifts and two multiplications in GF (2m) and in each subfield of GF(2m): GF(2m/2), GF(2m/4),. . ., GF (28) and GF(24)  相似文献   

10.
An algorithm for computing the reliability of k-out-of- n systems is proposed. It is simple, easy to implement on a computer, time and memory efficient, and good for numerical computation. The memory complexity is O(n-k), and for a given value of n-k the computation time is proportional to n . Its FORTRAN implementation is presented  相似文献   

11.
A simple technique employing linear block codes to construct (d,k) error-correcting block codes is considered. This scheme allows asymptotically reliable transmission at rate R over a BSC channel with capacity CBSC provided R Cd,k-(1+CBSC), where Cd,k is the maximum entropy of a (d,k ) source. For the same error-correcting capability, the loss in code rate incurred by a multiple-error correcting (d,k) code resulting from this scheme is no greater than that incurred by the parent linear block code. The single-error correcting code is asymptotically optimal. A modification allows the correction of single bit-shaft errors as well. Decoding can be accomplished using off-the-shelf decoders. A systematic (but suboptimal) encoding scheme and detailed case studies are provided  相似文献   

12.
Accelerated life tests with high-temperature storage and electric aging for n+-p-n silicon planar transistors were carried out. Current gain hFE increases monotonously with time during the tests, and the hFE drift is correlated with initial measured 1/f noise in the transistors, i.e. the drift amount significantly increases with the increase of noise level. The correlation coefficient of relative drift ΔhFE /hFE and 1/f noise spectral density SiB(f) is far larger than that of Δ hFE/hFE and initial DC parameters of the transistors. A quantitative theory model for the h FE drift has been developed and explains the h FE drift behavior in the tests, which suggests that the h FE drift and 1/f noise can be attributed to the same physical origin, and both are caused by the modulation of the oxide traps near the Si-SiO2 interface to Si surface recombination. 1/f noise measurement, therefore, may be used as a fast and nondestructive means to predict the long-term instability in bipolar transistors  相似文献   

13.
Approximate confidence bounds for reliability, R=Pr{X >Y|X,Y}, are obtained, where X and Y are independent normal (Gaussian) random variables, and X and Y are vectors of measurements for X and Y, respectively. Balanced 1-way ANOVA (analysis of variants) random effect models are assumed for the populations of X and Y. Confidence bounds are derived for R under three cases for standard deviations, σx and σy. An example shows how the results are used  相似文献   

14.
The general concept of closest coset decoding (CCD) is presented, and a soft-decoding technique for block codes that is based on partitioning a code into a subcode and its cosets is described. The computational complexity of the CCD algorithm is significantly less than that required if a maximum-likelihood detector (MLD) is used. A set-partitioning procedure and details of the CCD algorithm for soft decoding of |u|u+v| codes are presented. Upper bounds on the bit-error-rate (BER) performance of the proposed algorithm are combined, and numerical results and computer simulation tests for the BER performance of second-order Reed-Muller codes of length 16 and 32 are presented. The algorithm is a suboptimum decoding scheme and, in the range of signal-to-noise-power-density ratios of interest, its BER performance is only a few tenths of a dB inferior to the performance of the MLD for the codes examined  相似文献   

15.
Upper and lower bounds for the reliability of a (linear or circular) consecutive k-within-m-out-of-n:F system with unequal component-failure probabilities are provided. Numerical calculations indicate that, for systems with components of good enough reliability, these bounds quite adequately estimate system reliability. The estimate is easy to calculate, having computational complexity O(m2×n). For identically distributed components, a Weibull limit theorem for system time-to-failure is proved  相似文献   

16.
A technique for the measurement of device derivatives d NV/dIN of arbitrary order N described. Measurement is accomplished by injecting a test current composed of the sum of N square waves into the rest device, and then multiplying the corresponding voltage change by the product of those same square waves, followed by low-pass filtering. The algorithm is implemented in real time using a mixture of analog and digital circuitry, and its application to semiconductor laser control in high-speed optical communications is described  相似文献   

17.
The effect of nonnormality on E{X} and R charts is reported. The effect of departure from normality can be examined by comparing the probabilities that E{X} and R lie outside their three-standard-deviation and two-standard-deviation control limits. Tukey's λ-family of symmetric distributions is used because it contains a wide spectrum of distributions with a variety of tail areas. The constants required to construct E{X} and R charts for the λ-family are computed. Control charts based on the assumption of normality give inaccurate results when the tails of the underlying distribution are thin or thick. The validity of the normality assumption is examined by using a numerical example  相似文献   

18.
The concept of a (k, t)-subnormal covering code is defined. It is discussed how an amalgamated-direct-sumlike construction can be used to combine such codes. The existence of optimal (q, n, M) 1 codes C is discussed such that by puncturing the first coordinate of C one obtains a code with (q, 1)-subnorm 2  相似文献   

19.
20.
Depressed-cladding single-mode fibers with a first cladding-to-core ratio (b/a) ranging from seven to one and relative refractive-index differences of the core from 0.25 to 0.35% and of the cladding from 0 to -0.2% are investigated experimentally with respect to the LP11 mode cutoff properties, the mode-field diameter, the dispersion, and the bending attenuation. Numerical calculations based on actual profile parameters of the bend loss and the mode-field diameter agree well with experiment. It is demonstrated that low attenuation and bend losses independent of b/a can be obtained if the cutoff wavelength is kept constant by adjusting the core radius, the core index or the index of the first cladding  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号