The Golden Ratio and Signal Quantization

Size: px
Start display at page:

Download "The Golden Ratio and Signal Quantization"

Transcription

1 The Golden Ratio and Signal Quantization Tom Hejda, based on the work of Ingrid Daubechies et al. Doppler Institute & Department of Mathematics, FNSPE, Czech Technical University in Prague Combinatorics on Words, Frysava 2011 Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 1 / 13

2 Abstract Optický nebo zvukový signál je obecn funkce z podmnoºiny R n do R. V p ípad fotograe je deni ní obor celá plocha scény a obor hodnot je jas v daném míst (pro ernobílý obrázek). V p ípad zvukového signálu je deni ní obor as a obor hodnot je amplituda. Pokud chceme signál p evést na digitální data, nutn musíme ztratit n jakou informaci, nebo kone ný objem dat pojme pouze kone né mnoºství hodnot. Omezení deni ního oboru se provádí tzv. samplováním, kdy se vezmou data pouze z kone ného po tu bod, obvykle z m íºky. Omezení oboru hodnot se provádí tzv. kvantizací, kdy z hodnoty nap tí x na výstupu m ícího p ístroje vygenerujeme kone nou posloupnost bit (nul a jedni ek), která p edepsaným zp sobem reprezentuje danou hodnotu nap tí. Práv kvantizací se zabývá tento p ísp vek. B ºn se pouºívá binární kvantizace, kdy se postupn tou jednotlivé bity binárního rozvoje x. Problém v²ak je, ºe jeden chybn p e tený bit nutn znamená chybný výsledek. Toto se pokusíme odstranit pouºítím soustavy o základu zlatý ez τ 1.618, který e²í rovnici τ 2 = τ + 1. S úsp chem vyuºijeme n kolika jeho vlastností: zmín ná rovnice má koecienty pouze 0 a ±1; platí 1 < τ < 2; soustava o základu τ je redundantní ( ísla mají více vyjád ení). Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 2 / 13

3 Motivation Signal: function f : (R n ) (R) Sampling: restriction f : ˆM n (R), where M N Quantization: restriction f : ˆM n nite set Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 3 / 13

4 Motivation Signal: function f : (R n ) (R) Sampling: restriction f : ˆM n (R), where M N Quantization: restriction f : ˆM n nite set Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 3 / 13

5 Motivation Signal: function f : (R n ) (R) Sampling: restriction f : ˆM n (R), where M N Quantization: restriction f : ˆM n nite set Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 3 / 13

6 Encoder Denition A/D Encoder is a device that takes a signal (voltage) and gives its (some) representation. Theory: Encoder : R + A N Reality: Encoder : X = interval A N Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 4 / 13

7 Encoder Denition A/D Encoder is a device that takes a signal (voltage) and gives its (some) representation. Theory: Encoder : R + A N Reality: Encoder : X = interval A N Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 4 / 13

8 Encoder Denition A/D Encoder is a device that takes a signal (voltage) and gives its (some) representation. Theory: Encoder : R + A N Reality: Encoder : X = interval A N Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 4 / 13

9 Technology q τ (u) := { 1 u τ 0 u < τ Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 5 / 13

10 Technology q τ (u) := { 1 u τ 0 u τ Reality: no this component is accurate Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 5 / 13

11 Common Encoders Binary encoder x = lim N b n 2 n N n=0 + Exponential accuracy, error = O ( 2 N) Not robust (with respect to parameters) Recursive process: x X = [0, 2); u 0 := x; b n := q(u n ); u n+1 := 2(u n b n ); Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 6 / 13

12 Common Encoders Σ -encoder x = lim N 1 N N n=0 b n + Robust (with respect to multiplication / quantization errors) Low accuracy, error = O (1/N) Recursive process: x X = [0, 1); u 0 (0, 1) arbitrary; b n := q(u n + x); u n+1 := u n + x b n ; Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 7 / 13

13 GRE Golden ratio encoder Golden ratio encoder: Golden mean φ = 1+ 5 satises φ 2 = φ N x = lim b n φ n N k=0 + Robust (with respect to multiplication / quantization errors) + Exponential accuracy: error = O ( φ N) Recursive process: T Q : [ un x X = [0, 2); u 0 := x, u 1 := 0; u n+2 := u n+1 + u n b n ; b n := Q(u n, u n+1 ), Q : R 2 A = {0, 1}. u n+1 ] [ un+1 u n+2 ] = [ ] [ ] 0 1 un Q(u n, u n+1 ) 1 1 u n+1 [ ] 0 1 Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 8 / 13

14 GRE Golden ratio encoder Golden ratio encoder: Golden mean φ = 1+ 5 satises φ 2 = φ N x = lim b n φ n N k=0 + Robust (with respect to multiplication / quantization errors) + Exponential accuracy: error = O ( φ N) Recursive process: T Q : [ un x X = [0, 2); u 0 := x, u 1 := 0; u n+2 := u n+1 + u n b n ; b n := Q(u n, u n+1 ), Q : R 2 A = {0, 1}. u n+1 ] [ un+1 u n+2 ] = [ ] [ ] 0 1 un Q(u n, u n+1 ) 1 1 u n+1 [ ] 0 1 Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 8 / 13

15 GRE Golden ratio encoder x X = [0, 2); u 0 := x, u 1 := 0; u n+2 := u n+1 + u n + b n ; b n := Q(u n, u n+1 ) Proposition Let x [0, 2) and dene b n and u n as above. Then x = b n φ n if and only if the seqence (u n ) is bounded. What properties we needed for the proof? β satises β d = a d 1 β d a 1 β + a 0 with a i { 1, 0, 1} β (1, 2) n=0 Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 9 / 13

16 GRE Golden ratio encoder x X = [0, 2); u 0 := x, u 1 := 0; u n+2 := u n+1 + u n + b n ; b n := Q(u n, u n+1 ) Proposition Let x [0, 2) and dene b n and u n as above. Then x = b n φ n if and only if the seqence (u n ) is bounded. What properties we needed for the proof? β satises β d = a d 1 β d a 1 β + a 0 with a i { 1, 0, 1} β (1, 2) n=0 Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 9 / 13

17 Quantizer Q Parameter α: Q α (u n, u n+1 ) := q(u n + αu n+1 ) Choice α = 1: no multipliers Proposition Let T Q1 as above and R Q1 := [0, 1] 2. Then T Q1 (R Q1 ) = R Q1. Accuracy of multiplier: α α Accuracy of quantizer: aky bit-quantizer q ν 1,ν 2, ν 1 < ν 2 : 0, if u < ν 1, q ν 1,ν 2 (u) := 1, if u > ν 2, 0 or 1, if u [ν 1, ν 2 ] Q 1 is not robust to aky q ν 1,ν 2, because (u n ) can get unbounded no matter how close ν 1,2 are to 1. Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 10 / 13

18 Quantizer Q Parameter α: Q α (u n, u n+1 ) := q(u n + αu n+1 ) Choice α = 1: no multipliers Proposition Let T Q1 as above and R Q1 := [0, 1] 2. Then T Q1 (R Q1 ) = R Q1. Accuracy of multiplier: α α Accuracy of quantizer: aky bit-quantizer q ν 1,ν 2, ν 1 < ν 2 : 0, if u < ν 1, q ν 1,ν 2 (u) := 1, if u > ν 2, 0 or 1, if u [ν 1, ν 2 ] Q 1 is not robust to aky q ν 1,ν 2, because (u n ) can get unbounded no matter how close ν 1,2 are to 1. Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 10 / 13

19 Quantizer Q Parameter α: Q α (u n, u n+1 ) := q(u n + αu n+1 ) Choice α = 1: no multipliers Proposition Let T Q1 as above and R Q1 := [0, 1] 2. Then T Q1 (R Q1 ) = R Q1. Accuracy of multiplier: α α Accuracy of quantizer: aky bit-quantizer q ν 1,ν 2, ν 1 < ν 2 : 0, if u < ν 1, q ν 1,ν 2 (u) := 1, if u > ν 2, 0 or 1, if u [ν 1, ν 2 ] Q 1 is not robust to aky q ν 1,ν 2, because (u n ) can get unbounded no matter how close ν 1,2 are to 1. Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 10 / 13

20 Quantizer Q Parameter α: Q α (u n, u n+1 ) := q(u n + αu n+1 ) Choice α = 1: no multipliers Proposition Let T Q1 as above and R Q1 := [0, 1] 2. Then T Q1 (R Q1 ) = R Q1. Accuracy of multiplier: α α Accuracy of quantizer: aky bit-quantizer q ν 1,ν 2, ν 1 < ν 2 : 0, if u < ν 1, q ν 1,ν 2 (u) := 1, if u > ν 2, 0 or 1, if u [ν 1, ν 2 ] Q 1 is not robust to aky q ν 1,ν 2, because (u n ) can get unbounded no matter how close ν 1,2 are to 1. Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 10 / 13

21 Quantizer Q: Choices α > 1 Proposition Let 0 µ (2φ 2 (φ + 2)) Then exists set R µ and ranges of choices of α, ν 1, ν 2 such that T ν Q 1,ν 2 (R α µ ) R µ + B µ. Imagine ugly inequalities for α min,max, ν min,max (µ) here. Additive noise: u n+2 := u n + u n+1 b n + ɛ n Theorem Let µ, α min,max (µ) as above. For every α (α min (µ), α max (µ)) there exists ν 1 < ν 2 and η > 0 such that GRE with Q ν 1,ν 2 α is stable for α α < η and ɛ n < µ. Stable encoder = the encoding converges, but the string (b n ) need not to represent x. Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 11 / 13

22 Quantizer Q: Choices α > 1 Proposition Let 0 µ (2φ 2 (φ + 2)) Then exists set R µ and ranges of choices of α, ν 1, ν 2 such that T ν Q 1,ν 2 (R α µ ) R µ + B µ. Imagine ugly inequalities for α min,max, ν min,max (µ) here. Additive noise: u n+2 := u n + u n+1 b n + ɛ n Theorem Let µ, α min,max (µ) as above. For every α (α min (µ), α max (µ)) there exists ν 1 < ν 2 and η > 0 such that GRE with Q ν 1,ν 2 α is stable for α α < η and ɛ n < µ. Stable encoder = the encoding converges, but the string (b n ) need not to represent x. Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 11 / 13

23 Quantizer Q: Choices α > 1 Proposition Let 0 µ (2φ 2 (φ + 2)) Then exists set R µ and ranges of choices of α, ν 1, ν 2 such that T ν Q 1,ν 2 (R α µ ) R µ + B µ. Imagine ugly inequalities for α min,max, ν min,max (µ) here. Additive noise: u n+2 := u n + u n+1 b n + ɛ n Theorem Let µ, α min,max (µ) as above. For every α (α min (µ), α max (µ)) there exists ν 1 < ν 2 and η > 0 such that GRE with Q ν 1,ν 2 α is stable for α α < η and ɛ n < µ. Stable encoder = the encoding converges, but the string (b n ) need not to represent x. Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 11 / 13

24 Conclusion We constructed a A/D encoder with: 1 exponential accuracy 2 robustness with respect to multiplication and quantization 3 the usage of a Golden ratio :--) Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 12 / 13

25 References 1 I. Daubechies; Ö. Ylmaz. Robust and practical analog-to-digital conversion with exponential precision. IEEE Trans. Inform. Theory 52 (2006), no. 8, I. Daubechies, C.S. Güntürk, Y. Wang, Ö. Ylmaz. The Golden Ratio Encoder. arxiv: , 7 Sep 2008 Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 13 / 13

Möbius numeration systems with discrete groups

Möbius numeration systems with discrete groups Möbius numeration systems with discrete groups Bc. Tomáš Hejda Supervisor: Prof. Petr Kůrka, CTS, ASCR & Charles University Master s Thesis, June 2012 Tomáš Hejda (FNSPE CTU) Möbius numeration systems

More information

arxiv: v1 [math.na] 6 Jun 2008

arxiv: v1 [math.na] 6 Jun 2008 On Robustness Properties of Beta Encoders and Golden Ratio Encoders Rachel Ward arxiv:0806.083v [math.na] 6 Jun 2008 March 8, 208 Abstract The beta-encoder was recently proposed as a quantization scheme

More information

The Golden Ratio Encoder

The Golden Ratio Encoder The Golden Ratio Encoder Ingrid Daubechies, C. Sinan Güntürk, Yang Wang, and Özgür Yılmaz 1 Abstract This paper proposes a novel Nyquist-rate analog-to-digital (A/D) conversion algorithm which achieves

More information

Finite Frame Quantization

Finite Frame Quantization Finite Frame Quantization Liam Fowl University of Maryland August 21, 2018 1 / 38 Overview 1 Motivation 2 Background 3 PCM 4 First order Σ quantization 5 Higher order Σ quantization 6 Alternative Dual

More information

ANALOG-to-digital (A/D) conversion consists of two

ANALOG-to-digital (A/D) conversion consists of two IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 8, AUGUST 2006 3533 Robust and Practical Analog-to-Digital Conversion With Exponential Precision Ingrid Daubechies, Fellow, IEEE, and Özgür Yılmaz,

More information

On the negative base greedy and lazy representations

On the negative base greedy and lazy representations On the negative base greedy and lazy representations Tomáš Hejda,, Zuzana Masáková, Edita Pelantová June 01 Abstract We consider positional numeration systems with negative real base β, where β > 1, and

More information

Last week: proétale topology on X, with a map of sites ν : X proét X ét. Sheaves on X proét : O + X = ν O + X ét

Last week: proétale topology on X, with a map of sites ν : X proét X ét. Sheaves on X proét : O + X = ν O + X ét INTEGRAL p-adi HODGE THEORY, TALK 3 (RATIONAL p-adi HODGE THEORY I, THE PRIMITIVE OMPARISON THEOREM) RAFFAEL SINGER (NOTES BY JAMES NEWTON) 1. Recap We x /Q p complete and algebraically closed, with tilt

More information

The Golden Ratio Encoder Ingrid Daubechies, Fellow, IEEE, C. Sinan Güntürk, Yang Wang, and Özgür Yılmaz, Member, IEEE

The Golden Ratio Encoder Ingrid Daubechies, Fellow, IEEE, C. Sinan Güntürk, Yang Wang, and Özgür Yılmaz, Member, IEEE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 56, NO 10, OCTOBER 2010 5097 The Golden Ratio Encoder Ingrid Daubechies, Fellow, IEEE, C Sinan Güntürk, Yang Wang, and Özgür Yılmaz, Member, IEEE Abstract This

More information

Discrete Mathematics and Logic II. Regular Sets

Discrete Mathematics and Logic II. Regular Sets Discrete Mathematics and Logic II. Regular Sets SFWR ENG 2FA3 Ryszard Janicki Winter 24 Acknowledgments: Material based on Automata and Computability by Dexter C. Kozen (Chapter 4). Ryszard Janicki Discrete

More information

APPROXIMATING A BANDLIMITED FUNCTION USING VERY COARSELY QUANTIZED DATA: IMPROVED ERROR ESTIMATES IN SIGMA-DELTA MODULATION

APPROXIMATING A BANDLIMITED FUNCTION USING VERY COARSELY QUANTIZED DATA: IMPROVED ERROR ESTIMATES IN SIGMA-DELTA MODULATION APPROXIMATING A BANDLIMITED FUNCTION USING VERY COARSELY QUANTIZED DATA: IMPROVED ERROR ESTIMATES IN SIGMA-DELTA MODULATION C. SİNAN GÜNTÜRK Abstract. Sigma-delta quantization is a method of representing

More information

4.6 Montel's Theorem. Robert Oeckl CA NOTES 7 17/11/2009 1

4.6 Montel's Theorem. Robert Oeckl CA NOTES 7 17/11/2009 1 Robert Oeckl CA NOTES 7 17/11/2009 1 4.6 Montel's Theorem Let X be a topological space. We denote by C(X) the set of complex valued continuous functions on X. Denition 4.26. A topological space is called

More information

Preface These notes were prepared on the occasion of giving a guest lecture in David Harel's class on Advanced Topics in Computability. David's reques

Preface These notes were prepared on the occasion of giving a guest lecture in David Harel's class on Advanced Topics in Computability. David's reques Two Lectures on Advanced Topics in Computability Oded Goldreich Department of Computer Science Weizmann Institute of Science Rehovot, Israel. oded@wisdom.weizmann.ac.il Spring 2002 Abstract This text consists

More information

Distributed Noise Shaping of Signal Quantization

Distributed Noise Shaping of Signal Quantization 1 / 37 Distributed Noise Shaping of Signal Quantization Kung-Ching Lin Norbert Wiener Center Department of Mathematics University of Maryland, College Park September 18, 2017 2 / 37 Overview 1 Introduction

More information

Examples. 2-input, 1-output discrete-time systems: 1-input, 1-output discrete-time systems:

Examples. 2-input, 1-output discrete-time systems: 1-input, 1-output discrete-time systems: Discrete-Time s - I Time-Domain Representation CHAPTER 4 These lecture slides are based on "Digital Signal Processing: A Computer-Based Approach, 4th ed." textbook by S.K. Mitra and its instructor materials.

More information

Distributed estimation based on multi-hop subspace decomposition

Distributed estimation based on multi-hop subspace decomposition Distributed estimation based on multi-hop subspace decomposition Luca Zaccarian 2,3 Joint work with A.R. del Nozal 1, P. Millán 1, L. Orihuela 1, A. Seuret 2 1 Departamento de Ingeniería, Universidad Loyola

More information

The Method of Types and Its Application to Information Hiding

The Method of Types and Its Application to Information Hiding The Method of Types and Its Application to Information Hiding Pierre Moulin University of Illinois at Urbana-Champaign www.ifp.uiuc.edu/ moulin/talks/eusipco05-slides.pdf EUSIPCO Antalya, September 7,

More information

Časopis pro pěstování matematiky a fysiky

Časopis pro pěstování matematiky a fysiky Časopis pro pěstování matematiky a fysiky Felix Adalbert Behrend On sequences of integers containing no arithmetic progression Časopis pro pěstování matematiky a fysiky, Vol. 67 (1938), No. 4, 235--239

More information

Finite Frames and Sigma Delta Quantization

Finite Frames and Sigma Delta Quantization Finite Frames and Sigma Delta Quantization with Matt Fickus Alex Powell and Özgür Yilmaz Aram Tangboondouangjit Finite Frames and Sigma Delta Quantization p.1/57 Frames Frames F = {e n } N n=1 for d-dimensional

More information

New Minimal Weight Representations for Left-to-Right Window Methods

New Minimal Weight Representations for Left-to-Right Window Methods New Minimal Weight Representations for Left-to-Right Window Methods James A. Muir 1 and Douglas R. Stinson 2 1 Department of Combinatorics and Optimization 2 School of Computer Science University of Waterloo

More information

Kybernetika. Tomáš Hejda; Zuzana Masáková; Edita Pelantová Greedy and lazy representations in negative base systems. Terms of use:

Kybernetika. Tomáš Hejda; Zuzana Masáková; Edita Pelantová Greedy and lazy representations in negative base systems. Terms of use: Kybernetika Tomáš Hejda; Zuzana Masáková; Edita Pelantová Greedy and lazy representations in negative base systems Kybernetika, Vol. 49 (03), No., 58 79 Persistent URL: http://dml.cz/dmlcz/43367 Terms

More information

CSE 1400 Applied Discrete Mathematics Definitions

CSE 1400 Applied Discrete Mathematics Definitions CSE 1400 Applied Discrete Mathematics Definitions Department of Computer Sciences College of Engineering Florida Tech Fall 2011 Arithmetic 1 Alphabets, Strings, Languages, & Words 2 Number Systems 3 Machine

More information

Efficient Metastability-Containing Gray Code 2-sort

Efficient Metastability-Containing Gray Code 2-sort Efficient Metastability-Containing Gray Code 2-sort Moti Medina Joint work with Christoph Lenzen Max Planck Institute For Informatics, Saarbrucken, Germany ASYNC 206 In The Beginning there was Metastability

More information

Math 324 Summer 2012 Elementary Number Theory Notes on Mathematical Induction

Math 324 Summer 2012 Elementary Number Theory Notes on Mathematical Induction Math 4 Summer 01 Elementary Number Theory Notes on Mathematical Induction Principle of Mathematical Induction Recall the following axiom for the set of integers. Well-Ordering Axiom for the Integers If

More information

arxiv: v8 [stat.co] 28 Jan 2018

arxiv: v8 [stat.co] 28 Jan 2018 OPTIMAL QUANTIZATION FOR NONUNIFORM CANTOR DISTRIBUTIONS LAKSHMI ROYCHOWDHURY arxiv:151.00379v8 [stat.co] 8 Jan 018 Abstract. Let P be a Borel probability measure on R such that P = 1 4 P S 1 1 + 3 4 P

More information

EE376A - Information Theory Final, Monday March 14th 2016 Solutions. Please start answering each question on a new page of the answer booklet.

EE376A - Information Theory Final, Monday March 14th 2016 Solutions. Please start answering each question on a new page of the answer booklet. EE376A - Information Theory Final, Monday March 14th 216 Solutions Instructions: You have three hours, 3.3PM - 6.3PM The exam has 4 questions, totaling 12 points. Please start answering each question on

More information

How do computers represent numbers?

How do computers represent numbers? How do computers represent numbers? Tips & Tricks Week 1 Topics in Scientific Computing QMUL Semester A 2017/18 1/10 What does digital mean? The term DIGITAL refers to any device that operates on discrete

More information

Towards control over fading channels

Towards control over fading channels Towards control over fading channels Paolo Minero, Massimo Franceschetti Advanced Network Science University of California San Diego, CA, USA mail: {minero,massimo}@ucsd.edu Invited Paper) Subhrakanti

More information

MATH2111 Higher Several Variable Calculus Week 2

MATH2111 Higher Several Variable Calculus Week 2 MATH2111 Higher Several Variable Calculus Week 2 Dr Denis Potapov School of Mathematics and Statistics University of New South Wales Semester 1, 2016 [updated: March 8, 2016] D Potapov (UNSW Maths & Stats)

More information

A/D Conversion with Imperfect Quantizers

A/D Conversion with Imperfect Quantizers A/D Conversion with Imperfect Quantizers Ingrid Daubechies, Ronald DeVore, C. Sinan Güntürk and Vinay Vaishampayan Abstract This paper analyzes mathematically the effect of quantizer threshold imperfection

More information

Lecture 8: Semidefinite programs for fidelity and optimal measurements

Lecture 8: Semidefinite programs for fidelity and optimal measurements CS 766/QIC 80 Theory of Quantum Information (Fall 0) Lecture 8: Semidefinite programs for fidelity and optimal measurements This lecture is devoted to two examples of semidefinite programs: one is for

More information

arxiv: v1 [cs.it] 21 Feb 2013

arxiv: v1 [cs.it] 21 Feb 2013 q-ary Compressive Sensing arxiv:30.568v [cs.it] Feb 03 Youssef Mroueh,, Lorenzo Rosasco, CBCL, CSAIL, Massachusetts Institute of Technology LCSL, Istituto Italiano di Tecnologia and IIT@MIT lab, Istituto

More information

Circuit depth relative to a random oracle. Peter Bro Miltersen. Aarhus University, Computer Science Department

Circuit depth relative to a random oracle. Peter Bro Miltersen. Aarhus University, Computer Science Department Circuit depth relative to a random oracle Peter Bro Miltersen Aarhus University, Computer Science Department Ny Munkegade, DK 8000 Aarhus C, Denmark. pbmiltersen@daimi.aau.dk Keywords: Computational complexity,

More information

National University of Singapore Department of Electrical & Computer Engineering. Examination for

National University of Singapore Department of Electrical & Computer Engineering. Examination for National University of Singapore Department of Electrical & Computer Engineering Examination for EE5139R Information Theory for Communication Systems (Semester I, 2014/15) November/December 2014 Time Allowed:

More information

EE376A: Homework #2 Solutions Due by 11:59pm Thursday, February 1st, 2018

EE376A: Homework #2 Solutions Due by 11:59pm Thursday, February 1st, 2018 Please submit the solutions on Gradescope. Some definitions that may be useful: EE376A: Homework #2 Solutions Due by 11:59pm Thursday, February 1st, 2018 Definition 1: A sequence of random variables X

More information

Introduction and mathematical preliminaries

Introduction and mathematical preliminaries Chapter Introduction and mathematical preliminaries Contents. Motivation..................................2 Finite-digit arithmetic.......................... 2.3 Errors in numerical calculations.....................

More information

COVARIANCE CALCULATION FOR FLOATING POINT STATE SPACE REALIZATIONS

COVARIANCE CALCULATION FOR FLOATING POINT STATE SPACE REALIZATIONS opyright 2002 IFA 15th riennial World ongress, Barcelona, Spain OVARIANE ALULAION FOR FLOAING POIN SAE SPAE REALIZAIONS Sangho Ko,1 Robert R Bitmead,1 Department of Mechanical and Aerospace Engineering,

More information

MATH 324 Summer 2011 Elementary Number Theory. Notes on Mathematical Induction. Recall the following axiom for the set of integers.

MATH 324 Summer 2011 Elementary Number Theory. Notes on Mathematical Induction. Recall the following axiom for the set of integers. MATH 4 Summer 011 Elementary Number Theory Notes on Mathematical Induction Principle of Mathematical Induction Recall the following axiom for the set of integers. Well-Ordering Axiom for the Integers If

More information

UNIVERSITY OF DUBLIN

UNIVERSITY OF DUBLIN UNIVERSITY OF DUBLIN TRINITY COLLEGE FACULTY OF ENGINEERING, MATHEMATICS & SCIENCE SCHOOL OF ENGINEERING Electronic & Electrical Engineering Junior Sophister Engineering Trinity Term, 2015 Annual Examinations

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

October 7, :8 WSPC/WS-IJWMIP paper. Polynomial functions are renable

October 7, :8 WSPC/WS-IJWMIP paper. Polynomial functions are renable International Journal of Wavelets, Multiresolution and Information Processing c World Scientic Publishing Company Polynomial functions are renable Henning Thielemann Institut für Informatik Martin-Luther-Universität

More information

54 D. S. HOODA AND U. S. BHAKER Belis and Guiasu [2] observed that a source is not completely specied by the probability distribution P over the sourc

54 D. S. HOODA AND U. S. BHAKER Belis and Guiasu [2] observed that a source is not completely specied by the probability distribution P over the sourc SOOCHOW JOURNAL OF MATHEMATICS Volume 23, No. 1, pp. 53-62, January 1997 A GENERALIZED `USEFUL' INFORMATION MEASURE AND CODING THEOREMS BY D. S. HOODA AND U. S. BHAKER Abstract. In the present communication

More information

Lecture 14 - P v.s. NP 1

Lecture 14 - P v.s. NP 1 CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) February 27, 2018 Lecture 14 - P v.s. NP 1 In this lecture we start Unit 3 on NP-hardness and approximation

More information

Relative entropies, suitable weak solutions, and weak-strong uniqueness for the compressible Navier-Stokes system

Relative entropies, suitable weak solutions, and weak-strong uniqueness for the compressible Navier-Stokes system Relative entropies, suitable weak solutions, and weak-strong uniqueness for the compressible Navier-Stokes system Institute of Mathematics, Academy of Sciences of the Czech Republic, Prague joint work

More information

Appendix. Title. Petr Lachout MFF UK, ÚTIA AV ČR

Appendix. Title. Petr Lachout MFF UK, ÚTIA AV ČR Title ROBUST - Kráĺıky - únor, 2010 Definice Budeme se zabývat optimalizačními úlohami. Uvažujme metrický prostor X a funkci f : X R = [, + ]. Zajímá nás minimální hodnota funkce f na X ϕ (f ) = inf {f

More information

Extremal problems in logic programming and stable model computation Pawe l Cholewinski and Miros law Truszczynski Computer Science Department Universi

Extremal problems in logic programming and stable model computation Pawe l Cholewinski and Miros law Truszczynski Computer Science Department Universi Extremal problems in logic programming and stable model computation Pawe l Cholewinski and Miros law Truszczynski Computer Science Department University of Kentucky Lexington, KY 40506-0046 fpaweljmirekg@cs.engr.uky.edu

More information

Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms

Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms Vladimir Bayev Abstract. Low degree annihilators for Boolean functions are of great interest in cryptology because of

More information

A large deviation principle for a RWRC in a box

A large deviation principle for a RWRC in a box A large deviation principle for a RWRC in a box 7th Cornell Probability Summer School Michele Salvi TU Berlin July 12, 2011 Michele Salvi (TU Berlin) An LDP for a RWRC in a nite box July 12, 2011 1 / 15

More information

arxiv: v2 [cs.ds] 17 Sep 2017

arxiv: v2 [cs.ds] 17 Sep 2017 Two-Dimensional Indirect Binary Search for the Positive One-In-Three Satisfiability Problem arxiv:1708.08377v [cs.ds] 17 Sep 017 Shunichi Matsubara Aoyama Gakuin University, 5-10-1, Fuchinobe, Chuo-ku,

More information

How to Pop a Deep PDA Matters

How to Pop a Deep PDA Matters How to Pop a Deep PDA Matters Peter Leupold Department of Mathematics, Faculty of Science Kyoto Sangyo University Kyoto 603-8555, Japan email:leupold@cc.kyoto-su.ac.jp Abstract Deep PDA are push-down automata

More information

Support Detection in Super-resolution

Support Detection in Super-resolution Support Detection in Super-resolution Carlos Fernandez-Granda (Stanford University) 7/2/2013 SampTA 2013 Support Detection in Super-resolution C. Fernandez-Granda 1 / 25 Acknowledgements This work was

More information

Applications and fundamental results on random Vandermon

Applications and fundamental results on random Vandermon Applications and fundamental results on random Vandermonde matrices May 2008 Some important concepts from classical probability Random variables are functions (i.e. they commute w.r.t. multiplication)

More information

An introduction to basic information theory. Hampus Wessman

An introduction to basic information theory. Hampus Wessman An introduction to basic information theory Hampus Wessman Abstract We give a short and simple introduction to basic information theory, by stripping away all the non-essentials. Theoretical bounds on

More information

L -Bounded Robust Control of Nonlinear Cascade Systems

L -Bounded Robust Control of Nonlinear Cascade Systems L -Bounded Robust Control of Nonlinear Cascade Systems Shoudong Huang M.R. James Z.P. Jiang August 19, 2004 Accepted by Systems & Control Letters Abstract In this paper, we consider the L -bounded robust

More information

Number Representation and Waveform Quantization

Number Representation and Waveform Quantization 1 Number Representation and Waveform Quantization 1 Introduction This lab presents two important concepts for working with digital signals. The first section discusses how numbers are stored in memory.

More information

Stochastic Dynamic Programming. Jesus Fernandez-Villaverde University of Pennsylvania

Stochastic Dynamic Programming. Jesus Fernandez-Villaverde University of Pennsylvania Stochastic Dynamic Programming Jesus Fernande-Villaverde University of Pennsylvania 1 Introducing Uncertainty in Dynamic Programming Stochastic dynamic programming presents a very exible framework to handle

More information

the station can send one of t code packets, transmitting one binary symbol for the time unit. Let > 0 be a xed parameter. Put p = =M, 0 < p < 1. Suppo

the station can send one of t code packets, transmitting one binary symbol for the time unit. Let > 0 be a xed parameter. Put p = =M, 0 < p < 1. Suppo Superimposed Codes and ALOHA system Arkady G. D'yachkov, Vyacheslav V. Rykov Moscow State University, Faculty of Mechanics and Mathematics, Department of Probability Theory, Moscow, 119899, Russia, Email:

More information

Analog Neural Nets with Gaussian or other Common. Noise Distributions cannot Recognize Arbitrary. Regular Languages.

Analog Neural Nets with Gaussian or other Common. Noise Distributions cannot Recognize Arbitrary. Regular Languages. Analog Neural Nets with Gaussian or other Common Noise Distributions cannot Recognize Arbitrary Regular Languages Wolfgang Maass Inst. for Theoretical Computer Science, Technische Universitat Graz Klosterwiesgasse

More information

Poisson-Lie T-Duality and supermanifolds

Poisson-Lie T-Duality and supermanifolds Poisson-Lie T-Duality and supermanifolds L. Hlavatý, I. Petr, V. Štěpán, J. Vysoký Department of Physics, Faculty of Nuclear Sciences and Physical Engineering, Czech Technical University in Prague IPM

More information

Homework 4, 5, 6 Solutions. > 0, and so a n 0 = n + 1 n = ( n+1 n)( n+1+ n) 1 if n is odd 1/n if n is even diverges.

Homework 4, 5, 6 Solutions. > 0, and so a n 0 = n + 1 n = ( n+1 n)( n+1+ n) 1 if n is odd 1/n if n is even diverges. 2..2(a) lim a n = 0. Homework 4, 5, 6 Solutions Proof. Let ɛ > 0. Then for n n = 2+ 2ɛ we have 2n 3 4+ ɛ 3 > ɛ > 0, so 0 < 2n 3 < ɛ, and thus a n 0 = 2n 3 < ɛ. 2..2(g) lim ( n + n) = 0. Proof. Let ɛ >

More information

Does soft-decision ECC improve endurance?

Does soft-decision ECC improve endurance? Flash Memory Summit 2015 Does soft-decision ECC improve endurance? Thomas Parnell IBM Research - Zurich Outline Motivation Why do we need more endurance? Capacity What is channel capacity? How can it be

More information

EE-597 Notes Quantization

EE-597 Notes Quantization EE-597 Notes Quantization Phil Schniter June, 4 Quantization Given a continuous-time and continuous-amplitude signal (t, processing and storage by modern digital hardware requires discretization in both

More information

Solutions to Problem Set 5

Solutions to Problem Set 5 UC Berkeley, CS 74: Combinatorics and Discrete Probability (Fall 00 Solutions to Problem Set (MU 60 A family of subsets F of {,,, n} is called an antichain if there is no pair of sets A and B in F satisfying

More information

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding Tim Roughgarden October 29, 2014 1 Preamble This lecture covers our final subtopic within the exact and approximate recovery part of the course.

More information

ON THE COMPUTABILITY OF PERFECT SUBSETS OF SETS WITH POSITIVE MEASURE

ON THE COMPUTABILITY OF PERFECT SUBSETS OF SETS WITH POSITIVE MEASURE ON THE COMPUTABILITY OF PERFECT SUBSETS OF SETS WITH POSITIVE MEASURE C. T. CHONG, WEI LI, WEI WANG, AND YUE YANG Abstract. A set X 2 ω with positive measure contains a perfect subset. We study such perfect

More information

MODULAR ARITHMETIC I

MODULAR ARITHMETIC I MODULAR ARITHMETIC I. Modular Arithmetic and Check Digit Schemes The check digit schemes that we have been studying have some features in common. Certain information (book title publisher etc., personal

More information

IE 5531: Engineering Optimization I

IE 5531: Engineering Optimization I IE 5531: Engineering Optimization I Lecture 14: Unconstrained optimization Prof. John Gunnar Carlsson October 27, 2010 Prof. John Gunnar Carlsson IE 5531: Engineering Optimization I October 27, 2010 1

More information

Notes for Lecture 3... x 4

Notes for Lecture 3... x 4 Stanford University CS254: Computational Complexity Notes 3 Luca Trevisan January 14, 2014 Notes for Lecture 3 In this lecture we introduce the computational model of boolean circuits and prove that polynomial

More information

About the relationship between formal logic and complexity classes

About the relationship between formal logic and complexity classes About the relationship between formal logic and complexity classes Working paper Comments welcome; my email: armandobcm@yahoo.com Armando B. Matos October 20, 2013 1 Introduction We analyze a particular

More information

80DB A 40DB 0DB DB

80DB A 40DB 0DB DB Stability Analysis On the Nichols Chart and Its Application in QFT Wenhua Chen and Donald J. Ballance Centre for Systems & Control Department of Mechanical Engineering University of Glasgow Glasgow G12

More information

Dispersion of the Gilbert-Elliott Channel

Dispersion of the Gilbert-Elliott Channel Dispersion of the Gilbert-Elliott Channel Yury Polyanskiy Email: ypolyans@princeton.edu H. Vincent Poor Email: poor@princeton.edu Sergio Verdú Email: verdu@princeton.edu Abstract Channel dispersion plays

More information

Uncertainity, Information, and Entropy

Uncertainity, Information, and Entropy Uncertainity, Information, and Entropy Probabilistic experiment involves the observation of the output emitted by a discrete source during every unit of time. The source output is modeled as a discrete

More information

Nyquist-Rate D/A Converters. D/A Converter Basics.

Nyquist-Rate D/A Converters. D/A Converter Basics. Nyquist-Rate D/A Converters David Johns and Ken Martin (johns@eecg.toronto.edu) (martin@eecg.toronto.edu) slide 1 of 20 D/A Converter Basics. B in D/A is a digital signal (or word), B in b i B in = 2 1

More information

CS1800: Mathematical Induction. Professor Kevin Gold

CS1800: Mathematical Induction. Professor Kevin Gold CS1800: Mathematical Induction Professor Kevin Gold Induction: Used to Prove Patterns Just Keep Going For an algorithm, we may want to prove that it just keeps working, no matter how big the input size

More information

which possibility holds in an ensemble with a given a priori probability p k log 2

which possibility holds in an ensemble with a given a priori probability p k log 2 ALGORITHMIC INFORMATION THEORY Encyclopedia of Statistical Sciences, Volume 1, Wiley, New York, 1982, pp. 38{41 The Shannon entropy* concept of classical information theory* [9] is an ensemble notion it

More information

Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function

Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function Dinesh Krithivasan and S. Sandeep Pradhan Department of Electrical Engineering and Computer Science,

More information

Spurious Chaotic Solutions of Dierential. Equations. Sigitas Keras. September Department of Applied Mathematics and Theoretical Physics

Spurious Chaotic Solutions of Dierential. Equations. Sigitas Keras. September Department of Applied Mathematics and Theoretical Physics UNIVERSITY OF CAMBRIDGE Numerical Analysis Reports Spurious Chaotic Solutions of Dierential Equations Sigitas Keras DAMTP 994/NA6 September 994 Department of Applied Mathematics and Theoretical Physics

More information

Solution of the 7 th Homework

Solution of the 7 th Homework Solution of the 7 th Homework Sangchul Lee December 3, 2014 1 Preliminary In this section we deal with some facts that are relevant to our problems but can be coped with only previous materials. 1.1 Maximum

More information

Joint Optimum Bitwise Decomposition of any. Memoryless Source to be Sent over a BSC. Ecole Nationale Superieure des Telecommunications URA CNRS 820

Joint Optimum Bitwise Decomposition of any. Memoryless Source to be Sent over a BSC. Ecole Nationale Superieure des Telecommunications URA CNRS 820 Joint Optimum Bitwise Decomposition of any Memoryless Source to be Sent over a BSC Seyed Bahram Zahir Azami, Pierre Duhamel 2 and Olivier Rioul 3 cole Nationale Superieure des Telecommunications URA CNRS

More information

Optimization over Sparse Symmetric Sets via a Nonmonotone Projected Gradient Method

Optimization over Sparse Symmetric Sets via a Nonmonotone Projected Gradient Method Optimization over Sparse Symmetric Sets via a Nonmonotone Projected Gradient Method Zhaosong Lu November 21, 2015 Abstract We consider the problem of minimizing a Lipschitz dierentiable function over a

More information

Decidability of Existence and Construction of a Complement of a given function

Decidability of Existence and Construction of a Complement of a given function Decidability of Existence and Construction of a Complement of a given function Ka.Shrinivaasan, Chennai Mathematical Institute (CMI) (shrinivas@cmi.ac.in) April 28, 2011 Abstract This article denes a complement

More information

Compressibility of Infinite Sequences and its Interplay with Compressed Sensing Recovery

Compressibility of Infinite Sequences and its Interplay with Compressed Sensing Recovery Compressibility of Infinite Sequences and its Interplay with Compressed Sensing Recovery Jorge F. Silva and Eduardo Pavez Department of Electrical Engineering Information and Decision Systems Group Universidad

More information

ADDENDUM B: CONSTRUCTION OF R AND THE COMPLETION OF A METRIC SPACE

ADDENDUM B: CONSTRUCTION OF R AND THE COMPLETION OF A METRIC SPACE ADDENDUM B: CONSTRUCTION OF R AND THE COMPLETION OF A METRIC SPACE ANDREAS LEOPOLD KNUTSEN Abstract. These notes are written as supplementary notes for the course MAT11- Real Analysis, taught at the University

More information

EE 521: Instrumentation and Measurements

EE 521: Instrumentation and Measurements Aly El-Osery Electrical Engineering Department, New Mexico Tech Socorro, New Mexico, USA September 23, 2009 1 / 18 1 Sampling 2 Quantization 3 Digital-to-Analog Converter 4 Analog-to-Digital Converter

More information

Some Results Concerning Uniqueness of Triangle Sequences

Some Results Concerning Uniqueness of Triangle Sequences Some Results Concerning Uniqueness of Triangle Sequences T. Cheslack-Postava A. Diesl M. Lepinski A. Schuyler August 12 1999 Abstract In this paper we will begin by reviewing the triangle iteration. We

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE7C (Spring 018): Convex Optimization and Approximation Instructor: Moritz Hardt Email: hardt+ee7c@berkeley.edu Graduate Instructor: Max Simchowitz Email: msimchow+ee7c@berkeley.edu February

More information

Introduction to Bandit Algorithms. Introduction to Bandit Algorithms

Introduction to Bandit Algorithms. Introduction to Bandit Algorithms Stochastic K-Arm Bandit Problem Formulation Consider K arms (actions) each correspond to an unknown distribution {ν k } K k=1 with values bounded in [0, 1]. At each time t, the agent pulls an arm I t {1,...,

More information

QM1 - Tutorial 1 The Bohr Atom and Mathematical Introduction

QM1 - Tutorial 1 The Bohr Atom and Mathematical Introduction QM - Tutorial The Bohr Atom and Mathematical Introduction 26 October 207 Contents Bohr Atom. Energy of a Photon - The Photo Electric Eect.................................2 The Discrete Energy Spectrum

More information

MARKOV CHAINS: STATIONARY DISTRIBUTIONS AND FUNCTIONS ON STATE SPACES. Contents

MARKOV CHAINS: STATIONARY DISTRIBUTIONS AND FUNCTIONS ON STATE SPACES. Contents MARKOV CHAINS: STATIONARY DISTRIBUTIONS AND FUNCTIONS ON STATE SPACES JAMES READY Abstract. In this paper, we rst introduce the concepts of Markov Chains and their stationary distributions. We then discuss

More information

HIGHER ORDER SLIDING MODES AND ARBITRARY-ORDER EXACT ROBUST DIFFERENTIATION

HIGHER ORDER SLIDING MODES AND ARBITRARY-ORDER EXACT ROBUST DIFFERENTIATION HIGHER ORDER SLIDING MODES AND ARBITRARY-ORDER EXACT ROBUST DIFFERENTIATION A. Levant Institute for Industrial Mathematics, 4/24 Yehuda Ha-Nachtom St., Beer-Sheva 843, Israel Fax: +972-7-232 and E-mail:

More information

Index coding with side information

Index coding with side information Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated

More information

The Extension of the Theorem of J. W. Garrett, C. S. Rees and C. V. Stanojevic from One Dimension to Two Dimension

The Extension of the Theorem of J. W. Garrett, C. S. Rees and C. V. Stanojevic from One Dimension to Two Dimension Int. Journal of Math. Analysis, Vol. 3, 29, no. 26, 1251-1257 The Extension of the Theorem of J. W. Garrett, C. S. Rees and C. V. Stanojevic from One Dimension to Two Dimension Jatinderdeep Kaur School

More information

Soft-Output Trellis Waveform Coding

Soft-Output Trellis Waveform Coding Soft-Output Trellis Waveform Coding Tariq Haddad and Abbas Yongaçoḡlu School of Information Technology and Engineering, University of Ottawa Ottawa, Ontario, K1N 6N5, Canada Fax: +1 (613) 562 5175 thaddad@site.uottawa.ca

More information

A proof of the existence of good nested lattices

A proof of the existence of good nested lattices A proof of the existence of good nested lattices Dinesh Krithivasan and S. Sandeep Pradhan July 24, 2007 1 Introduction We show the existence of a sequence of nested lattices (Λ (n) 1, Λ(n) ) with Λ (n)

More information

From Fractional Brownian Motion to Multifractional Brownian Motion

From Fractional Brownian Motion to Multifractional Brownian Motion From Fractional Brownian Motion to Multifractional Brownian Motion Antoine Ayache USTL (Lille) Antoine.Ayache@math.univ-lille1.fr Cassino December 2010 A.Ayache (USTL) From FBM to MBM Cassino December

More information

Practical Polar Code Construction Using Generalised Generator Matrices

Practical Polar Code Construction Using Generalised Generator Matrices Practical Polar Code Construction Using Generalised Generator Matrices Berksan Serbetci and Ali E. Pusane Department of Electrical and Electronics Engineering Bogazici University Istanbul, Turkey E-mail:

More information

NUMBERS WITH INTEGER COMPLEXITY CLOSE TO THE LOWER BOUND

NUMBERS WITH INTEGER COMPLEXITY CLOSE TO THE LOWER BOUND #A1 INTEGERS 12A (2012): John Selfridge Memorial Issue NUMBERS WITH INTEGER COMPLEXITY CLOSE TO THE LOWER BOUND Harry Altman Department of Mathematics, University of Michigan, Ann Arbor, Michigan haltman@umich.edu

More information

Flags of almost ane codes

Flags of almost ane codes Flags of almost ane codes Trygve Johnsen Hugues Verdure April 0, 207 Abstract We describe a two-party wire-tap channel of type II in the framework of almost ane codes. Its cryptological performance is

More information

u = λ u 2 in Ω (1) u = 1 on Ω (2)

u = λ u 2 in Ω (1) u = 1 on Ω (2) METHODS AND APPLICATIONS OF ANALYSIS. c 8 International Press Vol. 15, No. 3, pp. 37 34, September 8 4 SYMMETRY ANALYSIS OF A CANONICAL MEMS MODEL J. REGAN BECKHAM AND JOHN A. PELESKO Abstract. A canonical

More information

Notes for Math 290 using Introduction to Mathematical Proofs by Charles E. Roberts, Jr.

Notes for Math 290 using Introduction to Mathematical Proofs by Charles E. Roberts, Jr. Notes for Math 290 using Introduction to Mathematical Proofs by Charles E. Roberts, Jr. Chapter : Logic Topics:. Statements, Negation, and Compound Statements.2 Truth Tables and Logical Equivalences.3

More information

Signal types. Signal characteristics: RMS, power, db Probability Density Function (PDF). Analogue-to-Digital Conversion (ADC).

Signal types. Signal characteristics: RMS, power, db Probability Density Function (PDF). Analogue-to-Digital Conversion (ADC). Signal types. Signal characteristics:, power, db Probability Density Function (PDF). Analogue-to-Digital Conversion (ADC). Signal types Stationary (average properties don t vary with time) Deterministic

More information