The Golden Ratio and Signal Quantization
|
|
- Gladys Simmons
- 5 years ago
- Views:
Transcription
1 The Golden Ratio and Signal Quantization Tom Hejda, based on the work of Ingrid Daubechies et al. Doppler Institute & Department of Mathematics, FNSPE, Czech Technical University in Prague Combinatorics on Words, Frysava 2011 Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 1 / 13
2 Abstract Optický nebo zvukový signál je obecn funkce z podmnoºiny R n do R. V p ípad fotograe je deni ní obor celá plocha scény a obor hodnot je jas v daném míst (pro ernobílý obrázek). V p ípad zvukového signálu je deni ní obor as a obor hodnot je amplituda. Pokud chceme signál p evést na digitální data, nutn musíme ztratit n jakou informaci, nebo kone ný objem dat pojme pouze kone né mnoºství hodnot. Omezení deni ního oboru se provádí tzv. samplováním, kdy se vezmou data pouze z kone ného po tu bod, obvykle z m íºky. Omezení oboru hodnot se provádí tzv. kvantizací, kdy z hodnoty nap tí x na výstupu m ícího p ístroje vygenerujeme kone nou posloupnost bit (nul a jedni ek), která p edepsaným zp sobem reprezentuje danou hodnotu nap tí. Práv kvantizací se zabývá tento p ísp vek. B ºn se pouºívá binární kvantizace, kdy se postupn tou jednotlivé bity binárního rozvoje x. Problém v²ak je, ºe jeden chybn p e tený bit nutn znamená chybný výsledek. Toto se pokusíme odstranit pouºítím soustavy o základu zlatý ez τ 1.618, který e²í rovnici τ 2 = τ + 1. S úsp chem vyuºijeme n kolika jeho vlastností: zmín ná rovnice má koecienty pouze 0 a ±1; platí 1 < τ < 2; soustava o základu τ je redundantní ( ísla mají více vyjád ení). Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 2 / 13
3 Motivation Signal: function f : (R n ) (R) Sampling: restriction f : ˆM n (R), where M N Quantization: restriction f : ˆM n nite set Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 3 / 13
4 Motivation Signal: function f : (R n ) (R) Sampling: restriction f : ˆM n (R), where M N Quantization: restriction f : ˆM n nite set Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 3 / 13
5 Motivation Signal: function f : (R n ) (R) Sampling: restriction f : ˆM n (R), where M N Quantization: restriction f : ˆM n nite set Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 3 / 13
6 Encoder Denition A/D Encoder is a device that takes a signal (voltage) and gives its (some) representation. Theory: Encoder : R + A N Reality: Encoder : X = interval A N Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 4 / 13
7 Encoder Denition A/D Encoder is a device that takes a signal (voltage) and gives its (some) representation. Theory: Encoder : R + A N Reality: Encoder : X = interval A N Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 4 / 13
8 Encoder Denition A/D Encoder is a device that takes a signal (voltage) and gives its (some) representation. Theory: Encoder : R + A N Reality: Encoder : X = interval A N Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 4 / 13
9 Technology q τ (u) := { 1 u τ 0 u < τ Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 5 / 13
10 Technology q τ (u) := { 1 u τ 0 u τ Reality: no this component is accurate Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 5 / 13
11 Common Encoders Binary encoder x = lim N b n 2 n N n=0 + Exponential accuracy, error = O ( 2 N) Not robust (with respect to parameters) Recursive process: x X = [0, 2); u 0 := x; b n := q(u n ); u n+1 := 2(u n b n ); Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 6 / 13
12 Common Encoders Σ -encoder x = lim N 1 N N n=0 b n + Robust (with respect to multiplication / quantization errors) Low accuracy, error = O (1/N) Recursive process: x X = [0, 1); u 0 (0, 1) arbitrary; b n := q(u n + x); u n+1 := u n + x b n ; Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 7 / 13
13 GRE Golden ratio encoder Golden ratio encoder: Golden mean φ = 1+ 5 satises φ 2 = φ N x = lim b n φ n N k=0 + Robust (with respect to multiplication / quantization errors) + Exponential accuracy: error = O ( φ N) Recursive process: T Q : [ un x X = [0, 2); u 0 := x, u 1 := 0; u n+2 := u n+1 + u n b n ; b n := Q(u n, u n+1 ), Q : R 2 A = {0, 1}. u n+1 ] [ un+1 u n+2 ] = [ ] [ ] 0 1 un Q(u n, u n+1 ) 1 1 u n+1 [ ] 0 1 Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 8 / 13
14 GRE Golden ratio encoder Golden ratio encoder: Golden mean φ = 1+ 5 satises φ 2 = φ N x = lim b n φ n N k=0 + Robust (with respect to multiplication / quantization errors) + Exponential accuracy: error = O ( φ N) Recursive process: T Q : [ un x X = [0, 2); u 0 := x, u 1 := 0; u n+2 := u n+1 + u n b n ; b n := Q(u n, u n+1 ), Q : R 2 A = {0, 1}. u n+1 ] [ un+1 u n+2 ] = [ ] [ ] 0 1 un Q(u n, u n+1 ) 1 1 u n+1 [ ] 0 1 Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 8 / 13
15 GRE Golden ratio encoder x X = [0, 2); u 0 := x, u 1 := 0; u n+2 := u n+1 + u n + b n ; b n := Q(u n, u n+1 ) Proposition Let x [0, 2) and dene b n and u n as above. Then x = b n φ n if and only if the seqence (u n ) is bounded. What properties we needed for the proof? β satises β d = a d 1 β d a 1 β + a 0 with a i { 1, 0, 1} β (1, 2) n=0 Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 9 / 13
16 GRE Golden ratio encoder x X = [0, 2); u 0 := x, u 1 := 0; u n+2 := u n+1 + u n + b n ; b n := Q(u n, u n+1 ) Proposition Let x [0, 2) and dene b n and u n as above. Then x = b n φ n if and only if the seqence (u n ) is bounded. What properties we needed for the proof? β satises β d = a d 1 β d a 1 β + a 0 with a i { 1, 0, 1} β (1, 2) n=0 Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 9 / 13
17 Quantizer Q Parameter α: Q α (u n, u n+1 ) := q(u n + αu n+1 ) Choice α = 1: no multipliers Proposition Let T Q1 as above and R Q1 := [0, 1] 2. Then T Q1 (R Q1 ) = R Q1. Accuracy of multiplier: α α Accuracy of quantizer: aky bit-quantizer q ν 1,ν 2, ν 1 < ν 2 : 0, if u < ν 1, q ν 1,ν 2 (u) := 1, if u > ν 2, 0 or 1, if u [ν 1, ν 2 ] Q 1 is not robust to aky q ν 1,ν 2, because (u n ) can get unbounded no matter how close ν 1,2 are to 1. Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 10 / 13
18 Quantizer Q Parameter α: Q α (u n, u n+1 ) := q(u n + αu n+1 ) Choice α = 1: no multipliers Proposition Let T Q1 as above and R Q1 := [0, 1] 2. Then T Q1 (R Q1 ) = R Q1. Accuracy of multiplier: α α Accuracy of quantizer: aky bit-quantizer q ν 1,ν 2, ν 1 < ν 2 : 0, if u < ν 1, q ν 1,ν 2 (u) := 1, if u > ν 2, 0 or 1, if u [ν 1, ν 2 ] Q 1 is not robust to aky q ν 1,ν 2, because (u n ) can get unbounded no matter how close ν 1,2 are to 1. Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 10 / 13
19 Quantizer Q Parameter α: Q α (u n, u n+1 ) := q(u n + αu n+1 ) Choice α = 1: no multipliers Proposition Let T Q1 as above and R Q1 := [0, 1] 2. Then T Q1 (R Q1 ) = R Q1. Accuracy of multiplier: α α Accuracy of quantizer: aky bit-quantizer q ν 1,ν 2, ν 1 < ν 2 : 0, if u < ν 1, q ν 1,ν 2 (u) := 1, if u > ν 2, 0 or 1, if u [ν 1, ν 2 ] Q 1 is not robust to aky q ν 1,ν 2, because (u n ) can get unbounded no matter how close ν 1,2 are to 1. Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 10 / 13
20 Quantizer Q Parameter α: Q α (u n, u n+1 ) := q(u n + αu n+1 ) Choice α = 1: no multipliers Proposition Let T Q1 as above and R Q1 := [0, 1] 2. Then T Q1 (R Q1 ) = R Q1. Accuracy of multiplier: α α Accuracy of quantizer: aky bit-quantizer q ν 1,ν 2, ν 1 < ν 2 : 0, if u < ν 1, q ν 1,ν 2 (u) := 1, if u > ν 2, 0 or 1, if u [ν 1, ν 2 ] Q 1 is not robust to aky q ν 1,ν 2, because (u n ) can get unbounded no matter how close ν 1,2 are to 1. Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 10 / 13
21 Quantizer Q: Choices α > 1 Proposition Let 0 µ (2φ 2 (φ + 2)) Then exists set R µ and ranges of choices of α, ν 1, ν 2 such that T ν Q 1,ν 2 (R α µ ) R µ + B µ. Imagine ugly inequalities for α min,max, ν min,max (µ) here. Additive noise: u n+2 := u n + u n+1 b n + ɛ n Theorem Let µ, α min,max (µ) as above. For every α (α min (µ), α max (µ)) there exists ν 1 < ν 2 and η > 0 such that GRE with Q ν 1,ν 2 α is stable for α α < η and ɛ n < µ. Stable encoder = the encoding converges, but the string (b n ) need not to represent x. Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 11 / 13
22 Quantizer Q: Choices α > 1 Proposition Let 0 µ (2φ 2 (φ + 2)) Then exists set R µ and ranges of choices of α, ν 1, ν 2 such that T ν Q 1,ν 2 (R α µ ) R µ + B µ. Imagine ugly inequalities for α min,max, ν min,max (µ) here. Additive noise: u n+2 := u n + u n+1 b n + ɛ n Theorem Let µ, α min,max (µ) as above. For every α (α min (µ), α max (µ)) there exists ν 1 < ν 2 and η > 0 such that GRE with Q ν 1,ν 2 α is stable for α α < η and ɛ n < µ. Stable encoder = the encoding converges, but the string (b n ) need not to represent x. Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 11 / 13
23 Quantizer Q: Choices α > 1 Proposition Let 0 µ (2φ 2 (φ + 2)) Then exists set R µ and ranges of choices of α, ν 1, ν 2 such that T ν Q 1,ν 2 (R α µ ) R µ + B µ. Imagine ugly inequalities for α min,max, ν min,max (µ) here. Additive noise: u n+2 := u n + u n+1 b n + ɛ n Theorem Let µ, α min,max (µ) as above. For every α (α min (µ), α max (µ)) there exists ν 1 < ν 2 and η > 0 such that GRE with Q ν 1,ν 2 α is stable for α α < η and ɛ n < µ. Stable encoder = the encoding converges, but the string (b n ) need not to represent x. Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 11 / 13
24 Conclusion We constructed a A/D encoder with: 1 exponential accuracy 2 robustness with respect to multiplication and quantization 3 the usage of a Golden ratio :--) Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 12 / 13
25 References 1 I. Daubechies; Ö. Ylmaz. Robust and practical analog-to-digital conversion with exponential precision. IEEE Trans. Inform. Theory 52 (2006), no. 8, I. Daubechies, C.S. Güntürk, Y. Wang, Ö. Ylmaz. The Golden Ratio Encoder. arxiv: , 7 Sep 2008 Tom Hejda (CTU) Golden Ratio Encoder Frysava '11 13 / 13
Möbius numeration systems with discrete groups
Möbius numeration systems with discrete groups Bc. Tomáš Hejda Supervisor: Prof. Petr Kůrka, CTS, ASCR & Charles University Master s Thesis, June 2012 Tomáš Hejda (FNSPE CTU) Möbius numeration systems
More informationarxiv: v1 [math.na] 6 Jun 2008
On Robustness Properties of Beta Encoders and Golden Ratio Encoders Rachel Ward arxiv:0806.083v [math.na] 6 Jun 2008 March 8, 208 Abstract The beta-encoder was recently proposed as a quantization scheme
More informationThe Golden Ratio Encoder
The Golden Ratio Encoder Ingrid Daubechies, C. Sinan Güntürk, Yang Wang, and Özgür Yılmaz 1 Abstract This paper proposes a novel Nyquist-rate analog-to-digital (A/D) conversion algorithm which achieves
More informationFinite Frame Quantization
Finite Frame Quantization Liam Fowl University of Maryland August 21, 2018 1 / 38 Overview 1 Motivation 2 Background 3 PCM 4 First order Σ quantization 5 Higher order Σ quantization 6 Alternative Dual
More informationANALOG-to-digital (A/D) conversion consists of two
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 8, AUGUST 2006 3533 Robust and Practical Analog-to-Digital Conversion With Exponential Precision Ingrid Daubechies, Fellow, IEEE, and Özgür Yılmaz,
More informationOn the negative base greedy and lazy representations
On the negative base greedy and lazy representations Tomáš Hejda,, Zuzana Masáková, Edita Pelantová June 01 Abstract We consider positional numeration systems with negative real base β, where β > 1, and
More informationLast week: proétale topology on X, with a map of sites ν : X proét X ét. Sheaves on X proét : O + X = ν O + X ét
INTEGRAL p-adi HODGE THEORY, TALK 3 (RATIONAL p-adi HODGE THEORY I, THE PRIMITIVE OMPARISON THEOREM) RAFFAEL SINGER (NOTES BY JAMES NEWTON) 1. Recap We x /Q p complete and algebraically closed, with tilt
More informationThe Golden Ratio Encoder Ingrid Daubechies, Fellow, IEEE, C. Sinan Güntürk, Yang Wang, and Özgür Yılmaz, Member, IEEE
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 56, NO 10, OCTOBER 2010 5097 The Golden Ratio Encoder Ingrid Daubechies, Fellow, IEEE, C Sinan Güntürk, Yang Wang, and Özgür Yılmaz, Member, IEEE Abstract This
More informationDiscrete Mathematics and Logic II. Regular Sets
Discrete Mathematics and Logic II. Regular Sets SFWR ENG 2FA3 Ryszard Janicki Winter 24 Acknowledgments: Material based on Automata and Computability by Dexter C. Kozen (Chapter 4). Ryszard Janicki Discrete
More informationAPPROXIMATING A BANDLIMITED FUNCTION USING VERY COARSELY QUANTIZED DATA: IMPROVED ERROR ESTIMATES IN SIGMA-DELTA MODULATION
APPROXIMATING A BANDLIMITED FUNCTION USING VERY COARSELY QUANTIZED DATA: IMPROVED ERROR ESTIMATES IN SIGMA-DELTA MODULATION C. SİNAN GÜNTÜRK Abstract. Sigma-delta quantization is a method of representing
More information4.6 Montel's Theorem. Robert Oeckl CA NOTES 7 17/11/2009 1
Robert Oeckl CA NOTES 7 17/11/2009 1 4.6 Montel's Theorem Let X be a topological space. We denote by C(X) the set of complex valued continuous functions on X. Denition 4.26. A topological space is called
More informationPreface These notes were prepared on the occasion of giving a guest lecture in David Harel's class on Advanced Topics in Computability. David's reques
Two Lectures on Advanced Topics in Computability Oded Goldreich Department of Computer Science Weizmann Institute of Science Rehovot, Israel. oded@wisdom.weizmann.ac.il Spring 2002 Abstract This text consists
More informationDistributed Noise Shaping of Signal Quantization
1 / 37 Distributed Noise Shaping of Signal Quantization Kung-Ching Lin Norbert Wiener Center Department of Mathematics University of Maryland, College Park September 18, 2017 2 / 37 Overview 1 Introduction
More informationExamples. 2-input, 1-output discrete-time systems: 1-input, 1-output discrete-time systems:
Discrete-Time s - I Time-Domain Representation CHAPTER 4 These lecture slides are based on "Digital Signal Processing: A Computer-Based Approach, 4th ed." textbook by S.K. Mitra and its instructor materials.
More informationDistributed estimation based on multi-hop subspace decomposition
Distributed estimation based on multi-hop subspace decomposition Luca Zaccarian 2,3 Joint work with A.R. del Nozal 1, P. Millán 1, L. Orihuela 1, A. Seuret 2 1 Departamento de Ingeniería, Universidad Loyola
More informationThe Method of Types and Its Application to Information Hiding
The Method of Types and Its Application to Information Hiding Pierre Moulin University of Illinois at Urbana-Champaign www.ifp.uiuc.edu/ moulin/talks/eusipco05-slides.pdf EUSIPCO Antalya, September 7,
More informationČasopis pro pěstování matematiky a fysiky
Časopis pro pěstování matematiky a fysiky Felix Adalbert Behrend On sequences of integers containing no arithmetic progression Časopis pro pěstování matematiky a fysiky, Vol. 67 (1938), No. 4, 235--239
More informationFinite Frames and Sigma Delta Quantization
Finite Frames and Sigma Delta Quantization with Matt Fickus Alex Powell and Özgür Yilmaz Aram Tangboondouangjit Finite Frames and Sigma Delta Quantization p.1/57 Frames Frames F = {e n } N n=1 for d-dimensional
More informationNew Minimal Weight Representations for Left-to-Right Window Methods
New Minimal Weight Representations for Left-to-Right Window Methods James A. Muir 1 and Douglas R. Stinson 2 1 Department of Combinatorics and Optimization 2 School of Computer Science University of Waterloo
More informationKybernetika. Tomáš Hejda; Zuzana Masáková; Edita Pelantová Greedy and lazy representations in negative base systems. Terms of use:
Kybernetika Tomáš Hejda; Zuzana Masáková; Edita Pelantová Greedy and lazy representations in negative base systems Kybernetika, Vol. 49 (03), No., 58 79 Persistent URL: http://dml.cz/dmlcz/43367 Terms
More informationCSE 1400 Applied Discrete Mathematics Definitions
CSE 1400 Applied Discrete Mathematics Definitions Department of Computer Sciences College of Engineering Florida Tech Fall 2011 Arithmetic 1 Alphabets, Strings, Languages, & Words 2 Number Systems 3 Machine
More informationEfficient Metastability-Containing Gray Code 2-sort
Efficient Metastability-Containing Gray Code 2-sort Moti Medina Joint work with Christoph Lenzen Max Planck Institute For Informatics, Saarbrucken, Germany ASYNC 206 In The Beginning there was Metastability
More informationMath 324 Summer 2012 Elementary Number Theory Notes on Mathematical Induction
Math 4 Summer 01 Elementary Number Theory Notes on Mathematical Induction Principle of Mathematical Induction Recall the following axiom for the set of integers. Well-Ordering Axiom for the Integers If
More informationarxiv: v8 [stat.co] 28 Jan 2018
OPTIMAL QUANTIZATION FOR NONUNIFORM CANTOR DISTRIBUTIONS LAKSHMI ROYCHOWDHURY arxiv:151.00379v8 [stat.co] 8 Jan 018 Abstract. Let P be a Borel probability measure on R such that P = 1 4 P S 1 1 + 3 4 P
More informationEE376A - Information Theory Final, Monday March 14th 2016 Solutions. Please start answering each question on a new page of the answer booklet.
EE376A - Information Theory Final, Monday March 14th 216 Solutions Instructions: You have three hours, 3.3PM - 6.3PM The exam has 4 questions, totaling 12 points. Please start answering each question on
More informationHow do computers represent numbers?
How do computers represent numbers? Tips & Tricks Week 1 Topics in Scientific Computing QMUL Semester A 2017/18 1/10 What does digital mean? The term DIGITAL refers to any device that operates on discrete
More informationTowards control over fading channels
Towards control over fading channels Paolo Minero, Massimo Franceschetti Advanced Network Science University of California San Diego, CA, USA mail: {minero,massimo}@ucsd.edu Invited Paper) Subhrakanti
More informationMATH2111 Higher Several Variable Calculus Week 2
MATH2111 Higher Several Variable Calculus Week 2 Dr Denis Potapov School of Mathematics and Statistics University of New South Wales Semester 1, 2016 [updated: March 8, 2016] D Potapov (UNSW Maths & Stats)
More informationA/D Conversion with Imperfect Quantizers
A/D Conversion with Imperfect Quantizers Ingrid Daubechies, Ronald DeVore, C. Sinan Güntürk and Vinay Vaishampayan Abstract This paper analyzes mathematically the effect of quantizer threshold imperfection
More informationLecture 8: Semidefinite programs for fidelity and optimal measurements
CS 766/QIC 80 Theory of Quantum Information (Fall 0) Lecture 8: Semidefinite programs for fidelity and optimal measurements This lecture is devoted to two examples of semidefinite programs: one is for
More informationarxiv: v1 [cs.it] 21 Feb 2013
q-ary Compressive Sensing arxiv:30.568v [cs.it] Feb 03 Youssef Mroueh,, Lorenzo Rosasco, CBCL, CSAIL, Massachusetts Institute of Technology LCSL, Istituto Italiano di Tecnologia and IIT@MIT lab, Istituto
More informationCircuit depth relative to a random oracle. Peter Bro Miltersen. Aarhus University, Computer Science Department
Circuit depth relative to a random oracle Peter Bro Miltersen Aarhus University, Computer Science Department Ny Munkegade, DK 8000 Aarhus C, Denmark. pbmiltersen@daimi.aau.dk Keywords: Computational complexity,
More informationNational University of Singapore Department of Electrical & Computer Engineering. Examination for
National University of Singapore Department of Electrical & Computer Engineering Examination for EE5139R Information Theory for Communication Systems (Semester I, 2014/15) November/December 2014 Time Allowed:
More informationEE376A: Homework #2 Solutions Due by 11:59pm Thursday, February 1st, 2018
Please submit the solutions on Gradescope. Some definitions that may be useful: EE376A: Homework #2 Solutions Due by 11:59pm Thursday, February 1st, 2018 Definition 1: A sequence of random variables X
More informationIntroduction and mathematical preliminaries
Chapter Introduction and mathematical preliminaries Contents. Motivation..................................2 Finite-digit arithmetic.......................... 2.3 Errors in numerical calculations.....................
More informationCOVARIANCE CALCULATION FOR FLOATING POINT STATE SPACE REALIZATIONS
opyright 2002 IFA 15th riennial World ongress, Barcelona, Spain OVARIANE ALULAION FOR FLOAING POIN SAE SPAE REALIZAIONS Sangho Ko,1 Robert R Bitmead,1 Department of Mechanical and Aerospace Engineering,
More informationMATH 324 Summer 2011 Elementary Number Theory. Notes on Mathematical Induction. Recall the following axiom for the set of integers.
MATH 4 Summer 011 Elementary Number Theory Notes on Mathematical Induction Principle of Mathematical Induction Recall the following axiom for the set of integers. Well-Ordering Axiom for the Integers If
More informationUNIVERSITY OF DUBLIN
UNIVERSITY OF DUBLIN TRINITY COLLEGE FACULTY OF ENGINEERING, MATHEMATICS & SCIENCE SCHOOL OF ENGINEERING Electronic & Electrical Engineering Junior Sophister Engineering Trinity Term, 2015 Annual Examinations
More informationLecture 12. Block Diagram
Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data
More informationOctober 7, :8 WSPC/WS-IJWMIP paper. Polynomial functions are renable
International Journal of Wavelets, Multiresolution and Information Processing c World Scientic Publishing Company Polynomial functions are renable Henning Thielemann Institut für Informatik Martin-Luther-Universität
More information54 D. S. HOODA AND U. S. BHAKER Belis and Guiasu [2] observed that a source is not completely specied by the probability distribution P over the sourc
SOOCHOW JOURNAL OF MATHEMATICS Volume 23, No. 1, pp. 53-62, January 1997 A GENERALIZED `USEFUL' INFORMATION MEASURE AND CODING THEOREMS BY D. S. HOODA AND U. S. BHAKER Abstract. In the present communication
More informationLecture 14 - P v.s. NP 1
CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) February 27, 2018 Lecture 14 - P v.s. NP 1 In this lecture we start Unit 3 on NP-hardness and approximation
More informationRelative entropies, suitable weak solutions, and weak-strong uniqueness for the compressible Navier-Stokes system
Relative entropies, suitable weak solutions, and weak-strong uniqueness for the compressible Navier-Stokes system Institute of Mathematics, Academy of Sciences of the Czech Republic, Prague joint work
More informationAppendix. Title. Petr Lachout MFF UK, ÚTIA AV ČR
Title ROBUST - Kráĺıky - únor, 2010 Definice Budeme se zabývat optimalizačními úlohami. Uvažujme metrický prostor X a funkci f : X R = [, + ]. Zajímá nás minimální hodnota funkce f na X ϕ (f ) = inf {f
More informationExtremal problems in logic programming and stable model computation Pawe l Cholewinski and Miros law Truszczynski Computer Science Department Universi
Extremal problems in logic programming and stable model computation Pawe l Cholewinski and Miros law Truszczynski Computer Science Department University of Kentucky Lexington, KY 40506-0046 fpaweljmirekg@cs.engr.uky.edu
More informationFinding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms
Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms Vladimir Bayev Abstract. Low degree annihilators for Boolean functions are of great interest in cryptology because of
More informationA large deviation principle for a RWRC in a box
A large deviation principle for a RWRC in a box 7th Cornell Probability Summer School Michele Salvi TU Berlin July 12, 2011 Michele Salvi (TU Berlin) An LDP for a RWRC in a nite box July 12, 2011 1 / 15
More informationarxiv: v2 [cs.ds] 17 Sep 2017
Two-Dimensional Indirect Binary Search for the Positive One-In-Three Satisfiability Problem arxiv:1708.08377v [cs.ds] 17 Sep 017 Shunichi Matsubara Aoyama Gakuin University, 5-10-1, Fuchinobe, Chuo-ku,
More informationHow to Pop a Deep PDA Matters
How to Pop a Deep PDA Matters Peter Leupold Department of Mathematics, Faculty of Science Kyoto Sangyo University Kyoto 603-8555, Japan email:leupold@cc.kyoto-su.ac.jp Abstract Deep PDA are push-down automata
More informationSupport Detection in Super-resolution
Support Detection in Super-resolution Carlos Fernandez-Granda (Stanford University) 7/2/2013 SampTA 2013 Support Detection in Super-resolution C. Fernandez-Granda 1 / 25 Acknowledgements This work was
More informationApplications and fundamental results on random Vandermon
Applications and fundamental results on random Vandermonde matrices May 2008 Some important concepts from classical probability Random variables are functions (i.e. they commute w.r.t. multiplication)
More informationAn introduction to basic information theory. Hampus Wessman
An introduction to basic information theory Hampus Wessman Abstract We give a short and simple introduction to basic information theory, by stripping away all the non-essentials. Theoretical bounds on
More informationL -Bounded Robust Control of Nonlinear Cascade Systems
L -Bounded Robust Control of Nonlinear Cascade Systems Shoudong Huang M.R. James Z.P. Jiang August 19, 2004 Accepted by Systems & Control Letters Abstract In this paper, we consider the L -bounded robust
More informationNumber Representation and Waveform Quantization
1 Number Representation and Waveform Quantization 1 Introduction This lab presents two important concepts for working with digital signals. The first section discusses how numbers are stored in memory.
More informationStochastic Dynamic Programming. Jesus Fernandez-Villaverde University of Pennsylvania
Stochastic Dynamic Programming Jesus Fernande-Villaverde University of Pennsylvania 1 Introducing Uncertainty in Dynamic Programming Stochastic dynamic programming presents a very exible framework to handle
More informationthe station can send one of t code packets, transmitting one binary symbol for the time unit. Let > 0 be a xed parameter. Put p = =M, 0 < p < 1. Suppo
Superimposed Codes and ALOHA system Arkady G. D'yachkov, Vyacheslav V. Rykov Moscow State University, Faculty of Mechanics and Mathematics, Department of Probability Theory, Moscow, 119899, Russia, Email:
More informationAnalog Neural Nets with Gaussian or other Common. Noise Distributions cannot Recognize Arbitrary. Regular Languages.
Analog Neural Nets with Gaussian or other Common Noise Distributions cannot Recognize Arbitrary Regular Languages Wolfgang Maass Inst. for Theoretical Computer Science, Technische Universitat Graz Klosterwiesgasse
More informationPoisson-Lie T-Duality and supermanifolds
Poisson-Lie T-Duality and supermanifolds L. Hlavatý, I. Petr, V. Štěpán, J. Vysoký Department of Physics, Faculty of Nuclear Sciences and Physical Engineering, Czech Technical University in Prague IPM
More informationHomework 4, 5, 6 Solutions. > 0, and so a n 0 = n + 1 n = ( n+1 n)( n+1+ n) 1 if n is odd 1/n if n is even diverges.
2..2(a) lim a n = 0. Homework 4, 5, 6 Solutions Proof. Let ɛ > 0. Then for n n = 2+ 2ɛ we have 2n 3 4+ ɛ 3 > ɛ > 0, so 0 < 2n 3 < ɛ, and thus a n 0 = 2n 3 < ɛ. 2..2(g) lim ( n + n) = 0. Proof. Let ɛ >
More informationDoes soft-decision ECC improve endurance?
Flash Memory Summit 2015 Does soft-decision ECC improve endurance? Thomas Parnell IBM Research - Zurich Outline Motivation Why do we need more endurance? Capacity What is channel capacity? How can it be
More informationEE-597 Notes Quantization
EE-597 Notes Quantization Phil Schniter June, 4 Quantization Given a continuous-time and continuous-amplitude signal (t, processing and storage by modern digital hardware requires discretization in both
More informationSolutions to Problem Set 5
UC Berkeley, CS 74: Combinatorics and Discrete Probability (Fall 00 Solutions to Problem Set (MU 60 A family of subsets F of {,,, n} is called an antichain if there is no pair of sets A and B in F satisfying
More informationCS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding
CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding Tim Roughgarden October 29, 2014 1 Preamble This lecture covers our final subtopic within the exact and approximate recovery part of the course.
More informationON THE COMPUTABILITY OF PERFECT SUBSETS OF SETS WITH POSITIVE MEASURE
ON THE COMPUTABILITY OF PERFECT SUBSETS OF SETS WITH POSITIVE MEASURE C. T. CHONG, WEI LI, WEI WANG, AND YUE YANG Abstract. A set X 2 ω with positive measure contains a perfect subset. We study such perfect
More informationMODULAR ARITHMETIC I
MODULAR ARITHMETIC I. Modular Arithmetic and Check Digit Schemes The check digit schemes that we have been studying have some features in common. Certain information (book title publisher etc., personal
More informationIE 5531: Engineering Optimization I
IE 5531: Engineering Optimization I Lecture 14: Unconstrained optimization Prof. John Gunnar Carlsson October 27, 2010 Prof. John Gunnar Carlsson IE 5531: Engineering Optimization I October 27, 2010 1
More informationNotes for Lecture 3... x 4
Stanford University CS254: Computational Complexity Notes 3 Luca Trevisan January 14, 2014 Notes for Lecture 3 In this lecture we introduce the computational model of boolean circuits and prove that polynomial
More informationAbout the relationship between formal logic and complexity classes
About the relationship between formal logic and complexity classes Working paper Comments welcome; my email: armandobcm@yahoo.com Armando B. Matos October 20, 2013 1 Introduction We analyze a particular
More information80DB A 40DB 0DB DB
Stability Analysis On the Nichols Chart and Its Application in QFT Wenhua Chen and Donald J. Ballance Centre for Systems & Control Department of Mechanical Engineering University of Glasgow Glasgow G12
More informationDispersion of the Gilbert-Elliott Channel
Dispersion of the Gilbert-Elliott Channel Yury Polyanskiy Email: ypolyans@princeton.edu H. Vincent Poor Email: poor@princeton.edu Sergio Verdú Email: verdu@princeton.edu Abstract Channel dispersion plays
More informationUncertainity, Information, and Entropy
Uncertainity, Information, and Entropy Probabilistic experiment involves the observation of the output emitted by a discrete source during every unit of time. The source output is modeled as a discrete
More informationNyquist-Rate D/A Converters. D/A Converter Basics.
Nyquist-Rate D/A Converters David Johns and Ken Martin (johns@eecg.toronto.edu) (martin@eecg.toronto.edu) slide 1 of 20 D/A Converter Basics. B in D/A is a digital signal (or word), B in b i B in = 2 1
More informationCS1800: Mathematical Induction. Professor Kevin Gold
CS1800: Mathematical Induction Professor Kevin Gold Induction: Used to Prove Patterns Just Keep Going For an algorithm, we may want to prove that it just keeps working, no matter how big the input size
More informationwhich possibility holds in an ensemble with a given a priori probability p k log 2
ALGORITHMIC INFORMATION THEORY Encyclopedia of Statistical Sciences, Volume 1, Wiley, New York, 1982, pp. 38{41 The Shannon entropy* concept of classical information theory* [9] is an ensemble notion it
More informationLattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function
Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function Dinesh Krithivasan and S. Sandeep Pradhan Department of Electrical Engineering and Computer Science,
More informationSpurious Chaotic Solutions of Dierential. Equations. Sigitas Keras. September Department of Applied Mathematics and Theoretical Physics
UNIVERSITY OF CAMBRIDGE Numerical Analysis Reports Spurious Chaotic Solutions of Dierential Equations Sigitas Keras DAMTP 994/NA6 September 994 Department of Applied Mathematics and Theoretical Physics
More informationSolution of the 7 th Homework
Solution of the 7 th Homework Sangchul Lee December 3, 2014 1 Preliminary In this section we deal with some facts that are relevant to our problems but can be coped with only previous materials. 1.1 Maximum
More informationJoint Optimum Bitwise Decomposition of any. Memoryless Source to be Sent over a BSC. Ecole Nationale Superieure des Telecommunications URA CNRS 820
Joint Optimum Bitwise Decomposition of any Memoryless Source to be Sent over a BSC Seyed Bahram Zahir Azami, Pierre Duhamel 2 and Olivier Rioul 3 cole Nationale Superieure des Telecommunications URA CNRS
More informationOptimization over Sparse Symmetric Sets via a Nonmonotone Projected Gradient Method
Optimization over Sparse Symmetric Sets via a Nonmonotone Projected Gradient Method Zhaosong Lu November 21, 2015 Abstract We consider the problem of minimizing a Lipschitz dierentiable function over a
More informationDecidability of Existence and Construction of a Complement of a given function
Decidability of Existence and Construction of a Complement of a given function Ka.Shrinivaasan, Chennai Mathematical Institute (CMI) (shrinivas@cmi.ac.in) April 28, 2011 Abstract This article denes a complement
More informationCompressibility of Infinite Sequences and its Interplay with Compressed Sensing Recovery
Compressibility of Infinite Sequences and its Interplay with Compressed Sensing Recovery Jorge F. Silva and Eduardo Pavez Department of Electrical Engineering Information and Decision Systems Group Universidad
More informationADDENDUM B: CONSTRUCTION OF R AND THE COMPLETION OF A METRIC SPACE
ADDENDUM B: CONSTRUCTION OF R AND THE COMPLETION OF A METRIC SPACE ANDREAS LEOPOLD KNUTSEN Abstract. These notes are written as supplementary notes for the course MAT11- Real Analysis, taught at the University
More informationEE 521: Instrumentation and Measurements
Aly El-Osery Electrical Engineering Department, New Mexico Tech Socorro, New Mexico, USA September 23, 2009 1 / 18 1 Sampling 2 Quantization 3 Digital-to-Analog Converter 4 Analog-to-Digital Converter
More informationSome Results Concerning Uniqueness of Triangle Sequences
Some Results Concerning Uniqueness of Triangle Sequences T. Cheslack-Postava A. Diesl M. Lepinski A. Schuyler August 12 1999 Abstract In this paper we will begin by reviewing the triangle iteration. We
More informationCourse Notes for EE227C (Spring 2018): Convex Optimization and Approximation
Course Notes for EE7C (Spring 018): Convex Optimization and Approximation Instructor: Moritz Hardt Email: hardt+ee7c@berkeley.edu Graduate Instructor: Max Simchowitz Email: msimchow+ee7c@berkeley.edu February
More informationIntroduction to Bandit Algorithms. Introduction to Bandit Algorithms
Stochastic K-Arm Bandit Problem Formulation Consider K arms (actions) each correspond to an unknown distribution {ν k } K k=1 with values bounded in [0, 1]. At each time t, the agent pulls an arm I t {1,...,
More informationQM1 - Tutorial 1 The Bohr Atom and Mathematical Introduction
QM - Tutorial The Bohr Atom and Mathematical Introduction 26 October 207 Contents Bohr Atom. Energy of a Photon - The Photo Electric Eect.................................2 The Discrete Energy Spectrum
More informationMARKOV CHAINS: STATIONARY DISTRIBUTIONS AND FUNCTIONS ON STATE SPACES. Contents
MARKOV CHAINS: STATIONARY DISTRIBUTIONS AND FUNCTIONS ON STATE SPACES JAMES READY Abstract. In this paper, we rst introduce the concepts of Markov Chains and their stationary distributions. We then discuss
More informationHIGHER ORDER SLIDING MODES AND ARBITRARY-ORDER EXACT ROBUST DIFFERENTIATION
HIGHER ORDER SLIDING MODES AND ARBITRARY-ORDER EXACT ROBUST DIFFERENTIATION A. Levant Institute for Industrial Mathematics, 4/24 Yehuda Ha-Nachtom St., Beer-Sheva 843, Israel Fax: +972-7-232 and E-mail:
More informationIndex coding with side information
Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated
More informationThe Extension of the Theorem of J. W. Garrett, C. S. Rees and C. V. Stanojevic from One Dimension to Two Dimension
Int. Journal of Math. Analysis, Vol. 3, 29, no. 26, 1251-1257 The Extension of the Theorem of J. W. Garrett, C. S. Rees and C. V. Stanojevic from One Dimension to Two Dimension Jatinderdeep Kaur School
More informationSoft-Output Trellis Waveform Coding
Soft-Output Trellis Waveform Coding Tariq Haddad and Abbas Yongaçoḡlu School of Information Technology and Engineering, University of Ottawa Ottawa, Ontario, K1N 6N5, Canada Fax: +1 (613) 562 5175 thaddad@site.uottawa.ca
More informationA proof of the existence of good nested lattices
A proof of the existence of good nested lattices Dinesh Krithivasan and S. Sandeep Pradhan July 24, 2007 1 Introduction We show the existence of a sequence of nested lattices (Λ (n) 1, Λ(n) ) with Λ (n)
More informationFrom Fractional Brownian Motion to Multifractional Brownian Motion
From Fractional Brownian Motion to Multifractional Brownian Motion Antoine Ayache USTL (Lille) Antoine.Ayache@math.univ-lille1.fr Cassino December 2010 A.Ayache (USTL) From FBM to MBM Cassino December
More informationPractical Polar Code Construction Using Generalised Generator Matrices
Practical Polar Code Construction Using Generalised Generator Matrices Berksan Serbetci and Ali E. Pusane Department of Electrical and Electronics Engineering Bogazici University Istanbul, Turkey E-mail:
More informationNUMBERS WITH INTEGER COMPLEXITY CLOSE TO THE LOWER BOUND
#A1 INTEGERS 12A (2012): John Selfridge Memorial Issue NUMBERS WITH INTEGER COMPLEXITY CLOSE TO THE LOWER BOUND Harry Altman Department of Mathematics, University of Michigan, Ann Arbor, Michigan haltman@umich.edu
More informationFlags of almost ane codes
Flags of almost ane codes Trygve Johnsen Hugues Verdure April 0, 207 Abstract We describe a two-party wire-tap channel of type II in the framework of almost ane codes. Its cryptological performance is
More informationu = λ u 2 in Ω (1) u = 1 on Ω (2)
METHODS AND APPLICATIONS OF ANALYSIS. c 8 International Press Vol. 15, No. 3, pp. 37 34, September 8 4 SYMMETRY ANALYSIS OF A CANONICAL MEMS MODEL J. REGAN BECKHAM AND JOHN A. PELESKO Abstract. A canonical
More informationNotes for Math 290 using Introduction to Mathematical Proofs by Charles E. Roberts, Jr.
Notes for Math 290 using Introduction to Mathematical Proofs by Charles E. Roberts, Jr. Chapter : Logic Topics:. Statements, Negation, and Compound Statements.2 Truth Tables and Logical Equivalences.3
More informationSignal types. Signal characteristics: RMS, power, db Probability Density Function (PDF). Analogue-to-Digital Conversion (ADC).
Signal types. Signal characteristics:, power, db Probability Density Function (PDF). Analogue-to-Digital Conversion (ADC). Signal types Stationary (average properties don t vary with time) Deterministic
More information