期刊文献+
共找到49篇文章
< 1 2 3 >
每页显示 20 50 100
CONSTRUCTION OF SOME KIESSWETTER-LIKE FUNCTIONS-THE CONTINUOUS BUT NON-DIFFERENT-IABLE FUNCTION DEFINED BY QUINARY DECIMAL 被引量:1
1
作者 TieYong YangGuangjun 《Analysis in Theory and Applications》 2004年第1期58-68,共11页
In this paper, we construct some continuous but non-differentiable functions defined by quinary dec-imal, that are Kiesswetter-like functions. We discuss their properties, then investigate the Hausdorff dimensions of ... In this paper, we construct some continuous but non-differentiable functions defined by quinary dec-imal, that are Kiesswetter-like functions. We discuss their properties, then investigate the Hausdorff dimensions of graphs of these functions and give a detailed proof. 展开更多
关键词 Kiesswetter-like functions continuous but non-differentiable quinary decimal iterated function system inequality Hausdorff dimension
下载PDF
颅骨切除减压治疗恶性大脑中动脉梗死试验(DECIMAL) 被引量:1
2
作者 曲东锋 《国外医学(脑血管疾病分册)》 2004年第4期281-281,共1页
试验状态:从2003年11月开始,已纳入18例患者。试验目的:评价偏侧颅骨切除减压和硬膜成形术在恶性大脑中动脉(MCA)区梗死患者中的作用。试验设计:多中心随机对照试验。
关键词 颅骨切除减压 外科治疗 恶性大脑动脉梗死 试验 decimal 硬膜成形术
下载PDF
A New Evolutionary Algorithm Based on the Decimal Coding
3
作者 Dong Wen-yong, Li Yuan-xiang, Zheng Bo-jin, Zen San-you, Zhang Jin-bo State Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072,Hubei, China 《Wuhan University Journal of Natural Sciences》 CAS 2002年第2期150-156,共7页
Traditional Evolutionary Algorithm (EAs) is based on the binary code, real number code, structure code and so on. But these coding strategies have their own advantages and disadvantages for the optimization of functio... Traditional Evolutionary Algorithm (EAs) is based on the binary code, real number code, structure code and so on. But these coding strategies have their own advantages and disadvantages for the optimization of functions. In this paper a new Decimal Coding Strategy (DCS), which is convenient for space division and alterable precision, was proposed, and the theory analysis of its implicit parallelism and convergence was also discussed. We also redesign several genetic operators for the decimal code. In order to utilize the historial information of the existing individuals in the process of evolution and avoid repeated exploring, the strategies of space shrinking and precision alterable, are adopted. Finally, the evolutionary algorithm based on decimal coding (DCEAs) was applied to the optimization of functions, the optimization of parameter, mixed-integer nonlinear programming. Comparison with traditional GAs was made and the experimental results show that the performances of DCEAS are better than the tradition GAs. 展开更多
关键词 evolutionary algorithm function optimize genetic algorithm decimal coding CLC number TP 301.6
下载PDF
Dissociated neural potential for processing strategies between decimals and fractions
4
作者 Lin Pingting Zhu Yanmei +2 位作者 Zhang Li Bai Yi Wang Haixian 《Journal of Southeast University(English Edition)》 EI CAS 2021年第4期379-387,共9页
The entity and symbolic fraction comparison tasks separating identification and semantic access stages based on event-related potential technology were used to investigate neural differences between fraction and decim... The entity and symbolic fraction comparison tasks separating identification and semantic access stages based on event-related potential technology were used to investigate neural differences between fraction and decimal strategies in magnitude processing of nonsymbolic entities and symbolic numbers.The experimental results show that continuous entities elicit stronger left-lateralized anterior N2 in decimals,while discretized ones elicit more significant right-lateralized posterior N2 in fractions during the identification stage.On the other hand,decimals elicit stronger N2 over the left-lateralized fronto-central sites while fractions elicit the more profound P2 over the right-lateralized fronto-central sites and N2 at biparietal regions during the semantic access stage.Hence,for nonsymbolic entity processing,alignments of decimals and continuous entities activate the phonological network,while alignments of fractions and discretized entities trigger the visuospatial regions.For symbolic numbers processing,exact strategies with rote arithmetic retrieval in verbal format are used in decimal processing,while approximate strategies with complex magnitude processing in a visuospatial format are used in fraction processing. 展开更多
关键词 decimal FRACTION exact strategy approximate strategy event-related potential(ERP) P2 N2
下载PDF
Automatic Classification of Swedish Metadata Using Dewey Decimal Classification:A Comparison of Approaches
5
作者 Koraljka Golub Johan Hagelback Anders Ardo 《Journal of Data and Information Science》 CSCD 2020年第1期18-38,共21页
Purpose:With more and more digital collections of various information resources becoming available,also increasing is the challenge of assigning subject index terms and classes from quality knowledge organization syst... Purpose:With more and more digital collections of various information resources becoming available,also increasing is the challenge of assigning subject index terms and classes from quality knowledge organization systems.While the ultimate purpose is to understand the value of automatically produced Dewey Decimal Classification(DDC)classes for Swedish digital collections,the paper aims to evaluate the performance of six machine learning algorithms as well as a string-matching algorithm based on characteristics of DDC.Design/methodology/approach:State-of-the-art machine learning algorithms require at least 1,000 training examples per class.The complete data set at the time of research involved 143,838 records which had to be reduced to top three hierarchical levels of DDC in order to provide sufficient training data(totaling 802 classes in the training and testing sample,out of 14,413 classes at all levels).Findings:Evaluation shows that Support Vector Machine with linear kernel outperforms other machine learning algorithms as well as the string-matching algorithm on average;the string-matching algorithm outperforms machine learning for specific classes when characteristics of DDC are most suitable for the task.Word embeddings combined with different types of neural networks(simple linear network,standard neural network,1 D convolutional neural network,and recurrent neural network)produced worse results than Support Vector Machine,but reach close results,with the benefit of a smaller representation size.Impact of features in machine learning shows that using keywords or combining titles and keywords gives better results than using only titles as input.Stemming only marginally improves the results.Removed stop-words reduced accuracy in most cases,while removing less frequent words increased it marginally.The greatest impact is produced by the number of training examples:81.90%accuracy on the training set is achieved when at least 1,000 records per class are available in the training set,and 66.13%when too few records(often less than A Comparison of Approaches100 per class)on which to train are available—and these hold only for top 3 hierarchical levels(803 instead of 14,413 classes).Research limitations:Having to reduce the number of hierarchical levels to top three levels of DDC because of the lack of training data for all classes,skews the results so that they work in experimental conditions but barely for end users in operational retrieval systems.Practical implications:In conclusion,for operative information retrieval systems applying purely automatic DDC does not work,either using machine learning(because of the lack of training data for the large number of DDC classes)or using string-matching algorithm(because DDC characteristics perform well for automatic classification only in a small number of classes).Over time,more training examples may become available,and DDC may be enriched with synonyms in order to enhance accuracy of automatic classification which may also benefit information retrieval performance based on DDC.In order for quality information services to reach the objective of highest possible precision and recall,automatic classification should never be implemented on its own;instead,machine-aided indexing that combines the efficiency of automatic suggestions with quality of human decisions at the final stage should be the way for the future.Originality/value:The study explored machine learning on a large classification system of over 14,000 classes which is used in operational information retrieval systems.Due to lack of sufficient training data across the entire set of classes,an approach complementing machine learning,that of string matching,was applied.This combination should be explored further since it provides the potential for real-life applications with large target classification systems. 展开更多
关键词 LIBRIS Dewey decimal Classification Automatic classification Machine learning Support Vector Machine Multinomial Naive Bayes Simple linear network Standard neural network 1D convolutional neural network Recurrent neural network Word embeddings String matching
下载PDF
Search for Monic Irreducible Polynomials with Decimal Equivalents of Polynomials over Galois Field <I>GF</I>(<I>p<sup>q</sup></I>)
6
作者 Sankhanil Dey Ranjan Ghosh 《Open Journal of Discrete Mathematics》 2018年第1期21-33,共13页
Substitution boxes or S-boxes play a significant role in encryption and de-cryption of bit level plaintext and cipher-text respectively. Irreducible Poly-nomials (IPs) have been used to construct 4-bit or 8-bit substi... Substitution boxes or S-boxes play a significant role in encryption and de-cryption of bit level plaintext and cipher-text respectively. Irreducible Poly-nomials (IPs) have been used to construct 4-bit or 8-bit substitution boxes in many cryptographic block ciphers. In Advance Encryption Standard, the ele-ments of 8-bit S-box have been obtained from the Multiplicative Inverse (MI) of elemental polynomials (EPs) of the 1st IP over Galois field GF(28) by adding an additive element. In this paper, a mathematical method and the algorithm of the said method with the discussion of the execution time of the algorithm, to obtain monic IPs over Galois field GF(pq) have been illustrated with example. The method is very similar to polynomial multiplication of two polynomials over Galois field GF(pq) but has a difference in execution. The decimal equivalents of polynomials have been used to identify Basic Polynomials (BPs), EPs, IPs and Reducible polynomials (RPs). The monic RPs have been determined by this method and have been cancelled out to produce monic IPs. The non-monic IPs have been obtained with multiplication of α where?α∈ GF(pq)?and assume values from 2 to (p &#8722;1) to monic IPs. 展开更多
关键词 Finite FIELDS GALOIS FIELDS Irreducible POLYNOMIALS decimal EQUIVALENTS
下载PDF
Fast Signed-Digit Multi-operand Decimal Adders
7
作者 Jeff Rebacz Erdal Oruklu Jafar Saniie 《Circuits and Systems》 2011年第3期225-236,共12页
Decimal arithmetic is desirable for high precision requirements of many financial, industrial and scientific applications. Furthermore, hardware support for decimal arithmetic has gained momentum with IEEE 754-2008, w... Decimal arithmetic is desirable for high precision requirements of many financial, industrial and scientific applications. Furthermore, hardware support for decimal arithmetic has gained momentum with IEEE 754-2008, which standardized decimal floating-point. This paper presents a new architecture for two operand and multi-operand signed-digit decimal addition. Signed-digit architectures are advantageous because there are no carry-propagate chains. The proposed signed-digit adder reduces the critical path delay by parallelizing the correction stage inherent to decimal addition. For performance evaluation, we synthesize and compare multiple unsigned and signed-digit multi-operand decimal adder architectures on 0.18μm CMOS VLSI technology. Synthesis results for 2, 4, 8, and 16 operands with 8 decimal digits provide critical data in determining each adder's performance and scalability. 展开更多
关键词 Computer ARITHMETIC decimal ARITHMETIC Signed-Digit Multi-operand ADDER BCD
下载PDF
Exercises of Decimals
8
作者 钱怡凡 《疯狂英语(双语世界)》 2019年第2期31-34,共4页
关键词 Exercises of decimals
下载PDF
The Cumulative Method for Multiplication and Division
9
作者 Muna Mohammed Hammuda 《Applied Mathematics》 2024年第5期349-354,共6页
This paper provides a method of the process of computation called the cumulative method, it is based upon repeated cumulative process. The cumulative method is being adapted to the purposes of computation, particularl... This paper provides a method of the process of computation called the cumulative method, it is based upon repeated cumulative process. The cumulative method is being adapted to the purposes of computation, particularly multiplication and division. The operations of multiplication and division are represented by algebraic formulas. An advantage of the method is that the cumulative process can be performed on decimal numbers. The present paper aims to establish a basic and useful formula valid for the two fundamental arithmetic operations of multiplication and division. The new cumulative method proved to be more flexible and made it possible to extend the multiplication and division based on repeated addition/subtraction to decimal numbers. 展开更多
关键词 Multiplication and Division Cumulative Method Repeated Process decimal Numbers
下载PDF
Decimal Solvent-Based High-Entropy Electrolyte Enabling the Extended Survival Temperature of Lithium-Ion Batteries to−130°C 被引量:6
10
作者 Wei Zhang Huarong Xia +7 位作者 Zhiqiang Zhu Zhisheng Lv Shengkai Cao Jiaqi Wei Yifei Luo Yao Xiao Lin Liu Xiaodong Chen 《CCS Chemistry》 CAS 2021年第4期1245-1255,共11页
Freezing and crystallization of commercial ethylene carbonate-based binary electrolytes,leading to irreversible damage to lithium-ion batteries(LIBs),remain a significant challenge for the survival of energy storage d... Freezing and crystallization of commercial ethylene carbonate-based binary electrolytes,leading to irreversible damage to lithium-ion batteries(LIBs),remain a significant challenge for the survival of energy storage devices at extremely low temperatures(<−40°C).Herein,a decimal solvent-based high-entropy electrolyte is developed with an unprecedented low freezing point of−130°C to significantly extend the service temperature range of LIBs,far superior to−30°C of the commercial counterpart.Distinguished from conventional electrolytes,this molecularly disordered solvent mixture greatly suppresses the freezing crystallization of electrolytes,providing good protection for LIBs from possible mechanical damage at extremely low temperatures.Benefiting from this,our high-entropy electrolyte exhibits extraordinarily high ionic conductivity of 0.62 mS·cm−1 at−60°C,several orders of magnitude higher than the frozen commercial electrolytes.Impressively,LIBs utilizing decimal electrolytes can be charged and discharged even at an ultra-low temperature of−60°C,maintaining high capacity retention(∼80%at−40°C)as well as remarkable rate capability.This study provides design strategies of low-temperature electrolytes to extend the service temperature range of LIBs,creating a new avenue for improving the survival and operation of various energy storage systems under extreme environmental conditions. 展开更多
关键词 low temperatures lithium-ion batteries electrolytes high entropy decimal solvent
原文传递
Enhanced Wideband Frequency Estimation via FFT: Leveraging Polynomial Interpolation and Array Indexing
11
作者 Kiran Jayarama Chien-In Henry Chen 《Journal of Computer and Communications》 2024年第1期35-48,共14页
Accurate frequency estimation in a wideband digital receiver using the FFT algorithm encounters challenges, such as spectral leakage resulting from the FFT’s assumption of signal periodicity. High-resolution FFTs pos... Accurate frequency estimation in a wideband digital receiver using the FFT algorithm encounters challenges, such as spectral leakage resulting from the FFT’s assumption of signal periodicity. High-resolution FFTs pose computational demands, and estimating non-integer multiples of frequency resolution proves exceptionally challenging. This paper introduces two novel methods for enhanced frequency precision: polynomial interpolation and array indexing, comparing their results with super-resolution and scalloping loss. Simulation results demonstrate the effectiveness of the proposed methods in contemporary radar systems, with array indexing providing the best frequency estimation despite utilizing maximum hardware resources. The paper demonstrates a trade-off between accurate frequency estimation and hardware resources when comparing polynomial interpolation and array indexing. 展开更多
关键词 Scalloping Loss Goertzel’s Algorithm SUPER-RESOLUTION Fast Fourier Transform (FFT) Decimation in Frequency (DIF) Decimation in Time (DIT) Spectral Leakage Frequency Estimation
下载PDF
An optimized infinite time-evolving block decimation algorithm for lattice systems
12
作者 许军军 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第4期171-174,共4页
The infinite time-evolving block decimation algorithm(i TEBD)provides an efficient way to determine the ground state and dynamics of the quantum lattice systems in the thermodynamic limit.In this paper we suggest an o... The infinite time-evolving block decimation algorithm(i TEBD)provides an efficient way to determine the ground state and dynamics of the quantum lattice systems in the thermodynamic limit.In this paper we suggest an optimized way to take the i TEBD calculation,which takes advantage of additional reduced decompositions to speed up the calculation.The numerical calculations show that for a comparable computation time our method provides more accurate results than the traditional i TEBD,especially for lattice systems with large on-site degrees of freedom. 展开更多
关键词 time-evolving block decimation matrix product states spin models symmetry-protected topological states
下载PDF
The Constructivist Real Number System
13
作者 Edgar E. Escultura 《Advances in Pure Mathematics》 2016年第9期593-607,共15页
The paper summarizes the contributions of the three philosophies of mathematics—logicism, intuitionism-constructivism (constructivism for short) and formalism and their rectification—which constitute the new foundat... The paper summarizes the contributions of the three philosophies of mathematics—logicism, intuitionism-constructivism (constructivism for short) and formalism and their rectification—which constitute the new foundations of mathematics. The critique of the traditional foundations of mathematics reveals a number of errors including inconsistency (contradiction or paradox) and undefined and vacuous concepts which fall under ambiguity. Critique of the real and complex number systems reveals similar defects all of which are responsible not only for the unsolved long standing problems of foundations but also of traditional mathematics such as the 379-year-old Fermat’s last theorem (FLT) and 274-year-old Goldbach’s conjecture. These two problems require rectification of these defects before they can be resolved. One of the major defects is the inconsistency of the field axioms of the real number system with the construction of a counterexample to the trichotomy axiom that proved it and the real number system false and at the same time not linearly ordered. Indeed, the rectification yields the new foundations of mathematics, constructivist real number system and complex vector plane the last mathematical space being the rectification of the complex real number system. FLT is resolved by a counterexample that proves it false and the Goldbach’s conjecture has been proved both in the constructivist real number system and the new real number system. The latter gives to two mathematical structures or tools—generalized integral and generalized physical fractal. The rectification of foundations yields the resolution of problem 1 and the solution of problem 6 of Hilbert’s 23 problems. 展开更多
关键词 Axiom of Choice Banach-Tarski Paradox Continuum Dark Number decimal Integer D-Sequence G-Norm G-Sequence Nonterminating decimal Russell Antimony SELF-REFERENCE Trichotomy Axiom
下载PDF
线性反馈移位寄存器的差分能量攻击 被引量:8
14
作者 臧玉亮 韩文报 《电子与信息学报》 EI CSCD 北大核心 2009年第10期2406-2410,共5页
能否有效去除算法噪声的影响,直接关系到能量攻击成败。该文以线性反馈移位寄存器(LFSR)相邻两个时钟周期的能量消耗差异为出发点,提出了一种新的差分能量攻击算法。它从根本上去除了密码算法噪声在攻击过程中带来的影响。由于该算法随... 能否有效去除算法噪声的影响,直接关系到能量攻击成败。该文以线性反馈移位寄存器(LFSR)相邻两个时钟周期的能量消耗差异为出发点,提出了一种新的差分能量攻击算法。它从根本上去除了密码算法噪声在攻击过程中带来的影响。由于该算法随机选择初始向量(initialization vector),从而使攻击者能够容易地将其推广到具有类似结构的流密码体制。为了进一步验证攻击算法的有效性,该文利用软件仿真的方法对DECIM进行了模拟攻击。仿真结果表明,该攻击算法能够有效降低LFSR的密钥搜索的复杂度。 展开更多
关键词 流密码 差分能量攻击 线性反馈移位寄存器 DECIM 复杂度
下载PDF
LS-SVM and Monte Carlo methods based reliability analysis for settlement of soft clayey foundation 被引量:5
15
作者 Yinghe Wang Xinyi Zhao Baotian Wang 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2013年第4期312-317,共6页
A method which adopts the combination of least squares support vector machine(LS-SVM) and Monte Carlo(MC) simulation is used to calculate the foundation settlement reliability.When using LS-SVM,choosing the traini... A method which adopts the combination of least squares support vector machine(LS-SVM) and Monte Carlo(MC) simulation is used to calculate the foundation settlement reliability.When using LS-SVM,choosing the training dataset and the values for LS-SVM parameters is the key.In a representative sense,the orthogonal experimental design with four factors and five levels is used to choose the inputs of the training dataset,and the outputs are calculated by using fast Lagrangian analysis continua(FLAC).The decimal ant colony algorithm(DACA) is also used to determine the parameters.Calculation results show that the values of the two parameters,and δ2 have great effect on the performance of LS-SVM.After the training of LS-SVM,the inputs are sampled according to the probabilistic distribution,and the outputs are predicted with the trained LS-SVM,thus the reliability analysis can be performed by the MC method.A program compiled by Matlab is employed to calculate its reliability.Results show that the method of combining LS-SVM and MC simulation is applicable to the reliability analysis of soft foundation settlement. 展开更多
关键词 Foundation settlement Reliability analysis Least squares support vector machine(LS-SVM) Monte Carlo(MC) simulation decimal ant colony algorithm(DACA)
下载PDF
A 16 bit Stereo Audio ΣΔ A/D Converter
16
作者 陈雷 赵元富 +3 位作者 高德远 文武 王宗民 朱小飞 《Journal of Semiconductors》 EI CAS CSCD 北大核心 2006年第7期1183-1188,共6页
A 16 bit stereo audio novel stability fifth-order ∑△ A/D converter that consists of switched capacitor ∑△ modulators, a decimation filter, and a bandgap circuit is proposed. A method for the stabilization of a hig... A 16 bit stereo audio novel stability fifth-order ∑△ A/D converter that consists of switched capacitor ∑△ modulators, a decimation filter, and a bandgap circuit is proposed. A method for the stabilization of a high order single stage ∑△ modulator is also proposed. A new multistage comb filter is used for the front end decimation filter. The ∑△ A/D converter achieves a peak SNR of 96dB and a dynamic range of 96dB. The ADC was implemented in 0. 5μm 5V CMOS technology. The chip die area occupies only 4. 1mm × 2.4mm and dissipates 90mW. 展开更多
关键词 ∑△ A/D converter switched capacitor STABILITY decimation filter bandgap circuits
下载PDF
A comparison of mapping strategies from DDC to CLC 被引量:1
17
作者 Fang LI Yihua ZHANG 《Chinese Journal of Library and Information Science》 2012年第3期47-61,共15页
Purpose: This study aims to discuss the strategies for mapping from Dewey Decimal Classification(DDC) numbers to Chinese Library Classification(CLC) numbers based on co-occurrence mapping while minimizing manual inter... Purpose: This study aims to discuss the strategies for mapping from Dewey Decimal Classification(DDC) numbers to Chinese Library Classification(CLC) numbers based on co-occurrence mapping while minimizing manual intervention.Design/methodology/approach: Several statistical tables were created based on frequency counts of the mapping relations with samples of USMARC records,which contain both DDC and CLC numbers. A manual table was created through direct mapping. In order to find reasonable mapping strategies,the mapping results were compared from three aspects including the sample size,the choice between one-to-one and one-to-multiple mapping relations,and the role of a manual mapping table.Findings: Larger sample size provides more DDC numbers in the mapping table. The statistical table including one-to-multiple DDC-CLC relations provides a higher ratio of correct matches than that including only one-to-one relations. The manual mapping table cannot produce a better result than the statistical tables. Therefore,we should make full use of statistical mapping tables and avoid the time-consuming manual mapping as much as possible.Research limitations: All the sample sizes were small. We did not consider DDC editions in our study. One-to-multiple DDC-CLC relations in the records were collected in the mapping table,but how to select one appropriate CLC number in the matching process needs to be further studied.Practical implications: The ratio of correct matches based on the statistical mapping table came up to about 90% by CLC top-level classes and 76% by the second-level classes in our study. The statistical mapping table will be improved to realize the automatic classification of e-resources and shorten the cataloging cycle significantly.Originality/value: The mapping results were investigated from different aspects in order to find suitable mapping strategies from DDC to CLC while minimizing manual intervention.The findings have facilitated the establishment of DDC-CLC mapping system for practical applications. 展开更多
关键词 Dewey decimal Classification(DDC) Chinese Library Classification(CLC) Co-occurrence mapping Mapping strategies
下载PDF
Identifying Brain Characteristics of Bright Students
18
作者 Ramla Ghali Hamdi Ben Abdessalem +1 位作者 Claude Frasson Roger Nkambou 《Journal of Intelligent Learning Systems and Applications》 2018年第3期93-103,共11页
Gifted students have different ways of learning. They are characterized by a fitful level of attention and intuitive reasoning. In order to distinguish gifted students from normal students, we conducted an experiment ... Gifted students have different ways of learning. They are characterized by a fitful level of attention and intuitive reasoning. In order to distinguish gifted students from normal students, we conducted an experiment with 17 pupils, willing participants in this study. We collected different types of data (gender, age, performance, initial average in math and EEG mental states) in a web platform called NetMath intending for the learning of mathematics. We selected ten tasks divided into three difficulty levels (easy, medium and hard). Participants were invited to respond to top-level exercises on the four basic operations in decimals. Our first results confirmed that the student’s performance has no relation with age. A younger 9-year-old student achieved a higher score than the group with an average of 68.18%. This student can be considered as a gifted one. The gifted students can be also characterized by a mean value of attention (around 60%). They also can be defined by slightly weaker values of their mental states of attention and workload in comparison with the weak pupils. 展开更多
关键词 NetMath Platform Performance WORKLOAD ATTENTION RELAXATION decimal NUMBERS
下载PDF
Origin, Alternative Expressions of Newcomb-Benford Law and Deviations of Digit Frequencies
19
作者 Gene Whyman 《Applied Mathematics》 2021年第7期576-586,共11页
The Newcomb-Benford law, which describes the uneven distribution of the frequencies of digits in data sets, is by its nature probabilistic. Therefore, the main goal of this work was to derive formulas for the permissi... The Newcomb-Benford law, which describes the uneven distribution of the frequencies of digits in data sets, is by its nature probabilistic. Therefore, the main goal of this work was to derive formulas for the permissible deviations of the above frequencies (confidence intervals). For this, a previously developed method was used, which represents an alternative to the traditional approach. The alternative formula expressing the Newcomb-Benford law is re-derived. As shown in general form, it is numerically equivalent to the original Benford formula. The obtained formulas for confidence intervals for Benford’s law are shown to be useful for checking arrays of numerical data. Consequences for numeral systems with different bases are analyzed. The alternative expression for the frequencies of digits at the second decimal place is deduced together with the corresponding deviation intervals. In general, in this approach, all the presented results are a consequence of the positionality property of digital systems such as decimal, binary, etc. 展开更多
关键词 Benford’s Law Confidence Intervals in Benford’s Law Alternative Expression of Benford’s Law Benford’s Law for Different Numeral Systems Frequencies of Digits at the Second decimal Place
下载PDF
A 16bit 96kHz Chopper-Stabilized Sigma-Delta ADC 被引量:1
20
作者 曹楹 任腾龙 洪志良 《Journal of Semiconductors》 EI CAS CSCD 北大核心 2007年第8期1204-1210,共7页
A 16bit sigma-delta audio analog-to-digital converter is developed.It consists of an analog modulator and a digital decimator.A standard 2-order single-loop architecture is employed in the modulator.Chopper stabilizat... A 16bit sigma-delta audio analog-to-digital converter is developed.It consists of an analog modulator and a digital decimator.A standard 2-order single-loop architecture is employed in the modulator.Chopper stabilization is applied to the first integrator to eliminate the 1/f noise.A low-power,area-efficient decimator is used,which includes a poly-phase comb-filter and a wave-digital-filter.The converter achieves a 92dB dynamic range over the 96kHz audio band.This single chip occupies 2.68mm2 in a 0.18μm six-metal CMOS process and dissipates only 15.5mW power. 展开更多
关键词 sigma-delta modulation chopper stabilize decimator poly phase wave digital filter on-chip noise
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部