We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This chapter introduces bandlimited signals, sampling theory, and the method of reconstruction from samples. Uniform sampling with a Dirac delta train is considered, and the Fourier transform of the sampled signal is derived. The reconstruction from samples is based on the use of a linear filter called an interpolator. When the sampling rate is not sufficiently large, the sampling process leads to a phenomenon called aliasing. This is discussed in detail and several real-world manifestations of aliasing are also discussed. In practice, the sampled signal is typically processed by a digital signal processing device, before it is converted back into a continuous-time signal. The building blocks in such a digital signal processing system are discussed. Extensions of the lowpass sampling theorem to the bandpass case are also presented. Also proved is the pulse sampling theorem, where the sampling pulse is spread out over a short duration, unlike the Dirac delta train. Bandlimited channels are discussed and it is explained how the data rate that can be transmitted over a channel is limited by channel bandwidth.
Collocation methods for elliptic problems are discussed here. We begin by providing their definition. For their analysis we first introduce a weighted weak formulation of the problem, and show that it is well posed. Then, we introduce and analyze a Galerkin approximation for this problem, where the subspace consists of polynomials that vanish sufficiently fast at the boundary. Next, a scheme with quadrature is proposed, and its analysis is provided using the theory of variational crimes and Strang lemmas. For its implementation and analysis the discrete cosine and Chebyshev transforms are introduced and analyzed. The phenomenon of aliasing is briefly discussed. Finally, we connect the weighted Galerkin approximation with quadrature to collocation methods, thus providing an analysis of collocation schemes.
Sharing analysis is used to statically discover data structures which may overlap in object-oriented programs. Using the abstract interpretation framework, we show that sharing analysis greatly benefits from linearity information. A variable is linear in a program state when different field paths starting from it always reach different objects. We propose a graph-based abstract domain which can represent aliasing, linearity, and sharing information and define all the necessary abstract operators for the analysis of a Java-like language.
A firm grounding in single-input, single-output feedback theory leaves the reader well positioned to jump off into many other topics.Modern control theory as it is normally presented is such a blizzard of linear algebra that it can seem at first to have nothing at all to do with what appears in this book.The first section of this chapter offers a short bridge to that world. Next, this chapter treats an extremely common misunderstanding about oscillation, whose genesis is often an overinterpretation of phase margin. Finally, many students of "classical" control theory find themselves utterly at sea when it comes to applying their hard-earned knowledge to digitally controlled systems. The final section of this chapter aims to bridge that gap.
The charge-coupled devices used in electron microscopy are coated with a scintillating crystal that gives rise to a severe modulation transfer function (MTF). Exact knowledge of the MTF is imperative for a good correspondence between image simulation and experiment. We present a practical method to measure the MTF above the Nyquist frequency from the beam blocker's shadow image. The image processing has been fully automated and the program is made public. The method is successfully tested on three cameras with various beam blocker shapes.
The mosaics of S-cones and the neurons to which they are connected are relatively well characterized, so the S-cone system is a good vehicle for exploring how the sampling of the retinal image controls visual performance. We used an interferometer to measure the grating acuity of the S-cone system in the fovea and at a range of eccentricities out to 20 deg. We also developed a simple model observer that, by assuming only that cone pathways are noisy and that signals are subject to eccentricity-dependent postreceptoral pooling, predicts the measured acuities from the sampling properties of the S-cone mosaic. The amount of pooling required to explain performance is consistent with that suggested by anatomical and physiological measurements.
Linear dynamical systems are widely used in many different
fields from engineering to economics. One simple but important class of such
systems is called the single-input transfer function model. Suppose that all
variables of the system are sampled for
a period using a fixed sample
rate. The central issue of this paper is the determination
of the smallest
sampling rate that will yield a sample that will allow the investigator to
identify the discrete-time representation of the system. A critical sampling
rate exists
that will identify the model. This rate, called the Nyquist
rate, is twice the highest frequency component of the system. Sampling at a
lower rate will result in an identification problem that is serious. The
standard assumptions made about the model and the unobserved innovation
errors in the model protect the investigators from the identification
problem and resulting biases of undersampling. The critical assumption
that is needed to identify an undersampled system is that at least one of the
exogenous time series be white noise.
Numerical evaluation of compound distributions is one of the central numerical tasks in insurance mathematics. Two widely used techniques are Panjer recursion and transform methods. Many authors have pointed out that aliasing errors imply the need to consider the whole distribution if transform methods are used, a potential drawback especially for heavy-tailed distributions. We investigate the magnitude of aliasing errors and show that this problem can be solved by a suitable change of measure.
Recommend this
Email your librarian or administrator to recommend adding this to your organisation's collection.