Information Technology Reference
In-Depth Information
Assumption 2.
In figuring out the size
, the number of constraints
(DMDP) is independent with the depth parameter
h
(in the definition of
DMDP) when a suitable range for
h
is taken into consideration.
|
S
(
m, t
)
|
Following Assumption 2,
p
(
m, t
) is a product of probabilities of individual events
related to the depth parameter
h
of a given MDT. Note that the RHS of (4) is
the product of
q
(
m, t, h
)'s in the range of
h
from 1 to
t
.Thevalue
q
(
m, t, h
)
will be identified with the probability that an arbitrarily selected symbol at
position
t
satisfies DMDP of level
h
deep of the entries of the MDT constructed
so far. This quantity is still too complicated to calculate exactly, and we need
the following third assumption:
2
Assumption 3.
The probability
q
(
m, t, h
) can be approximated as the condi-
tional probability that an arbitrarily selected symbol at position
t
satisfies
DMDP of level
h
deep with regard to the entries of the MDT constructed so
far, given the condition that it satisfies all the DMDP of level
k<h
deep.
Under Assumption 3, the value
q
(
m, t, h
) can be approximated as the conditional
probability that there is no
j
such that
h<j<t
and
f
(
t
)
− f
(
t − h
)=
f
(
j
)
−
f
(
j
−
h
)(mod
m
), given the condition that, for each and every
k
with
1
k
)
(mod
m
). To find this conditional probability and show that it is given as in RHS
of (5), we claim that the complementary event has an approximated probability
≤
k<h
, there is no
j
such that
k<j<t
and
f
(
t
)
−
f
(
t
−
k
)=
f
(
j
)
−
f
(
j
−
(
t
−
2
h
)
m
1
−
q
(
m, t, h
)
≈
h
+1)
·
h
+1)
.
(7)
(
m
−
(
m
−
We may easily determine an upper and lower bound on 1
q
(
m, t, h
)whichis
the fraction of symbols that violates DMDP. Recall that the current position is
t
, and we are given a sequence of length
t
−
−
1 and the corresponding MDT of
depth
t
(
h
+ 1) symbols which violate DMDP for fixed
h
.Itis
just the number of entries of MDT at level
h
deep. Thus, at most
−
2. There are
t
−
t
−
(
h
+1)
m
of
A
m
t−
(
h
+1)
m
will be BAD for
f
(
t
)fromrow
h
of MDT, and hence,
is an upper bound
on 1
q
(
m, t, h
). When we use Fact 1 and Assumption 3, we see that there are
at least
−
t−
(
h
+1)
−
(
h−
1)
m−
t−
2
h
m−h
+1
1
symbols (shaded area of the row
h
in Fig. 1, for example, and using Fact 1) have
already been taken care of with regard to the DMDP of level
k<h
deep. Thus,
t−
2
h
m−h
+1
=
of
A
m
, which will be BAD for
f
(
t
), since
h
−
(
h−
1)
is a lower bound on 1
−
q
(
m, t, h
). Therefore, we have
t
−
2
h
t
−
(
h
+1)
m
h
+1
≤
1
−
q
(
m, t, h
)
≤
.
m
−
By carefully examining the situation further, we have chosen a factor as shown
in (7) and obtained the result given in (5).
In order to check the validity of the estimated number
N
(
m, n
)of
m
n
modular sonar sequences, we have done a second round search for the values
N
(
m, n
)for
m
up to 14 and
n
up to
m
+ 1. These are shown in Table 2 with the
calculated number from (5). Further, this relation is plotted in Fig. 2.
×