Information Technology Reference
In-Depth Information
will calculate it further by simulation. Combining eqs. (11), (13), (16) and (19)
for “short” pulse response, we obtain from (9) and (10):
− Q
(
λ
− µ
)
P
m
=1
(20)
P
fa
=
Q
(
λ
)
(21)
where
λ
Var (
Λ
0
)
=
λ
λ
=
N−
1
k
=0
h
(
k
)
ασ
ε
|
|
2
N−
k
=0
|
1
E
(
Λ
1
)
Var (
Λ
0
)
=
α
σ
ε
h
(
k
)
µ
=
|
2
.
(22)
Using Fourier transforms and considering
C
as a wide-sense stochastic process,
we can express (5) as follows:
N−
1
k
=0
|
N−
1
k
=0
|
σ
2
ε
σ
2
C
1
η
a
1
N
1
η
w
N
h
(
k
)
h
(
k
)
2
2
+
=
|
φ
co
(
k
)+
|
(23)
where
N−
1
1
σ
2
C
ϕ
C
(
n
)
e
−
2
πk
N
i
,
φ
co
(
k
)=
k
=0
,...,N −
1
,
n
=0
is the autocorrelation function of
C
,
σ
2
C
ϕ
C
= Var (
C
), and
h
0
(
k
)=
N−
1
− δ
(
n
))
e
−
2
πk
N
i
,
(
h
(
n
)
k
=0
,...,N −
1
,
n
=0
Using (23) we may express the reciprocal of factor in last member of (22) as
N−
1
k
=0
|
N−
1
k
=0
|
σ
α
η
η
a
1
N
η
N
h
(
k
)
h
(
k
)
=
−
|
2
−
|
2
φ
co
(
k
)
.
(24)
From now on we can compute the probabilities
P
m
and
P
fa
using (20)-(22)
and (24) for any frequency response of the attack filter
h
, power density spectrum
φ
C
of CM, number
N
of WM elements and distortion constraints
η
w
and
η
a
.
Since it is not easy to know the power density spectrum (
φ
co
(
k
))
N−
1
k
=0
of CM,
we may assume that the attack filter has to be chosen in such a way to provide
no noticeable distortions of CM. Then we can make zero the last term in the
right of (24) to get
N−
k
=0
|
1
σ
α
η
η
a
1
N
h
(
k
)
=
−
|
2
.
(25)