IX. A. COMMUNICATION RESEARCH MULTIPATH TRANSMISSION H. W. E. R. Prof. L. B. Arguimbau Dr. J. Granlund Dr. C. A. Stutt 1. Speech and Music. H. Cross C. Kinzinger E. Manna A. Paananen E. M. Rizzoni G. M. Rodgers R. D. Stuart Transatlantic Tests The series of tests discussed in the last few Quarterly Progress Reports has been concompleted. As a result of these tests, it can be said that under many ionospheric ditions it is not practical to use the standard system of FM transmission for transmitting speech and music over long short-wave paths. The reason is roughly as follows. An FM receiver will select the stronger of two signals (possibly arriving from the same transmitter over paths differing in delay) and reject the weaker. If three or more signals are received simultaneously, there may not be one signal that is always stronger than the rest, that is, stronger than the alge- In this case, the receiver output depends braic sum of strengths of the other signals. on each of the signals, and serious distortion may result. if all signals arrive from the same transmitter with very nearly the same delay, the composite signal at the receiver is very much like any one of its components. Using standard FM broadcast conditions, we found experimentally that if the times of flight of all signal components lie within 100 psec, the resulting distortion is not very Of course, serious and can often be improved appreciably by special circuitry. We have acquired a much better understanding of the ionosphere while performing these tests, largely by observing narrow amplitude-modulated pulses received from the transmitter. The duration of the received pulse pattern or "smear" time is, the spread in time of flight mentioned above. of course, The limitation on fidelity (or rate of trans- mission of information) imposed by the smear is not peculiar to frequency modulation and for this reason we attach major importance to pulse patterns. Figure IX-1 is a collection of pulse patterns that is representative of our reception during the past year. The first nine patterns were observed in a 200-kc/sec bandwidth; these are probably of greater interest, since it is not usually possible to obtain such detail in pulse experiments. The set a, b, c, d is a sequence which we interpret as reception just below the maximum usable frequency (MUF). The MUF is increasing throughout the sequence. For comparison, we interpret e, f, g as scatter reception just above MUF, again with MUF increasing throughout the sequence. Similarly, h, i, and j represent more samples of scatter reception; note the lack of detail in j caused by the narrower receiver bandwidth. Traces k and I are typical of nighttime reception well below MUF. These pictures were taken with a longer sweep length than the others. J. -53- Granlund, C. A. Stutt, L. B. Arguimbau _iiIIIII. i!_".~.: . -_ _" _ _. . a b c d' e f 9 h k I U1 ~ I Fig. IX-1 Representative patterns received during pulse transmissions over transatlantic path in 1951. a Da.te Time (GMT) Carrier Frequency (Me/sec) Mar. 21 13:40 23.09 Signal Strength (db above 1 f.l.v on 50 -ohm feeder) Duration of Transmitted Pulse (f.l.sec) Sweep Length (f.l.sec) Duration of Pulse Pattern (f.l.sec) Receiver Bandwidth (kc/sec) Quality of Program Immediately after Pulse Transmission 72 20 2000 400 200 fair to poor 20 2000 550 200 mostly poor b Mar. 21 14: 10 23.09 65 c Mar. 21 15: 10 23.09 75 20 2000 650 200 fair 2000 900 200 good d Mar. 21 17:40 23.09 60 20 e Mar. 20 13:40 23.09 75 20 2000 200 200 fair f Mar. 20 14:05 23.09 70 20 2000 300 200 fair g Mar. 20 14:40 23.09 50 20 2000 350 200 h Jan. 26 14:05 26.0 50 20 2000 120 200 Feb. 1 16:05 26.0 65 20 2000 500 200 j Apr. 16 13:45 23.09 30 20 2000 250 40 k Oct. 6 00:15 11.6575 60 100 5000 1400 40 bad 1 Oct. 6 01: 15 11. 6575 60 100 5000 1800 40 poor fair to poor poor fair (IX. COMMUNICATION RESEARCH) 26 2.05 / N 5 08 n 10 100 1000 10,000 100,000 I VOLT INPUT IN /L VOLTS Fig. IX-5 Suppression threshold as a function of input. Report, July 15, 1950. The better takeover performance at low signal input values is especially useful. One problem still needing attention is the rather high interstation noise levels present in the receiver output. This is partly due to the high sensitivity of the design while the rest may be attributed to the widebanding of the ratio detector. That is, these circuits have about the same sensitivity to amplitude modulation regardless of their bandwidth, while the FM output is inversely proportional to this quantity. Even with two limiters the noise is not limited completely and hence the resultant noise output is caused by both the AM and FM components of the noise, with the FM/AM ratio considerably worse than with a narrowband FM detector. Either a squelch circuit or a mechanical tuning cut-off switch should provide a solution. R. A. Paananen -56- I +150 -I I + 300 +150 -150 -300 1/2 6AL5 JA /--\ +150 IOK I -j 100 K O.IM 5687 2M -300 Fig. IX-6 Pentode-gate decoder. (IX. B. COMMUNICATION RESEARCH) STATISTICAL THEORY OF COMMUNICATION Prof. Prof. Prof. Prof. Prof. 1. J. W. R. Y. J. B. B. M. W. F. Wiesner Davenport, Jr. Fano Lee Reintjes Dr. P. Elias B. L. Basore J. J. Bussgang C. A. Desoer L. P. A. R. M. Dolansky E. Green, Jr. J. Lephakis M. Lerner J. Levin Multichannel Analog Electronic Correlator The sampling pulse generator has been redesigned and rebuilt. Testing of the equip- ment with a single channel is being carried out. Y. W. Lee, J. 2. F. Reintjes, M. J. Levin Pulse Code Magnetic Recorder Successful experiments were conducted on a two-channel part of the pentodegate decoder and, in accordance with the results, a complete seven-channel decoder was constructed. The diagram is given in Fig. IX-6. The decoder requires three tubes less than the simplest of the former models, although an additional mastertiming circuit is included to ensure perfect time coincidence of the leading and trailing edges of the individually weighted decoder pulses. To establish the over-all performance of a major part of the electronic equipment, the various units were connected as shown in Fig. IX-7. An auxiliary unit (A) consisting of one multivibrator per channel is used to bypass temporarily the recorder proper and the following amplifier. Sawtooth, sine-wave, and square-wave signals were connected to the input. The experimentally obtained waveforms are shown in Fig. IX-8, where (a), (b) and (c) show the phantastron-plate Fig. VII-24, Quarterly Progress Report, April 15, the filter output, voltage (i. e. 1950), the decoder output and respectively; the corresponding input voltage (sine wave, mately 10 kc/sec) is included in the top part of each picture. approxi- For a 50-cps sine Fig. IX-7 Block diagram of equipment used in over-all tests. 58- V a b c d e f 9 h Fig. IX-8 Waveforms obtained experimentally at the phantastron plate, the decoder output, and the filter output, related to the input waveforms. -59- (IX. COMMUNICATION RESEARCH) wave the corresponding waveforms are represented by (d), (e) and (f). The input and output waveforms for a 300-cps square wave are shown in (g); a 360-cps sawtooth in (h). The performance for sawtooth waveforms was used during an approximate visual adjustment of the plate resistors in the individual decoder stages as indicated by (i). The lower part of (i) represents the plate waveform in the phantastron stage of the coder; the upper part represents the decoder output. By changing the values of the individual plate resistors, is adjusted to approximately a straight line. the lower edge of the decoder output It should be pointed out that a cer- tain delay between the upper and lower figures is present in all the pictures. This is more noticeable for the sawtooth waveform (see (g)). Part of this delay is due to the oscilloscope; another part is caused by the fact that the coder output lags behind the sampling time; and, finally, for some frequencies at least, additional delay is caused by the output filter. To ensure that no frequencies above 10 kc/sec enter the coder, a filter similar to the output filter (Fig. VIII-9, Quarterly Progress Report, April 15, 1951) was constructed and is being tested. J. 3. a. B. Wiesner, L. Dolansky Information Theory Transmission of information through channels in cascade The problem of quantization to a larger number of levels, as described in the Quarterly Progress Report, January 15, 1952, has been the problem of chief interest during the last quarterly period. Consider a communication system consisting of two channels in cascade. The transmitter sends pulses of amplitude l1. The intermediate station may operate according to the following rules: if the received pulse is positive (or negative) the intermediate transmitter retransmits a pulse of amplitude + 1 (or - 1 respectively). The output of the second receiver is a pulse of amplitude + 1 (or - 1) if the pulse received through the second channel is positive (or negative, respectively). The capacity of such a communication system is easily obtained. It has been shown, however, that if the average power of the intermediate transmitter is left constant, the amount of information received increases as long as the intermediate station does not retransmit anything when the received pulse belongs to the interval (-a, +a). This saving of energy permits a larger pulse amplitude to be used by the intermediate station. The optimum a increases the information received by 17 percent when S/N = 1 and only 1. 1 percent when S/N = 3. The amount of information received can be further increased if the second receiver also introduces a rejection interval (-p, +p) so that the output of the system now consists of the three-valued pulse -60- (IX. + 1, 0, - 1. P are not given by explicit formulas and could The optimum values of a and be found by trial and error only. COMMUNICATION RESEARCH) For S/N = 1, the relative increase of information received (with respect to the case a = p = 0) is 33 percent. For S/N = 4, the relative increase is 5 percent. These results indicate that the type of detection used by the second receiver is of importance, and consequently it would be highly desirable to be able to compute the amount of information actually contained in the received pulse. Such a formulation would give results which depend only on the operation of the intermediate station. This formulation involves the difficulty of integrating expressions of the type +oo f p(x) log p(x) dx - 00 where p(x) is a weighted sum of gaussian distributions. The amount of information received in the case of a binary channel (samples ± 1) was computed by the combined use of power series and asymptotic expansions. It is expected that the same procedure will be applicable to the case of channels in cascade, even when the intermediate station requantizes to a number of levels larger than two. C. A. Desoer, R. M. Fano b. Vocoder Equipment for operating on the magnitude of the analytic function of speech to obtain the fundamental pitch period is under test. Investigations continue in the application of polar representation to speech and electroencephelography. A method for designing wideband phase-splitting structures has been developed and is being written up. R. M. Lerner -61- (IX. C. COMMUNICATION RESEARCH) HUMAN COMMUNICATION SYSTEMS 1. D. G. Senft P. F. Thorlakson J. B. Flannery J. Macy, Jr. E. S. Palmer Dr. L. S. Christie Dr. R. D. Luce Technical Report Much of the time of the staff members was devoted to continuing the writing of the comprehensive report mentioned in the Quarterly Progress Report, January 15, 1952. Data analysis for this report consumed well over 50 percent of the time of our technicians. At present the report is nearly completed. We shall not attempt to present a resume here of the empirical and theoretical results to be presented in detail in that study, but we will mention the four main areas of analysis: A) The development of learning within the group as a function of the communication This group-learning is interpreted as a combinatorial resultant of network is studied. individual learning. B) The temporal characteristics of group communication are analyzed and shown to be readily explained by comparatively simple assumptions as to individual behavior. Again the group behavior is a fairly simple, mathematical resultant of the individual behavior. C) An analysis of the effects of encoding-decoding noise on the communication pro- cess is examined. It is shown that there is considerable interaction between the noise present and the feedback nature of the network. Notions from Information Theory play an important role in this analysis. D) From questionnaire data, various correlations are shown to exist between a person's role in the group and his emotional reaction to the situation. in all cases what would be expected, These are not and it is felt that only a very partial understanding of this area yet exists. 2. Experiment on the Effect of Change in Communication Network Experimental work has begun on the problem of determining the influence of the group organization developed in one network upon subsequent performance of the same subjects in a different network. given previously (1). A preliminary description of this experiment has been It has been found desirable, on the basis of preliminary tests, to make certain modifications in that plan. The final test network will be "diablo" in every case. (See Fig. IX-A. ) In this net- work the node A has the most critical effect on group performance, since information originating at B or C can get to D and E only by way of A, and conversely. node A the "center man." Call The 6 networks for the conditioning trials have been selected -62- (IX. 0B Do COMMUNICATION RESEARCH) to favor to various degrees the development of organization about a center man. After having run the groups on these Spatterns Eo o C Fig. IX-A Diablo. in which centralized organization develops, it is possible to change to the test network diablo in two ways, i. e. with the same man in the center and with a different man in the center. Taking these possibilities into account, we plan to run 10 groups of 5 military subjects, each on the following network sequences (C = circle, D = diablo, P = pinwheel, S = star; a prime denotes change of center man): CD. DD, DD', SD, SD', PD, Fifteen trials will be run in each phase of the experiment, preceded by 5 trials on network P to be used for adjustment to the apparatus. Our previous experiments have been run in such a way that group trial time was composed of individual action times, either with no temporal constraint on the individuals, or with each individual constrained to act only when every member of the group has signaled his readiness to act. In the former case, the complexity of the relations between one group member's and another's action make it impossible to analyze the group process in a way which explains how group action is composed of individual The latter case does permit this reconstruction, but it has the disadvantages actions. of considerably lengthening the experiment and seeming highly artificial to the subjects. In the present experiment we have adopted a compromise between the two extremes above. A "sending signal"' We now quantize the time scale rather than the group action. is sounded at regular intervals and the subjects are told that they may send messages, if they desire, when they hear the signal but at no other times. If the interval is very short, this regime approximates the unconstrained situation; if it is approximates the action-quantized scheme. very long, it It appears that an interval of 15 seconds will accomplish the objective of making the data amenable to analysis and, at the same time, remove much of the artificiality. Developments in the apparatus are described in section 3 below and in data analysis in section 4 below. 3. Experimental Apparatus In order to implement the experimental scheme described above, and at the same time to permit a complete reconstruction of the actions of the group, several modifications to the apparatus have been necessary. The table previously described (2) is being used for this experiment, with certain changes. The "ready" buttons have been removed from the subjects' compartments, and a new centerpiece has been constructed. the original one, with send and receive This centerpiece follows the scheme of slots between each man. The slots have been enlarged to accommodate IBM cards, and each slot has been equipped with a -63- (IX. COMMUNICATION RESEARCH) spring-loaded finger which detects the passage of a card. These fingers break a circuit every time a card is passed through the given slot, and these circuits are each connected to a different pen in an Esterline-Angus operations recorder. Since the transmission time of the messages is quantized as mentioned in part 2 above, the correlation of this record with the possible transmission times makes possible a complete reconstruction of the location of all information in the net at any instant. In addition, the instant at which each man gets the answer is recorded on another 20-pen recorder, and also a series of marks representing the possible transmission times. All the information derived from the recorders mentioned above will subsequently be punched on the message cards themselves, described below. and these will be used for analysis, as These modifications to the experimental apparatus have been com- pleted and tested, and are now in use. 4. IBM Analysis of Data During the time that the equipment conversion for the Network Change experiment was being planned and carried out (see sec. 3 above), an extensive analysis of the data from Network Pattern and Group Learning experiment (2) was under way. This analysis ultimately assumed the form of determining conditional probabilities for the behavior of individuals in the groups studied. It was found that except for comparatively simple conditions, which meant also comparatively simple networks, it is practically impossible to carry out the necessary computations by hand, even in the highly simplified action quantized case. Since the Network Change experiment, as described above, is not action quantized, the calculation of these probabilities would be even more difficult. These considerations lead us to investigate the possibility of computational aid from the Center of Analysis, using IBM equipment. It became apparent that this would be satisfactory for our purposes, and that in payment for some labor in the preparation of the IBM message cards, the computation of the conditional probabilities desired could be reduced to a purely machine operation. It is felt that this is an appreciable improvement in technique, for we will be able to obtain somewhat more complex probability conditions with less labor. L. S. Christie, R. D. Luce, J. Macy, Jr. References I. Quarterly Progress Report, Research Laboratory of Electronics, M.I.T. Jan. 15, 1952, pp. 57-58 2. Quarterly Progress Report, Research Laboratory of Electronics, M.I.T. Jan. 15, 1952, pp. 79-80 -64- (IX. D. COMMUNICATION RESEARCH) REPLACEMENT OF VISUAL SENSE IN TASK OF OBSTACLE AVOIDANCE Dr. C. M. Witcher E. Ruiz de Luzuriaga L. Washington, Jr. Work on this project has proceeded along two principal lines: continuation of the program for modification of the Signal Corps sensory aid as outlined in the Quarterly Progress Report, January 15, 1952; and work on the development of a device for the reliable detection of step-downs or other sudden drops. Work on the modification of the Signal Corps obstacle detector has thus far consisted of the completion of the necessary electronic modifications to yield an output signal suitable for operation of relays to actuate the signal presentation pins discussed in the Quarterly Progress Report, January 15, 1952. Rough estimates based on previous experience with tactile stimulators of this kind have indicated that the signal presentation pins should be actuated by a force whose minimum value is not less than about 15 gm, and that the length of stroke for these pins should be of the order of 0. 025 inch. Measurements indicate that the signals from our modified Signal Corps obstacle detector, when applied to the relays which we have selected (Sigma 4F), will yield armature motions which will more than meet these requirements. The next steps in the work with this device will consist of the development of the necessary mechanical and optical systems to facilitate automatic scanning, and the modification of the scheme by which information received by the device is coded so as to yield a signal presentation of the form outlined in the Quarterly Progress Report, January 15, 1952. It was long ago realized by all of those familiar with the problem of independent travel by the blind that their greatest dangers lay in their encounters with unexpected step-downs or other sudden drops. It was therefore felt that an attack on this aspect of the problem should be undertaken as soon as possible. During the past three months a tentative solution has been developed, and a model embodying it is now under construction. The requirements for an adequate step-down detector were fairly well estab- lished about three years ago by a group of experienced blind travelers at a meeting of the Technical Research Council in New York. They are: 1) the device should provide definite indication of a step-down or other drop at distances of 5 to 7 feet in front of it; 2) the device should (except for possible false alarms) give no signal except when a step-down is encountered; 3) the step-down signal should be very distinct from that given by any obstacle-detecting equipment with which the step-down device is to be combined. It is generally conceded that some false alarms (perhaps even 20 percent of the total signals) can be tolerated, provided the detection of step-downs of height greater than 3 inches is absolutely reliable. -65- (IX. COMMUNICATION RESEARCH) Fig. IX-9 Fig. IX-10 Step-down detector. Approximate pulse shape when the beam of light crosses the step-down. Our proposed solution to this problem can be understood by reference to Fig. IX-9. Light from a flashlight bulb and reflector (a) passes downward through a rectangular collimating tube (b) to fall on a small rotating mirror (c). As the mirror turns, the light beam will be periodically reflected so as to pass out through the rectangular opening (d) in the bottom of the housing for the device. The dimensions of the system have been so chosen that the beam will initially strike the ground at a distance of about 5 feet in front of the device and sweep along the ground to a point about 7 feet in front of it when the device is held horizontally with its bottom surface about 2 feet above the ground. A small amount of the light scattered from the spot where the beam strikes the ground will enter the receiving lens (e) on the front of the device and will, after reflection from the mirror (f) come to a focus near the front surface of the photo cell (g). The window of this photo cell is masked except for a narrow horizontal slit across its center. The position of the photo cell can be adjusted so that the image formed by the lens will pass across the slit on the cell mask when the light beam is falling on the ground at any desired spot along its path. to send the beam out of the device, Thus, each time the mirror (c) turns so as a light pulse will be registered by the photo cell and amplified by the amplifier (h). When the surface of the ground is flat or merely sloping along the path of the beam, the pulses received by the photo cell will be approximately rectangular or trapezoidal in shape. However, if at the moment the image is crossing the slit of the cell, the beam is passing over the edge of a step-down, the image will consist of two bright bands separated by a relatively narrow dark line, the shadow of the step-down. image will, accordingly, give rise to a pulse of the approximate -66- This shape shown in (IX. Fig. IX-10. COMMUNICATION RESEARCH) Although the design of the circuits has not been completed, it is fairly certain that these pulses can be electronically distinguished from those produced by level or sloping ground. Except for the pulse-discriminating now complete, and it is circuits, the construction of the device is to be tested by oscilloscopic -67- observation. (IX. E. COMMUNICATION RESEARCH) COMMUNICATIONS BIOPHYSICS Prof. W. A. Rosenblith K. Putter 1. Interaction of Cortical Activity and Evoked Potentials Preliminary experimentation on this topic continues at the Massachusetts General Hospital. Observations have been made concerning such phenomena as masking of clicks by means of noise and cortical driving and also on the influence of metrazol upon evoked responses. More systematic experimentation will be carried out when satis- factory facilities and equipment become available. In the meantime, the construction of an electronic correlator having the appropriate characteristics for this type of work will be undertaken. W. A. Rosenblith with Dr. M. 2. A. B. Brazier (Massachusetts General Hospital) Variability of Cortical Responses to Acoustic Clicks Research on this topic and statistical analysis of the data continues to be carried out at the Psycho-Acoustic Laboratory, Harvard University. W. A. Rosenblith with K. Safford (Harvard Psycho-Acoustic Laboratory) 3. Instrumentation The time-gated amplitude quantizer is in the experimental stage. The unit has at present a single-channel time gate, and the quantizing process is done electromechanically. The design characteristics call for a quantizing rate of 10/sec. K. Putter, W. A. Rosenblith -68- (IX. F. COMMUNICATION RESEARCH) NEUROPHYSIOLOGY W. H. Pitts J. Y. Lettvin P. D. Wall B. Howland Our stereotaxic instrument is completed and in use. It is to be on display at the American Physiological Society meeting in April. The source-sink maps of the spinal cord following dorsal and ventral root stimulation are now complete for two experiments, and they agree beyond our expectations. The anatomical match of the two series at corresponding times is good enough to encourage us in attacking the more difficult mapping of inputs from separate modalities without any further gross justification of the technique. The data will appear in a tech- nical report now in preparation. Because of the tedium of computation and the length of time required for calculating one experiment (two months), we are designing an analog computer for finding the "smoothest" distribution of sources and sinks that will reproduce an irregularly spaced matrix of potentials in a bounded volume conductor. The details of this computer will be included in the technical report. In the experiments of the past three months we have tried to map the potentials arising from bulbar reticular inhibition in the cord. Twelve attempts have failed to produce a single set of data that is satisfactory for computation. We had not hoped for earlier success, principally because the inhibitory system is so ill-defined in the bulb that, although repeated stimulation anywhere around it will nicely suppress tone and reflex, single stimuli, save with luck in placing the electrode, rarely do so. But the map must be made; for unless we can exhibit an example of pure inhibition, we cannot argue with certainty about its nature. In December J. C. Eccles put an important problem to us. Recording within cells, he has found a twenty-fold amplification and inversion of certain potentials relative to their values just outside the cell-body. Fortunately, under simplifying assumptions about the geometry, this problem is susceptible of analytic treatment. One can derive relations between the Fourier transforms of the potentials inside and outside cells which are quite different in the two cases: the one where the cause is in the external medium outside the cell, the other where it lies in the cell membrane. It is a remarkable fact that both relations are independent of the details of the processes in the membrane. We are now using the Integral Transform Computer developed by J. M. Ham to convert these relations into a form expressing the internal potential as a weighted average (a convolution integral) over the external, and vice versa, in the two cases. computations are finished, When the we hope to use them to determine the causes of various measured potentials by comparing their magnitudes inside and outside of cells. -69- COMMUNICATION RESEARCH) (IX. Another difficult problem is the fate of an impulse arriving at a branch in a single axon. With the kind cooperation of Dr. Aldo Truant of Tufts we shall try to get some experimental data on squid axon this summer at Woods Hole. Such data are necessary to any theory of transmission in the central nervous system, since axons there almost always arborize where they terminate, certainly where they end on the motor neurons in the spinal cord. Mr. Pitts presented our work on inhibition at the Josiah Macy Jr. Foundation Conference on Cybernetics on March 20, and we are submitting an abbreviated version of the technical report to the Journal of Comparative Neurology. -70- (IX. G. COMMUNICATION RESEARCH) MECHANICAL TRANSLATION Much valuable time is now being spent by highly trained people on language trans- lation. Probably the amount of material that has to be translated will increase even more in the future. Plausible estimates indicate that the scarcity of expert translators causes a log jam in scientific translation that alone costs American research hundreds of thousands of dollars yearly. In addition to the need for high-accuracy translation in science, finance, and diplomacy, there also exists an urgent need for high-speed translation of the huge printed output of actual or potential enemies, i. e. newpapers, journals, propaganda leaflets and the like. Some preliminary research for the use of electronic computer-like machinery as an aid in translation has been going on in various places these last few years, but the proThe author has made a survey of the various gress made so far has been rather slight. possible machine-man partnerships in translation. For the time being, no completely mechanical translation seems to be possible with respect to an actual language, there is since no way in sight by which a machine with its limited memory-capacity overcome semantical ambiguities. for instance, could The number of possible word-digrams in German, is probably more than a billion. Therefore, the method by which a human being reduces ambiguity (i. e. through consideration of the context of the ambiguous word) is out of reach for present machines. In this discussion the following terminology and abbreviations will be used: MT: mechanical translation FL: foreign language TL: target language Pre-editor: Post-editor: the human partner who knows the FL alone the human partner who knows the TL alone Bilingual editor: the human partner who knows both FL and TL. The major practical problem is to reduce the required services of a bilingual editor as much as possible and, if possible, to eliminate him completely. nerships were studied: Accordingly four part- MT with pre-editor, MT with post-editor, MT with pre-editor and post-editor, and MT with limited availability of a bilingual editor. It seems that a pre-editor would be most efficient in eliminating morphological and syntactical ambiguities and in rearranging the FL text in an order corresponding to that of some standard order in the TL. And there also exists a method by which the pre- editor could eliminate semantical ambiguities without any knowledge of the TL. It is plausible that this method would be more time-consuming than having the semantical ambiguities eliminated by the post-editor. It has been shown experimentally that a post- editor is able to pick out from the millions of suitably arranged correlates of an average FL-sentence just one, up to synonymy; and, in general, is able to do it without difficulty. -71- (IX. COMMUNICATION RESEARCH) If the average number of possible translations of an FL-word within a 25-letter sentence is 2, the number of possible correlates of this sentence is 2 25, i. e. almost 40, 000, 000. A satisfactory explanation of this rather astonishing fact can be given on the basis of certain other experimental results achieved by Abraham Kaplan with respect to the reduction of ambiguity through context. The main problem is, therefore, to have the machine do the preliminary syntactical analysis of the FL material. This could be achieved only if an operational syntax for this FL were available which would take the form of a sequential program as used for electronic computers, though it would be incomparably more complicated. operational syntax exists so far for any natural languages, been clearly seen until now. No such and the need for one has not No insuperable difficulties for its preparation can be seen. Another major obstacle lies on the hardware level. Existing memory capacities of electronic computers are still unable to handle with an appropriate speed the task of picking out one word from approximately a million. with the mechanical word-analyzer, This is one of the steps to be taken that gives for each running word its various divisions into stem or morphological category. A high reduction of the memory-capacity can be achieved through the restricted use of a bilingual editor. With a storage of a few tens of thousands of words, the analysis and translation of perhaps 90 percent of the words of a foreign text should be possible. The bilingual editor would be required to deal only with the remaining 10 percent. Various methods of dealing with so-called idioms have been developed. All the methods treated so far deal with MT from one specific language into another specific one. There are practical situations in which multiple translation into various languages is of importance. than that of specific MT. The task of general MT is incomparably more complex The only reasonable method of handling the problem of general MT would be to devise a universal syntax. All attempts undertaken until recently in this direction failed, mainly because they were based on Aristotelian logic, physical prejudices, and lack of acquaintance with exotic languages. certain meta- It is possible that a combination of the best methods developed by modern structural linguists and by mathematical logicians might lead to better results (see sec. IX-H). The problem of MT is much less formidable when applied to certain artificial or semi-artificial languages with restricted vocabularies and regular grammars, such as Interlingua or Basic English. These languages are therefore most suitable for future experimental work to be undertaken for finding out the optimum combination of man and machine in translation or the optimal combinations. Other types of restricted languages that lend themselves easily to MT are those in which the syntactical structure of a natural language is left completely unchanged, but there the field of relevant messages is reduced either by the nature of the field or by artificial convention. It seems that this is the situation with respect to pilots' language -72- (IX. COMMUNICATION RESEARCH) or the meteorologists' code. Some investigations were made into the degree of distortion introduced by MT in comparison with purely human translations. It appears that under suitable conditions a man-machine partnership would do, on the average, not worse than a human translator alone, at least with regard to material where the emotive component is of relatively small importance. A more extensive interim report, "The Present State of Research on Mechanical Translation," containing summaries and evaluations of the work done by other groups, will appear in American Documentation, Vol. II, No. 4. Y. -73- Bar-Hillel (IX. H. COMMUNICATION RESEARCH) A NEW METHOD OF SYNTACTICAL DESCRIPTION A method proposed by the Polish logician, K. Ajdukiewicz (1), for syntactical des- cription has apparently exerted no influence on American linguistics. ever, that if some of its shortcomings are removed, opments among American structural linguists (2), and efficient. It seems, how- mainly on the basis of recent devel- it should turn out to be quite powerful Its main importance lies in its quasi-mathematical character, which enables a purely formal and completely mechanical analysis of the structure of any sentence of a given language to be made on the basis of the morphological-syntactical gories to which the words of the sentence belong. cate- It should be, therefore, of special value in those cases where a mechanical analysis is indispensable, as in mechanical translation (see sec. IX-G). Preliminary results show that this new method is very efficient and perspicuous with regard to artificial or semi-artificial languages. however, With respect to natural languages, its efficiency is hampered by their enormous syntactical complexity and phe- nomena like homonymity, idioms, etc. Since complete exposition of this method cannot be given here, let us simply say that it consists of assigning to appropriate linguistic units (generally words or morphemes) such symbols designating their morphologicalsyntactical categories as are easily amenable to a formal manipulation. This manipula- tion is very similar to the multiplication of fractions and is governed by a few, very simple rules. All of customary syntax is embodied in this categorical symbolism and in its rules of operation. Y. Bar-Hillel References 1. K. Ajdukiewicz: Die Syntaktische Konnexitaet, Studia Philosophica 1, (Mimeographed translation by University of Chicago, 1951.)1935. 2. Z. S. 3. Y. Harris: Bar-Hillel: 1-27, Lwow, Methods in Structural Linguistics, University of Chicago Press, 1951 On Syntactical Categories, J. -74- Symbolic Logic 15, 1-16, 1950 (IX. I. COMMUNICATION RESEARCH) SEMANTIC INFORMATION AND ITS MEASURES In existing Theory of Information the semantic aspects of communication have been deliberately ignored. It is the purpose of the present inquiry, undertaken in collaboration with Professor Rudolf Carnap, Department of Philosophy, University of Chicago, to investigate just these aspects and to arrive at an explication of the concept of information as used on this level, and of its measures. treated as a function whose arguments are Information in its semantic aspect is statements. For the time being, only languages of a very limited complexity of structure are treated, essentially those designated by Carnap (1) by "LN", i. e. languages containing a finite number N of individual symbols and a finite number, Ir,of one-place predicates, in addition to the customary symbols of a lower functional calculus with identity. Abbreviating the presystematic "the semantic information carried by the sentence i" to "In(i)", R1: has to fulfill the requirement any adequate explication of "In" In(i) includes In(j), if and only if i L-implies j. Various possible explications which fulfill this condition are treated. The most fruitful one seems to be that in which In(i) is identified with Cont(i) (read: the content of i), defined as the class of all content-elements of i. It can be shown that Cont is indeed an adequate explicatum of the presystematic concept of semantic information. On the basis of Cont(i) (the absolute information carried by i) Cont(j/i) (the information carried by j relative or in excess to i) is defined by Cont(j/i) =Df Cont(i. j) - Cont(i). It can be shown that for any L-true statement t, Cont(j/t) = Cont(j), so that we could have also defined Cont(j) on the basis of Cont(j/i). From any adequate explication of the concept of amount of semantic information, the fulfillment of the following requirements is stipulated: Abbreviating "the amount of semantic information carried by i" to "in(i)", in(i) >, in(j) if (but not only if) i L-implies j in(i) = 0 if i is L-true in(i) > 0 if i is not L-true. In addition to these three requirements, cated. It is, however, under certain conditions additivity is indi- not easy to specify at this stage the exact nature of the conditions, and it turns out that these conditions are different for various plausible explicata. To explicate the function in(i), has to be defined. In [Prob.], a measure-function ranging over the content-elements a related problem, namely, that of defining measure- functions ranging over negations of content-elements (the state-descriptions) has been treated at great length. With respect to any measure-function defined over state- descriptions, a so-called m-function, we take as our first explicatum the function cont(i), -75- (IX. RESEARCH) COMMUNICATION defined as equal to m(-i) and called content-measure. The range of cont is then extended to include not only content-elements but any sentences whatsoever. The most important properties of cont are cont(i) = 1 - m(i) 0 < cont(i) < 1 cont(i.j) = cont(i) + cont(j), if iVj is L-true. The last property shows that this measure of information is additive with respect to L-disjunct sentences. It can easily be shown that cont fulfills the above requirements. The relative content-measure of j with respect to i, cont(j/i), is defined as cont(i. j) - cont(j). The most interesting property of cont(j/i) is perhaps its being equal to cont(iDj). Interpreted in terms of an "ideal" receiver, this means that for such a receiver with the previous knowledge i, the acquisition of the additional information j increases his information as measured by cont by exactly the same amount as it would have been increased by acquiring the "weaker" statement i = j. Among the various m-functions, that one which assigns equal values to each statedescription, mD (called "mt" in [Prob.] ) is especially simple but unsuitable for purposes of inductive logic, mainly because it does not fulfill the requirement of instantial relevance. In the interest of deductive logic, however, cont-function based upon mD, namely, contD. it is also worthwhile to study the Many theorems referring to contD have indeed an especially simple form. Among the other m-functions, those suitable for inductive logic are denoted by "m" 1 and the cont-functions based on them by " conti." Though the cont-functions fulfill the requirements stated for explicata of amount of information and have many plausible properties (for example, additivity with respect to L-disjunct sentences) they also have other properties which may look less plausible. One of these is the following: If several basic sentences with distinct primitive predi- cates are received as information, the cont-value for the first is one-half, but the relative cont-value for the second is only one-fourth; and, in general, every new basic sentence adds to the content-measure only half as much as its immediate predecessor. This is disturbing, since basic sentences of this type are not only deductively independ- ent, but even inductively independent, if we take inductive independence to be identical with what has been called in [Prob.] initial irrelevance. We might, therefore, be inter- ested to have at our disposal another measure of information which assigns the same value to basic sentences of the type considered, by other basic sentences. If, whether or not they have been preceded in addition (for the sake of normalization) we require that the information-value for each such sentence be 1, it can be shown that these requirements are most simply fulfilled by defining the new concept of measure of information, denoted by "inf," as follows: -76- (IX. COMMUNICATION RESEARCH) 1 inf(i) =Df Log 1 cont(i) where "Log" is short for "log 2 .' Among the more interesting theorems we have 1 inf(i) = Log m(i) = -Log m(i) which recalls, of course, the well-known formula of Hartley. 0 . inf(i) . oo inf(i V j) inf(i) . inf(i.j) inf(i.j) = inf(i) + inf(j), if and only if i is initially irrelevant to j with respect to that m-function on which inf is based. The last theorem states that inf is additive with respect to inductively independent sentences. Against this plausible result, we get another result which looks strange. Whereas cont(i. j) is, at most, equal to the sum of cont(i) and cont(j), inf(i. j) may, for suitable arguments, be greater than inf(i) + inf(j). The relative measure of information can now be defined in the familiar pattern, and among the various measures of information the deductive infD and the inductive inf been specially treated. theorem holds: I have With respect to infD, for instance, a much stronger additivity If i and j are molecular sentences such that no atomic sentence occurs simultaneously in both, then infD(i.j) = infD(i) + infD(j). The fact that each of the proposed explicata for amount of information has plausible as well as implausible properties seems to indicate that we have more than one explicandum in mind, and that we require incompatible properties because we are confusing different, though related, concepts. its field of application. It seems that each explicatum has its value and To make this statement more definite would require additional studies. One of the most promising m-functions is m . Therefore, the properties of cont and inf , based upon m*, have been studied with special care, and many numerical examples have been worked out. Y. Bar-Hillel Reference 1. R. Carnap: Logical Foundations of Probability [Prob.] , University of Chicago Press, Chicago 1950. The terminology of this book is used in this discussion. -77- (IX. J. COMMUNICATION RESEARCH) PARALLEL CHAIN AMPLIFIER The coils mentioned in the Quarterly Progress Report, january 15, 1952, have been rewound with a sufficiently small distributed capacitance (large self-resonance) as to make them appear to be satisfactory. Progress has been hampered by the cumbersomeness of the present measurement technique. The difficulty lies in the very wide frequency range involved. (We are interested in the amplitude response from approximately 1 Mc/sec to 270 Mc/sec.) We are working on some ideas to ease this situation. R. K. Bennett -78- (IX. K. CORRELATION FUNCTIONS OF AMPLITUDE COMMUNICATION RESEARCH) DISTORTED NOISE Correlation functions of stationary gaussian noise passed through nonlinear circuits can be computed by probability techniques. derived: The following general property has been The crosscorrelation function of two coherent gaussian signals, taken after one of them has undergone amplitude distortion, is identical, except for a factor of proportionality, to the crosscorrelation function taken on undistorted signals. A technical report (No. 216) has been prepared in which this relation is demonstrated, and its possible practical applications discussed. The report includes a number of correlation functions computed for some of the more common types of nonlinear distortion. J. -79- J. Bussgang (IX. COMMUNICATION RESEARCH) L. TRANSIENT PROBLEMS Prof. E. A. Guillemin Dr. M. V. Cerrillo I. E. F. Bolinder Dr. F. M. Reza Basic Existence Theorems (continued from Quarterly Progress Report, Jan. 15, 1952) Synopsis of Previous Report A new set of integral representations of direct and inverse Laplace transformations was given. The main feature of this representation is that both f(t) and F(s) can be simultaneously expressed in terms of integrals containing the real part of F(s) along certain semi-infinite contours. When the contour runs over one or several singularities of F(s), but leaves the rest to the right, then the integral must be taken in the Stieltjes sense. When the contour leaves some of the singularities to its right, the corresponding Stieltjes integral representation is also produced. With the aid of this integral representation, a set of theorems was obtained, particular, the following: t < 0, in first, let f(t) be a bounded function for t > 0 and be zero for then F(s) is necessarily a transfer function; second, the necessary and sufficient condition for F(s) to be a transfer function is that F(s) satisfy the integral representation. The theorems are of a constructive nature. The corresponding electrical network for a certain transfer function can be obtained. Part II Introduction The aim of this report is to push the previously reported results somewhat further toward the construction of methods on network synthesis, both in the frequency and time domains. The material given here serves as a preparatory introduction to the basic future results. Because of lack of space and for clarity in the explanation, the presentation of the subject follows heuristic and suggestive lines. The formal mathematical aspect is then not hard to derive. Repetitions of equations already given will be omitted here, so that the reader must continually consult the Quarterly January 15, 1952. -80- Progress Report, (IX. COMMUNICATION RESEARCH) Section 4 Introductory Ideas Concerning New Strategic Integral Representations on Transfer Functions II-4. 0 This section deals with the first steps tending to develop new integral repre- sentations of transfer functions which lately have become quite suitable in founding the theories of constructions of methods for network synthesis. 11-4. 1 In section I, particularly in Eqs. 19, 30, 43, 44, 45, 52, 53, (I-l. 14) we have given sets of representations of Laplace transforms to two basic positions, with respect to the singularities of F(s), 54 and theorem corresponding of the semi-infinite contour of integration 2F (see ref. 1). Our next move is to deform the contour idea of deforming the contour r F in certain strategic configurations. This plays a basic role in the present and in future discus- sion. Let f(t) be a bounded function as described in theorem (2-2. 1) (ref. 1, sec. 1). Then F(s) is a transfer function whose singularities lie on or to the left of the imaginary axis in the s plane. Suppose that F(s) possesses a group of singularities, say poles, branchpoints, etc. in certain domains, say D v , v = 1,2,... n, of the s plane. Figure IX-11 illustrates a possible situation. Now let us deform the contour of integration F continuously in such a way that the singularities and branch-cuts are surrounded, but leave all of them always to the left of the deformed contour when traveling from -ioo to +ioo, as indicated by Fig. IX-11. Note that our present aim is to surround regions containing groups of singularities but not necessarily isolating individually each indiFig. IX-11 Deformation of the contour of integration F around the domains D containing the singularities of F(s). Branch-cuts must not necessarily be straight-line segments, except along the real axis. vidual singularity. Since we have shown in (1) that the transfer function belongs to Laplace transforms, then such deformation is permitted and the functions F(s) and f(t) both remain invariant to such deformations. -81- (IX. COMMUNICATION RESEARCH) We want to develop the corresponding integral representation of F(s) and f(t) under such deformations of the semi-infinite contour F. Such representation is not difficult to obtain from Eqs. 19, 30, 43, etc., but it is not so obvious as it may seem at first sight. Due care must be taken at certain steps of the derivations to avoid fatal violations of the conditions under which the existence of the integral representation is valid. 11-4. 2 To facilitate for the reader the proof of the integral representation now reported, we will first perform a simple operation which takes the function F(s) into the wellknown classical Cauchy integral representation. Let us call This step is convenient but not needed. Fd the deformed contour equivalent to F , already described. thesis F d does not touch any singularity of F(s). By hypo- It is well-known that the fundamental basic expression for f(t) may be written as f(t) F(S) e =- - St dS 1,(II-4.2) Fd where S indicates a point on By multiplying f(t) by e d" dt, integrating from 0 to oc, and inverting the order of integration (permitted because Fd does not touch singularities of F(s)), one gets 00cc F(s) f(t) e - = st dt = 0 (S-s) (S-s) 2, (II-4.2) rd where f is taken along the closed contour formed by Fd plus the infinite circle in the right-half s plane. The integral vanishes along such semicircles. The function F(s) is represented in the inside of the above closed region, where F(s) is analytic. It must be recalled that if F d is allowed to form a "pocket" which contains no singularities of F(s) inside, then the integral 2, (1I-4. 2) produces a zero contribution to F(s). (The integral in this pocket represents an analytic function inside the pocket and zero outside.) 11-4. 3 For clarity in the explanation we will assume that F(s) is decomposed into a sum of function components, say KV(s), which are each generated only by the singularities contained inside the respective pockets or branch-point circuits. This function decom- position is not a necessity in the final theorems. Assume first that F(s) contains singularities in the inside of only two pockets mirrorsymmetrical with respect to the real axis, or in one symmetrical pocket (if the first two pockets have a non-empty intersection). The singularities need not be confined to poles. If there are branch-points inside, let us assume that the cuts are formed by points all contained inside the respective pockets. -82- COMMUNICATION RESEARCH) (IX. The corresponding integral representation for the function F(s) for such pockets, say D 1 and D 2 , is given by F( s) =72 = f F Xdy + (s-y)dXk U(Y, 2 U(, (s-)2 ) + (Riemann's sense) 2 =-f 7rf Xdy + (s-y)dk U, 1(Y, 2 (K, 1)( , (s- )2 + X where (y, k) are the coordinates of points of the contour around the pocket. U(K, 1 )(y, 1, (II-4. 3) U(y, k) and K) are respectively the real part of F(s) or Kl(s) on the pocket contour. The They may have a quite different reader must not confuse the function F(s) and Kl(s). character, because F(s) is necessarily a transfer function but Kl(s) is not necessarily so. For example, let the singularities inside the pockets D 1 and D 2 be a simple pole of residue one located at s = -o- + iw . Then, the corresponding transfer function is F(s) 2(s + O- ) 2 ( + (s+ o)Z 1 o s-s + S o 1 s-s - I o 2, (11-4.3) = K (s) + K 2 (s); s : - o- + i= Alternate forms to 1, (II-4. 3) are where neither K 1 (s) nor K 2 (s) are tr ansfer functions. given by [X + (s-y)g'(y)] (s-y)2 +2 + g,() 3, (11-4. 3) 2/ 0D U(y, k)di [x + (s-y)g'()lU(K, (s-y) 2 + 1 )(Y-, )dl 1i + g'(y)2 1 where g'(y) indicates the derivative at a point (y, k) on the contour of integration. The above expression presupposes that the contour of integration is a closed curve having a continuous turning tangent. (The corresponding expression when the above closed contour possesses corners will be given later.) For the particular case of a circular region D 1 , centered at oR, the above expressions reduce to -83- + iw and with radius (IX. COMMUNICATION RESEARCH) +T- F(s) = -TT s - -)2 0 0 (s - +w 2 + R2] - 2R(-w sin 0 + (s 0 0 u(R,0) ) cos 0 - R [-w 0sin - ) cos 0) 0O UK 1 (R, 0) RdO 4, (11-4. 3) It is convenient to illustrate the correctness of 4, (11-4. 3) by means of a few simple examples: Take first F(s) as given by 2, (11-4. 3) and set the pole s at the center of the circle. R is arbitrary, and for simplicity let us make RK (S) 1 1 s s - s . Here 0. cos 0 cos R (R, 6) U, K OR Hence 5, (1I-4. 3) [- osin 0 + (s + - ) cos 2 F(s) --4- + (s+o) -W as it should be. O] cos 0 dO 2 + O +0 2(s + o) (s+a-) 0 O 2 +w 2 0 The important feature of this new representation comes from the fact that F(s) is here generated by a K (s) function. Of course, computing the above integral directly with the complete real part of F(s) on the circle, one obtains exactly the same result. Suppose now that the "pocket" D 1 contains a finite number n of simple poles, say at sk' k = 1, 2, ... n, each having a positive residue a k . The corresponding F(s) follows with ease from 3, (11-4. 3) or 4, (11-4. 3) since the domain D1 can be broken in n circular nonoverlapping small subdomains, each surrounding one pole. (This is justified by 2, (11-4. 2).) By applying 5, (II-4. 3) to each subdomain, we finally get F(s) k=n (s + k) 6, (11-4. 3) k=l 11-4. 4 (s + ok k In this subsection, let us consider a pocket which is symmetrically bisected by the real axis, such as D 0 in Fig. IX-11. The corresponding integral representation of the transfer function F(s) which is generated by the singularities in such a pocket has the following integral representation F(s) = 2 [X + (s-y)g'(y) (s-y) + X2 fU(y,X) UK, o (-Y,k dI 1, (II-4.4) 1 + g'(N)2 The reader must note that the integration is to be taken only along the upper contour of -84- (IX. COMMUNICATION RESEARCH) D . The representation 4, (11-4. 3) can also be used here by taking the integral between o 0 and Tr only. II-4. 5 Let us consider the integral along the banks of the branch-cuts. In order to fulfill the symmetry condition imposed on the contour f , the branch-cutting must be Otherwise made with mirror symmetry with respect to the real axis of the s plane. the representation given in Part I would be invalidated. Let us consider the function An example of the resulting violation is quite convenient. 1/v,' The branch-points are at s = 0, o0 . (the Laplace transform of I/ fft). Suppose we cut the s plane along the straight line inclined at an angle 0o to the real axis (see Fig. IX-12a). Let us define the corresponding Riemannian sheets f jT. -2Tr+ O 1 I* 0 < 0 < 0< 0 and fII < 0 +27r The corresponding sign distribution of the real and imaginary parts of 1/,/ 0 _4f ++++++ SIGN OF REAL SIGN OF Im., -- 1rs +1 , SF + + ++SGNOF REAL SIGNOF REAL 1 SIGN OF Im. ,rS Fig. IX-12 Resulting asymmetry of Real (1/fs) -85- as follows with respect to the real axis. in each (IX. COMMUNICATION RESEARCH) sheet is indicated in Fig. IX-12b and IX-12c. These plots put in evidence that Real (1/f-) does not have even symmetry and Im(l/f-s) does not have odd symmetry with regard to the real axis when 60 ± w (0o = 0 violates the analyticity of F(s) in the right-hand side of the s plane). Hence, 6o must be set equal to n. If 1/Tis to represent a p. r. function, then the sheet I, o00= w, is the only solution. Consider first a branch-cut in the upper part of the plane (not along the real axis) as illustrated in Fig. IX-12a. The cut need not be a straight-line segment. Let us assume, for simplicity in the explanation, that F(s) is a function whose singularities are two branch-points, s = s a s = sb (s - sa)(s - Sb , (as for example, It can immediately be shown that F(s) is represented by , [kdy + (s-y)dk]U( U(Y' X) 2 )2 (s-y) + F(s) = 2 sb a 1, (II-4.5) Jump U (y, X) (Xd2 + (s-y)dk) + 2 2 [(s-y)+ iT 2] ,--sb sb con tour -a a where the last two integrals of the third member must be taken around each branchpoint. These last integrals have the form 4, (11-4. 3) when R- 0. If the branch-cut cuts the real axis, then the needed integration is similar to 1, (11-4. 5) except that we need only go around the upper part of the branch-cut. That is 2 F(s) = [Xdy + (s-y)dX] (s- _ .real axis v) + 2 [kdy + (s-)dA X) (-2 /contour -86- + Jump U(y, X) 2 2, (1I-4. 5) COMMUNICATION (IX. RESEARCH) Finally, if the cut is made along the real axis, we can write F(s) = V(Y,,O) dy +-2 Tr (s- ) Tr + 3, (11-4. 5) ~~fTr J sa sb where the explicit expression for the last two integrals is given by 2 f + XZ (s-y) 2) V(y, (s-y)dy - XdX 4, (11-4.5) + X (s-y) y = R cos 0 R = constant} S= R sin 0 reference 1. See Eq. 7, The reader should observe that in the last two representations we have used V(y,X) This anomaly will be properly straightened out later. This subinstead of U(y, k). Note: section will be closed with two illustrative examples. Example I: Take F(s) = 1/ s + 1, straight segment from +i to -i. 1/ 1 7 Let us cut the s plane by the with branch points at s = ±i. The real part along the cut, sheet I, is given by at the right bank, and by -1/1 - K at the left bank of the cut. By direct application of 2, (1I-4. 5) and setting y = 0, -2s F(s)= one gets dk Os 2 5, (11-4. 5) + X2 2 since the integral around +i vanishes. To evaluate the integral we may use reference 2, page 72, entry No. 387, which gives dx (ax 2 + b) = 1 (fx 2 + g) tan-1 x4(ag - bf); b(fx 2 + g) b(ag - bf) By direct application we find 1 S 1 s2 0 + dk 1 W 2 s 1 S 1 -87- 2 + 12 ~1 ag > bf (IX. COMMUNICATION RESEARCH) and consequently F(s) = s2 +1 as it should be. Example II: 1 F(s)=; -1 V(y, 0) By direct application of 3, (11-4. 5), = -oo s -a _s b and since the integration 4, (1I-4. 5) around s = 0 vanishes, one gets -00 F(s)=L2r-1 Tr J- dy - s +y 0 Using reference 2, page 197, entry No. 856. 3, one gets 00 00 1 d 0 ys + dx y 0 1 T(i+t) Hence F(s) - 1 as it should be. 11-4. 6 From these particular cases, one can write down with ease the corresponding integral representation in the general case. To facilitate the writing, we will use a suggestive notation as follows: CD indicates integration around a pocket which contains no common points with the real axis of the s plane. The singularities of each pocket lie inside the pocket contour. Pockets need not be circles. r{ Dk indicates integration around the upper contour of a pocket, symmetrically bisected by the real axis of the s plane. when the pocket is The singularities of the pocket do not lie on the pocket contour. (~Cn indicates integration around the banks of a branch-cut which contains no points in common with the real axis. gPC Branch-cuts need not be straight-line segments. indicates integration around the upper branches of a branch-cut which is -88- (IX. COMMUNICATION RESEARCH) symmetrically bisected by the real axis of the s plane. ( C. indicates integration around the upper part of a straight-line branch-cut which lies along the real axis of the s plane. One must remember that all pockets and branch-cuts of the s plane must have mirror symmetry with respect to the real axis. With this notation, the corresponding integral representation (Riemann's sense) of F(s) is given by the condensed notation F(s) = {integrals + ~ of type 3, (II-4. 3) + D integral7Dk of type 1, (II-4. 4)} + k {integral + + integrals Cg of type 1, (11-4. 5) + Ch of type 2, (11-4. 5) + 1, (II-4.6) h + {integrals --- ' of type 3, (II-4. 5)} j This expression is not written in full; our particular aim now is to put in evidence the structural formation of the function F(s). In section 5 we shall study some funda- mental structural properties of transfer functions which are of basic importance in the theory of network synthesis. This subject will be continued in the Quarterly Progress Report for July 15, M. V. 1952. Cerrillo References 1. Quarterly Progress Report, 1952 2. H. B. Dwight: Research Laboratory of Electronics, Table of Integrals, MacMillan, -89- New York 1947 M. I. T., Jan. 15, (IX. COMMUNICATION 2. RESEARCH) Conformal Mapping of Physically Realizable Passive Networks Certain studies have been made on the conformal mapping of physically realizable impedance functions, with particular emphasis on the geometry of the network. These studies are aimed toward possible improvements of existing synthesis procedures. F. -90- M. Reza