共查询到20条相似文献,搜索用时 156 毫秒
1.
2.
3.
参数不确定混沌系统的自适应同步控制 总被引:5,自引:1,他引:4
用同步误差最小化的自适应方法与替代状态变量的同步法相结合,来研究混沌系统的同步控制,并且估计驱动系统的未知参数,所需的信息只要一个这个系统的状态变量.未知参数可能显含在这个已知状态变量的发展方程中,也可能不显含在这个发展方程中,只要满足一定的条件,都可以实现参数估计与系统的混沌同步.以Lorenz系统为例,进行了具体分析与数值模拟,所得结果说明该控制策略是有效的. 相似文献
4.
基于求解校验序列的(n,1,m)卷积码盲识别 总被引:6,自引:0,他引:6
伴随信息对抗和智能通信的快速发展,信道编码识别已成为信息恢复领域一个重要的课题。针对(n,1,m)卷积码盲识别问题,该文提出一种新的识别方法,该方法首先提出了校验序列的概念,通过改进后的矩阵模型求解出校验序列,进而由校验序列构造方程求解出生成多项式矩阵,完成识别。最后,通过实例仿真验证了该方法能够在参数n和码字起始位置都未知情况下有效识别出(n,1,m)卷积码。 相似文献
5.
根据删余卷积码具有较低的译码复杂度这一特征,提出了一种适用于普通高码率卷积码的低复杂度译码方法。通过多项式生成矩阵表示法,推导了删余卷积码的等效多项式生成矩阵,给出了等效多项式生成矩阵的计算准则。在分析删余卷积码与相同码率普通卷积码的等效关系和区别的基础上,提出了高码率卷积码的删余等效并给出了计算高码率卷积码删余等效后原始码和删余矩阵的方法。以原始码和删余矩阵构成的删余等效结构为译码基础,实现了高码率卷积码的低复杂度译码,其译码复杂度与原始码相当。仿真结果表明,删余等效译码方法相对于正常译码方法,其性能损失很小。 相似文献
6.
7.
8.
9.
在现代数字通信系统中,纠错编码技术的作用是很重要的,本文以卷积码为例,分析了纠错码的原理,并利用matlab实现了卷积码的编码和解码,对卷积码纠错原理进行了仿真研究。 相似文献
10.
阐述了电力线通信系统中卷积码及其Viterbi译码的信道编码方法,给出了(2,1,6)卷积码编译码的设计以及采用VerilogHDL硬件描述语言完成卷积码编译码的FPGA实现方法。 相似文献
11.
Forney G.D. Jr. Trott M.D. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1993,39(5):1491-1513
A group code C over a group G is a set of sequences of group elements that itself forms a group under a component-wise group operation. A group code has a well-defined state space Σk at each time k. Each code sequence passes through a well-defined state sequence. The set of all state sequences is also a group code, the state code of C. The state code defines an essentially unique minimal realization of C. The trellis diagram of C is defined by the state code of C and by labels associated with each state transition. The set of all label sequences forms a group code, the label code of C, which is isomorphic to the state code of C. If C is complete and strongly controllable, then a minimal encoder in controller canonical (feedbackfree) form may be constructed from certain sets of shortest possible code sequences, called granules. The size of the state space Σk is equal to the size of the state space of this canonical encoder, which is given by a decomposition of the input groups of C at each time k. If C is time-invariant and ν-controllable, then |Σk|=Π1⩽j⩽v|Fj/F j-1|j, where F0 ⊆···⊆ Fν is a normal series, the input chain of C. A group code C has a well-defined trellis section corresponding to any finite interval, regardless of whether it is complete. For a linear time-invariant convolutional code over a field G, these results reduce to known results; however, they depend only on elementary group properties, not on the multiplicative structure of G. Moreover, time-invariance is not required. These results hold for arbitrary groups, and apply to block codes, lattices, time-varying convolutional codes, trellis codes, geometrically uniform codes and discrete-time linear systems 相似文献
12.
A counterexample is presented disproving the conjecture that the planar least-squares inverse of a 2-variable polynomial is devoid of zeros when both variables are inside or on the unit circle. 相似文献
13.
模型构建是模型检验的基础,在微控制器代码模型构建过程中面临状态爆炸的问题。由于生成模型的状态数量与代码规模密切相关,通过简化代码可以有效缩减生成的状态数量。该文提出了敏感变量和敏感位置的概念,并以此为基础提出了结合子程序摘要信息的敏感位置识别算法;该算法从待验证的性质出发,提取敏感变量,识别代码中与敏感变量相关的敏感位置;模型构建过程中只对敏感位置对应代码进行建模,从而实现对模型状态的缩减。实验结果表明所提的方法能够有效缓解微控制器代码模型生成过程中的状态爆炸问题。 相似文献
14.
15.
Naraghi-Pour M. Hegde M. Arora N. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1994,40(1):153-160
Fixed (nonadaptive) and forward adaptive differential pulse code modulation of regenerative composite sources is investigated. In the fixed code, an approximate formula is given for the optimal value of the prediction coefficient. This is then used as an initial guess to optimize the code (predictor and quantizer) through a numerical method. In the forward adaptive scheme, the state of the switch in the composite source is estimated using a MAP sequence estimation algorithm, and the code is then matched to the mode process corresponding to the estimated switch state. The performance of the two systems is evaluated with quantizers of 4, 8, and 16 levels. The results show that the forward adaptive scheme significantly outperforms optimized fixed DPCM in the sense of mean-squared error. Stochastic stability of the code is also established for the fixed DPCM scheme as well as for an adaptive scheme which receives the switch state as side information 相似文献
16.
Generation of the 2-variable very-strictly-Hurwitz polynomial (VSHP) using properties of derivatives of even or odd parts of Hurwitz polynomials and their applications in designing 2-D recursive digital filters satisfying prescribed magnitude and constant group delay response is described. 相似文献
17.
Fagnani F. Zampieri S. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1999,45(1):3-31
Given a controllable group code, it has been shown by Forney (1970, 1973), Trott, and Loeliger (1994) that it is possible to construct a canonical encoder whose state space coincides with the canonical state space of the code, that is the essential element determining the minimal trellis of the code. The construction of such an encoder is based on the concept of controllability granule. In this paper the construction of a syndrome former for an observable group code is proposed. This syndrome former exhibits analogous properties of the above mentioned canonical encoder and, in particular, its state space coincides with the canonical state space of the code. The proposed construction is based on the concept of observability granule, introduced by Forney and Trott (1993), which dualizes the concept of controllability granule. Similarly to what happens for the encoders, each observability granule produces a map and all these maps together provide the syndrome former. The main difference is that here, to achieve the right state-space dimension, the automata associated with these maps do not evolve independently from each other, but are coupled according to a triangular structure 相似文献
18.
Hashem Moradmand Ziyabar Mahnaz Sinaie Ali Payandeh Vahid Tabataba Vakili 《Signal, Image and Video Processing》2014,8(7):1263-1272
Recently, arithmetic coding has attracted the attention of many scholars because of its high compression capability. Accordingly, in this paper, a method that adds secrecy to this well-known source code is proposed. Finite state arithmetic code is used as source code to add security. Its finite state machine characteristic is exploited to insert some random jumps during source coding process. In addition, a Huffman code is designed for each state to make decoding possible even in jumps. Being prefix-free, Huffman codes are useful in tracking correct states for an authorized user when he/she decodes with correct symmetric pseudo-random key. The robustness of our proposed scheme is further reinforced by adding another extra uncertainty by swapping outputs of Huffman codes in each state. Several test images are used for inspecting the validity of the proposed Huffman finite state arithmetic coding (HFSAC). The results of several experimental key space analyses, statistical analyses, key and plaintext sensitivity tests show that HFSAC with a little effect on compression efficiency provides an efficient and secure method for real-time image encryption and transmission. 相似文献
19.
Hung-Hua Tang Mao-Chao Lin 《Communications, IEEE Transactions on》2002,50(1):37-47
We show that the state complexity profile of a convolutional code C is the same as that of the reciprocal of the dual code of C in case that minimal encoders for both codes are used. Then, we propose an optimum permutation for any given (n, n-1) binary convolutional code that will yield an equivalent code with the lowest state complexity. With this permutation, we are able to find many (n, n-1) binary convolutional codes which are better than punctured convolutional codes of the same code rate and memory size by either lower decoding complexity or better weight spectra 相似文献
20.
Shany Y. Be'ery Y. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2000,46(4):1523-1527
An upper bound on the minimal state complexity of codes from the Hermitian function field and some of its subfields is derived. Coordinate orderings under which the state complexity of the codes is not above the bound are specified. For the self-dual Hermitian code it is proved that the bound coincides with the minimal state complexity of the code. Finally, it is shown that Hermitian codes over fields of characteristic 2 admit a recursive twisted squaring construction 相似文献