共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
Linear spans of modified de Bruijn sequences 总被引:3,自引:0,他引:3
Mayhew G.L. Golomb S.W. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1990,36(5):1166-1167
Order n modified de Bruijn sequences are created by removing a single zero from the longest run of zeros in period 2n de Bruijn sequences. The M sequences are then the natural undisguised linear subset of modified de Bruijn sequences. Theorems are given on the linear spans of modified de Bruijn sequences and data are presented for 4⩽n ⩽6 相似文献
3.
4.
A generalized recursive construction for de Bruijn sequences 总被引:1,自引:0,他引:1
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1983,29(6):843-850
This paper is concerned with the construction of de Bruijn sequences of spann --binary sequences of period2^{n} in which every binaryn -tuple appears as somen consecutive terms in one period of the sequence. Constructions in the literature are based on maximum length linear sequences, algorithms which start from scratch, and recursive methods which start with a single de Bruijn sequence of spann and produce one of spann+1 . We give a more general recursive construction which takes two de Brnijn sequences of spann and produces a de Bruijn sequence of spann+1 . In addition, for a special case of the construction, the complexity (shortest linear recursion that generates the sequence) of the resulting sequence is determined in terms of the complexities of the ingredient sequences. In particular, de Bruijn sequences of spann+1 with maximum complexity2^{(n+1)}-1 are obtained from maximum complexity sequences of spann . Reverse-complementary de Bruijn sequences are also considered. 相似文献
5.
A method for constructing decodable de Bruijn sequences 总被引:1,自引:0,他引:1
Mitchell C.J. Etzion T. Paterson K.G. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1996,42(5):1472-1478
We present two related methods of construction for de Bruijn (1946) sequences, both based on interleaving “smaller” de Bruijn sequences. Sequences obtained using these construction methods have the advantage that they can be “decoded” very efficiently, i.e., the position within the sequence of any particular “window” can be found very simply. Sequences with simple decoding algorithms are of considerable practical importance in position location applications 相似文献
6.
Construction of de Bruijn sequences of minimal complexity 总被引:1,自引:0,他引:1
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(5):705-709
It is well known that the linear complexity of a de Bruijn sequenceS of length2^{n} is bounded below by2^{n- 1} + n forn geq 3 . It is shown that this lower bound is attainable for alln . 相似文献
7.
n级修正de Bmijn序列,就是从n级de Bmijn序列所有的2“个状态中去掉全0状态而得到的移位寄存器序列。为深入了解修正de Bmijn序列,研究了修正de Bmijn序列的重量和线性复杂度,提出了相关的定理并进行了证明,并给出了5—6级修正de Bmijn序列的线性复杂度和重量的分布统计数据。 相似文献
8.
Etzion T. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1999,45(2):693-698
The linear complexity of a de Bruijn sequence is the degree of the shortest linear recursion which generates the sequence. It is well known that the complexity of a binary de Bruijn sequence of length 2n is bounded below by 2n-1+n and above by 2n-1 for n⩾3. We briefly survey the known knowledge in this area. Some new results are also presented, in particular, it is shown that for each interval of length 2[log n]+1 in the above range, there exist binary de Bruijn sequences of length 2n with linear complexity in the interval 相似文献
9.
On the distribution of de Bruijn sequences of given complexity 总被引:1,自引:0,他引:1
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(4):611-614
The distributiongamma (c, n) of de Bruijn sequences of ordern and linear complexityc is investigated. It is shown that forn geq 4, gamma (2^{n} - 1, n) equiv 0 pmod{8} , and fork geq 3, gamma (2^{2k} - 1,2k) equiv 0 pmod{l6} . It is also shown thatgamma (c, n) equiv 0 pmod{4} for allc , andn geq 3 such thatcn is even. 相似文献
10.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1986,32(3):422-423
It is shown that the number of de Bruijn sequences of ordern and linear complexityc is not a multiple of four for everyn andc . 相似文献
11.
郑伟 《信息安全与通信保密》2007,(4):120-122
n级修正de Bruijn序列,就是从n级de Bruijn序列所有状态中去掉全0状态而得到周期为2n-1的移位寄存器序列。文章讨论了修正de Bruijn序列的伪随机特性,主要研究了修正deBruijn序列的自相关特性和线性复杂度,给出了4-6级修正de Bruijn序列旁瓣特性和线性复杂度的统计数据。 相似文献
12.
The complexity and autocorrelation properties of de Bruijn sequences generated by an algorithm of Etzion and Lempel are investigated. While the autocorrelation results deviate from the behaviour expected for truly random sequences, the complexity distributions are very encouraging. Specifically, the minimum complexities are significantly greater than those of other de Bruijn sequences. 相似文献
13.
产生2元de Bruijn序列的一个新算法 总被引:3,自引:0,他引:3
2元n级deBruijn序列是由n级移位寄存器产生的周期为2n的移位寄存器序列,给出了2元deBruijn序列的一个新的生成算法,该算法能生成2s·g(n,s)个n级如de Bruijin序列,其中,0≤s≤2(n-7)/3;当 2l-1<s≤2L时,g(n,s)=n-3L-6-[(n-2L-6)/(L+1)]。 相似文献
14.
Two new presentation forms of multilevel de Bruijn sequences (BS) have been introduced as geometric and algebraic structures. The attractive and practical properties of these structures have been found. This formed the basis for proposing a constructive method for the synthesis of generating and complete classes of BS. It has been shown that the application of the found classes of quaternary BS in encryption ensures a two-fold reduction of the memory space required for storing the cryptographic substitution boxes (S-boxes). 相似文献
15.
In this paper, we study an algorithmic model for wireless ad hoc and sensor networks that aims to be sufficiently close to
reality as to represent practical realworld networks while at the same time being concise enough to promote strong theoretical
results. The quasi unit disk graph model contains all edges shorter than a parameter d between 0 and 1 and no edges longer than 1. We show that—in comparison to the cost known for unit disk graphs—the complexity
results of geographic routing in this model contain the additional factor 1/d
2. We prove that in quasi unit disk graphs flooding is an asymptotically message-optimal routing technique, we provide a geographic
routing algorithm being most efficient in dense networks, and we show that classic geographic routing is possible with the
same asymptotic performance guarantees as for unit disk graphs if .
相似文献
Aaron Zollinger (Corresponding author)Email: |
16.
Qinghua Guo Li Ping 《Selected Areas in Communications, IEEE Journal on》2008,26(2):311-319
In this paper, a vector-form factor graph representation is derived for intersymbol interference (ISI) channels. The resultant graphs have a tree-structure that avoids the short cycle problem in existing graph approaches. Based on a joint Gaussian approximation, we establish a connection between the LLR (log-likelihood ratio) estimator for a linear system driven by binary inputs and the LMMSE (linear minimum mean-square error) estimator for a linear system driven by Gaussian inputs. This connection facilitates the application of the recently proposed Gaussian message passing technique to the cycle-free graphs for ISI channels. We also show the equivalence between the proposed approach and the Wang-Poor approach based on the LMMSE principle. An attractive advantage of the proposed approach is its intrinsic parallel structure. Simulation results are provided to demonstrate this property. 相似文献
18.
Permutation filters are a broad class of nonlinear selection filters that utilize the complete spatial and rank order information of observation samples. This use of joint spatial-rank information has proven useful in numerous applications. The application of permutation filters, however, is limited by the factorial growth in the number of spatial-rank orderings. Although M-permutation filters have been developed to address the growth in orderings, their a priori uniform selection of samples is not appropriate in most cases. Permutation filter implementations based on acyclic connected graphs provide a more general approach that allows the level of ordering information utilized to automatically adjust to the problem at hand. In addition to developing and analyzing graph implementations of permutation filters this paper presents a LNE based optimization of the graph structure and filter operation. Simulation results illustrating the performance of the optimization technique and the advantages of the graph implementation are presented. 相似文献
19.
It is shown that all finite Cayley graphs can be represented by generalized chordal rings (GCR). An example Borel Cayley graph is used to illustrate the generation of GCR representations. A sufficient condition is given for the representation of a Cayley graph as a chordal ring (CR). With the integer labeling of GCR representations, a straightforward, progressive routing algorithm based on table look-up is summarized 相似文献
20.
1 Introduction The lightwave CATV systems recently can provide the extremely high-fidelity transmission required by the AM-VSB video format. These systems can also provide the satisfactory performance of CNR, CSO and CTB. Such performance has been realize… 相似文献