共查询到20条相似文献,搜索用时 564 毫秒
1.
2.
Cunsheng Ding Chaoping Xing 《Communications, IEEE Transactions on》2004,52(2):263-268
Optical orthogonal codes (OOCs) have applications in optical code-division multiple-access communications systems and other wideband code-division multiple environments. They can also be used to construct protocol sequences for multiuser collision channel without feedback, and constant-weight codes for error detection and correction. We have given a cyclotomic construction of several classes of (2/sup m/-1,w,2) OOCs recently. The purpose of this paper is to present five classes of (q-1,w,2) OOCs, and thus five classes of binary constant-weight cyclic codes, where q is a power of an odd prime. 相似文献
3.
Klove T. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1996,42(1):172-179
The worst case probability of undetected error for a linear [n,k:q] code used on a local binomial channel is studied. For the two most important cases it is determined in terms of the weight hierarchy of the code. The worst case probability of undetected error is determined explicitly for some classes of codes 相似文献
4.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1975,21(1):106-110
This correspondence presents a complete solution to the problem of constructing maximalq -nary codes, for any word lengthn and minimum distanced in the regionqd geq (q - 1)n . Several interesting results regarding the interdependence of these codes are developed, which reveal the unique structure of the code spaces of the regionqd geq (q - 1)n . Some new maximal codes are obtained for the regionqd < (q - 1)n . 相似文献
5.
A method for constructing linear codes over the ring of integers modulo q, Z/sub q/, using the idea of generalised concatenated (GC) codes is presented.<> 相似文献
6.
7.
8.
9.
A characterization of MMD codes 总被引:2,自引:0,他引:2
Faldum A. Willems W. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1998,44(4):1555-1558
Let C be a linear [n,k,d]-code over GF(q) with k⩾2. If s=n-k+1-d denotes the defect of C, then by the Griesmer bound, d⩽(s+1)q. Now, for obvious reasons, we are interested in codes of given defect s for which the minimum distance is maximal, i.e., d=(s+1)q. We classify up to formal equivalence all such linear codes over GF(q). Remember that two codes over GF(q) are formally equivalent if they have the same weight distribution. It turns out that for k⩾3 such codes exist only in dimension 3 and 4 with the ternary extended Golay code, the ternary dual Golay code, and the binary even-weight code as exceptions. In dimension 4 they are related to ovoids in PG(3,q) except the binary extended Hamming code, and in dimension 3 to maximal arcs in PG(2,q) 相似文献
10.
11.
杨义先 《电子科学学刊(英文版)》1988,5(3):239-240
This paper presents four classes of codes which meet the Johnson's upper bound and twoclasses of codes which have gone beyond the Graham's lower bound. 相似文献
12.
Heng Tang Jun Xu Yu Kou Lin S. Abdel-Ghaffar K. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2004,50(6):1269-1279
This correspondence presents three algebraic methods for constructing low-density parity-check (LDPC) codes. These methods are based on the structural properties of finite geometries. The first method gives a class of Gallager codes and a class of complementary Gallager codes. The second method results in two classes of circulant-LDPC codes, one in cyclic form and the other in quasi-cyclic form. The third method is a two-step hybrid method. Codes in these classes have a wide range of rates and minimum distances, and they perform well with iterative decoding. 相似文献
13.
Klove T. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1995,41(1):279-283
Codes of (d,k) sequences of constant Hamming weight are considered. Perfect codes correcting a single insertion, deletion, or peak-shift are defined and shown to exist. A systematic method to construct large classes of perfect codes is given. A number of related problems are considered 相似文献
14.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1972,18(6):785-794
Polynomial codes and their dual codes as introduced by Kasami, Lin, and Peterson have considerable algebraic and geometric structure. It has been shown that these codes contain many well-known classes of cyclic codes as subclasses, such as BCH codes, projective geometry codes (PG codes), Euclidean geometry codes (EG codes), and generalized Reed-Muller codes (GRM codes). In this paper, combinatorial expressions for the number of information symbols and parity-check symbols in polynomial codes are derived. The results are applied to two important subclasses of codes, the PG codes and EG codes. 相似文献
15.
16.
List decoding of q-ary Reed-Muller codes 总被引:2,自引:0,他引:2
Pellikaan R. Xin-Wen Wu 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2004,50(4):679-682
The q-ary Reed-Muller (RM) codes RM/sub q/(u,m) of length n=q/sup m/ are a generalization of Reed-Solomon (RS) codes, which use polynomials in m variables to encode messages through functional encoding. Using an idea of reducing the multivariate case to the univariate case, randomized list-decoding algorithms for RM codes were given in and . The algorithm in Sudan et al. (1999) is an improvement of the algorithm in , it is applicable to codes RM/sub q/(u,m) with u
相似文献
17.
Explicit construction of families of LDPC codes with no 4-cycles 总被引:1,自引:0,他引:1
Jon-Lark Kim Peled U.N. Perepelitsa I. Pless V. Friedland S. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2004,50(10):2378-2388
Low-density parity-check (LDPC) codes are serious contenders to turbo codes in terms of decoding performance. One of the main problems is to give an explicit construction of such codes whose Tanner graphs have known girth. For a prime power q and m/spl ges/2, Lazebnik and Ustimenko construct a q-regular bipartite graph D(m,q) on 2q/sup m/ vertices, which has girth at least 2/spl lceil/m/2/spl rceil/+4. We regard these graphs as Tanner graphs of binary codes LU(m,q). We can determine the dimension and minimum weight of LU(2,q), and show that the weight of its minimum stopping set is at least q+2 for q odd and exactly q+2 for q even. We know that D(2,q) has girth 6 and diameter 4, whereas D(3,q) has girth 8 and diameter 6. We prove that for an odd prime p, LU(3,p) is a [p/sup 3/,k] code with k/spl ges/(p/sup 3/-2p/sup 2/+3p-2)/2. We show that the minimum weight and the weight of the minimum stopping set of LU(3,q) are at least 2q and they are exactly 2q for many LU(3,q) codes. We find some interesting LDPC codes by our partial row construction. We also give simulation results for some of our codes. 相似文献
18.
Bit-error bounds for trellis-coded MPSK in mixed fading channels 总被引:1,自引:0,他引:1
Bit-error probability (BEP) bounds of trellis-coded MPSK systems over two classes of mixed fading channels are studied. These two classes of channels have been proposed as candidate models for mobile satellite communications. The first class consists of slow and frequency-nonselective fading channels whose output field strengths follow a probability law characterized by a convex combination of Rician and Rayleigh/lognormal distributions. For the other class of fading channels, the received signal amplitude has a convex combination of Rician and Rician/lognormal distributions. We analyze performance bounds for trellis codes that belong to the class of either geometrically uniform codes (GUCs) or quasi-regular codes (QRCs). Receivers with either ideal channel state information (CSI) or no CSI at all are considered. We examine asymptotic behaviors of these codes and identify key design parameters. Numerical results are provided to illustrate and compare the BEP performances of various codes and to validate the usefulness of the asymptotic analysis 相似文献
19.
On robust and dynamic identifying codes 总被引:1,自引:0,他引:1
Honkala I. Karpovsky M.G. Levitin L.B. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2006,52(2):599-612
A subset C of vertices in an undirected graph G=(V,E) is called a 1-identifying code if the sets I(v)={u/spl isin/C:d(u,v)/spl les/1}, v/spl isin/V, are nonempty and no two of them are the same set. It is natural to consider classes of codes that retain the identification property under various conditions, e.g., when the sets I(v) are possibly slightly corrupted. We consider two such classes of robust codes. We also consider dynamic identifying codes, i.e., walks in G whose vertices form an identifying code in G. 相似文献
20.
This letter analyzes the behavior of two time-code division architectures serving voice and data applications on the uplink of a cellular radio system. Both solutions attribute speech users one code over a timeslot, whereas data users are granted several codes over the same timeslot or a single code over several time slots. Call admission control dynamically attributes resources if specified levels of transmission quality are met. The blocking probability of the two classes of users is determined, demonstrating that the multicode T/CDMA approach performs better than the multislot solution and than a pure CDMA system 相似文献