共查询到20条相似文献,搜索用时 15 毫秒
1.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(3):509-519
Continuous phase frequency shift keying (CPFSK) is a constant amplitude modulation method with good spectral sidelobe properties. Good error probability properties can be obtained with coherent maximum-likelihood detection. In this paper we study the Euclidean distance properties of signals formed by a conventional rate1/2 convolutional encoder followed by a binary or4 -level CPFSK modulator. The minimum Euclidean distance is calculated for these signal sets as a function of the modulation index and the observation interval length. The optimum detector is discussed for rational modulation index values. The best obtainable codes are found for the case of short rate1/2 codes with binary or4 -level CPFSK modulation. Lists of the best codes are given. Among the results are that the noncatastrophic rate1/2 convolutional codes with optimum free Hamming distance do not in general give the best Euclidean distance with CPFSK. 相似文献
2.
3.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1977,23(4):518-520
If a linear binary code of lengthn contains the all-one codeword, than the weights of the code are symmetric. We consider those codes which do not contain the all-one codeword and yet have an equal number of symmetrically placed odd weight words. 相似文献
4.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1980,26(3):363-363
Some new examples of binary Bose-Chaudhuri-Hocquanghen (BCH) codes of length 255 are found for which the minimum distance and designed distance agree. 相似文献
5.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1986,32(1):106-108
LetC(B) denote the binary cyclicAN code with generatorA , whereAB=2^{n} - 1 . It is known thatC(B) is equidistant ifB is a prime powerp^{k} , where either2 or-2 is primitive moduloB providedpequiv 1 pmod{3}{rm if} k > 1 . It is conjectured that these are the onlyB such thatC(B) is equidistant. We have verified this forB < 100 000 . Several results are established that further limit the possibilities for counterexamples to the conjecture. 相似文献
6.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1982,28(5):789-790
The rank of the generating matrix in certain cases is computed. The result is perhaps of interest in its own right, apart from any applications it may have. The method of proof, utilizing as it does a knowledge of the parameters of a certain association scheme, is a technique which can be profitably used elsewhere. 相似文献
7.
8.
9.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1975,21(3):345-350
Leth_1(x)h_2(x) be the parity-check polynomial of a binary cyclic code. This correspondence presents a formula for decomposing words in the code as sums of multiples of words in the codes whose parity-check polynomials areh_1(x) andh_2(x) . This decomposition provides information about the weight distribution of the code. 相似文献
10.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(2):407-411
We find the minimum distances of the binary(113, 57) , and ternary(37, 19), (61, 31), (71, 36) , and(73, 37) quadratic residue codes and the corresponding extended codes. These distances are15, 10, 11, 17 , and17 , respectively, for the nonextended codes and are increased by one for the respective extended codes. We also characterize the minimum weight codewords for the(113, 57) binary code and its extended counterpart. 相似文献
11.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1982,28(5):787-789
A construction method of asymmetric error-correcting codes is proposed. In this method, at -fold asymmetric error-correcting code of lengthn-1 is constructed by expurgating and puncturing anyt -fold symmetric error-correcting code of lengthn . These codes are designed for use on binary asymmetric channels, such as large-scale integration (LSI) memory protection, on which transition is one-way. 相似文献
12.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1976,22(3):349-352
It is shown that(n_{o},k_{o}) convolutional codes with unit memory always achieve the largest free distance among all codes of the same ratek_{o}/n_{o} and same number2^{Mk_{o} of encoder states, whereM is the encoder memory. A unit-memory code with maximal free distance is given at each place where this free distance exceeds that of the best code withk_{o} andn_{o} relatively prime, for allMk_{o} leq 6 and forR = l/2, 1/3, 1/4, 2/3 . It is shown that the unit-memory codes are byte oriented in such a way as to be attractive for use in concatenated coding systems. 相似文献
13.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1986,32(6):849-854
The problem of achieving synchronization for variable-length source codes is addressed through the use of self-synchronizing binary prefix-condition codes. Although our codes are suboptimal in the sense of minimum average codeword length, they have the advantages of being generated by an explicit constructive algorithm, having minimal additional redundancy compared with optimal codes-as little as one additional bit introduced into the least likely codeword for a large class of sources-and having statistical synchronizing performance that improves on that of the optimal code in many cases. 相似文献
14.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1975,21(5):589-592
In this correspondence a method is presented whereby the average synchronization-error-correcting capability of Tavares' subset codes may be improved with no additional cost in rate and with only a small increase in the complexity of encoding and decoding. The method consists simply in shifting every word of the subset codes in such a way so that the shifted versions have a maximum number of leading and trailing zeros. A lower bound on the increase in synchronization-error-correcting capability provided by this method is derived. 相似文献
15.
16.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1974,20(1):131-133
LetVprime be a binary(n,k) majority-logic decodable code withgprime (X) as its generator polynomial and odd minimum distanced . LetV be the(n, k - 1) subset code generated bygprime (X)(1 + X ). This correspondence shows thatV is majority-logic deeodable withd + 1 orthogonal estimates. This fact is useful in the simultaneous correction of random errors and erasures. 相似文献
17.
18.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1978,24(2):264-268
Fixed binary convolutional codes are considered which are simultaneously optimal or near-optimal according to three criteria: namely, distance profiled , free distanced_{ infty} , and minimum number of weightd_{infty} paths. It is shown how the optimum distance profile criterion can be used to limit the search for codes with a large value ofd_{infty} . We present extensive lists of such robustly optimal codes containing rateR = l/2 nonsystematic codes, several withd_{infty} superior to that of any previously known code of the same rate and memory; rateR = 2/3 systematic codes; and rateR = 2/3 nonsystematic codes. As a counterpart to quick-look-in (QLI) codes which are not "transparent," we introduce rateR = 1/2 easy-look-in-transparent (ELIT) codes with a feedforward inverse(1 + D,D) . In general, ELIT codes haved_{infty} superior to that of QLI codes. 相似文献
19.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1977,23(3):396-397
An asymptotic Hamming bound for tree codes is derived. This bound is not new, it has been obtained earlier by Pinsker. However, Markov chains were used by Pinsker in its proof whereas more direct methods are used here. 相似文献
20.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1986,32(5):695-697
Let{ v_{1}, cdots , v_{N} } be a code ofN vectors whose components consist ofm ones and(n - m) zeros. The vectors are transmitted with equal probability over the asymmetric channel whose error probabilities for transmitted zeros and ones equal respectively0 andp, 0 < p < 1 (such channels arise in optical communication). The problem of determining for fixed values of the parametersN, n, m, p those codes which achieve minimum error probability is studied. The problem is solved forN leq 3 . Partial results are obtained for allN . 相似文献