共查询到20条相似文献,搜索用时 31 毫秒
1.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(2):385-388
LetV be an(n, k, d) binary projective geometry code withn = (q^{m}-1)/(q - 1), q = 2^{s} , andd geq [(q^{m-r}-1)/(q - 1)] + 1 . This code isr -step majority-logic decodable. With reference to the GF(q^{m}) = {0, 1, alpha , alpha^{2} , cdots , alpha^{n(q-1)-1} } , the generator polynomialg(X) , ofV , hasalpha^{nu} as a root if and only ifnu has the formnu = i(q - 1) andmax_{0 leq l < s} W_{q}(2^{l} nu) leq (m - r - 1)(q - 1) , whereW_{q}(x) indicates the weight of the radix-q representation of the numberx . LetS be the set of nonzero numbersnu , such thatalpha^{nu} is a root ofg(X) . LetC_{1}, C_{2}, cdots, C_{nu} be the cyclotomic cosets such thatS is the union of these cosets. It is clear that the process of findingg(X) becomes simpler if we can find a representative from eachC_{i} , since we can then refer to a table, of irreducible factors, as given by, say, Peterson and Weldon. In this correspondence it was determined that the coset representatives for the cases ofm-r = 2 , withs = 2, 3 , andm-r=3 , withs=2 . 相似文献
2.
《Electron Devices, IEEE Transactions on》1974,21(1):89-93
Assuming the conventional divisions of the semiconductor into depleted and neutral regions, it is shown that for an abrupt p-n junction with nondegenerate carriers a relation exists between the open circuit photovoltage and the PN product at the junction(PN)_{0} , which is valid for all signal levels. In the small-signal case this leads to the standard result. At intermediate levels a new relationV = KT/q (1 pm m) log_{e} ([(PN)_{0}]^{1/2}/n_{i}) holds, the upper sign for p+-n junctions, the lower for n+-p junctions;m = (micro_{e}-micro_{h})/(micro_{e}+micro_{h}) . At very high levels the photovoltage saturates toV = kT/q[log_{e}(M_{p}M_{n}/n_{i^{2}}) + m log_{e}(micro_{h}M_{p}/micro_{e}M_{N})] . Since Mp and MN are the doping levels in the p and n regions, the first term is the diffusion potential and the second term will be positive for p+-n junctions and negative for n+-p junctions. These results compare satisfactorily with the available experimental data. 相似文献
3.
Higher dimensional orthogonal designs and applications 总被引:2,自引:0,他引:2
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1981,27(6):772-779
The concept of orthogonal design is extended to higher dimensions. A properg -dimensional design[d_{ijk cdots upsilon}] is defined as one in which all parallel(g-1) -dimensional layers, in any orientation parallel to a hyper plane, are uncorrelated. This is equivalent to the requirement thatd_{ijk cdots upsilon} in {0, pm x_{1}, cdots , pm x_{t} } , wherex_{1}, cdots , x_{t} are commuting variables, and thatsum_{p} sum_{q} sum_{r} cdots sum_{y} d_{pqr cdots ya} d_{pqr cdots yb} = left( sum_{t} s_{i}x_{i}^{2} right)^{g-1} delta ab, where(s{1}, cdots , s{t}) are integers giving the occurrences ofpm x_{1}, cdots , pm x_{t} in each row and column (this is called the type(s_{1}, cdot ,s_{t})^{g-1}) and(pqr cdots yz) represents all permutations of(ijk cdots upsilon) . This extends an idea of Paul J. Shlichta, whose higher dimensional Hadamard matrices are special cases withx_{1}, cdots , x_{t} in {1,- 1}, (s_{1}, cdots, s_{t})=(g) , and(sum_{t}s_{i}x_{i}^{2})=g . Another special case is higher dimensional weighing matrices of type(k)^{g} , which havex_{1}, cdots , x_{t} in {0,1,- 1}, (s_{1}, cdots, s_{t})=(k) , and(sum_{t}s_{i}x_{i}^{2})=k . Shlichta found properg -dimensional Hadamard matrices of size(2^{t})^{g} . Proper orthogonal designs of type 相似文献
4.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1980,26(3):359-362
Letr_{i} be the covering radius of the(2^{i},i+ 1) Reed-Muller code. It is an open question whetherr_{2m+1}=2^{2_{m}}-2m holds for allm . It is known to be true form=0,1,2 , and here it is shown to be also true form=3 . 相似文献
5.
Achievable rates for multiple descriptions 总被引:12,自引:0,他引:12
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1982,28(6):851-857
6.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1987,33(6):919-923
LetC be the cyclic product code ofp single parity check codes of relatively prime lengthsn_{1}, n_{2},cdots , n_{p} (n_{1} < n_{2} < cdots < n_{p}) . It is proven thatC can correct2^{P-2}+2^{p-3}-1 bursts of lengthn_{1} , andlfloor(max{p+1, min{2^{p-s}+s-1,2^{p-s}+2^{p-s-1}}}-1)/2rfloor bursts of lengthn_{1}n_{2} cdots n_{s} (2leq s leq p-2) . Forp=3 this means thatC is double-burst-n_{1} -correcting. An efficient decoding algorithm is presented for this code. 相似文献
7.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1979,25(1):105-109
LetV be a binary linear(n,k) -code defined by a check matrixH with columnsh_{1}, cdots ,h_{n} , and leth(x) = 1 ifx in {h_{1}, cdots , h_{n} , andh(x) = 0 ifx in neq {h_{1}, cdots ,h_{n}} . A combinatorial argument relates the Walsh transform ofh(x) with the weight distributionA(i) of the codeV for smalli(i< 7) . This leads to another proof of the Plessi th power moment identities fori < 7 . This relation also provides a simple method for computing the weight distributionA(i) for smalli . The implementation of this method requires at most(n-k+ 1)2^{n-k} additions and subtractions,5 .2^{n-k} multiplications, and2^{n-k} memory cells. The method may be very effective if there is an analytic expression for the characteristic Boolean functionh(x) . This situation will be illustrated by several examples. 相似文献
8.
9.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1972,18(3):409-414
The weight enumerator of a code is the polynomial begin{equation} W(x,y)= sum_{r=0}^n A_r x^{n-r} y^r, end{equation} wheren denotes the block length andA_r , denotes the number of codewords of weightr . LetC be a self-dual code overGF(q) in which every weight is divisible byc . Then Gleason's theorem states that 1) ifq = 2 andc = 2, the weight enumerator ofC is a sum of products of the polynomialsx^2 + y^2 andx^2y^2 (x^2 - y^2 )^2 ifq = 2 andc = 4, the weight enumerator is a sum of products ofx^8 + 14x^4 y^4 + y^8 andx^4 y^4 (x^4 - y^4)^4 ; and 3) ifq = 3 andc = 3, the weight enumerator is a sum of products ofx^4 + 8xy^3 andy^3(x^3 - y^3)^3 . In this paper we give several proofs of Gleason's theorem. 相似文献
10.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(2):395-403
For any(n, k, d) binary linear code, the Griesmer bound says thatn geq sum_{i=0}^{k-1} lceil d/2^{i} rceil , wherelceil x rceil denotes the smallest integergeq x . We consider codes meeting the Griesmer bound with equality. These codes have parametersleft( s(2^{k} - 1) - sum_{i=1}^{p} (2^{u_{i}} - 1), k, s2^{k-1} - sum_{i=1}^{p} 2^{u_{i} -1} right) , wherek > u_{1} > cdots > u_{p} geq 1 . We characterize all such codes whenp = 2 oru_{i-1}-u_{i} geq 2 for2 leq i leq p . 相似文献
11.
An algorithm for maximizing expected log investment return 总被引:3,自引:0,他引:3
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(2):369-373
Let the random (stock market) vectorX geq 0 be drawn according to a known distribution functionF(x), x in R^{m} . A log-optimal portfoliob^{ast} is any portfoliob achieving maximal expectedlog returnW^{ast}=sup_{b} E ln b^{t}X , where the supremum is over the simplexb geq 0, sum_{i=1}^{m} b_{i} = 1 . An algorithm is presented for findingb^{ast} . The algorithm consists of replacing the portfoliob by the expected portfoliob^{'}, b_{i}^{'} = E(b_{i}X_{i}/b^{t}X) , corresponding to the expected proportion of holdings in each stock after one market period. The improvement inW(b) after each iteration is lower-bounded by the Kullback-Leibler information numberD(b^{'}|b) between the current and updated portfolios. Thus the algorithm monotonically improves the returnW . An upper bound onW^{ast} is given in terms of the current portfolio and the gradient, and the convergence of the algorithm is established. 相似文献
12.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1983,29(3):390-395
The encoding of a discrete memoryless multiple source{( X_{i}, Y_{i})}_{i=1}^{infty} for reconstruction of a sequence{Z_{i}}_{i=1}^{infty}} , withZ_{i} = F( X_{i}, Y_{i}); i = 1,2, cdots is considered. We require that the encoding should be such that{X_{i}}_{i=1}^{infty} is encoded first without any consideration of{Y_{i}}_{i=1}^{infty} , while in a second part of the encoding, this latter sequence is encoded based on knowledge of the outcome of the first encoding. The resulting scheme is called successive encoding. We find general outer and inner bounds for the corresponding set of achievable rates along with a complete single letter characterization for the special caseH( X_{i}|Z_{i}, Y_{i}) = 0 . Comparisons with the Slepian-Wolf problem and the Ahlswede-Korner-Wyner side information problem are carried out. 相似文献
13.
Duadic Codes 总被引:3,自引:0,他引:3
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(5):709-714
A new family of binary cyclic(n,(n + 1)/2) and(n,(n - 1)/2) codes are introduced, which include quadratic residue (QR) codes whenn is prime. These codes are defined in terms of their idempotent generators, and they exist for all oddn = p_{1}^{a_{1}} p_{2}^{a_{2}} cdots p_{r}^{a_{r}} where eachp_{i} is a primeequiv pm 1 pmod{8} . Dual codes are identified. The minimum odd weight of a duadic(n,(n + 1)/2) code satisfies a square root bound. When equality holds in the sharper form of this bound, vectors of minimum weight hold a projective plane. The unique projective plane of order 8 is held by the minimum weight vectors in two inequivalent(73,37,9) duadic codes. All duadic codes of length less than127 are identified, and the minimum weights of their extensions are given. One of the duadic codes of length113 has greater minimum weight than the QR code of that length. 相似文献
14.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1981,27(1):132-136
A randomized decision rule is derived and proved to be the saddlepoint solution of the robust detection problem for known signals in independent unknown-mean amplitude-bounded noise. The saddlepoint solutionphi^{0} uses an equaUy likely mixed strategy to chose one ofN Bayesian single-threshold decision rulesphi_{i}^{0}, i = 1,cdots , N having been obtained previously by the author. These decision rules are also all optimal against the maximin (least-favorable) nonrandomized noise probability densityf_{0} , wheref_{0} is a picket fence function withN pickets on its domain. Thee pair(phi^{0}, f_{0}) is shown to satisfy the saddlepoint condition for probability of error, i.e.,P_{e}(phi^{0} , f) leq P_{e}(phi^{0} , f_{0}) leq P_{e}(phi, f_{0}) holds for allf andphi . The decision rulephi^{0} is also shown to be an eqoaliir rule, i.e.,P_{e}(phi^{0}, f ) = P_{e}(phi^{0},f_{0}) , for allf , with4^{-1} leq P_{e}(phi^{0},f_{0})=2^{-1}(1-N^{-1})leq2^{-1} , N geq 2 . Thus nature can force the communicator to use an {em optimal} randomized decision rule that generates a large probability of error and does not improve when less pernicious conditions prevail. 相似文献
15.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1976,22(3):363-366
This article presents new tighter upper bounds on the rate of Gaussian autoregressive channels with linear feedback. The separation between the upper and lower bounds is small. We havefrac{1}{2} ln left( 1 + rho left( 1+ sum_{k=1}^{m} alpha_{k} x^{- k} right)^{2} right) leq C_{L} leq frac{1}{2} ln left( 1+ rho left( 1+ sum_{k = 1}^{m} alpha_{k} / sqrt{1 + rho} right)^{2} right), mbox{all rho} , whererho = P/N_{0}W, alpha_{l}, cdots, alpha_{m} are regression coefficients,P is power,W is bandwidth,N_{0} is the one-sided innovation spectrum, andx is a root of the polynomial(X^{2} - 1)x^{2m} - rho left( x^{m} + sum^{m}_{k=1} alpha_{k} x^{m - k} right)^{2} = 0. It is conjectured that the lower bound is the feedback capacity. 相似文献
16.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1974,20(2):278-279
Asymptotic properties of expected distortion are studied for the delay-time-weighted probability of error distortion measured_n(x,tilde{x}) = n^{-1} sum_{t=0}^{n-1} f(t + n)[l - delta(x_t,tilde{x}_t)] ,, wherex = (x_0,x_1,cdots,x_{n-1}) andtilde{x} = (tilde{x}_0,tilde{x}_1,cdots,tilde{x}_{n-1}) are source and reproducing vectors, respectively, anddelta (cdot, cdot) is the Kronecker delta. With reasonable block coding and transmission constraintsx_t is reproduced astilde{x}_t with a delay oft + n time units. It is shown that if the channel capacity is greater than the source entropyC > H(X) , then there exists a sequence of block lengthn codes such thatE[d_n(X,tilde{X})] rigjhtarrow 0 asn rightarrow infty even iff(t) rightarrow infty at an exponential rate. However, iff(t) grows at too fast an exponential rate, thenE[d_n(X,tilde{X})] rightarrow infty asn rightarrow infty . Also, ifC < H(X) andf(t) rightarrow infty thenE[d_n(X,tilde{X})] rightarrow infty asn rightarrow infty no matter how slowlyf(t) grows. 相似文献
17.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1986,32(3):349-354
An(n, k, d) linear code overF= GF(q) is said to be {em maximum distance separable} (MDS) ifd = n - k + 1 . It is shown that an(n, k, n - k + 1) generalized Reed-Solomon code such that2leq k leq n - lfloor (q - 1)/2 rfloor (k neq 3 {rm if} q is even) can be extended by one digit while preserving the MDS property if and only if the resulting extended code is also a generalized Reed-Solomon code. It follows that a generalized Reed-Solomon code withk in the above range can be {em uniquely} extended to a maximal MDS code of lengthq + 1 , and that generalized Reed-Solomon codes of lengthq + 1 and dimension2leq k leq lfloor q/2 rfloor + 2 (k neq 3 {rm if} q is even) do not have MDS extensions. Hence, in cases where the(q + 1, k) MDS code is essentially unique,(n, k) MDS codes withn > q + 1 do not exist. 相似文献
18.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1987,33(1):69-76
Consider separate encoding of correlated sourcesX^{n}=(X_{l}, cdots ,X_{n}), Y^{n} = (Y_{l}, cdots ,Y_{n}) for the decoder to reliably reproduce a function{F(X_{i}, Y_{i})}^{n}_{i=1} . We establish the necessary and sufficient condition for the set of all achievable rates to coincide with the Slepian-Wolf region whenever the probability densityp(x,y) is positive for all(x,y) . 相似文献
19.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1970,16(6):745-751
In this paper, we establish the following result. Theorem:A_i , the number of codewords of weighti in the second-order binary Reed-Muller code of length2^m is given byA_i = 0 unlessi = 2^{m-1} or2^{m-1} pm 2^{m-l-j} , for somej, 0 leq j leq [m/2], A_0 = A_{2^m} = 1 , and begin{equation} begin{split} A_{2^{m-1} pm 2^{m-1-j}} = 2^{j(j+1)} &{frac{(2^m - 1) (2^{m-1} - 1 )}{4-1} } \ .&{frac{(2^{m-2} - 1)(2^{m-3} -1)}{4^2 - 1} } cdots \ .&{frac{(2^{m-2j+2} -1)(2^{m-2j+1} -1)}{4^j -1} } , \ & 1 leq j leq [m/2] \ end{split} end{equation} begin{equation} A_{2^{m-1}} = 2 { 2^{m(m+1)/2} - sum_{j=0}^{[m/2]} A_{2^{m-1} - 2^{m-1-j}} }. end{equation} 相似文献
20.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1986,32(5):706-709
Recently Kasami {em et al.} presented a linear programming approach to the weight distribution of binary linear codes [2]. Their approach to compute upper and lower bounds on the weight distribution of binary primitive BCH codes of length2^{m} - 1 withm geq 8 and designed distance2t + 1 with4 leq t leq 5 is improved. From these results, the relative deviation of the number of codewords of weightjleq 2^{m-1} from the binomial distribution2^{-mt} left( stackrel{2^{m}-1}{j} right) is shown to be less than 1 percent for the following cases: (1)t = 4, j geq 2t + 1 andm geq 16 ; (2)t = 4, j geq 2t + 3 and10 leq m leq 15 ; (3)t=4, j geq 2t+5 and8 leq m leq 9 ; (4)t=5,j geq 2t+ 1 andm geq 20 ; (5)t=5, j geq 2t+ 3 and12 leq m leq 19 ; (6)t=5, j geq 2t+ 5 and10 leq m leq 11 ; (7)t=5, j geq 2t + 7 andm=9 ; (8)t= 5, j geq 2t+ 9 andm = 8 . 相似文献